期刊文献+
共找到22篇文章
< 1 2 >
每页显示 20 50 100
一种多路网线检测系统实现方案 被引量:1
1
作者 刘志刚 《数字技术与应用》 2011年第11期186-186,共1页
本文介绍了一种多路网线连接状态检测系统的实现方案,该方案采用ARM处理器与单片机相结合的方式,实现了多路网线状态检测、屏幕显示与触摸屏控制、远程升级等功能,同时还实现了测试数据的定时检测、本地或远程备份、远程控制。
关键词 ARM 单片机 网线检测
下载PDF
一种智能化网线检测器的设计
2
作者 辛大志 陈国明 《辽宁师专学报(自然科学版)》 2003年第4期15-16,64,共3页
网线在组网的过程中尤为重要,文章设计出一款经济实用的网线检测器,并精要地分析了其工作原理.
关键词 智能化网线检测 工作原理 局域 软件部分 软件调试 元件参数 硬件部分 电源
下载PDF
基于电阻网络的网线故障检测装置研究
3
作者 Suzhou Atlight Technology Co.,Ltd. 《电子技术(上海)》 2012年第6期66-68,共3页
文章阐述了一种基于电阻网络的网线故障检测装置,基于电学原理在网线周围构造电阻网络,并结合电阻一次性测量方法,使其在没有短路或断路状态时测得的阻值与网线内部有短路或断路的坏网线情况下所测得的阻值不相同。通过实验确定出网线... 文章阐述了一种基于电阻网络的网线故障检测装置,基于电学原理在网线周围构造电阻网络,并结合电阻一次性测量方法,使其在没有短路或断路状态时测得的阻值与网线内部有短路或断路的坏网线情况下所测得的阻值不相同。通过实验确定出网线良好时的电阻阻值,并将该阻值作为基础与以后的检测值作为比较。此方法克服了传统检测方式中的繁琐过程,提出了新型的网线状态判断方法,实现了低成本。 展开更多
关键词 网线检测 MULTISM 10.0 电阻
原文传递
网线测线仪质量检测方法的研究和设计 被引量:2
4
作者 高青云 李显光 +1 位作者 刘文格 刘敏 《中国检验检测》 2020年第5期29-30,共2页
网线检测仪的质量是确保检测网线准确的基本保证。在实际使用中,能快捷检测网线检测仪的质量,有着很重要的作用和应用需要。本文针对网线检测仪的质量检测工作存在的困难,研究出一种方便简单的测试网线测线仪的方法,并设计出简易网线检... 网线检测仪的质量是确保检测网线准确的基本保证。在实际使用中,能快捷检测网线检测仪的质量,有着很重要的作用和应用需要。本文针对网线检测仪的质量检测工作存在的困难,研究出一种方便简单的测试网线测线仪的方法,并设计出简易网线检测仪测试装置。用此方法可完成对相关的此类设备的快速检测。 展开更多
关键词 线 线线 线线检测装置 测试方法
原文传递
Neural Network for Prediction of Thermal Elastomer Quality
5
作者 刘念泉 吴沧浦 刘青 《Journal of Beijing Institute of Technology》 EI CAS 1999年第3期312-317,共6页
Aim To predict the indexes of quality of the thermal elastomer by polymerization process data. Methods Neural networks were used for learning the relationship between the product quality and the polymerization proce... Aim To predict the indexes of quality of the thermal elastomer by polymerization process data. Methods Neural networks were used for learning the relationship between the product quality and the polymerization process condition variables in an industrial scale batch polymerization reactor. Results The indexes of quality of the product were inferred with acceptable accuracy from easy to measure reaction process condition variables. Conclusion The method proposed in this paper provides on line soft sensors of the indexes of quality of the thermal elastomal. 展开更多
关键词 neural network process modeling on line supervision polymerization reactor
下载PDF
Energy Aware Spectrum Access in Cognitive Radio Networks with Imperfect Channel Sensing 被引量:2
6
作者 Wei Yifei Du Chenhui +1 位作者 Feng Ruijun F. Richard Yu 《China Communications》 SCIE CSCD 2012年第9期127-130,共4页
Due to the problem of spectrum underuti-lization and energy inefficiency in wireless commu-nications, the research on energy efficient Cogni-tive Radio Networks (CRNs) has received signifi-cant attention in both ind... Due to the problem of spectrum underuti-lization and energy inefficiency in wireless commu-nications, the research on energy efficient Cogni-tive Radio Networks (CRNs) has received signifi-cant attention in both industry and academia. In this paper, we consider the problem of optimal spectrum selection and transmission parameters de-sign with the objective of minimizing energy con-sumption in CRNs. Since the system state cannot be directly observed due to miss detections and estimation errors, we formulate the optimal spec-trum access problem as a Partially Observable Markov Decision Process (POMDP). In particular, the proposed scheme selects the optimal spectrum, modulation and coding scheme, transmission pow-er, and link layer frame size in each time slot ac-cording to the belief state, which captures all the history information of past actions and observa- tions. The optimal policy can be acquired by sol-ving POMDP problem with linear programming based algorithm Sinmlation results show that sig-nificant energy savings can be achieved by the proposed scheme. 展开更多
关键词 spectrum access cognitive radio POMDP
下载PDF
Determination of Threshold for Energy Detection in Cognitive Radio Sensor Networks 被引量:4
7
作者 郝建军 黎晋 《China Communications》 SCIE CSCD 2011年第1期14-19,共6页
