期刊文献+
共找到13,301篇文章
< 1 2 250 >
每页显示 20 50 100
A review of artificial intelligence applications in high-speed railway systems 被引量:2
1
作者 Xuehan Li Minghao Zhu +3 位作者 Boyang Zhang Xiaoxuan Wang Zha Liu Liang Han 《High-Speed Railway》 2024年第1期11-16,共6页
In recent years,the global surge of High-speed Railway(HSR)revolutionized ground transportation,providing secure,comfortable,and punctual services.The next-gen HSR,fueled by emerging services like video surveillance,e... In recent years,the global surge of High-speed Railway(HSR)revolutionized ground transportation,providing secure,comfortable,and punctual services.The next-gen HSR,fueled by emerging services like video surveillance,emergency communication,and real-time scheduling,demands advanced capabilities in real-time perception,automated driving,and digitized services,which accelerate the integration and application of Artificial Intelligence(AI)in the HSR system.This paper first provides a brief overview of AI,covering its origin,evolution,and breakthrough applications.A comprehensive review is then given regarding the most advanced AI technologies and applications in three macro application domains of the HSR system:mechanical manufacturing and electrical control,communication and signal control,and transportation management.The literature is categorized and compared across nine application directions labeled as intelligent manufacturing of trains and key components,forecast of railroad maintenance,optimization of energy consumption in railroads and trains,communication security,communication dependability,channel modeling and estimation,passenger scheduling,traffic flow forecasting,high-speed railway smart platform.Finally,challenges associated with the application of AI are discussed,offering insights for future research directions. 展开更多
关键词 High-speed railway Artificial intelligence Intelligent distribution Intelligent control Intelligent scheduling
下载PDF
Hydrocarbon accumulation and orderly distribution of whole petroleum system in marine carbonate rocks of Sichuan Basin,SW China 被引量:1
2
作者 GUO Xusheng HUANG Renchun +3 位作者 ZHANG Dianwei LI Shuangjian SHEN Baojian LIU Tianjia 《Petroleum Exploration and Development》 SCIE 2024年第4期852-869,共18页
Based on the situation and progress of marine oil/gas exploration in the Sichuan Basin,SW China,the whole petroleum system is divided for marine carbonate rocks of the basin according to the combinations of hydrocarbo... Based on the situation and progress of marine oil/gas exploration in the Sichuan Basin,SW China,the whole petroleum system is divided for marine carbonate rocks of the basin according to the combinations of hydrocarbon accumulation elements,especially the source rock.The hydrocarbon accumulation characteristics of each whole petroleum system are analyzed,the patterns of integrated conventional and unconventional hydrocarbon accumulation are summarized,and the favorable exploration targets are proposed.Under the control of multiple extensional-convergent tectonic cycles,the marine carbonate rocks of the Sichuan Basin contain three sets of regional source rocks and three sets of regional cap rocks,and can be divided into the Cambrian,Silurian and Permian whole petroleum systems.These whole petroleum systems present mainly independent hydrocarbon accumulation,containing natural gas of affinity individually.Locally,large fault zones run through multiple whole petroleum systems,forming a fault-controlled complex whole petroleum system.The hydrocarbon accumulation sequence of continental shelf facies shale gas accumulation,marginal platform facies-controlled gas reservoirs,and intra-platform fault-and facies-controlled gas reservoirs is common in the whole petroleum system,with a stereoscopic accumulation and orderly distribution pattern.High-quality source rock is fundamental to the formation of large gas fields,and natural gas in a whole petroleum system is generally enriched near and within the source rocks.The development and maintenance of large-scale reservoirs are essential for natural gas enrichment,multiple sources,oil and gas transformation,and dynamic adjustment are the characteristics of marine petroleum accumulation,and good preservation conditions are critical to natural gas accumulation.Large-scale marginal-platform reef-bank facies zones,deep shale gas,and large-scale lithological complexes related to source-connected faults are future marine hydrocarbon exploration targets in the Sichuan Basin. 展开更多
关键词 Sichuan Basin margin oil/gas whole petroleum system carbonate hydrocarbon accumulation hydrocarbon distribution law hydrocarbon exploration target
下载PDF
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
3
作者 Muhammad Ahmad Nawaz Ul Ghani Kun She +4 位作者 Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga 《Computers, Materials & Continua》 SCIE EI 2024年第5期2609-2623,共15页
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingthe significance of using cutting-edge technology to meet rising privacy issues in digital identity. 展开更多
关键词 Facial recognition privacy protection blockchain GAN distributed systems
下载PDF
Data-driven Wasserstein distributionally robust chance-constrained optimization for crude oil scheduling under uncertainty
4
作者 Xin Dai Liang Zhao +4 位作者 Renchu He Wenli Du Weimin Zhong Zhi Li Feng Qian 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2024年第5期152-166,共15页
