首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9篇
  免费   0篇
工业技术   9篇
  2021年   1篇
  2018年   1篇
  2017年   1篇
  2013年   1篇
  2012年   2篇
  2011年   2篇
  2004年   1篇
排序方式: 共有9条查询结果,搜索用时 15 毫秒
1
1.
IP traceback is an effective measure to deter internet attacks. A number of techniques have been suggested to realize IP traceback. The Fragment Marking Scheme (FMS) is one of the most promising techniques. However, it suffers a combinatorial explosion when computing the attacker?s location in the presence of multiple attack paths. The Tagged Fragment Marking Scheme (TFMS) has been suggested to suppress the combinatorial explosion by attaching a tag to each IP fragment. Tagging is effective because it allows the victim to differentiate IP fragments belonging to different routers, thereby greatly reducing the search space and finding the correct IP fragments. TFMS, however, increases the number of false positives when the number of routers on the attack path grows beyond some threshold. In this paper, we rigorously analyze the performance of TFMS to determine the correlation between the number of routers and the false positive error rate. Using a probabilistic argument, we determine the formulas for combination counts and error probabilities in terms of the number of routers. Under TFMS, our results show that we can reduce the required time to find an attacker?s location at the cost of a low error rate for a moderate number of routers.  相似文献   
2.
The so-called functional models, such as IDEF0, are useful tools for describing, designing and analysing the functional aspects of a complex manufacturing system, for example a CIM (computer integrated manufacturing) System. Though it involves considerable time and cost to build a sound functional model, the model usually cannot be used directly in further systems analysis procedures, such as quantitative performance analyses, due to its informal nature. To overcome this problem, we suggest a Petri net based procedure. First, we build a Petri net model from the IDEF0 and IDEF3 models, both of which are functional modelling tools widely used in real applications. Then, employing steady-state analysis for the Petri net, we propose a method to obtain performance measures such as the production rate. Since the analytical ability of a Petri net diminishes with increasing manufacturing system size, we develop a technique to aggregate and consolidate the Petri net to alleviate this problem that is associated with increasing complexity. An example problem is included to show the viability of our method for constructing a Petri net from a functional model and to evaluate the performance of the Petri net in an analytic manner.  相似文献   
3.
4.
Wireless Personal Communications - The IEEE 802.15.6 slotted Aloha protocol defines a contention based medium access mechanism for wireless body area network (WBAN). However the proposed scheme can...  相似文献   
5.
Corporate strategy can be divided into various substrategies, such as marketing, manufacturing, research and development, etc. In the current enterprise environment, products are highly varied and product life-cycles are shortening owing to customers' changing needs and market competition. In such an environment, the formulation of a good manufacturing strategy is critical for the success of manufacturing enterprises. In this research, for the establishment of good manufacturing strategy, we propose a framework enabling a decision-support system for the modelling and analysis of the manufacturing system. For this task, we have constructed a single integrated object model that contains information about products, processes and resources in the manufacturing system. The model is flexible, allowing the objects in the model to be defined according to the levels of detail required by analysis. The process model can then be transformed to a generalized stochastic Petri net (GSPN). Furthermore, a Petri net separation procedure is presented to relieve the complexity of the analytic method. By using the analytic analysis of GSPN, the system throughput is easily obtainable. An example is included to demonstrate the applicability of this framework. The proposed decision-support system for manufacturing strategy formulation enables (1) the analysis of the relationship between strategic input variables and performance measures, (2) the scenario evaluation for coordination between the manufacturing department and other departments, and (3) the formulation of manufacturing strategy using what-if analysis against dynamic manufacturing environments.  相似文献   
6.
The effect of a dietary supplementation of gallic acid and linoleic acid mixture (MGL) and their synthetic salt, sodium 2,3-dihydroxy-5-(((9E,12E)-octadeca-9,12-dienyloxy)carbonyl)phenolate (NGL), on egg quality was investigated. A total of 120 laying hens were allotted into five groups over 4 weeks of the experimental period. Birds were fed the following diets: (1) control [commercial diet (CD)], (2) 0.05% MGL (w/w, GA:LA = 1:1, equal molar ratio), (3) 0.1% MGL, (4) 0.05% NGL, (5) 0.1% NGL. The performance of the hen, the anti-oxidative potential of egg albumen and yolk, and the fatty acid composition and cholesterol content of egg yolk were measured. The TBARS value of egg yolk from hens fed 0.1% MGL and 0.05% NGL was lower than that fed control diet after storage for 14 days. The ABTS+ reducing activity of egg albumen was significantly improved by MGL and NGL, but only NGL had an effect on yolk (p < 0.05). The dietary supplementation of 0.05% or 0.1% MGL, and 0.05% NGL raised the PUFAs composition in egg yolk. The cholesterol content of egg yolk from hens fed control diet was higher than those fed 0.1% MGL, 0.05% or 0.1% NGL (p < 0.05). In conclusion, a diet consisting of MGL and NGL can improve the antioxidative potential of egg and the fatty acid quality of egg yolk while lowering the cholesterol level.  相似文献   
7.
Wireless Personal Communications - The IEEE 802.15.6 slotted Aloha based protocol for wireless body area network includes contention based medium access control to accommodate heterogeneous body...  相似文献   
8.
Yang HS  Lee EJ  Moon SH  Paik HD  Nam K  Ahn DU 《Meat science》2011,89(2):202-208
Irradiated raw ground beef had lower a*- and b*-values than nonirradiated ones regardless of garlic or onion treatment at 0 d. Irradiation increased TBARS values of control ground beef, but addition of 0.5% onion or 0.1% garlic+0.5% onion reduced oxidative changes during storage. Addition of garlic or onion greatly increased the amounts of sulfur compounds, but the increase was greater with garlic. With irradiation, the profiles and amounts of S-volatiles in raw ground beef changed significantly. However, the intensity of irradiation aroma in irradiated raw ground beef with garlic or onion was similar to that of the nonirradiated control. This indicated that some of the sulfur compounds unique to garlic or onion interacted with common sulfur compounds detected in irradiated meat and masked or changed the odor characteristics of irradiated raw ground beef. It was concluded that >0.5% onion or <0.01% garlic would be needed to mask or prevent irradiation aroma in irradiated raw ground beef.  相似文献   
9.
Hwang  Jinsoo  Kim  Jeankyung  Sung  Inje  Yoo  Duckwhan  Kim  Kichang 《Wireless Personal Communications》2021,118(2):1709-1731

Cooperative spectrum sensing allows users to detect available spectrum and utilize it. However, it is known that a few users can easily affect the cooperative decision at the fusion center by reporting falsified sensing data. The problem of detecting malicious users in cooperative spectrum sensing has been studied by numerous researchers. The basic approach is to compute the credibility of the reported data of each user and declare those with low credibility (below some threshold) as malicious. The computation of credibility can be based on several things such as pattern of historic behavior, entropy of the reported data, signal-to-noise ratio, etc. The credibility of the reported data of some user node can be expressed as an attack probability of that node. A node with higher attack probability will have lower credibility while a node with lower attack probability a higher credibility. Then, the problem of computing credibility of a node becomes the problem of computing attack probability of a node given a set of reported data. We can enumerate a list of all possible attack probability vectors for a set of nodes and the list of all possible energy level vectors of the channel for the observed time period, and compute which combination of attack probability and channel energy level vector can have the maximum probability to produce the reported channel energy level. However, the search space is quite large and grows exponentially as the number of user nodes and the number of time slots to observe increase. In this paper, we suggest algorithms that reduce the search space considerably and detect malicious users in linear time instead of exponential time. The suggested algorithms have been implemented and show promising results.

  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号