期刊文献+
共找到1,605篇文章
< 1 2 81 >
每页显示 20 50 100
Policy Network-Based Dual-Agent Deep Reinforcement Learning for Multi-Resource Task Offloading in Multi-Access Edge Cloud Networks
1
作者 Feng Chuan Zhang Xu +2 位作者 Han Pengchao Ma Tianchun Gong Xiaoxue 《China Communications》 SCIE CSCD 2024年第4期53-73,共21页
The Multi-access Edge Cloud(MEC) networks extend cloud computing services and capabilities to the edge of the networks. By bringing computation and storage capabilities closer to end-users and connected devices, MEC n... The Multi-access Edge Cloud(MEC) networks extend cloud computing services and capabilities to the edge of the networks. By bringing computation and storage capabilities closer to end-users and connected devices, MEC networks can support a wide range of applications. MEC networks can also leverage various types of resources, including computation resources, network resources, radio resources,and location-based resources, to provide multidimensional resources for intelligent applications in 5/6G.However, tasks generated by users often consist of multiple subtasks that require different types of resources. It is a challenging problem to offload multiresource task requests to the edge cloud aiming at maximizing benefits due to the heterogeneity of resources provided by devices. To address this issue,we mathematically model the task requests with multiple subtasks. Then, the problem of task offloading of multi-resource task requests is proved to be NP-hard. Furthermore, we propose a novel Dual-Agent Deep Reinforcement Learning algorithm with Node First and Link features(NF_L_DA_DRL) based on the policy network, to optimize the benefits generated by offloading multi-resource task requests in MEC networks. Finally, simulation results show that the proposed algorithm can effectively improve the benefit of task offloading with higher resource utilization compared with baseline algorithms. 展开更多
关键词 benefit maximization deep reinforcement learning multi-access edge cloud task offloading
下载PDF
Multi-access performance of DS UWB systemunder indoor dense multi-path channel
2
作者 樊祥宁 倪剑强 毕光国 《Journal of Southeast University(English Edition)》 EI CAS 2005年第4期393-397,共5页
The performance of multi-user code to direct spreading bi-phase shift keying (DS-BPSK) direct impulse ultra wideband (UWB) systems under indoor multi-user and multi-path environment is analyzed and simulated. The ... The performance of multi-user code to direct spreading bi-phase shift keying (DS-BPSK) direct impulse ultra wideband (UWB) systems under indoor multi-user and multi-path environment is analyzed and simulated. The system output signals with Rake receiver are derived, then a simple and practical code selection scheme is given; i. e., with a large occupation to empty ratio of the repeating pulses, directly choosing those random or pseudo-random user codes with enough length and good co-relative orthogonal features will make the performance of DS-BPSK approximate the optimum and, so there is no need to carefully design the code or its type. The system multi-access performances are simulated using Gold sequence and PN codes as multi-user codes under CMI-CM4 multi-path channels. Simulation results prove that the proposed scheme is feasible. 展开更多
关键词 ultra wideband multi-access MULTI-PATH Gold code direct sequence RAKE
下载PDF
Deep Reinforcement Learning-Based Computation Offloading for 5G Vehicle-Aware Multi-Access Edge Computing Network 被引量:16
3
作者 Ziying Wu Danfeng Yan 《China Communications》 SCIE CSCD 2021年第11期26-41,共16页
Multi-access Edge Computing(MEC)is one of the key technologies of the future 5G network.By deploying edge computing centers at the edge of wireless access network,the computation tasks can be offloaded to edge servers... Multi-access Edge Computing(MEC)is one of the key technologies of the future 5G network.By deploying edge computing centers at the edge of wireless access network,the computation tasks can be offloaded to edge servers rather than the remote cloud server to meet the requirements of 5G low-latency and high-reliability application scenarios.Meanwhile,with the development of IOV(Internet of Vehicles)technology,various delay-sensitive and compute-intensive in-vehicle applications continue to appear.Compared with traditional Internet business,these computation tasks have higher processing priority and lower delay requirements.In this paper,we design a 5G-based vehicle-aware Multi-access Edge Computing network(VAMECN)and propose a joint optimization problem of minimizing total system cost.In view of the problem,a deep reinforcement learningbased joint computation offloading and task migration optimization(JCOTM)algorithm is proposed,considering the influences of multiple factors such as concurrent multiple computation tasks,system computing resources distribution,and network communication bandwidth.And,the mixed integer nonlinear programming problem is described as a Markov Decision Process.Experiments show that our proposed algorithm can effectively reduce task processing delay and equipment energy consumption,optimize computing offloading and resource allocation schemes,and improve system resource utilization,compared with other computing offloading policies. 展开更多
关键词 multi-access edge computing computation offloading 5G vehicle-aware deep reinforcement learning deep q-network
下载PDF
Intelligent Immunity Based Security Defense System for Multi-Access Edge Computing Network 被引量:3
4
作者 Chengcheng Zhou Yanping Yu +1 位作者 Shengsong Yang Haitao Xu 《China Communications》 SCIE CSCD 2021年第1期100-107,共8页
In this paper,the security problem for the multi-access edge computing(MEC)network is researched,and an intelligent immunity-based security defense system is proposed to identify the unauthorized mobile users and to p... In this paper,the security problem for the multi-access edge computing(MEC)network is researched,and an intelligent immunity-based security defense system is proposed to identify the unauthorized mobile users and to protect the security of whole system.In the proposed security defense system,the security is protected by the intelligent immunity through three functions,identification function,learning function,and regulation function,respectively.Meanwhile,a three process-based intelligent algorithm is proposed for the intelligent immunity system.Numerical simulations are given to prove the effeteness of the proposed approach. 展开更多
