Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne...Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.展开更多
In this paper,an intelligent control method applying on numerical virtual flight is proposed.The proposed algorithm is verified and evaluated by combining with the case of the basic finner projectile model and shows a...In this paper,an intelligent control method applying on numerical virtual flight is proposed.The proposed algorithm is verified and evaluated by combining with the case of the basic finner projectile model and shows a good application prospect.Firstly,a numerical virtual flight simulation model based on overlapping dynamic mesh technology is constructed.In order to verify the accuracy of the dynamic grid technology and the calculation of unsteady flow,a numerical simulation of the basic finner projectile without control is carried out.The simulation results are in good agreement with the experiment data which shows that the algorithm used in this paper can also be used in the design and evaluation of the intelligent controller in the numerical virtual flight simulation.Secondly,combined with the real-time control requirements of aerodynamic,attitude and displacement parameters of the projectile during the flight process,the numerical simulations of the basic finner projectile’s pitch channel are carried out under the traditional PID(Proportional-Integral-Derivative)control strategy and the intelligent PID control strategy respectively.The intelligent PID controller based on BP(Back Propagation)neural network can realize online learning and self-optimization of control parameters according to the acquired real-time flight parameters.Compared with the traditional PID controller,the concerned control variable overshoot,rise time,transition time and steady state error and other performance indicators have been greatly improved,and the higher the learning efficiency or the inertia coefficient,the faster the system,the larger the overshoot,and the smaller the stability error.The intelligent control method applying on numerical virtual flight is capable of solving the complicated unsteady motion and flow with the intelligent PID control strategy and has a strong promotion to engineering application.展开更多
With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to res...With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to respond to the growing demand of users.This rapid evolution has given the operators to adapt,their methods to the new technologies that increase.This complexity becomes more important,when these networks include several technologies to access different from the heterogeneous network like in the 4G network.The dimensional new challenges tell the application and the considerable increase in demand for services and the compatibility with existing networks,the management of mobility intercellular of users and it offers a better quality of services.Thus,the proposed solution to meet these new requirements is the sizing of the EPC(Evolved Packet Core)core network to support the 5G access network.For the case of Orange Guinea,this involves setting up an architecture for interconnecting the core networks of Sonfonia and Camayenne.The objectives of our work are of two orders:(1)to propose these solutions and recommendations for the heart network EPC sizing and the deployment to be adopted;(2)supply and architectural interconnection in the heart network EPC and an existing heart network.In our work,the model of traffic in communication that we use to calculate the traffic generated with each technology has link in the network of the heart.展开更多
With the rapid development of the Internet,the network ideology of colleges and universities is facing severe challenges.This paper deeply analyzes the root of the risk of network ideology and makes a specific investi...With the rapid development of the Internet,the network ideology of colleges and universities is facing severe challenges.This paper deeply analyzes the root of the risk of network ideology and makes a specific investigation of the status quo of network public opinion in colleges and universities.On this basis,the study explores and puts forward a series of targeted risk prevention and resolution strategies,aiming at providing a systematic solution for the network ideology security of colleges and universities.In this paper,with the combination of theory and practice as the path,we verify the effectiveness and applicability of the proposed strategy through the analysis of the implementation effect of the strategy.This study also provides theoretical support and practical guidance for the prevention and control of ideological risks and public opinion guidance in universities under the network environment,which has important practical significance.With the continuous progress of network technology,the threats to the network ideology of colleges and universities are increasing.For example,the spread of false information has become a serious problem affecting the security of college network ideology.展开更多
Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal d...Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal discharges.Gaining more detailed information on brain network alterations can help us to further understand the mechanisms of epilepsy and pave the way for brain network-based precise therapeutic approaches in clinical practice.An increasing number of advanced neuroimaging techniques and electrophysiological techniques such as diffusion tensor imaging-based fiber tra ctography,diffusion kurtosis imaging-based fiber tractography,fiber ball imagingbased tra ctography,electroencephalography,functional magnetic resonance imaging,magnetoencephalography,positron emission tomography,molecular imaging,and functional ultrasound imaging have been extensively used to delineate epileptic networks.In this review,we summarize the relevant neuroimaging and neuroelectrophysiological techniques for assessing structural and functional brain networks in patients with epilepsy,and extensively analyze the imaging mechanisms,advantages,limitations,and clinical application ranges of each technique.A greater focus on emerging advanced technologies,new data analysis software,a combination of multiple techniques,and the construction of personalized virtual epilepsy models can provide a theoretical basis to better understand the brain network mechanisms of epilepsy and make surgical decisions.展开更多
