期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
计算机作战仿真中关于网络数据传输量问题的研究 被引量:5
1
作者 张靖男 杨建池 黄柯棣 《计算机仿真》 CSCD 2002年第6期7-9,共3页
计算机作战仿真已成为高技术条件下进行武器装备论证、武器性能评估、作战人员训练、战术战法研究甚至国家战略决策等不可或缺的一个环节。该文在介绍计算机作战仿真基本概念的基础上 ,重点讨论了分布式交互仿真中如何减少网络数据传输... 计算机作战仿真已成为高技术条件下进行武器装备论证、武器性能评估、作战人员训练、战术战法研究甚至国家战略决策等不可或缺的一个环节。该文在介绍计算机作战仿真基本概念的基础上 ,重点讨论了分布式交互仿真中如何减少网络数据传输量的问题 ,提出了几种解决问题的技术 ,其中 ,重点介绍了DR算法的应用。 展开更多
关键词 计算机作战仿真 网络数据传输 DR算法 数据压缩 数据打包 武器装备
下载PDF
飞行仿真系统网络传输与同步技术 被引量:4
2
作者 方伟 张兵强 +1 位作者 徐涛 方君 《海军航空工程学院学报》 2019年第2期199-204,共6页
网络通信是分布环境下飞行仿真系统需要解决的关键技术,包括网络传输量和时钟同步等。网络传输量方面,采用DR模型降低了网络数据更新频率,减少了数据通信量,并采用数据封包、解包的方法降低了网络频繁调用带来的时间损耗;时钟同步方面,... 网络通信是分布环境下飞行仿真系统需要解决的关键技术,包括网络传输量和时钟同步等。网络传输量方面,采用DR模型降低了网络数据更新频率,减少了数据通信量,并采用数据封包、解包的方法降低了网络频繁调用带来的时间损耗;时钟同步方面,采用了硬件同步电路和软件高性能时钟相结合的时钟同步方案,确保了飞行仿真系统时间推进的严格同步。在此基础上,构建了基于适配器模式的、支持多协议的通信引擎网络中间件,将顶层应用和底层通信进行有效隔离,降低了应用层开发量,加快了系统集成效率,在多型飞机模拟器中得到了应用。 展开更多
关键词 DR模型 飞行仿真系统 时钟同步 网络传输量 适配器
下载PDF
无线传感器网络中一种能量高效的skyline查询算法 被引量:1
3
作者 张晓琳 唐文斌 +1 位作者 魏朋佩 王颖 《计算机测量与控制》 CSCD 北大核心 2012年第6期1616-1618,共3页
针对分布式无线传感器网络环境下的skyline查询问题,提出了KSkySenor算法,有效地从传感器网络中获取更有意义的skyline结果;KSkySenor算法对感知数据进行预处理计算每个元组的支配能力,按照支配能力与各维度值之和对其进行排序,设计了... 针对分布式无线传感器网络环境下的skyline查询问题,提出了KSkySenor算法,有效地从传感器网络中获取更有意义的skyline结果;KSkySenor算法对感知数据进行预处理计算每个元组的支配能力,按照支配能力与各维度值之和对其进行排序,设计了一个基于聚簇的结构用于收集所有传感器读数,提出了一个剪枝方法用于渐进的从传感器网中获取skyline结果集;实验中分别改变传感器网络规模大小、数据维度、支配属性个数k,对KSkySensor算法进行测试,实验结果表明KSkySenor算法与先前的skyline查询处理算法相比具有很高效率,减少了无线传感器网络中的数据传输量,延长了网络生命周期。 展开更多
关键词 摘要:针对分布式无线传感器网络环境下的skyline查询问题 提出了KSkySenor算法 有效地从传感器网络中获取更有意义的skyline结果 KSkySenor算法对感知数据进行预处理计算每个元组的支配能力 按照支配能力与各维度值之和对其进行排序 设计了一个基于聚簇的结构用于收集所有传感器读数 提出了一个剪枝方法用于渐进的从传感器网中获取skyline结果集 实验中分别改变传感器网络规模大小、数据维度、支配属性个数^ 对KSkySensor算法进行测试 实验结果表明KSkySenor算法与先前的skyline查询处理算法相比具有很高效率 减少了无线传感器网络中的数据传输 延长了网络生命周期.关键宇:skyline 无线传感器网络 查询处理 k支配
下载PDF
云数据库中等宽直方图的分布式并行构造方法 被引量:6
4
作者 王阳 钟勇 +1 位作者 周渭博 杨观赐 《工程科学与技术》 EI CAS CSCD 北大核心 2018年第2期133-140,共8页
直方图能够直观描述数据分布,在数据库查询优化中起着重要作用。然而在分布式云数据库场景中,现有直方图构建方法存在并行资源利用率低,网络传输量较高的问题。针对该问题,基于关系型云数据库提出一种等宽直方图的分布式并行构造方法。... 直方图能够直观描述数据分布,在数据库查询优化中起着重要作用。然而在分布式云数据库场景中,现有直方图构建方法存在并行资源利用率低,网络传输量较高的问题。针对该问题,基于关系型云数据库提出一种等宽直方图的分布式并行构造方法。首先,根据集群中分布式存储的数据无关性,基于master-slave架构在直方图任务开始前由集群中请求发起节点对经RPC(remote procedure call)协议获取到的多个工作节点最值数据比较得到数据表在整个集群的全局最大值、最小值;然后,考虑到算法运行过程中数据传输量的优化,集群中工作节点对本地数据扫描、排序,划分至依据全局最值信息构建的直方图桶内,实现聚合子直方图的并行构建以提高集群计算资源利用率;最后,请求发起节点对并行构建的多个子直方图中边界值相等的桶频率值聚合得到全局直方图。算法利用分布式思想实现了关系型云数据库中直方图的构建,将计算任务划分成多个子任务并行执行,子直方图信息代替数据分片的传输大幅优化了网络带宽的负载。算法已应用于关系型云数据库内核以优化SQL语句执行路径的初始扫描开销、数据选择率等关键参数。人工合成数据与评分数据的实验结果证明,算法运行过程中的网络传输量与数据库表中元组个数无关,且具有良好的可拓展性。 展开更多
关键词 关系型云数据库 等宽直方图 数据分布 并行计算 网络传输量
下载PDF
A Learning-Based Channel Model for Synergetic Transmission Technology 被引量:4
5
作者 Liang Chen Li Haihan +2 位作者 Li Yunzhou Zhou Shidong Wang Jing 《China Communications》 SCIE CSCD 2015年第9期83-92,共10页
It is extensively approved that Channel State Information(CSI) plays an important role for synergetic transmission and interference management. However, pilot overhead to obtain CSI with enough precision is a signific... It is extensively approved that Channel State Information(CSI) plays an important role for synergetic transmission and interference management. However, pilot overhead to obtain CSI with enough precision is a significant issue for wireless communication networks with massive antennas and ultra-dense cell. This paper proposes a learning- based channel model, which can estimate, refine, and manage CSI for a synergetic transmission system. It decomposes the channel impulse response into multiple paths, and uses a learning-based algorithm to estimate paths' parameters without notable degradation caused by sparse pilots. Both indoor measurement and outdoor measurement are conducted to verify the feasibility of the proposed channel model preliminarily. 展开更多
关键词 channel model CSI synergetic transmission spectral efficiency learning-based channel measurement
下载PDF
通信局域网安全策略浅析
6
作者 张广安 《内蒙古煤炭经济》 2008年第1期115-116,共2页
由于上网的数据遭到不同程度的破坏,被删除或被复制,数据的安全性和自身的利益受到严重威胁。因此,不论在局域网还是在广域网中,网络的安全措施应是能全方位地针对各种不同的威胁和脆弱性,这样才能确保网络信息的保密性、完整性和可用性。
关键词 网络信息传输 网络信息保密性 网络安全策略
下载PDF
A special solution to transmission capacity of ad hoc networks
7
作者 陈昌海 Yin Changchuan +1 位作者 Li Nana Yue Guangxin 《High Technology Letters》 EI CAS 2011年第1期64-68,共5页
This paper presents an approximate expression to transmission capacity of ad hoc networks by using stochastic geometry. For there is no general close-form expression to the transmission capacity of ad hoc networks, by... This paper presents an approximate expression to transmission capacity of ad hoc networks by using stochastic geometry. For there is no general close-form expression to the transmission capacity of ad hoc networks, by using Taylor series, we obtain the exact series expression to transmission capacity first, then we take partial summation to yield an n-th order approximate expression. Further- more, compared with the exact expression under a special case, the accuracy of the n-th order ap- proximation has been studied. The numerical results show that the accuracy of the approximation is mainly determined by the order n, and a high accuracy can be obtained when the node density or the outage constraint is close to zero . 展开更多
关键词 ad hoc transmission capacity outage constraint APPROXIMATION normalized interference
下载PDF
A Combined Admission and Priority Control Mechanism for Assuring Communication Quality in VANETs integrated with Wireless Mesh Networks
8
作者 Do Trong Tuan Shiro Sakata Nobuyoshi Komuro 《Computer Technology and Application》 2012年第12期775-783,共9页
In this paper, we introduce a new combined priority and admission control mechanism applying in the VCN (Vehicular Communication Network) which is designed with an integration of the Vehicular Ad-hoc Networks (VAN... In this paper, we introduce a new combined priority and admission control mechanism applying in the VCN (Vehicular Communication Network) which is designed with an integration of the Vehicular Ad-hoc Networks (VANETs) based on standard IEEE 802.11 p and IEEE 802.11 s WMNs (Wireless Mesh Networks). Simulation experiments are intensively investigated to evaluate the novel combined priority and admission control mechanism to assure quality of the I2V (Infrastructure to Vehicle) emergency services occurred during the time video flows are being delivered between content servers and cars. The simulation results show effectiveness of proposed priority and admission control schemes in term of the minimized end-to-end delay as well as the increase of throughput and PDR (Packet Delivery Ratio) of the emergency data flow. 展开更多
关键词 Emergency services VANETs (vehicular ad-hoc networks) WMNs (wireless mesh networks) priority control admission control ITS (intelligent transportation systems).
下载PDF
Experimental Evaluation of TCP and ICMP in Network Measurement
9
作者 黎文伟 张大方 +1 位作者 谢高岗 杨金民 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期7-17,共11页
