-
121
Vision-Based Damage Detection Method Using Multi-Scale Local Information Entropy and Data Fusion
Published 2025-01-01“…For high-spatial-resolution vibration measurements, phase-based optical flow estimation algorithm is adopted to deploy virtual sensors on the structure, yielding reliable mode shapes. …”
Get full text
Article -
122
Advances in plant male sterility for hybrid seed production: an overview of conditional nuclear male sterile lines and biotechnology-based male sterile systems
Published 2025-02-01“…Here we review environment-sensitive genic male sterility (EGMS) and biotechnology-based male sterility systems and describe the underlying molecular mechanisms. …”
Get full text
Article -
123
-
124
-
125
An Intelligent Crow Search Optimization and Bi-GRU for Forest Fire Detection System Using Internet of Things
Published 2024-12-01“…This system leverages the Internet of Things (IoT) to collect real-time data from various sensors deployed in forest areas, providing continuous monitoring and early warning capabilities. …”
Get full text
Article -
126
Proactive Distributed Emergency Response With Heterogeneous Tasks Allocation
Published 2025-01-01“…Traditionally, traffic incident management (TIM) programs coordinate the deployment of emergency resources to immediate incident requests without accommodating the interdependencies on incident evolutions in the environment. …”
Get full text
Article -
127
Analysis of software defined security model and architecture
Published 2017-06-01“…Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest problems in the cloud computing environment.The advanced persistent attacks including of bypassing the traditional firewall easily,breaking through the black and white list and feature matching of the security defense mechanism have included to the traditional security system new challenges.The problem in the traditional tightly coupled security defense system of combining the virtual with the true for construction of network environments was described,and a software defined security model and framework was provided.The decoupling scheme of access patterns and deployment position in combining the virtual with the true for construction of network environments was realized,which provided a beneficial exploration in the field of the adaptive active safety for enterprise cloud computing environment.…”
Get full text
Article -
128
A method of planning and designing transmission networks for government and enterprises based on a rectangle-like distribution model combined with heat maps
Published 2022-09-01“…The circuit direction and service access point of the special line service for government enterprise group customers are decided by the customers themselves, and the service opening is extremely unpredictable.In order to effectively solve the problems of strong subjectivity, difficult adjustment, long cycle and low efficiency in the service opening of government and enterprise customers, a typical simulation environment and a quasi rectangular distribution model was built, and two deployment strategies combined with the thermal map were proposed.The simulation analysis shows that under the same conditions, the number of VC-OTN (VC cross connecting function with optical transport network) points meeting the coverage requirements decreases with the increase of the maximum access distance, the client point coverage increases with the increase of the deployed VC-OTN points, and the deployment benefit of strategy 2 (group coverage by maturity) is higher than that of strategy 1 (priority coverage of hot spots).When the coverage requirements are met, the number of VC points required by the theoretical minimum, strategy 1 and strategy 2 are 26, 58 and 50, respectively.This method provides reliable theoretical guidance for the accurate and rapid construction of network system, avoids blind deployment, improves the accuracy of deployment planning, and provides construction reference ideas for the subsequent construction of urban VC-OTN nodes.…”
Get full text
Article -
129
Self-trainable and adaptive sensor intelligence for selective data generation
Published 2025-01-01“…Through a sequential training and execution process, the framework achieves continuous adaptability without prior knowledge of the deployment environment. To enhance performance while preserving model efficiency, we integrate knowledge distillation, enabling the transfer of critical insights from a larger teacher model to a compact student model. …”
Get full text
Article -
130
Performance Evaluation of Energy Efficiency in Dense Heterogeneous Wireless Network
Published 2014-03-01“…In dense heterogeneous wireless network, the large-scale small cell deployment can substantially increase not only the complexity of the interference environment but also the network energy consumption. …”
Get full text
Article -
131
ContractGuard:defend Ethereum smart contract with embedded intrusion detection
