-
1321
Strength prediction of axial fiber-reinforced 3D5D circular braiding composites
Published 2025-01-01“…At the microscale, a unit cell model of axially-reinforced three-dimensional five-directional (3D5D) circular woven composite materials was established based on the spatial topology of the unit cell. This model considers the changes in cross-sectional shape of the yarns due to mutual compression and incorporates periodic boundary conditions for the circular unit cell. …”
Get full text
Article -
1322
Identifying Interindustry CO2 Emissions Transfer Structure Using Network Methods
Published 2021-01-01“…This paper proposes an input-output-based methodology to measure CO2 emissions transfer caused by linkages between industries in an economy and constructs the network topology in terms of the remarkable coefficients of interindustry CO2 emissions transfer. …”
Get full text
Article -
1323
Link-Disjoint Broadcasting Algorithm in Wormhole-Routed 3D Petersen-Torus Networks
Published 2013-12-01“…A 3D Petersen-Torus (3D PT) network has been proposed recently. the three-dimensionally magnified Petersen-Torus topology, 3D PT, is suitable for establishing a wireless sensor network (WSN) in 3D rectangular or cylindrical structures such as buildings. …”
Get full text
Article -
1324
Research and applications on intelligent operations of cross-professional carrying network
Published 2022-11-01“…With the increasingly close integration of artificial intelligence technology and networks, the operation and production of networks in the future should be fully digitalized, automated and intelligent.At present, fault locating of cross-professional network mainly relies on operation and maintenance staff of each professional network to analyze and dispatch orders, resulting in long trouble clearing time and repeated orders.In order to save manual work, with the help of automation and artificial intelligent technologies, a cross-professional network intelligent operation and maintenance system was developed and applied in real network.The associated topology information of IPRAN and OTN, along with the real-time IPRAN and OTN alarm data were analyzed, the root cause alarm was located accurately, the fault location was determined, and dispatch order was achieved automatically.A automatic cross-professional fault diagnosis capability was built by the system, which reduced the fault locating time from traditional two minutes to tens of milliseconds, therefore, the manual work was reduced by more than 90%, and 95% fault types of the existing network could be covered.…”
Get full text
Article -
1325
Stability Switches of Arbitrary High-Order Consensus in Multiagent Networks with Time Delays
Published 2013-01-01“…By employing a frequency domain method, we explicitly derive analytical equations that clarify a rigorous connection between the stability of general high-order consensus and the system parameters such as the network topology, communication time-delays, and feedback gains. …”
Get full text
Article -
1326
A transformer‐less DC–DC converter with high voltage conversion ratio adopting inverting voltage lift cell
Published 2022-05-01“…The proposed structure is compared with other topologies presented in the literature, previously. …”
Get full text
Article -
1327
Computational simulation of biaxial fatigue behaviour of lotus-type porous material
Published 2016-07-01“…The computational results are subjected to the appropriate statistical analysis, because of different pore topology a different fatigue lives are obtained on the same loading level. …”
Get full text
Article -
1328
Estimation of Super High-Rise Pumping Pressure for High-Performance Concrete Based on Computational Fluid Dynamics Modeling and Situation Measurement
Published 2021-01-01“…The later one is gained by establishing topology optimized model based on computational fluid dynamics and considering the lubrication layer formation. …”
Get full text
Article -
1329
Intelligent prediction method of network performance based on graph neural network
Published 2022-03-01“…There are some problems in the traditional network performance prediction technology, such as incomplete network state acquisition and poor accuracy of network performance evaluation.Combined with the characteristics of graph neural network learning and reasoning network relational data and the captured global information of the network, on the basis of the current network performance prediction methods, an intelligent prediction method of network performance based on graph neural network was proposed.Aiming at the complex network information, through the research of network system abstraction and network performance modeling, the network information can be transformed into the graph space convolution was used to process the message passing process of graph network nodes to realize the relationship reasoning between network information.The graph neural network model for network performance prediction was studied, and a graph neural network architecture which could deal with traffic matrix, network topology, routing strategy and node configuration was proposed.Finally, the experiments show that the model can better achieve accurate prediction of the network performance including delay, jitter and packet loss rate.…”
