期刊文献+
共找到78篇文章
< 1 2 4 >
每页显示 20 50 100
ACARS报文通信服务器的设计与实现 被引量:3
1
作者 钟青 张其善 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2001年第5期511-513,共3页
着重介绍ACARS(飞机通信寻址与报告系统 )报文通信服务器的软件设计方案及实现方法 .ACARS报文通信服务器通信模式采用了客户 /服务器(Client/Server)模式 .为了提高系统的实时性和响应速度 ,ACARS报文通信服务器设计成多线程并发服务器... 着重介绍ACARS(飞机通信寻址与报告系统 )报文通信服务器的软件设计方案及实现方法 .ACARS报文通信服务器通信模式采用了客户 /服务器(Client/Server)模式 .为了提高系统的实时性和响应速度 ,ACARS报文通信服务器设计成多线程并发服务器 .ACARS报文通信服务器实现了实时接收、发送和分发ACARS报文 .该系统已经成功地应用于中国民航VHF(甚高频 )数据通信网网络监控中心 . 展开更多
关键词 通信软件 信息交换 协议(通信) 飞机通信寻址报告系统 报文通信服务器 ACARS 软件设计 数据通信 民航
在线阅读 下载PDF
高速公路收费系统通信服务器的设计与实现 被引量:2
2
作者 付孟若 吴今培 张其善 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2003年第7期624-626,共3页
高速公路收费系统通信服务器是高速公路收费系统数据传输的枢纽 .重点介绍了高速公路收费系统通信服务器软件的设计、实现方法和特点 .通信服务器使用按优先级分发报文的通信协议 ,支持多用户的并发通信 .为了实现数据共享的集中控制 ,... 高速公路收费系统通信服务器是高速公路收费系统数据传输的枢纽 .重点介绍了高速公路收费系统通信服务器软件的设计、实现方法和特点 .通信服务器使用按优先级分发报文的通信协议 ,支持多用户的并发通信 .为了实现数据共享的集中控制 ,通信服务器采用客户 服务器的模式 .使用多线程的编程技术 ,满足了对通信服务器实时性的要求 .目前 ,该软件已通过了验收 。 展开更多
关键词 通信软件 协议(通信) 网络软件 并发通信
在线阅读 下载PDF
多协议多用户GPS/GSM监控系统网关的设计与实现 被引量:3
3
作者 陶海亮 张其善 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2002年第3期272-275,共4页
在多协议、多用户GPS(GlobalPositionSystem) GSM(GlobalSystemforMobilecommunications)监控系统中 ,网关的设计对系统的性能、可用性和可扩展性有重要作用 .讨论了在网关设计中需要注意的几个关键问题 :通过分析不同短消息服务器的... 在多协议、多用户GPS(GlobalPositionSystem) GSM(GlobalSystemforMobilecommunications)监控系统中 ,网关的设计对系统的性能、可用性和可扩展性有重要作用 .讨论了在网关设计中需要注意的几个关键问题 :通过分析不同短消息服务器的接口协议 ,提出使用协议管理器实现多协议接入 ;给出了与用户系统的通信指令格式 ,并分析了地址的转换流程 .最后剖析了用多线程方式和消息驱动实现这种系统的优点 ,并给出了一个具体实现的消息循环流程 .实践证明这种设计是可靠高效的 . 展开更多
关键词 监视系统 通信软件 协议(通信) 全球移动通信系统 网关 短消息服务
在线阅读 下载PDF
Design and Research of Information Processing System Based on Mix Platform
4
作者 董宁 徐立新 +1 位作者 何超 张宇河 《Journal of Beijing Institute of Technology》 EI CAS 1999年第3期294-299,共6页
Aim To develop an information processing system with real time processing capability and artistic user interface for the optoelectronic antagonism general measuring system. Methods The A/D board and the multifun... Aim To develop an information processing system with real time processing capability and artistic user interface for the optoelectronic antagonism general measuring system. Methods The A/D board and the multifunctional board communicating with every instruments were designed, data collecting and processing were realized by selecting appropriate software platform. Results Simulating results show the information processing system can operate correctly and dependably, the measuring rules, interactive interface and data handling method were all accepted by the user. Conclusion The designing approach based on the mix platform takes advantages of the two operating systems, the desired performances are acquired both in the real time processing and with the friendly artistic user interface. 展开更多
关键词 information processing real time data collection communicating protocols
在线阅读 下载PDF
A New Rational Secret Sharing Scheme 被引量:4
5
作者 ZHANG En CAI Yongquan 《China Communications》 SCIE CSCD 2010年第4期18-22,共5页
In this paper,we propose a new approach for rational secret sharing in game theoretic settings.The trusted center is eliminated in the secret reconstruction phase.Every player doesn’t know current round is real round... In this paper,we propose a new approach for rational secret sharing in game theoretic settings.The trusted center is eliminated in the secret reconstruction phase.Every player doesn’t know current round is real round or fake round.The gain of following the protocol is more than the gain of deviating,so rational player has an incentive to abide the protocol.Finally,every player can obtain the secret fairly.Our scheme is verifiable and any player’s cheating can not work.Furthermore the proposed scheme is immune to backward induction and satisfies resilient equilibrium.No player of the coalition C can do better,even if the whole coalition C cheats.Our scheme can withstand the conspiracy attack with at most m-1 players. 展开更多
关键词 Secret Sharing Game Theory Verifiable Secret Sharing Resilient Equilibrium
在线阅读 下载PDF
Principles and Defense Strategies of DNS Cache Poisoning 被引量:3
6
作者 Jin Chong Hao Zhiyu Wu Zhigang 《China Communications》 SCIE CSCD 2009年第4期75-81,共7页
