期刊文献+
共找到1,151篇文章
< 1 2 58 >
每页显示 20 50 100
The Role of Social Networks as a Public Sphere During the Rise of Chinese Cybernationalism
1
作者 Deng Lian Valle de Frutos Sonia 《Journalism and Mass Communication》 2019年第4期190-202,共13页
The nationalism is gradually expanding among the Chinese internauts,but few investigations about the Chinese nationalism’s dissemination over social networks have been done.This study focuses on the structure of soci... The nationalism is gradually expanding among the Chinese internauts,but few investigations about the Chinese nationalism’s dissemination over social networks have been done.This study focuses on the structure of social networks used by the Chinese cybernationalists,and their contribution as a public sphere to the Chinese nationalism will be examined,which leads to the understanding of the informational attribute of the Chinese cybernationalism.Also,the communication model showed by the social networks will be defined,so the role of the opinion leaders during the rise of Chinese nationalism can be evaluated. 展开更多
关键词 social networks public sphere China NATIONALISM cybernationalism international communication CYBERCULTURE digital public OPINION
下载PDF
Pro-Environmental Civic Participation in the USA: The Effects of Social Media, Pro-Environmental Lifestyle and Climate Experiences
2
作者 Rita Mano 《American Journal of Climate Change》 2024年第1期31-46,共16页
This study addresses the link between social media use and pro-environmental civic participation considering the moderating effect of social media affordances (public realm) on one hand, and lifestyle behaviors and cl... This study addresses the link between social media use and pro-environmental civic participation considering the moderating effect of social media affordances (public realm) on one hand, and lifestyle behaviors and climate change experiences (personal realm) on the other. We combine communication theory and behavioral models and using a sample of USA individuals (N = 7225) based on the American Trends Panel to predict variations in pro-environmental behavior. We show that social networks rather than information are more effective in predicting pro-environmental behavior. Moreover, a pro-environmental lifestyle as well as climate change experiences at the community level increase the likelihood for pro-environmental participation. However, affordances related to socioeconomic variations generate variations to pro-environmental civic participation. We conclude that in order to capture the depth of pro-environmental civic participation, it is necessary to theoretically and empirically bridge between private and public expressions of pro-environmental awareness. 展开更多
