期刊文献+
共找到18,009篇文章
< 1 2 250 >
每页显示 20 50 100
Enhancing Data Forwarding Efficiency in SIoT with Multidimensional Social Relations
1
作者 Fang Xu Songhao Jiang +3 位作者 Yi Ma Manzoor Ahmed Zenggang Xiong Yuanlin Lyu 《Computers, Materials & Continua》 SCIE EI 2024年第1期1095-1113,共19页
Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social ... Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social Relations(MSRR)in SIoT to solve this problem.The proposed algorithm separates message forwarding into intra-and cross-community forwarding by analyzing interest traits and social connections among nodes.Three new metrics are defined:the intensity of node social relationships,node activity,and community connectivity.Within the community,messages are sent by determining which node is most similar to the sender by weighing the strength of social connections and node activity.When a node performs cross-community forwarding,the message is forwarded to the most reasonable relay community by measuring the node activity and the connection between communities.The proposed algorithm was compared to three existing routing algorithms in simulation experiments.Results indicate that the proposed algorithmsubstantially improves message delivery efficiency while lessening network overhead and enhancing connectivity and coordination in the SIoT context. 展开更多
关键词 SIoT data forwarding social attributes social relations COMMUNITY
下载PDF
A fast forward computational method for nuclear measurement using volumetric detection constraints
2
作者 Qiong Zhang Lin-Lv Lin 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第2期47-63,共17页
Owing to the complex lithology of unconventional reservoirs,field interpreters usually need to provide a basis for interpretation using logging simulation models.Among the various detection tools that use nuclear sour... Owing to the complex lithology of unconventional reservoirs,field interpreters usually need to provide a basis for interpretation using logging simulation models.Among the various detection tools that use nuclear sources,the detector response can reflect various types of information of the medium.The Monte Carlo method is one of the primary methods used to obtain nuclear detection responses in complex environments.However,this requires a computational process with extensive random sampling,consumes considerable resources,and does not provide real-time response results.Therefore,a novel fast forward computational method(FFCM)for nuclear measurement that uses volumetric detection constraints to rapidly calculate the detector response in various complex environments is proposed.First,the data library required for the FFCM is built by collecting the detection volume,detector counts,and flux sensitivity functions through a Monte Carlo simulation.Then,based on perturbation theory and the Rytov approximation,a model for the detector response is derived using the flux sensitivity function method and a one-group diffusion model.The environmental perturbation is constrained to optimize the model according to the tool structure and the impact of the formation and borehole within the effective detection volume.Finally,the method is applied to a neutron porosity tool for verification.In various complex simulation environments,the maximum relative error between the calculated porosity results of Monte Carlo and FFCM was 6.80%,with a rootmean-square error of 0.62 p.u.In field well applications,the formation porosity model obtained using FFCM was in good agreement with the model obtained by interpreters,which demonstrates the validity and accuracy of the proposed method. 展开更多
关键词 Nuclear measurement Fast forward computation Volumetric constraints
下载PDF
Estimation of Displacement and Extension due to Reverse Drag of Normal Faults: Forward Method
3
作者 Shunshan Xu Angel Francisco Nieto-Samaniego +1 位作者 Huilong Xu Susana Alicia Alaniz-Álvarez 《International Journal of Geosciences》 CAS 2024年第1期25-39,共15页
