Nearly all real-world networks are complex networks and usually are in danger of collapse.Therefore,it is crucial to exploit and understand the mechanisms of network attacks and provide better protection for network f...Nearly all real-world networks are complex networks and usually are in danger of collapse.Therefore,it is crucial to exploit and understand the mechanisms of network attacks and provide better protection for network functionalities.Network dismantling aims to find the smallest set of nodes such that after their removal the network is broken into connected components of sub-extensive size.To overcome the limitations and drawbacks of existing network dismantling methods,this paper focuses on network dismantling problem and proposes a neighbor-loop structure based centrality metric,NL,which achieves a balance between computational efficiency and evaluation accuracy.In addition,we design a novel method combining NL-based nodes-removing,greedy tree-breaking and reinsertion.Moreover,we compare five baseline methods with our algorithm on ten widely used real-world networks and three types of model networks including Erd€os-Renyi random networks,Watts-Strogatz smallworld networks and Barabasi-Albert scale-free networks with different network generation parameters.Experimental results demonstrate that our proposed method outperforms most peer methods by obtaining a minimal set of targeted attack nodes.Furthermore,the insights gained from this study may be of assistance to future practical research into real-world networks.展开更多
This work carried out a measurement study of the Ethereum Peer-to-Peer(P2P)network to gain a better understanding of the underlying nodes.Ethereum was applied because it pioneered distributed applications,smart contra...This work carried out a measurement study of the Ethereum Peer-to-Peer(P2P)network to gain a better understanding of the underlying nodes.Ethereum was applied because it pioneered distributed applications,smart contracts,and Web3.Moreover,its application layer language“Solidity”is widely used in smart contracts across different public and private blockchains.To this end,we wrote a new Ethereum client based on Geth to collect Ethereum node information.Moreover,various web scrapers have been written to collect nodes’historical data fromthe Internet Archive and the Wayback Machine project.The collected data has been compared with two other services that harvest the number of Ethereumnodes.Ourmethod has collectedmore than 30% more than the other services.The data trained a neural network model regarding time series to predict the number of online nodes in the future.Our findings show that there are less than 20% of the same nodes daily,indicating thatmost nodes in the network change frequently.It poses a question of the stability of the network.Furthermore,historical data shows that the top ten countries with Ethereum clients have not changed since 2016.The popular operating system of the underlying nodes has shifted from Windows to Linux over time,increasing node security.The results have also shown that the number of Middle East and North Africa(MENA)Ethereum nodes is neglected compared with nodes recorded from other regions.It opens the door for developing new mechanisms to encourage users from these regions to contribute to this technology.Finally,the model has been trained and demonstrated an accuracy of 92% in predicting the future number of nodes in the Ethereum network.展开更多
With the advent of large-scale and high-speed IPv6 network technology, an effective multi-point traffic sampling is becoming a necessity. A distributed multi-point traffic sampling method that provides an accurate and...With the advent of large-scale and high-speed IPv6 network technology, an effective multi-point traffic sampling is becoming a necessity. A distributed multi-point traffic sampling method that provides an accurate and efficient solution to measure IPv6 traffic is proposed. The proposed method is to sample IPv6 traffic based on the analysis of bit randomness of each byte in the packet header. It offers a way to consistently select the same subset of packets at each measurement point, which satisfies the requirement of the distributed multi-point measurement. Finally, using real IPv6 traffic traces, the conclusion that the sampled traffic data have a good uniformity that satisfies the requirement of sampling randomness and can correctly reflect the packet size distribution of full packet trace is proved.展开更多
Nowadays,high mobility scenarios have become increasingly common.The widespread adoption of High-speed Rail(HSR)in China exemplifies this trend,while more promising use cases,such as vehicle-to-everything,continue to ...Nowadays,high mobility scenarios have become increasingly common.The widespread adoption of High-speed Rail(HSR)in China exemplifies this trend,while more promising use cases,such as vehicle-to-everything,continue to emerge.However,the Internet access provided in high mobility environments stllstruggles to achieve seamless connectivity.The next generation of wireless cellular technology 5 G further poses more requirements on the endto-end evolution to fully utilize its ultra-high band-width,while existing network diagnostic tools focus on above-IP layers or below-IP layers only.We then propose HiMoDiag,which enables flexible online analysis of the network performance in a cross-layer manner,i.e.,from the top(application layer)to the bottom(physical layer).We believe HiMoDiag could greatly simplify the process of pinpointing the deficiencies of the Internet access delivery on HSR,lead to more timely optimization and ultimately help to improve the network performance.展开更多
Financing of the African Integrated High-Speed Railway Network (AIHSRN) through Standard Gauge Railway (SGR) Projects is very expensive. As a result, most of the African countries seek financial supports from the Inte...Financing of the African Integrated High-Speed Railway Network (AIHSRN) through Standard Gauge Railway (SGR) Projects is very expensive. As a result, most of the African countries seek financial supports from the International Financial Institutions (IFIs). However, conditions provided by the IFIs through the Performance Standards (PS) of the International Financial Corporation (IFC) increase cost of the projects and thus, it becomes a burden to most of the African countries. This study aimed to explore the causes of IFC-PS through the SGR Projects that escalate costs and how to address them. The Tanzania SGR Lot 1 Project that covered 205 km from Dar es Salaam to Morogoro was selected as a case study. The methods used for data collection involved literature review, focus group discussions and interviews. The results and findings show a gap between the IFC-PS and the National Laws and Regulations that escalates costs of the projects if funds from the IFIs were to be secured. To bridge the gap, it is recommended that the African countries should engage into negotiations with the IFIs to agree to waive IFC-PS conditions that escalate costs provided they are adequately covered in the national laws and regulations;engagement of locally established national and regional financial institutions;and the responsible government institutions in the African countries should sit together for assessment and review of the IFC-PS against the national laws and regulations.展开更多
