期刊文献+
共找到1,345篇文章
< 1 2 68 >
每页显示 20 50 100
Distributed Weighted Data Aggregation Algorithm in End-to-Edge Communication Networks Based on Multi-armed Bandit 被引量:1
1
作者 Yifei ZOU Senmao QI +1 位作者 Cong'an XU Dongxiao YU 《计算机科学》 CSCD 北大核心 2023年第2期13-22,共10页
As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when ... As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when learning agents are deployed on the edge side,the data aggregation from the end side to the designated edge devices is an important research topic.Considering the various importance of end devices,this paper studies the weighted data aggregation problem in a single hop end-to-edge communication network.Firstly,to make sure all the end devices with various weights are fairly treated in data aggregation,a distributed end-to-edge cooperative scheme is proposed.Then,to handle the massive contention on the wireless channel caused by end devices,a multi-armed bandit(MAB)algorithm is designed to help the end devices find their most appropriate update rates.Diffe-rent from the traditional data aggregation works,combining the MAB enables our algorithm a higher efficiency in data aggregation.With a theoretical analysis,we show that the efficiency of our algorithm is asymptotically optimal.Comparative experiments with previous works are also conducted to show the strength of our algorithm. 展开更多
关键词 Weighted data aggregation End-to-edge communication Multi-armed bandit Edge intelligence
下载PDF
Performance Analysis of Three Spectrum Sensing Detection Techniques with Ambient Backscatter Communication in Cognitive Radio Networks
2
作者 Shayla Islam Anil Kumar Budati +2 位作者 Mohammad Kamrul Hasan Saoucene Mahfoudh Syed Bilal Hussian Shah 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期813-825,共13页
In wireless communications, the Ambient Backscatter Communication (AmBC) technique is a promisingapproach, detecting user presence accurately at low power levels. At low power or a low Signal-to-Noise Ratio(SNR), ther... In wireless communications, the Ambient Backscatter Communication (AmBC) technique is a promisingapproach, detecting user presence accurately at low power levels. At low power or a low Signal-to-Noise Ratio(SNR), there is no dedicated power for the users. Instead, they can transmit information by reflecting the ambientRadio Frequency (RF) signals in the spectrum. Therefore, it is essential to detect user presence in the spectrum forthe transmission of data without loss or without collision at a specific time. In this paper, the authors proposed anovel Spectrum Sensing (SS) detection technique in the Cognitive Radio (CR) spectrum, by developing the AmBC.Novel Matched Filter Detection with Inverse covariance (MFDI), Cyclostationary Feature Detection with Inversecovariance (CFDI) and Hybrid Filter Detection with Inverse covariance (HFDI) approaches are used with AmBCto detect the presence of users at low power levels. The performance of the three detection techniques is measuredusing the parameters of Probability of Detection (PD), Probability of False Alarms (Pfa), Probability of MissedDetection (Pmd), sensing time and throughput at low power or low SNR. The results show that there is a significantimprovement via the HFDI technique for all the parameters. 展开更多
关键词 Ambient backscatter communication cognitive radio MFDI CFDI HFDI
下载PDF
Secure vehicular data communication in Named Data Networking
3
作者 Xiaonan Wang Xilan Chen Xingwei Wang 《Digital Communications and Networks》 SCIE CSCD 2023年第1期203-210,共8页
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data N... Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives. 展开更多
关键词 Named data networking Reverse path Secure data communication
下载PDF
Design and Application of an S-band Fast Radio Bursts Search Pipeline for the Nanshan 26 m Radio Telescope
4
作者 Yan-Ling Liu Mao-Zheng Chen +6 位作者 Jian Li Jian-Ping Yuan Rai Yuen Zhi-Yong Liu Hao Yan Wen-Long Du Nan-Nan Zhai 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2024年第7期111-117,共7页
