期刊文献+
共找到200篇文章
< 1 2 10 >
每页显示 20 50 100
基于RG-RCMS 平台的计算机网络实验及实践项目开发与设计 被引量:1
1
作者 郑瑞娟 张明川 +2 位作者 吴庆涛 杨春蕾 魏汪洋 《信息与电脑(理论版)》 2014年第3期37-39,共3页
计算机网络课程应用性和实践性强,理论知识点相对抽象,实验和实践项目对于课程内容的学习效果与工程实践能力的综合提高具有举足轻重的作用。针对目前计算机网络课程的实践需求,基于分层思想,采用自底向上的思路紧密结合课程的理论内容... 计算机网络课程应用性和实践性强,理论知识点相对抽象,实验和实践项目对于课程内容的学习效果与工程实践能力的综合提高具有举足轻重的作用。针对目前计算机网络课程的实践需求,基于分层思想,采用自底向上的思路紧密结合课程的理论内容,利用RG-RCMS平台设计了一系列贴近实际应用的网络实验和实践项目。使让学生能够通过网络体系的设计与配置,切实巩固与加强对网络工程核心知识的掌握,同时提高学生的创新思维与项目经验。 展开更多
关键词 实践项目 RG-RCMS 计算机网络课程 计算机网络实验 学习效果 网络工程 交换机控制 《计算机网
原文传递
FAULT LOCATION AND RECORDING SYSTEM OF TRANSMISSION LINES BASED ON COMPUTER NETWORK 被引量:1
2
作者 贺家李 孙雅明 贺继红 《Transactions of Tianjin University》 EI CAS 1997年第1期17-23,共7页
In this paper a fault location and recording system based on a computer network is presented. A brief description of the system structure and main features are given. Emphasis is placed on the accurate fault location ... In this paper a fault location and recording system based on a computer network is presented. A brief description of the system structure and main features are given. Emphasis is placed on the accurate fault location method for extra high voltage and long distance transmission lines. 展开更多
关键词 computer network fault location recording system
下载PDF
Research and Implementation on HTTP Tunneling
3
作者 束坤 许勇 +1 位作者 吴国新 赵齐 《Journal of Southeast University(English Edition)》 EI CAS 2000年第2期52-57,共6页
The security problem of the Web system in the Internet based Intranet and the shortcomings of the methods used in solving this problem are analyzed and our system model of Web communication security are discussed, i... The security problem of the Web system in the Internet based Intranet and the shortcomings of the methods used in solving this problem are analyzed and our system model of Web communication security are discussed, i.e, adding local proxy to browser and reverse proxy to Web server based on present Web browser and server. The transformation between HTTP message and secure HTTP message is implemented in these two proxy modules. The architecture and implementing method is given and the features of this module is also discussed. 展开更多
关键词 computer network WEB communication security PROXY
下载PDF
Distributed Computation Models for Data Fusion System Simulation
4
作者 张岩 曾涛 +1 位作者 龙腾 崔智社 《Journal of Beijing Institute of Technology》 EI CAS 2001年第3期291-297,共7页
An attempt has been made to develop a distributed software infrastructure model for onboard data fusion system simulation, which is also applied to netted radar systems, onboard distributed detection systems and advan... An attempt has been made to develop a distributed software infrastructure model for onboard data fusion system simulation, which is also applied to netted radar systems, onboard distributed detection systems and advanced C3I systems. Two architectures are provided and verified: one is based on pure TCP/IP protocol and C/S model, and implemented with Winsock, the other is based on CORBA (common object request broker architecture). The performance of data fusion simulation system, i.e. reliability, flexibility and scalability, is improved and enhanced by two models. The study of them makes valuable explore on incorporating the distributed computation concepts into radar system simulation techniques. 展开更多
关键词 radar system computer network data fusion SIMULATION distributed computation
下载PDF
HARDWARE-BASED VOXELIZATION FOR TRUE 3-D DISPLAY 被引量:5
5
作者 谭皓 杨忠 +1 位作者 李玉峰 沈春林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2006年第1期59-64,共6页
An efficient voxelization algorithm is presented for polygonal models by using the hardware support for the 2 D rasterization algorithm and the GPU programmable function to satisfy the volumetric display system. The v... An efficient voxelization algorithm is presented for polygonal models by using the hardware support for the 2 D rasterization algorithm and the GPU programmable function to satisfy the volumetric display system. The volume is sampled into slices by the rendering hardware and then slices are rasterated into a series of voxels. A composed buffer is used to record encoded voxels of the target volume to reduce the graphic memory requirement. In the algorithm, dynamic vertexes and index buffers are used to improve the voxelization efficiency. Experimental results show that the algorithm is efficient for a true 3-D display system. 展开更多
关键词 computer graphics VOXELIZATION volumetric display mesh model
下载PDF
Modeling of Intelligent Integrated Network Management System Using Object Oriented Approach *
6
作者 费翔 罗军舟 +1 位作者 顾冠群 吴介一 《Journal of Southeast University(English Edition)》 EI CAS 1998年第1期3-7,共5页
