期刊文献+
共找到14,196篇文章
< 1 2 250 >
每页显示 20 50 100
Protocol Buffers在即时通讯系统中的应用研究 被引量:5
1
作者 田源 潘晨光 丁杰 《现代电子技术》 2014年第5期32-34,38,共4页
即时通讯系统已经广泛应用在人们的生活中,随着用户数量的增长,计算机设备在网络中传输的数据量越来越大。由于网络中的数据传输是非结构化的,因此需要数据的序列化与逆序列化方法来实现网络数据到可读数据的转换。基于即时通讯系统对... 即时通讯系统已经广泛应用在人们的生活中,随着用户数量的增长,计算机设备在网络中传输的数据量越来越大。由于网络中的数据传输是非结构化的,因此需要数据的序列化与逆序列化方法来实现网络数据到可读数据的转换。基于即时通讯系统对于数据的实时性需求,提出了使用Protocol Buffers作为系统的序列化与逆序列化的手段,并且将Protocol Buffers与目前几种比较主流的数据序列化方法进行了对比。 展开更多
关键词 即时通讯 数据序列化 消息
在线阅读 下载PDF
Protocol Buffer在Android企业云通讯录中的应用 被引量:8
2
作者 殷昊 沈奇威 王纯 《电信科学》 北大核心 2012年第9期148-151,共4页
本文介绍了在Android企业云通讯录中,应用Protocol Buffer进行数据更新的使用方法,并通过实验测试数据,对XML(extensible markup language)、JSON(JavaScript object notation)、Protocol Buffer进行时间和空间性能比较。
关键词 protocol BUFFER ANDROID 性能
在线阅读 下载PDF
Consensus tracking protocol and formation control of multi-agent systems with switching topology 被引量:13
3
作者 年晓红 苏赛军 潘欢 《Journal of Central South University》 SCIE EI CAS 2011年第4期1178-1183,共6页
Consensus tracking control problems for single-integrator dynamics of multi-agent systems with switching topology are investigated. In order to design effective consensus tracking protocols for a more general class of... Consensus tracking control problems for single-integrator dynamics of multi-agent systems with switching topology are investigated. In order to design effective consensus tracking protocols for a more general class of networks, which are aimed at ensuring that the concerned states of agents converge to a constant or time-varying reference state, new consensus tracking protocols with a constant and time-varying reference state are proposed, respectively. Particularly, by contrast with spanning tree, an improved condition of switching interaction topology is presented. And then, convergence analysis of two consensus tracking protocols is provided by Lyapunov stability theory. Moreover, consensus tracking protocol with a time-varying reference state is extended to achieve the fbrmation control. By introducing formation structure set, each agent can gain its individual desired trajectory. Finally, several simulations are worked out to illustrate the effectiveness of theoretical results. The test results show that the states of agents can converge to a desired constant or time-varying reference state. In addition, by selecting appropriate structure set, agents can maintain the expected formation under random switching interaction topologies. 展开更多
关键词 multi-agent system consensus protocols formation control switching topology
在线阅读 下载PDF
Reliable transmission of consultative committee for space data systems file delivery protocol in deep space communication 被引量:7
4
作者 Hui Li Hao Luo Faxin Yu Zheming Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期349-354,共6页
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac... In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification. 展开更多
关键词 deep space communication consultative committee for space data systems (CCSDS) CCSDS file delivery protocol (CFDP) RELIABLE delay.
在线阅读 下载PDF
Prediction-based protocol for mobile target tracking in wireless sensor networks 被引量:3
5
作者 Liang Xue Zhixin Liu Xinping Guan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第2期347-352,共6页
Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce... Remote tracking for mobile targets is one of the most important applications in wireless sensor networks (WSNs). A target tracking protoco–exponential distributed predictive tracking (EDPT) is proposed. To reduce energy waste and response time, an improved predictive algorithm–exponential smoothing predictive algorithm (ESPA) is presented. With the aid of an additive proportion and differential (PD) controller, ESPA decreases the system predictive delay effectively. As a recovery mechanism, an optimal searching radius (OSR) algorithm is applied to calculate the optimal radius of the recovery zone. The simulation results validate that the proposed EDPT protocol performes better in terms of track failed ratio, energy waste ratio and enlarged sensing nodes ratio, respectively. 展开更多
关键词 wireless sensor network target tracking protocol predictive algorithm recovery mechanism.
