MARKOV_CHAIN

作品数:296被引量:531H指数:10
导出分析报告
相关作者:李亚飞康慕谊徐广才陈蜀宇李娜更多>>
相关机构:东南大学燕山大学北京师范大学北京农学院更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家教育部博士点基金国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Chinese Journal of Electronicsx
条 记 录,以下是1-6
视图:
排序:
A Stochastic Approach of Dependency Evaluation for IoT Devices被引量:3
《Chinese Journal of Electronics》2016年第2期209-214,共6页HUANG Jiwei CHEN Guo CHENG Bo 
supported by the National Natural Science Foundation of China(No.61502043 and No.61132001);National High-tech R&D Program of China(863 Program)(No.2013AA102301);Beijing Natural Science Foundation(No.4162042);Bei Jing Talents Fund(No.2015000020124G082);the Fundamental Research Funds for the Central Universities(No.2015RC22)
Internet of things(Io T) is an emerging technique that offers advanced connectivity of devices, systems, services, and human beings. With the rapid development of hardware and network technologies, the Io T can refer ...
关键词:Internet of things(IoT) Dependency Random walk Markov chain 
A Novel Pauli Evolutionary Quantum Algorithm for Combinatorial Optimization被引量:3
《Chinese Journal of Electronics》2010年第3期399-402,共4页XIONG Yan LIANG Xiao MIAO Fuyou 
This work is supported by the National Natural Science Foundation of China (No.90818007) and Chinese 863 High-tech Project (No.2009AA01Z203)
In this paper, a novel evolutionary quantum algorithm with Pauli mutation PEQA is proposed to solve the combinatorial optimization problem. PEQA utilizes quantum bit strings, quantum gate and Pauli mutation to obtain ...
关键词:Quantum evolutionary algorithm Quantum computation Markov chain Pauli evolutionary quantum algorithm (PEQA). 
Anomaly Detection of User Behavior Based on Shell Commands and Homogeneous Markov Chains被引量:12
《Chinese Journal of Electronics》2008年第2期231-236,共6页TIAN Xinguang DUAN Miyi LI Wenfa SUN Chunlai 
Behavior-based intrusion detection is currently an active research topic in the field of network security. This paper proposes a novel method for anomaly detection of user behavior, which is applicable to host-based i...
关键词:Intrusion detection Anomaly detection Shell command Markov chain. 
Performance Analysis of the IEEE 802.15.3 CSMA/CA in Unsaturated Traffic Conditions
《Chinese Journal of Electronics》2008年第2期351-355,共5页LIU Xin DAI Qionghai WU Qiufeng 
This work is supported by the Key Project of National Natural Science Foundation of China (No.60432030) and the Distinguished Young Scholars of National Natural Science Foundation of China (No.60525111).
In IEEE 802.15.3 the traffic communicated by Carrier sense multi access/Collision avoidance (CSiVIA/CA) mechanism are unsaturated in most cases that are different in IEEE 802.11. This paper presented an extension an...
关键词:IEEE 802.15.3 Medium access control(MAC) UNSATURATED Markov chain. 
Performance Analysis of Capture Effect in High Speed Wireless Networks
《Chinese Journal of Electronics》2008年第1期165-169,共5页GE Xiaohu YANG Yang ZHU Yaoting 
This work is supported by National Natural Science Foundation of China (No.60610106111).
The influence of capture effect on the high speed wireless networks is investigated in this paper. A new garkov chain model considering capture effect for the binary exponential back-off scheme in the MAC layer has be...
关键词:IEEE 802.11 protocols MAC layer Throughput model Markov chain Capture effect. 
RWBO+BEB: A Novel Backoff Algorithm for IEEE 802.11 DCF
《Chinese Journal of Electronics》2005年第4期686-690,共5页LI Yun ZHAO Weiliang LONG Keping YANG Fengrui 
This work is supported by the National High Technology Development 863 Program of China (No.2003AA121540); the National Natural Science Foundation of China (No.90304004); the research grants by the Ministry of Education of China (No.204125); the Science and Technology Research Project of Chongqing Municipal Education Commission of China (No.050310); the research grants by the Ministry of Personnel of China.
The packet collision probability of 802.11 DCF is very high on saturated channel condition, which is attribute to that the PDoSS of 802.11 is uneven. In this paper, we propose a novel random backoff algorithm, called ...
关键词:802.11 Distributed coordination function (DCF) Random walking back Off Binary exponential backoff Markov chain mode 
检索报告 对象比较 聚类工具 使用帮助 返回顶部