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p...In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.展开更多
To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middl...To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middleboxes into software-based virtualized function entities.Due to the demands of virtual services placement in NFV network environment, this paper models the service amount placement problem involving with the resources allocation as a cooperative game and proposes the placement policy by Nash Bargaining Solution(NBS). Specifically,we first introduce the system overview and apply the rigorous cooperative game-theoretic guide to build the mathematical model, which can give consideration to both the responding efficiency of service requirements and the allocation fairness.Then a distributed algorithm corresponding to NBS is designed to achieve predictable network performance for virtual instances placement.Finally, with simulations under various scenarios,the results show that our placement approach can achieve high utilization of network through the analysis of evaluation metrics namely the satisfaction degree and fairness index. With the suitable demand amount of services, the average values of two metrics can reach above 90%. And by tuning the base placement, our solution can enable operators to flexibly balance the tradeoff between satisfaction and fairness of resourcessharing in service platforms.展开更多
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ...5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances.展开更多
Software-defined networks (SDN) have attracted much attention recently because of their flexibility in terms of network management. Increasingly, SDN is being introduced into wireless networks to form wireless SDN. ...Software-defined networks (SDN) have attracted much attention recently because of their flexibility in terms of network management. Increasingly, SDN is being introduced into wireless networks to form wireless SDN. One enabling technology for wireless SDN is network virtualization, which logically divides one wireless network element, such as a base station, into multiple slices, and each slice serving as a standalone virtual BS. In this way, one physical mobile wireless network can be partitioned into multiple virtual networks in a software-defined manner. Wireless virtual networks comprising virtual base stations also need to provide QoS to mobile end-user services in the same context as their physical hosting networks. One key QoS parameter is delay. This paper presents a delay model for software-defined wireless virtual networks. Network calculus is used in the modelling. In particular, stochastic network calculus, which describes more realistic models than deterministic network calculus, is used. The model enables theoretical investigation of wireless SDN, which is largely dominated by either algorithms or prototype implementations.展开更多
The factual data on error of positioning in VRS GPS networks have been analyzed, where the mobile receiver is provided with VRS. The method of highly informative zone is suggested for removal of initial vagueness in s...The factual data on error of positioning in VRS GPS networks have been analyzed, where the mobile receiver is provided with VRS. The method of highly informative zone is suggested for removal of initial vagueness in selection of reference stations for purposes of development of VRS on the basis of minimum GPS network, composed of three reference stations. The recommendations on use of suggested method are given.展开更多
People create network virtual space that is completely different from the real space through network information technologies.The characteristics of network virtual space are that the subject can obtain a similar real...People create network virtual space that is completely different from the real space through network information technologies.The characteristics of network virtual space are that the subject can obtain a similar real space experience.From the perspective of phenomenology of technics,in order to analyze the virtual space of the network,it is necessary to clear the phenomenological concepts,such as space,space experience,and virtual space experience,so as to know the type of network virtual space experience,explore the essential characteristics,and find solutions to the ethical conflicts in the virtual space experience of the network.展开更多
The single bottleneck node of ATM networks is considered. The virtual queue mechanism and the method of proportion-integral-differential(PID) control are adopted in the congestion control. The sufficient condition of ...The single bottleneck node of ATM networks is considered. The virtual queue mechanism and the method of proportion-integral-differential(PID) control are adopted in the congestion control. The sufficient condition of the considered system’s stability is given. The method of determining the PID parameters is given further. To quicken the speed of startup and remove the congestion rapidly, the factors of increase and decrease are set according to the length of queue. The result of simulation shows that the system, given an appropriate group of parameters, can acquire good robustness and dynamic performance, and guarantees the quality of service at the same time.展开更多
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2...In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.展开更多
