Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne...Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.展开更多
The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power suppor...The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power support,which is an important development direction of future communications.In this paper,we take into account a multi-scenario network model under the coverage of low earth orbit(LEO)satellite,which can provide computing resources to users in faraway areas to improve task processing efficiency.However,LEO satellites experience limitations in computing and communication resources and the channels are time-varying and complex,which makes the extraction of state information a daunting task.Therefore,we explore the dynamic resource management issue pertaining to joint computing,communication resource allocation and power control for multi-access edge computing(MEC).In order to tackle this formidable issue,we undertake the task of transforming the issue into a Markov decision process(MDP)problem and propose the self-attention based dynamic resource management(SABDRM)algorithm,which effectively extracts state information features to enhance the training process.Simulation results show that the proposed algorithm is capable of effectively reducing the long-term average delay and energy consumption of the tasks.展开更多
Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but...Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations.展开更多
COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus.The foremost and most prime sector among those affected were schools,colleges,and universities.The education system of en...COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus.The foremost and most prime sector among those affected were schools,colleges,and universities.The education system of entire nations had shifted to online education during this time.Many shortcomings of Learning Management Systems(LMSs)were detected to support education in an online mode that spawned the research in Artificial Intelligence(AI)based tools that are being developed by the research community to improve the effectiveness of LMSs.This paper presents a detailed survey of the different enhancements to LMSs,which are led by key advances in the area of AI to enhance the real-time and non-real-time user experience.The AI-based enhancements proposed to the LMSs start from the Application layer and Presentation layer in the form of flipped classroom models for the efficient learning environment and appropriately designed UI/UX for efficient utilization of LMS utilities and resources,including AI-based chatbots.Session layer enhancements are also required,such as AI-based online proctoring and user authentication using Biometrics.These extend to the Transport layer to support real-time and rate adaptive encrypted video transmission for user security/privacy and satisfactory working of AI-algorithms.It also needs the support of the Networking layer for IP-based geolocation features,the Virtual Private Network(VPN)feature,and the support of Software-Defined Networks(SDN)for optimum Quality of Service(QoS).Finally,in addition to these,non-real-time user experience is enhanced by other AI-based enhancements such as Plagiarism detection algorithms and Data Analytics.展开更多
Energy harvesting has been recognized as a promising technique with which to effectively reduce carbon emis-sions and electricity expenses of base stations.However,renewable energy is inherently stochastic and inter-m...Energy harvesting has been recognized as a promising technique with which to effectively reduce carbon emis-sions and electricity expenses of base stations.However,renewable energy is inherently stochastic and inter-mittent,imposing formidable challenges on reliably satisfying users'time-varying wireless traffic demands.In addition,the probability distribution of the renewable energy or users’wireless traffic demand is not always fully known in practice.In this paper,we minimize the total energy cost of a hybrid-energy-powered cellular network by jointly optimizing the energy sharing among base stations,the battery charging and discharging rates,and the energy purchased from the grid under the constraint of a limited battery size at each base station.In solving the formulated non-convex chance-constrained stochastic optimization problem,a new ambiguity set is built to characterize the uncertainties in the renewable energy and wireless traffic demands according to interval sets of the mean and covariance.Using this ambiguity set,the original optimization problem is transformed into a more tractable second-order cone programming problem by exploiting the distributionally robust optimization approach.Furthermore,a low-complexity distributionally robust chance-constrained energy management algo-rithm,which requires only interval sets of the mean and covariance of stochastic parameters,is proposed.The results of extensive simulation are presented to demonstrate that the proposed algorithm outperforms existing methods in terms of the computational complexity,energy cost,and reliability.展开更多
With the evolution of the sixth generation(6G)mobile communication technology,ample attention has gone to the integrated terrestrial-satellite networks.This paper notes that four typical application scenarios of integ...With the evolution of the sixth generation(6G)mobile communication technology,ample attention has gone to the integrated terrestrial-satellite networks.This paper notes that four typical application scenarios of integrated terrestrial-satellite networks are integrated into ultra dense satellite-enabled 6G networks architecture.Then the subchannel and power allocation schemes for the downlink of the ultra dense satellite-enabled 6G heterogeneous networks are introduced.Satellite mobile edge computing(SMEC)with edge caching in three-layer heterogeneous networks serves to reduce the link traffic of networks.Furthermore,a scheme for interference management is presented,involving quality-of-service(QoS)and co-tier/cross-tier interference constraints.The simulation results show that the proposed schemes can significantly increase the total capacity of ultra dense satellite-enabled 6G heterogeneous networks.展开更多