关键词 intelligent immunity security defense multi-access edge computing network security
下载PDF
Integration of Communication and Computing in Blockchain-Enabled Multi-Access Edge Computing Systems 被引量:2
5
作者 Zhonghua Zhang Jie Feng +2 位作者 Qingqi Pei Le Wang Lichuan Ma 《China Communications》 SCIE CSCD 2021年第12期297-314,共18页
Blockchain and multi-access edge com-puting(MEC)are two emerging promising tech-nologies that have received extensive attention from academia and industry.As a brand-new information storage,dissemination and managemen... Blockchain and multi-access edge com-puting(MEC)are two emerging promising tech-nologies that have received extensive attention from academia and industry.As a brand-new information storage,dissemination and management mechanism,blockchain technology achieves the reliable transmis-sion of data and value.While as a new computing paradigm,multi-access edge computing enables the high-frequency interaction and real-time transmission of data.The integration of communication and com-puting in blockchain-enabled multi-access edge com-puting networks has been studied without a systemat-ical view.In the survey,we focus on the integration of communication and computing,explores the mu-tual empowerment and mutual promotion effects be-tween the blockchain and MEC,and introduces the resource integration architecture of blockchain and multi-access edge computing.Then,the paper sum-marizes the applications of the resource integration ar-chitecture,resource management,data sharing,incen-tive mechanism,and consensus mechanism,and ana-lyzes corresponding applications in real-world scenar-ios.Finally,future challenges and potentially promis-ing research directions are discussed and present in de-tail. 展开更多
关键词 blockchain multi-access edge computing mutual empowerment network architecture
下载PDF
A Review in the Core Technologies of 5G: Device-to-Device Communication, Multi-Access Edge Computing and Network Function Virtualization 被引量:2
6
作者 Ruixuan Tu Ruxun Xiang +1 位作者 Yang Xu Yihan Mei 《International Journal of Communications, Network and System Sciences》 2019年第9期125-150,共26页
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ... 5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances. 展开更多
关键词 5th Generation Network VIRTUALIZATION Device-To-Device COMMUNICATION Base STATION Direct COMMUNICATION INTERFERENCE multi-access EDGE COMPUTING Mobile EDGE COMPUTING
下载PDF
New strategies for collision resolution of multi-access channel
7
作者 凌永发 孟德宇 张继洁 《Journal of Pharmaceutical Analysis》 SCIE CAS 2007年第1期56-59,共4页
The truncated binary exponential back-off algorithm is one of the most effective methods applied in collision resolution process of random multi-access channel.In this study,two new strategies are presented to improve... The truncated binary exponential back-off algorithm is one of the most effective methods applied in collision resolution process of random multi-access channel.In this study,two new strategies are presented to improve the capability of the truncated binary exponential back-off algorithm.In the new strategies,the sizes of the initial window size or the operating window sizes are adjusted dynamically,which always bring a significant improvement for the self-adaptability of the original algorithm.A series of experiments are simulated and the results verify that the new strategies can make the implementation more stable and effective than the original algorithm. 展开更多
