期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
一种基于多连接的P2P通信树算法研究 被引量:3
1
作者 李皎 刘天时 《西北大学学报(自然科学版)》 CAS CSCD 北大核心 2010年第6期970-974,共5页
目的解决节点多连接情况下P2P通信树通信效率问题。方法提出了一种多连接通信树算法,该算法引入节点通信连接数的概念,采用贪婪思想,根据节点通信连接数大小,优先依次选取通信能力强的节点作为通信源,以缩短整个通信过程的并发通信时间... 目的解决节点多连接情况下P2P通信树通信效率问题。方法提出了一种多连接通信树算法,该算法引入节点通信连接数的概念,采用贪婪思想,根据节点通信连接数大小,优先依次选取通信能力强的节点作为通信源,以缩短整个通信过程的并发通信时间。结果模拟结果表明,多连接通信树在通信时间、节点使用率、并发度方面均优于单连接通信树。结论多连接通信树算法可使节点最大限度发挥自己的通信能力,使整个通信过程并发通信,从而提高了通信树的通信效率和并发度。该算法适合于多播通信和网络数据群发。 展开更多
关键词 P2P通信树 多连接 并发度
下载PDF
P2P网络通信树群发算法研究
2
作者 王欣 《延安大学学报(自然科学版)》 2014年第2期25-27,30,共4页
深入分析P2P通信规则,以并发通信时间最短为目标,提出了一种新型的群发通信树构建算法——"困难节点"优先通信树算法。对比支路优先试加节点通信树算法,更加合理的布局各个节点在通信树中的位置,模拟结果表明,"困难节点&... 深入分析P2P通信规则,以并发通信时间最短为目标,提出了一种新型的群发通信树构建算法——"困难节点"优先通信树算法。对比支路优先试加节点通信树算法,更加合理的布局各个节点在通信树中的位置,模拟结果表明,"困难节点"优先通信树算法的通信效率优于支路优先试加节点通信树算法。 展开更多
关键词 P2P通信树 并发通信 困难节点
下载PDF
基于进化规划求解最优通信生成树 被引量:1
3
作者 曲润涛 席裕庚 韩兵 《通信学报》 EI CSCD 北大核心 2000年第1期55-59,共5页
本文分析了使用遗传算法求解最优通信生成树的缺陷,提出了基于进化规划求解最优通信生成树的新方法,并将这一方法扩展到有约束最优通信生成树问题。仿真结果验证了算法的有效性。
关键词 进化规划 遗传算法 最优通信生成
下载PDF
浅析发展短波通信技术的现实意义 被引量:4
4
作者 贾鑫铎 《中国新通信》 2012年第9期63-64,共2页
短波通信技术自身的一系列优点使得其在在无线通信技术领域有着其它通信技术无可替代的地位,必将重新引起人们的广泛关注。本文着重从短波通信以其独具的特点至今仍受国内外通信专家的青睐。
关键词 发射电波短波单边带电台通信长青有源中继体
下载PDF
考虑节点服务优先级的P2P网络群发算法研究
5
作者 李皎 梁工谦 +1 位作者 刘天时 李湘眷 《计算机应用研究》 CSCD 北大核心 2017年第4期1176-1179,共4页
为了提升P2P网络群发中节点服务请求的公平性和解决节点多连接情况下P2P网络群发通信效率问题,提出一种综合优化通信树算法(IOT)。该算法在多连接并发通信模型的基础上,引入节点服务请求队列的概念,将节点通信连接数和节点服务优先级综... 为了提升P2P网络群发中节点服务请求的公平性和解决节点多连接情况下P2P网络群发通信效率问题,提出一种综合优化通信树算法(IOT)。该算法在多连接并发通信模型的基础上,引入节点服务请求队列的概念,将节点通信连接数和节点服务优先级综合考虑,通过对服务请求队列局部调整,可将节点通信连接数大的节点优先加入通信树上层,使其在下次通信中作为通信源,进而提高通信并发度和通信效率。模拟实验表明,与连接数优先通信树算法(LFT)、队列优先通信树算法(QFT)相比,综合优化通信树算法在并发通信时间、平均端到端时延、队列乱序率、节点使用率、并发度方面均能取得较好的通信效果。该算法给出的群发方案既能兼顾绝大多数的节点服务请求优先级公平性,又能有效缩短P2P网络群发通信时间。 展开更多
关键词 网络群发 节点服务优先级 节点通信连接数 通信树
下载PDF
A new group key management scheme based on keys tree, XOR operation and one-way function 被引量:1
6
作者 张勇 张翼 汪为农 《Journal of Southeast University(English Edition)》 EI CAS 2006年第1期54-58,共5页
By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is p... By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree: SKDC, LKH, and OFF. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best. The security problem of the new scheme is analyzed. This new scheme provides backward and forward security, i.e.. newly admitted group members cannot read previous multicast messages and evicted members cannot read future multicast messages, even with collusion by many arbitrarily evicted members. 展开更多
关键词 secure group communication group key management keys tree one-way function
下载PDF
Channel Selection Information Hiding Scheme for Tracking User Attack in Cognitive Radio Networks 被引量:1
7
作者 LI Hongning PEI Qingqi MA Lichuan 《China Communications》 SCIE CSCD 2014年第3期125-136,共12页
For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels tha... For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks. 展开更多
关键词 HANDOFF tracking user attack attack tree
下载PDF
Research on Anti-collision Algorithm of Short Distance Data communication based on Binary-Tree Disassembly
8
作者 Zhongyue Hu 《International Journal of Technology Management》 2014年第8期30-32,共3页
This paper puts forward adaptive anti collision algorithm based on two fork tree decomposition. New search algorithm built on the basis of binary-tree algorithm, using the uniqueness of the label EPC, to estimate the ... This paper puts forward adaptive anti collision algorithm based on two fork tree decomposition. New search algorithm built on the basis of binary-tree algorithm, using the uniqueness of the label EPC, to estimate the distribution of label by slot allocation, the huge and complicated two fork tree is decomposed into several simple binary-tree by search the collision slots for binary-tree, so, it can simplifies the search process. The algorithm fully considers4 important performance parameters of the reader paging times, transmission delay, energy consumption and throughput label, the simulation results show that, the improved anti-collision algorithm is obviously improved performance than other two fork tree algorithm, it is more suitable for RFID anti-collision protocols. 展开更多
