期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
适合企业的无线数据传输网络
1
作者 张宏亮 侯燕 崔健 《衡器》 2009年第2期11-13,共3页
本文通过对现有无线网络的特点描述和对比,提供了一种适合工矿企业使用的无线数据传输网络(ZL网络),着重介绍了ZL网络的通信原理、网络结构和关键技术的特点。
关键词 无线数据传输网络(Zigbee LAN ZL网络)
下载PDF
利用广播电台剩余资源构建全国无线数据传输网
2
《现代电视技术》 2001年第9期105-105,共1页
一种由深圳天迭通讯发展有限公司开发的名为T-SCA无线数据广播系统的新技术,将构筑继GSM、寻呼网之后的又一个覆盖全国的无线数据传输网,而它利用的是广播电视台闲置频率资源。
关键词 无线数据传输网 频率资源 广播电台 剩余 构建 数据广播系统 广播电视台 有限公司 GSM
下载PDF
基于GPRS无线数据传输系统的设计与实现 被引量:4
3
作者 尤后兴 陈丹 汤彬 《重庆工学院学报》 2005年第5期64-66,共3页
以“家校e线通”应用系统为例论述了以GPRS无线数据传输网为依托,通过GGSN将数据在GPRSIP与INTERNET之间转发的BINGGPRS无线数据传输系统的设计与实现,以及该系统所应用的CMPP短信网关协议和多线程集群控制等技术.
关键词 无线数据传输系统 设计与实现 GPRS INTERNET 无线数据传输网 应用系统 GGSN 集群控制 网关协议 CMPP 多线程
下载PDF
基于GSM网络的数据传输模式应用研究 被引量:2
4
作者 李赟 《河南科技》 2011年第9期48-49,共2页
一、GSM网络及其发展历史 1.GSM网络。GSM(Global System Mobile Communications)系统从设计之初发展到今天,已经成为全球最大的移动通信系统。基于该系统构建的无线数据传输网,自然成为众多工业用户进行数据传输的首选方案,越来越... 一、GSM网络及其发展历史 1.GSM网络。GSM(Global System Mobile Communications)系统从设计之初发展到今天,已经成为全球最大的移动通信系统。基于该系统构建的无线数据传输网,自然成为众多工业用户进行数据传输的首选方案,越来越多地受到工程技术人员的青睐。 展开更多
关键词 数据传输模式 GSM网络 移动通信系统 无线数据传输网 应用 工程技术人员 发展历史 工业用户
下载PDF
利用CDPD终端进行移动数据交换的原理与实现
5
作者 王乐鹏 肖郴松 黄立平 《计算机时代》 2002年第10期20-21,共2页
利用CDPD终端进行移动数据交换,国外已经比较普遍,而国内仍属于一个新兴的领域。本文描述了利用CDPD终端进行XML数据下载和上传操作的原理,并以程序代码的形式对其中的关键技术进行了说明。
关键词 CDPD终端 移动数据交换 原理 无线数据传输网 蜂窝数字分组数据
下载PDF
数据传输及可视数据业务
6
《电子科技文摘》 2000年第12期68-69,共2页
Y2000-62040-720 0020475用于最小移动键控(MSK)无线数据通信设备在线测试的多 DSP 基测量装置=A multi-DSP based measure-ment apparatus for on-line testing of MSK wireIess datacommunication devices[会,英]/Bucci,G.& Landi... Y2000-62040-720 0020475用于最小移动键控(MSK)无线数据通信设备在线测试的多 DSP 基测量装置=A multi-DSP based measure-ment apparatus for on-line testing of MSK wireIess datacommunication devices[会,英]/Bucci,G.& Landi,C.//ProceedingS of 16th IEEE Instrumentation andMeasurement Technology Confefence,Vol.2.—720~725(F) 展开更多
关键词 数据业务 串行数据传输 无线数据通信设备 移动键控 在线测试 测量装置 点对多点通信 无线数据传输网 会议录 交换技术
原文传递
Cooperative Jamming for Enhancing Security of Cognitive Radio Networks with Multiple Primary Users 被引量:3
7
作者 Xiaofeng Feng Xinbo Gao Ru Zong 《China Communications》 SCIE CSCD 2017年第7期93-107,共15页
In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single... In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single PU in their frameworks. In this paper, we will consider a more complicated scenario with multiple PUs and try to investigate the cooperative jamming between multiple PUs and a single SU. When there are multiple PUs in CRN, in order to obtain more spectrum for data transmission, SU will cooperate with multiple PUs at the same time. Considering that both PU and SU are rational and selfish individuals, the interaction between PUs and SU is formulated as a multi-leaders and single-follower Stackelberg game, wherein PU is the leader and SU is the follower. And the Stackelberg Equilibrium(SE) is considered as the final decisions accepted by all PUs and SU. Furthermore, we also prove that when a specific condition is satisfied, the existence of SE can be guaranteed. And a Gauss-Jacobi iterative algorithm is proposed to compute a SE. Finally, simulation results are given to verify the performance and demonstrate that both of the PUs' secrecy rate and the SU's transmission rate can be improved through cooperation. 展开更多
关键词 cognitive radio networks cooperative jamming physical layer security spectrum sharing stackelberg game
下载PDF
Energy-Efficient Transmission Scheme for Mobile Data Gathering in Wireless Sensor Networks 被引量:2
8
作者 刘丹谱 张铠麟 丁杰 《China Communications》 SCIE CSCD 2013年第3期114-123,共10页
