期刊文献+
共找到528,415篇文章
< 1 2 250 >
每页显示 20 50 100
改进Deep Q Networks的交通信号均衡调度算法
1
作者 贺道坤 《机械设计与制造》 北大核心 2025年第4期135-140,共6页
为进一步缓解城市道路高峰时段十字路口的交通拥堵现象,实现路口各道路车流均衡通过,基于改进Deep Q Networks提出了一种的交通信号均衡调度算法。提取十字路口与交通信号调度最相关的特征,分别建立单向十字路口交通信号模型和线性双向... 为进一步缓解城市道路高峰时段十字路口的交通拥堵现象,实现路口各道路车流均衡通过,基于改进Deep Q Networks提出了一种的交通信号均衡调度算法。提取十字路口与交通信号调度最相关的特征,分别建立单向十字路口交通信号模型和线性双向十字路口交通信号模型,并基于此构建交通信号调度优化模型;针对Deep Q Networks算法在交通信号调度问题应用中所存在的收敛性、过估计等不足,对Deep Q Networks进行竞争网络改进、双网络改进以及梯度更新策略改进,提出相适应的均衡调度算法。通过与经典Deep Q Networks仿真比对,验证论文算法对交通信号调度问题的适用性和优越性。基于城市道路数据,分别针对两种场景进行仿真计算,仿真结果表明该算法能够有效缩减十字路口车辆排队长度,均衡各路口车流通行量,缓解高峰出行方向的道路拥堵现象,有利于十字路口交通信号调度效益的提升。 展开更多
关键词 交通信号调度 十字路口 Deep Q networks 深度强化学习 智能交通
在线阅读 下载PDF
Application of virtual reality technology improves the functionality of brain networks in individuals experiencing pain 被引量:2
2
作者 Takahiko Nagamine 《World Journal of Clinical Cases》 SCIE 2025年第3期66-68,共3页
Medical procedures are inherently invasive and carry the risk of inducing pain to the mind and body.Recently,efforts have been made to alleviate the discomfort associated with invasive medical procedures through the u... Medical procedures are inherently invasive and carry the risk of inducing pain to the mind and body.Recently,efforts have been made to alleviate the discomfort associated with invasive medical procedures through the use of virtual reality(VR)technology.VR has been demonstrated to be an effective treatment for pain associated with medical procedures,as well as for chronic pain conditions for which no effective treatment has been established.The precise mechanism by which the diversion from reality facilitated by VR contributes to the diminution of pain and anxiety has yet to be elucidated.However,the provision of positive images through VR-based visual stimulation may enhance the functionality of brain networks.The salience network is diminished,while the default mode network is enhanced.Additionally,the medial prefrontal cortex may establish a stronger connection with the default mode network,which could result in a reduction of pain and anxiety.Further research into the potential of VR technology to alleviate pain could lead to a reduction in the number of individuals who overdose on painkillers and contribute to positive change in the medical field. 展开更多
关键词 Virtual reality PAIN ANXIETY Salience network Default mode network
在线阅读 下载PDF
Adaptive control of parallel manipulators via fuzzy-neural network algorithm 被引量:3
3
作者 Dachang ZHU Yuefa FANG 《控制理论与应用(英文版)》 EI 2007年第3期295-300,共6页
This paper considers adaptive control of parallel manipulators combined with fuzzy-neural network algorithms (FNNA). With this algorithm, the robustness is guaranteed by the adaptive control law and the parametric u... This paper considers adaptive control of parallel manipulators combined with fuzzy-neural network algorithms (FNNA). With this algorithm, the robustness is guaranteed by the adaptive control law and the parametric uncertainties are eliminated. FNNA is used to handle model uncertainties and external disturbances. In the proposed control scheme, we consider modifying the weight of fuzzy rules and present these rules to a MIMO system of parallel manipulators with more than three degrees-of-freedom (DoF). The algorithm has the advantage of not requiring the inverse of the Jacobian matrix especially for the low DoF parallel manipulators. The validity of the control scheme is shown through numerical simulations of a 6-RPS parallel manipulator with three DoF. 展开更多
关键词 Parallel manipulator Adaptive control Fuzzy neural network algorithm SIMULATION
在线阅读 下载PDF
A Fuzzy-Neural Network Control of Nonlinear Dynamic Systems 被引量:2
