期刊文献+
共找到422篇文章
< 1 2 22 >
每页显示 20 50 100
Developing architecture of a traveler information system for dynamic equilibrium in traffic networks 被引量:1
1
作者 Mohammad Hossein Noranian Ahmad Reza Tahsiri 《Journal of Modern Transportation》 2017年第2期106-115,共10页
Having criticized the current architecture of Advanced Traveler Information Systems (ATISs), this work discusses a new base of requirements to develop a new paradigm for traffic information systems. It mainly integr... Having criticized the current architecture of Advanced Traveler Information Systems (ATISs), this work discusses a new base of requirements to develop a new paradigm for traffic information systems. It mainly integrates three dimensions within a traffic system: drivers' pattern of behavior and preferences, urban traffic desires, and capabilities of traffic information service providers. Based on the above, functional segments from several related backgrounds are brought together to structure a new architecture, called Interactive Traveler Information System (ITIS). The main interactive feature of this new architecture is a two-way communication track between drivers and the traffic information system provider-in fact, a decision on choosing a road at a particular time for an individual will be made based on the utility of both sides. This new configuration consists of driver-side smartphone application, centric traffic prediction, and decision-maker units, which will shape a new approach of decision-making processes. These all work together to satisfy the designated goal of ITIS, which is preserving the Wardrop equilibrium condition in the traffic network level. Finally, we concentrate on a comparison study, which shows a differentiation between performance of the proposed ITIS and the current ATIS model in a real situation. This has been done with simulations of analogical scenarios. The most noticeable advantage of the proposed architecture is not being limited to a saturation limit, and the positive effect of increasing system penetration in the performance of the newly introduced information system. In conclusion, new research subjects are suggested to be carried out. 展开更多
关键词 Advanced Traveler information System (ATIS) System architecture Requirement engineering Mobile network Dynamic equilibrium - Intelligent transportation system
下载PDF
Study of Smart Grid Communication Network Architectures and Technologies
2
作者 Naeem Raza Muhammad Qasim Akbar +1 位作者 Aized Amin Soofi Samia Akbar 《Journal of Computer and Communications》 2019年第3期19-29,共11页
Smart Grid (SG) is an emerging paradigm of the modern world to upgrade and enhance the existing conventional electrical power infrastructure from generation to distribution to the consumers in a two-way communication ... Smart Grid (SG) is an emerging paradigm of the modern world to upgrade and enhance the existing conventional electrical power infrastructure from generation to distribution to the consumers in a two-way communication fashion to automate the electrical power demand and supply and make this a cyber-physical system. SG infrastructure key elements, such as smart meters, circuit breakers, transformers, feeders, substations, control centers, grid stations, are required well-formed communication network architectures. SG infrastructure is divided into three main communication networks architectures, such as HAH, NAN, and WAN. Each of these communication network architectures requires reliable, stable, secure, high data rate at real-time with the help of different wireline and wireless communication technologies from HAN to WAN networks. To understand the complete concepts about SG, a concise review is presented and it will help the readers to get foundations of communication network architectures and technologies of SG. 展开更多
关键词 Smart GRID communication network architectureS Wireline and Wireless communication Technologies HAN NAN WAN
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
3
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information Security network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security architecture
下载PDF
Future Mobile Terminal and Network Access Architecture for China 4G Open Mobile Communications 被引量:1
4
作者 Willie W.Lu 《China Communications》 SCIE CSCD 2009年第2期134-143,共10页
This paper relates to an advanced open mobile communication system and method of integrating the mobile communications, wireless access systems and wired communications into one common platform architecture for China&... This paper relates to an advanced open mobile communication system and method of integrating the mobile communications, wireless access systems and wired communications into one common platform architecture for China's 4th generation mobile communications, supporting costeffective broadband voice, data and video services in wireless, mobile and wired environment with one single integrated mobile terminal device. The paper includes new architecture in the integrated mobile device and converged network access, and minimum modifi cation in the existing mobile telecommunication infrastructures. This paper introduces the long-term evolution strategy for China's TDD system platform towards China's future 4G mobile communications. 展开更多
关键词 mobile terminal network access architecture 4G mobile communications
下载PDF
Application of Network Information Communication Technology in Power System
5
作者 Chuanpeng Liu 《Journal of Electronic Research and Application》 2018年第6期1-4,共4页
Network information communication technology in power systems is the key to ensuring the safe and efficient operation of power grids.The network information communication technology itself has advantages in automation... Network information communication technology in power systems is the key to ensuring the safe and efficient operation of power grids.The network information communication technology itself has advantages in automation operation and information transmission,thus is widely applied to the power system.In the case of ensuring that the power system is compatible with the network information communication technology,the control of the power system can be strengthened,and the operational efficiency of the power system can be improved.This paper mainly analyzes the specific application of network information communication technology in power system. 展开更多
关键词 POWER system network information communication technology APPLICATION
下载PDF
Impact of Enforcement of Right of Communication through Information Network
6
作者 Chen Wen Attorney-at-law of the Beijing Hankun Law Firm 《中国专利与商标》 2006年第4期89-93,共5页
On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 20... On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 2001 has been incorporated a new subject matter under the copyright protection: the right of communication through information network, that is, the right to make a work available to the public by wire or by wireless means, so that people may have access to the work from a place and at a time individu... 展开更多