In the case of reverse drag of normal faulting, the displacement and horizontal extension are determined based on the established equations for the three mechanisms: rigid body, vertical shear and inclined shear. Ther... In the case of reverse drag of normal faulting, the displacement and horizontal extension are determined based on the established equations for the three mechanisms: rigid body, vertical shear and inclined shear. There are three sub-cases of basal detachment for the rigid body model: horizontal detachment, antithetic detachment and synthetic detachment. For the rigid body model, the established equations indicate that the total displacement on the synthetic base (D<sub>t2</sub>) is the largest, that on the horizontal base (D<sub>t1</sub>) is moderate, and that on the antithetic base (D<sub>t3</sub>) is the smallest. On the other hand, the value of (D<sub>t1</sub>) is larger than the displacement for the vertical shear (D<sub>t4</sub>). The value of (D<sub>t1</sub>) is larger than or less than the displacement for the inclined shear (D<sub>t5</sub>) depending on the original fault dip δ<sub>0</sub>, bedding angle θ, and the angle of shear direction β. For all original parameters, the value of D<sub>t5</sub> is less than the value of D<sub>t4</sub>. Also, by comparing three rotation mechanisms, we find that the inclined shear produces largest extension, the rigid body model with horizontal detachment produces the smallest extension, and the vertical shear model produces moderate extension. 展开更多
关键词 Fault Rotation Fault Drag Fault Displacement EXTENSION forward Model
下载PDF
An efficient method for constructing a random insertional mutant library for forward genetics in Nannochloropsis oceanica
4
作者 Zhongyi ZHANG Hang LIU +5 位作者 Xiaohui PAN Yanan ZONG Leili FENG Lixian LIU Li GUO Guanpin YANG 《Journal of Oceanology and Limnology》 SCIE CAS CSCD 2024年第1期216-225,共10页
Insertional mutation,phenotypic evaluation,and mutated gene cloning are widely used to clone genes from scratch.Exogenous genes can be integrated into the genome during non-homologous end joining(NHEJ)of the double-st... Insertional mutation,phenotypic evaluation,and mutated gene cloning are widely used to clone genes from scratch.Exogenous genes can be integrated into the genome during non-homologous end joining(NHEJ)of the double-strand breaks of DNA,causing insertional mutation.The random insertional mutant library constructed using this method has become a method of forward genetics for gene cloning.However,the establishment of a random insertional mutant library requires a high transformation efficiency of exogenous genes.Many microalgal species show a low transformation efficiency,making constructing random insertional mutant libraries difficult.In this study,we established a highly efficient transformation method for constructing a random insertional mutant library of Nannochloropsis oceanica,and tentatively tried to isolate its genes to prove the feasibility of the method.A gene that may control the growth rate and cell size was identified.This method will facilitate the genetic studies of N.oceanica,which should also be a reference for other microalgal species. 展开更多
关键词 Nannochloropsis oceanica genetic transformation random insertional mutant library zeocin pretreatment forward genetics
下载PDF
Exploring the Relationship Between Patent Forward Citation and Stock Return Rate Using Empirical Data of China Stock Market
5
作者 Hong-Wen Tsai Hui-Chung Che 《Management Studies》 2024年第2期67-83,共17页
A novel indicator called price-citation was proposed.Based on the company integrated patent database of China listed companies of common stocks(A-shares)with the stock price and the stock return rate data,more than tw... A novel indicator called price-citation was proposed.Based on the company integrated patent database of China listed companies of common stocks(A-shares)with the stock price and the stock return rate data,more than two thousand of A-shares from 2017 to 2020 were selected.The effect of the traditional patent forward citation and the price-citation for discriminating the stock return rate was thoroughly analyzed via ANOVA.The A-shares of forward citation counts above the average showed higher stock return rate means than the A-shares having patents but receiving no forward citations.The price-citation,combining both the financial and patent attributes,defined as the multiplication of the current stock price and the currently receiving forward citation count,showed its excellence in discriminating the stock return rate.The A-shares of higher price-citation showed significantly higher stock return rate means while the A-shares of lower price-citation showed significantly lowest stock return rate means.The price-citation effect had not been changed by COVID-19 though COVID-19 affected the social and economic environment to a considerable extent in 2020. 展开更多