4
作者 Li Shaoyuan & Xi Yugeng (Shanghai Jiaotong University, 200030, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2000年第1期61-66,共6页
In this paper, an adaptive dynamic control scheme based on a fuzzy neural network is presented, that presents utilizes both feed-forward and feedback controller elements. The former of the two elements comprises a neu... In this paper, an adaptive dynamic control scheme based on a fuzzy neural network is presented, that presents utilizes both feed-forward and feedback controller elements. The former of the two elements comprises a neural network with both identification and control role, and the latter is a fuzzy neural algorithm, which is introduced to provide additional control enhancement. The feedforward controller provides only coarse control, whereas the feedback controller can generate on-line conditional proposition rule automatically to improve the overall control action. These properties make the design very versatile and applicable to a range of industrial applications. 展开更多
关键词 Fuzzy logic Neural networks Adaptive control Nonlinear dynamic system.
在线阅读 下载PDF
Strategies for Optimizing Feed Rate of Fed-Batch Yeast Fermentation by Fuzzy-Neural Network 被引量:1
5
作者 苗志奇 元英进 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 1998年第4期62-69,共8页
In this paper,a novel fuzzy neural network model,in which an adjustable fuzzy sub-space was designed by uniform design,has been established and used in fed-batch yeast fermentationas an example.A brand-new optimizatio... In this paper,a novel fuzzy neural network model,in which an adjustable fuzzy sub-space was designed by uniform design,has been established and used in fed-batch yeast fermentationas an example.A brand-new optimization sub-network with special structure has been built andgenetic algorithm,guaranteeing the optimization in overall space,is introduced for the feed rateoptimization.On the basis of the model network,the optimal substrate concentration and theoptimal amount of fed-batch at different periods have been studied,aided with the optimizationnetwork and the genetic algorithm separately.The above results can be used as a basis for theestablishment of a fuzzy neural network controller. 展开更多
关键词 FUZZY NEURAL network optimization FED-BATCH FERMENTATION the GENETIC algorithm
在线阅读 下载PDF
Intelligent vehicle lateral controller design based on genetic algorithmand T-S fuzzy-neural network
6
作者 RuanJiuhong FuMengyin LiYibin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期382-387,共6页
Non-linearity and parameter time-variety are inherent properties of lateral motions of a vehicle. How to effectively control intelligent vehicle (IV) lateral motions is a challenging task. Controller design can be reg... Non-linearity and parameter time-variety are inherent properties of lateral motions of a vehicle. How to effectively control intelligent vehicle (IV) lateral motions is a challenging task. Controller design can be regarded as a process of searching optimal structure from controller structure space and searching optimal parameters from parameter space. Based on this view, an intelligent vehicle lateral motions controller was designed. The controller structure was constructed by T-S fuzzy-neural network (FNN). Its parameters were searched and selected with genetic algorithm (GA). The simulation results indicate that the controller designed has strong robustness, high precision and good ride quality, and it can effectively resolve IV lateral motion non-linearity and time-variant parameters problem. 展开更多
关键词 intelligent vehicle genetic algorithm fuzzy-neural network lateral control robustness.
