Showing 321 - 340 results of 471 for search '"complex networks"', query time: 0.06s Refine Results
  1. 321

    Security evaluation method for confidential and stable complex systems by Jinxin ZUO, Ziyu GUO, Jin LI, Jie ZHANG, Yueming LU

    Published 2019-04-01
    “…Confidential and stable complex systems are characterized by high confidentiality requirements,continuous and stable operation requirements,and complex network structure,but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators.In view of this,a comprehensive security evaluation model based on the correlation analysis of indicators is proposed and eight security objectives covering confidentiality,availability,controllability,identifiability,personnel organization,risk management,enterprise grading and sustainability at three levels of product,system and service have been established.Taking the confidentiality of the smart medical IoT as an example,a sorting and weight confirmation algorithm based on index correlation is constructed,and the fuzzy comprehensive evaluation method is used to evaluate the selected system.…”
    Get full text
    Article
  2. 322

    Community detection in multiplex networks via consensus matrix by Nianwen Ning, Bin Wu

    Published 2017-09-01
    “…In complex network of real world,there are many types of relationships between individuals,and the more effective research ways for this kind of network is to abstract these relationship as a multiplex network.More and more researchers are attracted to be engaged in multiplex network research.A novel framework of community detection of multiplex network based on consensus matrix was presented.Firstly,this framework merges the structure of multiplex network and the information of link between each node into monoplex network.Then,the community structure information of each layer network was obtained through consensus matrix,and the traditional community division algorithm was utilized to carry out community detection of combine networks.The experimental results show that the proposed algorithm can get better performance of community partition in the real network datasets.…”
    Get full text
    Article
  3. 323

    Traffic identification of network business based on multi-layer cascade algorithm by Feng HUANG, Yao WANG, Li HUANG, Jiming YAO, Shidong LIU

    Published 2015-12-01
    “…The contradiction between traffic demand and network bandwidth is the main problem of the current network.Traffic management is one of the effective solutions,at the same time it can improve the quality of service of the network,and network traffic identification is the basis of fine traffic management.The traffic identification method of network business based on multi-layer cascade algorithm was proposed,after the research of network traffic identification and machine learning techniques.This method can adapt to the situation of the complex network traffic flow,and can balance the contradiction between the time performance and the accuracy of the machine learning algorithm.Furthermore the cascade algorithm of this method takes the cost imbalance into account,and takes more attention to the identification of important business,so it can help enhance user experience.…”
    Get full text
    Article
  4. 324

    The Construction of an Aircraft Control Multilayer Network and Its Robustness Analysis by Guangjian Ren, Ming Zhang, Yushuai Guo

    Published 2022-01-01
    “…The characteristics of ACMN are studied based on complex network theory. Simultaneously, according to the multilayer characteristics of ACMN and the relative entropy theory, a robustness analysis method is proposed. …”
    Get full text
    Article
  5. 325

    Crosstalk between Innate Lymphoid Cells and Other Immune Cells in the Tumor Microenvironment by Fabian Flores-Borja, Sheeba Irshad, Peter Gordon, Felix Wong, Ibrahim Sheriff, Andrew Tutt, Tony Ng

    Published 2016-01-01
    “…However, recent evidence from experimental models and clinical studies has demonstrated that ILC contribute to the mechanisms that generate suppressive or tolerant environments that allow tumor regression or progression. Defining the complex network of interactions and crosstalk of ILC with other immune cells and understanding the specific contributions of each type of ILC leading to tumor development will allow the manipulation of their function and will be important to develop new interventions and therapeutic strategies.…”
    Get full text
    Article
  6. 326

    PM2.5 concentration prediction model based on random forest regression analysis by Xu DU, Jingyu FENG, Shaoqing LV, Wei SHI

    Published 2017-07-01
    “…The random foreat regression algorithm was introduced to solve the shortcomings of neural network in predicting the PM2.5 concentration,such as over-fitting,complex network structure,low learning efficiency.A novel PM2.5 concentration prediction model named RFRP was designed by analyzing the 22 characteristic factors including the meteorological conditions,the concentration of air pollutants and the season.The historical meteorological data of Xi’an in 2013—2016 were collected to verify the effectiveness of the model.The experimental results show that the proposed model can not only predict the PM2.5 concentration effectively,but also improve the operating efficiency of the model without affecting the prediction accuracy.The average run time of the proposed model is 0.281 s,which is about 5.58% of the neural network prediction model.…”
    Get full text
    Article
  7. 327

    Algorithm of grid reliability assessment and reconstruction optimization system by Zhibin ZANG, Peihao ZHENG, Benhai WEI, Zaipei ZHAI, Shengguo MA

    Published 2017-12-01
    “…Based on the research of the reliability of distribution network and the reconstruction of network,a new method was put forward to reconstruct the power grid reliability.Firstly,the evaluation index system was proposed,which included the active network LOSS (LOSS),lack of system power supply (ENS) and the average power supply availability (ASAI).A multi-objective model of distribution network was constructed by normalization,and the multi-objective function was transformed into a new single objective function by using the judgment matrix method,which realized fast calculation of power distribution network reconstruction and optimization.Through IEEE69 example verification,the optimization algorithm can obtain the global optimal solution and reduce the computational time at the same time,effectively solve the problem of the reconstruction of the complex network optimization.…”
    Get full text
    Article
  8. 328

    GBSS:researches on group-based semantic search by CHEN Hai-tao, GONG Zheng-hu, HUANG Zun-guo

    Published 2006-01-01
    “…A group-based semantic search method-GBSS was presented.With regard to architecture,GBSS introduced a hybrid architecture in which the storage and search of raw data was based on DHT network,but the storage and search of meta-data was based on unstructured P2P network.With regard to search algorithm,GBSS presented a file grouping method without users’ description and constructs friend relations between nodes based on search interests and sharing files.The design idea came from some conclusions of P2P researches and complex network researches.The forwarding of user requests came use of friend relations in search process,which integrated effective caching strategy.The simulation tests prove that the GBSS algorithm is efficient,stable,and the performance improved times compared with traditional algorithms.…”
    Get full text
    Article
  9. 329

    Adaptive federated learning secure aggregation scheme based on threshold homomorphic encryption by Zhuo MA, Jiayu JIN, Yilong YANG, Yang LIU, Zuobin YING, Teng LI, Junwei ZHANG

    Published 2023-07-01
    “…Aiming at the communication bottleneck problem when the current federated learning security aggregation algorithm was applied in a complex network environment, an adaptive federated learning secure aggregation scheme based on threshold homomorphic encryption was proposed.While protecting gradient privacy, users adaptively compress gradients based on the current available bandwidth, greatly reduced communication overhead for federated users.Furthermore, the new dynamic decryption task distribution algorithm and gradient combination algorithm were designed in the phase of aggregation gradient decryption, which relieved the user’s uplink communication pressure.The experimental results show that the proposed scheme can sharply reduce the amount of communication to 4% compared with the existing federated learning scheme with a trivial model accuracy loss of 1%.…”
    Get full text
    Article
  10. 330

    A Decomposition Algorithm for Learning Bayesian Networks Based on Scoring Function by Mingmin Zhu, Sanyang Liu

    Published 2012-01-01
    “…The theoretical and experimental results show that our algorithm can efficiently and accurately identify complex network structures from small data set.…”
    Get full text
    Article
  11. 331

    Detecting DDoS attack based on compensation non-parameter CUSUM algorithm by YAN Fen1~3, CHEN Yi-qun3, HUANG Hao1, YIN Xin-chun3

    Published 2008-01-01
    “…t,calculated the ratio of the number of unacknowledged segments and the number of all segments.Then,the statistical sequence based on time came into being.After that,an improved non-parameter recursive CUSUM algorithm was used to detect attack effi-ciently on line.In this procedure,the suspicious packets were also recorded.Experiments prove that this algorithm is fast and efficient.It has low false-positive rate and could adapt to more complex network environments.In addition,it is helpful to attack analysis and tracing.…”
    Get full text
    Article
  12. 332

    Study on the 5GC security situational awareness system by Yatian LIU, Bowen HU, Maofei CHEN, Dongxin LIU

    Published 2022-11-01
    “…As the key infrastructure for the next generation mobile network, 5G confronts more complex network security threats, targeting the new architecture and techniques that 5G evolves.Also as a key component of the 5G architecture, 5GC security has become an essential research topic.5GC security situational awareness aims at understanding the current security situation and making tendency predictions in near future, which is an effective technique to counter network threats under 5G scenarios and enhance 5G operations more securely and effectively.The security situational awareness was firstly introduced, 5G particularly 5GC security demands were analyzed, then the detail design of 5GC security situational awareness system was addressed, including the system architecture and key techniques.…”
    Get full text
    Article
  13. 333