关键词 China A-share PATENT ANOVA stock return rate forward citation price-citation
下载PDF
UAV-based transient electromagnetic 3D forward modeling and inversion and analysis of exploration capability
6
作者 WEI Laonao LIU Yunhe ZHANG Bo 《Global Geology》 2024年第3期154-166,共13页
Unmanned aerial vehicle transient electromagnetic(UAV-TEM)is a novel airborne exploration method that offers advantages such as low cost,simple operation,high exploration efficiency and suitability for near-surface ex... Unmanned aerial vehicle transient electromagnetic(UAV-TEM)is a novel airborne exploration method that offers advantages such as low cost,simple operation,high exploration efficiency and suitability for near-surface exploration in complex terrain areas.To improve the accuracy of data interpretation in this method,the authors conducted a systematic three-dimensional(3D)forward modeling and inversion of the UAV-TEM.This study utilized the finite element method based on unstructured tetrahedral elements and employed the second-order backward Euler method for time discretization.This allowed for accurate 3D modeling and accounted for the effects of complex terrain.Based on these,the influence characteristics of flight altitudes and the sizes,burial depths,and resistivities of anomalies are compared and analyzed to explore the UAV-TEM systems’exploration capability.Lastly,four typical geoelectrical models of landslides are designed,and the inversion method based on the Gauss-Newton optimization method is used to image the landslide models and analyze the imaging effect of the UAV-TEM method on landslide geohazards.Numerical results showed that UAV-TEM could have better exploration resolution and fine imaging of nearsurface structures,providing important technical support for monitoring,early warning,and preventing landslides and other geological hazards. 展开更多
关键词 UAV 3D forward modeling transient electromagnetic 3D inversion landslide model
下载PDF
Application Strategy of BIM Technology in the Forward Design of Bridges
7
作者 Jianmin He 《Journal of Architectural Research and Development》 2024年第3期14-19,共6页
Bridge engineering is highly specialized and has spatial characteristics,which puts forward higher requirements for design work.The advancement of information technology has provided ample tools to facilitate bridge d... Bridge engineering is highly specialized and has spatial characteristics,which puts forward higher requirements for design work.The advancement of information technology has provided ample tools to facilitate bridge design work,with building information modeling(BIM)technology being one of them.BIM technology ensures the efficiency and quality of the forward design of bridges,while also reducing construction costs.This article starts with defining the concept of BIM technology,followed by a discussion on its advantages in bridge design and application process,which serves as a reference for other bridge designers. 展开更多
关键词 BIM technology BRIDGE forward design Application strategy
下载PDF
Forwarding控制方法的改进及其在惯性摆系统中的应用 被引量:1
8
作者 陈奕梅 寇春海 韩正之 《电机与控制学报》 EI CSCD 北大核心 2005年第3期218-221,共4页
针对常规积分Forwarding设计的局限性,提出了—种新的设计方案。该方案增加了积分运算的自由度,因而有效地拓展了Forwarding设计的使用范围。运用所提出的方法对惯性摆系统进行了控制器的设计。此外,设计过程中同时还构造出该系统的控制... 针对常规积分Forwarding设计的局限性,提出了—种新的设计方案。该方案增加了积分运算的自由度,因而有效地拓展了Forwarding设计的使用范围。运用所提出的方法对惯性摆系统进行了控制器的设计。此外,设计过程中同时还构造出该系统的控制Lyapunov函数。理论与实际表明了这种控制方案的有效性。 展开更多
关键词 系统 控制方法 控制LYAPUNOV函数 惯性 应用 设计方案 积分运算 设计过程 控制方案 局限性 自由度 控制器
下载PDF
基于行为模型的IP Forwarding异常检测方法 被引量:1
9
作者 郭琳 张大方 +1 位作者 黎文伟 谢鲲 《计算机应用》 CSCD 北大核心 2006年第3期564-566,共3页
通过研究网络流动态特征,基于路由变化、流变化和包延迟,以及IP报文头信息(例如TTL、源/目的地址、报文长度和路由器时间戳)建立网络行为模型,通过高性能测量和在线分析网络流和路由信息对初始网络异常产生实时报警,实现了IP forwardin... 通过研究网络流动态特征,基于路由变化、流变化和包延迟,以及IP报文头信息(例如TTL、源/目的地址、报文长度和路由器时间戳)建立网络行为模型,通过高性能测量和在线分析网络流和路由信息对初始网络异常产生实时报警,实现了IP forwarding网络异常的有效检测和识别。定义了网络行为模型的五种功能模块,通过关联空间和时间状态信息检测识别网络异常为大范围监测网络提供强大支持。 展开更多
关键词 行为模型 IP forwarding异常 生存时间(TTL) 路由 报文延迟
下载PDF
International Freight Forwarding Services Network in the Yangtze River Delta, 2005–2015: Patterns and Mechanisms 被引量:4
