期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
Advancing 5G Network Applications Lifecycle Security:An ML-Driven Approach
1
作者 Ana Hermosilla Jorge Gallego-Madrid +3 位作者 Pedro Martinez-Julia Jordi Ortiz Ved P.Kafle Antonio Skarmeta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1447-1471,共25页
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa... As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security. 展开更多
关键词 network application network function virtualization machine learning SECURITY 5G
下载PDF
Artificial Neural Network Application to the Friction Stir Welding of Al 6061 Alloy to Stainless Steel 304 被引量:1
2
作者 HASSAN Nassef 《Computer Aided Drafting,Design and Manufacturing》 2008年第1期26-31,共6页
The joining of a 6-mm thickness Al 6061 to Stainless steel 304 has been performed by solid state welding. A selection method of optimum friction welding condition using neural networks is proposed. The data used for a... The joining of a 6-mm thickness Al 6061 to Stainless steel 304 has been performed by solid state welding. A selection method of optimum friction welding condition using neural networks is proposed. The data used for analyses are the friction stir welding condition, the input parameters of the model consist of welding speed and tool rotation speed. The outputs of the ANN (Artificial Neural Network)model includes resulting parameters, namely, maximum reached temperature,and heating rate for both aluminum alloy 6061 and stainless steel 304 during friction stir welding process.The results of analysis suggest that the proposed method is an effective one to select an optimum welding condition.Good performance of the ANN model was achieved. The combined influence of welding speed and tool rotation speed on the maximum reached temperature and heating rate for both aluminum alloy 6061and stainless steel 304 friction stir welding was simulated. A comparison was made between the output of the ANN program and finite element model. The calculated results were in good agreement with that of finite element model. 展开更多
关键词 friction stir welding artificial neural network application welding parameters
下载PDF
ZTE's Softswitch Networking and Application Cases
3
作者 Jiang Lihua (Network Division of ZTE Corporation,Nanjing 210012,China) 《ZTE Communications》 2003年第2期36-39,共4页
The article introduces ZTE's Softswitch-based NGN solutions. such as the long distance VolP service solution over data back- bone,and local voice and data service solution over MAN.Three application cases are anal... The article introduces ZTE's Softswitch-based NGN solutions. such as the long distance VolP service solution over data back- bone,and local voice and data service solution over MAN.Three application cases are analyzed,and NGN's features in aspects of network architecture,service provision and network management are summarized. 展开更多
关键词 ZTE’s Softswitch networking and application Cases of in work for NGN IAD
下载PDF
Vehicular Communications,Networks,and Applications
4
作者 ZHUANG Weihua ZHU Hongzi 《ZTE Communications》 2016年第3期1-2,共2页
Avehicular ad hoc network (VANET) is a packet-switched network, consisting of mobile communication nodes mounted on vehicles, with very limited or no infrastructure support [1]. It supports communications among near... Avehicular ad hoc network (VANET) is a packet-switched network, consisting of mobile communication nodes mounted on vehicles, with very limited or no infrastructure support [1]. It supports communications among nearby vehicles, 展开更多
关键词 VANETS Vehicular Communications networks and applications DSRC
下载PDF
Wireless Network Technologies Supporting M2M Applications
5
作者 Lei Zhenzhou (China Academy of Telecommunications Research of Mil, Beijing 100083, China) 《ZTE Communications》 2005年第1期6-9,共4页
When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) commun... When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) communication. Someday, the traffic generated by machines will greatly exceed those of man-machine and man-man applications. Large numbers of M2M applications will need various wireless networks to support them. This paper introduces the characteristics, advantages and disadvantages of the currently available various wireless network technologies, including WiFi, Bluetooth, ZigBee, passive RFID and the 802.15 standard networks. 展开更多
关键词 ZIGBEE UWB Wireless network Technologies Supporting M2M applications RFID WiFi
下载PDF
Applications of Access Networks in India
6
作者 Le Zhifeng (Network Division of ZTE Corporation,Shanghai 200231,China) 《ZTE Communications》 2003年第1期33-34,37,共3页
