期刊文献+
共找到637篇文章
< 1 2 32 >
每页显示 20 50 100
基于SCADA-DCS通讯技术的油气开采数据自动化采集与控制系统
1
作者 张强 陈锐 +1 位作者 杜永红 马潇 《自动化与仪表》 2024年第4期52-55,60,共5页
设计基于SCADA-DCS通讯技术的油气开采数据自动化采集与控制系统。系统以SCADA服务器为上层监控服务器,通过与井站现场仪器仪表实时通信,监控整个开采过程。当油气缓冲罐液位越限时,SCADA服务器自动下达指令至原油处理站DCS,启动基于智... 设计基于SCADA-DCS通讯技术的油气开采数据自动化采集与控制系统。系统以SCADA服务器为上层监控服务器,通过与井站现场仪器仪表实时通信,监控整个开采过程。当油气缓冲罐液位越限时,SCADA服务器自动下达指令至原油处理站DCS,启动基于智能PID的油泵控制器,调节油泵变频器,控制油气液位不溢出。系统使用SCADA-DCS通讯技术的MODBUS通信协议,并根据通信中断优先级分配方法,确保对中断处理时间要求高的通信请求能实时响应。实验结果表明,该系统能提升油气液位控制和紧急信息通讯效率。 展开更多
关键词 SCADA-dcs通讯 油气开采 数据自动化采集 控制系统 MODBUS通讯协议 智能PID
下载PDF
Distributed Weighted Data Aggregation Algorithm in End-to-Edge Communication Networks Based on Multi-armed Bandit 被引量:1
2
作者 Yifei ZOU Senmao QI +1 位作者 Cong'an XU Dongxiao YU 《计算机科学》 CSCD 北大核心 2023年第2期13-22,共10页
As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when ... As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when learning agents are deployed on the edge side,the data aggregation from the end side to the designated edge devices is an important research topic.Considering the various importance of end devices,this paper studies the weighted data aggregation problem in a single hop end-to-edge communication network.Firstly,to make sure all the end devices with various weights are fairly treated in data aggregation,a distributed end-to-edge cooperative scheme is proposed.Then,to handle the massive contention on the wireless channel caused by end devices,a multi-armed bandit(MAB)algorithm is designed to help the end devices find their most appropriate update rates.Diffe-rent from the traditional data aggregation works,combining the MAB enables our algorithm a higher efficiency in data aggregation.With a theoretical analysis,we show that the efficiency of our algorithm is asymptotically optimal.Comparative experiments with previous works are also conducted to show the strength of our algorithm. 展开更多
关键词 Weighted data aggregation End-to-edge communication Multi-armed bandit Edge intelligence
下载PDF
Secure vehicular data communication in Named Data Networking
3
作者 Xiaonan Wang Xilan Chen Xingwei Wang 《Digital Communications and Networks》 SCIE CSCD 2023年第1期203-210,共8页
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data N... Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives. 展开更多
关键词 Named data networking Reverse path Secure data communication
下载PDF
Reliable transmission of consultative committee for space data systems file delivery protocol in deep space communication 被引量:7
4
作者 Hui Li Hao Luo Faxin Yu Zheming Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期349-354,共6页
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac... In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification. 展开更多
关键词 deep space communication consultative committee for space data systems (CCSDS) CCSDS file delivery protocol (CFDP) RELIABLE delay.
