期刊文献+
共找到1,405篇文章
< 1 2 71 >
每页显示 20 50 100
Formal Specifications and Verification of a Secure Communication Protocol Model 被引量:2
1
作者 夏阳 陆余良 蒋凡 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2003年第2期90-97,共8页
This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, system... This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, systematic construction and state transition of EABM. Then , it describes the channels and the process of state transition of EABM in terms of ESTELLE. At last, it offers a verification of the accuracy of the EABM model. 展开更多
关键词 protocol model ESTELLE Extended alternating bit machine.
下载PDF
An Optimized Protocol of Azoxymethane-Dextran Sodium Sulfate Induced Colorectal Tumor Model in Mice 被引量:2
2
作者 梁玺 胡婧楠 何建明 《Chinese Medical Sciences Journal》 CAS CSCD 2019年第4期281-288,共8页
Since azoxymethane(AOM)-dextran sodium sulfate(DSS)induced tumorigenesis was used to explore inflammation-associated carcinogenesis of sporadic colorectal cancer(CRC),different administration modes of AOM or DSS have ... Since azoxymethane(AOM)-dextran sodium sulfate(DSS)induced tumorigenesis was used to explore inflammation-associated carcinogenesis of sporadic colorectal cancer(CRC),different administration modes of AOM or DSS have been reported.In this article we optimized the protocol of the AOM-DSS modeling using C57BL/6 mice for study on sporadic CRC by intraperitoneal injecting AOM solution at a proper concentration with a 100μl sterile syringe once,feeding with DSS solution for 7 days in a roll and change DSS solution every day.More than 100 C57BL/6 mice had been treated with the optimized protocol,and all mice were demonstrated suffering from colorectal tumors when sacrificed in 8 to 20 weeks after AOM injection.These tumors mainly occurred in distal segment of colorectum with an increase in tumor density,which was similar to CRC in human beings.Tumor per mouse was high,and variation of tumor number per mouse was low.The histology of tumor developed through the defined stage ranged from precursor lesions,adenomatous lesions,adenomas to adenocarcinomas.The modified protocol of AOM-DSS model is easy,cheap,with high tumor formation rate of colorectal tumors. 展开更多
关键词 animal model colorectal cancer INFLAMMATION protocol
下载PDF
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker 被引量:1
3
作者 Prabhu Kaliappan Hartmut Koenig 《Journal of Software Engineering and Applications》 2008年第1期13-19,共7页
The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, security, etc., are being developed day-to-day which of... The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, security, etc., are being developed day-to-day which often leads to rapid, premature developments. Many protocols have not scaled to satisfy important properties like deadlock and livelock freedom, since MDA focuses on the rapid development rather than on the quality of the developed models. In order to fix the above, we introduce a 2-Phase strategy based on the UML state machine and sequence diagram. The state machine is converted into PROMELA code as a protocol model and its properties are derived from the sequence diagram as Linear Temporal Logic (LTL) through automation. The PROMELA code is interpreted through the SPIN model checker, which helps to simulate the behavior of protocol. Later the automated LTL properties are supplemented to the SPIN for the verification of protocol properties. The results are compared with the developed UML model and SPIN simulated model. Our test results impress the designer to verify the expected results with the system design and to identify the errors which are unnoticed during the design phase. 展开更多
关键词 UML modeling Communication protocols protocol Verification SPIN Tool
下载PDF
Research on the Computer Network Protocol Test Model based on Genetic and Random Walk Algorithm
4
作者 Ping Li 《International Journal of Technology Management》 2016年第8期39-42,共4页
In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of net... In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of network system. Fully understand and grasp of thenetwork protocols for managers is there is a big diffi cult. Network covert channel is the evaluation of intrusion detection system and fi rewallsecurity performance of an important means, the paper will start from the angle of the attacker, the fl aws of the research, and use this kind ofdefect to realize network covert channel, the random walk algorithm will be feasible for dealing with this issue. For achieving this, we integratethe genetic and random walk algorithm for systematic optimization. 展开更多
关键词 Computer Network protocol Test model Genetic and Random Walk Algorithm.