关键词 back-off algorithm collision resolution multi-access channel
下载PDF
DQN-Based Proactive Trajectory Planning of UAVs in Multi-Access Edge Computing
8
作者 Adil Khan Jinling Zhang +3 位作者 Shabeer Ahmad Saifullah Memon Babar Hayat Ahsan Rafiq 《Computers, Materials & Continua》 SCIE EI 2023年第3期4685-4702,共18页
The main aim of future mobile networks is to provide secure,reliable,intelligent,and seamless connectivity.It also enables mobile network operators to ensure their customer’s a better quality of service(QoS).Nowadays... The main aim of future mobile networks is to provide secure,reliable,intelligent,and seamless connectivity.It also enables mobile network operators to ensure their customer’s a better quality of service(QoS).Nowadays,Unmanned Aerial Vehicles(UAVs)are a significant part of the mobile network due to their continuously growing use in various applications.For better coverage,cost-effective,and seamless service connectivity and provisioning,UAVs have emerged as the best choice for telco operators.UAVs can be used as flying base stations,edge servers,and relay nodes in mobile networks.On the other side,Multi-access EdgeComputing(MEC)technology also emerged in the 5G network to provide a better quality of experience(QoE)to users with different QoS requirements.However,UAVs in a mobile network for coverage enhancement and better QoS face several challenges such as trajectory designing,path planning,optimization,QoS assurance,mobilitymanagement,etc.The efficient and proactive path planning and optimization in a highly dynamic environment containing buildings and obstacles are challenging.So,an automated Artificial Intelligence(AI)enabled QoSaware solution is needed for trajectory planning and optimization.Therefore,this work introduces a well-designed AI and MEC-enabled architecture for a UAVs-assisted future network.It has an efficient Deep Reinforcement Learning(DRL)algorithm for real-time and proactive trajectory planning and optimization.It also fulfills QoS-aware service provisioning.A greedypolicy approach is used to maximize the long-term reward for serving more users withQoS.Simulation results reveal the superiority of the proposed DRL mechanism for energy-efficient and QoS-aware trajectory planning over the existing models. 展开更多
关键词 multi-access edge computing UAVS trajectory planning QoS assurance reinforcement learning deep Q network
下载PDF
A Random Multi-Access Method for Data Services in CDMA Cellular System
9
作者 李振 尤肖虎 《Journal of Southeast University(English Edition)》 EI CAS 1997年第2期8-12,共5页
ARandomMultiAccessMethodforDataServicesinCDMACelularSystemLiZhen(李振)YouXiaohu(尤肖虎)(NationalMobileCommunicat... ARandomMultiAccessMethodforDataServicesinCDMACelularSystemLiZhen(李振)YouXiaohu(尤肖虎)(NationalMobileCommunicationsResearchLabor... 展开更多
关键词 multiple ACCESS CODE DIVISION multi ACCESS mobile communication
下载PDF
基于空中计算CoMAC架构的不同计算场景叠加符号判决算法
10
作者 秦晓卫 周子涵 陈力 《中山大学学报(自然科学版)(中英文)》 CAS 北大核心 2025年第1期61-70,共10页