下载PDF
Create Your Own Data and Energy Integrated Communication Network:A Brief Tutorial and a Prototype System 被引量:2
5
作者 Yali Zheng Yitian Zhang +2 位作者 Yang Wang Jie Hu Kun Yang 《China Communications》 SCIE CSCD 2020年第9期193-209,共17页
In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The... In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation. 展开更多
关键词 data and energy integrated communication network(DEIN) wireless power transfer(WPT) simultaneously wireless information and power transfer(SWIPT) RF charging hardware implementation
下载PDF
工业加热电炉高耗电异常DCS数据主动采集技术研究
6
作者 江御龙 张涛 +2 位作者 刘永春 张高山 蔡华 《工业加热》 CAS 2024年第7期39-44,共6页
工业加热电炉在运行过程中容易出现高耗电现象,且异常用电数据产生的频率较高、数据量较大,使得对异常数据的采集效率降低。为此,提出工业加热电炉高耗电异常分布式控制系统数据主动采集技术研究。利用局部平均值计算工业加热缺失DCS数... 工业加热电炉在运行过程中容易出现高耗电现象,且异常用电数据产生的频率较高、数据量较大,使得对异常数据的采集效率降低。为此,提出工业加热电炉高耗电异常分布式控制系统数据主动采集技术研究。利用局部平均值计算工业加热缺失DCS数据,采用拉格朗日插值法对其插补,对插补后的数据标准化处理。构建用电不平衡特征矩阵,采用局部离群因子检测算法,提取出用电异常数据特征集,构建基于长短期记忆网络(long short-term memory,简称LSTM)的分位数回归模型,实现工业电炉异常DCS数据的主动采集。实验结果表明,所提方法有效地提高了采集效率和采集精度,采集平均用时仅为029ms,其准确率-召回率在98%以上。 展开更多
关键词 工业加热电炉dcs数据 数据采集 异常特征 LSTM回归模型
下载PDF
Federated Learning on Internet of Things:Extensive and Systematic Review
7
作者 Meenakshi Aggarwal Vikas Khullar +4 位作者 Sunita Rani Thomas AndréProla Shyama Barna Bhattacharjee Sarowar Morshed Shawon Nitin Goyal 《Computers, Materials & Continua》 SCIE EI 2024年第5期1795-1834,共40页
The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and ... The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT. 展开更多
关键词 Internet of Things federated learning PRISMA framework of FL applications of FL data privacy communication
下载PDF
Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Application
8
作者 Ibraheem Al-Hejri Farag Azzedin +1 位作者 Sultan Almuhammadi Naeem Firdous Syed 《Computers, Materials & Continua》 SCIE EI 2024年第6期4197-4218,共22页
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ... The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes. 展开更多
关键词 IoT LIGHTWEIGHT computation complexity communication overhead cybersecurity threats threat prevention secure data transmission Wireless Sensor Networks(WSNs) elliptic curve cryptography
下载PDF
Model-based predictive controller design for a class of nonlinear networked systems with communication delays and data loss
9
作者 安宝冉 刘国平 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第8期211-216,共6页
This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems,... This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems, the model-based networked predictive control strategy can compensate for communication delay and data loss in an active way. The designed model-based predictive controller can also guarantee the stability of the closed-loop networked system. The simulation re- suits demonstrate the feasibility and efficacy of the proposed model-based predictive controller design scheme. 展开更多
关键词 communication delays data loss model-based networked predictive control
下载PDF
利用DCS系统网络实现炼化企业固定污染源在线监测数据上传 被引量:1
10
作者 张建军 《中国仪器仪表》 2024年第1期45-49,共5页
针对炼化企业污染排放特点及环保监管需求,本文重点介绍如何利用DCS系统网络实现固定污染源在线监测数据上传,并对在线监测在实际运用中平台数据显示离线等故障现象进行解析。
关键词 污染源 烟气连续排放监测系统 数采仪 dcs系统
下载PDF
Design of Power Communication Data Network Management System and Implementation of Data Acquisition Module
11
作者 Yue Zhang Zefeng Jian Hao Wang 《Journal of Electronic Research and Application》 2021年第6期1-5,共5页
The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network managem... The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network management architecture of the power communication data network and the implementation of the data acquisition module in the network management system through theoretical analysis,for the reference of relevant personnel,in order to better promote the collection of power grid communication network data. 展开更多
关键词 Electric power communication Network management system design data acquisition
下载PDF
DCS控制系统在工业自动化中的应用研究
