-
301
On Ve-Degree-Based Irregularity Properties of the Crystallographic Structure of Molecules
Published 2021-01-01“…These theoretical conclusions provide practical guiding significance for pharmaceutical engineering and complex network and quantify the degree of folding of long organic molecules.…”
Get full text
Article -
302
Linear discriminant analysis in network traffic modeling
Published 2005-01-01“…Compared with traditional method this arithmetic is useful and can conveniently give an accurate judgment for complex network traffic trace.…”
Get full text
Article -
303
Comidas del Zopilote
Published 2014-06-01“…Using the “multispecies ethnography” perspective, the author underlines how the relations between human beings and the vulture are connected to food and empathy, and how the bird, as cleaner of the world, is involved in the complex network of relations framed by the basic Nahua concepts of working, feeding and loving. …”
Get full text
Article -
304
Consensus Congestion Control in Multirouter Networks Based on Multiagent System
Published 2017-01-01“…Simulation results by MATLAB and Ns2 indicate that the proposed algorithm maintains a high throughput and a low packet drip ratio and improves the quality of the service in the complex network environment.…”
Get full text
Article -
305
Personalized lightweight distributed network intrusion detection system in fog computing
Published 2023-06-01“…With the continuous development of Internet of Things (IoT) technology, there is a constant emergency of new IoT applications with low latency, high dynamics, and large bandwidth requirements.This has led to the widespread aggregation of massive devices and information at the network edge, promoting the emergence and deep development of fog computing architecture.However, with the widespread and in-depth application of fog computing architecture, the distributed network security architecture deployed to ensure its security is facing critical challenges brought by fog computing itself, such as the limitations of fog computing node computing and network communication resources, and the high dynamics of fog computing applications, which limit the edge deployment of complex network intrusion detection algorithms.To effectively solve the above problems, a personalized lightweight distributed network intrusion detection system (PLD-NIDS) was proposed based on the fog computing architecture.A large-scale complex network flow intrusion detection model was trained based on the convolutional neural network architecture, and furthermore the network traffic type distribution of each fog computing node was collected.The personalized model distillation algorithm and the weighted first-order Taylor approximation pruning algorithm were proposed to quickly compress the complex model, breaking through the limitation of traditional model compression algorithms that can only provide single compressed models for edge node deployment due to the high compression calculation overhead when facing a large number of personalized nodes.According to experimental results, the proposed PLD-NIDS architecture can achieve fast personalized compression of edge intrusion detection models.Compared with traditional model pruning algorithms, the proposed architecture achieves a good balance between computational loss and model accuracy.In terms of model accuracy, the proposed weighted first-order Taylor approximation pruning algorithm can achieve about 4% model compression ratio improvement under the same 0.2% model accuracy loss condition compared with the traditional first-order Taylor approximation pruning algorithm.…”
Get full text
Article -
306
The Traffic Capacity Variation of Urban Road Network due to the Policy of Unblocking Community
Published 2021-01-01“…Stage two consists of constructing a global capacity model based on multilayer complex network coupling from the perspective of complex global dynamics. …”
Get full text
Article -
307
Co-Loan Network of Chinese Banking System Based on Listed Companies’ Loan Data
Published 2018-01-01“…Based on the loan data of Chinese listed companies from 2008 to 2016, this paper constructs a co-loan network of the Chinese banking system and analyzes the topological structures and corresponding evolvement characteristics from the perspective of complex network. Through the empirical studies, we find that the co-loan network always displays a core-periphery structure; for example, ten banks including four state banks and six large commercial banks are always in the core region of the Chinese banking system for nine consecutive years. …”
Get full text
Article -
308
Research and application of UMR technology for new metropolitan area network
Published 2022-02-01“…The new metropolitan area network adopts the new architecture of spine-leaf.BRAS is a high hanging and centralized deployment mode.With the deployment of the new metropolitan area network, the home wide service is gradually cut over to the new network.The current typical bearer scheme has many problems, such as the sharp increase of pressure on the network equipment MAC routing table, the large and complex network configuration.After analyzing and comparing the defects of typical bearer schemes, the implementation scheme of UMR technology was innovatively put forward, which provided reference significance for promoting the rapid deployment of new metropolitan area network.…”
Get full text
Article -
309
Seismic Isolation Performance Evaluation for a Class of Inerter-Based Low-Complexity Isolators
Published 2020-01-01“…In this paper, the seismic base isolation problem for all low-complexity networks containing one inerter, one spring, and one damper is studied based on a multi-degree-of-freedom model. …”
Get full text
Article -
310
Optimization of Communication Path Planning Method for Low Earth Orbit Constellation Based on Dijkstra Algorithm
Published 2024-09-01“…Complex network topologies and unbalanced uses of network resources are key problems in communication path planning for low earth orbit constellations. …”
Get full text
Article -
311
Delay adaptive transmission method for scalable video streaming based on OpenFlow
