期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
C^3I节点计算机的文电处理技术初探
1
作者 甘永庆 《无线电通信技术》 北大核心 1990年第6期29-33,共5页
本文根据军事指挥自动化系统总体设计方案,提出了一种在总线型局域网中节点计算机的文电处理方法,包括文电的接收、存贮、转发、查询等.
关键词 C^3I系统 节点计算机 文电处理
下载PDF
沈阳铁路局全局计算机网络
2
作者 许庆昱 《辽宁大学学报(自然科学版)》 CAS 1988年第2期33-42,共10页
沈阳铁路局的计算机网络特点:网络拓扑采用星形结构:网络硬件节点计算机为PDP-11 23^-:网络通讯接口用四路异步串行接口板DLV11-J:网络操作系统软件RSX-11M:网络通讯软件DEC_(net),并讨论了该网络今后的发展。
关键词 沈阳铁路局 节点计算机 接口板 哈尔滨铁路局 星形结构 通讯软件 通讯接口 网络特点 异步串行 网络硬件
下载PDF
计算机病毒与软件立法
3
作者 肖成勇 王硕强 《群言》 1990年第10期41-42,共2页
近年来,计算机病毒的流行与危害越来越严重,成了世界瞩目的问题。在我国现阶段,人们关注的重点是计算机病毒的检测、消毒和免疫等技术性的安全措施。本文从另一个角度,即从计算机病毒的发生和传播与计算机软件立法的关系,对如何抑制计... 近年来,计算机病毒的流行与危害越来越严重,成了世界瞩目的问题。在我国现阶段,人们关注的重点是计算机病毒的检测、消毒和免疫等技术性的安全措施。本文从另一个角度,即从计算机病毒的发生和传播与计算机软件立法的关系,对如何抑制计算机病毒的流行作一初步探讨。 展开更多
关键词 病毒程序 逻辑炸弹 程序设计者 病毒制造者 网络系统 非法拷贝 节点计算机 程序系统 机器语言 蟠虫
原文传递
机动军用通讯网络管理
4
作者 D.A.RRigler 张鼎 《舰船电子工程》 1994年第Z3期25-29,共5页
引言: 该文论述的是包含有若干机动节点计算机辅助通讯网络管理的进展,其主要内容有:典型的管理系统的基本设备;历史上的发展过程。从BRUN管理信息系统和Ptarmigan系统计算机控制直到MRS网络管理处理系统;当今的管理设备的状态;当今民... 引言: 该文论述的是包含有若干机动节点计算机辅助通讯网络管理的进展,其主要内容有:典型的管理系统的基本设备;历史上的发展过程。从BRUN管理信息系统和Ptarmigan系统计算机控制直到MRS网络管理处理系统;当今的管理设备的状态;当今民用系统间的关系;近期、远期的未来课题,及第4代计算机语言的影响和人工智能问题。 展开更多
关键词 通讯网络 节点计算机 计算机语言 网络管理 计算机控制 管理设备 中心软件 数据管理 存储用户 频率分配
下载PDF
Positioning of grid points in wave front construction 被引量:6
5
作者 Han Fuxing Sun Jianguo +1 位作者 Sun Zhangqing Yang Hao 《Applied Geophysics》 SCIE CSCD 2009年第3期248-258,300,共12页
In view of the relative positioning problem between non-regular quadrilateral grids and regular rectangle grid nodes in the wave front construction method, concrete realization problems with four grid positioning meth... In view of the relative positioning problem between non-regular quadrilateral grids and regular rectangle grid nodes in the wave front construction method, concrete realization problems with four grid positioning methods (vector cross product judgment, angle sum, intersection-point, and signs comparison algorithms) in wave front construction which are commonly used in computer graphics are compared and analyzed in this paper. Based on the stability analysis of the location method, the calculation examples show that the vector cross product judgment method is faster and more accurate than other methods in the realization of the relative positioning between non-regular quadrilateral grids and regular rectangle grid nodes in wave front construction. It provides precise grid point attribute values for the next steps of migration and demigration. 展开更多
关键词 wave front construction grid localization grid nodes wave front quadrilateral
下载PDF
A Secure and Pragmatic Routing Protocol for Mobile Ad hoc Networks
6
作者 刘志远 《Journal of Donghua University(English Edition)》 EI CAS 2008年第1期11-15,共5页
An ad hoc network is a group of wireless mobile computers(or nodes),in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range.Beca... An ad hoc network is a group of wireless mobile computers(or nodes),in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range.Because of node mobility and power limitations,the network topology changes frequently.Routing protocol plays an important role in the ad hoc network.A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required.As an optimization for the current Dynamic Source Routing Protocol,a secure and pragmatic routes selection scheme based on Reputation Systems was proposed.We design the Secure and Pragmatic Routing protocol and implement simulation models using GloMoSim.Simulation results show that the Secure and Pragmatic Routing protocol provides better experimental results on packet delivery ratio,power consumption and system throughput than Dynamic Source Routing Protocol. 展开更多
关键词 ad hoc network routing protocol Dynamic Source Routing Protocol
下载PDF
Secure Data Aggregation Approach Based on Monitoring in Wireless Sensor Networks 被引量:1
7
作者 Dong Xiaomei Li Shanshan 《China Communications》 SCIE CSCD 2012年第6期14-27,共14页
In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid... In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption. 展开更多
关键词 data aggregation wireless sensor net-work MONITORING on-off attack RECOVERY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部