期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
基于计算机通信的网络传输数据断点检测研究
1
作者 文险峰 《通信电源技术》 2024年第19期185-187,共3页
在计算机通信网络中,传输数据中断检测对于保证传输数据的完整性和稳定性具有重要影响。因此,文章提出一种基于相似度检测和约束标签法的网络传输数据断点检测方法。通过相似度检测计算数据点之间的欧氏距离,以识别异常数据。利用约束... 在计算机通信网络中,传输数据中断检测对于保证传输数据的完整性和稳定性具有重要影响。因此,文章提出一种基于相似度检测和约束标签法的网络传输数据断点检测方法。通过相似度检测计算数据点之间的欧氏距离,以识别异常数据。利用约束标签法提高测准确性,设定距离阈值进行数据断点区域的精确识别。实验结果表明,与传统方法相比,文章设计方法在不同样本数量条件下具有更低的耗时和漏检率,表现出更高的检测效率和准确性。 展开更多
关键词 计算机通信 网络传输数据 断点检测
下载PDF
计算机通信网络传输数据断点区域智能检测方法 被引量:5
2
作者 李玉亭 《电子设计工程》 2020年第5期94-97,102,共5页
基于提高传统传输数据断点区域检测方法的检测效果、缩短检测运行时长、降低漏检率的目的,提出一种新的计算机通信网络数据传输断点区域检测方法。通过获取数据断点区域特征的信息分布,提取出数据断点区域的分布密度特征。采用标签方法... 基于提高传统传输数据断点区域检测方法的检测效果、缩短检测运行时长、降低漏检率的目的,提出一种新的计算机通信网络数据传输断点区域检测方法。通过获取数据断点区域特征的信息分布,提取出数据断点区域的分布密度特征。采用标签方法检测提取特征的相似度,引入近邻算法推算出数据断点区域检测的最优解,完成智能检测。通过对比试验得出,该方法的检测耗时仅是传统方法的一半,且最大召回率为12%,漏检率较低,更具优势。 展开更多
关键词 通信网络传输数据 断点区域 检测 分布密度 近邻算法
下载PDF
基于深度学习的网络传输数据异常识别方法 被引量:2
3
作者 王芳 《现代电子技术》 2023年第6期62-66,共5页
互联网技术的广泛普及使得网络用户数量急剧增加,网络传输数据体量也随之增大,在多种因素的影响下,内部异常数据占比也越来越高,为网络数据传输、应用带来了极大的困难,为此提出一种基于深度学习的网络传输数据异常识别方法。该方法在L... 互联网技术的广泛普及使得网络用户数量急剧增加,网络传输数据体量也随之增大,在多种因素的影响下,内部异常数据占比也越来越高,为网络数据传输、应用带来了极大的困难,为此提出一种基于深度学习的网络传输数据异常识别方法。该方法在LSTM神经网络模型的应用下,大幅度提升了评价指标——F1值,能够更加精确的识别异常数据,为网络传输数据的应用与处理提供更有效的方法支撑。应用高斯混合模型分割网络传输数据集合(训练集合/测试集合),引入深度学习技术——LSTM,构建网络传输数据异常识别模型,根据LSTM神经网络长期与短期记忆单元需求重塑网络传输数据,基于梯度下降法制定构建模型训练程序,确定异常数据判别规则,将测试集合输入至训练好的识别模型中,输出结果即为异常数据识别结果。实验数据显示:应用所提方法后,F1值呈现波动状态,最小值为83.70%,最大值为94.50%,符合数据异常识别需求,证明该方法具备可行性。 展开更多
关键词 LSTM 异常数据 深度学习 网络传输数据 自动识别 神经网络 模型训练
下载PDF
基于光纤通信技术的网络传输数据加密技术探讨
4
作者 高旭 谷玉千 《中国宽带》 2023年第12期34-36,共3页
随着信息技术的迅猛发展和网络通信的全面普及,光纤通信作为一种高效、稳定、安全的数据传输方式,已被广泛应用于各类网络系统。然而,光纤通信中的数据安全问题愈加突出,数据加密成为保障通信安全的关键技术。本文探讨了光纤通信的基本... 随着信息技术的迅猛发展和网络通信的全面普及,光纤通信作为一种高效、稳定、安全的数据传输方式,已被广泛应用于各类网络系统。然而,光纤通信中的数据安全问题愈加突出,数据加密成为保障通信安全的关键技术。本文探讨了光纤通信的基本原理及其数据传输特性,分析了光纤通信中的网络传输数据加密需求,讨论了光纤通信中网络传输数据加密技术的实现方式,包括加密设备、加密算法、端到端加密与传输层加密、模块集成与智能化管理。综合运用这些技术,可以有效提高光纤通信的安全性,保护数据的机密性和完整性,应对更加复杂和多样化的网络安全挑战。 展开更多
关键词 光纤通信 网络传输数据加密 技术应用
下载PDF
基于AES算法的ZigBee网络加密方法研究
5
作者 吴碧霞 《信息系统工程》 2016年第8期65-66,共2页
信息化技术的不断发展,对计算机网络的安全性带来了潜在的威胁,影响着用户的各种信息安全性。由于系统的整体功能非常复杂,对于相关的加密机制提出了更高的要求,需要技术人员采取必要的措施编写出合理科学的加密算法程序,为系统的正常... 信息化技术的不断发展,对计算机网络的安全性带来了潜在的威胁,影响着用户的各种信息安全性。由于系统的整体功能非常复杂,对于相关的加密机制提出了更高的要求,需要技术人员采取必要的措施编写出合理科学的加密算法程序,为系统的正常运行提供可靠的安全模式。作为高级加密标准算法,AES算法在实际的应用中取得了良好的作用效果,为各种信息安全问题的有效解决带来了重要的参考依据。这种算法作用下的安全模式,可以对Zig Bee网络使用中产生的各种数据进行加密处理,提高了网络传输数据的静载荷量。基于此,本文将对基于AES算法的Zig Bee网络加密方法进行必要地研究。 展开更多
关键词 AES算法 ZigBee网络加密方法 加密机制 网络传输数据 安全模式
下载PDF
Energy-Efficient Transmission Scheme for Mobile Data Gathering in Wireless Sensor Networks 被引量:2
6
作者 刘丹谱 张铠麟 丁杰 《China Communications》 SCIE CSCD 2013年第3期114-123,共10页
Energy conservation in Wireless Sensor Networks (WSNs) has always been a crucial issue and has received increased attention in the recent years. A transmission scheme for energy-constrained WSNs is proposed in this pa... Energy conservation in Wireless Sensor Networks (WSNs) has always been a crucial issue and has received increased attention in the recent years. A transmission scheme for energy-constrained WSNs is proposed in this paper. The scheme, called MIHOP (MIMO and Multi-hop), combines cluster-based virtual MIMO and multi-hop technologies. The multihop mode is employed in transmitting data when the related sensors are located within a specific number of hops from the sink, and the virtual MIMO mode is used in transmitting data from the remaining sensor nodes. We compare the energy consumption of different transmission schemes and propose an algorithm for determining the optimal hop count in MIHOP. A controllable mobile sink that reduces the energy consumed in sensor transmission is also adopted for data collection. The theoretical analysis and the Monte Carlo simulation demonstrate that the proposed scheme significantly outperforms individual virtual MIMO, multi-hop technologies, and double-string networks in terms of energy conservation. The energy consumption levels under the MIHOP scheme are approximately 12.98%, 47.55% and 48.30% less than that under virtual MIMO schemes, multi-hop networks and doublestring networks, respectively. 展开更多