In this study,we investigate the relationship between tax avoidance and earnings management in the largest five European Union economies by using artificial neural network regressions.This methodology allows us to dea...In this study,we investigate the relationship between tax avoidance and earnings management in the largest five European Union economies by using artificial neural network regressions.This methodology allows us to deal with nonlinearities detected in the data,which is the principal contribution to the previous literature.We ana-lyzed Compustat data for Germany,the United Kingdom,France,Italy,and Spain for the 2006–2015 period,focusing on discretionary accruals.We considered three tax avoidance measures,two based on the effective tax rate(ETR)and one on book-tax differences(BTD).Our results indicate the presence of nonlinear patterns and a posi-tive,statistically significant relationship between discretionary accruals and both ETR indicators implying that when companies resort to earnings management,a larger tax-able income—and thus higher ETR and lesser tax avoidance–would ensue.Hence,as also highlighted by the fact that discretionary accruals do not appear to affect BTD,our evidence does not suggest that companies are exploiting tax manipulation to reduce their tax payments;thus,the gap between accounting and taxation seems largely unaf-fected by earnings management.展开更多
Recently,wireless sensor networks(WSNs)find their applicability in several real-time applications such as disaster management,military,surveillance,healthcare,etc.The utilization of WSNs in the disaster monitoring pro...Recently,wireless sensor networks(WSNs)find their applicability in several real-time applications such as disaster management,military,surveillance,healthcare,etc.The utilization of WSNs in the disaster monitoring process has gained significant attention among research communities and governments.Real-time monitoring of disaster areas using WSN is a challenging process due to the energy-limited sensor nodes.Therefore,the clustering process can be utilized to improve the energy utilization of the nodes and thereby improve the overall functioning of the network.In this aspect,this study proposes a novel Lens-Oppositional Wild Goose Optimization based Energy Aware Clustering(LOWGO-EAC)scheme for WSN-assisted real-time disaster management.The major intention of the LOWGO-EAC scheme is to perform effective data collection and transmission processes in disaster regions.To achieve this,the LOWGOEAC technique derives a novel LOWGO algorithm by the integration of the lens oppositional-based learning(LOBL)concept with the traditional WGO algorithm to improve the convergence rate.In addition,the LOWGO-EAC technique derives a fitness function involving three input parameters like residual energy(RE),distance to the base station(BS)(DBS),and node degree(ND).The proposed LOWGO-EAC technique can accomplish improved energy efficiency and lifetime of WSNs in real-time disaster management scenarios.The experimental validation of the LOWGO-EAC model is carried out and the comparative study reported the enhanced performance of the LOWGO-EAC model over the recent approaches.展开更多
Madness has attracted and frightened for centuries,and talking about this means discussing how this diversity was built and managed in different social contexts and historical periods.Not all societies have had,and st...Madness has attracted and frightened for centuries,and talking about this means discussing how this diversity was built and managed in different social contexts and historical periods.Not all societies have had,and still have,the same relationship with madness.It is only with the affirmation of the Modern State,and of Capitalism,that the idea of“normality”indispensable to be able to conceive diversity as something dangerously distant and different from the norm takes over.In our post-modern society,people with mental illness in Italy can resort to specialists and social-health services.But the heterogeneous answers given after the approval of law 180 appear to be increasingly diversified.In this research,much attention will be paid to how the social and health services,located in different areas of Italy(Messina,Rome,Trento)face the current growing risk of social,housing and economic isolation of these fragile subjects.The aim of the research is to explore the possibility of a new relationship between the social-health service and the local community.On the one hand,research investigates what the contribution of the services could be.On the other what the spaces of protagonism and participation of the community could be in inclusion process account.In order to better understand the differences between these two dimensions,a qualitative research approach was chosen through the conduct of in-depth interviews.In this way it was possible to investigate:(1)the partial representations characteristic of the single individual,family members,operators and stackholders in general;(2)the services around the topic dealt with is articulated.From the first results of the research it emerges that the territory can no longer be considered as an abstract entity,but becomes the social space within which the construction of a new community welfare can and must take place.展开更多