在线阅读 下载PDF
Multi-Stage-Based Siamese Neural Network for Seal Image Recognition
7
作者 Jianfeng Lu Xiangye Huang +3 位作者 Caijin Li Renlin Xin Shanqing Zhang Mahmoud Emam 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期405-423,共19页
Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting.Stamped seal inspection is commonly audited... Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting.Stamped seal inspection is commonly audited manually to ensure document authenticity.However,manual assessment of seal images is tedious and laborintensive due to human errors,inconsistent placement,and completeness of the seal.Traditional image recognition systems are inadequate enough to identify seal types accurately,necessitating a neural network-based method for seal image recognition.However,neural network-based classification algorithms,such as Residual Networks(ResNet)andVisualGeometryGroup with 16 layers(VGG16)yield suboptimal recognition rates on stamp datasets.Additionally,the fixed training data categories make handling new categories to be a challenging task.This paper proposes amulti-stage seal recognition algorithmbased on Siamese network to overcome these limitations.Firstly,the seal image is pre-processed by applying an image rotation correction module based on Histogram of Oriented Gradients(HOG).Secondly,the similarity between input seal image pairs is measured by utilizing a similarity comparison module based on the Siamese network.Finally,we compare the results with the pre-stored standard seal template images in the database to obtain the seal type.To evaluate the performance of the proposed method,we further create a new seal image dataset that contains two subsets with 210,000 valid labeled pairs in total.The proposed work has a practical significance in industries where automatic seal authentication is essential as in legal,financial,and governmental sectors,where automatic seal recognition can enhance document security and streamline validation processes.Furthermore,the experimental results show that the proposed multi-stage method for seal image recognition outperforms state-of-the-art methods on the two established datasets. 展开更多
关键词 Seal recognition seal authentication document tampering siamese network spatial transformer network similarity comparison network
在线阅读 下载PDF
Dynamic Multi-Graph Spatio-Temporal Graph Traffic Flow Prediction in Bangkok:An Application of a Continuous Convolutional Neural Network
8
作者 Pongsakon Promsawat Weerapan Sae-dan +2 位作者 Marisa Kaewsuwan Weerawat Sudsutad Aphirak Aphithana 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期579-607,共29页
The ability to accurately predict urban traffic flows is crucial for optimising city operations.Consequently,various methods for forecasting urban traffic have been developed,focusing on analysing historical data to u... The ability to accurately predict urban traffic flows is crucial for optimising city operations.Consequently,various methods for forecasting urban traffic have been developed,focusing on analysing historical data to understand complex mobility patterns.Deep learning techniques,such as graph neural networks(GNNs),are popular for their ability to capture spatio-temporal dependencies.However,these models often become overly complex due to the large number of hyper-parameters involved.In this study,we introduce Dynamic Multi-Graph Spatial-Temporal Graph Neural Ordinary Differential Equation Networks(DMST-GNODE),a framework based on ordinary differential equations(ODEs)that autonomously discovers effective spatial-temporal graph neural network(STGNN)architectures for traffic prediction tasks.The comparative analysis of DMST-GNODE and baseline models indicates that DMST-GNODE model demonstrates superior performance across multiple datasets,consistently achieving the lowest Root Mean Square Error(RMSE)and Mean Absolute Error(MAE)values,alongside the highest accuracy.On the BKK(Bangkok)dataset,it outperformed other models with an RMSE of 3.3165 and an accuracy of 0.9367 for a 20-min interval,maintaining this trend across 40 and 60 min.Similarly,on the PeMS08 dataset,DMST-GNODE achieved the best performance with an RMSE of 19.4863 and an accuracy of 0.9377 at 20 min,demonstrating its effectiveness over longer periods.The Los_Loop dataset results further emphasise this model’s advantage,with an RMSE of 3.3422 and an accuracy of 0.7643 at 20 min,consistently maintaining superiority across all time intervals.These numerical highlights indicate that DMST-GNODE not only outperforms baseline models but also achieves higher accuracy and lower errors across different time intervals and datasets. 展开更多
