期刊文献+
共找到800篇文章
< 1 2 40 >
每页显示 20 50 100
Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks
1
作者 R.Sabitha C.Gokul Prasad S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2795-2810,共16页
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W... In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works. 展开更多
关键词 Enhanced security model wireless sensor networks improved defensive routing mechanism secure paths node security
下载PDF
A TRUST MECHANISM-BASED CHANNEL ASSIGNMENT AND ROUTING SCHEME IN COGNITIVE WIRELESS MESH NETWORKS WITH INTRUSION DETECTION 被引量:1
2
作者 Wu Guofeng Zhang Jing He Zhaopan 《Journal of Electronics(China)》 2010年第5期728-734,共7页
Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networ... Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively. 展开更多
关键词 Cognitive Wireless Mesh Networks (CWMN) Intrusion detection Trust mechanism Channel assignment routing
下载PDF
Backtracking Routing Mechanism for Improving Link Failure Recovery
3
作者 WU Jing ZHOU Jianguo YANG Jianfeng YAN Puliu JIANG Hao 《Wuhan University Journal of Natural Sciences》 CAS 2007年第3期462-466,共5页
Failure-insensitive routing is a good mechanism to avoid packet dropping and disconnection of forwarding when some links fail, but multiple failure links may bring routing loop for the mechanism. Backtracking routing ... Failure-insensitive routing is a good mechanism to avoid packet dropping and disconnection of forwarding when some links fail, but multiple failure links may bring routing loop for the mechanism. Backtracking routing algorithm based on inverse shortest path tree rooted at destination is presented. The feasible restoration routing is obtained through searching from the start of the failure link and tracing back to the leaves of the shortest path tree with the destination as the root. The packets are forwarded from the mounted point with smaller sequence to the mount point with bigger sequence to decrease the possible of loop in case of multi-failures. The simulations and analysis indicate that backtracking routing algorithm improves the network survivability especially for large network, at the cost of the computation complexity in the same order as failure insensitive routing. 展开更多
关键词 failure insensitive routing (FIR) shortest path tree (SPT) backtracking routing mechanism network survivability network usability
下载PDF
Considerations on Novel Network Routing Mechanism
4
作者 Guo Yunfei, Zhu Xuanyong, Wang Na (Information Engineering University, Zhengzhou 450002, China) 《ZTE Communications》 2008年第1期23-28,共6页
Routing is the cornerstone of network architecture, and a new routing mechanism is a requisite for constructing new network architecture. The current routing mechanism of the Internet layer is basically the single nex... Routing is the cornerstone of network architecture, and a new routing mechanism is a requisite for constructing new network architecture. The current routing mechanism of the Internet layer is basically the single next-hop routing mechanism, which is the root of transmission congestion in the network. To solve this congestion problem, a fundamental measure is to change the route selection mode of current routing mechanism to allow parallel transmission over multiple routes. Currently, Border Gateway Protocol (BGP) is the only inter-domain routing protocol used in the Internet, but the routing system using BGP suffers scalability problem. To solve the scalability issue of the current inter-domain routing system, a new hierarchical routing system, i.e. Scalable Inter-Domain Routing Architecture (s-idra), is suggested. In addition to scalability, the current routing system is facing other challenges including security, Quality of Service (QoS), multicasting, mobility and dynamic network topology. Therefore, the research on routing protocols, especially the protocol for the new network architecture, is still a tough task and has a long way to go. 展开更多
关键词 Considerations on Novel Network routing mechanism BGP QOS
下载PDF
Vibration of a Two-Layer“Metal+PZT”Plate Contacting with Viscous Fluid
5
作者 Zeynep Ekicioglu Kuzeci Surkay D.Akbarov 《Computers, Materials & Continua》 SCIE EI 2023年第2期4337-4362,共26页
