Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (73)

Search Parameters:
Keywords = virtual isolated network

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 2501 KB  
Article
Field-Deployable Kubernetes Cluster for Enhanced Computing Capabilities in Remote Environments
by Teodor-Mihail Giurgică, Annamaria Sârbu, Bernd Klauer and Liviu Găină
Appl. Sci. 2025, 15(24), 12991; https://doi.org/10.3390/app152412991 - 10 Dec 2025
Viewed by 123
Abstract
This paper presents a portable cluster architecture based on a lightweight Kubernetes distribution designed to provide enhanced computing capabilities in isolated environments. The architecture is validated in two operational scenarios: (1) machine learning operations (MLOps) for on-site learning, fine-tuning and retraining of models [...] Read more.
This paper presents a portable cluster architecture based on a lightweight Kubernetes distribution designed to provide enhanced computing capabilities in isolated environments. The architecture is validated in two operational scenarios: (1) machine learning operations (MLOps) for on-site learning, fine-tuning and retraining of models and (2) web hosting for isolated or resource-constrained networks, providing resilient service delivery through failover and load balancing. The cluster leverages low-cost Raspberry Pi 4B units and virtualized nodes, integrated with Docker containerization, Kubernetes orchestration, and Kubeflow-based workflow optimization. System monitoring with Prometheus and Grafana offers continuous visibility into node health, workload distribution, and resource usage, supporting early detection of operational issues within the cluster. The results show that the proposed dual-mode cluster can function as a compact, field-deployable micro-datacenter, enabling both real-time Artificial Intelligence (AI) operations and resilient web service delivery in field environments where autonomy and reliability are critical. In addition to performance and availability measurements, power consumption, scalability bottlenecks, and basic security aspects were analyzed to assess the feasibility of such a platform under constrained conditions. Limitations are discussed, and future work includes scaling the cluster, evaluating GPU/TPU-enabled nodes, and conducting field tests in realistic tactical environments. Full article
Show Figures

Figure 1

25 pages, 3099 KB  
Article
Joint Energy–Resilience Optimization of Grid-Forming Storage in Islanded Microgrids via Wasserstein Distributionally Robust Framework
by Yinchi Shao, Yu Gong, Xiaoyu Wang, Xianmiao Huang, Yang Zhao and Shanna Luo
Energies 2025, 18(21), 5674; https://doi.org/10.3390/en18215674 - 29 Oct 2025
Viewed by 571
Abstract
The increasing deployment of islanded microgrids in disaster-prone and infrastructure-constrained regions has elevated the importance of resilient energy storage systems capable of supporting autonomous operation. Grid-forming energy storage (GFES) units—designed to provide frequency reference, voltage regulation, and black-start capabilities—are emerging as critical assets [...] Read more.
The increasing deployment of islanded microgrids in disaster-prone and infrastructure-constrained regions has elevated the importance of resilient energy storage systems capable of supporting autonomous operation. Grid-forming energy storage (GFES) units—designed to provide frequency reference, voltage regulation, and black-start capabilities—are emerging as critical assets for maintaining both energy adequacy and dynamic stability in isolated environments. However, conventional storage planning models fail to capture the interplay between uncertain renewable generation, time-coupled operational constraints, and control-oriented performance metrics such as virtual inertia and voltage ride-through. To address this gap, this paper proposes a novel distributionally robust optimization (DRO) framework that jointly optimizes the siting and sizing of GFES under renewable and load uncertainty. The model is grounded in Wasserstein-metric DRO, allowing worst-case expectation minimization over an ambiguity set constructed from empirical historical data. A multi-period convex formulation is developed that incorporates energy balance, degradation cost, state-of-charge dynamics, black-start reserve margins, and stability-aware constraints. Frequency sensitivity and voltage compliance metrics are explicitly embedded into the optimization, enabling control-aware dispatch and resilience-informed placement of storage assets. A tractable reformulation is achieved using strong duality and solved via a nested column-and-constraint generation algorithm. The framework is validated on a modified IEEE 33-bus distribution network with high PV penetration and heterogeneous demand profiles. Case study results demonstrate that the proposed model reduces worst-case blackout duration by 17.4%, improves voltage recovery speed by 12.9%, and achieves 22.3% higher SoC utilization efficiency compared to deterministic and stochastic baselines. Furthermore, sensitivity analyses reveal that GFES deployment naturally concentrates at nodes with high dynamic control leverage, confirming the effectiveness of the control-informed robust design. This work provides a scalable, data-driven planning tool for resilient microgrid development in the face of deep temporal and structural uncertainty. Full article
Show Figures

