期刊文献+
共找到61,465篇文章
< 1 2 250 >
每页显示 20 50 100
Traffic-Distributed Clustering Scheme for Cluster-Based WSNs with Various Non-Uniform Traffic Fluctuations
1
作者 Ryuta Mizitani Kazuo Mori +1 位作者 Katsuhiro Naito Hideo Kobayashi 《International Journal of Communications, Network and System Sciences》 2013年第2期109-118,共10页
In wireless sensor networks (WSNs), it is essential to save energy consumption at sensor nodes (SNs). A clustering technique is one of the approaches to save energy consumption, where several neighboring SNs form a cl... In wireless sensor networks (WSNs), it is essential to save energy consumption at sensor nodes (SNs). A clustering technique is one of the approaches to save energy consumption, where several neighboring SNs form a cluster and transmit the sensed data to their cluster head (CH), and then the CH sends the aggregated data to a sink node. Under spatial non-uniform traffic environments, the clustering technique causes the non-uniformity in data gathering performance and energy consumption between clusters in WSNs. In this paper, we propose a clustering scheme for the WSNs employing IEEE802.15.4 beacon enabled mode under various non-uniform traffic environments. The proposed scheme distributes network traffic uniformly to the clusters through cluster area control by adjusting beacon transmission power, and thereby achieves uniform and improved data gathering performance. In the clusters with expanded area, however, the performance degradation arises from long distance communications. To solve this problem, the proposed scheme controls transmission power at SNs. In addition, to reduce energy consumption the proposed scheme sets the appropriate active period length in duty cycle operation to the current traffic condition. The performance evaluations by computer simulation show the effectiveness of the proposed scheme for the WSNs under various non-uniform traffic environments. 展开更多
关键词 Wireless Sensor Networks IEEE802.15.4 Clustering non-uniform traffic
下载PDF
Network traffic classification:Techniques,datasets,and challenges 被引量:1
2
作者 Ahmad Azab Mahmoud Khasawneh +2 位作者 Saed Alrabaee Kim-Kwang Raymond Choo Maysa Sarsour 《Digital Communications and Networks》 SCIE CSCD 2024年第3期676-692,共17页
In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the... In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the quality of service,preventing application choke points,and facilitating malicious behavior identification.In this paper,we review existing network classification techniques,such as port-based identification and those based on deep packet inspection,statistical features in conjunction with machine learning,and deep learning algorithms.We also explain the implementations,advantages,and limitations associated with these techniques.Our review also extends to publicly available datasets used in the literature.Finally,we discuss existing and emerging challenges,as well as future research directions. 展开更多
关键词 Network classification Machine learning Deep learning Deep packet inspection traffic monitoring
下载PDF
Applying an Improved Dung Beetle Optimizer Algorithm to Network Traffic Identification 被引量:1
3
作者 Qinyue Wu Hui Xu Mengran Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4091-4107,共17页
Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexi... Network traffic identification is critical for maintaining network security and further meeting various demands of network applications.However,network traffic data typically possesses high dimensionality and complexity,leading to practical problems in traffic identification data analytics.Since the original Dung Beetle Optimizer(DBO)algorithm,Grey Wolf Optimization(GWO)algorithm,Whale Optimization Algorithm(WOA),and Particle Swarm Optimization(PSO)algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution,an Improved Dung Beetle Optimizer(IDBO)algorithm is proposed for network traffic identification.Firstly,the Sobol sequence is utilized to initialize the dung beetle population,laying the foundation for finding the global optimal solution.Next,an integration of levy flight and golden sine strategy is suggested to give dung beetles a greater probability of exploring unvisited areas,escaping from the local optimal solution,and converging more effectively towards a global optimal solution.Finally,an adaptive weight factor is utilized to enhance the search capabilities of the original DBO algorithm and accelerate convergence.With the improvements above,the proposed IDBO algorithm is then applied to traffic identification data analytics and feature selection,as so to find the optimal subset for K-Nearest Neighbor(KNN)classification.The simulation experiments use the CICIDS2017 dataset to verify the effectiveness of the proposed IDBO algorithm and compare it with the original DBO,GWO,WOA,and PSO algorithms.The experimental results show that,compared with other algorithms,the accuracy and recall are improved by 1.53%and 0.88%in binary classification,and the Distributed Denial of Service(DDoS)class identification is the most effective in multi-classification,with an improvement of 5.80%and 0.33%for accuracy and recall,respectively.Therefore,the proposed IDBO algorithm is effective in increasing the efficiency of traffic identification and solving the problem of the original DBO algorithm that converges slowly and falls into the local optimal solution when dealing with high-dimensional data analytics and feature selection for network traffic identification. 展开更多