The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficien... The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently. 展开更多
关键词 object oriented approach computer communication network network management
下载PDF
Computer Network Control System in Automatic Automobile Detection
7
作者 高岩 窦丽华 +1 位作者 高琪 周宁 《Journal of Beijing Institute of Technology》 EI CAS 2001年第4期406-411,共6页
An automobile test controlling and managing system with computer network is introduced. The architecture of the local network, hardware structure, software structure, design of the test process, and error tolerating r... An automobile test controlling and managing system with computer network is introduced. The architecture of the local network, hardware structure, software structure, design of the test process, and error tolerating redundant design in work position substituting are presented. At last, the pivotal questions solved are discussed. With an advanced structure, this system is multi functional and flexible. Furthermore, advanced computer technology is adopted to improve its technical degree. 展开更多
关键词 computer control system local network automobile test error tolerance
下载PDF
Prediction of Injection-Production Ratio with BP Neural Network
8
作者 袁爱武 郑晓松 王东城 《Petroleum Science》 SCIE CAS CSCD 2004年第4期62-65,共4页
Injection of water to enhance oil production is commonplace, and improvements in understanding the process are economically important. This study examines predictive models of the injection-to-production ratio. First... Injection of water to enhance oil production is commonplace, and improvements in understanding the process are economically important. This study examines predictive models of the injection-to-production ratio. Firstly, the error between the fitting and actual injection-production ratio is calculated with such methods as the injection-production ratio and water-oil ratio method, the material balance method, the multiple regression method, the gray theory GM (1,1) model and the back-propogation (BP) neural network method by computer applications in this paper. The relative average errors calculated are respectively 1.67%, 1.08%, 19.2%, 1.38% and 0.88%. Secondly, the reasons for the errors from different prediction methods are analyzed theoretically, indicating that the prediction precision of the BP neural network method is high, and that it has a better self-adaptability, so that it can reflect the internal relationship between the injection-production ratio and the influencing factors. Therefore, the BP neural network method is suitable to the prediction of injection-production ratio. 展开更多
关键词 Injection-production ratio (IPR) BP neural network gray theory PREDICTION
下载PDF
HiQoS:An SDN-Based Multipath QoS Solution 被引量:20
9
作者 YAN Jinyao ZHANG Hailong +2 位作者 SHUAI Qianjun LIU Bo GUO Xiao 《China Communications》 SCIE CSCD 2015年第5期123-133,共11页
Today's Internet architecture provides only "best effort" services,thus it cannot guarantee quality of service(QoS) for applications.Software Defined Network(SDN)is a new approach to computer networking ... Today's Internet architecture provides only "best effort" services,thus it cannot guarantee quality of service(QoS) for applications.Software Defined Network(SDN)is a new approach to computer networking that separates control plane and forwarding planes,and has the advantage of centralized control and programmability.In this paper,we propose HiQoS that provides QoS guarantees using SDN.Moreover,HiQoS makes use of multiple paths between source and destination and queuing mechanisms to guarantee QoS for different types of traffic.Experimental results show that our HiQoS scheme can reduce delay and increase throughput to guarantee QoS.Very importantly,HiQoS recovers from link failure very quickly by rerouting traffic from failed path to other available path. 展开更多
关键词 SDN QOS MULTIPATH OpenFlow
下载PDF
Adaptive ant-based routing in wireless sensor networks using Energy~* Delay metrics 被引量:6
10
作者 Yao-feng WEN Yu-quan CHEN Min PAN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第4期531-538,共8页