The present work investigates the mechanically forced vibration of the hydro-elasto-piezoelectric system consisting of a two-layer plate“elastic+PZT”,a compressible viscous fluid,and a rigid wall.It is assumed that ... The present work investigates the mechanically forced vibration of the hydro-elasto-piezoelectric system consisting of a two-layer plate“elastic+PZT”,a compressible viscous fluid,and a rigid wall.It is assumed that the PZT(piezoelectric)layer of the plate is in contact with the fluid and time-harmonic linear forces act on the free surface of the elastic-metallic layer.This study is valuable because it considers for the first time the mechanical vibration of the metal+piezoelectric bilayer plate in contact with a fluid.It is also the first time that the influence of the volumetric concentration of the constituents on the vibration of the hydro-elasto-piezoelectric system is studied.Another value of the present work is the use of the exact equations and relations of elasto-electrodynamics for elastic and piezoelectric materials to describe the motion of the plate layers within the framework of the piecewise homogeneous body model and the use of the linearized Navier-Stokes equations to describe the flow of the compressible viscous fluid.The plane-strain state in the plate and the plane flow in the fluid take place.For the solution of the corresponding boundary-value problem,the Fourier transform is used with respect to the spatial coordinate on the axis along the laying direction of the plate.The analytical expressions of the Fourier transform of all the sought values of each component of the system are determined.The origins of the searched values are determined numerically,after which numerical results on the stress on the fluid and plate interface planes are presented and discussed.These results are obtained for the case where PZT-2 is chosen as the piezoelectric material,steel and aluminum as the elastic metal materials,and Glycerin as the fluid.Analysis of these results allows conclusions to be drawn about the character of the problem parameters on the frequency response of the interfacial stress.In particular,it was found that after a certain value of the vibration frequency,the presence of the metal layer in the two-layer plate led to an increase in the absolute values of the above interfacial stress. 展开更多
关键词 Metal+piezoelectric two-layer plate compressible viscous fluid mechanical forced vibration interfacial stress resonance frequency
下载PDF
Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET
6
作者 S.Neelavathy Pari K.Sudharson 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2775-2789,共15页
A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,... A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,from the other side,are exposed to severe potential threats that are difficult to counter with present security methods.As a result,several safe communication protocols designed to enhance the secure interaction among MANET nodes.In this research,we offer a reputed optimal routing value among network nodes,secure computations,and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation Mechanism(HTRM).In addition,the study designs a robust Public Key Infrastructure(PKI)system using the suggested trust evaluation method in terms of“key”generation,which is a crucial component of a PKI cryptosystem.We also concentrate on the solid node authenticating process that relies on pre-authentication.To ensure edge-to-edge security,we assess safe,trustworthy routes to secure computations and authenticate mobile nodes,incorporating uncertainty into the trust management solution.When compared to other protocols,our recommended approach performs better.Finally,we use simulations data and performance evaluation metrics to verify our suggested approach’s validity Our approach outperformed the competing systems in terms of overall end-to-end delay,packet delivery ratio,performance,power consumption,and key-computing time by 3.47%,3.152%,2.169%,and 3.527%,3.762%,significantly. 展开更多
关键词 Mobile ad-hoc network trust management secure authentication reputation mechanism secure routing
下载PDF
Microstructure evolution and mechanical properties of ZK60 magnesium alloy produced by SSTT and RAP route in semi-solid state
7
作者 王长朋 张营营 +3 位作者 李迪凡 梅华生 张帷 刘杰 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2013年第12期3621-3628,共8页
The microstructure evolution and mechanical properties of a ZK60 magnesium alloy produced by the semi-solid thermal transformation (SSTT) route and the recrystallization and partial melting (RAP) route were studie... The microstructure evolution and mechanical properties of a ZK60 magnesium alloy produced by the semi-solid thermal transformation (SSTT) route and the recrystallization and partial melting (RAP) route were studied, respectively. The microstructure evolution during partial remelting was studied at different temperatures for different time. The tensile mechanical properties of thixoformed components by the two routes at room temperature were examined. The results show that coalescence is dominant in the SSTT alloy and Ostwald ripening is dominant in the RAP alloy. Compared with the SSTT route, the RAP route can produce finer semi-solid microstructure under the similar isothermal holding condition. The microstructure of the RAP alloy is much more spheroidized compared with the SSTT alloy. Thixoforming for the ZK60 magnesium alloy produced by the SSTT and RAP route results in successful filling of the die, and the thixoforming process improves the mechanical properties of ZK60 magnesium alloy. The RAP alloy shows significantly advantageous mechanical properties over that of the SSTT alloy. 展开更多
关键词 ZK60 magnesium alloy semi-solid thermal transformation (SSTT) recrystallization and partial melting (RAP) route microstructure evolution mechanical properties
下载PDF
Influence of rolling route on microstructure and mechanical properties of AZ31 magnesium alloy during asymmetric reduction rolling 被引量:9
8
作者 Ru MA Yue LU +1 位作者 Ling WANG Yi-nong WANG 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2018年第5期902-911,共10页
Four different routes of asymmetric reduction rolling were conducted on AZ31 magnesium alloy to investigate their effect on the microstructure evolution and mechanical properties. Route A is the forward rolling; while... Four different routes of asymmetric reduction rolling were conducted on AZ31 magnesium alloy to investigate their effect on the microstructure evolution and mechanical properties. Route A is the forward rolling; while during routes B and C the sheets are rotated 180o in rolling direction and normal direction, respectively; route D is the unidirectional rolling. The strain states of rolled sheets were analyzed by the finite element method, while the microstructure and texture were observed using optical microscopy, X-ray diffraction and electron back-scattered diffraction techniques, and the mechanical properties were measured by tensile test. The results show that route D produced the largest effective strain. Compared with other samples, sample D exhibited a homogeneous microstructure with fine grains as well as a weak and tilted texture, in corresponding, it performed excellent tensile properties, which suggested that route D was an effective way to enhance the strength and plasticity of AZ31 sheet. 展开更多
关键词 AZ31 Mg alloy asymmetric reduction rolling rolling route fmite element analysis mechanical properties
下载PDF
A Novel Distributed LDoS Attack Scheme against Internet Routing 被引量:3
9
作者 ZHU Hongliangt XIN Yang +1 位作者 WU Qiuxin YOU Fucheng 《China Communications》 SCIE CSCD 2014年第A01期101-107,共7页
LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is... LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is subject to LDoS attacks as well. LDoS attacks can cause table reset, route flapping of BGP protocol. A deliberately constructed distributed low-rate DOS attacks can even generate surge of updates throughout the Internet. In this paper, we investigate the promotion of attack efficiency of this novel attack, and then propose an attack model to simulate the LDoS attack. Experiments prove that this attack model can exponentially lower the attack costs and improve the attack effect. 展开更多
关键词 distributed low-rate DoS attacks attack efficiency BGP route flapping defense mechanisms
下载PDF
Geological conditions and key rock mechanics issues in the Western Route of South-to-North Water Transfer Project 被引量:2
10
作者 XuechaoWang 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE 2011年第3期234-243,共10页
In terms of special geological conditions of the Western Route of South-to-North Water Transfer Project, the classification method for surrounding rocks is discussed by combining with the construction method of tunnel... In terms of special geological conditions of the Western Route of South-to-North Water Transfer Project, the classification method for surrounding rocks is discussed by combining with the construction method of tunnel boring machine (TBM). The classification standard of surrounding rocks is put forward on the basis of physical simulations and engineering practices. Damage, deformation and evolution of surrounding rocks induced by TBM excavation are discussed. Meanwhile, the long-term deformation mechanisms and stability of surrounding rocks are also studied. On this basis, a three-dimensional constitutive model for interbedded sandstone slate and a fiat shell-joint element-foundation system for calculating internal forces of segment lining are established. The deformation features of surrounding rocks of deep and steep interbedded sandstone slate and their influences on internal forces of segment lining are presented. Finally, the design methods of segment lining constructed in deep and steep flysch are proposed. 展开更多
关键词 the Western route of South-to-North Water Transfer Project rock mechanics issues classification of surrounding rocks stability of surrounding rocks excavation-induced damage lining design
下载PDF
Mechanism of Thaumasite Formation in Concrete 被引量:2
11
作者 宋远明 ZHOU Shaolong +2 位作者 WANG Zhijuan WANG Bo 钱觉时 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 2017年第4期893-897,共5页
