期刊文献+
共找到50,973篇文章
< 1 2 250 >
每页显示 20 50 100
DNBP-CCA:A Novel Approach to Enhancing Heterogeneous Data Traffic and Reliable Data Transmission for Body Area Network
1
作者 Abdulwadood Alawadhi Mohd.Hasbullah Omar +3 位作者 Abdullah Almogahed Noradila Nordin Salman A.Alqahtani Atif M.Alamri 《Computers, Materials & Continua》 SCIE EI 2024年第5期2851-2878,共28页
The increased adoption of Internet of Medical Things (IoMT) technologies has resulted in the widespread use ofBody Area Networks (BANs) in medical and non-medical domains. However, the performance of IEEE 802.15.4-bas... The increased adoption of Internet of Medical Things (IoMT) technologies has resulted in the widespread use ofBody Area Networks (BANs) in medical and non-medical domains. However, the performance of IEEE 802.15.4-based BANs is impacted by challenges related to heterogeneous data traffic requirements among nodes, includingcontention during finite backoff periods, association delays, and traffic channel access through clear channelassessment (CCA) algorithms. These challenges lead to increased packet collisions, queuing delays, retransmissions,and the neglect of critical traffic, thereby hindering performance indicators such as throughput, packet deliveryratio, packet drop rate, and packet delay. Therefore, we propose Dynamic Next Backoff Period and Clear ChannelAssessment (DNBP-CCA) schemes to address these issues. The DNBP-CCA schemes leverage a combination ofthe Dynamic Next Backoff Period (DNBP) scheme and the Dynamic Next Clear Channel Assessment (DNCCA)scheme. The DNBP scheme employs a fuzzy Takagi, Sugeno, and Kang (TSK) model’s inference system toquantitatively analyze backoff exponent, channel clearance, collision ratio, and data rate as input parameters. Onthe other hand, the DNCCA scheme dynamically adapts the CCA process based on requested data transmission tothe coordinator, considering input parameters such as buffer status ratio and acknowledgement ratio. As a result,simulations demonstrate that our proposed schemes are better than some existing representative approaches andenhance data transmission, reduce node collisions, improve average throughput, and packet delivery ratio, anddecrease average packet drop rate and packet delay. 展开更多
关键词 Internet of Medical Things body area networks backoff period tsk fuzzy model clear channel assessment media access control
下载PDF
Evolution and Governance of the Structure of Marine Economic Networks in China’s Coastal Areas: Based on Sea-related A-share Listed Companies
2
作者 LI Bo CAO Gai 《Chinese Geographical Science》 SCIE CSCD 2024年第5期899-916,共18页
Data on discrete,isolated attributes of the marine economy are often used in traditional marine economic research.However,as the focus of urban research shifts from internal static attributes to external dynamic linka... Data on discrete,isolated attributes of the marine economy are often used in traditional marine economic research.However,as the focus of urban research shifts from internal static attributes to external dynamic linkages,the importance of marine economic net-work research is beginning to emerge.The construction of the marine economic network in China’s coastal areas is necessary to change the flow of land and sea resources and optimize regional marine economic development.Employing data from headquarters and branches of sea-related A-share listed enterprises to construct the marine economic network in China,we use social network analysis(SNA)to discuss the characteristics of its evolution as of 2010,2015,and 2020 and its governance.The following results were obtained.1)In terms of topological characteristics,the scale of the marine economic network in China’s coastal areas has accelerated and expan-ded,and the connections have become increasingly close;thus,this development has complex network characteristics.2)In terms of spatial structure,the intensity of the connection fluctuates and does not form stable development support;the group structure gradually becomes clear,but the overall pattern is fragmented;there are spatial differences in marine economic agglomeration radiation;the radi-ation effect of the eastern marine economic circle is obvious;and the polarization effect of northern and southern marine economic circles is significant.On this basis,we construct a framework for the governance of a marine economic network with the market,the government,and industry as the three governing bodies.By clarifying the driving factors and building objectives of marine economic network construction,this study aims to foster the high-quality development of China’s marine economy. 展开更多
