Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Li Qianmu is active.

Publication


Featured researches published by Li Qianmu.


Computer Communications | 2008

An adaptive clustering routing transition protocol in ad hoc networks

Xu Jia; Li Zhi; Li Qianmu; Liu Feng-yu

To solve the expansibility problem of traditional flat routing protocols in ad hoc networks, an adaptive clustering routing transition protocol (ACRT) was proposed in this paper, by using the idea of adaptive clustering, routing transition and profits by the merits of passive clustering and gradual clustering. ACRT creates clusters adaptively by real-time apperceiving network scale which can solve the conflict between the expansibility of flat routing protocols and clustering overhead of clustering routing protocols. This mechanism takes the compatibility among different routing mechanisms into account to obtain high routing efficiency. ACRT can eliminate hangovers of flat routing protocol to reduce the occupancy of resources and storage cost by strict transition strategy. Simulation results show that ACRT has good expansibility and adaptive control action. ACRT is a correct and efficient routing mechanism. 2007 Elsevier B.V. All rights reserved.


systems, man and cybernetics | 2005

A symmetric cryptography based on extended cellular automata

Zhao Xuelong; Li Qianmu; Xu Manwu; Liu Feng-yu

Based on the basic theory of cellular automata (CA), using genetic algorithm to find the rules of CA, one-dimensional extended non-uniform CA is constructed to generate high quality random bit numbers. A stringent test of randomness is applied to the bit numbers. The results show that our extended CA generator outperforms other generators such as shift register generator, congruential generator and lagged Fibonacci generator. This generator can meet the requirement of the security for cryptographic modules and provide a new method to generate pseudo-random numbers in cryptography. An example of image encryption is also provided for illustration.


international conference on risk management & engineering management | 2008

Information Security Risk Assessment Based on Analytic Hierarchy Process and Fuzzy Comprehensive

Xiao Long; Qi Yong; Li Qianmu

Starting with the theory and research status on the information security risk assessment, this paper puts forward information security risk evaluation method based on analytic hierarchy process and fuzzy comprehensive evaluation, and solves the difficulty of the qualitative index and quantitative evaluation in the risk assessment process. Finally, it gives examples to prove that this method can be well applied to information security risk assessment.


grid and cooperative computing | 2006

A Root-fault Detection System of Grid Based on Immunology

Li Qianmu; Xu Manwu; Zhang Hong

According to the immunology principles of bionics, a grid root-fault detection system is presented. In this paper event detection sequences are viewed as analogous to peptide. With the principle of positive selection in immunology, the system builds up its event database. And the behavior whose frequency is higher will be analyzed and processed first to improve the speed and effectiveness of fault detection. The experiment system implemented by this method shows a good diagnostic ability


computer science and software engineering | 2008

Information Security Risk Assessment Method Based on CORAS Frame

Qi Yong; Xiao Long; Li Qianmu

This paper first carry out the summary to the information security risk assessments present situation and the correlation criterion, then introduced in detail to the risk which possibly exists carry out the quantification based on the CORAS frames information security risk assessment method and using the analytic hierarchy process, finally uses on-line Electronic bank systems example, proved this method to be possible very well suitable in the information security risk assessment.This paper first carry out the summary to the information security risk assessments present situation and the correlation criterion, then introduced in detail to the risk which possibly exists carry out the quantification based on the CORAS frames information security risk assessment method and using the analytic hierarchy process, finally uses on-line Electronic bank systems example, proved this method to be possible very well suitable in the information security risk assessment.


systems, man and cybernetics | 2005

Network congestion prediction based on RFNN

Li Qianmu; Zhao Xuelong; Xu man-wu; Liu Feng-yu

In this paper, a kind of traffic prediction and congestion control policy based on RFNN (rough-fuzzy neural network) is proposed for ATM (asynchronous transfer mode). Congestion control is one of the key problems in high-speed networks, such as ATM. Conventional traffic prediction method for congestion control using BPN (back propagation neural network) has suffered from long convergence time and dissatisfying precision and it is not effective. The fuzzy neural network scheme presented in this paper can solve these limitations satisfactorily for its good capability of processing inaccurate information and learning. Finally, the performance of the scheme based on BPN is compared with the scheme based on RFNN using simulations. The results show that the RFNN scheme is effective.


International journal of engineering business management | 2012

The Design and Cost Analysis of DCP Algorithm based on directional Circle

Li Qianmu; Mao Haiyan; Zhang Hong

This paper proposed a theoretical analysis model of the DCP cost and its assumption. Repatrolling the regular network topologies of Grid and Hexagonal, it reasoned the relationship of DCP cost, the DCP parameter (start TTL a, the fixed increment value b, and the patrol threshold L), network size, and the node density out. In order to validate the conclusion, this paper simulated it with a lot of AODV-DCP experiments in the JiST/SWANS simulation platform. It provides a necessary theoretical basis for setting the DCP parameter.


international conference on intelligent computing | 2011

A Service Access Security Control Model in Cyberspace

Li Qianmu; Hou Jun; Xu Jian; Zhang Hong; Qi Yong

A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.


international conference on neural information processing | 2006

The design of data-link equipment redundant strategy

Li Qianmu; Xu Manwu; Zhang Hong; Liu Feng-yu

A framework model proposed in this paper is a data-link Equipment Redundant Strategy based on reliability theory. The strategy combined with the normal maintenance could greatly improve the performance of the network system. The static-checking and policy of authentication mechanism ensure the running network without any error. The redundant equipments are independent but are capable of communication with each other when they work their actions. The model is independent of specific application environment, thus providing a general-purpose framework for fault diagnosis. An example is given to express the calculating method.A framework model proposed in this paper is a data-link Equipment Redundant Strategy based on reliability theory. The strategy combined with the normal maintenance could greatly improve the performance of the network system. The static-checking and policy of authentication mechanism ensure the running network without any error. The redundant equipments are independent but are capable of communication with each other when they work their actions. The model is independent of specific application environment, thus providing a general-purpose framework for fault diagnosis. An example is given to express the calculating method.


Archive | 2013

Intelligent access system for public security

Li Qianmu; Qi Yong; Mao Haiyan

Collaboration


Dive into the Li Qianmu's collaboration.

Top Co-Authors

Avatar

Hou Jun

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Qi Yong

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Zhang Hong

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Mao Haiyan

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Xu Jian

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Xu Jia

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Li Tao

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Liu Feng-yu

Nanjing University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Wang Jun

Harbin Engineering University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge