期刊文献+
共找到91篇文章
< 1 2 5 >
每页显示 20 50 100
A Recovery Algorithm for Self-Stabilizing Communication Protocols 被引量:1
1
作者 Li Layuan & Li Chunlin (Department of Computer Science & Technology, Wuhan nansportation University, 430063, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2000年第1期38-46,共9页
This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, pro... This paper presents a recovery algorithm for self-stabilizing communication protocols. It first describes some concepts and a formal description method for the algorithm. Then it proposes the algorithm procedures, proves its correctness and analyses its complexity. Finally, it also verifies the availability and efficiency of the algorithm by illustrating an example protocol with multi-processes. 展开更多
关键词 Computer networks Communication protocols Recovery algorithm SELF-STABILIZATION Multimedia communication networks.
在线阅读 下载PDF
Self Fault-Tolerance of Protocols: A Case Study
2
作者 Li, Layuan Li, Chunlin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2000年第3期28-34,共7页
The prerequisite for the existing protocols' correctness is that protocols can be normally operated under the normal conditions, rather than dealing with abnormal conditions. In other words, protocols with the fau... The prerequisite for the existing protocols' correctness is that protocols can be normally operated under the normal conditions, rather than dealing with abnormal conditions. In other words, protocols with the fault-tolerance can not be provided when some fault occurs. This paper discusses the self fault-tolerance of protocols. It describes some concepts and methods for achieving self fault-tolerance of protocols. Meanwhile, it provides a case study, investigates a typical protocol that does not satisfy the self fault-tolerance, and gives a new redesign version of this existing protocol using the proposed approach. 展开更多
关键词 protocols Self fault-tolerance Formal method Multimedia communications Protocol engineering.
在线阅读 下载PDF
The Algorithms for Achieving Global States and Self-Stabilization for Communication Protocols
3
作者 Li Layuan & Li Chunlin(Department of Computer Science & Engineering. Wuhan Transportation University,430063,P . R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1999年第4期34-41,共8页
This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limita... This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limitation of self-stabilization for communication protocols, and thenpresents an improved algorithm that can be suitable to achieve global states and can be also usedto self-stabilizing communication protocols. Filially, it gives the proof of correctness and analysis ofcomplexity of the improved algorithm, and verifies its availability and efficiency by illustrating anexample protocol. 展开更多
关键词 Communication protocols Algorithm for achieving global states Self-stabilization Computer networks Multimedia communication networks.
在线阅读 下载PDF
Component based ant routing protocols analysis over mobile ad hoc networks 被引量:1
4
作者 曲大鹏 王兴伟 黄敏 《Journal of Central South University》 SCIE EI CAS 2013年第9期2378-2387,共10页
