期刊文献+
共找到98篇文章
< 1 2 5 >
每页显示 20 50 100
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks
1
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 Vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
下载PDF
Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
2
作者 Weiwei Sun Xinci Gao +1 位作者 Lusong Ding Xiangyu Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1865-1876,共12页
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati... This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm. 展开更多
关键词 Actuator fault deception attacks distributed estimation sensor saturation stochastic communication protocol(SCP).
下载PDF
Coati Optimization-Based Energy Efficient Routing Protocol for Unmanned Aerial Vehicle Communication 被引量:1
3
作者 Hanan Abdullah Mengash Hamed Alqahtani +5 位作者 Mohammed Maray Mohamed K.Nour Radwa Marzouk Mohammed Abdullah Al-Hagery Heba Mohsen Mesfer Al Duhayyim 《Computers, Materials & Continua》 SCIE EI 2023年第6期4805-4820,共16页
With the flexible deployment and high mobility of Unmanned Aerial Vehicles(UAVs)in an open environment,they have generated con-siderable attention in military and civil applications intending to enable ubiquitous conn... With the flexible deployment and high mobility of Unmanned Aerial Vehicles(UAVs)in an open environment,they have generated con-siderable attention in military and civil applications intending to enable ubiquitous connectivity and foster agile communications.The difficulty stems from features other than mobile ad-hoc network(MANET),namely aerial mobility in three-dimensional space and often changing topology.In the UAV network,a single node serves as a forwarding,transmitting,and receiving node at the same time.Typically,the communication path is multi-hop,and routing significantly affects the network’s performance.A lot of effort should be invested in performance analysis for selecting the optimum routing system.With this motivation,this study modelled a new Coati Optimization Algorithm-based Energy-Efficient Routing Process for Unmanned Aerial Vehicle Communication(COAER-UAVC)technique.The presented COAER-UAVC technique establishes effective routes for communication between the UAVs.It is primarily based on the coati characteristics in nature:if attacking and hunting iguanas and escaping from predators.Besides,the presented COAER-UAVC technique concentrates on the design of fitness functions to minimize energy utilization and communication delay.A varied group of simulations was performed to depict the optimum performance of the COAER-UAVC system.The experimental results verified that the COAER-UAVC technique had assured improved performance over other approaches. 展开更多
关键词 Artificial intelligence unmanned aerial vehicle data communication routing protocol energy efficiency
下载PDF
UAV-Assisted FSO Communication System with Amplify-and-Forward Protocol under AOA Fluctuations:A Performance Analysis
4
作者 Maozhe Xu Guanjun Xu +3 位作者 Youran Dong Weizhi Wang Qinyu Zhang Zhaohui Song 《China Communications》 SCIE CSCD 2023年第11期111-130,共20页
Free space optical(FSO)communication has recently aroused great interest in academia due to its unique features,such as large transmission band,high data rates,and strong anti-electromagnetic interference.With the aim... Free space optical(FSO)communication has recently aroused great interest in academia due to its unique features,such as large transmission band,high data rates,and strong anti-electromagnetic interference.With the aim of evaluating the performance of an FSO communication system and extending the line-of-sight transmission distance,we propose an unmanned aerial vehicle(UAV)-assisted dual-hop FSO communication system equipped with amplifyand-forward protocol at the relay node.Specifically,we consider impairments of atmospheric absorption,pointing errors,atmospheric turbulence,and link interruptions due to angle-of-arrival fluctuations in the relay system.The Gamma-Gamma and Malaga distributions are used to model the influence of atmospheric turbulence on the source-to-UAV and UAVto-destination links,respectively.We derive closedform expressions of the probability density function(PDF)and cumulative distribution function(CDF)for the proposed communication system,in terms of the Meijer-G function.Based on the precise PDF and CDF,analytical expressions for the outage probability,average bit error rate,and ergodic capacity are proposed with the aid of the extended generalized bivariate Fox’s H function.Finally,we show that there is a match between the analytical results and numerical results,and we analyze the influence of the system and channel parameters on the performance. 展开更多
关键词 amplify-and-forward protocol angle-ofarrival fluctuations FSO communication Malaga distribution UAV relay
下载PDF
Eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel 被引量:10
5
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第2期277-281,共5页
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe... We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol. 展开更多
关键词 quantum communication ping-pong protocol EAVESDROPPING
下载PDF
Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems 被引量:4
6
作者 Ming Wan Jiangyuan Yao +1 位作者 Yuan Jing Xi Jin 《Computers, Materials & Continua》 SCIE EI 2018年第6期447-463,共17页