Crude oil scheduling optimization is an effective method to enhance the economic benefits of oil refining.But uncertainties,including uncertain demands of crude distillation units(CDUs),might make the production plans... Crude oil scheduling optimization is an effective method to enhance the economic benefits of oil refining.But uncertainties,including uncertain demands of crude distillation units(CDUs),might make the production plans made by the traditional deterministic optimization models infeasible.A data-driven Wasserstein distributionally robust chance-constrained(WDRCC)optimization approach is proposed in this paper to deal with demand uncertainty in crude oil scheduling.First,a new deterministic crude oil scheduling optimization model is developed as the basis of this approach.The Wasserstein distance is then used to build ambiguity sets from historical data to describe the possible realizations of probability distributions of uncertain demands.A cross-validation method is advanced to choose suitable radii for these ambiguity sets.The deterministic model is reformulated as a WDRCC optimization model for crude oil scheduling to guarantee the demand constraints hold with a desired high probability even in the worst situation in ambiguity sets.The proposed WDRCC model is transferred into an equivalent conditional value-at-risk representation and further derived as a mixed-integer nonlinear programming counterpart.Industrial case studies from a real-world refinery are conducted to show the effectiveness of the proposed method.Out-of-sample tests demonstrate that the solution of the WDRCC model is more robust than those of the deterministic model and the chance-constrained model. 展开更多
关键词 DISTRIBUTIONS Model OPTIMIZATION Crude oil scheduling Wasserstein distance distributionally robust chance constraints
下载PDF
Observer-based dynamic event-triggered control for distributed parameter systems over mobile sensor-plus-actuator networks
5
作者 穆文英 庄波 邱芳 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期237-243,共7页
We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that prov... We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that provide spatially averaged state measurements can be used to improve state estimation in the network.For the purpose of decreasing the update frequency of controller and unnecessary sampled data transmission, an efficient dynamic event-triggered control policy is constructed.In an event-triggered system, when an error signal exceeds a specified time-varying threshold, it indicates the occurrence of a typical event.The global asymptotic stability of the event-triggered closed-loop system and the boundedness of the minimum inter-event time can be guaranteed.Based on the linear quadratic optimal regulator, the actuator selects the optimal displacement only when an event occurs.A simulation example is finally used to verify that the effectiveness of such a control strategy can enhance the system performance. 展开更多
关键词 distributed parameter systems event-triggered control mobile sensors mobile actuators
下载PDF
Combined CNN-LSTM Deep Learning Algorithms for Recognizing Human Physical Activities in Large and Distributed Manners:A Recommendation System
6
作者 Ameni Ellouze Nesrine Kadri +1 位作者 Alaa Alaerjan Mohamed Ksantini 《Computers, Materials & Continua》 SCIE EI 2024年第4期351-372,共22页
Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell t... Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell the user whether he is moving well or not.Typically,smartphones and their associated sensing devices operate in distributed and unstable environments.Therefore,collecting their data and extracting useful information is a significant challenge.In this context,the aimof this paper is twofold:The first is to analyze human behavior based on the recognition of physical activities.Using the results of physical activity detection and classification,the second part aims to develop a health recommendation system to notify smartphone users about their healthy physical behavior related to their physical activities.This system is based on the calculation of calories burned by each user during physical activities.In this way,conclusions can be drawn about a person’s physical behavior by estimating the number of calories burned after evaluating data collected daily or even weekly following a series of physical workouts.To identify and classify human behavior our methodology is based on artificial intelligence models specifically deep learning techniques like Long Short-Term Memory(LSTM),stacked LSTM,and bidirectional LSTM.Since human activity data contains both spatial and temporal information,we proposed,in this paper,to use of an architecture allowing the extraction of the two types of information simultaneously.While Convolutional Neural Networks(CNN)has an architecture designed for spatial information,our idea is to combine CNN with LSTM to increase classification accuracy by taking into consideration the extraction of both spatial and temporal data.The results obtained achieved an accuracy of 96%.On the other side,the data learned by these algorithms is prone to error and uncertainty.To overcome this constraint and improve performance(96%),we proposed to use the fusion mechanisms.The last combines deep learning classifiers tomodel non-accurate and ambiguous data to obtain synthetic information to aid in decision-making.The Voting and Dempster-Shafer(DS)approaches are employed.The results showed that fused classifiers based on DS theory outperformed individual classifiers(96%)with the highest accuracy level of 98%.Also,the findings disclosed that participants engaging in physical activities are healthy,showcasing a disparity in the distribution of physical activities between men and women. 展开更多