The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization effici... The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization efficiency and lay a sofid foundation for large-scale application of IoT. Reliable spectrum sensing is a crucial task of the CR. For energy de- tection, threshold will determine the probability of detection (Pd) and the probability of false alarm Pf at the same time. While the threshold increases, Pd and Pf will both decrease. In this paper we focus on the maximum of the difference of Pd and Pf, and try to find out how to determine the threshold with this precondition. Simulation results show that the proposed method can effectively approach the ideal optimal result. 展开更多
关键词 Internet of Sensor Networks energy Things Cognitive Radio detection THRESHOLD
下载PDF
Spectrum Handoff Scheme Based on Recommended Channel Sensing Sequence 被引量:1
8
作者 吴呈瑜 何晨 蒋铃鸽 《China Communications》 SCIE CSCD 2013年第8期18-26,共9页
We consider the spectrum handoff delay of a Secondary User(SU)in cognitive radio networks.We propose a spectrum handoff scheme based on Recommended Channel Sensing Sequence(RCSS),which aims to optimise the spectrum ha... We consider the spectrum handoff delay of a Secondary User(SU)in cognitive radio networks.We propose a spectrum handoff scheme based on Recommended Channel Sensing Sequence(RCSS),which aims to optimise the spectrum handoff delay subject to the sensing reliability and link maintenance constraints.There are two cases that should be considered:1)the SU performs spectrum handoff successfully during the current frame,and 2)the SU successfully performs the spectrum handoff using several frames.We develop a dynamic programming algorithm for RCSS to identify the optimal sensing sequence for the first case,and an updating algorithm for RCSS to improve the handoff performance for the second case.The numerical results confirm that the proposed RCSS handoff scheme can achieve better handoff delay performance than others when the received signal-to-noise ratios of the Pus' signals on different channels are non-identical. 展开更多
关键词 cognitive radio sensing time handoff delay link maintenance
下载PDF
Cyclostationary Feature Detection Based Spectrum Sensing Algorithm under Complicated Electromagnetic Environment in Cognitive Radio Networks 被引量:19
9
作者 Yang Mingchuan Li Yuan +1 位作者 Liu Xiaofeng Tang Wenyan 《China Communications》 SCIE CSCD 2015年第9期35-44,共10页
This paper focuses on improving the detection performance of spectrum sensing in cognitive radio(CR) networks under complicated electromagnetic environment. Some existing fast spectrum sensing algorithms cannot get sp... This paper focuses on improving the detection performance of spectrum sensing in cognitive radio(CR) networks under complicated electromagnetic environment. Some existing fast spectrum sensing algorithms cannot get specific features of the licensed users'(LUs') signal, thus they cannot be applied in this situation without knowing the power of noise. On the other hand some algorithms that yield specific features are too complicated. In this paper, an algorithm based on the cyclostationary feature detection and theory of Hilbert transformation is proposed. Comparing with the conventional cyclostationary feature detection algorithm, this approach is more flexible i.e. it can flexibly change the computational complexity according to current electromagnetic environment by changing its sampling times and the step size of cyclic frequency. Results of simulation indicate that this approach can flexibly detect the feature of received signal and provide satisfactory detection performance compared to existing approaches in low Signal-to-noise Ratio(SNR) situations. 展开更多
关键词 cognitive radio cyclostationary feature detection Hilbert transformation
下载PDF
AN ERROR-RESILIENT H.263+ CODING SCHEME FOR VIDEO TRANSMISSION OVER WIRELESS NETWORKS
10
作者 Li Jian Bie Hongxia 《Journal of Electronics(China)》 2006年第6期831-836,共6页
Video transmission over wireless networks has received much attention recently for its restricted bandwidth and high bit-error rate, Based on H.263+, by reversing part stream sequences of each Group Of Block (GOB),... Video transmission over wireless networks has received much attention recently for its restricted bandwidth and high bit-error rate, Based on H.263+, by reversing part stream sequences of each Group Of Block (GOB), an error resilient scheme is presented to improve video robustness without additional bandwidth burden. Error patterns are employed to simulate Widcband Code Division Multiple Acccss,(WCDMA) channels to check out error resilience performances. Simulation results show that both subjective and objective qualities of the reconstructed images are improved remarkably. The mean Peak Signal to Noise Ratio (PSNR) is increased by 0.5dB, and the highest increment is 2dB. 展开更多
