期刊文献+
共找到13,606篇文章
< 1 2 250 >
每页显示 20 50 100
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques
1
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
下载PDF
An intelligent control method based on artificial neural network for numerical flight simulation of the basic finner projectile with pitching maneuver
2
作者 Yiming Liang Guangning Li +3 位作者 Min Xu Junmin Zhao Feng Hao Hongbo Shi 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期663-674,共12页
In this paper,an intelligent control method applying on numerical virtual flight is proposed.The proposed algorithm is verified and evaluated by combining with the case of the basic finner projectile model and shows a... In this paper,an intelligent control method applying on numerical virtual flight is proposed.The proposed algorithm is verified and evaluated by combining with the case of the basic finner projectile model and shows a good application prospect.Firstly,a numerical virtual flight simulation model based on overlapping dynamic mesh technology is constructed.In order to verify the accuracy of the dynamic grid technology and the calculation of unsteady flow,a numerical simulation of the basic finner projectile without control is carried out.The simulation results are in good agreement with the experiment data which shows that the algorithm used in this paper can also be used in the design and evaluation of the intelligent controller in the numerical virtual flight simulation.Secondly,combined with the real-time control requirements of aerodynamic,attitude and displacement parameters of the projectile during the flight process,the numerical simulations of the basic finner projectile’s pitch channel are carried out under the traditional PID(Proportional-Integral-Derivative)control strategy and the intelligent PID control strategy respectively.The intelligent PID controller based on BP(Back Propagation)neural network can realize online learning and self-optimization of control parameters according to the acquired real-time flight parameters.Compared with the traditional PID controller,the concerned control variable overshoot,rise time,transition time and steady state error and other performance indicators have been greatly improved,and the higher the learning efficiency or the inertia coefficient,the faster the system,the larger the overshoot,and the smaller the stability error.The intelligent control method applying on numerical virtual flight is capable of solving the complicated unsteady motion and flow with the intelligent PID control strategy and has a strong promotion to engineering application. 展开更多
关键词 Numerical virtual flight Intelligent control BP neural network PID Moving chimera grid
下载PDF
Design of an Interconnection Architecture and Sizing of Two (2) EPC Core Networks: The Case of Orange-Guinea
3
作者 Mamadou Sadigou Diallo Kadiatou Aissatou Barry +4 位作者 Amadou Lamarana Bah Mamadou Sanoussy Camara Janvier Fotsing Amadou Barry Amadou Oury Bah 《Journal of Energy and Power Engineering》 CAS 2024年第2期59-70,共12页
With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to res... With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to respond to the growing demand of users.This rapid evolution has given the operators to adapt,their methods to the new technologies that increase.This complexity becomes more important,when these networks include several technologies to access different from the heterogeneous network like in the 4G network.The dimensional new challenges tell the application and the considerable increase in demand for services and the compatibility with existing networks,the management of mobility intercellular of users and it offers a better quality of services.Thus,the proposed solution to meet these new requirements is the sizing of the EPC(Evolved Packet Core)core network to support the 5G access network.For the case of Orange Guinea,this involves setting up an architecture for interconnecting the core networks of Sonfonia and Camayenne.The objectives of our work are of two orders:(1)to propose these solutions and recommendations for the heart network EPC sizing and the deployment to be adopted;(2)supply and architectural interconnection in the heart network EPC and an existing heart network.In our work,the model of traffic in communication that we use to calculate the traffic generated with each technology has link in the network of the heart. 展开更多
关键词 5G network 4G network(EPS(evolved packet system)) 3G network(UMTS:Universal Mobile Telecommunications System) EPC network of the heart architecture dimensional Orange Guinea technology service
下载PDF
Research on Risk Prevention and Resolution Strategies of College Network Ideology in the Context of the Internet
4
作者 Feifei Huang 《Journal of Contemporary Educational Research》 2024年第5期85-90,共6页