Fast radio bursts(FRBs)are among the most studied radio transients in astrophysics,but their origin and radiation mechanism are still unknown.It is a challenge to search for FRB events in a huge amount of observationa... Fast radio bursts(FRBs)are among the most studied radio transients in astrophysics,but their origin and radiation mechanism are still unknown.It is a challenge to search for FRB events in a huge amount of observational data with high speed and high accuracy.With the rapid advancement of the FRB research process,FRB searching has changed from archive data mining to either long-term monitoring of the repeating FRBs or all-sky surveys with specialized equipments.Therefore,establishing a highly efficient and high quality FRB search pipeline is the primary task in FRB research.Deep learning techniques provide new ideas for FRB search processing.We have detected radio bursts from FRB 20201124A in the L-band observational data of the Nanshan 26 m radio telescope(NSRT-26m)using the constructed deep learning based search pipeline named dispersed dynamic spectra search(DDSS).Afterwards,we further retrained the deep learning model and applied the DDSS framework to S-band observations.In this paper,we present the FRB observation system and search pipeline using the S-band receiver.We carried out search experiments,and successfully detected the radio bursts from the magnetar SGR J1935+2145and FRB 20220912A.The experimental results show that the search pipeline can complete the search efficiently and output the search results with high accuracy. 展开更多
关键词 radio continuum general-methods data analysis-methods OBSERVATIONAL
下载PDF
Automatic modulation recognition of radio fuzes using a DR2D-based adaptive denoising method and textural feature extraction
5
作者 Yangtian Liu Xiaopeng Yan +2 位作者 Qiang Liu Tai An Jian Dai 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第4期328-338,共11页
The identification of intercepted radio fuze modulation types is a prerequisite for decision-making in interference systems.However,the electromagnetic environment of modern battlefields is complex,and the signal-to-n... The identification of intercepted radio fuze modulation types is a prerequisite for decision-making in interference systems.However,the electromagnetic environment of modern battlefields is complex,and the signal-to-noise ratio(SNR)of such environments is usually low,which makes it difficult to implement accurate recognition of radio fuzes.To solve the above problem,a radio fuze automatic modulation recognition(AMR)method for low-SNR environments is proposed.First,an adaptive denoising algorithm based on data rearrangement and the two-dimensional(2D)fast Fourier transform(FFT)(DR2D)is used to reduce the noise of the intercepted radio fuze intermediate frequency(IF)signal.Then,the textural features of the denoised IF signal rearranged data matrix are extracted from the statistical indicator vectors of gray-level cooccurrence matrices(GLCMs),and support vector machines(SVMs)are used for classification.The DR2D-based adaptive denoising algorithm achieves an average correlation coefficient of more than 0.76 for ten fuze types under SNRs of-10 d B and above,which is higher than that of other typical algorithms.The trained SVM classification model achieves an average recognition accuracy of more than 96%on seven modulation types and recognition accuracies of more than 94%on each modulation type under SNRs of-12 d B and above,which represents a good AMR performance of radio fuzes under low SNRs. 展开更多
关键词 Automatic modulation recognition Adaptive denoising data rearrangement and the 2D FFT(DR2D) radio fuze
下载PDF
Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Application
6
作者 Ibraheem Al-Hejri Farag Azzedin +1 位作者 Sultan Almuhammadi Naeem Firdous Syed 《Computers, Materials & Continua》 SCIE EI 2024年第6期4197-4218,共22页
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ... The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes. 展开更多
关键词 IoT LIGHTWEIGHT computation complexity communication overhead cybersecurity threats threat prevention secure data transmission Wireless Sensor Networks(WSNs) elliptic curve cryptography
下载PDF
Radio Propagation and Wireless Coverage of LSAA-Based 5G Millimeter-Wave Mobile Communication Systems 被引量:12
