Nitrogen deposition and water tables are important factors to control soil microbial community structure.However,the specific effects and mechanisms of nitrogen deposition and water tables coupling on bacterial divers...Nitrogen deposition and water tables are important factors to control soil microbial community structure.However,the specific effects and mechanisms of nitrogen deposition and water tables coupling on bacterial diversity,abundance,and community structure in arid alpine wetlands remain unclear.The nitrogen deposition(0,10,and 20 kg N/(hm^(2)•a))experiments were conducted in the Bayinbulak alpine wetland with different water tables(perennial flooding,seasonal waterlogging,and perennial drying).The 16S rRNA(ribosomal ribonucleic acid)gene sequencing technology was employed to analyze the changes in bacterial community diversity,network structure,and function in the soil.Results indicated that bacterial diversity was the highest under seasonal waterlogging condition.However,nitrogen deposition only affected the bacterial Chao1 and beta diversity indices under seasonal waterlogging condition.The abundance of bacterial communities under different water tables showed significant differences at the phylum and genus levels.The dominant phylum,Proteobacteria,was sensitive to soil moisture and its abundance decreased with decreasing water tables.Although nitrogen deposition led to changes in bacterial abundance,such changes were small compared with the effects of water tables.Nitrogen deposition with 10 kg N/(hm^(2)•a)decreased bacterial edge number,average path length,and robustness.However,perennial flooding and drying conditions could simply resist environmental changes caused by 20 kg N/(hm^(2)•a)nitrogen deposition and their network structure remain unchanged.The sulfur cycle function was dominant under perennial flooding condition,and carbon and nitrogen cycle functions were dominant under seasonal waterlogging and perennial drying conditions.Nitrogen application increased the potential function of part of nitrogen cycle and decreased the potential function of sulfur cycle in bacterial community.In summary,composition of bacterial community in the arid alpine wetland was determined by water tables,and diversity of bacterial community was inhibited by a lower water table.Effect of nitrogen deposition on bacterial community structure and function depended on water tables.展开更多
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa...As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.展开更多
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development...To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.展开更多
In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge...In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.展开更多
Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient co...Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient connection among IIoT devices,CRNs enhance spectrum utilization by using licensed spectrum.However,the routing protocol in these networks is considered one of the main problems due to node mobility and time-variant channel selection.Specifically,the channel selection for routing protocol is indispensable in CRNs to provide an adequate adaptation to the Primary User(PU)activity and create a robust routing path.This study aims to construct a robust routing path by minimizing PU interference and routing delay to maximize throughput within the IIoT domain.Thus,a generic routing framework from a cross-layer perspective is investigated that intends to share the information resources by exploiting a recently proposed method,namely,Channel Availability Probability.Moreover,a novel cross-layer-oriented routing protocol is proposed by using a time-variant channel estimation technique.This protocol combines lower layer(Physical layer and Data Link layer)sensing that is derived from the channel estimation model.Also,it periodically updates and stores the routing table for optimal route decision-making.Moreover,in order to achieve higher throughput and lower delay,a new routing metric is presented.To evaluate the performance of the proposed protocol,network simulations have been conducted and also compared to the widely used routing protocols,as a benchmark.The simulation results of different routing scenarios demonstrate that our proposed solution outperforms the existing protocols in terms of the standard network performance metrics involving packet delivery ratio(with an improved margin of around 5–20%approximately)under varying numbers of PUs and cognitive users in Mobile Cognitive Radio Networks(MCRNs).Moreover,the cross-layer routing protocol successfully achieves high routing performance in finding a robust route,selecting the high channel stability,and reducing the probability of PU interference for continued communication.展开更多
This paper summarizes the status quo of Mongolian medicine research,the basic research ideas and contents of network pharmacology,the latest development of network pharmacology technology in the field of Mongolian med...This paper summarizes the status quo of Mongolian medicine research,the basic research ideas and contents of network pharmacology,the latest development of network pharmacology technology in the field of Mongolian medicine research,the application progress,future development direction and existing problems in the research of Mongolian medicine,so as to provide new ideas and new methods for the scientific research of traditional medicine.展开更多