关键词 wireless sensor networks energyefficiency virtual MIMO multi-hop network mobile sink
下载PDF
Cooperative Jamming for Enhancing Security of Cognitive Radio Networks with Multiple Primary Users 被引量:3
7
作者 Xiaofeng Feng Xinbo Gao Ru Zong 《China Communications》 SCIE CSCD 2017年第7期93-107,共15页
In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single... In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single PU in their frameworks. In this paper, we will consider a more complicated scenario with multiple PUs and try to investigate the cooperative jamming between multiple PUs and a single SU. When there are multiple PUs in CRN, in order to obtain more spectrum for data transmission, SU will cooperate with multiple PUs at the same time. Considering that both PU and SU are rational and selfish individuals, the interaction between PUs and SU is formulated as a multi-leaders and single-follower Stackelberg game, wherein PU is the leader and SU is the follower. And the Stackelberg Equilibrium(SE) is considered as the final decisions accepted by all PUs and SU. Furthermore, we also prove that when a specific condition is satisfied, the existence of SE can be guaranteed. And a Gauss-Jacobi iterative algorithm is proposed to compute a SE. Finally, simulation results are given to verify the performance and demonstrate that both of the PUs' secrecy rate and the SU's transmission rate can be improved through cooperation. 展开更多
关键词 cognitive radio networks cooperative jamming physical layer security spectrum sharing stackelberg game
下载PDF
Hardware/software co-verification platform for EOS design 被引量:2
8
作者 Wang Peng(王鹏) Jin Depeng Zeng Lieguang 《High Technology Letters》 EI CAS 2005年第3期294-297,共4页
Ethernet over SDH/SONET (EOS) is a hotspot in today's data transmission technology for it combines the merits of both Ethernet and SDH/SONET. However, implementing an EOS system on a chip is complex and needs full... Ethernet over SDH/SONET (EOS) is a hotspot in today's data transmission technology for it combines the merits of both Ethernet and SDH/SONET. However, implementing an EOS system on a chip is complex and needs full verifications. This paper introduces our design of Hardware/Software co-verification platform for EOS design. The hardware platform contains a microprocessor board and an FPGA (Field Programmable Gate Array)-based verification board, and the corresponding software includes test benches running in FPGAs, controlling programs for the microprocessor and a console program with GUI (Graphical User Interface) interface for configuration, management and supervision. The design is cost-effective and has been successfully employed to verify several IP (Intellectual Property) blocks of our EOS chip. Moreover, it is flexible and can be applied as a general-purpose verification platform. 展开更多
关键词 Hardware/software co-verification EOS
下载PDF
A Survey on Information-Centric Networking: Rationales, Designs and Debates 被引量:8
9
作者 JIANG Xiaoke BI Jun +1 位作者 NAN Guoshun LI Zhaogeng 《China Communications》 SCIE CSCD 2015年第7期1-12,共12页
