期刊文献+
共找到7,370篇文章
< 1 2 250 >
每页显示 20 50 100
A Network-Based VPN Architecture Using Virtual Routing 被引量:4
1
作者 ZHANG Bao-liang 1,2,HU Han-ping 1,2,WU Xiao-gang 1,2, KONG Tao 31.State Education Ministry Key Laboratory of Image Information and Intelligent Control, Wuhan 430074, Hubei, China 2.Institute of Pattem Recognition and Artificial Intelligonce, Huazhong University of Science and Technology, Wuhan 430074, Hubei, China 3.709th Research Institute of China Shipbuilding Engineering Society, Wuhan 430074, Hubei, China 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期161-164,共4页
A network-based Virtual Private Network (VPN) architecture by using fundamental routing mechanism is proposed. This network is a virtual overlay network based on the relay of IP-in-IP tunneling of virtual routing modu... A network-based Virtual Private Network (VPN) architecture by using fundamental routing mechanism is proposed. This network is a virtual overlay network based on the relay of IP-in-IP tunneling of virtual routing modules. The packet format employs the encapsulation of IPSec ESP(Encapsulating Security Payload), an impact path code and an extended DS(Differentiated Services) code to support multi-path routing and QoS. Comparing with other models of VPN, this network system can be deployed in the current network with little investment, and it is easy to implement. The simulation result shows its performance is better than the traditional VPN system of black box mode. 展开更多
关键词 virtual routing network-based vpn proactive defense
在线阅读 下载PDF
An Experimental Study of Network-based Language Learning in Less-developed Areas
2
作者 王正华 《海外英语》 2012年第12X期7-9,共3页
The advent of the Age of Information brings about bright prospects to Network-based Language Learning(NBLL).The thesis adopts the Engagement Theory as guided principles.The purpose is to use the novel NBLL model effec... The advent of the Age of Information brings about bright prospects to Network-based Language Learning(NBLL).The thesis adopts the Engagement Theory as guided principles.The purpose is to use the novel NBLL model effectively with the help of modern technology especially in less-developed areas.This thesis focuses on network-based experimental study.The research shows that the students under NBLL environment have cultivated the capabilities in information collection,computer operation,and information evaluation,as well as the abilities in problem solving,reasoning with criticism,and cooperating with others. 展开更多
关键词 the ENGAGEMENT theory network-based LANGUAGE LEARN
在线阅读 下载PDF
GRE over IPSec VPN在无线校园网中的应用探讨
3
作者 江家龙 《轻工科技》 2025年第2期112-116,147,共6页
文章介绍GRE、IPSec和无线网络的相关技术理论,对“一校多区”的无线校园网络提出了一个基于GRE over IPSec VPN实现AP上线统一管理方案,并通过HCL模拟软件进行实验仿真。实验结果表明,该方案可以跨区域安全稳定传输私网数据,实现AP上... 文章介绍GRE、IPSec和无线网络的相关技术理论,对“一校多区”的无线校园网络提出了一个基于GRE over IPSec VPN实现AP上线统一管理方案,并通过HCL模拟软件进行实验仿真。实验结果表明,该方案可以跨区域安全稳定传输私网数据,实现AP上线统一管理,无线业务运行正常。方案在一定程度上避免设备重复投资,节约了成本,提高了管理效率。实验涉及OSPF、GRE over IPSec VPN和无线相关配置等,通过具体步骤和配置助力校园网无线网络管理,为实际网络的建设提供有效参考和依据。 展开更多
关键词 GRE IPSEC vpn 无线 校园网
原文传递
A precise tidal prediction mechanism based on the combination of harmonic analysis and adaptive network-based fuzzy inference system model 被引量:6
4
作者 ZHANG Zeguo YIN Jianchuan +2 位作者 WANG Nini HU Jiangqiang WANG Ning 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2017年第11期94-105,共12页
An efficient and accurate prediction of a precise tidal level in estuaries and coastal areas is indispensable for the management and decision-making of human activity in the field wok of marine engineering. The variat... An efficient and accurate prediction of a precise tidal level in estuaries and coastal areas is indispensable for the management and decision-making of human activity in the field wok of marine engineering. The variation of the tidal level is a time-varying process. The time-varying factors including interference from the external environment that cause the change of tides are fairly complicated. Furthermore, tidal variations are affected not only by periodic movement of