In this study, the Global Navigation Satellite System (GNSS) network of China is discussed, which can be used to monitor atmospheric precipitable water vapor (PWV). By the end of 2013, the network had 952 GNSS sit...In this study, the Global Navigation Satellite System (GNSS) network of China is discussed, which can be used to monitor atmospheric precipitable water vapor (PWV). By the end of 2013, the network had 952 GNSS sites, including 260 belonging to the Crustal Movement Observation Network of China (CMONOC) and 692 belonging to the China Meteorological Administration GNSS network (CMAGN). Additionally, GNSS observation collecting and data processing procedures are presented and PWV data quality control methods are investigated. PWV levels as determined by GNSS and radiosonde are compared. The results show that GNSS estimates are generally in good agreement with measurements of radio- sondes and water vapor radiometers (WVR). The PWV retrieved by the national GNSS network is used in weather forecasting, assimilation of data into numerical weather prediction models, the validation of PWV estimates by radiosonde, and plum rain monitoring. The network is also used to monitor the total ionospheric electron content.展开更多
The mutual-interference phenomenon among multiple applications delivered as services through Cloud Services Delivery Network(CSDN)influences their QoS seriously.In order to deploy multiple applications dependably and ...The mutual-interference phenomenon among multiple applications delivered as services through Cloud Services Delivery Network(CSDN)influences their QoS seriously.In order to deploy multiple applications dependably and efficiently,we propose the Multiple Applications Co-Exist(MACE)method.MACE classifies multiple applications into different types and deploys them using isolation to some extent.Meanwhile,resource static allocation,dynamic supplement and resource reserved mechanism to minimize mutual-interference and maximize resource utilization are designed.After MACE is applied to a real large-scale CSDN and evaluated through 6-month measurement,we find that the CSDN load is more balanced,the bandwidth utilization increases by about 20%,the multiple applications'potential statistical multiplexing ratio decreases from 12% to 5%,and the number of complaint events affecting the dependability of CSDN services caused by multiple applications'mutual-interference has dropped to 0.Obviously,MACE offers a tradeoff and improvement for the dependability and efficiency goals of CSDN.展开更多
This paper presents the networking observation capabilities of Chinese ocean satellites and their diverse applications in ocean disaster prevention,ecological monitoring,and resource development.Since the inaugural la...This paper presents the networking observation capabilities of Chinese ocean satellites and their diverse applications in ocean disaster prevention,ecological monitoring,and resource development.Since the inaugural launch in 2002,China has achieved substantial advancements in ocean satellite technology,forming an observation system composed of the HY-1,HY-2,and HY-3 series satellites.These satellites are integral to global ocean environmental monitoring due to their high resolution,extensive coverage,and frequent observations.Looking forward,China aims to further enhance and expand its ocean satellite capabilities through ongoing projects to support global environmental protection and sustainable development.展开更多
The joining of a 6-mm thickness Al 6061 to Stainless steel 304 has been performed by solid state welding. A selection method of optimum friction welding condition using neural networks is proposed. The data used for a...The joining of a 6-mm thickness Al 6061 to Stainless steel 304 has been performed by solid state welding. A selection method of optimum friction welding condition using neural networks is proposed. The data used for analyses are the friction stir welding condition, the input parameters of the model consist of welding speed and tool rotation speed. The outputs of the ANN (Artificial Neural Network)model includes resulting parameters, namely, maximum reached temperature,and heating rate for both aluminum alloy 6061 and stainless steel 304 during friction stir welding process.The results of analysis suggest that the proposed method is an effective one to select an optimum welding condition.Good performance of the ANN model was achieved. The combined influence of welding speed and tool rotation speed on the maximum reached temperature and heating rate for both aluminum alloy 6061and stainless steel 304 friction stir welding was simulated. A comparison was made between the output of the ANN program and finite element model. The calculated results were in good agreement with that of finite element model.展开更多
In this paper,we study cross-layer scheduling scheme on multimedia application which considers both streaming traffic and data traffic over cognitive ad hoc networks.A cross-layer design is proposed to optimize SU'...In this paper,we study cross-layer scheduling scheme on multimedia application which considers both streaming traffic and data traffic over cognitive ad hoc networks.A cross-layer design is proposed to optimize SU's utility,which is used as an approach to balance the transmission efficiency and heterogeneous traffic in cognitive ad hoc networks.A framework is provided for utility-based optimal subcarrier assignment,power allocation strategy and corresponding modulation scheme,subject to the interference threshold to primary user(PU) and total transmit power constraint.Bayesian learning is adopted in subcarrier allocation strategy to avoid collision and alleviate the burden of information exchange on limited common control channel(CCC).In addition,the M/G/l queuing model is also introduced to analyze the expected delay of streaming traffic.Numerical results are given to demonstrate that the proposed scheme significantly reduces the blocking probability and outperforms the mentioned single-channel dynamic resource scheduling by almost 8%in term of system utility.展开更多