To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.... To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.The analysis results show that every routing protocol has its own characteristics and competitive environment.No routing protocol is better than others in all aspects.Therefore,based on no free lunch theory,ant routing protocols were decomposed into three key components:route discovery,route maintenance (including route refreshing and route failure handling) and data forwarding.Moreover,component based ant routing protocol (CBAR) was proposed.For purpose of analysis,it only maintained basic ant routing process,and it was simple and efficient with a low overhead.Subsequently,different mechanisms used in every component and their effect on performance were analyzed and tested by simulations.Finally,future research strategies and trends were also summarized. 展开更多
关键词 routing protocol mobile ad hoc networks ant colony optimization route discovery route maintenance data forwarding
在线阅读 下载PDF
面向运行时复杂数据的零序列化远程过程调用mRPC
5
作者 刘中一 阎松柏 +1 位作者 黄向平 崔华 《计算机应用研究》 北大核心 2025年第5期1470-1479,共10页
远程过程调用是云计算平台的核心组件之一,其可传输数据的复杂度与效率由序列化技术决定,C++语言相关数据传输序列化实现较少,尚欠缺完全支持标准模板库容器和指针嵌套的方法。设计了一种面向复杂数据对象的高性能远程过程调用方法,利... 远程过程调用是云计算平台的核心组件之一,其可传输数据的复杂度与效率由序列化技术决定,C++语言相关数据传输序列化实现较少,尚欠缺完全支持标准模板库容器和指针嵌套的方法。设计了一种面向复杂数据对象的高性能远程过程调用方法,利用内存映射技术的零序列化协议与精细化内存映射管理技术,扩展了基于C++数据结构的可传输数据类型,同时提高了传输效率与开发效率。实例验证中,与主流远程调用方法相比,该方法在客户端和服务端最好情况下可提升27.20%和76.79%的性能,并节约43.13%的编程时间。该方法简洁高效,可有效解决C++语言在数据传输序列化方面的不足,特别适用于由传统架构向新型分布式架构转换的场景,也为云计算和微服务等领域的数据传输提供了新的解决方案。 展开更多
关键词 远程过程调用 零序列化 Protocol Buffers Boost.Serialization Cap’n Proto 内存映射 地址绑定 内存镜像
在线阅读 下载PDF
Resilient multi-objective mission planning for UAV formation:A unified framework integrating task pre-and re-assignment
6
作者 Xinwei Wang Xiaohua Gao +4 位作者 Lei Wang Xichao Su Junhong Jin Xuanbo Liu Zhilong Deng 《Defence Technology(防务技术)》 2025年第3期203-226,共24页
Combat effectiveness of unmanned aerial vehicle(UAV)formations can be severely affected by the mission execution reliability.During the practical execution phase,there are inevitable risks where UAVs being destroyed o... Combat effectiveness of unmanned aerial vehicle(UAV)formations can be severely affected by the mission execution reliability.During the practical execution phase,there are inevitable risks where UAVs being destroyed or targets failed to be executed.To improve the mission reliability,a resilient mission planning framework integrates task pre-and re-assignment modules is developed in this paper.In the task pre-assignment phase,to guarantee the mission reliability,probability constraints regarding the minimum mission success rate are imposed to establish a multi-objective optimization model.And an improved genetic algorithm with the multi-population mechanism and specifically designed evolutionary operators is used for efficient solution.As in the task-reassignment phase,possible trigger events are first analyzed.A real-time contract net protocol-based algorithm is then proposed to address the corresponding emergency scenario.And the dual objective used in the former phase is adapted into a single objective to keep a consistent combat intention.Three cases of different scales demonstrate that the two modules cooperate well with each other.On the one hand,the pre-assignment module can generate high-reliability mission schedules as an elaborate mathematical model is introduced.On the other hand,the re-assignment module can efficiently respond to various emergencies and adjust the original schedule within a millisecond.The corresponding animation is accessible at bilibili.com/video/BV12t421w7EE for better illustration. 展开更多
