期刊文献+
共找到157篇文章
< 1 2 8 >
每页显示 20 50 100
Optimal decision-making method for equipment maintenance to enhance the resilience of power digital twin system under extreme disaster
1
作者 Song Gao Wei Wang +2 位作者 Jingyi Chen Xinyu Wu Junyan Shao 《Global Energy Interconnection》 EI CSCD 2024年第3期336-346,共11页
Digital twins and the physical assets of electric power systems face the potential risk of data loss and monitoring failures owing to catastrophic events,causing surveillance and energy loss.This study aims to refine ... Digital twins and the physical assets of electric power systems face the potential risk of data loss and monitoring failures owing to catastrophic events,causing surveillance and energy loss.This study aims to refine maintenance strategies for the monitoring of an electric power digital twin system post disasters.Initially,the research delineates the physical electric power system along with its digital counterpart and post-disaster restoration processes.Subsequently,it delves into communication and data processing mechanisms,specifically focusing on central data processing(CDP),communication routers(CRs),and phasor measurement units(PMUs),to re-establish an equipment recovery model based on these data transmission methodologies.Furthermore,it introduces a mathematical optimization model designed to enhance the digital twin system’s post-disaster monitoring efficacy by employing the branch-and-bound method for its resolution.The efficacy of the proposed model was corroborated by analyzing an IEEE-14 system.The findings suggest that the proposed branch-and-bound algorithm significantly augments the observational capabilities of a power system with limited resources,thereby bolstering its stability and emergency response mechanisms. 展开更多
关键词 Phasor measurement units Through-sequence optimization Resilience enhancement Communication networks Digital twins
下载PDF
For LEO Satellite Networks: Intelligent Interference Sensing and Signal Reconstruction Based on Blind Separation Technology
2
作者 Chengjie Li Lidong Zhu Zhen Zhang 《China Communications》 SCIE CSCD 2024年第2期85-95,共11页
In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signal... In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system. 展开更多
关键词 blind source separation greedy optimization algorithm interference sensing LEO satellite communication networks signal reconstruction
下载PDF
Sum-Rate Maximization in Active RIS-Assisted Multi-Antenna WPCN
3
作者 Jiang Jie Lyu Bin +1 位作者 Chen Pengcheng Yang Zhen 《China Communications》 SCIE CSCD 2024年第6期23-39,共17页
In this paper,we propose an active reconfigurable intelligent surface(RIS)enabled hybrid relaying scheme for a multi-antenna wireless powered communication network(WPCN),where the active RIS is employed to assist both... In this paper,we propose an active reconfigurable intelligent surface(RIS)enabled hybrid relaying scheme for a multi-antenna wireless powered communication network(WPCN),where the active RIS is employed to assist both wireless energy transfer(WET)from the power station(PS)to energyconstrained users and wireless information transmission(WIT)from users to the receiving station(RS).For further performance enhancement,we propose to employ both transmit beamforming at the PS and receive beamforming at the RS.We formulate a sumrate maximization problem by jointly optimizing the RIS phase shifts and amplitude reflection coefficients for both the WET and the WIT,transmit and receive beamforming vectors,and network resource allocation.To solve this non-convex problem,we propose an efficient alternating optimization algorithm with the linear minimum mean squared error criterion,semidefinite relaxation(SDR)and successive convex approximation techniques.Specifically,the tightness of applying the SDR is proved.Simulation results demonstrate that our proposed scheme with 10 reflecting elements(REs)and 4 antennas can achieve 17.78%and 415.48%performance gains compared to the single-antenna scheme with 10 REs and passive RIS scheme with 100 REs,respectively. 展开更多
关键词 active reconfigurable intelligent surface BEAMFORMING sum-rate maximization wireless powered communication network
下载PDF
Enabling Efficient Caching in High Mobility UAV Communications Network under Limited Backhaul
4
作者 Yan Wu Jiandong Li +2 位作者 Junyu Liu Min Sheng Chenxi Zhao 《China Communications》 SCIE CSCD 2022年第10期207-219,共13页