As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their seri... As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their serious privacy.Based on the SDN(Software Defined Network)technology,this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols,and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems.Furthermore,aiming at the unknown protocol specification and message format,this approach first restructures the industrial communication sessions and merges the payloads from industrial communication packets.After that,the feature selection and event sequence extraction can be carried out by using the N-gram model and K-means algorithm.Based on the obtained event sequences,this approach finally trains an event-based HMM(Hidden Markov Model)to identify aberrant industrial communication behaviors.Experimental results clearly show that the proposed approach has obvious advantages of classification accuracy and detection efficiency. 展开更多
关键词 Event sequence anomaly detection non-public industrial communication protocols SDN
下载PDF
Neural-Network-Based Control for Discrete-Time Nonlinear Systems with Input Saturation Under Stochastic Communication Protocol 被引量:7
7
作者 Xueli Wang Derui Ding +1 位作者 Hongli Dong Xian-Ming Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第4期766-778,共13页
In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between th... In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input saturation.To save the communication resources between the controller and the actuators,stochastic communication protocols(SCPs)are adopted to schedule the control signal,and therefore the closed-loop system is essentially a protocol-induced switching system.A neural network(NN)-based identifier with a robust term is exploited for approximating the unknown nonlinear system,and a set of switch-based updating rules with an additional tunable parameter of NN weights are developed with the help of the gradient descent.By virtue of a novel Lyapunov function,a sufficient condition is proposed to achieve the stability of both system identification errors and the update dynamics of NN weights.Then,a value iterative ADP algorithm in an offline way is proposed to solve the optimal control of protocol-induced switching systems with saturation constraints,and the convergence is profoundly discussed in light of mathematical induction.Furthermore,an actor-critic NN scheme is developed to approximate the control law and the proposed performance index function in the framework of ADP,and the stability of the closed-loop system is analyzed in view of the Lyapunov theory.Finally,the numerical simulation results are presented to demonstrate the effectiveness of the proposed control scheme. 展开更多
关键词 Adaptive dynamic programming(ADP) constrained inputs neural network(NN) stochastic communication protocols(SCPs) suboptimal control
下载PDF
Reliable transmission of consultative committee for space data systems file delivery protocol in deep space communication 被引量:7
8
作者 Hui Li Hao Luo Faxin Yu Zheming Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期349-354,共6页
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac... In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification. 展开更多
关键词 deep space communication consultative committee for space data systems (CCSDS) CCSDS file delivery protocol (CFDP) RELIABLE delay.
下载PDF
Performance for Device-to-Device Communication with Three-Time-Slot Two-Way Amplify-and-Forward Relay Protocol 被引量:2
9
作者 CAI Yan NI Yiyang ZHU Hongbo 《China Communications》 SCIE CSCD 2015年第11期24-34,共11页
Multi-hop device-to-device(D2D) communication can significantly improve the system performance. This paper studied the outage performance of D2 D communication assisted by another D2 D user using three-timeslot two-wa... Multi-hop device-to-device(D2D) communication can significantly improve the system performance. This paper studied the outage performance of D2 D communication assisted by another D2 D user using three-timeslot two-way amplify-and-forward relaying protocol over Rayleigh fading channels. Considering the co-channel interference from cellular user at the D2 D node,the approximate expression for the overall outage probability was derived. Furthermore,a power allocation optimum method to minimize the outage probability was developed,and the closed form expression for the optimal power allocation coefficient at the relay was derived. Simulation results demonstrate accuracy of the derived outage probability expressions. Simulation results also demonstrate that the outage performance can be improved using the proposed optimal power allocation method. 展开更多
关键词 D2D communicATION OUTAGE probability power ALLOCATION AMPLIFY-AND-FORWARD RELAYING protocol
下载PDF
A Computing Resource Adjustment Mechanism for Communication Protocol Processing in Centralized Radio Access Networks 被引量:3
10
作者 Guowei Zhai Lin Tian +2 位作者 Yiqing Zhou Qian Sun Jinglin Shi 《China Communications》 SCIE CSCD 2016年第12期79-89,共11页
