摘要:
The usual network message transmission is based on store and forward mechanism. The network node does not process the network messages. Network coding theory has changed this routing form. To improve the network transmission capacity, it allows nodes to encode the transmitting messages. Some researches show that the network coding theory makes the node reach the maximal network traffic introduced by max flow min cut theory. Our paper uses network coding theory to optimize the performance of P2P network resource sharing. Lastly, we implement a P2P content sharing system based on network coding and design simulations to evaluate its performance. Analysing the experimental results, we find that network coding theory make P2P content sharing application efficient and scalable.
期刊:
Journal of Networks,2010年5(5):586-593 ISSN:1796-2056
通讯作者:
Gengsheng, Z.(zhenggengsheng@sina.com)
作者机构:
[Gengsheng, Zheng] School of Computer Science and Engineering, Wuhan Institute of Technology, China;[Zhengbing, Hu] Department of Information Technology, Huazhong Normal University, China
期刊:
FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS,2009年:497-+
通讯作者:
Hu, Zhengbing
作者机构:
[Hu, Zhengbing] Huazhong Normal Univ, Dept Informat Technol, Wuhan, Peoples R China.;[Al Shboul, Rabah Moh'd] Al Balqa Appl Univ, Huson Univ Coll, Dept Informat Technol, Irbid, Jordan.
通讯机构:
[Hu, Zhengbing] H;Huazhong Normal Univ, Dept Informat Technol, Wuhan, Peoples R China.
关键词:
Ant Colony Optimization Technique;Collaborative Learning;Training Courses;Decision Support
摘要:
In this paper, ACOT was provided to advise for employees in selecting the Training Courses (TCs). The courses planning process needs to abide the company's policies regarding training hours and costs. In order to avoid the courses of an employee are confined to only one or two areas, we stipulate that the selected TCs cover three or more areas. This paper uses Ant Colony Optimization (ACO) algorithm to generate packages of TCs for individual employees with the maximization of utility (costs * hours) as the objective function values. Moreover, we also use an enumerate algorithm to verify the effectiveness and efficiency of our ACO algorithm. The two measurements are related to the solution quality and run time required by our algorithm.
期刊:
Journal of Software,2009年4(10):1145-1151 ISSN:1796-217X
通讯作者:
Hu, Z.(kievpastor@yahoo.com)
作者机构:
[Zhengbing Hu] Huazhong Normal University, Department of Information Technology, Wuhan, China;[Kai Du] National University of Defense Technology, Changsha, China
期刊:
PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL III,2009年3:946-949
通讯作者:
Wu Junqi
作者机构:
[Wu Junqi] Huazhong Normal Univ, Engn & Res Ctr Informat Technol Educ, Wuhan 430079, Peoples R China.;[Liu Yumei; Yang Zongkai; Hu Zhengbing] Huazhong Normal Univ, Wuhan 430079, Peoples R China.
通讯机构:
[Wu Junqi] H;Huazhong Normal Univ, Engn & Res Ctr Informat Technol Educ, Wuhan 430079, Peoples R China.
摘要:
Multimedia technology is one of the hot technologies at the turn of the century. It promotes the reform of instruction and improves the qualities and effects of instruction. Using multimedia in instruction is the main component of modernization of instruction, as well as the breakthrough of overall instructional reform. The paper first introduces the conception of multimedia technology and its main characteristics, and then expounds the advantages of multimedia technology in instruction, the transformations of instructional modes after the application of multimedia technology, the methods of multimedia teaching and the changes of requirements of teachers and students. In the end, we propose our thoughts and the items that we should pay attentions to in the application of multimedia of multimedia technology in teaching.
期刊:
PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL III,2009年3:950-952
通讯作者:
Wu Junqi
作者机构:
[Wu Junqi] Huazhong Normal Univ, Engn & Res Ctr Informat Technol Educ, Wuhan 430079, Peoples R China.;[Liu Yumei; Yang Zongkai; Hu Zhengbing] Huazhong Normal Univ, Wuhan 430079, Peoples R China.
通讯机构:
[Wu Junqi] H;Huazhong Normal Univ, Engn & Res Ctr Informat Technol Educ, Wuhan 430079, Peoples R China.
关键词:
Strategies;Eudcation;Computer game
摘要:
Nowadays people in the area of e-Learning contents development are paying attention to educational computer games, which utilize games in education for pleasant learning. In many respects, the relevant technologies are sufficiently sophisticated for ambitious game designs. However, design theory itself is lagging behind. This study purposes to analyze the status of current educational computer games, and then puts forward some principles and guidelines for designing educational computer games. Hope the guidelines will benefit to the designer of educational computer games.
摘要:
An embedded video multipoint processor in videoconferencing system is presented. The embedded video multipoint processor hardware system is designed based on TMS320DM642, which can meet the requirements of real time and video processing in videoconference. The software is an open system based on PC platform and can be designed for customized applications. The realization of video multipoint processor is described based on H.264; the performance of the system and the solution of key problem are given in details.
摘要:
With the development of computer network and modern instructional theory, collaborative learning has become an important instructional strategy in the environment of cyber-schools, and it can help develop many important characters of learners, such as creativity, collaboration with people and so on, which are valued highly in modern society. This paper firstly introduces collaborative learning and the instructional procedures of collaborative learning in network environment, and then lists designs of some practical and useful collaborative learning cases that are carried out in LAMS platform, finally it gives some suggestions of collaborative learning in cyber-schools.