An emulating environment for network management of the space network was presented. The emulating environment was developed with node-link model. The nodes of the satellite entities were controlled by the controlling ...An emulating environment for network management of the space network was presented. The emulating environment was developed with node-link model. The nodes of the satellite entities were controlled by the controlling network, which consist of sets of HLA/RTI based federates. These federates described the different aspect of the attributes of the satellites, such as orbit coordinate, routing table and the chain budget. We described the architecture of the emulation environment and the software design of federates. We measured the response time of the protocol data units and verified the detecting of the network topology in the environment. The environment was open that the on board router and the simulator of satellite link which developed by third party could be integrated.展开更多
In the rapid development of science and technology,the Internet has been widely used in the daily life and work of people,which has greatly changed the way people live and work.At this stage,people regard the Internet...In the rapid development of science and technology,the Internet has been widely used in the daily life and work of people,which has greatly changed the way people live and work.At this stage,people regard the Internet as the main way to obtain news information,and they have supervised the news contents[1].Based on this,the article expounds the relevant content of network public opinion,analyzes the role of network public opinion in the public management of Chinese government,and studies the influence of public opinion on the public management of Chinese government.展开更多
In this paper, we conduct research on the enterprise management and the related employee incentive mechanism under the environment of enterprise social networks. As the sharp change in the environment, the enterprise ...In this paper, we conduct research on the enterprise management and the related employee incentive mechanism under the environment of enterprise social networks. As the sharp change in the environment, the enterprise how to win the competitive advantage for a long time which caused many strategic management thinking, to promote the new development of the theory of the strategic management. Our designed mechanism will enhance the management activities and promote the general value of the employees which has significant meanings.展开更多
The construction of archives in colleges and universities in China is in the process of development and improvement.With the development information technology,the informatization of college archives has been accelera...The construction of archives in colleges and universities in China is in the process of development and improvement.With the development information technology,the informatization of college archives has been accelerated.Network technology is developing rapidly in our country,and the number of network users has increased significantly.The use of network technology in university archives management can improve the management efficiency and quality of archives,but the safety factor has dropped significantly.For example,the archival system may face many problems such as virus infection,system paralysis,or cyberattacks,which affects the security of the university archives.Therefore,this paper presents an analysis of these problems in detail,and proposes corresponding solutions,so as to optimize and improve the information security management of college archives.展开更多
In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasib...In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it.展开更多
The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficien...The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently.展开更多
This paper analyzes progresses and difficulties of subjects on computer network’s management and artificial intelligence, proposes AGIMA, a new model of network intelligent management, which is based on computer supp...This paper analyzes progresses and difficulties of subjects on computer network’s management and artificial intelligence, proposes AGIMA, a new model of network intelligent management, which is based on computer supported cooperative work (CSCW) and combining new technologies such as WWW, Java. AGIMA transfers from information distribution centered mode in traditional network management to computing distribution centered mode, providing intelligence capacity for network management by a whole intelligent agent group. The implementation of AGIMA takes much consideration of openess, scalability, proactive adaptability and friendliness of human computer interface. Authors present properties of intelligent agent in details, and conclude that network intelligence should be cooperation between human and computer.展开更多
With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management...With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management systems.In this paper,in order to improve the accuracy of network traffic identification,sampled NetFlow data is applied to traffic identification,and the impact of packet sampling on the accuracy of the identification method is studied.This study includes feature selection,a metric correlation analysis for the application behavior,and a traffic identification algorithm.Theoretical analysis and experimental results show that the significance of behavior characteristics becomes lower in the packet sampling environment.Meanwhile,in this paper,the correlation analysis results in different trends according to different features.However,as long as the flow number meets the statistical requirement,the feature selection and the correlation degree will be independent of the sampling ratio.While in a high sampling ratio,where the effective information would be less,the identification accuracy is much lower than the unsampled packets.Finally,in order to improve the accuracy of the identification,we propose a Deep Belief Networks Application Identification(DBNAI)method,which can achieve better classification performance than other state-of-the-art methods.展开更多
Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching metho...Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching methods with better cache hit rate and achieve allocating on-demand. Therefore, an in-network caching scheduling scheme for ICN was designed, distinguishing different kinds of contents and dynamically allocating the cache size on-demand. First discussing what was appropriated to be cached in nodes, and then a classification about the contents could be cached was proposed. Furthermore, we used AHP to weight different contents classes through analyzing users' behavior. And a distributed control process was built, to achieve differentiated caching resource allocation and management. The designed scheme not only avoids the waste of caching resource, but also further enhances the cache availability. Finally, the simulation results are illustrated to show that our method has the superior performance in the aspects of server hit rate and convergence.展开更多
The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing ...The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing a high efficient and low cost network multi-well data management architecture based on the General Logging Curve Theory and the Cif data format; 2, implementing efficient visit and transmission of multi-well data in C/S local network based on TCP/IP protocol; 3,ensuring the safety of multi-well data in store, visit and application based on Unix operating system security. By using CifNet system, the researcher in office or at home can visit curves of any borehole in any working area of any oilfield. The application foreground of CifNet system is also commented.展开更多
Taking into chief consideration the features of aviation nodes in satellite networks, such as high moving speed, long communication distance, and high connection frequency, this article proposes an aviation-oriented m...Taking into chief consideration the features of aviation nodes in satellite networks, such as high moving speed, long communication distance, and high connection frequency, this article proposes an aviation-oriented mobility management method for IP/low earth orbit (LEO) satellite networks. By introducing the concept of ground station real-time coverage area, the proposed method uses ground-station-based IP addressing method and cell paging scheme to decrease the frequency of IP binding update requests as well as the paging cost. In comparison with the paging mobile IP (P-MIP) method and the handover-independent IP mobility management method, as is verified by the mathematical analysis and simulation, the proposed method could decrease the management cost. It also possesses better ability to support the aviation nodes because it is subjected to fewer influences from increased node speeds and newly coming connection rates.展开更多
基金This work was funded by the Deanship of Scientific Research at Jouf University under Grant Number(DSR2022-RG-0102).
文摘Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.
基金supported by the National Key Research and Development Plan(No.2022YFB2902701)the key Natural Science Foundation of Shenzhen(No.JCYJ20220818102209020).
文摘The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power support,which is an important development direction of future communications.In this paper,we take into account a multi-scenario network model under the coverage of low earth orbit(LEO)satellite,which can provide computing resources to users in faraway areas to improve task processing efficiency.However,LEO satellites experience limitations in computing and communication resources and the channels are time-varying and complex,which makes the extraction of state information a daunting task.Therefore,we explore the dynamic resource management issue pertaining to joint computing,communication resource allocation and power control for multi-access edge computing(MEC).In order to tackle this formidable issue,we undertake the task of transforming the issue into a Markov decision process(MDP)problem and propose the self-attention based dynamic resource management(SABDRM)algorithm,which effectively extracts state information features to enhance the training process.Simulation results show that the proposed algorithm is capable of effectively reducing the long-term average delay and energy consumption of the tasks.
文摘Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations.
文摘COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus.The foremost and most prime sector among those affected were schools,colleges,and universities.The education system of entire nations had shifted to online education during this time.Many shortcomings of Learning Management Systems(LMSs)were detected to support education in an online mode that spawned the research in Artificial Intelligence(AI)based tools that are being developed by the research community to improve the effectiveness of LMSs.This paper presents a detailed survey of the different enhancements to LMSs,which are led by key advances in the area of AI to enhance the real-time and non-real-time user experience.The AI-based enhancements proposed to the LMSs start from the Application layer and Presentation layer in the form of flipped classroom models for the efficient learning environment and appropriately designed UI/UX for efficient utilization of LMS utilities and resources,including AI-based chatbots.Session layer enhancements are also required,such as AI-based online proctoring and user authentication using Biometrics.These extend to the Transport layer to support real-time and rate adaptive encrypted video transmission for user security/privacy and satisfactory working of AI-algorithms.It also needs the support of the Networking layer for IP-based geolocation features,the Virtual Private Network(VPN)feature,and the support of Software-Defined Networks(SDN)for optimum Quality of Service(QoS).Finally,in addition to these,non-real-time user experience is enhanced by other AI-based enhancements such as Plagiarism detection algorithms and Data Analytics.