The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular n... The centralized radio access cellular network infrastructure based on centralized Super Base Station(CSBS) is a promising solution to reduce the high construction cost and energy consumption of conventional cellular networks. With CSBS, the computing resource for communication protocol processing could be managed flexibly according the protocol load to improve the resource efficiency. Since the protocol load changes frequently and may exceed the capacity of processors, load balancing is needed. However, existing load balancing mechanisms used in data centers cannot satisfy the real-time requirement of the communication protocol processing. Therefore, a new computing resource adjustment scheme is proposed for communication protocol processing in the CSBS architecture. First of all, the main principles of protocol processing resource adjustment is concluded, followed by the analysis on the processing resource outage probability that the computing resource becomes inadequate for protocol processing as load changes. Following the adjustment principles, the proposed scheme is designed to reduce the processing resource outage probability based onthe optimized connected graph which is constructed by the approximate Kruskal algorithm. Simulation re-sults show that compared with the conventional load balancing mechanisms, the proposed scheme can reduce the occurrence number of inadequate processing resource and the additional resource consumption of adjustment greatly. 展开更多
关键词 computing resource adjustment communication protocol processing cloud RAN super BS processing resource outage probability optimized connected graph
下载PDF
A Secure Communication Protocol for Unmanned Aerial Vehicles 被引量:2
11
作者 Navid Ali Khan N.Z.Jhanjhi +2 位作者 Sarfraz Nawaz Brohi Abdulwahab Ali Almazroi Abdulaleem Ali Almazroi 《Computers, Materials & Continua》 SCIE EI 2022年第1期601-618,共18页
Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles.Multiple UAVs and autopilot systems support it,and it provides bi-directional communication between th... Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles.Multiple UAVs and autopilot systems support it,and it provides bi-directional communication between the UAV and Ground Control Station.The communications contain critical information about the UAV status and basic control commands sent from GCS to UAV and UAV to GCS.In order to increase the transfer speed and efficiency,the Mavlink does not encrypt the messages.As a result,the protocol is vulnerable to various security attacks such as Eavesdropping,GPS Spoofing,and DDoS.In this study,we tackle the problem and secure the Mavlink communication protocol.By leveraging the Mavlink packet’s vulnerabilities,this research work introduces an experiment in which,first,the Mavlink packets are compromised in terms of security requirements based on our threat model.The results show that the protocol is insecure and the attacks carried out are successful.To overcomeMavlink security,an additional security layer is added to encrypt and secure the protocol.An encryption technique is proposed that makes the communication between the UAV and GCS secure.The results show that the Mavlink packets are encrypted using our technique without affecting the performance and efficiency.The results are validated in terms of transfer speed,performance,and efficiency compared to the literature solutions such as MAVSec and benchmarked with the original Mavlink protocol.Our achieved results have significant improvement over the literature and Mavlink in terms of security. 展开更多
关键词 Unmanned aerial vehicles mavlink protocol drones security UAVs communication
下载PDF
A Recovery Algorithm for Self-Stabilizing Communication Protocols 被引量:1
12
作者 Li Layuan & Li Chunlin (Department of Computer Science & Technology, Wuhan nansportation University, 430063, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2000年第1期38-46,共9页
This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, pro... This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, proves its correctness and analyses its complexity. Finally, it also verifies the availability and efficiency of the algorithm by illustrating an example protocol with multi-processes. 展开更多
关键词 Computer networks communication protocols Recovery algorithm SELF-STABILIZATION Multimedia communication networks.
下载PDF
The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel 被引量:2
13
作者 李剑 孙风琪 +3 位作者 潘泽世 聂金瑞 陈彦桦 袁开国 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期1-5,共5页
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a... To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. 展开更多
关键词 The Security Analysis of Two-Step Quantum Direct communication protocol in Collective-Rotation Noise Channel EPR
下载PDF
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker 被引量:1
14
作者 Prabhu Kaliappan Hartmut Koenig 《Journal of Software Engineering and Applications》 2008年第1期13-19,共7页
The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, security, etc., are being developed day-to-day which of... The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, security, etc., are being developed day-to-day which often leads to rapid, premature developments. Many protocols have not scaled to satisfy important properties like deadlock and livelock freedom, since MDA focuses on the rapid development rather than on the quality of the developed models. In order to fix the above, we introduce a 2-Phase strategy based on the UML state machine and sequence diagram. The state machine is converted into PROMELA code as a protocol model and its properties are derived from the sequence diagram as Linear Temporal Logic (LTL) through automation. The PROMELA code is interpreted through the SPIN model checker, which helps to simulate the behavior of protocol. Later the automated LTL properties are supplemented to the SPIN for the verification of protocol properties. The results are compared with the developed UML model and SPIN simulated model. Our test results impress the designer to verify the expected results with the system design and to identify the errors which are unnoticed during the design phase. 展开更多