To find the optimal routing is always an important topic in wireless sensor networks (WSNs). Considering a WSN where the nodes have limited energy, we propose a novel Energy*Delay model based on ant algorithms ("... To find the optimal routing is always an important topic in wireless sensor networks (WSNs). Considering a WSN where the nodes have limited energy, we propose a novel Energy*Delay model based on ant algorithms ("E&D ANTS" for short) to minimize the time delay in transferring a fixed number of data packets in an energy-constrained manner in one round. Our goal is not only to maximize the lifetime of the network but also to provide real-time data transmission services. However, because of the tradeoff of energy and delay in wireless network systems, the reinforcement learning (RL) algorithm is introduced to train the model. In this survey, the paradigm of E&D ANTS is explicated and compared to other ant-based routing algorithms like AntNet and AntChain about the issues of routing information, routing overhead and adaptation. Simulation results show that our method performs about seven times better than AntNet and also outperforms AntChain by more than 150% in terms of energy cost and delay per round. 展开更多
关键词 Ant colony optimization (ACO) PHEROMONES Power consumption Wireless sensor networks (WSNs)
下载PDF
Deterministic and randomized scheduling problems under the lp norm on two identical machines 被引量:5
11
作者 林凌 谈之奕 何勇 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第1期20-26,共7页
Parallel machine scheduling problems, which are important discrete optimization problems, may occur in many applications. For example, load balancing in network communication channel assignment, parallel processing in... Parallel machine scheduling problems, which are important discrete optimization problems, may occur in many applications. For example, load balancing in network communication channel assignment, parallel processing in large-size computing, task arrangement in flexible manufacturing systems, etc., are multiprocessor scheduling problem. In the traditional parallel machine scheduling problems, it is assumed that the problems are considered in offline or online environment. But in practice, problems are often not really offline or online but somehow in-between. This means that, with respect to the online problem, some further information about the tasks is available, which allows the improvement of the performance of the best possible algorithms. Problems of this class are called semi-online ones. In this paper, the semi-online problem P2|decr|lp (p>1) is considered where jobs come in non-increasing order of their processing times and the objective is to minimize the sum of the lp norm of every machine’s load. It is shown that LS algorithm is optimal for any lp norm, which extends the results known in the literature. Furthermore, randomized lower bounds for the problems P2|online|lp and P2|decr|lp are presented. 展开更多
关键词 SEMI-ONLINE SCHEDULING RANDOMIZATION Competitive ratio
下载PDF
Improved Feistel-based ciphers for wireless sensor network security 被引量:3
12
作者 Tamara PAZYNYUK George S. OREKU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第8期1111-1117,共7页
Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accor... Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accordingly, leading to a similar rise in methods of resistance. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme. The modified accelerated-cipher design uses data-dependent permutations, and can be used for fast hardware, firmware, software and WSN encryption systems. The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES, Camellia and so on. 展开更多
关键词 SECURITY CIPHER Wireless sensor network (WSN) Feistel scheme
下载PDF
An Adaptive Scheme for Neighbor Discovery in Mobile Ad Hoc Networks 被引量:5
13
作者 沈耀 蔡云泽 许晓鸣 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期602-609,617,共9页
The neighbor knowledge in mobile ad hoc networks is important information. However, the accuracy of neighbor knowledge is paid in terms of energy consumption. In traditional schemes for neighbor discovery, a mobile no... The neighbor knowledge in mobile ad hoc networks is important information. However, the accuracy of neighbor knowledge is paid in terms of energy consumption. In traditional schemes for neighbor discovery, a mobile node uses fixed period to send HELLO messages to notify its existence. An adaptive scheme was proposed. The objective is that when mobile nodes are distributed sparsely or move slowly, fewer HELLO messages are needed to achieve reasonable accuracy, while in a mutable network where nodes are dense or move quickly, they can adaptively send more HELLO messages to ensure the accuracy. Simulation results show that the adaptive scheme achieves the objective and performs effectively. 展开更多
关键词 ad hoc network neighbor discovery energy efficiency
下载PDF
A Novel Packet Marking Algorithm in Context-aware Autonomic QoS Framework 被引量:2
14
作者 Gong Xiangyang Wang Wendong Li Yan 《China Communications》 SCIE CSCD 2009年第4期98-107,共10页