基金supported in part by the National Natural Science Foundation of China under grants 61971080,61901367in part by the Natural Science Foundation of Shaanxi Province under grant 2020JQ-844in part by the open-end fund of the Engineering Research Center of Intelligent Air-ground Integrated Vehicle and Traffic Control(ZNKD2021-001)。
文摘Energy harvesting has been recognized as a promising technique with which to effectively reduce carbon emis-sions and electricity expenses of base stations.However,renewable energy is inherently stochastic and inter-mittent,imposing formidable challenges on reliably satisfying users'time-varying wireless traffic demands.In addition,the probability distribution of the renewable energy or users’wireless traffic demand is not always fully known in practice.In this paper,we minimize the total energy cost of a hybrid-energy-powered cellular network by jointly optimizing the energy sharing among base stations,the battery charging and discharging rates,and the energy purchased from the grid under the constraint of a limited battery size at each base station.In solving the formulated non-convex chance-constrained stochastic optimization problem,a new ambiguity set is built to characterize the uncertainties in the renewable energy and wireless traffic demands according to interval sets of the mean and covariance.Using this ambiguity set,the original optimization problem is transformed into a more tractable second-order cone programming problem by exploiting the distributionally robust optimization approach.Furthermore,a low-complexity distributionally robust chance-constrained energy management algo-rithm,which requires only interval sets of the mean and covariance of stochastic parameters,is proposed.The results of extensive simulation are presented to demonstrate that the proposed algorithm outperforms existing methods in terms of the computational complexity,energy cost,and reliability.
基金supported in part by the National Key R&D Program of China(2020YFB1806103)the National Natural Science Foundation of China under Grant 62225103 and U22B2003+1 种基金Beijing Natural Science Foundation(L212004)China University Industry-University-Research Collaborative Innovation Fund(2021FNA05001).
文摘With the evolution of the sixth generation(6G)mobile communication technology,ample attention has gone to the integrated terrestrial-satellite networks.This paper notes that four typical application scenarios of integrated terrestrial-satellite networks are integrated into ultra dense satellite-enabled 6G networks architecture.Then the subchannel and power allocation schemes for the downlink of the ultra dense satellite-enabled 6G heterogeneous networks are introduced.Satellite mobile edge computing(SMEC)with edge caching in three-layer heterogeneous networks serves to reduce the link traffic of networks.Furthermore,a scheme for interference management is presented,involving quality-of-service(QoS)and co-tier/cross-tier interference constraints.The simulation results show that the proposed schemes can significantly increase the total capacity of ultra dense satellite-enabled 6G heterogeneous networks.
基金gratefully acknowledge the funding from the Spanish Ministry of Science and Innovation,project MCI-21-PID2020-115183RB-C21.
文摘In this study,we investigate the relationship between tax avoidance and earnings management in the largest five European Union economies by using artificial neural network regressions.This methodology allows us to deal with nonlinearities detected in the data,which is the principal contribution to the previous literature.We ana-lyzed Compustat data for Germany,the United Kingdom,France,Italy,and Spain for the 2006–2015 period,focusing on discretionary accruals.We considered three tax avoidance measures,two based on the effective tax rate(ETR)and one on book-tax differences(BTD).Our results indicate the presence of nonlinear patterns and a posi-tive,statistically significant relationship between discretionary accruals and both ETR indicators implying that when companies resort to earnings management,a larger tax-able income—and thus higher ETR and lesser tax avoidance–would ensue.Hence,as also highlighted by the fact that discretionary accruals do not appear to affect BTD,our evidence does not suggest that companies are exploiting tax manipulation to reduce their tax payments;thus,the gap between accounting and taxation seems largely unaf-fected by earnings management.
