期刊文献+
共找到917篇文章
< 1 2 46 >
每页显示 20 50 100
Cluster DetectionMethod of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network
1
作者 Ruchun Jia Jianwei Zhang +2 位作者 Yi Lin Yunxiang Han Feike Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2523-2546,共24页
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f... In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network. 展开更多
关键词 Air traffic control network security attack behavior cluster detection behavioral characteristics information gain cluster threshold automatic encoder
下载PDF
Proactive traffic responsive control based on state-space neural network and extended Kalman filter 被引量:3
2
作者 过秀成 李岩 杨洁 《Journal of Southeast University(English Edition)》 EI CAS 2010年第3期466-470,共5页
The state-space neural network and extended Kalman filter model is used to directly predict the optimal timing plan that corresponds to futuristic traffic conditions in real time with the purposes of avoiding the lagg... The state-space neural network and extended Kalman filter model is used to directly predict the optimal timing plan that corresponds to futuristic traffic conditions in real time with the purposes of avoiding the lagging of the signal timing plans to traffic conditions. Utilizing the traffic conditions in current and former intervals, the network topology of the state-space neural network (SSNN), which is derived from the geometry of urban arterial routes, is used to predict the optimal timing plan corresponding to the traffic conditions in the next time interval. In order to improve the effectiveness of the SSNN, the extended Kalman filter (EKF) is proposed to train the SSNN instead of conventional approaches. Raw traffic data of the Guangzhou Road, Nanjing and the optimal signal timing plan generated by a multi-objective optimization genetic algorithm are applied to test the performance of the proposed model. The results indicate that compared with the SSNN and the BP neural network, the proposed model can closely match the optimal timing plans in futuristic states with higher efficiency. 展开更多
关键词 state-space neural network extended Kalman filter traffic responsive control timing plan traffic state prediction
下载PDF
Traffic Signals Control with Adaptive Fuzzy Controller in Urban Road Network 被引量:1
3
作者 李艳 樊晓平 《Journal of Donghua University(English Edition)》 EI CAS 2008年第6期710-717,共8页
An adaptive fuzzy logic controller (AFC) is presented for the signal control of the urban traffic network. The AFC is composed of the signal control system-oriented control level and the signal controller-oriented fuz... An adaptive fuzzy logic controller (AFC) is presented for the signal control of the urban traffic network. The AFC is composed of the signal control system-oriented control level and the signal controller-oriented fuzzy rules regulation level. The control level decides the signal timings in an intersection with a fuzzy logic controller. The regulation level optimizes the fuzzy rules by the Adaptive Rule Module in AFC according to both the system performance index in current control period and the traffic flows in the last one. Consequently the system performances are improved. A weight coefficient controller (WCC) is also developed to describe the interactions of traffic flow among the adjacent intersections. So the AFC combined with the WCC can be applied in a road network for signal timings. Simulations of the AFC on a real traffic scenario have been conducted. Simulation results indicate that the adaptive controller for traffic control shows better performance than the actuated one. 展开更多
关键词 traffic signal control urban road network fuzzy logic adaptive algorithm traffic interaction
下载PDF
Prediction and Analysis of Elevator Traffic Flow under the LSTM Neural Network
4
作者 Mo Shi Entao Sun +1 位作者 Xiaoyan Xu Yeol Choi 《Intelligent Control and Automation》 2024年第2期63-82,共20页
Elevators are essential components of contemporary buildings, enabling efficient vertical mobility for occupants. However, the proliferation of tall buildings has exacerbated challenges such as traffic congestion with... Elevators are essential components of contemporary buildings, enabling efficient vertical mobility for occupants. However, the proliferation of tall buildings has exacerbated challenges such as traffic congestion within elevator systems. Many passengers experience dissatisfaction with prolonged wait times, leading to impatience and frustration among building occupants. The widespread adoption of neural networks and deep learning technologies across various fields and industries represents a significant paradigm shift, and unlocking new avenues for innovation and advancement. These cutting-edge technologies offer unprecedented opportunities to address complex challenges and optimize processes in diverse domains. In this study, LSTM (Long Short-Term Memory) network technology is leveraged to analyze elevator traffic flow within a typical office building. By harnessing the predictive capabilities of LSTM, the research aims to contribute to advancements in elevator group control design, ultimately enhancing the functionality and efficiency of vertical transportation systems in built environments. The findings of this research have the potential to reference the development of intelligent elevator management systems, capable of dynamically adapting to fluctuating passenger demand and optimizing elevator usage in real-time. By enhancing the efficiency and functionality of vertical transportation systems, the research contributes to creating more sustainable, accessible, and user-friendly living environments for individuals across diverse demographics. 展开更多
关键词 Elevator traffic Flow Neural network LSTM Elevator Group control
下载PDF
Distributed Optimal Control for Traffic Networks with Fog Computing
5
作者 Yijie Wang Lei Wang +1 位作者 Saeed Amir Qing-Guo Wang 《China Communications》 SCIE CSCD 2019年第10期202-213,共12页
This paper presents a distributed optimization strategy for large-scale traffic network based on fog computing. Different from the traditional cloud-based centralized optimization strategy, the fog-based distributed o... This paper presents a distributed optimization strategy for large-scale traffic network based on fog computing. Different from the traditional cloud-based centralized optimization strategy, the fog-based distributed optimization strategy distributes its computing tasks to individual sub-processors, thus significantly reducing computation time. A traffic model is built and a series of communication rules between subsystems are set to ensure that the entire transportation network can be globally optimized while the subsystem is achieving its local optimization. Finally, this paper numerically simulates the operation of the traffic network by mixed-Integer programming, also, compares the advantages and disadvantages of the two optimization strategies. 展开更多
关键词 FOG COMPUTING traffic network DISTRIBUTED optimization DISTRIBUTED control
下载PDF
Chaotic Control of Network Traffic
6
作者 Yang Tan Guo Shize +1 位作者 Jin Yuehui Cheng Shiduan 《China Communications》 SCIE CSCD 2010年第5期112-119,共8页
This paper presents a chaotic control method on network traffic. By this method, the chaotic network traffic can be controlled to pre-assigned equifibrium point according to chaotic prediction and the Largest Lyapunov... This paper presents a chaotic control method on network traffic. By this method, the chaotic network traffic can be controlled to pre-assigned equifibrium point according to chaotic prediction and the Largest Lyapunov Exponent (LLE) of the traffic on congested link is reduced, thereby the probability of traffic burst and network congestion can be reduced. Numerical examples show that this method is effective. 展开更多
关键词 network traffic chaotic control Lyapunov exponent chaotic prediction
下载PDF
Networked control and supervision system based on LonWorks fieldbus and Intranet/Internet 被引量:2
7
作者 吴敏 赵虹 +1 位作者 刘国平 佘锦华 《Journal of Central South University of Technology》 EI 2007年第2期260-265,共6页
A networked control and supervision system (NCSS) based on LonWorks fieldbus and lntranet/Intemet was designed, which was composed of the universal intelligent control nodes (ICNs), the visual control and supervis... A networked control and supervision system (NCSS) based on LonWorks fieldbus and lntranet/Intemet was designed, which was composed of the universal intelligent control nodes (ICNs), the visual control and supervision configuration platforms (VCCP and VSCP) and an Intranet/Internet-based remote supervision platform (RSP). The ICNs were connected to field devices, such as sensors, actuators and controllers. The VCCP and VSCP were implemented by means of a graphical programming environment and network management so as to simplify the tasks of programming and maintaining the ICNs. The RSP was employed to perform the remote supervision function, which was based on a three-layer browser/server(B/S) structure mode. The validity of the NCSS was demonstrated by laboratory experiments. 展开更多
关键词 FIELDBUS LONWORKS networked control visual control configuration Web database
下载PDF
Traffic jam in signalized road network 被引量:1
8
作者 祁宏生 王殿海 +1 位作者 陈鹏 别一鸣 《Journal of Central South University》 SCIE EI CAS 2014年第2期832-842,共11页
Traffic jam in large signalized road network presents a complex nature.In order to reveal the jam characteristics,two indexes,SVS(speed of virtual signal) and VOS(velocity of spillover),were proposed respectively.SVS ... Traffic jam in large signalized road network presents a complex nature.In order to reveal the jam characteristics,two indexes,SVS(speed of virtual signal) and VOS(velocity of spillover),were proposed respectively.SVS described the propagation of queue within a link while VOS reflected the spillover velocity of vehicle queue.Based on the two indexes,network jam simulation was carried out on a regular signalized road network.The simulation results show that:1) The propagation of traffic congestion on a signalized road network can be classified into two stages:virtual split driven stage and flow rate driven stage.The former stage is characterized by decreasing virtual split while the latter only depends on flow rate; 2) The jam propagation rate and direction are dependent on traffic demand distribution and other network parameters.The direction with higher demand gets more chance to be jammed.Our findings can serve as the basis of the prevention of the formation and propagation of network traffic jam. 展开更多
关键词 traffic engineering network traffic jam virtual signal traffic control
下载PDF
Neural Network-Powered License Plate Recognition System Design
9
作者 Sakib Hasan Md Nagib Mahfuz Sunny +1 位作者 Abdullah Al Nahian Mohammad Yasin 《Engineering(科研)》 2024年第9期284-300,共17页
The development of scientific inquiry and research has yielded numerous benefits in the realm of intelligent traffic control systems, particularly in the realm of automatic license plate recognition for vehicles. The ... The development of scientific inquiry and research has yielded numerous benefits in the realm of intelligent traffic control systems, particularly in the realm of automatic license plate recognition for vehicles. The design of license plate recognition algorithms has undergone digitalization through the utilization of neural networks. In contemporary times, there is a growing demand for vehicle surveillance due to the need for efficient vehicle processing and traffic management. The design, development, and implementation of a license plate recognition system hold significant social, economic, and academic importance. The study aims to present contemporary methodologies and empirical findings pertaining to automated license plate recognition. The primary focus of the automatic license plate recognition algorithm was on image extraction, character segmentation, and recognition. The task of character segmentation has been identified as the most challenging function based on my observations. The license plate recognition project that we designed demonstrated the effectiveness of this method across various observed conditions. Particularly in low-light environments, such as during periods of limited illumination or inclement weather characterized by precipitation. The method has been subjected to testing using a sample size of fifty images, resulting in a 100% accuracy rate. The findings of this study demonstrate the project’s ability to effectively determine the optimal outcomes of simulations. 展开更多
关键词 Intelligent traffic control Systems Automatic License Plate Recognition (ALPR) Neural networks Vehicle Surveillance traffic Management License Plate Recognition Algorithms Image Extraction Character Segmentation Character Recognition Low-Light Environments Inclement Weather Empirical Findings Algorithm Accuracy Simulation Outcomes DIGITALIZATION
下载PDF
Performance and robustness analysis of a fuzzy-immune flow controller in ATM networks with time-varying multiple time-delays
10
作者 Tao REN Zhenhua GAO +3 位作者 Weiming KONG Yuanwei JING Muyi YANG Georgi M. DIMIROVSKI 《控制理论与应用(英文版)》 EI 2008年第3期253-258,共6页
For the Asynchronous Transfer Mode (ATM) networks with time-varying multiple time-delays, a more realistic model for the available bit rate (ABR) traffic class with explicit rate feedback is introduced. A fuzzy-im... For the Asynchronous Transfer Mode (ATM) networks with time-varying multiple time-delays, a more realistic model for the available bit rate (ABR) traffic class with explicit rate feedback is introduced. A fuzzy-immune controller is designed, which can adjust the rates of ABR on-line, overcome the bad effect caused by the saturation nonlinearity and satisfy the weighted fairness. Also, the sufficient condition that guarantees the stability of the closed-loop system with a fuzzy-immune controller is presented in theory for the first time. The algorithm exhibits good performance, and most importantly, has a solid theoretical foundation and can be implemented in practice easily. Simulation results show that the control system is rapid, adaptive, robust, and meanwhile, the quality of service (QoS) is guaranteed. 展开更多
关键词 ATM networks ABR traffic TIME-DELAY Fuzzy-immune controller Robust stabilization
下载PDF
PERFORMANCE ANALYSIS OF LEAKY BUCKET ALGORITHM WITH BURSTY TRAFFIC INPUT IN ATM NETWORKS
11
作者 孙海荣 李乐民 《Journal of Electronics(China)》 1995年第2期105-112,共8页
A bursty traffic model is introduced in this paper to describe the statistical characteristics of packet video. The performance of leady bucket algorithm with bursty traffic input is analyzed. The influences of variou... A bursty traffic model is introduced in this paper to describe the statistical characteristics of packet video. The performance of leady bucket algorithm with bursty traffic input is analyzed. The influences of various parameters on QOS (Quality of Service) are investigated. The analysis shows that although the loss probability decreases through expanding the buffer capacity, the delay and delay jitter increase, whose effect on QOS will not be negligible. 展开更多
关键词 Communication network ATM network USAGE parameter control LB ALGORITHM Bursty traffic
下载PDF
A novel fractional uplink power control framework for self-organizing networks
12
作者 Zezhou Luo Hongcheng Zhuang 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1434-1440,共7页
Internet of things and network densification bring significant challenges to uplink management.Only depending on optimization algorithm enhancements is not enough for uplink transmission.To control intercell interfere... Internet of things and network densification bring significant challenges to uplink management.Only depending on optimization algorithm enhancements is not enough for uplink transmission.To control intercell interference,Fractional Uplink Power Control(FUPC)should be optimized from network-wide perspective,which has to find a better traffic distribution model.Conventionally,traffic distribution is geographic-based,and ineffective due to tricky locating efforts.This paper proposes a novel uplink power management framework for Self-Organizing Networks(SON),which firstly builds up pathloss-based traffic distribution model and then makes the decision of FUPC based on the model.PathLoss-based Traffic Distribution(PLTD)aggregates traffic based on the propagation condition of traffic that is defined as the pathloss between the position generating the traffic and surrounding cells.Simulations show that the improvement in optimization efficiency of FUPC with PLTD can be up to 40%compared to conventional GeoGraphic-based Traffic Distribution(GGTD). 展开更多
关键词 5G and beyond Self-organizing networks Uplink power control Optimization efficiency traffic distribution
下载PDF
RRCNN: Request Response-Based Convolutional Neural Network for ICS Network Traffic Anomaly Detection
13
作者 Yan Du Shibin Zhang +6 位作者 Guogen Wan Daohua Zhou Jiazhong Lu Yuanyuan Huang Xiaoman Cheng Yi Zhang Peilin He 《Computers, Materials & Continua》 SCIE EI 2023年第6期5743-5759,共17页
Nowadays,industrial control system(ICS)has begun to integrate with the Internet.While the Internet has brought convenience to ICS,it has also brought severe security concerns.Traditional ICS network traffic anomaly de... Nowadays,industrial control system(ICS)has begun to integrate with the Internet.While the Internet has brought convenience to ICS,it has also brought severe security concerns.Traditional ICS network traffic anomaly detection methods rely on statistical features manually extracted using the experience of network security experts.They are not aimed at the original network data,nor can they capture the potential characteristics of network packets.Therefore,the following improvements were made in this study:(1)A dataset that can be used to evaluate anomaly detection algorithms is produced,which provides raw network data.(2)A request response-based convolutional neural network named RRCNN is proposed,which can be used for anomaly detection of ICS network traffic.Instead of using statistical features manually extracted by security experts,this method uses the byte sequences of the original network packets directly,which can extract potential features of the network packets in greater depth.It regards the request packet and response packet in a session as a Request-Response Pair(RRP).The feature of RRP is extracted using a one-dimensional convolutional neural network,and then the RRP is judged to be normal or abnormal based on the extracted feature.Experimental results demonstrate that this model is better than several other machine learning and neural network models,with F1,accuracy,precision,and recall above 99%. 展开更多
关键词 Industrial control system(ICS) DATASET network traffic anomaly detection
下载PDF
Automated Routing Control System of Local Area Network Segment
14
作者 Zafer Al-Makhadmee 《Communications and Network》 2013年第3期247-250,共4页
Automated Routing Control System supersedes the prior approach to LAN redundancy which provides two or more LANs and each has a network (LAN) controller coupled to data communication devices. Devices require some soft... Automated Routing Control System supersedes the prior approach to LAN redundancy which provides two or more LANs and each has a network (LAN) controller coupled to data communication devices. Devices require some software to switch between the network (LAN) controllers to counter some network segment failures. This approach is proven to be very costly due to demands for “off-the-shelf” data communication devices with built-in LAN controller drivers [1]. Automated Routing Control System, is the ultimate solution to the growing demands for inexpensive (less costly) and less difficult approach which requires less modification rather than upgrade of network devices yet it minimizes data and information exchange losses and interruptions caused by connection failures within the network and lessens the task of managing a complex network having many segments rather than subnets under a centralized monitoring and management. Automated Routing Control System rather than mechanism is a realistic approach applied to meet the ever growing demands for reliability, high efficiency and availability within data and information exchange networks. 展开更多
关键词 City network ROUTING control System VECTOR Analysis traffic METERING
下载PDF
APPLICATION OF INTELLIGENCE FORECASTING METHOD IN TRAFFIC ANALYSIS OF EGCS 被引量:2
15
作者 宗群 岳有军 +1 位作者 曹燕飞 尚晓光 《Transactions of Tianjin University》 EI CAS 2000年第1期18-21,共4页
Traffic flow forecasting is an important part of elevator group control system (EGCS).This paper applies time series prediction theories based on neural networks(NN) to EGCSs traffic analysis,and establishes a time se... Traffic flow forecasting is an important part of elevator group control system (EGCS).This paper applies time series prediction theories based on neural networks(NN) to EGCSs traffic analysis,and establishes a time series NN traffic flow forecasting model.Simulation results show its validity. 展开更多
关键词 traffic flow time series FORECAST elevator group control system neural networks
全文增补中
Analysis of Completion of Call with on-off Data Source in Wireless Networks
16
作者 XUANXiao-ying SHIBing-xin ZOULing 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第4期477-482,共6页
In wireless network, call completion probability accounts for users' satisfaction since the admitted ongoing call may be interrupted during hand-off process or even stay in the same cell when dynamically allocatin... In wireless network, call completion probability accounts for users' satisfaction since the admitted ongoing call may be interrupted during hand-off process or even stay in the same cell when dynamically allocating resource to calls because of the loss of resource. We focus on the relationship between call's completion probability and these interruptions and develop an analytical relationship model for homogeneous cellular networks based on probability analysis. Then assuming call's data source is modeled by on-off traffic model, a two dimensional Markov process is established to compute these blocking and dropping probabilities for call's completion probability. The impacts of different new call arrival rate, call's traffic characteristic, user's mobility, call's holding time and call's admission threshold on call's completion are evaluated and compared through numerical examples. These results show that call's completion reaches its maximum value if making no difference between hand-off call and new call in the case of light traffic load. But some resource should be reserved for the hand-off call in high traffic scenario. The analytical model provides a basis for helping to set the call admission threshold. Key words on-off traffic source - call completion probability - call admission control - wireless networks CLC number TN 919. 72 Foundation item: Supported by the National Natural Science Foundation of China (60172077)Biography: XUAN Xiao-ying (1972-), female, Ph. D candidate, research direction: radio resource management and scheduling in wireless networks. 展开更多
关键词 on-off traffic source call completion probability call admission control wireless networks
下载PDF
Class of Service Support Layer for Wireless Mesh Networks
17
作者 Jukka SUHONEN Timo D. HAMALAINEN Marko HANNIKAINEN 《International Journal of Communications, Network and System Sciences》 2010年第2期140-151,共12页
This paper presents an add-on Class of Service (CoS) layer for wireless mesh networks. The proposed protocol is applicable for contention-based MACs and is therefore compatible with most of the Wireless Local Area Net... This paper presents an add-on Class of Service (CoS) layer for wireless mesh networks. The proposed protocol is applicable for contention-based MACs and is therefore compatible with most of the Wireless Local Area Network (WLAN) and Wireless Sensor Network (WSN) protocols. The protocol has a locally centralized control for managing data flows, which either reserve a fixed bandwidth or are weighted by fair scheduling. The protocol reduces transmission collisions, thus improving the overall throughput. IEEE 802.11 adhoc WLAN has been taken as a platform for simulations and prototyping for evaluating the protocol performance. Network Simulator Version 2 (NS2) simulations show that the CoS protocol efficiently differentiates bandwidth, supports bandwidth reservations, and reaches less than 10 ms transfer delay on IEEE 802.11b WLAN. Testing with a full prototype implementation verified the performance of the protocol. 展开更多
关键词 WIRELESS LAN WIRELESS Sensor network SCHEDULING traffic control (Communication) Quality of Service
下载PDF
Wireless Hybrid QoS Architecture with an Enhancement of Fair Intelligent Congestion Control
18
作者 Li Zheng Doan B. Hoang Ming Li 《Wireless Engineering and Technology》 2012年第3期113-124,共12页
More subtle and explicit QoS control mechanisms are required at the radio access level, even though the simple and scalable Differentiated Services (DiffServ) QoS control model is acceptable for the core of the networ... More subtle and explicit QoS control mechanisms are required at the radio access level, even though the simple and scalable Differentiated Services (DiffServ) QoS control model is acceptable for the core of the network. At the radio access level, available resources are severely limited and the degree of traffic aggregation is not significant, thus rendering the DiffServ principles less effective. In this paper we present a suitable hybrid QoS architecture framework to address the problem. At the wireless access end, the local QoS mechanism is designed in the context of IEEE 802.11 WLAN with 802.11e QoS extensions;so streams of those session-based applications are admitted, established according to the traffic profile they require, and guaranteed. As the core in the Admission Control of the hybrid QoS architecture, the Fair Intelligent Congestion Control (FICC) algorithm is applied to provide fairness among traffic aggregates and control congestion at the bottleneck interface between the wireless link and the network core via mechanisms of packet scheduling, buffer management, feedback and adjustments. It manages effectively the overloading scenario by preventing traffic violation from uncontrolled traffic, and providing guarantee to the priority traffic in terms of guaranteed bandwidth allocation and specified delay. 展开更多
关键词 HYBRID QoS for WIRELESS network traffic Stream Admission control traffic Specifications FAIR INTELLIGENT Congestion control
下载PDF
On Coexistence of Vehicular Overlay Network and H2H Terminals on PRACH in LTE
19
作者 Nargis Khan Jelena Mii Vojislav B.Mii 《ZTE Communications》 2016年第3期3-12,共10页
Vehicular ad hoc networks (VANETs) that use the IEEE 802.11p communication standard face a number of challenges, not least when it comes to safety messages on the VANET control channel (CCH) where short delay time... Vehicular ad hoc networks (VANETs) that use the IEEE 802.11p communication standard face a number of challenges, not least when it comes to safety messages on the VANET control channel (CCH) where short delay times and reliable delivery are of pri- mary importance. In this paper we propose a vehicular machine-to-machine (VM2M) overlay network that uses Long Term Evolu- tion (LTE) physical random access channel (PRACH) to emulate VANET CCH. The overlay network uses dedicated preambles to separate vehicular traffic from regular LTE traffic and a cartier sense multiple access with collision avoidance (CSMA-CA) layer similar to the one used in IEEE 802.15.4 to avoid the four step handshake and the overhead it incurs. The performance of the pro- posed overlay is evaluated under a wide range of PRACH parameters which conform to the scenarios with high vehicle velocities and large distances between roadside units (RSUs) that may be encountered in rural areas and on highways. 展开更多
关键词 vehicular ad hoc networks (VANETs) VANET control channel (CCH) 3GPP long term evolution (LTE) physical random accesschannel (PRACH) IEEE 802.15.4 human-to-human (H2H) traffic
下载PDF
面向高性能计算的互连网络拥塞控制分析与评估 被引量:2
20
作者 孙岩 张建民 +1 位作者 黎渊 孙舜禹 《计算机工程与科学》 CSCD 北大核心 2024年第2期209-216,共8页
随着高性能计算技术的发展,高性能计算系统的网络节点数量不断增长,高性能计算应用对网络性能的要求越来越高,高性能互连网络的拥塞控制面临很大的压力与挑战。针对高性能计算互连网络的特点,研究高效、低开销的拥塞控制方法,是确保高... 随着高性能计算技术的发展,高性能计算系统的网络节点数量不断增长,高性能计算应用对网络性能的要求越来越高,高性能互连网络的拥塞控制面临很大的压力与挑战。针对高性能计算互连网络的特点,研究高效、低开销的拥塞控制方法,是确保高性能互连网络性能和稳定性的关键。针对高性能计算系统中互连通信的核心问题,对主流的拥塞控制方法进行分析和实验比较;基于高性能计算系统的结构特点和通信特性,设计用于大规模模拟仿真的数据流模型和流文件生成工具,并提出一种拥塞控制综合评价指标;使用所提出的数据流模型,在较大规模网络中对不同拥塞控制方法进行模拟,并基于所提出的评价指标对几种拥塞控制方法的性能进行分析和评估。提出的分析和评估技术可以对高性能互连网络的拥塞控制方法进行更客观和准确的分析与评估。 展开更多
关键词 高性能计算 拥塞控制 流量控制 RDMA网络
下载PDF
上一页 1 2 46 下一页 到第
使用帮助 返回顶部