关键词 marine economic network sea-related A-share listed companies social network analysis(SNA) network governance China’s coastal areas
下载PDF
New Rural Community Construction or Retention Development:A Comparative Analysis of Rural Settlement Transition Mechanism in Plain Agriculture Area of China Based on Actor Network Theory
3
作者 QU Yanbo DONG Xiaozhen +1 位作者 MA Wenqiu ZHAO Weiying 《Chinese Geographical Science》 SCIE CSCD 2024年第3期436-452,共17页
It is an important way to realize rural revitalization and sustainable development to guide rural settlement transition(RST)in an appropriate way.This paper uses actor network theory(ANT)to construct a theoretical fra... It is an important way to realize rural revitalization and sustainable development to guide rural settlement transition(RST)in an appropriate way.This paper uses actor network theory(ANT)to construct a theoretical framework for the study of RST.Taking two typical villages with different transition paths in rural areas of North China Plain as examples,this paper reveals the mechanism of RST and makes a comparative analysis.The results show that:1)after identifying problems and obligatory passage point,key actors recruit heterogeneous actors into the actor network by entrusting them with common interests,and realize RST under the system operation.2)Rural settlements under different transition paths have similarities in the problems to be solved,collective actions and policy factors,but there are differences in the transition process,mechanism and effect.The actor network and mechanism of RST through the path of new rural community construction are more complex and the transition effect is more thorough.In contrast,the degree of RST of retention development path is limited if there is no resource and location advantage.3)Based on the applicable conditions of different paths,this paper designs a logical framework of‘Situation-Structure-Behavior-Result’to scientifically guide the identification of RST paths under the background of rural revitalization. 展开更多
关键词 rural settlement transition(RST) actor network theory(ANT) transition path transition mechanism plain area China
下载PDF
Priority Based Energy Efficient MAC Protocol by Varying Data Ratefor Wireless Body Area Network
4
作者 R.Sangeetha Usha Devi Gandhi 《Computer Systems Science & Engineering》 2024年第2期395-411,共17页
Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor ... Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor human physical parameters such as temperature,blood pressure,pulse rate,oxygen level,body motion,and so on.They sense the data and communicate it to the Body Area Network(BAN)Coordinator.The main challenge for the WBAN is energy consumption.These issues can be addressed by implementing an effective Medium Access Control(MAC)protocol that reduces energy consumption and increases network lifetime.The purpose of the study is to minimize the energy consumption and minimize the delay using IEEE 802.15.4 standard.In our proposed work,if any critical events have occurred the proposed work is to classify and prioritize the data.We gave priority to the highly critical data to get the Guarantee Tine Slots(GTS)in IEEE 802.15.4 standard superframe to achieve greater energy efficiency.The proposed MAC provides higher data rates for critical data based on the history and current condition and also provides the best reliable service to high critical data and critical data by predicting node similarity.As an outcome,we proposed a MAC protocol for Variable Data Rates(MVDR).When compared to existing MAC protocols,the MVDR performed very well with low energy intake,less interruption,and an enhanced packet-sharing ratio. 展开更多
关键词 Wireless Body area network(WBAN) IEEE 802.15.4 energy efficiency MAC protocol ZIGBEE
下载PDF
Research on the Impact and Strategies of Rail Transit Network Integration in the Context of Metropolitan Area Development:A Case Study of the Wuhan Metropolitan Area
5
作者 Xiaorong Wang Rong Li 《Proceedings of Business and Economic Studies》 2024年第5期73-80,共8页