Network measurement is an important approach to understand network behaviors, which has been widely studied. Both Transfer Control Protocol (TCP) and Interact Control Messages Protocol (ICMP) are applied in networ... Network measurement is an important approach to understand network behaviors, which has been widely studied. Both Transfer Control Protocol (TCP) and Interact Control Messages Protocol (ICMP) are applied in network measurement, while investigating the differences between the measured results of these two protocols is an important topic that has been less investigated. In this paper, to compare the differences between TCP and ICMP when they are used in measuring host connectivity, RTT, and packet loss rate, two groups of comparison programs have been designed, and after careful evaluation of the program parameters, a lot of comparison experiments are executed on the Internet. The experimental results show that, there are significant differences between the host connectivity measured using TCP or ICMP; in general, the accuracy of connectivity measured using TCP is 20%- 30% higher than that measured using ICMP. The case of RTT and packet loss rate is complicated, which are related to path loads and destination host loads. While commonly, the RTF and packet loss rate" measured using TCP or ICMP are very close. According to the experimental results, some advices are also given on protocol selection for conducting accurate connectivity, RTF and packet loss rate measurements. 展开更多
关键词 network measurement network performance performance measurement TCP ICMP
下载PDF
Cross-Layer and One-Hop Neighbour-Assisted Video Sharing Solution in Mobile Ad Hoc Networks
10
作者 贾世杰 许长桥 +2 位作者 Gabriel-Miro Muntean 关建峰 张宏科 《China Communications》 SCIE CSCD 2013年第6期111-126,共16页
Fast resources discovery and high Quality of Service(QoS) guarantee are the key determinants for efficient Mobile P2P(MP2P) video sharing.In this paper,we propose a CrossLayer and One-Hop Neighbour-Assisted Video Shar... Fast resources discovery and high Quality of Service(QoS) guarantee are the key determinants for efficient Mobile P2P(MP2P) video sharing.In this paper,we propose a CrossLayer and One-Hop Neighbour-Assisted Video Sharing(CNVS) solution in Mobile Ad Hoc Networks(MANETs).By making use of crosslayer approaches to bridge the overlay and the MAC layer and with the help of dissemination assisted by one-hop neighbours,CNVS intelligently builds the resource-centric self-organization node cluster group.In order to meet the QoS requirement,by making use of video resources access cost model,each peer can disconnect a less efficient connection with the original supplier and choose a peer that provides a low access cost as the new supplier.Simulation results also show how CNVS achieves lower average end-to-end delay,less average number of hops for video data delivery,lower routing overhead and packet loss rate,and higher network throughput than another state-of-the-art solution. 展开更多
关键词 CROSS-LAYER video sharing CLUSTERING assist
下载PDF
Interference Coordination for Secrecy Enhancement in Random Wireless Networks
11
作者 BAI Juan TAO Xiaofeng XU Jin 《China Communications》 SCIE CSCD 2014年第8期28-36,共9页
The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference m... The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs. 展开更多
关键词 interference coordination poissonpoint process secrecy transmission capacity random wireless networks
下载PDF
Priority-Aware IP over Hierarchical WDM Ring Networks
12
作者 Jih-Hsin Ho 《Computer Technology and Application》 2015年第2期70-75,共6页
