期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
基于Contiki/COOJA平台的Deluge协议性能测试 被引量:1
1
作者 徐顶鑫 易卫东 《计算机研究与发展》 EI CSCD 北大核心 2011年第S2期290-294,共5页
无线再编程就是对布置在现场的传感器节点进行远程程序代码更新.它对于无线传感器网络的开发、部署以及维护至关重要.大对象(large object)数据分发协议是无线再编程技术的基础.Deluge协议是一个为支持无线再编程而设计的代码分发协议,... 无线再编程就是对布置在现场的传感器节点进行远程程序代码更新.它对于无线传感器网络的开发、部署以及维护至关重要.大对象(large object)数据分发协议是无线再编程技术的基础.Deluge协议是一个为支持无线再编程而设计的代码分发协议,它在TinyOS平台上已经取得了广泛的应用.将用COOJA仿真器在Contiki平台上对Deluge协议的性能进行深入的测试.测试指标包括编程时间,能耗,以及传输效率等.Contiki在操作系统层面内建了支持对节点能耗水平进行在线测试的新机制,采用该方法来测量Deluge的能耗.同时,详细测试并分析了在Deluge代码分发过程中所涉及到的各种通信行为,重点分析了其采用广播方式进行通信的优缺点.最后,根据实验结果,提出了对Deluge进行改进的方法. 展开更多
关键词 无线传感器网络 无线再编程 deluge Contiki COOJA 性能评估
下载PDF
THE WARNING OF THE '98 YANGTZE DELUGE & OUR FLOOD CONTROL STRATEGY
2
作者 Yu Xiaogan, Jiang Jiahu, Dou Hongshen Yang Guishan(Nanjing Institute of Geography & Limnology) 《Bulletin of the Chinese Academy of Sciences》 1999年第1期50-56,共7页
Based on a panoramic analysis of the serious Yangtze deluge in 1998 and its hydrological traits, the authors elucidate the formative factors of the deluge and review existing flood-control policies in retrospect. In a... Based on a panoramic analysis of the serious Yangtze deluge in 1998 and its hydrological traits, the authors elucidate the formative factors of the deluge and review existing flood-control policies in retrospect. In addition, some countermeas-ures are suggested for coping with similar calamities in the near future. 展开更多
关键词 OUR FLOOD CONTROL STRATEGY Pro LAKE THE WARNING OF THE YANGTZE deluge than
下载PDF
Improved Whale Optimization with Local-Search Method for Feature Selection 被引量:2
3
作者 Malek Alzaqebah Mutasem KAlsmadi +12 位作者 Sana Jawarneh Jehad Saad Alqurni Mohammed Tayfour Ibrahim Almarashdeh Rami Mustafa A.Mohammad Fahad A.Alghamdi Nahier Aldhafferi Abdullah Alqahtani Khalid A.Alissa Bashar A.Aldeeb Usama A.Badawi Maram Alwohaibi Hayat Alfagham 《Computers, Materials & Continua》 SCIE EI 2023年第4期1371-1389,共19页
Various feature selection algorithms are usually employed to improve classification models’overall performance.Optimization algorithms typically accompany such algorithms to select the optimal set of features.Among t... Various feature selection algorithms are usually employed to improve classification models’overall performance.Optimization algorithms typically accompany such algorithms to select the optimal set of features.Among the most currently attractive trends within optimization algorithms are hybrid metaheuristics.The present paper presents two Stages of Local Search models for feature selection based on WOA(Whale Optimization Algorithm)and Great Deluge(GD).GD Algorithm is integrated with the WOA algorithm to improve exploitation by identifying the most promising regions during the search.Another version is employed using the best solution found by the WOA algorithm and exploited by the GD algorithm.In addition,disruptive selection(DS)is employed to select the solutions from the population for local search.DS is chosen to maintain the diversity of the population via enhancing low and high-quality solutions.Fifteen(15)standard benchmark datasets provided by the University of California Irvine(UCI)repository were used in evaluating the proposed approaches’performance.Next,a comparison was made with four population-based algorithms as wrapper feature selection methods from the literature.The proposed techniques have proved their efficiency in enhancing classification accuracy compared to other wrapper methods.Hence,the WOA can search effectively in the feature space and choose the most relevant attributes for classification tasks. 展开更多
关键词 OPTIMIZATION whale optimization algorithm great deluge algorithm feature selection and classification
下载PDF
ADV-Hash:一种基于广告散列链的无线传感器网络重编程抗DoS攻击方法
4
作者 张羽 蒋泽军 +2 位作者 周兴社 方智毅 王丽芳 《西北工业大学学报》 EI CAS CSCD 北大核心 2009年第6期873-878,共6页
现有的安全网络重编程方案主要解决无线传感器网络中更新代码的有效验证问题。其目的在于防止恶意代码的传播和安装。但是,由于这些安全机制大多基于已有的网络重编程协议Deluge,而此协议自身的"流行病"特性使网络攻击者很容... 现有的安全网络重编程方案主要解决无线传感器网络中更新代码的有效验证问题。其目的在于防止恶意代码的传播和安装。但是,由于这些安全机制大多基于已有的网络重编程协议Deluge,而此协议自身的"流行病"特性使网络攻击者很容易通过对控制消息的破坏实施拒绝服务(Denial ofService,简称DoS)攻击,因此现有的安全网络重编程协议尽管提供更新代码的源认证和完整性认证,却无法保证网络重编程协议的可用性。文章针对上述缺陷,提出了一种基于广告散列链的抗DoS攻击方法ADV-Hash。该方法将更新代码的广告看作一个有限的消息序列,并利用安全散列链和一次数字签名混合机制实现传感器节点对控制消息的轻量认证。理论分析和TOSSIM仿真实验结果表明ADV-Hash方法在不影响Deluge协议原有特性的同时,能有效避免由虚假广告引发的DoS攻击,确保网络重编程协议的可用性。 展开更多