This year,the number college graduates in China surpassed tens of millions for the first time.The employment rate of fresh graduates has been concerning.In view of this,network entrepreneurship has become an important...This year,the number college graduates in China surpassed tens of millions for the first time.The employment rate of fresh graduates has been concerning.In view of this,network entrepreneurship has become an important channel and platform to solve the problem of college students’employment.The government,society and universities has been actively encouraging college students'network entrepreneurship as the value of college students'network entrepreneurship is significant.This paper analyzes the current situation of college students'network entrepreneurship and the problems faced through the survey data and thus suggests corresponding countermeasures.展开更多
As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model...As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model that makes full use of the gate recurrent unit(GRU)algorithm.Based on the fragmentation prediction model,one virtual optical network mapping scheme is presented for edge computing driven EON.With the minimum of fragmentation degree all over the whole EON,the virtual network mapping can be successively conducted.Test results show that the proposed approach can reduce blocking rate,and the supporting ability for virtual optical network services is greatly improved.展开更多
The geometric characteristics of fractures within a rock mass can be inferred by the data sampling from boreholes or exposed surfaces.Recently,the universal elliptical disc(UED)model was developed to represent natural...The geometric characteristics of fractures within a rock mass can be inferred by the data sampling from boreholes or exposed surfaces.Recently,the universal elliptical disc(UED)model was developed to represent natural fractures,where the fracture is assumed to be an elliptical disc and the fracture orientation,rotation angle,length of the long axis and ratio of short-long axis lengths are considered as variables.This paper aims to estimate the fracture size-and azimuth-related parameters in the UED model based on the trace information from sampling windows.The stereological relationship between the trace length,size-and azimuth-related parameters of the UED model was established,and the formulae of the mean value and standard deviation of trace length were proposed.The proposed formulae were validated via the Monte Carlo simulations with less than 5%of error rate between the calculated and true values.With respect to the estimation of the size-and azimuth-related parameters using the trace length,an optimization method was developed based on the pre-assumed size and azimuth distribution forms.A hypothetical case study was designed to illustrate and verify the parameter estimation method,where three combinations of the sampling windows were used to estimate the parameters,and the results showed that the estimated values could agree well with the true values.Furthermore,a hypothetical three-dimensional(3D)elliptical fracture network was constructed,and the circular disc,non-UED and UED models were used to represent it.The simulated trace information from different models was compared,and the results clearly illustrated the superiority of the proposed UED model over the existing circular disc and non-UED models。展开更多
Edge intelligence brings the deployment of applied deep learning(DL)models in edge computing systems to alleviate the core backbone network congestions.The setup of programmable software-defined networking(SDN)control...Edge intelligence brings the deployment of applied deep learning(DL)models in edge computing systems to alleviate the core backbone network congestions.The setup of programmable software-defined networking(SDN)control and elastic virtual computing resources within network functions virtualization(NFV)are cooperative for enhancing the applicability of intelligent edge softwarization.To offer advancement for multi-dimensional model task offloading in edge networks with SDN/NFV-based control softwarization,this study proposes a DL mechanism to recommend the optimal edge node selection with primary features of congestion windows,link delays,and allocatable bandwidth capacities.Adaptive partial task offloading policy considered the DL-based recommendation to modify efficient virtual resource placement for minimizing the completion time and termination drop ratio.The optimization problem of resource placement is tackled by a deep reinforcement learning(DRL)-based policy following the Markov decision process(MDP).The agent observes the state spaces and applies value-maximized action of available computation resources and adjustable resource allocation steps.The reward formulation primarily considers taskrequired computing resources and action-applied allocation properties.With defined policies of resource determination,the orchestration procedure is configured within each virtual network function(VNF)descriptor using topology and orchestration specification for cloud applications(TOSCA)by specifying the allocated properties.The simulation for the control rule installation is conducted using Mininet and Ryu SDN controller.Average delay and task delivery/drop ratios are used as the key performance metrics.展开更多
The Metaverse of Dream of the Red Chamber has a natural fit with Unity + Socket.IO, both in virtual space and functional design. Using Unity, you can generate and build the foundation of the Metaverse of Dream of the ...The Metaverse of Dream of the Red Chamber has a natural fit with Unity + Socket.IO, both in virtual space and functional design. Using Unity, you can generate and build the foundation of the Metaverse of Dream of the Red Chamber: virtual reality, including real-time dynamic internal generation and external loading of virtual characters, scenes, and various other elements, and can achieve various controls over these elements without delay. The Metaverse space built by Unity has full immersion and diversity;Socket.IO realizes Internet connection, Unity C# script creates Socket.IO client, Unity + Socket.IO connection realizes interpersonal communication, thus jointly realizing digital identity management in the Metaverse of Dream of the Red Chamber. Including virtual identity registration, Unity to achieve login authentication, digital avatar unique distribution;jointly create a network social space including games, business transactions, friends and entertainment, and provide corresponding safety information management for it, which is enough to reflect the special code of conduct and civilization ecology in the Metaverse. In short, Unity + Socket.IO can build a complete system of the Metaverse of Dream of the Red Chamber from the digital technology level.展开更多
