Li Qianmu
Nanjing University of Science and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Li Qianmu.
Computer Communications | 2008
Xu Jia; Li Zhi; Li Qianmu; Liu Feng-yu
To solve the expansibility problem of traditional flat routing protocols in ad hoc networks, an adaptive clustering routing transition protocol (ACRT) was proposed in this paper, by using the idea of adaptive clustering, routing transition and profits by the merits of passive clustering and gradual clustering. ACRT creates clusters adaptively by real-time apperceiving network scale which can solve the conflict between the expansibility of flat routing protocols and clustering overhead of clustering routing protocols. This mechanism takes the compatibility among different routing mechanisms into account to obtain high routing efficiency. ACRT can eliminate hangovers of flat routing protocol to reduce the occupancy of resources and storage cost by strict transition strategy. Simulation results show that ACRT has good expansibility and adaptive control action. ACRT is a correct and efficient routing mechanism. 2007 Elsevier B.V. All rights reserved.
systems, man and cybernetics | 2005
Zhao Xuelong; Li Qianmu; Xu Manwu; Liu Feng-yu
Based on the basic theory of cellular automata (CA), using genetic algorithm to find the rules of CA, one-dimensional extended non-uniform CA is constructed to generate high quality random bit numbers. A stringent test of randomness is applied to the bit numbers. The results show that our extended CA generator outperforms other generators such as shift register generator, congruential generator and lagged Fibonacci generator. This generator can meet the requirement of the security for cryptographic modules and provide a new method to generate pseudo-random numbers in cryptography. An example of image encryption is also provided for illustration.
international conference on risk management & engineering management | 2008
Xiao Long; Qi Yong; Li Qianmu
Starting with the theory and research status on the information security risk assessment, this paper puts forward information security risk evaluation method based on analytic hierarchy process and fuzzy comprehensive evaluation, and solves the difficulty of the qualitative index and quantitative evaluation in the risk assessment process. Finally, it gives examples to prove that this method can be well applied to information security risk assessment.
grid and cooperative computing | 2006
Li Qianmu; Xu Manwu; Zhang Hong
According to the immunology principles of bionics, a grid root-fault detection system is presented. In this paper event detection sequences are viewed as analogous to peptide. With the principle of positive selection in immunology, the system builds up its event database. And the behavior whose frequency is higher will be analyzed and processed first to improve the speed and effectiveness of fault detection. The experiment system implemented by this method shows a good diagnostic ability
computer science and software engineering | 2008
Qi Yong; Xiao Long; Li Qianmu
This paper first carry out the summary to the information security risk assessments present situation and the correlation criterion, then introduced in detail to the risk which possibly exists carry out the quantification based on the CORAS frames information security risk assessment method and using the analytic hierarchy process, finally uses on-line Electronic bank systems example, proved this method to be possible very well suitable in the information security risk assessment.This paper first carry out the summary to the information security risk assessments present situation and the correlation criterion, then introduced in detail to the risk which possibly exists carry out the quantification based on the CORAS frames information security risk assessment method and using the analytic hierarchy process, finally uses on-line Electronic bank systems example, proved this method to be possible very well suitable in the information security risk assessment.
systems, man and cybernetics | 2005
Li Qianmu; Zhao Xuelong; Xu man-wu; Liu Feng-yu
In this paper, a kind of traffic prediction and congestion control policy based on RFNN (rough-fuzzy neural network) is proposed for ATM (asynchronous transfer mode). Congestion control is one of the key problems in high-speed networks, such as ATM. Conventional traffic prediction method for congestion control using BPN (back propagation neural network) has suffered from long convergence time and dissatisfying precision and it is not effective. The fuzzy neural network scheme presented in this paper can solve these limitations satisfactorily for its good capability of processing inaccurate information and learning. Finally, the performance of the scheme based on BPN is compared with the scheme based on RFNN using simulations. The results show that the RFNN scheme is effective.
International journal of engineering business management | 2012
Li Qianmu; Mao Haiyan; Zhang Hong
This paper proposed a theoretical analysis model of the DCP cost and its assumption. Repatrolling the regular network topologies of Grid and Hexagonal, it reasoned the relationship of DCP cost, the DCP parameter (start TTL a, the fixed increment value b, and the patrol threshold L), network size, and the node density out. In order to validate the conclusion, this paper simulated it with a lot of AODV-DCP experiments in the JiST/SWANS simulation platform. It provides a necessary theoretical basis for setting the DCP parameter.
international conference on intelligent computing | 2011
Li Qianmu; Hou Jun; Xu Jian; Zhang Hong; Qi Yong
A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.
international conference on neural information processing | 2006
Li Qianmu; Xu Manwu; Zhang Hong; Liu Feng-yu
A framework model proposed in this paper is a data-link Equipment Redundant Strategy based on reliability theory. The strategy combined with the normal maintenance could greatly improve the performance of the network system. The static-checking and policy of authentication mechanism ensure the running network without any error. The redundant equipments are independent but are capable of communication with each other when they work their actions. The model is independent of specific application environment, thus providing a general-purpose framework for fault diagnosis. An example is given to express the calculating method.A framework model proposed in this paper is a data-link Equipment Redundant Strategy based on reliability theory. The strategy combined with the normal maintenance could greatly improve the performance of the network system. The static-checking and policy of authentication mechanism ensure the running network without any error. The redundant equipments are independent but are capable of communication with each other when they work their actions. The model is independent of specific application environment, thus providing a general-purpose framework for fault diagnosis. An example is given to express the calculating method.
Archive | 2013
Li Qianmu; Qi Yong; Mao Haiyan