下载PDF
Analysis of reactive routing protocols for mobile ad hoc networks in Markov models
5
作者 王汉兴 胡细 +1 位作者 方建超 贾维嘉 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2007年第1期127-139,共13页
Mobile ad hoc networks (MANETs) have become a hot issue in the area of wireless networks for their non-infrastructure and mobile features. In this paper, a MANET is modeled so that the length of each link in the net... Mobile ad hoc networks (MANETs) have become a hot issue in the area of wireless networks for their non-infrastructure and mobile features. In this paper, a MANET is modeled so that the length of each link in the network is considered as a birthdeath process and the space is reused for n times in the flooding process, which is named as an n-spatiai reuse birth-death model (n-SRBDM). We analyze the performance of the network under the dynamic source routing protocol (DSR) which is a famous reactive routing protocol. Some performance parameters of the route discovery are studied such as the probability distribution and the expectation of the flooding distance, the probability that a route is discovered by a query packet with a hop limit, the probability that a request packet finds a τ-time-valid route or a symmetric-valid route, and the average time needed to discover a valid route. For the route maintenance, some parameters are introduced and studied such as the average frequency of route recovery and the average time of a route to be valid. We compare the two models with spatial reuse and without spatial reuse by evaluating these parameters. It is shown that the spatial reuse model is much more effective in routing. 展开更多
关键词 Mobile ad hoc network Markov model routing protocol performance analysis
下载PDF
Symbolic Model Checking and Analysis for E-Commerce Protocol
6
作者 文静华 张梅 李祥 《Journal of Electronic Science and Technology of China》 2005年第3期213-217,共5页
A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects- non-repudiat... A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects- non-repudiation and fairness using SME. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker. 展开更多
关键词 e-commerce protocols FAIRNESS symbolic model verification
下载PDF
APN Model for Specification of the Communication Protocols in Multi-Agent System
7
作者 Marzougui Borhen Kamel Barkaoui NejibBen Hadj Alouane 《Journal of Software Engineering and Applications》 2013年第9期14-22,共9页
This paper deals with the proposal of a new model based on Agent Petri Nets (APN) to specify interactions among agents in Multi Agents System (MAS). Indeed, an agent approach requires a powerful and expressive formali... This paper deals with the proposal of a new model based on Agent Petri Nets (APN) to specify interactions among agents in Multi Agents System (MAS). Indeed, an agent approach requires a powerful and expressive formalism that allows him to model the behavior of a set of agents that interact. We are modeling some variants of FIPA standard protocols. Our Models are found based on communicating cognitive agents. Each Agent is capable of perceiving their environment partly and building, sending and receiving messages. 展开更多
关键词 model AP MAS FORMALISM INTERACT FIFA protocols
下载PDF
支持IPv4/IPv6双栈的5G通信网络可靠性组网部署研究
8
作者 黄琳 黄劼 蒋平 《现代电子技术》 北大核心 2025年第1期102-106,共5页
5G网络要求更多的基站部署以支持更高的数据传输速率和连接密度。为实现网络数据的并行高速传输,确保网络应用业务的实时性和稳定性,文中提出一种支持IPv4/IPv6双栈的5G通信网络可靠性组网部署方法。结合IPv4和IPv6双栈,构建双栈转换机... 5G网络要求更多的基站部署以支持更高的数据传输速率和连接密度。为实现网络数据的并行高速传输,确保网络应用业务的实时性和稳定性,文中提出一种支持IPv4/IPv6双栈的5G通信网络可靠性组网部署方法。结合IPv4和IPv6双栈,构建双栈转换机制结合有限双协议栈模型,在模型下构建5G通信网络结构,并通过高架立体交叉网优化IPv4/IPv6双栈的5G通信网络组网结构,提升IPv4/IPv6双栈5G通信网络的通信速度。采用冗余路径算法,实现5G网络IPv4/IPv6双栈通信中的服务功能链编排,解决IPv4/IPv6双栈通信中的冗余问题。实验结果表明,该方法能够构建一种更稳定、更高效的5G通信网络组网结构,提高了网络频谱效率,优化了网络环境。 展开更多
关键词 5G通信网络 IPV4/IPV6双栈 可靠性组网部署 服务功能链 冗余路径算法 有限双协议栈模型
下载PDF
引入包分析的E-Model语音质量评价模型改进
9
作者 杨英杰 赵万马 王冲 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2017年第2期149-154,共6页
