Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    Dynamic Routing of Multiple QoS-Required Flows in Cloud-Edge Autonomous Multi-Domain Data Center Networks

    Shiyan Zhang1,*, Ruohan Xu2, Zhangbo Xu3, Cenhua Yu1, Yuyang Jiang1, Yuting Zhao4

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2287-2308, 2024, DOI:10.32604/cmc.2023.046550

    Abstract The 6th generation mobile networks (6G) network is a kind of multi-network interconnection and multi-scenario coexistence network, where multiple network domains break the original fixed boundaries to form connections and convergence. In this paper, with the optimization objective of maximizing network utility while ensuring flows performance-centric weighted fairness, this paper designs a reinforcement learning-based cloud-edge autonomous multi-domain data center network architecture that achieves single-domain autonomy and multi-domain collaboration. Due to the conflict between the utility of different flows, the bandwidth fairness allocation problem for various types of flows is formulated by considering different defined reward functions. Regarding the tradeoff between… More >

  • Open Access

    ARTICLE

    Multi-Domain Malicious Behavior Knowledge Base Framework for Multi-Type DDoS Behavior Detection

    Ouyang Liu, Kun Li*, Ziwei Yin, Deyun Gao, Huachun Zhou

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2955-2977, 2023, DOI:10.32604/iasc.2023.039995

    Abstract Due to the many types of distributed denial-of-service attacks (DDoS) attacks and the large amount of data generated, it becomes a challenge to manage and apply the malicious behavior knowledge generated by DDoS attacks. We propose a malicious behavior knowledge base framework for DDoS attacks, which completes the construction and application of a multi-domain malicious behavior knowledge base. First, we collected malicious behavior traffic generated by five mainstream DDoS attacks. At the same time, we completed the knowledge collection mechanism through data pre-processing and dataset design. Then, we designed a malicious behavior category graph and malicious behavior structure graph for… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Topologies for Multi-Domain Software-Defined Networking

    Jiangyuan Yao1, Weiping Yang1, Shuhua Weng1, Minrui Wang1, Zheng Jiang2, Deshun Li1,*, Yahui Li3, Xingcan Cao4

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 741-755, 2023, DOI:10.32604/csse.2023.031531

    Abstract Software-defined networking (SDN) is widely used in multiple types of data center networks, and these distributed data center networks can be integrated into a multi-domain SDN by utilizing multiple controllers. However, the network topology of each control domain of SDN will affect the performance of the multi-domain network, so performance evaluation is required before the deployment of the multi-domain SDN. Besides, there is a high cost to build real multi-domain SDN networks with different topologies, so it is necessary to use simulation testing methods to evaluate the topological performance of the multi-domain SDN network. As there is a lack of… More >

  • Open Access

    ARTICLE

    Multi-Domain Deep Convolutional Neural Network for Ancient Urdu Text Recognition System

    K. O. Mohammed Aarif1,*, P. Sivakumar2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 275-289, 2022, DOI:10.32604/iasc.2022.022805

    Abstract Deep learning has achieved magnificent success in the field of pattern recognition. In recent years Urdu character recognition system has significantly benefited from the effectiveness of the deep convolutional neural network. Majority of the research on Urdu text recognition are concentrated on formal handwritten and printed Urdu text document. In this paper, we experimented the Challenging issue of text recognition in Urdu ancient literature documents. Due to its cursiveness, complex word formation (ligatures), and context-sensitivity, and inadequate benchmark dataset, recognition of Urdu text from the literature document is very difficult to process compared to the formal Urdu text document. In… More >

  • Open Access

    ARTICLE

    Multi-domain boundary knot method for ultra-thin coating problems

    Hui Zheng1, Wen Chen1,2,3, Chuanzeng Zhang4

    CMES-Computer Modeling in Engineering & Sciences, Vol.90, No.3, pp. 179-195, 2013, DOI:10.3970/cmes.2013.090.179

    Abstract This paper develops a multi-domain boundary knot method (BKM) formulation to solve the heat conduction problems of ultra-thin coatings. This approach overcomes the troublesome singular integration difficulty in the boundary element method in the simulation of such ultra-thin coating problems. Our numerical results show that the present BKM is very promising with sufficient accuracy in predicting the temperature distributions and the other physical quantities in thin coated layers even when the thickness ranges from 10-1m to 10-9m. The present method can also easily be extended to the three-dimensional problems. More >

  • Open Access

    ARTICLE

    Mechanical Analysis of 3D Composite Materials by Hybrid Boundary Node Method

    Yu Miao1, Zhe Chen1, Qiao Wang1,2, Hongping Zhu1

    CMC-Computers, Materials & Continua, Vol.43, No.1, pp. 49-74, 2014, DOI:10.3970/cmc.2014.043.049

    Abstract In this paper, an improved multi-domain model based on the hybrid boundary node method (Hybrid BNM) is proposed for mechanical analysis of 3D composites. The Hybrid BNM is a boundary type meshless method which based on the modified variational principle and the Moving Least Squares (MLS) approximation. The improved multi-domain model can reduce the total degrees of freedom (DOFs) compared with the conventional multi-domain solver. It is very suitable for the inclusion-based composites, especially for the composites when the inclusions are solid and totally embedded in the matrix domain. Numerical examples are presented to verify the improved multi-domain model and… More >

Displaying 1-10 on page 1 of 6. Per Page