根据国际电信联盟关于IMT-2030愿景,第6代移动通信系统(the 6th generation mobile networks,6G)的覆盖服务需求将从单场景覆盖向多场景覆盖扩展,6G基础设施的部署也将逐步从2D覆盖向3D覆盖扩展、从局部覆盖向全球覆盖扩展、从中低频段...根据国际电信联盟关于IMT-2030愿景,第6代移动通信系统(the 6th generation mobile networks,6G)的覆盖服务需求将从单场景覆盖向多场景覆盖扩展,6G基础设施的部署也将逐步从2D覆盖向3D覆盖扩展、从局部覆盖向全球覆盖扩展、从中低频段融合使用向更高频段按需开启.上述需求使得6G在提升容量的同时,需要进一步考虑无线覆盖扩展需求.本文针对如何在6G网络结构时空尺度跨度大、全场景业务需求差异大、超密集覆盖能耗大等关键挑战下实现容量和能效约束下的覆盖能力扩展这一重大科学问题,首先提出了面向6G无线覆盖扩展的智能柔性组网架构;其次研究了面向6G无线覆盖扩展的关键技术,包括面向6G广域覆盖的多维立体空天地覆盖扩展技术、面向深度覆盖的超密集异构覆盖扩展技术和面向6G平滑度覆盖的超高速移动覆盖扩展技术;接着分析了基于语义通信的覆盖扩展技术;最后给出了6G全场景无线覆盖扩展仿真验证,通过定义6G无线覆盖扩展技术指标体系,进行了典型场景的覆盖性能仿真验证.展开更多
Based on the Wireless Mesh Network (WMN), a wireless emergency communicationsystem for underground coal mine which was designed to be capable of videosurveillance, voice communication, and environment monitoring at th...Based on the Wireless Mesh Network (WMN), a wireless emergency communicationsystem for underground coal mine which was designed to be capable of videosurveillance, voice communication, and environment monitoring at the same time wasproposed.The network architecture of the system was proposed, and its service model,extensible technology, medium access control, routing algorithm, channel allocation andsystem management technologies were analyzed according to the actual rescue requirementsof underground coal mine and the characteristics of underground spatial structureand radio transmissions.The relevant theories and key technologies were extracted,which would provide theoretical support for the system development.展开更多
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In...Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.展开更多
The carbon dioxide removal system is the most critical system for controlling CO2 mass concentration in long-term manned spacecraft.In order to ensure the controlling CO2 mass concentration in the cabin within the all...The carbon dioxide removal system is the most critical system for controlling CO2 mass concentration in long-term manned spacecraft.In order to ensure the controlling CO2 mass concentration in the cabin within the allowable range,the state of CO2 removal system needs to be estimated in real time.In this paper,the mathematical model is firstly established that describes the actual system conditions and then the Galerkin-based extended Kalman filter algorithm is proposed for the estimation of the state of CO2.This method transforms partial differential equation to ordinary differential equation by using Galerkin approaching method,and then carries out the state estimation by using extended Kalman filter.Simulation experiments were performed with the qualification of the actual manned space mission.The simulation results show that the proposed method can effectively estimate the system state while avoiding the problem of dimensional explosion,and has strong robustness regarding measurement noise.Thus,this method can establish a basis for system fault diagnosis and fault positioning.展开更多
The observed images of the asteroid and the asteroid reference images are used to obtain the probe-to-asteroid direction and the location of the limb features of the asteroid in the inertial coordinate. These informa-...The observed images of the asteroid and the asteroid reference images are used to obtain the probe-to-asteroid direction and the location of the limb features of the asteroid in the inertial coordinate. These informa-tion in combination with the shape model of the asteroid and attitude information of the probe are utilized to ob-tain the position of the probe. The position information is then input to the UKF which determines the real-timeorbit of the probe. Finally, the autonomous orbit determination algorithm is validated using digital simulation.The determination of orbit using UKF is compared with that using extended Kalman filter (EKF), and the resultshows that UKF is superior to EKF.展开更多
Despite the rapid advances in mobile technology, many constraints still prevent mobile devices from running resource-demanding applications in mobile environments. Cloud computing with flexibility, stability and scala...Despite the rapid advances in mobile technology, many constraints still prevent mobile devices from running resource-demanding applications in mobile environments. Cloud computing with flexibility, stability and scalability enables access to unlimited resources for mobile devices, so more studies have focused on cloud computingbased mobile services. Due to the stability of wireless networks, changes of Quality of Service (QoS) level and user' real-time preferences, it is becoming challenging to determine how to adaptively choose the "appropriate" service in mobile cloud computing environments. In this paper, we present an adaptive service selection method. This method first extracts user preferences from a service's evaluation and calculates the similarity of the service with the weighted Euclidean distance. Then, they are combined with user context data and the most suitable service is recommended to the user. In addition, we apply the fuzzy cognitive imps-based model to the adaptive policy, which improves the efficiency and performance of the algorithm. Finally, the experiment and simulation demonstrate that our approach is effective.展开更多