关键词 Graph neural networks convolutional neural network deep learning dynamic multi-graph SPATIO-TEMPORAL
在线阅读 下载PDF
DIGNN-A:Real-Time Network Intrusion Detection with Integrated Neural Networks Based on Dynamic Graph
9
作者 Jizhao Liu Minghao Guo 《Computers, Materials & Continua》 SCIE EI 2025年第1期817-842,共26页
The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats.Intrusion detection systems are cr... The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats.Intrusion detection systems are crucial to network security,playing a pivotal role in safeguarding networks from potential threats.However,in the context of an evolving landscape of sophisticated and elusive attacks,existing intrusion detection methodologies often overlook critical aspects such as changes in network topology over time and interactions between hosts.To address these issues,this paper proposes a real-time network intrusion detection method based on graph neural networks.The proposedmethod leverages the advantages of graph neural networks and employs a straightforward graph construction method to represent network traffic as dynamic graph-structured data.Additionally,a graph convolution operation with a multi-head attention mechanism is utilized to enhance the model’s ability to capture the intricate relationships within the graph structure comprehensively.Furthermore,it uses an integrated graph neural network to address dynamic graphs’structural and topological changes at different time points and the challenges of edge embedding in intrusion detection data.The edge classification problem is effectively transformed into node classification by employing a line graph data representation,which facilitates fine-grained intrusion detection tasks on dynamic graph node feature representations.The efficacy of the proposed method is evaluated using two commonly used intrusion detection datasets,UNSW-NB15 and NF-ToN-IoT-v2,and results are compared with previous studies in this field.The experimental results demonstrate that our proposed method achieves 99.3%and 99.96%accuracy on the two datasets,respectively,and outperforms the benchmark model in several evaluation metrics. 展开更多
关键词 Intrusion detection graph neural networks attention mechanisms line graphs dynamic graph neural networks
在线阅读 下载PDF
Secure Channel Estimation Using Norm Estimation Model for 5G Next Generation Wireless Networks
10
作者 Khalil Ullah Song Jian +4 位作者 Muhammad Naeem Ul Hassan Suliman Khan Mohammad Babar Arshad Ahmad Shafiq Ahmad 《Computers, Materials & Continua》 SCIE EI 2025年第1期1151-1169,共19页
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile networks.These networks are sufficiently scaled to interconnect billions of user... The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile networks.These networks are sufficiently scaled to interconnect billions of users and devices.Researchers in academia and industry are focusing on technological advancements to achieve highspeed transmission,cell planning,and latency reduction to facilitate emerging applications such as virtual reality,the metaverse,smart cities,smart health,and autonomous vehicles.NextG continuously improves its network functionality to support these applications.Multiple input multiple output(MIMO)technology offers spectral efficiency,dependability,and overall performance in conjunctionwithNextG.This article proposes a secure channel estimation technique in MIMO topology using a norm-estimation model to provide comprehensive insights into protecting NextG network components against adversarial attacks.The technique aims to create long-lasting and secure NextG networks using this extended approach.The viability of MIMO applications and modern AI-driven methodologies to combat cybersecurity threats are explored in this research.Moreover,the proposed model demonstrates high performance in terms of reliability and accuracy,with a 20%reduction in the MalOut-RealOut-Diff metric compared to existing state-of-the-art techniques. 展开更多
关键词 Next generation networks massive mimo communication network artificial intelligence 5G adversarial attacks channel estimation information security
在线阅读 下载PDF
Network pharmacology:Changes the treatment mode of"one disease-one target"in cancer treatment
11
作者 Shuai Liu Yong-Wei Yu 《World Journal of Gastrointestinal Oncology》 SCIE 2025年第1期268-271,共4页
