首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到16条相似文献,搜索用时 78 毫秒
1.
石军锋  钟先信 《系统仿真学报》2007,19(18):4330-4334
低占空比MAC协议通过节点休眠有效延长了传感网络的寿命,然而同步过程中许多节点监听多个计划,降低了协议的节能效果;同时节点休眠导致数据转发时延大大延长。提出了一种适用于低占空比MAC的新同步机制。基站成为唯一的同步发起者,它周期性地发布同步信息。其他节点仅监听一个计划并广播他们自己的休眠计划,多跳路径上的邻居节点交错监听周期。在一个树型拓扑网络上的仿真试验表明,此同步机制可以在更少能量的条件下进一步减少低占空比MAC的系统时延,提高网络在较重负载下的吞吐量。  相似文献   

2.
由于水声传感网络具有能量的局限性,所以低复杂度的定位算法更适用于水声传感网络。传统的APIT算法能够以较少的控制开销获得较好的定位精度,有利于水下传感网络定位的实现,但其复杂度高,冗余误差较大。以点扫描的方式取代传统网格扫描法,提出一种低复杂度的APIT算法,并在OPNET平台上搭建水声传感网络环境,阐述该算法在水下传感网络节点定位的实现过程。仿真结果表明,待定位节点与锚节点密度的增加有助于改善算法的性能,且在同等条件下本文算法比传统APIT算法定位精度更高。  相似文献   

3.
基于组件的安全主动网络仿真模型   总被引:1,自引:0,他引:1  
聂飞  李增智  周恒琳 《系统仿真学报》2004,16(12):2884-2885
分析了主动网络中存在的安全问题,提出了一种增强主动网安全性的方法:通过对数据信源格式的扩充,即为主动信包增加安全域的方式来增加主动网络的安全性。建立了基于组件结构的仿真模型,并通过J-Sim仿真软件对具体实例进行了仿真研究。模型可以研究不同的协议部署方式、不同的拓扑结构、不同的安全策略以及不同的网络性能参数对主动网络性能的影响。  相似文献   

4.
基于贝叶斯网络的概率安全评估方法研究   总被引:5,自引:0,他引:5  
针对传统的事件树/故障树分析方法的局限性,提出了基于贝叶斯网络的系统概率安全评估方法.该方法采用了一体化的建模思想,将故障树和事件树转化为贝叶斯网络进行分析,不仅可以得到常用的安全性分析结果,还可以得到其他有用的信息,非常便于推理和诊断.而且该方法还可以处理多态、相依、非单调和非确定性逻辑关系,有很强的适用性.通过1个油井平台瓦斯泄漏实例说明了该方法的有效性,并与传统的故障树/事件树分析方法和基于二元决策图的分析方法进行了比较.  相似文献   

5.
面向任务的保障网络再路由策略及预先规划研究   总被引:1,自引:0,他引:1  
以保障战争物资所需的保障网络为背景 ,研究并提出了面向任务的保障网络再路由策略及各种策略的具体使用准则 .在此基础上 ,为了缩短任务完成时间 ,研究了任务物流的再路由策略预先规划问题 ,绘制了再路由策略决策图 ,并作了实例分析 ,方法简单、实用 .  相似文献   

6.
安全资源的优化配置对于实现复杂网络信息系统安全风险管理具有非常重要的作用.建立了基于攻击传播性及分层防护的复杂网络信息系统安全资源分配模型.以该模型为基础,实现了单层防护以及双层防护方式下的安全资源分配过程.通过仿真实验的验证,在安全风险评估过程中考虑攻击传播性,有助于更加准确地评估整个组织中的安全风险.同时,采用分层防护方式能够在固有投资条件下更加有效地降低复杂网络信息系统的安全风险.  相似文献   

7.
屏蔽数据是指引起系统失效的真实原因不得而知,即失效原因可能是系统组件的某个子集。一般地,屏蔽数据下非齐次泊松过程 (non-homogeneous Poisson process, NHPP)类软件可靠性叠加模型中参数的极大似然估计比较复杂,因为叠加模型不能分解成几个简单的NHPP模型。本文主要研究基于屏蔽数据下叠加模型中参数的极大似然估计,评估软件系统的可靠性。最后通过一组模拟数据,说明极大似然估计效果良好。  相似文献   

8.
以二维方格网络为拓扑结构,在考虑同一地理区域节点存在共因失效关系、同一类节点存在关联失效关系、网络体系结构存在协议层与层之间的级联失效关系等3 种依赖关系的条件下,建立失效概率的依赖模型来模拟节点相依失效。以节点之间连通的概率为可靠性测度,利用Monte Carlo 法进行近似计算,分析依赖关系对网络可靠性的影响。研究表明,级联失效比共因失效带给网络可靠性的影响更大;关联失效带来的影响是灾难性的,尽管节点自身失效概率很小,只要关联程度足够大,就会使节点故障在网络中快速传播。  相似文献   