Figure 1

20 pages, 1343 KB  
Article
Hybrid CDN Architecture Integrating Edge Caching, MEC Offloading, and Q-Learning-Based Adaptive Routing
by Aymen D. Salman, Akram T. Zeyad, Asia Ali Salman Al-karkhi, Safanah M. Raafat and Amjad J. Humaidi
Computers 2025, 14(10), 433; https://doi.org/10.3390/computers14100433 - 13 Oct 2025
Cited by 1 | Viewed by 1418
Abstract
Content Delivery Networks (CDNs) have evolved to meet surging data demands and stringent low-latency requirements driven by emerging applications like high-definition video streaming, virtual reality, and IoT. This paper proposes a hybrid CDN architecture that synergistically combines edge caching, Multi-access Edge Computing (MEC) [...] Read more.
Content Delivery Networks (CDNs) have evolved to meet surging data demands and stringent low-latency requirements driven by emerging applications like high-definition video streaming, virtual reality, and IoT. This paper proposes a hybrid CDN architecture that synergistically combines edge caching, Multi-access Edge Computing (MEC) offloading, and reinforcement learning (Q-learning) for adaptive routing. In the proposed system, popular content is cached at radio access network edges (e.g., base stations) and computation-intensive tasks are offloaded to MEC servers, while a Q-learning agent dynamically routes user requests to the optimal service node (cache, MEC server, or origin) based on the network state. The study presented detailed system design and provided comprehensive simulation-based evaluation. The results demonstrate that the proposed hybrid approach significantly improves cache hit ratios and reduces end-to-end latency compared to traditional CDNs and simpler edge architectures. The Q-learning-enabled routing adapts to changing load and content popularity, converging to efficient policies that outperform static baselines. The proposed hybrid model has been tested against variants lacking MEC, edge caching, or the RL-based controller to isolate each component’s contributions. The paper concludes with a discussion on practical considerations, limitations, and future directions for intelligent CDN networking at the edge. Full article
(This article belongs to the Special Issue Edge and Fog Computing for Internet of Things Systems (2nd Edition))
Show Figures

Figure 1

13 pages, 3043 KB  
Article
Secure Virtual Network Provisioning over Key Programmable Optical Networks
by Xiaoyu Wang, Hao Jiang, Jianwei Li and Zhonghua Liang
Entropy 2025, 27(10), 1042; https://doi.org/10.3390/e27101042 - 7 Oct 2025
Viewed by 356
Abstract
Virtual networks have emerged as a promising solution for enabling diverse users to efficiently share bandwidth resources over optical network infrastructures. Despite the invention of various schemes aimed at ensuring secure isolation among virtual networks, the security of data transfer in virtual networks [...] Read more.
Virtual networks have emerged as a promising solution for enabling diverse users to efficiently share bandwidth resources over optical network infrastructures. Despite the invention of various schemes aimed at ensuring secure isolation among virtual networks, the security of data transfer in virtual networks remains a challenging problem. To address this challenge, the concept of evolving traditional optical networks into key programmable optical networks (KPONs) has been proposed. Inspired by this, this paper delves into the establishment of secure virtual networks over KPONs, in which the information-theoretically secure keys can be supplied for ensuring the information-theoretic security of data transfer within virtual networks. A layered architecture for secure virtual network provisioning over KPONs is proposed, which leverages software-defined networking to realize the programmable control of optical-layer resources. With this architecture, a heuristic algorithm, i.e., the key adaptation-based secure virtual network provisioning (KA-SVNP) algorithm, is designed to dynamically allocate key resources based on the adaption between the key supply and key demand. To evaluate the proposed solutions, an emulation testbed is established, achieving millisecond latencies for secure virtual network establishment and deletion. Moreover, numerical simulations indicate that the designed KA-SVNP algorithm performs superior to the benchmark algorithm in terms of the success probability of secure virtual network requests. Full article
(This article belongs to the Special Issue Secure Network Ecosystems in the Quantum Era)
Show Figures