Entangled porous metallic wire material(EPMWM)has the potential as a thermal insulation material in defence and engineering.In order to optimize its thermophysical properties at the design stage,it is of great signifi...Entangled porous metallic wire material(EPMWM)has the potential as a thermal insulation material in defence and engineering.In order to optimize its thermophysical properties at the design stage,it is of great significance to reveal the thermal response mechanism of EPMWM based on its complex structural effects.In the present work,virtual manufacturing technology(VMT)was developed to restore the physics-based 3D model of EPMWM.On this basis,the transient thermal analysis is carried out to explore the contact-relevant thermal behavior of EPMWM,and then the spiral unit containing unique structural information are further extracted and counted.In particular,the thermal resistance network is numerically constructed based on the spiral unit through the thermoelectric analogy method to accurately predict the effective thermal conductivity(ETC)of EPMWM.Finally,the thermal diffusivity and specific heat of the samples were obtained by the laser thermal analyzer to calculate the ETC and thermal insulation factor of interest.The results show that the ETC of EPMWM increases with increasing temperature or reducing density under the experimental conditions.The numerical prediction is consistent with the experimental result and the average error is less than 4%.展开更多
The unique ways of information organization and dissemination was examined through the microblog and the real-name social network as the representatives of the new virtual social networks. In order to discuss the inte...The unique ways of information organization and dissemination was examined through the microblog and the real-name social network as the representatives of the new virtual social networks. In order to discuss the interrelation and interaction of the two dimensions-topic and user, a supernetwork model was established based on the supernetwork research method. Through the actual data, a supernetwork topology diagram and the changing rule of user participation were attained. And it was concluded that the key factor of dealing with emergent online public sentiment should start with affecting the opinions of key figures, whose opinions would further affect the public opinions.展开更多
基金This work was funded by the Deanship of Scientific Research at Jouf University under Grant Number(DSR2022-RG-0102).
文摘Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.
文摘In this paper,an intelligent control method applying on numerical virtual flight is proposed.The proposed algorithm is verified and evaluated by combining with the case of the basic finner projectile model and shows a good application prospect.Firstly,a numerical virtual flight simulation model based on overlapping dynamic mesh technology is constructed.In order to verify the accuracy of the dynamic grid technology and the calculation of unsteady flow,a numerical simulation of the basic finner projectile without control is carried out.The simulation results are in good agreement with the experiment data which shows that the algorithm used in this paper can also be used in the design and evaluation of the intelligent controller in the numerical virtual flight simulation.Secondly,combined with the real-time control requirements of aerodynamic,attitude and displacement parameters of the projectile during the flight process,the numerical simulations of the basic finner projectile’s pitch channel are carried out under the traditional PID(Proportional-Integral-Derivative)control strategy and the intelligent PID control strategy respectively.The intelligent PID controller based on BP(Back Propagation)neural network can realize online learning and self-optimization of control parameters according to the acquired real-time flight parameters.Compared with the traditional PID controller,the concerned control variable overshoot,rise time,transition time and steady state error and other performance indicators have been greatly improved,and the higher the learning efficiency or the inertia coefficient,the faster the system,the larger the overshoot,and the smaller the stability error.The intelligent control method applying on numerical virtual flight is capable of solving the complicated unsteady motion and flow with the intelligent PID control strategy and has a strong promotion to engineering application.
文摘With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to respond to the growing demand of users.This rapid evolution has given the operators to adapt,their methods to the new technologies that increase.This complexity becomes more important,when these networks include several technologies to access different from the heterogeneous network like in the 4G network.The dimensional new challenges tell the application and the considerable increase in demand for services and the compatibility with existing networks,the management of mobility intercellular of users and it offers a better quality of services.Thus,the proposed solution to meet these new requirements is the sizing of the EPC(Evolved Packet Core)core network to support the 5G access network.For the case of Orange Guinea,this involves setting up an architecture for interconnecting the core networks of Sonfonia and Camayenne.The objectives of our work are of two orders:(1)to propose these solutions and recommendations for the heart network EPC sizing and the deployment to be adopted;(2)supply and architectural interconnection in the heart network EPC and an existing heart network.In our work,the model of traffic in communication that we use to calculate the traffic generated with each technology has link in the network of the heart.