celestial bodies but also by time-varying interference from the external environment. Consequently, for the efficient and precise tidal level prediction, a neuro-fuzzy hybrid technology based on the combination of harmonic analysis and adaptive network-based fuzzy inference system(ANFIS)model is utilized to construct a precise tidal level prediction system, which takes both advantages of the harmonic analysis method and the ANFIS network. The proposed prediction model is composed of two modules: the astronomical tide module caused by celestial bodies’ movement and the non-astronomical tide module caused by various meteorological and other environmental factors. To generate a fuzzy inference system(FIS) structure,three approaches which include grid partition(GP), fuzzy c-means(FCM) and sub-clustering(SC) are used in the ANFIS network constructing process. Furthermore, to obtain the optimal ANFIS based prediction model, large numbers of simulation experiments are implemented for each FIS generating approach. In this tidal prediction study, the optimal ANFIS model is used to predict the non-astronomical tide module, while the conventional harmonic analysis model is used to predict the astronomical tide module. The final prediction result is performed by combining the estimation outputs of the harmonious analysis model and the optimal ANFIS model. To demonstrate the applicability and capability of the proposed novel prediction model, measured tidal level samples of Fort Pulaski tidal station are selected as the testing database. Simulation and experimental results confirm that the proposed prediction approach can achieve precise predictions for the tidal level with high accuracy, satisfactory convergence and stability. 展开更多
关键词 tidal level prediction harmonious analysis method adaptive network-based fuzzy inference system correlation analysis
在线阅读 下载PDF
Bottleneck Prediction Method Based on Improved Adaptive Network-based Fuzzy Inference System (ANFIS) in Semiconductor Manufacturing System 被引量:4
5
作者 曹政才 邓积杰 +1 位作者 刘民 王永吉 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2012年第6期1081-1088,共8页
Semiconductor manufacturing (SM) system is one of the most complicated hybrid processes involved continuously variable dynamical systems and discrete event dynamical systems. The optimization and scheduling of semicon... Semiconductor manufacturing (SM) system is one of the most complicated hybrid processes involved continuously variable dynamical systems and discrete event dynamical systems. The optimization and scheduling of semiconductor fabrication has long been a hot research direction in automation. Bottleneck is the key factor to a SM system, which seriously influences the throughput rate, cycle time, time-delivery rate, etc. Efficient prediction for the bottleneck of a SM system provides the best support for the consequent scheduling. Because categorical data (product types, releasing strategies) and numerical data (work in process, processing time, utilization rate, buffer length, etc.) have significant effect on bottleneck, an improved adaptive network-based fuzzy inference system (ANFIS) was adopted in this study to predict bottleneck since conventional neural network-based methods accommodate only numerical inputs. In this improved ANFIS, the contribution of categorical inputs to firing strength is reflected through a transformation matrix. In order to tackle high-dimensional inputs, reduce the number of fuzzy rules and obtain high prediction accuracy, a fuzzy c-means method combining binary tree linear division method was applied to identify the initial structure of fuzzy inference system. According to the experimental results, the main-bottleneck and sub-bottleneck of SM system can be predicted accurately with the proposed method. 展开更多
关键词 semiconductor manufacturing system bottleneck prediction adaptive network-based fuzzy inference system
在线阅读 下载PDF
Predictive Tracking Control of Network-Based Agents With Communication Delays 被引量:4
6