Significant efforts have been made in revealing the mechanism of thaumasite formation in concrete, which continues to be fraught with ambiguities and dissension. Chemical method was employed to synthesize pure C3S, C2... Significant efforts have been made in revealing the mechanism of thaumasite formation in concrete, which continues to be fraught with ambiguities and dissension. Chemical method was employed to synthesize pure C3S, C2S, C3A, ettringite, and thaumasite, and X-ray diffraction(XRD), Raman spectroscopy and infrared spectroscopy(IR) were used to identify thaumasite from other hydrates. To investigate the direct route of thaumasite formation, C3S, C2S, gypsum, and calcium carbonate were used to prepare a cement paste so that the interference of ettringite formation can be avoided. The indirect route of thaumasite formation was also studied by considering the effect of C3A or ettringite content on thaumasite formation. Results show that thaumasite can be definitely generated in the absence of aluminium-bearing minerals or ettringite under appropriate conditions, while the ettringite presence promotes the thaumasite formation. No evidences support the heterogeneous nucleation route in this work. It is concluded that the method mentioned in this work can surely be used to investigate the mechanism of thaumasite formation, and thaumasite can form by both direct and woodfordite routes. 展开更多
关键词 thaumasite ettringite formation mechanism direct route woodfordite route
下载PDF
A Survey on Routing Algorithms for Opportunistic Mobile Social Networks 被引量:1
12
作者 Ying Cai Haochen Zhang +1 位作者 Yanfang Fan Hongke Xia 《China Communications》 SCIE CSCD 2021年第2期86-109,共24页
Opportunistic Mobile Social Networks(OMSNs)are kind of Delay Tolerant Networks(DTNs)that leverage characteristics of Mobile Ad Hoc Networks(MANETs)and Social Networks,particularly the social features,to boost performa... Opportunistic Mobile Social Networks(OMSNs)are kind of Delay Tolerant Networks(DTNs)that leverage characteristics of Mobile Ad Hoc Networks(MANETs)and Social Networks,particularly the social features,to boost performance of routing algorithms.Users in OMSNs communicate to share and disseminate data to meet needs for variety of applications.Such networks have attracted tremendous attention lately due to the data transmission requirement from emerging applications such as IoT and smart city initiatives.Devices carried by human is the carrier of message transmission,so the social features of human can be used to improve the ability of data transmission.In this paper,we conduct a comparative survey on routing algorithms in OMSNs.We first analyze routing algorithms based on three social features.Since node selfishness is not really considered previously in aforementioned routing algorithms,but has significant impact on network performance,we treat node selfishness as another social feature,classify and elaborate routing algorithms based on incentive mechanism.To assess the impact of social features on routing algorithms,we conducted simulation for six routing algorithms and analyzed the simulation result.Finally,we conclude the paper with challenges on design of routing in OMSNs and point out some future research directions. 展开更多
关键词 OMSNs routing algorithms social features SELFISHNESS incentive mechanism
下载PDF
Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN 被引量:2
13
作者 Yu Hu Yuanming Wu Hongshuai Wang 《Wireless Sensor Network》 2014年第11期237-248,共12页
The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider at... The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm. 展开更多
关键词 INSIDER ATTACK Selective FORWARDING TRUST mechanism MONITOR NODE Secure routing Protocol
下载PDF
Packet Drop Battling Mechanism for Energy Aware Detection in Wireless Networks 被引量:5
14
作者 Ahmad F.Subahi Youseef Alotaibi +1 位作者 Osamah Ibrahim Khalaf F.Ajesh 《Computers, Materials & Continua》 SCIE EI 2021年第2期2077-2086,共10页
Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the uns... Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the unsecure wireless communication,resource constrained capabilities and dynamic topology.In order to cope with these issues,Ad Hoc On-Demand Distance Vector(AODV)routing protocol can be used to remain the normal networks functionality and to adjust data transmission by defending the networks against black hole attacks.The proposed system,in this work,identifies the optimal route from sender to collector,prioritizing the number of jumps,the battery life,and security,which are fundamental prerequisites.Researches have proposed various plans for detecting the shortest route,as well as ensuring energy conversions and defense against threats and attacks.In this regard,the packet drop attack is one of the most destructive attack against WMANet communication and hence merits special attention.This type of attack may allow the attacker to take control of the attacked hubs,which may lost packets or transmitted information via a wrong route during the packets journey from a source hub to a target one.Hence,a new routing protocol method has been proposed in this study.It applies the concept of energy saving systems to conserve energy that is not required by the system.The proposed method for energy aware detection and prevention of packet drop attacks in mobile ad hoc networks is termed the Ad Hoc On-Demand and Distance Vector–Packet Drop Battling Mechanism(AODV–PDBM). 展开更多