摘要:
This paper is going to present a new algorithm called "PP" (a RFID anti-collision algorithm based on pipeline and pre-detecting mechanism) to solve the problem of collisions among the tags in RFID system. This algorithm provides a hardware architecture consisting of two antennas: a pre-detection antenna for pre-detecting and a reading antenna for tag reading, the two processes of which will work respectively and concurrently based on pipeline system. Compared with other related researches, this algorithm that avoids the waste of time in the process of pre-detecting and free from the limitation the ratio of the length of detection slot to reading slot will contribute to a non-stop reading operation. Our simulation illuminates that the proposed PP algorithm outperforms the existing ones in efficiency, stability and the leakage rate of tags.
期刊:
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS,2009年:831-+
通讯作者:
Wu Junqi
作者机构:
[Wu Junqi] Huazhong Normal Univ, Engn & Res Ctr Informat Technol Educ, Wuhan 430079, Peoples R China.;[Liu Yumei; Yang Zongkai; Hu Zhengbing] Huazhong Normal Univ, Dept Informat & Technol, Wuhan, Peoples R China.
通讯机构:
[Wu Junqi] H;Huazhong Normal Univ, Engn & Res Ctr Informat Technol Educ, Wuhan 430079, Peoples R China.
摘要:
E-learning learning management systems have appeared for a few of years, but most of them just put their emphasis on "learning contents", and ignore supporting and tracking the process of learning. LAM is a new type of Learning Activity Management System which makes a teacher be able to organize various activities of instruction under the support of technology. It's easy to revise activities according to teaching, resources and environment, and share all the designs of learning activities. This paper firstly introduces the LAMS, and then discusses how to carry out classroom teaching design, and designs relevant design cases. It finally lists some points which should be paid attention to when designing learning activities sequence with LAMS and conclusions about application of LAMS.
期刊:
Journal of Computers,2009年4(12):1332-1339 ISSN:1796-203X
通讯作者:
Hu, Z.(kievpastor@yahoo.com)
作者机构:
[Hu, Zhengbing] Huazhong Normal University, Department of Information Technology, Wuhan, China;[Du, Kai] National University of Defense Technology, Changsha, China
摘要:
In WSNs, energy efficiency and low latency are considered as two key issues in designing routing protocol. This paper proposes a two layer hierarchical routing protocol called chain routing based on coordinates-oriented clustering strategy (CRBCC), which gives a good compromise between energy consumption and delay. First, CRBCC makes balanced clustering according to y coordinates where each cluster has approximately equal number of nodes. Second, CRBCC makes chain routing by simulated annealing algorithm (SA) inside the cluster and elects chain leader in the order of x coordinates. Third, CRBCC makes chain routing again by SA method among chain leaders. Simulation results show that CRBCC performs better than PEGASIS in terms of energy efficiency and network delay.
摘要:
P2P traffic has become one of the most significant portions of the network traffic. How to improve the accuracy of the traffic identification efficiently is still a difficult problem. A promising approach that has recently received some attention is traffic classification using machine learning techniques. In this paper, we propose a BP neural network algorithm for P2P traffic classification problem. We implement a P2P traffic identification prototype system which can realize offline learning and online classification of P2P traffic effectively. The results show that the method provides a promising way to measure aggregate P2P traffic.
摘要:
In recent years, the network attack become more and more widespread and difficult in against. The traditional technique, such as Firewall is good, but when malicious traffic originates from inside network or enters through a hole in the firewall you may need another line of defense to protect you. This is a article introducing the concepts of IDS, what they do, the functions they serve, the classification of IDS, how you might use an IDS to monitor for and detect suspicious or malicious activity on the network and the different methods of intrusion detection that they may employ.
摘要:
Network security has been a very important issue, since the rising evolution of the Internet. There has been an increasing need for security systems against the external attacks from the hackers. One important type is the Intrusion Detection System (IDS). There are two major categories of the analysis techniques of IDS the anomaly detection and the misuse detection. Here we forcus on misuse detection, the misuse detection collected the attack signatures in a database as the same as virus protection software to detect the relate attacks. we propose an algorithm to use the known signature to find the signature of the related attack quickly.
期刊:
2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15,2007年:2020-2024
通讯作者:
Wu Junqi
作者机构:
[Yang Jiuming; Hu Zhengbing; Wu Junqi] Huazhong Normal Univ, Dept Informat Technol, Wuhan 430079, Hubei, Peoples R China.;[Su Jun] Yangtze Univ, Coll Comp Sci, Jingzhou 434023, Hubei, Peoples R China.
通讯机构:
[Wu Junqi] H;Huazhong Normal Univ, Dept Informat Technol, Wuhan 430079, Hubei, Peoples R China.
会议名称:
第三届IEEE无线通讯、网络技术暨移动计算国际会议
会议时间:
2007-09-21
会议地点:
上海
会议论文集名称:
第三届IEEE无线通讯、网络技术暨移动计算国际会议论文集
关键词:
mobile network;QoS;Adaptive Multimedia;Bandwidth Degradation;4G
摘要:
In this paper, we present a Bandwidth Degradation QoS scheme for Adaptive Multimedia services in next generation Wireless/Mobile networks, and introduce it in mobile networks to improve the performance of channel allocation. The proposed schemes are the generic Call Admission Control (CAC) algorithm and the admission policy to support multiple rates, multiple class traffic of next generation mobile network. Based on diverse QoS parameters be included in connection request, a Two-Stage Bandwidth Degradation QoS CAC algorithm is presented to satisfy the diverse QoS requirement and utilize the system resource efficiently. The simulation results show that the performance of our scheme is preferable to that of existing schemes.