期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
一种基于启发式搜索的跨域认证路径构建算法 被引量:2
1
作者 崔阿军 张华峰 +2 位作者 范迪龙 张小东 苗丰满 《计算机工程》 CAS CSCD 2012年第13期283-285,共3页
针对跨域认证中存在域间与域内路径反复交替查找的特点,提出一种基于启发式搜索的AD*跨域认证路径构建算法。结合A*和D*2种搜索方法,即在静态的域内查找认证路径时使用A*算法,在动态的域间使用D*算法。实验结果表明,该算法能在一定程度... 针对跨域认证中存在域间与域内路径反复交替查找的特点,提出一种基于启发式搜索的AD*跨域认证路径构建算法。结合A*和D*2种搜索方法,即在静态的域内查找认证路径时使用A*算法,在动态的域间使用D*算法。实验结果表明,该算法能在一定程度上避免路径查找的不确定性,有效提高跨域认证路径构造的速度。 展开更多
关键词 跨域认证 认证路径 启发式搜索 ad*算法 A*算法 D*算法
下载PDF
Detection of Selfish Behavior in Wireless Ad Hoc Networks Based on CUSUM Algorithm
2
作者 刘春凤 舒炎泰 +1 位作者 YANG Oliver 李明远 《Transactions of Tianjin University》 EI CAS 2010年第2期104-108,共5页
The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, ... The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, a wireless node can distinguish if there is a selfish behavior in the wireless network. The detection efficiency is validated using a Qualnet simulator. An IEEE 802.11 wireless ad hoc network with 20 senders and 20 receivers spreading out randomly in a given area is evaluated. The well-behaved senders use minimum contention window size of 32 and maximum con- tention window size of I 024, and the selfish nodes are assumed not to use the binary exponential strategy for which the contention window sizes are both fixed as 16. The transmission radius of all nodes is 250 m. Two scenarios are investigated: a single-hop network with nodes spreading out in 100 m^100 m, and all the nodes are in the range of each other; and a multi-hop network with nodes spreading out in 1 000 m~ 1 000 m. The node can monitor the backoff time from all the other nodes and run the detection algorithms over those samples. It is noted that the threshold can significantly affect the detection time and the detection accuracy. For a given threshold of 0.3 s, the false alarm rates and the missed alarm rates are less than 5%. The detection delay is less than 1.0 s. The simulation results show that the algorithm has short detection time and high detection accuracy. 展开更多
关键词 ad hoc networks selfish behavior DETECTION CUSUM
下载PDF
Clustering in mobile ad hoc network based on neural network 被引量:2
3
作者 陈爱斌 蔡自兴 胡德文 《Journal of Central South University of Technology》 EI 2006年第6期699-702,共4页
An on-demand distributed clustering algorithm based on neural network was proposed. The system parameters and the combined weight for each node were computed, and cluster-heads were chosen using the weighted clusterin... An on-demand distributed clustering algorithm based on neural network was proposed. The system parameters and the combined weight for each node were computed, and cluster-heads were chosen using the weighted clustering algorithm, then a training set was created and a neural network was trained. In this algorithm, several system parameters were taken into account, such as the ideal node-degree, the transmission power, the mobility and the battery power of the nodes. The algorithm can be used directly to test whether a node is a cluster-head or not. Moreover, the clusters recreation can be speeded up. 展开更多
关键词 ad hoc network CLUSTERING neural network
下载PDF
Quantitative and qualitative correlation analysis of optimal route discovery for vehicular ad-hoc networks
4
作者 MUKUND B.Wagh GOMATHI N. 《Journal of Central South University》 SCIE EI CAS CSCD 2018年第7期1732-1745,共14页
Vehicular ad-hoc networks (VANETs) are a significant field in the intelligent transportation system (ITS) for improving road security. The interaction among the vehicles is enclosed under VANETs. Many experiments ... Vehicular ad-hoc networks (VANETs) are a significant field in the intelligent transportation system (ITS) for improving road security. The interaction among the vehicles is enclosed under VANETs. Many experiments have been performed in the region of VANET improvement. A familiar challenge that occurs is obtaining various constrained quality of service (QoS) metrics. For resolving this issue, this study obtains a cost design for the vehicle routing issue by focusing on the QoS metrics such as collision, travel cost, awareness, and congestion. The awareness of QoS is fuzzified into a price design that comprises the entire cost of routing. As the genetic algorithm (GA) endures from the most significant challenges such as complexity, unassisted issues in mutation, detecting slow convergence, global maxima, multifaceted features under genetic coding, and better fitting, the currently established lion algorithm (LA) is employed. The computation is analyzed by deploying three well-known studies such as cost analysis, convergence analysis, and complexity investigations. A numerical analysis with quantitative outcome has also been studied based on the obtained correlation analysis among various cost functions. It is found that LA performs better than GA with a reduction in complexity and routing cost. 展开更多