Due to flexible deployment,unmanned aerial vehicle(UAV)mounted aerial access points are capable of expanding the coverage capabilities of existing terrestrial base stations(TBSs).Different from TBSs,however,UAV access... Due to flexible deployment,unmanned aerial vehicle(UAV)mounted aerial access points are capable of expanding the coverage capabilities of existing terrestrial base stations(TBSs).Different from TBSs,however,UAV access points(UAPs)are of high mobility in horizontal and vertical dimensions,which may deteriorate the coverage performance.Worsestill,the mobility of UAPs would as well increase the pressure of wireless backhaul.In this light,we investigate the performance of the cache-enabled UAV communications network(CUCN)in terms of network spatial throughput(ST)by analyzing the line of sight(LoS)connections and non-line of sight(NLoS)connections.It is found that the network ST is exponentially decreased with the square of UAP altitude.Furthermore,contrary to intuition,a large cache size may deteriorate the network ST when UAPs are over-deployed.The reason is that a large cache size increases the hit probability,which may increase the activation of UAPs and consequently result in complicated interference.Aiming to maximize the network ST,we optimize the cache strategy under limited backhaul.Remarkably,the results show that network ST could be substantially improved by the optimized cache strategy and the performance degeneration brought by UAP high mobility could be even eliminated especially when the UAP altitude is high. 展开更多
关键词 caching optimization UAV communications network spatial throughput stochastic geometry aerial access point
下载PDF
Trajectory Design for UAV-Enabled Maritime Secure Communications:A Reinforcement Learning Approach
5
作者 Jintao Liu Feng Zeng +3 位作者 Wei Wang Zhichao Sheng Xinchen Wei Kanapathippillai Cumanan 《China Communications》 SCIE CSCD 2022年第9期26-36,共11页
This paper investigates an unmanned aerial vehicle(UAV)-enabled maritime secure communication network,where the UAV aims to provide the communication service to a legitimate mobile vessel in the presence of multiple e... This paper investigates an unmanned aerial vehicle(UAV)-enabled maritime secure communication network,where the UAV aims to provide the communication service to a legitimate mobile vessel in the presence of multiple eavesdroppers.In this maritime communication networks(MCNs),it is challenging for the UAV to determine its trajectory on the ocean,since it cannot land or replenish energy on the sea surface,the trajectory should be pre-designed before the UAV takes off.Furthermore,the take-off location of the UAV and the sea lane of the vessel may be random,which leads to a highly dynamic environment.To address these issues,we propose two reinforcement learning schemes,Q-learning and deep deterministic policy gradient(DDPG)algorithms,to solve the discrete and continuous UAV trajectory design problem,respectively.Simulation results are provided to validate the effectiveness and superior performance of the proposed reinforcement learning schemes versus the existing schemes in the literature.Additionally,the proposed DDPG algorithm converges faster and achieves higher utilities for the UAV,compared to the Q-learning algorithm. 展开更多
关键词 maritime communication networks(MCNs) unmanned aerial vehicles(UAV) reinforcement learning physical layer security trajectory design
下载PDF
Packet Transport for Maritime Communications:A Streaming Coded UDP Approach
6
作者 Ye Li Jianhao Yu +3 位作者 Liang Chen Yingdong Hu Xiaomin Chen Jue Wang 《China Communications》 SCIE CSCD 2022年第9期10-25,共16页
The maritime communication network(MCN)plays an important role in the 6th generation(6G)system development.In MCNs,packet transport over long-distance lossy links will be ubiquitous.Transmission control protocol(TCP),... The maritime communication network(MCN)plays an important role in the 6th generation(6G)system development.In MCNs,packet transport over long-distance lossy links will be ubiquitous.Transmission control protocol(TCP),the dominant transport protocol in the past decades,have had performance issues in such links.In this paper,we propose a novel transport approach which uses user datagram protocol(UDP)along with a simple yet effective bandwidth estimator for congestion control,and with a proactive packet-level forward erasure correction(FEC)code called streaming code to provide low-delay loss recovery without data retransmissions at all.We show that the approach can effectively address two issues of the state-of-the-art TCP variants in the long-distance lossy links,namely 1)the low bandwidth utilization caused by the slow increase of the congestion window(CWND)due to long roundtrip time(RTT)and the frequent CWND drop due to random and congestion losses,and 2)the high endto-end in-order delivery delay when re-transmissions are incurred to recover lost packets.In addition,we show that the scheme’s goodput has good smoothness and short-term intra-protocol fairness properties,which are beneficial for multimedia streaming and interactive applications that are prominent parts of today’s wireless traffic. 展开更多
关键词 maritime communication network forward-erasure correction congestion control
下载PDF
Vehicular Communications,Networks,and Applications
7
作者 ZHUANG Weihua ZHU Hongzi 《ZTE Communications》 2016年第3期1-2,共2页