关键词 Pro-Environmental Behavior SOCIO-ECONOMIC Digital Information Digital networks private Expressions public Expressions Climate Changes USA
下载PDF
A Review in the Core Technologies of 5G: Device-to-Device Communication, Multi-Access Edge Computing and Network Function Virtualization 被引量:2
3
作者 Ruixuan Tu Ruxun Xiang +1 位作者 Yang Xu Yihan Mei 《International Journal of Communications, Network and System Sciences》 2019年第9期125-150,共26页
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ... 5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances. 展开更多
关键词 5th Generation Network virtualIZATION Device-To-Device COMMUNICATION Base STATION Direct COMMUNICATION INTERFERENCE Multi-Access EDGE COMPUTING Mobile EDGE COMPUTING
下载PDF
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:1
4
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching Internet Protocol Security virtual private Network Video Conferencing Voice over Internet Protocol JITTER End to End Delay
下载PDF
Lifetime Optimization via Network Sectoring in Cooperative Wireless Sensor Networks 被引量:1
5
作者 Hadi Jamali Rad Bahman Abolhassani Mohammad Abdizadeh 《Wireless Sensor Network》 2010年第12期905-909,共5页
Employing cooperative communication in multihop wireless sensor networks provides the network with significant energy efficiency. However, the lifetime of such a network is directly dependant upon the lifetime of each... Employing cooperative communication in multihop wireless sensor networks provides the network with significant energy efficiency. However, the lifetime of such a network is directly dependant upon the lifetime of each of its individual sections (or clusters). Ignoring the fact that those sections close to sink have to forward more data (their own data plus the data received from the previous sections) and hence die sooner with considering equal section sizes, leads to a sub-optimal lifetime. In this paper, we optimize the section sizes of a multihop cooperative WSN so that it maximizes the network lifetime. Simulation results demonstrate a significant lifetime enhancement for the proposed optimal sectoring. 展开更多
关键词 Wireless Sensor NETWORK (WSN) COOPERATIVE COMMUNICATIONS virtual Multi-Input-Multi-Output (V-MIMO) Energy Efficiency
下载PDF
E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks
6
作者 Hossein Fereidooni Hassan Taheri Mehran Mahramian 《International Journal of Communications, Network and System Sciences》 2012年第4期228-237,共10页
Accelerating methods are used to enhance TCP performance over satellite links by employing Performance Enhancement Proxies (PEPs). However, providing a secure connection through the PEPs seems to be impossible. In thi... Accelerating methods are used to enhance TCP performance over satellite links by employing Performance Enhancement Proxies (PEPs). However, providing a secure connection through the PEPs seems to be impossible. In this paper an appropriate method is proposed in order to provide an accelerated secure E2E connection. We show an efficient secure three-party protocol, based on public key infrastructure (PKI), which provides security against spiteful adversaries. Our construction is based on applying asymmetric cryptography techniques to the original IKE protocol. Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified in detail, we cannot be certain what constitute a flaw. Proofing security properties is essential for the development of secure protocol. We give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange. Based on the results of this preliminary analysis, we have implemented a prototype of our security protocol and evaluated its performance and checked safety properties of security protocol, and the results show that the protocol is robust and safe against major security threats. 展开更多
关键词 virtual private networks (VPNs) public KEY Infrastructure Authentication Internet KEY Exchange (IKE) BAN-Logic
下载PDF
Integration of Manufacturing Services into Virtual Environments over the Internet
7
作者 Huiping Shang Zhengxu Zhao 《International Journal of Automation and computing》 EI 2004年第1期89-106,共18页
Virtual reality (VR) is a rapidly developing technology that has a wide spectrum of industrial and commercial applications. Networked (distributed or shared) virtual environments (VE) are of growing interest to modern... Virtual reality (VR) is a rapidly developing technology that has a wide spectrum of industrial and commercial applications. Networked (distributed or shared) virtual environments (VE) are of growing interest to modern manufacturing industry; a dominating use of networked virtual manufacturing environments (VMEs) is on-line visualisation and collaborative control of 3D information. This has to be supported by real-time data transfer. To meet a broad range of common requirements for Internet-based VE communications, particularly for virtual manufacturing and collaborative design and control, this paper presents a networked virtual environment system that is designed to support networked virtual design and manufacturing. The system is implemented with manufacturing message specification (MMS) standards so as to integrate a range of manufacturing services into networked VEs over the Internet. 展开更多
关键词 Distributed virtual environment networked virtual environment shared virtual environment virtual reality (VR) virtual environment (VE) virtual manufacturing virtual manufacturing device (VMD) manufacturing message specification (MMS) communication protocol
下载PDF
Effective and Extensive Virtual Private Network
8