关键词 Wireless and mobile ad hoc networks(WMANet) packet drop attack(PDA) ad hoc on-demand distance vector(AODV) dynamic source routing(DSR) packet drop battling mechanism(PDBM)
下载PDF
Proton Transfer Mechanism of Alanine Induced by Zn^(2+): a Theoretical Study
15
作者 孟祥军 《Chinese Journal of Structural Chemistry》 SCIE CAS CSCD 2014年第5期669-675,共7页
In this paper, proton transfer mechanism of alanine induced by Zn2+ was investiga- ted by the CCSD/6-31++G**//B3LYP/6-31++G** method. Six neutral complexes and one ampho- teric complex were optimized, among w... In this paper, proton transfer mechanism of alanine induced by Zn2+ was investiga- ted by the CCSD/6-31++G**//B3LYP/6-31++G** method. Six neutral complexes and one ampho- teric complex were optimized, among which the amphoteric complex was the most stable with binding energy of 201.92 kcal·mol-1. In addition, the rotation of intramolecular single bond leads to the neutral configuration conversion, in which the rotation energy barriers of C–C single bonds are lower than 10.51 kcal·mol-1, and those of C–O single bonds range among 9.53~17.50 kcal·mol-1. On the other hand, the proton transfers among the carboxylic oxygen atoms can also result in the neutral configuration conversion, whose energy barriers of forward/back reaction are 53.90 and 32.46 kcal·mol-1, respectively. In detail, the proton transfers from carboxylic group to amino lead to their configuration conversion from neutral to amphoteric. Furthermore, under the catalysis of Zn2+, there was no energy barrier in this reaction. The conversion route from the most stable neutral configuration Ⅱ to the most stable amphoteric configuration I was: Ⅱ→Ⅱ-Ⅲ→Ⅲ→Ⅲ-Ⅵ→Ⅵ→Ⅴ-Ⅵ→Ⅴ→Ⅰ-Ⅴ→Ⅰ,with the energy barrier to be 64.64 kcal·mol-1. 展开更多
关键词 COMPLEXES ALANINE Zn2+ transition state reaction route mechanism
下载PDF
Ants-Based On-Demand Routing Algorithm for Mobile Ad Hoc Networks
16
作者 吴东亚 侯朝桢 +1 位作者 侯紫峰 王再跃 《Journal of Beijing Institute of Technology》 EI CAS 2005年第3期244-249,共6页
An ants-based on-demand routing algorithm (AORA) specialized for mobile ad hoc networks is proposed. AORA measures the network's traffic information including delivery time, route energy etc. by the continuous deli... An ants-based on-demand routing algorithm (AORA) specialized for mobile ad hoc networks is proposed. AORA measures the network's traffic information including delivery time, route energy etc. by the continuous delivery of data packets, then calculates the compositive parameter for each route which can be seen as the stigmity and uses it to choose the comparatively optimal route in real time. To adjust the weight of each traffic information, the algorithm can meet the different demand of the network's user. Multipath source self repair routing (MSSRR) algorithm and dynamic source routing (DSR) can be seen as the special samples of AORA. The routing overhead is not increased in this algorithm. By using simulation, it can be seen that the performance of AORA is better than that of DSR in all scenarios obviously, especially the delivery fraction is increased by more than 100 96. 展开更多
关键词 mobile ad hoc network routing ants-based algorithm on-demand mechanism
下载PDF
Deformation datum in source mechanism inversion
17
作者 巩守文 王庆良 +1 位作者 祝意青 陈兵 《Acta Seismologica Sinica(English Edition)》 CSCD 1996年第2期299-308,共10页
Based on the analyses of geodetic deformation datum, the concepts of real datum and relative datum of displacements associated with an earthquake are put foward. Introducting a deformation datum parameter into model p... Based on the analyses of geodetic deformation datum, the concepts of real datum and relative datum of displacements associated with an earthquake are put foward. Introducting a deformation datum parameter into model parameter vector can enable the reference station to be set in the epicentral areas. Two improved inversionmethods, the deformation datum parameter (DDP) method and deformation difference (DD) method, are advanced in this paper. They are further applied to dislocation model inversion of the 1990 Gonghe Ms7.0 earthquake. The inversion results inferred by using the two methods are well consistent with each other, which basically reflect the source geometry and the slip of the causative fault. 展开更多
关键词 deformation datum focal mechanism INVERSION levelling survey route Gonghe earthquake.
