期刊文献+
共找到314篇文章
< 1 2 16 >
每页显示 20 50 100
High laser damage threshold reflective optically addressed liquid crystal light valve based on gallium nitride conductive electrodes 被引量:3
1
作者 Zhibo Xing Wei Fan +2 位作者 Dajie Huang He Cheng Tongyao Du 《High Power Laser Science and Engineering》 SCIE CAS CSCD 2022年第6期8-14,共7页
In this paper,the feasibility of a high laser damage threshold liquid crystal spatial light modulator based on gallium nitride(GaN)transparent conductive electrodes is proved.The laser-induced damage threshold(LIDT)is... In this paper,the feasibility of a high laser damage threshold liquid crystal spatial light modulator based on gallium nitride(GaN)transparent conductive electrodes is proved.The laser-induced damage threshold(LIDT)is measured,and a high LIDT reflective optically addressed liquid crystal light valve(OALCLV)based on GaN is designed and fabricated.The proper work mode of the OALCLV is determined;the OALCLV obtained a maximum reflectivity of about 55%and an on–off ratio of 55:1,and an image response is demonstrated. 展开更多
关键词 gallium nitride laser-induced damage threshold liquid crystal optically addressed liquid crystal light valve
原文传递
Compensation method for performance degradation of optically addressed spatial light modulator induced by CW laser 被引量:3
2
作者 Tongyao Du Dajie Huang +4 位作者 He Cheng Wei Fan Zhibo Xing Xuechun Li Jianqiang Zhu 《High Power Laser Science and Engineering》 SCIE CAS CSCD 2022年第1期64-75,共12页
In this paper,we propose an effective method to compensate for the performance degradation of optically addressed spatial light modulators(OASLMs).The thermal deposition problem usually leads to the on-off ratio reduc... In this paper,we propose an effective method to compensate for the performance degradation of optically addressed spatial light modulators(OASLMs).The thermal deposition problem usually leads to the on-off ratio reduction of amplitude OASLM,so it is difficult to achieve better results in high-power laser systems.Through the analysis of the laser-induced temperature rise model and the liquid crystal layer voltage model,it is found that reducing the driving voltage of the liquid crystal light valve and increasing the driving current of the optical writing module can compensate for the decrease of on-off ratio caused by temperature rise.This is the result of effectively utilizing the photoconductive effect of Bi_(12)SiO_(20)(BSO)crystal.The experimental results verify the feasibility of the proposed method and increase the laser withstand power of amplitude-only OASLM by about a factor of 2.5. 展开更多
关键词 liquid crystal optically addressed spatial fight modulator beam intensity shaping thermal effects
原文传递
A Study of Variations in Address Forms in the Tinghu Dialect of Yancheng City
3
作者 Xingcheng Pan Zhenjun Song 《Journal of Contemporary Educational Research》 2025年第1期227-233,共7页
This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles o... This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles of tone sandhi theory.In Chinese phonology,it is generally assumed that individual characters serve as fundamental forms based on their standard pronunciations,with real-time pronunciations adapting to phonetic conditions.However,the study of address forms has not traditionally been integrated into this framework.Observations indicate that a wide range of addressing methods is employed in social interactions,reflecting the complexity of regional cultural traits and social dynamics.This research highlights the distinctive features of address forms in the Tinghu dialect,particularly in terms of tone sandhi,vocative expressions,and indirect address.By examining these unique characteristics,the study enhances our understanding of the principles governing tonal changes in Chinese.Furthermore,it offers valuable insights into the preservation and inheritance of regional dialects. 展开更多