Figure 1

27 pages, 3840 KB  
Article
Adaptive Lag Binning and Physics-Weighted Variograms: A LOOCV-Optimised Universal Kriging Framework with Trend Decomposition for High-Fidelity 3D Cryogenic Temperature Field Reconstruction
by Jiecheng Tang, Yisha Chen, Baolin Liu, Jie Cao and Jianxin Wang
Processes 2025, 13(10), 3160; https://doi.org/10.3390/pr13103160 - 3 Oct 2025
Viewed by 519
Abstract
Biobanks rely on ultra-low-temperature (ULT) storage for irreplaceable specimens, where precise 3D temperature field reconstruction is critical to preserve integrity. This is the first study to apply geostatistical methods to ULT field reconstruction in cryogenic biobanking systems. We address critical gaps in sparse-sensor [...] Read more.
Biobanks rely on ultra-low-temperature (ULT) storage for irreplaceable specimens, where precise 3D temperature field reconstruction is critical to preserve integrity. This is the first study to apply geostatistical methods to ULT field reconstruction in cryogenic biobanking systems. We address critical gaps in sparse-sensor environments where conventional interpolation fails due to vertical thermal stratification and non-stationary trends. Our physics-informed universal kriging framework introduces (1) the first domain-specific adaptation of universal kriging for 3D cryogenic temperature field reconstruction; (2) eight novel lag-binning methods explicitly designed for sparse, anisotropic sensor networks; and (3) a leave-one-out cross-validation-driven framework that automatically selects the optimal combination of trend model, binning strategy, logistic weighting, and variogram model fitting. Validated on real data collected from a 3000 L operating cryogenic chest freezer, the method achieves sub-degree accuracy by isolating physics-guided vertical trends (quadratic detrending dominant) and stabilising variogram estimation under sparsity. Unlike static approaches, our framework dynamically adapts to thermal regimes without manual tuning, enabling centimetre-scale virtual sensing. This work establishes geostatistics as a foundational tool for cryogenic thermal monitoring, with direct engineering applications in biobank quality control and predictive analytics. Full article
Show Figures

Figure 1

15 pages, 3514 KB  
Article
Emulation-Based Dataset EmuIoT-VT for NIDS in IoT Systems
by Antanas Čenys, Simran Kaur Hora and Nikolaj Goranin
Sensors 2025, 25(16), 5077; https://doi.org/10.3390/s25165077 - 15 Aug 2025
Viewed by 1326
Abstract
Due to the rapid expansion of Internet of Things devices and their associated network, security has become a critical concern, necessitating the development of reliable security mechanisms. Anomaly-based NIDS leveraging machine learning and deep learning have emerged as key solutions in detecting abnormal [...] Read more.
Due to the rapid expansion of Internet of Things devices and their associated network, security has become a critical concern, necessitating the development of reliable security mechanisms. Anomaly-based NIDS leveraging machine learning and deep learning have emerged as key solutions in detecting abnormal network traffic patterns. However, one challenge that affects the detection rate of machine learning or deep learning-based anomaly NIDS is the class data imbalance present in the existing dataset. Datasets are crucial for the development and evaluation of anomaly-based NIDS for IoT systems. In this study, we introduce EmuIoT-VT, a dataset generated by creating virtual replicas of IoT devices implementing a novel emulation-based method, enabling realistic network traffic generation without relying on any external network emulators. The data was collected in an isolated offline environment to capture clean, uncontaminated network traffic. The EmuIoT-VT is balanced-by-design, containing 28,000 labeled records that are evenly distributed across devices, classes, and subclasses, and supports both binary and multiclass classification tasks. It includes 82 features extracted from raw PCAP data and includes attack categories such as DoS, brute force, reconnaissance, and exploitation. This article presents the novel method and creation of the EmuIoT-VT dataset, detailing data collection, balancing strategy, and details of the dataset structure, and proposes directions for future work. Full article
Show Figures

