期刊文献+
共找到31,971篇文章
< 1 2 250 >
每页显示 20 50 100
Research on Multiple Access Algorithms for Wireless Network
1
作者 Kaifeng Yao 《Journal of Electronic Research and Application》 2024年第4期55-63,共9页
Nodes in the communication network mainly depend on the Media Access Control(MAC)layer protocol design.To ensure the MAC protocol achieves high throughput,low latency,and high service quality,this paper designed a“ce... Nodes in the communication network mainly depend on the Media Access Control(MAC)layer protocol design.To ensure the MAC protocol achieves high throughput,low latency,and high service quality,this paper designed a“centralized-distribution”system MAC protocol combined with a slot allocation algorithm.This allows it to quickly adapt to the topology changes in the network and the overall network frame structure.For the centralized time slot allocation,since the system’s frame structure changes across the entire network,the root node must gather information from other nodes.This ensures that the root node can collect the latest topology information when the network topology changes and subsequently adjust the frame structure of the whole network for the distributed time slot allocation.The simulation results show that the adaptive time-division multiple access mechanism can quickly adapt to changes in topology and the network’s frame structure.It enables adaptive changes in node transmission times,ensures the rapid transmission and circulation of large-capacity data between nodes,and improves transmission efficiency. 展开更多
关键词 TDMA wireless network MAC protocol Time gap allocation
下载PDF
A maximum-independent-set-based channel allocation algorithm for multi-channel wireless networks
2
作者 余旭涛 施小翔 曾绍祥 《Journal of Southeast University(English Edition)》 EI CAS 2015年第1期12-18,共7页
A channel allocation algorithm based on the maximum independent set is proposed to decrease network conflict and improve network performance. First, a channel allocation model is formulated and a series of the maximum... A channel allocation algorithm based on the maximum independent set is proposed to decrease network conflict and improve network performance. First, a channel allocation model is formulated and a series of the maximum independent sets (MISs) are obtained from a contention graph by the proposed approximation algorithm with low complexity. Then, a weighted contention graph is obtained using the number of contention vertices between two MISs as a weighted value. Links are allocated to channels by the weighted contention graph to minimize conflicts between independent sets. Finally, after channel allocation, each node allocates network interface cards (NICs) to links that are allocated channels according to the queue lengths of NICs. Simulations are conducted to evaluate the proposed algorithm. The results show that the proposed algorithm significantly improves the network throughput and decreases the end to end delay. 展开更多
关键词 wireless networks MULTI-CHANNEL channelaUocation maximum independent set
下载PDF
MULTIPLE ATTRIBUTE NETWORK SELECTION ALGORITHM BASED ON AHP AND SYNERGETIC THEORY FOR HETEROGENEOUS WIRELESS NETWORKS 被引量:8
3
作者 Zhang Lina Zhu Qi 《Journal of Electronics(China)》 2014年第1期29-40,共12页
It is a hot issue in communication research field to select the best network for Heterogeneous Wireless Networks(HWNs),and it is also a difficult problem to reduce the handoff number of vertical handoff.In order to so... It is a hot issue in communication research field to select the best network for Heterogeneous Wireless Networks(HWNs),and it is also a difficult problem to reduce the handoff number of vertical handoff.In order to solve this problem,the paper proposes a multiple attribute network selection algorithm based on Analytic Hierarchy Process(AHP)and synergetic theory.The algorithm applies synergetics to network selection,considering the candidate network as a compound system composed of multiple attribute subsystems,and combines the subsystem order degree with AHP weight to obtain entropy of the compound system,which is opposite the synergy degree of a network system.The greater the synergy degree,the better the network performance.The algorithm takes not only the coordination of objective attributes but also Quality of Service(QoS)requirements into consideration,ensuring that users select the network with overall good performance.The simulation results show that the proposed algorithm can effectively reduce the handoff number and provide uses with satisfactory QoS according to different services. 展开更多
关键词 Heterogeneous wireless networks(HWNs) network selection Synergetic theory Order degree Analytic Hierarchy Process(AHP)
下载PDF
A RISK ASSESSMENT METHOD OF THE WIRELESS NETWORK SECURITY 被引量:13
4
作者 Zhao Dongmei Wang Changguang Ma Jianfeng 《Journal of Electronics(China)》 2007年第3期428-432,共5页
The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method ... The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation. 展开更多
关键词 wireless network Risk assessment Analytic Hierarchy Process (AHP) method Fuzzy logical method
下载PDF
Feedback Stabilization over Wireless Network Using Adaptive Coded Modulation 被引量:5
5
作者 Li Yang Xin-Ping Guan +1 位作者 Cheng-Nian Long Xiao-Yuan Luo 《International Journal of Automation and computing》 EI 2008年第4期381-388,共8页
In this paper,we apply adaptive coded modulation (ACM) schemes to a wireless networked control system (WNCS) to improve the energy efficiency and increase the data rate over a fading channel.To capture the characteris... In this paper,we apply adaptive coded modulation (ACM) schemes to a wireless networked control system (WNCS) to improve the energy efficiency and increase the data rate over a fading channel.To capture the characteristics of varying rate, interference,and routing in wireless transmission channels,the concepts of equivalent delay (ED) and networked condition index (NCI) are introduced.Also,the analytic lower and upper bounds of EDs are obtained.Furthermore,we model the WNCS as a multicontroller switched system (MSS) under consideration of EDs and loss index in the wireless transmission.Sufficient stability condition of the closed-loop WNCS and corresponding dynamic state feedback controllers are derived in terms of linear matrix inequality (LMI). Numerical results show the validity and advantage of our proposed control strategies. 展开更多
关键词 wireless networked control system (WNCS) adaptive coded modulation (ACM) equivalent delay (ED) networked condition index (NCI) multicontroller switched system (MSS) stability.