作者 Tianyong Zhang Guoping Liu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第6期1150-1156,共7页
This paper investigates the remote tracking control problem of Network-based Agents with communication delays existing in both forward and feedback communication channels.A networked predictive tracking controller is ... This paper investigates the remote tracking control problem of Network-based Agents with communication delays existing in both forward and feedback communication channels.A networked predictive tracking controller is proposed to compensate the negative effects caused by bilateral time-delays in a wireless network.Furthermore,the problem of consecutive data loss in the feedback channel is solved using aforementioned controller,where lateral movement perturbations are introduced.Simulations and experiments are provided for several cases,which verify the realizability and effectiveness of the proposed controller. 展开更多
关键词 Consecutive data loss network-based agents networked predictive control remote tracking time-delay
在线阅读 下载PDF
Parallel Neural Network-Based Motion Controller for Autonomous Underwater Vehicles 被引量:5
7
作者 甘永 王丽荣 +1 位作者 万磊 徐玉如 《China Ocean Engineering》 SCIE EI 2005年第3期485-496,共12页
A parallel neural network-based controller (PNNC) is presented for the motion control of underwater vehicles in this paper. It consists of a real-time part, a self-learning part and a desired-state programmer, and i... A parallel neural network-based controller (PNNC) is presented for the motion control of underwater vehicles in this paper. It consists of a real-time part, a self-learning part and a desired-state programmer, and it is different from normal adaptive neural network controller in structure. Owing to the introduction of the self-learning part, on-line learning can be performed without sample data in several sample periods, resulting in high learning speed of the controller and good control performance. The desired-state programmer is utilized to obtain better learning samples of the neural network to keep the stability of the controller. The developed controller is applied to the 4-degree of freedom control of the AUV “IUV- IV” and is successful on the simulation platform. The control performance is also compared with that of neural network controller with different structures such as normal adaptive neural network and different learning methods. Current effects and surge velocity control are also included to demonstrate the controller' s performance. It is shown that the PNNC has a great possibility to solve the problems in the control system design of underwater vehicles. 展开更多
关键词 neural network autonomous underwater vehicles (AUV) parallel neural network-based controller (PNNC real-time part self-learning part
在线阅读 下载PDF
Probe on Network-based Collaborative Maintenance Model for After-sales Equipment 被引量:2
8
作者 CHEN Xiaohui SHENG Tianwen YI Shuping 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2009年第5期702-709,共8页
In order to make equipment run safely, economically and continuously, some new maintenance models were put forward to improve the equipment after-sale maintenance service, such as E-maintenance, third-party maintenanc... In order to make equipment run safely, economically and continuously, some new maintenance models were put forward to improve the equipment after-sale maintenance service, such as E-maintenance, third-party maintenance, etc. To certain extent, the models solved the problem of the distance between the manufacturer and customer and the dispersion of the maintenance technologies, however, those resources are still widely distributed and do not collaborate efficiently. In this paper, a network-based collaborative maintenance service model was proposed for after-sales equipment to solve the problem of maintenance resources integration. Concretely, equipment designers, maintainers, spare parts suppliers and maintenance experts were grouped together to establish dynamic alliance. The leader of the alliance is the manufacturer under guaranty period or equipment user exceeding the guaranty period. The process of maintenance service was divided into three stages which are fault diagnosis, maintenance decision and maintenance implementation. The sub-alliances were established to carry out maintenance work at each stage. In addition, the business process of network-based collaborative maintenance was analyzed and collaborative business system for equipment's after-sales collaborative maintenance service was designed. In the end, an informational economics model of network-based collaborative maintenance was established to demonstrate the effectiveness of this maintenance model. 