7
作者 Haiming Wang Peize Zhang +1 位作者 Jing Li Xiaohu You 《China Communications》 SCIE CSCD 2019年第5期1-18,共18页
Millimeter-wave(mm Wave) communications will be used in fifth-generation(5G) mobile communication systems, but they experience severe path loss and have high sensitivity to physical objects, leading to smaller cell ra... Millimeter-wave(mm Wave) communications will be used in fifth-generation(5G) mobile communication systems, but they experience severe path loss and have high sensitivity to physical objects, leading to smaller cell radii and complicated network architectures. A coverage extension scheme using large-scale antenna arrays(LSAAs) has been suggested and theoretically proven to be cost-efficient in combination with ultradense small cell networks. To analyze and optimize the LSAA-based network deployments, a comprehensive survey of recent advances in statistical mmWave channel modeling is first presented in terms of channel parameter estimation, large-scale path loss models, and small-scale cluster models. Next, the measurement and modeling results at two 5G candidate mmWave bands(e.g., 28 GHz and 39 GHz) are reviewed and compared in several outdoor scenarios of interest, where the propagation characteristics make crucial contributions to wireless network designs. Finally, the coverage behaviors of systems employing a large number of antenna arrays are discussed, as well as some implications on future mmWave cellular network designs. 展开更多
关键词 FIFTH generation (5G) channel modeling large-scale antenna array(LSAA) MILLIMETER wave(mmWave) communicationS radio propagation measurements wireless COVERAGE
下载PDF
Impact of atmospheric ionization by delayed radiation from highaltitude nuclear explosions on radio communication 被引量:2
8
作者 Heng Xu Jian-Ming Ouyang +2 位作者 Shang-Wu Wang Yun Liu Xu Sun 《Nuclear Science and Techniques》 SCIE CAS CSCD 2019年第12期58-64,共7页
In this study,we investigated the motion,shape,and delayed radiation intensity of a radioactive cloud by establishing a volume-source model of delayed radiation after high-altitude nuclear explosions.Then,the spatial ... In this study,we investigated the motion,shape,and delayed radiation intensity of a radioactive cloud by establishing a volume-source model of delayed radiation after high-altitude nuclear explosions.Then,the spatial distribution of electron number density at different moments on the north side of the explosion point generated by delayed γ-rays and delayed β-rays from the radioactive cloud under the influence of the geomagnetic field was calculated by solving chemical reaction kinetics equations.The impact of radio communication in the different frequency bands on the process of atmospheric ionization was also studied.The numerical results of the high-altitude nuclear explosion (120 km high and with a 1 megaton equivalent at 40°N latitude) indicated that the peak of electron number density ionized delayed γ-rays is located at a height of approximately 100 km and that of electron number density ionized delayed β-rays is about 90 km high.After 1 min of explosion,the radio communication in the medium frequency (MF) and high-frequency (HF)bands was completely interrupted,and the energy attenuation of the radio wave in the very high-frequency (VHF)band was extremely high.Five minutes later,the VHF radio communication was basically restored,but the energy attenuation in the HF band was still high.After 30 min,theVHF radio communication returned to normal,but its influence on the HF and MF radio communication continued. 展开更多
关键词 HIGH-ALTITUDE NUCLEAR explosions DELAYED RADIATION IONIZATION effect radio communication
下载PDF
Reliable transmission of consultative committee for space data systems file delivery protocol in deep space communication 被引量:7
9
作者 Hui Li Hao Luo Faxin Yu Zheming Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期349-354,共6页
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac... In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification. 展开更多
关键词 deep space communication consultative committee for space data systems (CCSDS) CCSDS file delivery protocol (CFDP) RELIABLE delay.