DNS is one of the most important basic infrastructures of the Internet, attacks on which will prevent the Internet from working properly. Therefore, its security is receiving great concern. This paper analyzes the pri... DNS is one of the most important basic infrastructures of the Internet, attacks on which will prevent the Internet from working properly. Therefore, its security is receiving great concern. This paper analyzes the principles of both traditional and novel (Kaminsky) DNS cache poisoning, presents attack samples and describes the whole attack process in detail. After verifying the potential harm of DNS cache poisoning, the paper gives out several defense strategies. 展开更多
关键词 DNS cache poisoning Kaminsky attack
在线阅读 下载PDF
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State 被引量:5
7
作者 Li Jian Guo Xiaojing +2 位作者 Song Danjie Xie Feng Peng Yong 《China Communications》 SCIE CSCD 2012年第1期111-116,共6页
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 quantum key distffoution "Ping-pong" protocol extended three-particle GHZ state eavesdropping detection
在线阅读 下载PDF
A hierarchical architecture of centralized monitoring and controlling system and its high-performance and interoperability protocol 被引量:3
8
作者 黄理灿 吴朝晖 潘云鹤 《Journal of Zhejiang University Science》 CSCD 2004年第1期22-30,共9页
This paper describes a hierarchical architecture and a high-performance and interoperability protocol for centralized monitoring and controlling systems (CMCS) . The protocol we proposed can interoperate different mon... This paper describes a hierarchical architecture and a high-performance and interoperability protocol for centralized monitoring and controlling systems (CMCS) . The protocol we proposed can interoperate different monitoring and controlling systems constructed by different companies, each with different functions and communication protocols. The protocol reduces the amount of traffic and has real-time and high-perfor-mance advantages. The protocol was implemented in CMCS for telecommunication power supply and air-condi-tioner used by the Telecommunication Bureau of Zhejiang Province. This paper deals with the hierarchical architecture and function of CMCS and packet format, command ID, and SDL description of its protocol. We also discuss the properties of the interoperability and performance of the protocol in this paper. 展开更多
关键词 Monitoring and controlling system PROTOCOL ARCHITECTURE
在线阅读 下载PDF
Research and improvement on packet capture mechanism in linux for high-speed network 被引量:2
9
作者 杨武 方滨兴 +1 位作者 云晓春 张宏莉 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第5期494-498,共5页
With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic techniqu... With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic technique used in each field of the network applications. In a high-speed network, the heavy traffic of network transmission challenges the packet capture techniques. This paper does an in-depth analysis on the traditional packet capture mechanisms in Linux, and then measures the performance bottleneck in the process of packet capture. The methods for improving the packet capture performance are presented and an optimized packet capture scheme is also designed and implemented. The test demonstrates that the new packet capture mechanism (Libpacket) can greatly improve the packet capture performance of the network application systems in a high-speed network. 展开更多
关键词 high-speed network packet capture TCP/IP protocol stack performance bottleneck LKM
在线阅读 下载PDF
A Feedback Scheme for Fountain Codes Based Transport Protocol in Space Communications 被引量:1
10
作者 XING Yanling GE Ning 《China Communications》 SCIE CSCD 2015年第8期62-72,共11页
