期刊文献+
共找到515,601篇文章
< 1 2 250 >
每页显示 20 50 100
Pluggable multitask diffractive neural networks based on cascaded metasurfaces 被引量:4
1
作者 Cong He Dan Zhao +8 位作者 Fei Fan Hongqiang Zhou Xin Li Yao Li Junjie Li Fei Dong Yin-Xiao Miao Yongtian Wang Lingling Huang 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第2期23-31,共9页
Optical neural networks have significant advantages in terms of power consumption,parallelism,and high computing speed,which has intrigued extensive attention in both academic and engineering communities.It has been c... Optical neural networks have significant advantages in terms of power consumption,parallelism,and high computing speed,which has intrigued extensive attention in both academic and engineering communities.It has been considered as one of the powerful tools in promoting the fields of imaging processing and object recognition.However,the existing optical system architecture cannot be reconstructed to the realization of multi-functional artificial intelligence systems simultaneously.To push the development of this issue,we propose the pluggable diffractive neural networks(P-DNN),a general paradigm resorting to the cascaded metasurfaces,which can be applied to recognize various tasks by switching internal plug-ins.As the proof-of-principle,the recognition functions of six types of handwritten digits and six types of fashions are numerical simulated and experimental demonstrated at near-infrared regimes.Encouragingly,the proposed paradigm not only improves the flexibility of the optical neural networks but paves the new route for achieving high-speed,low-power and versatile artificial intelligence systems. 展开更多
关键词 optical neural networks diffractive deep neural networks cascaded metasurfaces
下载PDF
Activation Redistribution Based Hybrid Asymmetric Quantization Method of Neural Networks 被引量:1
2
作者 Lu Wei Zhong Ma Chaojie Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期981-1000,共20页
The demand for adopting neural networks in resource-constrained embedded devices is continuously increasing.Quantization is one of the most promising solutions to reduce computational cost and memory storage on embedd... The demand for adopting neural networks in resource-constrained embedded devices is continuously increasing.Quantization is one of the most promising solutions to reduce computational cost and memory storage on embedded devices.In order to reduce the complexity and overhead of deploying neural networks on Integeronly hardware,most current quantization methods use a symmetric quantization mapping strategy to quantize a floating-point neural network into an integer network.However,although symmetric quantization has the advantage of easier implementation,it is sub-optimal for cases where the range could be skewed and not symmetric.This often comes at the cost of lower accuracy.This paper proposed an activation redistribution-based hybrid asymmetric quantizationmethod for neural networks.The proposedmethod takes data distribution into consideration and can resolve the contradiction between the quantization accuracy and the ease of implementation,balance the trade-off between clipping range and quantization resolution,and thus improve the accuracy of the quantized neural network.The experimental results indicate that the accuracy of the proposed method is 2.02%and 5.52%higher than the traditional symmetric quantization method for classification and detection tasks,respectively.The proposed method paves the way for computationally intensive neural network models to be deployed on devices with limited computing resources.Codes will be available on https://github.com/ycjcy/Hybrid-Asymmetric-Quantization. 展开更多
关键词 QUANTIZATION neural network hybrid asymmetric ACCURACY
下载PDF
Feature extraction for machine learning-based intrusion detection in IoT networks 被引量:1
3
作者 Mohanad Sarhan Siamak Layeghy +2 位作者 Nour Moustafa Marcus Gallagher Marius Portmann 《Digital Communications and Networks》 SCIE CSCD 2024年第1期205-216,共12页
A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems(NIDSs).Consequently,network interruptions and loss of sensitive data have ... A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems(NIDSs).Consequently,network interruptions and loss of sensitive data have occurred,which led to an active research area for improving NIDS technologies.In an analysis of related works,it was observed that most researchers aim to obtain better classification results by using a set of untried combinations of Feature Reduction(FR)and Machine Learning(ML)techniques on NIDS datasets.However,these datasets are different in feature sets,attack types,and network design.Therefore,this paper aims to discover whether these techniques can be generalised across various datasets.Six ML models are utilised:a Deep Feed Forward(DFF),Convolutional Neural Network(CNN),Recurrent Neural Network(RNN),Decision Tree(DT),Logistic Regression(LR),and Naive Bayes(NB).The accuracy of three Feature Extraction(FE)algorithms is detected;Principal Component Analysis(PCA),Auto-encoder(AE),and Linear Discriminant Analysis(LDA),are evaluated using three benchmark datasets:UNSW-NB15,ToN-IoT and CSE-CIC-IDS2018.Although PCA and AE algorithms have been widely used,the determination of their optimal number of extracted dimensions has been overlooked.The results indicate that no clear FE method or ML model can achieve the best scores for all datasets.The optimal number of extracted dimensions has been identified for each dataset,and LDA degrades the performance of the ML models on two datasets.The variance is used to analyse the extracted dimensions of LDA and PCA.Finally,this paper concludes that the choice of datasets significantly alters the performance of the applied techniques.We believe that a universal(benchmark)feature set is needed to facilitate further advancement and progress of research in this field. 展开更多
关键词 Feature extraction Machine learning Network intrusion detection system IOT
下载PDF
Rao Algorithms-Based Structure Optimization for Heterogeneous Wireless Sensor Networks 被引量:1
4
作者 Shereen K.Refaay Samia A.Ali +2 位作者 Moumen T.El-Melegy Louai A.Maghrabi Hamdy H.El-Sayed 《Computers, Materials & Continua》 SCIE EI 2024年第1期873-897,共25页
The structural optimization of wireless sensor networks is a critical issue because it impacts energy consumption and hence the network’s lifetime.Many studies have been conducted for homogeneous networks,but few hav... The structural optimization of wireless sensor networks is a critical issue because it impacts energy consumption and hence the network’s lifetime.Many studies have been conducted for homogeneous networks,but few have been performed for heterogeneouswireless sensor networks.This paper utilizes Rao algorithms to optimize the structure of heterogeneous wireless sensor networks according to node locations and their initial energies.The proposed algorithms lack algorithm-specific parameters and metaphorical connotations.The proposed algorithms examine the search space based on the relations of the population with the best,worst,and randomly assigned solutions.The proposed algorithms can be evaluated using any routing protocol,however,we have chosen the well-known routing protocols in the literature:Low Energy Adaptive Clustering Hierarchy(LEACH),Power-Efficient Gathering in Sensor Information Systems(PEAGSIS),Partitioned-based Energy-efficient LEACH(PE-LEACH),and the Power-Efficient Gathering in Sensor Information Systems Neural Network(PEAGSIS-NN)recent routing protocol.We compare our optimized method with the Jaya,the Particle Swarm Optimization-based Energy Efficient Clustering(PSO-EEC)protocol,and the hybrid Harmony Search Algorithm and PSO(HSA-PSO)algorithms.The efficiencies of our proposed algorithms are evaluated by conducting experiments in terms of the network lifetime(first dead node,half dead nodes,and last dead node),energy consumption,packets to cluster head,and packets to the base station.The experimental results were compared with those obtained using the Jaya optimization algorithm.The proposed algorithms exhibited the best performance.The proposed approach successfully prolongs the network lifetime by 71% for the PEAGSIS protocol,51% for the LEACH protocol,10% for the PE-LEACH protocol,and 73% for the PEGSIS-NN protocol;Moreover,it enhances other criteria such as energy conservation,fitness convergence,packets to cluster head,and packets to the base station. 展开更多
关键词 Wireless sensor networks Rao algorithms OPTIMIZATION LEACH PEAGSIS
下载PDF
Biodiversity metrics on ecological networks: Demonstrated with animal gastrointestinal microbiomes 被引量:1
5
作者 Zhanshan(Sam)Ma Lianwei Li 《Zoological Research(Diversity and Conservation)》 2024年第1期51-65,共15页
Biodiversity has become a terminology familiar to virtually every citizen in modern societies.It is said that ecology studies the economy of nature,and economy studies the ecology of humans;then measuring biodiversity... Biodiversity has become a terminology familiar to virtually every citizen in modern societies.It is said that ecology studies the economy of nature,and economy studies the ecology of humans;then measuring biodiversity should be similar with measuring national wealth.Indeed,there have been many parallels between ecology and economics,actually beyond analogies.For example,arguably the second most widely used biodiversity metric,Simpson(1949)’s diversity index,is a function of familiar Gini-index in economics.One of the biggest challenges has been the high“diversity”of diversity indexes due to their excessive“speciation”-there are so many indexes,similar to each country’s sovereign currency-leaving confused diversity practitioners in dilemma.In 1973,Hill introduced the concept of“numbers equivalent”,which is based on Renyi entropy and originated in economics,but possibly due to his abstruse interpretation of the concept,his message was not widely received by ecologists until nearly four decades later.What Hill suggested was similar to link the US dollar to gold at the rate of$35 per ounce under the Bretton Woods system.The Hill numbers now are considered most appropriate biodiversity metrics system,unifying Shannon,Simpson and other diversity indexes.Here,we approach to another paradigmatic shift-measuring biodiversity on ecological networks-demonstrated with animal gastrointestinal microbiomes representing four major invertebrate classes and all six vertebrate classes.The network diversity can reveal the diversity of species interactions,which is a necessary step for understanding the spatial and temporal structures and dynamics of biodiversity across environmental gradients. 展开更多
关键词 Biodiversity on network Hill numbers Animal gut microbiome Network link diversity Network species diversity Network abundance-weighted link diversity
下载PDF
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks 被引量:1
6
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 Vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
下载PDF
Multi-Scale-Matching neural networks for thin plate bending problem 被引量:1
7
作者 Lei Zhang Guowei He 《Theoretical & Applied Mechanics Letters》 CAS CSCD 2024年第1期11-15,共5页
Physics-informed neural networks are a useful machine learning method for solving differential equations,but encounter challenges in effectively learning thin boundary layers within singular perturbation problems.To r... Physics-informed neural networks are a useful machine learning method for solving differential equations,but encounter challenges in effectively learning thin boundary layers within singular perturbation problems.To resolve this issue,multi-scale-matching neural networks are proposed to solve the singular perturbation problems.Inspired by matched asymptotic expansions,the solution is decomposed into inner solutions for small scales and outer solutions for large scales,corresponding to boundary layers and outer regions,respectively.Moreover,to conform neural networks,we introduce exponential stretched variables in the boundary layers to avoid semiinfinite region problems.Numerical results for the thin plate problem validate the proposed method. 展开更多
关键词 Singular perturbation Physics-informed neural networks Boundary layer Machine learning
下载PDF
Robot-Oriented 6G Satellite-UAV Networks: Requirements, Paradigm Shifts, and Case Studies 被引量:1
8
作者 Peng Wei Wei Feng +2 位作者 Yunfei Chen Ning Ge Wei Xiang 《China Communications》 SCIE CSCD 2024年第2期74-84,共11页
Networked robots can perceive their surroundings, interact with each other or humans,and make decisions to accomplish specified tasks in remote/hazardous/complex environments. Satelliteunmanned aerial vehicle(UAV) net... Networked robots can perceive their surroundings, interact with each other or humans,and make decisions to accomplish specified tasks in remote/hazardous/complex environments. Satelliteunmanned aerial vehicle(UAV) networks can support such robots by providing on-demand communication services. However, under traditional open-loop communication paradigm, the network resources are usually divided into user-wise mostly-independent links,via ignoring the task-level dependency of robot collaboration. Thus, it is imperative to develop a new communication paradigm, taking into account the highlevel content and values behind, to facilitate multirobot operation. Inspired by Wiener’s Cybernetics theory, this article explores a closed-loop communication paradigm for the robot-oriented satellite-UAV network. This paradigm turns to handle group-wise structured links, so as to allocate resources in a taskoriented manner. It could also exploit the mobility of robots to liberate the network from full coverage,enabling new orchestration between network serving and positive mobility control of robots. Moreover,the integration of sensing, communications, computing and control would enlarge the benefit of this new paradigm. We present a case study for joint mobile edge computing(MEC) offloading and mobility control of robots, and finally outline potential challenges and open issues. 展开更多
关键词 closed-loop communication mobility control satellite-UAV network structured resource allocation
下载PDF
Correcting Climate Model Sea Surface Temperature Simulations with Generative Adversarial Networks:Climatology,Interannual Variability,and Extremes 被引量:2