关键词 Network security network traffic identification data analytics feature selection dung beetle optimizer
下载PDF
Network Intrusion Traffic Detection Based on Feature Extraction 被引量:1
4
作者 Xuecheng Yu Yan Huang +2 位作者 Yu Zhang Mingyang Song Zhenhong Jia 《Computers, Materials & Continua》 SCIE EI 2024年第1期473-492,共20页
With the increasing dimensionality of network traffic,extracting effective traffic features and improving the identification accuracy of different intrusion traffic have become critical in intrusion detection systems(... With the increasing dimensionality of network traffic,extracting effective traffic features and improving the identification accuracy of different intrusion traffic have become critical in intrusion detection systems(IDS).However,both unsupervised and semisupervised anomalous traffic detection methods suffer from the drawback of ignoring potential correlations between features,resulting in an analysis that is not an optimal set.Therefore,in order to extract more representative traffic features as well as to improve the accuracy of traffic identification,this paper proposes a feature dimensionality reduction method combining principal component analysis and Hotelling’s T^(2) and a multilayer convolutional bidirectional long short-term memory(MSC_BiLSTM)classifier model for network traffic intrusion detection.This method reduces the parameters and redundancy of the model by feature extraction and extracts the dependent features between the data by a bidirectional long short-term memory(BiLSTM)network,which fully considers the influence between the before and after features.The network traffic is first characteristically downscaled by principal component analysis(PCA),and then the downscaled principal components are used as input to Hotelling’s T^(2) to compare the differences between groups.For datasets with outliers,Hotelling’s T^(2) can help identify the groups where the outliers are located and quantitatively measure the extent of the outliers.Finally,a multilayer convolutional neural network and a BiLSTM network are used to extract the spatial and temporal features of network traffic data.The empirical consequences exhibit that the suggested approach in this manuscript attains superior outcomes in precision,recall and F1-score juxtaposed with the prevailing techniques.The results show that the intrusion detection accuracy,precision,and F1-score of the proposed MSC_BiLSTM model for the CIC-IDS 2017 dataset are 98.71%,95.97%,and 90.22%. 展开更多
关键词 Network intrusion traffic detection PCA Hotelling’s T^(2) BiLSTM
下载PDF
BSTFNet:An Encrypted Malicious Traffic Classification Method Integrating Global Semantic and Spatiotemporal Features 被引量:1
5
作者 Hong Huang Xingxing Zhang +2 位作者 Ye Lu Ze Li Shaohua Zhou 《Computers, Materials & Continua》 SCIE EI 2024年第3期3929-3951,共23页
While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious behavior.To address the issues of traditional machine learning me... While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious behavior.To address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic,we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features,called BERT-based Spatio-Temporal Features Network(BSTFNet).At the packet-level granularity,the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers(BERT)model.At the byte-level granularity,we initially employ the Bidirectional Gated Recurrent Unit(BiGRU)model to extract temporal features from bytes,followed by the utilization of the Text Convolutional Neural Network(TextCNN)model with multi-sized convolution kernels to extract local multi-receptive field spatial features.The fusion of features from both granularities serves as the ultimate multidimensional representation of malicious traffic.Our approach achieves accuracy and F1-score of 99.39%and 99.40%,respectively,on the publicly available USTC-TFC2016 dataset,and effectively reduces sample confusion within the Neris and Virut categories.The experimental results demonstrate that our method has outstanding representation and classification capabilities for encrypted malicious traffic. 展开更多
关键词 Encrypted malicious traffic classification bidirectional encoder representations from transformers text convolutional neural network bidirectional gated recurrent unit
下载PDF
Urban Traffic Control Meets Decision Recommendation System:A Survey and Perspective
6
作者 Qingyuan Ji Xiaoyue Wen +2 位作者 Junchen Jin Yongdong Zhu Yisheng Lv 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第10期2043-2058,共16页