文摘根据国际电信联盟关于IMT-2030愿景,第6代移动通信系统(the 6th generation mobile networks,6G)的覆盖服务需求将从单场景覆盖向多场景覆盖扩展,6G基础设施的部署也将逐步从2D覆盖向3D覆盖扩展、从局部覆盖向全球覆盖扩展、从中低频段融合使用向更高频段按需开启.上述需求使得6G在提升容量的同时,需要进一步考虑无线覆盖扩展需求.本文针对如何在6G网络结构时空尺度跨度大、全场景业务需求差异大、超密集覆盖能耗大等关键挑战下实现容量和能效约束下的覆盖能力扩展这一重大科学问题,首先提出了面向6G无线覆盖扩展的智能柔性组网架构;其次研究了面向6G无线覆盖扩展的关键技术,包括面向6G广域覆盖的多维立体空天地覆盖扩展技术、面向深度覆盖的超密集异构覆盖扩展技术和面向6G平滑度覆盖的超高速移动覆盖扩展技术;接着分析了基于语义通信的覆盖扩展技术;最后给出了6G全场景无线覆盖扩展仿真验证,通过定义6G无线覆盖扩展技术指标体系,进行了典型场景的覆盖性能仿真验证.
基金Supported by the National Natural Science Foundation of China(50534060)the National High Technology Project of China(2007AA06Z106)
文摘Based on the Wireless Mesh Network (WMN), a wireless emergency communicationsystem for underground coal mine which was designed to be capable of videosurveillance, voice communication, and environment monitoring at the same time wasproposed.The network architecture of the system was proposed, and its service model,extensible technology, medium access control, routing algorithm, channel allocation andsystem management technologies were analyzed according to the actual rescue requirementsof underground coal mine and the characteristics of underground spatial structureand radio transmissions.The relevant theories and key technologies were extracted,which would provide theoretical support for the system development.
基金Supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)the National Natural Science Foundation of China (No.60903181)Nanjing University of Posts and Telecommunications Funds (No.NY208072)
文摘Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.
基金Project(050403)supported by Pre-research Project in the Manned Space Filed of China。
文摘The carbon dioxide removal system is the most critical system for controlling CO2 mass concentration in long-term manned spacecraft.In order to ensure the controlling CO2 mass concentration in the cabin within the allowable range,the state of CO2 removal system needs to be estimated in real time.In this paper,the mathematical model is firstly established that describes the actual system conditions and then the Galerkin-based extended Kalman filter algorithm is proposed for the estimation of the state of CO2.This method transforms partial differential equation to ordinary differential equation by using Galerkin approaching method,and then carries out the state estimation by using extended Kalman filter.Simulation experiments were performed with the qualification of the actual manned space mission.The simulation results show that the proposed method can effectively estimate the system state while avoiding the problem of dimensional explosion,and has strong robustness regarding measurement noise.Thus,this method can establish a basis for system fault diagnosis and fault positioning.
文摘The observed images of the asteroid and the asteroid reference images are used to obtain the probe-to-asteroid direction and the location of the limb features of the asteroid in the inertial coordinate. These informa-tion in combination with the shape model of the asteroid and attitude information of the probe are utilized to ob-tain the position of the probe. The position information is then input to the UKF which determines the real-timeorbit of the probe. Finally, the autonomous orbit determination algorithm is validated using digital simulation.The determination of orbit using UKF is compared with that using extended Kalman filter (EKF), and the resultshows that UKF is superior to EKF.
基金the third level of 2011 Zhejiang Province 151 Talent Project and National Natural Science Foundation of China under Grant No.61100043
文摘Despite the rapid advances in mobile technology, many constraints still prevent mobile devices from running resource-demanding applications in mobile environments. Cloud computing with flexibility, stability and scalability enables access to unlimited resources for mobile devices, so more studies have focused on cloud computingbased mobile services. Due to the stability of wireless networks, changes of Quality of Service (QoS) level and user' real-time preferences, it is becoming challenging to determine how to adaptively choose the "appropriate" service in mobile cloud computing environments. In this paper, we present an adaptive service selection method. This method first extracts user preferences from a service's evaluation and calculates the similarity of the service with the weighted Euclidean distance. Then, they are combined with user context data and the most suitable service is recommended to the user. In addition, we apply the fuzzy cognitive imps-based model to the adaptive policy, which improves the efficiency and performance of the algorithm. Finally, the experiment and simulation demonstrate that our approach is effective.