Multi-service SDH networks support both packet- and circuit-switched traffic. Optimal design of such a network means to guarantee the circuit connections and configure a logical packet-switched topology with lowest co...Multi-service SDH networks support both packet- and circuit-switched traffic. Optimal design of such a network means to guarantee the circuit connections and configure a logical packet-switched topology with lowest congestion. This letter first formulates the problem as a mixed integer linear programming, which achieves optimal solution but has high computation. Then a heuristic algorithm is proposed to yield near-optimal solution efficiently. Performance of the algorithm is verified by an example.展开更多
The article introduces ZTE's Softswitch-based NGN solutions. such as the long distance VolP service solution over data back- bone,and local voice and data service solution over MAN.Three application cases are anal...The article introduces ZTE's Softswitch-based NGN solutions. such as the long distance VolP service solution over data back- bone,and local voice and data service solution over MAN.Three application cases are analyzed,and NGN's features in aspects of network architecture,service provision and network management are summarized.展开更多
When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) commun...When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) communication. Someday, the traffic generated by machines will greatly exceed those of man-machine and man-man applications. Large numbers of M2M applications will need various wireless networks to support them. This paper introduces the characteristics, advantages and disadvantages of the currently available various wireless network technologies, including WiFi, Bluetooth, ZigBee, passive RFID and the 802.15 standard networks.展开更多
Wireless Sensor Network (WSN) is characterized by the dense deployment of sensor nodes that continuously observe physical phenomenon. The main advantages of WSN include its low cost, rapid deployment, self-organizat...Wireless Sensor Network (WSN) is characterized by the dense deployment of sensor nodes that continuously observe physical phenomenon. The main advantages of WSN include its low cost, rapid deployment, self-organization, and fault tolerance. WSN has received tremendous interests of various research communities,展开更多
Along with the further development of science and technology, computer hardware and the Intemet are in a rapid development, and information technology has been widely used in all fields so that complex problems are si...Along with the further development of science and technology, computer hardware and the Intemet are in a rapid development, and information technology has been widely used in all fields so that complex problems are simply solved. Because of the needs for the development, software starts to mutually integrate with complex power network, making the scale of software increase greatly. Such a growing trend of software promotes soft-ware development to go beyond a general understanding and control and thus a complex system is formed. It is necessary to strengthen the research of complex network theory, and this is a new way to help people study the complexity of software systems. In this paper, the development course of complex dynamic network is introduced simply and the use of complex power network in the software engineering is summarized. Hopefully, this paper can help the crossover study of complex power network and software engineering in the future.展开更多
With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development ...With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology.展开更多
Aerobics teaching in colleges and universities is the most important part of higher education, and the important means to carry out quality-oriented education and cultivate all-round developed talents. The reform of a...Aerobics teaching in colleges and universities is the most important part of higher education, and the important means to carry out quality-oriented education and cultivate all-round developed talents. The reform of aerobics teaching in colleges and universities should be geared to the demands of the times, and explore new innovation and continual development. In this paper, using the research methods of documentation, courseware development, teaching experiment and mathematical statistics, we study on the making and application of college aerobics network teaching courseware. It is revealed that, with the combination of modem network technology and college aerobics teaching, the resulted college aerobics network teaching courseware is the important media to not only upgrades college aerobics teaching quality, but also help develop students' habits of doing physical exercise, and promote physical health. Therefore, this is meaningful and practical in promoting the education of college students in physical quality development.展开更多
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2...In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.展开更多
In this paper,an approach is developed to optimize the quality of the training samples in the conventional Artificial Neural Network(ANN)by incorporating expert knowledge in the means of constructing expert-rule sampl...In this paper,an approach is developed to optimize the quality of the training samples in the conventional Artificial Neural Network(ANN)by incorporating expert knowledge in the means of constructing expert-rule samples from rules in an expert system,and through training by using these samples,an ANN based on expert-knowledge is further developed.The method is introduced into the field of quantitative identification of potential seismic sources on the basis of the rules in an expert system.Then it is applied to the quantitative identification of the potential seismic sources in Beijing and its adjacent area.The result indicates that the expert rule based on ANN method can well incorporate and represent the expert knowledge in the rules in an expert system,and the quality of the samples and the efficiency of training and the accuracy of the result are optimized.展开更多
基金supported by the National Natural Science Foundation of China(31960258)the Graduate Research Innovation Project of Xinjiang Uygur Autonomous Region(XJ2023G119).