Autonomic networking is one of the hot research topics in the research area of future network architectures.In this paper, we introduce context-aware and autonomic attributes into DiffServ QoS framework, and propose a... Autonomic networking is one of the hot research topics in the research area of future network architectures.In this paper, we introduce context-aware and autonomic attributes into DiffServ QoS framework, and propose a novel autonomic packet marking(APM) algorithm.In the proposed autonomic QoS framework, APM is capable of collecting various QoS related contexts, and adaptively adjusting its behavior to provide better QoS guarantee according to users' requirements and network conditions.Simulation results show that APM provides better performance than traditional packet marker, and significantly improves user's quality of experience. 展开更多
关键词 autonomic QoS framework DIFFSERV CONTEXT-AWARE packet marking
下载PDF
Strategic games on a hierarchical network model 被引量:2
15
作者 Yi-xiao LI Xiao-gang JIN +1 位作者 Fan-sheng KONG Hui-lan LUO 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第2期271-278,共8页
Among complex network models,the hierarchical network model is the one most close to such real networks as world trade web,metabolic network,WWW,actor network,and so on.It has not only the property of power-law degree... Among complex network models,the hierarchical network model is the one most close to such real networks as world trade web,metabolic network,WWW,actor network,and so on.It has not only the property of power-law degree distribution,but also the scaling clustering coefficient property which Barabási-Albert(BA)model does not have.BA model is a model of network growth based on growth and preferential attachment,showing the scale-free degree distribution property.In this paper,we study the evolution of cooperation on a hierarchical network model,adopting the prisoner's dilemma(PD)game and snowdrift game(SG)as metaphors of the interplay between connected nodes.BA model provides a unifying framework for the emergence of cooperation.But interestingly,we found that on hierarchical model,there is no sign of cooperation for PD game,while the fre-quency of cooperation decreases as the common benefit decreases for SG.By comparing the scaling clustering coefficient prop-erties of the hierarchical network model with that of BA model,we found that the former amplifies the effect of hubs.Considering different performances of PD game and SG on complex network,we also found that common benefit leads to cooperation in the evolution.Thus our study may shed light on the emergence of cooperation in both natural and social environments. 展开更多
关键词 Complex network Hierarchical network model Barabási-Albert (BA) model Prisoner's dilemma (PD) game Snowdrift game (SG)
下载PDF
An Algorithm to Construct Concurrent Reachability Graph of Petri Nets 被引量:3
16
作者 张金泉 倪丽娜 蒋昌俊 《Journal of Donghua University(English Edition)》 EI CAS 2004年第3期180-184,共5页
Reachability graph is a very important tool to analyze the dynamic properties of Petri nets, but the concurrent relation of transitions in Petri nets cannot be represented by reachability graph. Petri net is a concurr... Reachability graph is a very important tool to analyze the dynamic properties of Petri nets, but the concurrent relation of transitions in Petri nets cannot be represented by reachability graph. Petri net is a concurrent system, while reachability graph is a serial one. However, concurrency is a kind of property which is not only very significant but also difficult to be analyzed and controlled. This paper presents the concepts of concurrent reachable marking and concurrent reachable graph in order to represent and analyze the concurrent system. The algorithm constructing concurrent reachable marking set and concurrent reachability graph is also shown so that we can study the response problems among services in a network computing environment and analyze the throughput of the system. The Dining Philosophers Problem, which is a classic problem of describing the management of concurrent resources, is given as an example to illustrate the significance of concurrent reachability graph. 展开更多
关键词 Petri nets concurrent system Concurrent Reachable Marking concurrent reachable marking set Concurrent Reachability Graph
下载PDF
A flexible architecture for job management in a grid environment 被引量:2
17
作者 LUAN Cui-ju SONG Guang-hua +1 位作者 ZHENG Yao ZHANG Ji-fa 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第1期95-105,共11页