下载PDF
DCGAN Based Spectrum Sensing Data Enhancement for Behavior Recognition in Self-Organized Communication Network 被引量:3
10
作者 Kaixin Cheng Lei Zhu +5 位作者 Changhua Yao Lu Yu Xinrong Wu Xiang Zheng Lei Wang Fandi Lin 《China Communications》 SCIE CSCD 2021年第11期182-196,共15页
Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately ... Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately analyze the communication behavior.Traditional means can hardly utilize the scarce and crude spectrum sensing data captured in a real scene.Thus,communication behavior recognition using raw sensing data under smallsample condition has become a new challenge.In this paper,a data enhanced communication behavior recognition(DECBR)scheme is proposed to meet this challenge.Firstly,a preprocessing method is designed to make the raw spectrum data suitable for the proposed scheme.Then,an adaptive convolutional neural network structure is exploited to carry out communication behavior recognition.Moreover,DCGAN is applied to support data enhancement,which realize communication behavior recognition under small-sample condition.Finally,the scheme is verified by experiments under different data size.The results show that the DECBR scheme can greatly improve the accuracy and efficiency of behavior recognition under smallsample condition. 展开更多
关键词 spectrum sensing communication behavior recognition small-sample data enhancement selforganized network
下载PDF
Coping with the Big Data:Convergence of Communications,Computing and Storage 被引量:2
11
作者 Pingzhi Fan 《China Communications》 SCIE CSCD 2016年第9期203-207,共5页
To cope with the impact of big data,it is proposed to integrate the traditionally individual computing,communications and storage systems,which are getting inevitably converged.An effective information system capacity... To cope with the impact of big data,it is proposed to integrate the traditionally individual computing,communications and storage systems,which are getting inevitably converged.An effective information system capacity is introduced and discussed,aimed at excavating potentials of information system under a new paradigm with more degrees of freedom. 展开更多
关键词 big data communicationS com- puting STORAGE information system capacity
下载PDF
Simulation of Radio Path Strength for Multipath Propagation in Land Mobile Communications 被引量:2
12
作者 Gao Shichang (Shanghai University)Li Jun (Nanjing University) Jiang Changyin (China Research Institute of Radiowave Propagation) Zhong Shunshi (Shanghai University) 《Advances in Manufacturing》 SCIE CAS 1998年第4期17-20,共4页
Based on the characteristics of the radio propagation in land mobile communications environment, a theoretical model for the reflecting(scattering) number of each radio path is derived firstly. This model can be used ... Based on the characteristics of the radio propagation in land mobile communications environment, a theoretical model for the reflecting(scattering) number of each radio path is derived firstly. This model can be used to predict the variation of radio path strength, which is important for practical mobile communications engineering. Using this model, a method for simulating radio path strength is developed, with numerical results presented. 展开更多
关键词 radio propagation path strength land mobile communications
下载PDF
Achieving Fuzzy Matching Data Sharing for Secure Cloud-Edge Communication 被引量:2
13
作者 Chuan Zhang Mingyang Zhao +4 位作者 Yuhua Xu Tong Wu Yanwei Li Liehuang Zhu Haotian Wang 《China Communications》 SCIE CSCD 2022年第7期257-276,共20页
In this paper,we propose a novel fuzzy matching data sharing scheme named FADS for cloudedge communications.FADS allows users to specify their access policies,and enables receivers to obtain the data transmitted by th... In this paper,we propose a novel fuzzy matching data sharing scheme named FADS for cloudedge communications.FADS allows users to specify their access policies,and enables receivers to obtain the data transmitted by the senders if and only if the two sides meet their defined certain policies simultaneously.Specifically,we first formalize the definition and security models of fuzzy matching data sharing in cloud-edge environments.Then,we construct a concrete instantiation by pairing-based cryptosystem and the privacy-preserving set intersection on attribute sets from both sides to construct a concurrent matching over the policies.If the matching succeeds,the data can be decrypted.Otherwise,nothing will be revealed.In addition,FADS allows users to dynamically specify the policy for each time,which is an urgent demand in practice.A thorough security analysis demonstrates that FADS is of provable security under indistinguishable chosen ciphertext attack(IND-CCA)in random oracle model against probabilistic polynomial-time(PPT)adversary,and the desirable security properties of privacy and authenticity are achieved.Extensive experiments provide evidence that FADS is with acceptable efficiency. 展开更多
关键词 fuzzy-matching privacy-preserving set intersection cloud-edge communication data sharing