With the rapid development of the Internet,the network ideology of colleges and universities is facing severe challenges.This paper deeply analyzes the root of the risk of network ideology and makes a specific investi... With the rapid development of the Internet,the network ideology of colleges and universities is facing severe challenges.This paper deeply analyzes the root of the risk of network ideology and makes a specific investigation of the status quo of network public opinion in colleges and universities.On this basis,the study explores and puts forward a series of targeted risk prevention and resolution strategies,aiming at providing a systematic solution for the network ideology security of colleges and universities.In this paper,with the combination of theory and practice as the path,we verify the effectiveness and applicability of the proposed strategy through the analysis of the implementation effect of the strategy.This study also provides theoretical support and practical guidance for the prevention and control of ideological risks and public opinion guidance in universities under the network environment,which has important practical significance.With the continuous progress of network technology,the threats to the network ideology of colleges and universities are increasing.For example,the spread of false information has become a serious problem affecting the security of college network ideology. 展开更多
关键词 network ideology Colleges and universities Risk prevention Public opinion management Resolution strategy theory and practice
下载PDF
Epileptic brain network mechanisms and neuroimaging techniques for the brain network
5
作者 Yi Guo Zhonghua Lin +1 位作者 Zhen Fan Xin Tian 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第12期2637-2648,共12页
Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal d... Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal discharges.Gaining more detailed information on brain network alterations can help us to further understand the mechanisms of epilepsy and pave the way for brain network-based precise therapeutic approaches in clinical practice.An increasing number of advanced neuroimaging techniques and electrophysiological techniques such as diffusion tensor imaging-based fiber tra ctography,diffusion kurtosis imaging-based fiber tractography,fiber ball imagingbased tra ctography,electroencephalography,functional magnetic resonance imaging,magnetoencephalography,positron emission tomography,molecular imaging,and functional ultrasound imaging have been extensively used to delineate epileptic networks.In this review,we summarize the relevant neuroimaging and neuroelectrophysiological techniques for assessing structural and functional brain networks in patients with epilepsy,and extensively analyze the imaging mechanisms,advantages,limitations,and clinical application ranges of each technique.A greater focus on emerging advanced technologies,new data analysis software,a combination of multiple techniques,and the construction of personalized virtual epilepsy models can provide a theoretical basis to better understand the brain network mechanisms of epilepsy and make surgical decisions. 展开更多
关键词 electrophysiological techniques EPILEPSY functional brain network functional magnetic resonance imaging functional near-infrared spectroscopy machine leaning molecular imaging neuroimaging techniques structural brain network virtual epileptic models
下载PDF
Research on College Network Information Security Protection in the Digital Economy Era
6
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges network information security Protection status COUNTERMEASURES
下载PDF
Using the Cooperative Game for Service Placement of Virtual Network Functions 被引量:1
7
作者 XIONG Gang HU Yuxiang +1 位作者 WANG Weiming WANG Lingqiang 《China Communications》 SCIE CSCD 2016年第S1期146-157,共12页
To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middl... To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middleboxes into software-based virtualized function entities.Due to the demands of virtual services placement in NFV network environment, this paper models the service amount placement problem involving with the resources allocation as a cooperative game and proposes the placement policy by Nash Bargaining Solution(NBS). Specifically,we first introduce the system overview and apply the rigorous cooperative game-theoretic guide to build the mathematical model, which can give consideration to both the responding efficiency of service requirements and the allocation fairness.Then a distributed algorithm corresponding to NBS is designed to achieve predictable network performance for virtual instances placement.Finally, with simulations under various scenarios,the results show that our placement approach can achieve high utilization of network through the analysis of evaluation metrics namely the satisfaction degree and fairness index. With the suitable demand amount of services, the average values of two metrics can reach above 90%. And by tuning the base placement, our solution can enable operators to flexibly balance the tradeoff between satisfaction and fairness of resourcessharing in service platforms. 展开更多
关键词 Middlebox GAME theory network FUNCTION virtualIZATION SofTWARE defined networkING
下载PDF
A Review in the Core Technologies of 5G: Device-to-Device Communication, Multi-Access Edge Computing and Network Function Virtualization 被引量:2
8
作者 Ruixuan Tu Ruxun Xiang +1 位作者 Yang Xu Yihan Mei 《International Journal of Communications, Network and System Sciences》 2019年第9期125-150,共26页
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ... 5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances. 展开更多
关键词 5th Generation network virtualIZATION Device-To-Device COMMUNICATION Base STATION Direct COMMUNICATION INTERFERENCE Multi-Access EDGE COMPUTING Mobile EDGE COMPUTING
下载PDF
Virtualized Wireless SDNs:Modelling Delay Through the Use of Stochastic Network Calculus 被引量:1
9
作者 Lianming Zhang Jia Liu Kun Yang 《ZTE Communications》 2014年第2期50-56,共7页
