期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
WInternet:从物网到物联网 被引量:33
1
作者 武建佳 赵伟 《计算机研究与发展》 EI CSCD 北大核心 2013年第6期1127-1134,共8页
近年来,物联网的发展受到了高度重视,学术界、工业界及政府对物联网的发展给予极大关注.物联网被认为是可以将数以亿计的物理对象连接起来,通过信息技术进行监测、分析和控制的网络,在延伸人类的感知控制能力方面潜力巨大.大量物联网研... 近年来,物联网的发展受到了高度重视,学术界、工业界及政府对物联网的发展给予极大关注.物联网被认为是可以将数以亿计的物理对象连接起来,通过信息技术进行监测、分析和控制的网络,在延伸人类的感知控制能力方面潜力巨大.大量物联网研究工作已经开展,许多物联网示范系统也被开发,并取得了显著应用效果.但同时,物联网当前的发展也面临着一些根本性的问题:物联网有什么特殊需求必须满足?当前物联网技术处于什么阶段?物联网的发展方向在哪里?这些问题值得探讨.本文回顾了互联网发展的历程,并根据互联网发展经验,分析物联网的现状,提出物联网当前处于"物-机"相连的局部小规模物网阶段,其发展方向应是相连众多小规模"物网"的开放大网——"物联网".基于这一思路,提出称之为WInternet的物联网设计,并介绍了其总体架构、工作模式和协议体系,同时也探讨了若干其他值得进一步研究的问题. 展开更多
关键词 物联 WInternet 管道协议 网件计算
下载PDF
INTERNET-BASED MACHINING PARAMETER OPTIMIZATION AND MANAGEMENT SYSTEM FOR HIGH-SPEED MACHINING 被引量:5
2
作者 武美萍 廖文和 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2005年第1期42-46,共5页
The theory and its method of machining parameter optimization for high-speed machining are studied. The machining data collected from workshops, labs and references are analyzed. An optimization method based on the ge... The theory and its method of machining parameter optimization for high-speed machining are studied. The machining data collected from workshops, labs and references are analyzed. An optimization method based on the genetic algorithm (GA) is investigated. Its calculation speed is faster than that of traditional optimization methods, and it is suitable for the machining parameter optimization in the automatic manufacturing system. Based on the theoretical studies, a system of machining parameter management and optimization is developed. The system can improve productivity of the high-speed machining centers. 展开更多
关键词 computer aided manufacturing DATABASE genetic algorithm OPTIMIZATION numerical control machining
下载PDF
Contrastive Analysis of Software Networks Based on Different Coupling Relationships 被引量:3
3
作者 XU Guoai GAO Yang +2 位作者 QI Yana PENG Junhao TANG Xianjing 《China Communications》 SCIE CSCD 2010年第4期76-82,共7页
Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analy... Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analyzed by using these models.The results show that: (1) Dependency network does play a key role in software architecture;(2) The exponents of in-degree and total-degree distribution functions of different networks differ slightly,while the exponent of out-degree varies obviously;(3) Weak-coupling relationships have greater impact on software architecture than strong-coupling relationships.Finally,a theoretically analysis on these statistical phenomena is proposed from the perspectives of software develop technology,develop process and developer’s habits,respectively. 展开更多
关键词 Software System Software Networks Coupling Relationship Degree Distribution
下载PDF
A new semi-fragile watermarking algorithm for image authentication 被引量:1
4
作者 韩德志 《Journal of Chongqing University》 CAS 2005年第1期41-46,共6页
This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional con... This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional content modification and the other for indicating the modified location. The algorithm provides an effective mechanism for image authentication. The watermark generation and watermark embedment are disposed in the image itself, and the received image authentication needs no information about the original image or watermark. The algorithm increases watermark security and prevents forged watermark. Experimental results show that the algorithm can identify intentional content modification and incidental tampering, and also indicate the location where a modification takes place. 展开更多
关键词 AUTHENTICATION semi-fragile watermarking FRAGILITY wavelet transform
下载PDF
ESTIMATION METHOD OF AIRSPACE CONNECTIVITY PROBABILITY IN MILITARY AANET 被引量:2
5
作者 Luo Changyuan Song Yulong Pang Songchao 《Journal of Electronics(China)》 2013年第6期538-546,共9页
Connectivity is the premise and foundation of networking and routing.For the probabilistic flight path of military aircraft resulting in the difficulty of Aeronautical Ad hoc NETwork(AANET) research,an estimation meth... Connectivity is the premise and foundation of networking and routing.For the probabilistic flight path of military aircraft resulting in the difficulty of Aeronautical Ad hoc NETwork(AANET) research,an estimation method of connectivity probability is proposed.The method takes airspace as the research object,starts with actual flight characteristics,and applies conclusions of random waypoint mobility model.Building a connectivity model by establishing Airspace Unit Circle(AUC) from the perspective of circle-circle coverage,the method obtains a theory of airspace network connectivity.Experiment demonstrates its correctness.Finally,according to the actual condition simulation,relationship between the number of aircraft,communication radius,and the flight area under connectivity probabilities is achieved,results provide reference for creating a network that under certain aerial combat condition. 展开更多
关键词 Aeronautical ad hoc network (AANET) Military aviation Mobility model Con-nectivity Airspace Unit Circle (AUC)
下载PDF
The Performance Analysis of the THMLD-based Mobile Multicast Method
6
作者 Guan Jianfeng Zhou Huachun +1 位作者 Li Xin Zhang Hongke 《China Communications》 SCIE CSCD 2009年第4期127-135,共9页