Figure 1

24 pages, 3691 KB  
Article
Immersive Virtual Reality in Psychotherapeutic Interventions for Youth with Eating Disorders: A Pilot Study in a Rural Context
by Lídia Sarrió-Colas, Silvia Reverté-Villarroya, Anna Belén Castellà-Culvi, Dolors Barberà-Roig, Cinta Gas-Prades, Antonio Coello-Segura and Mireia Adell-Lleixà
Appl. Sci. 2025, 15(16), 9013; https://doi.org/10.3390/app15169013 - 15 Aug 2025
Cited by 1 | Viewed by 1523
Abstract
Technological innovation in immersive virtual reality is fostering the development of novel psychotherapeutic interventions in mental health, particularly benefiting populations with limited access to specialized services. This pilot study explores the feasibility, tolerability, and therapeutic potential of an immersive virtual reality-based psychotherapeutic intervention [...] Read more.
Technological innovation in immersive virtual reality is fostering the development of novel psychotherapeutic interventions in mental health, particularly benefiting populations with limited access to specialized services. This pilot study explores the feasibility, tolerability, and therapeutic potential of an immersive virtual reality-based psychotherapeutic intervention for adolescents and young people with eating disorders in a rural setting. A quasi-experimental pre-test/post-test design was used, with a control group (n = 5) and an experimental group (n = 5), applying weekly immersive virtual reality sessions focused on body perception and food exposure. Preliminary results showed good acceptance and a low incidence of cybersickness. However, a reduction in anxiety levels was observed in the experimental group after immersive virtual reality exposure, particularly in trait anxiety, suggesting a potential effect of the intervention on emotional regulation. While these changes were not statistically significant, the direction and magnitude of the effect warrant further investigation. Changes in body mass index were also noted during the intervention. The remotely guided sessions, conducted via fifth-generation mobile network connectivity, demonstrated technical feasibility and encouraging clinical outcomes, even in geographically isolated or underserved areas. These findings support the use of immersive VR as a complementary tool in the early stages of treatment for eating disorders, contributing to improved body perception and emotional self-regulation. This work not only reinforces the applicability of immersive technology in real-world clinical practice but also opens new avenues for the development of personalized, accessible, and emotionally meaningful interventions in child and adolescent mental health. Full article
(This article belongs to the Special Issue Emerging Technologies in Innovative Human–Computer Interactions)
Show Figures

Figure 1

33 pages, 5164 KB  
Article
Flexibility Resource Planning and Stability Optimization Methods for Power Systems with High Penetration of Renewable Energy
by Haiteng Han, Xiangchen Jiang, Yang Cao, Xuanyao Luo, Sheng Liu and Bei Yang
Energies 2025, 18(15), 4139; https://doi.org/10.3390/en18154139 - 4 Aug 2025
Cited by 1 | Viewed by 993
Abstract
With the accelerating global transition toward sustainable energy systems, power grids with a high share of renewable energy face increasing challenges due to volatility and uncertainty, necessitating advanced flexibility resource planning and stability optimization strategies. This paper presents a comprehensive distribution network planning [...] Read more.
With the accelerating global transition toward sustainable energy systems, power grids with a high share of renewable energy face increasing challenges due to volatility and uncertainty, necessitating advanced flexibility resource planning and stability optimization strategies. This paper presents a comprehensive distribution network planning framework that coordinates and integrates multiple types of flexibility resources through joint optimization and network reconfiguration to enhance system adaptability and operational resilience. A novel virtual network coupling modeling approach is proposed to address topological constraints during network reconfiguration, ensuring radial operation while allowing rapid topology adjustments to isolate faults and restore power supply. Furthermore, to mitigate the uncertainty and fault risks associated with extreme weather events, a CVaR-based risk quantification framework is incorporated into a bi-level optimization model, effectively balancing investment costs and operational risks under uncertainty. In this model, the upper-level planning stage optimizes the siting and sizing of flexibility resources, while the lower-level operational stage coordinates real-time dispatch strategies through demand response, energy storage operation, and dynamic network reconfiguration. Finally, a hybrid SA-PSO algorithm combined with conic programming is employed to enhance computational efficiency while ensuring high solution quality for practical system scales. Case study analyses demonstrate that, compared to single-resource configurations, the proposed coordinated planning of multiple flexibility resources can significantly reduce the total system cost and markedly improve system resilience under fault conditions. Full article
(This article belongs to the Special Issue Analysis and Control of Power System Stability)
Show Figures

Figure 1

24 pages, 281 KB  
Article
Balancing Care and Sacrifice: Lived Experiences and Support Needs of Primary Caregivers in Pediatric Chronic Pain Across Canada and Australia
by Nicole Pope, Nicole Drumm, Kathryn A. Birnie, Melanie Noel, Carolyn Berryman, Nicki Ferencz, Tieghan Killackey, Megan Macneil, Darrel Zientek, Victoria Surry and Jennifer N. Stinson
Children 2025, 12(7), 911; https://doi.org/10.3390/children12070911 - 10 Jul 2025
Viewed by 1189
Abstract
Background: Chronic pain affects one in five youth globally and is frequently accompanied by mental health challenges that extend into adulthood. Caregivers play a vital role in supporting youth with chronic pain, yet their own mental and physical health needs are often overlooked. [...] Read more.
Background: Chronic pain affects one in five youth globally and is frequently accompanied by mental health challenges that extend into adulthood. Caregivers play a vital role in supporting youth with chronic pain, yet their own mental and physical health needs are often overlooked. While caregiver well-being is linked to child outcomes, few interventions directly address caregivers’ health, especially among those facing systemic barriers. This study explored the lived experiences of caregivers to better understand their unmet needs and inform the co-design of a supportive digital health solution. Methods: We conducted a qualitative exploratory study involving 32 caregivers of youth with chronic pain across Canada and Australia. Semi-structured interviews were co-facilitated by caregiver partners. Thematic analysis was applied to interview data. Results: Two overarching themes were identified: (1) bearing the weight and sacrifice of caregiving and (2) deep interrelatedness and blurred boundaries. Caregivers reported profound emotional, physical, and financial burdens; strained relationships; and social isolation. Many struggled with self-neglect, prioritizing their child’s needs over their own. Fathers’ evolving caregiving roles challenged traditional gender norms, though mothers continued to bear a disproportionate load. Despite challenges, caregivers demonstrated resilience and recognized their well-being as interconnected with their child’s health. Conclusions: Findings underscore the need for systemic investment in caregiver well-being. Digital health solutions, including virtual peer networks, mental health resources, and tailored education, offer scalable, accessible pathways for support. These insights will inform the development of Power over Pain for Primary Caregivers, a digital solution and knowledge hub aimed at improving caregiver well-being and family outcomes, aligning with global efforts to enhance family-centred pediatric pain care. Full article
(This article belongs to the Section Pediatric Anesthesiology, Perioperative and Pain Medicine)
15 pages, 410 KB  
Article
5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches
by José Dias, Pedro Pinto, Ricardo Santos and Silvestre Malta
Sensors 2025, 25(13), 3940; https://doi.org/10.3390/s25133940 - 24 Jun 2025
Cited by 2 | Viewed by 5888
Abstract
This paper explores the security challenges associated with network slicing in 5th Generation (5G) networks, a technology that enables the creation of virtual networks tailored to different use cases. This study contributes to network slicing research efforts by providing a comprehensive classification of [...] Read more.
This paper explores the security challenges associated with network slicing in 5th Generation (5G) networks, a technology that enables the creation of virtual networks tailored to different use cases. This study contributes to network slicing research efforts by providing a comprehensive classification of attacks aligned with the architectural layers of 5G, complemented by practical mitigation approaches suitable for multi-tenant environments. The classification depicts specific attacks and categorizes vulnerabilities across layers such as orchestration, virtualization, and inter-slice communication. Additionally, mitigation strategies are discussed, emphasizing the importance of real-time monitoring and robust access controls. The proposed classification aims to support the development of advanced security mechanisms, including risk assessment models and automated mitigation strategies, tailored to the dynamic and heterogeneous nature of 5G slicing. The findings highlight the need for layered defenses, AI-driven monitoring, and architectural isolation as critical components to enhance the resilience of 5G slicing deployments. Full article
Show Figures

