Learn More
Wireless sensors networks (WSNs) are susceptible because of its characters. The traditional security mechanisms cannot be use to protect the WSNs. Trust and reputation are recently suggested as an effective secure mechanism for Ad hoc networks. Moreover biologic authentication based on gene has been suggested as a most effective identity authentication(More)
Wireless sensors networks (WSNs) are susceptible because of its characters. The traditional security mechanisms can not be use to protect the WSNs. In the paper, a trusted transport mode based on cluster-merkle-tree for WSNs (TTMCMT) is proposed, which can provide a method of trusted transport with WSNs of great restriction. The object of scheme is to(More)
With the development of computer network and information technology rapidly, they are serving every walk of life in China. Chinese government is using widely the information and network technology for improving its work. So, Chinese EGovernment information system is developing feetly. However, in fact, E-Government information system has some its characters(More)
This paper introduces the application of particle swarm optimization(PSO) algorithm. Based on the analysis of the characteristics of the sustainable development indexes, this paper adopts the classified individual sustainable development index formula and the composite index formula, optimizes the model parameters by PSO algorithm, and sets up a composite(More)
The response of chlorophyll fluorescence parameters characteristics and spectral reflectance in New sugarcane 22(T22) were studied under 4 different water treaments in pots. The results showed that, except qN increased, other chlorophyll fluorescence parameters as Fv/Fm, PS ¢ò, rETR and qP decreased with increasing of water stress. Photo system(More)
  • 1