关键词 vehicular ad-hoc network lion algorithm fuzzy quality of service ROUTING
下载PDF
Load balancing strategy of heterogeneous wireless networks based on multi-hop routing algorithm of ad hoc network 被引量:1
5
作者 裴雪兵 朱光喜 《High Technology Letters》 EI CAS 2009年第1期44-50,共7页
Because of different system capacities of base station (BS) or access point (AP) and ununiformity of traffic distribution in different cells, quantities of new call users may be blocked in overloaded cell in commu... Because of different system capacities of base station (BS) or access point (AP) and ununiformity of traffic distribution in different cells, quantities of new call users may be blocked in overloaded cell in communication hot spots. Whereas in some neighboring under-loaded cells, bandwidth may be superfluous because there are only few users to request services. In order to raise resource utilization of the whole heterogeneous networks, several novel load balancing strategies are proposed, which combine the call ad- mission control policy and multi-hop routing protocol of ad-hoc network for load balancing. These loadbalancing strategies firstly make a decision whether to admit a new call or not by considering some parameters like load index and route cost, etc., and then transfer the denied users into neighboring under-loaded cell with surplus channel according to optimum multi-hop routing algorithm. Simulation results show that the proposed load balancing strategies can distribute traffics to the whole heterogeneous wireless netorks, improve the load balance index efficiently, and avoid the call block phenomenon almost absolutely. 展开更多
关键词 load balancing multi-hop routing algorithm call admission control heterogeneous wireless networks
下载PDF
Design and analysis of a network coding algorithm for ad hoc networks
6
作者 王远 徐华 贾培发 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第4期1358-1365,共8页
Network coding is proved to have advantages in both wireline and wireless networks. Especially, appropriate network coding schemes are programmed for underlined networks. Considering the feature of strong node mobilit... Network coding is proved to have advantages in both wireline and wireless networks. Especially, appropriate network coding schemes are programmed for underlined networks. Considering the feature of strong node mobility in aviation communication networks, a hop-by-hop network coding algorithm based on ad hoc networks was proposed. Compared with COPE-like network coding algorithms, the proposed algorithm does not require overhearing from other nodes, which meets confidentiality requirements of aviation communication networks. Meanwhile, it does save resource consumption and promise less processing delay. To analyze the performance of the network coding algorithm in scalable networks with different traffic models, a typical network was built in a network simulator, through which receiving accuracy rate and receiving delay were both examined.The simulation results indicate that, by virtue of network coding, the proposed algorithm works well and improves performance significantly. More specifically, it has better performance in enhancing receiving accuracy rate and reducing receiving delay, as compared with any of the traditional networks without coding. It was applied to both symmetric and asymmetric traffic flows and, in particular, it achieves much better performance when the network scale becomes larger. Therefore, this algorithm has great potentials in large-scale multi-hop aviation communication networks. 展开更多
关键词 ad hoc network network coding algorithm aviation communication network
下载PDF
A contention-based efficient-information perception algorithm (CEiPA) for vehicular ad hoc networks
7
作者 陈立家 《High Technology Letters》 EI CAS 2009年第1期51-58,共8页
The problem of information dissemination is researched for vehicular ad-hoc networks (VANET) in this paper, and a contention-based effficient-information perception algorithm (CEiPA) is proposed. The idea of CEiPA... The problem of information dissemination is researched for vehicular ad-hoc networks (VANET) in this paper, and a contention-based effficient-information perception algorithm (CEiPA) is proposed. The idea of CEiPA is that beacons are delivered over VANET with limited lifetime and efficient information. CEiPA consists of two phases. The first one is initialization phase, during which the count timers Tcyce and Tlocal are set to start beacon delivery while Tcycle is also used to monitor and restart beaconing. The second one is beacon delivery phase. An elaborate distance function is employed to set contention delay for beacons of each vehicle. In this way beacons will be sent in order, which decreases the collision of beacons. Simulation results show that CEiPA enables each beacon to carry more efficient information and spread them over more vehicles with lower network overhead than the periodic beacon scheme. CEiPA is also flexible and scalable because the efficient information threshold it employs is a balance among the freshness of information, network overhead and perception area of a vehicle. 展开更多