Urban traffic control is a multifaceted and demanding task that necessitates extensive decision-making to ensure the safety and efficiency of urban transportation systems.Traditional approaches require traffic signal ... Urban traffic control is a multifaceted and demanding task that necessitates extensive decision-making to ensure the safety and efficiency of urban transportation systems.Traditional approaches require traffic signal professionals to manually intervene on traffic control devices at the intersection level,utilizing their knowledge and expertise.However,this process is cumbersome,labor-intensive,and cannot be applied on a large network scale.Recent studies have begun to explore the applicability of recommendation system for urban traffic control,which offer increased control efficiency and scalability.Such a decision recommendation system is complex,with various interdependent components,but a systematic literature review has not yet been conducted.In this work,we present an up-to-date survey that elucidates all the detailed components of a recommendation system for urban traffic control,demonstrates the utility and efficacy of such a system in the real world using data and knowledgedriven approaches,and discusses the current challenges and potential future directions of this field. 展开更多
关键词 Recommendation system traffic control traffic perception traffic prediction
下载PDF
Failure mechanisms and destruction characteristics of cemented coal gangue backfill under compression effect of non-uniform load
7
作者 FENG Guo-rui GUO Wei +5 位作者 QI Ting-ye LI Zhu CUI Jia-qing WANG Hao-chen CUI Ye-kai MA Jing-kai 《Journal of Central South University》 SCIE EI CAS CSCD 2024年第8期2676-2693,共18页
Backfill mining is one of the most important technical means for controlling strata movement and reducing surface subsidence and environmental damage during exploitation of underground coal resources. Ensuring the sta... Backfill mining is one of the most important technical means for controlling strata movement and reducing surface subsidence and environmental damage during exploitation of underground coal resources. Ensuring the stability of the backfill bodies is the primary prerequisite for maintaining the safety of the backfilling working face, and the loading characteristics of backfill are closely related to the deformation and subsidence of the roof. Elastic thin plate model was used to explore the non-uniform subsidence law of the roof, and then the non-uniform distribution characteristics of backfill bodies’ load were revealed. Through a self-developed non-uniform loading device combined with acoustic emission (AE) and digital image correlation (DIC) monitoring technology, the synergistic dynamic evolution law of the bearing capacity, apparent crack, and internal fracture of cemented coal gangue backfills (CCGBs) under loads with different degrees of non-uniformity was deeply explored. The results showed that: 1) The uniaxial compressive strength (UCS) of CCGB increased and then decreased with an increase in the degree of non-uniformity of load (DNL). About 40% of DNL was the inflection point of DNL-UCS curve and when DNL exceeded 40%, the strength decreased in a cliff-like manner;2) A positive correlation was observed between the AE ringing count and UCS during the loading process of the specimen, which was manifested by a higher AE ringing count of the high-strength specimen. 3) Shear cracks gradually increased and failure mode of specimens gradually changed from “X” type dominated by tension cracks to inverted “Y” type dominated by shear cracks with an increase in DNL, and the crack opening displacement at the peak stress decreased and then increased. The crack opening displacement at 40% of the DNL was the smallest. This was consistent with the judgment of crack size based on the AE b-value, i. e., it showed the typical characteristics of “small b-value-large crack and large b-value-small crack”. The research results are of significance for preventing the instability and failure of backfill. 展开更多
关键词 cemented coal gangue backfill non-uniform load degree of non-uniformity of load failure mode crack opening displacement
下载PDF
Spatiotemporal Prediction of Urban Traffics Based on Deep GNN
8
作者 Ming Luo Huili Dou Ning Zheng 《Computers, Materials & Continua》 SCIE EI 2024年第1期265-282,共18页
Traffic prediction already plays a significant role in applications like traffic planning and urban management,but it is still difficult to capture the highly non-linear and complicated spatiotemporal correlations of ... Traffic prediction already plays a significant role in applications like traffic planning and urban management,but it is still difficult to capture the highly non-linear and complicated spatiotemporal correlations of traffic data.As well as to fulfil both long-termand short-termprediction objectives,a better representation of the temporal dependency and global spatial correlation of traffic data is needed.In order to do this,the Spatiotemporal Graph Neural Network(S-GNN)is proposed in this research as amethod for traffic prediction.The S-GNN simultaneously accepts various traffic data as inputs and