关键词 Cooperative mission planning UAV formation Mission reliability Evolutionary algorithm Contract net protocol
在线阅读 下载PDF
Group cooperative midcourse guidance law design considering time-to-go
7
作者 ZHANG Ruitao FANG Yangwang +2 位作者 CHEN Zhan GUO Hang FU Wenxing 《Journal of Systems Engineering and Electronics》 2025年第3期835-853,共19页
To solve the problem of providing the best initial situation for terminal guidance when multiple missiles intercept multiple targets,a group cooperative midcourse guidance law(GCMGL)considering time-to-go is proposed.... To solve the problem of providing the best initial situation for terminal guidance when multiple missiles intercept multiple targets,a group cooperative midcourse guidance law(GCMGL)considering time-to-go is proposed.Firstly,a threedimensional(3D)guidance model is established and a cooperative trajectory shaping guidance law is given.Secondly,for estimating the unknown target maneuvering acceleration,an adaptive disturbance observer(ADO)is designed,combining finitetime theory with a radial basis function(RBF)neural network,and the convergence of the estimation error is proven using Lyapunov stability theory.Then,to ensure time-to-go cooperation among missiles within the same group and across different groups,the group consensus protocols of virtual collision point mean and the inter-group cooperative consensus protocol are designed respectively.Based on the group consensus protocols,the virtual collision point cooperative guidance law is given,and the finite-time convergence is proved by Lyapunov stability theory.Simultaneously,combined with trajectory shaping guidance law,virtual collision point cooperative guidance law and the intergroup cooperative consensus protocol,the design of GCMGL considering time-to-go is given.Finally,numerical simulation results show the effectiveness and the superiority of the proposed GCMGL. 展开更多
关键词 cooperative midcourse guidance virtual collision point TIME-TO-GO finite-time theory group consensus protocol
在线阅读 下载PDF
Air-to-ground reconnaissance-attack task allocation for heterogeneous UAV swarm
8
作者 LUO Yuelong JIANG Xiuqiang +1 位作者 ZHONG Suchuan JI Yuandong 《Journal of Systems Engineering and Electronics》 2025年第1期155-175,共21页
A task allocation problem for the heterogeneous unmanned aerial vehicle (UAV) swarm in unknown environments is studied in this paper.Considering that the actual mission environment information may be unknown,the UAV s... A task allocation problem for the heterogeneous unmanned aerial vehicle (UAV) swarm in unknown environments is studied in this paper.Considering that the actual mission environment information may be unknown,the UAV swarm needs to detect the environment first and then attack the detected targets.The heterogeneity of UAVs,multiple types of tasks,and the dynamic nature of task environment lead to uneven load and time sequence problems.This paper proposes an