The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data.... The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data. The fundamental mismatch between data delivery and naming attachment points leads to a lot of challenges, e.g., mapping from data name to IP address, handling dynamics of underlying topology, scaling up the data distribution, and securing communication, etc. Informationcentric networking(ICN) is proposed to shift the focus of communication paradigm from where to what, by making the named data the first-class citizen in the network, The basic consensus of ICN is to name the data independent from its container(space dimension) and session(time dimension), which breaks the limitation of point-to-point IP semantic. It scales up data distribution by utilizing available resources, and facilitates communication to fit diverse connectivity and heterogeneous networks. However, there are only a few consensuses on the detailed design of ICN, and quite a few different ICN architectures are proposed. This paper reveals the rationales of ICN from the perspective of the Internet evolution, surveys different design choices, and discusses on two debatable topics in ICN, i.e.,self-certifying versus hierarchical names, and edge versus pervasive caching. We hope this survey helps clarify some mis-understandings on ICN and achieve more consensuses. 展开更多
关键词 information-centric networking content-centric networking future internet architecture named-data networking PUBLISH-SUBSCRIBE
下载PDF
Gradient based restoration of coal mine images obtained by underground wireless transmissions 被引量:2
10
作者 Lu Zhaolin Qian Jiansheng Li Leida 《Mining Science and Technology》 EI CAS 2011年第6期809-813,共5页
Curvature-driven diffusion (CDD) principles were used to develop a novel gradient based image restora- tion algorithm. The algorithm fills in blocks of missing data in a wireless image after transmission through the n... Curvature-driven diffusion (CDD) principles were used to develop a novel gradient based image restora- tion algorithm. The algorithm fills in blocks of missing data in a wireless image after transmission through the network. When images are transmitted over fading channels, especially in the severe circum- stances of a coal mine, blocks of the image may be destroyed by the effects of noise. Instead of using com- mon retransmission query protocols the lost data is reconstructed by using the adaptive curvature-driven diffusion (ACDD) image restoration algorithm in the gradient domain of the destroyed image. Missing blocks are restored by the method in two steps: In step one, the missing blocks are filled in the gradient domain by the ACDD algorithm; in step two, and the image is reconstructed from the reformed gradients by solving a Poisson equation. The proposed method eliminates the staircase effect and accelerates the convergence rate. This is demonstrated by experimental results. 展开更多
关键词 Image restoration Curvature-driven diffusion Gradient domain Wireless image transmission Poisson equation
下载PDF
Anomalous Cell Detection with Kernel Density-Based Local Outlier Factor 被引量:2
11
作者 Miao Dandan Qin Xiaowei Wang Weidong 《China Communications》 SCIE CSCD 2015年第9期64-75,共12页
Since data services are penetrating into our daily life rapidly, the mobile network becomes more complicated, and the amount of data transmission is more and more increasing. In this case, the traditional statistical ... Since data services are penetrating into our daily life rapidly, the mobile network becomes more complicated, and the amount of data transmission is more and more increasing. In this case, the traditional statistical methods for anomalous cell detection cannot adapt to the evolution of networks, and data mining becomes the mainstream. In this paper, we propose a novel kernel density-based local outlier factor(KLOF) to assign a degree of being an outlier to each object. Firstly, the notion of KLOF is introduced, which captures exactly the relative degree of isolation. Then, by analyzing its properties, including the tightness of upper and lower bounds, sensitivity of density perturbation, we find that KLOF is much greater than 1 for outliers. Lastly, KLOFis applied on a real-world dataset to detect anomalous cells with abnormal key performance indicators(KPIs) to verify its reliability. The experiment shows that KLOF can find outliers efficiently. It can be a guideline for the operators to perform faster and more efficient trouble shooting. 展开更多