Get full text
Article -
1330
EBS-based efficient and secure group key management in wireless sensor networks
Published 2009-01-01“…To achieve the secure group communication in wireless sensor networks(WSN), a EBS-based group key management scheme was presented.First, the network topology was simplified by combining the chain-clusters and the star-clusters.Next, to prevent the adversary uncover all the administrative keys by a few colluding sensors, the number of sensors needed to capture WSN was increased.Then, the sensors of key combinations distribution were sorted through a coloring algorithm.Based on all these operations, the presented scheme distributed the administrative keys based on the hamming distance and EBS.Furthermore, the approaches handling the join event and leave event were described.Two experiments were performed to study the potential for collusions and the influence of size of compromised nodes on the effectiveness against collusions.Simulation results demonstrate that the presented scheme boosts the WSN’ resilience to attacks.The performance evaluation on join event and leave event shows that the number of key-updating messages and storage of sensors in the proposed scheme are fewer than those of SHELL.…”
Get full text
Article -
1331
Kinematics and Statics Analysis of Single Drive Multi-mode Metamorphic Manipulators
Published 2023-07-01“…Firstly, the equivalent mechanism of the metamorphic manipulator in different configurations is derived based on the law of minimum resistance. Variable topological structures are described using topology diagram and corresponding kinematic models of the manipulator in different configurations are established. …”
Get full text
Article -
1332
Global cyclic queuing and forwarding mechanism for large-scale deterministic networks
Published 2021-10-01“…Delay and jitter sensitive industrial control and remote driving application-driven network by best-effort to deterministic service.To meet the deterministic application of delay and jitter demands, industry and academia have conducted detailed research on stream filtering shaping and queue forwarding control, implementing microsecond delay and microsecond jitter of light load steady in small-scale ethernet environment.However, the study seldom considers the effects of long-distance topology change, transmission delay fluctuations and short-time traffic overloads, challenging to meet deterministic requirements under large-scale backbone networks.For this challenge, based on cyclic queuing and forwarding, considers source-destination path properties and deterministic traffic intensity, the global cyclic queuing and forwarding three-queue was proposed.The deterministic network simulation system was based on OMNeT++.Experiments compare queue forwarding control mechanisms such as CQF, CQF-three and GCQF-three.Results show that GCQF-three can timely adjust the gatecontrol and queueing priority according to the deterministic traffic state, achieves the best in delay, jitter and network utilization.…”
Get full text
Article -
1333
Belong and Nonbelong Relations on Double-Framed Soft Sets and Their Applications
Published 2021-01-01“…By the notions presented herein, many concepts can be studied on double-framed soft topology such as soft separation axioms and cover properties. …”
Get full text
Article -
1334
Towards load adaptive routing based on link critical degree for delay-sensitive traffic in IP networks
Published 2015-03-01“…LARA with ECMP (equal-cost multipath) routing strategy was compared which was widely deployed in the network by using NS2 simulation under CERNET2 topology. By evaluating the feedback delay, packet loss rate and traffic load, the results show that LARA can exhibit good performance and achieve excellent load balance, and meanwhile improve the robustness of the link when using multipath routing technology.…”
Get full text
Article -
1335
Coding-aware secure routing for multi-hop wireless networks