Figure 1

18 pages, 15637 KB  
Article
Molecular Mechanisms of Reversal of Multidrug Resistance in Breast Cancer by Inhibition of P-gp by Cytisine N-Isoflavones Derivatives Explored Through Network Pharmacology, Molecular Docking, and Molecular Dynamics
by Chuangchuang Xiao, Xiaoying Yin, Rui Xi, Chunping Yuan and Yangsheng Ou
Int. J. Mol. Sci. 2025, 26(8), 3813; https://doi.org/10.3390/ijms26083813 - 17 Apr 2025
Viewed by 1388
Abstract
The compound CNI1, identified as a novel antitumor agent based on the cytisine N-isoflavones scaffold, and its series of cytisine N-isoflavones derivatives (CNI2, CNI3, and CNI4), were first isolated from bitter bean seeds, a traditional Chinese medicinal source, by our research team. Cellular [...] Read more.
The compound CNI1, identified as a novel antitumor agent based on the cytisine N-isoflavones scaffold, and its series of cytisine N-isoflavones derivatives (CNI2, CNI3, and CNI4), were first isolated from bitter bean seeds, a traditional Chinese medicinal source, by our research team. Cellular activity assays combined with virtual screening targeting P-gp revealed that CNI1, along with the three cytisine N-isoflavones derivatives, CNI2, CNI3, and CNI4, exhibited significant multidrug resistance (MDR) reversal activity in breast cancer. Despite this promising outcome, the precise molecular mechanisms and key targets involved in the MDR reversal of these compounds remain to be elucidated. To explore potential mechanisms, targets for CNI1, CNII2, CNI3, and CNI4 (CNI1-4) were predicted using SwissTargetPrediction and Pharmmapper databases, while MDR-related targets in breast cancer were retrieved from OMIM and GeneCards. The overlapping targets were utilized to construct a protein–protein interaction (PPI) network to identify core targets. Additionally, Gene Ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG) enrichment analyses were conducted using the DAVID database to identify relevant signaling pathways. Molecular docking simulations were employed to evaluate the binding sites and energies of CNI1-4 with the identified key targets, with the highest binding energy complexes selected for subsequent molecular dynamics simulations. This study identified 81 intersecting multidrug resistance (MDR) targets and 19 core targets in breast cancer. GO and KEGG pathway enrichment analyses revealed that MDR was primarily mediated by genes involved in cellular processes, apoptosis, protein phosphorylation, as well as the MAPK and PI3K-Akt signaling pathways. Molecular docking studies demonstrated that the binding energies of P-gp, AKT1, and SRC to CNI1-4 were all lower than −10 kcal/mol, indicating strong binding affinities. Molecular dynamics simulations further confirmed the stable and favorable binding interactions of CNI1-4 with AKT1 and P-gp. This study provides preliminary insights into the potential targets and molecular mechanisms of cytisine N-isoflavones compounds in reversing MDR in breast cancer, offering crucial data for the pharmacological investigation of CNI1-4 and supporting the development of P-gp inhibitors. Full article
(This article belongs to the Section Molecular Pharmacology)
Show Figures

Figure 1

19 pages, 734 KB  
Article
Secure and Intelligent Single-Channel Blind Source Separation via Adaptive Variational Mode Decomposition with Optimized Parameters
by Meishuang Yan, Lu Chen, Wei Hu, Zhihong Sun and Xueguang Zhou
Sensors 2025, 25(4), 1107; https://doi.org/10.3390/s25041107 - 12 Feb 2025
Cited by 2 | Viewed by 1436
Abstract
Emerging intelligent systems rely on secure and efficient signal processing to ensure reliable operation in environments where there is limited prior knowledge and significant interference. Single-channel blind source separation (SCBSS) is critical for applications such as wireless communication and sensor networks, where signals [...] Read more.
Emerging intelligent systems rely on secure and efficient signal processing to ensure reliable operation in environments where there is limited prior knowledge and significant interference. Single-channel blind source separation (SCBSS) is critical for applications such as wireless communication and sensor networks, where signals are often mixed and corrupted. Variational mode decomposition (VMD) has proven effective for SCBSS, but its performance depends heavily on selecting the optimal modal component count k and quadratic penalty parameter α. To address this challenge, we propose a secure and intelligent SCBSS algorithm leveraging adaptive VMD optimized with Improved Particle Swarm Optimization (IPSO). The IPSO dynamically determines the optimal k and α parameters, enabling VMD to filter noise and create a virtual multi-channel signal. This signal is then processed using improved Fast Independent Component Analysis (IFastICA) for high-fidelity source isolation. Experiments on the RML2016.10a dataset demonstrate a 15.7% improvement in separation efficiency over conventional methods, with robust performance for BPSK and QPSK signals, achieving correlation coefficients above 0.9 and signal-to-noise ratio (SNR) improvements of up to 24.66 dB. Full article
(This article belongs to the Special Issue Advances in Security for Emerging Intelligent Systems)
Show Figures

Figure 1

16 pages, 2379 KB  
Article
Resource Sizing for Virtual Environments of Networked Interconnected System Services
by Alexandr Albychev, Dmitry Ilin and Evgeny Nikulchev
Technologies 2024, 12(12), 245; https://doi.org/10.3390/technologies12120245 - 27 Nov 2024
Viewed by 1974
Abstract
Networked interconnected systems are often deployed in infrastructures with resource allocation using isolated virtual environments. The technological implementation of such systems varies significantly, making it difficult to accurately estimate the required volume of resources to allocate for each virtual environment. This leads to [...] Read more.
Networked interconnected systems are often deployed in infrastructures with resource allocation using isolated virtual environments. The technological implementation of such systems varies significantly, making it difficult to accurately estimate the required volume of resources to allocate for each virtual environment. This leads to overprovisioning of some services and underprovisioning of others. The problem of distributing the available computational resources between the system services arises. To efficiently use resources and reduce resource waste, the problem of minimizing free resources under conditions of unknown ratios of resource distribution between services is formalized; an approach to determining regression dependencies of computing resource consumption by services on the number of requests and a procedure for efficient resource distribution between services are proposed. The proposed solution is experimentally evaluated using the networked interconnected system model. The results show an increase in throughput by 20.75% compared to arbitrary resource distribution and a reduction in wasted resources by 55.59%. The dependences of the use of resources by networked interconnected system services on the number of incoming requests, identified using the proposed solution, can also be used for scaling in the event of an increase in the total volume of allocated resources. Full article
(This article belongs to the Section Information and Communication Technologies)
Show Figures

Figure 1

14 pages, 4775 KB  
Article
A Unified-Mode Analysis Method for Symmetric Networks and Its Application to Balun Design
by Lei Li, Qingbo Li, Zhongxiang Shen and Wen Wu
Electronics 2024, 13(19), 3925; https://doi.org/10.3390/electronics13193925 - 4 Oct 2024
Viewed by 1380
Abstract
A unified-mode analysis method for modeling symmetric networks is proposed in this paper. Adjusting to the characteristics of Marchand balun circuits, a unified-mode circuit model is constructed by introducing virtual impedance. The tenable condition of a Marchand balun with connecting segments is then [...] Read more.
A unified-mode analysis method for modeling symmetric networks is proposed in this paper. Adjusting to the characteristics of Marchand balun circuits, a unified-mode circuit model is constructed by introducing virtual impedance. The tenable condition of a Marchand balun with connecting segments is then derived. The parameter constraint of Marchand balun’s input matching is given in a quarter-saddle diagram. Simulated results under different parameter conditions verify the validity of the derived formulas. Based on the derived formulas, the traditional isolation circuit and impedance matching circuit are merged with a Marchand balun to achieve matching for all ports and full-frequency isolation between output ports. A microstrip balun with input and output impedance values of 50 Ω, operating at 1.5 GHz, is simulated, fabricated, and measured. The simulated and measured results of the microstrip balun are in good agreement. When the core parameters remain unchanged, an impedance transformer is inserted in front of the input port of the balun to realize a balun with a topology characterized by flexible impedance transformation. A balun with an input impedance of 35 Ω and different output impedances of 50 Ω and 75 Ω is simulated and fabricated to verify the design concept. Measured results show that an amplitude balance of less than 0.4 dB and a phase balance of less than 3° for a fractional bandwidth of 50%. It should be mentioned that all design equations are closed-form and can be readily employed to design symmetric networks. Full article
Show Figures

Figure 1

24 pages, 4648 KB  
Article
A Micro-Segmentation Method Based on VLAN-VxLAN Mapping Technology
by Di Li, Zhibang Yang, Siyang Yu, Mingxing Duan and Shenghong Yang
Future Internet 2024, 16(9), 320; https://doi.org/10.3390/fi16090320 - 4 Sep 2024
Cited by 5 | Viewed by 4964
Abstract
As information technology continues to evolve, cloud data centres have become increasingly prominent as the preferred infrastructure for data storage and processing. However, this shift has introduced a new array of security challenges, necessitating innovative approaches distinct from traditional network security architectures. In [...] Read more.
As information technology continues to evolve, cloud data centres have become increasingly prominent as the preferred infrastructure for data storage and processing. However, this shift has introduced a new array of security challenges, necessitating innovative approaches distinct from traditional network security architectures. In response, the Zero Trust Architecture (ZTA) has emerged as a promising solution, with micro-segmentation identified as a crucial component for enabling continuous auditing and stringent security controls. VxLAN technology is widely utilized in data centres for tenant isolation and virtual machine interconnection within tenant environments. Despite its prevalent use, limited research has focused on its application in micro-segmentation scenarios. To address this gap, we propose a method that leverages VLAN and VxLAN many-to-one mapping, requiring that all internal data centre traffic routes through the VxLAN gateway. This method can be implemented cost-effectively, without necessitating business modifications or causing service disruptions, thereby overcoming the challenges associated with micro-segmentation deployment. Importantly, this approach is based on standard public protocols, making it independent of specific product brands and enabling a network-centric framework that avoids software compatibility issues. To assess the effectiveness of our micro-segmentation approach, we provide a comprehensive evaluation that includes network aggregation and traffic visualization. Building on the implementation of micro-segmentation, we also introduce an enhanced asset behaviour algorithm. This algorithm constructs behavioural profiles based on the historical traffic of internal network assets, enabling the rapid identification of abnormal behaviours and facilitating timely defensive actions. Empirical results demonstrate that our algorithm is highly effective in detecting anomalous behaviour in intranet assets, making it a powerful tool for enhancing security in cloud data centres. In summary, the proposed approach offers a robust and efficient solution to the challenges of micro-segmentation in cloud data centres, contributing to the advancement of secure and reliable cloud infrastructure. Full article
Show Figures

Graphical abstract

Back to TopTop