期刊文献+
共找到4,043篇文章
< 1 2 203 >
每页显示 20 50 100
High dynamic mobile topology-based clustering algorithm for UAV swarm networks
1
作者 CHEN Siji JIANG Bo +2 位作者 XU Hong PANG Tao GAO Mingke 《Journal of Systems Engineering and Electronics》 2025年第4期1103-1112,共10页
Unmanned aerial vehicles(UAVs)have become one of the key technologies to achieve future data collection due to their high mobility,rapid deployment,low cost,and the ability to establish line-of-sight communication lin... Unmanned aerial vehicles(UAVs)have become one of the key technologies to achieve future data collection due to their high mobility,rapid deployment,low cost,and the ability to establish line-of-sight communication links.However,when UAV swarm perform tasks in narrow spaces,they often encounter various spatial obstacles,building shielding materials,and high-speed node movements,which result in intermittent network communication links and cannot support the smooth comple-tion of tasks.In this paper,a high mobility and dynamic topol-ogy of the UAV swarm is particularly considered and the high dynamic mobile topology-based clustering(HDMTC)algorithm is proposed.Simulation and real flight verification results verify that the proposed HDMTC algorithm achieves higher stability of net-work,longer link expiration time(LET),and longer node lifetime,all of which improve the communication performance for UAV swarm networks. 展开更多
关键词 unmanned aerial vehichle(UAV)swarm network UAV clustering mobilITY virtual tube.
在线阅读 下载PDF
Multi-agent cooperative intrusion response in mobile adhoc networks 被引量:6
2
作者 Yi Ping Zou Futai +1 位作者 Jiang Xinghao Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期785-794,共10页
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s... The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation. 展开更多
关键词 computer networks SECURITY mobile agent mobile adhoc networks intrusion detection intrusion response
在线阅读 下载PDF
Distributed intrusion detection for mobile ad hoc networks 被引量:7
3
作者 Yi Ping Jiang Xinghao +1 位作者 Wu Yue Liu Ning 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期851-859,共9页
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments. 展开更多
关键词 mobile ad hoc networks routing protocol SECURITY intrusion detection timed automata.
在线阅读 下载PDF
Node Coverage Algorithms in Wireless Sensor Networks Using Mobile Agents 被引量:9
4
作者 RAINA Manik KUMAR Subhas PATRO Ranjeet 《自动化学报》 EI CSCD 北大核心 2006年第6期915-921,共7页
This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of g... This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of global deployment or topology, etc). We propose the algorithms and show mathematical analysis to support our claims. The paper ends with simulation studies and discussion of results. 展开更多
关键词 Wireless sensor networks mobile agents
在线阅读 下载PDF
A quality of service routing protocol based on mobility prediction in mobile ad hoc networks 被引量:5
5
作者 王建新 邓曙光 +1 位作者 陈松乔 陈建二 《Journal of Central South University of Technology》 2003年第1期53-57,共5页
A QoS routing protocol based on mobility prediction is proposed. The protocol selects the steadiest path based on mobility prediction and QoS requirements on bandwidth, delay, and so forth. The main properties of the ... A QoS routing protocol based on mobility prediction is proposed. The protocol selects the steadiest path based on mobility prediction and QoS requirements on bandwidth, delay, and so forth. The main properties of the protocol as follows. (1) Each node just broadcasts its own information, so the packet is very small and can get to the destination in a very short time. (2) When another path is built for the same QoS requirements, the original path has higher priority. (3) The update messages are reduced by using mobility prediction. (4) Data packets carry the information of link change using piggyback, which is helpful for forecasting the link status more accurately. (5) When source node gets Resource Reserve and reconnect packets at the same time, it selects reconnect packet over Resource Reserve packet. The results of simulation show that the protocol has good network performance with low control overload, and efficiently supports transmitting multimedia with QoS requirements in mobile ad hoc networks. 展开更多
关键词 mobile ad HOC networks PREDICTION QoS ROUTING
在线阅读 下载PDF
Node deployment strategy optimization for wireless sensor network with mobile base station 被引量:7
6
作者 龙军 桂卫华 《Journal of Central South University》 SCIE EI CAS 2012年第2期453-458,共6页
The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytica... The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends. 展开更多
关键词 wireless sensor network mobile base station network optimization energy consumption balancing density ratio of sensor node network lifetime
在线阅读 下载PDF
Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks 被引量:2
7
作者 Siguang Chen Meng Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第3期519-527,共9页
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of secu... Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance. 展开更多
关键词 multipath routing secret sharing CRYPTOGRAPHY ANONYMITY SECURITY mobile ad hoc network(MANET).
