首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2篇
  免费   3篇
  国内免费   1篇
无线电   5篇
自动化技术   1篇
  2018年   1篇
  2016年   1篇
  2014年   1篇
  2013年   1篇
  2012年   1篇
  2010年   1篇
排序方式: 共有6条查询结果,搜索用时 203 毫秒
1
1.
智慧边缘计算安全综述   总被引:1,自引:0,他引:1       下载免费PDF全文
边缘计算将传统的云服务扩展到网络边缘,更贴近用户,适用于具有低时延需求的网络服务。随着边缘计算范式的兴起,其安全问题也得到越来越多的关注。首先介绍了边缘计算范式的基本概念、系统架构以及与其他计算范式的关系。然后分析了当前边缘计算中存在的安全威胁,并针对各种安全威胁探讨了相应的安全技术问题。最后对边缘计算安全技术中关键的入侵检测、访问控制、防御策略、密钥管理技术进行了分析,并提出了进一步研究方向。  相似文献   
2.
学术界近期提出了基于扁平结构的分布式哈希表(DHT)名系统,用以克服现有名系统域名解析系统(DNS)存在的缺陷,如不支持数据的移动、复制等,但由于其解析时延较大,不适于实际应用。为此,综合DNS名系统及DHT名系统的优点,设计了两种新的系统:第一种系统采用One-hop DHT形式,三层环结构实现,适于小环境应用;第二种采用混合结构DHT形式,分域实现,适于全球性应用。经理论分析证明这两套系统在实际应用中是可行的。  相似文献   
3.
Internet of Things(IoT) refers to an infrastructure which enables the forms of communication and collaboration between people and things,and between things themselves.In order to improve its performance,we present a tradeoff between bandwidth and energy consumption in the IoT in this paper.A service providing model is built to find the relationship between bandwidth and energy consumption using a cooperative differential game model.The game solution is gotten in the condition of grand coalition,feedback Nash equilibrium and intermediate coalitions and an allocation policy is obtain by Shapley theory.The results are shown as follows.Firstly,the performance of IoT decreases with the increasing of bandwidth cost or with the decreasing of energy cost;secondly,all the nodes in the IoT composing a grand coalition can save bandwidth and energy consumption;thirdly,when the factors of bandwidth cost and energy cost are equal,the obtained number of provided services is an optimised value which is the trade-off between energy and bandwidth consumption.  相似文献   
4.
The architecture of cislunar multi-hop communication networks, which focuses on the re-quirements of lunar full-coverage and continuous cislunar communications, is presented on the basis of Geosynchronous Orbit (GEO) satellite network relays. According to the geographical distribution of the forthcoming Chinese Deep Space Measuring and Controlling Network (DSMCN ), two networking schemes are proposed and two elevation angle opti-mization models are established for locating GEO relay satellites. To analyze the dynamic connectivi-ty, a dynamic network model is constructed with re-spect to the time-varying characteristics of cislunar trunk links. The advantages of the two proposed schemes, in terms of the Connectivity Rate (CR), In-terruption Frequency (IF), and Average Length of Connecting Duration (ALCD), are corroborated by several simulations. In the case of the lunar polar orbit constellation case, the gains in the perform-ance of scheme I are observed to be 134.55% , 117. 03% , and 217. 47% compared with DSMCN for three evaluation indicators, and the gains in the per-formance of scheme II are observed to be 238.22% , 240.40% , and 572.71% . The results validate that the connectivity of GEO satellites outperforms that of earth facilities significantly and schemes based on GEO satellite relays are promising options for cislu-nar multi-hop communication networking.  相似文献   
5.
宽带卫星网络中,下载带宽是非常宝贵的资源。而使用宽带卫星网络下载带宽的用户有着自身的特点,即下载带宽需求量不同。为此,本文将研究高效的的下载带宽分配策略。Stackelberg模型可以解决层次化资源合理分配问题。应用该模型,带卫星网络用户被分成两个组。一组是下载需求量大的用户组;另一组是,下载需求量小的用户组。分别对其建立优化函数,利用Stackelberg求解算法得到各用户最佳的下载带宽。数值仿真实验验证了分配策略的有效性。  相似文献   
6.
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclu-sions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号