Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age c...Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age contexts that restrict their ability when they are applied in the current network envi-ronment. For example, the port based ap-proach cannot identify network applications with dynamic ports; the deep packet inspec-tion approach is invalid for encrypted network applications; and the statistical based approach is time-onsuming. In this paper, a novel tech-nique is proposed to classify different catego-ries of network applications. The port based, deep packet inspection based and statistical based approaches are integrated as a multi-stage classifier. The experimental results demonstrate that this approach has high rec-ognition rate which is up to 98% and good performance of real-time for traffic identifica-tion.展开更多
This paper proposed a watermarking algorithm for tamper-proof of web pages. For a web page, it generates a watermark consisting of a sequence of Space and Tab. The wa termark is then embedded into the web page after e...This paper proposed a watermarking algorithm for tamper-proof of web pages. For a web page, it generates a watermark consisting of a sequence of Space and Tab. The wa termark is then embedded into the web page after each word and each line. When a watermarked web page is tampered, the extracted watermark can detect and locate the modifications to the web page. Besides, the framework of watermarked Web Server system was given. Compared with traditional digital signature methods, this watermarking method is more transparent in that there is no necessary to detach the watermark before displaying web pages. The e xperimental results show that the proposed scheme is an effective tool for tamper-proof of web pages.展开更多
The joint grid system, which consists of the developed collar grid, the virtual grid and other grids, was used in the embedding technique to solve the problem of finding interpolating cells of the internal and externa...The joint grid system, which consists of the developed collar grid, the virtual grid and other grids, was used in the embedding technique to solve the problem of finding interpolating cells of the internal and external boundary points near the joint regions. With different boundary plane generated along different fixed surface, the collar grid obtained using hyperbolic partial equations can ensure to generate high quality grids and to provide real interpolating cells for the boundary points in the blanking regions. The virtual grid was used to convert solid wall boundary conditions into an interface condition, however, no fluid flow computations were conducted within the virtual grid. The computational result of body strake wing shows that the current developed embedding technique with joint grid system can effectively treat the geometry and can more accurately predict the flow over complexconfiguration with intersecting surfaces.展开更多
The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.T...The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.This paper proposes a research framework for predicting reliability of individual software entities as well as the whole Internet application.Characteristics of the Internet environment are comprehensively analyzed and several reliability prediction approaches are proposed.A prototype is implemented and practical use of the proposed framework is also demonstrated.展开更多
The network delay of the periodic messages transmission in the network control system (NCS) based on Ethemet for plant automation (EPA) is analyzed from the theoretical and experimental perspective in this paper. ...The network delay of the periodic messages transmission in the network control system (NCS) based on Ethemet for plant automation (EPA) is analyzed from the theoretical and experimental perspective in this paper. The composition and the characteristics of the network delay of EPA periodic messages transmission in a subnet is studied through analyzing the information transmission regularity and EPA deterministic scheduling mechanism. On this basis, the queuing delay at communication schedule management entity (EPA _ CSME) that is the most important component of network delay is analyzed, during which the formulas for the queuing delay of periodic messages and other real time parameters are proposed. Furthermore, an experiment is developed to test each component of network delay of periodic messages transmission in a EPA subnet. According to the experimental and the theoretical analysis, the conclusion is drawn that the delay during which the periodic messages wait for the periodic messages transmission time slice is the main factor that causes considerable network delay, and improvement method is presented.展开更多
In order to achieve an intelligent and automated self-management network,dynamic policy configuration and selection are needed.A certain policy only suits to a certain network environment.If the network environment ch...In order to achieve an intelligent and automated self-management network,dynamic policy configuration and selection are needed.A certain policy only suits to a certain network environment.If the network environment changes,the certain policy does not suit any more.Thereby,the policy-based management should also have similar "natural selection" process.Useful policy will be retained,and policies which have lost their effectiveness are eliminated.A policy optimization method based on evolutionary learning was proposed.For different shooting times,the priority of policy with high shooting times is improved,while policy with a low rate has lower priority,and long-term no shooting policy will be dormant.Thus the strategy for the survival of the fittest is realized,and the degree of self-learning in policy management is improved.展开更多