在线阅读 下载PDF
Link reliability based hybrid routing for tactical mobile ad hoc network 被引量:2
8
作者 Xie Xiaochuan Wei Gang +2 位作者 Wu Keping Wang Gang Jia Shilou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期259-267,共9页
Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network, without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the network... Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network, without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the network performance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol. 展开更多
关键词 tactical mobile ad hoc networks hybrid routing link reliability edge weight.
在线阅读 下载PDF
CA-MobileNet V2:轻量化的作物病害识别模型 被引量:3
9
作者 陈洋 张欣 +2 位作者 陈孝玉龙 林建吾 蔡季桐 《计算机工程与设计》 北大核心 2024年第2期484-490,共7页
在传统的作物病害识别的深度学习模型中,存在检测精度与效率不高的问题。针对上述问题提出一种轻量化的改进型MobileNet V2模型CA-MobileNet V2(coordinate attention),在提升检测精度的同时,部署在移动端便于种植者使用。在MobileNet V... 在传统的作物病害识别的深度学习模型中,存在检测精度与效率不高的问题。针对上述问题提出一种轻量化的改进型MobileNet V2模型CA-MobileNet V2(coordinate attention),在提升检测精度的同时,部署在移动端便于种植者使用。在MobileNet V2中嵌入坐标注意力模块,提升模型的精度;加入TanhExp激活函数,加速模型收敛,增强模型的鲁棒性和泛化性;将模型部署到移动端APP中,使模型具有良好的可视化应用效果。在PantifyDr和Turkey-PlantDataset数据集上的对比实验结果表明,CA-MobileNet V2具有精度高和轻量化的优势。 展开更多
关键词 农作物病害 深度学习 卷积神经网络 轻量化 坐标注意力 激活函数 移动端部署
在线阅读 下载PDF
MobileNetV3识别甲状腺良恶性结节的超声图像 被引量:1
10
作者 张佳维 王艳 孟名柱 《中国医学计算机成像杂志》 CSCD 北大核心 2024年第2期243-249,共7页
目的:研究MobileNetV3在甲状腺良恶性结节超声图像分类问题中的可行性并评估效果。方法:回顾性分析1996例甲状腺结节患者的临床与超声资料。共获得良性结节1353个,恶性结节1197个。将良性结节和恶性结节超声图像按照8∶1∶1比例划分为... 目的:研究MobileNetV3在甲状腺良恶性结节超声图像分类问题中的可行性并评估效果。方法:回顾性分析1996例甲状腺结节患者的临床与超声资料。共获得良性结节1353个,恶性结节1197个。将良性结节和恶性结节超声图像按照8∶1∶1比例划分为训练集、测试集和验证集。构建基于Pytorch框架的MobileNetV3深度学习网络。采用不同优化器和学习率组合在数据集中对MobileNetV3的2个亚模型(small和large)进行训练、测试和验证。结果:large模型中以LAdamax_0.001在训练集和测试集的准确率最高,分别为0.98和0.92;其次为LAdam_0.0001,分别为0.96和0.87。small模型中以SAdam_0.001在训练集和测试集的准确率最高,分别为0.97和0.85;其次为SAdam_0.0001,分别为0.88和0.85。在验证集中的精确度、召回率、F1评分和受试者工作特征曲线下面积分别为LAdamax_0.001(0.95,0.95,0.95,0.94)、LAdam_0.0001(0.88,0.88,0.88,0.88)、SAdam_0.001(0.90,0.89,0.89,0.88)和SAdam_0.0001(0.89,0.89,0.89,0.89)。结论:MobileNetV3是甲状腺良恶性结节超声图像分类的有效方法,以LAdamax_0.001性能最佳,具有潜在的临床应用价值。 展开更多
关键词 深度学习 移动神经网络 甲状腺结节 超声
在线阅读 下载PDF
Survivability modeling and analysis on 3D mobile ad-hoc networks 被引量:2
11
作者 彭三城 王国军 +1 位作者 胡忠望 陈建平 《Journal of Central South University》 SCIE EI CAS 2011年第4期1144-1152,共9页
Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and ... Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and air defense systems.The impact on network survivability due to node behaviors was presented,and a quantitative analysis method on survivability was developed in 3D MANETs by modeling node behaviors and analyzing 3D network connectivity.Node behaviors were modeled by using a semi-Markov process.The node minimum degree of 3D MANETs was discussed.An effective approach to derive the survivability of k-connected networks was proposed through analyzing the connectivity of 3D MANETs caused by node misbehaviors,based on the model of node isolation.The quantitative analysis of node misbehaviors on the survivability in 3D MANETs is obtained through mathematical description,and the effectiveness and rationality of the proposed approach are verified through numerical analysis.The analytical results show that the effect from black and gray attack on network survivability is much severer than other misbehaviors. 展开更多
关键词 mobile ad-hoc networks (MANETs) SURVIVABILITY node behaviors semi-Markov process network connectivity
在线阅读 下载PDF
Performance analysis of mobile ad hoc networks under flooding attacks 被引量:1
12
作者 Ping Yi Futai Zou +1 位作者 Yan Zou Zhiyang Wang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第2期334-339,共6页
Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects o... Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects of flooding attacks in network simulation 2 (NS2) and measured performance parameters are investigated, including packet loss ratio, average delay, throughput and average number of hops under different numbers of attack nodes, flooding frequency, network bandwidth and network size. Simulation results show that with the increase of the flooding frequency and the number of attack nodes, network performance sharply drops. But when the frequency of flooding attacks or the number of attack nodes is greater than a certain value, performance degradation tends to a stable value. 展开更多
关键词 mobile ad hoc network SECURITY flooding attack.
在线阅读 下载PDF
A distributed adaptive multi-hop certification authority schemefor mobile Ad Hoc networks 被引量:1
13
作者 TanXuezhi WuShaochuan JiaShilou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期265-272,共8页
This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification aut... This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design. 展开更多
关键词 mobile Ad Hoc networks threshold secret share certification authority.
在线阅读 下载PDF
A reliable routing algorithm based on fuzzy Petri net in mobile ad hoc networks 被引量:2
14
作者 胡志刚 马好 +1 位作者 王国军 廖麟 《Journal of Central South University of Technology》 EI 2005年第6期714-719,共6页
A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structure... A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structured representation of network topology, which has a fuzzy reasoning mechanism for finding the routing sprouting tree from the source node to the destination node in the mobile ad boc environment. Finally, by comparing the degree of reliability in the routing sprouting tree, the most reliable route can be computed. The algorithm not only offers the local reliability between each neighboring node, but also provides global reliability for the whole selected route. The algorithm can be applied to most existing on-demand routing protocols, and the simulation results show that the routing reliability is increased by more than 80% when applying the proposed algorithm to the ad hoc on demand distance vector routing protocol. 展开更多
关键词 mobile ad hoe network fuzzy Petri net certainty factor ad hoc on demand distance vector routing algorithm
在线阅读 下载PDF
Component based ant routing protocols analysis over mobile ad hoc networks 被引量:1
15
作者 曲大鹏 王兴伟 黄敏 《Journal of Central South University》 SCIE EI CAS 2013年第9期2378-2387,共10页
To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.... To deeply exploit the mechanisms of ant colony optimization (ACO) applied to develop routing in mobile ad hoe networks (MANETS),some existing representative ant colony routing protocols were analyzed and compared.The analysis results show that every routing protocol has its own characteristics and competitive environment.No routing protocol is better than others in all aspects.Therefore,based on no free lunch theory,ant routing protocols were decomposed into three key components:route discovery,route maintenance (including route refreshing and route failure handling) and data forwarding.Moreover,component based ant routing protocol (CBAR) was proposed.For purpose of analysis,it only maintained basic ant routing process,and it was simple and efficient with a low overhead.Subsequently,different mechanisms used in every component and their effect on performance were analyzed and tested by simulations.Finally,future research strategies and trends were also summarized. 展开更多
关键词 routing protocol mobile ad hoc networks ant colony optimization route discovery route maintenance data forwarding
在线阅读 下载PDF
Hopfield Neural Network Approach to Clustering in Mobile Radio Networks
16
作者 Jiang Yan Li Chengshu(Northern Jiaotong University,Beijing 100044) 《通信学报》 EI CSCD 北大核心 1995年第4期40-44,共5页
HopfieldNeuralNetworkApproachtoClusteringinMobileRadioNetworksJiangYan;LiChengshu(NorthernJiaotongUniversity... HopfieldNeuralNetworkApproachtoClusteringinMobileRadioNetworksJiangYan;LiChengshu(NorthernJiaotongUniversity,Beijing100044)Ab... 展开更多
关键词 藿普菲尔神经网 串级连接 移动无线电网
在线阅读 下载PDF
The Application of Artificial Neural Network in Assessing Chinese Mobile Internet Service
17
作者 Zhu Jiachuan 《学术界》 CSSCI 北大核心 2014年第6期282-288,共7页
This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore ... This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore the three layers construct of the artificial neural network( ANN) theory is applied to address the problem. The final research model contains MIS features including personalization,localization,reachability,connectivity,convenience and ubiquity as the input layer variables,perceived MIS quality and MIS satisfaction as the hidden layer variables and reuse intention as the output layer variable. MIS risk is identified as the mediating variable. Theoretically,the framework is robust and reveals the mechanism of how customers evaluate a certain mobile Internet service. Practically,the model based on ANN should shed some light on how to understand and improve customer perceived mobile Internet service for both MIS giants and new comers. 展开更多
关键词 人工神经网络 互联网服务 质量管理信息系统 移动 中国 应用 评估 MIS
在线阅读 下载PDF
Guaranteed Consensus Control of Mobile Sensor Networks With Partially Unknown Switching Probabilities
18
作者 Yuan Zhao Ge Guo +2 位作者 Lei Ding Jian Gong Zibao Lu 《自动化学报》 EI CSCD 北大核心 2017年第7期1265-1272,共8页
关键词 移动传感器网络 一致性控制 切换概率 MARKOV跳跃系统 开关控制器 系统稳定性分析 拓扑结构 协商
在线阅读 下载PDF
基于Mobile Agent的SNMP网络管理框架的研究 被引量:4
19
作者 窦炳琳 朱有产 +1 位作者 商李彪 张小松 《华北电力大学学报(自然科学版)》 CAS 北大核心 2004年第3期100-103,共4页
使用 MobileAgent 技术能够克服集中网络管理中扩展性、灵活性等因素的限制来进行管理任务的分配。在讨论 Mobile Agent 的概念、结构及其平台的基础上,提出了一种基于 Mobile Agent 的 SNMP 网络管理框架,描述了系统的工作方式,并对系... 使用 MobileAgent 技术能够克服集中网络管理中扩展性、灵活性等因素的限制来进行管理任务的分配。在讨论 Mobile Agent 的概念、结构及其平台的基础上,提出了一种基于 Mobile Agent 的 SNMP 网络管理框架,描述了系统的工作方式,并对系统进行了评估。 展开更多
关键词 计算机网络 SNMP 网络管理框架 mobile AGENT
在线阅读 下载PDF
基于Mobile Agent技术的主动网络管理体系结构的研究 被引量:11
20
作者 庄力可 杜军平 +1 位作者 涂序彦 赵敏哲 《计算机工程》 CAS CSCD 北大核心 2001年第4期79-81,共3页
随着网络规模的不断扩大,为了提高网络的可靠性和管理水平,需要进一步改进原有的计算机网络管理的体系结构,而基于SNMP协议的传统管理体系已不能适应规模日益扩大网络的需要。在讨论传统的集中式网管体系结构的基础上,探讨移动Agent... 随着网络规模的不断扩大,为了提高网络的可靠性和管理水平,需要进一步改进原有的计算机网络管理的体系结构,而基于SNMP协议的传统管理体系已不能适应规模日益扩大网络的需要。在讨论传统的集中式网管体系结构的基础上,探讨移动Agent 技术在主动网络管理体系结构中的运用。 展开更多
关键词 移动代理 主动网络管理 体系结构 计算机网络 MlbileAgent技术
在线阅读 下载PDF
上一页 1 2 203 下一页 到第
使用帮助 返回顶部