共查询到20条相似文献,搜索用时 78 毫秒
1.
杨卫东 《计算机工程与应用》2010,46(21):111-115
Ad Hoc网络是一种多跳的自组织网络,网络是由移动的节点组成。Ad Hoc网络的许多应用都依赖层次结构的支持,簇结构是Ad Hoc网络中应用最为广泛的层次结构,而这种层次结构的形成和维护依赖于某种分簇算法。在研究已有分簇算法的基础上,提出了一种新的基于权值的分簇算法(NWCA),通过对算法进行分析和仿真测试,证明了该算法的有效性。 相似文献
2.
3.
在分析目前4种典型的Ad Hoc网络分簇算法优缺点的基础上,提出了应用计算几何中最小覆盖问题算法,并借鉴了GSM、CDMA移动通讯中的蜂窝位置管理技术,设计了一种基于动态分区技术新的Ad Hoc网络分簇算法:将Ad Hoc网络中的各个节点动态地划分为若干个动态分区,每个动态分区就是一个簇,并确定了簇头更新策略.实践证明,该分簇算法计算复杂度低,具有较高的适应性. 相似文献
4.
杨卫东 《计算机工程与应用》2009,45(25):111-114
Ad Hoc网络是一种多跳的自组织网络,网络是由移动的节点组成。Ad Hoc网络的许多应用都依赖层次结构的支持,簇结构是Ad Hoc网络中应用最为广泛的层次结构,而这种层次结构的形成和维护依赖于某种分簇算法。提出了移动节点的平均连接度计算方法,并在此基础上提出了一种新的分簇算法(MCDA),通过对算法进行分析和仿真测试,证明了该算法的有效性。 相似文献
5.
分布式PKI在移动Ad Hoc网中的应用 总被引:1,自引:0,他引:1
介绍了一种基于椭圆曲线和门限算法的数字签名算法,并提出了一个基于分布式PKI的移动Ad Hoc网络安全体系结构。该体系结构中主要采用了分布式PKI安全机制、门限密钥管理、椭圆曲线算法和动态网络分簇思想。分布式PKI和门限密钥管理的应用增加了系统的安全性、容错性,椭圆曲线算法的应用减少了对移动节点的性能的要求,分簇算法的应用减少了对节点容量的要求。 相似文献
6.
分布式PKI在移动Ad Hoc网中的应用 总被引:1,自引:0,他引:1
介绍了一种基于椭圆曲线和门限算法的数字签名算法,并提出了一个基于分布式PKI的移动Ad Hoc网络安全体系结构。该体系结构中主要采用了分布式PKI安全机制、门限密钥管理、椭圆曲线算法和动态网络分簇思想。分布式PKI和门限密钥管理的应用增加了系统的安全性、容错性,椭圆曲线算法的应用减少了对移动节点的性能的要求,分簇算法的应用减少了对节点容量的要求。 相似文献
7.
8.
分簇Ad Hoc网络的密钥管理 总被引:2,自引:0,他引:2
Ad Hoc网络可以不依赖于现有网络基础设施,快速搭建起一个移动通信网络,然而其灵活特性又使其安全性面临着严峻的挑战。密钥管理是Ad Hoc网络安全的关键技术,本文首先回顾了Ad Hoc网络密钥管理方面的研究,然后基于分簇的网络结构给出了一种新的Ad Hoc网络密钥管理方案。方案使用了身份签密的密码算法,不需要公钥证书的存在,用户以其身份标识作为公钥,有效地降低了用户终端计算、存储能力的需求和系统密钥管理的通信开销。基于分簇的结构将网上节点分成一些相对独立的自治域,既提高了安全服务的可用性和可扩充性,也便于对某些紧急情况快速做出反应。 相似文献
9.
10.
11.
12.
地图匹配( MM)算法通过粒子滤波( PF)利用室内地图信息来抑制基于惯性传感器的室内定位系统的误差累计。利用区域生长( RG)算法结合当前步长和方向信息在地图上找到合理的落脚范围,并以此来判断粒子的有效性。这种方法能有效改善地图配准算法的实用性和计算复杂度。提出一种改进的零速度( ZV)检测算法能准确提取步伐信息,间接提升了零速度更新( ZUPT)算法和地图配准算法的精度。实验结果表明:该算法的定位误差小于1.0%,定位精度比单纯的航位推算( DR)算法平均提高了5.97%。 相似文献
13.
This research investigates the impact of intellectual capital components on the competitive advantage in the Jordanian telecommunication companies. The empirical findings indicate that the relational capital and the structural capital have positive impact on competitive advantage. Both the relational capital and the structural capital account for 48.4% of the competitive advantage. It is unexpected to find that the human capital does not have a significant direct impact on competitive advantage. However, it is valid to state that the human capital indirectly and significantly influences competitive advantage as it is embedded in the relational capital. The effect of the relational capital on competitive advantage is moderated by gender and age. The effect is strongest among younger men. In the case of the structural capital its effect is moderated by gender only such that the effect is slightly stronger for females rather than males. 相似文献
14.
15.
一、引言计算机仿真接口界面,随着计算机软硬件的不断提高也在快速地变化着。从其发展趋势中我们不难看出这一点:从早期的命令行提示编辑Command Line,到全屏幕菜单编辑(Menu based Editor),再到图形用户界面Graphic User In-terface(GUI),界面在不断追求如何更好地适应用户、与用户更直接地交互。其具体特点包括自然而又丰富的色彩、逼真而又完美的几何造型、柔和而又动听的环境声响、质感而又具有力反馈的实物等。这些人们所需要的真实感,一种技术是难以胜任的,它需要各种软、硬件技术的综合与集成。从目前的趋 相似文献
16.
S. Suja Priyadharsini 《Applied Soft Computing》2012,12(3):1131-1137
Electroencephalography (EEG) is the recording of electrical activity of neurons within the brain and is used for the evaluation of brain disorders. But, EEG signals are contaminated with various artifacts which make interpretation of EEGs clinically difficult. In this research paper, we use a soft-computing technique called ANFIS (Adaptive Neuro-Fuzzy Inference System) for the removal of EOG artifact, combined EOG and EMG artifact. Improvement in the output signal to noise ratio and minimum mean square error are used as the performance measures. The outputs of the proposed technique are compared with the outputs of techniques such as neural network, based on ADALINE (Adaptive Linear Neuron) and adaptive filtering method, which makes use of RLS (Recursive Least Squares) algorithm through wavelet transform (RLS-Wavelet). The obtained results show that the proposed method could significantly detect and suppress the artifacts. 相似文献
17.
The Prize-collecting Steiner Tree Problem (PCSTP) is a well-known problem in graph theory and combinatorial optimization. It has been successfully applied to solve real problems such as fiber-optic and gas distribution networks design. In this work, we concentrate on its application in biology to perform a functional analysis of genes. It is common to analyze large networks in genomics to infer a hidden knowledge. Due to the NP-hard characteristics of the PCSTP, it is computationally costly, if possible, to achieve exact solutions for such huge instances. Therefore, there is a need for fast and efficient matheuristic algorithms to explore and understand the concealed information in huge biological graphs. In this study, we propose a matheuristic method based on clustering algorithm. The main target of the method is to scale up the applicability of the currently available exact methods to large graph instances, without loosing too much on solution quality. The proposed matheuristic method is composed of a preprocessing procedures, a heuristic clustering algorithm and an exact solver for the PCSTP, applied on sub-graphs. We examine the performance of the proposed method on real-world benchmark instances from biology, and compare its results with those of the exact solver alone, without the heuristic clustering. We obtain solutions in shorter execution time and with negligible optimality gaps. This enables analyzing very large biological networks with the currently available exact solvers. 相似文献
18.
Wavelet-based envelope features with automatic EOG artifact removal: Application to single-trial EEG data 总被引:1,自引:0,他引:1
Wei-Yen Hsu Chao-Hung LinHsien-Jen Hsu Po-Hsun ChenI-Ru Chen 《Expert systems with applications》2012,39(3):2743-2749
In this study, we propose an analysis system for single-trial classification of electroencephalogram (EEG) data. Combined with automatic EOG artifact removal and wavelet-based amplitude modulation (AM) features, the support vector machine (SVM) classifier is applied to the classification of left finger lifting and resting. Automatic EOG artifact removal is proposed to eliminate the EOG artifacts automatically by means of independent component analysis (ICA) and correlation coefficient. The features are then extracted from the discrete wavelet transform (DWT) data by the AM method. Finally, the SVM is used for the discriminant of wavelet-based AM features. Compared with EEG data without EOG artifact removal, band power features and LDA classifier, the proposed system achieves promising results in classification accuracy. 相似文献
19.
20.
VoIP认证与计费的设计与实现 总被引:1,自引:0,他引:1
基于RADIUS的VoIP认证系统,采用分散受理、集中管理的接入认证管理体系,数据集中存放在认证中心(RADIUS服务器),用户身份认证由PC向网守发起,网守通过RADIUS协议向认证中心的认证服务器发起认证请求。这样,可以保证用户安全地使用网络资源,以确保用户身份的合法性。同时其落地话单经过处理,可进行计费及其它帐务处理。文中论述了RADIUS对VoIP的支持,提出了一个Gatekeeper与RADIUS结合的整体解决方案。 相似文献