The metropolitan area is one of the key focal points in the construction and development of China’s new urbanization.Urban integration is an emerging trend in metropolitan areas.This paper explores the traffic demand... The metropolitan area is one of the key focal points in the construction and development of China’s new urbanization.Urban integration is an emerging trend in metropolitan areas.This paper explores the traffic demand characteristics and economic aspects of rail transit within metropolitan regions and argues that the construction of an integrated urban rail transit network is an effective approach to support their development.Rail transit in metropolitan areas offers both technical and economic advantages,improving the efficiency of time and space resource utilization,fostering economic cooperation,and ultimately contributing to an integrated development model.However,the integration of rail transit networks faces several challenges,including road network planning,technical standards,and operational organization.Using the Wuhan metropolitan area as a case study,this paper analyzes the challenges of rail transit network integration and proposes strategic solutions for development. 展开更多
关键词 Rail transit Metropolitan area Rail network integration URBANIZATION
下载PDF
M/S Controller Area Network(CAN) System Using Shared-Clock Scheduler
6
作者 LIU Jianxin1,TAN Ping2,LIU Yu1 (1.School of Mechanical Engineering & Automation,Xihua University,Chengdu 610039,China 2.School of Mathematical & Computer Science,Xihua University,ChengDu 610039,China) 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S1期284-288,共5页
The Controller Area Network (CAN) is a well established control network for automotive and automation control applications. Time-Triggered Controller Area Network (TTCAN) is a recent development which introduces a ses... The Controller Area Network (CAN) is a well established control network for automotive and automation control applications. Time-Triggered Controller Area Network (TTCAN) is a recent development which introduces a session layer,for message scheduling,to the existing CAN standard,which is a two layer standard comprising of a physical layer and a data link layer. TTCAN facilitates network communication in a time-triggered fashion,by introducing a Time Division Multiple Access style communication scheme. This allows deterministic network behavior,where maximum message latency times can be quantified and guaranteed. In order to solve the problem of determinate time latency and synchronization among several districted units in one auto panel CAN systems,this paper proposed a prototype design implementation for a shared-clock scheduler based on PIC18F458 MCU. This leads to improved CAN system performance and avoid the latency jitters and guarantee a deterministic communication pattern on the bus. The real runtime performance is satisfied. 展开更多
关键词 TIME-TRIGGERED controller area network auto PANEL shared-clock SCHEDULER embedded SYSTEM
下载PDF
基于MobileViT轻量化网络的车载CAN入侵检测方法
7
作者 陈虹 张立昂 +2 位作者 金海波 武聪 齐兵 《信息安全研究》 CSCD 北大核心 2024年第5期411-420,共10页
车载控制区域网络(controller area network,CAN)总线因缺少安全措施而易被攻击,因此入侵检测系统(intrusion detection system,IDS)在保护车载CAN总线免受网络攻击中发挥着重要作用.现有基于深度学习的车载CAN总线入侵检测方法存在资... 车载控制区域网络(controller area network,CAN)总线因缺少安全措施而易被攻击,因此入侵检测系统(intrusion detection system,IDS)在保护车载CAN总线免受网络攻击中发挥着重要作用.现有基于深度学习的车载CAN总线入侵检测方法存在资源开销大和延迟较高的问题.为减少检测延迟,提高检测率,提出一种利用改进的轻量化MobileViT模型对车载CAN总线进行入侵检测的方法.首先,将攻击流量可视化为彩色图,再使用GELU替换MobileViT的MV2模块中常规ReLU6,从而作为该模块的激活函数,可有效解决神经元死亡问题,提升模型收敛速度.使用指数衰减自动更新学习率,并通过迁移学习加速训练过程实现对彩色图分类,从而达到对入侵行为的检测.基于CAR-HACKING DATASET数据集的实验表明,改进后的MobileViT在消耗较少算力的情况下对入侵行为的检测准确率为100%,模型参数仅为2.12 MB,平均响应时间仅为1.6 ms,节省了训练资源,并保证了检测的准确率. 展开更多
关键词 入侵检测 车载网络安全 轻量化 MobileViT can总线
下载PDF
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder 被引量:1
8
作者 Pengcheng Wei Bo Wang +2 位作者 Xiaojun Dai Li Li Fangcheng He 《Digital Communications and Networks》 SCIE CSCD 2023年第1期14-21,共8页