文摘Nitrogen deposition and water tables are important factors to control soil microbial community structure.However,the specific effects and mechanisms of nitrogen deposition and water tables coupling on bacterial diversity,abundance,and community structure in arid alpine wetlands remain unclear.The nitrogen deposition(0,10,and 20 kg N/(hm^(2)•a))experiments were conducted in the Bayinbulak alpine wetland with different water tables(perennial flooding,seasonal waterlogging,and perennial drying).The 16S rRNA(ribosomal ribonucleic acid)gene sequencing technology was employed to analyze the changes in bacterial community diversity,network structure,and function in the soil.Results indicated that bacterial diversity was the highest under seasonal waterlogging condition.However,nitrogen deposition only affected the bacterial Chao1 and beta diversity indices under seasonal waterlogging condition.The abundance of bacterial communities under different water tables showed significant differences at the phylum and genus levels.The dominant phylum,Proteobacteria,was sensitive to soil moisture and its abundance decreased with decreasing water tables.Although nitrogen deposition led to changes in bacterial abundance,such changes were small compared with the effects of water tables.Nitrogen deposition with 10 kg N/(hm^(2)•a)decreased bacterial edge number,average path length,and robustness.However,perennial flooding and drying conditions could simply resist environmental changes caused by 20 kg N/(hm^(2)•a)nitrogen deposition and their network structure remain unchanged.The sulfur cycle function was dominant under perennial flooding condition,and carbon and nitrogen cycle functions were dominant under seasonal waterlogging and perennial drying conditions.Nitrogen application increased the potential function of part of nitrogen cycle and decreased the potential function of sulfur cycle in bacterial community.In summary,composition of bacterial community in the arid alpine wetland was determined by water tables,and diversity of bacterial community was inhibited by a lower water table.Effect of nitrogen deposition on bacterial community structure and function depended on water tables.
文摘As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.
基金supported by the National Key R&D Program of China(Project Number:2022YFB2902100).
文摘To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.
文摘In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.
文摘Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient connection among IIoT devices,CRNs enhance spectrum utilization by using licensed spectrum.However,the routing protocol in these networks is considered one of the main problems due to node mobility and time-variant channel selection.Specifically,the channel selection for routing protocol is indispensable in CRNs to provide an adequate adaptation to the Primary User(PU)activity and create a robust routing path.This study aims to construct a robust routing path by minimizing PU interference and routing delay to maximize throughput within the IIoT domain.Thus,a generic routing framework from a cross-layer perspective is investigated that intends to share the information resources by exploiting a recently proposed method,namely,Channel Availability Probability.Moreover,a novel cross-layer-oriented routing protocol is proposed by using a time-variant channel estimation technique.This protocol combines lower layer(Physical layer and Data Link layer)sensing that is derived from the channel estimation model.Also,it periodically updates and stores the routing table for optimal route decision-making.Moreover,in order to achieve higher throughput and lower delay,a new routing metric is presented.To evaluate the performance of the proposed protocol,network simulations have been conducted and also compared to the widely used routing protocols,as a benchmark.The simulation results of different routing scenarios demonstrate that our proposed solution outperforms the existing protocols in terms of the standard network performance metrics involving packet delivery ratio(with an improved margin of around 5–20%approximately)under varying numbers of PUs and cognitive users in Mobile Cognitive Radio Networks(MCRNs).Moreover,the cross-layer routing protocol successfully achieves high routing performance in finding a robust route,selecting the high channel stability,and reducing the probability of PU interference for continued communication.
基金Supported by Key Research Project of Science and Technology in Colleges and Universities of Inner Mongolia Autonomous Region(NJZZ21029)Basic Research Fund for Universities directly under Inner Mongolia Autonomous Region.