WDM (wavelength division multiplexing) appears to be the solution of choice for providing a faster networking infrastructure that can meet the explosive growth of the Internet. It has the scalability problem with in... WDM (wavelength division multiplexing) appears to be the solution of choice for providing a faster networking infrastructure that can meet the explosive growth of the Internet. It has the scalability problem with increasing the access node numbers in WDM ring architecture, so we further propose the alternatives of hierarchical WDM ring architecture. Since the traditional IP provides the best effort service only, the issue of supporting IP packets with QoS (quality of Service) transfer has become a crucial issue for multimedia transmission. We do so by addressing the priority-aware QoS model. Finally present performance analysis multiple classes of hierarchical WDM ring networks. 展开更多
关键词 Hierarchical WDM ring priority-aware performance analysis.
下载PDF
Traffic sensitive spectrum access scheme for cognitive radio networks
13
作者 陆佃杰 Huang Xiaoxia +1 位作者 Zhang Guijuan Fan Jianping 《High Technology Letters》 EI CAS 2014年第1期22-28,共7页
A traffic sensitive spectrum access scheme is proposed to satisfy the traffic load requirement of secondary users (SUs). In the proposed design, SU only accesses available channels which can meet the traffic demand.... A traffic sensitive spectrum access scheme is proposed to satisfy the traffic load requirement of secondary users (SUs). In the proposed design, SU only accesses available channels which can meet the traffic demand. To achieve this, the expected transmission time (E3W) of the SU is calcu- lated first based on the delivery ratio. Then, the channel idle time is estimated based on the activity of primary users (PUs). Therefore, available channels with estimated idle time longer than ETr could be chosen. With high probability, the SU can finish transmission on these channels without disruption, thereby satisfying the traffic load demand of the SU. Finally, our method is extended to the multi-channel scenario where each SU can access multiple channels simultaneously. Performance analysis shows that our method satisfies the requirement of SUs while effectively improving the throughput. 展开更多
关键词 opportunistic spectrum access expected transmission time cognitive radio net-work
下载PDF
Transferring Multi-Dimensional Quantum States and Preparing Quantum Networks in Cavity QED
14
作者 陈子翃 郑小兰 廖长庚 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第9期452-456,共5页
In this paper we propose a scheme for transferring quantum states and preparing quantum networks. Compared with the previous schemes, this scheme is more efficient, since three or four-dimensional quantum states can b... In this paper we propose a scheme for transferring quantum states and preparing quantum networks. Compared with the previous schemes, this scheme is more efficient, since three or four-dimensional quantum states can be transferred with a single step and information interchange of three-dimensional quantum states can be realized, which is a significant improvement. It is based on the resonant interaction of a three-mode cavity field with an atom. As a consequence, the interaction time is shortened greatly. Furthermore, we give some discussions about the feasibility of the scheme. 展开更多
关键词 multi-dimensional quantum states transfer quantum networks cavity QED
下载PDF
Dynamic routing and wavelength assignment algorithm of optical satellite networks based on cross-layer design
15
作者 文国莉 Zhang Qi +6 位作者 Tian Qinghua Wang Houtian Tao Ying Chen Dong Liu Naijin Shen Yufei Zhou Na 《High Technology Letters》 EI CAS 2017年第3期252-259,共8页