A software package to be used in high-speed oscilloscope-basedthree-dimensionalbunch-by-bunch charge and position measurement is presented.The software package takes the pick-up electrode signal waveform recorded by t...A software package to be used in high-speed oscilloscope-basedthree-dimensionalbunch-by-bunch charge and position measurement is presented.The software package takes the pick-up electrode signal waveform recorded by the high-speed oscilloscope as input,and it calculates and outputs the bunch-by-bunch charge and position.In addition to enabling a three-dimensional observation of the motion of each passing bunch on all beam position monitor pick-up electrodes,it offers many additional features such as injection analysis,bunch response function reconstruction,and turn-by-turn beam analysis.The software package has an easy-to-understand graphical user interface and convenient interactive operation,which has been verified on the Windows 10 system.展开更多
Wireless communication for high-speed railways (HSRs) that provides reliable and high data rate communi- cation between the train and trackside networks is a challenging task. It is estimated that the wireless commu...Wireless communication for high-speed railways (HSRs) that provides reliable and high data rate communi- cation between the train and trackside networks is a challenging task. It is estimated that the wireless communication traffic could be as high as 65 Mbps per high-speed train. The development of such HSR communications systems and standards requires, in turn, accurate models for the HSR propagation channel. This article provides an overview of ex- isting HSR channel measurement campaigns in recent years. Particularly, some important measurement and modeling results in various HSR scenarios, such as viaduct and U-shaped groove (USG), are briefly described and analyzed. In addition, we review a novel channel sounding method, which can highly improve the measurement efficiency in HSR environment.展开更多
WiFi has become one of the most popular ways to access the Internet.However,in large-scale campus wireless networks,it is challenging for network administrators to provide optimized access quality without knowledge on...WiFi has become one of the most popular ways to access the Internet.However,in large-scale campus wireless networks,it is challenging for network administrators to provide optimized access quality without knowledge on fine-grained traffic characteristics and real network performance.In this paper,we implement PerfMon,a network performance measurement and diagnosis system,which integrates collected multi-source datasets and analysis methods.Based on PerfMon,we first conduct a comprehensive measurement on application-level traffic patterns and behaviors from multiple dimensions in the wireless network of T university(TWLAN),which is one of the largest campus wireless networks.Then we systematically study the application-level network performance.We observe that the application-level traffic behaviors and performance vary greatly across different locations and device types.The performance is far from satisfactory in some cases.To diagnose these problems,we distinguish locations and device types,and further locate the most crucial factors that affect the performance.The results of case studies show that the influential factors can effectively characterize performance changes and explain for performance degradation.展开更多
As a promising technology to completely transform how we architect, deploy, operate and manage various networks, software-based Network Function Virtualization(NFV) enables hardware-independent, flexible, fast and eff...As a promising technology to completely transform how we architect, deploy, operate and manage various networks, software-based Network Function Virtualization(NFV) enables hardware-independent, flexible, fast and efficient network service provision. With the increasing popularity of NFV paradigm, the Internet has also transformed to be a hybrid environment where NFV-based network entities coexist with traditional network devices. To facilitate our understanding, design, evaluate and manage of such novel network environment, there is a great need for a new NFV-compatible network measurement system which is still in absent so far. To bridge this gap, a system, named Software Defined Network Measurement System(SDNMS), is presented in this paper. Firstly, the architecture of SDNMS is proposed. In this architecture, a formal method to describe the working mode of the network measurement is defined. This method can also be utilized to generate a network measurement middle box(NMMB) in a specific location of the NFV network according to the customized description file, and to flexibly deploy the network measurement function. Secondly, the technology of virtual network measurement function(VNMF) combined with LXC is studied to form NMMB function. Thirdly, a control method is presented to control the start, stop, and update NMMB to form a specific network measurement system function. Finally, a prototype of SDNMS with network monitoring function to monitor network performance anomalies and locate faults is introduced. Experimental results have shown that SDNMS architecture and related technologies are feasible and effective to deploy and control network measurement functions in NFV networks. We hope SDNMS could provide a new method for practitioners to conduct network management and research at the age of NFV.展开更多
High-speed trains often use temperature sensors to monitor the motion state of bearings.However,the temperature of bearings can be affected by factors such as weather and faults.Therefore,it is necessary to analyze in...High-speed trains often use temperature sensors to monitor the motion state of bearings.However,the temperature of bearings can be affected by factors such as weather and faults.Therefore,it is necessary to analyze in detail the relationship between the bearing temperature and influencing factors.In this study,a dynamics model of the axle box bearing of high-speed trains is established.The model can obtain the contact force between the rollers and raceway and its change law when the bearing contains outer-ring,inner-ring,and rolling-element faults.Based on the model,a thermal network method is introduced to study the temperature field distribution of the axle box bearings of high-speed trains.In this model,the heat generation,conduction,and dispersion of the isothermal nodes can be solved.The results show that the temperature of the contact point between the outer-ring raceway and rolling-elements is the highest.The relationships between the node temperature and the speed,fault type,and fault size are analyzed,finding that the higher the speed,the higher the node temperature.Under different fault types,the node temperature first increases and then decreases as the fault size increases.The effectiveness of the model is demonstrated using the actual temperature data of a high-speed train.This study proposes a thermal network model that can predict the temperature of each component of the bearings on a high-speed train under various speed and fault conditions.展开更多
In metal cutting industry it is a common practice to search for optimal combination of cutting parameters in order to maximize the tool life for a fixed minimum value of material removal rate(MRR). After the advent ...In metal cutting industry it is a common practice to search for optimal combination of cutting parameters in order to maximize the tool life for a fixed minimum value of material removal rate(MRR). After the advent of high-speed milling(HSM) pro cess, lots of experimental and theoretical researches have been done for this purpose which mainly emphasized on the optimization of the cutting parameters. It is highly beneficial to convert raw data into a comprehensive knowledge-based expert system using fuzzy logic as the reasoning mechanism. In this paper an attempt has been presented for the extraction of the rules from fuzzy neural network(FNN) so as to have the most effective knowledge-base for given set of data. Experiments were conducted to determine the best values of cutting speeds that can maximize tool life for different combinations of input parameters. A fuzzy neural network was constructed based on the fuzzification of input parameters and the cutting speed. After training process, raw rule sets were extracted and a rule pruning approach was proposed to obtain concise linguistic rules. The estimation process with fuzzy inference showed that the optimized combination of fuzzy rules provided the estimation error of only 6.34 m/min as compared to 314 m/min of that of randomized combination of rule s.展开更多
The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the Internet.Bot detection using machine learning(ML)with flow-based fea...The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the Internet.Bot detection using machine learning(ML)with flow-based features has been extensively studied in the literature.Existing flow-based detection methods involve significant computational overhead that does not completely capture network communication patterns that might reveal other features ofmalicious hosts.Recently,Graph-Based Bot Detection methods using ML have gained attention to overcome these limitations,as graphs provide a real representation of network communications.The purpose of this study is to build a botnet malware detection system utilizing centrality measures for graph-based botnet detection and ML.We propose BotSward,a graph-based bot detection system that is based on ML.We apply the efficient centrality measures,which are Closeness Centrality(CC),Degree Centrality(CC),and PageRank(PR),and compare them with others used in the state-of-the-art.The efficiency of the proposed method is verified on the available Czech Technical University 13 dataset(CTU-13).The CTU-13 dataset contains 13 real botnet traffic scenarios that are connected to a command-and-control(C&C)channel and that cause malicious actions such as phishing,distributed denial-of-service(DDoS)attacks,spam attacks,etc.BotSward is robust to zero-day attacks,suitable for large-scale datasets,and is intended to produce better accuracy than state-of-the-art techniques.The proposed BotSward solution achieved 99%accuracy in botnet attack detection with a false positive rate as low as 0.0001%.展开更多
With the continual growth of the variety and complexity of network crime means, the traditional packet feature matching cannot detect all kinds of intrusion behaviors completely. It is urgent to reassemble network str...With the continual growth of the variety and complexity of network crime means, the traditional packet feature matching cannot detect all kinds of intrusion behaviors completely. It is urgent to reassemble network stream to perform packet processing at a semantic level above the network layer. This paper presents an efficient TCP stream reassembly mechanism for real-time processing of high-speed network traffic. By analyzing the characteristics of network stream in high-speed network and TCP connection establishment process, several polices for designing the reassembly mechanism are built. Then, the reassembly implementation is elaborated in accordance with the policies. Finally, the reassembly mechanism is compared with the traditional reassembly mechanism by the network traffic captured in a typical gigabit gateway. Experiment results illustrate that the reassembly mechanism is efficient and can satisfy the real-time property requirement of traffic analysis system in high-speed network.展开更多
China has the largest high-speed railway(HSR) system in the world, and it has gradually reshaped the urban network.The HSR system can be represented as different types of networks in terms of the nodes and various rel...China has the largest high-speed railway(HSR) system in the world, and it has gradually reshaped the urban network.The HSR system can be represented as different types of networks in terms of the nodes and various relationships(i.e.,linkages) between them. In this paper, we first introduce a general dual network model, including a physical network(PN)and a logical network(LN) to provide a comparative analysis for China’s high-speed rail network via complex network theory. The PN represents a layout of stations and rail tracks, and forms the basis for operating all trains. The LN is a network composed of the origin and destination stations of each high-speed train and the train flows between them. China’s high-speed railway(CHSR) has different topological structures and link strengths for PN in comparison with the LN. In the study, the community detection is used to analyze China’s high-speed rail networks and several communities are found to be similar to the layout of planned urban agglomerations in China. Furthermore, the hierarchies of urban agglomerations are different from each other according to the strength of inter-regional interaction and intra-regional interaction, which are respectively related to location and spatial development strategies. Moreover, a case study of the Yangtze River Delta shows that the hub stations have different resource divisions and are major contributors to the gap between train departure and arrival flows.展开更多