Published 2012-06-01“…To address security issues of DCAR in“coding+routing”discovery,a new security destination was proposed and a distributed coding-aware secure routing(DCASR)was designed.DCASR guarantees discovery of correct coding opportunity and establishment of trusted routes by using cryptography.To analyze the properties of DCASR,LS2(logic of security systems)was extended,and a new logic LS2-RP(LS2 for routing protocol)was proposed.In LS2-RP,the concepts of location and neighboring location of thread were introduced.The dynamic topology of multi-hop wireless networks was described by the set of neighbors for thread.The broadcast rule of neighboring location threads modeled the feature of wireless broadcast communication.Finally,DCASR was described by programming language of LS2-RP and security properties were defined by predicates and modal formulas of LS2-RP.Security of DCASR was analyzed by using the proof system of LS2-RP.DCASR can satisfy our secure destination.…”
Get full text
Article -
1336
Reliability and cost efficiency analysis for deep space habitat network based on Nash bargaining solution
Published 2017-02-01“…Focusing on the deep space habitat network requirements of high reliability and expensive links,two impact factors to the network performance were regarded as a multi-objective optimization problem,which were network reliability and cost efficiency model,and the relations between the two factors were formalized.Thereafter,the Nash model of cooperative game was used to make a fairness compromise to the network reliability and cost efficiency,and the Nash bargaining solution set was acquired through the Matlab platform with CVX.Further,through changing the threat value dynamically and performing the repeated game,the Pareto optimal solution could be obtained which can ensure the fairness of reliability and cost efficiency simultaneously.Finally,the Nash bargaining method was applied to a typical deep space habitat network topology,and described in detail how to set up the link numbers and link capacity in order to reduce the cost when the network traffic and the link capacity were given.The proposed work is important for the deployment and optimization of the deep space habitat network.…”
Get full text
Article -
1337
Energy-efficient strategy for data migration and merging in Storm
Published 2019-12-01“…Storm is suffering the problems of high energy consumption but low efficiency.Aiming at this problem,the resource constraint model,the optimal principle of data reorganization in executors and node voltage reduction principle were proposed based on the analysis of the architecture and topology of Storm,and further the energy-efficient strategy for data migration and merging was put forward in Storm(DMM-Storm),which was composed of resource constraint algorithm,data migration and merging algorithm as well as node voltage reduction algorithm.The resource constraint algorithm estimates whether work nodes are appropriate for data migration according to the resource constraint model.The data migration and merging algorithm designs an optimal method to migrate data according to the the optimal principle of data reorganization in executors.The node voltage reduction algorithm reduces voltage of work nodes according to node voltage reduction principle.The experimental results show that the DMM-Storm can reduce energy consumption efficiently without affecting the performance of cluster compared with the existing researches.…”
Get full text
Article -
1338
Energy-efficient strategy for work node by DRAM voltage regulation in storm
Published 2018-10-01“…Focused on the problem that traditional energy-efficient strategies never consider about the real time of data processing and transmission,models of directed acyclic graph,parallelism of instance,resource allocation for task and critical path were set up based on the features of data stream processing and the structure of storm cluster.Meanwhile,the WNDVR-storm (energy-efficient strategy for work node by dram voltage regulation in storm) was proposed according to the analysis of critical path and system performance,which included two energy-efficient algorithms aiming at whether there were any work nodes executing on the non-critical path of a topology.Finally,the appropriate threshold values fit for the CPU utilization of work node and the volume of transmitted data were determined based on the data processing and transmission constraints to dynamically regulate the DRAM voltage of the system.The experimental result shows that the strategy can reduce energy consumption effectively.Moreover,the fewer constraints are,the higher energy efficiency is.…”
Get full text
Article -
1339
Gradient Based Multipath Reliable Transmission Strategy with Fault Tolerance for Wireless Sensor Networks
Published 2014-04-01“…Firstly nonuniform clustering topology is established in nonequal clustering probability based on twice K -means algorithm. …”
Get full text
Article -
1340
Multidomain Hierarchical Resource Allocation for Grid Applications
Published 2012-01-01“…The resource allocation is performed in a distributed way among different domains such that each participant domain keeps its internal topology and private data hidden while sharing abstracted information with other domains. …”
Get full text
Article