Avehicular ad hoc network (VANET) is a packet-switched network, consisting of mobile communication nodes mounted on vehicles, with very limited or no infrastructure support [1]. It supports communications among near... Avehicular ad hoc network (VANET) is a packet-switched network, consisting of mobile communication nodes mounted on vehicles, with very limited or no infrastructure support [1]. It supports communications among nearby vehicles, 展开更多
关键词 VANETS Vehicular communications Networks and Applications DSRC
下载PDF
Study on QoS and Communications Capacity in Heterogeneous Network Convergence
8
作者 Xia Weiwei,Shen Lianfeng(National Mobile Communications Research Laboratory,Southeast University,Nanjing 210096,China) 《ZTE Communications》 2008年第3期6-9,共4页
To provide any subscriber from anywhere at anytime with services that have both secured Quality of Service(QoS) and simultaneous expansion of network coverage and communications capacity is a key problem that has to b... To provide any subscriber from anywhere at anytime with services that have both secured Quality of Service(QoS) and simultaneous expansion of network coverage and communications capacity is a key problem that has to be considered and solved in heterogeneous network convergence.Key technologies for a secured QoS and communications capacity analysis under heterogeneous environment are important subjects for research.Key technologies for a secured QoS are mainly on radio resource management algorithms covering Call Admission Control(CAC) algorithm,vertical handover algorithm,heterogeneous resource allocation algorithm and network selection algorithm.The applications of a novel multi-hop in heterogeneous convergence system serve the purposes of network coverage expansion,transmission power reduction,system communication capacity and throughput increase. 展开更多
关键词 QOS Study on QoS and communications Capacity in Heterogeneous Network Convergence WLAN IEEE
下载PDF
Power Line Communications Networking Method Based on Hybrid Ant Colony and Genetic Algorithm
9
作者 Qianghui Xiao Huan Jin Xueyi Zhang 《Engineering(科研)》 2020年第8期581-590,共10页
When solving the routing problem with traditional ant colony algorithm, there is scarce in initialize pheromone and a slow convergence and stagnation for the complex network topology and the time-varying characteristi... When solving the routing problem with traditional ant colony algorithm, there is scarce in initialize pheromone and a slow convergence and stagnation for the complex network topology and the time-varying characteristics of channel in power line carrier communication of low voltage distribution grid. The algorithm is easy to fall into premature and local optimization. Proposed an automatic network algorithm based on improved transmission delay and the load factor as the evaluation factors. With the requirements of QoS, a logical topology of power line communication network is established. By the experiment of MATLAB simulation, verify that the improved Dynamic hybrid ant colony genetic algorithm (DH_ACGA) algorithm has improved the communication performance, which solved the QoS routing problems of power communication to some extent. 展开更多
关键词 Power Line Carrier Communication Network Quality of Service Hybrid Ant Colony and Genetic Algorithm
下载PDF
Hubei: Building a Modern Communications Network
10
《China Today》 2000年第10期22-25,共4页
关键词 CO Building a Modern communications Network HUBEI
下载PDF
Generative Adversarial Networks Based Digital Twin Channel Modeling for Intelligent Communication Networks 被引量:2
11
作者 Yuxin Zhang Ruisi He +5 位作者 Bo Ai Mi Yang Ruifeng Chen Chenlong Wang Zhengyu Zhang Zhangdui Zhong 《China Communications》 SCIE CSCD 2023年第8期32-43,共12页
Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With D... Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With DT channel modeling,the generated channel data can be closer to realistic channel measurements without requiring a prior channel model,and amount of channel data can be significantly increased.Artificial intelligence(AI)based modeling approach shows outstanding performance to solve such problems.In this work,a channel modeling method based on generative adversarial networks is proposed for DT channel,which can generate identical statistical distribution with measured channel.Model validation is conducted by comparing DT channel characteristics with measurements,and results show that DT channel leads to fairly good agreement with measured channel.Finally,a link-layer simulation is implemented based on DT channel.It is found that the proposed DT channel model can be well used to conduct link-layer simulation and its performance is comparable to using measurement data.The observations and results can facilitate the development of DT channel modeling and provide new thoughts for DT channel applications,as well as improving the performance and reliability of intelligent communication networking. 展开更多
