Software defined network (SDN) enables efficient and green traffic management by separating the control and data planes. However, the existing itemized scheduling approach is prone to waste of network resources and en...
详细信息
Software defined network (SDN) enables efficient and green traffic management by separating the control and data planes. However, the existing itemized scheduling approach is prone to waste of network resources and energy consumption due to the different sensitivity of traffic to time delay. To address these problems, we design a Slime Mould Algorithm based Energy-efficient Traffic Scheduling Method (SMA-ETSM) for SDN. First, we model the traffic scheduling problem with delay requirements to evaluate the decision. Second, in order to minimize the generation of invalid solutions in traffic scheduling, the encoding of the slime mould algorithm is improved, and a slime mould adaptation and update mechanism suitable for energy-efficient traffic scheduling is designed. The experiments show that SMA-ETSM can effectively reduce the energy consumption and improve the overall bandwidth utilization of the network compared with ECMP and ACO algorithm, and it also has some improvement in the operation efficiency compared with the original slime mould algorithm.
Amid the worsening energy crisis, wind farm layout optimization (WFLO) to increase power generation, reduce costs, and mitigate potential environmental impacts is of great significance. This paper formulates three-obj...
详细信息
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavio...
详细信息
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavior models to authenticate *** this paper,a mobile terminal APP browsing behavioral authentication system architecture which synthesizes multiple factors is *** architecture is suitable for users using the mobile terminal APP in the daily *** architecture includes data acquisition,data processing,feature extraction,and sub model *** can use this architecture for continuous authentication when the user uses APP at the mobile terminal.
The ability of road networks to withstand external disturbances is a crucial measure of transportation system performance, where resilience distinctly emerges as an effective perspective for its unique insights into t...
详细信息
The ability of road networks to withstand external disturbances is a crucial measure of transportation system performance, where resilience distinctly emerges as an effective perspective for its unique insights into the system's resistance and recovery capabilities. In the face of unforeseen resilience disturbance events, predictive and accurate assessment of road network resilience is essential for better traffic regulation and emergency response management. However, existing resilience assessment methods of road networks are insufficient: they lack reliable real-time big-data analysis, do not possess predictive capabilities for guiding decision-making, and have a narrow view with single-dimensional resilience indicators. To address these issues, focusing on rainfall disturbance scenarios, this work introduces a novel resilience assessment method, which is predictive and real-time, consisting of two components: a deep learning traffic indicator prediction model and a comprehensive resilience assessment model. Firstly, we propose a two-stage traffic indicator prediction model, namely the Conditional Diffusion-Reconstruction-based Graph Neural Network (CDRGNN), which particularly enhances disturbance-scenario prediction accuracy, thereby providing reliable foresight in aid of the following assessments. Subsequently, we develop a resilience assessment model featuring structural-functional comprehensive resilience indicators established through shortest-path aggregation, and the overall resilience assessment is performed through comparative analysis using indicators obtained in real-time with historical non-disruptive resilience benchmarks. In a case study focusing on heavy rainfall disturbances on a road network in California, the United States, abundant experiments and visualizations are conducted to demonstrate the rationality of our proposed comprehensive resilience indicators as well as the precision and reliability of these predictive resilience assessment outcom
The upper bounds on lifetime of three dimensional extended Time hopping impulse radio Ultrawide band (TH-IR UWB) sensor networks are derived using percolation theory arguments. The TH-IR UWB sensor network consists of...
详细信息
The upper bounds on lifetime of three dimensional extended Time hopping impulse radio Ultrawide band (TH-IR UWB) sensor networks are derived using percolation theory arguments. The TH-IR UWB sensor network consists of $n$ sensor nodes distributed in a cube of edge length $n^{1/3}$ according to a Poisson point process of unit intensity. It is shown that for such a static three dimensional extended TH-IR UWB sensor network, the upper bound on the lifetime is of order $O(n^{-1})$ , while in the ideal case, the upper bound on the lifetime is longer than that of a static network by a factor of $n^{2/3}$ . Therefore sensor nodes moving randomly in the deployment area can improve the upper bound on network lifetime. The results also reveal that the upper bounds on network lifetime decrease with the number of nodes $n$ , thus extended TH-IR UWB sensor networks aren't prone to be employed in large-scale network.
Social behavior metadata has altered business models and human lifestyles. However, the inclusion of personal information in social behavior metadata poses risks of identity exposure for users. Under the requirements ...
详细信息
Deep generative models, such as Generative Adversarial Networks (GAN) and Variational Autoencoders (VAE), are widely used in collaborative filtering. They usually learn users’ preferences for items directly from a hi...
详细信息
ISBN:
(数字)9798350379860
ISBN:
(纸本)9798350379877
Deep generative models, such as Generative Adversarial Networks (GAN) and Variational Autoencoders (VAE), are widely used in collaborative filtering. They usually learn users’ preferences for items directly from a highly sparse user rating matrix (URM), and then recommend the top-N items to users. Due to the high sparsity of URM, GAN has limited ability to handle sparse data, while VAE’s encoder can extract features. Therefore, we propose a two-stage collaborative filtering framework based on variational autoencoders and generative adversarial networks, named VCFGAN. It first uses two VAEs to extract features from URM and side information (SI), and then uses the extracted latent vectors to train the GAN network. To evaluate the performance of our proposed VCFGAN model, some experiments are conducted on two real datasets, and the experimental results show that our model outperforms other representative models.
Due to the influence of global climate anomalies, abnormal weather conditions such as heavy rainfall have become more frequent in recent years, posing a significant threat to the operation of transportation systems. A...
详细信息
In this note, we study the prescribed-time (PT) synchronization of multiweighted and directed complex networks (MWDCNs) via pinning control. Unlike finite-time and fixed-time synchronization, the time for synchronizat...
详细信息
Reusing existing class libraries can improve the productivity of software development. API usage patterns are useful resources for programmers in reusing class libraries. Existing approaches often exploit API graphs t...
详细信息
暂无评论