关键词 BEACON CONTENTION efficient information PERCEPTION vehicular ad hoc networks
下载PDF
A Layered Zone Routing Algorithm in Ad Hoc Network Based on Matrix of Adjacency Connection
8
作者 徐光伟 李峰 +1 位作者 石秀金 霍佳震 《Journal of Donghua University(English Edition)》 EI CAS 2007年第1期43-45,共3页
The hybrid routing protocol has received more attention recently than the proactive and the reactive, especially for large-scale and highly dynamic connection,in mobile ad hoc network. A crucial reason is that zone-la... The hybrid routing protocol has received more attention recently than the proactive and the reactive, especially for large-scale and highly dynamic connection,in mobile ad hoc network. A crucial reason is that zone-layered is being utilized in the complex systems.A hybrid routing algorithm which is layered zone based on adjacency connection(LZBAC) is put forward under the background of a few members in network with steady position and link. The algorithm modifies storage structure of nodes and improves routing mechanism. The theoretical analysis and simulation testing testify that the algorithm costs shorter time of route finding and less delay than others. 展开更多
关键词 ad Hoc Network adjacency connection masternode routing protocol.
下载PDF
Dependent task assignment algorithm based on particle swarm optimization and simulated annealing in ad-hoc mobile cloud 被引量:3
9
作者 Huang Bonan Xia Weiwei +4 位作者 Zhang Yueyue Zhang Jing Zou Qian Yan Feng Shen Lianfeng 《Journal of Southeast University(English Edition)》 EI CAS 2018年第4期430-438,共9页
In order to solve the problem of efficiently assigning tasks in an ad-hoc mobile cloud( AMC),a task assignment algorithm based on the heuristic algorithm is proposed. The proposed task assignment algorithm based on pa... In order to solve the problem of efficiently assigning tasks in an ad-hoc mobile cloud( AMC),a task assignment algorithm based on the heuristic algorithm is proposed. The proposed task assignment algorithm based on particle swarm optimization and simulated annealing( PSO-SA) transforms the dependencies between tasks into a directed acyclic graph( DAG) model. The number in each node represents the computation workload of each task and the number on each edge represents the workload produced by the transmission. In order to simulate the environment of task assignment in AMC,mathematical models are developed to describe the dependencies between tasks and the costs of each task are defined. PSO-SA is used to make the decision for task assignment and for minimizing the cost of all devices,which includes the energy consumption and time delay of all devices.PSO-SA also takes the advantage of both particle swarm optimization and simulated annealing by selecting an optimal solution with a certain probability to avoid falling into local optimal solution and to guarantee the convergence speed. The simulation results show that compared with other existing algorithms,the PSO-SA has a smaller cost and the result of PSO-SA can be very close to the optimal solution. 展开更多
关键词 ad-hoc mobile cloud task assignment algorithm directed acyclic graph particle swarm optimization simulated annealing
下载PDF
Hybrid ants-like search algorithms for P2P media streaming distribution in ad hoc networks
10
作者 ZUO Dong-hong DU Xu YANG Zong-kai 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第8期1191-1198,共8页
Media streaming delivery in wireless ad hoc networks is challenging due to the stringent resource restrictions,po-tential high loss rate and the decentralized architecture. To support long and high-quality streams,one... Media streaming delivery in wireless ad hoc networks is challenging due to the stringent resource restrictions,po-tential high loss rate and the decentralized architecture. To support long and high-quality streams,one viable approach is that a media stream is partitioned into segments,and then the segments are replicated in a network and served in a peer-to-peer(P2P) fashion. However,the searching strategy for segments is one key problem with the approach. This paper proposes a hybrid ants-like search algorithm(HASA) for P2P media streaming distribution in ad hoc networks. It takes the advantages of random walks and ants-like algorithms for searching in unstructured P2P networks,such as low transmitting latency,less jitter times,and low unnecessary traffic. We quantify the performance of our scheme in terms of response time,jitter times,and network messages for media streaming distribution. Simulation results showed that it can effectively improve the search efficiency for P2P media streaming distribution in ad hoc networks. 展开更多
