期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
融合区块链数据结构的雾计算数据传输方法研究
1
作者 彭永倩 《数字通信世界》 2024年第6期30-32,36,共4页
针对现有的雾计算网络数据传输安全性差、加密解密烦琐等问题,该文提出一种融合区块链结构的雾计算通信网络传输方法。该方法首先构建动态更新词向量模型,将雾计算网络中的明文数据映射至对应的词向量空间;然后对区块链数据结构进行改进... 针对现有的雾计算网络数据传输安全性差、加密解密烦琐等问题,该文提出一种融合区块链结构的雾计算通信网络传输方法。该方法首先构建动态更新词向量模型,将雾计算网络中的明文数据映射至对应的词向量空间;然后对区块链数据结构进行改进,将对应的词向量数据转化为对应的区块数据;最后对雾计算网络的节点和网络架构进行设计。实验结果表明,该方法比现有方法在数据传输效率、安全性及完整性等方面均具有很大优势。 展开更多
关键词 物联网 雾计算 词向量 区块数据结构 雾计算网络架构
下载PDF
A Novel Immune System Model and Its Application to Network Intrusion Detection 被引量:2
2
作者 LingJun CaoYang +1 位作者 YinJian-hua HuangTian-xi 《Wuhan University Journal of Natural Sciences》 CAS 2003年第02A期393-398,共6页
Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network I... Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network IDS, which is helpful to design an effective IDS. Besides, this paper suggests a scheme to represent the self profile of network. And an automated self profile extraction algorithm is provided to extract self profile from packets. The experimental results prove validity of the scheme and algorithm, which is the foundation of the immune model. 展开更多
关键词 key words network Intrusion Detection System 5 Immune System self profile automated self profile extraction algorithm
下载PDF
Neural Network Based Scheduling for Variable-Length Packets in Gigabit Router with Crossbar Switch Fabric and Input Queuing
3
作者 Li Sheng\|hong, Xue Zhi, Li Jian\|hua, Zhu Hong\|wen Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200030, China 《Wuhan University Journal of Natural Sciences》 EI CAS 2002年第3期313-318,共6页
A high-speed and effective packet scheduling method is crucial to the performance of Gigabit routers. The paper studies the variable-length packet scheduling problem in Gigabit router with crossbar switch fabric and i... A high-speed and effective packet scheduling method is crucial to the performance of Gigabit routers. The paper studies the variable-length packet scheduling problem in Gigabit router with crossbar switch fabric and input queuing, and a scheduling method based on neural network is proposed. For the proposed method, a scheduling system structure fit for the variable-length packet case is presented first, then some rules for scheduling are given. At last, an optimal scheduling method using Hopfield neural network is proposed based on the rules. Furthermore, the paper discusses that the proposed method can be realized by hardware circuit. The simulation result shows the effectiveness of the proposed method. 展开更多
关键词 key words scheduling neural networks input queuing gigabit router
下载PDF
A Distributed Routing and Wavelength Assignment Algorithm for Online Multicast in All-Optical WDM Networks
4
作者 Huang Chuan-he, Chen Xin-meng, Jia Xiao-hua School of Computer, Wuhan University, Wuhan 430072, Hubei, China 《Wuhan University Journal of Natural Sciences》 EI CAS 2002年第1期27-36,共10页
Routing and wavelength assignment for online real-time multicast connection setup is a difficult task due to the dynamic change of availabilities of wavelengths on links and the consideration of wavelength conversion ... Routing and wavelength assignment for online real-time multicast connection setup is a difficult task due to the dynamic change of availabilities of wavelengths on links and the consideration of wavelength conversion delay in WDM networks. This paper presents a distributed routing and wavelength assignment scheme for the setup of real-time multicast connections. It integrates routing and wavelength assignment as a single process, which greatly reduces the connection setup time. The proposed routing method is based on the Prim’s MST (Minimum Spanning Tree) algorithm and the K-restricted breadth-first search method, which can produce a sub-minimal cost tree under a given delay bound. The wave-length assignment uses the least-conversion and load balancing strategies. Simulation results show that the proposed algorithm is suitable for online multicast connection establishment in WDM networks. 展开更多