9.
针对航空电子网络通信任务的实时性需求,建立具有时延约束的面向任务的网络可靠性模型,并从共因失效(common cause failure, CCF)的角度分析了部件故障相关性,提出一种基于有序二叉决策图(ordered binary decision diagram, OBDD)的航空电子网络可靠性评价方法--时延约束边扩张算法。算法结合时延约束,利用边扩张构建网络OBDD,递归遍历OBDD结构计算部件故障统计独立条件下航空电子网络可靠度,并在此基础上引入CCF分析,利用同一OBDD结构综合评价航空电子网络可靠性。通过实例阐述了算法的原理,实验表明算法能有效评价航空电子网络的可靠性。  相似文献   

10.
As the web-server based business is rapidly developed and popularized, how to evaluate and improve the reliability of web-servers has been extremely important. Although a large num- ber of software reliability growth models (SRGMs), including those combined with multiple change-points (CPs), have been available, these conventional SRGMs cannot be directly applied to web soft- ware reliability analysis because of the complex web operational profile. To characterize the web operational profile precisely, it should be realized that the workload of a web server is normally non-homogeneous and often observed with the pattern of random impulsive shocks. A web software reliability model with random im- pulsive shocks and its statistical analysis method are developed. In the proposed model, the web server workload is characterized by a geometric Brownian motion process. Based on a real data set from IIS server logs of ICRMS website (www.icrms.cn), the proposed model is demonstrated to be powerful for estimating impulsive shocks and web software reliability.  相似文献   

11.
Distributed localization for anchor-free sensor networks   总被引:1,自引:0,他引:1  
Geographic location of nodes is very useful in a sensor network. Previous localization algorithms assume that there exist some anchor nodes in this kind of network, and then other nodes are estimated to create their coordinates. Once there are not anchors to be deployed, those localization algorithms will be invalidated. Many papers in this field focus on anchor-based solutions. The use of anchors introduces many limitations, since anchors require external equipments such as global position system, cause additional power consumption. A novel positioning algorithm is proposed to use a virtual coordinate system based on a new concept--virtual anchor. It is executed in a distributed fashion according to the connectivity of a node and the measured distances to its neighbors. Both the adjacent member information and the ranging distance result are combined to generate the estimated position of a network, one of which is independently adopted for localization previously. At the position refinement stage the intermediate estimation of a node begins to be evaluated on its reliability for position mutation; thus the positioning optimization process of the whole network is avoided falling into a local optimal solution. Simulation results prove that the algorithm can resolve the distributed localization problem for anchor-free sensor networks, and is superior to previous methods in terms of its positioning capability under a variety of circumstances.  相似文献   

12.
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels.  相似文献   

13.
A pair of coupling metrics for software networks   总被引:1,自引:0,他引:1  
Complex networks are everywhere. A typical example is software network. How to measure and control coupling interactions of software components is a largely explored research problem in software network. In terms of graph theory and linear algebra, this paper investigates a pair of coupling metrics to evaluate coupling interactions between the classes of object-oriented systems. These metrics differ from the majority of existing metrics in three aspects: Taking into account the strength that one class depends on other ones, reflecting indirect coupling, and distinguishing various coupling interaction. An empirical comparison of the novel measures with one of the most widely used coupling metrics is described. Specifically, an experiment about the relationships of this pair metrics is conducted. The result shows that software complexity derived from coupling interaction could not be accurately reflected by one dimension of coupling metric for negative correlation.  相似文献   

14.
The network reliability is difficult to be evaluated because of the complex relationship among the network components.It can be quite different for different users running different applications on the same network.This paper proposes a new concept and a model of application reliability.Different from the existing models that ignores the effects of applications,the proposed application reliability model considers the effects of different applications on the network performance and different types of network faults and makes the analysis of network components relationship possible.This paper also provides a method to evaluate the application reliability when the data flow satisfies Markov properties.Finally,a case study is presented to illustrate the proposed network reliability model and the analysis method.  相似文献   

15.
一种适用于无线传感器网络定位的新方法   总被引:3,自引:0,他引:3  
针对无线传感器网络,提出了一种基于恒模算法(constant modulus algorithm,CMA)的新定位方法(CMA-MAP)以及它的一种增强型算法(CMA-MDS)。其中CMA-MAP算法利用通信节点间距离的恒模性质,通过计算求出满足网络拓扑结构的多个局部最优解,并通过比较获得全局最优解。增强型算法(CMA-MDS)则是恒模算法与多维尺度分析技术相结合的一种新方法,模拟表明CMA-MDS可以提高估计的精度,且具有很强的鲁棒性。  相似文献   

16.
为对抗无线传感器网络中存在的强针对性的智能型干扰攻击,基于多种扩频技术提出了一种混合跳频扩频、非协调直接序列扩频以及非协调跳频扩频的抗干扰攻击方法。为解决传统扩频技术需要提前共享密钥的限制,在网络初始化阶段使用非协调跳频扩频进行网络通信;为避免持续使用非协调扩频跳频带来的高能量消耗问题,发送节点与接收节点在非协调扩频跳频模式下生成跳频序列,即可进行传统跳频扩频;通过非协调直接序列扩频技术进一步增强对抗干扰攻击的性能;使用OPNET并基于多种干扰攻击模型进行网络仿真,评估所提出的混合抗干扰攻击方法的性能。仿真结果表明,在环境恶劣情况下,并受到强针对性的智能型干扰攻击时,网络仍能保持较低的丢包率,故所提出的混合抗干扰攻击方法能有效地抵抗无线传感器网络中的干扰攻击。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号