investigates the non-linear correlations between the variables.In terms of modelling,the road network is initially represented as a spatiotemporal directed graph,with the features of the samples at the time step being captured by a convolution module.In order to assign varying attention weights to various adjacent area nodes of the target node,the adjacent areas information of nodes in the road network is then aggregated using a graph network.The data is output using a fully connected layer at the end.The findings show that S-GNN can improve short-and long-term traffic prediction accuracy to a greater extent;in comparison to the control model,the RMSE of S-GNN is reduced by about 0.571 to 9.288 and the MAE(Mean Absolute Error)by about 0.314 to 7.678.The experimental results on two real datasets,Pe MSD7(M)and PEMS-BAY,also support this claim. 展开更多
关键词 Urban traffic traffic temporal correlation GNN PREDICTION
下载PDF
Impacts of bus holding strategy on the performance and pollutant emissions of a two-lane mixed traffic system
9
作者 Yanfeng Qiao Ronghan Yao +1 位作者 Baofeng Pan Yu Xue 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第11期236-248,共13页
This paper investigates the impacts of a bus holding strategy on the mutual interference between buses and passenger cars in a non-dedicated bus route,as well as the impacts on the characteristics of pollutant emissio... This paper investigates the impacts of a bus holding strategy on the mutual interference between buses and passenger cars in a non-dedicated bus route,as well as the impacts on the characteristics of pollutant emissions of passenger cars.The dynamic behaviors of these two types of vehicles are described using cellular automata(CA)models under open boundary conditions.Numerical simulations are carried out to obtain the phase diagrams of the bus system and the trajectories of buses and passenger cars before and after the implementation of the bus holding strategy under different probabilities of passenger cars entering a two-lane mixed traffic system.Then,we analyze the flow rate,satisfaction rate,and pollutant emission rates of passenger cars together with the performance of a mixed traffic system.The results show that the bus holding strategy can effectively alleviate bus bunching,whereas it has no significant impact on the flow rate and pollutant emission rates of passenger cars;the flow rate,satisfaction rate,and pollutant emission rates of passenger cars for either the traffic system or for each lane are influenced by the bus departure interval and the number of passengers arriving at bus stops. 展开更多
关键词 mixed traffic flow bus holding strategy cellular automata traffic emissions
下载PDF
HGNN-ETC: Higher-Order Graph Neural Network Based on Chronological Relationships for Encrypted Traffic Classification
10
作者 Rongwei Yu Xiya Guo +1 位作者 Peihao Zhang Kaijuan Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第11期2643-2664,共22页
Encrypted traffic plays a crucial role in safeguarding network security and user privacy.However,encrypting malicious traffic can lead to numerous security issues,making the effective classification of encrypted traff... Encrypted traffic plays a crucial role in safeguarding network security and user privacy.However,encrypting malicious traffic can lead to numerous security issues,making the effective classification of encrypted traffic essential.Existing methods for detecting encrypted traffic face two significant challenges.First,relying solely on the original byte information for classification fails to leverage the rich temporal relationships within network traffic.Second,machine learning and convolutional neural network methods lack sufficient network expression capabilities,hindering the full exploration of traffic’s potential characteristics.To address these limitations,this study introduces a traffic classification method that utilizes time relationships and a higher-order graph neural network,termed HGNN-ETC.This approach fully exploits the original byte information and chronological relationships of traffic packets,transforming traffic data into a graph structure to provide the model with more comprehensive context information.HGNN-ETC employs an innovative k-dimensional graph neural network to effectively capture the multi-scale structural features of traffic graphs,enabling more accurate classification.We select the ISCXVPN and the USTC-TK2016 dataset for our experiments.The results show that compared with other state-of-the-art methods,our method can obtain a better classification effect on different datasets,and the accuracy rate is about 97.00%.In addition,by analyzing the impact of varying input specifications on classification performance,we determine the optimal network data truncation strategy and confirm the model’s excellent generalization ability on different datasets. 展开更多
关键词 Encrypted network traffic graph neural network traffic classification deep learning
下载PDF
Segment routing for traffic engineering and effective recovery in low-earth orbit satellite constellations
11