Software-defined networks (SDN) have attracted much attention recently because of their flexibility in terms of network management. Increasingly, SDN is being introduced into wireless networks to form wireless SDN. ... Software-defined networks (SDN) have attracted much attention recently because of their flexibility in terms of network management. Increasingly, SDN is being introduced into wireless networks to form wireless SDN. One enabling technology for wireless SDN is network virtualization, which logically divides one wireless network element, such as a base station, into multiple slices, and each slice serving as a standalone virtual BS. In this way, one physical mobile wireless network can be partitioned into multiple virtual networks in a software-defined manner. Wireless virtual networks comprising virtual base stations also need to provide QoS to mobile end-user services in the same context as their physical hosting networks. One key QoS parameter is delay. This paper presents a delay model for software-defined wireless virtual networks. Network calculus is used in the modelling. In particular, stochastic network calculus, which describes more realistic models than deterministic network calculus, is used. The model enables theoretical investigation of wireless SDN, which is largely dominated by either algorithms or prototype implementations. 展开更多
关键词 wireless software defined networks (SDN) wireless network virtualization QoS modelling upper bound delay stochastic networkcalculus
下载PDF
Development of Virtual Reference Station in Kinematic Schemes of Geodetic GPS Network Using the Method of Maximum Informative Zone
10
作者 Arif Shafayat Mehdiyev Ramiz Ahmed Eminov Hikmat Hamid Asadov 《Positioning》 2013年第4期267-270,共4页
The factual data on error of positioning in VRS GPS networks have been analyzed, where the mobile receiver is provided with VRS. The method of highly informative zone is suggested for removal of initial vagueness in s... The factual data on error of positioning in VRS GPS networks have been analyzed, where the mobile receiver is provided with VRS. The method of highly informative zone is suggested for removal of initial vagueness in selection of reference stations for purposes of development of VRS on the basis of minimum GPS network, composed of three reference stations. The recommendations on use of suggested method are given. 展开更多
关键词 GPS Receiver virtual Reference STATION KINEMATIC SCHEMES POSITIONING GEODETIC network
下载PDF
Reflections on the Experience of Network Virtual Space FromPhenomenology of Technics
11
作者 MA Wen-wu 《Journal of Philosophy Study》 2019年第10期610-615,共6页
People create network virtual space that is completely different from the real space through network information technologies.The characteristics of network virtual space are that the subject can obtain a similar real... People create network virtual space that is completely different from the real space through network information technologies.The characteristics of network virtual space are that the subject can obtain a similar real space experience.From the perspective of phenomenology of technics,in order to analyze the virtual space of the network,it is necessary to clear the phenomenological concepts,such as space,space experience,and virtual space experience,so as to know the type of network virtual space experience,explore the essential characteristics,and find solutions to the ethical conflicts in the virtual space experience of the network. 展开更多
关键词 the experience of network virtual space phenomenology of technics Don Ihde ethical conflicts and countermeasures
下载PDF
Design of ATM Networks Congestion Controller Based on the Virtual Queue
12
作者 刘志新 关新平 龙承念 《Journal of Electronic Science and Technology of China》 2004年第4期47-52,共6页
The single bottleneck node of ATM networks is considered. The virtual queue mechanism and the method of proportion-integral-differential(PID) control are adopted in the congestion control. The sufficient condition of ... The single bottleneck node of ATM networks is considered. The virtual queue mechanism and the method of proportion-integral-differential(PID) control are adopted in the congestion control. The sufficient condition of the considered system’s stability is given. The method of determining the PID parameters is given further. To quicken the speed of startup and remove the congestion rapidly, the factors of increase and decrease are set according to the length of queue. The result of simulation shows that the system, given an appropriate group of parameters, can acquire good robustness and dynamic performance, and guarantees the quality of service at the same time. 展开更多
关键词 ATM networks virtual queue PID congestion control sufficient condition
下载PDF
A Research on the Application of Virtual Network Technology in Computer Network Security
13
作者 Kun Qi 《Journal of Electronic Research and Application》 2022年第4期1-6,共6页
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2... In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference. 展开更多
关键词 virtual network technology Computer network security Application research
下载PDF
Investigation and Analysis on the Status Quo of College Students’Network Entrepreneurship in Private University
14
作者 Shaohong Chen Chao Zhang Lingling Dai 《Journal of Contemporary Educational Research》 2022年第8期81-90,共10页