关键词 ad hoc networks Media streaming distribution Search algorithms Peer to peer (P2P)
下载PDF
Routing Protocol Based on Grover’s Searching Algorithm for Mobile Ad-hoc Networks 被引量:3
11
作者 孟利民 宋文波 《China Communications》 SCIE CSCD 2013年第3期145-156,共12页
In Mobile Ad-hoc Networks (MANETs), routing protocols directly affect various indices of network Quality of Service (QoS), so they play an important role in network performance. To address the drawbacks associated wit... In Mobile Ad-hoc Networks (MANETs), routing protocols directly affect various indices of network Quality of Service (QoS), so they play an important role in network performance. To address the drawbacks associated with traditional routing protocols in MANETs, such as poor anti-fading performance and slow convergence rate, for basic Dynamic Source Routing (DSR), we propose a new routing model based on Grover's searching algorithm. With this new routing model, each node maintains a node vector function, and all the nodes can obtain a node probability vector using Grover's algorithm, and then select an optimal routing according to node probability. Simulation results show that compared with DSR, this new routing protocol can effectively extend the network lifetime, as well as reduce the network delay and the number of routing hops. It can also significantly improve the anti-jamming capability of the network. 展开更多
关键词 Grover's channel fading additive bit error rate searching algorithm noise network delay
下载PDF
An effective connected dominating set based mobility management algorithm in MANETs
12
作者 Xin-yu WANG Xiao-hu YANG +3 位作者 Jian-ling SUN Wei LI Wei SHI Shan-ping LI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第10期1318-1325,共8页
This paper proposes a connected dominating set (CDS) based mobility management algorithm, CMMA, to solve the problems of node entering, exiting and movement in mobile ad hoc networks (MANETs), which ensures the connec... This paper proposes a connected dominating set (CDS) based mobility management algorithm, CMMA, to solve the problems of node entering, exiting and movement in mobile ad hoc networks (MANETs), which ensures the connectivity and efficiency of the CDS. Compared with Wu's algorithm, the proposed algorithm can make full use of present network conditions and involves fewer nodes. Also it has better performance with regard to the approximation factor, message complexity, and time complexity. 展开更多
关键词 Mobile ad hoc network (MANET) Connected dominating set (CDS) MOBILITY Dominator No-key dominator Approximation factor
下载PDF
DBLAR:A DISTANCE-BASED LOCATION-AIDED ROUTING FOR MANET 被引量:3
13
作者 Wang Kun Wu Meng 《Journal of Electronics(China)》 2009年第2期152-160,共9页
In location-aided routing of Mobile Ad hoc NETworks(MANET),nodes mobility and the inaccuracy of location information may result in constant flooding,which will reduce the network performance.In this paper,a Distance-B... In location-aided routing of Mobile Ad hoc NETworks(MANET),nodes mobility and the inaccuracy of location information may result in constant flooding,which will reduce the network performance.In this paper,a Distance-Based Location-Aided Routing(DBLAR) for MANET has been proposed.By tracing the location information of destination nodes and referring to distance change between nodes to adjust route discovery dynamically,the proposed routing algorithm can avoid flooding in the whole networks.Besides,Distance Update Threshold(DUT) is set up to reach the balance between real-time ability and update overhead of location information of nodes,meanwhile,the detection of relative distance vector can achieve the goal of adjusting forwarding condition.Simulation results reveal that DBLAR performs better than LAR1 in terms of packet successful delivery ratio,average end-to-end delay and routing-load,and the set of DUT and relative distance vector has a significant impact on this algorithm. 展开更多
关键词 Location-aided routing Relative distance vector Mobile ad hoc NETworks(MANET)
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部