Ethernet Ring Protection (ERP) introduced by ITU-T G.8032 Recommendation is a new type of packet-switched network protection technology, which can provide ring automatic protection switch. However, the Filtering Datab...Ethernet Ring Protection (ERP) introduced by ITU-T G.8032 Recommendation is a new type of packet-switched network protection technology, which can provide ring automatic protection switch. However, the Filtering Database (FDB) flush method adopted in the current ERP standard has the drawback of introducing a large amount of transient traffic overshoot caused by flooded Ethernet frames right after protection switching. In this article, we propose a G.8032 ERP scheme that uses FDB flush based on area to resolve this issue and investigate how the proposed scheme deals with the traffic flooding problem. The theoretical analysis and simulation show that the proposed scheme can effectively improve the performance of the Ethernet ring by decreasing the unnecessary FDB flush in comparison with the existing approaches.展开更多
With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex...With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex network environment. Aiming at this situation, by using the method of T-S fuzzy neural network model to analyze the characteristics of the data transmission in network, it has obtained corresponding threat information. By processing these threat information, it completes the construction of three-dimensional power security defense system. The paper carries on the corresponding data training methods by using T-shirt model fuzzy neural network, which has certain reference significance for the data analysis of other similar fields. At the same time, the study of building on the three-dimensional power security defense system aims to provide a theoretical reference for solving the security defense of the current complex network environment.展开更多
This paper focuses on the key technologies of P2P and network traffic monitoring, research and analyze the traditional P2P flow control technology and the working principle of deployment, discuss on the straight loss ...This paper focuses on the key technologies of P2P and network traffic monitoring, research and analyze the traditional P2P flow control technology and the working principle of deployment, discuss on the straight loss and bypass interference control technology, and the reasonable combination of two kinds of technology to design straight bypass joint deployment. On basis of it, we design a new P2P traffic monitoring system. Through the design and implementation of computer network traffic monitoring system based on C/S mode to achieve automatic control, maintenance, and monitor network traffic, which is suitable for the current engineering software to monitor a network application environment. From the network users and network operator' s perspective, monitoring of network traffic is scientific, reasonable that improve network management and it has important research value.展开更多
In the era of rapid technological development, business English teaching methods are in the development and changes and multimedia network technology gradually appeared. It has brought great convenience to business En...In the era of rapid technological development, business English teaching methods are in the development and changes and multimedia network technology gradually appeared. It has brought great convenience to business English teaching.This paper starts from the feasibility and necessity of multimedia network teaching in Business English to discuss the advantages of multimedia network Teaching Business English. Finally, it is to put forward multimedia network teaching mode, to provide practical recommendations for the majority of business English teacher during the multimedia network teaching.展开更多
This paper introduces an adaptive traffic allocation scheme with cooperation of multiple Radio Access Networks (RANs) in universal wireless environments.The different cooperation scenarios are studied,and based on the...This paper introduces an adaptive traffic allocation scheme with cooperation of multiple Radio Access Networks (RANs) in universal wireless environments.The different cooperation scenarios are studied,and based on the scenario of cooperation in both network layer and terminal layer,an open queuing system model,which is aiming to depict the characteristics of packet loss rate of wireless communication networks,is proposed to optimize the traffic allocation results.The analysis and numerical simulations indicate that the proposed scheme achieves inter-networking load balance tominimize the whole transmission delay and expands the communication ability of single-mode terminals to support high data rate traffics.展开更多
In this paper,the recurrent neural network structure of a bidirectional long shortterm memory network(Bi-LSTM)with special memory cells that store information is used to characterize the deep features of the variation...In this paper,the recurrent neural network structure of a bidirectional long shortterm memory network(Bi-LSTM)with special memory cells that store information is used to characterize the deep features of the variation pattern between logging and seismic data.A mapping relationship model between high-frequency logging data and low-frequency seismic data is established via nonlinear mapping.The seismic waveform is infinitely approximated using the logging curve in the low-frequency band to obtain a nonlinear mapping model of this scale,which then stepwise approach the logging curve in the high-frequency band.Finally,a seismic-inversion method of nonlinear mapping multilevel well–seismic matching based on the Bi-LSTM network is developed.The characteristic of this method is that by applying the multilevel well–seismic matching process,the seismic data are stepwise matched to the scale range that is consistent with the logging curve.Further,the matching operator at each level can be stably obtained to effectively overcome the problems that occur in the well–seismic matching process,such as the inconsistency in the scale of two types of data,accuracy in extracting the seismic wavelet of the well-side seismic traces,and multiplicity of solutions.Model test and practical application demonstrate that this method improves the vertical resolution of inversion results,and at the same time,the boundary and the lateral characteristics of the sand body are well maintained to improve the accuracy of thin-layer sand body prediction and achieve an improved practical application effect.展开更多
