期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
面向多层无线网络的基站协同节能
1
作者 刘通 田波 袁振宇 《移动通信》 2022年第10期65-70,共6页
为进一步提升基站节能效益,开展了面向多层无线网络的基站协同节能研究。首先,提出了节能优先级机制,根据各频点在网络覆盖、业务承载等方面承担的角色,设置各频点的节能优先级。在基站协同节能判决时,先对优先级高的频点实施节能。其次... 为进一步提升基站节能效益,开展了面向多层无线网络的基站协同节能研究。首先,提出了节能优先级机制,根据各频点在网络覆盖、业务承载等方面承担的角色,设置各频点的节能优先级。在基站协同节能判决时,先对优先级高的频点实施节能。其次,通过对基站负荷评估和统计指标的研究,提出了5G到4G的负荷转移评估机制,以确保5G节能关断后,4G可以有效承接全部业务。最后,研究建立了4G/5G多层网络间基于负荷、故障的协同节能流程,在满足条件时对5G网络实施硬节能,并通过监控机制确保可以在必要时唤醒5G。实践应用表明,面向多层无线网络的基站协同节能可以在保障网络服务能力的基础上,有效提升基站节能效益。 展开更多
关键词 基站节能 无线网络 4G/5G协同
下载PDF
一种面向电力设施的无线传感器网络及频谱竞争分配方案 被引量:1
2
作者 金晶 《数字通信世界》 2023年第3期8-10,共3页
为提升电力设施传感器网络监测效率,通过引入无线物联网技术构建无线传感器网络,并根据电力设施传感器监测性能需求,对无线传感器监测频谱分配问题进行了深入研究,提出了基于优先级的时频资源竞争分配机制;在此基础上,利用MATLAB仿真软... 为提升电力设施传感器网络监测效率,通过引入无线物联网技术构建无线传感器网络,并根据电力设施传感器监测性能需求,对无线传感器监测频谱分配问题进行了深入研究,提出了基于优先级的时频资源竞争分配机制;在此基础上,利用MATLAB仿真软件对所提出的频谱竞争分配机制进行了仿真。 展开更多
关键词 物联网 频谱共享方案 多簇无线网络
下载PDF
基于加密流量分类的无线网络应用层安全方法研究 被引量:1
3
作者 张灏林 《网络安全技术与应用》 2023年第7期23-25,共3页
现阶段,计算机网络技术在社会发展的各个领域均有着重要应用,相关技术的研发成果与实际应用均有着良好表现,因此,为保证计算机网络技术在未来阶段的良好发展状态,需要对其使用安全性展开更加深入的研究,以此保证网络环境的整体安全性和... 现阶段,计算机网络技术在社会发展的各个领域均有着重要应用,相关技术的研发成果与实际应用均有着良好表现,因此,为保证计算机网络技术在未来阶段的良好发展状态,需要对其使用安全性展开更加深入的研究,以此保证网络环境的整体安全性和使用效率。本文以上述内容为背景,针对加密流量分类的无线网络应用层安全方法进行深度分析,总结相关经验,给出针对性建议,希望可以为同领域工作者提供合理参考作用。 展开更多
关键词 加密流量分类 无线网络应用 安全方法
原文传递
5.8GHz无线宽带接入系统应用设计
4
作者 张陆勇 周正 《无线电技术与信息》 2004年第5期62-66,共5页
无线宽带接入网技术是近几年才发展起来的一种新技术。其码元速率为10、20、54、108 Mbit/s,有效传输速率分别为7、14、20Mbit/s和50Mbit/s,通信距离从几公里到几十公里,多点协议设备能很好地解决方圆几十公里的覆盖。随着国家对5.
