期刊文献+
共找到653篇文章
< 1 2 33 >
每页显示 20 50 100
Analysis on traffic characteristics and transmission efficiency of instant messager services
1
作者 李克 Li Wenfa +1 位作者 Su Limin Chen Xiaodan 《High Technology Letters》 EI CAS 2015年第4期439-449,共11页
Traffic characteristics of several typical instant messager services under certain scenarios are firstly analyzed,based on real-time data collected in the commercial mobile network.Then criteria for the evaluation of ... Traffic characteristics of several typical instant messager services under certain scenarios are firstly analyzed,based on real-time data collected in the commercial mobile network.Then criteria for the evaluation of the efficiency of the mobile network for the transmission of packet services are proposed in both transport layer and physical layer over air interface.The transmission efficiency of IM services is evaluated and compared under the proposed criteria.Furthermore,a so-called smart resource adaptation algorithm is verified in the effectiveness of improving the wireless transmission efficiency.Finally,improvements to the smart resource adaptation are proposed to further improve the wireless transmission efficiency,and its effectiveness is verified by the calculations. 展开更多
关键词 transmission efficiency traffic model instant messager keep-alive mechanism wireless resource TCP packet
在线阅读 下载PDF
Impact of message fatigue and individual behavioral responses on epidemiological spread in temporal simplicial networks 被引量:1
2
作者 Xiao-Nan Fan Xuemei You 《Chinese Physics B》 2025年第3期32-43,共12页
Health information spreads rapidly,which can effectively control epidemics.However,the swift dissemination of information also has potential negative impacts,which increasingly attracts attention.Message fatigue refer... Health information spreads rapidly,which can effectively control epidemics.However,the swift dissemination of information also has potential negative impacts,which increasingly attracts attention.Message fatigue refers to the psychological response characterized by feelings of boredom and anxiety that occur after receiving an excessive amount of similar information.This phenomenon can alter individual behaviors related to epidemic prevention.Additionally,recent studies indicate that pairwise interactions alone are insufficient to describe complex social transmission processes,and higher-order structures representing group interactions are crucial.To address this,we develop a novel epidemic model that investigates the interactions between information,behavioral responses,and epidemics.Our model incorporates the impact of message fatigue on the entire transmission system.The information layer is modeled using a static simplicial network to capture group interactions,while the disease layer uses a time-varying network based on activity-driven model with attractiveness to represent the self-protection behaviors of susceptible individuals and self-isolation behaviors of infected individuals.We theoretically describe the co-evolution equations using the microscopic Markov chain approach(MMCA)and get the epidemic threshold.Experimental results show that while the negative impact of message fatigue on epidemic transmission is limited,it significantly weakens the group interactions depicted by higher-order structures.Individual behavioral responses strongly inhibit the epidemic.Our simulations using the Monte Carlo(MC)method demonstrate that greater intensity in these responses leads to clustering of susceptible individuals in the disease layer.Finally,we apply the proposed model to real networks to verify its reliability.In summary,our research results enhance the understanding of the information-epidemic coupling dynamics,and we expect to provide valuable guidance for managing future emerging epidemics. 展开更多
关键词 Monte Carlo simulation microscopic Markov chain approach message fatigue information-epidemic coupled spreading simplicial complex
原文传递
Design of improved error-rate sliding window decoder for SC-LDPC codes: reliable termination and channel value reuse
3
作者 JIA Xishan LI Jining +3 位作者 YAO Yuan WANG Yifan LIU Bo XU Degang 《Optoelectronics Letters》 2025年第4期212-217,共6页
