-
1
-
2
-
3
Translating biomarker insights into practice: a path forward in TA-TMA management
Published 2025-05-01Get full text
Article -
4
-
5
Address overloading-based packet forwarding verification in SDN
Published 2022-03-01“…Aiming at the problem that the most existing forwarding verification mechanisms in software-defined network (SDN) verified packets hop-by-hop by incorporating new secure communication protocols, which incurred significant computation and communication overhead, an address overloading-based forwarding verification mechanism was proposed.The flow runtime was divided into consecutive random intervals by the ingress switch via overloading address fields of packet, basing on overloading address, packets were forwarded by each subsequent switch, and the controller sampled the packets forwarded by ingress and egress switch in the interval to detect abnormal behavior on the path.Finally, the proposed mechanism and simulation network was implemented and evaluated.Experiments show that the mechanism achieves efficient forwarding and effective anomaly detection with less than 8% of additional forwarding delays.…”
Get full text
Article -
6
Selfish Node Detection in Delay Tolerant Networks Using Fuzzy Logic
Published 2024-12-01“…Delay Tolerant Networks (DTNs) are a type of Mobile Ad-Hoc Networks (MANETs) where nodes are mobile, resulting in the absence of an end-to-end path between the source and destination nodes. Due to frequent disruptions in communication links, nodes in DTNs rely on a store, carry, and forward pattern to transmit messages. …”
Get full text
Article -
7
AUV Online Path Planning Strategy Based on Sectorial Gridded Detection Area
Published 2025-02-01“…In this study, an online path planning strategy capable of traversing narrow passages is proposed for an autonomous underwater vehicle equipped only with forward-looking sonar in unknown environments. …”
Get full text
Article -
8
Underwater Target Tracking Method Based on Forward-Looking Sonar Data
Published 2025-02-01Get full text
Article -
9
Integrating Message Content and Propagation Path for Enhanced False Information Detection Using Bidirectional Graph Convolutional Neural Networks
Published 2025-03-01“…We investigate the impact of textual content and its structural characteristics on the detection of false information. We propose a Bidirectional Graph Convolutional Neural Network (ICP-BGCN) that integrates message content with its propagation paths for enhanced detection performance. …”
Get full text
Article -
10
-
11
Intra-Domain Routing Protection Scheme Based on the Minimum Cross-Degree Between the Shortest Path and Backup Path
Published 2025-07-01“…The existing methods, such as Loop Free Alternative (LFA) and Equal Cost Multiple Paths (ECMP), have some shortcomings in terms of fast fault detection, fault response, and fault recovery processes, such as long fault recovery time, limitations of routing protection strategies, and requirements for network topology. …”
Get full text
Article -
12
Research on path planning for coal mine rescue robots
Published 2024-12-01“…Firstly, an adjustment mechanism of collision constraint function is incorporated into the bidirectional A* algorithm to improve path safety. Next, a correction factor is incorporated into the cost function of the Bidirectional A* algorithm to ensure that the forward and backward search paths intersect, preventing them from diverging. …”
Get full text
Article -
13
Fast loop-free path migration strategy in software defined network
Published 2022-05-01“…Aiming at the problems of slow and faulty path migration caused by distributed deployment and asynchronous operation of data plane forwarding devices in software defined network, a fast loop-free path migration strategy was proposed.First, a fast loop detection algorithm based on node ranking was proposed.By comparing the position differences of adjacent nodes on the old and new paths of the flow, whether there was a forwarding loop in the path migration process and the location detection where the loop occurs could be quickly determined.Then, a greedy update mechanism based on node relaxation dependency was proposed.The fast loop detection algorithm was used to uncover the relaxation dependency between the common switches on the old and new paths, and the number of switches updated in each round of the migration process was ensured to be maximized.Simulation results show that the proposed strategy can effectively avoid migration loops and obtain the optimal update time overhead under different network states compared with existing migration schemes.…”
Get full text
Article -
14
On the Performance Analysis of Decode-and-Forward Multi-Hop Hybrid FSO/RF Systems With Hard-Switching Configuration
Published 2019-01-01“…The FSO link is assumed to follow Gamma-Gamma distribution with the combined effects of pointing errors and path loss under intensity modulation with direct detection technique, and the RF link is assumed to follow Nakagami-m distribution. …”
Get full text
Article -
15
A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks
Published 2014-01-01“…The forwarding path of the key dissemination message strongly affects the number of nodes to which the authentication keys in the message are actually distributed. …”
Get full text
Article -
16
Intelligent Optimization of OSPF Path Selection Using Machine Learning Models for Adaptive Network Routing
Published 2025-08-01“… At the core of enterprise networks lies routing protocols that make forwarding decisions based on a set of rules and metrics. …”
Get full text
Article -
17
Load Balancing and Alternative Path Selection in Self-Organized Networks: A Data Plane Approach
Published 2025-01-01“…By detecting latency spikes indicative of congestion, switches autonomously select alternative paths to maintain optimal traffic flow. …”
Get full text
Article -
18
Research on improving the registration success rate of VoWi-Fi under multiple equivalent path scenarios
Published 2019-01-01“…The 3GPP's VoWi-Fi S2b specification requires the client to use the IPSec tunnel to register with the ePDG through the metropolitan area network. When IPSec faces a path forwarding fault in a multi-equivalent path environment of a metropolitan area network, it can't actively evade, and the service can't be registered. …”
Get full text
Article -
19
-
20
Joint Modulation Identification and IQ Impairment Handling in Two-Path Relayed Multiple Users OFDMA Over Unknown Channels
Published 2025-01-01“…The focus is placed on a multiple users OFDMA uplink configuration that employs amplify-and-forward relays within a two-path consecutive relayed (TCR) system. …”
Get full text
Article