This paper describes how to use medium access control (MAC) isolation to enhance management performance in public wireless LAN (PWLAN). To comply with the IEEE 802.11 standards, a scheme to implement MAC isolation in ...This paper describes how to use medium access control (MAC) isolation to enhance management performance in public wireless LAN (PWLAN). To comply with the IEEE 802.11 standards, a scheme to implement MAC isolation in WLAN access points by re-designing the Distribution_Service component of the MAC state machine is proposed. A variable named dotl 1 Isolation is defined to determine whether the MAC level communication between wireless stations in the same BSS is permitted or not. Finally, a design solution based on MPC860 hardware and embedded Linux software for PWLAN access point is specified. The simulation results of MAC isolation for PWLAN show that the proposed scheme is feasible and effective.展开更多
Using the Keldysh-Green function,we present a theoretical study on the electron transport properties of two coupled quantum dots under optical pumping. Plateaus in the I-V curve and resonant peaks in the transmission ...Using the Keldysh-Green function,we present a theoretical study on the electron transport properties of two coupled quantum dots under optical pumping. Plateaus in the I-V curve and resonant peaks in the transmission coefficient occur and can be explained by the local electron density of states in the quantum dots. The effects of the optical pumping frequency and intensity on the transport properties of the system are also discussed. The electron dynamical localization phenomenon occurs when the optical pumping frequency is equal to the discrete hole energy level. This result can be used to realize optical control switches.展开更多
The existing network security management systems are unable either to provide users with useful security situation and risk assessment, or to aid administrators to make right and timely decisions based on the current ...The existing network security management systems are unable either to provide users with useful security situation and risk assessment, or to aid administrators to make right and timely decisions based on the current state of network. These disadvantages always put the whole network security management at high risk. This paper establishes a simulation environment, captures the alerts as the experimental data and adopts statistical analysis to seek the vulnerabilities of the services provided by the hosts in the network. According to the factors of the network, the paper introduces the two concepts: Situational Meta and Situational Weight to depict the total security situation. A novel hierarchical algorithm based on analytic hierarchy process (AHP) is proposed to analyze the hierarchy of network and confirm the weighting coefficients. The algorithm can be utilized for modeling security situation, and determining its mathematical expression. Coupled with the statistical results, this paper simulates the security situational trends. Finally, the analysis of the simulation results proves the algorithm efficient and applicable, and provides us with an academic foundation for the implementation in the security situation展开更多
The global exponential stability of Cohen-Grossberg neural networks with time-varying delays is studied. By constructing several suitable Lyapunov functionals and utilizing differential in-equality techniques, some su...The global exponential stability of Cohen-Grossberg neural networks with time-varying delays is studied. By constructing several suitable Lyapunov functionals and utilizing differential in-equality techniques, some sufficient criteria for the global exponential stability and the exponential convergence rate of the equilibrium point of the system are obtained. The criteria do not require the activation functions to be differentiable or monotone nondecreasing. Some stability results from previous works are extended and improved. Comparisons are made to demonstrate the advantage of our results.展开更多
文摘This paper describes how to use medium access control (MAC) isolation to enhance management performance in public wireless LAN (PWLAN). To comply with the IEEE 802.11 standards, a scheme to implement MAC isolation in WLAN access points by re-designing the Distribution_Service component of the MAC state machine is proposed. A variable named dotl 1 Isolation is defined to determine whether the MAC level communication between wireless stations in the same BSS is permitted or not. Finally, a design solution based on MPC860 hardware and embedded Linux software for PWLAN access point is specified. The simulation results of MAC isolation for PWLAN show that the proposed scheme is feasible and effective.
文摘Using the Keldysh-Green function,we present a theoretical study on the electron transport properties of two coupled quantum dots under optical pumping. Plateaus in the I-V curve and resonant peaks in the transmission coefficient occur and can be explained by the local electron density of states in the quantum dots. The effects of the optical pumping frequency and intensity on the transport properties of the system are also discussed. The electron dynamical localization phenomenon occurs when the optical pumping frequency is equal to the discrete hole energy level. This result can be used to realize optical control switches.
基金Supported by the High Technology Research and Development Programme of China (No. 2003AA142160) and the National Natural Science Foundation of China (No. 60605019).
文摘The existing network security management systems are unable either to provide users with useful security situation and risk assessment, or to aid administrators to make right and timely decisions based on the current state of network. These disadvantages always put the whole network security management at high risk. This paper establishes a simulation environment, captures the alerts as the experimental data and adopts statistical analysis to seek the vulnerabilities of the services provided by the hosts in the network. According to the factors of the network, the paper introduces the two concepts: Situational Meta and Situational Weight to depict the total security situation. A novel hierarchical algorithm based on analytic hierarchy process (AHP) is proposed to analyze the hierarchy of network and confirm the weighting coefficients. The algorithm can be utilized for modeling security situation, and determining its mathematical expression. Coupled with the statistical results, this paper simulates the security situational trends. Finally, the analysis of the simulation results proves the algorithm efficient and applicable, and provides us with an academic foundation for the implementation in the security situation
基金National Natural Science Foundation of China (No70471049)
文摘The global exponential stability of Cohen-Grossberg neural networks with time-varying delays is studied. By constructing several suitable Lyapunov functionals and utilizing differential in-equality techniques, some sufficient criteria for the global exponential stability and the exponential convergence rate of the equilibrium point of the system are obtained. The criteria do not require the activation functions to be differentiable or monotone nondecreasing. Some stability results from previous works are extended and improved. Comparisons are made to demonstrate the advantage of our results.