Energy conservation in Wireless Sensor Networks (WSNs) has always been a crucial issue and has received increased attention in the recent years. A transmission scheme for energy-constrained WSNs is proposed in this pa... Energy conservation in Wireless Sensor Networks (WSNs) has always been a crucial issue and has received increased attention in the recent years. A transmission scheme for energy-constrained WSNs is proposed in this paper. The scheme, called MIHOP (MIMO and Multi-hop), combines cluster-based virtual MIMO and multi-hop technologies. The multihop mode is employed in transmitting data when the related sensors are located within a specific number of hops from the sink, and the virtual MIMO mode is used in transmitting data from the remaining sensor nodes. We compare the energy consumption of different transmission schemes and propose an algorithm for determining the optimal hop count in MIHOP. A controllable mobile sink that reduces the energy consumed in sensor transmission is also adopted for data collection. The theoretical analysis and the Monte Carlo simulation demonstrate that the proposed scheme significantly outperforms individual virtual MIMO, multi-hop technologies, and double-string networks in terms of energy conservation. The energy consumption levels under the MIHOP scheme are approximately 12.98%, 47.55% and 48.30% less than that under virtual MIMO schemes, multi-hop networks and doublestring networks, respectively. 展开更多
关键词 wireless sensor networks energyefficiency virtual MIMO multi-hop network mobile sink
下载PDF
An Anti-Eavesdrop Transmission Scheduling Scheme Based on Maximizing Secrecy Outage Probability in Ad Hoc Networks 被引量:1
9
作者 WANG Yajun LIAO Tongqing WANG Chuanan 《China Communications》 SCIE CSCD 2016年第1期176-184,共9页
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optim... In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic manner.To be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading effect.The proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping attacks.For comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective destinations.We derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading environments.Numerical results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage probability.Additionally,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping. 展开更多
关键词 transmission scheduling eavesdropping secrecy outage probability secrecy rate rayleigh fading
下载PDF
Gradient based restoration of coal mine images obtained by underground wireless transmissions 被引量:2
10
作者 Lu Zhaolin Qian Jiansheng Li Leida 《Mining Science and Technology》 EI CAS 2011年第6期809-813,共5页
Curvature-driven diffusion (CDD) principles were used to develop a novel gradient based image restora- tion algorithm. The algorithm fills in blocks of missing data in a wireless image after transmission through the n... Curvature-driven diffusion (CDD) principles were used to develop a novel gradient based image restora- tion algorithm. The algorithm fills in blocks of missing data in a wireless image after transmission through the network. When images are transmitted over fading channels, especially in the severe circum- stances of a coal mine, blocks of the image may be destroyed by the effects of noise. Instead of using com- mon retransmission query protocols the lost data is reconstructed by using the adaptive curvature-driven diffusion (ACDD) image restoration algorithm in the gradient domain of the destroyed image. Missing blocks are restored by the method in two steps: In step one, the missing blocks are filled in the gradient domain by the ACDD algorithm; in step two, and the image is reconstructed from the reformed gradients by solving a Poisson equation. The proposed method eliminates the staircase effect and accelerates the convergence rate. This is demonstrated by experimental results. 展开更多
关键词 Image restoration Curvature-driven diffusion Gradient domain Wireless image transmission Poisson equation
下载PDF
FPGA Based Wireless Multi-Node Transceiver and Monitoring System
11
作者 Ozkan Akin ilker Basaran +2 位作者 Radosveta Sokullu lrfan Alan Kemal Biiytikkabasakal 《Journal of Mathematics and System Science》 2012年第1期53-57,共5页
In recent years the variety and complexity of Wireless Sensor Network (WSN) applications, the nodes and the functions they are expected to perform have increased immensely. This poses the question of reducing the ti... In recent years the variety and complexity of Wireless Sensor Network (WSN) applications, the nodes and the functions they are expected to perform have increased immensely. This poses the question of reducing the time from initial design of WSN applications to their implementation as a major research topic. RF communication programs for WSN nodes are generally written on microcontroller units (MCUs) for universal asynchronous receiver/transmitter (UART) data communication, however nowadays radio frequency (RF) designs based on field-programmable gate array (FPGA) have emerged as a very powerful alternative, due to their parallel data processing ability and software reconfigurability. In this paper, the authors present a prototype of a flexible multi-node transceiver and monitoring system. The prototype is designed for time-critical applications and can be also reconfigured for other applications like event tracking. The processing power of FPGA is combined with a simple communication protocol. The system consists of three major parts: wireless nodes, the FPGA and display used for visualization of data processing. The transmission protocol is based on preamble and synchronous data transmission, where the receiver adjusts the receiving baud rate in the range from min. 300 to max. 2400 bps. The most important contribution of this work is using the virtual PicoBlaze Soft-Core Processor for controlling the data transmission through the RF modules. The proposed system has been evaluated based on logic utilization, in terms of the number of slice flip flops, the number of 4 input LUTs (Look-Up Tables) and the number of bonded lOBs (Input Output Blocks). The results for capacity usage are very promising as compared to other similar research. 展开更多
关键词 FPGA PICOBLAZE RF MULTI-NODE WIRELESS TRANSCEIVER
下载PDF
Cooperative MIMO MAC Transmission Using Space Codes in Wireless Sensor Network
12
作者 Janakiraman Vidhya Gunasekaran Kalpana +1 位作者 Dananjayan Sathian Perumal Dananjayan 《Computer Technology and Application》 2011年第4期256-262,共7页
Wireless sensor network (WSN) requires robust and efficient communication protocols to minimise delay and save energy. The lifetime of WSN can be maximised by selecting proper medium access control (MAC) scheme de... Wireless sensor network (WSN) requires robust and efficient communication protocols to minimise delay and save energy. The lifetime of WSN can be maximised by selecting proper medium access control (MAC) scheme depending on the contention level of the network. The throughput of WSN however reduces due to channel fading effects even with the proper design of MAC protocol. Hence this paper proposes a new MAC scheme for enabling packet transmission using cooperative multi-input multi-output (MIMO) utilising space time codes(STC) such as space time block code (STBC), space time trellis code (STTC) to achieve higher energy savings and lower delay by allowing nodes to transmit and receive information jointly. The performance of the proposed MAC protocol is evaluated in terms of transmission error probability, energy consumption and delay. Simulation results show that the proposed cooperative MIMO MAC protocol provides reliable and efficient transmission by leveraging MIMO diversity gains. 展开更多
关键词 Cooperative multi-input multi-output (MIMO) space time block code (STBC) space time trellis code (STTC) medium access control energy efficiency wireless sensor network.
下载PDF
无线生存:宽带还是窄带?
13
作者 徐永 《电子设计技术 EDN CHINA》 2004年第6期16-16,18,共2页
从有线到无线,"宽带"已被谈论了很多年.有线宽带借助互联网这个平台已被广泛使用,但无线宽带的应用至今还是空中楼阁.早已铺就的2.5G的GPRS网络至今也没有形成一两项主流应用,这让业界各方目前在3G网上的投入极为谨慎.很多情... 从有线到无线,"宽带"已被谈论了很多年.有线宽带借助互联网这个平台已被广泛使用,但无线宽带的应用至今还是空中楼阁.早已铺就的2.5G的GPRS网络至今也没有形成一两项主流应用,这让业界各方目前在3G网上的投入极为谨慎.很多情况下,技术的先进性是一回事,但是否具有现实的商业价值是另一回事. 展开更多
关键词 无线宽带 发展前景 无线窄带双向数据传输网 GPRS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部