关键词 Wireless networks Error detection Error resilient Error localization RESYNCHRONIZATION
下载PDF
Efficient Algorithm for K-Barrier Coverage Based on Integer Linear Programming 被引量:15
11
作者 Yanhua Zhang Xingming Sun Baowei Wang 《China Communications》 SCIE CSCD 2016年第7期16-23,共8页
Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest.However,in certain applications,barrier coverage cannot be satisfied af... Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest.However,in certain applications,barrier coverage cannot be satisfied after random deployment.In this paper,we study how mobile sensors can be efficiently relocated to achieve k-barrier coverage.In particular,two problems are studied:relocation of sensors with minimum number of mobile sensors and formation of k-barrier coverage with minimum energy cost.These two problems were formulated as 0–1 integer linear programming(ILP).The formulation is computationally intractable because of integrality and complicated constraints.Therefore,we relax the integrality and complicated constraints of the formulation and construct a special model known as RELAX-RSMN with a totally unimodular constraint coefficient matrix to solve the relaxed 0–1 ILP rapidly through linear programming.Theoretical analysis and simulation were performed to verify the effectiveness of our approach. 展开更多
关键词 k-barrier coverage linear programming wireless sensor networks
下载PDF
Intrusion Detection Model Based on Incomplete Information Ga me in Wireless Mesh Networks 被引量:1
12
作者 Chen Jing Du Ruiying +2 位作者 Yu Fajiang Zheng Minghui Zhang Huanguo 《China Communications》 SCIE CSCD 2012年第10期23-32,共10页
Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the sec... Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the security of wireless mesh networks is a precondition for practical use. Intrusion detection is pivotal for increasing network security. Considering the energy limitations in wireless mesh networks, we adopt two types of nodes: Heavy Intrusion Detection Node (HIDN) and Light Intrusion Detection Node (LIDN). To conserve energy, the LIDN detects abnorrml behavior according to probability, while the HIDN, which has sufficient energy, is always operational. In practice, it is very difficult to acquire accurate information regarding attackers. We propose an intrusion detection model based on the incomplete inforrmtion game (ID-IIG). The ID-IIG utilizes the Harsanyi transformation and Bayesian Nash equilibrium to select the best strategies of defenders, although the exact attack probability is unknown. Thus, it can effectively direct the deployment of defenders. Through experiments, we analyze the perforrmnce of ID-IIG and verify the existence and attainability of the Bayesian Nash equilibrium. 展开更多
关键词 game theory intrusion detection model WMNS
下载PDF
Intrusion Detection for Wireless Mesh Networks using Finite State Machine 被引量:5
13
作者 Yi Ping Wu Yue +1 位作者 Liu Ning Wang Zhiyang 《China Communications》 SCIE CSCD 2010年第5期40-48,共9页
Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protec... Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer suffi- cient and effective for those features. In this paper, we propose a distributed intrusion detection ap- proach based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we con- struct the Finite State Machine (FSM) by the way of manually abstracting the correct behaviors of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node's behavior by the Finite State Ma- chine (FSM), and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, we evaluate the intrusion detection method through simulation experiments. 展开更多
关键词 wireless mesh networks SECURITY intrusion detection finite state machine
下载PDF
On-line Detection of Gas Pipeline Based on the Real-Time Algorithm and Network Technology with Robot
14
作者 鄢波 颜国正 +3 位作者 丁国清 周斌 付西光 左建勇 《Journal of Donghua University(English Edition)》 EI CAS 2004年第5期93-97,共5页
