期刊文献+
共找到1,454篇文章
< 1 2 73 >
每页显示 20 50 100
Formal Specifications and Verification of a Secure Communication Protocol Model 被引量:2
1
作者 夏阳 陆余良 蒋凡 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2003年第2期90-97,共8页
This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, system... This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, systematic construction and state transition of EABM. Then , it describes the channels and the process of state transition of EABM in terms of ESTELLE. At last, it offers a verification of the accuracy of the EABM model. 展开更多
关键词 protocol model ESTELLE Extended alternating bit machine.
在线阅读 下载PDF
An Optimized Protocol of Azoxymethane-Dextran Sodium Sulfate Induced Colorectal Tumor Model in Mice 被引量:2
2
作者 梁玺 胡婧楠 何建明 《Chinese Medical Sciences Journal》 CAS CSCD 2019年第4期281-288,共8页
Since azoxymethane(AOM)-dextran sodium sulfate(DSS)induced tumorigenesis was used to explore inflammation-associated carcinogenesis of sporadic colorectal cancer(CRC),different administration modes of AOM or DSS have ... Since azoxymethane(AOM)-dextran sodium sulfate(DSS)induced tumorigenesis was used to explore inflammation-associated carcinogenesis of sporadic colorectal cancer(CRC),different administration modes of AOM or DSS have been reported.In this article we optimized the protocol of the AOM-DSS modeling using C57BL/6 mice for study on sporadic CRC by intraperitoneal injecting AOM solution at a proper concentration with a 100μl sterile syringe once,feeding with DSS solution for 7 days in a roll and change DSS solution every day.More than 100 C57BL/6 mice had been treated with the optimized protocol,and all mice were demonstrated suffering from colorectal tumors when sacrificed in 8 to 20 weeks after AOM injection.These tumors mainly occurred in distal segment of colorectum with an increase in tumor density,which was similar to CRC in human beings.Tumor per mouse was high,and variation of tumor number per mouse was low.The histology of tumor developed through the defined stage ranged from precursor lesions,adenomatous lesions,adenomas to adenocarcinomas.The modified protocol of AOM-DSS model is easy,cheap,with high tumor formation rate of colorectal tumors. 展开更多
关键词 animal model colorectal cancer INFLAMMATION protocol
暂未订购
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker 被引量:1
3
作者 Prabhu Kaliappan Hartmut Koenig 《Journal of Software Engineering and Applications》 2008年第1期13-19,共7页
The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, security, etc., are being developed day-to-day which of... The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, security, etc., are being developed day-to-day which often leads to rapid, premature developments. Many protocols have not scaled to satisfy important properties like deadlock and livelock freedom, since MDA focuses on the rapid development rather than on the quality of the developed models. In order to fix the above, we introduce a 2-Phase strategy based on the UML state machine and sequence diagram. The state machine is converted into PROMELA code as a protocol model and its properties are derived from the sequence diagram as Linear Temporal Logic (LTL) through automation. The PROMELA code is interpreted through the SPIN model checker, which helps to simulate the behavior of protocol. Later the automated LTL properties are supplemented to the SPIN for the verification of protocol properties. The results are compared with the developed UML model and SPIN simulated model. Our test results impress the designer to verify the expected results with the system design and to identify the errors which are unnoticed during the design phase. 展开更多
关键词 UML modeling Communication protocols protocol VERIFICATION SPIN Tool
暂未订购
Research on the Computer Network Protocol Test Model based on Genetic and Random Walk Algorithm
4
作者 Ping Li 《International Journal of Technology Management》 2016年第8期39-42,共4页
In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of net... In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of network system. Fully understand and grasp of thenetwork protocols for managers is there is a big diffi cult. Network covert channel is the evaluation of intrusion detection system and fi rewallsecurity performance of an important means, the paper will start from the angle of the attacker, the fl aws of the research, and use this kind ofdefect to realize network covert channel, the random walk algorithm will be feasible for dealing with this issue. For achieving this, we integratethe genetic and random walk algorithm for systematic optimization. 展开更多
关键词 Computer Network protocol Test model Genetic and Random Walk Algorithm.
