期刊文献+

计算机通信及网络远程控制技术的应用与可靠性提升 被引量:14

Application and reliability improvement of computer communication and network remote control technology
原文传递
导出
摘要 为提高计算机通信及网络远程控制的可靠性,针对计算机网络远程通信存在信道失稳的问题,提出一种基于自适应波特间隔均衡控制的计算机通信及网络远程控制技术,构建计算机网络通信的最佳信道模型,采用双边加权滤波方法进行计算网络通信信道的电磁干扰抑制,采用最小均方误差准确进行波特间隔均衡控制,在信道调制过程中通过抽头系数自适应调节方法进行信道误差补偿,提高网络远程通信控制的稳定性和信道传输的均衡性。仿真结果表明,采用该方法进行计算机通信及网络远程控制的稳定性较好,输出误码较低,提高计算机网络远程控制性能。 In order to improve the reliability of computer communication and network remote control, there is a problem of channel instability in computer network remote communication. A computer communication and network remote control technology based on adaptive Porter interval equalization control is proposed to construct the optimal channel model of computer network communication. The two-sided weighted filtering method is used to suppress the electromagnetic interference of the network communication channel, and the minimum mean square error is used to accurately control the baud interval equalization. In the process of channel modulation, the channel error is compensated by taps coefficient adaptive adjustment method, which improves the stability of the network remote communication control and the equalization of the channel transmission. The simulation results show that, Using this method, the stability of computer communication and network remote control is better, the output error code is lower, and the performance of computer network remote control is improved.
作者 刘元刚 薛海斌 LIU Yuangang;XUE Haibin(Yangling Vocational and Technical College,Yang Ling Shanxi,712100)
出处 《自动化与仪器仪表》 2018年第11期203-205,209,共4页 Automation & Instrumentation
基金 基于web的猕猴桃病害诊断与防治支持系统(A2017044)
关键词 计算机通信 网络远程控制 信道 可靠性 computer communication network remote control channel reliability
  • 相关文献

参考文献13

二级参考文献150

  • 1邢建斌,许国良,张旭苹,王光辉,丁涛.大气湍流对激光通信系统的影响[J].光子学报,2005,34(12):1850-1852. 被引量:63
  • 2张建新,陈永平,梁平治.硅光电二极管钝化膜的抗辐射性能研究[J].激光技术,2007,31(1):83-85. 被引量:3
  • 3李鹏,汪芙平,王赞基.时变多径信道中通信信号调制识别算法[J].清华大学学报(自然科学版),2007,47(7):1097-1100. 被引量:2
  • 4Mirkovic J, Reiher P. A Taxonomy of DDoS attack and DDoS defense mechanisms [J] ACM SIG- COMM Computer Communications Review, 2004, 34(2) : 39-53.
  • 5Lawniczak A T, Wu H, Di Stefan B N. Detection of anomalous packet traffic via entropy[C] // Proceed ings of the 22nd IEEE Canadian Conference on Elec trical and Computer Engineering, Canada, 2009: 137-141.
  • 6Lee W, Xiang D. Information theoretic measures foranomaly detection [C] /// Proceedings of the IEEE Symposium on Security and Privacy, Washington, 2001:130-147.
  • 7Feinstein I., Sehnackenberg D, Balupari R, et al. Statistical approaches to DDoS attack detection and response[C]// Proceedings of the DARPA Informa- tion Survivability Conference and Exposition, Washington, 2003: 303-314.
  • 8Lall A, Sekar V, Xu J,et al. Data streaming algo rithms for estimating entropy of network traffic[J] ACM SIGMETRICS Performance Evaluation Re view, 2006, 34(1): 145-156.
  • 9I.akhina A, Crovella M, Diot C. Mining anomalies using traffic feature distributions[J]. Computer Communication Review, 2005, 35(4): 217-228.
  • 10Li K, Zhou W L, Yu S, et al. Effective DDoS at tacks detection using generalized entropy metrie[C] //Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Process ing, Taiwan, 2009:266-280.

共引文献225

同被引文献36

引证文献14

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部