在线阅读 下载PDF
Reliable adaptive multicast protocol in wireless Ad hoc networks 被引量:3
6
作者 Sun Baolin Li Layuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第1期187-192,共6页
In wireless ad hoe network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multi... In wireless ad hoe network environments, every link is wireless and every node is mobile. Those features make data lost easily as well as multicasting inefficient and unreliable. Moreover, Efficient and reliable multicast in wireless ad hoe network is a difficult issue. It is a major challenge to transmission delays and packet losses due to link changes of a multicast tree at the provision of high delivery ratio for each packet transmission in wireless ad hoe network environment. In this paler, we propose and evaluate Reliable Adaptive Multicast Protocol (RAMP) based on a relay node concept. Relay nodes are placed along the multieast tree. Data recovery is done between relay nodes. RAMP supports a reliable multicasting suitable for mobile ad hoe network by reducing the number of packet retransmissions. We compare RAMP with SRM (Scalable Reliable Multicast). Simulation results show that the RAMP has high delivery ratio and low end-to-end delay for packet transmsission. 展开更多
关键词 muhicast multicast protocol reliable muhicast wireless ad hoc networks.
在线阅读 下载PDF
ARROW-WTCP:A fast transport protocol based on explicit congestion notification over wired/wireless networks 被引量:3
7
作者 王建新 李婧 荣亮 《Journal of Central South University》 SCIE EI CAS 2011年第3期800-808,共9页
An explicit congestion notification (ECN)-based distributed transport protocol,ARROW-WTCP (AcceleRate tRansmission towards Optimal Window size TCP for Wireless network),was proposed.The ARROW-WTCP enables feasible dep... An explicit congestion notification (ECN)-based distributed transport protocol,ARROW-WTCP (AcceleRate tRansmission towards Optimal Window size TCP for Wireless network),was proposed.The ARROW-WTCP enables feasible deployment of ARROW-TCP from wired to wireless networks by providing a joint design of source and router algorithms.The protocol obtains the actual capacity of the wireless channel by calculating the queue variation in base station (BS) and adjusts the congestion window by using the feedback from its bottleneck link.The simulation results show that the ARROW-WTCP achieves strong stability,max-min fairness in dynamic networks,fast convergence to efficiency without introducing much excess traffic,and almost full link utilization in the steady state.It outperforms the XCP-B (eXplicit Control Protocol Blind),the wireless version of XCP,in terms of stability,fairness,convergence and utilization in wireless networks. 展开更多
关键词 ARROW-WTCP transport protocol stability CONVERGENCE FAIRNESS IEEE 802.11
在线阅读 下载PDF
Dynamic Routing Protocol for Computer Networkswith Clustering Topology 被引量:2
8
作者 Li, Layuan Li, Chunlin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1999年第1期44-53,共10页
This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering... This paper presents a hierarchical dynamic routing protocol (HDRP) based on the discrete dynamic programming principle. The proposed protocol can adapt to the dynamic and large computer networks (DLCN) with clustering topology. The procedures for realizing routing update and decision are presented in this paper. The proof of correctness and complexity analysis of the protocol are also made. The performance measures of the HDRP including throughput and average message delay are evaluated by using of simulation. The study shows that the HDRP provides a new available approach to the routing decision for DLCN or high speed networks with clustering topology. 展开更多
关键词 Computational complexity Computer simulation Dynamic programming Network protocols TOPOLOGY
在线阅读 下载PDF
Joint channel assignment and cross-layer routing protocol for multi-radio multi-channel Ad Hoc networks 被引量:2
9
作者 Yang Lu Junming Guan +1 位作者 Zhen Wei Qilin Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第6期1095-1102,共8页
To study multi-radio multi-channel (MR-MC) Ad Hoc networks based on 802.11, an efficient cross-layer routing protocol with the function of joint channel assignment, called joint channel assignment and cross-layer ro... To study multi-radio multi-channel (MR-MC) Ad Hoc networks based on 802.11, an efficient cross-layer routing protocol with the function of joint channel assignment, called joint channel assignment and cross-layer routing (JCACR), is presented. Firstly, this paper introduces a new concept called channel utilization percentage (CUP), which is for measuring the contention level of different channels in a node’s neighborhood, and deduces its optimal value for determining whether a channel is overloaded or not. Then, a metric parameter named channel selection metric (CSM) is designed, which actually reffects not only the channel status but also corresponding node’s capacity to seize it. JCACR evaluates channel assignment by CSM, performs a local optimization by assigning each node a channel with the smaller CSM value, and changes the working channel dynamically when the channel is overloaded. Therefore, the network load balancing can be achieved. In addition, simulation shows that, when compared with the protocol of weighted cumulative expected transfer time (WCETT), the new protocol can improve the network throughput and reduce the end-to-end average delay with fewer overheads. 展开更多
关键词 Ad Hoc network multi-radio multi-channel channel assignment routing protocol channel utilization percentage.
在线阅读 下载PDF
Formal Specifications and Verification of a Secure Communication Protocol Model 被引量:2
10
作者 夏阳 陆余良 蒋凡 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2003年第2期90-97,共8页
This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, system... This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, systematic construction and state transition of EABM. Then , it describes the channels and the process of state transition of EABM in terms of ESTELLE. At last, it offers a verification of the accuracy of the EABM model. 展开更多
关键词 protocol Model ESTELLE Extended alternating bit machine.
在线阅读 下载PDF
Energy efficient mechanism using flexible medium access control protocol for hybrid wireless sensor networks 被引量:2
11
作者 SUN Ning JEONG Yoon-su LEE Sang-ho 《Journal of Central South University》 SCIE EI CAS 2013年第8期2165-2174,共10页
Energy efficiency is a primary consideration in a wireless sensor network (WSN). This is also a major parameter when designing a medium access control (MAC) protocol for WSNs. Hierarchical clustering structure is rega... Energy efficiency is a primary consideration in a wireless sensor network (WSN). This is also a major parameter when designing a medium access control (MAC) protocol for WSNs. Hierarchical clustering structure is regarded suitable for WSNs due to its good performance in energy conservation. In this work, an adequately flexible mechanism for clustering WSNs is designed, in which some creative or promotional metrics are utilized, such as cluster head selection algorithm, cluster optional reconstruction, interested data transmission, multiple path routing protocol. All these strategies were cooperated to maximize energy saving of whole system. An appropriate MAC protocol for this mechanism is proposed, by flexibly switching the status of diverse sensor nodes in different strategies. The simulation results show that the proposed MAC protocol is suitable for clustering WSNs and performs well in aspects of energy efficiency, flexibility and scalability. 展开更多
关键词 MAC protocol energy conservation FLEXIBILITY re-clustering wireless sensor network
在线阅读 下载PDF
Production protocol for and storage efficacy of an anthocorid predator Cardiastethus exiguus Poppius 被引量:1
12
作者 BALLAL Chandish R. 《环境昆虫学报》 CSCD 北大核心 2012年第1期50-56,共7页
Cardiastethus exiguus Poppius is an indigenous anthocorid predator of eggs and neonates of the notorious pest,coconut black-headed caterpillar Opisina arenosella Walker in India.At the National Bureau of Agriculturall... Cardiastethus exiguus Poppius is an indigenous anthocorid predator of eggs and neonates of the notorious pest,coconut black-headed caterpillar Opisina arenosella Walker in India.At the National Bureau of Agriculturally Important Insects(Indian Council of Agricultural Research),Bangalore,India,a simple mass production protocol was developed for multiplying C.exiguus using UV-irradiated eggs of alternate laboratory host Corcyra cephalonica Stainton.Field evaluation of the predator in the states of Kerala and Karnataka indicated that this predator could bring about a significant reduction in the pest population.Subsequently,the need was felt to investigate the storage efficacy of the eggs and adults of C.exiguus so that sufficient numbers could be accumulated and transportation of the predator could be planned for field releases.Low temperature storage studies indicated that C.exiguus eggs can be safely stored for up to 5 days at 10℃ and 10 days at 15℃ and incubation period could be staggered for up to 10 and 13 days,respectively.The longevity of the C.exiguus adults was significantly reduced due to low temperature storage.However,for adult females,a storage temperature of 15℃ for 15 days could be recommended as they could live for a more than a month after removal from storage and their progeny production was comparable to that of the control adults. 展开更多
关键词 ANTHOCORIDAE Cardiastethus exiguus coconut black-headed caterpillar Opisina arenosella production protocol STORAGE
在线阅读 下载PDF
Atomic and efficient e-cash transaction protocol 被引量:1
13
作者 王茜 杨德礼 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期392-398,共7页
Atomicity is necessary for reliable and secure electronic commerce transaction and to guarantee the participants' interests. An atomic and efficient e-cash (electronic cash) transaction protocol based on the class... Atomicity is necessary for reliable and secure electronic commerce transaction and to guarantee the participants' interests. An atomic and efficient e-cash (electronic cash) transaction protocol based on the classical e-cash scheme is presented. The delivery of digital goods is incorporated into the process of payment in the protocol. Apart from ensuring all three levels of atomicity, the novel protocol features high efficiency and practicability with unfavorable strong assumption removed. Furthermore, the proposed protocol provides non-repudiation proofs for any future disputes. At last, analysis of the atomicity and efficiency is illustrated. 展开更多
关键词 E-CASH ATOMICITY ANONYMITY protocol.
在线阅读 下载PDF
Distributed QoS multicast routing protocol in ad hoc networks 被引量:1
14
作者 Sun Baolin Li Layuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期692-698,共7页
Quality of service (QoS) routing and multicasting protocols in ad hoc networks are face with the challenge of delivering data to destinations through multihop routes in the presence of node movements and topology ch... Quality of service (QoS) routing and multicasting protocols in ad hoc networks are face with the challenge of delivering data to destinations through multihop routes in the presence of node movements and topology changes. The multicast routing problem with multiple QoS constraints is discussed, which may deal with the delay, bandwidth and cost metrics, and describes a network model for researching the ad hoc networks QoS multicast routing problem. It presents a distributed QoS multicast routing protocol (DQMRP). The proof of correctness and complenty analysis of the DQMRP are also given. Simulation results show that the multicast tree optimized by DQMRP is better than other protocols and is fitter for the network situations with frequently changed status and the realtime multimedia application. It is an available approach to multicast routing decision with multiple QoS constraints. 展开更多
关键词 ad hoc network multicast routing routing protocol QoS.
在线阅读 下载PDF
A Recovery Algorithm for Self-Stabilizing Communication Protocols 被引量:1
15
作者 Li Layuan & Li Chunlin (Department of Computer Science & Technology, Wuhan nansportation University, 430063, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2000年第1期38-46,共9页
This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, pro... This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, proves its correctness and analyses its complexity. Finally, it also verifies the availability and efficiency of the algorithm by illustrating an example protocol with multi-processes. 展开更多
关键词 Computer networks Communication protocols Recovery algorithm SELF-STABILIZATION Multimedia communication networks.
在线阅读 下载PDF
A Transport Protocol and Its Formal Description for Local Networks 被引量:1
16
作者 Li Layuan Wuhan Transportation University, 430063, P. R. China 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1998年第1期48-55,共8页
This paper discusses a transport protocol and its formal description techniques for local network. The transport layer function, the transport services and a transport protocol design in a local network architecture m... This paper discusses a transport protocol and its formal description techniques for local network. The transport layer function, the transport services and a transport protocol design in a local network architecture model are presented. A transport protocol specification using the finite state automata (FSA) is given. The correctness of the protocol is verified by using the reachability tree technique with respect to the protocol properties of completeness, deadlock and livelock freeness, termination and reachability. 展开更多
关键词 Local networks Transport protocol Formal description.
