期刊文献+
共找到148篇文章
< 1 2 8 >
每页显示 20 50 100
Efficient Protocol-Proving Algorithm Based on Improved Authentication Tests 被引量:1
1
作者 李谢华 杨树堂 +1 位作者 李建华 诸鸿文 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第1期9-17,共9页
A new efficient protocol-proving algorithm was proposed for verifying security protocols. This algorithm is based on the improved authentication tests model, which enhances the original model by formalizing the messag... A new efficient protocol-proving algorithm was proposed for verifying security protocols. This algorithm is based on the improved authentication tests model, which enhances the original model by formalizing the message reply attack. With exact causal dependency relations between messages in this model, the protocol-proving algorithm can avoid the state explosion caused by asynchronous. In order to get the straight proof of security protocols, three authentication theorems are exploited for evaluating the agreement and distinction properties. When the algorithm terminates, it outputs either the proof results or the potential flaws of the security protocol. The experiment shows that the protocol-proving algorithm can detect the type flaw attack on Neuman-Stubblebine protocol, and prove the correctness of NSL protocol by exploring only 10 states. 展开更多
关键词 protocol-proving algorithm improved authentication tests Neuman-Stubblebine protocol NSL protocol
在线阅读 下载PDF
A Novel Improved Artificial Bee Colony and Blockchain-Based Secure Clustering Routing Scheme for FANET 被引量:2
2
作者 Liang Zhao Muhammad Bin Saif +3 位作者 Ammar Hawbani Geyong Min Su Peng Na Lin 《China Communications》 SCIE CSCD 2021年第7期103-116,共14页
Flying Ad hoc Network(FANET)has drawn significant consideration due to its rapid advancements and extensive use in civil applications.However,the characteristics of FANET including high mobility,limited resources,and ... Flying Ad hoc Network(FANET)has drawn significant consideration due to its rapid advancements and extensive use in civil applications.However,the characteristics of FANET including high mobility,limited resources,and distributed nature,have posed a new challenge to develop a secure and ef-ficient routing scheme for FANET.To overcome these challenges,this paper proposes a novel cluster based secure routing scheme,which aims to solve the routing and data security problem of FANET.In this scheme,the optimal cluster head selection is based on residual energy,online time,reputation,blockchain transactions,mobility,and connectivity by using Improved Artificial Bee Colony Optimization(IABC).The proposed IABC utilizes two different search equations for employee bee and onlooker bee to enhance convergence rate and exploitation abilities.Further,a lightweight blockchain consensus algorithm,AI-Proof of Witness Consensus Algorithm(AI-PoWCA)is proposed,which utilizes the optimal cluster head for mining.In AI-PoWCA,the concept of the witness for block verification is also involved to make the proposed scheme resource efficient and highly resilient against 51%attack.Simulation results demonstrate that the proposed scheme outperforms its counterparts and achieves up to 90%packet delivery ratio,lowest end-to-end delay,highest throughput,resilience against security attacks,and superior in block processing time. 展开更多