关键词 Human physical activities smartphone sensors deep learning distributed monitoring recommendation system uncertainty HEALTHY CALORIES
下载PDF
A new method for evaluating the firing precision of multiple launch rocket system based on Bayesian theory
7
作者 Yunfei Miao Guoping Wang Wei Tian 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期232-241,共10页
How to effectively evaluate the firing precision of weapon equipment at low cost is one of the core contents of improving the test level of weapon system.A new method to evaluate the firing precision of the MLRS consi... How to effectively evaluate the firing precision of weapon equipment at low cost is one of the core contents of improving the test level of weapon system.A new method to evaluate the firing precision of the MLRS considering the credibility of simulation system based on Bayesian theory is proposed in this paper.First of all,a comprehensive index system for the credibility of the simulation system of the firing precision of the MLRS is constructed combined with the group analytic hierarchy process.A modified method for determining the comprehensive weight of the index is established to improve the rationality of the index weight coefficients.The Bayesian posterior estimation formula of firing precision considering prior information is derived in the form of mixed prior distribution,and the rationality of prior information used in estimation model is discussed quantitatively.With the simulation tests,the different evaluation methods are compared to validate the effectiveness of the proposed method.Finally,the experimental results show that the effectiveness of estimation method for firing precision is improved by more than 25%. 展开更多
关键词 Multiple launch rocket system Bayesian theory Simulation credibility Mixed prior distribution Firing precision
下载PDF
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
8
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 Blockchain architecture transaction verification information security heterogeneous Merkle tree distributed systems
下载PDF
Weak influence of natural vegetation in urban green spaces compared to agricultural ecosystems on House Martin populations:Insights from nationwide citizen science data in the Czech Republic
9
作者 Denisa Dvorakova Jan Sipos Josef Suchomel 《Avian Research》 SCIE CSCD 2024年第2期139-146,共8页
The House Martin(Delichon urbicum)is a common farmland bird species in the European landscape,yet its population numbers are currently in decline.However,it is not yet sufficiently explained why this long-term decline... The House Martin(Delichon urbicum)is a common farmland bird species in the European landscape,yet its population numbers are currently in decline.However,it is not yet sufficiently explained why this long-term decline occurs.To fill this gap in our knowledge,we investigated how land cover composition affects the abundance of House Martins on the landscape scale by using nationwide citizen science data.Utilizing a generalised linear mixed-effect model(GLMM),we evaluated 12,094 records from the Czech Republic spanning 2009-2017.Our analysis underscores the significance of land cover type in shaping House Martin abundance.More specifically,our results indicate that within agricultural land covers“naturally managed arable lands”exhibited significant positive effect,while forests,orchards,and vineyards were deemed less favourable for House Martin populations.Within urban land covers,we found a clear distinction in the impact on House Martin populations,with a positive effect observed in urban infrastructure,development areas,and post-industrial sites(i.e.,UrbanAreas),while an indifferent impact was noted within urban green spaces and landscaped areas(i.e.,GreenUrban).Notably,our findings suggest that the simple spatial,age,and species structure typical of forests in Europe,and similarly,the uniform structure of parks and gardens,may be responsible for the decline in the abundance of the House Martin.We advocate for the preservation or enhancement of urban greenery,expansion of natural vegetation in rural areas and adoption of ecological management practices in orchards and vineyards to mitigate further declines in House Martin populations. 展开更多
关键词 Citizen science Habitat preferences House Martin Species distribution Urban and suburban landscape
下载PDF
Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
10
作者 Weiwei Sun Xinci Gao +1 位作者 Lusong Ding Xiangyu Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1865-1876,共12页
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati... This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm. 展开更多
关键词 Actuator fault deception attacks distributed estimation sensor saturation stochastic communication protocol(SCP).