文摘With the rapid development of the Internet,the network ideology of colleges and universities is facing severe challenges.This paper deeply analyzes the root of the risk of network ideology and makes a specific investigation of the status quo of network public opinion in colleges and universities.On this basis,the study explores and puts forward a series of targeted risk prevention and resolution strategies,aiming at providing a systematic solution for the network ideology security of colleges and universities.In this paper,with the combination of theory and practice as the path,we verify the effectiveness and applicability of the proposed strategy through the analysis of the implementation effect of the strategy.This study also provides theoretical support and practical guidance for the prevention and control of ideological risks and public opinion guidance in universities under the network environment,which has important practical significance.With the continuous progress of network technology,the threats to the network ideology of colleges and universities are increasing.For example,the spread of false information has become a serious problem affecting the security of college network ideology.
基金supported by the Natural Science Foundation of Sichuan Province of China,Nos.2022NSFSC1545 (to YG),2022NSFSC1387 (to ZF)the Natural Science Foundation of Chongqing of China,Nos.CSTB2022NSCQ-LZX0038,cstc2021ycjh-bgzxm0035 (both to XT)+3 种基金the National Natural Science Foundation of China,No.82001378 (to XT)the Joint Project of Chongqing Health Commission and Science and Technology Bureau,No.2023QNXM009 (to XT)the Science and Technology Research Program of Chongqing Education Commission of China,No.KJQN202200435 (to XT)the Chongqing Talents:Exceptional Young Talents Project,No.CQYC202005014 (to XT)。
文摘Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal discharges.Gaining more detailed information on brain network alterations can help us to further understand the mechanisms of epilepsy and pave the way for brain network-based precise therapeutic approaches in clinical practice.An increasing number of advanced neuroimaging techniques and electrophysiological techniques such as diffusion tensor imaging-based fiber tra ctography,diffusion kurtosis imaging-based fiber tractography,fiber ball imagingbased tra ctography,electroencephalography,functional magnetic resonance imaging,magnetoencephalography,positron emission tomography,molecular imaging,and functional ultrasound imaging have been extensively used to delineate epileptic networks.In this review,we summarize the relevant neuroimaging and neuroelectrophysiological techniques for assessing structural and functional brain networks in patients with epilepsy,and extensively analyze the imaging mechanisms,advantages,limitations,and clinical application ranges of each technique.A greater focus on emerging advanced technologies,new data analysis software,a combination of multiple techniques,and the construction of personalized virtual epilepsy models can provide a theoretical basis to better understand the brain network mechanisms of epilepsy and make surgical decisions.
文摘In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.
基金supported by The National Basic Research Program of China (973) (Grant No. 2012CB315901, 2013CB329104)The National Natural Science Foundation of China (Grant No. 61521003, 61372121, 61309019, 61572519, 61502530)The National High Technology Research and Development Program of China (863) (Grant No. 2015AA016102)
文摘To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middleboxes into software-based virtualized function entities.Due to the demands of virtual services placement in NFV network environment, this paper models the service amount placement problem involving with the resources allocation as a cooperative game and proposes the placement policy by Nash Bargaining Solution(NBS). Specifically,we first introduce the system overview and apply the rigorous cooperative game-theoretic guide to build the mathematical model, which can give consideration to both the responding efficiency of service requirements and the allocation fairness.Then a distributed algorithm corresponding to NBS is designed to achieve predictable network performance for virtual instances placement.Finally, with simulations under various scenarios,the results show that our placement approach can achieve high utilization of network through the analysis of evaluation metrics namely the satisfaction degree and fairness index. With the suitable demand amount of services, the average values of two metrics can reach above 90%. And by tuning the base placement, our solution can enable operators to flexibly balance the tradeoff between satisfaction and fairness of resourcessharing in service platforms.
文摘5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances.
基金supported in part by the grant from the National Natural Science Foundation of China (60973129)
文摘Software-defined networks (SDN) have attracted much attention recently because of their flexibility in terms of network management. Increasingly, SDN is being introduced into wireless networks to form wireless SDN. One enabling technology for wireless SDN is network virtualization, which logically divides one wireless network element, such as a base station, into multiple slices, and each slice serving as a standalone virtual BS. In this way, one physical mobile wireless network can be partitioned into multiple virtual networks in a software-defined manner. Wireless virtual networks comprising virtual base stations also need to provide QoS to mobile end-user services in the same context as their physical hosting networks. One key QoS parameter is delay. This paper presents a delay model for software-defined wireless virtual networks. Network calculus is used in the modelling. In particular, stochastic network calculus, which describes more realistic models than deterministic network calculus, is used. The model enables theoretical investigation of wireless SDN, which is largely dominated by either algorithms or prototype implementations.