作者 Shengyu Zhang Xiaoqian Li Kwan Lawrence Yeung 《Digital Communications and Networks》 SCIE CSCD 2024年第3期706-715,共10页
Low-Earth Orbit Satellite Constellations(LEO-SCs)provide global,high-speed,and low latency Internet access services,which bridges the digital divide in the remote areas.As inter-satellite links are not supported in in... Low-Earth Orbit Satellite Constellations(LEO-SCs)provide global,high-speed,and low latency Internet access services,which bridges the digital divide in the remote areas.As inter-satellite links are not supported in initial deployment(i.e.the Starlink),the communication between satellites is based on ground stations with radio frequency signals.Due to the rapid movement of satellites,this hybrid topology of LEO-SCs and ground stations is time-varying,which imposes a major challenge to uninterrupted service provisioning and network management.In this paper,we focus on solving two notable problems in such a ground station-assisted LEO-SC topology,i.e.,traffic engineering and fast reroute,to guarantee that the packets are forwarded in a balanced and uninterrupted manner.Specifically,we employ segment routing to support the arbitrary path routing in LEO-SCs.To solve the traffic engineering problem,we proposed two source routings with traffic splitting algorithms,Delay-Bounded Traffic Splitting(DBTS)and DBTS+,where DBTS equally splits a flow and DBTS+favors shorter paths.Simu-lation results show that DBTS+can achieve about 30%lower maximum satellite load at the cost of about 10%more delay.To guarantee the fast recovery of failures,two fast reroute mechanisms,Loop-Free Alternate(LFA)and LFA+,are studied,where LFA pre-computes an alternate next-hop as a backup while LFA+finds a 2-segment backup path.We show that LFA+can increase the percentage of protection coverage by about 15%. 展开更多
关键词 Fast reroute Low-earth orbit satellite constellation Segment routing traffic engineering traffic splitting
下载PDF
Study of the pressure transient behavior of directional wells considering the effect of non-uniform flux distribution
12
作者 Yan-Zhong Liang Bai-Lu Teng Wan-Jing Luo 《Petroleum Science》 SCIE EI CAS CSCD 2024年第3期1765-1779,共15页
During the production,the fluid in the vicinity of the directional well enters the wellbore with different rates,leading to non-uniform flux distribution along the directional well.However,in all existing studies,it i... During the production,the fluid in the vicinity of the directional well enters the wellbore with different rates,leading to non-uniform flux distribution along the directional well.However,in all existing studies,it is oversimplified to a uniform flux distribution,which can result in inaccurate results for field applications.Therefore,this paper proposes a semi-analytical model of a directional well based on the assumption of non-uniform flux distribution.Specifically,the direction well is discretized into a carefully chosen series of linear sources,such that the complex well trajectory can be captured and the nonuniform flux distribution along the wellbore can be considered to model the three-dimensional flow behavior.By using the finite difference method,we can obtain the numerical solutions of the transient flow within the wellbore.With the aid of Green's function method,we can obtain the analytical solutions of the transient flow from the matrix to the wellbore.The complete flow behavior of a directional well is perfectly represented by coupling the above two types of transient flow.Subsequently,on the basis of the proposed model,we conduct a comprehensive analysis of the pressure transient behavior of a directional well.The computation results show that the flux variation along the direction well has a significant effect on pressure responses.In addition,the directional well in an infinite reservoir may exhibit the following flow regimes:wellbore afterflow,transition flow,inclined radial flow,elliptical flow,horizontal linear flow,and horizontal radial flow.The horizontal linear flow can be observed only if the formation thickness is much smaller than the well length.Furthermore,a dip region that appears on the pressure derivative curve indicates the three-dimensional flow behavior near the wellbore. 展开更多
关键词 Directional well Pressure transient behavior Semi-analytical model non-uniform flux
下载PDF
Network Traffic Synthesis and Simulation Framework for Cybersecurity Exercise Systems
13
作者 Dong-Wook Kim Gun-Yoon Sin +3 位作者 Kwangsoo Kim Jaesik Kang Sun-Young Im Myung-Mook Han 《Computers, Materials & Continua》 SCIE EI 2024年第9期3637-3653,共17页