下载PDF
Robust and Efficient Data Transmission over Noisy Communication Channels Using Stacked and Denoising Autoencoders 被引量:1
14
作者 Faisal Nadeem Khan Alan Pak Tao Lau 《China Communications》 SCIE CSCD 2019年第8期82-92,共11页
We study the effects of quantization and additive white Gaussian noise(AWGN) in transmitting latent representations of images over a noisy communication channel. The latent representations are obtained using autoencod... We study the effects of quantization and additive white Gaussian noise(AWGN) in transmitting latent representations of images over a noisy communication channel. The latent representations are obtained using autoencoders(AEs). We analyze image reconstruction and classification performance for different channel noise powers, latent vector sizes, and number of quantization bits used for the latent variables as well as AEs’ parameters. The results show that the digital transmission of latent representations using conventional AEs alone is extremely vulnerable to channel noise and quantization effects. We then propose a combination of basic AE and a denoising autoencoder(DAE) to denoise the corrupted latent vectors at the receiver. This approach demonstrates robustness against channel noise and quantization effects and enables a significant improvement in image reconstruction and classification performance particularly in adverse scenarios with high noise powers and significant quantization effects. 展开更多
关键词 communication CHANNELS data compression DEEP learning autoencoders DENOISING autoencoders
下载PDF
Cooperative Communication and Cognitive Radio(3) 被引量:2
15
作者 Luo Tao,Hao Jianjun,Yue Guangxin(Beijing University of Posts and Telecommunications,Beijing 100876,P.R.China) 《ZTE Communications》 2009年第3期60-63,共4页
Cooperative communication and cognitive radio have become hot topics in recent research of communication networks, attracting a widespread attention. Cooperative communication technique can enhance the transmission ca... Cooperative communication and cognitive radio have become hot topics in recent research of communication networks, attracting a widespread attention. Cooperative communication technique can enhance the transmission capacity of a communication system, while cognitive radio technique can improve the spectrum utilization ratio. As a result, the combination of the two techniques will have a significant impact on the future wireless mobile communication system. This lecture comes in four parts. This part introduces the key technologies for cooperative communications, and the basic concept and key technologies of Cognitive Radio (CR). 展开更多
关键词 Cooperative communication and Cognitive radio IEEE OFDMA WRAN
下载PDF
Power Allocation for Cooperative Communications in Non-Orthogonal Cognitive Radio Vehicular Ad-Hoc Networks 被引量:1
16
作者 Yancheng Ji Dan Sun +1 位作者 Xiaojun Zhu Danfeng Dong 《China Communications》 SCIE CSCD 2020年第11期91-99,共9页
To achieve the better system performance for cooperative communication in non-orthogonal cognitive radio vehicular adhoc networks(CR-VANETs),this paper investigates the power allocation considering the interference to... To achieve the better system performance for cooperative communication in non-orthogonal cognitive radio vehicular adhoc networks(CR-VANETs),this paper investigates the power allocation considering the interference to the main system in a controllable range.We propose a three-slot one-way vehicle system model where the mobile vehicle nodes complete information interaction with the assistance of other independent nodes by borrowing the unused radio spectrum with the primary networks.The end-to-end SNR relationship in overlay and underlay cognitive communication system mode are analyzed by using two forwarding protocol,namely,decode-and-forward(DF)protocol and amplify-and-forward(AF)protocol,respectively.The system outage probability is derived and the optimal power allocation factor is obtained via seeking the minimum value of the approximation of system outage probability.The analytical results have been confirmed by means of Monte Carlo simulations.Simulation results show that the proposed system performance in terms of outage under the optimal power allocation is superior to that under the average power allocation,and is also better than that under other power allocation systems. 展开更多
关键词 DECODE-AND-FORWARD AMPLIFY-AND-FORWARD outage probability optimal power allocation cooperative communication cognitive radio vehicular ad-hoc networks
下载PDF
Power Versus Bandwidth Efficiency in Wireless Communications:from Economic Sustainability to Green Radio 被引量:1
17
作者 Yosef Akhtman Lajos Hanzo 《China Communications》 SCIE CSCD 2010年第2期6-15,共10页