The hot deformation behavior of TI (18W-4Cr-1V) high-speed steel was investigated by means of continuous compression tests performed on Gleeble 1500 thermomechan- ical simulator in a wide range of tempemtures (950℃...The hot deformation behavior of TI (18W-4Cr-1V) high-speed steel was investigated by means of continuous compression tests performed on Gleeble 1500 thermomechan- ical simulator in a wide range of tempemtures (950℃-1150℃) with strain rotes of 0.001s-1-10s-1 and true strains of 0-0. 7. The flow stress at the above hot defor- mation conditions is predicted by using BP artificial neural network. The architecture of network includes there are three input parameters:strain rate,temperature T and true strain , and just one output parameter, the flow stress ,2 hidden layers are adopted, the first hidden layer includes 9 neurons and second 10 negroes. It has been verified that BP artificial neural network with 3-9-10-1 architecture can predict flow stress of high-speed steel during hot deformation very well. Compared with the prediction method of flow stress by using Zaped-Holloman parumeter and hyperbolic sine stress function, the prediction method by using BP artificial neurul network has higher efficiency and accuracy.展开更多
For the congestion problems in high-speed networks, a genetic based fuzzy Q-learning flow controller is proposed. Because of the uncertainties and highly time-varying, it is not easy to accurately obtain the complete ...For the congestion problems in high-speed networks, a genetic based fuzzy Q-learning flow controller is proposed. Because of the uncertainties and highly time-varying, it is not easy to accurately obtain the complete information for high-speed networks. In this case, the Q-learning, which is independent of mathematic model, and prior-knowledge, has good performance. The fuzzy inference is introduced in order to facilitate generalization in large state space, and the genetic operators are used to obtain the consequent parts of fuzzy rules. Simulation results show that the proposed controller can learn to take the best action to regulate source flow with the features of high throughput and low packet loss ratio, and can avoid the occurrence of congestion effectively.展开更多
In view of class imbalance in data-driven modeling for Prognostics and Health Management(PHM),existing classification methods may fail in generating effective fault prediction models for the on-board high-speed train ...In view of class imbalance in data-driven modeling for Prognostics and Health Management(PHM),existing classification methods may fail in generating effective fault prediction models for the on-board high-speed train control equipment.A virtual sample generation solution based on Generative Adversarial Network(GAN)is proposed to overcome this shortcoming.Aiming at augmenting the sample classes with the imbalanced data problem,the GAN-based virtual sample generation strategy is embedded into the establishment of fault prediction models.Under the PHM framework of the on-board train control system,the virtual sample generation principle and the detailed procedures are presented.With the enhanced class-balancing mechanism and the designed sample augmentation logic,the PHM scheme of the on-board train control equipment has powerful data condition adaptability and can effectively predict the fault probability and life cycle status.Practical data from a specific type of on-board train control system is employed for the validation of the presented solution.The comparative results indicate that GAN-based sample augmentation is capable of achieving a desirable sample balancing level and enhancing the performance of correspondingly derived fault prediction models for the Condition-based Maintenance(CBM)operations.展开更多
The construction of high-speed rail(HSR)network has promoted the social-economic ties of cities,accelerated the compression of time and space,and changed the pattern of regional development.In this paper,with the adop...The construction of high-speed rail(HSR)network has promoted the social-economic ties of cities,accelerated the compression of time and space,and changed the pattern of regional development.In this paper,with the adoption of the operation frequency data of HSR from 12306 website,and based on the HSR connection strength model and social network analysis model,as well as according to the HSR connection strength,HSR network density,centrality,agglomeration subgroup,and other indicators,we analyzed the characteristics of HSR network structure in Northeast China.Results show that the number of HSR cities in Northeast China is small,cities in HSR network generally exhibit weak connectivity,and the existence of HSR network marginalizes cities such as Ulanhot,Baicheng,and Songyuan,which significantly reduce the overall network connectivity of Northeast China.The overall centrality of HSR network in Northeast China is characterized by“one axis,four edges”;specifically,the one axis is located in Harbin-Dalian transportation line and the four edges are located on both sides of the main axis of Harbin-Dalian transportation line.Eight agglomeration subgroups(four double city subgroups and four multi city subgroups)have formed in Northeast China.The core status of Shenyang in HSR network is improved significantly,and“one axis and two wings”HSR network in Liaoning Province is improved significantly.With the gradual expansion of Chaoyang-Fuxin,Dandong-Benxi,and Jilin-Yanji branch networks,the“point axis”HSR network mode in Northeast China has gradually developed and matured.In the future,it is recommended to rely on eight agglomerating subgroups to encrypt HSR network structure,create secondary node central cities,and gradually build a new pattern of opening up in Northeast China.展开更多
The complexity of large-scale network systems made of a large number of nonlinearly interconnected components is a restrictive facet for their modeling and analysis. In this paper, we propose a framework of hierarchic...The complexity of large-scale network systems made of a large number of nonlinearly interconnected components is a restrictive facet for their modeling and analysis. In this paper, we propose a framework of hierarchical modeling of a complex network system, based on a recursive unsupervised spectral clustering method. The hierarchical model serves the purpose of facilitating the management of complexity in the analysis of real-world critical infrastructures. We exemplify this by referring to the reliability analysis of the 380 kV Italian Power Transmission Network (IPTN). In this work of analysis, the classical component Importance Measures (IMs) of reliability theory have been extended to render them compatible and applicable to a complex distributed network system. By utilizing these extended IMs, the reliability properties of the IPTN system can be evaluated in the framework of the hierarchical system model, with the aim of providing risk managers with information on the risk/safety significance of system structures and components.展开更多
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network...The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection.展开更多
基金the National Natural Science Foundation of China under Grants 61871209 and 61901210,in part by Artificial Intelligence and Intelligent Transportation Joint Technical Center of HUST and Hubei Chutian Intelligent Transportation Co.,LTD under project”Intelligent Transportation Operation Monitoring Network and System”.
