Showing 321 - 340 results of 397 for search 'node’s influence', query time: 0.07s Refine Results
  1. 321

    Risk assessment method for network attack surface based on Bayesian attack graph by Yuyang ZHOU, Guang CHENG, Chunsheng GUO

    Published 2018-06-01
    “…Aiming at the lack of objective risk assessment for the network attack surface on moving target defense,in order to realize the security risk assessment for the network system,and calculate the potential attack paths,a risk assessment method for network attack surface based on Bayesian attack graph was proposed.The network system resources,vulnerability and dependencies between them were used to establish Bayesian attack graph.Considering dependencies between nodes,the correlation between the resource and the influence of attacks on the attack path,the probability of each state that attackers can reach and the maximum probability attack path can be inferred.The experimental results prove the feasibility and effectiveness of the proposed network attack surface risk assessment method,which can provide a good support for the selection of dynamic defensive measures of attack surface.…”
    Get full text
    Article
  2. 322
  3. 323

    STUDY ON SHEAR DEFORMATION AND FAILURE CHARACTERISTICS OF TWO-DIMENSIONAL CELLULAR STRUCTURE by ZHANG ZuWei, ZHANG ChenFan, DENG QingTian, YANG ZhiChun, Ll XinBo, WEN JinPeng

    Published 2024-04-01
    “…The results show that the failure can attribute to tensile failure and shear failure near the nodes of cell walls, and the damage extends gradually from the edge to the inside. …”
    Get full text
    Article
  4. 324

    Delay Analysis of Networked Control Systems Based on 100 M Switched Ethernet by Ming Li

    Published 2014-01-01
    “…The key factors that influence the upper bound delay of switched Ethernet are analyzed; then, the characteristics of the upper bound delay are presented, which show that the delay induced by the single-level 100 M switched Ethernet has little effect on the performance of control systems, while the delay induced by the multiple-level 100 M switched Ethernet may meet the time requirements of all classes of control systems if the numbers of levels and the numbers of nodes connecting to switches are set properly. …”
    Get full text
    Article
  5. 325

    EBS-based efficient and secure group key management in wireless sensor networks by WANG Wei1, ZHAO Wen-hong2, LI Feng-hua3.4, MA Jian-feng3

    Published 2009-01-01
    “…To achieve the secure group communication in wireless sensor networks(WSN), a EBS-based group key management scheme was presented.First, the network topology was simplified by combining the chain-clusters and the star-clusters.Next, to prevent the adversary uncover all the administrative keys by a few colluding sensors, the number of sensors needed to capture WSN was increased.Then, the sensors of key combinations distribution were sorted through a coloring algorithm.Based on all these operations, the presented scheme distributed the administrative keys based on the hamming distance and EBS.Furthermore, the approaches handling the join event and leave event were described.Two experiments were performed to study the potential for collusions and the influence of size of compromised nodes on the effectiveness against collusions.Simulation results demonstrate that the presented scheme boosts the WSN’ resilience to attacks.The performance evaluation on join event and leave event shows that the number of key-updating messages and storage of sensors in the proposed scheme are fewer than those of SHELL.…”
    Get full text
    Article
  6. 326

    Application of artificial neural network in the modeling and optimization of volatile acid from anaerobic digestion of biomass by Noohi Ali

    Published 2024-01-01
    “…An algorithm is run that iteratively makes billions of small adjustments to the weights and biases of millions of nodes. In this paper pilot-scale fermentation tests are carried out with mixtures of sewage sludge and food residues to investigate different process parameters that influence fermentation yields. …”
    Get full text
    Article
  7. 327

    Research on intrusion detection method of marine meteorological sensor network based on anomalous behaviors by Xin SU, Tian TIAN, Gong Ziyang, Yiqing ZHOU

