首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 234 毫秒
1.
向彪 《信息与电脑》2011,(1):111-111
移动Ad hoc网络又称MANET,具有多跳路由和拓扑动态变化的特点,是一种特殊的无线移动通信网络。本文提出了一种基于稳定拓扑和蚁群优化的Ad hoc网络多路由算法SAMR。  相似文献   

2.
简单介绍MANET(Mobile Ad hoc Network) 路由协议后,提出定量评估MANET路由协议性能的六个基本指标。基于网络仿真器NS2阐述了评估和测试路由协议性能的仿真模型及数据结果的分析方法,并给出仿真实例及其分析。结果表明,模型仿真结果接近理论分析和实际情况,该性能评估方法有较强的实用性和通用性。  相似文献   

3.
肖昆  郑记 《计算机应用与软件》2007,24(4):157-158,173
移动自组织网络(Mobile Ad hoc Networks,MANET)是一种开放性的媒介系统,从而很容易受到黑客的入侵.提出了一种有效的适应于MANET的入侵检测系统,叫做MAPIDS(Mobile Agent-based Peer-to-peer Intrusion Detection System).该系统一旦发现网络中的可疑行为,就会引发一次集体投票过程,以确定该可疑行为是否是入侵行为,并根据投票结果作出相应的进一步处理.相比于其他同样基于集体决策机制的入侵检测系统,MAPIDS节省了更多的网络带宽和电池能耗,并且该系统不存在稀疏节点问题.  相似文献   

4.
基于NS-2的MANET路由协议仿真及性能评估   总被引:1,自引:0,他引:1  
简单介绍MANET(Mobile Ad hoc Network)路由协议后,提出定量评估MANET路由协议性能的六个基本指标。基于网络仿真器NS-2阐述了评估和测试路由协议性能的仿真模型及数据结果的分析方法,并给出仿真实例及其分析。结果表明,模型仿真结果接近理论分析和实际情况,该性能评估方法有较强的实用性和通用性。  相似文献   

5.
基于机器学习的移动自组织网络入侵检测方法   总被引:1,自引:0,他引:1  
杨德明  潘进  赵爽 《计算机应用》2005,25(11):2557-2558
移动自组织网络是由无线移动节点组成的复杂分布式通信系统。研究了移动自组织网络的入侵检测问题,采用了一种新型的基于机器学习算法的异常入侵检测方法。该方法获取正常事件的内部特征的相互关系模式,并将该模式作为轮廓检测异常事件。在Ad hoc 按需距离向量协议上实现了该方法,并在网络仿真软件QualNet中对其进行了评估。  相似文献   

6.
随着Ad hoc网络的发展,无线网络安全问题愈加突出。由于移动Ad hoc网络与有线网络存在很大差别,针对有线网络开发的入侵检测系统很难适用于移动Ad hoc网络。文章分析了移动Ad hoc网络中入侵检测所面临的挑战,时现有的几种典型Ad hoc网络入侵检测方案进行了综合的比较和研究。对移动Ad hoc中入侵检测技术的选择和下一步的研究方向提出了建议。  相似文献   

7.
对Ad hoc网络各种路由协议进行仿真评估,分析它们在不同约束条件下不同度量的相对性能,是了解与学习路由协议性能的重要手段.目前的度量标准主要集中在吞吐量、延时、抖动、丢包率等QoS因子或路由负载、寻路时间等外部特性上,还没有以Ad hoc网络系统本身的连通度作为度量标准进行仿真,评价各种路由协议在不同试验条件下对于同一网络系统连通度的影响的相关研究.基于能量模型、节点密度、停留时间及移动速率四种约束条件对MANET提出的四种路由协议进行了关于网络连通度的仿真与评估,给出了这方面的初步结论.  相似文献   

8.
基于SVM的MANET路由层入侵检测*   总被引:1,自引:0,他引:1  
针对MANET(移动自组织网络)路由层的攻击,通过对MANET路由层AODV(Ad hoc on-demand distance vector)路由协议交互行为的分析,提取了9个路由交互过程特征,将入侵检测问题转换为对正常行为和异常行为分类识别问题,采用SVM(支持向量机)算法,设计了一种分布式异常检测系统。仿真结果表明,使用该检测系统的检测率达到97%以上,从而验证了该系统的可行性,同时也验证了所提取的路由交互行为特征的有效性。  相似文献   

9.
移动Ad hoc网络是一种高度动态的无线网络,路由成为其实际应用中必须解决的关键问题.目前基于拓扑的MANET路由协议大多不具有良好的可扩展性.为此面向Ad hoc组网应用,提出一种具有可扩展性的中心控制路由协议.仿真结果和性能分析表明,在大型Ad hoc网络组网中,该路由协议具有较好的可扩展性和较高的分组递送率,并提供了QoS路由实现手段.  相似文献   

10.
移动自组织网络是由无线移动节点组成的复杂分布式通信系统.研究了移动自组织网络的入侵检测问题,对当前Ad hoc网络上的入侵行为和入侵检测技术进行了分析,论述了学习Petri网络应用于入侵检测系统中的优势,给出了一个基于学习Petri网络的入侵检测实施模型,并在网络仿真软件ns2中对其进行了评估.  相似文献   

11.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

12.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

13.
本文分析了法律数据库的结构和特点,介绍了采用面向对象设计方法和超文本数据库技术开发和实现法律信息库系统将作为重要网络资源之一为不同用户进行法律咨询服务。  相似文献   

14.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

15.
16.
17.
正SCIENCE CHINA Information Sciences(Sci China Inf Sci),cosponsored by the Chinese Academy of Sciences and the National Natural Science Foundation of China,and published by Science China Press,is committed to publishing highquality,original results of both basic and applied research in all areas of information sciences,including computer science and technology;systems science,control science and engineering(published in Issues with odd numbers);information and communication engineering;electronic science and technology(published in Issues with even numbers).Sci China Inf Sci is published monthly in both print and electronic forms.It is indexed by Academic OneFile,Astrophysics Data System(ADS),CSA,Cabells,Current Contents/Engineering,Computing and Technology,DBLP,Digital Mathematics Registry,Earthquake Engineering Abstracts,Engineering Index,Engineered Materials Abstracts,Gale,Google,INSPEC,Journal Citation Reports/Science Edition,Mathematical Reviews,OCLC,ProQuest,SCOPUS,Science Citation Index Expanded,Summon by Serial Solutions,VINITI,Zentralblatt MATH.  相似文献   

18.
正Erratum to:J Zhejiang Univ-Sci C(ComputElectron)2014 15(7):551-563doi:10.1631/jzus.C1300320The original version of this article unfortunately contained mistakes.Algorithm 6 should be as follows:Algorithm 6 FGKFCM-F clustering Input:(1)X={x_1,x_2,…,x_N},,x_iR~d,i=1,2,…,N,the dataset;(2)C,1C≤N,the number of clusters;(3)ε0,the stopping criterion;  相似文献   

19.
20.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号