期刊文献+

基于负载动态压缩调节的网络通讯优化算法

Network Communication Optimization Algorithm Based on the Load Dynamic Compression Regulation
下载PDF
导出
摘要 针对当前的网络通信中,对流量的忽然变化缺少必要的动态调节机制,通信中的负载很难形成一个动态的变化,造成通讯效果下降。为了解决这一问题,本文提出了一种基于负载动态压缩调节的网络通讯优化算法,通过建立有效的网络负载模型,对网络中的负载情况进行实时监控。利用小波压缩动态数据压缩理论,根据负载变化,进行数据的有效压缩调节,该方法在网络信息通信的各项指标都取得了较好的效果,应用性较强。 In view of the current network communication,the flow of the lack of necessary suddenly change the dynamic adjustment mechanism,communication of the load is difficult to form a dynamic changes,resulting in communication effect is reduced.In order to solve this problem,this paper puts forward a dynamic compression regulation based on the load of network communication optimization algorithm,through the establishment of effective network load model for the load of network real-time monitoring.By using wavelet compression dynamic data compression theory,according to the load change,carries on the data of the effective compression control,this method in the network information communication of each index is obtained a better effect,strong applicability.
作者 洪亮
机构地区 扬州市职业大学
出处 《科技通报》 北大核心 2013年第6期65-67,共3页 Bulletin of Science and Technology
基金 江苏省高等教育教学改革研究课题(2011JSJG440)
关键词 动态压缩 网络通讯 负载 小波函数 dynamic compression network communication load the wavelet function
  • 相关文献

参考文献5

二级参考文献28

  • 1杨明,孙志挥,宋余庆.快速更新全局频繁项目集[J].软件学报,2004,15(8):1189-1197. 被引量:18
  • 2蒋文保,郝双,戴一奇,刘庭华.高速网络入侵检测系统负载均衡策略与算法分析[J].清华大学学报(自然科学版),2006,46(1):106-110. 被引量:29
  • 3R Agrawal, J Shafer. Parallel mining of association rules [ J ]. IEEE Trans. on Knowledge and Data Engineering, 1996,8 ( 6 ) : 962 - 969.
  • 4J W Han, J Pei, Y Yin. Mining frequent patterns without candidate generation[ C]. Chen WD, Naughton JF, Bemstein PA, eds. Proc. of the 2000 ACM SIGMOD Int'l Conf. on Management of Data, ACM, 2000. 1 - 12.
  • 5W Lee. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems [ D ]. New York: Columbia University, 2005.11 - 16.
  • 6J S Park, M S Chen, P S Yu. Efficient parallel data mining for association rules[ C ]. Proc. of the 4th Int'l Conf. on Information and Knowledge Management, ACM, 1995.31 -36.
  • 7Christopher K, Fredrik V, Giovanni V, et al.Intrusion detection for high-speed networks[C]//Proceedings of the IEEE Sympo- sium on Security and Privacy, Washington, USA, 2002: 285-293.
  • 8Edwards S.Vulnerabilities of network intrusion detection systems:Realizing and overcoming the risks[J].Toplayer Networks, 2002.
  • 9Bunt R B, Eager D L, Oster G M, et al.Achieving load balanceand effective caching in clustered Web servers[C]//Proc of WCW, San Diego, CA,USA, Apr 1999.
  • 10Takens F.Detecting strange attractor in turbulence[C]//Lecture Notes in Mathematics,[S.L.] : Springer-Verlag, 1981 : 366-381.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部