首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 112 毫秒
1.
现有发布/订阅系统分组普遍采用随机平均分组,没考虑代理的订阅内容会造成事件在所有分组中转发,增加网络流量.为此,提出一种基于订阅内容相似性分组拓扑构建算法.将每个代理的本地订阅聚集为一个订阅表达式,利用订阅间的相似性,把相似订阅所在代理添加到同一个组中,形成分组拓扑结构.实验结果表明,在不增加订阅信息转发流量和事件转发时延的情况下,可以明显降低事件在代理覆盖网之间转发流量,从而降低网络带宽占用率和代理平均负载.  相似文献   

2.
基于重路由的匿名通信系统研究   总被引:5,自引:1,他引:5  
基于重路由的匿名通信系统主要采用重路由机制来提供匿名保护。论文在分析基于重路由的匿名通信模型的基础上,提出了一种转发概率等比递减的重路由算法,理论分析和计算数据表明这种重路由算法能有效保证匿名性能,使匿名通信路径长度的期望值显著降低,缩短匿名通信的延时,但随着重路由路径重组轮数增加,系统提供的匿名性仍将会降低。  相似文献   

3.
提出一种架构在P2P系统上可根据用户延迟需求而建立的匿名通信策略DDACM(delay demand-based anonymous communication mechanism).该策略采用TTL探测包确定成员之间的跳数,作为成员之间的延迟距离及选择转发结点的依据,当构建匿名通信的转发路径时,根据用户所提出的延迟需求参数DelayD,从自己的0到DelayD跳组中选择邻居结点作为转发代理.数学分析和模拟实验结果表明,该匿名通信机制在满足和Crowds相近匿名性的同时,可极大地降低通信时延,并使匿名通信系统具有可扩展性.  相似文献   

4.
P2P网络中基于代理合作的匿名传输机制   总被引:4,自引:0,他引:4  
P2P网络中通常采用重路由技术实现匿名通信,增加了网络管理的难度和传输延迟。基于代理合作的匿名传输机制是在P2P网络中选取部分节点组成虚拟合作代理群(Virtual Cooperative Proxy Troop,VCP),网络中的节点均有一个对应的VCP节点来负责为其提供代理转发服务。VCP代理节点根据响应请求的延迟来合理分配多条有限长度的路径来进行数据传输,从而实现VCP节点之间的相互合作,降低传输耗时和平衡网络负载  相似文献   

5.
基于改进蚁群算法的网络负载均衡路由优化   总被引:5,自引:2,他引:3       下载免费PDF全文
最短路径优先的路由控制策略在解决突发业务模式下的拥塞问题上存在不足,针对该问题,采用随机选择尺度因子实现负载均衡,增加路由器向所有相邻路由器转发分组的机会。设计路由算法模拟器,完成改进蚁群网络路由优化算法在4种典型网络上的仿真。以CHINANET为例的对比实验表明,在重负载情况下,改进的蚁群网络路由优化算法能获得较高的吞吐量、较低的平均时延与丢包率。  相似文献   

6.
基于重路由匿名通信系统的设计   总被引:1,自引:0,他引:1  
王少辉  蒋季宏  肖甫 《计算机科学》2016,43(10):154-159
在分析现有匿名通信系统的基础上,设计了一种新的基于重路由的匿名通信方案。针对如何实现用户与用户之间通信匿名性的问题,提出了一种结合重路由机制中的变长策略和下一跳路由选择策略的方法来建立匿名通信路径,该方法还引入了概率转发机制和加密机制。针对如何增强匿名通信系统稳定性和抗攻击能力的问题,提出采用多服务器协调的P2P工作方式来设计匿名通信系统;并且新方案引入了分片冗余机制,在维护匿名转发路径的同时,也对通信消息提供了保护。通过理论分析和仿真分析可知,该方案设计具有较好的稳定性和匿名性。  相似文献   