为了能够更加准确地评价语音包丢失对基于IP的语音传输(voice over internet protocol,Vo IP)的语音质量的损伤,对ITU-T G.107建议书提出的语音质量预测模型E-Model中计算丢包与编码造成的损伤Ie-eff的方法作出改进,在综合考虑语音包的... 为了能够更加准确地评价语音包丢失对基于IP的语音传输(voice over internet protocol,Vo IP)的语音质量的损伤,对ITU-T G.107建议书提出的语音质量预测模型E-Model中计算丢包与编码造成的损伤Ie-eff的方法作出改进,在综合考虑语音包的内部特性和存在突发连续丢包情况后,提出利用在固定语音长度下,语音实际损失时间Tloss来衡量语音包丢失造成的语音损伤。仿真结果表明,相比原有模型,改进后的模型得到的语音质量评分同主观语音质量评估方法(perceptual evaluation of speech quality,PESQ)评分相比,皮尔森相关系数平均提高了0.045 8,均方根误差平均降低了0.053 4,改进后的E-Model模型在评价语音质量时与PESQ更具有一致性,可以更为准确地预测Vo IP通信的语音质量。 展开更多
关键词 基于IP的语音传输(Vo IP) E-model 语音包 丢包
下载PDF
WAP(Wireless Application Protocol)应用技术探讨 被引量:2
10
作者 刘永利 张新 《山东科技大学学报(自然科学版)》 CAS 2001年第3期65-67,共3页
根据WAP协议的总体开发原则和技术思路 ,研究WAP的应用模型 ,在此基础上分析WAP协议栈的结构及各层提供的服务 ,探讨WAP在GSM移动通信系统中的应用 。
关键词 协议栈 应用 模型 移动通信系统 应用技术 SAP协议 开发原则 代理机制 无线通信
下载PDF
Virtual reality mobility model for wireless ad hoc networks 被引量:1
11
作者 Yu Ziyue Gong Bo He Xingui 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期819-826,共8页
For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle en... For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment, and the model uses the path planning method to avoid obstacles and to compute the node's moving path. Obstacles also affect node's signal propagation. Considering these factors, this study implements the mobility model for wireless ad hoc networks. Simulation results show that the model has a significant impact on the performance of protocols. 展开更多
关键词 wireless ad hoc networks computer simulation network protocols mobility models
下载PDF
Mechanical Proofs about BW Multi-Party Contract Signing Protocol 被引量:1
12
作者 ZHANG Ningrong ZHANG Xingyuan WANG Yuanyuan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1516-1520,共5页
We report on the verification of a multi-party contract signing protocol described by Baum-Waidner and Waidner (BW). Based on Paulson's inductive approach, we give the protocol model that includes infinitely many s... We report on the verification of a multi-party contract signing protocol described by Baum-Waidner and Waidner (BW). Based on Paulson's inductive approach, we give the protocol model that includes infinitely many signatories and contract texts signing simuhaneously. We consider composite attacks of the dishonest signatory and the external intruder, formalize cryptographic primitives and protocol arithmetic including attack model, show formal description of key distribution, and prove signature key secrecy theorems and fairness property theorems of the BW protocol using the interactive theorem prover Isabelle/HOL. 展开更多
关键词 formal verification multi-party contract signing protocol inductive approach model
下载PDF
A Realization Method of Protocol Conversion Between Modbus and IEC61850 被引量:1
13
作者 Fan Zhang Yongli Zhu +3 位作者 Chunyu Yan Jiangang Bi Haijun Xiong Shuai Yuan 《Open Journal of Applied Sciences》 2013年第2期18-23,共6页
In order to adapt to the construction needs of the smart grid, smart substation need to solve the problem of protocol conversion between the conventional non-standardized condition monitoring equipment and the standar... In order to adapt to the construction needs of the smart grid, smart substation need to solve the problem of protocol conversion between the conventional non-standardized condition monitoring equipment and the standardized monitoring system. This paper proposed a realization method of conversion method between Modbus and IEC61850. Object-oriented technology is used for information model on Modbus. After the analysis of IEC61850 and MMS information and service model, to establish the model mapping relationship between IEC61850, MMS and Modbus based on the principle of minimum information point which is one to one correspondence. Combined with the implementation of SISCO MMS-EASE LITE software development kit programming, giving a realization method using QT programming techniques based on the mapping model. Finally, the establishment the interval controller as an example of protocol scheme verifies the correctness and the feasibility of protocol conversion method. 展开更多
关键词 MODBUS IEC 61850 protocol CONVERSION model MAPPING Consolidated Monitoring UNIT
下载PDF
Problem of Standardization of Configuration Data in Wireless Sensor Networks: The Case of Routing Protocols 被引量:1
14
作者 Thomas Djotio Ndie Judith Soulamite Nouho Noutat 《Wireless Sensor Network》 2012年第7期177-184,共8页
The exploitation of Wireless Sensor Networks (WSN) is constrained by limited power, low computing power and storage and short-range radio transmission. Many routing protocols respecting these constraints were develope... The exploitation of Wireless Sensor Networks (WSN) is constrained by limited power, low computing power and storage and short-range radio transmission. Many routing protocols respecting these constraints were developed but, it still lacks formal and standardized solutions being able to help in their configuration. The configuration management that responds to this concern is very important in this type of network. It consists of the definition of data models to configure and is very necessary for the good network performance. Tangible results were obtained in traditional networks with the emergence of NETCONF and YANG standards, but on the best of our humble knowledge there are none yet in WSNs. We propose in this paper wsn-routing-protocol, a YANG data model for routing protocols configuration in WSNs. Following our model, we propose two YANG configuration data models based on the latter: they are respectively aodv for AODV and rpl for RPL. 展开更多
关键词 N Sensor Network ROUTING protocols CONFIGURATION Data model YANG
下载PDF
GRMP协议中的FEModel在Linux下的实现
15
作者 时磊 王伟明 《计算机工程》 EI CAS CSCD 北大核心 2005年第14期74-76,共3页
GRMP(GeneralRouterManagementProtocol)协议是用于转发和控制单元分离(ForwardingandControlElementSeparation,ForCES)的路由器管理协议。该文介绍了如何利用Linux2.4内核中的模块、软中断、Netfilter等来实现GRMP协议模型中的转发单... GRMP(GeneralRouterManagementProtocol)协议是用于转发和控制单元分离(ForwardingandControlElementSeparation,ForCES)的路由器管理协议。该文介绍了如何利用Linux2.4内核中的模块、软中断、Netfilter等来实现GRMP协议模型中的转发单元模型(ForwardingElementModel,FEModel)。 展开更多
关键词 GRMP 路由器 FORCES FE model 模块 软中断 NETFILTER
下载PDF
低轨巨型星座体系架构设计与关键技术分析 被引量:2
16
作者 高梓贺 姚海鹏 +3 位作者 张磊 石钰林 王富 陶滢 《天地一体化信息网络》 2024年第2期43-52,共10页
巨型星座中海量网元对现有网络架构和技术体制提出了严峻挑战,如何设计和规划网络体系架构是巨型星座发展的关键问题之一。从星座架构的概念与特征出发,结合国内外卫星星座发展情况与技术预判,提出“四面”(感知平面、数据平面、控制平... 巨型星座中海量网元对现有网络架构和技术体制提出了严峻挑战,如何设计和规划网络体系架构是巨型星座发展的关键问题之一。从星座架构的概念与特征出发,结合国内外卫星星座发展情况与技术预判,提出“四面”(感知平面、数据平面、控制平面、智能管理平面)和“三层”(资源层、传送层、业务层)的多层多域混合式智能协同组网体系架构,设计星座网络管控架构、技术参考模型与协议架构等。同时,针对星座建设与发展趋势,阐述并分析星座网络编址路由、网络鲁棒性敏捷保障、差异化业务承载、端到端可靠传送等关键技术的演化趋势,支撑我国低轨巨型星座网络发展与建设。 展开更多
关键词 巨型星座 组网体系架构 技术参考模型 协议架构
下载PDF
Towards a Methodology for Formal Design and Analysis of Agent Interaction Protocols ——An Investigation in Electronic Commerce
17
作者 Wei Jun 1,2 , Cheung Shing Chi 1, Wang Xu 1 1. Department of Computer Science, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong, China 2. Institute of Software, Chinese Academy of Science, Beijing 100080, Ch 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期126-139,共14页
Various extensions of UML have been developed to meet the challenges of designing modern software systems, such as agent based electronic commerce applications. Recent advances in model checking technology have led i... Various extensions of UML have been developed to meet the challenges of designing modern software systems, such as agent based electronic commerce applications. Recent advances in model checking technology have led it to be introduced into the development of approaches and tools to check the correctness of electronic commerce protocols. This paper focuses on the research of a method that connects an extension of AUML to model checker SPIN/Promela for the specification and verification of agent interaction protocols (AIP) in electronic commerce. The method presented here allows us to combine the benefits of visual specification with the power of some static analysis and model checking. Some algorithms and rules are developed to permit all visual modeling constructs translated mechanically into some Promela models of AIP, as supported by the model checker SPIN. Moreover, a process is illustrated to guide the specification and verification of AIP. The method is demonstrated thoroughly using the e commerce protocol NetBill as an example. 展开更多
