首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
There are a large number of malicious attack nodes and collusion groups in P2P(peer to peer) network, and the existing trust models improve the P2P network environment to some extent, but the emphasis of the models are different, which are unable to fully solve large-scale malicious attacks and deception. Therefore, a P2P trust model based on equilibrium theory is presented. The model consists of the construction of the trust structure, the malicious node detection and trust speculation. It constructs trust network according to the equilibrium theory, uses the equilibrium theory to define nodes balance factor, detects balance malicious nodes by calculating the impact of malicious behavior on the network, and adopts trust inference algorithm to estimate trust nodes to prevent distrust network nodes being added. Experimental results show that the model is reliable, and the algorithm is efficient and robust.  相似文献   

2.
In view of the Campus Grid construction,which is also a crucial part of ChinaGrid project,the performance decline for grid scheduling algorithms when non-dedicated nodes emerge in multi-grid environment is studied.A load balancing algorithm to optimize resource usage rate is proposed.The paper involves three parts: problem modeling,algorithm design,and experiment evaluation.The experimental results show that the proposed algorithm is effective for solving the problem of resource usage rate decline under the discussed grid circumstance.  相似文献   

3.
Some thoroughly research on the basic method for load state detection in MIN is introduced. Load sources of SCP and SSP in MIN are analyzed in detail after investigating the relationship between inter resource and load state in the system. And load detection parameters and model are presented. Moreover, a novel strategy to detect system load state based on fusion of multi detection data is presented. By some test, the theory and method are proved most feasible. Our research show that load state of MIN can be recognized by detecting utility of internal resource utilizing of single node in MIN, and multi redundant detecting data fusion is effective approach to improve the reliability and trust degree of the result.  相似文献   

4.
In order to establish network interaction pattern based on trust,trust-based basic interaction patterns were proposed and the fuzzy production rules were designed.The basic interaction patterns were used to describe degree of truth of the interaction event trust and that of the integrated interaction pattern.Furthermore,the searching algorithm and refreshing method for the basic interaction pattern based network interaction pattern were proposed.The searching algorithm for integrated interaction pattern is based on the depth-first search algorithm for stack and heap.The active refreshing for integrated interaction pattern is based on user's requirements,while the passive refreshing for integrated interaction pattern is based on trust changes between the interacted entities and the interaction event changes.Theoretical analysis and experiment results show that the method can establish trusted integrated interaction patterns quickly and refresh degree of truth of the integrated interaction patterns.  相似文献   

5.
The prediction of network traffic flow is a problem of great significance in the research work of resource allocation and congestion control. Based on this accurate prediction, the scheme of resource allocation and control can easily adapt to dynamic variations of incoming traffic flow. So the goal of optimal network performance is achieved. There are many sorts of traffic flow of self-similarity characteristics in high-speed network, and some research work has showed this self-similarity keeps in close contact with the attractor of chaos system. A rate prediction of self-similar traffic sources in high-speed network is proposed as well as the maximum of predictable time by applying the technology of phase space reconstruction about chaotic time series. This method has a simple prediction mode, and the result of simulations indicates it also has highly accurate results.  相似文献   

6.
从网络规模、网络紧密度、信任与承诺、社会风气与归属感及社会参与5个方面构建评价农户社会网络关系的指标体系,按照区域分布,将所调查区域分为河套地区、中原地区和关中地区,采用实地调查的1440份农户数据,运用变异系数法确定各指标权重,进而对农户社会网络关系水平进行测算。研究得出:按照权重大小依次为社会参与、网络规模、网络紧密度、信任与承诺、社会风气与归属感;农户社会网络关系评价值整体较低,呈正偏态分布,且存在地区差异;关中地区最高,但个体差异明显,其次依次为河套地区和中原地区;从一级指标的测算结果看,社会参与得分最高,其次为社会风气与归属感、信任与承诺,最后为网络规模和网络紧密度,可见农户更愿意参与集体行动,人文环境得到进一步改善;地缘与亲缘限制了网络规模的扩大,而农村人口的流失也使得网络紧密度减弱。在此研究基础上提出相关建议,以期为相关政府机构实施乡村治理提供依据。  相似文献   