This paper proposed a practical- feedback scheme for fountain codes based transportprotocol in space communications. In the proposed scheme, the sender is signaled by two types of acknowledgment (ACK) packets.Before... This paper proposed a practical- feedback scheme for fountain codes based transportprotocol in space communications. In the proposed scheme, the sender is signaled by two types of acknowledgment (ACK) packets.Before decoding, packet loss probability isestimated on the receiver side and encapsulated intoa soft ACKand sent to the sender.After decoding,decoding results are encapsulated into hard ACKsandsent to the sender. There are two contributionsin the proposed scheme: 1. Empl layer calculation instead layer statistics to estimate oying physical of application the packet loss probability of space channel, which can improvethe accuracy and practicality. 2. A cascade overhead-failure probability relationship between the sender and the receiver has been analyzed to help determine the exact numberof packetsneeded byfountain decoding.Simulations show that for space communications,compared with the existing space transport protocols, fountain codes based transport protoeolwith the proposed schemecan not only ensure transmission reliability, but also greatly improvelink utilization. 展开更多
关键词 fountain code FEEDBACK spacecommunication packet loss probabilityestimation transport protocol
在线阅读 下载PDF
CW-HSTCP: Fair TCP in high-speed networks 被引量:1
11
作者 潘雪增 苏凡军 +1 位作者 吕勇 平玲娣 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第2期172-178,共7页
The congestion control mechanisms of the current standard TCP constrain the congestion windows that can be achieved by TCP in high-speed networks, which leads to low link utilization. HSTCP is one solution to solve th... The congestion control mechanisms of the current standard TCP constrain the congestion windows that can be achieved by TCP in high-speed networks, which leads to low link utilization. HSTCP is one solution to solve this problem by modifying the congestion control mechanism to have the characteristics of TCP friendliness in high loss rate environment and high scalability in low loss rate environment. However, experiments revealed that HSTCP has severe RTT unfairness. After analyzing the RTT unfairness in HSTCP with a model, we proposed CW-HSTCP, which added a fair factor to decrease the difference of congestion window caused by different RTT. Fair factor of long RTT flows can cause a sharp window increment that is easy to cause a bursty traffic, so a method called block-pacing was adopted. Simulation results showed that our new proposal could alleviate the RTT unfairness while keeping advantages of HSTCP. 展开更多
关键词 High-speed networks HSTCP Congestion control
在线阅读 下载PDF
Design of intelligent detecting system based on wireless transmission 被引量:1
12
作者 GUO Li-wei LIU Dong-hui +1 位作者 ZHANG Xin-ling SUN Xiao-yun 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第3期490-494,共5页
An intelligent detecting system based on wireless transmission is designed. Its hardware includes the card reading module, the wireless digital transmission module, the LCD module, the random password keyboard module ... An intelligent detecting system based on wireless transmission is designed. Its hardware includes the card reading module, the wireless digital transmission module, the LCD module, the random password keyboard module and a 16×16 lattice word database based on e-Flash MM36SB020. Its software is a communication protocol between the central control computer and the entrance management base station. To resolve the conflicting problems occurred during the data transmission, a method of delaying time at random is proposed. 展开更多
关键词 Communication protocol Delaying time Random entrance management base station Random password keyboard Wireless digital transmission
在线阅读 下载PDF
Quantum Secure Direct Communication with Authentication Expansion Using Single Photons 被引量:2
13
作者 杨静 王川 张茹 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第11期829-834,共6页
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first sc... In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first scheme,the third party, called Trent is introduced to authenticate the users that participate in the communication.He sends thepolarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys.In thecommunication process, polarized single photons are used to serve as the carriers, which transmit the secret messagesdirectly.The second QSDC process with authentication between two parties is also discussed. 展开更多
关键词 quantum secure direct communication quantum authentication authentication key expansion
在线阅读 下载PDF
Classical Communication and Entanglement Cost in Preparing a Class of Multi-qubit States 被引量:2
14
