Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 2
- Moral and ethical aspects 2
- African literature 1
- Arthritis 1
- Arthritis, Rheumatoid 1
- CRAFTS & HOBBIES / Pottery & Ceramics 1
- CRAFTS & HOBBIES / Reference 1
- Constitutional law 1
- Delivery of Health Care 1
- Derecho de familia 1
- Diagnostic Imaging 1
- Domestic relations 1
- Economic policy 1
- Ego (Psychology) 1
- History and criticism 1
- Imaging 1
- Journalistic ethics 1
- Magnetic Resonance Imaging 1
- Mental Health 1
- Nursing 1
- Osteoarthritis 1
- Photojournalism 1
- Potters' wheels 1
- Pottery 1
- Proposal Writing 1
- Psychiatric Nursing 1
- Psychological aspects 1
- Public health 1
- Social policy 1
- Technique 1
-
4321
SDN resolve space-ground integrated network based on end side computing
Published 2020-07-01“…There is a complex network structure of space-ground integrated network.And this kind of network has heterogeneous network,dynamic topology,intermittently connected node height exposure,and so on.There are many limitations in traditional SDN implementation.A method of SDN implement based on end side computing and a space-ground integrated network based on SDN were presented,which separated space network control and data,using the computing power of the communication terminal (mobile terminal and fixed ground backbone network),unloading the calculation of SDN controller in space-based plane,thus simplifying the data forwarding plane.A practical and effective verification method was also proposed.…”
Get full text
Article -
4322
Anti-frequency-shift packet detection for D2D power-saving communications over Wi-Fi network
Published 2016-10-01“…An efficient packet detection scheme based on Wi-Fi interface was proposed.It was implemented by employing a novel normalized factor as a denominator in OFDM symbol synchronization-timing metric.Compared to the old-tradition schemes,the proposed scheme can not only obtain great detection probability,but also achieve the threshold setting without pre-estimation of frequency offset.Both theoretical analysis and conducted simulation results show that the new scheme facilitates threshold selection for a wide range of signal-to-noise ratio (SNR) in additive white Gaussian noise (AWGN) channel.Besides,the threshold setting in multi-path Rayleigh fading channels can be determined according to the AWGN case straight forwardly.…”
Get full text
Article -
4323
Multiple Addressing Coordination and Switching Technology in Space-Integrated-Ground Information Network
Published 2020-12-01“…The construction requirements and deployment status of the space-integrated-ground integrated information network was analyzed, and the diffi culties in the integration of satellite network and internet was discussed.To tackle the problems of complex network structure, high dynamic topology, diffi cult data compatibility and limited satellite resources, a multi addressing coordination and switching technology based on IP address, ID identifi cation and content name was proposed.In particular, a multi addressing datagram format was designed, and the multi addressing route forwarding mechanism was extended.It could realized the interconnection of heterogeneous networks, the stability of mobile communication, the compatible switching of polymorphic data, and the effi cient routing with low power consumption of satellites.…”
Get full text
Article -
4324
Research on distributed mobile management of satellite network based on software define network
Published 2017-10-01“…Distributed mobility management (DMM) was an effective method to solve the mobile address handover.Therefore,it was considered to be a technology that can be applied to satellite network mobility management.A distributed mobile management scheme which based on software definition network (SDN) was proposed to solve the traffic redirection problem in satellite network.Different from the traditional DMM application scenario which was network-based or terminal-based,the SDN-DMM scheme implements location management and address handover in SDN controllers.Therefore,SDN-based satellite network distributed mobile management scheme can realize packet forwarding path optimization compared with traditional scheme,and it shows significant advantages in managementcost and traffic management.…”
Get full text
Article -
4325
Study on game-based incentive mechanism of mobile ad hoc network
Published 2014-04-01“…According to the selfishness of rational mobile ad hoc network nodes showed during the packet forwarding, the selfish behavior statically and dynamically based on game theory were analyzed and modeled. …”
Get full text
Article -
4326
Detection of selfish nodes based on credit mechanism in opportunistic networks
