期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
遥感图像处理软件设计中插件技术的应用 被引量:1
1
作者 王宏勇 张杰 张永生 《海洋测绘》 2005年第2期34-36,共3页
首先给出了插件的定义及引入插件的意义,然后阐述了插件的原理及关键技术,最后给出了插件设计的步骤和在遥感图像处理软件中的实现方法。
关键词 遥感图像 协议 接口 动态链接库
下载PDF
一种新型主动式网络体系结构模型 被引量:1
2
作者 陈虹 段米毅 《计算机工程与应用》 CSCD 北大核心 2002年第8期163-166,174,共5页
主动网是一种允许用户“按需”定制自己的服务的可编程网络。由于允许用户编程,主动网不但应具有较好的可编程性,而且应具有较好的性能和安全性。文章基于组件和安全语言技术提出了一种新的主动网体系结构模型----Ac-tiveWare。它包括... 主动网是一种允许用户“按需”定制自己的服务的可编程网络。由于允许用户编程,主动网不但应具有较好的可编程性,而且应具有较好的性能和安全性。文章基于组件和安全语言技术提出了一种新的主动网体系结构模型----Ac-tiveWare。它包括网络基础设施、协议件和主动包三个层次。基于这一模型,用户可以利用协议件安全、方便地在主动网上构建自己的服务。 展开更多
关键词 主动式网络 体系结构 计算机网络 协议件
下载PDF
进口综合录井仪WITS标准实时数据传输与接收 被引量:6
3
作者 侯艳伟 刘波 《录井工程》 2012年第3期54-59,101,共6页
摘要适应井场数据共享的需要,不同型号的进口综合录井仪都提供了相应的符合WITS标准的实时数据传输程序软件,但由于软件各具特色且数据接口设置不统一,实时数据的输出格式未达到统一的要求,给数据接收及应用带来了一定的不便。为了解决... 摘要适应井场数据共享的需要,不同型号的进口综合录井仪都提供了相应的符合WITS标准的实时数据传输程序软件,但由于软件各具特色且数据接口设置不统一,实时数据的输出格式未达到统一的要求,给数据接收及应用带来了一定的不便。为了解决这一问题,在介绍WITS特点的基础上,分析了具有领先水平的3种型号进口综合录井仪(Advantage、ALS2.2和DataLog)的WITS实时数据传输方法、软件设置方式、数据接收系统组成和实现实时数据接收的主要手段。以录井信息为主且符合统一格式要求的实时数据传输与接收,将对实现实时信息的有效共享和充分利用起到重要的保障作用。 展开更多
关键词 WITS ADVANTAGE ALS DataLog实时数据 传输与接收 格式文TCP IP协议
下载PDF
基于剩余能量和睡眠控制的改进LEACH算法 被引量:1
4
作者 韩媛萍 《现代电子技术》 2012年第22期97-100,共4页
无线传感器网络(WSN)路由协议研究的一个重要的目标是如何在有限的能源下降低整个网络的能耗,提高网络的生存时间。以分簇路由协议LEACH为研究基础,提出了一种改进算法。该算法改进了簇首选择规则,引入协调件协议算法,通过在成簇阶段降... 无线传感器网络(WSN)路由协议研究的一个重要的目标是如何在有限的能源下降低整个网络的能耗,提高网络的生存时间。以分簇路由协议LEACH为研究基础,提出了一种改进算法。该算法改进了簇首选择规则,引入协调件协议算法,通过在成簇阶段降低剩余能量低的节点被选择成为簇首的概率,在稳定运行阶段使簇首节点尽可能多的保持睡眠状态,从而降低了网络能耗。仿真结果表明,与原LEACH算法相比,改进的算法能够明显地延长网络生存时间。 展开更多
关键词 无线传感器网络 分簇算法 协调协议 生存周期
下载PDF
Formal analysis of robust email protocol based on authentication tests 被引量:1
5
作者 蒋睿 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2009年第2期147-151,共5页
Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the m... Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy. 展开更多
关键词 email protocol authentication tests formal method perfect forward secrecy strand space model
下载PDF
On Generality of the Data Plane and Scalability of the Control Plane in Software-Defined Networking 被引量:2
6
作者 ZUO Qingyun CHEN Ming DING Ke XU Bo 《China Communications》 SCIE CSCD 2014年第2期55-64,共10页
The control and data planes are decoupled in software-defined networking(SDN),which enables both planes to evolve independently,and brings about many advantages such as high flexibility,programmability,and rapid imple... The control and data planes are decoupled in software-defined networking(SDN),which enables both planes to evolve independently,and brings about many advantages such as high flexibility,programmability,and rapid implementation of new network protocols.However,in order to improve the scalability of the control plane at present,some control functionalities are added to the data plane,which is probably to impact on the generality of the data plane.The key challenge of adding control functionalities to the data plane is to strike a careful balance between the generality of the data plane and the scalability of the control plane.We propose some basic principles that both control and data planes should comply with,based on the evolutionary trend of SDN.Moreover,we take two approaches for reference according to the principles,viewed from the control messages in OpenFlow-based SDN.Our evaluations demonstrate that the approaches can maintain the generality of the data plane and improve the scalability of the control plane. 展开更多
关键词 OpenFlow SDN architecture control functionalities control message
下载PDF
FPGA BASED REAL-TIME VIDEO IMAGE ACQUISITION AND STORAGE SYSTEM 被引量:4
7
作者 李娜 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2012年第4期404-410,共7页
To overcome the traditional disadvantages, an improved FPGA-core based real-time video image acqui- sition and storage system is designed. The modular designed by Verilog programming is used for video decoding of A/D ... To overcome the traditional disadvantages, an improved FPGA-core based real-time video image acqui- sition and storage system is designed. The modular designed by Verilog programming is used for video decoding of A/D configuration, video image capturing logic control and image storage logic control modules. And IDE in- terface bard disk as storage medium and FAT32 file system as record form are used for real-time image storage. Experimental results show that the system has the advantages of strong real-time capability, high integration, powerful storage, easy expansibility and so on. 展开更多
关键词 video capture FPGA I2C protocol IDE interface FAT32 file format
下载PDF
Component based ant routing protocols analysis over mobile ad hoc networks 被引量:1
8
作者 曲大鹏 王兴伟 黄敏 《Journal of Central South University》 SCIE EI CAS 2013年第9期2378-2387,共10页
