According to several attributes of network structure, firstly, we give a summary about some related works of network stability. And then, through the simulation experiments, we explored the influence of network densit...
详细信息
According to several attributes of network structure, firstly, we give a summary about some related works of network stability. And then, through the simulation experiments, we explored the influence of network density and network size on the stability of complex networks and got some interesting conclusions. Finally, we defined a factor η for the connection strength of community, and we speculate that there is a threshold η c , it led to the network stability decreased and then increased with the increase of η, and eventually reached a peak.
Two analytical drain current models for organic thin-film transistors(OTFTs)are *** first one is the surface potential based drain current model considering both deep and tail trap states densities within the energy g...
详细信息
Two analytical drain current models for organic thin-film transistors(OTFTs)are *** first one is the surface potential based drain current model considering both deep and tail trap states densities within the energy gap,and the model is valided in both subthreshold and above-threshold *** second one is the polynomial based model valided in above-threshold regime,and the model has the advantage in the simple parameter extraction steps by fitting the experimental effective mobility with the polynomial *** presented models are verified with the experimental data, and good agreements are obtained.
Analysis of the Vehicle Behavior is mainly to analyze and identify the vehicles' motion pattern, and describe it by the use of natural language. It is a considerable challenge to analyze and describe the vehicles&...
详细信息
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is *** the chosen ciphertext...
详细信息
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is *** the chosen ciphertext security model,by using identity(ID) sequence and adding additional information in ciphertext,the self-adaptive chosen identity security(the full security) and the chosen ciphertext security are gained *** reduction of scheme's security is the decisional bilinear Diffie-Hellman(BDH) intractable assumption,and the proof of security shows that the proposed scheme is indistinguishable against adaptive chosen ciphertext attacks in the standard model under the decisional BDH intractable *** the security level is improved,and it is suitable for higher security environment.
Traditional smart home system based on TCP/IP network applies TC35i cell phone module in smart home controller, and realizes function of short message service by GSM network. This realization model is complex, high-co...
详细信息
Scientific workflow system (SWFs) is a tool which is used in scientific research. SWFs is a useful tool that brings remote data access and management under distributed infrastructures to the desktop. Because the Scien...
详细信息
Component-based software development is an effective and efficient approach to improve productivity and quality of software development. So far, almost all the technologies of software components focus on component de...
详细信息
From the view of signal processing in the frequency domain, a scheme for the return-to-zero (RZ) to nonreturn-to-zero (NRZ) signal data format conversion based on a tunable microwave photonic filter is analyzed and de...
详细信息
From the view of signal processing in the frequency domain, a scheme for the return-to-zero (RZ) to nonreturn-to-zero (NRZ) signal data format conversion based on a tunable microwave photonic filter is analyzed and demonstrated. Theoretically, the spectral characteristics of RZ and NRZ baseband signals and microwave photonic filter characteristics are analyzed. It is found that RZ to NRZ data format conversion can be successfully realized by a low-pass filter on the RZ signal with strong suppressing the clock component of the RZ data. In the experimental demonstration, a 10 Gbit/s NRZ signal is successfully converted from a RZ signal by utilizing an two-tap microwave photonic filter with two different light sources and intensity modulation. Both waveform and spectrum show the signal has good quality. In addition, signals with various repetition rate can be well processed by simply adjusting some parameters of the filter. It is shown that this scheme is very simple and flexible.
In this paper, the feasibility of co-channel coexistence of Time Division- Synchronous Code Division Multiple Access (TD-SCDMA) and Code Division Multiple Access 2000 (CDMA2000) systems operating in a macro cell envir...
详细信息
After the discussion of field research scientific significance, the system quality of service (QoS), reputation mechanisms and reputation incentive were reviewed respectively. Finally, the issue remains in this area w...
详细信息
After the discussion of field research scientific significance, the system quality of service (QoS), reputation mechanisms and reputation incentive were reviewed respectively. Finally, the issue remains in this area were summarized after the overseas research review. After years of study, it has been some progress in the field of E-services reputation mechanism, the problem forced to be resolved are inconsistent definitions of trust, lack of feedback incentive, poor security of trust model, high complexity of trust model to achieve. Therefore, problems such as peer-to-peer (P2P) E-services QoS evaluation model, two-way trust model integrated with QoS and reputation incentives, trust model security, are becoming the focus and main direction of our future work.
暂无评论