Published 2020-04-01“…Ethereum smart contracts are programs that can be collectively executed by a network of mutually untrusted nodes.Smart contracts handle and transfer assets of values,offering strong incentives for malicious attacks.Intrusion attacks are a popular type of malicious attacks.ContractGuard,the first intrusion detection system (IDS) was proposed to defend Ethereum smart contracts against such attacks.Like IDSs for conventional programs,ContractGuard detects intrusion attempts as abnormal control flow.However,existing IDS techniques or tools are inapplicable to Ethereum smart contracts due to Ethereum’s decentralized nature and its highly restrictive execution environment.To address these issues,ContractGuard was designed by embedding it in the contracts.At runtime,ContractGuard protects the smart contract by monitoring the context-tagged acyclic path of the smart contract.As ContractGuard involves deployment overhead and deployment overhead.It was optimized under the Ethereum Gas-oriented performance model to reduce the overheads.The experimental results show that this work can effectively detect 83% of vulnerabilities,ContractGuard only adds to 36.14% of the deployment overhead and 28.27% of the runtime overhead.…”
Get full text
Article -
132
-
133
Design of a Machine Learning-Based Platform for Currency Market Prediction: A Fundamental Design Model
Published 2025-01-01“…However, the development of these models and their deployment within computer platforms is a complex task, given the variety of approaches that each researcher uses based on the training process and therefore by definition of the model, which leads to the consumption of high computing resources for its training, as well as various processes for its deployment. …”
Get full text
Article -
134
Research and construction of new digital foundation for the fusion between IPv6 and 5G
Published 2024-11-01“…Based on the current situation of the campus network of Nankai University, new generation information network technologies such as IPv6 and 5G were studied, a new basic network integrating Wi-Fi campus network and 5G private network based on IPv6 protocol, IPv6 adaptation and application pilot deployment of the information innovation platform was built, a new digital foundation integrating IPv6 and 5G for plug and play against IPv6 was carried out and constructed, a mature cloud network fusion solution for the deployment of smart campus business system and a new basic network environment and trusted computing resources for the training, technology research and innovation of professionals in the next generation Internet related disciplines were provided, and the digital transformation of university education was enabled.…”
Get full text
Article -
135
Utilization of ICT for industrial promotion on a japanese remote island
Published 2020-02-01“…In recent years, the deployment of broadband across Japan has led to expectations for its utilization on remote islands. …”
Get full text
Article -
136
Security monitoring system of intelligent substation based on IoT
Published 2018-09-01“…Through the deployment of the internet of things,such as intelligent terminal,sensing sensor etc.…”
Get full text
Article -
137
High-resolution gridded dataset of China’s offshore wind potential and costs under technical change
Published 2025-01-01Get full text
Article -
138
Research on network virtualization slicing mechanism in SDN-based testbeds
Published 2016-04-01“…The researches on future network architecture and key logies need test environment both open and flex-ible. Traditional distribute architecture was short on effective control and new protocol deployment. …”
Get full text
Article -
139
Cost optimization model for multi-cloud network based on Kubernetes
Published 2023-02-01“…The cloud-native scheduling system, represented by Kubernetes, is widely used by cloud tenants in a multi-cloud environment.The problem of network observation becomes more and more serious, especially the cost of network traffic across cloud and region.In Kubernetes, the eBPF technology was introduced to collect the network data features of kernel state of operating system to solve the network observation problem, and then the network data features were modeled as QAP, a combination of heuristic and stochastic optimization was used to obtain the best near optimal solution in a real-time computing scenario.This model is superior to the Kubernetes native scheduler in the cost optimization of network resources, which is based on the scheduling strategy of computing resources only, and increases the complexity of scheduling links in a controllable range, effectively reduces the cost of network resources in a multi-cloud area deployment environment.…”
Get full text
Article -
140
Advanced Path Planning for UAV Swarms in Smart City Disaster Scenarios Using Hybrid Metaheuristic Algorithms
Published 2025-01-01“…The reference point group mobility (RPGM) model consistently achieved higher coverage rates (95%) than the random waypoint model (RWPM) (90%), thereby demonstrating the importance of group-based mobility patterns in enhancing UAV deployment efficiency. The findings reveal that the APC-GA adaptive clustering and path planning mechanisms effectively navigate propagation challenges, interference, and non-line-of-sight (NLOS) conditions, ensuring reliable connectivity in the most demanding environments. …”
Get full text
Article