期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
电话网上的数据通信(3)
1
作者 李朝举 《电信技术》 北大核心 1989年第6期35-37,共3页
关键词 电话网 数通通信 通信
下载PDF
数据信号电平
2
作者 赵敏生 《电信技术》 北大核心 1989年第7期34-36,共3页
关键词 据信号电平 数通通信 通信
下载PDF
衰减频率失真和群时延失真的均衡(上)
3
作者 赵敏生 《电信技术》 北大核心 1989年第9期33-35,共3页
关键词 衰减频率失真 群时延失真 数通通信
下载PDF
相位抖动
4
作者 赵敏生 《电信技术》 北大核心 1989年第12期43-45,共3页
关键词 相位抖动 数通通信
下载PDF
Dynamics and circuit implementation of three simplified chaotic systems 被引量:1
5
作者 孙克辉 王艳丽 朱从旭 《Journal of Central South University》 SCIE EI CAS 2013年第3期663-669,共7页
To improve the performance of chaotic secure communication,three simplified chaotic systems with one variable parameter were investigated.Basic properties were analyzed including symmetry,dissipation and topological s... To improve the performance of chaotic secure communication,three simplified chaotic systems with one variable parameter were investigated.Basic properties were analyzed including symmetry,dissipation and topological structure.Complex dynamical behaviors of the systems including chaos and periodic orbits were verified by numerical simulations,Lyapunov exponents and bifurcation diagrams.Interestingly,the three systems were integrated in a common circuit,and their dynamical behaviors were easily observed by adjusting regulable resistors R28,R14 and R17,respectively,and the relations between the variable resistor and the system parameter were deduced.The circuit experiment results agree well with the simulation results.Finally,a secure communication scheme based on chaos shift keying(CSK) was presented,which lays an experiment foundation for chaotic digital secure communication. 展开更多
关键词 CHAOS single-parameter system circuit realization secure communication chaos shift keying
下载PDF
Analysis of OFDM Applied to Powerline High Speed Digital Communication 被引量:1
6
作者 庄建 杨公训 《Journal of China University of Mining and Technology》 2003年第2期174-178,共5页
The low voltage powerline is becoming a powerful solution to home network, building automation, and internet access as a result of its wide distribution, easy access and little maintenance. The character of powerline ... The low voltage powerline is becoming a powerful solution to home network, building automation, and internet access as a result of its wide distribution, easy access and little maintenance. The character of powerline channel is very complicated because it is an open net. This article analysed the character of the powerline channel,introduced the basics of OFDM(Orthogonal Frequency Division Multiplexing), and studied the OFDM applied into powerline high speed digital communication. 展开更多
关键词 powerline carrier communication OFDM high speed digital communication
下载PDF
Design and Implementation of GPS Vehicle Navigation and Guidance System 被引量:1
7
作者 任炳忠 孔文焕 《Journal of Measurement Science and Instrumentation》 CAS 2010年第2期157-160,共4页
The urban traffic information manageanent has become an important way of solving traffic jam of cities. With the wider use of the third generation of mobile conmmunication (3G) networks, information management based... The urban traffic information manageanent has become an important way of solving traffic jam of cities. With the wider use of the third generation of mobile conmmunication (3G) networks, information management based on 3G will be a central issue of application. The paper designs a fi-amework of Global Posititoning System (GPS) vehicle navigating and guiding system using 3G mobile network and Glbal Information System (GIS) electronic map according to moving objects. It discusses moving object's time-space attrihltes which will be described by a five-field and a directed graph. It analyzes the GPS mobile apparatus' s software functions and hardware structures. Anti it improves the function of GPS mobile apparatus which provide the guiding function utilizing the shared information of traffic. The navigation based on the shortest path algortithm is been advanced to one based on the real-time traffic flow of moving objects, which help people travelling on roads more convenietly. 展开更多
关键词 moving objects urban informatization global positioning system intelligent transport system
下载PDF
The improved CFDAMA protocol with predictive request strategy via satellite
8
作者 周熙 贾世楼 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第3期287-290,共4页
The novel satellite Multiple Access scheme called Combined Free/Demand Assignment Multiple Access-Predictive Request (CFDAMA-PR) is proposed in this paper. In the CFDAMA-PR scheme, the ground station requests the dema... The novel satellite Multiple Access scheme called Combined Free/Demand Assignment Multiple Access-Predictive Request (CFDAMA-PR) is proposed in this paper. In the CFDAMA-PR scheme, the ground station requests the demand assignment slots by predicting the positive varying trend of the traffic source. The delay performances between CFDAMA-PR and CFDAMA-RR (Round Robin request) schemes were compared by computer simulation. Simulations were carried out with the Interrupted Poisson Process (IPP) and the Interrupted Fluid Process (IFP) traffic models. Simulation results demonstrate that compared to CFDAMA-RR protocol, the CFDAMA-PR scheme achieves a better delay/throughput of satellite channel. 展开更多
关键词 CFDAMA-PR CFDAMA-RR IPP traffic IFP traffic
下载PDF