Published 2012-11-01“…The existence of selfish nodes seriously affects the routing performance of opportunistic networks(OppNet).To protect the OppNet against the nodes’ selfish behavior,a credit-based selfish nodes detection mechanism was proposed to make it possible to keep away from such nodes during the process of message forwarding.The mechanism leverages 2-ACK messages to observe the nodes’behavior.Then the credit value was calculated based on the observation information and accordingly acts as the metric to distinguish the selfish nodes.Simulation results show that,when coupled with various routing algorithms,the mechanism could detect selfish nodes out accurately,and improve network performance effectively in terms of delivery rate and traffic load.…”
Get full text
Article -
4327
Aggregation algorithm for MPLS multicast flows based on bidirectional shared tree
Published 2010-01-01“…The processes of medium nodes are simplified and the forwarding states of routers are reduced in the algorithm. …”
Get full text
Article -
4328
Secure-Network-Coding-Based File Sharing via Device-to-Device Communication
Published 2017-01-01“…In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. …”
Get full text
Article -
4329
An energy-efficient multi-channel MAC protocol for linear sensor network
Published 2022-12-01“…Sensor nodes in linear sensor network (LSN) are deployed linearly due to the linear topology of the monitoring area.Most of the state-of-the-art medium access control (MAC) protocols designed for LSN adopted the duty-cycling and pipelined-forwarding (DCPF) schemes.They can reduce data propagation delay and network energy consumption but may still cause issues such as transmission competition, interference, and energy hole.To address these issues, an improved DCPF MAC protocol was proposed based on multiple channels and redundant-node deployment for LSN.The extensive simulations based on OPNET demonstrate that, compared with existing protocols, the proposed protocol shows a better performance in terms of energy efficiency, packet delivery ratio, throughput, and packet transmission latency.…”
Get full text
Article -
4330
The Content and Game Action Weight of Senior Football Players as Goalkeeper
Published 2024-12-01“…The players in the football teams are strictly specialized in playing positions, which are four in number: goalkeeper, defenders, midfielders, and forwards. The given article represents an extensive analysis of all the footballers’ actions in the position of Goalkeeper, here being analyzed in detail the content of the actions of the footballers in the position of Goalkeeper, as well as their weight in an official match. …”
Get full text
Article -
4331
Les réformes contre le redoublement ou les limites des recherches non collaboratives
Published 2010-06-01“…At the political level, research results are translated into instructions forwarded to teachers; these instructions take the shape of strategies to be implemented in their classes. …”
Get full text
Article -
4332
Random Dissemination Algorithm of Stete-Updating Message for Distributed Virtual Environments of P2P Architecture
Published 2014-10-01“…The greedy routing algorithm can find the forwarding route and obtain the message-spreading time between the source and the destinations. …”
Get full text
Article -
4333
FALB: a FC protocol link aggregation algorithm
Published 2021-09-01“…Link aggregation is a common technology to increase the bandwidth by bundling multiple physical links into a logical link.However, in a switching network based on the fibre channel (FC) protocol, as the forwarding traffic continues to concentrate, traditional static link aggregation algorithms have problems of poor load balance and low reliability.A dynamic load balancing link aggregation algorithm flow adaptive load balancing (FALB) based on FC protocol messages was proposed, which could realize dynamic adaptive matching of traffic and a reconnection protection mechanism for broken links.The results show that compared with the static load balancing algorithm design, the algorithm mechanism could maintain the effective bandwidth ratio above 95%, effectively improving the load balancing characteristics and reliability of the aggregated link.…”
Get full text
Article -
4334
Design and implementation of semi-physical simulation platform in space delay tolerant network
Published 2016-07-01“…The architecture of space delay tolerant networking can effectively support a deep space communication network with long delay,high error rate and on-off frequently link characteristics through“store-carry-forwards”and other features.Due to the experiment of application of deep space communication is not easy to carry,so building an accurate and reliable semi-physical simulation platform for simulating and making an argumentation of the design of deep space communication tasks was very necessary.A space DTN semi-physical simulation platform was proposed which supported a variety of specific deep space communication tasks simulation.The simulation platform provided new theory and technology for ground simulation and verification,and provided analysis tools and test instruments for carrying out deep space communication application study.…”