The attacks on in-vehicle Controller Area Network(CAN)bus messages severely disrupt normal communication between vehicles.Therefore,researches on intrusion detection models for CAN have positive business value for veh... The attacks on in-vehicle Controller Area Network(CAN)bus messages severely disrupt normal communication between vehicles.Therefore,researches on intrusion detection models for CAN have positive business value for vehicle security,and the intrusion detection technology for CAN bus messages can effectively protect the invehicle network from unlawful attacks.Previous machine learning-based models are unable to effectively identify intrusive abnormal messages due to their inherent shortcomings.Hence,to address the shortcomings of the previous machine learning-based intrusion detection technique,we propose a novel method using Attention Mechanism and AutoEncoder for Intrusion Detection(AMAEID).The AMAEID model first converts the raw hexadecimal message data into binary format to obtain better input.Then the AMAEID model encodes and decodes the binary message data using a multi-layer denoising autoencoder model to obtain a hidden feature representation that can represent the potential features behind the message data at a deeper level.Finally,the AMAEID model uses the attention mechanism and the fully connected layer network to infer whether the message is an abnormal message or not.The experimental results with three evaluation metrics on a real in-vehicle CAN bus message dataset outperform some traditional machine learning algorithms,demonstrating the effectiveness of the AMAEID model. 展开更多
关键词 controller area network bus packet In-vehicle network Attention mechanism Autoencoder
下载PDF
Spatial prediction of soil organic carbon in coal mining subsidence areas based on RBF neural network 被引量:2
9
作者 Qiangqiang Qi Xin Yue +2 位作者 Xin Duo Zhanjun Xu Zhe Li 《International Journal of Coal Science & Technology》 EI CAS CSCD 2023年第2期218-230,共13页
A quantitative research on the effect of coal mining on the soil organic carbon(SOC)pool at regional scale is beneficial to the scientific management of SOC pools in coal mining areas and the realization of coal low-c... A quantitative research on the effect of coal mining on the soil organic carbon(SOC)pool at regional scale is beneficial to the scientific management of SOC pools in coal mining areas and the realization of coal low-carbon mining.Moreover,the spatial prediction model of SOC content suitable for coal mining subsidence area is a scientific problem that must be solved.Tak-ing the Changhe River Basin of Jincheng City,Shanxi Province,China,as the study area,this paper proposed a radial basis function neural network model combined with the ordinary kriging method.The model includes topography and vegetation factors,which have large influence on soil properties in mining areas,as input parameters to predict the spatial distribution of SOC in the 0-20 and 2040 cm soil layers of the study area.And comparing the prediction effect with the direct kriging method,the results show that the mean error,the mean absolute error and the root mean square error between the predicted and measured values of SOC content predicted by the radial basis function neural network are lower than those obtained by the direct kriging method.Based on the fitting effect of the predicted and measured values,the R^(2) obtained by the radial basis artificial neural network are 0.81,0.70,respectively,higher than the value of 0.44 and 0.36 obtained by the direct kriging method.Therefore,the model combining the artificial neural network and kriging,and considering environmental factors can improve the prediction accuracy of the SOC content in mining areas. 展开更多
关键词 Mining area Soil organic carbon Radial basis function neural network Environmental factor Spatial prediction
下载PDF
A fuzzy control and neural network based rotor speed controller for maximum power point tracking in permanent magnet synchronous wind power generation system 被引量:1
10
作者 Min Ding Zili Tao +3 位作者 Bo Hu Meng Ye Yingxiong Ou Ryuichi Yokoyama 《Global Energy Interconnection》 EI CSCD 2023年第5期554-566,共13页
When the wind speed changes significantly in a permanent magnet synchronous wind power generation system,the maximum power point cannot be easily determined in a timely manner.This study proposes a maximum power refer... When the wind speed changes significantly in a permanent magnet synchronous wind power generation system,the maximum power point cannot be easily determined in a timely manner.This study proposes a maximum power reference signal search method based on fuzzy control,which is an improvement to the climbing search method.A neural network-based parameter regulator is proposed to address external wind speed fluctuations,where the parameters of a proportional-integral controller is adjusted to accurately monitor the maximum power point under different wind speed conditions.Finally,the effectiveness of this method is verified via Simulink simulation. 展开更多