基金This research is funded by the Deanship of Scientific Research at Umm Al-Qura University,Grant Code:22UQU4281755DSR01。
文摘Recently,wireless sensor networks(WSNs)find their applicability in several real-time applications such as disaster management,military,surveillance,healthcare,etc.The utilization of WSNs in the disaster monitoring process has gained significant attention among research communities and governments.Real-time monitoring of disaster areas using WSN is a challenging process due to the energy-limited sensor nodes.Therefore,the clustering process can be utilized to improve the energy utilization of the nodes and thereby improve the overall functioning of the network.In this aspect,this study proposes a novel Lens-Oppositional Wild Goose Optimization based Energy Aware Clustering(LOWGO-EAC)scheme for WSN-assisted real-time disaster management.The major intention of the LOWGO-EAC scheme is to perform effective data collection and transmission processes in disaster regions.To achieve this,the LOWGOEAC technique derives a novel LOWGO algorithm by the integration of the lens oppositional-based learning(LOBL)concept with the traditional WGO algorithm to improve the convergence rate.In addition,the LOWGO-EAC technique derives a fitness function involving three input parameters like residual energy(RE),distance to the base station(BS)(DBS),and node degree(ND).The proposed LOWGO-EAC technique can accomplish improved energy efficiency and lifetime of WSNs in real-time disaster management scenarios.The experimental validation of the LOWGO-EAC model is carried out and the comparative study reported the enhanced performance of the LOWGO-EAC model over the recent approaches.
文摘Madness has attracted and frightened for centuries,and talking about this means discussing how this diversity was built and managed in different social contexts and historical periods.Not all societies have had,and still have,the same relationship with madness.It is only with the affirmation of the Modern State,and of Capitalism,that the idea of“normality”indispensable to be able to conceive diversity as something dangerously distant and different from the norm takes over.In our post-modern society,people with mental illness in Italy can resort to specialists and social-health services.But the heterogeneous answers given after the approval of law 180 appear to be increasingly diversified.In this research,much attention will be paid to how the social and health services,located in different areas of Italy(Messina,Rome,Trento)face the current growing risk of social,housing and economic isolation of these fragile subjects.The aim of the research is to explore the possibility of a new relationship between the social-health service and the local community.On the one hand,research investigates what the contribution of the services could be.On the other what the spaces of protagonism and participation of the community could be in inclusion process account.In order to better understand the differences between these two dimensions,a qualitative research approach was chosen through the conduct of in-depth interviews.In this way it was possible to investigate:(1)the partial representations characteristic of the single individual,family members,operators and stackholders in general;(2)the services around the topic dealt with is articulated.From the first results of the research it emerges that the territory can no longer be considered as an abstract entity,but becomes the social space within which the construction of a new community welfare can and must take place.
文摘An emulating environment for network management of the space network was presented. The emulating environment was developed with node-link model. The nodes of the satellite entities were controlled by the controlling network, which consist of sets of HLA/RTI based federates. These federates described the different aspect of the attributes of the satellites, such as orbit coordinate, routing table and the chain budget. We described the architecture of the emulation environment and the software design of federates. We measured the response time of the protocol data units and verified the detecting of the network topology in the environment. The environment was open that the on board router and the simulator of satellite link which developed by third party could be integrated.
文摘In the rapid development of science and technology,the Internet has been widely used in the daily life and work of people,which has greatly changed the way people live and work.At this stage,people regard the Internet as the main way to obtain news information,and they have supervised the news contents[1].Based on this,the article expounds the relevant content of network public opinion,analyzes the role of network public opinion in the public management of Chinese government,and studies the influence of public opinion on the public management of Chinese government.
文摘In this paper, we conduct research on the enterprise management and the related employee incentive mechanism under the environment of enterprise social networks. As the sharp change in the environment, the enterprise how to win the competitive advantage for a long time which caused many strategic management thinking, to promote the new development of the theory of the strategic management. Our designed mechanism will enhance the management activities and promote the general value of the employees which has significant meanings.
文摘The construction of archives in colleges and universities in China is in the process of development and improvement.With the development information technology,the informatization of college archives has been accelerated.Network technology is developing rapidly in our country,and the number of network users has increased significantly.The use of network technology in university archives management can improve the management efficiency and quality of archives,but the safety factor has dropped significantly.For example,the archival system may face many problems such as virus infection,system paralysis,or cyberattacks,which affects the security of the university archives.Therefore,this paper presents an analysis of these problems in detail,and proposes corresponding solutions,so as to optimize and improve the information security management of college archives.