关键词 Tone sandhi Address form Vocative Indirect address
在线阅读 下载PDF
China President XI Jin-ping Met with Dr.Margaret Chan,Director-General of the World Health Organization,and Addressed to Promote Integrative Medicine and Chinese Medicine to Develop in Oversea Countries
4
《Chinese Journal of Integrative Medicine》 SCIE CAS 2013年第11期803-803,共1页
China President Xi Jin-ping met with Dr. Margaret Chan, Director-General of the World Health Organization (WHO), at the Great Hall of the People in Beijing, capital of China, Aug. 20, 2013. XI Jin-ping said that Chi... China President Xi Jin-ping met with Dr. Margaret Chan, Director-General of the World Health Organization (WHO), at the Great Hall of the People in Beijing, capital of China, Aug. 20, 2013. XI Jin-ping said that China will continue to improve public health and enhance cooperation with the WHO. The Chinese government always prioritizes its people's health and will make unremitting efforts to further implement reform of its public health system, Xi said. He promised that the Chinese government would continue to effectively distribute public health and medical resources in order to achieve full coverage of basic health services to all Chinese people by 2020. 展开更多
关键词 Organization PING China President XI Jin-ping Met with Dr.Margaret Chan Director-General of the World Health Organization and addressed to Promote Integrative Medicine and Chinese Medicine to Develop in Oversea Countries World MET
原文传递
A Dynamic SDN-Based Address Hopping Model for IoT Anonymization
5
作者 Zesheng Xi Chuan He +1 位作者 Yunfan Wang Bo Zhang 《Computer Modeling in Engineering & Sciences》 2025年第8期2545-2565,共21页
The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional an... The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional anonymization methods for IoT networks often rely on static identity models,making them vulnerable to inference attacks through long-term observation.Moreover,these methods tend to sacrifice data availability to protect privacy,limiting their practicality in real-world applications.To overcome these limitations,we propose a dynamic device identity anonymization framework using Moving Target Defense(MTD)principles implemented via Software-Defined Networking(SDN).In our model,the SDN controller periodically reconfigures the network addresses and routes of IoT devices using a constraint-aware backtracking algorithmthat constructs new virtual topologies under connectivity and performance constraints.This address-hopping scheme introduces continuous unpredictability at the network layer dynamically changing device identifiers,routing paths,and even network topology which thwarts attacker reconnaissance while preserving normal communication.Experimental results demonstrate that our approach significantly reduces device identity exposure and scan success rates for attackers compared to static networks.Moreover,the dynamic schememaintains high data availability and network performance.Under attack conditions it reduced average communication delay by approximately 60% vs.an unprotected network,with minimal overhead on system resources. 展开更多
关键词 Device anonymization address hopping moving target defense software defined networking cyber resilience
在线阅读 下载PDF
43 robot teams from all over the world gathered in Shanghai
6
作者 陈福金 《疯狂英语(新读写)》 2025年第8期44-46,78,共4页
1 The 2025 FIRST Robotics Competition(FRC)Shanghai Regional has returned to the city,inspiring youth in science and technology.The three⁃day event,starting from March 14,has brought together nearly 1,000 young competi... 1 The 2025 FIRST Robotics Competition(FRC)Shanghai Regional has returned to the city,inspiring youth in science and technology.The three⁃day event,starting from March 14,has brought together nearly 1,000 young competitors from 43 teams—including three international teams.Held at East China Normal University,the event centered on this year's theme“Reefscape”,challenging participants to address environmental issues through robotics.Teams have to design and program robots to transplant artificial coral and collect simulated algae(模拟藻类),simulating marine ecosystems'restoration processes. 展开更多
关键词 design program robots SHANGHAI FRC environmental issues address environmental issues simulated algae transplant artificial coral robotics competition
在线阅读 下载PDF
Ultrafast Ternary Content-Addressable Nonvolatile Floating-Gate Memory Based on van der Waals Heterostructures
7
作者 Peng Song Xuanye Liu +8 位作者 Jiequn Sun Nuertai Jiazila Chijun Wei Hui Gao Chengze Du Hui Guo Haitao Yang Lihong Bao Hong-Jun Gao 《Chinese Physics Letters》 2025年第6期297-304,I0001-I0006,共14页
As a typical in-memory computing hardware design, nonvolatile ternary content-addressable memories(TCAMs) enable the logic operation and data storage for high throughout in parallel big data processing. However,TCAM c... As a typical in-memory computing hardware design, nonvolatile ternary content-addressable memories(TCAMs) enable the logic operation and data storage for high throughout in parallel big data processing. However,TCAM cells based on conventional silicon-based devices suffer from structural complexity and large footprintlimitations. Here, we demonstrate an ultrafast nonvolatile TCAM cell based on the MoTe2/hBN/multilayergraphene (MLG) van der Waals heterostructure using a top-gated partial floating-gate field-effect transistor(PFGFET) architecture. Based on its ambipolar transport properties, the carrier type in the source/drain andcentral channel regions of the MoTe2 channel can be efficiently tuned by the control gate and top gate, respectively,enabling the reconfigurable operation of the device in either memory or FET mode. When working inthe memory mode, it achieves an ultrafast 60 ns programming/erase speed with a current on-off ratio of ∼105,excellent retention capability, and robust endurance. When serving as a reconfigurable transistor, unipolar p-typeand n-type FETs are obtained by adopting ultrafast 60 ns control-gate voltage pulses with different polarities.The monolithic integration of memory and logic within a single device enables the content-addressable memory(CAM) functionality. Finally, by integrating two PFGFETs in parallel, a TCAM cell with a high current ratioof ∼10^(5) between the match and mismatch states is achieved without requiring additional peripheral circuitry.These results provide a promising route for the design of high-performance TCAM devices for future in-memorycomputing applications. 展开更多
关键词 van der waals heterostructures floating gate memory memory computing parallel big data processing nonvolatile memory van der waals heterostructure ternary content addressable memory top gated partial floating gate field effect transistor
原文传递
Distributed Application Addressing in 6G Network 被引量:1
8
作者 Liu Jie Chen Sibo +4 位作者 Liu Yuqin Mo Zhiwei Lin Yilin Zhu Hongmei He Yufeng 《China Communications》 SCIE CSCD 2024年第4期193-207,共15页
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development... To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification. 展开更多
关键词 application addressing CNC(Computing&Network Convergence) DNS(Domain Name System) ICN(Information-Centric Network) 6G
在线阅读 下载PDF
An Active Deception Defense Model Based on Address Mutation and Fingerprint Camouflage
9
作者 Wang Shuo Chu Jiang +3 位作者 Pei Qingqi Shao Feng Yuan Shuai Zhong Xiaoge 《China Communications》 SCIE CSCD 2024年第7期212-223,共12页
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M... The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation. 展开更多
关键词 address mutation deception defense fingerprint camouflage moving target defense probabilistic model
在线阅读 下载PDF
Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking
10
作者 Hira Akhtar Butt Khoula Said Al Harthy +3 位作者 Mumtaz Ali Shah Mudassar Hussain Rashid Amin Mujeeb Ur Rehman 《Computers, Materials & Continua》 SCIE EI 2024年第11期3003-3031,共29页
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such atta... Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)environments.While Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining.In this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN environments.Our model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant features.This adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack scenarios.Our proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble techniques.The proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in SDNs.It provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving threats.Our comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing SDNs.Experimental results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost. 展开更多
关键词 Table 1(continued)OSI layer Possible DDoS attack Data link MAC Address Flooding Physical Cable disconnection JaMMING physical impersonation
在线阅读 下载PDF
Application Strategies of Automatic Addressable Single-Lamp Control Technology in Tunnel Lighting
11
作者 Huiyan Yang 《Journal of World Architecture》 2024年第2期90-95,共6页
The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting syste... The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively. 展开更多
关键词 Tunnel lighting Automatic addressable single-lamp control technology System design Cascade control
在线阅读 下载PDF
基于TCP Options Address的客户端真实IP获取的设计与实现
12
作者 张会奇 《微型计算机》 2024年第12期37-39,共3页
在代理服务器场景下获取客户端的真实IP地址是非常常见的需求。但通常代理服务器会隐藏客户端的真实IP地址,这对真实IP地址的获取增加了困难。当前一些应用层协议,例如HTTP协议、Proxy protocol协议可以实现客户端真实IP地址的获取,但... 在代理服务器场景下获取客户端的真实IP地址是非常常见的需求。但通常代理服务器会隐藏客户端的真实IP地址,这对真实IP地址的获取增加了困难。当前一些应用层协议,例如HTTP协议、Proxy protocol协议可以实现客户端真实IP地址的获取,但都存在一些弊端,如都需要修改上游服务器的应用层程序。基于TCP Options Address,将数据包从内核态映射到用户态修改,不涉及上游服务器程序的变动,即可得到客户端真实IP地址。 展开更多
关键词 代理服务器 上游服务器 IP地址 TCP Options Address 内核态 用户态
在线阅读 下载PDF
Area-Exposure Additive Manufacturing Techniques and Devices:A Mini-Review
13
作者 Xinyan Liu Yuanqiao Li +1 位作者 Jing Zhou Zhao Maonan Wang 《Additive Manufacturing Frontiers》 2024年第4期155-165,共11页
This review provides a comprehensive overview of the various three-dimensional printing techniques for area exposure additive manufacturing using the patterned control of optical devices.Additive manufacturing techniq... This review provides a comprehensive overview of the various three-dimensional printing techniques for area exposure additive manufacturing using the patterned control of optical devices.Additive manufacturing techniques can be broadly categorized into low-power exposure and high-power melting,both of which involve innovative patterning and light-sourcing methods.The working principles and accompanying auxiliary devices of core technologies including the digital micromirror device,liquid crystal display,liquid crystal on silicon mask,and optically addressable light valve are summarized.The discussed techniques and devices have played critical roles in advancing both vat photopolymerization and powder bed fusion additive manufacturing processes and can be applied to markedly enhance printing efficiency.The advances discussed in this review hold significant promise in fields such as biomedicine,robotics,and sensing.The associated challenges and opportunities faced by the considered techniques and devices are summarized accordingly. 展开更多
关键词 3D printing Digital light processing(DLP) Liquid crystal display(LCD) Liquid crystal on silicon(LCOS) Optically addressable light valve(OALV)
在线阅读 下载PDF
CAM辅助的哈希表查找性能分析 被引量:3
14
作者 万成威 邬江兴 +1 位作者 李玉峰 兰巨龙 《电子与信息学报》 EI CSCD 北大核心 2011年第2期272-277,共6页
现有大规模IP流处理方式中,哈希机制极具优势而在高速网络环境下被广泛采用,但其查找性能直接受限于访存次数。该文主要研究了CAM(Content Addressable Memory)辅助的哈希表(CAHT)查找性能。利用合理的近似,推导了单函数CAHT查找时平均... 现有大规模IP流处理方式中,哈希机制极具优势而在高速网络环境下被广泛采用,但其查找性能直接受限于访存次数。该文主要研究了CAM(Content Addressable Memory)辅助的哈希表(CAHT)查找性能。利用合理的近似,推导了单函数CAHT查找时平均访存次数的理论下限;结合单函数CAHT的分析结论给出了多函数CAHT查找时达到平均访存次数最小的条件。最后,使用实际网络数据验证了分析结果的有效性,为准确评估CAHT处理能力提供了必要的理论依据。 展开更多
关键词 CAM(Content ADDRESSABLE Memory)辅助的哈希表(CAHT) 查找 平均访存次数下限 泊松分布
在线阅读 下载PDF
一种支持多维资源描述的高效P2P路由算法 被引量:1
15
作者 宋伟 李瑞轩 +1 位作者 卢正鼎 於光灿 《软件学报》 EI CSCD 北大核心 2007年第11期2851-2862,共12页
在分析现有P2P(peer to peer)路由算法的基础上,提出了一种基于二阶矩定位、支持多维资源数据描述的高效资源路由算法——FAN(flabellate addressable network)路由算法.FAN算法将节点映射到统一的多维笛卡尔空间,并以节点相对空间原点... 在分析现有P2P(peer to peer)路由算法的基础上,提出了一种基于二阶矩定位、支持多维资源数据描述的高效资源路由算法——FAN(flabellate addressable network)路由算法.FAN算法将节点映射到统一的多维笛卡尔空间,并以节点相对空间原点的二阶矩作为子空间管理和资源搜索的依据.FAN路由算法具有O(log(N/k))的高路由效率,在节点加入和退出FAN网络时,更新路由信息的代价为O(klog(N/k)).实验结果表明,FAN路由算法具有路由效率高、维护代价小的优点,是一种P2P环境中支持多维资源数据描述的高效结构化资源路由算法.而且,目前部分基于CAN(content-addressable network)网络的改进算法也可以在FAN网络中适用,并获得更好的路由效率和更低的维护代价. 展开更多
关键词 P2P(peer to peer) FAN(flabellate ADDRESSABLE network)路由算法 二阶矩定位 资源搜索 多维资源描述
在线阅读 下载PDF
基于XML和COM(MAPI)的通用地址簿设计 被引量:1
16
作者 葛春林 周杰 蔡磊 《计算机应用与软件》 CSCD 2009年第12期82-85,共4页
步入信息时代,邮箱、传真机已经成为人们通信的重要平台,一般的传真机、邮箱都携带自身的地址簿,并不是所有邮箱、传真机的地址簿都可以兼容。通用的地址簿,对于开发一个邮件系统或传真机的驱动就可以直接采用,提高效率以及代码的重用... 步入信息时代,邮箱、传真机已经成为人们通信的重要平台,一般的传真机、邮箱都携带自身的地址簿,并不是所有邮箱、传真机的地址簿都可以兼容。通用的地址簿,对于开发一个邮件系统或传真机的驱动就可以直接采用,提高效率以及代码的重用性。目前使用较多的地址簿有Microsoft的WAB(Windows address book)、Outlook Address Book等,但有些地址簿不兼容,即一种地址簿格式不能导入到另一种地址簿中,通过Microsoft提供的MAPI(Messaging Application Programming Interface)探讨了如何使用这种COM组件技术和XML来实现一个简单的支持多种格式的地址簿管理工具。 展开更多
关键词 COM MAPI Windows ADDRESS BOOK XML
在线阅读 下载PDF
ARP协议简介及ARP木马防治 被引量:7
17
作者 苗恺 周轲 《河南机电高等专科学校学报》 CAS 2006年第6期32-33,共2页
介绍了ARP协议的工作原理。针对ARP的特点,在局域网内查找感染ARP木马的主机,提出防治ARP木马的相关办法。
关键词 ARP(Address RESOLUTION Protoc01) MAC地址 IP地址
在线阅读 下载PDF
网络地址转换器友好通讯构件的设计与实现 被引量:1
18
作者 贺清碧 黄大荣 赵玲 《科学技术与工程》 北大核心 2016年第18期197-203,224,共8页
为了解决IPv4地址匮乏问题,网络中部署了大量的NAT设备,而NAT的部署破坏了Internet端到端的特性,并给不断发展的网络多媒体应用带来了障碍。针对该问题,提出一套系统化的NAT穿透方案,实现了一种具有NAT穿透能力的构件,可平滑地植入现有... 为了解决IPv4地址匮乏问题,网络中部署了大量的NAT设备,而NAT的部署破坏了Internet端到端的特性,并给不断发展的网络多媒体应用带来了障碍。针对该问题,提出一套系统化的NAT穿透方案,实现了一种具有NAT穿透能力的构件,可平滑地植入现有的流媒体产品中,并降低软件开发的复杂度,从而可很好地解决NAT部署带给流媒体的障碍。 展开更多
关键词 网络地址转换器(network ADDRESS sranslator NAT)穿透 音视频通讯 STUN
在线阅读 下载PDF
A survey on life prediction of equipment 被引量:15
19
作者 Hu Changhua Zhou Zhijie +1 位作者 Zhang Jianxun Si Xiaosheng 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第1期25-33,共9页
Once in the hands of end users, such durable equipment as spacecraft, aircraft, ships,automobiles, computers, etc. are in a state of debugging, working or storage. In either state, availability, reliability and super-... Once in the hands of end users, such durable equipment as spacecraft, aircraft, ships,automobiles, computers, etc. are in a state of debugging, working or storage. In either state, availability, reliability and super-efficiency are the ultimate goals, which have been achieved through constant monitoring as well as regular, preventive, routine and corrective maintenance. Although some advanced instruments can visualize certain invisible malfunctioning phenomena into visible ones, deeply hidden troubles cannot be found unless monitoring and testing data are addressed using tools that process the data statistically, analytically and mathematically. Some state-of-theart trouble-shooting and life-predicting techniques and approaches are introduced in this paper. 展开更多
关键词 hidden uncertainty accelerated instruments shooting ultimate maintenance visible addressed trouble
原文传递
NAT专网下的数据流穿透研究与实现 被引量:2
20
作者 邰非 苏华 +1 位作者 诸啸军 宋培龙 《计算机与数字工程》 2011年第5期112-114,共3页
设置NAT能有效防止外部用户访问局域网内部资源,但却给同机构不同地域局域网间访问带来很多限制,已布署的实时流媒体软件因不具备NAT穿透功能,从而导致传输受阻,单方面地去改造这些流媒体软件,将会引发诸如:时间、成本、安全性等一系列... 设置NAT能有效防止外部用户访问局域网内部资源,但却给同机构不同地域局域网间访问带来很多限制,已布署的实时流媒体软件因不具备NAT穿透功能,从而导致传输受阻,单方面地去改造这些流媒体软件,将会引发诸如:时间、成本、安全性等一系列问题。本文提供的agent原型,利用端口映射机制,代理穿透通道并对它们进行动态分配、释放及安全认证,从而打破NAT屏障。Agent同时提供很好的可扩展性,可方便集成到其它传输系统之中,具有极高的使用价值。 展开更多
关键词 NETWORK ADDRESS Translation(NAT) 数据穿透 端口映射 加密
在线阅读 下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部