关键词 data mining key performance indicators kernel density-based local outlier factor density perturbation anomalous cell detection
下载PDF
Automatic Configuration in NTP
12
作者 蒋宗礼 Xu Binbin 《High Technology Letters》 EI CAS 2003年第4期70-73,共4页
NTP is nowadays the most widely used distributed network time protocol, which aims at synchronizing the clocks of computers in a network and keeping the accuracy and validation of the time information which is transmi... NTP is nowadays the most widely used distributed network time protocol, which aims at synchronizing the clocks of computers in a network and keeping the accuracy and validation of the time information which is transmitted in the network. Without automatic configuration mechanism, the stability and flexibility of the synchronization network built upon NTP protocol are not satisfying. P2P’s resource discovery mechanism is used to look for time sources in a synchronization network, and according to the network environment and node’s quality, the synchronization network is constructed dynamically. 展开更多
关键词 synchronization network timekeeping automatic configuration NTP
下载PDF
Dynamic routing and wavelength assignment algorithm of optical satellite networks based on cross-layer design
13
作者 文国莉 Zhang Qi +6 位作者 Tian Qinghua Wang Houtian Tao Ying Chen Dong Liu Naijin Shen Yufei Zhou Na 《High Technology Letters》 EI CAS 2017年第3期252-259,共8页
In order to overcome the adverse effects of Doppler wavelength shift on data transmission in the optical satellite networks,a dynamic routing and wavelength assignment algorithm based on crosslayer design( CL-DRWA) is... In order to overcome the adverse effects of Doppler wavelength shift on data transmission in the optical satellite networks,a dynamic routing and wavelength assignment algorithm based on crosslayer design( CL-DRWA) is introduced which can improve robustness of the network. Above all,a cross-layer optimization model is designed,which considers transmission delay and wavelength-continuity constraint,as well as Doppler wavelength shift. Then CL-DRWA is applied to solve this model,resulting in finding an optimal light path satisfying the above constraints for every connection request. In CL-DRWA,Bellman-Ford method is used to find an optimal route and a distributed relative capacity loss method is implemented to get an optimal wavelength assignment result on the optimal route. Moreover,compared with the dynamic routing and wavelength assignment algorithm based on minimum delay strategy( MD-DRWA),CL-DRWA can make an improvement of 5. 3% on the communication success probability. Meanwhile,CL-DRWA can meet the requirement of transmission delay for real-time services. 展开更多
关键词 cross-layer design Doppler wavelength shift dynamic routing and wavelength assignment optical satellite network
下载PDF
Asymmetric Dual-Channel MAC Protocol for Multihop Mobile Ad Hoc Networks
14
作者 Liu Kai Wang Dongdong +1 位作者 Liu Feng Wang Xin 《China Communications》 SCIE CSCD 2012年第8期52-63,共12页