    Réseaux familiaux et institutionnels des religieuses : des alliés en justice ? Le cas des Visitandines de Rennes (xviie-xviiie siècles) by Aude Loriaud

    Published 2023-12-01
    “…Thus, the Visitandines of Bordeaux were able to win a trial in the parliament of Brittany thanks to the Visitandines of Rennes. We can sketch a complex network consisting of institutional, family and friendly links, and reveal informal gratuities to judicial officers. …”
    Get full text
    Article
  14. 334

    A Hybrid Model of Extreme Learning Machine Based on Bat and Cuckoo Search Algorithm for Regression and Multiclass Classification by Qinwei Fan, Tongke Fan

    Published 2021-01-01
    “…However, the standard ELM requires more hidden nodes in the application due to the random assignment of hidden layer parameters, which in turn has disadvantages such as poorly hidden layer sparsity, low adjustment ability, and complex network structure. In this paper, we propose a hybrid ELM algorithm based on the bat and cuckoo search algorithm to optimize the input weight and threshold of the ELM algorithm. …”
    Get full text
    Article
  15. 335

    Cooperation Mechanism in Blockchain by Evolutionary Game Theory by Jinxin Zhang, Meng Wu

    Published 2021-01-01
    “…To better understand the blockchain design of cooperation mechanisms, in this paper, we constructed a game framework between participants with different willingness, using evolutionary game theory, and complex network games. We analyzed how the behavior of participants potentially develops with cost and payoff. …”
    Get full text
    Article
  16. 336

    Enter Sir Alfred, or Hitchcock’s Three Du Mauriers by Jean-Loup Bourget

    Published 2021-11-01
    “…It concludes that the complex network between Hitchcock and three generations of Du Mauriers is evidence of the Hollywood director’s abiding English roots and inspiration.…”
    Get full text
    Article
  17. 337

    PPARα as a Transcriptional Regulator for Detoxification of Plant Diet-Derived Unfavorable Compounds by Bunichiro Ashibe, Yu Nakajima, Yuka Fukui, Kiyoto Motojima

    Published 2012-01-01
    “…PPARα plays a vital role in direct or indirect activation of the relevant genes via the complex network among other xenobiotic nuclear receptors. …”
    Get full text
    Article
  18. 338

    A survey on resource allocation in backscatter communication networks by Yongjun XU, Haoke YANG, Yinghui YE, Qianbin CHEN, Guangyue LU

    Published 2021-09-01
    “…With the development of Internet of things (IoT) technology, wireless networks have the characteristics of massive user access, high power consumption, and high capacity requirements.In order to meet the transmission requirements and reduce energy consumption, backscatter communication technology was considered to be one of the most effective solutions to the above problems.In the fact of complex network scenarios, the improvement of spectrum efficiency, system capacity, and energy management has become an urgent problem of resource allocation areas in backscatter communications.For this problem, resource allocation algorithms in backscatter communications were surveyed.Firstly, the basic concept and different network architectures of backscatter communication were introduced.Then, resource allocation algorithms in backscatter communication networks were analyzed according to different network types, optimization objectives, and the number of antennas.Finally, the challenges and future research trends of resource allocation problems in backscatter communication networks were prospected.…”
    Get full text
    Article
  19. 339

    Analysing Topology Control Protocols in Wireless Sensor Network Using Network Evolution Model by Chiranjib Patra, Samiran Chattopadhyay, Matangini Chattopadhyay, Parama Bhaumik

    Published 2015-10-01
    “…Using our theoretical framework based on a complex network model, we have also tried to quantify some of the observed features of these algorithms such as number of cluster heads and average degree of the resultant graph. …”
    Get full text
    Article
  20. 340

    A Novel Intelligent Recommendation Algorithm Based on Mass Diffusion by Guanglai Tian, Shuang Zhou, Gengxin Sun, Chih-Cheng Chen

    Published 2020-01-01
    “…Based on user-item bipartite graph, this paper establishes a multisubnet composited complex network (MSCCN) of multiple user relationships and then extends the mass diffusion (MD) algorithm into a novel intelligent recommendation algorithm. …”
    Get full text
    Article