文摘This paper summarizes the status quo of Mongolian medicine research,the basic research ideas and contents of network pharmacology,the latest development of network pharmacology technology in the field of Mongolian medicine research,the application progress,future development direction and existing problems in the research of Mongolian medicine,so as to provide new ideas and new methods for the scientific research of traditional medicine.
基金financially supported by the Special Fund for Meteorological Scientific Research in the Public Interest(GYHY201406012)the National Natural Science Foundation of China(41275114)a construction fund for CMONOC
文摘In this study, the Global Navigation Satellite System (GNSS) network of China is discussed, which can be used to monitor atmospheric precipitable water vapor (PWV). By the end of 2013, the network had 952 GNSS sites, including 260 belonging to the Crustal Movement Observation Network of China (CMONOC) and 692 belonging to the China Meteorological Administration GNSS network (CMAGN). Additionally, GNSS observation collecting and data processing procedures are presented and PWV data quality control methods are investigated. PWV levels as determined by GNSS and radiosonde are compared. The results show that GNSS estimates are generally in good agreement with measurements of radio- sondes and water vapor radiometers (WVR). The PWV retrieved by the national GNSS network is used in weather forecasting, assimilation of data into numerical weather prediction models, the validation of PWV estimates by radiosonde, and plum rain monitoring. The network is also used to monitor the total ionospheric electron content.
基金National Basic Research Program of China under Grant No. 2011CB302600National Natural Science Foundation of China under Grant No. 90818028,No. 61003226National Science Fund for Distinguished Young Scholars under Grant No. 60625203
文摘The mutual-interference phenomenon among multiple applications delivered as services through Cloud Services Delivery Network(CSDN)influences their QoS seriously.In order to deploy multiple applications dependably and efficiently,we propose the Multiple Applications Co-Exist(MACE)method.MACE classifies multiple applications into different types and deploys them using isolation to some extent.Meanwhile,resource static allocation,dynamic supplement and resource reserved mechanism to minimize mutual-interference and maximize resource utilization are designed.After MACE is applied to a real large-scale CSDN and evaluated through 6-month measurement,we find that the CSDN load is more balanced,the bandwidth utilization increases by about 20%,the multiple applications'potential statistical multiplexing ratio decreases from 12% to 5%,and the number of complaint events affecting the dependability of CSDN services caused by multiple applications'mutual-interference has dropped to 0.Obviously,MACE offers a tradeoff and improvement for the dependability and efficiency goals of CSDN.
基金Supported by Remote Sensing Support for Offshore Ocean Environment and Polar Sea Ice Early Warning Services(102121201550000009004)。
文摘This paper presents the networking observation capabilities of Chinese ocean satellites and their diverse applications in ocean disaster prevention,ecological monitoring,and resource development.Since the inaugural launch in 2002,China has achieved substantial advancements in ocean satellite technology,forming an observation system composed of the HY-1,HY-2,and HY-3 series satellites.These satellites are integral to global ocean environmental monitoring due to their high resolution,extensive coverage,and frequent observations.Looking forward,China aims to further enhance and expand its ocean satellite capabilities through ongoing projects to support global environmental protection and sustainable development.
文摘The joining of a 6-mm thickness Al 6061 to Stainless steel 304 has been performed by solid state welding. A selection method of optimum friction welding condition using neural networks is proposed. The data used for analyses are the friction stir welding condition, the input parameters of the model consist of welding speed and tool rotation speed. The outputs of the ANN (Artificial Neural Network)model includes resulting parameters, namely, maximum reached temperature,and heating rate for both aluminum alloy 6061 and stainless steel 304 during friction stir welding process.The results of analysis suggest that the proposed method is an effective one to select an optimum welding condition.Good performance of the ANN model was achieved. The combined influence of welding speed and tool rotation speed on the maximum reached temperature and heating rate for both aluminum alloy 6061and stainless steel 304 friction stir welding was simulated. A comparison was made between the output of the ANN program and finite element model. The calculated results were in good agreement with that of finite element model.
基金This work was supported by the National Natural Science Foundations of China (Grant No. 61201143), the Fundamental Research Fund for the Central Universities (Grant No. HIT. NSRIF. 2010091), the National Science Foundation for Post-doctoral Scientists of China (Grant No. 2012M510956), and the Post-doc- toral Fund of Heilongjiang Province (GrantNo. LBHZ11128).