12
作者 刘国防 《今日自动化》 2024年第5期3-5,共3页
DCS控制系统在工业自动化中的应用是通过将计算机技术和控制技术相结合,运用集中控制的方式,对工业自动化进行控制,使其能够满足工业生产过程中的需求。DCS控制系统在工业自动化中的应用,能够保证工业生产过程中各个环节之间的协调合作... DCS控制系统在工业自动化中的应用是通过将计算机技术和控制技术相结合,运用集中控制的方式,对工业自动化进行控制,使其能够满足工业生产过程中的需求。DCS控制系统在工业自动化中的应用,能够保证工业生产过程中各个环节之间的协调合作,使其在进行操作和管理时更加方便和高效。文章分析了DCS控制系统在工业自动化中应用的意义,探讨了DCS控制系统在工业自动化中的具体应用,以及应用中应该注意的问题,以供参考。 展开更多
关键词 dcs控制系统 工业自动化 数据采集 数据库
下载PDF
核电厂智能化DCS数据管理系统建设
13
作者 卢俊 《仪器仪表用户》 2024年第3期80-82,85,共4页
本文针对福清核电DCS系统,因不同平台的技术差异,图纸、组态和接口数据量大,文件复杂,使用和管理过程效率低下,人因风险高。基于此,提出了一种以面向内容为核心,以计算机数据库技术为基本方法,依托设计输入文件和运行过程数据,构建要素... 本文针对福清核电DCS系统,因不同平台的技术差异,图纸、组态和接口数据量大,文件复杂,使用和管理过程效率低下,人因风险高。基于此,提出了一种以面向内容为核心,以计算机数据库技术为基本方法,依托设计输入文件和运行过程数据,构建要素间普遍联系的DCS数据管理系统。有效梳理了相关业务所需要的各类数据和文件的获取与处理方式,实现数据组织、图纸与组态数据的精确关联,并设计和建设了一站式检索平台,对数据和图纸进行深度分析,实现自动化风险提示的变更管理,以服务于现场执行控制系统相关工作和检查的各个过程。本文详细论述了需求分析和项目建设办法,为类似项目的建设、维护提供经验。 展开更多
关键词 dcs 数据处理 变更管理 组态数据 逻辑图 信号流图 通信
下载PDF
Green indoor optical wireless communication systems:Pathway towards pervasive deployment 被引量:2
14
作者 C.Jenila R.K.Jeyachitra 《Digital Communications and Networks》 SCIE CSCD 2021年第3期410-444,共35页
The Optical Wireless Communication(OWC)offers the high capacity of optical fiber communication with the flexibility of wireless communication.Since it works in the optical region of the ElectroMagnetic(EM)spectrum,it ... The Optical Wireless Communication(OWC)offers the high capacity of optical fiber communication with the flexibility of wireless communication.Since it works in the optical region of the ElectroMagnetic(EM)spectrum,it guarantees safety and security which are critical in radio and microwave frequency communication.The principal objective of this paper is to analyze the indoor OWC systems on these guaranteed features,and safety and security are jointly denoted by the term green.The high obstacle impermeability of optical signals and their directivity strengthen the security of indoor OWC data transmission.The confidentiality and authenticity of optical wireless data can also be preserved with the Quantum Key Distribution(QKD).This paper provides a technological overview and a review of literature about the OWC system that helps to identify the challenges in the path of a ubiquitous deployment of green wireless communication systems.Significant advancements in the sources and detectors are discussed together with the coding,modulation and multiplexing techniques for making highly robust OWC links.The ubiquitous deployment of green OWC necessitates the development of optical transmitters and receivers,performance enhancement techniques,incorporation of uplink and energy harvesting abilities,and safety and security enhancement techniques.Hence,a special emphasis is placed on these aspects and their challenges towards the green implementation.Furthermore,the paper explores some significant indoor applications based on the OWC that have great impacts on the Next Generation Networks(NGN)and the Internet of Things(IoT). 展开更多
关键词 data rate Energy efficiency Green communication Infrared communication Optical wireless communication Visible light communication
下载PDF
DCGAN Based Spectrum Sensing Data Enhancement for Behavior Recognition in Self-Organized Communication Network 被引量:3
15
作者 Kaixin Cheng Lei Zhu +5 位作者 Changhua Yao Lu Yu Xinrong Wu Xiang Zheng Lei Wang Fandi Lin 《China Communications》 SCIE CSCD 2021年第11期182-196,共15页
Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately ... Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately analyze the communication behavior.Traditional means can hardly utilize the scarce and crude spectrum sensing data captured in a real scene.Thus,communication behavior recognition using raw sensing data under smallsample condition has become a new challenge.In this paper,a data enhanced communication behavior recognition(DECBR)scheme is proposed to meet this challenge.Firstly,a preprocessing method is designed to make the raw spectrum data suitable for the proposed scheme.Then,an adaptive convolutional neural network structure is exploited to carry out communication behavior recognition.Moreover,DCGAN is applied to support data enhancement,which realize communication behavior recognition under small-sample condition.Finally,the scheme is verified by experiments under different data size.The results show that the DECBR scheme can greatly improve the accuracy and efficiency of behavior recognition under smallsample condition. 展开更多
关键词 spectrum sensing communication behavior recognition small-sample data enhancement selforganized network
下载PDF
Achieving Fuzzy Matching Data Sharing for Secure Cloud-Edge Communication 被引量:2
16
作者 Chuan Zhang Mingyang Zhao +4 位作者 Yuhua Xu Tong Wu Yanwei Li Liehuang Zhu Haotian Wang 《China Communications》 SCIE CSCD 2022年第7期257-276,共20页
In this paper,we propose a novel fuzzy matching data sharing scheme named FADS for cloudedge communications.FADS allows users to specify their access policies,and enables receivers to obtain the data transmitted by th... In this paper,we propose a novel fuzzy matching data sharing scheme named FADS for cloudedge communications.FADS allows users to specify their access policies,and enables receivers to obtain the data transmitted by the senders if and only if the two sides meet their defined certain policies simultaneously.Specifically,we first formalize the definition and security models of fuzzy matching data sharing in cloud-edge environments.Then,we construct a concrete instantiation by pairing-based cryptosystem and the privacy-preserving set intersection on attribute sets from both sides to construct a concurrent matching over the policies.If the matching succeeds,the data can be decrypted.Otherwise,nothing will be revealed.In addition,FADS allows users to dynamically specify the policy for each time,which is an urgent demand in practice.A thorough security analysis demonstrates that FADS is of provable security under indistinguishable chosen ciphertext attack(IND-CCA)in random oracle model against probabilistic polynomial-time(PPT)adversary,and the desirable security properties of privacy and authenticity are achieved.Extensive experiments provide evidence that FADS is with acceptable efficiency. 展开更多
关键词 fuzzy-matching privacy-preserving set intersection cloud-edge communication data sharing
下载PDF
Robust and Efficient Data Transmission over Noisy Communication Channels Using Stacked and Denoising Autoencoders 被引量:1
17
作者 Faisal Nadeem Khan Alan Pak Tao Lau 《China Communications》 SCIE CSCD 2019年第8期82-92,共11页
We study the effects of quantization and additive white Gaussian noise(AWGN) in transmitting latent representations of images over a noisy communication channel. The latent representations are obtained using autoencod... We study the effects of quantization and additive white Gaussian noise(AWGN) in transmitting latent representations of images over a noisy communication channel. The latent representations are obtained using autoencoders(AEs). We analyze image reconstruction and classification performance for different channel noise powers, latent vector sizes, and number of quantization bits used for the latent variables as well as AEs’ parameters. The results show that the digital transmission of latent representations using conventional AEs alone is extremely vulnerable to channel noise and quantization effects. We then propose a combination of basic AE and a denoising autoencoder(DAE) to denoise the corrupted latent vectors at the receiver. This approach demonstrates robustness against channel noise and quantization effects and enables a significant improvement in image reconstruction and classification performance particularly in adverse scenarios with high noise powers and significant quantization effects. 展开更多
关键词 communication CHANNELS data compression DEEP learning autoencoders DENOISING autoencoders