This paper summarizes the basic content of network curriculum design based on online learning mode and the basic flow, as well as network course should have the factors that suitable of the mode and attention matters ...This paper summarizes the basic content of network curriculum design based on online learning mode and the basic flow, as well as network course should have the factors that suitable of the mode and attention matters in the design collaboration mode of network course. Based on this, other researchers and practitioners can conveniently and effectively design network course based on the cooperation mode. Through the analysis of the network curriculum development and the actual case, verify advantage of collaborative online learning mode.展开更多
Under the background of rapid development of the Intemet, the traditional garment industry in China has undergone changes in marketing, payment and logistics and warehousing. The development trend of the,apparel indus...Under the background of rapid development of the Intemet, the traditional garment industry in China has undergone changes in marketing, payment and logistics and warehousing. The development trend of the,apparel industry is becoming more and more obvious. However, faced with the strong Internet impact, the retailing of apparel is confronted with both development constraints and new challenges. The individualized consumption demand is becoming more and more prominent.How to achieve the successful transformation of the entity retailing in the competitive environment, To meet the diverse needs of consumers.Therefore, based on the theory and practice, this paper analyzes the present situation and trend of the development of garment retailing in the Internet environment, and aims at providing theoretical analysis basis for the change of China's garment retailing industry.Application of reference to promote the network environment of China's traditional garment industry restructuring and healthy and sustainable development.展开更多
Along with the rapid development of communications,the Internet,and smart terminals,mobile Internet has become a hot topic with both opportunities and challenges.In this article,a new perspective on edge content deliv...Along with the rapid development of communications,the Internet,and smart terminals,mobile Internet has become a hot topic with both opportunities and challenges.In this article,a new perspective on edge content delivery service for mobile Internet is described,based on cooperating terminals.A mobile cloud architecture named Cloudlet Aided Cooperative Terminals Service Environment(CACTSE) is proposed as an edge network service environment.The Service Manager(SM),a cloudlet like module,is introduced into the local service domain in order to manage the in-domain terminals and help coordinate the content delivery requests for better bandwidth efficiency as well as user experience.The reference model is presented in this article with architecture and mechanism design.Moreover,the research progress and potential technology trends of CACTSE are analysed based on the related R&D directions.展开更多
基金supported by the National Key Technology R&D Program under Grant No. 2012BAH18B05
文摘Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age contexts that restrict their ability when they are applied in the current network envi-ronment. For example, the port based ap-proach cannot identify network applications with dynamic ports; the deep packet inspec-tion approach is invalid for encrypted network applications; and the statistical based approach is time-onsuming. In this paper, a novel tech-nique is proposed to classify different catego-ries of network applications. The port based, deep packet inspection based and statistical based approaches are integrated as a multi-stage classifier. The experimental results demonstrate that this approach has high rec-ognition rate which is up to 98% and good performance of real-time for traffic identifica-tion.
文摘This paper proposed a watermarking algorithm for tamper-proof of web pages. For a web page, it generates a watermark consisting of a sequence of Space and Tab. The wa termark is then embedded into the web page after each word and each line. When a watermarked web page is tampered, the extracted watermark can detect and locate the modifications to the web page. Besides, the framework of watermarked Web Server system was given. Compared with traditional digital signature methods, this watermarking method is more transparent in that there is no necessary to detach the watermark before displaying web pages. The e xperimental results show that the proposed scheme is an effective tool for tamper-proof of web pages.
文摘The joint grid system, which consists of the developed collar grid, the virtual grid and other grids, was used in the embedding technique to solve the problem of finding interpolating cells of the internal and external boundary points near the joint regions. With different boundary plane generated along different fixed surface, the collar grid obtained using hyperbolic partial equations can ensure to generate high quality grids and to provide real interpolating cells for the boundary points in the blanking regions. The virtual grid was used to convert solid wall boundary conditions into an interface condition, however, no fluid flow computations were conducted within the virtual grid. The computational result of body strake wing shows that the current developed embedding technique with joint grid system can effectively treat the geometry and can more accurately predict the flow over complexconfiguration with intersecting surfaces.
基金supported by the National Natural Science Foundation of China(Project No.61472338,61332010)Guangdong Natural Science Foundation(Project No. 2014A030313151)+1 种基金the Fundamental Research Funds for the Central Universitiesthe Research Grants Council of the Hong Kong Special Administrative Region,China (No.415113)
文摘The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.This paper proposes a research framework for predicting reliability of individual software entities as well as the whole Internet application.Characteristics of the Internet environment are comprehensively analyzed and several reliability prediction approaches are proposed.A prototype is implemented and practical use of the proposed framework is also demonstrated.
