期刊文献+
共找到130篇文章
< 1 2 7 >
每页显示 20 50 100
A Novel Distributed LDoS Attack Scheme against Internet Routing 被引量:3
1
作者 ZHU Hongliangt XIN Yang +1 位作者 WU Qiuxin YOU Fucheng 《China Communications》 SCIE CSCD 2014年第A01期101-107,共7页
LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is... LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is subject to LDoS attacks as well. LDoS attacks can cause table reset, route flapping of BGP protocol. A deliberately constructed distributed low-rate DOS attacks can even generate surge of updates throughout the Internet. In this paper, we investigate the promotion of attack efficiency of this novel attack, and then propose an attack model to simulate the LDoS attack. Experiments prove that this attack model can exponentially lower the attack costs and improve the attack effect. 展开更多
关键词 distributed low-rate DoS attacks attack efficiency BGP route flapping defense mechanisms
在线阅读 下载PDF
A Distributed Cell Outage Compensation Mechanism Based on RS Power Adjustment in LTE Networks 被引量:2
2
作者 LI Wenjing YU Peng YIN Mengjun MENG Luoming 《China Communications》 SCIE CSCD 2014年第A01期40-47,共8页
To solve the coverage and quality problems caused by cell outage in LTE networks, this paper proposes a distributed self-organizing networks management architecture and a distributed cell outage compensation managemen... To solve the coverage and quality problems caused by cell outage in LTE networks, this paper proposes a distributed self-organizing networks management architecture and a distributed cell outage compensation management mechanism. After detecting and analyzing the outage, a cell outage compensation algorithm based on reference signal power adjustment is proposed. The simulation results show that the proposed mechanism can mitigate the performance degradation significantly. Compared with other algorithms, the proposed scheme is more effective in compensating the coverage gap induced by cell outage 展开更多
关键词 LTE cell outage compensation (COC) reference signal power PSO
在线阅读 下载PDF
Three-Dimensional Gravity Model Applied to Underwater Navigation 被引量:2
3
作者 YANLei FENGHao +1 位作者 DENGZhongliang GAOZhengbing 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2004年第3期838-842,共5页
At present, new integrated navigation, which usesthe location function of reference gravity anomaly map to control the errors of the inertial navigation system (INS), has been developed in marine navigation. It is nam... At present, new integrated navigation, which usesthe location function of reference gravity anomaly map to control the errors of the inertial navigation system (INS), has been developed in marine navigation. It is named the gravity-aided INS. Both the INS and real-time computation of gravity anomalies need a 3-D marine normal gravity model. Conventionally, a reduction method applied in geophysical survey is directiy introduced to observed data processing. This reduction does not separate anomaly from normal gravity in the observed data, so errors cannot be avoided. The 3-D marine normal gravity model was derived from the J2 gravity model, and is suitable for the region whose depth is less than 1000 m. 展开更多
关键词 MARINE GRAVITY NAVIGATION
在线阅读 下载PDF
A SVM Based Text Steganalysis Algorithm for Spacing Coding 被引量:2
4
作者 YANG Yu 《China Communications》 SCIE CSCD 2014年第A01期108-113,共6页
Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines ... Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines coverage on specified values, and make variances of group distances among N-Window text lines become small. Inspired by the discovery, the research brings out a Support Vector Machine (SVM) based steganalysis algorithm. To avoid the disturbance of large difference among words length from same line, the research only reserves samples whose occurrence-frequencies are ± 10dB of the maximum frequency. The results show that the correct rate of the SVM classifier is higher than 90%. 展开更多
关键词 text steganalysis SVM steganalysis space-coding detecting
在线阅读 下载PDF
Distribution Behavior of Aminobenzoic Acid by Extraction with Di(2-ethylhexyl)phosphoric Acid 被引量:1
5
作者 张瑾 戴猷元 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2000年第4期300-303,共4页