In order to resolve the hidden and exposed terminal problems and improve the probability of concurrent packet transmissions for multihop Mobile Ad Hoc Networks (MANETs), a novel slotted Asyrmaetric Dual-Channel Medi... In order to resolve the hidden and exposed terminal problems and improve the probability of concurrent packet transmissions for multihop Mobile Ad Hoc Networks (MANETs), a novel slotted Asyrmaetric Dual-Channel Medium Access Control (ADC-MAC) protocol is proposed. It exploits sirmltaneous reservation with less collisions and conision-flee data packet transmissions, and achieves optimal transmission balance on the Control Channel (CCH) and Data Channel (DCH) by adjusting the relationship between Reservation Slot (RS) on the CCH and the data packet Transmission Slot (TS) on the DCH. Transmission interferences can be avoided by only observing CCH for the transmission time of a data packet. The proposed RS and contention micro-slot backoff mechanisms also greatly improve channel access efficiency. Simulation results show that compared to IFEE 802. 11 DCF and -Mc protocols, the proposed protocol can achieve a throughput gain of 88% in singlehop networks and 151% in nltihop networks at the same total data rate. 展开更多
关键词 mobile ad hoc networks medium access control asyrrcnetric dual-channel RESERVATION collision avoidance nltichannel hidden and exposed terminal problerm
下载PDF
Research and Monitoring of Metro Tunnel Deformation based on the Technology of the Internet of Things
15
作者 Xiaowei Du Yongtao Gao 《International Journal of Technology Management》 2013年第1期11-13,共3页
After a long subway tunnel operators will produce cross-sectional deformation. Articles designed vehicle laser ranging device tbr continuous measurement of tunnel wall to test their defomaed state. The paper also desc... After a long subway tunnel operators will produce cross-sectional deformation. Articles designed vehicle laser ranging device tbr continuous measurement of tunnel wall to test their defomaed state. The paper also describes the tunnel cross-section deltbrmation measurement method, contour titting principles and error analysis and networking technology for wireless data transmission methods. The detection system is designed to achieve a tunnel section of the structural safety testing and deformation that may occur timely disaster warning, the safe operation of the subway tunnel to provide effective protection. 展开更多
关键词 Internet of Things technology sectional defom^ation laser rangefinder
下载PDF
Cooperative MIMO MAC Transmission Using Space Codes in Wireless Sensor Network
16
作者 Janakiraman Vidhya Gunasekaran Kalpana +1 位作者 Dananjayan Sathian Perumal Dananjayan 《Computer Technology and Application》 2011年第4期256-262,共7页
Wireless sensor network (WSN) requires robust and efficient communication protocols to minimise delay and save energy. The lifetime of WSN can be maximised by selecting proper medium access control (MAC) scheme de... Wireless sensor network (WSN) requires robust and efficient communication protocols to minimise delay and save energy. The lifetime of WSN can be maximised by selecting proper medium access control (MAC) scheme depending on the contention level of the network. The throughput of WSN however reduces due to channel fading effects even with the proper design of MAC protocol. Hence this paper proposes a new MAC scheme for enabling packet transmission using cooperative multi-input multi-output (MIMO) utilising space time codes(STC) such as space time block code (STBC), space time trellis code (STTC) to achieve higher energy savings and lower delay by allowing nodes to transmit and receive information jointly. The performance of the proposed MAC protocol is evaluated in terms of transmission error probability, energy consumption and delay. Simulation results show that the proposed cooperative MIMO MAC protocol provides reliable and efficient transmission by leveraging MIMO diversity gains. 展开更多
关键词 Cooperative multi-input multi-output (MIMO) space time block code (STBC) space time trellis code (STTC) medium access control energy efficiency wireless sensor network.