作者 PAN Gui-Xia LIU Yi-Min ZHANG Zhan-Jun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第3期631-634,共4页
Recently, several similar protocols [J. Opt. B 4 (2002) 380; Phys. Lett. A 316 (2003) 159; Phys. Lett. A 355 (2006) 285; Phys. Lett. A 336 (2005) 317] for remotely preparing a class of multi-qubit states (i.... Recently, several similar protocols [J. Opt. B 4 (2002) 380; Phys. Lett. A 316 (2003) 159; Phys. Lett. A 355 (2006) 285; Phys. Lett. A 336 (2005) 317] for remotely preparing a class of multi-qubit states (i.e, α[0...0〉 +β[1... 1〉) were proposed, respectively. In this paper, by applying the controlled-not (CNOT) gate, a new simple protocol is proposed for remotely preparing such class of states. Compared to the previous protocols, both classical communication cost and required quantum entanglement in our protocol are remarkably reduced. Moreover, the difficulty of identifying some quantum states in our protocol is also degraded. Hence our protocol is more economical and feasible. 展开更多
关键词 remote state preparation quantum entanglement classical communication cost projective measurement local unitary operation
在线阅读 下载PDF
Dynamic Polarization-Basis Compensation for Free-Space Quantum Communications 被引量:3
15
作者 张光宇 杨哲 +2 位作者 张成龙 朱智涵 王振华 《China Communications》 SCIE CSCD 2013年第2期27-32,共6页
In polarization-encoded free-space quantum communications, a transmitter on a satellite and a receiver in a ground station each have a respective polarization zero direction, by which they encode and decode every pola... In polarization-encoded free-space quantum communications, a transmitter on a satellite and a receiver in a ground station each have a respective polarization zero direction, by which they encode and decode every polariza-tion quantum bit required for a quantum com-munication protocol. In order to complete the protocol, the ground-based receiver needs to track and compensate for the polarization zero direction of the satellite-based transmitter. Ex- pressions satisfied by amplitudes of the s-polarization component and the p-polarization component are derived based on a two-mirror model, and a condition satisfied by the reflec- tion coefficients of the two mirrors is given. A polarization tracking principle is analyzed for satellite-to-ground quanaun communications, and quantum key encoding and decoding prin- ciples based on polarization tracking are given. A half-wave-plate-based dynamic polariza- tion-basis compensation scheme is proposed in this paper, and this scheme is proved to be suitable for satellite-to-ground and intersatellite quantum communications. 展开更多
关键词 dynamic polarization-basis com-pensation half-wave plate two-mirror model free-space quantum communications
在线阅读 下载PDF
Performance analysis of an iSCSI-based unified storage network 被引量:2
16
作者 傅湘林 张琨 谢长生 《Journal of Zhejiang University Science》 EI CSCD 2004年第1期1-7,共7页
In this paper, we introduced a novel storage architecture 'Unified Storage Network', which merges NAC( Network Attached Channel) and SAN( Storage Area Network) , and provides the file I/O services as NAS devic... In this paper, we introduced a novel storage architecture 'Unified Storage Network', which merges NAC( Network Attached Channel) and SAN( Storage Area Network) , and provides the file I/O services as NAS devices and provides the block I/O services as SAN. To overcome the drawbacks from FC, we employ iSCSI to implement the USN( Unified Storage Network) . To evaluate whether iSCSI is more suitable for implementing the USN, we analyze iSCSI protocol and compare it with FC protocol from several components of a network protocol which impact the performance of the network. From the analysis and comparison, we can conclude that the iSCSI is more suitable for implementing the storage network than the FC under condition of the wide-area network. At last, we designed two groups of experiments carefully. 展开更多
关键词 ISCSI Network Attached Channel (NAC) Unified Storage Networks (USN) NAS (Network Attached Storage) SAN (Storage Area Network)
在线阅读 下载PDF
Bidirectional Quantum Secure Direct Communication Network Protocol with Hyperentanglement 被引量:4
17
作者 顾斌 黄余政 +1 位作者 方夏 陈玉林 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第10期659-663,共5页