9
作者 Ya WANG Gang HUANG +6 位作者 Baoxiang PAN Pengfei LIN Niklas BOERS Weichen TAO Yutong CHEN BO LIU Haijie LI 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1299-1312,共14页
Climate models are vital for understanding and projecting global climate change and its associated impacts.However,these models suffer from biases that limit their accuracy in historical simulations and the trustworth... Climate models are vital for understanding and projecting global climate change and its associated impacts.However,these models suffer from biases that limit their accuracy in historical simulations and the trustworthiness of future projections.Addressing these challenges requires addressing internal variability,hindering the direct alignment between model simulations and observations,and thwarting conventional supervised learning methods.Here,we employ an unsupervised Cycle-consistent Generative Adversarial Network(CycleGAN),to correct daily Sea Surface Temperature(SST)simulations from the Community Earth System Model 2(CESM2).Our results reveal that the CycleGAN not only corrects climatological biases but also improves the simulation of major dynamic modes including the El Niño-Southern Oscillation(ENSO)and the Indian Ocean Dipole mode,as well as SST extremes.Notably,it substantially corrects climatological SST biases,decreasing the globally averaged Root-Mean-Square Error(RMSE)by 58%.Intriguingly,the CycleGAN effectively addresses the well-known excessive westward bias in ENSO SST anomalies,a common issue in climate models that traditional methods,like quantile mapping,struggle to rectify.Additionally,it substantially improves the simulation of SST extremes,raising the pattern correlation coefficient(PCC)from 0.56 to 0.88 and lowering the RMSE from 0.5 to 0.32.This enhancement is attributed to better representations of interannual,intraseasonal,and synoptic scales variabilities.Our study offers a novel approach to correct global SST simulations and underscores its effectiveness across different time scales and primary dynamical modes. 展开更多
关键词 generative adversarial networks model bias deep learning El Niño-Southern Oscillation marine heatwaves
下载PDF
Multi-scale physics-informed neural networks for solving high Reynolds number boundary layer flows based on matched asymptotic expansions 被引量:1
10
作者 Jianlin Huang Rundi Qiu +1 位作者 Jingzhu Wang Yiwei Wang 《Theoretical & Applied Mechanics Letters》 CAS CSCD 2024年第2期76-81,共6页
Multi-scale system remains a classical scientific problem in fluid dynamics,biology,etc.In the present study,a scheme of multi-scale Physics-informed neural networks is proposed to solve the boundary layer flow at hig... Multi-scale system remains a classical scientific problem in fluid dynamics,biology,etc.In the present study,a scheme of multi-scale Physics-informed neural networks is proposed to solve the boundary layer flow at high Reynolds numbers without any data.The flow is divided into several regions with different scales based on Prandtl's boundary theory.Different regions are solved with governing equations in different scales.The method of matched asymptotic expansions is used to make the flow field continuously.A flow on a semi infinite flat plate at a high Reynolds number is considered a multi-scale problem because the boundary layer scale is much smaller than the outer flow scale.The results are compared with the reference numerical solutions,which show that the msPINNs can solve the multi-scale problem of the boundary layer in high Reynolds number flows.This scheme can be developed for more multi-scale problems in the future. 展开更多
关键词 Physics-informed neural networks(PINNs) MULTI-SCALE Fluid dynamics Boundary layer
下载PDF
A data-driven model of drop size prediction based on artificial neural networks using small-scale data sets 被引量:1
11
作者 Bo Wang Han Zhou +3 位作者 Shan Jing Qiang Zheng Wenjie Lan Shaowei Li 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2024年第2期71-83,共13页
An artificial neural network(ANN)method is introduced to predict drop size in two kinds of pulsed columns with small-scale data sets.After training,the deviation between calculate and experimental results are 3.8%and ... An artificial neural network(ANN)method is introduced to predict drop size in two kinds of pulsed columns with small-scale data sets.After training,the deviation between calculate and experimental results are 3.8%and 9.3%,respectively.Through ANN model,the influence of interfacial tension and pulsation intensity on the droplet diameter has been developed.Droplet size gradually increases with the increase of interfacial tension,and decreases with the increase of pulse intensity.It can be seen that the accuracy of ANN model in predicting droplet size outside the training set range is reach the same level as the accuracy of correlation obtained based on experiments within this range.For two kinds of columns,the drop size prediction deviations of ANN model are 9.6%and 18.5%and the deviations in correlations are 11%and 15%. 展开更多