关键词 传感器网络 网络重编程 deluge DOS攻击 散列链
下载PDF
无线传感器网络重编程中DoS攻击初探 被引量:1
5
作者 方智毅 王丽芳 +1 位作者 张羽 蒋长清 《西北工业大学学报》 EI CAS CSCD 北大核心 2009年第5期725-730,共6页
无线重编程技术是解决无线传感器网络管理和维护的有效途径。文章介绍了无线重编程协议Deluge的原理和存在的缺陷;详细分析了各种针对无线重编程的DoS攻击并对攻击产生的危害进行了评价和建模;在TinyOS平台上用TOSSIM对各种DoS攻击进行... 无线重编程技术是解决无线传感器网络管理和维护的有效途径。文章介绍了无线重编程协议Deluge的原理和存在的缺陷;详细分析了各种针对无线重编程的DoS攻击并对攻击产生的危害进行了评价和建模;在TinyOS平台上用TOSSIM对各种DoS攻击进行了仿真实验,并对实验结果进行了客观评价。理论分析和实验数据一致表明,在资源受限的无线传感器网络中,DoS攻击给无线重编程带来了极大的威胁。文中给无线重编程安全性的进一步研究提供了理论基础和实验参考数据。 展开更多
关键词 无线传感器网络 无线重编程 deluge DOS攻击
下载PDF
群体机器人程序更新系统的设计
6
作者 陈晓松 《微型电脑应用》 2013年第2期19-21,共3页
传统方式下,在一个由几十上百个机器人节点组成的群体系统中,程序的更新意味着逐个烧录,工作量巨大。本文提出一种基于无线广播的IAP方法,对系统中局部或全部个体进行并行程序更新,并实现了相关的原型系统。主要内容包括:基于不可靠MAC... 传统方式下,在一个由几十上百个机器人节点组成的群体系统中,程序的更新意味着逐个烧录,工作量巨大。本文提出一种基于无线广播的IAP方法,对系统中局部或全部个体进行并行程序更新,并实现了相关的原型系统。主要内容包括:基于不可靠MAC层的可靠数据分发协议和减少传输量的增量式补丁生成算法。在系统实现方面,针对可靠性,通信协议参考Deluge协议的部分思想,保证节点接收到数据的完整性和正确性;针对可移植性,直接在二进制级别上进行代码比较和更新,不依赖操作系统和特殊硬件;针对高效性,对Deluge协议进行了若干改进,使用最小编辑距离算法生成补丁文件,实现了理论上最小量数据通信。 展开更多
关键词 群体机器人 程序更新 IAP数据分发协议deluge
下载PDF
Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks
7
作者 Yu ZHANG Xing She ZHOU +2 位作者 Yi Ming JI Yee Wei LAW Marimuthu PALANISWAMI 《International Journal of Communications, Network and System Sciences》 2009年第1期64-72,共9页
Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemina... Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemination protocols for WSNs aim for the efficient source authentication and integrity verification of code image, however, due to the resource constrains of WSNs and the epidemic behavior of the code dissemination system, existing secure code dissemination protocols are vulnerable to Denial of Service (DoS) attacks when sensor nodes can be compromised (insider DoS attacks). In this paper, we identify five different basic types of DoS attacks exploiting the epidemic propagation strategies used by Deluge. They are (1) Higher-version Advertisement attack, (2) False Request attack, (3) Larger-numbered Page attack, (4) Lower-version Adv attack, and (5) Same-version Adv attack. Simulation shows these susceptibilities caused by above insider DoS attacks. Some simple models are also proposed which promote understanding the problem of insider DoS attacks and attempt to quantify the severity of these attacks in the course of code dissemination in WSNs. 展开更多
关键词 Sensor Networks Code DISSEMINATION deluge Security DOS ATTACKS
下载PDF
A hybrid original approach for prediction of the aerodynamic coefficients of an ATR-42 scaled wing model 被引量:1
8
作者 Abdallah Ben Mosbah Ruxandra Mihaela Botez Thien My Dao 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2016年第1期41-52,共12页
A new approach for the prediction of lift, drag, and moment coefficients is presented. This approach is based on the support vector machines (SVMs) methodology and an optimization meta-heuristic algorithm called ext... A new approach for the prediction of lift, drag, and moment coefficients is presented. This approach is based on the support vector machines (SVMs) methodology and an optimization meta-heuristic algorithm called extended great deluge (EGD). The novelty of this approach is the hybridization between the SVM and the EGD algorithm. The EGD is used to optimize the SVM parameters. The training and validation of this new identification approach is realized using the aerodynamic coefficients of an ATR-42 wing model. The aerodynamic coefficients data are obtained with the XFoil software and experimental tests using the Price-Paidoussis wind tunnel. The predicted results with our approach are compared with those from the XFoil software and experimental results for different flight cases of angles of attack and Mach numbers. The main pur- pose of this methodology is to rapidly Predict aircraft aerodynamic coefficients. 展开更多
关键词 Aerodynamic coefficients Estimation Extended great deluge METAHEURISTIC Model identification Optimization Support vector machines Wind tunnel tests
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部