本文研究不同场景下基于空中计算的多址信道计算(CoMAC)架构的覆盖符号决策算法。首先,从理论上分析了XOR、ADD、MOD三种场景中加性高斯白噪声(AWGN)多址接入信道下叠加符号的概率密度分布,提出了一种基于先验概率的最优门限判决策略。... 本文研究不同场景下基于空中计算的多址信道计算(CoMAC)架构的覆盖符号决策算法。首先,从理论上分析了XOR、ADD、MOD三种场景中加性高斯白噪声(AWGN)多址接入信道下叠加符号的概率密度分布,提出了一种基于先验概率的最优门限判决策略。其次,推导了系统最优门限及对应误码率的理论表达式。最后,通过仿真验证了不同信噪比、传感器节点个数及先验概率对于该门限判决方案的鲁棒性和可靠性的影响。与通信计算相分离的传统方案相比,空中计算判决方案具有更好的检测性能,为多址接入信道下的信号识别提供了新的参考方案。 展开更多
关键词 空中计算 多址接入信道 最优门限判决 检测性能
下载PDF
Analysis of Multi-Channel and Slotted Random Multi-Access Protocol with Two-Dimensional Probability for Ad Hoc Network 被引量:4
11
作者 周宁玉 赵东风 丁洪伟 《Tsinghua Science and Technology》 SCIE EI CAS 2008年第6期747-753,共7页
A higher quality of service (QoS) is provided for ad hoc networks through a multi-channel and slotted random multi-access (MSRM) protocol with two-dimensional probability. For this protocol, the system time is slo... A higher quality of service (QoS) is provided for ad hoc networks through a multi-channel and slotted random multi-access (MSRM) protocol with two-dimensional probability. For this protocol, the system time is slotted into a time slot with high channel utilization realized by the choice of two parameters p1 and p2, and the channel load equilibrium. The protocol analyzes the throughput of the MSRM protocol for a load equilibrium state and the throughput based on priority. Simulations agree with the theoretical analysis. The simulations also show that the slotted-time system is better than the continuous-time system. 展开更多
关键词 MULTI-CHANNEL slotted random multi-access two-dimensional probability carrier sense multiple access quality of service ad hoc networks
原文传递
基于高空平台的边缘计算卸载:网络、算法和展望
12
作者 孙恩昌 李梦思 +2 位作者 何若兰 张卉 张延华 《北京工业大学学报》 CAS CSCD 北大核心 2024年第3期348-361,共14页
高空平台(high altitude platform,HAP)技术与多接入边缘计算(multi-access edge computing,MEC)技术的结合将MEC服务器部署区域由地面扩展到空中,打破传统地面MEC网络的局限性,为用户提供无处不在的计算卸载服务。针对基于HAP的MEC卸... 高空平台(high altitude platform,HAP)技术与多接入边缘计算(multi-access edge computing,MEC)技术的结合将MEC服务器部署区域由地面扩展到空中,打破传统地面MEC网络的局限性,为用户提供无处不在的计算卸载服务。针对基于HAP的MEC卸载研究进行综述,首先,从HAP计算节点的优势、网络组成部分、网络结构、主要挑战及其应对技术4个方面分析基于HAP的MEC网络;其次,分别从图论、博弈论、机器学习、联邦学习等理论的角度对基于HAP的MEC卸载算法进行横向分析和纵向对比;最后,指出基于HAP的MEC卸载技术目前存在的问题,并对该技术的未来研究方向进行展望。 展开更多
关键词 高空平台(high altitude platform HAP) 多接入边缘计算(multi-access edge computing MEC) 计算卸载 图论 博弈论 机器学习
下载PDF
基于深度确定性策略梯度的星地融合网络可拆分任务卸载算法
13
作者 宋晓勤 吴志豪 +4 位作者 赖海光 雷磊 张莉涓 吕丹阳 郑成辉 《通信学报》 EI CSCD 北大核心 2024年第10期116-128,共13页
为解决低轨卫星网络中星地链路任务卸载时延长的问题,提出了一种基于深度确定性策略梯度(DDPG)的星地融合网络可拆分任务卸载算法。针对不同地区用户建立了星地融合网络的多接入边缘计算结构模型,通过应用多智能体DDPG算法,将系统总服... 为解决低轨卫星网络中星地链路任务卸载时延长的问题,提出了一种基于深度确定性策略梯度(DDPG)的星地融合网络可拆分任务卸载算法。针对不同地区用户建立了星地融合网络的多接入边缘计算结构模型,通过应用多智能体DDPG算法,将系统总服务时延最小化的目标转化为智能体奖励收益最大化。在满足子任务卸载约束、服务时延约束等任务卸载约束条件下,优化用户任务拆分比例。仿真结果表明,所提算法在用户服务时延和受益用户数量等方面优于基线算法。 展开更多
关键词 星地融合网络 深度确定性策略梯度 资源分配 多接入边缘计算
下载PDF
Two-Stage IoT Computational Task Offloading Decision-Making in MEC with Request Holding and Dynamic Eviction
14
作者 Dayong Wang Kamalrulnizam Bin Abu Bakar Babangida Isyaku 《Computers, Materials & Continua》 SCIE EI 2024年第8期2065-2080,共16页