We propose a bidirectional quantum secure direct communication(QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be... We propose a bidirectional quantum secure direct communication(QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal.The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently.Compared with other QSDC network protocols,our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information.Also,we discuss the security of our QSDC network protocol and its feasibility with current techniques. 展开更多
关键词 quantum secure direct communication NETWORK BIDIRECTIONAL hyperentanglement high capacity
在线阅读 下载PDF
Deterministic Quantum Key Distribution Using Two Non-orthogonal Entangled States 被引量:3
18
作者 GUO Ying ZENG Gui-Hua 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第3期459-463,共5页
A deterministic quantum key distribution scheme using two non-orthogonal entangled states is proposed. In the proposed scheme, communicators share key information by exchanging one travelling photon with two random an... A deterministic quantum key distribution scheme using two non-orthogonal entangled states is proposed. In the proposed scheme, communicators share key information by exchanging one travelling photon with two random and secret polarization angles. The security of the distributed key is guaranteed by three checking phases in three-way channel and the communicators' secret polarization angles. 展开更多
关键词 quantum key distribution quantum entanglement state
在线阅读 下载PDF
Using CSMA/CD for Ethernet Passive Optical Network (EPON) 被引量:1
19
作者 季晓飞 范戈 《Journal of Shanghai Jiaotong university(Science)》 EI 2004年第2期25-28,共4页
Using CSMA/CD for EPON can eliminate the augmentations, such as multi-point control protocol and point-to-point emulation, added to the existing 802.3 architecture due to the incompatibility of PON to Ethernet. Both f... Using CSMA/CD for EPON can eliminate the augmentations, such as multi-point control protocol and point-to-point emulation, added to the existing 802.3 architecture due to the incompatibility of PON to Ethernet. Both full-duplex EPON system and half-duplex EPON system using CSMA/CD were proposed. In the full-duplex EPON, CSMA/CD is used as the upstream MAC protocol. In the half-duplex EPON system, both upstream and downstream traffic contend for the optical channel through CSMA/CD protocol. The upstream lightwave redirection and collision detection techniques were given. By the analysis and simulation, the throughput performance of the half-duplex EPON system is proven to be as well as that of the existing high speed half-duplex Ethernet LAN. 展开更多
关键词 ETHERNET passive optical network carrier sense multiple access optical access network
在线阅读 下载PDF
Novel multipath routing protocol integrated with forward error correction in MANET 被引量:1
20
作者 安辉耀 卢锡城 +1 位作者 彭伟 王阳元 《Journal of Central South University of Technology》 EI 2006年第2期196-199,共4页
In order to improve the data transmission reliability of mobile ad hoc network, a routing scheme called integrated forward error correction multipath routing protocol was proposed, which integrates the techniques of p... In order to improve the data transmission reliability of mobile ad hoc network, a routing scheme called integrated forward error correction multipath routing protocol was proposed, which integrates the techniques of packet fragmenting and forward error correction encoding into multipath routing. The scheme works as follows: adding a certain redundancy into the original packets; fragmenting the resulting packets into exclusive blocks of the same size; encoding with the forward error correction technique, and then sending them to the destination node. When the receiving end receives a certain amount of information blocks, the original information will be recovered even with partial loss. The performance of the scheme was evaluated using OPNET modeler. The experimental results show that with the method the average transmission delay is decreased by 20% and the transmission reliability is increased by 30%. 展开更多
关键词 mobile ad hoc networks multipath routing forward error correction encoding reliable transmission
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部