在线阅读 下载PDF
CC-CV charge protocol based on spherical diffusion model 被引量:1
17
作者 李连兴 唐新村 +1 位作者 瞿毅 刘洪涛 《Journal of Central South University》 SCIE EI CAS 2011年第2期319-322,共4页
A new insight into the constant current-constant voltage (CC-CV) charge protocol based on the spherical diffusion model was presented. From the model, the CV-charge process compensates, to a large extent, the capaci... A new insight into the constant current-constant voltage (CC-CV) charge protocol based on the spherical diffusion model was presented. From the model, the CV-charge process compensates, to a large extent, the capacity loss in the CC process, and the capacity loss increases with increasing the charging rate and decreases with increasing the lithium-ion diffusion coefficient and using a smaller r value (smaller particle-size and larger diffusion coefficient) and a lower charge rate will be helpful to decreasing the capacity loss. The results show that the CC and the CV charging processes, in some way, are complementary and the capacity loss during the CC charging process due to the large electrochemical polarization can be effectively compensated from the CV charging process. 展开更多
关键词 lithium-ion battery charge protocol constant current-constant voltage mode capacity loss
在线阅读 下载PDF
Component based ant routing protocols analysis over mobile ad hoc networks 被引量:1
18
作者 曲大鹏 王兴伟 黄敏 《Journal of Central South University》 SCIE EI CAS 2013年第9期2378-2387,共10页
To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.... To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.The analysis results show that every routing protocol has its own characteristics and competitive environment.No routing protocol is better than others in all aspects.Therefore,based on no free lunch theory,ant routing protocols were decomposed into three key components:route discovery,route maintenance (including route refreshing and route failure handling) and data forwarding.Moreover,component based ant routing protocol (CBAR) was proposed.For purpose of analysis,it only maintained basic ant routing process,and it was simple and efficient with a low overhead.Subsequently,different mechanisms used in every component and their effect on performance were analyzed and tested by simulations.Finally,future research strategies and trends were also summarized. 展开更多
关键词 routing protocol mobile ad hoc networks ant colony optimization route discovery route maintenance data forwarding
在线阅读 下载PDF
A new real-time ethernet MAC protocol for time-critical applications 被引量:1
19
作者 沈钢 许晓鸣 +2 位作者 蔡云泽 何星 张卫东 《Journal of Central South University of Technology》 EI 2002年第1期54-58,共5页
The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol ... The authors propose a new persistent transmission based real time Ethernet MAC protocol that provides a predictable upper bound for the delivery delay of real time frames. Moreover, it is compatible with the protocol used by the existing Ethernet controllers for conventional datagram traffic and thus standard Ethernet stations can be used in the system without any modification. The paper describes the protocol in detail and analyses the maximum delivery delay for real time traffic and the efficiency of the channel. 展开更多
关键词 real time ETHERNET multiple access protocol industrial control networks
在线阅读 下载PDF
Deep space multi-file delivery protocol based on LT codes 被引量:2
20
作者 Ruyan Wang Hua Liang +1 位作者 Hui Zhao Gaofeng Fang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第3期524-530,共7页
A deep space multi-file delivery protocol(DSMDP) based on LT codes is proposed to reduce the influence of long delay and a high bit error rate(BER) in deep space communication. The protocol increases sending redun... A deep space multi-file delivery protocol(DSMDP) based on LT codes is proposed to reduce the influence of long delay and a high bit error rate(BER) in deep space communication. The protocol increases sending redundancy by LT codes to improve the success rate of file delivery, and adopts different protective strategies for different situations of packet loss. At the same time, the multi-file united delivery strategy is adopted to make full use of the retransmission time to reduce the end-toend transmission delay. Furthermore, the protocol determines the quantity of encoded packets according to the feedback for controlling redundancy. The simulation results show that the proposed protocol can significantly reduce the transmission delay of files, which would be effectively suitable for deep space communication environment of high BER and long delay. 展开更多
关键词 deep space communication multi-file delivery protocol LT codes delay
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部