关键词 agent UML interaction protocol software agent model checking formal specification electronic commerce protocol
下载PDF
Performance Analysis of RFID Framed Slotted Aloha Anti-Collision Protocol 被引量:3
18
作者 Emad Felemban 《Journal of Computer and Communications》 2014年第1期13-18,共6页
In this paper, we develop a novel mathematical model to estimate the probability distribution function of the number of tags discovered after a certain number of interrogation rounds. In addition, the pdfs of the numb... In this paper, we develop a novel mathematical model to estimate the probability distribution function of the number of tags discovered after a certain number of interrogation rounds. In addition, the pdfs of the number of rounds needed to discover all the tags are also calculated. The estimation of such pdfs will be helpful in estimating the number of interrogation rounds and the optimal parameter configuration of the RFID system which in turn will be helpful in estimating the time needed to discover all tags. Our results show that the proposed model accurately predicts the tags detection probability. We then use the proposed model to optimally configure the reader parameters (i.e. the frame size and the number of interrogation rounds). 展开更多
关键词 Performance modeling RFID WIRELESS NETWORKS ANTI-COLLISION protocol
下载PDF
A Quantitative Analysis of Collision Resolution Protocol for Wireless Sensor Network
19
作者 Reema Patel Dhiren Patel 《Journal of Software Engineering and Applications》 2015年第8期361-371,共11页
In this paper, we present formal analysis of 2CS-WSN collision resolution protocol for wireless sensor networks using probabilistic model checking. The 2CS-WSN protocol is designed to be used during the contention pha... In this paper, we present formal analysis of 2CS-WSN collision resolution protocol for wireless sensor networks using probabilistic model checking. The 2CS-WSN protocol is designed to be used during the contention phase of IEEE 802.15.4. In previous work on 2CS-WSN analysis, authors formalized protocol description at abstract level by defining counters to represent number of nodes in specific local state. On abstract model, the properties specifying individual node behavior cannot be analyzed. We formalize collision resolution protocol as a Markov Decision Process to express each node behavior and perform quantitative analysis using probabilistic model checker PRISM. The identical nodes induce symmetry in the reachable state space which leads to redundant search over equivalent areas of the state space during model checking. We use “ExplicitPRISMSymm” on-the-fly symmetry reduction approach to prevent the state space explosion and thus accommodate large number of nodes for analysis. 展开更多
关键词 Wireless Sensor Network COLLISION Resolution protocol PROBABILISTIC model CHECKING SYMMETRY Reduction
下载PDF
Model of Trust Management in Open Network Environment
20
作者 曹元大 宁宇鹏 《Journal of Beijing Institute of Technology》 EI CAS 2003年第3期265-268,共4页
To keep open network more efficacious and secure, it is necessary that a nice trust model and method of trust management must be developed. The reason why traditional trust models are incomplete in their function to m... To keep open network more efficacious and secure, it is necessary that a nice trust model and method of trust management must be developed. The reason why traditional trust models are incomplete in their function to manage trust is explained, and a general model based on hybrid trust model and introducer protocol is provided. The hybrid model is more flexible and efficacious to manage trust compared with hierarchy model and Web model. The introducer protocol is a better solution to build, maintain and refresh the trust relationship in open network environment. 展开更多
关键词 trust model trust management introducer protocol
下载PDF
上一页 1 2 71 下一页 到第
使用帮助 返回顶部