关键词 无线宽带接入 无线网络 E1接口 互联网接入
下载PDF
WCDMA与PHS两网共存的探讨 被引量:4
5
作者 张灿 马肃平 《电信科学》 北大核心 2003年第11期U006-U009,共4页
PHS已在中国大范围建网,投资不可逆转;而3G作为移动通信发展的未来在诸多因素推动下加速发展。本文从业务层、核心网络层和无线网络层等方面对WCDMA和PHS两网的融合、重用进行了分析。
关键词 WCDMA PHS 移动通信 核心网络 无线网络层 网络融合 网络建设
下载PDF
Physical layer design of wireless sensor network nodes 被引量:5
6
作者 钟子果 胡爱群 王丹 《Journal of Southeast University(English Edition)》 EI CAS 2006年第1期21-25,共5页
Major consideration dimensions for the physical layer design of wireless sensor network (WSN) nodes is analyzed by comparing different wireless communication approaches, diverse mature standards, important radio fre... Major consideration dimensions for the physical layer design of wireless sensor network (WSN) nodes is analyzed by comparing different wireless communication approaches, diverse mature standards, important radio frequency (RF) parameters and various microcontroller unit (MCU) solutions. An implementation of the WSN node is presented with experimental results and a novel "one processor working at two frequencies" energy saving strategy. The lifetime estimation issue is analyzed with consideration to the periodical listen required by common WSN media access control (MAC) algorithms. It can be concluded that the startup time of the RF which determines the best sleep time ratio and the shortest backoff slot time of MAC, the RF frequency and modulation methods which determinate the RX and TX current, and the overall energy consumption of the dual frequency MCU SOC ( system on chip) are the most essential factors for the WSN node physical layer design. 展开更多
关键词 wireless sensor network node physical layer radio frequency energy consumption node lifetime
下载PDF
Wireless ad hoc video transmission:a Bayesian network-based scheme
7
作者 蒋荣欣 田翔 +1 位作者 谢立 陈耀武 《Journal of Southeast University(English Edition)》 EI CAS 2008年第4期407-413,共7页
A novel bandwidth prediction and control scheme is proposed for video transmission over an ad boc network. The scheme is based on cross-layer, feedback, and Bayesian network techniques. The impacts of video quality ar... A novel bandwidth prediction and control scheme is proposed for video transmission over an ad boc network. The scheme is based on cross-layer, feedback, and Bayesian network techniques. The impacts of video quality are formulized and deduced. The relevant factors are obtained by a cross-layer mechanism or Feedback method. According to these relevant factors, the variable set and the Bayesian network topology are determined. Then a Bayesian network prediction model is constructed. The results of the prediction can be used as the bandwidth of the mobile ad hoc network (MANET). According to the bandwidth, the video encoder is controlled to dynamically adjust and encode the right bit rates of a real-time video stream. Integrated simulation of a video streaming communication system is implemented to validate the proposed solution. In contrast to the conventional transfer scheme, the results of the experiment indicate that the proposed scheme can make the best use of the network bandwidth; there are considerable improvements in the packet loss and the visual quality of real-time video.K 展开更多
关键词 mobile ad hoc network (MANET) Bayesian network CROSS-LAYER IEEE 802. 11 real-time video streaming
下载PDF
SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks 被引量:6
8
作者 Lin Hui Ma Jianfeng Hu Jia 《China Communications》 SCIE CSCD 2012年第10期40-48,共9页
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this proble... Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes' identification, and success rates, SI_CRM imple- ments security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model. 展开更多
关键词 wireless mesh networks reputation mechanism cross-layer design network security
下载PDF
Physical-layer security enhancement method for wireless HetNets via transmission pair scheduling 被引量:1
9
作者 Ding Xiaojin Song Tiecheng Zhang Gengxin 《Journal of Southeast University(English Edition)》 EI CAS 2019年第3期318-324,共7页