关键词 digital twin channel modeling generative adversarial networks intelligent communication networking
下载PDF
A 5G Perspective of an SDN-Based Privacy-Preserving Scheme for IoT Networks 被引量:1
12
作者 Isaac Appiah Xiaoming Jiang +1 位作者 Edward Kwadwo Boahen Ebenezer Owusu 《International Journal of Communications, Network and System Sciences》 2023年第8期169-190,共22页
The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as techno... The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as technology advances, and its use expands. As a consequence, boosting the capacity of these networks has garnered widespread attention. As a result, 5G, the next phase of cellular networks, is expected to be a game-changer, bringing with it faster data transmission rates, more capacity, improved service quality, and reduced latency. However, 5G networks continue to confront difficulties in establishing pervasive and dependable connections amongst high-speed IoT devices. Thus, to address the shortcomings in current recommendations, we present a unified architecture based on software-defined networks (SDNs) that provides 5G-enabled devices that must have complete secrecy. Through SDN, the architecture streamlines network administration while optimizing network communications. A mutual authentication protocol using elliptic curve cryptography is introduced for mutual authentication across certificate authorities and clustered heads in IoT network deployments based on IoT. Again, a dimensionality reduction intrusion detection mechanism is introduced to decrease computational cost and identify possible network breaches. However, to leverage the method’s potential, the initial module's security is reviewed. The second module is evaluated and compared to modern models. 展开更多
关键词 Internet of Things 5G SDNs Security and Privacy INTRUSION Network communications
下载PDF
RAISE:A Resilient Anonymous Information Sharing Environment
13
作者 Ning Hu Ling Liu +2 位作者 Xin Liu Kaijun Wu Yue Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第12期2743-2759,共17页
With the widespread application of cloud computing and network virtualization technologies,more and more enterprise applications are directly deployed in the cloud.However,the traditional TCP/IP network transmission m... With the widespread application of cloud computing and network virtualization technologies,more and more enterprise applications are directly deployed in the cloud.However,the traditional TCP/IP network transmission model does not fully consider the information security issues caused by the uncontrollable internet environment.Network security communication solutions represented by encrypted virtual private networks(VPN)are facing multiple security threats.In fact,during the communication process,the user application needs to protect not only the content of the communication but also the behavior of the communication,such as the communication relationship,the communication protocol,and so on.Inspired by blockchain and software-defined networking technology,this paper proposes a resilient anonymous information sharing environment,RAISE.The RAISE system consists of user agents,a core switching network and a control cluster based on a consortium blockchain.User agents are responsible for segmenting,encrypting,and encapsulating user traffic.The core switching network forwards user traffic according to the rules issued by the controller,and the controller dynamically calculates the forwarding rules according to the security policy.Different from onion routing technology,RAISE adopts the controller to replace the onion routing model,which effectively overcomes the uncontrollability of nodes.The dispersed computing model is introduced to replace the TCP/IP pipeline transmission models,which overcomes the problems of anti-tracking and traffic hijacking that cannot be solved by VPNs.We propose a blockchain control plane framework,design the desired consensus algorithmand deploy a RAISE systemconsisting of 150 nodes in an internet environment.The experimental results show that the use of blockchain technology can effectively improve the reliability and security of the control plane.While maintaining high-performance network transmission,it further provides network communication security. 展开更多
关键词 Software-defined anonymous communication network blockchain network communication security
下载PDF
Reliable Scheduling Method for Sensitive Power Business Based on Deep Reinforcement Learning
14
作者 Shen Guo Jiaying Lin +2 位作者 Shuaitao Bai Jichuan Zhang Peng Wang 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期1053-1066,共14页