关键词 improved artificial bee colony optimization optimal cluster head selection secure routing blockchain lightweight consensus protocol
在线阅读 下载PDF
Cryptanalysis and Improvement of the Multi-User QPCE Protocol with Semi-Honest Third Party 被引量:1
3
作者 昌燕 许春香 +5 位作者 张仕斌 王海春 闫丽丽 韩贵华 黄源源 盛志伟 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第1期1-5,共5页
In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third... In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third party, the private information of the users will be totally leaked out to the third party. A special attack is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocol secure against this kind of attack. 展开更多
关键词 of in it or IS on Cryptanalysis and improvement of the Multi-User QPCE protocol with Semi-Honest Third Party TP with
原文传递
Performance improvement of licklider transmission protocol in complex deep space networks based on parameter optimization
4
作者 Guo YU Zhenxing DONG Yan ZHU 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2023年第5期406-420,共15页
A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified sce... A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified scenarios with one to two hops or multihop scenarios with a custody mechanism of the Bundle Protocol(BP).However,the research results are not applicable to communications in Complex Deep Space Networks(CDSNs)without the custody mechanism of BP that are more suitable for deep space communications with LTP.In this paper,we propose a model of file delivery time for LTP in CDSNs.Based on the model,we propose a Parameter Optimization Design Algorithm for LTP(LTP-PODA)of configuring reasonable parameters for LTP.The results show that the accuracy of the proposed model is at least 6.47%higher than that of the previously established models based on simple scenarios,and the proposed model is more suitable for CDSNs.Moreover,the LTP parameters are optimized by the LTP-PODA algorithm to obtain an optimization plan.Configuring the optimization plan for LTP improves the protocol transmission performance by at least 18.77%compared with configuring the other parameter configuration plans. 展开更多
关键词 Complex deep space networks File delivery time model Licklider Transmission protocol(LTP) Network Performance Network protocols Parameter optimization Performance improvement
原文传递
Accuracy of machine electrocardiogram interpretation and implementation of a de-prioritization protocol in the emergency department
5
作者 Adam K Stanley Isobel Sonksen +2 位作者 Henry Morgan Nicola Hilton Sukhbir Bhullar 《World Journal of Emergency Medicine》 2025年第5期486-487,共2页
Computer analysis of electrocardiograms(ECGs)was introduced more than 50 years ago,with the aim to improve efficiency and clinical workflow.[1,2]However,inaccuracies have been documented in the literature.[3,4]Researc... Computer analysis of electrocardiograms(ECGs)was introduced more than 50 years ago,with the aim to improve efficiency and clinical workflow.[1,2]However,inaccuracies have been documented in the literature.[3,4]Research indicates that emergency department(ED)clinician interruptions occur every 4-10 min,which is significantly more common than in other specialties.[5]This increases the cognitive load and error rates and impacts patient care and clinical effi ciency.[1,2,5]De-prioritization protocols have been introduced in certain centers in the United Kingdom(UK),removing the need for clinician ECG interpretation where ECGs have been interpreted as normal by the machine. 展开更多