下载PDF
An Efficient ECDSA-Based Signature Scheme for Wireless Networks 被引量:4
6
作者 XU Zhong DAI Guanzhong YANG Deming 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1707-1710,共4页
Wired equivalent security is difficult to provide in wireless networks due to high dynamics, wireless link vulnerability, and decentralization. The Elliptic Curve Digital Signature Algorithm(ECDSA) has been applied ... Wired equivalent security is difficult to provide in wireless networks due to high dynamics, wireless link vulnerability, and decentralization. The Elliptic Curve Digital Signature Algorithm(ECDSA) has been applied to wireless networks because of its low computational cost and short key size, which reduces the overheads in a wireless environment. This study improves the ECDSA scheme by reducing its time complexity. The significant advantage of the algorithm is that our new scheme needs not to calculate modular inverse operation in the phases of signature generation and signature verification. Such an improvement makes the proposed scheme more efficient and secure. 展开更多
关键词 SIGNATURE ECDSA wireless networks
下载PDF
Network Coding-based Reliable Broadcast Transmission in Wireless Networks 被引量:4
7
作者 Wang Jing Chi Kaikai Wang Xinmei 《China Communications》 SCIE CSCD 2010年第2期71-77,共7页
Recently, network coding has been applied to the loss recovery of reliable broadcast transmission in wireless networks. Since it was proved that fi nding the optimal set of lost packets for XOR-ing is a complex NP-com... Recently, network coding has been applied to the loss recovery of reliable broadcast transmission in wireless networks. Since it was proved that fi nding the optimal set of lost packets for XOR-ing is a complex NP-complete problem, the available time-based retransmission scheme and its enhanced retransmission scheme have exponential computational complexity and thus are not scalable to large networks. In this paper, we present an efficient heuristic scheme based on hypergraph coloring and also its enhanced heuristic scheme to improve the transmission efficiency. Basically, our proposed schemes fi rst create a hypergraph according to the packet-loss matrix. Then our schemes solve the problem of generating XORed packets by coloring the edges of hypergraph. Extensive simulation results demonstrate that, the heuristic scheme based on hypergraph coloring and its enhanced scheme can achieve almost the same transmission efficiency as the available ones, but have much lower computational complexity, which is very important for the wireless devices without high computation capacity. 展开更多
关键词 network coding reliable broadcast wireless networks transmission bandwidth computational complexity
下载PDF
Traffic Characteristics Based Dynamic Radio Resource Management in Heterogeneous Wireless Networks 被引量:4
8
作者 WEN Juan SHENG Min ZHANG Yan WANG Xijun LI Yuzhou 《China Communications》 SCIE CSCD 2014年第1期1-11,共11页
The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy R... The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy Resource Management(SDHRM)algorithm exploiting the resources dynamically and intelligently is proposed with the consideration of tidal traffic.In network-level resource allocation,the proposed algorithm first adopts wavelet neural network to forecast the traffic of each sub-area and then allocates the resources to those sub-areas to maximise the network utility.In connection-level network selection,based on the above resource allocation and the pre-defined QoS requirement,three typical network selection policies are provided to assign traffic flow to the most appropriate network.Furthermore,based on multidimensional Markov model,we analyse the performance of SDHRM in HWNs with heavy tailed traffic.Numerical results show that our theoretical values coincide with the simulation results and the SDHRM can improve the resource utilization. 展开更多
关键词 heterogeneous wireless networks radio resource management multidimensional Markov analysis tidal traffic performance analysis
下载PDF
Modeling and Control for Wireless Networked Control System 被引量:3
9
作者 Chang-Chun Hua Ying Zheng Xin-Ping Guan 《International Journal of Automation and computing》 EI 2011年第3期357-363,共7页
In this paper, the stabilization problem is considered for the class of wireless networked control systems (WNCS). An indicator is introduced in the WNCS model. The packet drop sequences in the indicator are represe... In this paper, the stabilization problem is considered for the class of wireless networked control systems (WNCS). An indicator is introduced in the WNCS model. The packet drop sequences in the indicator are represented as states of a Markov chain. A new discrete Markov switching system model integrating 802.11 protocol and new scheduling approach for wireless networks with control systems are constructed. The variable controller can be obtained easily by solving the linear matrix inequality (LMI) with the use of the Matlab toolbox. Both the known and unknown dropout probabilities are considered. Finally, a simulation is given to show the feasibility of the proposed method. 展开更多
关键词 wireless networked control systems (WNCS) packet dropout sequences CONTROLLER network scheduling stability.