在线阅读 下载PDF
Analysis of reactive routing protocols for mobile ad hoc networks in Markov models
5
作者 王汉兴 胡细 +1 位作者 方建超 贾维嘉 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2007年第1期127-139,共13页
Mobile ad hoc networks (MANETs) have become a hot issue in the area of wireless networks for their non-infrastructure and mobile features. In this paper, a MANET is modeled so that the length of each link in the net... Mobile ad hoc networks (MANETs) have become a hot issue in the area of wireless networks for their non-infrastructure and mobile features. In this paper, a MANET is modeled so that the length of each link in the network is considered as a birthdeath process and the space is reused for n times in the flooding process, which is named as an n-spatiai reuse birth-death model (n-SRBDM). We analyze the performance of the network under the dynamic source routing protocol (DSR) which is a famous reactive routing protocol. Some performance parameters of the route discovery are studied such as the probability distribution and the expectation of the flooding distance, the probability that a route is discovered by a query packet with a hop limit, the probability that a request packet finds a τ-time-valid route or a symmetric-valid route, and the average time needed to discover a valid route. For the route maintenance, some parameters are introduced and studied such as the average frequency of route recovery and the average time of a route to be valid. We compare the two models with spatial reuse and without spatial reuse by evaluating these parameters. It is shown that the spatial reuse model is much more effective in routing. 展开更多
关键词 Mobile ad hoc network Markov model routing protocol performance analysis
在线阅读 下载PDF
Symbolic Model Checking and Analysis for E-Commerce Protocol
6
作者 文静华 张梅 李祥 《Journal of Electronic Science and Technology of China》 2005年第3期213-217,共5页
A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects- non-repudiat... A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects- non-repudiation and fairness using SME. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker. 展开更多
关键词 e-commerce protocols FAIRNESS symbolic model verification
在线阅读 下载PDF
APN Model for Specification of the Communication Protocols in Multi-Agent System
7
作者 Marzougui Borhen Kamel Barkaoui NejibBen Hadj Alouane 《Journal of Software Engineering and Applications》 2013年第9期14-22,共9页
This paper deals with the proposal of a new model based on Agent Petri Nets (APN) to specify interactions among agents in Multi Agents System (MAS). Indeed, an agent approach requires a powerful and expressive formali... This paper deals with the proposal of a new model based on Agent Petri Nets (APN) to specify interactions among agents in Multi Agents System (MAS). Indeed, an agent approach requires a powerful and expressive formalism that allows him to model the behavior of a set of agents that interact. We are modeling some variants of FIPA standard protocols. Our Models are found based on communicating cognitive agents. Each Agent is capable of perceiving their environment partly and building, sending and receiving messages. 展开更多
关键词 model AP MAS FORMALISM INTERACT FIFA protocols
暂未订购
推动国家智慧教育公共服务平台从资源集成到能力集成的优化路径
8
作者 翟雪松 张丽洁 +2 位作者 易龙珠 王会军 曹培杰 《远程教育杂志》 北大核心 2026年第1期22-30,共9页
随着我国教育国际化和智能化程度的不断深入,来自不同背景的学习者对教育需求也愈发多元。汇聚多方资源,建设大规模个性化学习环境是国家智慧教育公共服务平台的重要战略目标。在基本完成各级各类教育资源集成的使命后,平台开始探索对... 随着我国教育国际化和智能化程度的不断深入,来自不同背景的学习者对教育需求也愈发多元。汇聚多方资源,建设大规模个性化学习环境是国家智慧教育公共服务平台的重要战略目标。在基本完成各级各类教育资源集成的使命后,平台开始探索对现有资源的智能挖掘和整合。特别是在以具身感知和空间计算为代表的下一代人工智能时代,随着专业智能体、分析工具和行业数据包的不断丰富,平台将迎来汇聚外部专业工具并实现能力集成的巨大机遇,为全场域、大规模、个性化的未来课堂提供支撑。能力集成的关键技术路径在于构建一种融通于平台与外部能力服务的技术协议。当下兴起的模型上下文协议(MCP)为平台实现能力集成提供了可行的技术方案。研究从面向学生的大规模个性化学习、支持教师的智慧教学工具创编,以及赋能管理者的多尺度数据治理三个角度,阐释了国家智慧教育平台在直面具身智能时代下,迭代发展的紧迫性。进而,基于MCP的技术特性,分析了其教育应用潜能、融入平台的实践路径和典型场景,旨在推动平台向数据协同高效、业务功能多元的智能应用集群演进,构筑开放、共创、协同的教育新生态。 展开更多
关键词 模型上下文协议 国家智慧教育平台 能力集成 具身智能 大规模个性化学习
在线阅读 下载PDF
引入包分析的E-Model语音质量评价模型改进
9