In the rapidly evolving field of cybersecurity,the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical.Traditional methods often fall short in ... In the rapidly evolving field of cybersecurity,the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical.Traditional methods often fall short in capturing the dynamic and complex nature of modern cyber threats.To address this gap,we propose a comprehensive framework designed to create authentic network environments tailored for cybersecurity exercise systems.Our framework leverages advanced simulation techniques to generate scenarios that mirror actual network conditions faced by professionals in the field.The cornerstone of our approach is the use of a conditional tabular generative adversarial network(CTGAN),a sophisticated tool that synthesizes realistic synthetic network traffic by learning fromreal data patterns.This technology allows us to handle technical components and sensitive information with high fidelity,ensuring that the synthetic data maintains statistical characteristics similar to those observed in real network environments.By meticulously analyzing the data collected from various network layers and translating these into structured tabular formats,our framework can generate network traffic that closely resembles that found in actual scenarios.An integral part of our process involves deploying this synthetic data within a simulated network environment,structured on software-defined networking(SDN)principles,to test and refine the traffic patterns.This simulation not only facilitates a direct comparison between the synthetic and real traffic but also enables us to identify discrepancies and refine the accuracy of our simulations.Our initial findings indicate an error rate of approximately 29.28%between the synthetic and real traffic data,highlighting areas for further improvement and adjustment.By providing a diverse array of network scenarios through our framework,we aim to enhance the exercise systems used by cybersecurity professionals.This not only improves their ability to respond to actual cyber threats but also ensures that the exercise is cost-effective and efficient. 展开更多
关键词 Cybersecurity exercise synthetic network traffic generative adversarial network traffic generation software-defined networking
下载PDF
RUFY4 deletion prevents pathological bone loss by blocking endo-lysosomal trafficking of osteoclasts
14
作者 Minhee Kim Jin Hee Park +13 位作者 Miyeon Go Nawon Lee Jeongin Seo Hana Lee Doyong Kim Hyunil Ha Taesoo Kim Myeong Seon Jeong Suree Kim Taesoo Kim Han Sung Kim Dongmin Kang Hyunbo Shim Soo Young Lee 《Bone Research》 SCIE CAS CSCD 2024年第2期407-420,共14页
Mature osteoclasts degrade bone matrix by exocytosis of active proteases from secretory lysosomes through a ruffled border.However,the molecular mechanisms underlying lysosomal trafficking and secretion in osteoclasts... Mature osteoclasts degrade bone matrix by exocytosis of active proteases from secretory lysosomes through a ruffled border.However,the molecular mechanisms underlying lysosomal trafficking and secretion in osteoclasts remain largely unknown.Here,we show with GeneChip analysis that RUN and FYVE domain-containing protein 4(RUFY4)is strongly upregulated during osteoclastogenesis.Mice lacking Rufy4 exhibited a high trabecular bone mass phenotype with abnormalities in osteoclast function in vivo.Furthermore,deleting Rufy4 did not affect osteoclast differentiation,but inhibited bone-resorbing activity due to disruption in the acidic maturation of secondary lysosomes,their trafficking to the membrane,and their secretion of cathepsin K into the extracellular space.Mechanistically,RUFY4 promotes late endosome-lysosome fusion by acting as an adaptor protein between Rab7 on late endosomes and LAMP2 on primary lysosomes.Consequently,Rufy4-deficient mice were highly protected from lipopolysaccharide-and ovariectomy-induced bone loss.Thus,RUFY4 plays as a new regulator in osteoclast activity by mediating endo-lysosomal trafficking and have a potential to be specific target for therapies against bone-loss diseases such as osteoporosis. 展开更多
关键词 OSTEOCLAST inhibited traffic
下载PDF
Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network
15
作者 Saad Abdalla Agaili Mohamed Sefer Kurnaz 《Computers, Materials & Continua》 SCIE EI 2024年第7期819-841,共23页
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and c... VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeVPNnetwork data.We present a novelVPNnetwork traffic flowclassificationmethod utilizing Artificial Neural Networks(ANN).This paper aims to provide a reliable system that can identify a virtual private network(VPN)traffic fromintrusion attempts,data exfiltration,and denial-of-service assaults.We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns.Next,we create an ANN architecture that can handle encrypted communication and distinguish benign from dangerous actions.To effectively process and categorize encrypted packets,the neural network model has input,hidden,and output layers.We use advanced feature extraction approaches to improve the ANN’s classification accuracy by leveraging network traffic’s statistical and behavioral properties.We also use cutting-edge optimizationmethods to optimize network characteristics and performance.The suggested ANN-based categorization method is extensively tested and analyzed.Results show the model effectively classifies VPN traffic types.We also show that our ANN-based technique outperforms other approaches in precision,recall,and F1-score with 98.79%accuracy.This study improves VPN security and protects against new cyberthreats.Classifying VPNtraffic flows effectively helps enterprises protect sensitive data,maintain network integrity,and respond quickly to security problems.This study advances network security and lays the groundwork for ANN-based cybersecurity solutions. 展开更多