    Published 2023-07-01
    “…To deal with the abnormal data flow attacks faced by the marine meteorological sensor network (MMSN), analyze the security mechanism, and aim at the complex and huge network structure and the extremely imbalanced data flow in the nodes, the intrusion detection method of marine meteorological sensor network based on anomalous behaviors was studied, and intrusion detection system (IDS) was built.The imbalance of dataset was considered emphatically, and the effective data generation was realized by using depth generation network CVAE-GAN to learn the distribution of minority classes in the dataset.OPTICS-based denoising algorithm was used to remove the noise points in majority classes and clarify the category boundaries.From the data perspective, the imbalance rate of dataset was reduced, the influence of imbalanced dataset on IDS was reduced, and the ability of classifier to identify minority classes of abnormal traffic was improved.The simulation results show that the proposed system can effectively identify all kinds of abnormal traffic, especially minority classes of them, and the imbalanced dataset processing method can significantly improve the detection ability of the classifier.…”
    Get full text
    Article
  8. 328
  9. 329

    Review of optimal resource allocation scheme for 5G Internet of vehicles by Chengyu ZHENG, Yiting YAO, Hongbin LIANG, Lei WANG

    Published 2023-07-01
    “…As a necessary part of the development of intelligent transportation, the Internet of vehicles (IoV) accelerates the construction of intelligent transportation infrastructure in China, which plays an important practical significance to the construction of smart city.The number of vehicles and the massive data generated by them make the transmission conflict rate between communication vehicle nodes rise significantly, and communication resources and computing resources are in short supply.Therefore, the effective resource allocation scheme can ensure the communication quality of vehicle networking, thereby improving the reliability of vehicle communication and reducing the time delay.Firstly, the influence of IoV on the development status of intelligent transportation at home and abroad and the bottlenecks of the development of IoV were analyzed.Secondly, in terms of the efficiency and safety of smart transportation, the resource allocation problem of IoV was analyzed.Thirdly, by summarizing the advantages of 5G technology, the contribution of 5G in the optimization allocation and management of vehicle networking resources was analyzed.Finally, combined with the application of artificial intelligence technology in the context of Internet of vehicles communication, computing and storage resource optimization allocation and management, the development prospect of intelligent transportation based on 5G+V2X was proposed.…”
    Get full text
    Article
  10. 330

    Calculation of Reinforced Concrete Frames for a Special Design Situation with Discrete Crack Modeling by S. Yu. Savin, T. A. Iliushchenko

    Published 2024-06-01
    “…The revealed effect may lead to an increase in the influence of longitudinal bending for the outermost row column to which the beam is adjacent.…”
    Get full text
    Article
  11. 331

    Physical layer security for SWIPT-NOMA system in presence of randomly located eavesdroppers by Yifan DING, Guangqiu LI, Hui LI

    Published 2022-03-01
    “…The combination of non-orthogonal multiple access (NOMA) and simultaneous wireless information and power transfer (SWIPT) technologies can improve spectrum efficiency of wireless system and solve the power supply problem of user nodes.However, when energy-harvesting receivers want to maliciously eavesdrop on confidential information sent by the base station, the information security transmission of SWIPT-NOMA system will be threatened.To enhance its physical layer security (PLS) performance, the PLS model of SWIPT-NOMA system with transmit antenna selection and power split strategies was proposed.When the spatial location randomly distributed energy-harvesting receivers obey the Poisson point process, the approximate expressions for the secrecy outage probability and non-zero secrecy capacity probability of SWIPT-NOMA system were derived by using the spatial Poisson probability generation function.Numerical and simulation results verify the accuracy of the expressions.The above expressions can also be used to study the influence of eavesdropper density, the distance between the base station and the far and near information receivers, the number of transmitting antennas and the power split factor on PLS performance of SWIPT-NOMA system.…”
    Get full text
    Article
  12. 332

    A novel droop coefficient to realize rapid SOC balance for distributed energy storage systems by Yuanxi Liu, Ling Yang, Maohua Wei

    Published 2025-03-01
    “…Additionally, a dynamic consistency algorithm is employed to gather average information about the distributed energy storage system, reducing communication line pressure as local nodes only exchange information with neighboring nodes. …”
    Get full text
    Article
  13. 333

    Transformed Calculation Models in Practice of Dynamic Analysis of Fixed Offshore Platform Structures by Valerii I. Sutyrin, Elvira R. Kuzhakhmetova

    Published 2024-12-01
    “…Contour nodes are used to connect the Substructure of super nodes to the Superstructure. …”
    Get full text
    Article
  14. 334

    High-accuracy localization for indoor group users based on extended Kalman filter by Tian Wang, Yuzhu Liang, Yaxin Mei, Muhammad Arif, Chunsheng Zhu

    Published 2018-11-01
    “…Moreover, we design a mobile group localization method based on extended kalman filter and believable factor of non-localized nodes, which can alleviate the influence caused by environmental noisy and unstable wireless signals to improve the localization accuracy. …”
    Get full text
    Article
  15. 335

    Impact of Urban Rail Transit Network on Residential and Commercial Land Values in China: A Complex Network Perspective by Shiping Wen, Jiangang Shi, Wei Zhang

    Published 2021-01-01
    “…This study applied a Space-P model of urban rail transit network based on complex network theory and demonstrated the influence of urban rail transit network characteristics on residential and commercial land prices. …”
    Get full text
    Article
  16. 336

    Study of Stress and Deformation of High Concrete-Face Rockfill Dam on Steep Slope in Narrow Valley by HOU Bingling, NIE Baisong

    Published 2022-01-01
    “…At present,in the finite-element stress and strain calculation of rockfill dams,fixed support is mostly adopted to simulate the connection between the rockfill at the bank slope and the slope.As for a concrete-face rockfill dam (CFRD) in the steep slope area of a narrow valley,the rockfill may slip along the bank slope face,in which case fixed support simulation is inconsistent with the actual situation.To study the influence of the steep slope in a narrow valley on the stress and deformation of a CFRD,we adopt the thickness-free Goodman element to simulate the interface between the steep slope boundary and the rockfill in a narrow valley.The results are compared with those of the conventional method of simulating the rockfill nodes at the bank slope as fixed support.The calculation results show that the deformation and stress distribution of the rockfill body are similar in the two cases,although the deformation is relatively smaller when fixed support treatment is implemented.Moreover,the tensile stress at the bottom of the concrete face in the riverbed section is large in the case of fixed support,which disagrees with the practical situation.After frictional contact is considered,the rockfill can slide along the bank slope,the stress distribution in this area tends to be uniform,and the arch effect is minor.After impoundment,the concrete face at the bank slope is slightly compressed under the action of the hydrostatic pressure,which is in line with the actual situation.…”
    Get full text
    Article
  17. 337

    Regulatory Role of rno-miR-30b-5p in IL-10 and Toll-like Receptor 4 Expressions of T Lymphocytes in Experimental Autoimmune Uveitis In Vitro by Yuanyuan Sun, Dadong Guo, Bin Liu, Xuewei Yin, Huixia Wei, Kai Tang, Hongsheng Bi

    Published 2018-01-01
    “…Meanwhile, the levels of rno-miR-30b-5p in eye tissues, spleen, and lymph nodes were measured using quantitative PCR (Q-PCR). …”
    Get full text
    Article
  18. 338

    The Spread of Information in Virtual Communities by Zhen Zhang, Jin Du, Qingchun Meng, Xiaoxia Rong, Xiaodan Fan

    Published 2020-01-01
    “…Also, few researchers have considered the link between multilayer physical features and the nodes’ spreading influence. In this paper, we present two new ideas to enrich network theory as applied to VCs: a novel application of an adjusted coefficient of determination to topic growth and an adjustment to the Jaccard coefficient to measure the connection between two users. …”
    Get full text
    Article
  19. 339

    Parental effects of physiological integration on growth of a clonal herb by Li-Min Zhang, Li-Li Zheng, Fei-Hai Yu

    Published 2025-01-01
    “…In the first phase, we either severed or maintained the connections between the original proximal nodes (the basal portion) and the new distal nodes (the apical portion) of each genotype. …”
    Get full text
    Article
  20. 340

    Propagation Analysis for Wireless Sensor Networks Applied to Viticulture by Felipe Pinheiro Correia, Marcelo Sampaio de Alencar, Waslon Terllizzie Araújo Lopes, Mauro Soares de Assis, Brauliro Gonçalves Leal

    Published 2017-01-01
    “…In order to determine the position of the sensor nodes, the research dealt with various environmental factors that influence the intensity of the received signal. …”
    Get full text
    Article