作者 杨英杰 赵万马 王冲 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2017年第2期149-154,共6页
为了能够更加准确地评价语音包丢失对基于IP的语音传输(voice over internet protocol,Vo IP)的语音质量的损伤,对ITU-T G.107建议书提出的语音质量预测模型E-Model中计算丢包与编码造成的损伤Ie-eff的方法作出改进,在综合考虑语音包的... 为了能够更加准确地评价语音包丢失对基于IP的语音传输(voice over internet protocol,Vo IP)的语音质量的损伤,对ITU-T G.107建议书提出的语音质量预测模型E-Model中计算丢包与编码造成的损伤Ie-eff的方法作出改进,在综合考虑语音包的内部特性和存在突发连续丢包情况后,提出利用在固定语音长度下,语音实际损失时间Tloss来衡量语音包丢失造成的语音损伤。仿真结果表明,相比原有模型,改进后的模型得到的语音质量评分同主观语音质量评估方法(perceptual evaluation of speech quality,PESQ)评分相比,皮尔森相关系数平均提高了0.045 8,均方根误差平均降低了0.053 4,改进后的E-Model模型在评价语音质量时与PESQ更具有一致性,可以更为准确地预测Vo IP通信的语音质量。 展开更多
关键词 基于IP的语音传输(Vo IP) E-model 语音包 丢包
在线阅读 下载PDF
WAP(Wireless Application Protocol)应用技术探讨 被引量:2
10
作者 刘永利 张新 《山东科技大学学报(自然科学版)》 CAS 2001年第3期65-67,共3页
根据WAP协议的总体开发原则和技术思路 ,研究WAP的应用模型 ,在此基础上分析WAP协议栈的结构及各层提供的服务 ,探讨WAP在GSM移动通信系统中的应用 。
关键词 协议栈 应用 模型 移动通信系统 应用技术 SAP协议 开发原则 代理机制 无线通信
在线阅读 下载PDF
Virtual reality mobility model for wireless ad hoc networks 被引量:1
11
作者 Yu Ziyue Gong Bo He Xingui 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期819-826,共8页
For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle en... For wireless ad hoc networks simulation, node's mobility pattern and traffic pattern are two key elements. A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment, and the model uses the path planning method to avoid obstacles and to compute the node's moving path. Obstacles also affect node's signal propagation. Considering these factors, this study implements the mobility model for wireless ad hoc networks. Simulation results show that the model has a significant impact on the performance of protocols. 展开更多
关键词 wireless ad hoc networks computer simulation network protocols mobility models
在线阅读 下载PDF
胆管癌化疗联合免疫治疗患者生活质量现状及影响因素预测模型构建
12
作者 陈宏娟 张敏花 +3 位作者 李露露 陈璨 李苗 荣大伟 《转化医学杂志》 2026年第1期160-164,共5页
目的探究胆管癌化疗联合免疫治疗患者生活质量现状及影响因素,并构建预测模型。方法选择2023年2月至2024年12月南京医科大学第一附属医院收治的180例胆管癌患者作为研究对象,患者均接受化疗联合免疫治疗,治疗后调查患者生活质量评分,采... 目的探究胆管癌化疗联合免疫治疗患者生活质量现状及影响因素,并构建预测模型。方法选择2023年2月至2024年12月南京医科大学第一附属医院收治的180例胆管癌患者作为研究对象,患者均接受化疗联合免疫治疗,治疗后调查患者生活质量评分,采用单因素和多元线性回归分析患者生活质量的影响因素,并根据影响因素构建预测模型,采用受试者工作特征曲线评估模型效能。结果180例患者生活质量评分为(93.72±5.38)分,其中生理维度、功能维度、社会/家庭维度、感情维度分别为(26.49±4.24)分、(24.80±4.13)分、(22.67±3.71)分、(19.76±3.52)分。单因素分析显示,不同年龄、文化水平、家庭月收入、婚姻状态、病灶直径、分期、分化程度患者生活质量评分比较,差异有统计学意义(P<0.05)。多元线性回归分析显示,文化水平、家庭月收入、婚姻状态、病灶直径、分期是胆管癌化疗联合免疫治疗患者生活质量的影响因素(P<0.05)。该模型经受试者工作特征曲线分析后显示,曲线下面积为0.786(95%CI:0.705~0.848),Hosmer-Lemeshow检验显示模型校准度良好(χ^(2)=5.119,P=0.147)。结论胆管癌化疗联合免疫治疗患者生活质量处于中等偏上水平,文化水平、家庭月收入、婚姻状态、病灶直径、分期是影响患者生活质量的因素,基于上述影响因素构建的预测模型预测效能较高。 展开更多
关键词 胆管肿瘤 抗肿瘤联合化疗方案 免疫治疗 生活质量 影响因素分析 预测模型
暂未订购
Mechanical Proofs about BW Multi-Party Contract Signing Protocol 被引量:1
13
作者 ZHANG Ningrong ZHANG Xingyuan WANG Yuanyuan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1516-1520,共5页
We report on the verification of a multi-party contract signing protocol described by Baum-Waidner and Waidner (BW). Based on Paulson's inductive approach, we give the protocol model that includes infinitely many s... We report on the verification of a multi-party contract signing protocol described by Baum-Waidner and Waidner (BW). Based on Paulson's inductive approach, we give the protocol model that includes infinitely many signatories and contract texts signing simuhaneously. We consider composite attacks of the dishonest signatory and the external intruder, formalize cryptographic primitives and protocol arithmetic including attack model, show formal description of key distribution, and prove signature key secrecy theorems and fairness property theorems of the BW protocol using the interactive theorem prover Isabelle/HOL. 展开更多
关键词 formal verification multi-party contract signing protocol inductive approach model
在线阅读 下载PDF
A Realization Method of Protocol Conversion Between Modbus and IEC61850 被引量:1
14
作者 Fan Zhang Yongli Zhu +3 位作者 Chunyu Yan Jiangang Bi Haijun Xiong Shuai Yuan 《Open Journal of Applied Sciences》 2013年第2期18-23,共6页