This year,the number college graduates in China surpassed tens of millions for the first time.The employment rate of fresh graduates has been concerning.In view of this,network entrepreneurship has become an important... This year,the number college graduates in China surpassed tens of millions for the first time.The employment rate of fresh graduates has been concerning.In view of this,network entrepreneurship has become an important channel and platform to solve the problem of college students’employment.The government,society and universities has been actively encouraging college students'network entrepreneurship as the value of college students'network entrepreneurship is significant.This paper analyzes the current situation of college students'network entrepreneurship and the problems faced through the survey data and thus suggests corresponding countermeasures. 展开更多
关键词 Private university College students network entrepreneurship Suggestions
下载PDF
Edge computing oriented virtual optical network mapping scheme based on fragmentation prediction
15
作者 何烁 BAI Huifeng +1 位作者 HUO Chao ZHANG Ganghong 《High Technology Letters》 EI CAS 2024年第2期158-163,共6页
As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model... As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model that makes full use of the gate recurrent unit(GRU)algorithm.Based on the fragmentation prediction model,one virtual optical network mapping scheme is presented for edge computing driven EON.With the minimum of fragmentation degree all over the whole EON,the virtual network mapping can be successively conducted.Test results show that the proposed approach can reduce blocking rate,and the supporting ability for virtual optical network services is greatly improved. 展开更多
关键词 elastic optical networks virtual optical network fragmentation self-awareness edge computing
下载PDF
Estimation of fracture size and azimuth in the universal elliptical disc model based on trace information 被引量:3
16
作者 Jichao Guo Jun Zheng +1 位作者 Qing Lü Jianhui Deng 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2023年第6期1391-1405,共15页
The geometric characteristics of fractures within a rock mass can be inferred by the data sampling from boreholes or exposed surfaces.Recently,the universal elliptical disc(UED)model was developed to represent natural... The geometric characteristics of fractures within a rock mass can be inferred by the data sampling from boreholes or exposed surfaces.Recently,the universal elliptical disc(UED)model was developed to represent natural fractures,where the fracture is assumed to be an elliptical disc and the fracture orientation,rotation angle,length of the long axis and ratio of short-long axis lengths are considered as variables.This paper aims to estimate the fracture size-and azimuth-related parameters in the UED model based on the trace information from sampling windows.The stereological relationship between the trace length,size-and azimuth-related parameters of the UED model was established,and the formulae of the mean value and standard deviation of trace length were proposed.The proposed formulae were validated via the Monte Carlo simulations with less than 5%of error rate between the calculated and true values.With respect to the estimation of the size-and azimuth-related parameters using the trace length,an optimization method was developed based on the pre-assumed size and azimuth distribution forms.A hypothetical case study was designed to illustrate and verify the parameter estimation method,where three combinations of the sampling windows were used to estimate the parameters,and the results showed that the estimated values could agree well with the true values.Furthermore,a hypothetical three-dimensional(3D)elliptical fracture network was constructed,and the circular disc,non-UED and UED models were used to represent it.The simulated trace information from different models was compared,and the results clearly illustrated the superiority of the proposed UED model over the existing circular disc and non-UED models。 展开更多
关键词 Universal elliptical disc(UED)model Rock mass Discrete fracture network(DFN) Optimization algorithm Inverse problem
下载PDF
Adaptive Partial Task Offloading and Virtual Resource Placement in SDN/NFV-Based Network Softwarization
17
作者 Prohim Tam Sa Math Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2141-2154,共14页
Edge intelligence brings the deployment of applied deep learning(DL)models in edge computing systems to alleviate the core backbone network congestions.The setup of programmable software-defined networking(SDN)control... Edge intelligence brings the deployment of applied deep learning(DL)models in edge computing systems to alleviate the core backbone network congestions.The setup of programmable software-defined networking(SDN)control and elastic virtual computing resources within network functions virtualization(NFV)are cooperative for enhancing the applicability of intelligent edge softwarization.To offer advancement for multi-dimensional model task offloading in edge networks with SDN/NFV-based control softwarization,this study proposes a DL mechanism to recommend the optimal edge node selection with primary features of congestion windows,link delays,and allocatable bandwidth capacities.Adaptive partial task offloading policy considered the DL-based recommendation to modify efficient virtual resource placement for minimizing the completion time and termination drop ratio.The optimization problem of resource placement is tackled by a deep reinforcement learning(DRL)-based policy following the Markov decision process(MDP).The agent observes the state spaces and applies value-maximized action of available computation resources and adjustable resource allocation steps.The reward formulation primarily considers taskrequired computing resources and action-applied allocation properties.With defined policies of resource determination,the orchestration procedure is configured within each virtual network function(VNF)descriptor using topology and orchestration specification for cloud applications(TOSCA)by specifying the allocated properties.The simulation for the control rule installation is conducted using Mininet and Ryu SDN controller.Average delay and task delivery/drop ratios are used as the key performance metrics. 展开更多