关键词 UML Modeling communication protocols protocol Verification SPIN Tool
下载PDF
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm 被引量:1
15
作者 Youhai Shao Yong Wang +1 位作者 Yun Yang Xiang Wang 《Journal of Computer and Communications》 2022年第1期42-56,共15页
Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic s... Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability. 展开更多
关键词 Secret Algorithm SM2 communication protocol Hybrid Encryption Security Protection
下载PDF
A Message Transmission Protocol of a Mobile Data Communication Network
16
作者 顾学迈 郭庆 刘忠 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1996年第4期16-20,共5页
AMessageTransmissionProtocolofaMobileDataCommunicationNetworkGUXuemai;GUOQing;LIUZhong(顾学迈)(郭庆)(刘忠)(Research... AMessageTransmissionProtocolofaMobileDataCommunicationNetworkGUXuemai;GUOQing;LIUZhong(顾学迈)(郭庆)(刘忠)(ResearchInstituteofCommun... 展开更多
关键词 ss: DATA communicATION MOBILE communicATION protocol
下载PDF
Robust Authentication and Session Key Agreement Protocol for Satellite Communications
17
作者 Somayeh Soltani Seyed Amin Hosseini Seno +1 位作者 Juli Rejito Rahmat Budiarto 《Computers, Materials & Continua》 SCIE EI 2022年第6期5891-5910,共20页
Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stab... Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stability of these networks have increased their popularity.Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks,securing satellite communications is vital.So far,several protocols have been proposed for authentication and key exchange of satellite communications,but none of them fullymeet the security requirements.In this paper,we examine one of these protocols and identify its security vulnerabilities.Moreover,we propose a robust and secure authentication and session key agreement protocol using the elliptic curve cryptography(ECC).We show that the proposed protocol meets common security requirements and is resistant to known security attacks.Moreover,we prove that the proposed scheme satisfies the security features using the Automated Validation of Internet Security Protocols and Applications(AVISPA)formal verification tool and On-the fly Model-Checker(OFMC)and ATtack SEarcher(ATSE)model checkers.We have also proved the security of the session key exchange of our protocol using theReal orRandom(RoR)model.Finally,the comparison of our scheme with similar methods shows its superiority. 展开更多
关键词 Satellite communications AUTHENTICATION session key agreement secure communication security protocols formal verification
下载PDF
Study of Communication Protocol and Link Establishing Mode of Mine Managing Mobile Communication System of Minute Areas
18
作者 杨维 孙继平 苏又平 《International Journal of Mining Science and Technology》 2000年第2期79-82,共4页
This paper studies the communication protocol and link establishing mode of the mine managing mobile communication system consisted of minute areas. The communication protocol suitable for the system is proposed and d... This paper studies the communication protocol and link establishing mode of the mine managing mobile communication system consisted of minute areas. The communication protocol suitable for the system is proposed and designed. 展开更多
关键词 MINE mobile communication communication protocol LAYER LINK
下载PDF
The Algorithms for Achieving Global States and Self-Stabilization for Communication Protocols
19
作者 Li Layuan & Li Chunlin(Department of Computer Science & Engineering. Wuhan Transportation University,430063,P . R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1999年第4期34-41,共8页
This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limita... This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limitation of self-stabilization for communication protocols, and thenpresents an improved algorithm that can be suitable to achieve global states and can be also usedto self-stabilizing communication protocols. Filially, it gives the proof of correctness and analysis ofcomplexity of the improved algorithm, and verifies its availability and efficiency by illustrating anexample protocol. 展开更多
关键词 communication protocols Algorithm for achieving global states Self-stabilization Computer networks Multimedia communication networks.
下载PDF
A Hybrid Formal Description Method Based on FSM,CSP and ADT for Communication Protocol
20
作者 Li Layman(Wuhan Transportation Universityl 430063, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1998年第3期29-38,共10页
Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description met... Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description methods. This paper presents a new hybrid formal method for communication protocol specification. In this method, finite state machine (FSM), communication sequential process (CSP) and abstract data type (ADT) are mixed and the best features of these approaches are offered. In this paper, the main formal description techniques (FDT) for protocol engineering are brieny introduced and a hybrid formal description method based on the FSM, CSP and ADT for communication protocol is described. Finally, this paper presents the formal specification of an example protocol for LAN by using the proposed hybrid formal method. The results of studies show that the hybrid formal description method for communication protocol is an available and effective approach. 展开更多
关键词 communication protocol Formal description techniques protocol engineering Hybrid formal method
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部