To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.... To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.The analysis results show that every routing protocol has its own characteristics and competitive environment.No routing protocol is better than others in all aspects.Therefore,based on no free lunch theory,ant routing protocols were decomposed into three key components:route discovery,route maintenance (including route refreshing and route failure handling) and data forwarding.Moreover,component based ant routing protocol (CBAR) was proposed.For purpose of analysis,it only maintained basic ant routing process,and it was simple and efficient with a low overhead.Subsequently,different mechanisms used in every component and their effect on performance were analyzed and tested by simulations.Finally,future research strategies and trends were also summarized. 展开更多
关键词 routing protocol mobile ad hoc networks ant colony optimization route discovery route maintenance data forwarding
下载PDF
Dynamic Polling MAC Scheme Considering Emergency Access in WSNs Based on Priorities 被引量:3
9
作者 Pei Qingqi Chen Chen Xie Weiguang 《China Communications》 SCIE CSCD 2012年第4期45-54,共10页
In Wireless Sensor Networks(WSNs),polling can obviously improve the throughput and decrease average access delay by allocating bandwidth efficiently and reasonably.In this paper,a Dynamic Polling Media Access Control ... In Wireless Sensor Networks(WSNs),polling can obviously improve the throughput and decrease average access delay by allocating bandwidth efficiently and reasonably.In this paper,a Dynamic Polling Media Access Control (DPMAC) scheme designed according to WSNs' features is proposed.DPMAC is a priority based access control protocol with the characteristics that its polling table is dynamically refreshed depending on whether the sensor node is active and that the bandwidth is dynamically allocated according to the traffic types.The access priorities are determined by the emergency levels of events and the scheduler proposed in our MAC is preemptive based on the deadline of the events.Simulation results show that DPMAC can efficiently utilize bandwidth and decrease average access delay and response time for emergency events with different access priorities in WSNs. 展开更多
关键词 WSNS POLLING THROUGHPUT MAC
下载PDF
A Stream Control Transmission Protocol Based OAM System of 3G Cellular Network
10
作者 郭强 朱杰 张海滨 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期245-249,共5页
OAM (Operations, Administration and Maintenance) system is a very impo rtant component of 3G cellular network. In order to acquire overall managemen t, fast response and steady operation, an SCTP (Stream Control Trans... OAM (Operations, Administration and Maintenance) system is a very impo rtant component of 3G cellular network. In order to acquire overall managemen t, fast response and steady operation, an SCTP (Stream Control Transmission Prot ocol) based OAM, i.e., SOAM system was proposed. SOAM implements new characters of SCTP such as multi-stream, enforced SACK and heartbeat mechanism on its tran sport layer. These characters help SOAM decrease the message transmission delay and accelerate the link failure detection. Besides, a new component named SOAM agent was introduced to improve the operation efficiency of SOAM. The experim ental results prove the proposed SOAM system achieves better performance on sign aling transmission compared with conventional TCP based OAM system. 展开更多
关键词 stream control transmission protocol (SCTP) operations administration and maintenance (OAM) signaling transmission 3G cellular network
下载PDF
Component versioning for protocol configuration management
11
作者 陈天洲 贺臻杰 +1 位作者 黄江伟 戴鸿君 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第B08期75-78,共4页
Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol ... Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol configuration also encounters those problems. This paper focuses on solving protocol component versioning issues for protocol configuration man- agement on embedded system, incorporating the following versioning issues: version identification, version description and protocol component archiving and retrieving based on the version library. 展开更多
关键词 Component-Based Software Engineering (CBSE) Protocol component Protocol Configuration Management (PCM) VERSIONING META-MODEL
下载PDF
A Kind of Multi-party Non-repudiation Protocol with Consistent Evidence
12
作者 Liu Dongmei Qing Sihan 《China Communications》 SCIE CSCD 2009年第4期88-96,共9页
With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiatio... With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiation, there are less work on multi-party non-repudiation protocol. Multi-party protocol is more complex and facing more challenge of collusion attack. In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence. Consistent evidence is a property that can not only simplify the process of disputation resolving, but also make the service more friendly to users, which means that whether or not TTP involves, evidences participants obtained are consistent. In the meanwhile we analyze the collusion attack that multi-party protocol facing, our protocol can prevent collusion attack. 展开更多