关键词 Artificial neural network Drop size Solvent extraction Pulsed column Two-phase flow HYDRODYNAMICS
下载PDF
UAV-assisted data collection for wireless sensor networks with dynamic working modes 被引量:1
12
作者 Jie Chen Jianhua Tang 《Digital Communications and Networks》 SCIE CSCD 2024年第3期805-812,共8页
Wireless Sensor Network(WSN)is a cornerstone of Internet of Things(IoT)and has rich application scenarios.In this work,we consider a heterogeneous WSN whose sensor nodes have a diversity in their Residual Energy(RE).I... Wireless Sensor Network(WSN)is a cornerstone of Internet of Things(IoT)and has rich application scenarios.In this work,we consider a heterogeneous WSN whose sensor nodes have a diversity in their Residual Energy(RE).In this work,to protect the sensor nodes with low RE,we investigate dynamic working modes for sensor nodes which are determined by their RE and an introduced energy threshold.Besides,we employ an Unmanned Aerial Vehicle(UAV)to collect the stored data from the heterogeneous WSN.We aim to jointly optimize the cluster head selection,energy threshold and sensor nodes’working mode to minimize the weighted sum of energy con-sumption from the WSN and UAV,subject to the data collection rate constraint.To this end,we propose an efficient search method to search for an optimal energy threshold,and develop a penalty-based successive convex approximation algorithm to select the cluster heads.Then we present a low-complexity iterative approach to solve the joint optimization problem and discuss the implementation procedure.Numerical results justify that our proposed approach is able to reduce the energy consumption of the sensor nodes with low RE significantly and also saves energy for the whole WSN. 展开更多
关键词 Unmanned aerial vehicle Wireless sensor networks Cluster heads Dynamic working modes
下载PDF
Estimation of the anisotropy of hydraulic conductivity through 3D fracture networks using the directional geological entropy 被引量:1
13
作者 Chuangbing Zhou Zuyang Ye +2 位作者 Chi Yao Xincheng Fan Feng Xiong 《International Journal of Mining Science and Technology》 SCIE EI CAS CSCD 2024年第2期137-148,共12页
With an extension of the geological entropy concept in porous media,the approach called directional entrogram is applied to link hydraulic behavior to the anisotropy of the 3D fracture networks.A metric called directi... With an extension of the geological entropy concept in porous media,the approach called directional entrogram is applied to link hydraulic behavior to the anisotropy of the 3D fracture networks.A metric called directional entropic scale is used to measure the anisotropy of spatial order in different directions.Compared with the traditional connectivity indexes based on the statistics of fracture geometry,the directional entropic scale is capable to quantify the anisotropy of connectivity and hydraulic conductivity in heterogeneous 3D fracture networks.According to the numerical analysis of directional entrogram and fluid flow in a number of the 3D fracture networks,the hydraulic conductivities and entropic scales in different directions both increase with spatial order(i.e.,trace length decreasing and spacing increasing)and are independent of the dip angle.As a result,the nonlinear correlation between the hydraulic conductivities and entropic scales from different directions can be unified as quadratic polynomial function,which can shed light on the anisotropic effect of spatial order and global entropy on the heterogeneous hydraulic behaviors. 展开更多
关键词 3D fracture network Geological entropy Directional entropic scale ANISOTROPY Hydraulic conductivity
下载PDF
Regulatable Orthotropic 3D Hybrid Continuous Carbon Networks for Efficient Bi-Directional Thermal Conduction 被引量:1
14
作者 Huitao Yu Lianqiang Peng +2 位作者 Can Chen Mengmeng Qin Wei Feng 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第10期136-148,共13页