In order to adapt to the construction needs of the smart grid, smart substation need to solve the problem of protocol conversion between the conventional non-standardized condition monitoring equipment and the standar... In order to adapt to the construction needs of the smart grid, smart substation need to solve the problem of protocol conversion between the conventional non-standardized condition monitoring equipment and the standardized monitoring system. This paper proposed a realization method of conversion method between Modbus and IEC61850. Object-oriented technology is used for information model on Modbus. After the analysis of IEC61850 and MMS information and service model, to establish the model mapping relationship between IEC61850, MMS and Modbus based on the principle of minimum information point which is one to one correspondence. Combined with the implementation of SISCO MMS-EASE LITE software development kit programming, giving a realization method using QT programming techniques based on the mapping model. Finally, the establishment the interval controller as an example of protocol scheme verifies the correctness and the feasibility of protocol conversion method. 展开更多
关键词 MODBUS IEC 61850 protocol CONVERSION model MAPPING Consolidated Monitoring Unit
暂未订购
An Efficient Two-Party Key Exchange Protocol with Strong Security 被引量:2
15
作者 DENG Shaofeng LI Yifa DENG Yiqun 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期267-271,共5页
Combined public key (CPK) cryptography does not need certificates to guarantee the authenticity of public keys and avoids the inherent key escrow problem of identity-based cryptography. Based on the efficient CPK sc... Combined public key (CPK) cryptography does not need certificates to guarantee the authenticity of public keys and avoids the inherent key escrow problem of identity-based cryptography. Based on the efficient CPK scheme, we present an efficient three-round two-party authenticated key exchange protocol with strong security, which is provably secure in the standard model under the decisional Diffie-Hellman (DDH) assumption. The protocol can keep the session key secret from the adversary except that one party's ephemeral private key and static private key are all revealed to the adversary. Compared to the existing protocols, this protocol not only assures strong security but also is more efficient. 展开更多
关键词 combined public key (CPK) authenticated key exchange protocol strong security standard model
原文传递
Problem of Standardization of Configuration Data in Wireless Sensor Networks: The Case of Routing Protocols 被引量:1
16
作者 Thomas Djotio Ndie Judith Soulamite Nouho Noutat 《Wireless Sensor Network》 2012年第7期177-184,共8页
The exploitation of Wireless Sensor Networks (WSN) is constrained by limited power, low computing power and storage and short-range radio transmission. Many routing protocols respecting these constraints were develope... The exploitation of Wireless Sensor Networks (WSN) is constrained by limited power, low computing power and storage and short-range radio transmission. Many routing protocols respecting these constraints were developed but, it still lacks formal and standardized solutions being able to help in their configuration. The configuration management that responds to this concern is very important in this type of network. It consists of the definition of data models to configure and is very necessary for the good network performance. Tangible results were obtained in traditional networks with the emergence of NETCONF and YANG standards, but on the best of our humble knowledge there are none yet in WSNs. We propose in this paper wsn-routing-protocol, a YANG data model for routing protocols configuration in WSNs. Following our model, we propose two YANG configuration data models based on the latter: they are respectively aodv for AODV and rpl for RPL. 展开更多
关键词 N Sensor Network ROUTING protocols CONFIGURATION Data model YANG
暂未订购
GRMP协议中的FEModel在Linux下的实现
17
作者 时磊 王伟明 《计算机工程》 EI CAS CSCD 北大核心 2005年第14期74-76,共3页
GRMP(GeneralRouterManagementProtocol)协议是用于转发和控制单元分离(ForwardingandControlElementSeparation,ForCES)的路由器管理协议。该文介绍了如何利用Linux2.4内核中的模块、软中断、Netfilter等来实现GRMP协议模型中的转发单... GRMP(GeneralRouterManagementProtocol)协议是用于转发和控制单元分离(ForwardingandControlElementSeparation,ForCES)的路由器管理协议。该文介绍了如何利用Linux2.4内核中的模块、软中断、Netfilter等来实现GRMP协议模型中的转发单元模型(ForwardingElementModel,FEModel)。 展开更多
关键词 GRMP 路由器 FORCES FE model 模块 软中断 NETFILTER
在线阅读 下载PDF
随机多址协议下的鲁棒模型预测控制策略
18
作者 黄朕荣 董钰莹 高晨曦 《华侨大学学报(自然科学版)》 2026年第1期119-126,共8页
为在通信资源受限的网络化控制系统中实现对多胞不确定对象的控制,提出一种考虑随机多址协议(RMP)的鲁棒模型预测控制(RMPC)策略。首先,构建一类受通信约束与参数不确定性的闭环系统模型;其次,利用参数依赖Lyapunov函数与线性矩阵不等式... 为在通信资源受限的网络化控制系统中实现对多胞不确定对象的控制,提出一种考虑随机多址协议(RMP)的鲁棒模型预测控制(RMPC)策略。首先,构建一类受通信约束与参数不确定性的闭环系统模型;其次,利用参数依赖Lyapunov函数与线性矩阵不等式,将RMPC优化问题转化为可在线求解的凸优化问题,进而推导保证闭环系统均方稳定的充分条件;最后,对所提策略进行仿真算例验证。结果表明:经过100次独立实验验证,所提策略在随机网络环境下仍能有效保证闭环系统的均方稳定性。 展开更多
关键词 鲁棒预测控制 随机多址协议 网络化控制系统 均方稳定性
在线阅读 下载PDF
Towards a Methodology for Formal Design and Analysis of Agent Interaction Protocols ——An Investigation in Electronic Commerce
19
作者 Wei Jun 1,2 , Cheung Shing Chi 1, Wang Xu 1 1. Department of Computer Science, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong, China 2. Institute of Software, Chinese Academy of Science, Beijing 100080, Ch 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期126-139,共14页
Various extensions of UML have been developed to meet the challenges of designing modern software systems, such as agent based electronic commerce applications. Recent advances in model checking technology have led i... Various extensions of UML have been developed to meet the challenges of designing modern software systems, such as agent based electronic commerce applications. Recent advances in model checking technology have led it to be introduced into the development of approaches and tools to check the correctness of electronic commerce protocols. This paper focuses on the research of a method that connects an extension of AUML to model checker SPIN/Promela for the specification and verification of agent interaction protocols (AIP) in electronic commerce. The method presented here allows us to combine the benefits of visual specification with the power of some static analysis and model checking. Some algorithms and rules are developed to permit all visual modeling constructs translated mechanically into some Promela models of AIP, as supported by the model checker SPIN. Moreover, a process is illustrated to guide the specification and verification of AIP. The method is demonstrated thoroughly using the e commerce protocol NetBill as an example. 展开更多
关键词 agent UML interaction protocol software agent model checking formal specification electronic commerce protocol
在线阅读 下载PDF
Performance Analysis of RFID Framed Slotted Aloha Anti-Collision Protocol 被引量:3
20
作者 Emad Felemban 《Journal of Computer and Communications》 2014年第1期13-18,共6页
In this paper, we develop a novel mathematical model to estimate the probability distribution function of the number of tags discovered after a certain number of interrogation rounds. In addition, the pdfs of the numb... In this paper, we develop a novel mathematical model to estimate the probability distribution function of the number of tags discovered after a certain number of interrogation rounds. In addition, the pdfs of the number of rounds needed to discover all the tags are also calculated. The estimation of such pdfs will be helpful in estimating the number of interrogation rounds and the optimal parameter configuration of the RFID system which in turn will be helpful in estimating the time needed to discover all tags. Our results show that the proposed model accurately predicts the tags detection probability. We then use the proposed model to optimally configure the reader parameters (i.e. the frame size and the number of interrogation rounds). 展开更多
关键词 Performance modeling RFID WIRELESS NETWORKS ANTI-COLLISION protocol
暂未订购
上一页 1 2 73 下一页 到第
使用帮助 返回顶部