The main function of the power communication business is to monitor,control and manage the power communication network to ensure normal and stable operation of the power communication network.Commu-nication services r... The main function of the power communication business is to monitor,control and manage the power communication network to ensure normal and stable operation of the power communication network.Commu-nication services related to dispatching data networks and the transmission of fault information or feeder automation have high requirements for delay.If processing time is prolonged,a power business cascade reaction may be triggered.In order to solve the above problems,this paper establishes an edge object-linked agent business deployment model for power communication network to unify the management of data collection,resource allocation and task scheduling within the system,realizes the virtualization of object-linked agent computing resources through Docker container technology,designs the target model of network latency and energy consumption,and introduces A3C algorithm in deep reinforcement learning,improves it according to scene characteristics,and sets corresponding optimization strategies.Mini-mize network delay and energy consumption;At the same time,to ensure that sensitive power business is handled in time,this paper designs the business dispatch model and task migration model,and solves the problem of server failure.Finally,the corresponding simulation program is designed to verify the feasibility and validity of this method,and to compare it with other existing mechanisms. 展开更多
关键词 Power communication network dispatching data networks resource allocation A3C algorithm deep reinforcement learning
下载PDF
IoT data analytic algorithms on edge-cloud infrastructure:A review
15
作者 Abel E.Edje M.S.Abd Latiff Weng Howe Chan 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1486-1515,共30页
The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime services.However,it is constrained by limited data storage and processing power.It offloads its massiv... The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime services.However,it is constrained by limited data storage and processing power.It offloads its massive data stream to edge devices and the cloud for adequate storage and processing.This further leads to the challenges of data outliers,data redundancies,and cloud resource load balancing that would affect the execution and outcome of data streams.This paper presents a review of existing analytics algorithms deployed on IoT-enabled edge cloud infrastructure that resolved the challenges of data outliers,data redundancies,and cloud resource load balancing.The review highlights the problems solved,the results,the weaknesses of the existing algorithms,and the physical and virtual cloud storage servers for resource load balancing.In addition,it discusses the adoption of network protocols that govern the interaction between the three-layer architecture of IoT sensing devices enabled edge cloud and its prevailing challenges.A total of 72 algorithms covering the categories of classification,regression,clustering,deep learning,and optimization have been reviewed.The classification approach has been widely adopted to solve the problem of redundant data,while clustering and optimization approaches are more used for outlier detection and cloud resource allocation. 展开更多
关键词 Internet of things Cloud platform Edge Analytic algorithms Processes Network communication protocols
下载PDF
Computation of PoA for Selfish Node Detection and Resource Allocation Using Game Theory
16
作者 S.Kanmani M.Murali 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2583-2598,共16页
The introduction of new technologies has increased communication network coverage and the number of associating nodes in dynamic communication networks(DCN).As the network has the characteristics like decentralized an... The introduction of new technologies has increased communication network coverage and the number of associating nodes in dynamic communication networks(DCN).As the network has the characteristics like decentralized and dynamic,few nodes in the network may not associate with other nodes.These uncooperative nodes also known as selfish nodes corrupt the performance of the cooperative nodes.Namely,the nodes cause congestion,high delay,security concerns,and resource depletion.This study presents an effective selfish node detection method to address these problems.The Price of Anarchy(PoA)and the Price of Stability(PoS)in Game Theory with the Presence of Nash Equilibrium(NE)are discussed for the Selfish Node Detection.This is a novel experiment to detect selfish nodes in a network using PoA.Moreover,the least response dynamic-based Capacitated Selfish Resource Allocation(CSRA)game is introduced to improve resource usage among the nodes.The suggested strategy is simulated using the Solar Winds simulator,and the simulation results show that,when compared to earlier methods,the new scheme offers promising performance in terms of delivery rate,delay,and throughput. 展开更多