The rapid development of Internet of Things(IoT)technology has led to a significant increase in the computational task load of Terminal Devices(TDs).TDs reduce response latency and energy consumption with the support ... The rapid development of Internet of Things(IoT)technology has led to a significant increase in the computational task load of Terminal Devices(TDs).TDs reduce response latency and energy consumption with the support of task-offloading in Multi-access Edge Computing(MEC).However,existing task-offloading optimization methods typically assume that MEC’s computing resources are unlimited,and there is a lack of research on the optimization of task-offloading when MEC resources are exhausted.In addition,existing solutions only decide whether to accept the offloaded task request based on the single decision result of the current time slot,but lack support for multiple retry in subsequent time slots.It is resulting in TD missing potential offloading opportunities in the future.To fill this gap,we propose a Two-Stage Offloading Decision-making Framework(TSODF)with request holding and dynamic eviction.Long Short-Term Memory(LSTM)-based task-offloading request prediction and MEC resource release estimation are integrated to infer the probability of a request being accepted in the subsequent time slot.The framework learns optimized decision-making experiences continuously to increase the success rate of task offloading based on deep learning technology.Simulation results show that TSODF reduces total TD’s energy consumption and delay for task execution and improves task offloading rate and system resource utilization compared to the benchmark method. 展开更多
关键词 Decision making internet of things load prediction task offloading multi-access edge computing
下载PDF
Associative Tasks Computing Offloading Scheme in Internet of Medical Things with Deep Reinforcement Learning
15
作者 Jiang Fan Qin Junwei +1 位作者 Liu Lei Tian Hui 《China Communications》 SCIE CSCD 2024年第4期38-52,共15页
The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-rel... The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-related coupling relationships, Io MT faces unprecedented challenges. Considering the associative connections among tasks, this paper proposes a computing offloading policy for multiple-user devices(UDs) considering device-to-device(D2D) communication and a multi-access edge computing(MEC)technique under the scenario of Io MT. Specifically,to minimize the total delay and energy consumption concerning the requirement of Io MT, we first analyze and model the detailed local execution, MEC execution, D2D execution, and associated tasks offloading exchange model. Consequently, the associated tasks’ offloading scheme of multi-UDs is formulated as a mixed-integer nonconvex optimization problem. Considering the advantages of deep reinforcement learning(DRL) in processing tasks related to coupling relationships, a Double DQN based associative tasks computing offloading(DDATO) algorithm is then proposed to obtain the optimal solution, which can make the best offloading decision under the condition that tasks of UDs are associative. Furthermore, to reduce the complexity of the DDATO algorithm, the cacheaided procedure is intentionally introduced before the data training process. This avoids redundant offloading and computing procedures concerning tasks that previously have already been cached by other UDs. In addition, we use a dynamic ε-greedy strategy in the action selection section of the algorithm, thus preventing the algorithm from falling into a locally optimal solution. Simulation results demonstrate that compared with other existing methods for associative task models concerning different structures in the Io MT network, the proposed algorithm can lower the total cost more effectively and efficiently while also providing a tradeoff between delay and energy consumption tolerance. 展开更多