下载PDF
Location Verification Systems in Emerging Wireless Networks 被引量:5
10
作者 Shihao Yan Robert Malaney 《ZTE Communications》 2013年第3期3-10,共8页
As location-based techniques and applications have become ubiquitous in emerging wireless networks, the verification of location information has become more important. In recent years, there has been an explosion of a... As location-based techniques and applications have become ubiquitous in emerging wireless networks, the verification of location information has become more important. In recent years, there has been an explosion of activity related to lo- cation-verification techniques in wireless networks. In particular, there has been a specific focus on intelligent transport systems because of the mission-critical nature of vehicle location verification. In this paper, we review recent research on wireless location verification related to vehicular networks. We focus on location verification systems that rely on for- mal mathematical classification frameworks and show how many systems are either partially or fully encompassed by such frameworks. 展开更多
关键词 location verification wireless networks likelihood ratio test decision rule
下载PDF
Complex field network-coded cooperation based on multi-user detection in wireless networks 被引量:2
11
作者 Jing Wang Xiangyang Liu +1 位作者 Kaikai Chi Xiangmo Zhao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第2期215-221,共7页
Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC... Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values. 展开更多
关键词 network coding complex field wireless network cooperative communication multi-user detection
下载PDF
Collaborative Multiple Access And Energy-Efficient Resource Allocation in Distributed Maritime Wireless Networks 被引量:3
12
作者 Xueyan Cao Hongming Zhang Mugen Peng 《China Communications》 SCIE CSCD 2022年第4期137-153,共17页
With the rapid increasing of maritime activities, maritime wireless networks(MWNs) with high reliability, high energy efficiency, and low delay are required. However, the centralized networking with fixed resource sch... With the rapid increasing of maritime activities, maritime wireless networks(MWNs) with high reliability, high energy efficiency, and low delay are required. However, the centralized networking with fixed resource scheduling is not suitable for MWNs due to the special environment. In this paper,we introduce the collaborative relay communication in distributed MWNs to improve the link reliability, and propose an orthogonal time-frequency resource block reservation based multiple access(RRMA) scheme for both one-hop direct link and two-hop collaborative relay link to reduce the interference. To further improve the network performance, we formulate an energy efficiency(EE) maximization resource allocation problem and solve it by an iterative algorithm based on the Dinkelbach method. Finally, numerical results are provided to investigate the proposed RRMA scheme and resource allocation algorithm, showing that the low outage probability and transmission delay can be attained by the proposed RRMA scheme. Moreover,the proposed resource allocation algorithm is capable of achieving high EE in distributed MWNs. 展开更多
关键词 maritime wireless networks distributed multiple access resource allocation energy efficiency maximization
下载PDF
Time Delay Characteristic of Industrial Wireless Networks Based on IEEE 802.15.4a 被引量:2
13
作者 Tong-Tao Li Ting-Gang Jia +1 位作者 Min-Rui Fei Huo-Sheng Hu 《International Journal of Automation and computing》 EI 2011年第2期170-176,共7页
The IEEE 802.15.4a standard provides a framework for low-data-rate communication systems,typically sensor networks.In this paper,we established a realistic environment for the time delay characteristic of industrial n... The IEEE 802.15.4a standard provides a framework for low-data-rate communication systems,typically sensor networks.In this paper,we established a realistic environment for the time delay characteristic of industrial network based on IEEE 802.15.4a.Several sets of practical experiments are conducted to study its various features,including the effects of 1) numeral wireless nodes,2) numeral data packets,3) data transmissions with different upper-layer protocols,4) physical distance between nodes,and 5) adding and reducing the number of the wireless nodes.The results show that IEEE 802.15.4a is suitable for some industrial applications that have more relaxed throughput requirements and time-delay.Some issues that could degrade the network performance are also discussed. 展开更多
关键词 Time delay characteristic IEEE 802.15.4a industrial wireless network performance test sensor networks.