下载PDF
Cross-Layer and One-Hop Neighbour-Assisted Video Sharing Solution in Mobile Ad Hoc Networks
17
作者 贾世杰 许长桥 +2 位作者 Gabriel-Miro Muntean 关建峰 张宏科 《China Communications》 SCIE CSCD 2013年第6期111-126,共16页
Fast resources discovery and high Quality of Service(QoS) guarantee are the key determinants for efficient Mobile P2P(MP2P) video sharing.In this paper,we propose a CrossLayer and One-Hop Neighbour-Assisted Video Shar... Fast resources discovery and high Quality of Service(QoS) guarantee are the key determinants for efficient Mobile P2P(MP2P) video sharing.In this paper,we propose a CrossLayer and One-Hop Neighbour-Assisted Video Sharing(CNVS) solution in Mobile Ad Hoc Networks(MANETs).By making use of crosslayer approaches to bridge the overlay and the MAC layer and with the help of dissemination assisted by one-hop neighbours,CNVS intelligently builds the resource-centric self-organization node cluster group.In order to meet the QoS requirement,by making use of video resources access cost model,each peer can disconnect a less efficient connection with the original supplier and choose a peer that provides a low access cost as the new supplier.Simulation results also show how CNVS achieves lower average end-to-end delay,less average number of hops for video data delivery,lower routing overhead and packet loss rate,and higher network throughput than another state-of-the-art solution. 展开更多
关键词 CROSS-LAYER video sharing CLUSTERING assist
下载PDF
Research on Image Positioning Technology with High Precision
18
作者 Ronghong Chen 《International Journal of Technology Management》 2015年第1期117-119,共3页
In order to accurate measure micro displacement, the paper presents an accurate measuring system of distributed micro displacement. The system uses a linear CCD and FPGA and network communication technology to realize... In order to accurate measure micro displacement, the paper presents an accurate measuring system of distributed micro displacement. The system uses a linear CCD and FPGA and network communication technology to realize data acquisition and remote transmission. The test results show that the system can support 16 line array CCD test node to measure the micro deformation of the one- dimensional, the CCD data transmission rate is 3200 frames/s, node data transmission distance is greater than 200 m, and measurement accuracy is 500 micron. 展开更多
关键词 CCD FPGA network communication RS485 Micro displacement measurement
下载PDF
Analysis and Design of Open Remote Monitor and Control System Based on Virtual Reality
19
作者 Xiang Chen Huihuang Pi Linlin Zhou 《International Journal of Technology Management》 2013年第3期53-55,共3页
Introduced a Web-based real-time network monitoring and control system design methods, the 3-D VR was applied in a remote monitor system based on browser/server structure, and a VRML and Java based 3-D remote monitor ... Introduced a Web-based real-time network monitoring and control system design methods, the 3-D VR was applied in a remote monitor system based on browser/server structure, and a VRML and Java based 3-D remote monitor system was realized. Meanwhile, give possible solutions of the real-time data transmission and the stability of the system. 展开更多
关键词 WEB Virtual reality Remote monitor VRML JavaJRMI
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部