关键词 VPN network traffic flow ANN classification intrusion detection data exfiltration encrypted traffic feature extraction network security
下载PDF
Scalable Temporal Dimension Preserved Tensor Completion for Missing Traffic Data Imputation With Orthogonal Initialization
16
作者 Hong Chen Mingwei Lin +1 位作者 Jiaqi Liu Zeshui Xu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第10期2188-2190,共3页
Dear Editor,This letter puts forward a novel scalable temporal dimension preserved tensor completion model based on orthogonal initialization for missing traffic data(MTD)imputation.The MTD imputation acts directly on... Dear Editor,This letter puts forward a novel scalable temporal dimension preserved tensor completion model based on orthogonal initialization for missing traffic data(MTD)imputation.The MTD imputation acts directly on accessing the traffic state,and affects the traffic management. 展开更多
关键词 DIMENSION management traffic
下载PDF
Effect of non-uniform swelling on coal multiphysics during gas injection: The triangle approach
17
作者 Yifan Huang Jishan Liu +2 位作者 Yaoyao Zhao Derek Elsworth Yee-Kwong Leong 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第4期1362-1372,共11页
In current dual porosity/permeability models,there exists a fundamental assumption that the adsorption-induced swelling is distributed uniformly within the representative elementary volume (REV),irrespective of its in... In current dual porosity/permeability models,there exists a fundamental assumption that the adsorption-induced swelling is distributed uniformly within the representative elementary volume (REV),irrespective of its internal structures and transient processes.However,both internal structures and transient processes can lead to the non-uniform swelling.In this study,we hypothesize that the non-uniform swelling is responsible for why coal permeability in experimental measurements is not only controlled by the effective stress but also is affected by the adsorption-induced swelling.We propose a concept of the swelling triangle composed of swelling paths to characterize the evolution of the non-uniform swelling and serve as a core link in coupled multiphysics.A swelling path is determined by a dimensionless volumetric ratio and a dimensionless swelling ratio.Different swelling paths have the same start and end point,and each swelling path represents a unique swelling case.The swelling path as the diagonal of the triangle represents the case of the uniform swelling while that as the two perpendicular boundaries represents the case of the localized swelling.The paths of all intermediate cases populate inside the triangle.The corresponding relations between the swelling path and the response of coal multiphysics are established by a non-uniform swelling coefficient.We define this method as the triangle approach and corresponding models as swelling path-based ones.The proposed concept and models are verified against a long-term experimental measurement of permeability and strains under constant effective stress.Our results demonstrate that during gas injection,coal multiphysics responses have a close dependence on the swelling path,and that in both future experiments and field predictions,this dependence must be considered. 展开更多
关键词 Transient process HETEROGENEITY Swelling triangle Swelling path non-uniform swelling coefficient
下载PDF
Semantic Consistency and Correctness Verification of Digital Traffic Rules
18
作者 Lei Wan Changjun Wang +3 位作者 Daxin Luo Hang Liu Sha Ma Weichao Hu 《Engineering》 SCIE EI CAS CSCD 2024年第2期47-62,共16页
The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules... The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules can be translated into machine language and used by autonomous vehicles.In this paper,a translation flow is designed.Beyond the translation,a deeper examination is required,because the semantics of natural languages are rich and complex,and frequently contain hidden assumptions.The issue of how to ensure that digital rules are accurate and consistent with the original intent of the traffic rules they represent is both significant and unresolved.In response,we propose a method of formal verification that combines equivalence verification with model checking.Reasonable and reassuring digital traffic rules can be obtained by utilizing the proposed traffic rule digitization flow and verification method.In addition,we offer a number of simulation applications that employ digital traffic rules to assess vehicle violations.The experimental findings indicate that our digital rules utilizing metric temporal logic(MTL)can be easily incorporated into simulation platforms and autonomous driving systems(ADS). 展开更多
关键词 Autonomous driving traffic rules DIGITIZATION FORMALIZATION VERIFICATION