关键词 Dynamic communication network(DCN) price of anarchy(PoA) nash equilibrium(NE) capacitated selfish resource allocation(CSRA)game game theory price of stability(PoS)
下载PDF
A Transmission Design in Dynamic Heterogeneous V2V Networks Through Multi-Agent Deep Reinforcement Learning
17
作者 Nong Qu Chao Wang +1 位作者 Zuxing Li Fuqiang Liu 《China Communications》 SCIE CSCD 2023年第7期273-289,共17页
In highly dynamic and heterogeneous vehicular communication networks,it is challenging to efficiently utilize network resources and ensure demanding performance requirements of safetyrelated applications.This paper in... In highly dynamic and heterogeneous vehicular communication networks,it is challenging to efficiently utilize network resources and ensure demanding performance requirements of safetyrelated applications.This paper investigates machinelearning-assisted transmission design in a typical multi-user vehicle-to-vehicle(V2V)communication scenario.The transmission process proceeds sequentially along the discrete time steps,where several source nodes intend to deliver multiple different types of messages to their respective destinations within the same spectrum.Due to rapid movement of vehicles,real-time acquirement of channel knowledge and central coordination of all transmission actions are in general hard to realize.We consider applying multi-agent deep reinforcement learning(MADRL)to handle this issue.By transforming the transmission design problem into a stochastic game,a multi-agent proximal policy optimization(MAPPO)algorithm under a centralized training and decentralized execution framework is proposed such that each source decides its own transmission message type,power level,and data rate,based on local observations of the environment and feedback,to maximize its energy efficiency.Via simulations we show that our method achieves better performance over conventional methods. 展开更多
关键词 V2V communication networks SEQUENTIAL
下载PDF
一类活动发射平台驱动控制系统网络设计
18
作者 LI Daoping ZHU Maioxin +2 位作者 LI Chunlin CHEN Yaozu ZHENG Guokun 《Aerospace China》 2023年第3期26-30,共5页
In order to ensure that a mobile launch platform is able to transport a launch vehicle which is assembled vertically on a complex orbit,a communication network for the drive control system was designed.Based on the ch... In order to ensure that a mobile launch platform is able to transport a launch vehicle which is assembled vertically on a complex orbit,a communication network for the drive control system was designed.Based on the char-acteristics of equipment of the drive control system and its position,Industrial Ethernet and Profibus were selected.To meet the requirements for reliability and maintainability of aerospace products,the communication network featured a hot redundant to avoid single point failure risk,so that if any point in the system fails,the control strategy of standby switches using heartbeat detection and parity check would ensure the normal communication and failure diagnostics,which could enable the transport mission of the launch vehicle to be completed smoothly. 展开更多
关键词 mobile launch platform drive control system communication network Industrial Ethernet PROFIBUS hot redundancy
下载PDF
Modeling of Intelligent Integrated Network Management System Using Object Oriented Approach *
19
作者 费翔 罗军舟 +1 位作者 顾冠群 吴介一 《Journal of Southeast University(English Edition)》 EI CAS 1998年第1期3-7,共5页
The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficien... The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently. 展开更多
关键词 object oriented approach computer communication network network management
下载PDF
Distribution algorithm of entangled particles for wireless quantum communication mesh networks
20
作者 王霄峻 施丽慧 +2 位作者 占海涛 项睿清 余旭涛 《Journal of Southeast University(English Edition)》 EI CAS 2015年第4期450-456,共7页
With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes ... With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes selection in order to save cost and reduce complexity. A minimum spanning tree( MST)-based quantum distribution algorithm( QDMST) is presented to construct the mesh backbone network. First, the articulation points are found,and for each connected block uncovered by the articulation points, the general centers are solved. Then, both articulation points and general centers are classified as backbone nodes and an M ST is formed. The quantum path between every two neighbor nodes on the MST is calculated. The nodes on these paths are also classified as backbone nodes. Simulation results validate the advantages of QDMST in the average backbone nodes number and average quantum channel distance compared to the existing random selection algorithm under multiple network scenarios. 展开更多
关键词 wireless quantum communication networks entangled particles distribution wireless mesh networks minimum spanning tree
下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部