下载PDF
An overview of intelligent selection and prediction method in heterogeneous wireless networks 被引量:2
14
作者 Yass K.Salih Ong Hang See +2 位作者 Rabha W.Ibrahim Salman Yussof Azlan Iqbal 《Journal of Central South University》 SCIE EI CAS 2014年第8期3138-3154,共17页
Heterogeneous wireless access technologies will coexist in next generation wireless networks.These technologies form integrated networks,and these networks support multiple services with high quality level.Various acc... Heterogeneous wireless access technologies will coexist in next generation wireless networks.These technologies form integrated networks,and these networks support multiple services with high quality level.Various access technologies allow users to select the best available access network to meet the requirements of each type of communication service.Being always best connected anytime and anywhere is a major concern in a heterogeneous wireless networks environment.Always best connected enables network selection mechanisms to keep mobile users always connected to the best network.We present an overview of the network selection and prediction problems and challenges.In addition,we discuss a comprehensive classification of related theoretic approaches,and also study the integration between these methods,finding the best solution of network selection and prediction problems.The optimal solution can fulfill the requirements of the next generation wireless networks. 展开更多
关键词 heterogeneous wireless networks network selection network prediction always best connected
下载PDF
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers 被引量:3
15
作者 Bassma S.Alsulami Chandra Bajracharya Danda B.Rawat 《Digital Communications and Networks》 SCIE CSCD 2021年第3期327-334,共8页
Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertain... Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertainty causing issues to licensed users,business models for licensed service providers.Wireless virtualization is regarded as a technology that leverages service level agreements to sublease unused or underutilized RF spectrum that addresses aforementioned issues and helps to significantly enhance the utilization of the RF spectrum,offer improved coverage and capacity of networks,enhance network security and reduce energy consumption.With wireless virtualization,wireless networks'physical substrate is shared and reconfigured dynamically between virtual wireless networks through Mobile Virtual Network Operations(MVNOs).Wireless virtualization with dynamic configurable features of Wireless Infrastructure Providers(WIPs),virtualized wireless networks are vulnerable to a multitude of attacks,including jamming attacks and eavesdropping attacks.This paper investigates a means of defense through the employment of coalition game theory when jammers try to degrade the signal quality of legitimate users,and eavesdroppers aim to reduce secrecy rates.Specifically,we consider a virtual wireless network where MVNO users'job is to improve their Signal to Interference plus Noise Ratio(SINR)while the jammers target to collectively enhance their Jammer Received Signal Strength(JRSS),and an eavesdropper's goal is to reduce the overall secrecy rate.Numerical results have demonstrated that the proposed game strategies are effective(in terms of data rate,secrecy rate and latency)against such attackers compared to the traditional approaches. 展开更多
关键词 Game theory based security Virtual wireless networks Jamming and eavesdropping
下载PDF
Confidentiality-aware message scheduling for security-critical wireless networks 被引量:1
16
作者 Wei Jiang Guangze Xiong Xuyang Ding Zhengwei Chang Nan Sang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第1期154-160,共7页
Without considering security, existing message scheduling mechanisms may expose critical messages to malicious threats like confidentiality attacks. Incorporating confidentiality improvement into message scheduling, t... Without considering security, existing message scheduling mechanisms may expose critical messages to malicious threats like confidentiality attacks. Incorporating confidentiality improvement into message scheduling, this paper investigates the problem of scheduling aperiodc messages with time-critical and security-critical requirements. A risk-based security profit model is built to quantify the security quality of messages; and a dynamic programming based approximation algorithm is proposed to schedule aperiodic messages with guaranteed security performance. Experimental results illustrate the efficiency and effectiveness of the proposed algorithm. 展开更多
关键词 security-critical wireless networks confidentialityaware REAL-TIME message scheduling.