Mobile multicast is important for the emerging applications such as mobile video or audio conference and mobile IPTV.Some mobile multicast schemes have been proposed in the past few years, but most of them study the r... Mobile multicast is important for the emerging applications such as mobile video or audio conference and mobile IPTV.Some mobile multicast schemes have been proposed in the past few years, but most of them study the reconstruc-tion of multicast delivery tree, and few consider the group membership management for mobile sub-scribers.In this paper, we propose a new mobile multicast method based on the Two-Hop Multicast Listener Discovery(THMLD) protocol which pro-vides the mobile multicast membership manage-ment function by forwarding the traditional MLD messages to its neighboring subnets.To evaluate its performance, we analyze the THMLD and set up the simulation platform to compare it with the several traditional mobile multicast methods.The results show that THMLD can reduce the multicast join time, and the THMLD-based mobile multicast method can reduce the multicast join delay at a cost of increasing additional multicast maintenance cost. 展开更多
关键词 mobile multicast MLD BT RS join delay COST
下载PDF
Precise Transformation of Feistel to SP Fuse into LFSR
7
作者 Luo Lan Qu Zehui Song Chaoming 《China Communications》 SCIE CSCD 2009年第4期168-171,共4页
For the published block cipher algorithm, two kinds of round functions have been researched.Block ciphers in network environments are taking more risks than ever before because of their initialization key's distri... For the published block cipher algorithm, two kinds of round functions have been researched.Block ciphers in network environments are taking more risks than ever before because of their initialization key's distribution in the internet.The security of block cipher algorithm is affected by linear bias and nonlinear bias which are restricted by confusion layer and diffusion layer.This article takes an approach on how block cipher's two round structures are initially transformed when they fuse into LFSR.The SP structure can be considered two F functions in one Feistel round function which combines both right and left of origin data transformation.Furthermore, the round number linear function and nonlinear function of Feistel and SP structure are compared.The merit of SP structure is that it can fuse in LFSR as a nonlinear filter without memory. 展开更多
关键词 block cipher algorithm precise transformation merit of SP structure fuse in LFSR
下载PDF
Instance-oriented delegation: A solution for providing security to Grid-based mobile agent middleware
8
作者 马天驰 李善平 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第5期405-413,共9页
New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security... New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security threats in such mobile agent systems. The current security support in Grid Security Infrastructure (GSI) requires the users to delegate their privileges to certain hosts. This host-oriented solution is insecure and inflexible towards mobile agent applications because it cannot prevent delegation abuse and control well the diffusion of damage. Our proposed solution introduces security instance, which is an en- capsulation of one set of authorizations and their validity specifications with respect to the agent’s specific code segments, or even the states and requests. Applications can establish and configure their security framework flexibly on the same platform, through defining instances and operations according to their own logic. Mechanisms are provided to allow users delegating their identity to these instances instead of certain hosts. By adopting this instance-oriented security mechanism, a Grid-based general-purpose MA middleware, Everest, is developed to enhance Globus Toolkit’s security support for mobile agent applications. 展开更多
关键词 Mobile agent GRID Trust model DELEGATION
下载PDF
Improvement of Incentive Mechanism on BitTorrent-like Peer-to-Peer File Sharing Systems
9
作者 俞嘉地 李明禄 +1 位作者 洪峰 薛广涛 《Journal of Donghua University(English Edition)》 EI CAS 2007年第4期523-528,共6页
BitTorrent is a very popular Peer-to-Peer file sharing system, which adopts a set of incentive mechanisms to encourage contribution and prevent free-riding. However, we find that BitTorrent’s incentive mechanism can ... BitTorrent is a very popular Peer-to-Peer file sharing system, which adopts a set of incentive mechanisms to encourage contribution and prevent free-riding. However, we find that BitTorrent’s incentive mechanism can prevent free-riding effectively in a system with a relatively low number of seeds, but may fail in producing a disincentive for free-riding in a system with a high number of seeds. The reason is that BitTorrent does not provide effective mechanisms for seeds to guard against free-riding. Therefore, we propose a seed bandwidth allocation strategy for the BitTorrent system to reduce the effect of seeds on free-riding. Our target is that a downloader which provides more service to the system will be granted a higher benefit than downloaders which provide lower service when some downloaders ask for downloading file from a seed. Finally, simulation results are given, which validate the effectiveness of the proposed strategy. 展开更多
关键词 BITTORRENT FreeRiding Incentive Mechanism Bandwidth Allocation Strategy
下载PDF
Distributed QoS-aware source-specific multicast routing protocol
10
作者 王竞 《Journal of Chongqing University》 CAS 2005年第2期96-101,共6页
A distributed QoS (quality of service) -aware source-specific multicast routing protocol—DQSSMR is proposed to increase the successful join ratio and lower the overhead of the control message in QoS required multicas... A distributed QoS (quality of service) -aware source-specific multicast routing protocol—DQSSMR is proposed to increase the successful join ratio and lower the overhead of the control message in QoS required multicast routing. By an improved searching strategy, the cost of message control is reduced and the successful join ratio is increased. The network load is balanced due to the distributed routing operation and the scalability is enhanced further because of the usage of SSM (source- specific multicast) service model in DQSSMR. The analysis results indicate that DQSSMR performs as expected. 展开更多
关键词 quality of service (QoS) distributed multicast routing source-specific multicast (SSM)
下载PDF
AN ADAPTIVE-WEIGHTED TWO-DIMENSIONAL DATA AGGREGATION ALGORITHM FOR CLUSTERED WIRELESS SENSOR NETWORKS
11
作者 Zhang Junhu Zhu Xiujuan Peng Hui 《Journal of Electronics(China)》 2013年第6期525-537,共13页
In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving t... In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving the accuracy of the data gathered in the network.AWTDSD contains three phases:(1) the time-dimensional aggregation phase for eliminating the data redundancy;(2) the adaptive-weighted aggregation phase for further aggregating the data as well as improving the accuracy of the aggregated data; and(3) the space-dimensional aggregation phase for reducing the size and the amount of the data transmission to the base station.AWTDSD utilizes the correlations between the sensed data for reducing the data transmission and increasing the data accuracy as well.Experimental result shows that AWTDSD can not only save almost a half of the total energy consumption but also greatly increase the accuracy of the data monitored by the sensors in the clustered network. 展开更多
关键词 Data aggregation Adaptive-weighted aggregation Clustered Wireless Sensor Networks(WSNs) Linear regression Data accuracy Energy consumption Lempel-Ziv-Welch (LZW)
下载PDF
AN IDENTITY-BASED KEY AGREEMENT SCHEME FOR LARGE SCALE SENSOR NETWORKS
12
作者 Yang Lijun Wu Meng Ding Chao 《Journal of Electronics(China)》 2013年第6期574-586,共13页
To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Senso... To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor Networks (WSNs), an Identity-Based Key Agreement Scheme (IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman (ECDH). IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption. Theoretical analysis indicates that comparing to the random key pre-distribution techniques, IBKAS achieves significant improvement in key connectivity, communication overhead, memory occupation, and security strength, and also enables efficient secure rekcying and network expansion. Furthermore, we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes, and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensor networks. 展开更多
关键词 Large scale Wireless Sensor Networks (WSNs) Network security Key agreement Iden-tity-based cryptography
下载PDF
Design and Implementation of Computer Network Remote Control System
13
作者 Xiaohui ZHANG 《International Journal of Technology Management》 2015年第2期101-104,共4页
The paper analyze and design and implement a remote control system based on network. A computer network remote control system mainly includes server, client and the control information. Server registration information... The paper analyze and design and implement a remote control system based on network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction; control information transmission layer implementation using TCPflP protocol to control information including control of resources and control commands etc.. This paper adopts centralized network control system model, the structure of the network system realize unified observation, control, coordination, and control of high efficiency. The use of key technologies, such as Socket and COM to realize the goal of computer hardware resource control, software resource management and other functions. 展开更多
关键词 Remote Control System Control SOCKET Communication protocol
下载PDF
Technological Innovation Collaboration Network Evolution Simulation and Empirical Research
14
作者 Yu Wenlong 《International Journal of Technology Management》 2013年第8期138-141,共4页
The technology innovation cooperation relationship of enterprises has evolved into the representation of complicated network. MATLAB software is used for computer simulation on network evolution process of technology ... The technology innovation cooperation relationship of enterprises has evolved into the representation of complicated network. MATLAB software is used for computer simulation on network evolution process of technology innovation cooperation, and Ucinet characterization analysis software is used to compute characteristic values of simulation network such as power law index of network, average route length and accumulation coefficients. It is compared with the actual network, and the simulation results are analyzed to verify the rationality of the constructed evolution model. 展开更多
关键词 technological innovation network evolution SIMULATION
下载PDF
Special issue on future network:software-defined networking 被引量:1
15
作者 Tao HUANG F.Richard YU Yun-jie LIU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第7期603-605,共3页
Computer networks have to support an everincreasing array of applications,ranging from cloud computing in datacenters to Internet access for users.In order to meet the various demands,a large number of network devices... Computer networks have to support an everincreasing array of applications,ranging from cloud computing in datacenters to Internet access for users.In order to meet the various demands,a large number of network devices running different protocols are designed and deployed in networks. 展开更多
关键词 networking deployment cloud running users partition challenging centralized embedding scalability
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部