Published 2013-11-01“…This method combines SVC streaming scalable and flexible programmable features of OpenFlow effectively, and implements SVC streaming hierarchical adaptive transmission in a dynamic network,by building the base layer and the enhancement layer separate routes under complex network environment with limited network bandwidth and link congestion. …”
Get full text
Article -
312
Analysis of Complex Transportation Network and Its Tourism Utilization Potential: A Case Study of Guizhou Expressways
Published 2020-01-01“…Transportation is an example of a typical, open, fluid complex network system. Expressways are one form of complex transportation networks, and expressway service areas serve as infrastructure nodes in the expressway transportation network; hence, their construction has a significant impact on tourism development and utilization. …”
Get full text
Article -
313
Early-warning schemes for alarm mutation in networks based on control chart
Published 2016-03-01“…The amount of various network elements and alarms trigged is pretty startling with the expansion of the network.The traditional network operation and maintenance,that is,passively processed worksheet after the occurrence of network failure one by one,has been unable to adapt to the complex network management today.The various types of important service-related network alarm titles were sorted out,and the fluctuation under control for kinds of important alarms by control chart,establishes the graded early-warning model and algorithm for alarm mutation in networks combining with the service-related analysis,were analyzed.At last,a dynamic closed-loop control mechanism,which was preceded by fault occurred and actively digs into hidden troubles,was proposed.…”
Get full text
Article -
314
Load balancing based on clustering analysis and deep learning for multi-frequency and multi-mode network
Published 2020-07-01“…Load balancing is a huge challenge for LTE multi-frequency and multi-mode network.Hundreds of parameters are involved in load balancing for the complex network structure.Therefore,it is difficult to perform precise and meticulous configuration only relying on human experience.In order to cope with the challenge,a load balancing scheme based on clustering analysis and deep learning was proposed.Firstly,the key indicators were selected to identify the network scenes,and then big data and deep learning technologies were used to mine the relationship between data.Finally,the optimum system parameters for different network scenes were found.It has been proved that machine learning technology can greatly improve the accuracy and the efficiency of parameter configuration.…”
Get full text
Article -
315
Multiple Addressing Coordination and Switching Technology in Space-Integrated-Ground Information Network
Published 2020-12-01“…The construction requirements and deployment status of the space-integrated-ground integrated information network was analyzed, and the diffi culties in the integration of satellite network and internet was discussed.To tackle the problems of complex network structure, high dynamic topology, diffi cult data compatibility and limited satellite resources, a multi addressing coordination and switching technology based on IP address, ID identifi cation and content name was proposed.In particular, a multi addressing datagram format was designed, and the multi addressing route forwarding mechanism was extended.It could realized the interconnection of heterogeneous networks, the stability of mobile communication, the compatible switching of polymorphic data, and the effi cient routing with low power consumption of satellites.…”
Get full text
Article -
316
Molecular Mechanisms of the Whole DNA Repair System: A Comparison of Bacterial and Eukaryotic Systems
Published 2010-01-01“…All organisms have developed a complex network of DNA repair mechanisms. A variety of different DNA repair pathways have been reported: direct reversal, base excision repair, nucleotide excision repair, mismatch repair, and recombination repair pathways. …”
Get full text
Article -
317
Stanley Depth of the Edge Ideal of Extended Gear Networks and Application in Circuit Analysis
Published 2022-01-01“…Graph theory is widely used in power network analysis, complex network, and engineering calculation. Stanley depth is a geometric invariant of the module which is closely related to an algebraic invariant called depth of the module. …”
Get full text
Article -
318
SDN resolve space-ground integrated network based on end side computing
Published 2020-07-01“…There is a complex network structure of space-ground integrated network.And this kind of network has heterogeneous network,dynamic topology,intermittently connected node height exposure,and so on.There are many limitations in traditional SDN implementation.A method of SDN implement based on end side computing and a space-ground integrated network based on SDN were presented,which separated space network control and data,using the computing power of the communication terminal (mobile terminal and fixed ground backbone network),unloading the calculation of SDN controller in space-based plane,thus simplifying the data forwarding plane.A practical and effective verification method was also proposed.…”
Get full text
Article -
319
A Model for Evolution of Investors Behavior in Stock Market Based on Reinforcement Learning in Network
Published 2020-01-01“…Due to the heterogeneity of learning characteristics of bounded rational investors in investment decisions, we consider, respectively, the evolution mechanism of individual investors and institutional investors on the complex network theory and reinforcement learning theory. …”
Get full text
Article -
320
L’Éducation nouvelle et l’idée de liberté : approche trialectique
Published 2015-03-01“…More specifically, referring to the paradigm of complexity, which is enriched by the contributions of trialectic logic, we study the relationship freedom / education on repositioning it in a complex network of influences in order to highlight the concepts third who successively governed it. …”
Get full text
Article