Jiuhao Li

Learn More
Wireless sensors networks (WSNs) are susceptible because of its characters. The traditional security mechanisms cannot be use to protect the WSNs. Trust and reputation are recently suggested as an effective secure mechanism for Ad hoc networks. Moreover biologic authentication based on gene has been suggested as a most effective identity authentication(More)
Wireless sensors networks (WSNs) are susceptible because of its characters. The traditional security mechanisms can not be use to protect the WSNs. In the paper, a trusted transport mode based on cluster-merkle-tree for WSNs (TTMCMT) is proposed, which can provide a method of trusted transport with WSNs of great restriction. The object of scheme is to(More)
This paper introduces the application of particle swarm optimization(PSO) algorithm. Based on the analysis of the characteristics of the sustainable development indexes, this paper adopts the classified individual sustainable development index formula and the composite index formula, optimizes the model parameters by PSO algorithm, and sets up a composite(More)
  • 1