期刊文献+

一种基于脆性熵函数的通信系统脆性研究 被引量:2

Analysis of communication system brittleness based on brittleness entropy function
下载PDF
导出
摘要 针对开放的通信系统进行研究,提出了脆性是通信系统的基本属性,且给出了通信系统的脆性描述.根据信息论的信息率失真和信息传输理论可知信息率失真函数以及热力学中熵增大定理有着巧妙联系,由此可以把信息率失真函数写成熵差的形式.在此基础上,在通信系统中建立了脆性熵函数的概念,它反映了信息在通信前后脆性变化情况,同时对导致通信系统崩溃起着重要作用.最后,以离散信源为例对通信系统脆性进行定量分析,分析结果表明该方法不仅为通信系统脆性分析提供有效的、可行性的分析方法,而且为进一步研究通信系统的脆性评价奠定了理论基础. This paper focuses on communication systems, defining brittleness, a basic property of open communications. From the information distortion ratio and information transmission theory, it is known that there is a definite relationship between the information distortion ratio function and the entropy production theorem of thermodynamics. Thus the information distortion ratio function can be written as a form of entropy change. Based on this, the concept of a brittleness entropy function in a communication system is defined. It not only reflects changes in information brittleness before and after communications, but also explains important aspects in the collapse of a communication system. Finally, quantitative analysis is performed on brittleness using an example of a discrete information source. The results indicate that this function is a feasible and effective tool for brittleness analysis and lays a theoretical basis for future research on evaluating the brittleness of communication systems.
作者 薛萍 金鸿章
出处 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2007年第8期880-884,898,共6页 Journal of Harbin Engineering University
基金 国防科学技术工业委员会基础研究基金资助项目(J1600B001) 哈尔滨市青年科学研究基金资助项目(2005AFXXJD24)
关键词 通信系统 脆性 脆性熵函数 失真度 communication system brittleness brittleness entropy function distortion degree
  • 相关文献

参考文献6

二级参考文献17

  • 1昝廷全.复杂系统的一般数学框架(Ⅰ)[J].应用数学和力学,1993,14(4):367-375. 被引量:13
  • 2黄琳,秦化淑,郑应平,郑大钟.复杂控制系统理论:构想与前景[J].自动化学报,1993,19(2):129-137. 被引量:24
  • 3田玉楚,吕勇哉,符雪桐.离散最小误差熵估计的原理及应用[J].通信学报,1994,15(2):38-45. 被引量:1
  • 4田玉楚,符雪桐,吕勇哉,席裕庚,张钟俊.非线性控制和优化系统中的浑沌运动[J].控制与决策,1995,10(1):1-7. 被引量:15
  • 5桑博得 著 凌复华 译.突变理论入门[M].上海:上海科学技术文献出版社,1983年7月..
  • 6[1]Cohen W W.Fast Effective Rule Induction. In:Machine Learning:the 12th International Conference,Lake Taho,CA,Morgan Kaufmann, 1995
  • 7[2]Heady R,Luger G,Maccabe A,et al,The Architecture of a Network Level Intrusion Detection System.Technical Report,Computer Science Department, University of New Mexico, 1990-08
  • 8[3]Johnson D B,Maltz D A.Dynamic Sources Routing in ad hoc Wireless Networks. Mobile Computing,Kluwer Academic Publishers, 1996:153-181
  • 9[4]Lee W, Stolfo S J,Mok K W.A Data Mining Framework for Building Intrusion Detection Models. In:Proceedings of the 1999 IEEE Sympo-sium on Security and Privacy, 1999-05
  • 10[5]Maltz D A,Broch J,Jetcheva J,et al.The Effects of On-demand Behavior in Routing Protocols for Multi-hop Wireless ad hoc Networks.IEEE Journal on Selected Areas in Communications, 1999-08

共引文献45

同被引文献12

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部