文摘Nearly all real-world networks are complex networks and usually are in danger of collapse.Therefore,it is crucial to exploit and understand the mechanisms of network attacks and provide better protection for network functionalities.Network dismantling aims to find the smallest set of nodes such that after their removal the network is broken into connected components of sub-extensive size.To overcome the limitations and drawbacks of existing network dismantling methods,this paper focuses on network dismantling problem and proposes a neighbor-loop structure based centrality metric,NL,which achieves a balance between computational efficiency and evaluation accuracy.In addition,we design a novel method combining NL-based nodes-removing,greedy tree-breaking and reinsertion.Moreover,we compare five baseline methods with our algorithm on ten widely used real-world networks and three types of model networks including Erd€os-Renyi random networks,Watts-Strogatz smallworld networks and Barabasi-Albert scale-free networks with different network generation parameters.Experimental results demonstrate that our proposed method outperforms most peer methods by obtaining a minimal set of targeted attack nodes.Furthermore,the insights gained from this study may be of assistance to future practical research into real-world networks.
基金the Arab Open University for Funding this work through AOU Research Fund No.(AOURG-2023-006).
文摘This work carried out a measurement study of the Ethereum Peer-to-Peer(P2P)network to gain a better understanding of the underlying nodes.Ethereum was applied because it pioneered distributed applications,smart contracts,and Web3.Moreover,its application layer language“Solidity”is widely used in smart contracts across different public and private blockchains.To this end,we wrote a new Ethereum client based on Geth to collect Ethereum node information.Moreover,various web scrapers have been written to collect nodes’historical data fromthe Internet Archive and the Wayback Machine project.The collected data has been compared with two other services that harvest the number of Ethereumnodes.Ourmethod has collectedmore than 30% more than the other services.The data trained a neural network model regarding time series to predict the number of online nodes in the future.Our findings show that there are less than 20% of the same nodes daily,indicating thatmost nodes in the network change frequently.It poses a question of the stability of the network.Furthermore,historical data shows that the top ten countries with Ethereum clients have not changed since 2016.The popular operating system of the underlying nodes has shifted from Windows to Linux over time,increasing node security.The results have also shown that the number of Middle East and North Africa(MENA)Ethereum nodes is neglected compared with nodes recorded from other regions.It opens the door for developing new mechanisms to encourage users from these regions to contribute to this technology.Finally,the model has been trained and demonstrated an accuracy of 92% in predicting the future number of nodes in the Ethereum network.
基金This project was supported by the National Natural Science Foundation of China (60572147,60132030)
文摘With the advent of large-scale and high-speed IPv6 network technology, an effective multi-point traffic sampling is becoming a necessity. A distributed multi-point traffic sampling method that provides an accurate and efficient solution to measure IPv6 traffic is proposed. The proposed method is to sample IPv6 traffic based on the analysis of bit randomness of each byte in the packet header. It offers a way to consistently select the same subset of packets at each measurement point, which satisfies the requirement of the distributed multi-point measurement. Finally, using real IPv6 traffic traces, the conclusion that the sampled traffic data have a good uniformity that satisfies the requirement of sampling randomness and can correctly reflect the packet size distribution of full packet trace is proved.
基金supported by National Key Research and Development Plan,China(Grant No.2020YFB1710900)National Natural Science Foundation of China(Grant No.62022005 and 62172008).
文摘Nowadays,high mobility scenarios have become increasingly common.The widespread adoption of High-speed Rail(HSR)in China exemplifies this trend,while more promising use cases,such as vehicle-to-everything,continue to emerge.However,the Internet access provided in high mobility environments stllstruggles to achieve seamless connectivity.The next generation of wireless cellular technology 5 G further poses more requirements on the endto-end evolution to fully utilize its ultra-high band-width,while existing network diagnostic tools focus on above-IP layers or below-IP layers only.We then propose HiMoDiag,which enables flexible online analysis of the network performance in a cross-layer manner,i.e.,from the top(application layer)to the bottom(physical layer).We believe HiMoDiag could greatly simplify the process of pinpointing the deficiencies of the Internet access delivery on HSR,lead to more timely optimization and ultimately help to improve the network performance.
文摘Financing of the African Integrated High-Speed Railway Network (AIHSRN) through Standard Gauge Railway (SGR) Projects is very expensive. As a result, most of the African countries seek financial supports from the International Financial Institutions (IFIs). However, conditions provided by the IFIs through the Performance Standards (PS) of the International Financial Corporation (IFC) increase cost of the projects and thus, it becomes a burden to most of the African countries. This study aimed to explore the causes of IFC-PS through the SGR Projects that escalate costs and how to address them. The Tanzania SGR Lot 1 Project that covered 205 km from Dar es Salaam to Morogoro was selected as a case study. The methods used for data collection involved literature review, focus group discussions and interviews. The results and findings show a gap between the IFC-PS and the National Laws and Regulations that escalates costs of the projects if funds from the IFIs were to be secured. To bridge the gap, it is recommended that the African countries should engage into negotiations with the IFIs to agree to waive IFC-PS conditions that escalate costs provided they are adequately covered in the national laws and regulations;engagement of locally established national and regional financial institutions;and the responsible government institutions in the African countries should sit together for assessment and review of the IFC-PS against the national laws and regulations.
基金supported by the Ten Thousand Talent Program and National Natural Science Foundation of China(No.11575282)the Ten Thousand Talent Program and Chinese Academy of Sciences Key Technology Talent Program。
文摘A software package to be used in high-speed oscilloscope-basedthree-dimensionalbunch-by-bunch charge and position measurement is presented.The software package takes the pick-up electrode signal waveform recorded by the high-speed oscilloscope as input,and it calculates and outputs the bunch-by-bunch charge and position.In addition to enabling a three-dimensional observation of the motion of each passing bunch on all beam position monitor pick-up electrodes,it offers many additional features such as injection analysis,bunch response function reconstruction,and turn-by-turn beam analysis.The software package has an easy-to-understand graphical user interface and convenient interactive operation,which has been verified on the Windows 10 system.
基金supported in part by the National Natural Science Foundations(Nos.61032002 and 61102050)the National Science and Technology Major Project(No.2011ZX03001-007-01)+1 种基金the Beijing Natural Science Foundation(No.4122061)the Fundamental Research Funds for the Central Universities(No.2012YJS005)
文摘Wireless communication for high-speed railways (HSRs) that provides reliable and high data rate communi- cation between the train and trackside networks is a challenging task. It is estimated that the wireless communication traffic could be as high as 65 Mbps per high-speed train. The development of such HSR communications systems and standards requires, in turn, accurate models for the HSR propagation channel. This article provides an overview of ex- isting HSR channel measurement campaigns in recent years. Particularly, some important measurement and modeling results in various HSR scenarios, such as viaduct and U-shaped groove (USG), are briefly described and analyzed. In addition, we review a novel channel sounding method, which can highly improve the measurement efficiency in HSR environment.
基金supported by the National Key Research and Development Program of China(No.2020YFE0200500)。
文摘WiFi has become one of the most popular ways to access the Internet.However,in large-scale campus wireless networks,it is challenging for network administrators to provide optimized access quality without knowledge on fine-grained traffic characteristics and real network performance.In this paper,we implement PerfMon,a network performance measurement and diagnosis system,which integrates collected multi-source datasets and analysis methods.Based on PerfMon,we first conduct a comprehensive measurement on application-level traffic patterns and behaviors from multiple dimensions in the wireless network of T university(TWLAN),which is one of the largest campus wireless networks.Then we systematically study the application-level network performance.We observe that the application-level traffic behaviors and performance vary greatly across different locations and device types.The performance is far from satisfactory in some cases.To diagnose these problems,we distinguish locations and device types,and further locate the most crucial factors that affect the performance.The results of case studies show that the influential factors can effectively characterize performance changes and explain for performance degradation.
基金supported by National Natural Science Foundation of China (No. 61772271, 61379149)
文摘As a promising technology to completely transform how we architect, deploy, operate and manage various networks, software-based Network Function Virtualization(NFV) enables hardware-independent, flexible, fast and efficient network service provision. With the increasing popularity of NFV paradigm, the Internet has also transformed to be a hybrid environment where NFV-based network entities coexist with traditional network devices. To facilitate our understanding, design, evaluate and manage of such novel network environment, there is a great need for a new NFV-compatible network measurement system which is still in absent so far. To bridge this gap, a system, named Software Defined Network Measurement System(SDNMS), is presented in this paper. Firstly, the architecture of SDNMS is proposed. In this architecture, a formal method to describe the working mode of the network measurement is defined. This method can also be utilized to generate a network measurement middle box(NMMB) in a specific location of the NFV network according to the customized description file, and to flexibly deploy the network measurement function. Secondly, the technology of virtual network measurement function(VNMF) combined with LXC is studied to form NMMB function. Thirdly, a control method is presented to control the start, stop, and update NMMB to form a specific network measurement system function. Finally, a prototype of SDNMS with network monitoring function to monitor network performance anomalies and locate faults is introduced. Experimental results have shown that SDNMS architecture and related technologies are feasible and effective to deploy and control network measurement functions in NFV networks. We hope SDNMS could provide a new method for practitioners to conduct network management and research at the age of NFV.
基金National Key R&D Program(Grant No.2020YFB2007700),National Natural Science Foundation of China(Grant Nos.11790282,12032017,12002221 and 11872256)S&T Program of Hebei(Grant No.20310803D)+1 种基金Natural Science Foundation of Hebei Province(Grant No.A2020210028)State Foundation for Studying Abroad.
文摘High-speed trains often use temperature sensors to monitor the motion state of bearings.However,the temperature of bearings can be affected by factors such as weather and faults.Therefore,it is necessary to analyze in detail the relationship between the bearing temperature and influencing factors.In this study,a dynamics model of the axle box bearing of high-speed trains is established.The model can obtain the contact force between the rollers and raceway and its change law when the bearing contains outer-ring,inner-ring,and rolling-element faults.Based on the model,a thermal network method is introduced to study the temperature field distribution of the axle box bearings of high-speed trains.In this model,the heat generation,conduction,and dispersion of the isothermal nodes can be solved.The results show that the temperature of the contact point between the outer-ring raceway and rolling-elements is the highest.The relationships between the node temperature and the speed,fault type,and fault size are analyzed,finding that the higher the speed,the higher the node temperature.Under different fault types,the node temperature first increases and then decreases as the fault size increases.The effectiveness of the model is demonstrated using the actual temperature data of a high-speed train.This study proposes a thermal network model that can predict the temperature of each component of the bearings on a high-speed train under various speed and fault conditions.
基金supported by International Science and Technology Cooperation project (Grant No. 2008DFA71750)
文摘In metal cutting industry it is a common practice to search for optimal combination of cutting parameters in order to maximize the tool life for a fixed minimum value of material removal rate(MRR). After the advent of high-speed milling(HSM) pro cess, lots of experimental and theoretical researches have been done for this purpose which mainly emphasized on the optimization of the cutting parameters. It is highly beneficial to convert raw data into a comprehensive knowledge-based expert system using fuzzy logic as the reasoning mechanism. In this paper an attempt has been presented for the extraction of the rules from fuzzy neural network(FNN) so as to have the most effective knowledge-base for given set of data. Experiments were conducted to determine the best values of cutting speeds that can maximize tool life for different combinations of input parameters. A fuzzy neural network was constructed based on the fuzzification of input parameters and the cutting speed. After training process, raw rule sets were extracted and a rule pruning approach was proposed to obtain concise linguistic rules. The estimation process with fuzzy inference showed that the optimized combination of fuzzy rules provided the estimation error of only 6.34 m/min as compared to 314 m/min of that of randomized combination of rule s.
文摘The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the Internet.Bot detection using machine learning(ML)with flow-based features has been extensively studied in the literature.Existing flow-based detection methods involve significant computational overhead that does not completely capture network communication patterns that might reveal other features ofmalicious hosts.Recently,Graph-Based Bot Detection methods using ML have gained attention to overcome these limitations,as graphs provide a real representation of network communications.The purpose of this study is to build a botnet malware detection system utilizing centrality measures for graph-based botnet detection and ML.We propose BotSward,a graph-based bot detection system that is based on ML.We apply the efficient centrality measures,which are Closeness Centrality(CC),Degree Centrality(CC),and PageRank(PR),and compare them with others used in the state-of-the-art.The efficiency of the proposed method is verified on the available Czech Technical University 13 dataset(CTU-13).The CTU-13 dataset contains 13 real botnet traffic scenarios that are connected to a command-and-control(C&C)channel and that cause malicious actions such as phishing,distributed denial-of-service(DDoS)attacks,spam attacks,etc.BotSward is robust to zero-day attacks,suitable for large-scale datasets,and is intended to produce better accuracy than state-of-the-art techniques.The proposed BotSward solution achieved 99%accuracy in botnet attack detection with a false positive rate as low as 0.0001%.
基金National High-Tech Research and Development Program of China (863 Program) (No.2007AA01Z309)
文摘With the continual growth of the variety and complexity of network crime means, the traditional packet feature matching cannot detect all kinds of intrusion behaviors completely. It is urgent to reassemble network stream to perform packet processing at a semantic level above the network layer. This paper presents an efficient TCP stream reassembly mechanism for real-time processing of high-speed network traffic. By analyzing the characteristics of network stream in high-speed network and TCP connection establishment process, several polices for designing the reassembly mechanism are built. Then, the reassembly implementation is elaborated in accordance with the policies. Finally, the reassembly mechanism is compared with the traditional reassembly mechanism by the network traffic captured in a typical gigabit gateway. Experiment results illustrate that the reassembly mechanism is efficient and can satisfy the real-time property requirement of traffic analysis system in high-speed network.
基金Project supported by the National Key Research and Development Program of China(Grant No.2019YFF0301400)the National Natural Science Foundation of China(Grant Nos.61671031,61722102,41722103,and 61961146005)。
文摘China has the largest high-speed railway(HSR) system in the world, and it has gradually reshaped the urban network.The HSR system can be represented as different types of networks in terms of the nodes and various relationships(i.e.,linkages) between them. In this paper, we first introduce a general dual network model, including a physical network(PN)and a logical network(LN) to provide a comparative analysis for China’s high-speed rail network via complex network theory. The PN represents a layout of stations and rail tracks, and forms the basis for operating all trains. The LN is a network composed of the origin and destination stations of each high-speed train and the train flows between them. China’s high-speed railway(CHSR) has different topological structures and link strengths for PN in comparison with the LN. In the study, the community detection is used to analyze China’s high-speed rail networks and several communities are found to be similar to the layout of planned urban agglomerations in China. Furthermore, the hierarchies of urban agglomerations are different from each other according to the strength of inter-regional interaction and intra-regional interaction, which are respectively related to location and spatial development strategies. Moreover, a case study of the Yangtze River Delta shows that the hub stations have different resource divisions and are major contributors to the gap between train departure and arrival flows.