10
作者 LIANG Shuangbo CAO Youhui +3 位作者 WU Wei GAO Jinlong LIU Weichen ZHANG Weiyang 《Chinese Geographical Science》 SCIE CSCD 2019年第1期112-126,共15页
This study examined the spatio-temporal trajectories of the international freight forwarding service(IFFS) in the Yangtze River Delta(YRD) and explored the driving mechanisms of the service. Based on a bipartite netwo... This study examined the spatio-temporal trajectories of the international freight forwarding service(IFFS) in the Yangtze River Delta(YRD) and explored the driving mechanisms of the service. Based on a bipartite network projection from an IFFS firm-city data source, we mapped three IFFS networks in the YRD in 2005, 2010, and 2015. A range of statistical indicators were used to explore changes in the spatial patterns of the three networks. The underlying influence of marketization, globalization, decentralization, and integration was then explored. It was found that the connections between Shanghai and other nodal cities formed the backbones of these networks. The effects of a city's administrative level and provincial administrative borders were generally obvious. We found several specific spatial patterns associated with IFFS. For example, the four non-administrative centers of Ningbo, Suzhou, Lianyungang, and Nantong were the most connected cities and played the role of gateway cities. Furthermore, remarkable regional equalities were found regarding a city's IFFS network provision, with notable examples in the weakly connected areas of northern Jiangsu and southwestern Zhejiang. Finally, an analysis of the driving mechanisms demonstrated that IFFS network changes were highly sensitive to the influences of marketization and globalization, while regional integration played a lesser role in driving changes in IFFS networks. 展开更多
关键词 international FREIGHT forwarding service NETWORK pattern mechanism headquarters-branch method YANGTZE River DELTA
下载PDF
Solution of shallow-water equations using least-squares finite-element method 被引量:3
11
作者 S.J. Liang J,-H, Tang M.-S. Wu 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2008年第5期523-532,共10页
A least-squares finite-element method (LSFEM) for the non-conservative shallow-water equations is presented. The model is capable of handling complex topography, steady and unsteady flows, subcritical and supercriti... A least-squares finite-element method (LSFEM) for the non-conservative shallow-water equations is presented. The model is capable of handling complex topography, steady and unsteady flows, subcritical and supercritical flows, and flows with smooth and sharp gradient changes. Advantages of the model include: (1) sources terms, such as the bottom slope, surface stresses and bed frictions, can be treated easily without any special treatment; (2) upwind scheme is no needed; (3) a single approximating space can be used for all variables, and its choice of approximating space is not subject to the Ladyzhenskaya-Babuska-Brezzi (LBB) condition; and (4) the resulting system of equations is symmetric and positive-definite (SPD) which can be solved efficiently with the preconditioned conjugate gradient method. The model is verified with flow over a bump, tide induced flow, and dam-break. Computed results are compared with analytic solutions or other numerical results, and show the model is conservative and accurate. The model is then used to simulate flow past a circular cylinder. Important flow charac-teristics, such as variation of water surface around the cylinder and vortex shedding behind the cylinder are investigated. Computed results compare well with experiment data and other numerical results. 展开更多
关键词 Least-square finite-element method Shallow-water equations DAM-BREAK Vortex shedding
下载PDF
Enhancing Interest Forwarding for Fast Recovery from Unanticipated Data Access Failure in NDN 被引量:1
12
作者 Xiaoyan Hu Xuhui Liu +2 位作者 Lixia Zhao Jian Gong Guang Cheng 《China Communications》 SCIE CSCD 2019年第7期120-130,共11页
We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an... We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an upstream node due to its multipath forwarding. Furthermore, we propose NDRUDAF, a NACK based mechanism that enhances the Interest forwarding and enables Detection and fast Recovery from such Unanticipated Data Access Failure. In the NDN enhanced with NDRUDAF, the router that aggregates the Interest detects such unanticipated data access failure based on a negative acknowledgement from the upstream node that judges the Interest as a duplicate one. Then the router retransmits the Interest as soon as possible on behalf of the requester whose Interest is aggregated to fast recover from the data access failure. We qualitatively and quantitatively analyze the performance of the NDN enhanced with our proposed NDRUDAF and compare it with that of the present NDN. Our experimental results validate that NDRUDAF improves the system performance in case of such unanticipated data access failure in terms of data access delay and network resource utilization efficiency at routers. 展开更多
关键词 named DATA networking INTEREST aggregation multipath forwarding DATA access FAILURE negative ACKNOWLEDGEMENT
下载PDF
Least-squares finite-element method for shallow-water equations with source terms 被引量:2
13
作者 Shin-Jye Liang Tai-Wen Hsu 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2009年第5期597-610,共14页
Numerical solution of shallow-water equations (SWE) has been a challenging task because of its nonlinear hyperbolic nature, admitting discontinuous solution, and the need to satisfy the C-property. The presence of s... Numerical solution of shallow-water equations (SWE) has been a challenging task because of its nonlinear hyperbolic nature, admitting discontinuous solution, and the need to satisfy the C-property. The presence of source terms in momentum equations, such as the bottom slope and friction of bed, compounds the difficulties further. In this paper, a least-squares finite-element method for the space discretization and θ-method for the time integration is developed for the 2D non-conservative SWE including the source terms. Advantages of the method include: the source terms can be approximated easily with interpolation functions, no upwind scheme is needed, as well as the resulting system equations is symmetric and positive-definite, therefore, can be solved efficiently with the conjugate gradient method. The method is applied to steady and unsteady flows, subcritical and transcritical flow over a bump, 1D and 2D circular dam-break, wave past a circular cylinder, as well as wave past a hump. Computed results show good C-property, conservation property and compare well with exact solutions and other numerical results for flows with weak and mild gradient changes, but lead to inaccurate predictions for flows with strong gradient changes and discontinuities. 展开更多
关键词 Shallow-water equations Source terms Least-squares finite-element method DAM-BREAK C-property
下载PDF
Finite-element 3D modeling of stress patterns around a dipping fault 被引量:1
14
作者 R.M.Lobatskaya I.P.Strelchenko E.S.Dolgikh 《Geoscience Frontiers》 SCIE CAS CSCD 2018年第5期1555-1563,共9页
Stresses in a block around a dipping fracture simulating a damage zone of a fault are reconstructed by finite-element modeling. A fracture corresponding to a fault of different lengths, with its plane dipping at diffe... Stresses in a block around a dipping fracture simulating a damage zone of a fault are reconstructed by finite-element modeling. A fracture corresponding to a fault of different lengths, with its plane dipping at different angles, is assumed to follow a lithological interface and to experience either compression or shear. The stress associated with the destruction shows an asymmetrical pattern with different distances from the highest stress sites to the fault plane in the hanging and foot walls. As the dip angle decreases,the high-stress zone becomes wider in the hanging wall but its width changes negligibly in the foot wall.The length of the simulated fault and the deformation type affect only the magnitude of maximum stress,which remains asymmetrical relative to the fault plane. The Lh/Lfratio, where Lhand Lfare the widths of high-stress zones in the hanging and foot walls of the fault, respectively, is inversely proportional to the fault plane dip. The arithmetic mean of this ratio over different fault lengths in fractures subject to compression changes from 0.29 at a dip of 80°to 1.67 at 30°. In the case of shift displacement, ratios are increasing to 1.2 and 2.94, respectively.Usually they consider vertical fault planes and symmetry in a damage zone of faults. Following that assumption may cause errors in reconstructions of stress and fault patterns in areas of complex structural setting. According geological data, we know the structures are different and asymmetric in hanging and foot walls of fault. Thus, it is important to quantify zones of that asymmetry. The modeling results have to be taken into account in studies of natural faults, especially for practical applications in seismic risk mapping, engineering geology, hydrogeology, and tectonics. 展开更多
关键词 STRESS FAULT finite-element modeling ANSYS PACKAGE
下载PDF
REDUCING BURST PACKET LOSS THROUGH ROUTE-FREE FORWARDING 被引量:1
15
作者 Ma Hailong Guo Yunfei +1 位作者 Cheng Dongnian Zhang Jianwei 《Journal of Electronics(China)》 2010年第3期363-370,共8页
It is well known that today's inter-domain routing protocol, Border Gateway Protocol (BGP), converges slowly during network failures. Due to the distribution nature of Internet routing decisions and the rate-limit... It is well known that today's inter-domain routing protocol, Border Gateway Protocol (BGP), converges slowly during network failures. Due to the distribution nature of Internet routing decisions and the rate-limiting timer Minimum Route Advertisement Interval (MRAI) of BGP, unavoidable convergence latency is introduced in reaction to network changes. During the period of convergence temporarily routing table inconsistencies cause short-term routing blackholes and loops which result in widespread temporary burst packet loss. In this paper, we present ROute-Free Forwarding (ROFF) - a novel technique for packet delivering continuously during periods of convergence. With slightly modifications on IP packet header and BGP, route loops and blackholes can be avoided. Our preliminary evaluation demonstrates that ROFF succeeds in reducing the number of Autonomous Systems (ASes) which experience burst packet loss and the duration of packet loss. 展开更多
关键词 Border Gateway Protocol (BGP) Loop-free Blackhole forwarding
下载PDF
Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN 被引量:2
16
作者 Yu Hu Yuanming Wu Hongshuai Wang 《Wireless Sensor Network》 2014年第11期237-248,共12页
The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider at... The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm. 展开更多
关键词 INSIDER ATTACK Selective forwarding TRUST Mechanism MONITOR NODE Secure Routing Protocol
下载PDF
Mesomechanics Finite-element Method for Determining the Shear Strength of Mudded Intercalation Materials 被引量:2
17
作者 胡启军 SHI Rendan +3 位作者 YANG Xiaoqiang CAI Qijie HE Tianjun HE Leping 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 2017年第2期289-291,共3页
A new method regarding mesomechanics finite-element research is proposed to predict the peak shear strength of mudded intercalation materials on a mesoscopic scale. Based on geometric and mechanical parameters, along ... A new method regarding mesomechanics finite-element research is proposed to predict the peak shear strength of mudded intercalation materials on a mesoscopic scale. Based on geometric and mechanical parameters, along with the strain failure criteria obtained by sample's deformation characteristics, uniaxial compression tests on the sample were simulated through a finite-element model, which yielded values consistent with the data from the laboratory uniaxial compression tests, implying that the method is reasonable. Based on this model, a shear test was performed to calculate the peak shear strength of the mudded intercalation, consistent with values reported in the literature, thereby providing a new approach for investigating the mechanical properties of mudded intercalation materials. 展开更多
关键词 mudded intercalation mesomechanics finite-element method mesoscale structure shear strength
下载PDF
ESMD-Flow: An Intelligent Flow Forwarding Scheme with Endogenous Security Based on Mimic Defense in Space-Air-Ground Integrated Network 被引量:1
18
作者 Ziyong Li Yuxiang Hu +2 位作者 Di Zhu JiangxingWu Yunjie Gu 《China Communications》 SCIE CSCD 2022年第1期40-51,共12页
The Space-Air-Ground Integrated Network(SAGIN) realizes the integration of space, air,and ground networks, obtaining the global communication coverage.Software-Defined Networking(SDN) architecture in SAGIN has become ... The Space-Air-Ground Integrated Network(SAGIN) realizes the integration of space, air,and ground networks, obtaining the global communication coverage.Software-Defined Networking(SDN) architecture in SAGIN has become a promising solution to guarantee the Quality of Service(QoS).However, the current routing algorithms mainly focus on the QoS of the service, rarely considering the security requirement of flow. To realize the secure transmission of flows in SAGIN, we propose an intelligent flow forwarding scheme with endogenous security based on Mimic Defense(ESMD-Flow). In this scheme, SDN controller will evaluate the reliability of nodes and links, isolate malicious nodes based on the reliability evaluation value, and adapt multipath routing strategy to ensure that flows are always forwarded along the most reliable multiple paths. In addition, in order to meet the security requirement of flows, we introduce the programming data plane to design a multiprotocol forwarding strategy for realizing the multiprotocol dynamic forwarding of flows. ESMD-Flow can reduce the network attack surface and improve the secure transmission capability of flows by implementing multipath routing and multi-protocol hybrid forwarding mechanism. The extensive simulations demonstrate that ESMD-Flow can significantly improve the average path reliability for routing and increase the difficulty of network eavesdropping while improving the network throughput and reducing the average packet delay. 展开更多
关键词 space-air-ground integrated network(SAGIN) endogenous security multipath routing multi-protocol forwarding
下载PDF
Cluster-Based Content Download and Forwarding Scheme for Highway VANETs 被引量:3
19
作者 mingsi zhang changle li +1 位作者 tao guo yuchuan fu 《China Communications》 SCIE CSCD 2018年第4期110-120,共11页
The recent advances in wireless communication technology enable high-speed vehicles to download data from roadside units(RSUs). However, the data download volume of individual vehicle is rather restricted due to high ... The recent advances in wireless communication technology enable high-speed vehicles to download data from roadside units(RSUs). However, the data download volume of individual vehicle is rather restricted due to high mobility and limited transmission range of vehicles, bringing users poor performance. To address this issue, we exploit the combination of both clustering and carry-and-forward schemes in this paper. Our scheme coordinates the cooperation of multiple infrastructures, cluster formation in the same direction and data forwarding of reverse vehicles to facilitate the target vehicle to download large-size content in dark areas. The process of data dissemination and achievable data download volume are then derived and analyzed theoretically. Finally, we conduct extensive simulations to verify the performance of the proposed scheme. Results show significant benefits of the proposed scheme in terms of increasing data download volume and throughput. 展开更多
关键词 数据下载 高速公路 无线通讯技术 基础结构 数据提交 分析理论 模拟验证
下载PDF
A Direction-Based Data Forwarding Algorithm for Opportunistic Networks
20
作者 Jie Yu Yue Ling +2 位作者 Si-Ying Li Hui-Qi Fang Lin-Feng Liu 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第2期152-159,共8页
In this paper, the forwarding objective and mobility law of nodes in opportunistic networks are first investigated to establish a mathematical model for further analysis, then a gradually accelerated data forwarding a... In this paper, the forwarding objective and mobility law of nodes in opportunistic networks are first investigated to establish a mathematical model for further analysis, then a gradually accelerated data forwarding algorithm is proposed. In this algorithm, according to the distance between data carriers (nodes) and the destination, some intermediate nodes are selected to relay the data. Especially, the forwarded copies can be increased when the delay reaches a threshold, to guarantee the required delivery ratio. The simulation results show that the proposed algorithm can effectively reduce the storage occupancies of nodes and forwarding delay, and guarantee the delivery ratio simultaneously. 展开更多
关键词 ACCELERATED delivery ratio forwarding opportunistic networks storageoccupancies.
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部