关键词 associative tasks cache-aided procedure double deep Q-network Internet of Medical Things(IoMT) multi-access edge computing(MEC)
下载PDF
空间信息网的Ka频段非正交多址接入中继系统
16
作者 王春华 王莹莹 +2 位作者 王佳宁 白涛 孙洋 《信息技术》 2024年第11期167-172,共6页
针对深空通信的系统信息传输效率低,时延长的问题,文中设计一种空间信息网的Ka频段非正交多址接入中继系统,推导出中继卫星配备单天线情况下的中断概率和遍历系统容量等关键指标的解析表达式,提出的非正交多址接入中继系统在节约一半传... 针对深空通信的系统信息传输效率低,时延长的问题,文中设计一种空间信息网的Ka频段非正交多址接入中继系统,推导出中继卫星配备单天线情况下的中断概率和遍历系统容量等关键指标的解析表达式,提出的非正交多址接入中继系统在节约一半传输时间条件下,达到与正交多址接入系统相同遍历系统容量时所需的功率分配方案。通过仿真,验证了该方案的可行性。 展开更多
关键词 非正交多址接入 地月通信 信道估计 信噪比
下载PDF
重型施工机械安拆吊装作业视觉可达性BIM仿真分析
17
作者 郑霞忠 吴俊 +1 位作者 晋良海 杜发兴 《中国安全科学学报》 CAS CSCD 北大核心 2024年第2期124-130,共7页
为提高重型施工机械安拆吊装作业安全工效,改善安拆作业过程中人员的可视性,提出基于可视锥法的多主体视觉可达性建筑信息模型(BIM)仿真方法。首先,通过重型施工机械视觉任务分解,得到重型施工机械多主体视觉任务;其次,以wk-35型电铲安... 为提高重型施工机械安拆吊装作业安全工效,改善安拆作业过程中人员的可视性,提出基于可视锥法的多主体视觉可达性建筑信息模型(BIM)仿真方法。首先,通过重型施工机械视觉任务分解,得到重型施工机械多主体视觉任务;其次,以wk-35型电铲安拆作业为研究对象,分析起重驾驶司机-信号工-司索工多主体视觉任务,运用计算机辅助三维交互应用(CATIA)人因仿真模块,构建安拆吊装作业多主体视觉的BIM仿真场景;然后,采用可视锥法,计算安拆吊装作业过程多主体视觉可达性量值,测度多主体视觉可达性水平,构建重型机械施工机械多主体视觉评价模型;最后,调节BIM模型的过程参数,推演多主体视觉变化趋势,评价安拆吊装作业多主体视觉可达性。结果表明:安拆作业中起重司机在起升下降过程中视觉可达性较差,在平移过程中视觉可达性较好;信号工和司索工的位置与其视觉可达性联系紧密,当信号工处于视野刚好覆盖起重司机和司索工的位置时,其视觉可达性最好,而司索工需不断调整位置,使其视觉可达性达到最佳。 展开更多
关键词 重型施工机械 安拆吊装作业 视觉可达性 多主体 建筑信息模型(BIM)仿真
下载PDF
基于可达性的多层动态航空网络鲁棒性分析
18
作者 王兴隆 尹昊 《中国安全生产科学技术》 CAS CSCD 北大核心 2024年第1期18-24,共7页
为更准确地描述航空网络以分析其鲁棒性,提出1种以同一始发机场及其离场航班为子网络层,随出发时刻动态变化的多层动态航空网络模型。针对我国国内(不含港澳台)多层动态航空网络,以可达性、度中心性和加权介数中心性为节点特征指标,网... 为更准确地描述航空网络以分析其鲁棒性,提出1种以同一始发机场及其离场航班为子网络层,随出发时刻动态变化的多层动态航空网络模型。针对我国国内(不含港澳台)多层动态航空网络,以可达性、度中心性和加权介数中心性为节点特征指标,网络效率为网络性能测度指标,从随机攻击和蓄意攻击2种策略下对网络进行鲁棒性分析。研究结果表明:我国国内(不含港澳台)航空网络的鲁棒性主要由20%的机场提供,且在不同时间段内鲁棒性不同,在2023年夏秋航季,7∶00~20∶00间鲁棒性较好,4∶00~7∶00和20∶00~24∶00鲁棒性较差;用可达性指标衡量航空网络中机场节点的重要程度比度中心性和加权介数中心性指标更准确。研究结果可为保障航空运输网络安全提供一定参考。 展开更多
关键词 航空网络 多层动态网络 可达性 鲁棒性
下载PDF
校企共建多网融合下的“5G+智慧校园”研究
19
作者 余鹏 张淼 +1 位作者 高杰欣 李艳 《中国现代教育装备》 2024年第17期20-24,共5页
以5G技术为信息化新基建载体,设计“5G+智慧校园”的实施框架。从运用5G技术全面赋能高校智慧校园实现共建、共融、共享为切入点,剖析智慧校园视域下5G智慧应用的现实需求,分析“5G+智慧应用”的作用与研究意义。结合某高校 “5G+智慧... 以5G技术为信息化新基建载体,设计“5G+智慧校园”的实施框架。从运用5G技术全面赋能高校智慧校园实现共建、共融、共享为切入点,剖析智慧校园视域下5G智慧应用的现实需求,分析“5G+智慧应用”的作用与研究意义。结合某高校 “5G+智慧应用”多类应用场景实践,从部署模式、分流及认证、信息安全保障三个方面探究校园5G专网模式下基建新生态关键技术方案,为构筑泛在接入、多网融合、部署灵活、安全可控的5G创新应用提供支撑。 展开更多
关键词 “5G+智慧应用” 校园5G专网 泛在接入 多网融合
下载PDF
大型实验室网络敏感数据访问认证方法仿真
20
作者 魏琛 庄子波 刘凤鑫 《计算机仿真》 2024年第2期349-353,共5页
由于大型实验室网络中的敏感数据认证过程繁琐复杂,且对其安全性要求较高,增加用户访问敏感数据的复杂性和时间成本。为此,提出一种大型实验室网络敏感数据访问多阶段认证算法。利用互补集合经验模态分解(Coplementary Ensemble Empiric... 由于大型实验室网络中的敏感数据认证过程繁琐复杂,且对其安全性要求较高,增加用户访问敏感数据的复杂性和时间成本。为此,提出一种大型实验室网络敏感数据访问多阶段认证算法。利用互补集合经验模态分解(Coplementary Ensemble Empirical Mode Decomposition,CEEMD),分解含有噪声的大型实验室网络数据,获取不同本征模态函数,通过改进小波阈值去噪,重构本征模态函数(Intrinsic Mode Functions,IMF)信息,获取降噪处理后的数据。通过Apriori算法和互信息理论,分析不同数据之间的相关性,挖掘其关联性,实现大型实验室网络敏感数据访问多阶段认证。通过仿真分析证实,采用所提算法可以精准完成大型实验室网络敏感数据访问多阶段认证,准确性在90%以上。 展开更多
关键词 大型实验室 网络 敏感数据访问 多阶段认证
下载PDF
上一页 1 2 81 下一页 到第
使用帮助 返回顶部