下载PDF
Minimizing the Impact of Long Propagation Delay on Multiple Access for Wireless Networks 被引量:1
17
作者 刘凯 李亚燕 王新 《China Communications》 SCIE CSCD 2011年第7期21-33,共13页
A multiple access protocol is proposed to greatly improve multiple access performance of wireless networks with long propagation delay. All the nodes with packets to send can make rapid successful reservation in acces... A multiple access protocol is proposed to greatly improve multiple access performance of wireless networks with long propagation delay. All the nodes with packets to send can make rapid successful reservation in access reservation mini-slots, which is adaptively adjusted according to current traffic load and idle channel resources. A Central Control Node (CCN) coordinates channel reservation and allocates on-demand channel resources to the successfully accessed nodes on two channels. Each node can employ only one handshake to accomplish each communication session, and transmit one or multiple data packets piggybacked with acknowledgment (ACK) information to one or multiple destination nodes in each frame until the end of their communication sessions, which greatly minimizes the impact of long propagation delay caused by handshakes and improves channel efficiency. Simulation results show that the proposed protocol obviously outperforms the Centralized Scheduling-based Medium Access Control (CSMAC) protocol, especially in the presence of long propagation delay. 展开更多
关键词 wireless networks multiple access on-demand reservation conflict-free transmission long propagation delay
下载PDF
Shortest Link Scheduling in Wireless Networks with Oblivious Power Control 被引量:1
18
作者 Chunmei Ma Jiguo Yu +1 位作者 Baogui Huang Yu Meng 《China Communications》 SCIE CSCD 2021年第4期137-152,共16页
Link scheduling has always been a fundamental problem in wireless networks for its direct impacts on the performance of wireless networks such as throughput capacity,transmission delay,lifetime,etc.Existing work is ma... Link scheduling has always been a fundamental problem in wireless networks for its direct impacts on the performance of wireless networks such as throughput capacity,transmission delay,lifetime,etc.Existing work is mainly established under graphbased models,which are not only impractical but also incorrect due to the essentially fading characteristics of signals.In this paper,we study the shortest link scheduling problem under two more realistic models,namely the signal to interference plus noise ratio(SINR)model and the Rayleigh fading model.We propose a centralized square-based scheduling algorithm(CSSA)with oblivious power control under the SINR model and prove its correctness under both the SINR model and the Rayleigh fading model.Furthermore,we extend CSSA and propose a distributed square-based scheduling algorithm(DSSA).Note that DSSA adopts CSMA/CA so that a wireless node can compete for the wireless channel before starting its communication.We also show theoretical analysis and conduct extensive simulations to exhibit the correctness and efficiency of our algorithms. 展开更多
关键词 link scheduling SINR Rayleigh fading wireless networks wireless communications
下载PDF
Heterogeneous Quality of Experience Guarantees Over Wireless Networks 被引量:1
19
作者 Jianyu Wang Wenchi Cheng 《China Communications》 SCIE CSCD 2018年第10期51-59,共9页
Quality of experience(Qo E), which is very critical for the experience of users in wireless networks, has been extensively studied. However, due to different human perceptions, quantifying the effective capacity of wi... Quality of experience(Qo E), which is very critical for the experience of users in wireless networks, has been extensively studied. However, due to different human perceptions, quantifying the effective capacity of wireless network subject to diverse Qo E is very difficult, which leads to many new challenges regarding Qo E guarantees in wireless networks. In this paper, we formulate the Qo E guarantees model for cellular wireless networks. Based on the model, we convert the effective capacity maximization problem into the equivalent convex optimization problem. Then, we develop the optimal Qo E-driven power allocation scheme, which can maximize the effective capacity. The obtained simulation results verified our proposed power allocation scheme, showing that the effective capacity can be significantly increased compared with that of traditional Qo E guarantees based schemes. 展开更多
关键词 wireless network effective capacity power allocation HETEROGENEOUS qualityof experience quality of service
下载PDF
Real-Time Monitoring System for Rotor Temperature of a Large Turbogenerator Based on SmartMesh IP Wireless Network Communication Technology 被引量:1
20
作者 Zhiting Zhou Hui Li +2 位作者 Yong Yang Haibo Zhang Zhennan Fan 《China Communications》 SCIE CSCD 2022年第5期150-163,共14页
In this study,a real-time rotor temperature monitoring system for large turbogenerators using SmartMesh IP wireless network communication technology was designed and tested.The system is capable of providing comprehen... In this study,a real-time rotor temperature monitoring system for large turbogenerators using SmartMesh IP wireless network communication technology was designed and tested.The system is capable of providing comprehensive,accurate,continuous,and reliable real-time temperature monitoring for turbogenerators.Additionally,it has demonstrated satisfactory results in a real-time monitoring test of the rotor temperature of various famous large-scale turbogenerators and giant nuclear power half-speed turbogenerators designed and manufactured in China.The development and application of this wireless temperature measurement system would aid in improving the intelligent operation quality,safety,and stability of China’s large turbine generators and even the entire power system. 展开更多
关键词 SmartMesh IP wireless network communication turbine generator rotor temperature realtime monitoring
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部