下载PDF
A PI+R Control Scheme Based on Multi-Agent Systems for Economic Dispatch in Isolated BESSs
11
作者 Yalin Zhang Zhongxin Liu Zengqiang Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第10期2154-2165,共12页
Battery energy storage systems(BESSs)are widely used in smart grids.However,power consumed by inner impedance and the capacity degradation of each battery unit become particularly severe,which has resulted in an incre... Battery energy storage systems(BESSs)are widely used in smart grids.However,power consumed by inner impedance and the capacity degradation of each battery unit become particularly severe,which has resulted in an increase in operating costs.The general economic dispatch(ED)algorithm based on marginal cost(MC)consensus is usually a proportional(P)controller,which encounters the defects of slow convergence speed and low control accuracy.In order to solve the distributed ED problem of the isolated BESS network with excellent dynamic and steady-state performance,we attempt to design a proportional integral(PI)controller with a reset mechanism(PI+R)to asymptotically promote MC consensus and total power mismatch towards 0 in this paper.To be frank,the integral term in the PI controller is reset to 0 at an appropriate time when the proportional term undergoes a zero crossing,which accelerates convergence,improves control accuracy,and avoids overshoot.The eigenvalues of the system under a PI+R controller is well analyzed,ensuring the regularity of the system and enabling the reset mechanism.To ensure supply and demand balance within the isolated BESSs,a centralized reset mechanism is introduced,so that the controller is distributed in a flow set and centralized in a jump set.To cope with Zeno behavior and input delay,a dwell time that the system resides in a flow set is given.Based on this,the system with input delays can be reduced to a time-delay free system.Considering the capacity limitation of the battery,a modified MC scheme with PI+R controller is designed.The correctness of the designed scheme is verified through relevant simulations. 展开更多
关键词 Battery energy storage system(BESS) distributed control economic dispatch multi-agent system reset control
下载PDF
Adaptive Cloud Intrusion Detection System Based on Pruned Exact Linear Time Technique
12
作者 Widad Elbakri Maheyzah Md.Siraj +2 位作者 Bander Ali Saleh Al-rimy Sultan Noman Qasem Tawfik Al-Hadhrami 《Computers, Materials & Continua》 SCIE EI 2024年第6期3725-3756,共32页
Cloud computing environments,characterized by dynamic scaling,distributed architectures,and complex work-loads,are increasingly targeted by malicious actors.These threats encompass unauthorized access,data breaches,de... Cloud computing environments,characterized by dynamic scaling,distributed architectures,and complex work-loads,are increasingly targeted by malicious actors.These threats encompass unauthorized access,data breaches,denial-of-service attacks,and evolving malware variants.Traditional security solutions often struggle with the dynamic nature of cloud environments,highlighting the need for robust Adaptive Cloud Intrusion Detection Systems(CIDS).Existing adaptive CIDS solutions,while offering improved detection capabilities,often face limitations such as reliance on approximations for change point detection,hindering their precision in identifying anomalies.This can lead to missed attacks or an abundance of false alarms,impacting overall security effectiveness.To address these challenges,we propose ACIDS(Adaptive Cloud Intrusion Detection System)-PELT.This novel Adaptive CIDS framework leverages the Pruned Exact Linear Time(PELT)algorithm and a Support Vector Machine(SVM)for enhanced accuracy and efficiency.ACIDS-PELT comprises four key components:(1)Feature Selection:Utilizing a hybrid harmony search algorithm and the symmetrical uncertainty filter(HSO-SU)to identify the most relevant features that effectively differentiate between normal and anomalous network traffic in the cloud environment.(2)Surveillance:Employing the PELT algorithm to detect change points within the network traffic data,enabling the identification of anomalies and potential security threats with improved precision compared to existing approaches.(3)Training Set:Labeled network traffic data forms the training set used to train the SVM classifier to distinguish between normal and anomalous behaviour patterns.(4)Testing Set:The testing set evaluates ACIDS-PELT’s performance by measuring its accuracy,precision,and recall in detecting security threats within the cloud environment.We evaluate the performance of ACIDS-PELT using the NSL-KDD benchmark dataset.The results demonstrate that ACIDS-PELT outperforms existing cloud intrusion detection techniques in terms of accuracy,precision,and recall.This superiority stems from ACIDS-PELT’s ability to overcome limitations associated with approximation and imprecision in change point detection while offering a more accurate and precise approach to detecting security threats in dynamic cloud environments. 展开更多