We carry out a comprehensive analysis of a range of wireless network efficiency considerations. Firstly, we explore the properties and the implications of the power-versus bandwidth-efficiency criteria. Secondly, we p... We carry out a comprehensive analysis of a range of wireless network efficiency considerations. Firstly, we explore the properties and the implications of the power-versus bandwidth-efficiency criteria. Secondly, we perform a detailed top-down analysis of a typical commercial wireless network, which emphasizes the inherent differences between the aforementioned two efficiency metrics, while demonstrating that the appropriate choice of the network optimization criterion can have a profound effect on the overall network performance. Finally, we address the issue of resource management and its impact on the definition of the overall system efficiency. Our results suggest that no substantial area spectral efficiency gains beyond those exhibited by the 2G cellular technol- ogy may be economically achieved, and hence, no significant economic gains may be realized by simply increasing the bps/Hz bandwidth efficiency. In contrast, manifold utility and throughput gains as well as substantial Quality of Service enhancements may be attained by the appropriate combination of improved power efficiency, bandwidth expansion as well as the appropriate evolution of the networking paradigm. 展开更多
关键词 green radio economic aspects ofwireless communications bandwidth versus powerefficiency
下载PDF
The safety parameters monitoring system for the coal mine based on CAN bus communication and intelligent data acquisition 被引量:4
18
作者 Bin Guangfu Chu Wangwen +1 位作者 Balbir S. Dhillon He Wenbiao 《Engineering Sciences》 EI 2008年第4期92-96,共5页
In this paper,a monitoring and controlling system for the safety in production and environmental parameters of a small and medium-sized coal mine has been developed after analyzing the current domestic coal production... In this paper,a monitoring and controlling system for the safety in production and environmental parameters of a small and medium-sized coal mine has been developed after analyzing the current domestic coal production and security conditions. The client computer can convert the analog signal about the safety in production and environmental parameters detected from the monitoring terminal into digital signal,and then,send the signal to the coal mine safety monitoring centre. This information can be analyzed,judged,and diagnosed by the monitoring-management-controlling software for helping the manager and technical workers to control the actual underground production and security situations. The system has many advantages including high reliability,better performance of real-time monitoring,faster data communicating and good practicability,and it can effectively prevent the occurrence of safety incidents in coal mines. 展开更多
关键词 small and mediumsized coal mine safety CAN bus communication intelligent data acquisition production parameters monitoring environmental parameters monitoring
下载PDF
Cooperative Communication and Cognitive Radio (1) 被引量:1
19
作者 Luo Tao,Hao Jianjun,Yue Guangxin(Beijing University of Posts and Telecommunications,Beijing 100876,P.R.China) 《ZTE Communications》 2009年第1期59-64,共6页
Cooperative communication and cognitive radio have become hot topics in recent researches of communication networks,attracting a widespread attention.Cooperative communication technique can enhance the transmission ca... Cooperative communication and cognitive radio have become hot topics in recent researches of communication networks,attracting a widespread attention.Cooperative communication technique can enhance the transmission capacity of a communication system,while cognitive radio technique can improve the spectrum utilization ratio.As a result,the combination of the two techniques will have significant impact on the future wireless mobile communication system.This lecture comes in four parts.This part introduces the history of cooperative communication as well as several cooperation schemes. 展开更多
关键词 Cooperative communication and Cognitive radio NODE FIGURE AS
下载PDF
Cooperative Communication and Cognitive Radio (2) 被引量:1
20
作者 Luo Tao, Hao Jianjun, Yue Guangxin (Beijing University of Posts and Telecommunications, Beijing 100876, P. R. China) 《ZTE Communications》 2009年第2期61-65,共5页
Cooperative communication and cognitive radio have become hot topics in recent research of communication networks, attracting a widespread attention. Cooperative communication technique can enhance the transmission ca... Cooperative communication and cognitive radio have become hot topics in recent research of communication networks, attracting a widespread attention. Cooperative communication technique can enhance the transmission capacity of a communication system, while cognitive radio technique can improve the spectrum utilization ratio. As a result, the combination of the two techniques will have a significant impact on the future wireless mobile communication system. This lecture comes in four parts. This part analyzes the impacts of cooperative communication technology on modern wireless communication systems. 展开更多
关键词 Cooperative communication and Cognitive radio NODE CR AS
下载PDF
上一页 1 2 68 下一页 到第
使用帮助 返回顶部