共查询到20条相似文献,搜索用时 109 毫秒
1.
2.
3.
4.
提出了一种新的适用于变长分组的调度算法——弹性定额值轮询调度算法(Resilient Quantum Round Robin,RQRR),与现有算法不同,该算法中每个数据流的定额值不是固定不变的,定额值的生成依赖于前一个轮次中各个数据流的发送情况。理论分析表明,RQRR可以保证数据流之间具有较好的公平性,它的公平性度量具有上界值7Max-1,其中Max为分组的最大长度。RQRR对每个分组的处理复杂度为O(1),易于实现、适用于高速网络。 相似文献
5.
6.
7.
8.
随着计算机通信的发展,信息交换的便利快捷和安全保密的矛盾日益加深,密码在本世纪七十年代以前一直是军方的独家领域,民间的研究几乎为零,直到七十年代中期,数据加密标准DES的出现,才改变了这一局面。 DES回顾 1972年,美国国家标准局(NBS),即现在的美国国家标准与技术研究所(NIST),公开征集标准密码算法,最后采纳了IBM开发的一个叫LUCIFER的算法,并在美国安全局的帮助下,修改成为现在应用最为广泛的分组加密算法DES,并于1976年成为标准。 DES是64位分组长,56位密钥长,由16轮迭代运算组成的对称分组加密算法。对称算法指的是加密和解密算法一致或基本一致,这样有利于在硬件实现时节省空间,而分组加密算法是指加密 相似文献
9.
10.
在分析蓝牙技术标准采用的加密算法所存在问题的基础上,指出影响蓝牙通信安全性的一个主要问题是E0漉加密所用的参数易被替换及E0流加密算法本身存在的固有缺陷.在标准的DES算法的基础上设计了一个适用于蓝牙设备特点的加密算法(BT_DES),给出了该加密算法的软硬件解决方案.算法BT-DES在计算复杂度、速度等方面具有较大的优势. 相似文献
11.
12.
随着移动通信系统技术的发展,信息传输形式也逐渐多样化,信息传输的安全性也日显重要。针对手机的硬件性能特点,设计了基于IDEA算法改进的X-IDEA算法应用于手机图文信息安全传输,较好地解决了IDEA算法的弱密钥等问题,X-IDEA算法的加密过程也使得其混淆性与扩散性较IDEA算法更强。根据移动通信系统的特征,提出了一种基于身份的密钥管理方法,该方法可使通信双方安全地获得密钥且计算量和通信量较小。实验证明了X-IDEA算法应用于手机图文安全传输的高效性和安全性。 相似文献
13.
14.
Mohammadreza Alirezaee Mohammadreza Rafiee Sani 《International Transactions in Operational Research》2018,25(6):1997-2007
If production trade‐offs—which represent simultaneously feasible exchanges in the inputs and outputs of decision‐making units (DMUs)—are added to an integer production possibility set (IPPS), a new IPPS is produced; conventional axioms of production do not generate a new IPPS, however. This paper develops the axiomatic foundation for data envelopment analysis (DEA) for integer‐value inputs and outputs in the presence of production trade‐offs by introducing a new axiom of “natural trade‐offs.” First, a mixed‐integer linear programming formula called an integer DEA trade‐off (IDEA‐TO) is presented for computing efficiency scores and reference points. The numeration algorithm (NA) method presented in this concept is improved, and an improved numeration algorithm (INA) method for solving integer DEA (IDEA) models is developed. Finally, comparison between the two methods and a generalized INA method for solving the IDEA‐TO model are presented. 相似文献
15.
In this article, an idea divergent editor using analogy (IDEA) system has been proposed. The analogies between two concepts are learned using a neural network through training. First, the problem that a user wants to solve is input to the proposed IDEA system. Second, the IDEA system can draw effective analogies from a knowledge base containing large‐scale and wide‐ranging concepts for solutions to various problems. The user chooses one of the analogies. Then, the IDEA system presents questions that prompt the user to analyze the problem with reference to the background of the analogy. Answering the presented questions triggers off an inspiration of a solution. The IDEA system facilitates users' divergent thinking, which creates many fragments of ideas. We performed an experiment to examine the effectiveness of the IDEA system; the number of ideas generated is increased about 1.5~2.0 times using the IDEA system. © 2003 Wiley Periodicals, Inc. 相似文献
16.