关键词 Adaptive cloud IDS harmony search distributed denial of service(DDoS) PELT machine learning SVM ISOTCID NSL-KDD
下载PDF
CL2ES-KDBC:A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems
13
作者 Talal Albalawi P.Ganeshkumar 《Computers, Materials & Continua》 SCIE EI 2024年第3期3511-3528,共18页
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed wo... The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks. 展开更多
关键词 IoT security attack detection covariance linear learning embedding selection kernel distributed bayes classifier mongolian gazellas optimization
下载PDF
Threshold-Based Software-Defined Networking(SDN)Solution for Healthcare Systems against Intrusion Attacks
14
作者 Laila M.Halman Mohammed J.F.Alenazi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1469-1483,共15页
The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are ... The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and monitoring.In this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe attacks.These attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human lives.This can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or m-health.In this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various scenarios.We propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS attack.We then evaluate the accuracy and performance of the proposed TBDC approach.Our technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic. 展开更多
关键词 Network resilience network management attack prediction software defined networking(SDN) distributed denial of service(DDoS) healthcare
下载PDF
A frequency domain estimation and compensation method for system synchronization parameters of distributed-HFSWR
15
作者 WANG Hongyong SUO Ying +3 位作者 DENG Weibo WU Xiaochuan BAI Yang ZHANG Xin 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1084-1097,共14页
To analyze the influence of time synchronization error,phase synchronization error,frequency synchronization error,internal delay of the transceiver system,and range error and angle error between the unit radars on th... To analyze the influence of time synchronization error,phase synchronization error,frequency synchronization error,internal delay of the transceiver system,and range error and angle error between the unit radars on the target detection performance,firstly,a spatial detection model of distributed high-frequency surface wave radar(distributed-HFSWR)is established in this paper.In this model,a method for accurate extraction of direct wave spectrum based on curve fitting is proposed to obtain accurate system internal delay and frequency synchronization error under complex electromagnetic environment background and low signal to noise ratio(SNR),and to compensate for the shift of range and Doppler frequency caused by time-frequency synchronization error.The direct wave component is extracted from the spectrum,the range estimation error and Doppler estimation error are reduced by the method of curve fitting,and the fitting accuracy of the parameters is improved.Then,the influence of frequency synchronization error on target range and radial Doppler velocity is quantitatively analyzed.The relationship between frequency synchronization error and radial Doppler velocity shift and range shift is given.Finally,the system synchronization parameters of the trial distributed-HFSWR are obtained by the proposed spectrum extraction method based on curve fitting,the experimental data is compensated to correct the shift of the target,and finally the correct target parameter information is obtained.Simulations and experimental results demonstrate the superiority and correctness of the proposed method,theoretical derivation and detection model proposed in this paper. 展开更多
关键词 distributed high-frequency surface wave radar(distributed-HFSWR) direct wave synchronization error curve fitting system synchronization parameter compensation
下载PDF
Seismic safety assessment with non-Gaussian random processes for train-bridge coupled systems
16
作者 Zhao Han Gao Lei +4 位作者 Wei Biao Tan Jincheng Guo Peidong Jiang Lizhong Xiang Ping 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2024年第1期241-260,共20页