The article concluded that network pharmacology provides new ideas and insights into the molecular mechanism of traditional Chinese medicine(TCM)treatment of cancer.TCM is a new choice and hot spot in the field of can... The article concluded that network pharmacology provides new ideas and insights into the molecular mechanism of traditional Chinese medicine(TCM)treatment of cancer.TCM is a new choice and hot spot in the field of cancer treatment.We have also previously published studies on TCM and network pharmacology.In this letter,we summarize the new paradigm of network pharmacology in cancer treatment mechanisms. 展开更多
关键词 network pharmacology CANCER MULTICOMPONENT Multitarget THERAPY
在线阅读 下载PDF
AN IMAGE SEGMENTATION APPROACH BASED ON FUZZY-NEURAL-NETWORK HYBRID SYSTEM
12
作者 Qian Yuntao Xie Weixin(Dept. of Computer Sci. & Eng., Northwestern Polytechnical University, Xi’an 710072) (Dept. of Electronic Eng., Xidian University, Xi’an 710071) 《Journal of Electronics(China)》 1997年第4期352-356,共5页
This paper presents a new solution to the image segmentation problem, which is based on fuzzy-neural-network hybrid system (FNNHS). This approach can use the experiential knowledge and the ability of neural networks w... This paper presents a new solution to the image segmentation problem, which is based on fuzzy-neural-network hybrid system (FNNHS). This approach can use the experiential knowledge and the ability of neural networks which learn knowledge from the examples, to obtain the well performed fuzzy rules. Furthermore this fuzzy inference system is completed by neural network structure which can work in parallel. The segmentation process consists of pre-segmentation based on region growing algorithm and region merging based on FNNHS. The experimental results on the complicated image manifest the utility of this method. 展开更多
关键词 COMPUTER VISION Image segmentation Fuzzy LOGIC NEURAL network
在线阅读 下载PDF
Offload Strategy for Edge Computing in Satellite Networks Based on Software Defined Network
13
作者 Zhiguo Liu Yuqing Gui +1 位作者 Lin Wang Yingru Jiang 《Computers, Materials & Continua》 SCIE EI 2025年第1期863-879,共17页
Satellite edge computing has garnered significant attention from researchers;however,processing a large volume of tasks within multi-node satellite networks still poses considerable challenges.The sharp increase in us... Satellite edge computing has garnered significant attention from researchers;however,processing a large volume of tasks within multi-node satellite networks still poses considerable challenges.The sharp increase in user demand for latency-sensitive tasks has inevitably led to offloading bottlenecks and insufficient computational capacity on individual satellite edge servers,making it necessary to implement effective task offloading scheduling to enhance user experience.In this paper,we propose a priority-based task scheduling strategy based on a Software-Defined Network(SDN)framework for satellite-terrestrial integrated networks,which clarifies the execution order of tasks based on their priority.Subsequently,we apply a Dueling-Double Deep Q-Network(DDQN)algorithm enhanced with prioritized experience replay to derive a computation offloading strategy,improving the experience replay mechanism within the Dueling-DDQN framework.Next,we utilize the Deep Deterministic Policy Gradient(DDPG)algorithm to determine the optimal resource allocation strategy to reduce the processing latency of sub-tasks.Simulation results demonstrate that the proposed d3-DDPG algorithm outperforms other approaches,effectively reducing task processing latency and thus improving user experience and system efficiency. 展开更多
关键词 Satellite network edge computing task scheduling computing offloading
在线阅读 下载PDF
A Survey of Link Failure Detection and Recovery in Software-Defined Networks
14
作者 Suheib Alhiyari Siti Hafizah AB Hamid Nur Nasuha Daud 《Computers, Materials & Continua》 SCIE EI 2025年第1期103-137,共35页
Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhance... Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhanced networkmanagement capabilities than those of traditional networks.However,because SDN is designed to ensure high-level service availability,it faces additional challenges.One of themost critical challenges is ensuring efficient detection and recovery from link failures in the data plane.Such failures can significantly impact network performance and lead to service outages,making resiliency a key concern for the effective adoption of SDN.Since the recovery process is intrinsically dependent on timely failure detection,this research surveys and analyzes the current literature on both failure detection and recovery approaches in SDN.The survey provides a critical comparison of existing failure detection techniques,highlighting their advantages and disadvantages.Additionally,it examines the current failure recovery methods,categorized as either restoration-based or protection-based,and offers a comprehensive comparison of their strengths and limitations.Lastly,future research challenges and directions are discussed to address the shortcomings of existing failure recovery methods. 展开更多