Generalized bounds on the partial periodic correlation of complex roots of unity sequence set
9
作者 Li-fang FENG 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第2期207-210,共4页
In this paper,the generalized bounds are derived on the partial periodic correlation of complex roots of unity sequence set with zero or low correlation zone(ZCZ/LCZ)as the important criteria of the sequence design an... In this paper,the generalized bounds are derived on the partial periodic correlation of complex roots of unity sequence set with zero or low correlation zone(ZCZ/LCZ)as the important criteria of the sequence design and application.The derived bounds are with respect to family size,subsequence length,maximum partial autocorrelation sidelobe,maximum partial cross-correlation value and the ZCZ/LCZ.The results show that the derived bounds include the previous periodic bounds,such as Sarwate bound,Welch bound,Peng-Fan bound and Paterson-Lothian bound,as special cases. 展开更多
关键词 Partial correlation Zero correlation zone (ZCZ) Low correlation zone (LCZ) CDMA
下载PDF
An Improved Scalar Costa Scheme Based on Watson Perceptual Model
10
作者 齐开悦 陈剑波 周异 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期26-29,共4页
An improved scalar Costa scheme (SCS) was proposed by using improved Watson perceptual model to adaptively decide quantization step size and scaling factor. The improved scheme equals to embed hiding data based on an ... An improved scalar Costa scheme (SCS) was proposed by using improved Watson perceptual model to adaptively decide quantization step size and scaling factor. The improved scheme equals to embed hiding data based on an actual image. In order to withstand amplitude scaling attack, the Watson perceptual model was redefined, and the improved scheme using the new definition can insure quantization step size in decoder that is proportional to amplitude scaling attack factor. The performance of the improved scheme outperforms that of SCS with fixed quantization step size. The improved scheme combines information theory and visual model. 展开更多
关键词 information hiding scalar costa scheme perceptual model quantization step size
下载PDF
Statistical Multiplexing of Video Traffic and Data Traffic
11
作者 黄晓东 周源华 +1 位作者 张容福 周军 《Journal of Donghua University(English Edition)》 EI CAS 2005年第4期83-90,共8页
This paper studies statistical multiplexing performance by input of video traffic and data traffic. The inputs have different Qos requirements such as loss and delay jitter. By applying a modified FBM model, we presen... This paper studies statistical multiplexing performance by input of video traffic and data traffic. The inputs have different Qos requirements such as loss and delay jitter. By applying a modified FBM model, we present methods to estimate effective bandwidth of the aggregated traffic. Simulations were performed to evaluate effective bandwidth. The comparison between the estimation and the simulation shows that the estimations can give correct data for the effective bandwidths in terms of our interests. The analysis of gain by using priority multiplexing also addresses proper Qos configuration for the inputs in order to achieve positive gains. 展开更多
关键词 statistical multiplexing video traffic QOS long-range dependent delay jitter effective bandwidth.
下载PDF
Digital Beamforming by Multiple Chirp Zeta Transforms for 3-D Sonar Imaging Systems
12
作者 袁龙涛 田翔 +1 位作者 韩业强 陈耀武 《Journal of Donghua University(English Edition)》 EI CAS 2012年第5期373-379,共7页
The computational load is prohibitive for real-time image generation in 3-D sonar systems, particularly when the steering angle approximation is required. In this paper, a novel multiple Chirp Zeta Transforms (MCZT)... The computational load is prohibitive for real-time image generation in 3-D sonar systems, particularly when the steering angle approximation is required. In this paper, a novel multiple Chirp Zeta Transforms (MCZT) beamforming method in frequency domain is being proposed. The single long-length Chirp Zeta Transform (CZT) in the original CZT beamforming is replaced by several CZTs with smaller lengths for different partitions along each dimension. The implementing routine of the algorithm is also optimized. Furthermore, an avenue to evaluate the estimating error for the angle approximation in 3-D imaging applications is presented, and an approach to attain valid partitions for the steering angles is also flhistrated. This paper demonstrates a few advantages of the proposed frequency-domain beamforming method over existing methods in terms of the computatianal complexity. 展开更多
关键词 3-D sonar imaging frequency-domain beamforming angle approximation Chirp Zeta Transform CZT steering angle partitions computational load evaluation
下载PDF
A cross-layer design approach on spectrum allocation and resource scheduling in cognitive PMP networks
13
作者 Jie CHEN Min-jian ZHAO +1 位作者 Qiao ZHOU Shi-ju LI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第4期435-444,共10页