Vertically oriented carbon structures constructed from low-dimen-sional carbon materials are ideal frameworks for high-performance thermal inter-face materials(TIMs).However,improving the interfacial heat-transfer eff... Vertically oriented carbon structures constructed from low-dimen-sional carbon materials are ideal frameworks for high-performance thermal inter-face materials(TIMs).However,improving the interfacial heat-transfer efficiency of vertically oriented carbon structures is a challenging task.Herein,an orthotropic three-dimensional(3D)hybrid carbon network(VSCG)is fabricated by depositing vertically aligned carbon nanotubes(VACNTs)on the surface of a horizontally oriented graphene film(HOGF).The interfacial interaction between the VACNTs and HOGF is then optimized through an annealing strategy.After regulating the orientation structure of the VACNTs and filling the VSCG with polydimethylsi-loxane(PDMS),VSCG/PDMS composites with excellent 3D thermal conductive properties are obtained.The highest in-plane and through-plane thermal conduc-tivities of the composites are 113.61 and 24.37 W m^(-1)K^(-1),respectively.The high contact area of HOGF and good compressibility of VACNTs imbue the VSCG/PDMS composite with low thermal resistance.In addition,the interfacial heat-transfer efficiency of VSCG/PDMS composite in the TIM performance was improved by 71.3%compared to that of a state-of-the-art thermal pad.This new structural design can potentially realize high-performance TIMs that meet the need for high thermal conductivity and low contact thermal resistance in interfacial heat-transfer processes. 展开更多
关键词 Orthotropic continuous structures Hybrid carbon networks Carbon/polymer composites Thermal interface materials
下载PDF
A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments 被引量:1
15
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期631-654,共24页
Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control l... Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks. 展开更多
关键词 6G networks noise injection attacks Gaussian mixture model Bessel function traffic filter Volterra filter
下载PDF
‘Partly'globalized networks and driving mechanism in resource-based state-owned enterprises:A case study of J Group 被引量:1
16
作者 Jing Xu Yongchun Yang +1 位作者 Yongjiao Zhang Shan Man 《Geography and Sustainability》 CSCD 2024年第1期77-88,共12页
In the context of economic globalization,while multinational enterprises from developed countries occupy a high-end position in the global value chain,enterprises from developing countries are often marginalized in th... In the context of economic globalization,while multinational enterprises from developed countries occupy a high-end position in the global value chain,enterprises from developing countries are often marginalized in the world market.In China,resource-based state-owned enterprises(SOEs)are tasked with the mission of safeguarding resource security,and their internationalization development ideas and strategic deployment are significantly and fundamentally different from those of other non-state-owned enterprises and large multinational corporations.This study provides ideas for the globalization policies of enterprises in developing countries.We consider J Group in western China as a case and discuss its productive investment and global production network development from 2010 to 2019.We found that J Group was‘Partly'globalized,and there are multiple core nodes with the characteristics of centralized and decentralized coexistence in the production network;in addition,the overall layout centre shifted to Southeast Asia and China;however,its global production was restricted by the enterprise's investment security considerations,support and restrictions of the home country,political security risk of the host country,and sanctions from the West.These findings provide insights for future research:under the wave of anti-globalization and'internal circulation as the main body',resource SOEs should consider the potential risk of investment,especially keeping the middle and downstream industrial chain in China as much as possible. 展开更多
关键词 Global production networks Global value chain Productive investment Resource SOEs J Group ‘Partly'globalized
下载PDF
Security Implications of Edge Computing in Cloud Networks 被引量:1
17
作者 Sina Ahmadi 《Journal of Computer and Communications》 2024年第2期26-46,共21页
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r... Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques. 展开更多
关键词 Edge Computing Cloud networks Artificial Intelligence Machine Learning Cloud Security
下载PDF
Influencer identification of dynamical networks based on an information entropy dimension reduction method
18
作者 段东立 纪思源 袁紫薇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期375-384,共10页
