共查询到20条相似文献,搜索用时 117 毫秒
1.
The traffic congestion occurs frequently in urban areas, while most existing solutions only take effects after congesting. In this paper, a congestion warning method is proposed based on the Internet of vehicles(IOV) and community discovery of complex networks. The communities in complex network model of traffic flow reflect the local aggregation of vehicles in the traffic system, and it is used to predict the upcoming congestion. The real-time information of vehicles on the roads is obtained from the IOV, which includes the locations, speeds and orientations of vehicles. Then the vehicles are mapped into nodes of network, the links between nodes are determined by the correlations between vehicles in terms of location and speed. The complex network model of traffic flow is hereby established. The communities in this complex network are discovered by fast Newman(FN) algorithm, and the congestion warnings are generated according to the communities selected by scale and density. This method can detect the tendency of traffic aggregation and provide warnings before congestion occurs. The simulations show that the method proposed in this paper is effective and practicable, and makes it possible to take action before traffic congestion. 相似文献
2.
This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the scenario involving multiparty network data sharing with Trusted Third Party (TTP) is proposed. Simulations are then conducted using network data from different sources, and show that the measurement indicators defined in this paper can adequately quantify the privacy of the network. In particular, it can indicate the effect of the auxiliary information of the adversary on privacy. 相似文献
3.
The congestion control problem in a single node network has been solved by the nonlinear feedback control method,which has been proven to be effective and robust for different router’s queue size.However,these control models are based on the single layer network architecture,and the senders and receivers are directly connected by one pair of routers.With the network architecture being more and more complex,it is a serious problem how to cooperate many routers working in the multilayer network simultaneously.In this paper,an effective Active Queue Management(AQM)scheme to guarantee the stability by the nonlinear control of imposing some restrictions on AQM parameter in multilayer network is proposed.The nonlinear control can rely on some heuristics and network traffic controllers that appear to be highly correlated with the multilayer network status.The proposed method is based on the improved classical Random Early Detection(RED)differential equation and a theorem for network congestion control.The theorem proposed in the paper proved that the stability of the fluid model can effectively ensure the convergence of the average rate to its equilibrium point through many routers in multilayer network.Moreover,when the network capacity is larger,the proposed scheme can still approach to the fullest extensibility of utilization and ensure the stability of the fluid model.The paper reveals the reasons of congestion control in multilayer network,provides a theorem for avoiding network congestion,and gives simulations to verify the results. 相似文献
4.
WANG Jian HUANG Tao LIU Jiang LIU Yunjie 《中国通信》2014,(2):12-25
The low-cost, self-configuration capability and "plug-and-play" feature of Ethernet establishes its dominant position in the local area networks (LAN). However, it is hard to extend to large scale because of the legacy broadcast-based service discovery mechanism. Therefore, to solve this problem, a new split network architecture named Software-Defined Networking (SDN) is introduced in this paper, and a novel floodless service discovery mechanism (FSDM) for SDN is designed. For the FSDM, the widespread broadcast messages for Dynamic Host Configuration Protocol (DHCP) and Address Resolution Protocol (ARP) are considered especially, respectively. Then the DHCP relay and ARP proxy are proposed to handle DHCP broadcast messages and ARP broadcast messages, respectively. The proposed FSDM in this paper can eliminate flooding completely, reserve the auto- configuration characteristics. Particularly, there is no need to change the existing hardware, software and protocols of hosts for the proposed scheme. Finally, the simulation results are demonstrated to show that our proposed model allows redundant links existed in network and has the property of scalability, which can significantly reduce network traffic in data plane and control traffic in control plane, and decrease the overhead of control plane. 相似文献
5.
As the smart home is the end-point power consumer, it is the major part to be controlled in a smart micro grid. There are so many challenges for implementing a smart home system in which the most important ones are the cost and simplicity of the implementation method. It is clear that the major share of the total cost is referred to the internal controlling system network; although there are too many methods proposed but still there is not any satisfying method at the consumers’ point of view. In this paper, a novel solution for this demand is proposed, which not only minimizes the implementation cost, but also provides a high level of reliability and simplicity of operation; feasibility, extendibility, and flexibility are other leading properties of the design. 相似文献
6.
LEO satellite communication network has a large number of satellites distributed in low orbits,which leads to multiple coverage of many areas on the ground.It is hard work to describe and evaluate the reliability of LEO satellite communication network.To solve this problem,the reliability of all-user terminals in LEO satellite communication network is defined,and the corresponding reliability evaluation method is proposed in the paper.Due to the large scale of the interstellar network,a modular reduction algorithm using the modular network instead of the original network for state decomposition is proposed in this paper.Case study shows that the calculation time of the proposed method is equivalent to 6.28%of the original state space decomposition algorithm.On this basis,the reliability of LEO satellite communication network is further analyzed.It is found that the reliability of LEO satellite network was more sensitive to the reliability of Inter-Satellite link and the satisfaction of global coverage in the early stage,and it is more sensitive to the reliability of the satellite in the later stage.The satellite-ground link has a relatively constant impact on of LEO satellite network. 相似文献
7.
In this paper, a visual focus of attention(VFOA) detection method based on the improved hybrid incremental dynamic Bayesian network(IHIDBN) constructed with the fusion of head, gaze and prediction sub-models is proposed aiming at solving the problem of the complexity and uncertainty in dynamic scenes. Firstly, gaze detection sub-model is improved based on the traditional human eye model to enhance the recognition rate and robustness for different subjects which are detected. Secondly, the related sub-models are described, and conditional probability is used to establish regression models respectively. Also an incremental learning method is used to dynamically update the parameters to improve adaptability of this model. The method has been evaluated on two public datasets and daily exper iments. The results show that the method proposed in this paper can effectively estimate VFOA from user, and it is robust to the free deflection of the head and distance change. 相似文献
8.