Job management is a key issue in computational grids, and normally involves job definition, scheduling, executing and monitoring. However, job management in the existing grid middleware needs to be improved in terms o... Job management is a key issue in computational grids, and normally involves job definition, scheduling, executing and monitoring. However, job management in the existing grid middleware needs to be improved in terms of efficiency and flexibility. This paper addresses a flexible architecture for job management with detailed design and implementation. Frameworks for job scheduling and monitoring, as two important aspects, are also presented. The proposed job management has the advantages of reusability of job definition, flexible and automatic file operation, visual steering of file transfer and job execution, and adaptive application job scheduler. A job management wizard is designed to implement each step. Therefore, what the grid user needs to do is only to define the job by constructing necessary information at runtime. In addition, the job space is adopted to ensure the security of the job management. Experimental results showed that this approach is user-friendly and system efficient. 展开更多
关键词 Grid Job management Job definition reuse Steering of job transfer Job space
下载PDF
Research on traffic congestion mechanism and countermeasures based on dynamic traffic assignment 被引量:3
18
作者 裴玉龙 郎益顺 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第3期235-238,共4页
Traffic congestion is widely distributed around a network. Generally, to analyze traffic congestion, static traffic capacity is adopted. But dynamic characteristics must be studied because congestion is a dynamic proc... Traffic congestion is widely distributed around a network. Generally, to analyze traffic congestion, static traffic capacity is adopted. But dynamic characteristics must be studied because congestion is a dynamic process. A Dynamic Traffic Assignment modeling fundamental combined with an urban congestion analysis method is studied in this paper. Three methods are based on congestion analysis, and the stochastic user optimal DTA models are especially considered. Correspondingly, a dynamic system optimal model is suggested for responding congestion countermeasures and an ideal user optimal model for predicted congestion countermeasure respectively. 展开更多
关键词 dynamic traffic assignment traffic congestion dynamic user optimal dynamic system optimal
下载PDF
Web Page Watermarking for Tamper-Proof 被引量:2
19
作者 赵启军 卢宏涛 蒋晓华 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期280-284,共5页
This paper proposed a watermarking algorithm for tamper-proof of web pages. For a web page, it generates a watermark consisting of a sequence of Space and Tab. The wa termark is then embedded into the web page after e... This paper proposed a watermarking algorithm for tamper-proof of web pages. For a web page, it generates a watermark consisting of a sequence of Space and Tab. The wa termark is then embedded into the web page after each word and each line. When a watermarked web page is tampered, the extracted watermark can detect and locate the modifications to the web page. Besides, the framework of watermarked Web Server system was given. Compared with traditional digital signature methods, this watermarking method is more transparent in that there is no necessary to detach the watermark before displaying web pages. The e xperimental results show that the proposed scheme is an effective tool for tamper-proof of web pages. 展开更多
关键词 web page WATERMARKING hypertext markup language(HTML) tamper-proof
下载PDF
A reliable routing algorithm based on fuzzy Petri net in mobile ad hoc networks 被引量:2
20
作者 胡志刚 马好 +1 位作者 王国军 廖麟 《Journal of Central South University of Technology》 EI 2005年第6期714-719,共6页
A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structure... A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structured representation of network topology, which has a fuzzy reasoning mechanism for finding the routing sprouting tree from the source node to the destination node in the mobile ad boc environment. Finally, by comparing the degree of reliability in the routing sprouting tree, the most reliable route can be computed. The algorithm not only offers the local reliability between each neighboring node, but also provides global reliability for the whole selected route. The algorithm can be applied to most existing on-demand routing protocols, and the simulation results show that the routing reliability is increased by more than 80% when applying the proposed algorithm to the ad hoc on demand distance vector routing protocol. 展开更多
关键词 mobile ad hoe network fuzzy Petri net certainty factor ad hoc on demand distance vector routing algorithm
下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部