Identifying critical nodes or sets in large-scale networks is a fundamental scientific problem and one of the key research directions in the fields of data mining and network science when implementing network attacks,... Identifying critical nodes or sets in large-scale networks is a fundamental scientific problem and one of the key research directions in the fields of data mining and network science when implementing network attacks, defense, repair and control.Traditional methods usually begin from the centrality, node location or the impact on the largest connected component after node destruction, mainly based on the network structure.However, these algorithms do not consider network state changes.We applied a model that combines a random connectivity matrix and minimal low-dimensional structures to represent network connectivity.By using mean field theory and information entropy to calculate node activity,we calculated the overlap between the random parts and fixed low-dimensional parts to quantify the influence of node impact on network state changes and ranked them by importance.We applied this algorithm and the proposed importance algorithm to the overall analysis and stratified analysis of the C.elegans neural network.We observed a change in the critical entropy of the network state and by utilizing the proposed method we can calculate the nodes that indirectly affect muscle cells through neural layers. 展开更多
关键词 dynamical networks network influencer low-dimensional dynamics network disintegration
下载PDF
Verifying hierarchical network nonlocality in general quantum networks
19
作者 杨舒媛 侯晋川 贺衎 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期199-208,共10页
Recently, a class of innovative notions on quantum network nonlocality(QNN), called full quantum network nonlocality(FQNN), have been proposed in Phys. Rev. Lett. 128 010403(2022). As the generalization of full networ... Recently, a class of innovative notions on quantum network nonlocality(QNN), called full quantum network nonlocality(FQNN), have been proposed in Phys. Rev. Lett. 128 010403(2022). As the generalization of full network nonlocality(FNN), l-level quantum network nonlocality(l-QNN) was defined in arxiv. 2306.15717 quant-ph(2024). FQNN is a NN that can be generated only from a network with all sources being non-classical. This is beyond the existing standard network nonlocality, which may be generated from a network with only a non-classical source. One of the challenging tasks is to establish corresponding Bell-like inequalities to demonstrate the FQNN or l-QNN. Up to now, the inequality criteria for FQNN and l-QNN have only been established for star and chain networks. In this paper, we devote ourselves to establishing Bell-like inequalities for networks with more complex structures. Note that star and chain networks are special kinds of tree-shaped networks. We first establish the Bell-like inequalities for verifying l-QNN in k-forked tree-shaped networks. Such results generalize the existing inequalities for star and chain networks. Furthermore, we find the Bell-like inequality criteria for l-QNN for general acyclic and cyclic networks. Finally, we discuss the demonstration of l-QNN in the well-known butterfly networks. 展开更多
关键词 full network nonlocality hierarchical network nonlocality tree network
下载PDF
Source localization in signed networks with effective distance
20
作者 马志伟 孙蕾 +2 位作者 丁智国 黄宜真 胡兆龙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期577-585,共9页
While progress has been made in information source localization,it has overlooked the prevalent friend and adversarial relationships in social networks.This paper addresses this gap by focusing on source localization ... While progress has been made in information source localization,it has overlooked the prevalent friend and adversarial relationships in social networks.This paper addresses this gap by focusing on source localization in signed network models.Leveraging the topological characteristics of signed networks and transforming the propagation probability into effective distance,we propose an optimization method for observer selection.Additionally,by using the reverse propagation algorithm we present a method for information source localization in signed networks.Extensive experimental results demonstrate that a higher proportion of positive edges within signed networks contributes to more favorable source localization,and the higher the ratio of propagation rates between positive and negative edges,the more accurate the source localization becomes.Interestingly,this aligns with our observation that,in reality,the number of friends tends to be greater than the number of adversaries,and the likelihood of information propagation among friends is often higher than among adversaries.In addition,the source located at the periphery of the network is not easy to identify.Furthermore,our proposed observer selection method based on effective distance achieves higher operational efficiency and exhibits higher accuracy in information source localization,compared with three strategies for observer selection based on the classical full-order neighbor coverage. 展开更多
关键词 complex networks signed networks source localization effective distance
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部