关键词 Software defined networking failure detection failure recovery RESTORATION PROTECTION
在线阅读 下载PDF
3D tomographic analysis of equatorial plasma bubble using GNSS-TEC data from Indonesian GNSS Network
15
作者 Ihsan Naufal Muafiry Prayitno Abadi +5 位作者 Teguh N.Pratama Dyah R.Martiningrum Sri Ekawati Yuandhika GWismaya Febrylian FChabibi Gatot HPramono 《Earth and Planetary Physics》 EI CAS 2025年第1期127-136,共10页
Equatorial Plasma Bubbles(EPBs)are ionospheric irregularities that take place near the magnetic equator.EPBs most commonly occur after sunset during the equinox months,although they can also be observed during other s... Equatorial Plasma Bubbles(EPBs)are ionospheric irregularities that take place near the magnetic equator.EPBs most commonly occur after sunset during the equinox months,although they can also be observed during other seasons.The phenomenon significantly disrupts radio wave signals essential to communication and navigation systems.The national network of Global Navigation Satellite System(GNSS)receivers in Indonesia(>30°longitudinal range)provides an opportunity for detailed EPB studies.To explore this,we conducted preliminary 3D tomography of total electron content(TEC)data captured by GNSS receivers following a geomagnetic storm on December 3,2023,when at least four EPB clusters occurred in the Southeast Asian sector.TEC and extracted TEC depletion with a 120-minute running average were then used as inputs for a 3D tomography program.Their 2D spatial distribution consistently captured the four EPB clusters over time.These tomography results were validated through a classical checkerboard test and comparisons with other ionospheric data sources,such as the Global Ionospheric Map(GIM)and International Reference Ionosphere(IRI)profile.Validation of the results demonstrates the capability of the Indonesian GNSS network to measure peak ionospheric density.These findings highlight the potential for future three-dimensional research of plasma bubbles in low-latitude regions using existing GNSS networks,with extensive longitudinal coverage. 展开更多
关键词 EPB Indonesian GNSS network 3D tomography
在线阅读 下载PDF
A Generative Model-Based Network Framework for Ecological Data Reconstruction
16
作者 Shuqiao Liu Zhao Zhang +1 位作者 Hongyan Zhou Xuebo Chen 《Computers, Materials & Continua》 SCIE EI 2025年第1期929-948,共20页
This study examines the effectiveness of artificial intelligence techniques in generating high-quality environmental data for species introductory site selection systems.Combining Strengths,Weaknesses,Opportunities,Th... This study examines the effectiveness of artificial intelligence techniques in generating high-quality environmental data for species introductory site selection systems.Combining Strengths,Weaknesses,Opportunities,Threats(SWOT)analysis data with Variation Autoencoder(VAE)and Generative AdversarialNetwork(GAN)the network framework model(SAE-GAN),is proposed for environmental data reconstruction.The model combines two popular generative models,GAN and VAE,to generate features conditional on categorical data embedding after SWOT Analysis.The model is capable of generating features that resemble real feature distributions and adding sample factors to more accurately track individual sample data.Reconstructed data is used to retain more semantic information to generate features.The model was applied to species in Southern California,USA,citing SWOT analysis data to train the model.Experiments show that the model is capable of integrating data from more comprehensive analyses than traditional methods and generating high-quality reconstructed data from them,effectively solving the problem of insufficient data collection in development environments.The model is further validated by the Technique for Order Preference by Similarity to an Ideal Solution(TOPSIS)classification assessment commonly used in the environmental data domain.This study provides a reliable and rich source of training data for species introduction site selection systems and makes a significant contribution to ecological and sustainable development. 展开更多
