期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
中韩科研合作网络、模式与演进路径 被引量:3
1
作者 刘琼 刘桂锋 丁岚 《科技管理研究》 CSSCI 北大核心 2019年第13期65-73,共9页
从6个时间阶段分析中韩科研合作网络演化路径,以期为两国科研机构的学术合作发展提供新启示。采用中韩合著SCI论文进行产出力、影响力分析,构建其学科网络、机构合作网络,深入挖掘中韩科研合作模式,描绘中韩科研合作演化路径。研究发现... 从6个时间阶段分析中韩科研合作网络演化路径,以期为两国科研机构的学术合作发展提供新启示。采用中韩合著SCI论文进行产出力、影响力分析,构建其学科网络、机构合作网络,深入挖掘中韩科研合作模式,描绘中韩科研合作演化路径。研究发现:中韩科研合作模式先后经历被动分散、"一对一"单一合作模式、以人才流动为纽带的"一对N""N对一"自发式合作模式、海外办学平台建设的"面到面"平民化合作模式,发展到从学院出发、以学科发展为目的"点对点"任务型合作模式,以及战略联盟、校企合作、地方合作等自由化、多样化、开放化的"N+N"模式。 展开更多
关键词 中韩合作 科研合作 合著论文 合作网路 合作模式 演化
在线阅读 下载PDF
OvBNN authentication based on cooperative signature for wireless sensor networks 被引量:1
2
作者 秦丹阳 Zhang Yan +1 位作者 Ma Jingya Ji Ping 《High Technology Letters》 EI CAS 2018年第3期287-295,共9页
The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key man... The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key management and secure routing protocol. Although the signature mechanism based on symmetric encryption is high in energy efficiency,it is vulnerable to be attacked and there is a time delay during authentication. Traditional public key encryption mechanism with improvement in security brings in complex algorithm and costs much time,which is not suitable for WSN. In this paper,a signature authentication mechanism,an optimized variant Bellare Namprempre Neven( OvBNN) is presented to quickly complete the authentication by mutual cooperation between nodes so as to make the nodes use the intermediate calculation results of their neighbor nodes directly.Simulation results show that the proposed mechanism is superior to traditional authentication mechanisms both in energy consumption and authentication time. 展开更多
关键词 optimized variant Bellare Namprempre Neven (OvBNN) digital signature authentication speed energy consumption wireless sensor networks (WSN)
在线阅读 下载PDF
Social-Aware Cooperation Among Mobile Terminals for Wireless Downlink Transmission 被引量:1
3
作者 Mao Hongliang Feng Wei Ge Ning 《China Communications》 SCIE CSCD 2015年第9期1-10,共10页
This paper investigates the social-aware cooperation(SAC) among mobile terminals(MTs), motivated by the fact that modern smart devices have much improved context awareness. Aware of the social ties, the cooperative ne... This paper investigates the social-aware cooperation(SAC) among mobile terminals(MTs), motivated by the fact that modern smart devices have much improved context awareness. Aware of the social ties, the cooperative network contains two layers of property: social and physical. In order to observe how the social awareness benefit the cooperation performance, we first formulate the social ties between MTs into parameters that can describe the cooperative behaviors by taking the mobility feature into account, defined as the conviction-approval-suspicion(CAS) model. Limited by the processing capability, partner selection is of great practical significance. To this end, the social-aware partner selection strategy is analyzed, and a significant superiority is observed compared to social-unaware selection. By analyzing the cooperative throughput, an explicit relationship between the degrees-of-freedom gain and the social-physical property is finally derived. Simulation results validate the theoretical analysis. 展开更多
关键词 social-aware cooperation partner selection degrees-of-freedom
在线阅读 下载PDF
Cooperative Layer-2 Based Routing Approach for Hybrid Wireless Mesh Networks
4
作者 Alicia Trivino Alfonso Ariza +1 位作者 Eduardo Casilari Juan C.Cano 《China Communications》 SCIE CSCD 2013年第8期88-99,共12页
In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing ... In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing scheme that works differently accordingly to the node mobility.In this sense,a proactive routing scheme is restricted to the backbone to promote the use of stable routes.Conversely,the reactive protocol is used for searching routes to or from a mobile destination.Both approaches are simultaneously implemented in the mesh nodes so that the routing protocols share routing information that optimises the network performance.Aimed at guaranteeing the IP compatibility,the combination of the two protocols in the core routers is carried out in the Medium Access Control(MAC)layer.In contrast to the operation in the IP layer where two routing protocols cannot work concurrently,the transfer of the routing tasks to the MAC layer enables the use of multiple independent forwarding tables.Simulation results show the advantage of the proposal in terms of packet losses and data delay. 展开更多
关键词 hybrid mesh networks mobile ad hoc network hybrid routing protocols Layer-2 routing Layer-2 forwarding
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部