文摘The factual data on error of positioning in VRS GPS networks have been analyzed, where the mobile receiver is provided with VRS. The method of highly informative zone is suggested for removal of initial vagueness in selection of reference stations for purposes of development of VRS on the basis of minimum GPS network, composed of three reference stations. The recommendations on use of suggested method are given.
文摘People create network virtual space that is completely different from the real space through network information technologies.The characteristics of network virtual space are that the subject can obtain a similar real space experience.From the perspective of phenomenology of technics,in order to analyze the virtual space of the network,it is necessary to clear the phenomenological concepts,such as space,space experience,and virtual space experience,so as to know the type of network virtual space experience,explore the essential characteristics,and find solutions to the ethical conflicts in the virtual space experience of the network.
基金Supported by the National Natural Foundation of China (No.60174010 and No.60404022) and the Key Scientific Research Project of the Education Ministry of China (No.204014)
文摘The single bottleneck node of ATM networks is considered. The virtual queue mechanism and the method of proportion-integral-differential(PID) control are adopted in the congestion control. The sufficient condition of the considered system’s stability is given. The method of determining the PID parameters is given further. To quicken the speed of startup and remove the congestion rapidly, the factors of increase and decrease are set according to the length of queue. The result of simulation shows that the system, given an appropriate group of parameters, can acquire good robustness and dynamic performance, and guarantees the quality of service at the same time.
文摘In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.
基金Guangzhou Huashang College 2022 Innovation and Entrepreneurship Education Research Project“Research on the Influencing Factors of College Students’Network Entrepreneurship Intention Based on TPB Model”(Project Number:HS2022CXCY04)。
文摘This year,the number college graduates in China surpassed tens of millions for the first time.The employment rate of fresh graduates has been concerning.In view of this,network entrepreneurship has become an important channel and platform to solve the problem of college students’employment.The government,society and universities has been actively encouraging college students'network entrepreneurship as the value of college students'network entrepreneurship is significant.This paper analyzes the current situation of college students'network entrepreneurship and the problems faced through the survey data and thus suggests corresponding countermeasures.
基金Supported by the National Key Research and Development Program of China(No.2021YFB2401204)。
文摘As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model that makes full use of the gate recurrent unit(GRU)algorithm.Based on the fragmentation prediction model,one virtual optical network mapping scheme is presented for edge computing driven EON.With the minimum of fragmentation degree all over the whole EON,the virtual network mapping can be successively conducted.Test results show that the proposed approach can reduce blocking rate,and the supporting ability for virtual optical network services is greatly improved.
基金funded by National Natural Science Foundation of China(Grant No.41972264)Zhejiang Provincial Natural Science Foundation of China(Grant No.LR22E080002)the Observation and Research Station of Geohazards in Zhejiang,Ministry of Natural Resources,China(Grant No.ZJDZGCZ-2021).
文摘The geometric characteristics of fractures within a rock mass can be inferred by the data sampling from boreholes or exposed surfaces.Recently,the universal elliptical disc(UED)model was developed to represent natural fractures,where the fracture is assumed to be an elliptical disc and the fracture orientation,rotation angle,length of the long axis and ratio of short-long axis lengths are considered as variables.This paper aims to estimate the fracture size-and azimuth-related parameters in the UED model based on the trace information from sampling windows.The stereological relationship between the trace length,size-and azimuth-related parameters of the UED model was established,and the formulae of the mean value and standard deviation of trace length were proposed.The proposed formulae were validated via the Monte Carlo simulations with less than 5%of error rate between the calculated and true values.With respect to the estimation of the size-and azimuth-related parameters using the trace length,an optimization method was developed based on the pre-assumed size and azimuth distribution forms.A hypothetical case study was designed to illustrate and verify the parameter estimation method,where three combinations of the sampling windows were used to estimate the parameters,and the results showed that the estimated values could agree well with the true values.Furthermore,a hypothetical three-dimensional(3D)elliptical fracture network was constructed,and the circular disc,non-UED and UED models were used to represent it.The simulated trace information from different models was compared,and the results clearly illustrated the superiority of the proposed UED model over the existing circular disc and non-UED models。
基金This work was funded by BK21 FOUR(Fostering Outstanding Universities for Research)(No.5199990914048)this research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(NRF-2020R1I1A3066543).In addition,this work was supported by the Soonchunhyang University Research Fund.