Extensive high-speed railway(HSR)network resembled the intricate vascular system of the human body,crisscrossing mainlands.Seismic events,known for their unpredictability,pose a significant threat to both trains and b... Extensive high-speed railway(HSR)network resembled the intricate vascular system of the human body,crisscrossing mainlands.Seismic events,known for their unpredictability,pose a significant threat to both trains and bridges,given the HSR’s extended operational duration.Therefore,ensuring the running safety of train-bridge coupled(TBC)system,primarily composed of simply supported beam bridges,is paramount.Traditional methods like the Monte Carlo method fall short in analyzing this intricate system efficiently.Instead,efficient algorithm like the new point estimate method combined with moment expansion approximation(NPEM-MEA)is applied to study random responses of numerical simulation TBC systems.Validation of the NPEM-MEA’s feasibility is conducted using the Monte Carlo method.Comparative analysis confirms the accuracy and efficiency of the method,with a recommended truncation order of four to six for the NPEM-MEA.Additionally,the influences of seismic magnitude and epicentral distance are discussed based on the random dynamic responses in the TBC system.This methodology not only facilitates seismic safety assessments for TBC systems but also contributes to standard-setting for these systems under earthquake conditions. 展开更多
关键词 train-bridge coupled(TBC)system random vibration new point estimate method(NPEM) seismic safety assessment moment expansion approximation(MEA) non-Gaussian distributions
下载PDF
Rapid Parameter-Optimizing Strategy for Plug-and-Play Devices in DC Distribution Systems under the Background of Digital Transformation
17
作者 Zhi Li Yufei Zhao +2 位作者 Yueming Ji Hanwen Gu Zaibin Jiao 《Energy Engineering》 EI 2024年第12期3899-3927,共29页
By integrating advanced digital technologies such as cloud computing and the Internet of Things in sensor measurement,information communication,and other fields,the digital DC distribution network can efficiently and ... By integrating advanced digital technologies such as cloud computing and the Internet of Things in sensor measurement,information communication,and other fields,the digital DC distribution network can efficiently and reliably access DistributedGenerator(DG)and Energy Storage Systems(ESS),exhibiting significant advantages in terms of controllability and meeting requirements of Plug-and-Play(PnP)operations.However,during device plug-in and-out processes,improper systemparametersmay lead to small-signal stability issues.Therefore,before executing PnP operations,conducting stability analysis and adjusting parameters swiftly is crucial.This study introduces a four-stage strategy for parameter optimization to enhance systemstability efficiently.In the first stage,state-of-the-art technologies in measurement and communication are utilized to correct model parameters.Then,a novel indicator is adopted to identify the key parameters that influence stability in the second stage.Moreover,in the third stage,a local-parameter-tuning strategy,which leverages rapid parameter boundary calculations as a more efficient alternative to plotting root loci,is used to tune the selected parameters.Considering that the local-parameter-tuning strategy may fail due to some operating parameters being limited in adjustment,a multiparameter-tuning strategy based on the particle swarm optimization(PSO)is proposed to comprehensively adjust the dominant parameters to improve the stability margin of the system.Lastly,system stability is reassessed in the fourth stage.The proposed parameter-optimization strategy’s effectiveness has been validated through eigenvalue analysis and nonlinear time-domain simulations. 展开更多
关键词 DC distribution system digital grid small-signal stability eigenvalue parametric sensitivity particle swarm optimization parameter boundary calculation parameter tuning
下载PDF
Etiology of anterior choroidal artery infarction:a systematic review
18
作者 Mingxuan Cao Liu Yang +1 位作者 Shen Li Xunming Ji 《Journal of Translational Neuroscience》 2024年第2期42-52,共11页