Resource allocation is an important problem in ubiquitous network. Most of the existing resource allocation methods considering only wireless networks are not suitable for the ubiquitous network environment, and they will harm the interest of individual users with instable resource requirements. This paper considers the multi-point video surveillance scenarios in a complex network environment with both wired and wireless networks. We introduce the utility estimated by the total costs of an individual network user. The problem is studied through mathematical modeling and we propose an improved problem-specific branch-and-cut algorithm to solve it. The algorithm follows the divide-and-conquer principle and fully considers the duality feature of network selection. The experiment is conducted by simulation through C and Lingo. And it shows that compared with a centralized random allocation scheme and a cost greed allocation scheme, the proposed scheme has better per- formance of reducing the total costs by 13.0% and 30.6% respectively for the user. 相似文献
9.
Attacks such as APT usually hide communication data in massive legitimate network traffic, and mining structurally complex and latent relationships among flow-based network traffic to detect attacks has become the focus of many initiatives. Effectively analyzing massive network security data with high dimensions for suspicious flow diagnosis is a huge challenge. In addition, the uneven distribution of network traffic does not fully reflect the differences of class sample features, resulting in the low accuracy of attack detection. To solve these problems, a novel approach called the fuzzy entropy weighted natural nearest neighbor(FEW-NNN) method is proposed to enhance the accuracy and efficiency of flowbased network traffic attack detection. First, the FEW-NNN method uses the Fisher score and deep graph feature learning algorithm to remove unimportant features and reduce the data dimension. Then, according to the proposed natural nearest neighbor searching algorithm(NNN_Searching), the density of data points, each class center and the smallest enclosing sphere radius are determined correspondingly. Finally, a fuzzy entropy weighted KNN classification method based on affinity is proposed, which mainly includes the following three steps: 1、 the feature weights of samples are calculated based on fuzzy entropy values, 2、 the fuzzy memberships of samples are determined based on affinity among samples, and 3、 K-neighbors are selected according to the class-conditional weighted Euclidean distance, the fuzzy membership value of the testing sample is calculated based on the membership of k-neighbors, and then all testing samples are classified according to the fuzzy membership value of the samples belonging to each class;that is, the attack type is determined. The method has been applied to the problem of attack detection and validated based on the famous KDD99 and CICIDS-2017 datasets. From the experimental results shown in this paper, it is observed that the FEW-NNN method improves the accuracy and efficiency of flow-based network traffic attack detection. 相似文献
10.
Facial expression recognition(FER) is a vital application of image processing technology. In this paper, a FER model based on the residual network is proposed. The proposed model introduces the idea of the DenseNet, in which the outputs of the residual blocks are not simply added but are linked to the channel dimension. In addition, transfer learning is used to reduce training costs and accelerate training speed. The accuracy and robustness of the proposed FER model were tested by K-fold cross-v... 相似文献
11.
指纹识别是一种重要的生物特征鉴别技术。随着计算机技术的不断发展,自动指纹识别系统得到广泛的应用。因此进一步提高指纹识别的性能具有十分重要的意义,而指纹图像增强在指纹图像预处理过程中非常重要,直接影响指纹识别的识别率和识别速度。对指纹图像的细化算法进行了较深入的研究,分析了OPTA算法并且在OPTA算法的基础上,重新构建了细化模板,提出了一种新的细化算法.经过实验证明,该算法能够很好地满足细化的要求,细化完全彻底,细化以后的指纹骨架在纹线中心线,并保持了纹线原有的拓扑结构和细节特征,而且光滑无毛刺,运算速度也很快。 相似文献
12.
本文发现并以定理的形式证明了具有异号权重模板的细胞神经网络系统在非均匀增益分段性输函数下的细 化稳态性性。 相似文献
13.
干涉条纹中心线提取与细化的新方法 总被引:4,自引:0,他引:4
干涉条纹分析是光学干涉计量的重要分析方法,本文提出基于改进Yangtagai求极值点法与改进Hilditch细化法相结合的干涉条纹中心线提取与细化方法,该方法具有条纹断点少、抗噪声能力强以及处理速度快的特点。通过实验证实了本文提出方法的有效性。 相似文献
14.
15.
16.
阐述了SDB-SOI晶片的减薄技术的特点和要求,依次介绍了化学机械抛光、电化学自停止腐蚀、等离子抛光技术和智能剥离技术的原理和特点,并指出了SDB-SOI晶片减薄的发展趋势。 相似文献
17.
一种基于标记的并行细化算法 总被引:5,自引:0,他引:5
本文提出了一种基于图像标记的并行细化算法.首先计算图像中像素和轮廓距离的标记信息,并将标记图像作为细化算法的输入.通过综合利用标记信息,保留了几何特性,提高了细化算法的鲁棒性,同时为进一步图元识别/拟合奠定了基础. 相似文献
18.
19.
20.
骨架保存了要处理对象的拓扑信息,是图像分析的重要研究内容之一.传统的骨架细化算法不能保证结果的准确性,而距离场的方法无法保证结果的连续性.为此提出一种快速有效的骨架提取算法,将经典的距离变换法和细化方法结合,克服二者之间存在的缺陷,实现算法的互补.经过大量实验验证,此方法能够得到连续、准确的骨架,可以很好地满足实际应用的需求. 相似文献