In order to enhance the physical-layer security of wireless transmission in a wireless heterogeneous network (HetNet), a two-stage-based cooperative framework is advocated. To be specific, a source-destination (SD) pa... In order to enhance the physical-layer security of wireless transmission in a wireless heterogeneous network (HetNet), a two-stage-based cooperative framework is advocated. To be specific, a source-destination (SD) pair is opportunistically chosen at the beginning of the transmission slot, which can be used to assist the transmissions of other SD pairs. Under this framework, a transmit antenna selection assisted opportunistic SD pair scheduling (TAS-OSDS) scheme is proposed, and the intercept probability (IP) of the proposed TAS-OSDS, the conventional round-robin source-destination pair scheduling (RSDS) and the conventional non-cooperation (non-coop) schemes is also analyzed, where the RSDS and non-coop schemes are used for comparison with the proposed TAS-OSDS. Numerical results show that increasing the number of the SD pairs can effectively reduce the IP of the TAS-OSDS scheme, whereas the IP of the RSDS and the non-coop remain unchanged with an increasing number of the SD pairs. Furthermore, the TAS-OSDS scheme achieves a lower IP than that of the RSDS and the non-coop schemes, showing the superiority of the proposed TAS-OSDS. 展开更多
关键词 wireless heterogeneous network physical-layer security source-destination pair scheduling
下载PDF
Wireless sensor networks in relic protection:deployment methodology and cross-layer design 被引量:1
10
作者 李栋 《High Technology Letters》 EI CAS 2009年第1期59-64,共6页
This paper describes the deployment optimization technology and the cross-layer design of a surveil-lance WSN system applied in relic protection.Facing the typical technical challenges in the applicationcontext of rel... This paper describes the deployment optimization technology and the cross-layer design of a surveil-lance WSN system applied in relic protection.Facing the typical technical challenges in the applicationcontext of relic protection,we firstly propose a deployment technology based on ant colony optimization al-gorithm(DT-ACO)to overcome the difficulties in communication connectivity and sensing coverage.Meanwhile,DT-ACO minimizes the overall cost of the system as much as possible.Secondly we proposea novel power-aware cross-layer scheme(PACS)to facilitate adjustable system lifetime and surveillanceaccuracy.The performance analysis shows that we achieve lower device cost,significant extension of thesystem lifetime and improvement on the data delivery rate compared with the traditional methods. 展开更多
关键词 wireless sensor network deployment algorithm cross-layer design
下载PDF
Generalized Physical Layer Channel Model for RelayBased Super Dense Networks 被引量:1
11
作者 ZHANG Lingwen LIU Chang +1 位作者 ZHANG Jiayi WU Faen 《China Communications》 SCIE CSCD 2015年第8期123-131,共9页
The κ-μ fading model is an advanced channel model in super dense wireless networks.In this paper,we evaluate the performance of the system over κ-μ fading channel in super dense relay networks with consideration o... The κ-μ fading model is an advanced channel model in super dense wireless networks.In this paper,we evaluate the performance of the system over κ-μ fading channel in super dense relay networks with consideration of multiple independent but not necessarily identically distributed(i.n.i.d.) cochannel interference(CCI) under interferencelimited environment.More specifically,we derive a useful and accurate cumulative distribution function(CDF) expression of the end-to-end signal-to-interference plus noise(SINR) ratio.Moreover,we derive novel analytical expressions of the outage probability(OP),average bit error probability(ABEP) and average capacity for binary modulation types and arbitrary positive values of κ-and μ of such system.Furthermore,we propose asymptotic analysis for both the OP and ABEP to give physical insights.A simplified analytical form for the ABEP at high-SNR regimes is provided as well.Finally,the accuracy of the derived expressions is well validated by Monte Carlo simulations. 展开更多
关键词 super dense generalized fadingmodel RELAY co-channel interference DECODE-AND-FORWARD outage probability average biterror probability average capacity.