关键词 multi-party fair non-repudiation protocol consistent evidence collusion attack freehess FAIRNESS
下载PDF
Collaboration strategy for software dynamic evolution of multi-agent system
13
作者 李青山 褚华 +2 位作者 张曼 李敏 刁亮 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第7期2629-2637,共9页
As the ability of a single agent is limited while information and resources in multi-agent systems are distributed, cooperation is necessary for agents to accomplish a complex task. In the open and changeable environm... As the ability of a single agent is limited while information and resources in multi-agent systems are distributed, cooperation is necessary for agents to accomplish a complex task. In the open and changeable environment on the Internet, it is of great significance to research a system flexible and capable in dynamic evolution that can find a collaboration method for agents which can be used in dynamic evolution process. With such a method, agents accomplish tasks for an overall target and at the same time, the collaborative relationship of agents can be adjusted with the change of environment. A method of task decomposition and collaboration of agents by improved contract net protocol is introduced. Finally, analysis on the result of the experiments is performed to verify the improved contract net protocol can greatly increase the efficiency of communication and collaboration in multi-agent system. 展开更多
关键词 multi-agent system dynamic evolution task decomposition collaboration
下载PDF
The Argumentation for Contemporary Peacemaking Efforts According to Jewish Tradition
14
作者 Uri Zur 《Sino-US English Teaching》 2014年第5期393-399,共7页
Peace is a key concept in the Jewish tradition; it has a long history. It is also an extremely broad concept. The present article takes on the subject of contemporary peace between Israel and her neighbors, addressing... Peace is a key concept in the Jewish tradition; it has a long history. It is also an extremely broad concept. The present article takes on the subject of contemporary peace between Israel and her neighbors, addressing the issue from the vantage point of Judaism. While opinions on many issues are divided in Judaism today, all streams within the Jewish tradition uphold the concept of peace. Even so, each stream supports a somewhat different version of this ideal, subject to different limitations or reservations. One of the most serious challenges which Judaism today faces in connection with the State of Israel is the issue of exchanging territories for peace. The goal of the present paper is to show that while most approaches rooted in traditional Judaism have opposed such an exchange, Israel's religious political parties have endorsed it, advancing different arguments in support of their view. The method followed in the present paper is to study the arguments which have been used in support of peace agreements based on return or exchange of land. In light of the arguments put forth in the paper, to be counted among the accomplishments is a greater degree of openness--even on the part of the religious sector in Israel--toward the effort to achieve peace between Israel and her neighbors. 展开更多
关键词 PEACE ARGUMENTATION contemporary peacemaking Jewish tradition
下载PDF
Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers 被引量:1
15
作者 杨宇光 王园 +2 位作者 腾义伟 柴海平 温巧燕 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第7期84-88,共5页
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collabo... Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical proved to be secure even with a compromised arbitrator. messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator. 展开更多
关键词 arbitrated signature quantum signature quantum cryptography
下载PDF
Development of New Macadamia Products
16
作者 Thamires Canuto de Almeida e Silva Leonardo da Silva Arriechet Dermeval Jos6 Mazzini Sartori 《Journal of Chemistry and Chemical Engineering》 2013年第8期698-710,共13页