关键词 RFID ANTI-COLLISION Binary-tree disassembly
下载PDF
HUFFMAN-BASED GROUP KEY ESTABLISHMENT SCHEME WITH LOCATION-AWARE
9
作者 Gu Xiaozhuo Yang Jianzu Lan Julong 《Journal of Electronics(China)》 2009年第2期237-243,共7页
Time efficiency of key establishment and update is one of the major problems contributory key managements strive to address.To achieve better time efficiency in key establishment,we propose a Location-based Huffman(L-... Time efficiency of key establishment and update is one of the major problems contributory key managements strive to address.To achieve better time efficiency in key establishment,we propose a Location-based Huffman(L-Huffman) scheme.First,users are separated into several small groups to minimize communication cost when they are distributed over large networks.Second,both user's computation difference and message transmission delay are taken into consideration when Huffman coding is employed to forming the optimal key tree.Third,the combined weights in Huffman tree are located in a higher place of the key tree to reduce the variance of the average key generation time and minimize the longest key generation time.Simulations demonstrate that L-Huffman has much better performance in wide area networks and is a little better in local area network than Huffman scheme. 展开更多
关键词 Secure group communication Contributory group key management Group key estab-lishment
下载PDF
SECURE GROUP COMMUNICATIONS FOR LARGE DYNAMIC MULTICAST GROUP
10
作者 Liu Jing Zhou Mingtian (College of Computer Science and Engineering, UEST of China, Chengdu 610054) 《Journal of Electronics(China)》 2003年第4期265-273,共9页
As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dy... As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme. 展开更多
关键词 Multicast security Group communication Group key management Access control Secret key tree
下载PDF
Bayesian texture segmentation based on wavelet domain hidden markov tree and the SMAP rule
11
作者 孙俊喜 张素 +1 位作者 赵永明 陈亚珠 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第1期86-90,共5页
According to the sequential maximum a posteriori probability (SMAP) rule, this paper proposes a novel multi-scale Bayesian texture segmentation algorithm based on the wavelet domain Hidden Markov Tree (HMT) model. In ... According to the sequential maximum a posteriori probability (SMAP) rule, this paper proposes a novel multi-scale Bayesian texture segmentation algorithm based on the wavelet domain Hidden Markov Tree (HMT) model. In the proposed scheme, interscale label transition probability is directly defined and resoled by an EM algorithm. In order to smooth out the variations in the homogeneous regions, intrascale context information is considered. A Gaussian mixture model (GMM) in the redundant wavelet domain is also exploited to formulate the pixel-level statistical features of texture pattern so as to avoid the influence of the variance of pixel brightness. The performance of the proposed method is compared with the state-of-the-art HMTSeg method and evaluated by the experiment results. 展开更多
关键词 wavelet transform hidden markov tree EM algorithm
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部