下载PDF
Effect of speed humps on instantaneous traffic emissions in a microscopic model with limited deceleration capacity
19
作者 胡宇晨 李启朗 +2 位作者 刘军 王君霞 汪秉宏 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期413-420,共8页
As a common transportation facility, speed humps can control the speed of vehicles on special road sections to reduce traffic risks. At the same time, they also cause instantaneous traffic emissions. Based on the clas... As a common transportation facility, speed humps can control the speed of vehicles on special road sections to reduce traffic risks. At the same time, they also cause instantaneous traffic emissions. Based on the classic instantaneous traffic emission model and the limited deceleration capacity microscopic traffic flow model with slow-to-start rules, this paper has investigated the impact of speed humps on traffic flow and the instantaneous emissions of vehicle pollutants in a single lane situation. The numerical simulation results have shown that speed humps have significant effects on traffic flow and traffic emissions. In a free-flow region, the increase of speed humps leads to the continuous rise of CO_(2), NO_(X) and PM emissions. Within some density ranges, one finds that these pollutant emissions can evolve into some higher values under some random seeds. Under other random seeds, they can evolve into some lower values. In a wide moving jam region, the emission values of these pollutants sometimes appear as continuous or intermittent phenomenon. Compared to the refined Na Sch model, the present model has lower instantaneous emissions such as CO_(2), NO_(X) and PM and higher volatile organic components(VOC) emissions. Compared to the limited deceleration capacity model without slow-to-start rules, the present model also has lower instantaneous emissions such as CO_(2), NO_(X) and PM and higher VOC emissions in a wide moving jam region. These results can also be confirmed or explained by the statistical values of vehicle velocity and acceleration. 展开更多
关键词 traffic emissions speed humps slow-to-start rules deceleration capacity
下载PDF
Pressure transient characteristics of non-uniform conductivity fractured wells in viscoelasticity polymer flooding based on oil-water two-phase flow
20
作者 Yang Wang Jia Zhang +2 位作者 Shi-Long Yang Ze-Xuan Xu Shi-Qing Cheng 《Petroleum Science》 SCIE EI CAS CSCD 2024年第1期343-351,共9页
Polymer flooding in fractured wells has been extensively applied in oilfields to enhance oil recovery.In contrast to water,polymer solution exhibits non-Newtonian and nonlinear behavior such as effects of shear thinni... Polymer flooding in fractured wells has been extensively applied in oilfields to enhance oil recovery.In contrast to water,polymer solution exhibits non-Newtonian and nonlinear behavior such as effects of shear thinning and shear thickening,polymer convection,diffusion,adsorption retention,inaccessible pore volume and reduced effective permeability.Meanwhile,the flux density and fracture conductivity along the hydraulic fracture are generally non-uniform due to the effects of pressure distribution,formation damage,and proppant breakage.In this paper,we present an oil-water two-phase flow model that captures these complex non-Newtonian and nonlinear behavior,and non-uniform fracture characteristics in fractured polymer flooding.The hydraulic fracture is firstly divided into two parts:high-conductivity fracture near the wellbore and low-conductivity fracture in the far-wellbore section.A hybrid grid system,including perpendicular bisection(PEBI)and Cartesian grid,is applied to discrete the partial differential flow equations,and the local grid refinement method is applied in the near-wellbore region to accurately calculate the pressure distribution and shear rate of polymer solution.The combination of polymer behavior characterizations and numerical flow simulations are applied,resulting in the calculation for the distribution of water saturation,polymer concentration and reservoir pressure.Compared with the polymer flooding well with uniform fracture conductivity,this non-uniform fracture conductivity model exhibits the larger pressure difference,and the shorter bilinear flow period due to the decrease of fracture flow ability in the far-wellbore section.The field case of the fall-off test demonstrates that the proposed method characterizes fracture characteristics more accurately,and yields fracture half-lengths that better match engineering reality,enabling a quantitative segmented characterization of the near-wellbore section with high fracture conductivity and the far-wellbore section with low fracture conductivity.The novelty of this paper is the analysis of pressure performances caused by the fracture dynamics and polymer rheology,as well as an analysis method that derives formation and fracture parameters based on the pressure and its derivative curves. 展开更多
关键词 Polymer flooding Non-Newtonian fluid non-uniform fracture conductivity Two-phase flow Pressure transient analysis
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部