关键词 Deep learning partial task offloading software-defined networking virtual machine virtual network functions
下载PDF
Based on Socket IO + Unity Building the Metaverse of Dream of the Red Chamber
18
作者 Ziqian Rong 《Intelligent Information Management》 2023年第6期426-441,共16页
The Metaverse of Dream of the Red Chamber has a natural fit with Unity + Socket.IO, both in virtual space and functional design. Using Unity, you can generate and build the foundation of the Metaverse of Dream of the ... The Metaverse of Dream of the Red Chamber has a natural fit with Unity + Socket.IO, both in virtual space and functional design. Using Unity, you can generate and build the foundation of the Metaverse of Dream of the Red Chamber: virtual reality, including real-time dynamic internal generation and external loading of virtual characters, scenes, and various other elements, and can achieve various controls over these elements without delay. The Metaverse space built by Unity has full immersion and diversity;Socket.IO realizes Internet connection, Unity C# script creates Socket.IO client, Unity + Socket.IO connection realizes interpersonal communication, thus jointly realizing digital identity management in the Metaverse of Dream of the Red Chamber. Including virtual identity registration, Unity to achieve login authentication, digital avatar unique distribution;jointly create a network social space including games, business transactions, friends and entertainment, and provide corresponding safety information management for it, which is enough to reflect the special code of conduct and civilization ecology in the Metaverse. In short, Unity + Socket.IO can build a complete system of the Metaverse of Dream of the Red Chamber from the digital technology level. 展开更多
关键词 Metaverse Features virtual Reality Digital Identity Digital Avatar Social network
下载PDF
Numerical and experimental evaluation for density-related thermal insulation capability of entangled porous metallic wire material
19
作者 Tao Zhou Rong-zheng Fang +3 位作者 Di Jia Pei Yang Zhi-ying Ren Hong-bai Bai 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第5期177-188,共12页
Entangled porous metallic wire material(EPMWM)has the potential as a thermal insulation material in defence and engineering.In order to optimize its thermophysical properties at the design stage,it is of great signifi... Entangled porous metallic wire material(EPMWM)has the potential as a thermal insulation material in defence and engineering.In order to optimize its thermophysical properties at the design stage,it is of great significance to reveal the thermal response mechanism of EPMWM based on its complex structural effects.In the present work,virtual manufacturing technology(VMT)was developed to restore the physics-based 3D model of EPMWM.On this basis,the transient thermal analysis is carried out to explore the contact-relevant thermal behavior of EPMWM,and then the spiral unit containing unique structural information are further extracted and counted.In particular,the thermal resistance network is numerically constructed based on the spiral unit through the thermoelectric analogy method to accurately predict the effective thermal conductivity(ETC)of EPMWM.Finally,the thermal diffusivity and specific heat of the samples were obtained by the laser thermal analyzer to calculate the ETC and thermal insulation factor of interest.The results show that the ETC of EPMWM increases with increasing temperature or reducing density under the experimental conditions.The numerical prediction is consistent with the experimental result and the average error is less than 4%. 展开更多
关键词 Entangled porous metallic wire material (EPMWM) virtual manufacturing technology(VMT) thermal resistance network Effective thermal conductivity(ETC) thermal insulation factor
下载PDF
The Supernetwork Model of Social Networking Services 被引量:4
20
作者 尚艳超 王恒山 王艳灵 《Journal of Donghua University(English Edition)》 EI CAS 2012年第1期37-39,共3页
The unique ways of information organization and dissemination was examined through the microblog and the real-name social network as the representatives of the new virtual social networks. In order to discuss the inte... The unique ways of information organization and dissemination was examined through the microblog and the real-name social network as the representatives of the new virtual social networks. In order to discuss the interrelation and interaction of the two dimensions-topic and user, a supernetwork model was established based on the supernetwork research method. Through the actual data, a supernetwork topology diagram and the changing rule of user participation were attained. And it was concluded that the key factor of dealing with emergent online public sentiment should start with affecting the opinions of key figures, whose opinions would further affect the public opinions. 展开更多
关键词 virtual community network SUPERnetwork HYPERGRAPH emergent online public sentiment
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部