下载PDF
Analysis of coverage problem under border effects in wireless sensor networks 被引量:1
12
作者 金岩 《High Technology Letters》 EI CAS 2008年第1期61-66,共6页
Wireless sensor networks can be used to monitor the interested region by deploying dense sensor nodes. Coverage is a primary metric to evaluate the capacity of monitoring. In this paper, we focus on the coverage probl... Wireless sensor networks can be used to monitor the interested region by deploying dense sensor nodes. Coverage is a primary metric to evaluate the capacity of monitoring. In this paper, we focus on the coverage problem under border effects, where the sensor nodes are distributed in a circle-shaped region randomly. Under this scenario, we derive the expected coverage of the sensor node and the total network coverage provided by n sensor nodes accurately by probability. These findings are useful to determine the related parameters (sensing range, number of sensor nodes and radius of monitored region) for a specific network coverage ratio. Simulation results demonstrate that our analysis is correct and effective. 展开更多
关键词 wireless sensor networks COVERAGE border effects
下载PDF
Multilevel Pattern Mining Architecture for Automatic Network Monitoring in Heterogeneous Wireless Communication Networks 被引量:8
13
作者 Zhiguo Qu John Keeney +2 位作者 Sebastian Robitzsch Faisal Zaman Xiaojun Wang 《China Communications》 SCIE CSCD 2016年第7期108-116,共9页
The rapid development of network technology and its evolution toward heterogeneous networks has increased the demand to support automatic monitoring and the management of heterogeneous wireless communication networks.... The rapid development of network technology and its evolution toward heterogeneous networks has increased the demand to support automatic monitoring and the management of heterogeneous wireless communication networks.This paper presents a multilevel pattern mining architecture to support automatic network management by discovering interesting patterns from telecom network monitoring data.This architecture leverages and combines existing frequent itemset discovery over data streams,association rule deduction,frequent sequential pattern mining,and frequent temporal pattern mining techniques while also making use of distributed processing platforms to achieve high-volume throughput. 展开更多
关键词 automatic network monitoring sequential pattern mining episode discovery module
下载PDF
Distributed Plume Source Localization Using Hierarchical Sensor Networks 被引量:1
14
作者 匡兴红 刘雨青 +1 位作者 吴燕翔 邵惠鹤 《Journal of Donghua University(English Edition)》 EI CAS 2009年第1期56-61,共6页
A hierarchical wireless sensor networks(WSN) was proposed to estimate the plume source location.Such WSN can be of tremendous help to emergency personnel trying to protect people from terrorist attacks or responding t... A hierarchical wireless sensor networks(WSN) was proposed to estimate the plume source location.Such WSN can be of tremendous help to emergency personnel trying to protect people from terrorist attacks or responding to an accident.The entire surveillant field is divided into several small sub-regions.In each sub-region,the localization algorithm based on the improved particle filter(IPF) was performed to estimate the location.Some improved methods such as weighted centroid,residual resampling were introduced to the IPF algorithm to increase the localization performance.This distributed estimation method eliminates many drawbacks inherent with the traditional centralized optimization method.Simulation results show that localization algorithm is efficient for estimating the plume source location. 展开更多
关键词 wireless sensor networks source localization distributed localization improved particle filter
下载PDF
SAE-TOPSIS algorithm for vertical handoff decision in heterogeneous wireless networks
15
作者 刘胜美 Pan Su Mi Zhengkun 《High Technology Letters》 EI CAS 2012年第4期382-386,共5页
An improved technique for order preference by similarity to ideal solution (TOPSIS) algorithm, SAE-TOPSIS, is proposed for the vertical handoff decision in heterogeneous wireless networks. The signal to interference... An improved technique for order preference by similarity to ideal solution (TOPSIS) algorithm, SAE-TOPSIS, is proposed for the vertical handoff decision in heterogeneous wireless networks. The signal to interference plus noise ratio (SINR) effects, analytic hierarchy process (AHP) and infor- mation entropy (SAE) weight method were introduced into the algorithm. Handoff decision meeting the multi-attribute quality of service (QoS) requirement is made according to an attribute matrix and weight vector using the TOPSIS algorithm. The simulation results have shown that the proposed algo- rithm can provide satisfactory performance fitted to the characteristics of the traffic. 展开更多
关键词 heterogeneous wireless networks vertical handoff technique for order preferenceby similarity to ideal solution (TOPSIS) analytic hierarchy process (AHP) ENTROPY signal to in-terference plus noise ratio (SINR)
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部