improved contract net protocol (CNP) based task allocation scheme,which effectively balances the load of UAVs and improves the task efficiency.Firstly,two types of task models are established,including regional reconnaissance tasks and target attack tasks.Secondly,for regional reconnaissance tasks,an improved CNP algorithm using the uncertain contract is developed.Through uncertain contracts,the area size of the regional reconnaissance task is determined adaptively after this task assignment,which can improve reconnaissance efficiency and resource utilization.Thirdly,for target attack tasks,an improved CNP algorithm using the fuzzy integrated evaluation and the double-layer negotiation is presented to enhance collaborative attack efficiency through adjusting the assignment sequence adaptively and multi-layer allocation.Finally,the effectiveness and advantages of the improved method are verified through comparison simulations. 展开更多
关键词 unmanned aerial vehicle(UAV)swarm reconnaissance-attack coupled task allocation contract net protocol(CNP) fuzzy integrated evaluation double-layer negotiation
在线阅读 下载PDF
Exploring the effects of angle of incidence on stabbing resistance in advanced protective textiles:Novel experimental framework and analysis
9
作者 Mulat Alubel Abtew François Boussu Irina Cristian 《Defence Technology(防务技术)》 2025年第2期67-82,共16页
Despite numerous research investigations to understand the influences of various structural parameters,to the authors'knowledge,no research has been the effect of different angles of incidence on stab response and... Despite numerous research investigations to understand the influences of various structural parameters,to the authors'knowledge,no research has been the effect of different angles of incidence on stab response and performance of different types of protective textiles.Three distinct structures of 3D woven textiles and 2D plain weave fabric made with similar high-performance fiber and areal density were designed and manufactured to be tested.Two samples,one composed of a single and the other of 4-panel layers,from each fabric type structure,were prepared,and tested against stabbing at[0○],[22.5○],and[45○]angle of incidence.A new stabbing experimental setup that entertained testing of the specimens at various angles of incidence was engineered and utilized.The stabbing bench is also equipped with magnetic sensors and a UK Home Office Scientific Development Branch(HOSDB)/P1/B sharpness engineered knives to measure the impact velocity and exerted impact energy respectively.A silicon compound was utilized to imprint the Back Face Signature(BFS)on the backing material after every specimen test.Each silicon print was then scanned,digitized,and precisely measured to evaluate the stab response and performance of the specimen based on different performance variables,including Depth of Trauma(DOT),Depth of Penetration(DOP),and Length of Penetration(LOP).Besides,the post-impact surface failure modes of the fabrics were also measured using Image software and analyzed at the microscale level.The results show stab angle of incidence greatly influences the stab response and performance of protective textiles.The outcome of the study could provide not only valuable insights into understanding the stab response and capabilities of protective textiles under different angle of incidence,but also provide valuable information for protective textile manufacturer,armor developer and stab testing and standardizing organizations to consider the angle of incidence while developing,testing,optimizing,and using protective textiles in various applications. 展开更多
