期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
基于HLA分布式仿真中的负载平衡技术研究 被引量:1
1
作者 李雪 翟正军 +2 位作者 王季 姚和平 姜鹏 《微电子学与计算机》 CSCD 北大核心 2007年第11期155-158,共4页
HLA为实现分布式仿真的互操作和重用提供了一个通用的技术框架,但HLA中并未提供负载平衡机制。通过对HLA/RTI及负载平衡技术的研究,在HLA中实现了负载平衡机制,同时通过在系统中加入结点检测模块的方法解决了实体迁移过程中出现的问题... HLA为实现分布式仿真的互操作和重用提供了一个通用的技术框架,但HLA中并未提供负载平衡机制。通过对HLA/RTI及负载平衡技术的研究,在HLA中实现了负载平衡机制,同时通过在系统中加入结点检测模块的方法解决了实体迁移过程中出现的问题。与没有采用负载平衡机制的系统相比,采用该机制的系统性能明显提高,具有较高的实用价值。 展开更多
关键词 负载监测 迁移技术 推模式 结点检测 迁移决策 负载平衡
下载PDF
VEHICLE SEGMENTATION AND SHADOW HANDLER BASED ON EXTREMUM IMAGE 被引量:3
2
作者 温惠英 徐建闽 刘利频 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2006年第1期65-71,共7页
The shadows similar to the vehicle and the spots caused by vehicle lamps need to be accurately detected in the vehicle segmentation involved in the video-based traffic parameter measurement. Generally, the road surfac... The shadows similar to the vehicle and the spots caused by vehicle lamps need to be accurately detected in the vehicle segmentation involved in the video-based traffic parameter measurement. Generally, the road surface is different from the vehicle surface in the gray-level architecture. An invariant gray-level architecture-the extremum image in the changing illumination environment is derived and a novel algorithm is presented for detecting shadows and spots. The gray-level structure that is not sensitive to the illumination is employed in the algorithm and the road surface mistaken as vehicles can be removed. 展开更多
关键词 gray-level structure extremun point image extremum polarity image shadow detecting VEHICLE
下载PDF
Intrusion Detection for Wireless Mesh Networks using Finite State Machine 被引量:5
3
作者 Yi Ping Wu Yue +1 位作者 Liu Ning Wang Zhiyang 《China Communications》 SCIE CSCD 2010年第5期40-48,共9页
Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protec... Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer suffi- cient and effective for those features. In this paper, we propose a distributed intrusion detection ap- proach based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we con- struct the Finite State Machine (FSM) by the way of manually abstracting the correct behaviors of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node's behavior by the Finite State Ma- chine (FSM), and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, we evaluate the intrusion detection method through simulation experiments. 展开更多
关键词 wireless mesh networks SECURITY intrusion detection finite state machine
下载PDF
Topology inference of uncertain complex dynamical networks and its applications in hidden nodes detection 被引量:7
4
作者 WANG YingFei WU XiaoQun +2 位作者 FENG Hui LU JunAn LU JinHu 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2016年第8期1232-1243,共12页
The topological structure of a complex dynamical network plays a vital role in determining the network's evolutionary mecha- nisms and functional behaviors, thus recognizing and inferring the network structure is of ... The topological structure of a complex dynamical network plays a vital role in determining the network's evolutionary mecha- nisms and functional behaviors, thus recognizing and inferring the network structure is of both theoretical and practical signif- icance. Although various approaches have been proposed to estimate network topologies, many are not well established to the noisy nature of network dynamics and ubiquity of transmission delay among network individuals. This paper focuses on to- pology inference of uncertain complex dynamical networks. An auxiliary network is constructed and an adaptive scheme is proposed to track topological parameters. It is noteworthy that the considered network model is supposed to contain practical stochastic perturbations, and noisy observations are taken as control inputs of the constructed auxiliary network. In particular, the control technique can be further employed to locate hidden sources (or latent variables) in networks. Numerical examples are provided to illustrate the effectiveness of the proposed scheme. In addition, the impact of coupling strength and coupling delay on identification performance is assessed. The proposed scheme provides engineers with a convenient approach to infer topologies of general complex dynamical networks and locate hidden sources, and the detailed performance evaluation can further facilitate practical circuit design. 展开更多
关键词 complex dynamical network topology inference coupling delay stochastic perturbation hidden node
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部