展开更多
关键词 network-based collaborative maintenance after-sales service dynamic maintenance alliance information economics
在线阅读 下载PDF
Design and implementation of self-protection agent for network-based intrusion detection system 被引量:3
9
作者 ZHU Shu-ren(朱树人) LI Wei-qin(李伟琴) 《Journal of Central South University of Technology》 2003年第1期69-73,共5页
Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection ag... Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection agents were designed, which have the distributed architecture,cooperate with the agents in intrusion detection in a loose-coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self-protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network-based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network-based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks exist ing in some system service process and back-door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively. 展开更多
关键词 INTRUSION DETECTION SYSTEM (IDS) network-based INTRUSION DETECTION system(NIDS) SELF-PROTECTION AGENT IP filter
在线阅读 下载PDF
Where Have Network-based Self-learning Classes Gone?——Reflections & Expectations on the Employment of Network-based Self-learning Classes
10
作者 吴雪茵 《海外英语》 2012年第18期279-280,共2页
To respond to the further development of college English reforms,many universities employed network-based selflearning classes to aid the traditional classroom teaching,especially in teaching listening,but as time wen... To respond to the further development of college English reforms,many universities employed network-based selflearning classes to aid the traditional classroom teaching,especially in teaching listening,but as time went by,some universities gradually gave them up.The paper intends to reflect on the employment of network-based self-learning listening classes,analyz ing the learning with and without its aid,and meanwhile introduce the need to re-employ it,and discuss how we can improve the network-based self-learning classes to help with students' listening. 展开更多
关键词 network-based SELF-LEARNING LISTENING improvement
在线阅读 下载PDF
State feedback control of network-based systems with packet disordering
11
作者 Jinna Li Shiqian Han +2 位作者 Meng Zheng Haibin YU Qingling Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第2期306-313,共8页
A new method that stabilizes network-based systems with both bounded delay and packet disordering is discussed under the state feedback controller. A novel model, fully describing the dynamic characteristic of network... A new method that stabilizes network-based systems with both bounded delay and packet disordering is discussed under the state feedback controller. A novel model, fully describing the dynamic characteristic of network-based systems with packet disordering, is constructed. Different from the existing models of network-based systems, the number of delay items is time-varying in the model proposed. Further, this model is converted into a parameter-uncertain discrete-time system with time-varying delay item numbers in terms of matrix theory. Moreover, the less conservative stability condition is obtained by avoiding utilisation of Moon et al.’ inequality and bounding inequalities for quadratic functional terms. By solving a minization problem based on linear matrix inequalities, the state feedback controller is presented. A numerical example is given to illustrate the effectiveness of the proposed method. 展开更多
关键词 network-based systems packet disordering time-varying delay item numbers stability.
在线阅读 下载PDF
Error code analysis and selection principle of M-ary modulation in network-based control systems
12
作者 赵顺利 尹逊和 +1 位作者 魏学业 H. K. LAM 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第6期1372-1382,共11页
Error codes induced by M-ary modulation and modulation selection in network-based control systems are studied.It is the first time the issue of error codes induced by M-ary modulation is addressed in control field.In ... Error codes induced by M-ary modulation and modulation selection in network-based control systems are studied.It is the first time the issue of error codes induced by M-ary modulation is addressed in control field.In network-based control systems,error codes induced by noisy channel can significantly decrease the quality of control.To solve this problem,the network-based control system with delay and noisy channel is firstly modeled as an asynchronous dynamic system(ADS).Secondly,conditions of packet with error codes(PEC)loss rate by using M-ary modulation are obtained based on dynamic output feedback scheme.Thirdly,more importantly,the selection principle of M-ary modulation is proposed according to the measured signal-to-noise ratio(SNR)and conditions of PEC loss rate.Finally,system stability is analyzed and controller is designed through Lyapunov function and linear matrix inequality(LMI)scheme,and numerical simulations are made to demonstrate the effectiveness of the proposed scheme. 展开更多
关键词 network-based control system asynchronous dynamic system (ADS) M-ary modulation delay error code linear matrix inequality (LMI)
在线阅读 下载PDF
跨平台VPN客户端访问去中心化身份验证研究
13
作者 厉白 唐伟 朱泽洲 《微型电脑应用》 2025年第12期229-233,共5页
跨平台虚拟专用网络(VPN)客户端在访问去中心化身份验证系统时,易出现身份混淆和冒用的问题。因此,提出跨平台VPN客户端访问去中心化身份验证方法。采用双线性映射和哈希函数来初始化模型参数,构建包含这些参数的模型。将构建好的模型... 跨平台虚拟专用网络(VPN)客户端在访问去中心化身份验证系统时,易出现身份混淆和冒用的问题。因此,提出跨平台VPN客户端访问去中心化身份验证方法。采用双线性映射和哈希函数来初始化模型参数,构建包含这些参数的模型。将构建好的模型部署在VPN客户端和网络节点,平台会根据用户的注册内容为其生成一个独有的密钥。验证平台通过用户的身份标识和密钥,利用多个节点协同执行身份验证流程。只有在身份验证通过的情况下,服务器才会允许用户访问网络资源。实验结果表明,所提出方法数据传输速率保持在3000 bps以上,其传输开销始终保持在总传输量的1.78%以下,且抗中间人攻击能力大于0.98。 展开更多
关键词 vpn客户端 去中心化 身份验证 双线性映射 密钥生成
在线阅读 下载PDF
Language Learning Strategies in a Network-based Environment
14
作者 王小萍 《海外英语》 2017年第22期9-13,15,共6页
With the swift development of network technology, research on how to integrate network technology into language learning has become a trend. This paper examines whether the application of language learning strategy(LL... With the swift development of network technology, research on how to integrate network technology into language learning has become a trend. This paper examines whether the application of language learning strategy(LLS) in the networkbased environment has incomparable superiority. Beginning with the literature review, it presents an analysis on similarities and differences between network-based language learning strategy(NBLLS) and non-NBLLS, and then expounds the characteristics,the influencing factors and teachers' role of NBLLS. Taking 25 participants in the group of non-NBLL and 34 in the NBLL group as the comparative survey study, the empirical result shows the new evidence that there is a little difference between the two groups in the use of LLS. The findings of this study have implications for the application of NBLLS. 展开更多
关键词 language learning strategy APPLICATION IMPLICATION network-based
在线阅读 下载PDF
College English Teachers’ Beliefs on Network-based Language Learning
15
作者 樊海怡 《教师》 2018年第29期45-46,共2页
The advantages and disadvantages for learning English in the Network-based environment attract most researchers’concern nowadays.This study profiles college English teachers’beliefs about the networkbased language l... The advantages and disadvantages for learning English in the Network-based environment attract most researchers’concern nowadays.This study profiles college English teachers’beliefs about the networkbased language learning.The main finding is that teachers’beliefs about network-based language learning are heterogeneous and thus reflect a wide range in terms of the evolution of approaches and technology use. 展开更多
关键词 COLLEGE ENGLISH teachers’beliefs network-based LANGUAGE learning
在线阅读 下载PDF
Re-Exploring Biomarkers and Therapeutic Targets in Primary Melanoma Patients: Insights from Network-Based Analysis of Microarray Data
16
作者 Kangjie SHEN Chuanyuan WEI +8 位作者 Yi XIE Lu WANG Shuyu WANG Ming REN Xinyi DENG Daohe WANG Zixu GAO Zihao FENG Jianying GU 《Chinese Journal of Plastic and Reconstructive Surgery》 2020年第4期228-240,共13页
Objective To identify novel biomarkers and therapeutic targets for primary melanoma using network-based microarray data analysis.Methods Eligible microarray datasets from the Gene Expression Omnibus(GEO)database were ... Objective To identify novel biomarkers and therapeutic targets for primary melanoma using network-based microarray data analysis.Methods Eligible microarray datasets from the Gene Expression Omnibus(GEO)database were used to identify differentially expressed genes(DEGs).The protein-protein interaction(PPI)network,Gene Ontology(GO),and Kyoto Encyclopedia of Genes and Genomes(KEGG)pathway enrichment analyses were performed to identify hub genes and pathways that might affect the survival of melanoma patients.Immunohistochemistry results obtained from the Human Protein Atlas(HPA)database confirmed the protein expression levels of hub genes.The Cancer Genome Atlas(TCGA)database was used to further verify the gene expression levels and conduct survival analysis.Results Three microarray datasets(GSE3189,GSE15605,and GSE46517)containing 122 melanoma and 30 normal skin tissue samples were included.A total of 262 common differentially expressed genes(cDEGs)were identified based on three statistical approaches(Fisher’s method,the random effects model(REM),and vote counting)with strict criteria.Of these,two upregulated genes,centromere protein F(CENPF)and pituitary tumortransforming gene 1(PTTG1),were selected as hub genes.HPA and TCGA database analyses confirmed that CENPF and PTTG1 were overexpressed in melanoma.Survival analysis showed that high expression levels of CENPF were significantly correlated with decreased overall survival(OS)(P=0.028).Conclusion The expression level of CENPF was significantly upregulated in melanoma and correlated with decreased OS.Thus,CENPF may represent a novel biomarker and therapeutic target for melanoma patients. 展开更多
关键词 MELANOMA network-based analysis MICROARRAY Centromere protein F Biomarkers
暂未订购
基于eNSP的IPSec VPN实验设计与实现
17
作者 姜延丰 李永飞 《电脑知识与技术》 2025年第20期79-81,共3页
IPSec是一种开放标准的框架结构,用于为IP网络通信安全提供服务,确保数据的机密性、完整性和来源认证。IPSec VPN利用这些安全机制,使远程用户或分支机构能够通过不安全的公共网络安全地访问企业内部网络资源。该文介绍了IPSec VPN的原... IPSec是一种开放标准的框架结构,用于为IP网络通信安全提供服务,确保数据的机密性、完整性和来源认证。IPSec VPN利用这些安全机制,使远程用户或分支机构能够通过不安全的公共网络安全地访问企业内部网络资源。该文介绍了IPSec VPN的原理,重点分析了IPSec VPN实验的设计与实现,给出了具体实验方法及步骤,以使学生掌握IPSec VPN的配置方法,直观地看到实验效果,增强学生对IPSec原理的理解和实践能力。 展开更多
关键词 vpn IPSEC 实验教学
在线阅读 下载PDF
计算机网络信息安全管理中VPN技术的应用
18
作者 黄丽丽 《微型计算机》 2025年第16期217-219,共3页
随着信息技术的快速发展和网络应用的普及,计算机网络安全问题日益突出。病毒木马、黑客攻击、数据泄露等安全威胁严重影响着政府、企业和个人用户的网络应用体验,给国家安全和经济发展带来隐患。虚拟专用网络VPN作为一种安全、可靠、... 随着信息技术的快速发展和网络应用的普及,计算机网络安全问题日益突出。病毒木马、黑客攻击、数据泄露等安全威胁严重影响着政府、企业和个人用户的网络应用体验,给国家安全和经济发展带来隐患。虚拟专用网络VPN作为一种安全、可靠、经济的网络互联技术,在计算机网络信息安全管理中发挥着越来越重要的作用。文章在分析计算机网络面临的主要安全威胁的基础上,重点探讨了VPN技术在政务、金融、企业组网、移动办公等领域的应用实践,并展望了VPN技术结合软件定义网络、云计算、人工智能等新兴技术的发展趋势,以期为提升网络空间安全防护能力提供参考。 展开更多
关键词 信息安全 网络安全 vpn 虚拟专用网 软件定义网络
在线阅读 下载PDF
面向星地融合SRv6 L3VPN网络的快速迁移方法
19
作者 周妍 郭宗焕 +2 位作者 麻涵 王鹏 李红艳 《移动通信》 2025年第10期100-106,155,共8页
随着面向空天地海一体化网络技术多维协同的发展,场景对业务数据安全性、隔离性、实时可靠性需求日益增长,如何在低轨卫星动态拓扑环境中构建稳定的用于业务逻辑隔离的虚拟专用通信网络,已经成为亟待解决的问题。基于现有路由方法实现L3... 随着面向空天地海一体化网络技术多维协同的发展,场景对业务数据安全性、隔离性、实时可靠性需求日益增长,如何在低轨卫星动态拓扑环境中构建稳定的用于业务逻辑隔离的虚拟专用通信网络,已经成为亟待解决的问题。基于现有路由方法实现L3VPN网络迁移易引发链路资源冲突,难以为业务提供持续稳定的VPN服务。面向星地融合场景,提出了一种基于预测拓扑的SRv6 L3VPN网络快速迁移方法。该方法在分布式业务路由构建阶段基于入口网关节点间非协同竞争现象,构建冲突感知路径代价函数,将迁移后的路径决策问题建模为成熟的混合整数规划问题,有效避免了路径冲突。通过仿真分析表明,相比于现有方法,所提方法将网络迁移时延降低了80%以上。 展开更多
关键词 低轨卫星网络 vpn网络迁移 路由策略 预测拓扑
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部