Get full text
Article -
4335
Research on improving the registration success rate of VoWi-Fi under multiple equivalent path scenarios
Published 2019-01-01“…When IPSec faces a path forwarding fault in a multi-equivalent path environment of a metropolitan area network, it can't actively evade, and the service can't be registered. …”
Get full text
Article -
4336
Improved SpaceTwist privacy protection method based on anchor optimization algorithm
Published 2017-10-01“…With location-based services worldwide used,private location data appealed easily in query process which caused serious security problems.So the introduction of SpaceTwist incremental nearest neighbor query algorithm,proposes protection of privacy method combined with improved SpaceTwist location optimization algorithm.The anchor point authentication server added to distributed system structure,user generate a k anonymous area according to their privacy preference and actual environment,using optimization algorithm to generate the anchor point.Forwarding users use the incremental nearest neighbor query throught the anchor point and accurate.Experiments in road network environment with different data sets show that the privacy protection works well in the algorithm,and own high work efficiency.…”
Get full text
Article -
4337
Research on dynamic routing mechanism in network simulation
Published 2007-01-01“…A fundamental requirement for any network simulation environment is the realistic forwarding of packets from a source to a destination in the simulated topology.The routing decisions will be affected by topology changes.In almost all current simulators,all the nodes know the topology changes instantaneously,which is obviously unrealistic.The model of dynamic routing was presented and analyzed.Further an approach was proposed to compute the time needed for each node to know the topology changes,and dynamic MTree<sub>N</sub>ix routing mechanism was presented,which maintains static routing table and a message queue of topology changes,and looks up routing states according to the known time of different changes.Experimental results show that our approach can improve the realism of dynamic routing in network simulation,with high simulation efficiency.…”
Get full text
Article -
4338
Moving target defense against network eavesdropping attack using POF
Published 2018-02-01“…Eavesdropping attack hereby was the major attack for traditional network communication.As this kind of attacks was stealthy and untraceable,it was barely detectable for those feature detection or static configuration based passive defense approaches.Since existing encryption or dynamic address methods could only confuse part of fields of network protocols,they couldn’t form a comprehensive protection.Therefore a moving target defense method by utilizing the protocol customization ability of protocol-oblivious forwarding (POF) was proposed,through private protocol packet randomization strategy and randomly drop deception-packets on dynamic paths strategy.It could greatly increase the difficulty of implementing network eavesdropping attack and protect the privacy of the network communication process.Experiments and compare studies show its efficiency.…”
Get full text
Article -
4339
GBSS:researches on group-based semantic search
Published 2006-01-01“…A group-based semantic search method-GBSS was presented.With regard to architecture,GBSS introduced a hybrid architecture in which the storage and search of raw data was based on DHT network,but the storage and search of meta-data was based on unstructured P2P network.With regard to search algorithm,GBSS presented a file grouping method without users’ description and constructs friend relations between nodes based on search interests and sharing files.The design idea came from some conclusions of P2P researches and complex network researches.The forwarding of user requests came use of friend relations in search process,which integrated effective caching strategy.The simulation tests prove that the GBSS algorithm is efficient,stable,and the performance improved times compared with traditional algorithms.…”
Get full text
Article -
4340
5G deterministic network key technology research and application
Published 2024-08-01“…Secondly, cyclic queue forwarding technology was explored in 5G networks to eliminate end-to-end jitter. …”
Get full text
Article