7.
The security issues in mobile Ad hoc network, especially caused by inner malicious nodes are analyzed. By tracking the behavior of nodes, trust level of each node can be evaluated and managed; then actions of malicious nodes will be constrained and the security and reliability of entire network are enhanced. According to the features of Ad hoc. The scheme proposed in not only extends the conception of trust but also include the trust computation model and trust management mechanism. Simulation experiments show the novel scheme is more efficient than other trust schemes in traditional protocols.  相似文献   

8.
在分析地震条件下管线功能函数及极限状态方程基础上,对城市供水管单元体进行震害预测。以供水管网系统作为边权的有向网络图,通过基于神经网络的Monte Carlo方法,模拟各管线运行状态及其破坏状态。结合图论理论,分析供水管网的管线连通可靠性。  相似文献   

9.
Based on the fractal theory, using quarter tree in neighborhood method and Bang-Bang control method, the steady control of the chaotic in the secure communication is realized. A simulation circuit has been designed based on driving responding theory, then, its synchronization is simulated on the computer.  相似文献   

10.
As the important method and instrument of agile manufacture,the technology of distributed collaborative design and manufacturing has become the hotspot of manufacturing. The basic concept and key technologies of IP_VPN are introduced in this paper,and a collaborative design network model based on IP_VPN is presented. Distributed collaborative design is a multi_user,multitask involved system, which is consisted of lots of collaborative processs,so the network security is the key of distributed collaborative design. We research on the security of collaborative design network based on IP_VPN, hence get a conclusion:we can construct an economical?practical and secure collaborative design network system by the application of data encryption,user authentication and access control based on the role,etc.  相似文献   

11.
Trust is the most basic operation mechanism. From the embedded visual angle, the cooperation relation is considered as the inter-continuation.The trust relation in virtual enterprise is embedded in the network of social relation and will evolve dynamically. The interaction between partners, which is composed of information communion and learning, plays an important role in the creation mechanism of VE's trust . Firstly, this article starts with the time dimension of cooperation relation in VE, compartmentalizes the trust relation of VE as two parts: initial trust and continuous trust. Secondly, it argues that the prior experience of cooperation, reputation and commitment can affect the initial trust obviously, accordingly, the life cycle of VE, opportunism, interdependence and the distance of culture and geographic distribution can determine the generation and development of the continuous trust. Finally, it develops a dynamic process model based on information communion and learning, which perfects Nielsen's static conception model.  相似文献   

12.
基于格网GIS的伊通县县域耕地地力评价   总被引:1,自引:1,他引:0  
耕地地力是指在特定区域内的特定土壤类型上,立足于耕地自身素质的地力要素的总和。目前通用的评价方法是采用矢量的方法,在评价单元的基础上建立县域耕地资源数据库,采用模糊聚类、主成分分析等方法进行耕地地力综合评价。由于涉及较多矢量数据的叠加,采用该方法会出现大量碎小图斑和栅格挂接值的平均化。Grid方法将所有参评指标数据展布到一定尺寸的地理格网上,解决了矢量单元评价存在的缺点。以吉林省伊通县为例,采用Grid方法作为基本评价单元,以行政单元作为统计单元,对县域耕地地力状况进行了评价。研究将伊通县耕地地力状况分为5级,与环境因子进行了耦合分析并对各级地力耕地的空间分布进行了分乡统计,结果表明:整个伊通县耕地地力状况总体水平比较高,中高产地主要分布在低河漫滩和平坦的河流低阶地上,占耕地总面积的82.12%,低产地主要分布在高丘陵和低山地区。该结果将为耕地资源的合理规划,保护与利用提供数据支撑。  相似文献   

13.
Application system generally refers to all kinds of computer information system. It aims at improving the sharing and application of the resource. The resource in application system usually means data resource. For computer management and maintenance, there are not only data resource, but also program resource and network resource. Effective management of this resource is key to ensure proper work of the application system. In this paper, the basic pattern and policy for resource management is put forward and a method to build and realize the resource layer that lies between database layer and application layer is to be found. This management layer, which skillfully connects the application system with resource and establishes good base for application and exploitation of system, is named as resource management system.  相似文献   

14.
It is difficult to distinguish the cheating and other malicious behaviours in the grid service trust evaluation. A trust evaluation model for grid service based on compensation is proposed.With market mechanism, service provider and demander present the expected profit and compensate price for their behaviours to maximize their own profit. The game theory is applied to balance the expected profit and compensate price. Based on the game theory, evaluation trade strategy achieves perfect Bayesian equilibrium. Service provider and demander can choose their own trade strategy to maximize profit. Theoretical analysis and simulation results show that the service demanders can abandon the cheating motivation voluntarily, while the service providers can make right decision to choose trust evaluation. Compared with the existing model, the precision and security of the trust evaluation is enhanced greatly, while the calculating and communication cost is reduced remarkably.  相似文献   

15.
Privacy protection technologies of automated trust negotiation have witnessed great development, among which hidden credentials is an admittedly more satisfactory one. However, for hidden credentials, there exists fatal weakness of blindly decryption, which results decryption execution costly. To solve the problem, using bilinear pairings over elliptic curves, a policy-based encryption for privacy protection is proposed. Under the assumption of BDH problem, the scheme is proven to be IND-Pol-CCA safety in the random prediction model. Compared with hidden credentials and other encryption solutions based on policy, this scheme is more efficient, secure and of shorter length of cipher text.  相似文献   

16.
The theory of Artificial Neural Networks and image processing are analyzed. ANN theory is also investigated . A Back Propagation network is used for classification. Based on the ANN and feature extraction, a character recognition and entry system is developed. Its drawbacks are discussed. Some solutions are presented. An odd feature database is constructed to promote the performance for learning. A 3 layer feedforward network has been proved that it has the ability to identify hand written characters.  相似文献   

17.
As a key resource, the knowledge management is becoming a research field interested by many researchers. In order to study the mathematics theory base of knowledge expression, in this paper, a knowledge expression model is given. In this model the knowledge system is expressed by multi-tuple, the single knowledge object is expressed by the tuple, a structural expression of knowledge is given using token as example and the application of the model in city water supply pipe network is presented in this paper.  相似文献   

18.
农民创业活动已成为推动农村经济发展和农村城镇化进程的重要动力源泉,创业资源的获取是制约农民创业者的关键因素,而社会网络影响着农民创业过程中社会资源的配置,因此探讨农民获取创业资源的社会网络途径和机制有着重要的意义。运用问卷调查和统计分析的办法,就社会网络对农民创业者获取创业资源的影响作了分析,将农民创业者的社会网络按其关系密度进行了分类,深入分析了该社会网络的规模、密度、动态性和差异性,研究发现不同类型的社会网络在农民创业者获取资源过程中作用各有不同。  相似文献   

19.
Networks of interaction have assumed particular significance in recent years because of their presumed importance for learning and innovation. Alliances between related firms are thought to encourage interactive learning between participating organizations through the sharing of knowledge and information, which is itself facilitated through trust, shared values and ways of working. The vast body of literature that has emerged is, however, incredibly fragmented, encompassing an array of theoretical positions and perspectives. This paper focuses upon two issues which are believed to be of particular significance and which need clarification in order to move to a clearer understanding of the ways in which networks of interaction evolve, and of their capabilities and limitations in relation to economic performance and competitiveness: (1) the importance of network structure, arguing that innovative activity requires flexibility with regard to network formation. (2) The role of geography in relation to the construction and functioning of alliances. It is the contention here that networks are likely to be increasingly international in scope.  相似文献   

20.
基于社会资本的相关理论,利用四川省盆周山区的实地调查数据,采用Logistic线性回归模型,就影响合作社管理层对一般社员信任的因素进行了实证分析。研究结果表明,管理层人员年龄、性别、与一般社员关系、受教育程度以及社员责任心对信任有影响,其中管理层人员年龄和与一般社员关系对信任影响显著,而管理层人员性别、受教育程度以及社会责任心影响均较小,最后就提高管理层对一般社员的信任提出了加强合作社制度建设、提高管理层文化水平和合理分配人员工作的建议。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号