基金Supported by the National High Technology Research and Development Programme of China (No. 2006AA040301-4, 2007AA041301-6 2007AA041407).
文摘The network delay of the periodic messages transmission in the network control system (NCS) based on Ethemet for plant automation (EPA) is analyzed from the theoretical and experimental perspective in this paper. The composition and the characteristics of the network delay of EPA periodic messages transmission in a subnet is studied through analyzing the information transmission regularity and EPA deterministic scheduling mechanism. On this basis, the queuing delay at communication schedule management entity (EPA _ CSME) that is the most important component of network delay is analyzed, during which the formulas for the queuing delay of periodic messages and other real time parameters are proposed. Furthermore, an experiment is developed to test each component of network delay of periodic messages transmission in a EPA subnet. According to the experimental and the theoretical analysis, the conclusion is drawn that the delay during which the periodic messages wait for the periodic messages transmission time slice is the main factor that causes considerable network delay, and improvement method is presented.
基金National Natural Science Foundation of China(No.60534020)Cultivation Fund of the Key Scientific and Technical Innovation Project from Ministry of Education of China(No.706024)International Science Cooperation Foundation of Shanghai,China(No.061307041)
文摘In order to achieve an intelligent and automated self-management network,dynamic policy configuration and selection are needed.A certain policy only suits to a certain network environment.If the network environment changes,the certain policy does not suit any more.Thereby,the policy-based management should also have similar "natural selection" process.Useful policy will be retained,and policies which have lost their effectiveness are eliminated.A policy optimization method based on evolutionary learning was proposed.For different shooting times,the priority of policy with high shooting times is improved,while policy with a low rate has lower priority,and long-term no shooting policy will be dormant.Thus the strategy for the survival of the fittest is realized,and the degree of self-learning in policy management is improved.
基金supported partially by National Science and Technology Major Project of the Ministry of Science and Technology of China under Grant No.2011ZX03005-004-03 a Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions-Information and Communication Engineering,Natural Science Foundation of the Higher Education Institutions of Jiangsu Province,China under Grant No.10KJA510037+1 种基金 Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications),Ministry of Education under Grant No.NYKL201108 Natural Science Foundation of Nanjing University of Posts and Telecommunications under Grant No.NY209002
文摘Ethernet Ring Protection (ERP) introduced by ITU-T G.8032 Recommendation is a new type of packet-switched network protection technology, which can provide ring automatic protection switch. However, the Filtering Database (FDB) flush method adopted in the current ERP standard has the drawback of introducing a large amount of transient traffic overshoot caused by flooded Ethernet frames right after protection switching. In this article, we propose a G.8032 ERP scheme that uses FDB flush based on area to resolve this issue and investigate how the proposed scheme deals with the traffic flooding problem. The theoretical analysis and simulation show that the proposed scheme can effectively improve the performance of the Ethernet ring by decreasing the unnecessary FDB flush in comparison with the existing approaches.
文摘With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex network environment. Aiming at this situation, by using the method of T-S fuzzy neural network model to analyze the characteristics of the data transmission in network, it has obtained corresponding threat information. By processing these threat information, it completes the construction of three-dimensional power security defense system. The paper carries on the corresponding data training methods by using T-shirt model fuzzy neural network, which has certain reference significance for the data analysis of other similar fields. At the same time, the study of building on the three-dimensional power security defense system aims to provide a theoretical reference for solving the security defense of the current complex network environment.
文摘This paper focuses on the key technologies of P2P and network traffic monitoring, research and analyze the traditional P2P flow control technology and the working principle of deployment, discuss on the straight loss and bypass interference control technology, and the reasonable combination of two kinds of technology to design straight bypass joint deployment. On basis of it, we design a new P2P traffic monitoring system. Through the design and implementation of computer network traffic monitoring system based on C/S mode to achieve automatic control, maintenance, and monitor network traffic, which is suitable for the current engineering software to monitor a network application environment. From the network users and network operator' s perspective, monitoring of network traffic is scientific, reasonable that improve network management and it has important research value.