In order to overcome the adverse effects of Doppler wavelength shift on data transmission in the optical satellite networks,a dynamic routing and wavelength assignment algorithm based on crosslayer design( CL-DRWA) is... In order to overcome the adverse effects of Doppler wavelength shift on data transmission in the optical satellite networks,a dynamic routing and wavelength assignment algorithm based on crosslayer design( CL-DRWA) is introduced which can improve robustness of the network. Above all,a cross-layer optimization model is designed,which considers transmission delay and wavelength-continuity constraint,as well as Doppler wavelength shift. Then CL-DRWA is applied to solve this model,resulting in finding an optimal light path satisfying the above constraints for every connection request. In CL-DRWA,Bellman-Ford method is used to find an optimal route and a distributed relative capacity loss method is implemented to get an optimal wavelength assignment result on the optimal route. Moreover,compared with the dynamic routing and wavelength assignment algorithm based on minimum delay strategy( MD-DRWA),CL-DRWA can make an improvement of 5. 3% on the communication success probability. Meanwhile,CL-DRWA can meet the requirement of transmission delay for real-time services. 展开更多
关键词 cross-layer design Doppler wavelength shift dynamic routing and wavelength assignment optical satellite network
下载PDF
Capacity Analysis for Dynamic Space Networks
16
作者 Yang Lu Bo Li +2 位作者 Wenjing Kang Gongliang Liu Xueting Li 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第6期45-49,共5页
To evaluate transmission rate of highly dynamic space networks,a new method for studying space network capacity is proposed in this paper. Using graph theory,network capacity is defined as the maximum amount of flows ... To evaluate transmission rate of highly dynamic space networks,a new method for studying space network capacity is proposed in this paper. Using graph theory,network capacity is defined as the maximum amount of flows ground stations can receive per unit time. Combined with a hybrid constellation model,network capacity is calculated and further analyzed for practical cases. Simulation results show that network capacity will increase to different extents as link capacity,minimum ground elevation constraint and satellite onboard processing capability change. Considering the efficiency and reliability of communication networks,how to scientifically design satellite networks is also discussed. 展开更多
关键词 space network capacity hybrid constellation model graph theory practical cases
下载PDF
Quantum Network Coding on Networks with Arbitrarily Distributed Hidden Channels 被引量:1
17
作者 张盛 李洁 +1 位作者 董恒杰 刘进 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第10期415-420,共6页
Although perfect quantum network coding has been proved to be achievable, it is stiU puzzling whether it is feasible whenever one or more of the channels are replaced by the hidden ones emerging from quantum entanglem... Although perfect quantum network coding has been proved to be achievable, it is stiU puzzling whether it is feasible whenever one or more of the channels are replaced by the hidden ones emerging from quantum entanglement. The question is answered in this paper. First, we propose a quantum network coding protocol over a butterfly network with two hidden channels. Second, we investigate a more generaJ situation, where d-level quantum letters are transmitted through the network containing arbitrarily distributed hidden channels, and prove that quantum network coding on such networks is still achievable. 展开更多
关键词 quantum network coding quantum teleportation quantum communication
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部