关键词 2D/3D woven fabrics Impact protective fabric Drop tower perforation test Stab resistance testing protocol Angle of incidence Multi-layer panels Soft body armor Impact surface damage
在线阅读 下载PDF
智能网联汽车的高精地图数据交互模式 被引量:4
10
作者 张闯 应申 +2 位作者 王润泽 王舒曼 李霖 《测绘通报》 CSCD 北大核心 2024年第2期107-112,共6页
随着自动驾驶技术的发展,传统的地图服务已经不能满足以机器为主体的自动驾驶车辆的需要。具有更高精度、更多要素、更快更新频率的高精地图成为自动驾驶车辆的关键。不同来源数据之间的交互是高精地图用于自动驾驶导航决策的保证。针... 随着自动驾驶技术的发展,传统的地图服务已经不能满足以机器为主体的自动驾驶车辆的需要。具有更高精度、更多要素、更快更新频率的高精地图成为自动驾驶车辆的关键。不同来源数据之间的交互是高精地图用于自动驾驶导航决策的保证。针对智能网联汽车系统中高精地图的数据交互问题,本文首先对相关的研究进行了分析,依据高精地图的数据内容和数据来源对智能网联汽车中的高精地图数据进行再组织;然后详细阐述了基于车-路-云三方的高精地图数据交互的内容和交互机制,形成一个适用于智能网联汽车的高精地图数据交互模式;最后在仿真环境下对设计的数据交互模式进行了验证。 展开更多
关键词 高精地图 车-路-云 数据交互 protocol buffer
在线阅读 下载PDF
Cloud control for IIoT in a cloud-edge environment 被引量:1
11
作者 YAN Ce XIA Yuanqing +1 位作者 YANG Hongjiu ZHAN Yufeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期1013-1027,共15页
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for... The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms. 展开更多
关键词 5G and time sensitive network(TSN) industrial Internet of Things(IIoT)workflow transmission control protocol(TCP)flows control cloud edge collaboration multi-objective optimal scheduling
在线阅读 下载PDF
无线射频RFID识别协议自动验证方法研究 被引量:3
12
作者 宋岚 薛锦云 +3 位作者 胡启敏 谢武平 江东明 游珍 《计算机科学》 CSCD 北大核心 2017年第9期99-104,共6页
Population Protocols是一种受生物启发的计算模型,能够表示无线网络中数量庞大但计算能力弱的多组件间的交互,它为无线传感器网络提供了一种可计算推理的理论框架。将Population Protocol理论引入到RFID识别协议中,提出了RFID识别协议... Population Protocols是一种受生物启发的计算模型,能够表示无线网络中数量庞大但计算能力弱的多组件间的交互,它为无线传感器网络提供了一种可计算推理的理论框架。将Population Protocol理论引入到RFID识别协议中,提出了RFID识别协议系统模型验证框架;构建了标签与阅读器交互产生的状态变迁模型;最后用spin模型检测工具和LTL线性时序逻辑验证了弱公平条件下该模型的自稳定性,为分析与验证无线传感器网络中协议的正确性提供了一种行之有效的方法。 展开更多
关键词 POPULATION protocols RFID 协议验证 SPIN
在线阅读 下载PDF
水声通信网络定向搜索AODV协议研究 被引量:4
13
作者 刘旬 李宇 +1 位作者 张春华 黄海宁 《应用声学》 CSCD 北大核心 2010年第6期458-465,共8页
水声通信网络是水声研究的一个热点问题。由于水下声网络带宽窄、传播延迟大、能量受限等特点,无线电网络中一些成熟的路由协议,如DSDV、AODV等的应用受到了很大的限制。本文结合按需距离矢量(AODV)路由协议和地理位置协议,提出了一种... 水声通信网络是水声研究的一个热点问题。由于水下声网络带宽窄、传播延迟大、能量受限等特点,无线电网络中一些成熟的路由协议,如DSDV、AODV等的应用受到了很大的限制。本文结合按需距离矢量(AODV)路由协议和地理位置协议,提出了一种适用于水下网络的路由协议——定向搜索AODV(DSAODV)路由协议。DSAODV协议利用地理位置信息约束路由请求分组(RREQ)寻找路由的范围,降低了路由寻径的开销,减少了网络拥塞。仿真结果表明,DSAODV协议在吞吐量、协议开销等方面都优于AODV协议。 展开更多
关键词 水声通信网络 定向搜索 AODV协议 routing protocols 路由协议 地理位置 无线电网络 寻找路由 信息约束 协议开销 网络拥塞 网络带宽 热点问题 能量受限 路由请求 距离矢量 仿真结果 传播延迟 吞吐量 限制
在线阅读 下载PDF
MANET中TCP改进研究综述 被引量:34
14
作者 冯彦君 孙利民 +1 位作者 钱华林 宋成 《软件学报》 EI CSCD 北大核心 2005年第3期434-444,共11页
传统TCP(transmission control protocol)本是为有线网络设计,它假设包丢失全是由网络拥塞引起,这个假设不能适应于MANET (mobile ad hoc network),因为MANET 中除了拥塞丢包以外,还存在由于较高比特误码率、路由故障等因素引起的丢包现... 传统TCP(transmission control protocol)本是为有线网络设计,它假设包丢失全是由网络拥塞引起,这个假设不能适应于MANET (mobile ad hoc network),因为MANET 中除了拥塞丢包以外,还存在由于较高比特误码率、路由故障等因素引起的丢包现象.当出现非拥塞因素丢包时,传统 TCP 将错误地触发拥塞控制,从而引起TCP 性能低下.任何改进机制都可以分为发现问题和解决问题两个阶段.首先概括了 MANET 中影响 TCP 性能的若干问题;然后针对发现问题和解决问题两个阶段,详细地对每一阶段中存在的各种可行方法进行了分类、分析和比较;最后指出了 MANET 中 TCP 性能优化的研究方向. 展开更多
关键词 MANET(mobile AD HOC network) TCP(transmission control protocol) 性能 包丢失
在线阅读 下载PDF
基于串空间的Ad Hoc安全路由协议攻击分析模型 被引量:8
15
作者 董学文 马建峰 +2 位作者 牛文生 毛立强 谢辉 《软件学报》 EI CSCD 北大核心 2011年第7期1641-1651,共11页
根据ad hoc安全路由协议的特点,分析串空间理论的优势和不足,并在串空间分析协议的基础上,设计出一种返回不存在路由的协议攻击分析模型.以扩展SRP协议为例,验证了模型的正确性.
关键词 串空间 攻击分析模型 不存在路由 SRP(security ROUTING protocol)协议
在线阅读 下载PDF
无线多媒体传感器网络中一种自适应的报头压缩机制 被引量:14
16
作者 周新运 孙利民 +1 位作者 皇甫伟 牛建伟 《软件学报》 EI CSCD 北大核心 2007年第5期1122-1129,共8页
无线多媒体传感器网络传输大数据量的音频、视频、图像等数据,需要高效地利用宝贵的无线信道资源.报头压缩技术能够减小传输的数据量,提高信道利用效率.提出一种自适应的报头压缩机制AAHC,基于对信道状态的准确估计,动态调整压缩算法的... 无线多媒体传感器网络传输大数据量的音频、视频、图像等数据,需要高效地利用宝贵的无线信道资源.报头压缩技术能够减小传输的数据量,提高信道利用效率.提出一种自适应的报头压缩机制AAHC,基于对信道状态的准确估计,动态调整压缩算法的参数,并使用UDP(user datagram protocol)Lite协议作为传输层协议.AAHC机制在获得较高压缩效率的同时,可保证报头压缩的抗差错鲁棒性.仿真结果表明,AAHC机制的性能优于传统的ROHC(robust header compression)机制和CRTP(compressed RTP)机制. 展开更多
关键词 无线多媒体传感器网络 报头压缩 W-LSB(window-based least significant bits)编码 UDP(user DATAGRAM protocol)Lite
在线阅读 下载PDF
基于云计算的手机智能出租车呼叫系统 被引量:9
17
作者 刘亚秋 吴双满 +1 位作者 韩大明 景维鹏 《计算机工程》 CAS CSCD 2014年第4期14-18,共5页
针对目前交通拥堵致使出行打车难的问题,设计并实现一种基于云计算的手机智能出租车呼叫系统。该系统由云服务器和Android手机客户端组成,服务器利用云计算环境下的Map-Reduce并行编程模型对K-means聚类算法实施并行化,提高推送信息的... 针对目前交通拥堵致使出行打车难的问题,设计并实现一种基于云计算的手机智能出租车呼叫系统。该系统由云服务器和Android手机客户端组成,服务器利用云计算环境下的Map-Reduce并行编程模型对K-means聚类算法实施并行化,提高推送信息的质量和效率;客户端分别利用LocationClient、MapView和MKOfflineMap接口实现定位服务、图层展示更新和百度离线地图服务功能,通过Android智能手机平台为用户提供及时、准确的信息服务。在客户端和服务器之间,利用RPC服务推送Protocol Buffer协议序列化的信息。实验结果表明,与滴滴打车软件相比,该系统的搜索推荐效率提高了20%左右,离线地图展示及定位流量比在线方法减少了90%以上,快速响应性能较好。 展开更多
关键词 智能交通 聚类 云计算 推送 PROTOCOL Buffer协议 百度离线地图
在线阅读 下载PDF
无线局域网TKIP协议的安全分析 被引量:5
18
作者 宋宇波 胡爱群 蔡天佑 《应用科学学报》 CAS CSCD 北大核心 2005年第1期67-70,共4页
通过建立数学模型的方法对TKIP(temporalkeyintegrityprotocol)进行量化的安全分析,推导出TKIP协议内各模块与整个协议安全性能的对应函数关系,特别着重分析了iv空间与安全强度间的关系.根据分析得出TKIP协议虽然提高原有WEP(wiredequiv... 通过建立数学模型的方法对TKIP(temporalkeyintegrityprotocol)进行量化的安全分析,推导出TKIP协议内各模块与整个协议安全性能的对应函数关系,特别着重分析了iv空间与安全强度间的关系.根据分析得出TKIP协议虽然提高原有WEP(wiredequivalentprivacy)的安全性能,但其安全强度并没有预想的高. 展开更多
关键词 TKIP 无线局域网 协议安全 安全强度 WEP 量化 模块 protocol) 安全分析 性能
在线阅读 下载PDF
VBF水下传感器网络路由协议的路径优化与模拟 被引量:3
19
作者 王常颖 张杰 +1 位作者 王岩峰 官晟 《中国海洋大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第6期1261-1264,共4页
针对水下传感器网络节点的移动性,以基本VBF(Vector-Based Forwarding Protocol)路由协议为基础,提出了1种适用于水下移动传感器节点的路径优化算法。为了验证此路径优化算法的有效性,分别对基本VBF算法和改进的VBF算法进行了3个模拟实... 针对水下传感器网络节点的移动性,以基本VBF(Vector-Based Forwarding Protocol)路由协议为基础,提出了1种适用于水下移动传感器节点的路径优化算法。为了验证此路径优化算法的有效性,分别对基本VBF算法和改进的VBF算法进行了3个模拟实验;从数据包接收成功率和网络负载两方面分析比较了实验模拟结果。比较结果可以看出:文中提出的路径优化的VBF路由协议的数据包成功接收率要优于VBF路由协议,降低了网络负载,并且该优化算法实现简单,不需要增加额外的网络延迟时间。 展开更多
关键词 水下传感器网络 路由协议 VBF(Vector-Based FORWARDING Protocol) 模拟
在线阅读 下载PDF
基于二维码的内外网物理隔离环境下的数据交换 被引量:13
20
作者 韩林 张春海 徐建良 《计算机科学》 CSCD 北大核心 2016年第S2期520-522,共3页
针对保密性较高的工作数据或者其他原因导致的内外网物理隔离环境下数据交换困难的问题,通过对二维码生成和解析过程的研究,并且利用二维码可以携带数据、成本低和可随载体移动的特性,提出了使用二维码来解决一些特殊情况下的数据交换... 针对保密性较高的工作数据或者其他原因导致的内外网物理隔离环境下数据交换困难的问题,通过对二维码生成和解析过程的研究,并且利用二维码可以携带数据、成本低和可随载体移动的特性,提出了使用二维码来解决一些特殊情况下的数据交换问题。由于单个二维码可携带数据有限,提出利用Protocol Buffer格式和LZMA压缩算法来简化和压缩需要通过二维码传输的数据,对于大型数据则采取多个二维码的组合方式传输。另外还简述了基于二维码的数据交换的应用前景。 展开更多
关键词 二维码 物理隔离 数据交换 ZXing PROTOCOL BUFFER LZMA
在线阅读 下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部