7.
胡曦  王鑫  张斌 《计算机科学》2014,41(3):100-104,123
为了在节点频繁移动的MANETs网络环境中发现和建立具有较长维持时间的路由,以增强路由的可用性和数据传输的连续性,面向稳定性的路由算法需要中间节点转发更多的RREQ分组,但这会造成路由开销显著增加。为此,提出了一种面向稳定性的自适应路由开销控制算法。算法使用策略型博弈对RREQ转发过程进行建模,利用该博弈存在的混合策略纳什均衡计算RREQ的转发概率,实现RREQ的概率转发。仿真结果表明,提出的面向稳定性的自适应路由开销控制算法不仅保证了路由的稳定性和分组递交率,而且有效地减少了路由开销和传输延迟。  相似文献   

8.
利用覆盖网组播技术构建组播服务平台是一种可行的提供组播服务的方案.基于代理的覆盖网组播兼具覆盖网组播的灵活性和IP组播的高效性的特点.结合节点的带宽、处理延迟和节点间的通信延迟给出一个完善的基于代理的覆盖网组播模型,根据此模型设计了求节点度受限的具有最小平均延迟的组播转发树生成算法.探讨了主机节点在进行数据分组复制转发时的转发顺序对平均延迟的影响,给出并证明了主机节点对数据分组复制转发的最优策略.通过仿真实验验证了所给算法和最优复制转发策略的有效性.  相似文献   

9.
为了保护电子拍卖中竞拍者的身份隐私,提出了一个基于匿名通信的匿名电子拍卖协议.该协议在密封式拍卖方式的基础上,采用匿名通信模型进行通信.在整个通信过程中,竞拍者随机选取网络中的一个节点进行数据的转发,然后该中转节点再以概率Pf将数据发送给下一个中转节点或是以概率1-Pf将数据发送给拍卖服务器,下一个中转节点重复该中转节点的过程,直到最后一个中转节点将数据发送给拍卖服务器.在发送数据的过程中,使用AES算法和RSA算法分别对消息和密钥进行混合加密解密操作.数据经过多次转发最终到达拍卖服务器.拍卖服务器、任意的中转节点和攻击者都不可能获取竞拍者的身份和位置信息.任意的中转节点和攻击者都不可能获取竞拍者的竞标信息.相比较Crowds、Tor以及其改进的方案,本方案在通信过程中不需要提前建立链路,避免了路由路径上节点建好链路后节点故障而引起的通信失败.通信过程中所有节点都是对等的,并且整个路由路径中不依赖于某些特殊节点,因此该协议实现了网络流量的负载均衡且大大提高了网络的健壮性.理论分析和实验结果表明,该协议不仅稳定性较好,而且可以在较低的通信和计算代价下获得较好的匿名效果.  相似文献   

10.
目前重路由匿名通信系统有着广泛的应用,但也容易遭受各种攻击.基于重路由的匿名通信系统,如Onion Routing,Hordes,Tarzan以及MorphMix等,采用重路由机制在应用层转发数据,使实体之间的通信以间接的方式进行,从而有效地隐藏通信实体的身份信息,如主机的IP地址等.在基于路径的重路由匿名通信系统的基础上,提出了前驱攻击模型,并对该模型进行了理论研究和分析,其结果表明,在设计重路由匿名通信系统时,为了降低前驱攻击的成功率,要同时考虑选择发起者的概率、转发概率和所构建路径数目.  相似文献   

11.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

12.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

13.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

14.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

15.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

16.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

17.
Abstract  This paper considers some results of a study designed to investigate the kinds of mathematical activity undertaken by children (aged between 8 and 11) as they learned to program in LOGO. A model of learning modes is proposed, which attempts to describe the ways in which children used and acquired understanding of the programming/mathematical concepts involved. The remainder of the paper is concerned with discussing the validity and limitations of the model, and its implications for further research and curriculum development.  相似文献   

18.
正The demands of a rapidly advancing technology for faster and more accurate controllers have always had a strong influence on the progress of automatic control theory.In recent years control problems have been arising with increasing frequency in widely different areas,which cannot be addressed using conventional control techniques.The principal reason for this is the fact that a highly competitive economy is forcing systems to operate in regimes where  相似文献   

19.
正Aim The Journals of Zhejiang University-SCIENCE(A/B/C)areedited by the international board of distinguished Chinese andforeign scientists,and are aimed to present the latest devel-opments and achievements in scientific research in China andoverseas to the world’s scientific circles,especially to stimulateand promote academic exchange between Chinese and for-eign scientists everywhere.  相似文献   

20.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号