作者 Tarek S. Sobh Yasser Aly 《Journal of Information Security》 2011年第1期39-49,共11页
A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public wh... A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public which may be non-secure network into those of a private secure network through using encrypted tunnels. This work customized a standard VPN to a newly one called EEVPN (Effective Extensive VPN). It transmits a small data size in through a web based system in a reasonable time without affecting the security level. The proposed EEVPN is more effective where it takes small data transmission time with achieving high level of security. Also, the proposed EEVPN is more extensive because it is not built for a specific environment. 展开更多
关键词 virtual private NETWORK NETWORK Security SECURE Data Transmission
下载PDF
P2P energy trading via public power networks:Practical challenges,emerging solutions,and the way forward
9
作者 Yue ZHOU Jianzhong WU Wei GAN 《Frontiers in Energy》 SCIE CSCD 2023年第2期189-197,共9页
Peer-to-peer(P2P)energy trading is an emerging energy supply paradigm where customers with distributed energy resources(DERs)are allowed to directly trade and share electricity with each other.P2P energy trading can f... Peer-to-peer(P2P)energy trading is an emerging energy supply paradigm where customers with distributed energy resources(DERs)are allowed to directly trade and share electricity with each other.P2P energy trading can facilitate local power and energy balance,thus being a potential way to manage the rapidly increasing number of DERs in net zero transition.It is of great importance to explore P2P energy trading via public power networks,to which most DERs are connected.Despite the extensive research on P2P energy trading,there has been little large-scale commercial deployment in practice across the world.In this paper,the practical challenges of conducting P2P energy trading via public power networks are identified and presented,based on the analysis of a practical Local Virtual Private Networks(LVPNs)case in North Wales,UK.The ongoing efforts and emerging solutions to tackling the challenges are then summarized and critically reviewed.Finally,the way forward for facilitating P2P energy trading via public power networks is proposed. 展开更多
关键词 distribution network local virtual private network network charges peer-to-peer(P2P)energy trading practical implementation
原文传递
因地制“仪”:新型农村社区的空间生产与乡村传播网络重构 被引量:1
10
作者 何志武 陈天明 《编辑之友》 CSSCI 北大核心 2024年第1期75-83,共9页
空间是公共生活和权力运行的基础。空间生产对于形塑可沟通性和治理有效的乡村社会意义重大。文章从空间—传播—治理的理论框架考察新农村社区的村民交往方式、传播网络以及治理模式的变迁。研究发现,以连片规划为特征的新农村社区,产... 空间是公共生活和权力运行的基础。空间生产对于形塑可沟通性和治理有效的乡村社会意义重大。文章从空间—传播—治理的理论框架考察新农村社区的村民交往方式、传播网络以及治理模式的变迁。研究发现,以连片规划为特征的新农村社区,产生了新的生活空间,新空间驯化了村民的仪式化生活,村民获得了新的身份认同;生活空间的改变拓展了村民的交往空间,丰富了村民的交往形式,进而建构了可沟通的乡村;公共空间的增加使得公告牌、光荣榜(牌)、文化墙等传统媒介重现生机,村庄—邻里同构扩大了熟人社会的范围,激活了村庄微信群,增强了村民的联结;公共交流、协商活动的增多,增强了乡村公共性,促进了邻里共同体转向村庄治理共同体。 展开更多
关键词 村庄空间生产 乡村传播网络 公共传播 乡村治理 可沟通性
下载PDF
从2B到4B——电信行业与垂直行业的供需协同倍增发展
11
作者 钟章队 官科 +1 位作者 丁建文 陈姝 《中兴通讯技术》 北大核心 2024年第S01期67-75,共9页
为更好地发展下一代移动通信技术,加快5G/6G建设,需将发力点由“面向企业”的2B(To Business)向“为了企业”的4B(For Business)转变。从2B到4B,是从供给侧主导向需求侧主导的转变,是从“供给外生赋能”向“供需内生协同”本质的转变。... 为更好地发展下一代移动通信技术,加快5G/6G建设,需将发力点由“面向企业”的2B(To Business)向“为了企业”的4B(For Business)转变。从2B到4B,是从供给侧主导向需求侧主导的转变,是从“供给外生赋能”向“供需内生协同”本质的转变。发展5G/6G公专网,需要树立全生命周期的可持续发展理念,深度理解目标企业的核心诉求,充分发挥企业的主体作用。应由垂直行业主导公专网应用的标准制定与生态建设,设计可复制、可定义的商业模式,从顶层设计开始,将数字技术融入到垂直行业数字化转型之中,实现5G/6G公专网发展从2B到4B的转变,创造电信行业与垂直行业供需协同、价值倍增的可持续发展模式。 展开更多
关键词 5G 6G 2B 4B 垂直行业 公专网
下载PDF
基于5G的专科联盟分级诊疗平台的构建与应用
12
作者 张小亮 朱佳 +1 位作者 景慎旗 王忠民 《中国数字医学》 2024年第9期33-36,56,共5页
目的:为了进一步推进医联体远程医疗协作业务向基层医疗卫生机构提供远程医疗相关服务,通过信息化手段促进资源的纵向流动,提高优质医疗资源的可及性以及医疗服务整体效率。方法:基于5G虚拟专网技术,在医联体内建立集远程会诊、远程示... 目的:为了进一步推进医联体远程医疗协作业务向基层医疗卫生机构提供远程医疗相关服务,通过信息化手段促进资源的纵向流动,提高优质医疗资源的可及性以及医疗服务整体效率。方法:基于5G虚拟专网技术,在医联体内建立集远程会诊、远程示教、远程培训、数字资源共享等多种功能为一体的远程医疗协助服务平台。结果:在医联体内部,通过移动专网的使用,医护人员能够更加便捷、安全地进行远程会诊和教学工作。结论:充分利用虚拟专网优势,实现了通信主体间高速、高可靠、低时延以及安全的信息传输,保障了远程医疗协作业务应用场景的顺利开展。 展开更多
关键词 虚拟专网 医联体建设 远程医疗 移动查房
下载PDF
面向集成的VPN解决方案
13
作者 陶志勇 阳王东 《计算机科学》 CSCD 北大核心 2024年第9期357-364,共8页
针对传统方式构建的VPN不支持承载多种数据类型、承载数据缺乏安全性、标签边缘设备负载过重等问题,提出了集成的VPN解决方案。该方案设计包含GRE VPN的建立、IPSEC VPN的建立、网络设备虚拟化、MPLS VPN的建立、私网数据的识别与隔离5... 针对传统方式构建的VPN不支持承载多种数据类型、承载数据缺乏安全性、标签边缘设备负载过重等问题,提出了集成的VPN解决方案。该方案设计包含GRE VPN的建立、IPSEC VPN的建立、网络设备虚拟化、MPLS VPN的建立、私网数据的识别与隔离5个关键步骤,实现了各VPN技术数据的嵌套与各VPN技术的相互融合,融合后的VPN既支持承载多种数据类型,又支持数据交互的安全,且能实现私网数据访问控制与地址复用,还能实现数据的负载分担。为验证方案的可行性,对方案建立的隧道、网络资源池、标签转发路径等方面进行了测试与验证,达到了预期设定的目标。为凸显方案的优势,与传统方式在背板带宽、端口速率等方面进行了对比分析。分析结果表明,该方案的背板带宽与端口速率随着资源池中设备数的增加而增长,其数据传输能力相比传统方式成倍增长,且在数据的负载分担、数据安全、可管理性与可维护性等方面优于传统方案,为构建实用、可靠、安全的VPN提供了思路。 展开更多
关键词 虚拟私有网 多协议标签交换 边界网络路由协议 虚拟化 标签边缘设备
下载PDF
基于5G行业虚拟专网的海量可调节用户侧资源互动方案
14
作者 李彬 林驿轩 +2 位作者 张鑫 文华杰 祝俊龙 《内蒙古电力技术》 2024年第5期23-27,共5页
为满足新型电力系统建设的需要,应对电力行业用户侧资源的不断扩张和结构变化,需要用户侧资源在互动时具有广连接、低时延的特点。基于上述问题,对当前用户侧可调节资源的需求进行了分析,结合5G行业虚拟专网的优势,给出了5G行业虚拟专... 为满足新型电力系统建设的需要,应对电力行业用户侧资源的不断扩张和结构变化,需要用户侧资源在互动时具有广连接、低时延的特点。基于上述问题,对当前用户侧可调节资源的需求进行了分析,结合5G行业虚拟专网的优势,给出了5G行业虚拟专网应用于用户侧资源互动领域的可行性,提出了基于5G虚拟专网的资源互动方案,通过虚拟专网配合柔性网络切片技术,实现对海量可调节用户侧资源的分区管理,从而支撑低时延、高质量和高安全性的可调节用户侧资源互动。 展开更多
关键词 5G 行业虚拟专网 用户侧可调节资源 海量资源互动
下载PDF
一种基于虚拟专用网的网络安全解决方法
15
作者 刘开芬 《软件》 2024年第7期105-107,共3页
随着信息社会化的到来,网络安全形势日益严峻。组织单位内的个人身份信息、生物识别信息、单位财务信息、商业机密等敏感信息一旦泄露,可能会导致组织单位遭受重大财产损失。本文提供一种组织内部敏感信息安全访问的解决方案,其思路是... 随着信息社会化的到来,网络安全形势日益严峻。组织单位内的个人身份信息、生物识别信息、单位财务信息、商业机密等敏感信息一旦泄露,可能会导致组织单位遭受重大财产损失。本文提供一种组织内部敏感信息安全访问的解决方案,其思路是将网络划分成三个区域,将组织单位服务器及敏感信息置于授权的虚拟专用网络中,其他区域均应通过严格的身份认证和授权方可访问授权区域,同时通过高强度的加密技术和安全传输通道实现信息的安全传输。 展开更多
关键词 网络安全 授权访问 虚拟专用网
下载PDF
中国PPP项目商业模式创新的阻碍因素及对策研究——基于社会网络分析的视角
16
作者 杜亚灵 林翔宇 《天津理工大学学报》 2024年第5期119-126,共8页
推动我国政府和社会资本合作模式(public-private-partnership,PPP)项目的商业模式创新的关键在于发现其阻碍因素并制定相应的破解对策。基于文献分析设计访谈提纲,通过对访谈资料的三级编码识别出PPP项目商业模式创新的20个阻碍因素;... 推动我国政府和社会资本合作模式(public-private-partnership,PPP)项目的商业模式创新的关键在于发现其阻碍因素并制定相应的破解对策。基于文献分析设计访谈提纲,通过对访谈资料的三级编码识别出PPP项目商业模式创新的20个阻碍因素;运用社会网络分析构建阻碍因素间的联动网络,并分析了节点度数、中间性中心度、亲密中心度等阻碍因素的联动网络特征,确定了7个关键阻碍因素:社会资本-项目运营经验不足,项目公司-合同设计欠完善、高管的作风保守、合作关系恶劣,政府部门-态度保守、过度干预、缺少政策支撑;据此提出了3条破解对策:完善PPP项目商业模式创新的政策环境、公私双方在PPP项目采购阶段做好相互选择、以按照贡献进行利益分配为核心原则设计合同。 展开更多
关键词 政府和社会资本合作模式项目 商业模式创新 阻碍因素 社会网络分析
下载PDF
虚拟电厂网络安全风险评估指标体系构建及量化计算 被引量:2
17
作者 杨珂 王栋 +3 位作者 李达 张王俊 向尕 李军 《中国电力》 CSCD 北大核心 2024年第8期130-137,共8页
提出了静态与动态风险评估相结合的多维动态网络安全风险评估指标体系。基于虚拟电厂的特点进行网络安全风险分析,构筑多维静态风险评估指标。基于攻击路径演化机理,对信息侧、物理侧和信息-物理侧进行数据采集,构筑动态风险评估指标。... 提出了静态与动态风险评估相结合的多维动态网络安全风险评估指标体系。基于虚拟电厂的特点进行网络安全风险分析,构筑多维静态风险评估指标。基于攻击路径演化机理,对信息侧、物理侧和信息-物理侧进行数据采集,构筑动态风险评估指标。提出指标量化计算方法。通过仿真实验验证本文所提的指标体系及量化计算方法能够有效评估安全性,识别风险隐患,提出有效的加固措施。 展开更多
关键词 虚拟电厂 公网与专网互动 风险评估 指标体系
下载PDF
5G技术在UHV换流站中的应用实践 被引量:2
18
作者 李永杰 陆继钊 +1 位作者 吴晨光 赵豫京 《光通信研究》 北大核心 2024年第2期131-136,共6页
【目的】为了更好地支撑特高压(UHV)站点基建管控和智能运检业务需求,国内首次将第五代移动通信技术(5G)用于UHV换流站基建现场。【方法】在实现豫南站5G网络全覆盖的基础上,搭建5G虚拟专网,部署移动边缘计算(MEC)云平台。充分考虑前期... 【目的】为了更好地支撑特高压(UHV)站点基建管控和智能运检业务需求,国内首次将第五代移动通信技术(5G)用于UHV换流站基建现场。【方法】在实现豫南站5G网络全覆盖的基础上,搭建5G虚拟专网,部署移动边缘计算(MEC)云平台。充分考虑前期基建和后期运行的需求,将智能基建工地与后期智慧换流站同步衔接,依托5G优势,融合人工智能(AI)等技术,实现了UHV基建施工现场各类数据的实时采集、统一汇聚。提供了UHV基建的远程视频监控、工程监控预警、基建现场全景呈现、安全隐患识别和专家远程辅助指导等多功能场景的5G解决方案。组织开展了智慧工地、智能巡检和智能管控类5G系列应用,开展了5G网络适配性测试。【结果】文章为豫南换流站业务应用提供了灵活、大带宽和高速率的5G通信手段。有效赋能了UHV换流站内各项业务需求,验证了5G对UHV建设与巡检类业务的承载能力,提升了管理效率,降低了运维成本。【结论】5G在UHV豫南换流站的成功应用,提供了5G+能源互联网的典型UHV变电站解决方案,验证了5G在电力行业的可行性,推动了5G在电力场景的深化应用。 展开更多
关键词 第五代移动通信技术 特高压 虚拟专网 智慧工地 智能巡检
下载PDF
面向电力物联网的轻量化5G通信关键技术研究 被引量:3
19
作者 康守信 王贤辉 +4 位作者 李铮 冯相龙 邵志勇 李松 王学清 《电力科学与工程》 2024年第4期12-20,共9页
新一代5G通信技术在电力物联网应用中存在功耗和成本居高的问题,所以轻量化5G通信关键技术的相关研究具有重要意义。分析了电力5G典型业务场景需求及电力5G技术演进。重点探讨了轻量化5G终端的复杂度、成本、功耗以及安全性。结合国内... 新一代5G通信技术在电力物联网应用中存在功耗和成本居高的问题,所以轻量化5G通信关键技术的相关研究具有重要意义。分析了电力5G典型业务场景需求及电力5G技术演进。重点探讨了轻量化5G终端的复杂度、成本、功耗以及安全性。结合国内主流商用5G网络,分析了轻量化5G峰值速率与电力物联网业务需求匹配特性。对轻量化5G在电力行业应用的演进方向展开了讨论。最后,分析了轻量化5G在电力物联网中部署典型应用案例。 展开更多
关键词 5G通信 轻量化5G 电力物联网 虚拟专网 新型电力系统
下载PDF
城市轨道交通5G公专网无线覆盖方案研究
20
作者 刘为俊 《城市轨道交通研究》 北大核心 2024年第4期206-210,215,共6页
[目的]城市轨道交通5G公专网是5G公网在城市轨道交通行业的垂直应用,其无线覆盖方案与5G公网仅需满足公众乘客对移动通信的需求存在较大差异。因此需研究城市轨道交通5G公专网无线覆盖方案。[方法]以城市轨道交通无线通信业务需求为前提... [目的]城市轨道交通5G公专网是5G公网在城市轨道交通行业的垂直应用,其无线覆盖方案与5G公网仅需满足公众乘客对移动通信的需求存在较大差异。因此需研究城市轨道交通5G公专网无线覆盖方案。[方法]以城市轨道交通无线通信业务需求为前提,针对城市轨道交通的复杂应用环境,明确了5G公专网无线覆盖范围,提出了不同应用场景下无线覆盖技术指标要求;设计了隧道区域、地面区域和室内区域不同场景下的无线覆盖方式;探讨了无线网络容量优化和覆盖优化措施。[结果及结论]所形成的以业务需求为导向的城市轨道交通5G公专网无线覆盖方案是全场景、连续性的解决方案。城市轨道交通5G公专网无线覆盖方案还应统筹考虑运营商不同制式、多频段无线系统共建共享及系统之间干扰问题,以为城市轨道交通用户提供良好的5G公专网服务。 展开更多
关键词 城市轨道交通 5G公专网 无线覆盖 业务需求 网络优化
下载PDF
上一页 1 2 58 下一页 到第
使用帮助 返回顶部