关键词 key words WDM networks routing and wavelength assignment multicast routing delay bounded routing
下载PDF
基于SOA架构的网络教学平台集成研究与设计 被引量:6
5
作者 李梅 奚建清 《实验室研究与探索》 CAS 北大核心 2010年第11期173-177,共5页
介绍了一种基于SOA架构的面向服务的网络教学平台的设计框架、系统结构以及实现方法。特别介绍了一种在SOA中以Word文档存储数据的数据交换平台的实现思想及方法,对SOA架构在网络教学平台中的应用提供了良好的借鉴方法。
关键词 SOA架构 网络教学平台 Web SERVICE 数据交换平台 word模板
下载PDF
高速铁路宽带通信网络管理体系结构设计 被引量:1
6
作者 许菁 郑刚 +1 位作者 朱登科 马恒太 《计算机工程与设计》 CSCD 北大核心 2012年第10期3678-3681,共4页
为保证高速铁路宽带通信网络运行的稳定性和可靠性,在对基于TD-LTE(time division-long term evolution)的高速铁路宽带通信网络的结构进行分析的基础上,重点针对实现高速铁路宽带通信网络的可靠性、时效性以及对多类通信业务和通信设... 为保证高速铁路宽带通信网络运行的稳定性和可靠性,在对基于TD-LTE(time division-long term evolution)的高速铁路宽带通信网络的结构进行分析的基础上,重点针对实现高速铁路宽带通信网络的可靠性、时效性以及对多类通信业务和通信设备管理的兼容性等问题,设计了适用于高速铁路宽带通信网络的网络管理体系结构,分别从组织模型、信息模型、通信模型和功能模型4个方面对其进行了详细设计和分析。 展开更多
关键词 网络管理 高速铁路 宽带通信网络 管理体系结构 管理模型
下载PDF
计算机网络安全威胁分析及防护体系架构研究 被引量:6
7
作者 周跃 鄢斌 +1 位作者 谷会涛 赵进 《计算机安全》 2013年第12期18-21,共4页
通过分析计算机网络面临的主要威胁,指出了网络防护的重要性。在此基础上重点提出一种以信息安全保密策略为核心,综合采用网络加密技术和可信计算技术为技术支撑的、动态的、多方位的计算机网络安全防护体系架构。
关键词 计算机网络 安全威胁 网络加密技术 可信计算技术 防护体系架构
下载PDF
用于智能巡检的可见光通信系统设计 被引量:2
8
作者 孙德栋 徐东博 +2 位作者 龚桃荣 宋健 刘瑞 《供用电》 2016年第11期27-30,16,共5页
为了解决电网业务环境中许多无线电信号深度衰落及电磁敏感等场景的通信问题,提出了一种基于可见光通信与电力线通信深度融合的网络架构,该架构克服了传统架构网络改造工程规模大、成本高的缺点,成本低并且容易实现。并对基于该架构系... 为了解决电网业务环境中许多无线电信号深度衰落及电磁敏感等场景的通信问题,提出了一种基于可见光通信与电力线通信深度融合的网络架构,该架构克服了传统架构网络改造工程规模大、成本高的缺点,成本低并且容易实现。并对基于该架构系统业务流程、功能与主站平台设计进行了分析,进一步介绍了将可见光通信与电力线通信深度融合技术应用于典型的电网业务场景—变电站和电缆隧道智能巡检,可以为现场巡检人员与后台管理人员提供双向语音通信,并对现场巡检人员进行定位服务,以保障巡检人员的人身安全和电网生产安全。 展开更多
关键词 可见光通信 电力线通信 网络架构 智能巡检 定位服务
下载PDF
拼焊板母材性能参数与其板厚匹配关系研究 被引量:2
9
作者 孙东继 林建平 +2 位作者 邢丹英 刘瑞同 郭瑞泉 《系统仿真学报》 CAS CSCD 北大核心 2011年第6期1113-1118,共6页
基于拼焊板平面应力状态本构关系方程及其综合强度比研究,从理论上分析了综合强度比随母材性能参数与其板厚匹配关系的变化规律。在验证拼焊板胀形有限元仿真模型可靠的基础上,对拼焊板极限胀形高度随母材性能参数与其板厚匹配关系的变... 基于拼焊板平面应力状态本构关系方程及其综合强度比研究,从理论上分析了综合强度比随母材性能参数与其板厚匹配关系的变化规律。在验证拼焊板胀形有限元仿真模型可靠的基础上,对拼焊板极限胀形高度随母材性能参数与其板厚匹配关系的变化规律进行了仿真,并对不同匹配关系下拼焊板变形非均匀性情况进行了分析。研究结果发现:母材初始板厚与其性能参数的合理匹配能降低拼焊板综合强度比,减小其成形过程中的变形不均匀性,进而提高其冲压成形性能,为合理的拼焊板零件设计提供了一定的理论依据,为提高拼焊板制件的质量提供了有利的条件。 展开更多
关键词 拼焊板 综合强度比 胀形 匹配关系
下载PDF
Survey on key security technologies for space information networks 被引量:1
10
作者 LIU Jianwei LIU Weiran +2 位作者 WU Qianhong LI Dawei CHEN Shigang 《Journal of Communications and Information Networks》 2016年第1期72-85,共14页
SIN(Space Information Network)is expected to play an increasing role in providing real-time,flexible,and integrated communication and data transmission services in an efficient manner.Nowadays,SIN has been widely deve... SIN(Space Information Network)is expected to play an increasing role in providing real-time,flexible,and integrated communication and data transmission services in an efficient manner.Nowadays,SIN has been widely developed for position navigation,environment monitor,traffic management,counter-terrorism,etc.However,security is a major concern in SIN,since the satellites,spacecrafts,and aircrafts are susceptible to a variety of traditional/specific network-based attacks,including eavesdropping,session hijacking,and illegal accessing.The network architecture and security issues of SIN were reviewed.Various security requirements were discussed that should be considered when designing SIN.And existing solutions proposed to meet these requirements were surveyed.The key challenges and key technologies that still require extensive research and development for securing SIN were indentifed. 展开更多
关键词 space information network network architecture data encryption key management access authentication
原文传递
Algorithm of the Real-Time Extraction Image for Vehicle
11