The macadamia tree (macadamia integrifolia maiden & betche), originally from Australia, has smooth and rounded fruits, this walnut produces richly flavoured nuts, which are used "in natura" accompanying appetizer... The macadamia tree (macadamia integrifolia maiden & betche), originally from Australia, has smooth and rounded fruits, this walnut produces richly flavoured nuts, which are used "in natura" accompanying appetizers, in the manufacture of candies, being well accepted by the population. This paper analysed the production process of the agro industrial cooperative producers of macadamia nut (Coopmac), located in the town of Sao Mateus-ES/Brazil, and responsible for the production and marketing benefits for the states of Espirito Santo and Bahia. This analysis was performed in order to identify new opportunities for developing new products. The following steps were explored: analysis of the current procedure, ideas generation, analysis of potential ideas, development of a product concept and development of a prototype product. In cooperative, macadamia oil was only extracted. It was decided to develop a potential product from this oil. Initially, chemical analyzes were performed with this oil and opted for the production of soaps, liquid and bar. During this step, the methodology of design of experiments was used to develop the prototype. Sensory analysis, based on the LAM type hedonic scale, was used in the tests. The data were analyzed and could be distinguished the best formulation and the main effects for each assessed parameter. In this step, the statistical analysis software was used. From the value of the overall quality of the sample, greater acceptance for liquid soaps was obtained for a formulation with lower oil volume and higher volume of amphoteric. When concerning the sample bar soaps, the best formulation had the lower ratio of oil volume, the higher volume of amphoteric and lower mass of clay. The authors expect to contribute to generation of scientific and technological knowledge in order to effectively meet the practical needs of efforts directed to the production of macadamia nuts in the state of Espirito Santo. 展开更多
关键词 Planning experiments sensory analysis factorial design.
下载PDF
Controlled Deterministic Secure Quantum Communication Protocol Based on Three-Particle GHZ States in X-Basis 被引量:1
17
作者 昌燕 张仕斌 +1 位作者 闫丽丽 韩桂华 《Communications in Theoretical Physics》 SCIE CAS CSCD 2015年第3期285-290,共6页
A controlled deterministic secure quantum communication(CDSQC) protocol is proposed based on threeparticle GHZ state in X-basis.Only X-basis and Z_1Z_2X_3-basis(composed of Z-basis and X-basis) measurement are require... A controlled deterministic secure quantum communication(CDSQC) protocol is proposed based on threeparticle GHZ state in X-basis.Only X-basis and Z_1Z_2X_3-basis(composed of Z-basis and X-basis) measurement are required,which makes the scheme more convenient than others in practical applications.By distributing a random key between both sides of the communication and performing classical XOR operation,we realize a one-time-pad scheme,therefore our protocol achieves unconditional secure.Because only user with legitimate identity string can decrypt the secret,our protocol can resist man-in-the middle attack.The three-particle GHZ state in X-basis is used as decoy photons to detect eavesdropping.The detection rate reaches 75% per qubit. 展开更多
关键词 deterministic secure quantum communication eavesdropping detection classical XOR operation
原文传递
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
18
作者 徐淑奖 陈秀波 +1 位作者 钮心忻 杨义先 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第5期547-553,共7页
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail. 展开更多
关键词 quantum information hiding quantum covert channel quantum cryptography quantum communication
原文传递
Sequential protocol for C(sp)-H carboxylation with CO_2:KO^tBu-catalyzed C(sp)-H silylation and KO^tBu-mediated carboxylation
19
作者 Bo Yu Peng Yang +4 位作者 Xiang Gao Zhenzhen Yang Yanfei Zhao Hongye Zhang Zhimin Liu 《Science China Chemistry》 SCIE EI CAS CSCD 2018年第4期449-456,共8页
CO_2 incorporation into C-H bonds is an important and interesting topic. Herein a sequential protocol for C(sp)-H carboxylation by employing a metal-free C-H activation/catalytic silylation reaction in conjunction wit... CO_2 incorporation into C-H bonds is an important and interesting topic. Herein a sequential protocol for C(sp)-H carboxylation by employing a metal-free C-H activation/catalytic silylation reaction in conjunction with KO^tBu-mediated carboxylation with CO_2 was established, in which KO^t Bu catalyzes silylation of terminal alkynes to form alkynylsilanes at low temperature, and simultaneously mediates carboxylation of the alkynesilanes with atmospheric CO_2. Importantly, the carboxylation further promotes the silylation, which makes the whole reaction proceed very rapidly. Moreover, this methodology is simple and scalable, which is characterized by short reaction time, wide substrate scope, excellent functional-group tolerance and mild reaction conditions,affording a range of corresponding propiolic acid products in excellent yields in most cases. In addition, it also allows for a convenient ^(13)C-labeling through the use of ^(13)CO_2. 展开更多
关键词 CO2 incorporation CARBOXYLATION propiolic acid KO^tBu C(sp)-H silylation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部