1 IntroductionIndia has a population of over 1 billion, thesecond largest in the world, with a territo-ry area of 3.3 million square kilometresand 28 states; it is the largest country inSouth Asia. Since independence ... 1 IntroductionIndia has a population of over 1 billion, thesecond largest in the world, with a territo-ry area of 3.3 million square kilometresand 28 states; it is the largest country inSouth Asia. Since independence in 1947, In-dia has made great progress on its national e-conomy and infrastructure. By December 展开更多
关键词 of on in applications of Access networks in India ZTE ACCESS for HDSL GR CDMA
下载PDF
APPLICATIONS OF FAST SIMULATED ANNEALING IN NEURAL NETWORKS
7
作者 Yi Lin CAO Qing Zhang +1 位作者 LU Shu Ting YANG(Department of Chemistry, Henan Normal University, Xinxiang, 453002)Hong Lin LIU(Shanghai Institute of Mentallurgy, Academia Sinica, Shanghai, 200050) 《Chinese Chemical Letters》 SCIE CAS CSCD 1996年第4期365-366,共2页
Fast simulated annealing is implemented into the learning process of neural network to replace the traditional back-propagation algorithm. The new procedure exhibits performance fast in learning and accurate in predic... Fast simulated annealing is implemented into the learning process of neural network to replace the traditional back-propagation algorithm. The new procedure exhibits performance fast in learning and accurate in prediction compared to the traditional neural networks. Two numerical data sets were used to illustrate its use in chemistry. 展开更多
关键词 FAST applicationS OF FAST SIMULATED ANNEALING IN NEURAL networkS
下载PDF
Application of Neural Network in Precision Prediction of Hat-Section Profiles in Rotary Draw Bending
8
《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 2001年第1期137-138,共2页
关键词 application of Neural network in Precision Prediction of Hat-Section Profiles in Rotary Draw Bending
下载PDF
Call for papers Journal of Control Theory and Applications Special issue on Wireless sensor networks:from theory to practices and applications
9
《控制理论与应用(英文版)》 EI 2010年第1期123-123,共1页
Wireless Sensor Network (WSN) is characterized by the dense deployment of sensor nodes that continuously observe physical phenomenon. The main advantages of WSN include its low cost, rapid deployment, self-organizat... Wireless Sensor Network (WSN) is characterized by the dense deployment of sensor nodes that continuously observe physical phenomenon. The main advantages of WSN include its low cost, rapid deployment, self-organization, and fault tolerance. WSN has received tremendous interests of various research communities, 展开更多
关键词 WSNS Call for papers Journal of Control Theory and applications Special issue on Wireless sensor networks
下载PDF
Artificial Neural Network Method Based on Expert Knowledge and Its Application to Quantitative Identification of Potential Seismic Sources
10
作者 Hu Yinlei and Zhang YumingInstitute of Geology,SSB,Beijing 100029,China 《Earthquake Research in China》 1997年第2期64-72,共9页
In this paper,an approach is developed to optimize the quality of the training samples in the conventional Artificial Neural Network(ANN)by incorporating expert knowledge in the means of constructing expert-rule sampl... In this paper,an approach is developed to optimize the quality of the training samples in the conventional Artificial Neural Network(ANN)by incorporating expert knowledge in the means of constructing expert-rule samples from rules in an expert system,and through training by using these samples,an ANN based on expert-knowledge is further developed.The method is introduced into the field of quantitative identification of potential seismic sources on the basis of the rules in an expert system.Then it is applied to the quantitative identification of the potential seismic sources in Beijing and its adjacent area.The result indicates that the expert rule based on ANN method can well incorporate and represent the expert knowledge in the rules in an expert system,and the quality of the samples and the efficiency of training and the accuracy of the result are optimized. 展开更多
关键词 Artificial Neural network Method Based on Expert Knowledge and Its application to Quantitative Identification of Potential Seismic Sources LENGTH
下载PDF
STUDY ON THE OPTIMIZATION OF TRANSPORT CONTROL POLICY IN COMMUNICATION NETWORK 被引量:1
11
作者 Fan Shuyan Han Weizhan Lu Ran 《Journal of Electronics(China)》 2010年第2期261-266,共6页
In communication networks with policy-based Transport Control on-Demand (TCoD) function,the transport control policies play a great impact on the network effectiveness. To evaluate and optimize the transport policies ... In communication networks with policy-based Transport Control on-Demand (TCoD) function,the transport control policies play a great impact on the network effectiveness. To evaluate and optimize the transport policies in communication network,a policy-based TCoD network model is given and a comprehensive evaluation index system of the network effectiveness is put forward from both network application and handling mechanism perspectives. A TCoD network prototype system based on Asynchronous Transfer Mode/Multi-Protocol Label Switching (ATM/MPLS) is introduced and some experiments are performed on it. The prototype system is evaluated and analyzed with the comprehensive evaluation index system. The results show that the index system can be used to judge whether the communication network can meet the application requirements or not,and can provide references for the optimization of the transport policies so as to improve the communication network effectiveness. 展开更多
关键词 Communication network Comprehensive evaluation index system network application Effectiveness (NAE) Transport Control on-Demand (TCoD) Policy optimization
下载PDF
HIV incidence among men who have sex with men using geosocial networking smartphone application in Beijing, China: an open cohort study 被引量:4
12
作者 Guo-Dong Mi Bin-Bin Zhang +7 位作者 Fei Yu Xian-Long Ren Jason JOng Ya-Qi Fan Feng-Hua Guo Chun-Jun Li Mian-Zhi Zhang Min-Ying Zhang 《Infectious Diseases of Poverty》 SCIE 2021年第2期14-24,共11页
Background:Sexual transmission among men who have sex with men(MSM)is the dominant route of HIV transmission in China.Extensive use of geosocial networking(GSN)smartphone application(app)has dramatically changed the p... Background:Sexual transmission among men who have sex with men(MSM)is the dominant route of HIV transmission in China.Extensive use of geosocial networking(GSN)smartphone application(app)has dramatically changed the pattern of sexual behaviors and HIV risk among MSM;but data on HIV incidence and the changing risk behaviors of GSN app-using MSM are limited.We aims to assess the HIV incidence and its correlates among gay GSN app-using MSM in China.Methods:We constructed an open cohort which was initiated and maintained using a GSN app to assess the HIV incidence among app-using MSM,recruited from June 2017 to December 2018.MSM completed an online questionnaire on their sociodemographic characteristics,sexual behaviors,recreational drug use and sexually transmitted infections status.Then each man had an HIV test,and those tested negatives were enrolled into the cohort.Participants completed follow-ups with additional HIV tests though the app during the study period,and were censored at HIV seroconversion or study end date.HIV incidence was calculated by dividing the sum of observed HIV seroconversions by the observed person-time.Univariate(Chi-square test and Fisher's exact test)and multivariate(proportional hazards regression)analyses were used to examine correlates of HIV incidence.Results:A total of 6957 HIV negative MSM were enrolled in the open cohort,37 seroconversions occurred among 1937 men contributing 1065 observed person-years:HIV incidence was 3.47 per 100 person-years[95%confidence interval(Cl):2.37-4.57].More than five sexual partners[hazard ratio(HR)=2.65,95%Cl:1.04-6.67],and sex with HIV positive partners(HR=3.82,95%Cl:1.16-12.64)in the preceding six months were positively associated with HIV seroconversion.Consistent condom use for anal sex(HR=0.27,95%Cl:0.07-0.96),and reporting insertive anal sex only(HR=0.23,95%Cl:0.08-0.62)in the preceding six months were protective factors for HIV seroconversion.Conclusions:Tailored interventions targeting app-using MSM are urgently needed given their high risk of HIV.As a new tool for accessing MSM at higher HIV risk,GSN smartphone app could play an important role in HIV research among MSM. 展开更多
关键词 Men who have sex with men Geosocial networking application HIV INCIDENCE Sexual risk behavior
原文传递
Application of neural networks and ultraviolet spectroscopy to simultaneous determination of multiple vitamins
13
作者 李志良 曾鸽鸣 +4 位作者 王树信 李梦龙 H.Yoshida Y.Miyashita S.Sasaki 《Chinese Science Bulletin》 SCIE EI CAS 1996年第18期1582-1584,共3页
Multivariate analysis and filtering techniques are widely applied to simultaneous and/or selective determination of multicomponent systems. Many methods among them are based on the principle of linear addition, while ... Multivariate analysis and filtering techniques are widely applied to simultaneous and/or selective determination of multicomponent systems. Many methods among them are based on the principle of linear addition, while this principle does not always hold due to various physical and chemical factors. Using quite a different way, neural network (NN) based on a given learning rule, such as back propagation (BP) model, needs neither knowing nor using any form of input/output relationship. Particularly, NN can resolve various problems such as those with casual relation, those with fuzzy backgrounds, and those with uncertain inferential processes. NN was used by us to investigate quantitative struc- 展开更多
关键词 NN application of neural networks and ultraviolet spectroscopy to simultaneous determination of multiple vitamins
原文传递
Trends of Communication Processors
14
作者 LIU Dake CAI Zhaoyun WANG Wei 《China Communications》 SCIE CSCD 2016年第1期1-16,共16页
Processors have been playing important roles in both communication infrastructure systems and terminals.In this paper,both application specific and general purpose processors for communications are discussed including... Processors have been playing important roles in both communication infrastructure systems and terminals.In this paper,both application specific and general purpose processors for communications are discussed including the roles,the history,the current situations,and the trends.One trend is that ASIPs(Application Specific Instruction-set Processors) are taking over ASICs(Application Specific Integrated Circuits) because of the increasing needs both on performance and compatibility of multi-modes.The trend opened opportunities for researchers crossing the boundary between communications and computer architecture.Another trend is the serverlization,i.e.,more infrastructure equipments are replaced by servers.The trend opened opportunities for researchers working towards high performance computing for communication,such as research on communication algorithm kernels and real time programming methods on servers. 展开更多
关键词 ASIP baseband processor network processor application processor server processor
下载PDF
Application of a multilayer feedforward network to voiced-unvoiced-silence classifications of speech
15
作者 QI Yingyong(Department of Speech and Hearing Sciences, University of Arizona , Tucson . Arizona 85721) 《Chinese Journal of Acoustics》 1992年第2期167-178,共12页
A procedure has been developed for making voiced, unvoiced, and silence classifications of speech by using a multilayer feedforward net -work. Speech signals were analyzed sequentially and a feature vector was obtaine... A procedure has been developed for making voiced, unvoiced, and silence classifications of speech by using a multilayer feedforward net -work. Speech signals were analyzed sequentially and a feature vector was obtained for each segment . The feature vector served as input to a 3-layer feedforward network in which voiced, unvoiced, and silence classification was made. The network had a 6-12-3 node architecture and was trained using the generalized delta rule for back propagation of error . The performance of the network was evaluated using speech samples from 3 male and 3 female speakers . A speaker-dependent classification rate of 94.7% and speaker-independent classification rate of 94.3% were obtained. It is concluded that the voiced, unvoiced , and silence classification of speech can be effectively accomplished using a multilayer feedforward network. 展开更多
关键词 work IEEE net application of a multilayer feedforward network to voiced-unvoiced-silence classifications of speech
原文传递
A Proposal for a Benchmark Generator of Weakly Connected Directed Graphs
16
作者 Jose Miguel Montanana Antonio Hervas Pedro Pablo Soriano 《Open Journal of Modelling and Simulation》 2020年第1期18-34,共17页
The previous studies on detection of communities on complex networks were focused on nondirected graphs, such as Neural Networks, social networks, social interrelations, the contagion of diseases, and bibliographies. ... The previous studies on detection of communities on complex networks were focused on nondirected graphs, such as Neural Networks, social networks, social interrelations, the contagion of diseases, and bibliographies. However, there are also other problems whose modeling entails obtaining a weakly connected directed graph such as the student access to the university, the public transport networks, or trophic chains. Those cases deserve particularized study with an analysis and the resolution adjusted to them. Additionally, this is a challenge, since the existing algorithms in most of the cases were originally designed for non-directed graphs or symmetrical and regular graphs. Our proposal is a Benchmark Generator of Weakly Connected Directed Graphs whose properties can be defined by the end-users according to their necessities. The source code of the generators described in this article is available in GitHub under the GNU license. 展开更多
关键词 Graphs and networks applications Clustering Cluster Analysis Complex networks Social Models Higher Education Management
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部