文摘In the era of rapid technological development, business English teaching methods are in the development and changes and multimedia network technology gradually appeared. It has brought great convenience to business English teaching.This paper starts from the feasibility and necessity of multimedia network teaching in Business English to discuss the advantages of multimedia network Teaching Business English. Finally, it is to put forward multimedia network teaching mode, to provide practical recommendations for the majority of business English teacher during the multimedia network teaching.
基金supported by the National Natural Science Foundation of China under Grant No.60971125National Major Project under Grant No.2011ZX03003-003-01
文摘This paper introduces an adaptive traffic allocation scheme with cooperation of multiple Radio Access Networks (RANs) in universal wireless environments.The different cooperation scenarios are studied,and based on the scenario of cooperation in both network layer and terminal layer,an open queuing system model,which is aiming to depict the characteristics of packet loss rate of wireless communication networks,is proposed to optimize the traffic allocation results.The analysis and numerical simulations indicate that the proposed scheme achieves inter-networking load balance tominimize the whole transmission delay and expands the communication ability of single-mode terminals to support high data rate traffics.
基金supported by the National Major Science and Technology Special Project(No.2016ZX05026-002).
文摘In this paper,the recurrent neural network structure of a bidirectional long shortterm memory network(Bi-LSTM)with special memory cells that store information is used to characterize the deep features of the variation pattern between logging and seismic data.A mapping relationship model between high-frequency logging data and low-frequency seismic data is established via nonlinear mapping.The seismic waveform is infinitely approximated using the logging curve in the low-frequency band to obtain a nonlinear mapping model of this scale,which then stepwise approach the logging curve in the high-frequency band.Finally,a seismic-inversion method of nonlinear mapping multilevel well–seismic matching based on the Bi-LSTM network is developed.The characteristic of this method is that by applying the multilevel well–seismic matching process,the seismic data are stepwise matched to the scale range that is consistent with the logging curve.Further,the matching operator at each level can be stably obtained to effectively overcome the problems that occur in the well–seismic matching process,such as the inconsistency in the scale of two types of data,accuracy in extracting the seismic wavelet of the well-side seismic traces,and multiplicity of solutions.Model test and practical application demonstrate that this method improves the vertical resolution of inversion results,and at the same time,the boundary and the lateral characteristics of the sand body are well maintained to improve the accuracy of thin-layer sand body prediction and achieve an improved practical application effect.
文摘This paper summarizes the basic content of network curriculum design based on online learning mode and the basic flow, as well as network course should have the factors that suitable of the mode and attention matters in the design collaboration mode of network course. Based on this, other researchers and practitioners can conveniently and effectively design network course based on the cooperation mode. Through the analysis of the network curriculum development and the actual case, verify advantage of collaborative online learning mode.
文摘Under the background of rapid development of the Intemet, the traditional garment industry in China has undergone changes in marketing, payment and logistics and warehousing. The development trend of the,apparel industry is becoming more and more obvious. However, faced with the strong Internet impact, the retailing of apparel is confronted with both development constraints and new challenges. The individualized consumption demand is becoming more and more prominent.How to achieve the successful transformation of the entity retailing in the competitive environment, To meet the diverse needs of consumers.Therefore, based on the theory and practice, this paper analyzes the present situation and trend of the development of garment retailing in the Internet environment, and aims at providing theoretical analysis basis for the change of China's garment retailing industry.Application of reference to promote the network environment of China's traditional garment industry restructuring and healthy and sustainable development.
基金supported by the "New Generation Broadband Wireless Mobile Communication Network"Key Project under Grant No. 2011ZX03005004-02the National Natural Science Foundation of China under Grants No. 60971125,No.61101119+2 种基金the Funds for Creative Research Groups of China under Grant No. 61121001the European Commission FP7 Project EVANS under Grant No. 2010-269323the Program for Changjiang Scholars and Innovative Research Team in University of China under Grant No. IRT1049
文摘Along with the rapid development of communications,the Internet,and smart terminals,mobile Internet has become a hot topic with both opportunities and challenges.In this article,a new perspective on edge content delivery service for mobile Internet is described,based on cooperating terminals.A mobile cloud architecture named Cloudlet Aided Cooperative Terminals Service Environment(CACTSE) is proposed as an edge network service environment.The Service Manager(SM),a cloudlet like module,is introduced into the local service domain in order to manage the in-domain terminals and help coordinate the content delivery requests for better bandwidth efficiency as well as user experience.The reference model is presented in this article with architecture and mechanism design.Moreover,the research progress and potential technology trends of CACTSE are analysed based on the related R&D directions.