-
8121
Efficient and safe software defined network topology discovery protocol
Published 2023-12-01“…The network topology discovery in OpenFlow-based software-defined networks is mainly achieved by utilizing the OpenFlow discovery protocol (OFDP).However, it has been observed in existing research that OFDP exhibits low updating efficiency and is susceptible to network topology pollution attacks.To address the efficiency and safety concerns of the network topology discovery protocol, an in-depth investigation was conducted on the mechanism and safety of OFDP network topology discovery.The characteristics of network topology establishment and updating in OFDP were analyzed, and an improved protocol named Im-OFDP (improved OpenFlow discovery protocol) based on the minimum vertex covering problem in graph theory was proposed.In Im-OFDP, the switch port table and network link table were initially established using prior information obtained from OFDP network topology discovery.Subsequently, a graph model of the network topology was constructed, and the minimum vertex covering algorithm in graph theory was employed to select specific switches for the reception and forwarding of topology discovery link layer discovery protocol (LLDP) packets.Multi-level flow tables were designed based on the network topology structure, and these flow entries were installed on the selected switches by the controller to process LLDP packets.To address security issues, dynamic check code verification in LLDP packets was employed to ensure the safety of network links.Additionally, a network equipment information maintenance mechanism was established based on known network topologies to ensure the safety of the network equipment.Experimental results demonstrate a significant reduction in the number of network topology discovery messages, bandwidth overhead, and CPU overhead through the deployment of Im-OFDP.Moreover, the response time for node failures and link recovery time after mode failure is substantially reduced.Im-OFDP also effectively mitigates various network topology pollution attacks, such as link fabrication and switch forgery attacks.Overall, Im-OFDP has the capability to enhance the efficiency and safety of SDN topology discovery.…”
Get full text
Article -
8122
Prospects of integrative and hybrid approaches to assessing undeclared work
Published 2024-12-01“…It is concluded that today there is no generally accepted methodology for studying undeclared work that would allow for a comprehensive and reliable assessment of the wide range of manifestations of this phenomenon. Common methods mainly focus on measuring individual types of it or the overall scale of the informal economy. …”
Get full text
Article -
8123
Integrated energy, environmental, and economic optimization for energy management systems in PHEVs considering traffic conditions
Published 2025-07-01“…To achieve this, a plug-in hybrid electric vehicle is modeled based on the Samand vehicle using experimental data. A genetic algorithm is then employed to perform sizing optimization of the components. …”
Get full text
Article -
8124
Comprehensive analysis of cuproptosis-related genes in immune infiltration and development of a novel diagnostic model for acute kidney injury
Published 2024-12-01“…Background Acute kidney injury (AKI) represents a diverse range of conditions characterized by high incidence and mortality rates, and it is mainly associated with immune-mediated mechanisms and mitochondrial metabolism dysfunction. …”
Get full text
Article -
8125
Equatorial convection controls boreal summer intraseasonal oscillations in the present and future climates
Published 2025-02-01“…The weaker wind and moisture perturbations in the BAPM mainly cause this difference in the horizontal moisture advection between AAPM and BAPM. …”
Get full text
Article -
8126
A Robust Adaptive Strategy for Diesel Particulate Filter Health Monitoring Using Soot Sensor Data
Published 2025-04-01“…The transportation sector mainly relied on fossil fuel and is one of the major causes of climate change and environmental pollution. …”
Get full text
Article -
8127
A Distributed RF Threat Sensing Architecture
Published 2024-11-01“…The incorporation of the centralized SOC in the overall architecture allows also the centralized application of machine learning algorithms on all the received data.…”
Get full text
Article -
8128
Analysis of Tire-Pavement Contact Morphology Characteristics during the Virtual Track Train Maneuvering
Published 2022-01-01“…Then, the tire-pavement contact model was developed according to the Euler–Lagrange algorithm and validated. Contact area and stress distribution under uniform, braking, and cornering conditions are explored with the dynamic tire force of the virtual track train as the external load. …”
Get full text
Article -
8129
Synchronous Control of a Dual-Motor Driving Rack and Pinion Module for Steer-by-Wire System
Published 2024-01-01“…In order to improve these two goals, the existing synchronous control structures mainly designed controllers in the case of command tracking, and synchronization between motors used a compensation method using synchronous error. …”
Get full text
Article -
8130
Edge Artificial Intelligence: Real-Time Noninvasive Technique for Vital Signs of Myocardial Infarction Recognition Using Jetson Nano
Published 2021-01-01“…The research mainly pivots on two key factors in creating and training a CNN model to detect the vital signs and evaluate its performance metrics. …”
Get full text
Article -
8131
Design and Improvement of Routing Protocol for Field Observation Instrument Networking Based on LEACH Protocol
Published 2020-01-01“…Firstly, the FOI-LEACH was proposed to mainly improve the LEACH protocol in three aspects: (1) the network nodes are heterogeneous and combined with the characteristics of field observation instrument networking. …”
Get full text
Article -
8132
Reversible data hiding scheme based on enhanced image smoothness
Published 2022-06-01“…With the prosperity of Internet technology and the popularity of social networks, reversible data hiding technology has been widely adopted in concealed information transmission of medical and military fields with its advantages on secret information recovery.Traditional reversible data hiding schemes mainly focus on the enhancement of embedding capacity and the reduction of the distortion rate of stego image, but pay less attention to the understanding of image details with the human eyes.Thus, it is difficult to resist hidden information detection methods.To solve the above challenge, a reversible data hiding algorithm was proposed, which ensured the visual quality of the stego image in the process of data hiding through the image visual smoothness enhancement.Specifically, the original image was divided into reference area and non-reference area.The secret data was embedded through the translation of the difference, which was calculated according to the predicted pixel value and the original pixel value of the non-reference area.To guarantee the visual quality of the image, smoothing mechanism was constructed, in which a Gaussian filter was utilized as a template to filter the predicted value and to add the filter difference into the cover image without loss.The pixel value of the reference region was used as edge information for lossless restoration of the original image.The filtering coefficient in Gaussian function was exploited as the embedded key to ensure the security of secret information.Simulation results regarding a large number of classical image data sets illustrated that the visual smoothness of stego image processed by this scheme was effectively enhanced with lower distortion rate, higher embedding rate, and higher embedding and extraction efficiency.In a typical circumstance, the similarity between the generated stego image and the Gaussian filter image can reach 0.9963.The PSNR and the embedded capacity can be up to 37.346 and 0.3289 BPP, respectively.…”
Get full text
Article -
8133
TEACHING COMPUTATIONAL THINKING IN SAUDI ARABIAN SCHOOLS USING SMARTPHONE APPS
Published 2024-10-01“…Computational thinking, encompassing problem-solving, computational logic, and algorithmic thinking, is an essential skill in the modern world. …”
Get full text
Article -
8134
Landslide Segmentation in High-Resolution Remote Sensing Images: The Van–UPerAttnSeg Framework with Multi-Scale Feature Enhancement
Published 2025-04-01“…However, traditional methods of landslide recognition mainly rely on visual interpretation and manual recognition of remote sensing images, which are time-consuming and susceptible to subjective factors, thereby limiting the accuracy and efficiency of recognition. …”
Get full text
Article -
8135
Outlier Traffic Flow Detection and Pattern Analysis Under Unplanned Disruptions: A Low-Rank Robust Decomposition Model
Published 2025-01-01“…The accelerated proximal gradient solution algorithm is applied to obtain the decomposition results. …”
Get full text
Article -
8136
Signal mining and risk analysis of tisotumab vedotin adverse events based on the FAERS database
Published 2025-08-01“…However, its adverse events (AE) are mainly recorded in clinical trials, lacking of real-world data. …”
Get full text
Article -
8137
Two-stage deep reinforcement learning method for agile optical satellite scheduling problem
Published 2024-11-01“…A neural network is designed as the observation scheduling network to determine observation actions for the sequenced tasks, which is well trained by the soft actor-critic algorithm. Finally, extensive experiments show that the proposed method, along with the designed mechanisms and strategy, is superior to comparison algorithms in terms of solution quality, generalization performance, and computation efficiency.…”
Get full text
Article -
8138
MIMO-OFDM/OCDM low-complexity equalization under a doubly dispersive channel in wireless sensor networks
Published 2020-06-01“…Moreover, the proposed work is applied over multiple-input multiple-output systems rather than the conventional single-antenna orthogonal chirp division multiplexing systems, based on the discrete fractional cosine transform orthogonal chirp division multiplexing system to mitigate the effect of frequency-selective and time-varying channels, using low-complexity equalizers, specifically by ignoring the intercarrier interference coming from faraway subcarriers and using the LSMR iteration algorithm to decrease the equalization complexity, mainly with long orthogonal chirp division multiplexing symbols, such as the TV symbols. …”
Get full text
Article -
8139
Describing Pulmonary Nodules Using 3D Clustering
Published 2022-10-01“…This paper combines algorithms to cluster and define nodule’s features in 3D visualization. …”
Get full text
Article -
8140
Learning Rates for -Regularized Kernel Classifiers
Published 2013-01-01“…We consider a family of classification algorithms generated from a regularization kernel scheme associated with -regularizer and convex loss function. …”
Get full text
Article