文摘In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it.
文摘The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently.
文摘This paper analyzes progresses and difficulties of subjects on computer network’s management and artificial intelligence, proposes AGIMA, a new model of network intelligent management, which is based on computer supported cooperative work (CSCW) and combining new technologies such as WWW, Java. AGIMA transfers from information distribution centered mode in traditional network management to computing distribution centered mode, providing intelligence capacity for network management by a whole intelligent agent group. The implementation of AGIMA takes much consideration of openess, scalability, proactive adaptability and friendliness of human computer interface. Authors present properties of intelligent agent in details, and conclude that network intelligence should be cooperation between human and computer.
基金supported by Key Scientific and Technological Research Projects in Henan Province(Grand No 192102210125)Key scientific research projects of colleges and universities in Henan Province(23A520054)Open Foundation of State key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2020-2-01).
文摘With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management systems.In this paper,in order to improve the accuracy of network traffic identification,sampled NetFlow data is applied to traffic identification,and the impact of packet sampling on the accuracy of the identification method is studied.This study includes feature selection,a metric correlation analysis for the application behavior,and a traffic identification algorithm.Theoretical analysis and experimental results show that the significance of behavior characteristics becomes lower in the packet sampling environment.Meanwhile,in this paper,the correlation analysis results in different trends according to different features.However,as long as the flow number meets the statistical requirement,the feature selection and the correlation degree will be independent of the sampling ratio.While in a high sampling ratio,where the effective information would be less,the identification accuracy is much lower than the unsampled packets.Finally,in order to improve the accuracy of the identification,we propose a Deep Belief Networks Application Identification(DBNAI)method,which can achieve better classification performance than other state-of-the-art methods.
基金supported in part by The National High Technology Research and Development Program of China (863 Program) under Grant No. 2015AA016101The National Natural Science Foundation of China under Grant No. 61501042+1 种基金Beijing Nova Program under Grant No. Z151100000315078BUPT Special Program for Youth Scientific Research Innovation under Grant No. 2015RC10
文摘Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching methods with better cache hit rate and achieve allocating on-demand. Therefore, an in-network caching scheduling scheme for ICN was designed, distinguishing different kinds of contents and dynamically allocating the cache size on-demand. First discussing what was appropriated to be cached in nodes, and then a classification about the contents could be cached was proposed. Furthermore, we used AHP to weight different contents classes through analyzing users' behavior. And a distributed control process was built, to achieve differentiated caching resource allocation and management. The designed scheme not only avoids the waste of caching resource, but also further enhances the cache availability. Finally, the simulation results are illustrated to show that our method has the superior performance in the aspects of server hit rate and convergence.
文摘The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing a high efficient and low cost network multi-well data management architecture based on the General Logging Curve Theory and the Cif data format; 2, implementing efficient visit and transmission of multi-well data in C/S local network based on TCP/IP protocol; 3,ensuring the safety of multi-well data in store, visit and application based on Unix operating system security. By using CifNet system, the researcher in office or at home can visit curves of any borehole in any working area of any oilfield. The application foreground of CifNet system is also commented.
基金National Natural Science Foundation of China (60532030)National Natural Science Foundation for Distinguished Young Scholars (60625102)
文摘Taking into chief consideration the features of aviation nodes in satellite networks, such as high moving speed, long communication distance, and high connection frequency, this article proposes an aviation-oriented mobility management method for IP/low earth orbit (LEO) satellite networks. By introducing the concept of ground station real-time coverage area, the proposed method uses ground-station-based IP addressing method and cell paging scheme to decrease the frequency of IP binding update requests as well as the paging cost. In comparison with the paging mobile IP (P-MIP) method and the handover-independent IP mobility management method, as is verified by the mathematical analysis and simulation, the proposed method could decrease the management cost. It also possesses better ability to support the aviation nodes because it is subjected to fewer influences from increased node speeds and newly coming connection rates.