The aerosol fire extinguishing agent is a complex pyrotechnic composition, and the extinguishing efficiency need a series of experiments to identify. A method is put forward out based on combining back-propagation neu...
详细信息
The expansion mechanism of expandable graphite (EG) was studied systematically in this paper. Based on the feature of the structure and the linear expansion of expandable graphite, a simple expansion model was establi...
详细信息
A new fast numerical algorithm for the double-order double-argument Hankel transformation is proposed in this article. Due to the fact of rapid oscillation and slow attenuation of the kernel function, it is difficult ...
详细信息
A new fast numerical algorithm for the double-order double-argument Hankel transformation is proposed in this article. Due to the fact of rapid oscillation and slow attenuation of the kernel function, it is difficult to compute numerically. The New Algorithm break up the infinite integral interval into two subintervals. For the infinite subinterval, the integral can be calculated by Fast Fourier Transformation (FFT) efficiently; For the other finite integral, there has two choice, the one is ordinary quadrature algorithm which is simple but no efficient enough, the other is to express the integral as a summation series of the Bessel function integral, and then the calculus can be done with more efficient manner.
In the New-Generation Network, information-centric Networking (ICN) is one of the most promising technologies for communication systems which are suitable for the content data provisioning and delivery from/to users. ...
详细信息
In the New-Generation Network, information-centric Networking (ICN) is one of the most promising technologies for communication systems which are suitable for the content data provisioning and delivery from/to users. To create a new ICN on the JGN-X network virtualization platform, developing new networking technologies such as virtual network resources control from users, in-network processing for content data creation, and energy efficient routing on the virtual network, were challenged.
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. In MANETS, the performance is significantly degraded as the scale of the network grows, which has lot...
详细信息
ISBN:
(纸本)9781849198431
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. In MANETS, the performance is significantly degraded as the scale of the network grows, which has lots of difficulties in accessing control, bandwidth distribution, resource assign and congestion control. Therefore, in this paper, we have proposed an online self-organized group establishing mechanism for strategic mobile scenarios of MANETs to realize the maneuverability of putting the secure group operations into effect. First of all, the algorithm performs initialization for each node, and then the nodes determine group-manager based on condition function and invite neighboring nodes to join in, finally, the rest nodes without grouping confirm their own groups by the group condition function. Both theoretical analysis and simulation experiments have demonstrated that our method can meet the scalability requirement which plays an important role in prolonging the network lifetime and effectively saving the communication, computation and storage overhead in strategic mobile scenario of MANETs.
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. In MANETS, the performance is significantly degraded as the scale of the network grows, which has lot...
详细信息
ISBN:
(纸本)9781849198431
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. In MANETS, the performance is significantly degraded as the scale of the network grows, which has lots of difficulties in accessing control, bandwidth distribution, resource assign and congestion control. Therefore, in this paper, we have proposed an online self-organized group establishing mechanism for strategic mobile scenarios of MANETs to realize the maneuverability of putting the secure group operations into effect. First of all, the algorithm performs initialization for each node, and then the nodes determine group-manager based on condition function and invite neighboring nodes to join in, finally, the rest nodes without grouping confirm their own groups by the group condition function. Both theoretical analysis and simulation experiments have demonstrated that our method can meet the scalability requirement which plays an important role in prolonging the network lifetime and effectively saving the communication, computation and storage overhead in strategic mobile scenario of MANETs.
In this paper, we consider multiple primary and multiple secondary users cooperative cognitive radio networks, in which the primary users (PUs) lease a portion of their spectrum to the secondary users (SUs) for some r...
详细信息
Based on the P2P structure,a coordinated attack model with multi-nodes is presented for introduction from link configuration,broadcast mechanism and attack *** P2P,Pure P2P and Super P2P are discussed in link configur...
详细信息
Based on the P2P structure,a coordinated attack model with multi-nodes is presented for introduction from link configuration,broadcast mechanism and attack *** P2P,Pure P2P and Super P2P are discussed in link configuration ***,BCRM and DRM mechanisms are introduced in broadcast *** attack methods mainly focus on the index poisoning and routing table *** model is advanced in high attack flexibility,no single point of failure,high freedom in node attack,difficult to cluster and identify the attack traffic,difficult to trace the attacker,robustness,etc.,and it is suitable for wireless network confrontation.
The CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance) mechanism is formally modeled ***,based on the Markov Chain theory,the analysis of the attack on CSMA/CA is introduced from two aspects which are the...
详细信息
The CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance) mechanism is formally modeled ***,based on the Markov Chain theory,the analysis of the attack on CSMA/CA is introduced from two aspects which are the stochastic performance model and bandwidth share *** discussing the typical attack methods,the performance is analyzed from the aspects of throughput,communication efficiency,and collision numbers,which validates the feasibility and efficiency of attack method based on Markov Chain theory.
暂无评论