To meet some special needs, this article primarily introduced an automatic node arranging algorithm of Scleronomic Activity-On-Arrow network. By introducing the concept of Main-Path, the thoughts and steps of the algo...
详细信息
ISBN:
(纸本)9781424452729
To meet some special needs, this article primarily introduced an automatic node arranging algorithm of Scleronomic Activity-On-Arrow network. By introducing the concept of Main-Path, the thoughts and steps of the algorithm realization, which means to arrange the nodes around the Main-Path from inside to outside, it helps the readers to understand the algorithm easily. The algorithm provides the necessary technical support to realize the auto drawing of PERT network Chart. Its correctness has been proved in the auto drawings of various project network Charts.
Due to the complexity of wireless local area network (WLAN), the original teaching method cannot meet the needs of development of WLAN. WLAN simulation is an effective means of teaching in WLAN protocol courses. This ...
详细信息
ISBN:
(纸本)9781424452729
Due to the complexity of wireless local area network (WLAN), the original teaching method cannot meet the needs of development of WLAN. WLAN simulation is an effective means of teaching in WLAN protocol courses. This paper introduces the principle and characteristic of NS-3, proposes using open source software NS-3 as an assistant ways to improve the WLAN teaching quality, and also discusses the application of NS-3 in WLAN education as well. An example is provided at the end of this paper.
The study of the multicast routing protocol of multi-constrained is important for the development of the high performance network The aims are the multi-constrained network model and the definition of the formula of e...
详细信息
ISBN:
(纸本)9781424452729
The study of the multicast routing protocol of multi-constrained is important for the development of the high performance network The aims are the multi-constrained network model and the definition of the formula of every constrained characteristic measurement. However, it is a NP-complete problem. In order to gain the approximative solution, many heuristic algorithms have been designed by filling all kind of constraints. A few kind of classical routing algorithms at the optimization aspect have been analyzed and compared. The question has been pointed out in the protocol study.
The current mine industrial Ethernet that put into use did not connect and transmit multimedia video load in parallel, aimed at the actual working condition of severe influence on real time of network transmission tha...
详细信息
ISBN:
(纸本)9781424452729
The current mine industrial Ethernet that put into use did not connect and transmit multimedia video load in parallel, aimed at the actual working condition of severe influence on real time of network transmission that caused by multimedia load, and in order to transmit data load and multimedia load in real-time, it is necessary to design one effective scheduling strategy. According with the requirements of transmitting data load and multimedia load, the scheduling strategy of bandwidth detection with weighted queue is pointed out, and its simulation result shows that the scheduling strategy of bandwidth detection with weighted queue dynamically could guarantee the network transmission of data load and multimedia load in real time based on allocating limited bandwidth rationally.
Multicast applications in imbalanced environment require the equal computation for each mobile node. An ECC-based hierarchical key agreement scheme, ECC-GDH, is proposed in this paper. The scheme divides the responsib...
详细信息
ISBN:
(纸本)9781424452729
Multicast applications in imbalanced environment require the equal computation for each mobile node. An ECC-based hierarchical key agreement scheme, ECC-GDH, is proposed in this paper. The scheme divides the responsibility of computation into each member so as to achieve the equality demand. Moreover, the scheme also achieves forward and backward secrecy. Finally, we obtain an access control model by using ECC-GDH.
Ad Hoc network is brittle and vulnerable because of its special characteristics: dynamic topology, multi-hop wireless communication, and restricted resources. Attacks emerge endlessly aiming at the routing protocols a...
详细信息
ISBN:
(纸本)9781424452729
Ad Hoc network is brittle and vulnerable because of its special characteristics: dynamic topology, multi-hop wireless communication, and restricted resources. Attacks emerge endlessly aiming at the routing protocols and the network. First, we analyze the security goals and threats in the paper. And then a neighbor sensor election method, a competition mechanism, is described. Neighbor sensors cooperate to detect the attacks in AODV. Finally, we propose an FSM-based intrusion detection diagram for AODV to present current routing states and detecting attacks states.
Adopting the machine learning method to identify the traffic in the broadband network has become a new research direction in this field. In this paper, we evaluate 11 kinds of supervised learning algorithm of the mach...
详细信息
ISBN:
(纸本)9781424452729
Adopting the machine learning method to identify the traffic in the broadband network has become a new research direction in this field. In this paper, we evaluate 11 kinds of supervised learning algorithm of the machine learning through the index of testing time, modeling time, accuracy rate and CPU utilization ratio, then select suitable algorithms for the broadband network. Through the analysis we draw the conclusion that the algorithms of C4.5, RandomTree. OneR and BayesNet fit the traffic identification in the broadband network.
A distributed computing application can be used to do calculation-intensive multimedia content computing too, such as video optical character recognition, shot detection and so on. Meanwhile,the Web is catalyzing a tr...
详细信息
ISBN:
(纸本)9781424452729
A distributed computing application can be used to do calculation-intensive multimedia content computing too, such as video optical character recognition, shot detection and so on. Meanwhile,the Web is catalyzing a transition from PC-based software and file systems to Internet-based applications and Web services. We aim at the combination of multimedia computing and Web technologies (Web Services) together that supports uniform naming, protection, and access for multimedia Content objects stored by Web services to accomplish distributed computing. At a high level, it creates an integrated file and object system from heterogeneous, multimedia content objects dispersed across the Internet. Based on this fact, we proposed a novel framework of distributed multimedia computing in this paper. In this framework, the concept of workflow which can describe business processes logically is introduced. Some experiments show the effectiveness of the proposed framework
A large-scale authentication architecture and key management protocol based on combined symmetric key (CSK) algorithm are proposed. Through the CSK algorithm and smart card technology, the authentication process can b...
详细信息
ISBN:
(纸本)9781424452729
A large-scale authentication architecture and key management protocol based on combined symmetric key (CSK) algorithm are proposed. Through the CSK algorithm and smart card technology, the authentication process can be finished inside the chips, and the management of large-scale keys can be simplified to the management of small-scale key seeds. The security of the proposed architecture is analyzed and the test data are shown. It is obvious that the large-scale identity authentication and management abilities are improved while the building cost is reduced evidently with the application of the proposed infrastructure;it is an applicable solution for real-name authentication network.
In recent years, investigations on Ad Hoc networks have received considerable interest due to its capability to deploy quickly without any infrastructure. And with the development of mobile terminal, mobile CSCW gradu...
详细信息
暂无评论