文摘In this paper,we study cross-layer scheduling scheme on multimedia application which considers both streaming traffic and data traffic over cognitive ad hoc networks.A cross-layer design is proposed to optimize SU's utility,which is used as an approach to balance the transmission efficiency and heterogeneous traffic in cognitive ad hoc networks.A framework is provided for utility-based optimal subcarrier assignment,power allocation strategy and corresponding modulation scheme,subject to the interference threshold to primary user(PU) and total transmit power constraint.Bayesian learning is adopted in subcarrier allocation strategy to avoid collision and alleviate the burden of information exchange on limited common control channel(CCC).In addition,the M/G/l queuing model is also introduced to analyze the expected delay of streaming traffic.Numerical results are given to demonstrate that the proposed scheme significantly reduces the blocking probability and outperforms the mentioned single-channel dynamic resource scheduling by almost 8%in term of system utility.
文摘Multi-service SDH networks support both packet- and circuit-switched traffic. Optimal design of such a network means to guarantee the circuit connections and configure a logical packet-switched topology with lowest congestion. This letter first formulates the problem as a mixed integer linear programming, which achieves optimal solution but has high computation. Then a heuristic algorithm is proposed to yield near-optimal solution efficiently. Performance of the algorithm is verified by an example.
文摘The article introduces ZTE's Softswitch-based NGN solutions. such as the long distance VolP service solution over data back- bone,and local voice and data service solution over MAN.Three application cases are analyzed,and NGN's features in aspects of network architecture,service provision and network management are summarized.
文摘When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) communication. Someday, the traffic generated by machines will greatly exceed those of man-machine and man-man applications. Large numbers of M2M applications will need various wireless networks to support them. This paper introduces the characteristics, advantages and disadvantages of the currently available various wireless network technologies, including WiFi, Bluetooth, ZigBee, passive RFID and the 802.15 standard networks.
文摘Wireless Sensor Network (WSN) is characterized by the dense deployment of sensor nodes that continuously observe physical phenomenon. The main advantages of WSN include its low cost, rapid deployment, self-organization, and fault tolerance. WSN has received tremendous interests of various research communities,
文摘Along with the further development of science and technology, computer hardware and the Intemet are in a rapid development, and information technology has been widely used in all fields so that complex problems are simply solved. Because of the needs for the development, software starts to mutually integrate with complex power network, making the scale of software increase greatly. Such a growing trend of software promotes soft-ware development to go beyond a general understanding and control and thus a complex system is formed. It is necessary to strengthen the research of complex network theory, and this is a new way to help people study the complexity of software systems. In this paper, the development course of complex dynamic network is introduced simply and the use of complex power network in the software engineering is summarized. Hopefully, this paper can help the crossover study of complex power network and software engineering in the future.
文摘With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology.
文摘Aerobics teaching in colleges and universities is the most important part of higher education, and the important means to carry out quality-oriented education and cultivate all-round developed talents. The reform of aerobics teaching in colleges and universities should be geared to the demands of the times, and explore new innovation and continual development. In this paper, using the research methods of documentation, courseware development, teaching experiment and mathematical statistics, we study on the making and application of college aerobics network teaching courseware. It is revealed that, with the combination of modem network technology and college aerobics teaching, the resulted college aerobics network teaching courseware is the important media to not only upgrades college aerobics teaching quality, but also help develop students' habits of doing physical exercise, and promote physical health. Therefore, this is meaningful and practical in promoting the education of college students in physical quality development.
文摘In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.
文摘In this paper,an approach is developed to optimize the quality of the training samples in the conventional Artificial Neural Network(ANN)by incorporating expert knowledge in the means of constructing expert-rule samples from rules in an expert system,and through training by using these samples,an ANN based on expert-knowledge is further developed.The method is introduced into the field of quantitative identification of potential seismic sources on the basis of the rules in an expert system.Then it is applied to the quantitative identification of the potential seismic sources in Beijing and its adjacent area.The result indicates that the expert rule based on ANN method can well incorporate and represent the expert knowledge in the rules in an expert system,and the quality of the samples and the efficiency of training and the accuracy of the result are optimized.