In this paper,an improved error-rate sliding window decoder is proposed for spatially coupled low-density parity-check(SC-LDPC)codes.For the conventional sliding window decoder,the message retention mechanism causes u... In this paper,an improved error-rate sliding window decoder is proposed for spatially coupled low-density parity-check(SC-LDPC)codes.For the conventional sliding window decoder,the message retention mechanism causes unreliable messages along the edges of belief propagation(BP)decoding in the current window to be kept for subsequent window decoding.To improve the reliability of the retained messages during the window transition,a reliable termination method is embedded,where the retained messages undergo more reliable parity checks.Additionally,decoding failure is unavoidable and even causes error propagation when the number of errors exceeds the error-correcting capability of the window.To mitigate this problem,a channel value reuse mechanism is designed,where the received channel values are utilized to reinitialize the window.Furthermore,considering the complexity and performance of decoding,a feasible sliding optimized window decoding(SOWD)scheme is introduced.Finally,simulation results confirm the superior performance of the proposed SOWD scheme in both the waterfall and error floor regions.This work has great potential in the applications of wireless optical communication and fiber optic communication. 展开更多
关键词 reliable termination message retention mechanism reliable termination method sliding window decoderthe error rate sliding window decoder belief propagation bp decoding retained messages
原文传递
Partners in Progress Congratulatory message from Nguyen Thi Huong, Vietnam’s Consul General in Nanning for the 22nd CAEXPO
4
《China Report ASEAN》 2025年第9期22-23,共2页
The China-ASEAN Expo(CAEXPO),held annually in Nanning City of Guangxi Zhuang Autonomous Region since 2004,has become a pivotal platform for economic and trade exchange between China,Vietnam,and other ASEAN member stat... The China-ASEAN Expo(CAEXPO),held annually in Nanning City of Guangxi Zhuang Autonomous Region since 2004,has become a pivotal platform for economic and trade exchange between China,Vietnam,and other ASEAN member states.Over the years,CAEXPO has proven to be a highly effective mechanism for fostering international cooperation,playing a vital role in establishing ASEAN as China’s largest trading partner and positioning China as the foremost trade partner of many ASEAN countries,including Vietnam. 展开更多
关键词 huong PARTNERS thi MESSAGE trade partner nguyen congratulatory fostering international cooperationplaying
在线阅读 下载PDF
Efficient Data Aggregation and Message Transmission for Information Processing Model in the CPS-WSN
5
作者 Chao-Hsien Hsieh Qingqing Yang +2 位作者 Dehong Kong Fengya Xu Hongmei Wang 《Computers, Materials & Continua》 2025年第2期2869-2891,共23页
The Cyber-Physical Systems (CPS) supported by Wireless Sensor Networks (WSN) helps factories collect data and achieve seamless communication between physical and virtual components. Sensor nodes are energy-constrained... The Cyber-Physical Systems (CPS) supported by Wireless Sensor Networks (WSN) helps factories collect data and achieve seamless communication between physical and virtual components. Sensor nodes are energy-constrained devices. Their energy consumption is typically correlated with the amount of data collection. The purpose of data aggregation is to reduce data transmission, lower energy consumption, and reduce network congestion. For large-scale WSN, data aggregation can greatly improve network efficiency. However, as many heterogeneous data is poured into a specific area at the same time, it sometimes causes data loss and then results in incompleteness and irregularity of production data. This paper proposes an information processing model that encompasses the Energy-Conserving Data Aggregation Algorithm (ECDA) and the Efficient Message Reception Algorithm (EMRA). ECDA is divided into two stages, Energy conservation based on the global cost and Data aggregation based on ant colony optimization. The EMRA comprises the Polling Message Reception Algorithm (PMRA), the Shortest Time Message Reception Algorithm (STMRA), and the Specific Condition Message Reception Algorithm (SCMRA). These algorithms are not only available for the regularity and directionality of sensor information transmission, but also satisfy the different requirements in small factory environments. To compare with the recent HPSO-ILEACH and E-PEGASIS, DCDA can effectively reduce energy consumption. Experimental results show that STMRA consumes 1.3 times the time of SCMRA. Both optimization algorithms exhibit higher time efficiency than PMRA. Furthermore, this paper also evaluates these three algorithms using AHP. 展开更多
关键词 WSN-CPS assembly line message transmission data aggregation energy conservation
在线阅读 下载PDF
Learning-Based Turbo Message Passing for Channel Estimation in Rich-Scattering MIMO-OFDM
6
作者 Huang Zhouyang Jiang Wenjun +2 位作者 Yuan Xiaojun Wang Li Zuo Yong 《China Communications》 2025年第6期154-167,共14页
In this paper,we focus on the channel estimation for multi-user MIMO-OFDM systems in rich scattering environments.We find that channel sparsity in the delay-angle domain is severely compromised in rich scattering envi... In this paper,we focus on the channel estimation for multi-user MIMO-OFDM systems in rich scattering environments.We find that channel sparsity in the delay-angle domain is severely compromised in rich scattering environments,so that most existing compressed sensing(CS)based techniques can harvest a very limited gain(if any)in reducing the channel estimation overhead.To address the problem,we propose the learning-based turbo message passing(LTMP)algorithm.Instead of exploiting the channel sparsity,LTMP is able to efficiently extract the channel feature via deep learning as well as to exploit the channel continuity in the frequency domain via block-wise linear modelling.More specifically,as a component of LTMP,we develop a multi-scale parallel dilated convolutional neural network(MPDCNN),which leverages frequency-space channel correlation in different scales for channel denoising.We evaluate the LTMP’s performance in MIMO-OFDM channels using the 3rd generation partnership project(3GPP)clustered delay line(CDL)channel models.Simulation results show that the proposed channel estimation method has more than 5 dB power gain than the existing algorithms when the normalized mean-square error of the channel estimation is-20 dB.The proposed algorithm also exhibits strong robustness in various environments. 展开更多
关键词 channel estimation deep learning dilated CNN message passing MIMO-OFDM rich scattering environments
在线阅读 下载PDF
ITU Year in Review 2024:Secretary-General’s message
7
作者 《China Standardization》 2025年第1期50-50,共1页
If 2024 has taught me anything,it’s that digital is an irrefutable force for unity—a much-needed catalyst for global cooperation in an increasingly fragmented world.This truth has been on display all year long,somet... If 2024 has taught me anything,it’s that digital is an irrefutable force for unity—a much-needed catalyst for global cooperation in an increasingly fragmented world.This truth has been on display all year long,sometimes against the odds.And it’s evident in the adoption of the Pact for the Future and Global Digital Compact at the United Nations General Assembly,in the outcomes of the World Telecommunication Standardization Assembly(WTSA-24),and in the wide endorsement of the COP29 Declaration on Green Digital Action. 展开更多
关键词 TELECOMMUNICATION COMPACT MESSAGE
原文传递
Index Modulation Aided OTFS for SCMA System
8
作者 He Chunlin Xiao Lixia +3 位作者 Li Shuo Liu Weidan Xiao Pei Jiang Tao 《China Communications》 2025年第8期19-28,共10页
In this paper,an index modulation(IM)aided uplink orthogonal time frequency space modulation(OTFS)structure for sparse code multiple access(SCMA)is proposed.To be more specific,the information bits are firstly partiti... In this paper,an index modulation(IM)aided uplink orthogonal time frequency space modulation(OTFS)structure for sparse code multiple access(SCMA)is proposed.To be more specific,the information bits are firstly partitioned for transmit antenna(TA)selection and sparse codeword mapping,respectively.Subsequently,the codewords deployed on the 2-dimensional(2D)delay-Doppler(DD)plane are transmitted by the selected TA,and the superimposed signals are jointly detected at the receiver.Furthermore,a low-complexity zero-embedded expectation propagation(ZE-EP)detector is conceived,where the codebooks are extended with zero vectors to reflect the silent indices.The simulation results demonstrate that the proposed IM-OTFS-SCMA system is capable of providing significant performance gain over the OTFS-SCMA counterpart. 展开更多
关键词 expectation propagation algorithm index modulation message passing algorithm OTFS SCMA
在线阅读 下载PDF
SELECTED REMARKS OF CHINESE PRESIDENT XI JINPING
9
《ChinAfrica》 2025年第2期6-6,共1页
On New Year’s Eve,Chinese President Xi Jinping delivered his 2025 New Year message through China Media Group and the Internet.Edited excerpts of the message follow:Nurtured by our 5,000-plus years of continuous civil... On New Year’s Eve,Chinese President Xi Jinping delivered his 2025 New Year message through China Media Group and the Internet.Edited excerpts of the message follow:Nurtured by our 5,000-plus years of continuous civilisation,our country,China,is engraved not only on the bottom of the ancient bronze ritual wine vessel of He Zun,but also in the heart of every Chinese. 展开更多
关键词 MESSAGE BRONZE delivered
原文传递
Dual Self-attention Fusion Message Neural Network for Virtual Screening in Drug Discovery by Molecular Property Prediction
10
作者 Jingjing Wang Kangming Hou +2 位作者 Hao Chen Jing Fang Hongzhen Li 《Journal of Bionic Engineering》 2025年第1期354-369,共16页
The development of deep learning has made non-biochemical methods for molecular property prediction screening a reality,which can increase the experimental speed and reduce the experimental cost of relevant experiment... The development of deep learning has made non-biochemical methods for molecular property prediction screening a reality,which can increase the experimental speed and reduce the experimental cost of relevant experiments.There are currently two main approaches to representing molecules:(a)representing molecules by fixing molecular descriptors,and(b)representing molecules by graph convolutional neural networks.Currently,both of these Representative methods have achieved some results in their respective experiments.Based on past efforts,we propose a Dual Self-attention Fusion Message Neural Network(DSFMNN).DSFMNN uses a combination of dual self-attention mechanism and graph convolutional neural network.Advantages of DSFMNN:(1)The dual self-attention mechanism focuses not only on the relationship between individual subunits in a molecule but also on the relationship between the atoms and chemical bonds contained in each subunit.(2)On the directed molecular graph,a message delivery approach centered on directed molecular bonds is used.We test the performance of the model on eight publicly available datasets and compare the performance with several models.Based on the current experimental results,DSFMNN has superior performance compared to previous models on the datasets applied in this paper. 展开更多
关键词 Directed message passing network Deep learning Molecular property prediction Self-attention mechanism
暂未订购
Sparse graph neural network aided efficient decoder for polar codes under bursty interference
11
作者 Shengyu Zhang Zhongxiu Feng +2 位作者 Zhe Peng Lixia Xiao Tao Jiang 《Digital Communications and Networks》 2025年第2期359-364,共6页
In this paper,a sparse graph neural network-aided(SGNN-aided)decoder is proposed for improving the decoding performance of polar codes under bursty interference.Firstly,a sparse factor graph is constructed using the e... In this paper,a sparse graph neural network-aided(SGNN-aided)decoder is proposed for improving the decoding performance of polar codes under bursty interference.Firstly,a sparse factor graph is constructed using the encoding characteristic to achieve high-throughput polar decoding.To further improve the decoding performance,a residual gated bipartite graph neural network is designed for updating embedding vectors of heterogeneous nodes based on a bidirectional message passing neural network.This framework exploits gated recurrent units and residual blocks to address the gradient disappearance in deep graph recurrent neural networks.Finally,predictions are generated by feeding the embedding vectors into a readout module.Simulation results show that the proposed decoder is more robust than the existing ones in the presence of bursty interference and exhibits high universality. 展开更多
关键词 Sparse graph neural network Polar codes Bursty interference Sparse factor graph Message passing neural network
在线阅读 下载PDF
State-Incomplete Intelligent Dynamic Multipath Routing Algorithm in LEO Satellite Networks
12
作者 Peng Liang Wang Xiaoxiang 《China Communications》 2025年第2期1-11,共11页
The low Earth orbit(LEO)satellite networks have outstanding advantages such as wide coverage area and not being limited by geographic environment,which can provide a broader range of communication services and has bec... The low Earth orbit(LEO)satellite networks have outstanding advantages such as wide coverage area and not being limited by geographic environment,which can provide a broader range of communication services and has become an essential supplement to the terrestrial network.However,the dynamic changes and uneven distribution of satellite network traffic inevitably bring challenges to multipath routing.Even worse,the harsh space environment often leads to incomplete collection of network state data for routing decision-making,which further complicates this challenge.To address this problem,this paper proposes a state-incomplete intelligent dynamic multipath routing algorithm(SIDMRA)to maximize network efficiency even with incomplete state data as input.Specifically,we model the multipath routing problem as a markov decision process(MDP)and then combine the deep deterministic policy gradient(DDPG)and the K shortest paths(KSP)algorithm to solve the optimal multipath routing policy.We use the temporal correlation of the satellite network state to fit the incomplete state data and then use the message passing neuron network(MPNN)for data enhancement.Simulation results show that the proposed algorithm outperforms baseline algorithms regarding average end-to-end delay and packet loss rate and performs stably under certain missing rates of state data. 展开更多
关键词 deep deterministic policy gradient LEO satellite network message passing neuron network multipath routing
在线阅读 下载PDF
Turbo Message Passing Based Burst Interference Cancellation for Data Detection in Massive MIMO-OFDM Systems 被引量:2
13
作者 Wenjun Jiang Zhihao Ou +1 位作者 Xiaojun Yuan Li Wang 《China Communications》 SCIE CSCD 2024年第2期143-154,共12页
This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst inte... This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst interference may occur only on data symbols but not on pilot symbols, which means that interference information cannot be premeasured. To cancel the burst interference, we first revisit the uplink multi-user system and develop a matrixform system model, where the covariance pattern and the low-rank property of the interference matrix is discussed. Then, we propose a turbo message passing based burst interference cancellation(TMP-BIC) algorithm to solve the data detection problem, where the constellation information of target data is fully exploited to refine its estimate. Furthermore, in the TMP-BIC algorithm, we design one module to cope with the interference matrix by exploiting its lowrank property. Numerical results demonstrate that the proposed algorithm can effectively mitigate the adverse effects of burst interference and approach the interference-free bound. 展开更多
关键词 burst interference cancellation data detection massive multiple-input multiple-output(MIMO) message passing orthogonal frequency division multiplexing(OFDM)
在线阅读 下载PDF
An MPI parallel DEM-IMB-LBM framework for simulating fluid-solid interaction problems 被引量:2
14
作者 Ming Xia Liuhong Deng +3 位作者 Fengqiang Gong Tongming Qu Y.T.Feng Jin Yu 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第6期2219-2231,共13页
The high-resolution DEM-IMB-LBM model can accurately describe pore-scale fluid-solid interactions,but its potential for use in geotechnical engineering analysis has not been fully unleashed due to its prohibitive comp... The high-resolution DEM-IMB-LBM model can accurately describe pore-scale fluid-solid interactions,but its potential for use in geotechnical engineering analysis has not been fully unleashed due to its prohibitive computational costs.To overcome this limitation,a message passing interface(MPI)parallel DEM-IMB-LBM framework is proposed aimed at enhancing computation efficiency.This framework utilises a static domain decomposition scheme,with the entire computation domain being decomposed into multiple subdomains according to predefined processors.A detailed parallel strategy is employed for both contact detection and hydrodynamic force calculation.In particular,a particle ID re-numbering scheme is proposed to handle particle transitions across sub-domain interfaces.Two benchmarks are conducted to validate the accuracy and overall performance of the proposed framework.Subsequently,the framework is applied to simulate scenarios involving multi-particle sedimentation and submarine landslides.The numerical examples effectively demonstrate the robustness and applicability of the MPI parallel DEM-IMB-LBM framework. 展开更多
关键词 Discrete element method(DEM) Lattice Boltzmann method(LBM) Immersed moving boundary(IMB) Multi-cores parallelization Message passing interface(MPI) CPU Submarine landslides
在线阅读 下载PDF
Anti-Spoofing:Integrated Information Authentication of BeiDou-ⅡCivil Navigation Message 被引量:1
15
作者 Wu Zhijun Liang Cheng +2 位作者 Zhang Yun Liu Rusen Yue Meng 《China Communications》 SCIE CSCD 2024年第9期242-261,共20页
The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can le... The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication. 展开更多
关键词 anti-spoofing AUTHENTICATION BeiDou-II civil navigation message(BDII-CNAV) SIGNATURE spoofing attack
在线阅读 下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells 被引量:1
16
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 Network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
在线阅读 下载PDF
MQTT协议在机舱监测报警系统中的应用 被引量:3
17
作者 侯艳杰 焦少侠 +1 位作者 陈天祥 于栋亮 《船舶标准化工程师》 2024年第S01期45-49,共5页
为了探究消息队列遥测传输(Message Queuing Telemetry Transport, MQTT)协议在机舱监测报警系统中应用的可行性,基于机舱监测报警系统的发展现状,结合MQTT协议的工作流程及使用特点,对MQTT协议在机舱监测报警系统中实船应用的案例进行... 为了探究消息队列遥测传输(Message Queuing Telemetry Transport, MQTT)协议在机舱监测报警系统中应用的可行性,基于机舱监测报警系统的发展现状,结合MQTT协议的工作流程及使用特点,对MQTT协议在机舱监测报警系统中实船应用的案例进行分析。结果表明:采用MQTT协议传输信息到监测报警系统,所需要的通信电缆较少,能够传输的信号量明显增加,可显著降低船舶建造和后期运营维护成本。研究成果可为未来机舱监测报警系统的应用发展提供一定参考。 展开更多
关键词 机舱监测报警系统 消息队列遥测传输(Message Queuing Telemetry Transport MQTT) 物联网(Internet of Things IoT) 通信协议
在线阅读 下载PDF
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
18
作者 Syeda Wajiha Zahra Muhammad Nadeem +6 位作者 Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2024年第1期589-616,共28页
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear... Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms. 展开更多
关键词 Replay attack MALWARE message attack file encryption CRYPTOLOGY data security
在线阅读 下载PDF
BDSec:Security Authentication Protocol for BeiDou-Ⅱ Civil Navigation Message
19
作者 Wu Zhijun Zhang Yuan +2 位作者 Yang Yiming Wang Peng Yue Meng 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s... Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV. 展开更多
关键词 BDII civil navigation messages(BDIICNAV) BeiDou navigation satellite system(BDS) identity-based cryptography mechanism navigation message authentication protocol(BDSec)
在线阅读 下载PDF
Static Analysis Techniques for Fixing Software Defects in MPI-Based Parallel Programs
20
作者 Norah Abdullah Al-Johany Sanaa Abdullah Sharaf +1 位作者 Fathy Elbouraey Eassa Reem Abdulaziz Alnanih 《Computers, Materials & Continua》 SCIE EI 2024年第5期3139-3173,共35页
The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed memorysystems.However, MPI implementations can contain defects that impact the reliability and performance of par... The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed memorysystems.However, MPI implementations can contain defects that impact the reliability and performance of parallelapplications. Detecting and correcting these defects is crucial, yet there is a lack of published models specificallydesigned for correctingMPI defects. To address this, we propose a model for detecting and correcting MPI defects(DC_MPI), which aims to detect and correct defects in various types of MPI communication, including blockingpoint-to-point (BPTP), nonblocking point-to-point (NBPTP), and collective communication (CC). The defectsaddressed by the DC_MPI model include illegal MPI calls, deadlocks (DL), race conditions (RC), and messagemismatches (MM). To assess the effectiveness of the DC_MPI model, we performed experiments on a datasetconsisting of 40 MPI codes. The results indicate that the model achieved a detection rate of 37 out of 40 codes,resulting in an overall detection accuracy of 92.5%. Additionally, the execution duration of the DC_MPI modelranged from 0.81 to 1.36 s. These findings show that the DC_MPI model is useful in detecting and correctingdefects in MPI implementations, thereby enhancing the reliability and performance of parallel applications. TheDC_MPImodel fills an important research gap and provides a valuable tool for improving the quality ofMPI-basedparallel computing systems. 展开更多
关键词 High-performance computing parallel computing software engineering software defect message passing interface DEADLOCK
在线阅读 下载PDF
上一页 1 2 33 下一页 到第
使用帮助 返回顶部