下载PDF
A Message Transmission Protocol of a Mobile Data Communication Network
18
作者 顾学迈 郭庆 刘忠 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1996年第4期16-20,共5页
AMessageTransmissionProtocolofaMobileDataCommunicationNetworkGUXuemai;GUOQing;LIUZhong(顾学迈)(郭庆)(刘忠)(Research... AMessageTransmissionProtocolofaMobileDataCommunicationNetworkGUXuemai;GUOQing;LIUZhong(顾学迈)(郭庆)(刘忠)(ResearchInstituteofCommun... 展开更多
关键词 ss: data communication MOBILE communication PROTOCOL
下载PDF
Coati Optimization-Based Energy Efficient Routing Protocol for Unmanned Aerial Vehicle Communication 被引量:1
19
作者 Hanan Abdullah Mengash Hamed Alqahtani +5 位作者 Mohammed Maray Mohamed K.Nour Radwa Marzouk Mohammed Abdullah Al-Hagery Heba Mohsen Mesfer Al Duhayyim 《Computers, Materials & Continua》 SCIE EI 2023年第6期4805-4820,共16页
With the flexible deployment and high mobility of Unmanned Aerial Vehicles(UAVs)in an open environment,they have generated con-siderable attention in military and civil applications intending to enable ubiquitous conn... With the flexible deployment and high mobility of Unmanned Aerial Vehicles(UAVs)in an open environment,they have generated con-siderable attention in military and civil applications intending to enable ubiquitous connectivity and foster agile communications.The difficulty stems from features other than mobile ad-hoc network(MANET),namely aerial mobility in three-dimensional space and often changing topology.In the UAV network,a single node serves as a forwarding,transmitting,and receiving node at the same time.Typically,the communication path is multi-hop,and routing significantly affects the network’s performance.A lot of effort should be invested in performance analysis for selecting the optimum routing system.With this motivation,this study modelled a new Coati Optimization Algorithm-based Energy-Efficient Routing Process for Unmanned Aerial Vehicle Communication(COAER-UAVC)technique.The presented COAER-UAVC technique establishes effective routes for communication between the UAVs.It is primarily based on the coati characteristics in nature:if attacking and hunting iguanas and escaping from predators.Besides,the presented COAER-UAVC technique concentrates on the design of fitness functions to minimize energy utilization and communication delay.A varied group of simulations was performed to depict the optimum performance of the COAER-UAVC system.The experimental results verified that the COAER-UAVC technique had assured improved performance over other approaches. 展开更多
关键词 Artificial intelligence unmanned aerial vehicle data communication routing protocol energy efficiency
下载PDF
Application Research on Space Laser Communication in Bistatic Radar System
20
作者 李晓萍 韩绍坤 郝小宁 《Journal of Beijing Institute of Technology》 EI CAS 2003年第1期19-22,共4页
There exist three synchronizing problems in the bistatic radar system that some signals of the radar receiver must be synchronized with those of the radar transmitter. Several methods realizing data transmission, whic... There exist three synchronizing problems in the bistatic radar system that some signals of the radar receiver must be synchronized with those of the radar transmitter. Several methods realizing data transmission, which are used to complete the synchronization existing in the bistatic radar system, are described. Then a new idea is brought forward that employs space laser communication in the bistatic radar system to realize its data transmission. The theoretic analysis of the idea's usability and its merits are discussed in details. Finally the latest development of space laser communication is introduced, and the utility of the idea is pointed out further. 展开更多
关键词 space laser communication bistatic radar system data transmission channel data transmission trigger pulse radio frequency
下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部