The detection system integrates control technology, network technology, video encoding and decoding, video transmiss-ion, multi-single chip microcomputer communication, dat-abase technology, computer software and robo... The detection system integrates control technology, network technology, video encoding and decoding, video transmiss-ion, multi-single chip microcomputer communication, dat-abase technology, computer software and robot technology. The robot can adaptively adjust its status according to diameter (from 400 mm to 650 mm) of pipeline. The maximum detection distance is up to 1 000 m. The method of video coding in the system is based on fractal transformation. The experiments show that the coding scheme is fast and good PSNR. The precision of on-line detection is up to 3% thickness of pipeline wall. The robot can also have a high precision of location up to 0.03 m. The control method is based on network and characterized by on-line and real-time. The experiment in real gas pipeline shows that the performance of the detection system is good. 展开更多
关键词 on-line control control based on network fractal video coding(FVC) Non-Destructive Testing (NDT)
下载PDF
A Survey of Security Issues in Cognitive Radio Networks 被引量:9
15
作者 LI Jianwu FENG Zebing +1 位作者 FENG Zhiyong ZHANG Ping 《China Communications》 SCIE CSCD 2015年第3期132-150,共19页
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili... In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs. 展开更多
关键词 CRNs security physical layer security security capacity active attacks passive attacks
下载PDF
Behavior analysis of malicious sensor nodes based on optimal response dynamics
16
作者 GONG Junhui HU Xiaohui HONG Peng 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2022年第1期96-104,共9页
Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The acc... Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The accurate analysis of the attack behavior of malicious sensor nodes can help to configure intrusion detection system,reduce unnecessary system consumption and improve detection efficiency.However,the completely rational assumption of the traditional game model will cause the established model to be inconsistent with the actual attack and defense scenario.In order to formulate a reasonable and effective intrusion detection strategy,we introduce evolutionary game theory to establish an attack evolution game model based on optimal response dynamics,and then analyze the attack behavior of malicious sensor nodes.Theoretical analysis and simulation results show that the evolution trend of attacks is closely related to the number of malicious sensors in the network and the initial state of the strategy,and the attacker can set the initial strategy so that all malicious sensor nodes will eventually launch attacks.Our work is of great significance to guide the development of defense strategies for intrusion detection systems. 展开更多
关键词 wireless sensor network intrusion detection malicious node evolutionary game optimal response dynamics
下载PDF
A Method for Node Fault Detection in Wireless Sensor Networks 被引量:3
17
作者 高志鹏 黄日茂 +1 位作者 陈颖慧 芮兰兰 《China Communications》 SCIE CSCD 2011年第1期28-34,共7页
To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the conf... To reduce excessive computing and communication loads of traditional fault detection methods,a neighbor-data analysis based node fault detection method is proposed.First,historical data is analyzed to confirm the confidence level of sensor nodes.Then a node's reading data is compared with neighbor nodes' which are of good confidence level.Decision can be made whether this node is a failure or not.Simulation shows this method has good effect on fault detection accuracy and transient fault tolerance,and never transfers communication and computing overloading to sensor nodes. 展开更多
关键词 wireless sensor network fault detection neighbor nodes
下载PDF
Detection of Selfish Behavior in Wireless Ad Hoc Networks Based on CUSUM Algorithm
18
作者 刘春凤 舒炎泰 +1 位作者 YANG Oliver 李明远 《Transactions of Tianjin University》 EI CAS 2010年第2期104-108,共5页
