Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although...Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.展开更多
A new approach for multilevel image segmentation based on fuzzy cellular neural network(CNN) is proposed. Based on a novel fuzzy CNN, a new template is proposed for multilevel image segmentation. The result of compute...A new approach for multilevel image segmentation based on fuzzy cellular neural network(CNN) is proposed. Based on a novel fuzzy CNN, a new template is proposed for multilevel image segmentation. The result of computer simulation proves this approach is reasonable. The stability of the fuzzy neural network is also analyzed in this paper.展开更多
In terms of 34-year monthly mean temperature series in 1946-1979,the multi-level maPPing model of neural netWork BP type was applied to calculate the system's fractual dimension Do=2'8,leading tO a three-level...In terms of 34-year monthly mean temperature series in 1946-1979,the multi-level maPPing model of neural netWork BP type was applied to calculate the system's fractual dimension Do=2'8,leading tO a three-level model of this type with ixj=3x2,k=l,and the 1980 monthly mean temperture predichon on a long-t6rm basis were prepared by steadily modifying the weighting coefficient,making for the correlation coefficient of 97% with the measurements.Furthermore,the weighhng parameter was modified for each month of 1980 by means of observations,therefore constrcuhng monthly mean temperature forecasts from January to December of the year,reaching the correlation of 99.9% with the measurements.Likewise,the resulting 1981 monthly predictions on a long-range basis with 1946-1980 corresponding records yielded the correlahon of 98% and the month-tO month forecasts of 99.4%.展开更多
Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the m...Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the multilevel trust into MANET, thereby controlling restricted classified information flows among nodes that have different trust levels. Secondly, the infrastructure of MANET that suit to our multi-level trust is presented, Some conclusions are given at lastly.展开更多
基金the National Natural Science Foundation of China (60773049)the Natural Science Foundationof Jiangsu Province (BK2007086)the Fundamental Research Project of Natural Science in Colleges of Jiangsu Province(07KJB520016).
文摘Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.
文摘A new approach for multilevel image segmentation based on fuzzy cellular neural network(CNN) is proposed. Based on a novel fuzzy CNN, a new template is proposed for multilevel image segmentation. The result of computer simulation proves this approach is reasonable. The stability of the fuzzy neural network is also analyzed in this paper.
文摘In terms of 34-year monthly mean temperature series in 1946-1979,the multi-level maPPing model of neural netWork BP type was applied to calculate the system's fractual dimension Do=2'8,leading tO a three-level model of this type with ixj=3x2,k=l,and the 1980 monthly mean temperture predichon on a long-t6rm basis were prepared by steadily modifying the weighting coefficient,making for the correlation coefficient of 97% with the measurements.Furthermore,the weighhng parameter was modified for each month of 1980 by means of observations,therefore constrcuhng monthly mean temperature forecasts from January to December of the year,reaching the correlation of 99.9% with the measurements.Likewise,the resulting 1981 monthly predictions on a long-range basis with 1946-1980 corresponding records yielded the correlahon of 98% and the month-tO month forecasts of 99.4%.
基金Supported by the National Natural Science Foun-dation of China (60372107) Doctoral Innovative Foundation ofJiangsu Province(46666001) .
文摘Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the multilevel trust into MANET, thereby controlling restricted classified information flows among nodes that have different trust levels. Secondly, the infrastructure of MANET that suit to our multi-level trust is presented, Some conclusions are given at lastly.