Objective:To systematically review the etiology of anterior choroidal artery(AChA)infarction.Methods:A systematic literature search up to May 11,2024,for AChA infarction with its etiology.Epidemiologic and clinical da... Objective:To systematically review the etiology of anterior choroidal artery(AChA)infarction.Methods:A systematic literature search up to May 11,2024,for AChA infarction with its etiology.Epidemiologic and clinical data of patients,anatomic distribution of the lesions,and etiologic classification of AChA infarction were extracted.Results:A total of 1007 individual patient data was included(967 from retrospective clinical studies and 40 from case reports).Among the clinical research,patients’mean age was 64.7.There were 62.24%of male and 37.76%of female patients.Hypertension(66.04%)was the most common risk factor for patients with AChA infarction.Dyslipidemia(32.92%),diabetes mellitus(30.93%),and smoking(26.54%)were also common risk factors.Moreover,the posterior limb of the internal capsule was the most frequently affected structure.Undetermined etiology(n=173,38.02%),according to the trial of org 10172 in acute stroke treatment(TOAST)etiological classification,was the most common etiology,followed by small vessel disease(n=117,25.71%),large artery atherosclerosis(n=84,18.46%),and cardioembolism(n=63,13.85%).Furthermore,eighteen strokes were caused by other determined etiologies(3.96%).Conclusions:Undetermined etiology was the most common etiology of AChA infarction.Hypertension,dyslipidemia,diabetes mellitus,and smoking were common risk factors for patients with AChA infarction.It is necessary to prevent the risk factors. 展开更多
关键词 anterior choroidal artery INFARCTION ETIOLOGY anatomic distribution
下载PDF
Using Pearson’s System of Curves to Approximate the Distributions of the Difference between Two Correlated Estimates of Signal-to-Noise Ratios: The Cases of Bivariate Normal and Bivariate Lognormal Distributions
19
作者 Mohamed M. Shoukri 《Open Journal of Statistics》 2024年第3期207-227,共21页
Background: The signal-to-noise ratio (SNR) is recognized as an index of measurements reproducibility. We derive the maximum likelihood estimators of SNR and discuss confidence interval construction on the difference ... Background: The signal-to-noise ratio (SNR) is recognized as an index of measurements reproducibility. We derive the maximum likelihood estimators of SNR and discuss confidence interval construction on the difference between two correlated SNRs when the readings are from bivariate normal and bivariate lognormal distribution. We use the Pearsons system of curves to approximate the difference between the two estimates and use the bootstrap methods to validate the approximate distributions of the statistic of interest. Methods: The paper uses the delta method to find the first four central moments, and hence the skewness and kurtosis which are important in the determination of the parameters of the Pearsons distribution. Results: The approach is illustrated in two examples;one from veterinary microbiology and food safety data and the other on data from clinical medicine. We derived the four central moments of the target statistics, together with the bootstrap method to evaluate the parameters of Pearsons distribution. The fitted Pearsons curves of Types I and II were recommended based on the available data. The R-codes are also provided to be readily used by the readers. 展开更多
关键词 Signal-to-Noise Ratio Bivariate Distributions Bootstrap Methods Delta Method Pearson system of Curves
下载PDF
Cooperative Distributed Beamforming Design for Multi-RIS Aided Cell-Free Systems
20
作者 ZHU Yuting XU Zhiyu ZHANG Hongtao 《ZTE Communications》 2024年第2期99-106,共8页
Cell-free systems significantly improve network capacity by enabling joint user service without cell boundaries,eliminating intercell interference.However,to satisfy further capacity demands,it leads to high-cost prob... Cell-free systems significantly improve network capacity by enabling joint user service without cell boundaries,eliminating intercell interference.However,to satisfy further capacity demands,it leads to high-cost problems of both hardware and power consumption.In this paper,we investigate multiple reconfigurable intelligent surfaces(RISs)aided cell-free systems where RISs are introduced to improve spectrum efficiency in an energy-efficient way.To overcome the centralized high complexity and avoid frequent information exchanges,a cooperative distributed beamforming design is proposed to maximize the weighted sum-rate performance.In particular,the alternating optimization method is utilized with the distributed closed-form solution of active beamforming being derived locally at access points,and phase shifts are obtained centrally based on the Riemannian conjugate gradient(RCG)manifold method.Simulation results verify the effectiveness of the proposed design whose performance is comparable to the centralized scheme and show great superiority of the RISs-aided system over the conventional cellular and cell-free system. 展开更多
关键词 cell-free systems reconfigurable intelligent surface cooperative distributed beamforming Riemannian conjugate gradient
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部