杨建武 《数字社区&智能家居》2009,(19)
IDEA算法是在DES算法的基础上发展出来的,是一种使用128位密钥以64位分组为单位加密数据的分组密码算法。该文主要对IDEA算法思想进行深入的分析和研究,并在此基础上阐述了改算法的实现原理和过程,尤其对该算法的密钥扩展和加密过程进行了详细的描述,并在C#环境下设计、实现IDEA对称加解密算法。 相似文献
17.
杨建武 《数字社区&智能家居》2009,5(7):5155-5156,5178
IDEA算法是在DES算法的基础上发展出来的,是一种使用128位密钥以64位分组为单位加密数据的分组密码算法。该文主要对IDEA算法思想进行深入的分析和研究,并在此基础上阐述了改算法的实现原理和过程,尤其对该算法的密钥扩展和加密过程进行了详细的描述.并在C#环境下设计、实现IDEA对称加解密算法。 相似文献
18.
Purpose
The objective of this study is to optimize task scheduling and resource allocation using an improved differential evolution algorithm (IDEA) based on the proposed cost and time models on cloud computing environment.Methods
The proposed IDEA combines the Taguchi method and a differential evolution algorithm (DEA). The DEA has a powerful global exploration capability on macro-space and uses fewer control parameters. The systematic reasoning ability of the Taguchi method is used to exploit the better individuals on micro-space to be potential offspring. Therefore, the proposed IDEA is well enhanced and balanced on exploration and exploitation. The proposed cost model includes the processing and receiving cost. In addition, the time model incorporates receiving, processing, and waiting time. The multi-objective optimization approach, which is the non-dominated sorting technique, not with normalized single-objective method, is applied to find the Pareto front of total cost and makespan.Results
In the five-task five-resource problem, the mean coverage ratios C(IDEA, DEA) of 0.368 and C(IDEA, NSGA-II) of 0.3 are superior to the ratios C(DEA, IDEA) of 0.249 and C(NSGA-II, IDEA) of 0.288, respectively. In the ten-task ten-resource problem, the mean coverage ratios C(IDEA, DEA) of 0.506 and C(IDEA, NSGA-II) of 0.701 are superior to the ratios C(DEA, IDEA) of 0.286 and C(NSGA-II, IDEA) of 0.052, respectively. Wilcoxon matched-pairs signed-rank test confirms there is a significant difference between IDEA and the other methods. In summary, the above experimental results confirm that the IDEA outperforms both the DEA and NSGA-II in finding the better Pareto-optimal solutions.Conclusions
In the study, the IDEA shows its effectiveness to optimize task scheduling and resource allocation compared with both the DEA and the NSGA-II. Moreover, for decision makers, the Gantt charts of task scheduling in terms of having smaller makespan, cost, and both can be selected to make their decision when conflicting objectives are present. 相似文献19.
陈志伦 《计算机应用与软件》2005,22(1):127-129
总结常见软件保护方案及破解方法,提出一种采用RSA/IDEA双重加密机制的基于License文件的软件保护方案;结合常见的反跟踪技术讨论了软件保护和本方案的安全性。 相似文献
20.
在IDEA算法的基础上,分析其存在的弱密钥,其加密过程也决定了相同的明文必定加密成相同的密文,容易暴露明文的统计学特性。设计了基于IDEA算法的加密算法X_IDEA,较好地解决了IDEA算法的弱密钥问题。X_IDEA算法的加密过程中嵌套IDEA算法,特殊的加密过程设计使得其安全性和抗攻击能力较IDEA算法更强。Abstract: Based on the IDEA algorithm, introduced plaintext encrypted surely into a common ciphertext. It is X_IDEA algorithm based of IDEA algorithm, which gives a process nested the IDEA algorithm, and special encryption algorithm stronger. the existence of weak 相似文献