作者 LIU Quan HUANG Guo sheng 《Wuhan University Journal of Natural Sciences》 EI CAS 2000年第2期178-180,共3页
An algorithm applied to a real-time extraction image of vehicle is introduced. The algorithm include an image processing with a binarzation method, image grab for a vehicle with high speed, character isolator one by o... An algorithm applied to a real-time extraction image of vehicle is introduced. The algorithm include an image processing with a binarzation method, image grab for a vehicle with high speed, character isolator one by one, and neural network algorithm. The techniques include vehicles sensing, image garb control, vehicle license location, lighting and optic character recognition. The system is much more robust and faster than the traditional thresholding method. 展开更多
关键词 key words image processing target extraction BINARIZATION neural network
下载PDF
Investigation of CAM-Brain by Using EQUnn Model
12
作者 Wang Baozhong, Kang Lishan, He Wei(State Key Lab of Software Engineering,Wuhan University, Wuhan 430072,China) 《Wuhan University Journal of Natural Sciences》 EI CAS 1998年第2期139-142,共4页
The model of EQUnn (equivalent neural network of the CAM-Brain model) is proposed. With the help of EQUnn model, it is proved that the CAM-Brain can solve the XOR problem.
关键词 key words CAM BRAIN artificial brains evolvable hardware cellular automata neural network genetic algorithm
下载PDF
RED-DTB: A Dual Token Bucket Based Queue Management Algorithm
13
作者 YinJian-hua CaoYang +1 位作者 LingJun HuangTian-xi 《Wuhan University Journal of Natural Sciences》 EI CAS 2003年第02A期388-392,共5页
Improving the Quality of Service (QoS) of Internet traffic is widely recognized as a critical issue for the next-generation networks. In this paper, we present a new algorithm for the active queue management, namely R... Improving the Quality of Service (QoS) of Internet traffic is widely recognized as a critical issue for the next-generation networks. In this paper, we present a new algorithm for the active queue management, namely RED-DTB. This buffer control technique is used to enforce approximate fairness among a large number of concurrent Internet flows. Like RED (Random Early Detection) algorithm, the RED-DTB mechanism can be deployed to actively respond to the gateway congestion, keep the gateway in a healthy state, and protect the fragile flows from being stolen bandwidth by greedy ones. The algorithm is based on the so-called Dual Token Bucket (DTB) pattern. That is, on the one hand, every flow is rate-limited by its own token bucket, to ensure that it can not consume more than its fair share of bandwidth; On the other hand, to make some compensations to less aggressive flows, such as connections with larger round trip time or smaller sending window, and to gain a relatively higher system utilization coefficient, all flows, depending on their individual behavior, may have a chance to fetch tokens from the public token bucket when they run out of their own share of tokens. The algorithm is analyzed and evaluated by simulations, and is proved to be effective in protecting the gateway buffer and controlling the fair allocation of bandwidth among flows. 展开更多
关键词 key words congestion control active queue management Dual Token Bucket fair bandwidth allocation network simulation
下载PDF
近年来台湾地区建筑科学研究进展——基于中国台湾《建筑学报》视角的统计分析
14
作者 叶文欣 王彬 牛倩 《艺术与设计(理论版)》 2024年第2期33-36,共4页
建筑学是一门涉及设计、工程、理论和技术等方面的复杂学科。随着时间推移,建筑学研究主题亦随之变化。文章以中国台湾《建筑学报》为数据样本,选取作者、关键词、学科交叉等数据进行统计分析,采用Ucinet软件生成领域研究成果图谱,将主... 建筑学是一门涉及设计、工程、理论和技术等方面的复杂学科。随着时间推移,建筑学研究主题亦随之变化。文章以中国台湾《建筑学报》为数据样本,选取作者、关键词、学科交叉等数据进行统计分析,采用Ucinet软件生成领域研究成果图谱,将主要学术力量、热点主题及研究演变可视化,从而探析学科领域发展趋势。研究发现台湾地区建筑学科在合作度方面呈逐步攀升趋势;在关键词方面呈与社会需求紧密结合态势;在学科交叉方面呈现相对融合状态。 展开更多
关键词 作者合作度 共词网络 研究热点 研究进展 中国台湾《建筑学报》
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部