关键词 Maximum wind power tracking Fuzzy control Neural network
下载PDF
Ecological-Based Mining:A Coal-Water-Thermal Collaborative Paradigm in Ecologically Fragile Areas in Western China 被引量:2
11
作者 Xiaoxiu Liu Yifan Zeng +3 位作者 Qiang Wu Shihao Meng Jiyue Liang Zhuping Hou 《Engineering》 SCIE EI CAS CSCD 2024年第7期209-222,共14页
A substantial reduction in groundwater level,exacerbated by coal mining activities,is intensifying water scarcity in western China’s ecologically fragile coal mining areas.China’s national strategic goal of achievin... A substantial reduction in groundwater level,exacerbated by coal mining activities,is intensifying water scarcity in western China’s ecologically fragile coal mining areas.China’s national strategic goal of achieving a carbon peak and carbon neutrality has made eco-friendly mining that prioritizes the protection and efficient use of water resources essential.Based on the resource characteristics of mine water and heat hazards,an intensive coal-water-thermal collaborative co-mining paradigm for the duration of the mining process is proposed.An integrated system for the production,supply,and storage of mining companion resources is achieved through technologies such as roof water inrush prevention and control,hydrothermal quality improvement,and deep-injection geological storage.An active preventive and control system achieved by adjusting the mining technology and a passive system centered on multiobjective drainage and grouting treatment are suggested,in accordance with the original geological characteristics and dynamic process of water inrush.By implementing advanced multi-objective drainage,specifically designed to address the“skylight-type”water inrush mode in the Yulin mining area of Shaanxi Province,a substantial reduction of 50%in water drillings and inflow was achieved,leading to stabilized water conditions that effectively ensure subsequent safe coal mining.An integrated-energy complementary model that incorporates the clean production concept of heat utilization is also proposed.The findings indicate a potential saving of 8419 t of standard coal by using water and air heat as an alternative heating source for the Xiaojihan coalmine,resulting in an impressive energy conservation of 50.2%and a notable 24.2%reduction in carbon emissions.The ultra-deep sustained water injection of 100 m^(3)·h^(-1)in a single well would not rupture the formation or cause water leakage,and 7.87×10^(5)t of mine water could be effectively stored in the Liujiagou Formation,presenting a viable method for mine-water management in the Ordos Basin and providing insights for green and low-carbon mining. 展开更多
关键词 Dual carbon targets Coal-water-thermal co-mining Ecologically fragile areas Mine-water control Resource utilization
下载PDF
Finite-time Prescribed Performance Time-Varying Formation Control for Second-Order Multi-Agent Systems With Non-Strict Feedback Based on a Neural Network Observer 被引量:1
12
作者 Chi Ma Dianbiao Dong 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期1039-1050,共12页
This paper studies the problem of time-varying formation control with finite-time prescribed performance for nonstrict feedback second-order multi-agent systems with unmeasured states and unknown nonlinearities.To eli... This paper studies the problem of time-varying formation control with finite-time prescribed performance for nonstrict feedback second-order multi-agent systems with unmeasured states and unknown nonlinearities.To eliminate nonlinearities,neural networks are applied to approximate the inherent dynamics of the system.In addition,due to the limitations of the actual working conditions,each follower agent can only obtain the locally measurable partial state information of the leader agent.To address this problem,a neural network state observer based on the leader state information is designed.Then,a finite-time prescribed performance adaptive output feedback control strategy is proposed by restricting the sliding mode surface to a prescribed region,which ensures that the closed-loop system has practical finite-time stability and that formation errors of the multi-agent systems converge to the prescribed performance bound in finite time.Finally,a numerical simulation is provided to demonstrate the practicality and effectiveness of the developed algorithm. 展开更多