下载PDF
A Secure Multi-Routing Platform for Ad Hoc Network
18
作者 卢社阶 陈晶 熊再红 《Journal of Southwest Jiaotong University(English Edition)》 2008年第3期205-213,共9页
In an ad hoc network, it is usually difficult to optimize the assignment of network routing resources using a single type of routing protocol due to the differences in network scale, node moving mode and node distribu... In an ad hoc network, it is usually difficult to optimize the assignment of network routing resources using a single type of routing protocol due to the differences in network scale, node moving mode and node distribution. Therefore, it is desirable to have nodes run multiple routing protocols simultaneously so that more than one protocols can be chosen to work jointly. For this purpose, a multiple routing platform for Ad hoc networks is proposed on a higher level of current routing protocols. In order to ensure the security of the platform, a security mechanism and its formal analysis by BAN logic is given. The simulation results of the network performance demonstrate that the proposed multi-routing platform is practicable in some complex applications. 展开更多
关键词 Ad hoc network Multi-routing platform routing protocols Security mechanism routing performance Simulation
下载PDF
Multipath Routing Mathematical Model to Solve the Traffic Engineering in Multi-Protocol Label Switching Network
19
作者 Hani Attar 《Journal of Computer and Communications》 2017年第14期113-122,共10页
Multipath Protocol Label Switching (MPLS) is a routing mechanism (technology) used in modern telecommunication networks, which is built as a multi-service network with a certain Quality of Service (QoS). To maintain t... Multipath Protocol Label Switching (MPLS) is a routing mechanism (technology) used in modern telecommunication networks, which is built as a multi-service network with a certain Quality of Service (QoS). To maintain the required QoS in such complicated networks, the Traffic Engineering (TE) should be equipped with optimum traffic management, routing mechanism, and switching operations, which are what this paper tackles, where the TE is identified as the optimal distribution of flows in the existing network. In this paper, an effective multipath routing mathematical model is developed based on several previous mechanisms to ensure the guaranteed desired QoS and loading balance according to the Telecommunication Network Systems (TCS) resources, to achieve the optimum TE, and hence improving the network usage efficiency. Moreover, the obtained mathematical optimization algorithm results are provided through the relative equations. Indeed the developed routing mathematical model in this paper is suitable for the dynamic distribution of information flows, which is the main improvement in the TE achieved in this work. 展开更多
关键词 Multi-Sources NETWORK OPTIMUM Traffic Management routing mechanism and MULTIPATH routing Mathematical
下载PDF
Theoretical and experimental studies on fabrication of two-layer aluminum−copper pipe by friction stir additive manufacturing
20
作者 Mehdi FALAHATI NAQIBI Majid ELYASI +1 位作者 Hamed JAMSHIDI AVAL Mohammad Javad MIRNIA 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2021年第12期3643-3658,共16页
Using a friction stir additive manufacturing(FSAM)process,the fabrication of a two-layer aluminum−copper pipe was studied experimentally and numerically.For this purpose,by presenting a 3D thermo-mechanical model in A... Using a friction stir additive manufacturing(FSAM)process,the fabrication of a two-layer aluminum−copper pipe was studied experimentally and numerically.For this purpose,by presenting a 3D thermo-mechanical model in ABAQUS software,the temperature and strain distributions during the process were studied.The simulation results show that,although the rotational-to-traverse speed ratio with a good approximation can predict the heat input during welding,it is not a precise measure to predict the occurrence of defects in the weld cross-section.There is a good agreement between the predicted and experimental thermal results,and the maximum relative error is 4.1%in estimating the maximum temperature during welding.Due to heat and severe plastic deformation in the stir zone,the aluminum−copper intermetallic compounds(CuAl_(2) and Cu_(9)Al_(4))are formed.The maximum hardness in the stir zone is 301.4 HV_(0.1) in sample welded with an overlap of−0.5 mm.The ultimate tensile strength and elongation of the two-layer pipe fabricated by friction stir additive manufacturing are(319.52±2.31)MPa and 19.47%,respectively. 展开更多
关键词 friction stir welding thermo-mechanical simulation two-layer Al−Cu pipes microstructure mechanical properties
下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部