A series of extraction equilibrium experiments for aminobenzoic acid with di(2-ethylhexyl)phosphoric acid (D2EHPA) dissolved in n-octane or 1-octanol was carried out. The effects of aminobenzoic acid concentration,D2E... A series of extraction equilibrium experiments for aminobenzoic acid with di(2-ethylhexyl)phosphoric acid (D2EHPA) dissolved in n-octane or 1-octanol was carried out. The effects of aminobenzoic acid concentration,D2EHPA concentration and pH on the distribution ratio were discussed in detail. The infrared spectra of the organic phase loaded with solute illustrated that pH had little effect on the structure of the complex formed. There proceed ion association and cation-exchange.reaction in the extraction. An expression of the equilibrium distribution was proposed. 展开更多
关键词 EXTRACTION chemical complexation aminobenzoic acid D2EHPA pH value
在线阅读 下载PDF
Smartphone Malware Detection Model Based on Artificial Immune System 被引量:1
6
作者 WU Bin LU Tianliang +2 位作者 ZHENG Kangfeng ZHANG Dongmei LIN Xing 《China Communications》 SCIE CSCD 2014年第A01期86-92,共7页
In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artif... In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artificial immune system, in which static malware analysis and dynamic malware analysis techniques are combined, and antigens are generated by encoding the characteristics extracted from the malware. Based on negative selection algorithm, the mature detectors are generated. By introducing clonal selection algorithm, the detectors with higher affinity are selected to undergo a proliferation and somatic hyper-mutation process, so that more excellent detector offspring can be generated. Experimental result shows that the detection model has a higher detection rate for unknown smartphone malware, and better detection performance can be achieved by increasing the clone generation. 展开更多
关键词 artificial immune system smartphonemalware DETECTION negative selection clonalselection
在线阅读 下载PDF
A Hybrid Approach for Selection in Service Community 被引量:1
7
作者 TANG Chaogang 《China Communications》 SCIE CSCD 2014年第A01期114-120,共7页
Although there have been existing competitions among web service (WS) providers, they still have opportunities to cooperate together for common profits. WS community as a mean to provide an ontological organizati... Although there have been existing competitions among web service (WS) providers, they still have opportunities to cooperate together for common profits. WS community as a mean to provide an ontological organization of WSs that share the same domain of interest has realized this kind of fancy in the sense that providers can work together to compete against others outside the community. Service selection in WS community is different from the traditional service selection, since WS community should take into account its own benefits. Therefore, we propose a hybrid approach to make service selection in WS community. The approach considers the profits of both WS community and the services within it. The experimental evaluation shows that the approach has a great advantage over other approach without consideration of community's benefits. 展开更多
关键词 COMMUNITY service selection PROFITS dominating TOP-K
在线阅读 下载PDF
Distributed Connectivity Restoration Strategy for Movable Sensor Networks 被引量:1
8
作者 MA Guizhen YANG Yang +3 位作者 QIU Xuesong GAO Zhipeng LI He XIAO Xiangyue 《China Communications》 SCIE CSCD 2014年第A01期156-163,共8页
Failure of one or multiple critical nodes may partition wireless sensor networks into disjoint segments, and thus brings negative effect on the applications. We propose DCRS, a Distributed Connectivity Restoration Str... Failure of one or multiple critical nodes may partition wireless sensor networks into disjoint segments, and thus brings negative effect on the applications. We propose DCRS, a Distributed Connectivity Restoration Strategy to tolerate the failure of one critical node. Because of the energy restriction of sensor nodes, the energy overhead of the recovery process should be minimized to extend the lifetime of the network. To achieve it, we first design a novel algorithm to identify 2-critical nodes only relying on the positional information of 1-hop neighbors and some 2-hop neighbors, and then we present the criteria to select an appropriate backup for each critical node. Finally, we improve the cascaded node movement algorithm by determining whether a node can move to another non-adjacent node directly or not to reduce the number of nodes moved. The effectiveness of DCRS is validated through extensive simulation experiments. 展开更多
关键词 movable sensor networks connectivity recovery critical node
在线阅读 下载PDF
A Spatiotemporal-Chaos-Based Encryption Having Overall Properties Considerably Better than Advanced Encryption Standard 被引量:1
9
作者 WANGShi-Hong YEWei-Ping +4 位作者 LOHua-Ping KUANGJin-Yu LIJing-Hua LUOYun-Lun HUGang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2003年第1X期57-61,共5页
Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography.The chaotic outputs of many space units are used for encryption simultaneously. This system shows satisfactory cr... Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography.The chaotic outputs of many space units are used for encryption simultaneously. This system shows satisfactory cryp-tographie properties of high security, fast encryption (decryption) speed, and robustness against noise disturbances in communication channel. The overall features of this spatiotemporal-chaos-based cryptosystem are better than chaotic cryptosystems known so far, and also than currently used conventional cryptosystems, such as the Advanced Encryption Standard (AES). 展开更多
关键词 混沌同步 时空混沌 保密通讯 加密 通信安全
在线阅读 下载PDF
Analysis, design and implementation of ASON management system 被引量:1
10
作者 GuiXuan XuYunbin SongHongsheng ZhangJie GuWanyi 《High Technology Letters》 EI CAS 2005年第1期13-16,共4页
To manage Automatically Switched Optical Network (ASON), management requirements were analyzed first, including heterogeneous networks management, control plane components and new kind of connection management. Manage... To manage Automatically Switched Optical Network (ASON), management requirements were analyzed first, including heterogeneous networks management, control plane components and new kind of connection management. Management information classes were Abstracted based on these requirements. A two-layer management architecture was designed, in which Inter-domain Network Management System (INMS) provided an integrated view and Network Management System (NMS) focused on management of certain network domain. An implementation of ASON management system was described in details, whose interfaces were based on CORBA and GUI based on Java. At last, a test platform which demonstrated multi-domain, connection and control plane management was shown. 展开更多
关键词 计算机技术 计算机网络 ASON系统 自转换光学传输网络 网络管理系统 信息管理模式 控制面
在线阅读 下载PDF
MULTI-WATERMARKING SCHEME FOR GROUP USERS BASED ON VISUAL CRYPTOGRAPHY 被引量:1
11
作者 YuanZhonglan XiaGuangsheng +1 位作者 WenQiaoyan YangYixian 《Journal of Electronics(China)》 2005年第4期364-370,共7页
All watermarks are shared into shadow images using VCS(Visual Cryptography Scheme). Only one specific shadow (as a new watermark) is embedded into the host signal and the other ones are distributed to every user in ea... All watermarks are shared into shadow images using VCS(Visual Cryptography Scheme). Only one specific shadow (as a new watermark) is embedded into the host signal and the other ones are distributed to every user in each group as a key. In the watermarking extraction procedure, users in different group can obtain different watermark by combining their shadows with the extracted one from the watermarked signal. Analysis and experimental results show that the new watermarking method is novel, secure and robust. 展开更多
关键词 Digital watermarking Visual cryptography Multi-watermarking
在线阅读 下载PDF
Bers-type Spaces and Composition Operators 被引量:1
12
作者 姜立建 李叶舟 《Northeastern Mathematical Journal》 CSCD 2002年第3期223-232,共10页
For α ∈ (0, ∞), let Hα∞ (or Hα,0∞) denote the collection of all functions f which are analytic on the unit disc D and satisfy |f(z)|(1-|z|2)α = O(1) (or |f(z)|(1 - |z|2)α = o(1) as |z| → 1). Hα∞(or Hα,0∞... For α ∈ (0, ∞), let Hα∞ (or Hα,0∞) denote the collection of all functions f which are analytic on the unit disc D and satisfy |f(z)|(1-|z|2)α = O(1) (or |f(z)|(1 - |z|2)α = o(1) as |z| → 1). Hα∞(or Hα,0∞) is called a Bers-type space (or a little Bers-type space).In this paper, we give some basic properties of Hα∞. C, the composition operator associated with a symbol function which is an analytic self map of D, is difined by Cf = f o . We characterize the boundedness and compactness of C which sends one Bers-type space to another function space. 展开更多
关键词 Bers-type space Carleson measure composition operator
在线阅读 下载PDF
Improvement of Amplitude-Shift-Keying Signal Quality by Employing an Effective Spectrum Equalization Method in a Combined FSK/ASK Modulation Scheme 被引量:8
13
作者 忻向军 P.S.André +6 位作者 A.L.J.Teixeira 徐重秀 AnaFerreira TiagoSilveira P.M.Monteiro F.daRocha J.L.Pinto 《Chinese Physics Letters》 SCIE CAS CSCD 2005年第8期1948-1950,共3页
原文传递
Multiple Mobile Sinks Data Dissemination Mechanism for Large Scale Wireless Sensor Network
14
作者 XIE Dongliang WU Xiaojie LI Dan SUN Jia 《China Communications》 SCIE CSCD 2014年第A01期1-8,共8页
WSN has been developing from traditional environment monitoring applications to the ubiquitous information services such as the Congestion-oriented Intelligent Transportation System (ColTS). However, the mobility of... WSN has been developing from traditional environment monitoring applications to the ubiquitous information services such as the Congestion-oriented Intelligent Transportation System (ColTS). However, the mobility of nodes makes data dissemination a hard nut to crack. In this paper, we propose MSDD, a multiple mobile sinks data dissemination mechanism for solving the dissemination problem. The main ideas of MSDD are constructing a two-tier grid structure by a designated sink, exploiting a hierarchical monitoring mechanism, and employing a global agent to track the sink locations in order to make the emergencies reported to the sinks immediately, In addition, MSDD supports the query-driven data dissemination. Being compared with TTDD, MSDD is theoretically proved to have less communication overhead. We also validate MSDD outperforms TTDD in reliability and the emergency delivery latency bv simulations. 展开更多
关键词 ubiquitous information services multiple-mobile sink hierarchical monitoring two-tier grid global agent query-driven
在线阅读 下载PDF
A Virtual Private Local PCN Ring Network Based on ATM VP Cross-Connection
15
作者 LinBin MaYingjun 《通信学报》 EI CSCD 北大核心 1995年第4期8-13,共6页
AVirtualPrivateLocalPCNRingNetworkBasedonATMVPCross-ConnectionLiuBin;MaYingjun;MengLuoming(BeijingUniversity... AVirtualPrivateLocalPCNRingNetworkBasedonATMVPCross-ConnectionLiuBin;MaYingjun;MengLuoming(BeijingUniversityofPostsandTelecom... 展开更多
关键词 数字无绳电话 异步传输模式 个人通信网 虚拟 交叉连接
在线阅读 下载PDF
A Novel Synergy Selection Mechanism among Multi- Devices for Ubiquitous Services
16
作者 RUI Lanlan MAO Xiyue QIU Xuesong 《China Communications》 SCIE CSCD 2014年第A01期128-134,共7页
It is a challenge to select an optimal set of devices to accomplish a graph-based ubiquitous service and execute it continuously under the circumstances of dynamic environments and limited device capability. We elabor... It is a challenge to select an optimal set of devices to accomplish a graph-based ubiquitous service and execute it continuously under the circumstances of dynamic environments and limited device capability. We elaborate a Synergy- aware Selection Mechanism (SSM) considering synergetic among devices. In the SSM, we design a distributed algorithm to integrate the devices and a dynamic updating weight method. The simulation results show that SSM can make devices composed together to ensure the continuity and smoothness of service 展开更多
关键词 ubiquitous service synergy-aware quality of service SUSTAINABILITY
在线阅读 下载PDF
Construction of Resilient Functions
17
作者 ZHANGJie WENQiao-yan 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期199-202,共4页
Bastd on the relationship between nonlinearity and resiliency of amulti-output function, we present a method for constructing noninterseeling linear codes frompacking design. Through these linear codes, we obtain n-va... Bastd on the relationship between nonlinearity and resiliency of amulti-output function, we present a method for constructing noninterseeling linear codes frompacking design. Through these linear codes, we obtain n-variable, m-output, t-resilient functionswith very high nonlinearity. Their nonlinearities are currently the best results for most of cases. 展开更多
关键词 resilient functions packing design correlation-immune functions lineatcodes
在线阅读 下载PDF
Influence of Channel Power and Pumping Configuration on the Gain Profile of Distributed Raman Fibre Amplifier 被引量:1
18
作者 忻向军 张茹 《Chinese Physics Letters》 SCIE CAS CSCD 2003年第2期237-239,共3页
原文传递
Proper Accelerations of Time-Like Curves near a Null Geodesic 被引量:1
19
作者 田贵花 赵峥 《Chinese Physics Letters》 SCIE CAS CSCD 2003年第9期1437-1440,共4页
原文传递
Single mode rate equations for two sections self—pulsating DFB laser 被引量:1
20
作者 WangChun-Lin WuJian LinJin-Tong 《Chinese Physics B》 SCIE EI CAS CSCD 2003年第5期528-531,共4页
原文传递
上一页 1 2 7 下一页 到第
使用帮助 返回顶部