关键词 Finite-time control multi-agent systems neural network prescribed performance control time-varying formation control
下载PDF
基于BEGAN的汽车CAN网络入侵检测数据增强方法研究
13
作者 汪想 刘蓬勃 +2 位作者 赵剑 范科峰 李琳辉 《汽车工程》 EI CSCD 北大核心 2024年第8期1394-1402,1456,共10页
针对目前汽车CAN网络入侵检测算法因攻击样本缺少而导致数据不平衡问题,提出一种基于BEGAN的CAN入侵检测数据增强方法,引入one-hot编码将CAN报文特征图像化,结合构建的生成对抗网络,生成与真实攻击格式一致且内容差异的有效样本。通过... 针对目前汽车CAN网络入侵检测算法因攻击样本缺少而导致数据不平衡问题,提出一种基于BEGAN的CAN入侵检测数据增强方法,引入one-hot编码将CAN报文特征图像化,结合构建的生成对抗网络,生成与真实攻击格式一致且内容差异的有效样本。通过采集实车数据作为真实样本进行训练,从特征图、t-SNE可视化、统计学分析和分类器验证角度验证了所生成的增强数据集的实用性,可提高入侵检测分类器准确率;与传统过采样算法含随机过采样(ROS)、合成少数过采样(SMOTE)、SMOTE-ENN、自适应合成过采样(ADASYN)相比,具有更高的准确率。 展开更多
关键词 汽车控制器局域网络 入侵检测 生成对抗网络 数据增强
下载PDF
Reliability Analysis of Controller Area Network Based Systems—A Review 被引量:2
14
作者 Gerardine Immaculate Mary Zachariah C. Alex Lawrence Jenkins 《International Journal of Communications, Network and System Sciences》 2013年第4期155-166,共12页
This paper reviews the research work done on the Reliability Analysis of Controller Area Network (CAN) based systems. During the last couple of decades, real-time researchers have extended schedulability analysis to a... This paper reviews the research work done on the Reliability Analysis of Controller Area Network (CAN) based systems. During the last couple of decades, real-time researchers have extended schedulability analysis to a mature technique which for nontrivial systems can be used to determine whether a set of tasks executing on a single CPU or in a distributed system will meet their deadlines or not [1-3]. The main focus of the real-time research community is on hard real-time systems, and the essence of analyzing such systems is to investigate if deadlines are met in a worst case scenario. Whether this worst case actually will occur during execution, or if it is likely to occur, is not normally considered. Reliability modeling, on the other hand, involves study of fault models, characterization of distribution functions of faults and development of methods and tools for composing these distributions and models in estimating an overall reliability figure for the system [4]. This paper presents the research work done on reliability analysis developed with a focus on Controller-Area-Network-based automotive systems. 展开更多
关键词 Reliability Analysis of controller area network BASED SYSTEMS FAULT-TOLERANT can BASED SYSTEMS
下载PDF
Deployment Strategy for Multiple Controllers Based on the Aviation On-Board Software-Defined Data Link Network
15
作者 Yuting Zhu Yanfang Fu +3 位作者 Yang Ce Pan Deng Jianpeng Zhu Huankun Su 《Computers, Materials & Continua》 SCIE EI 2023年第12期3867-3894,共28页
In light of the escalating demand and intricacy of services in contemporary terrestrial,maritime,and aerial combat operations,there is a compelling need for enhanced service quality and efficiency in airborne cluster ... In light of the escalating demand and intricacy of services in contemporary terrestrial,maritime,and aerial combat operations,there is a compelling need for enhanced service quality and efficiency in airborne cluster communication networks.Software-Defined Networking(SDN)proffers a viable solution for the multifaceted task of cooperative communication transmission and management across different operational domains within complex combat contexts,due to its intrinsic ability to flexibly allocate and centrally administer network resources.This study pivots around the optimization of SDN controller deployment within airborne data link clusters.A collaborative multi-controller architecture predicated on airborne data link clusters is thus proposed.Within this architectural framework,the controller deployment issue is reframed as a two-fold problem:subdomain partition-ing and central interaction node selection.We advocate a subdomain segmentation approach grounded in node value ranking(NDVR)and a central interaction node selection methodology predicated on an enhanced Artificial Fish Swarm Algorithm(AFSA).The advanced NDVR-AFSA(Node value ranking-Improved artificial fish swarm algorithm)algorithm makes use of a chaos algorithm for population initialization,boosting population diversity and circumventing premature algorithm convergence.By the integration of adaptive strategies and incorporation of the genetic algorithm’s crossover and mutation operations,the algorithm’s search range adaptability is enhanced,thereby increasing the possibility of obtaining globally optimal solutions,while concurrently augmenting cluster reliability.The simulation results verify the advantages of the NDVR-IAFSA algorithm,achieve a better load balancing effect,improve the reliability of aviation data link cluster,and significantly reduce the average propagation delay and disconnection rate,respectively,by 12.8%and 11.7%.This shows that the optimization scheme has important significance in practical application,and can meet the high requirements of modern sea,land,and air operations to aviation airborne communication networks. 展开更多
关键词 Aviation cluster software defined network controller deployment Airborne network data link
下载PDF
Sea Turtle Foraging Optimization-Based Controller Placement with Blockchain-Assisted Intrusion Detection in Software-Defined Networks
16
作者 Sultan Alkhliwi 《Computers, Materials & Continua》 SCIE EI 2023年第6期4735-4752,共18页
Software-defined networking(SDN)algorithms are gaining increas-ing interest and are making networks flexible and agile.The basic idea of SDN is to move the control planes to more than one server’s named controllers a... Software-defined networking(SDN)algorithms are gaining increas-ing interest and are making networks flexible and agile.The basic idea of SDN is to move the control planes to more than one server’s named controllers and limit the data planes to numerous sending network components,enabling flexible and dynamic network management.A distinctive characteristic of SDN is that it can logically centralize the control plane by utilizing many physical controllers.The deployment of the controller—that is,the controller placement problem(CPP)—becomes a vital model challenge.Through the advancements of blockchain technology,data integrity between nodes can be enhanced with no requirement for a trusted third party.Using the lat-est developments in blockchain technology,this article designs a novel sea turtle foraging optimization algorithm for the controller placement problem(STFOA-CPP)with blockchain-based intrusion detection in an SDN environ-ment.The major intention of the STFOA-CPP technique is the maximization of lifetime,network connectivity,and load balancing with the minimization of latency.In addition,the STFOA-CPP technique is based on the sea turtles’food-searching characteristics of tracking the odour path of dimethyl sulphide(DMS)released from food sources.Moreover,the presented STFOA-CPP technique can adapt with the controller’s count mandated and the shift to controller mapping to variable network traffic.Finally,the blockchain can inspect the data integrity,determine significantly malicious input,and improve the robust nature of developing a trust relationship between sev-eral nodes in the SDN.To demonstrate the improved performance of the STFOA-CPP algorithm,a wide-ranging experimental analysis was carried out.The extensive comparison study highlighted the improved outcomes of the STFOA-CPP technique over other recent approaches. 展开更多
关键词 Software-defined networking NP hard problem metaheuristics controller placement problem objective function
下载PDF
An Efficient Heterogeneous Ring Signcryption Scheme for Wireless Body Area Networks
17
作者 Qingqing Ning Chunhua Jin +2 位作者 Zhiwei Chen Yongliang Xu Huaqi Lu 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2061-2078,共18页
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological signals.WBANs provide a mechanism for collecting,storing,and transmitting physiological data to healthcare pro... Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological signals.WBANs provide a mechanism for collecting,storing,and transmitting physiological data to healthcare providers.However,the open wireless channel and limited resources of sensors bring security challenges.To ensure physiological data security,this paper provides an efficient Certificateless Public Key Infrastructure Heterogeneous Ring Signcryption(CP-HRSC)scheme,in which sensors are in a certificateless cryptosystem(CLC)environment,and the server is in a public key infrastructure(PKI)environment.CLC could solve the limitations of key escrow in identity-based cryptography(IBC)and certificate management for public keys in PKI.While PKI is suited for the server because it is widely used on the Internet.Furthermore,this paper designs a ring signcryption method that allows the controller to anonymously encrypt physiological data on behalf of a set of sensors,but the server does not exactly know who the sensor is.The construction of this paper can achieve anonymity,confidentiality,authentication,non-repudiation,and integrity in a logically single step.Under the computational Diffie-Hellman(CDH)problem,the formal security proof is provided in the random oracle model(ROM).This paper demonstrates that this scheme has indistinguishability against adaptive chosen ciphertext attacks(IND-CCA2)and existential unforgeability against adaptive chosen message attacks(EUF-CMA).In terms of computational cost and energy usage,a comprehensive performance analysis demonstrates that the proposed scheme is the most effective.Compared to the three existing schemes,the computational cost of this paper’s scheme is reduced by about 49.5%,4.1%,and 8.4%,and the energy usage of our scheme is reduced by about 49.4%,3.7%,and 14.2%,respectively. 展开更多
关键词 Wireless body area networks certificateless cryptosystem public key infrastructure SECURITY ring singncryption
下载PDF
Trajectory tracking guidance of interceptor via prescribed performance integral sliding mode with neural network disturbance observer 被引量:1
18
作者 Wenxue Chen Yudong Hu +1 位作者 Changsheng Gao Ruoming An 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期412-429,共18页
This paper investigates interception missiles’trajectory tracking guidance problem under wind field and external disturbances in the boost phase.Indeed,the velocity control in such trajectory tracking guidance system... This paper investigates interception missiles’trajectory tracking guidance problem under wind field and external disturbances in the boost phase.Indeed,the velocity control in such trajectory tracking guidance systems of missiles is challenging.As our contribution,the velocity control channel is designed to deal with the intractable velocity problem and improve tracking accuracy.The global prescribed performance function,which guarantees the tracking error within the set range and the global convergence of the tracking guidance system,is first proposed based on the traditional PPF.Then,a tracking guidance strategy is derived using the integral sliding mode control techniques to make the sliding manifold and tracking errors converge to zero and avoid singularities.Meanwhile,an improved switching control law is introduced into the designed tracking guidance algorithm to deal with the chattering problem.A back propagation neural network(BPNN)extended state observer(BPNNESO)is employed in the inner loop to identify disturbances.The obtained results indicate that the proposed tracking guidance approach achieves the trajectory tracking guidance objective without and with disturbances and outperforms the existing tracking guidance schemes with the lowest tracking errors,convergence times,and overshoots. 展开更多
关键词 BP network neural Integral sliding mode control(ISMC) Missile defense Prescribed performance function(PPF) State observer Tracking guidance system
下载PDF
基于改进GAN的智能网联车CAN总线异常检测研究
19
作者 杨浩然 谢辉 +1 位作者 宋康 闫龙 《汽车安全与节能学报》 CAS CSCD 北大核心 2024年第5期660-669,共10页
为提高智能网联汽车(ICVs)的安全性,提出了一种能适应异常流量低的、泛化能力强的控制器局域网(CAN)总线异常检测算法,以应对车辆可能会产生的潜在的和难以察觉的异常情况,有效提高异常数据的检测精度。该文探讨了生成对抗网络(GANs)的... 为提高智能网联汽车(ICVs)的安全性,提出了一种能适应异常流量低的、泛化能力强的控制器局域网(CAN)总线异常检测算法,以应对车辆可能会产生的潜在的和难以察觉的异常情况,有效提高异常数据的检测精度。该文探讨了生成对抗网络(GANs)的理论意义,并在一辆智能网联公交车上,收集了4类不同攻击数据,2类罕见报警数据,基于计算数据的重构误差来衡量异常程度,验证算法的适应性。结果表明:该文提出的算法在低流量数据集Data4上的F1分数和误报率分别达到98.31%和2.90%,超过初始模型及深度卷积生成对抗网络(DCGAN)算法,且对罕见报警数据的误报率减少到3%,说明该算法适用于低流量异常检测,且泛化能力强。 展开更多
关键词 智能网联汽车(ICVs) 控制器局域网(can)总线 异常检测 低流量异常 隐空间距离
下载PDF
基于UVM的异步接口CAN控制器验证平台 被引量:1
20
作者 孙维东 胡小刚 《电子技术应用》 2024年第1期35-40,共6页
针对带有异步接口的CAN控制器,设计实现了一种基于UVM的随机化、可重用的功能验证平台。该平台使用面向对象的UVM类搭建,代码可重用性更强,开发周期更短;引入随机化程度更高的激励加快功能验证的收敛速度,且更加贴近芯片的实际应用场景... 针对带有异步接口的CAN控制器,设计实现了一种基于UVM的随机化、可重用的功能验证平台。该平台使用面向对象的UVM类搭建,代码可重用性更强,开发周期更短;引入随机化程度更高的激励加快功能验证的收敛速度,且更加贴近芯片的实际应用场景;自动化比对机制可以实时地输出结果报告,便于问题的定位和调试。平台独创性地实现了CAN总线代理器和异步接口驱动器两个组件,兼容CAN 2.0B标准协议和Intel/Motorola异步接口时序,实现了平台与DUT的数据交互。实验结果表明,设计验证平台可以有效验证待测设计异步接口CAN控制器。 展开更多
关键词 芯片设计验证 通用验证方法学 可重用验证平台 控制器局域网
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部