文摘The hot deformation behavior of TI (18W-4Cr-1V) high-speed steel was investigated by means of continuous compression tests performed on Gleeble 1500 thermomechan- ical simulator in a wide range of tempemtures (950℃-1150℃) with strain rotes of 0.001s-1-10s-1 and true strains of 0-0. 7. The flow stress at the above hot defor- mation conditions is predicted by using BP artificial neural network. The architecture of network includes there are three input parameters:strain rate,temperature T and true strain , and just one output parameter, the flow stress ,2 hidden layers are adopted, the first hidden layer includes 9 neurons and second 10 negroes. It has been verified that BP artificial neural network with 3-9-10-1 architecture can predict flow stress of high-speed steel during hot deformation very well. Compared with the prediction method of flow stress by using Zaped-Holloman parumeter and hyperbolic sine stress function, the prediction method by using BP artificial neurul network has higher efficiency and accuracy.
文摘For the congestion problems in high-speed networks, a genetic based fuzzy Q-learning flow controller is proposed. Because of the uncertainties and highly time-varying, it is not easy to accurately obtain the complete information for high-speed networks. In this case, the Q-learning, which is independent of mathematic model, and prior-knowledge, has good performance. The fuzzy inference is introduced in order to facilitate generalization in large state space, and the genetic operators are used to obtain the consequent parts of fuzzy rules. Simulation results show that the proposed controller can learn to take the best action to regulate source flow with the features of high throughput and low packet loss ratio, and can avoid the occurrence of congestion effectively.
基金supported by National Natural Science Foundation of China(U2268206,T2222015)Beijing Natural Science Foundation(4232031)+1 种基金Key Fields Project of DEGP(2021ZDZX1110)Shenzhen Science and Technology Program(CJGJZD20220517141801004).
文摘In view of class imbalance in data-driven modeling for Prognostics and Health Management(PHM),existing classification methods may fail in generating effective fault prediction models for the on-board high-speed train control equipment.A virtual sample generation solution based on Generative Adversarial Network(GAN)is proposed to overcome this shortcoming.Aiming at augmenting the sample classes with the imbalanced data problem,the GAN-based virtual sample generation strategy is embedded into the establishment of fault prediction models.Under the PHM framework of the on-board train control system,the virtual sample generation principle and the detailed procedures are presented.With the enhanced class-balancing mechanism and the designed sample augmentation logic,the PHM scheme of the on-board train control equipment has powerful data condition adaptability and can effectively predict the fault probability and life cycle status.Practical data from a specific type of on-board train control system is employed for the validation of the presented solution.The comparative results indicate that GAN-based sample augmentation is capable of achieving a desirable sample balancing level and enhancing the performance of correspondingly derived fault prediction models for the Condition-based Maintenance(CBM)operations.
基金the National Natural Science Foundation of China(41871151).
文摘The construction of high-speed rail(HSR)network has promoted the social-economic ties of cities,accelerated the compression of time and space,and changed the pattern of regional development.In this paper,with the adoption of the operation frequency data of HSR from 12306 website,and based on the HSR connection strength model and social network analysis model,as well as according to the HSR connection strength,HSR network density,centrality,agglomeration subgroup,and other indicators,we analyzed the characteristics of HSR network structure in Northeast China.Results show that the number of HSR cities in Northeast China is small,cities in HSR network generally exhibit weak connectivity,and the existence of HSR network marginalizes cities such as Ulanhot,Baicheng,and Songyuan,which significantly reduce the overall network connectivity of Northeast China.The overall centrality of HSR network in Northeast China is characterized by“one axis,four edges”;specifically,the one axis is located in Harbin-Dalian transportation line and the four edges are located on both sides of the main axis of Harbin-Dalian transportation line.Eight agglomeration subgroups(four double city subgroups and four multi city subgroups)have formed in Northeast China.The core status of Shenyang in HSR network is improved significantly,and“one axis and two wings”HSR network in Liaoning Province is improved significantly.With the gradual expansion of Chaoyang-Fuxin,Dandong-Benxi,and Jilin-Yanji branch networks,the“point axis”HSR network mode in Northeast China has gradually developed and matured.In the future,it is recommended to rely on eight agglomerating subgroups to encrypt HSR network structure,create secondary node central cities,and gradually build a new pattern of opening up in Northeast China.
文摘The complexity of large-scale network systems made of a large number of nonlinearly interconnected components is a restrictive facet for their modeling and analysis. In this paper, we propose a framework of hierarchical modeling of a complex network system, based on a recursive unsupervised spectral clustering method. The hierarchical model serves the purpose of facilitating the management of complexity in the analysis of real-world critical infrastructures. We exemplify this by referring to the reliability analysis of the 380 kV Italian Power Transmission Network (IPTN). In this work of analysis, the classical component Importance Measures (IMs) of reliability theory have been extended to render them compatible and applicable to a complex distributed network system. By utilizing these extended IMs, the reliability properties of the IPTN system can be evaluated in the framework of the hierarchical system model, with the aim of providing risk managers with information on the risk/safety significance of system structures and components.
基金ACKNOWLEDGMENT This work was supported by the National Basic Research Program of China (973 Project) (NO.2007CB311100), the National Science Foundation for Young Scholars of China (Grant No.61001091), Beijing Nature Science Foundation(No. 4122012), "next-generation broadband wireless mobile communication network" National Science and Technology major Special issue funding(No. 2012ZX03002003), Funding Program for Academic Human Resources Development in Institutions of Higher Learning Under the Jurisdiction of Beijing Municipality of China and the key technology research and validation issue for the emergency treatment telemedicine public service platform which integrates the military and civilian and bases on the broadband wireless networks(No.2013ZX03006001-005), the issue belongs to Major national science and technology projects.
文摘The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection.