Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Shaoguan University》 2012-12
Add to Favorite Get Latest Update

A strategy based on the game of the soft bus communications network of design and implementation

ZHENG Qin(Department of Software Engineer,Fujian Information and Technology College,Fuzhou 350003,Fujian,China)  
The existing communication networks often use component software bus for data exchanging and transfer data in peer that cannot dynamically distinguish the important information of the communication devices in a moment.In order to efficiently load the data traffic,this paper use the Game Strategies to optimize the software bus,to simulate the message queue as a competitive individual game decision-making,according to the historical experience of the load and transfer data.Relying on the communication network to simulate the real environment,,then the results show that the introduction of the strategy reduce a small message throughput,but greatly improves the load and the early time the probability of important information processing,then reducing the important information cumulative degrees,and therefore has a strong practical use.
【CateGory Index】: TN915.02
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 9 Hits
1 Lin Xiaozhi et al;A Design of Message Bus in Large-scale System Software[J];Computer Development & Applications;2010-12
2 Yuan Zhanting Zhang Qiuyu Zhai Zhiwan(Gansu University of Technology Software Engineering Center,Lanzhou730050);The Software Project Means Based on Software Bus Technique[J];Computer Engineering and Applications;2003-15
3 MA Shenglan,YE Dongyi College of Mathematics and Computer Science,Fuzhou University,Fuzhou 350108,China;Swarm intelligence based attribute reduction algorithm using game strategies[J];Computer Engineering and Applications;2012-01
4 WANG Yang1) LIN Chuang1) LI Quan-Lin2) WANG Jing-Qi3) JIANG Xin1)1)(Department of Computer Science and Technology,Tsinghua University,Beijing 100084)2)(Department of Industrial Engineering,Tsinghua University,Beijing 100084)3)(Kellogg School of Management,Northeast University,Boston,Masschusetts,USA);Non-Cooperative Game Based Research on Routing Schemes for Wireless Networks[J];Chinese Journal of Computers;2009-01
5 ZHU Jian-Ming1) Srinivasan Raghunathan2)1)(School of Information,Central University of Finance and Economics,Beijing 100081) 2)(School of Management,University of Texas at Dallas,Richardson,Texas 75083,USA);Evaluation Model of Information Security Technologies Based on Game Theoretic[J];Chinese Journal of Computers;2009-04
6 WANG Changbao (The 54th Research Institute of CETC, Shijiazhuang Hebei 050081, China);Research on Software Development/integration Method Based Software Bus Architecture[J];Radio Engineering of China;2006-01
7 YAN Jian-ping1,2,ZHANG Yan1,2,CHEN Lu-lu2(1.Xidian University,Xi'an Shanxi 710071,China;2.The 54th Research Institute of CETC,Shijiazhuang Hebei 050081,China);Development and Application of Software Bus Technology[J];Radio Engineering of China;2008-11
8 WANG Jun ,XIONG Gui-xi(College of Computer Application,Beijing University of Aeronautics & Astronautics,Beijing 100080 China);Develoment of Data Transmission & Processing System based on Software Bus Architecture and Software Component[J];Modern Computer;2007-01
9 DAI Jun,ZHU Xiao-Min(State Key Lab of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China;Eastcom-BUPT Information Technology Co.Ltd.,Beijing 100191,China);Design and Implementation of an Asynchronous Message Bus Based on ActiveMQ[J];Computer Systems & Applications;2010-08
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 ZHANG Yan1,2,ZHOU Wen-shuo2,ZHAO Hua-min2(1.Xidian University,Xi'an 710071,China;2.The 54th Research Institute of CETC,Shijiazhuang 050081,China);Study on Electronic Range Measurement and Control Architecture Based on Software Bus[J];Journal of Communication University of China(Science and Technology);2011-02
2 Zhao Liurong Mei Shu'e Zhong Weijun (School of Economics and Management, Southeast University, Nanjing 211189, China);Optimal configuration of firewall, IDS and vulnerability scan by game theory[J];东南大学学报(英文版);2011-02
3 Li Yi-nan Qian Zhi-hong Liu Ying Zhang Xun (School of Jilin University of Communication Engineering,Changchun 130025,China);An Intrusion Detection Model of Mobile Ad hoc Networks Based on Game Theory[J];Journal of Electronics & Information Technology;2010-09
4 WANG Xue-tao,BI Yu-shen,TIAN Qian-jin (School of Computer and Communication Engineering,Liaoning Shihua University,Fushun Liaoning 113001,P.R.China);Grouping Mechanism Based on Social Network in P2P Setting[J];Journal of Liaoning Shihua University;2010-02
5 NIU Tong,TIAN Zhihong(School of Computer Science and Technology,Harbin Institute of Technology,Harbin 150001,China);The Network Active Defense Research based on the Game Theory and the Analysis of Network Vulnerabilities[J];Intelligent Computer and Applications;2012-03
6 WANG Tong-wen, XIE Min, SUN Yue-qin (Anhui Electric Power Dispatch and Communication Center, Hefei 230022, China);Research on Relay Protection and Fault Information System Based on Software Bus Technology[J];Electric Power Information Technology;2012-07
7 Zhou Hua Zhou Hai-jun Ma Jian-feng(Xi’an Communications Institute,Xi’an 710106,China);Security Analysis Model of Intrusion Tolerant Systems Based on Game Theory[J];Journal of Electronics & Information Technology;2013-08
8 GE Yiyong;PENG Hui;GUO Hailong;LEI Baolong;WAN Shupeng;NARI Technology Development Co.Ltd.;;Solutions for Cross Failure of Message Bus with Dual Network in Dispatching Automation System[J];Automation of Electric Power Systems;2013-21
9 ZHANG Xiao-guo,WANG Qing,BEN Cheng-long (School of Instrument Science and Engineering,Southeast University,Nanjing 210096,China);Design of a Lightweight Packet Classifier and Its Application in LBS[J];Measurement & Control Technology;2011-03
10 Liu Bo(Northeast Research Institute of Electronic Technology,Jinzhou 121000);Discussion on Composition and Development of the System of Informatization Command and Control[J];Ship Electronic Engineering;2011-11
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 L Zhen-su,HOU Zhi-rong (School of Information Science and Engineering,Lanzhou University,Lanzhou,Gansu 730000,China);Particle Swarm Optimization with Adaptive Mutation[J];Acta Electronica Sinica;2004-03
2 WANG Guang-ze(College of Computer Science & Technology,Harbin University of Science and Technology,Harbin 150080,China);Research of intelligent MOM based on Pub/Sub model[J];Information Technology;2009-05
3 Mu Chengpo, Huang Houkuan, and Tian Shengfeng (School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044);A Survey of Intrusion-Detection Alert Aggregation and Correlation Techniques[J];Journal of Computer Research and Development;2006-01
4 Wang Guangping(Department of Computer Engineering, University of Automotive polytechnic of Wuhan, Wuhan 430070);Research of the Oriented Object Software Bus[J];COMPUTER ENGINEERING AND APPLICATIONS;2000-03
5 YUE Bing FU Hong Juan LIU Bo Ying XIE Bing BIAN Li Ping(School of Management, Tianjin University, Tianjin 300072);The Method of Perfecting the Audit Information in Intrusion Detection System[J];Chinese Journal of Computers;2002-07
6 WANG Yang1) LIN Chuang1) LI Quan-Lin2) WANG Jing-Qi3) JIANG Xin1)1)(Department of Computer Science and Technology,Tsinghua University,Beijing 100084)2)(Department of Industrial Engineering,Tsinghua University,Beijing 100084)3)(Kellogg School of Management,Northeast University,Boston,Masschusetts,USA);Non-Cooperative Game Based Research on Routing Schemes for Wireless Networks[J];Chinese Journal of Computers;2009-01
7 ZHU Jian-Ming1) Srinivasan Raghunathan2)1)(School of Information,Central University of Finance and Economics,Beijing 100081) 2)(School of Management,University of Texas at Dallas,Richardson,Texas 75083,USA);Evaluation Model of Information Security Technologies Based on Game Theoretic[J];Chinese Journal of Computers;2009-04
8 ZHAO Ge-ke, CHANG Bing-guo(Software School, Hunan University, Changsha Hunan 410082, China);Design of service-oriented asynchronous messaging middleware[J];Journal of Computer Applications;2009-08
9 ZHANG Shi\|kun,\ ZHANG Wen\|juan,\ CHANG Xin,\ WANG Li\|fu, YANG Fu\|qing(Department of Computer Science and Technology, Beijing University, Beijing 100871, China);Building and Assembling Reusable Components Based on Software Architecture[J];Journal of Software;2001-09
10 LIN Zheng-kui, YANG De-li (Institute of Systems Engineering, Dalian University of Technology, Dalian 116023, China);Software component reused technology overview[J];Computer Engineering and Design;2004-06
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved