A new and feasible trusted remediation model was built with its function and work flow explained in detail. Moreover, the communication and authentication process of remediation model were discussed. Simulation result...
详细信息
A new and feasible trusted remediation model was built with its function and work flow explained in detail. Moreover, the communication and authentication process of remediation model were discussed. Simulation results show that the proposed model can not only ensure the safety and reliability of network, but also provide remediation services for those terminal users who fail to meet the security policy demand.
After analyzing the specific security requirements of the wireless communication network based on IEEE802.16, a series of key issues about security methods and techniques were researched. A new authentication protocol...
详细信息
After analyzing the specific security requirements of the wireless communication network based on IEEE802.16, a series of key issues about security methods and techniques were researched. A new authentication protocol for wireless mobile environment was proposed and designed. Then, its security was analyzed from the angle of technical realization and formal analysis to verify whether the original safety goals were achieved. Especially, formal analysis was mostly done. Finally, system testing was also carried out and the results were analyzed to verify function and performance of the new protocol.
This paper first gives an analysis of data aggregation and data compression based on energy consumption of sensor nodes, after which an approach is proposed to construct an aggregation tree in the case of non-perfect ...
详细信息
This paper first gives an analysis of data aggregation and data compression based on energy consumption of sensor nodes, after which an approach is proposed to construct an aggregation tree in the case of non-perfect aggregation, since GIT considers only the case of perfect aggregation and it does not work well if the aggregation is non-perfect. An assessment scheme that can get the information of hops from the aggregation point to the sink and the hops from the aggregation point to the source node is used to construct such an aggregation tree. Moreover, the energy consumption of the aggregation is also considered. This scheme can be used when perfect aggregation cannot be performed. In this paper, an approach to reduce the cost of reinforcement is also proposed, in which the reinforcement work is done by the source nodes themselves, not by the sink node. Simulation result shows that this approach can save more energy than GIT when the aggregation ratio is small. This result also provides a theoretical limit of aggregation to tell when GIT will lose its superiority and thus gives a direction to choose among the aggregation algorithms. Another result shows that the further the sources are away from the sink, the less reinforcement messages are needed. Finally a guidance to tell when to use the EGA (energy consumption assessment) scheme is given.
Signed network is an important kind of complex network, which includes both positive relations and negative relations. Communities of a signed network are defined as the groups of vertices, within which positive relat...
详细信息
Signed network is an important kind of complex network, which includes both positive relations and negative relations. Communities of a signed network are defined as the groups of vertices, within which positive relations are dense and between which negative relations are also dense. Being able to identify communities of signed networks is helpful for analysis of such networks. Hitherto many algorithms for detecting network communities have been developed. However, most of them are designed exclusively for the networks including only positive relations and are not suitable for signed networks. So the problem of mining communities of signed networks quickly and correctly has not been solved satisfactorily. In this paper, we propose a heuristic algorithm to address this issue. Compared with major existing methods, our approach has three distinct features. First, it is very fast with a roughly linear time with respect to network size. Second, it exhibits a good clustering capability and especially can work well with complex networks without well-defined community structures. Finally, it is insensitive to its built-in parameters and requires no prior knowledge.
In this paper, a genetic algorithm approach with a novel mutation operator based on perturbation and local search has been proposed to solve an advanced planning and scheduling (APS) model in manufacturing supply chai...
详细信息
The difficulties of modeling complex knowledge system lie in a large quantity of knowledge rules and the difficulty in organizing rules and grasping their mutual logical relationships. This article proposed a concept ...
详细信息
Description Logics are formalisms for representing knowledge of various domains in a structured and formally well-understood way. Typically, DLs are limited to dealing with precise and well defined concepts. In this p...
详细信息
ISBN:
(纸本)9781601320254
Description Logics are formalisms for representing knowledge of various domains in a structured and formally well-understood way. Typically, DLs are limited to dealing with precise and well defined concepts. In this paper we first present a fuzzy extension of ALC and define its syntax and semantics. Then we devote to taking advantage of the expressive power and reasoning capabilities of fuzzy ALC by encoding flexible planning problems within the framework of fuzzy ALC. Both theory and experimental results have shown that our method is sound and efficient.
It is inadequate considering only one aspect of spatial information in practical problems, where several aspects are usually involved together. Reasoning with multi-aspect spatial information has become the focus of q...
详细信息
The existing 3D direction models approximate spatial objects either as a point or as a minimal bounding block, which decrease the descriptive capability and precision. Considering the influence of object's shape, ...
详细信息
At present, qualitative spatial reasoning has become the hot issues in many research fields. The most popular models of spatial topological relations are Region Connection Calculus (RCC) and 9-intersection model. Howe...
详细信息
暂无评论