The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, ... The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, a wireless node can distinguish if there is a selfish behavior in the wireless network. The detection efficiency is validated using a Qualnet simulator. An IEEE 802.11 wireless ad hoc network with 20 senders and 20 receivers spreading out randomly in a given area is evaluated. The well-behaved senders use minimum contention window size of 32 and maximum con- tention window size of I 024, and the selfish nodes are assumed not to use the binary exponential strategy for which the contention window sizes are both fixed as 16. The transmission radius of all nodes is 250 m. Two scenarios are investigated: a single-hop network with nodes spreading out in 100 m^100 m, and all the nodes are in the range of each other; and a multi-hop network with nodes spreading out in 1 000 m~ 1 000 m. The node can monitor the backoff time from all the other nodes and run the detection algorithms over those samples. It is noted that the threshold can significantly affect the detection time and the detection accuracy. For a given threshold of 0.3 s, the false alarm rates and the missed alarm rates are less than 5%. The detection delay is less than 1.0 s. The simulation results show that the algorithm has short detection time and high detection accuracy. 展开更多
关键词 ad hoc networks selfish behavior DETECTION CUSUM
下载PDF
New event detection based on sorted subtopic matching algorithm
19
作者 翟东海 CUI Jing-jing +1 位作者 NIE Hong-yu DU Jia 《Journal of Chongqing University》 CAS 2013年第4期179-186,共8页
How to quickly and accurately detect new topics from massive data online becomes a main problem of public opinion monitoring in cyberspace. This paperpresents a new event detection method for the current new event det... How to quickly and accurately detect new topics from massive data online becomes a main problem of public opinion monitoring in cyberspace. This paperpresents a new event detection method for the current new event detection system, based on sorted subtopic matching algorithm and constructs the entire design framework. In this p^per, the subtopics contained in old topics (or news stories) are sorted in descending order according to their importance to the topic(or news stories), and form a sorted subtopic sequence. In the process of subtopic matching, subtopic scoring matrix is used to determine whether a new story is reporting a new event. Experimental results show that the sorted subtopic matching model improved the accuracy and effectiveness ofthenew event detection system in cyberspace. 展开更多
关键词 new event detection topic detection scoring matrix sorted subtopic matching model subtopic sequence
下载PDF
FLBS: Fuzzy lion Bayes system for intrusion detection in wireless communication network
20
作者 NARENDRASINH B Gohil VDEVYAS Dwivedi 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第11期3017-3033,共17页
An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detecti... An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detection system (IDS). In this paper, the fuzzy lion Bayes system (FLBS) is proposed for intrusion detection mechanism. Initially, the data set is grouped into a number of clusters by the fuzzy clustering algorithm. Here, the Naive Bayes classifier is integrated with the lion optimization algorithm and the new lion naive Bayes (LNB) is created for optimally generating the probability measures. Then, the LNB model is applied to each data group, and the aggregated data is generated. After generating the aggregated data, the LNB model is applied to the aggregated data, and the abnormal nodes are identified based on the posterior probability function. The performance of the proposed FLBS system is evaluated using the KDD Cup 99 data and the comparative analysis is performed by the existing methods for the evaluation metrics accuracy and false acceptance rate (FAR). From the experimental results, it can be shown that the proposed system has the maximum performance, which shows the effectiveness of the proposed system in the intrusion detection. 展开更多
关键词 intrusion detection wireless communication network fuzzy clustering naive Bayes classifier lion naive Bayes system
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部