关键词 Convolutional Neural network(CNN) VAE GAN TOPSIS data reconstruction
在线阅读 下载PDF
Leveraging ROTI map derived from Indonesian GNSS receiver network for advancing study of Equatorial Plasma Bubble in Southeast/East Asia 被引量:1
17
作者 Prayitno Abadi Ihsan N.Muafiry +8 位作者 Teguh N.Pratama Angga Y.Putra Suraina Gatot H.Pramono Sidik T.Wibowo Febrylian F.Chabibi Umar A.Ahmad Wildan P.Tresna Asnawi 《Earth and Planetary Physics》 EI CAS 2025年第1期101-116,共16页
This paper highlights the crucial role of Indonesia’s GNSS receiver network in advancing Equatorial Plasma Bubble(EPB)studies in Southeast and East Asia,as ionospheric irregularities within EPB can disrupt GNSS signa... This paper highlights the crucial role of Indonesia’s GNSS receiver network in advancing Equatorial Plasma Bubble(EPB)studies in Southeast and East Asia,as ionospheric irregularities within EPB can disrupt GNSS signals and degrade positioning accuracy.Managed by the Indonesian Geospatial Information Agency(BIG),the Indonesia Continuously Operating Reference Station(Ina-CORS)network comprises over 300 GNSS receivers spanning equatorial to southern low-latitude regions.Ina-CORS is uniquely situated to monitor EPB generation,zonal drift,and dissipation across Southeast Asia.We provide a practical tool for EPB research,by sharing two-dimensional rate of Total Electron Content(TEC)change index(ROTI)derived from this network.We generate ROTI maps with a 10-minute resolution,and samples from May 2024 are publicly available for further scientific research.Two preliminary findings from the ROTI maps of Ina-CORS are noteworthy.First,the Ina-CORS ROTI maps reveal that the irregularities within a broader EPB structure persist longer,increasing the potential for these irregularities to migrate farther eastward.Second,we demonstrate that combined ROTI maps from Ina-CORS and GNSS receivers in East Asia and Australia can be used to monitor the development of ionospheric irregularities in Southeast and East Asia.We have demonstrated the combined ROTI maps to capture the development of ionospheric irregularities in the Southeast/East Asian sector during the G5 Geomagnetic Storm on May 11,2024.We observed simultaneous ionospheric irregularities in Japan and Australia,respectively propagating northwestward and southwestward,before midnight,whereas Southeast Asia’s equatorial and low-latitude regions exhibited irregularities post-midnight.By sharing ROTI maps from Indonesia and integrating them with regional GNSS networks,researchers can conduct comprehensive EPB studies,enhancing the understanding of EPB behavior across Southeast and East Asia and contributing significantly to ionospheric research. 展开更多
关键词 Equatorial Plasma Bubble(EPB) GNSS receivers’network Indonesia Continuously Operating Reference Station(Ina-CORS) ionospheric map Rate of TEC change index(ROTI)map
在线阅读 下载PDF
A Decentralized and TCAM-Aware Failure Recovery Model in Software Defined Data Center Networks
18
作者 Suheib Alhiyari Siti Hafizah AB Hamid Nur Nasuha Daud 《Computers, Materials & Continua》 SCIE EI 2025年第1期1087-1107,共21页
Link failure is a critical issue in large networks and must be effectively addressed.In software-defined networks(SDN),link failure recovery schemes can be categorized into proactive and reactive approaches.Reactive s... Link failure is a critical issue in large networks and must be effectively addressed.In software-defined networks(SDN),link failure recovery schemes can be categorized into proactive and reactive approaches.Reactive schemes have longer recovery times while proactive schemes provide faster recovery but overwhelm the memory of switches by flow entries.As SDN adoption grows,ensuring efficient recovery from link failures in the data plane becomes crucial.In particular,data center networks(DCNs)demand rapid recovery times and efficient resource utilization to meet carrier-grade requirements.This paper proposes an efficient Decentralized Failure Recovery(DFR)model for SDNs,meeting recovery time requirements and optimizing switch memory resource consumption.The DFR model enables switches to autonomously reroute traffic upon link failures without involving the controller,achieving fast recovery times while minimizing memory usage.DFR employs the Fast Failover Group in the OpenFlow standard for local recovery without requiring controller communication and utilizes the k-shortest path algorithm to proactively install backup paths,allowing immediate local recovery without controller intervention and enhancing overall network stability and scalability.DFR employs flow entry aggregation techniques to reduce switch memory usage.Instead of matching flow entries to the destination host’s MAC address,DFR matches packets to the destination switch’s MAC address.This reduces the switches’Ternary Content-Addressable Memory(TCAM)consumption.Additionally,DFR modifies Address Resolution Protocol(ARP)replies to provide source hosts with the destination switch’s MAC address,facilitating flow entry aggregation without affecting normal network operations.The performance of DFR is evaluated through the network emulator Mininet 2.3.1 and Ryu 3.1 as SDN controller.For different number of active flows,number of hosts per edge switch,and different network sizes,the proposed model outperformed various failure recovery models:restoration-based,protection by flow entries,protection by group entries and protection by Vlan-tagging model in terms of recovery time,switch memory consumption and controller overhead which represented the number of flow entry updates to recover from the failure.Experimental results demonstrate that DFR achieves recovery times under 20 milliseconds,satisfying carrier-grade requirements for rapid failure recovery.Additionally,DFR reduces switch memory usage by up to 95%compared to traditional protection methods and minimizes controller load by eliminating the need for controller intervention during failure recovery.Theresults underscore the efficiency and scalability of the DFR model,making it a practical solution for enhancing network resilience in SDN environments. 展开更多
关键词 Software defined networking failure detection failure recovery RESTORATION protection TCAM size
在线阅读 下载PDF
Global Piecewise Analysis of HIV Model with Bi-Infectious Categories under Ordinary Derivative and Non-Singular Operator with Neural Network Approach
19
作者 Ghaliah Alhamzi Badr Saad TAlkahtani +1 位作者 Ravi Shanker Dubey Mati ur Rahman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期609-633,共25页
This study directs the discussion of HIV disease with a novel kind of complex dynamical generalized and piecewise operator in the sense of classical and Atangana Baleanu(AB)derivatives having arbitrary order.The HIV i... This study directs the discussion of HIV disease with a novel kind of complex dynamical generalized and piecewise operator in the sense of classical and Atangana Baleanu(AB)derivatives having arbitrary order.The HIV infection model has a susceptible class,a recovered class,along with a case of infection divided into three sub-different levels or categories and the recovered class.The total time interval is converted into two,which are further investigated for ordinary and fractional order operators of the AB derivative,respectively.The proposed model is tested separately for unique solutions and existence on bi intervals.The numerical solution of the proposed model is treated by the piece-wise numerical iterative scheme of Newtons Polynomial.The proposed method is established for piece-wise derivatives under natural order and non-singular Mittag-Leffler Law.The cross-over or bending characteristics in the dynamical system of HIV are easily examined by the aspect of this research having a memory effect for controlling the said disease.This study uses the neural network(NN)technique to obtain a better set of weights with low residual errors,and the epochs number is considered 1000.The obtained figures represent the approximate solution and absolute error which are tested with NN to train the data accurately. 展开更多
关键词 HIV infection model qualitative scheme approximate solution piecewise global operator neural network
在线阅读 下载PDF
Modeling and Comprehensive Review of Signaling Storms in 3GPP-Based Mobile Broadband Networks:Causes,Solutions,and Countermeasures
20
作者 Muhammad Qasim Khan Fazal Malik +1 位作者 Fahad Alturise Noor Rahman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期123-153,共31页
Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important a... Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject. 展开更多
关键词 Signaling storm problems control signaling load analytical modeling 3GPP networks smart devices diameter signaling mobile broadband data access data traffic mobility management signaling network architecture 5G mobile communication
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部