We propose the spectrum allocation and resource scheduling algorithms in cognitive point to multipoint (PMP) networks with rapid changes of spectrum opportunities and present a media access control (MAC) protocol base... We propose the spectrum allocation and resource scheduling algorithms in cognitive point to multipoint (PMP) networks with rapid changes of spectrum opportunities and present a media access control (MAC) protocol based on these algorithms. The objective of spectrum allocation is to make efficient use of the spectrum while maintaining the transceiver synchronization on frequency and time in the network. The objective of resource scheduling is to guarantee the quality of service (QoS) requirements of different kinds of connections and to minimize the total energy consumption in the network as well. By sensing only a small set of possible channels in each slot based on the state transition probability of each channel, our spectrum allocation algorithm achieves high spectrum efficiency in the network. The resource scheduling problem is divided into three sub problems and we derive optimal solutions to these problems by greedy algorithm and convex optimization. The simulation results show that our algorithm can make efficient use of the spectrum and the network resources at a cost of low computational complexity. 展开更多
关键词 Cognitive point to multipoint (PMP) networks Markov process Cross-layer design Convex optimization
下载PDF
Achieving Efficient Channel Utilization for Data Communications in IEEE 802.11 WLAN
14
作者 张亮 舒炎泰 《Transactions of Tianjin University》 EI CAS 2005年第6期422-427,共6页
In the IEEE g02. 11 protocol, the adoption of the exponential backoff technique leads to throughput performance strongly dependent on the initial contention window size and, most importantly, on the number of contendi... In the IEEE g02. 11 protocol, the adoption of the exponential backoff technique leads to throughput performance strongly dependent on the initial contention window size and, most importantly, on the number of contending stations considered in the network. This paper proposes a simple but accurate method to dynamically estimate the number of contending stations in a wireless local area network ( WLAN ). Based on estimation, all the mobile stations dynamically adjust the initial contention window in medium access control ( MAC ) layer to avoid collisions. The simulation results show that the proposed algorithm can achieve efficient channel utilization, higher system throughput, and better fairness performance. 展开更多
关键词 IEEE 802.11 wireless local area network( WLAN distributed coordination function DCF
下载PDF
Multicast Routing in Satellite Network
15
作者 郭惠玲 宋姝 +2 位作者 李磊 刘志涛 郭鹏程 《Journal of China University of Mining and Technology》 2004年第1期61-63,共3页
There are some problems in the dual-layer satellite MPLs metworks to be composed of LEO and MEO. In order to solve the problems, this paper presents a plan by means of unicast LSP to implement multicast in the dual-la... There are some problems in the dual-layer satellite MPLs metworks to be composed of LEO and MEO. In order to solve the problems, this paper presents a plan by means of unicast LSP to implement multicast in the dual-layer satellite MPLs networks. It has advantages of saving space and reducing extra charge. 展开更多
关键词 satellite network low earch orbit(LEO)/medium earth orbit(MEO) multicast routing MPLS
下载PDF
An effective PN blind estimation reconstruction strategy to solve data reversions interference
16
作者 张一 Zhang Zhongzhao 《High Technology Letters》 EI CAS 2007年第2期169-172,共4页
In a direct spectrum (DS) system, the PN code can be estimated by analyzing the singular vectors of the received data matrix in order to blind despread in a non-cooperative context. But as there are informa-tion dat... In a direct spectrum (DS) system, the PN code can be estimated by analyzing the singular vectors of the received data matrix in order to blind despread in a non-cooperative context. But as there are informa-tion data reversions in the analyzed data matrix, some parts of the estimated PN code may be invertible to the original PN code, which may bring about problems in the following despreading process. In order to solve this problem, a method to well reconstruct the PN code is proposed. This method is based on power detection. The combination scheme which has the maximum power is the best combination scheme that is most suitable to the original PN code. Simulation results show that the method can reconstruct the PN code very well,even if the signal-to-noise ratio is low. 展开更多
关键词 blind despread singular vector estimation power detection
下载PDF
Mathematical Analysis of Energy Efficiency in IEEE 802.11 DCF
17
作者 高波 杨宇航 马惠业 《Transactions of Tianjin University》 EI CAS 2005年第5期332-337,共6页
The standardized IEEE ,802. II distributed coordination function ( DCF) provides a contention-based distributed channel access mechanism for mobile stations to share the wireless medium. However, when stations are m... The standardized IEEE ,802. II distributed coordination function ( DCF) provides a contention-based distributed channel access mechanism for mobile stations to share the wireless medium. However, when stations are mobile or portable units, power consumption becomes a primary issue since terminals are usually battery driven. This paper proposes an analytical model that calculates the energy efficiency of both the basic and the RTS/CTS access mechanisms of the IEEE 802. II protocol. The model is validated with simulation results using NS-2 simulation package. The effects of the network size, the average packet length, the initial contention window and maximum backoff stages on the energy efficiency of both access mechanisms are also investigated. Results show that the basic scheme has low energy efficiency at large packet length and large network size, and depends strongly on the number of stations and the backoff procedure parameters. Conversely, the RTS/CTS mechanism provides higher energy efficiency when the network size is large, and is more robust to variations in the backoff procedure parameters. 展开更多
关键词 energy efficiency: IEEE 802. 11: wireless local area networks (WLANs) distributed co ordination function (DCF)
下载PDF
OFDM-based Low-voltage Powerline High Rate Communication
18
作者 张有兵 程时杰 +1 位作者 Joseph Nguimbis 熊兰 《Journal of Donghua University(English Edition)》 EI CAS 2004年第1期13-17,共5页
Based on the experimental results, a simplified model for low-voltage powerline used as a high frequency communication channel is presented. With this model, the Orthogonal Frequency Division Multiplexing (OFDM) based... Based on the experimental results, a simplified model for low-voltage powerline used as a high frequency communication channel is presented. With this model, the Orthogonal Frequency Division Multiplexing (OFDM) based high rate digital communication over low-voltage powerline is analyzed and simulated. The capability of the signal transmission system in overcoming multi-path interference and selection of the system parameters are discussed. And time-domain simulation is carried out to investigate the transmission capability of the OFDM communication system for different mapping schemes and transmission power levels. Simulation results show that it is possible to realize high rate digital communication over low-voltage powerline using OFDM when the transmitted power is large enough. 展开更多
关键词 low-voltage powerline communication OFDM modeling of channel
下载PDF
Can the Polynomial Based Key Predistribution Scheme Be Used Many Times in One Wireless Sensor Network Key Establishment Protocol?
19
作者 许丽卿 陈豪 《Journal of Shanghai Jiaotong university(Science)》 EI 2013年第3期376-384,共9页
Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment f... Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment for WSNs. It is tempting to use many random and different instances of polynomial based key predistribution scheme for various parts of the WSN to enhance the efficiency of WSN key establishment protocols. This paper indicates that it is not secured in general to use many instances of Blom-Blundo et al. polynomial based key predistribution scheme in a WSN key establishment protocol. Thus the previously constructed group-based type WSN key predistribution schemes using polynomial based key predistribution scheme are insecure. We propose new generalized Bloin-Blundo et al. key predistribution schemes. These new generalized Blom-Blundo et al. key predistribution schemes can be used many times in one WSN key establishment protocol with only a small increase of cost. The application to group-based WSN key predistribution schemes is given. 展开更多
关键词 polynomial based key predistribution scheme generalized Blom-Blundo et al. key predistribution scheme clustered wireless sensor network (WSN)
原文传递
Exploring adoption of augmented reality smart glasses: Applications in the medical industry 被引量:1
20
作者 Nuri BASOGLU Muge GOKEN +2 位作者 Marina DABIC Dilek OZDEMIR GUNGOR Tugrul U. DAIM 《Frontiers of Engineering Management》 2018年第2期167-181,共15页
This study explores the use of augmented reality smart glasses(ARSGs) by physicians and their adoption of these products in the Turkish medical industry.Google Glass was used as a demonstrative example for the introdu... This study explores the use of augmented reality smart glasses(ARSGs) by physicians and their adoption of these products in the Turkish medical industry.Google Glass was used as a demonstrative example for the introduction of ARSGs. We proposed an exploratory model based on the technology acceptance model by Davis. Exogenous factors in the model were defined by performing semi-structured in-depth interviews, along with the use of an expert panel in addition to the technology adoption literature. The framework was tested by means of a field study, data was collected via an Internet survey, and path analysis was used. The results indicate that there were a number of factors to be considered in order to understand ARSG adoption by physicians.Usefulness was influenced by ease of use, compatibility,ease of reminding, and speech recognition, while ease of use was affected by ease of learning, ease of medical education, external influence, and privacy. Privacy was the only negative factor that reduced the perceived ease of use,and was found to indirectly create a negative attitude.Compatibility emerged as the most significant external factor for usefulness. Developers of ARSGs should pay attention to healthcare-specific requirements for improved utilization and more extensive adoption of ARSGs in healthcare settings. In particular, they should focus on how to increase the compatibility of ARSGs. Further research needs to be conducted to explain the adoption intention of physicians. 展开更多
关键词 technology adoption augmented reality smartglasses (ARSGs) healthcare
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部