关键词 cognitive load de prioritization protocol improve efficiency clinical workflow howeverinaccuracies computer analysis electrocardiograms ecgs computer analysis electrocardiograms machine electrocardiogram interpretation emergency department error rates
暂未订购
A Quantitative Security Metric Model for Security Controls:Secure Virtual Machine Migration Protocol as Target of Assessment 被引量:1
6
作者 Tayyaba Zeb Muhammad Yousaf +1 位作者 Humaira Afzal Muhammad Rafiq Mufti 《China Communications》 SCIE CSCD 2018年第8期126-140,共15页
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the... Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol. 展开更多
关键词 attack resiliency measure cost-benefit measure performance improvement factor security assessment formal verification security controls security metrics virtual machine migration protocol
在线阅读 下载PDF
IAGNES algorithm for protocol recognition
7
作者 Deng Lijun Tan Tiantian +1 位作者 Han Jingwen Tian Tian 《High Technology Letters》 EI CAS 2018年第4期408-416,共9页
In the process of protected protocol recognition,an improved AGglomerative NESting algorithm( IAGNES) with high adaptability is proposed,which is based on the AGglomerative NESting algorithm( AGNES),for the challengin... In the process of protected protocol recognition,an improved AGglomerative NESting algorithm( IAGNES) with high adaptability is proposed,which is based on the AGglomerative NESting algorithm( AGNES),for the challenging issue of how to obtain single protocol data frames from multiprotocol data frames. It can improve accuracy and efficiency by similarity between bit-stream data frames and clusters,extract clusters in the process of clustering. Every cluster obtained contains similarity evaluation index which is helpful to evaluation. More importantly,IAGNES algorithm can automatically recognize the number of cluster. Experiments on the data set published by Lincoln Laboratory shows that the algorithm can cluster the protocol data frames with high accuracy. 展开更多
关键词 improved AGglomerative NESTING algorithm(IAGNES) protocol RECOGNITION bit-stream
在线阅读 下载PDF
石油行业图像数据高效安全传输方法 被引量:1
8
作者 汤明 邹露 +3 位作者 何世明 谢玉森 周越淼 陈春钱 《深圳大学学报(理工版)》 北大核心 2025年第2期172-182,I0004-I0006,共14页
为解决石油行业大数据高效安全传输难题,将图像转化为三通道矩阵数据并对矩阵进行奇异值分解,综合考虑Laplace算子、灰度方差函数、离散余弦变换系数、图像相关系数、熵函数、图像结构相似度和图像信噪比等7个评价因素,利用熵权逼近理... 为解决石油行业大数据高效安全传输难题,将图像转化为三通道矩阵数据并对矩阵进行奇异值分解,综合考虑Laplace算子、灰度方差函数、离散余弦变换系数、图像相关系数、熵函数、图像结构相似度和图像信噪比等7个评价因素,利用熵权逼近理想解排序(technique for order preference by similarity to an ideal solution,TOPSIS)法对分解后的奇异值进行优选,在确保数据真实性的前提下用少量奇异值表征原始图像,进行图像压缩,降低数据大小,提高传输效率;提出多通道猫脸分割加密方法,分别对每个颜色通道的图像进行随机分割、随机加密和随机排序,解决了传统猫脸加密算法颜色通道线性相关度高,整体置乱度低的问题.结果表明:改进奇异值压缩技术在保证图像清晰的情况下仅利用15%的奇异值数据完成对图像的压缩,最大图像压缩比可达4.43,平均压缩后所占用的存储空间仅为原空间的26.29%,数据传输控制协议通信平均传输效率提高86.39%.在加密图像达到0相关的前提下,多通道猫脸分割加密算法加密图像在像素点处三通道颜色值完全不同,新方法颜色通道相关系数分别为0.20、0.22和0.25,对比传统猫脸加密方法,分别降低0.78、0.75和0.71.新方法加密效果好、难破解,可为石油行业数字化转型提供理论和技术支撑. 展开更多
关键词 石油天然气工业 图像数据 改进奇异值压缩 猫脸变换 熵权TOPSIS法 传输控制协议 数据安全
在线阅读 下载PDF
高低压成套设备与小三箱的物联网集成与远程监控 被引量:2
9
作者 李亮 薛特 张伟 《信息与电脑》 2025年第6期153-155,共3页
文章探讨了高低压设备通信协议适配优化后的性能增强效果,采用先进编码算法与分组交换技术提升了数据传输速率,构建通用协议转换平台增强了设备兼容性,增添校验机制及采用冗余传输技术提高了系统可靠性,有效提升了电力系统运行水平。
关键词 高低压设备 通信协议 性能提升 数据传输 系统可靠性
在线阅读 下载PDF
5G与6G网络中网络切片技术的协议优化与性能提升研究
10
作者 高红山 《移动信息》 2025年第6期85-87,共3页
文中旨在探讨5G与6G网络中网络切片技术的协议优化与性能提升问题.研究分析了当前网络切片技术的挑战与瓶颈,并提出了基于优化协议的资源管理、调度及切片间协同策略.优化的协议提升了网络切片的资源利用率,降低延迟并加强了切片间的隔... 文中旨在探讨5G与6G网络中网络切片技术的协议优化与性能提升问题.研究分析了当前网络切片技术的挑战与瓶颈,并提出了基于优化协议的资源管理、调度及切片间协同策略.优化的协议提升了网络切片的资源利用率,降低延迟并加强了切片间的隔离性.该研究提供了高效网络切片技术的实现理论支持与实践指导. 展开更多
关键词 网络切片 协议优化 性能提升 资源管理
在线阅读 下载PDF
Improved algorithm of cluster-based routing protocols for agricultural wireless multimedia sensor networks
11
作者 Zhang Fu Liu Hongmei +3 位作者 Wang Jun Qiu Zhaomei Mao Pengjun Zhang Yakun 《International Journal of Agricultural and Biological Engineering》 SCIE EI CAS 2016年第4期132-140,共9页
Low Energy Adaptive Clustering Hierarchy(LEACH)is a routing algorithm in agricultural wireless multimedia sensor networks(WMSNs)that includes two kinds of improved protocol,LEACH_D and LEACH_E.In this study,obstacles ... Low Energy Adaptive Clustering Hierarchy(LEACH)is a routing algorithm in agricultural wireless multimedia sensor networks(WMSNs)that includes two kinds of improved protocol,LEACH_D and LEACH_E.In this study,obstacles were overcome in widely used protocols.An improved algorithm was proposed to solve existing problems,such as energy source restriction,communication distance,and energy of the nodes.The optimal number of clusters was calculated by the first-order radio model of the improved algorithm to determine the percentage of the cluster heads in the network.High energy and the near sink nodes were chosen as cluster heads based on the residual energy of the nodes and the distance between the nodes to the sink node.At the same time,the K-means clustering analysis method was used for equally assigning the nodes to several clusters in the network.Both simulation and the verification results showed that the survival number of the proposed algorithm LEACH-ED increased by 66%.Moreover,the network load was high and network lifetime was longer.The mathematical model between the average voltage of nodes(y)and the running time(x)was concluded in the equation y=−0.0643x+4.3694,and the correlation coefficient was R2=0.9977.The research results can provide a foundation and method for the design and simulation of the routing algorithm in agricultural WMSNs. 展开更多
关键词 wireless sensor networks routing protocol LEACH algorithm improved algorithm cluster head K-means clustering
原文传递
An improved evaporation rate water cycle algorithm for energy-efficient routing protocol in WSNs
12
作者 Vimala Dayalan Manikandan Kuppusamy 《International Journal of Intelligent Computing and Cybernetics》 EI 2023年第1期30-45,共16页
Purpose-The paper aims to introduce an efficient routing algorithm for wireless sensor networks(WSNs).It proposes an improved evaporation rate water cycle(improved ER-WC)algorithm and outlining the systems performance... Purpose-The paper aims to introduce an efficient routing algorithm for wireless sensor networks(WSNs).It proposes an improved evaporation rate water cycle(improved ER-WC)algorithm and outlining the systems performance in improving the energy efficiency of WSNs.The proposed technique mainly analyzes the clustering problem of WSNs when huge tasks are performed.Design/methodology/approach-This proposed improved ER-WC algorithm is used for analyzing various factors such as network cluster-head(CH)energy,CH location and CH density in improved ER-WCA.The proposed study will solve the energy efficiency and improve network throughput in WSNs.Findings-This proposed work provides optimal clustering method for Fuzzy C-means(FCM)where efficiency is improved in WSNs.Empirical evaluations are conducted to find network lifespan,network throughput,total network residual energy and network stabilization.Research limitations/implications-The proposed improved ER-WC algorithm has some implications when different energy levels of node are used in WSNs.Practical implications-This research work analyzes the nodes’energy and throughput by selecting correct CHs in intra-cluster communication.It can possibly analyze the factors such as CH location,network CH energy and CH density.Originality/value-This proposed research work proves to be performing better for improving the network throughput and increases energy efficiency for WSNs. 展开更多
关键词 WSNS improved ER-WCA Energy efficiency Routing protocol PCM Fuzzy C-Means Paper type Research paper
在线阅读 下载PDF
基于SDN控制器的拓扑发现协议改进策略研究
13
作者 陈思彤 《移动信息》 2025年第5期300-302,共3页
文中围绕SDN网络拓扑发现展开了研究。首先,阐述了SDN架构及现有拓扑发现协议的不足。然后,提出了改进策略,如多信息源融合机制、引入机器学习算法、改进消息交互机制,并从复杂度分析和正确性与完整性证明两方面对改进策略进行了理论分... 文中围绕SDN网络拓扑发现展开了研究。首先,阐述了SDN架构及现有拓扑发现协议的不足。然后,提出了改进策略,如多信息源融合机制、引入机器学习算法、改进消息交互机制,并从复杂度分析和正确性与完整性证明两方面对改进策略进行了理论分析。结果表明,该改进策略能有效提升拓扑发现的性能。 展开更多
关键词 SDN 拓扑发现协议 改进策略 复杂度分析
在线阅读 下载PDF
基于进化计算的Java通信协议栈优化算法研究
14
作者 卢佳明 《移动信息》 2025年第8期17-19,共3页
在通信技术迅速发展的背景下,Java通信协议栈在数据传输中扮演着关键角色。文中利用进化计算技术对Java通信协议栈进行优化,旨在通过智能算法改进协议栈的性能。研究结果显示,所提优化方法能显著提高数据处理速度和传输效率,为通信协议... 在通信技术迅速发展的背景下,Java通信协议栈在数据传输中扮演着关键角色。文中利用进化计算技术对Java通信协议栈进行优化,旨在通过智能算法改进协议栈的性能。研究结果显示,所提优化方法能显著提高数据处理速度和传输效率,为通信协议栈的性能提升提供了新的技术路径。 展开更多
关键词 进化计算 Java通信协议栈 优化算法 性能提升
在线阅读 下载PDF
基于分布式动态规划的集群杀伤链生成与重构算法
15
作者 胡人杰 陈志伟 +3 位作者 王惠真 封雷 樊柯德 张罗庚 《指挥信息系统与技术》 2025年第4期45-53,共9页
针对集群杀伤链研究在实时性和作战实体协同方面的不足,提出了一种基于分布式动态规划的杀伤链动态生成与重构算法。首先,给出了一种基于动态规划的集群杀伤链生成框架,将杀伤链生成问题视为一个多阶段决策过程,利用动态规划的分治策略... 针对集群杀伤链研究在实时性和作战实体协同方面的不足,提出了一种基于分布式动态规划的杀伤链动态生成与重构算法。首先,给出了一种基于动态规划的集群杀伤链生成框架,将杀伤链生成问题视为一个多阶段决策过程,利用动态规划的分治策略,有效解决了具有最优子结构和带耦合约束子问题的复杂优化问题;然后,通过解决集群复杂多对多任务分配问题,并考虑临机任务以及节点失效等重构情况,设计了一种基于改进合同网协议的集群杀伤链生成与重构算法,使得分配算法可及时有效地处理复杂任务重构情况;最后,以200个要素的集群协同防空任务为例,验证了该算法在提高杀伤链生成速度和作战效能方面的有效性,进而为集群杀伤链动态生成与重构提供了新的技术支撑,提升其决策效率与作战效能。 展开更多
关键词 动态规划 分布式 改进合同网协议 杀伤链生成与重构
在线阅读 下载PDF
基于领导跟随策略的一致性编队避障控制研究
16
作者 朱许 王正宁 +3 位作者 章胜 匡育衡 张博涵 黄江涛 《航空工程进展》 2025年第5期28-41,共14页
避障飞行是复杂环境中无人机集群编队飞行需要解决的重要问题。为实现无人机集群编队高效可靠的避障飞行,基于分布式领导跟随一致性控制策略,将无人机集群分为负责路径规划的领导者和负责编队控制的跟随者;针对包含动态障碍物的复杂环境... 避障飞行是复杂环境中无人机集群编队飞行需要解决的重要问题。为实现无人机集群编队高效可靠的避障飞行,基于分布式领导跟随一致性控制策略,将无人机集群分为负责路径规划的领导者和负责编队控制的跟随者;针对包含动态障碍物的复杂环境,提出一种改进RRT*路径规划算法,为无人机集群提供实时规划路径;基于反步控制方法,将编队一致性协议作为误差,发展根据周围环境动态调整编队队形间距的分布式编队飞行控制律。通过构建三种不同复杂度的障碍物环境对编队避障算法进行验证,结果表明:本文方法能够依据环境变化快速生成可行的编队飞行路径,实现无人机集群可变间距编队飞行的精准控制,达到无人机集群编队高效避障的目的。 展开更多
关键词 无人机集群 编队避障 领导跟随策略 改进RRT*算法 一致性协议 反步法
在线阅读 下载PDF
Improved Multi-Agent System for the Vehicle Routing Problem with Time Windows 被引量:6
17
作者 但正刚 蔡临宁 郑力 《Tsinghua Science and Technology》 SCIE EI CAS 2009年第3期407-412,共6页
The vehicle routing problem with time windows (VRPTW) involves assigning a fleet of limited capacity vehicles to serve a set of customers without violating the capacity and time constraints. This paper presents a mu... The vehicle routing problem with time windows (VRPTW) involves assigning a fleet of limited capacity vehicles to serve a set of customers without violating the capacity and time constraints. This paper presents a multi-agent model system for the VRPTW based on the internal behavior of agents and coordination among the agents. The system presents a formal view of coordination using the traditional contract-net protocol (CNP) that relies on the basic loop of agent behavior for order receiving, order announcement, bid calculation, and order scheduling followed by order execution. An improved CNP method based on a vehicle selection strategy is used to reduce the number of negotiations and the negotiation time. The model is validated using Solomon's benchmarks, with the results showing that the improved CNP uses only 30% as many negotiations and only 70% of the negotiation time of the traditional CNP. 展开更多
关键词 vehicle routing problem with time window multi-agent system improved contract-net protocol
原文传递
植物石蜡制片中透明和脱蜡技术的改良 被引量:56
18
作者 杨虎彪 李晓霞 罗丽娟 《植物学报》 CAS CSCD 北大核心 2009年第2期230-235,共6页
石蜡切片是植物科学研究领域中一项重要的实验技术,为组织学的发展做出了卓越贡献。制片过程中采用不同试剂和处理程序对切片质量有较大的影响。该文针对常规石蜡切片方法在操作步骤上存在的繁琐及试剂安全性等问题,摸索出改进方法。实... 石蜡切片是植物科学研究领域中一项重要的实验技术,为组织学的发展做出了卓越贡献。制片过程中采用不同试剂和处理程序对切片质量有较大的影响。该文针对常规石蜡切片方法在操作步骤上存在的繁琐及试剂安全性等问题,摸索出改进方法。实验结果表明,采用histolene(C1OH16)、环保透明剂van-clear、正丁醇(n-butanol)和松节油(oil of turpentine)代替二甲苯(xylene),可避免二甲苯的毒性危害;同时精简了传统石蜡切片的操作程序,缩短了实验周期并提高了制片质量。 展开更多
关键词 改良方案 石蜡切片 植物组织学
在线阅读 下载PDF
一种提取植物基因组DNA的方法--改良尿素法 被引量:26
19
作者 曹文波 郑璐璐 谢文海 《华中师范大学学报(自然科学版)》 CAS CSCD 2008年第3期448-451,共4页
介绍了一种从玉米和水稻叶片中提取高质量基因组DNA的改良尿素法.与其他常用方法如CTAB法、SDS法等相比,这种改良方法具有产率高、快速省时、可常温操作、成本耗用低等优点.结果证明,采用这种改良方法获得的基因组DNA纯度高、浓度大,适... 介绍了一种从玉米和水稻叶片中提取高质量基因组DNA的改良尿素法.与其他常用方法如CTAB法、SDS法等相比,这种改良方法具有产率高、快速省时、可常温操作、成本耗用低等优点.结果证明,采用这种改良方法获得的基因组DNA纯度高、浓度大,适合用于限制性内切酶的酶切反应、基于PCR基础上的遗传多样性分析、基于传统的Southern杂交的遗传图谱分析以及其他下游分子生物学研究,是一种适于植物基因组DNA制备方法,值得推广的.并针对基因组制备过程中经常出现的难题,分析了产生的原因,提出了具体解决办法. 展开更多
关键词 基因组DNA提取 改良尿素法 浓度和纯度
在线阅读 下载PDF
同种农机机群动态作业任务分配方法 被引量:14
20
作者 王猛 赵博 +3 位作者 刘阳春 伟利国 汪凤珠 方宪法 《农业工程学报》 EI CAS CSCD 北大核心 2021年第9期199-210,共12页
为解决农机作业过程中因突发状况引起的作业时间增加、某些作业任务无法完成等问题,该研究提出一种基于改进合同网算法的同种农机机群动态作业任务分配方法。基于农机性能参数和任务参数综合考虑用时最长农机的作业时间、农机机群油耗... 为解决农机作业过程中因突发状况引起的作业时间增加、某些作业任务无法完成等问题,该研究提出一种基于改进合同网算法的同种农机机群动态作业任务分配方法。基于农机性能参数和任务参数综合考虑用时最长农机的作业时间、农机机群油耗和路上的路程建立机群代价函数,建立单个田块和地头相邻田块的路径规划方法,参考合同网算法中的招-投标过程,建立农机对任务进行投标的代价函数,基于降低服务器计算量、减少通信次数、任务均衡分配和减小非作业路程等原则,通过选择招标者、设定招标阈值、中标者任务再分配和农机间任务交换等方式改进合同网算法。在不同时间进行基于传统合同网算法和改进合同网算法的农机机群动态作业任务分配仿真试验和农场实际播种作业试验。仿真结果表明,基于改进合同网算法的动态任务分配仿真结果比基于传统合同网算法的动态任务分配仿真结果机群时间代价降低0.83%~12.89%,与服务器通信次数降低77.4%~85%。农场实际试验结果表明:在不同的任务分配时间,基于改进合同网算法的动态任务分配的机群时间代价比实际理论机群时间代价降低30.20%~34.09%。本文提出的动态作业任务分配法能够满足农业生产中同种农机机群动态作业任务分配需求。 展开更多
关键词 农业机械 算法 任务分配 代价函数 改进合同网算法
在线阅读 下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部