文摘Edge intelligence brings the deployment of applied deep learning(DL)models in edge computing systems to alleviate the core backbone network congestions.The setup of programmable software-defined networking(SDN)control and elastic virtual computing resources within network functions virtualization(NFV)are cooperative for enhancing the applicability of intelligent edge softwarization.To offer advancement for multi-dimensional model task offloading in edge networks with SDN/NFV-based control softwarization,this study proposes a DL mechanism to recommend the optimal edge node selection with primary features of congestion windows,link delays,and allocatable bandwidth capacities.Adaptive partial task offloading policy considered the DL-based recommendation to modify efficient virtual resource placement for minimizing the completion time and termination drop ratio.The optimization problem of resource placement is tackled by a deep reinforcement learning(DRL)-based policy following the Markov decision process(MDP).The agent observes the state spaces and applies value-maximized action of available computation resources and adjustable resource allocation steps.The reward formulation primarily considers taskrequired computing resources and action-applied allocation properties.With defined policies of resource determination,the orchestration procedure is configured within each virtual network function(VNF)descriptor using topology and orchestration specification for cloud applications(TOSCA)by specifying the allocated properties.The simulation for the control rule installation is conducted using Mininet and Ryu SDN controller.Average delay and task delivery/drop ratios are used as the key performance metrics.
文摘The Metaverse of Dream of the Red Chamber has a natural fit with Unity + Socket.IO, both in virtual space and functional design. Using Unity, you can generate and build the foundation of the Metaverse of Dream of the Red Chamber: virtual reality, including real-time dynamic internal generation and external loading of virtual characters, scenes, and various other elements, and can achieve various controls over these elements without delay. The Metaverse space built by Unity has full immersion and diversity;Socket.IO realizes Internet connection, Unity C# script creates Socket.IO client, Unity + Socket.IO connection realizes interpersonal communication, thus jointly realizing digital identity management in the Metaverse of Dream of the Red Chamber. Including virtual identity registration, Unity to achieve login authentication, digital avatar unique distribution;jointly create a network social space including games, business transactions, friends and entertainment, and provide corresponding safety information management for it, which is enough to reflect the special code of conduct and civilization ecology in the Metaverse. In short, Unity + Socket.IO can build a complete system of the Metaverse of Dream of the Red Chamber from the digital technology level.
基金National Natural Science Foundation of China(Grant Nos.52175162,51805086 and 51975123)Natural Science Foundation of Fujian Province,China(Grant No.2019J01210)Health Education Joint Project of Fujian Province,China(Grant No.2019-WJ-01).
文摘Entangled porous metallic wire material(EPMWM)has the potential as a thermal insulation material in defence and engineering.In order to optimize its thermophysical properties at the design stage,it is of great significance to reveal the thermal response mechanism of EPMWM based on its complex structural effects.In the present work,virtual manufacturing technology(VMT)was developed to restore the physics-based 3D model of EPMWM.On this basis,the transient thermal analysis is carried out to explore the contact-relevant thermal behavior of EPMWM,and then the spiral unit containing unique structural information are further extracted and counted.In particular,the thermal resistance network is numerically constructed based on the spiral unit through the thermoelectric analogy method to accurately predict the effective thermal conductivity(ETC)of EPMWM.Finally,the thermal diffusivity and specific heat of the samples were obtained by the laser thermal analyzer to calculate the ETC and thermal insulation factor of interest.The results show that the ETC of EPMWM increases with increasing temperature or reducing density under the experimental conditions.The numerical prediction is consistent with the experimental result and the average error is less than 4%.
基金National Natural Science Foundation of China (No. 71071098)
文摘The unique ways of information organization and dissemination was examined through the microblog and the real-name social network as the representatives of the new virtual social networks. In order to discuss the interrelation and interaction of the two dimensions-topic and user, a supernetwork model was established based on the supernetwork research method. Through the actual data, a supernetwork topology diagram and the changing rule of user participation were attained. And it was concluded that the key factor of dealing with emergent online public sentiment should start with affecting the opinions of key figures, whose opinions would further affect the public opinions.