关键词 PRO Impact of Enforcement of Right of communication through information network ISP
下载PDF
Regulations for the Protection of the Right of Communication through Information Network
7
《中国专利与商标》 2006年第3期90-94,共5页
Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication throug... Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially. 展开更多
关键词 Regulations for the Protection of the Right of communication through information network
下载PDF
Create Your Own Data and Energy Integrated Communication Network:A Brief Tutorial and a Prototype System 被引量:2
8
作者 Yali Zheng Yitian Zhang +2 位作者 Yang Wang Jie Hu Kun Yang 《China Communications》 SCIE CSCD 2020年第9期193-209,共17页
In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The... In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation. 展开更多
关键词 data and energy integrated communication network(DEIN) wireless power transfer(WPT) simultaneously wireless information and power transfer(SWIPT) RF charging hardware implementation
下载PDF
An Adaptive Routing Algorithm for Integrated Information Networks 被引量:11
9
作者 Feng Wang Dingde Jiang Sheng Qi 《China Communications》 SCIE CSCD 2019年第7期195-206,共12页
The integrated information network is a large capacity information network that integrates various communication platforms on the ground, at sea, in the air and in the deep air through the inter-satellite and satellit... The integrated information network is a large capacity information network that integrates various communication platforms on the ground, at sea, in the air and in the deep air through the inter-satellite and satellite-ground links to acquire information accurately, process it quickly, and transmit it efficiently. The satellite communication, as an important part of integrated information networks, is one of main approaches to acquire, process and distribute communication information and resources. In this paper, based on current researches of the satellite communication network, we put forward a 3-layer satellite communication network model based on the Software Defined Network (SDN). Meanwhile, to improve current routing policies of the Low Earth Orbit (LEO) satellite communication network, we put forward an Adaptive Routing Algorithm (ARA) to sustain the shortest satellite communication link. Experiment results show that the proposed method can effectively reduce link distance and communication delay, and realize adaptive path planning. 展开更多
关键词 INTEGRATED information network software defined network SATELLITE communication ROUTING POLICY adaptive PATH planning
下载PDF
Optimization of an Underwater Wireless Sensor Network Architecture with Wave Glider as a Mobile Gateway 被引量:1
10
作者 Tatiana A.Fedorova Vladimir A.Ryzhov +1 位作者 Nikolay N.Semenov Shaharin A.Sulaiman 《Journal of Marine Science and Application》 CSCD 2022年第2期179-196,共18页
This paper presents an original probabilistic model of a hybrid underwater wireless sensor network(UWSN),which includes a network of stationary sensors placed on the seabed and a mobile gateway.The mobile gateway is a... This paper presents an original probabilistic model of a hybrid underwater wireless sensor network(UWSN),which includes a network of stationary sensors placed on the seabed and a mobile gateway.The mobile gateway is a wave glider that collects data from the underwater network segment and retransmits it to the processing center.The authors consider the joint problem of optimal localization of stationary network nodes and the corresponding model for bypassing reference nodes by a wave glider.The optimality of the network is evaluated according to the criteria of energy efficiency and reliability.The influence of various physical and technical parameters of the network on its energy efficiency and on the lifespan of sensor nodes is analyzed.The analysis is carried out for networks of various scales,depending on the localization of stationary nodes and the model of bypassing the network with a wave glider.As a model example,the simulation of the functional characteristics of the network for a given size of the water area is carried out.It is shown that in the case of a medium-sized water area,the model of“bypassing the perimeter”by a wave glider is practically feasible,energy efficient and reliable for hourly data measurements.In the case of a large water area,the cluster bypass model becomes more efficient. 展开更多
关键词 Underwater wireless sensor network(UWSN) Wave glider(WG) Sensor network architecture Mobile gateway Hydroacoustic communication
下载PDF
Information security through controlled quantum teleportation networks 被引量:1
11
作者 Hala Hamdoun Alaa Sagheer 《Digital Communications and Networks》 SCIE 2020年第4期463-470,共8页
Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new m... Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new models to ensure the safe transmission of information through such systems.Recently,quantum systems have drawn much attention since they are expected to have a significant impact on the research in information security.This paper proposes a quantum teleportation scheme based on controlled multi-users to ensure the secure information transmission among users.Quantum teleportation is an original key element in a variety of quantum information tasks as well as quantum-based technologies,which plays a pivotal role in the current progress of quantum computing and communication.In the proposed scheme,the sender transmits the information to the receiver under the control of a third user or controller.Here,we show that the efficiency of the proposed scheme depends on the properties of the transmission channel and the honesty of the controller.Compared with various teleportation scheme presented recently in the literature,the most important difference in the proposed scheme is the possibility of suspicion about the honesty of the controller and,consequently,taking proper precautions. 展开更多
关键词 information security Machine-to-machine communication Intelligent secure systems Quantum teleportation Quantum networks
下载PDF
Fundamentals of Visualizing Communication Networks
12
作者 Jürgen Pfeffer 《China Communications》 SCIE CSCD 2013年第3期82-90,共9页
The human brain is built to process complex visual impressions within milliseconds. In comparison with sequentially coded spoken language and written texts, we are capable of consuming graphical information at a high ... The human brain is built to process complex visual impressions within milliseconds. In comparison with sequentially coded spoken language and written texts, we are capable of consuming graphical information at a high bandwidth in a parallel fashion, producing a picture worth more than a thousand words. Effective information visualization can be a powerful tool to capture people's attention and quickly communicate large amounts of data and complex information. This is particularly important in the context of communication data, which often describes entities (people, organizations) and their connections through communication. Visual analytics approaches can optimize the user-computer interaction to gain insights into communication networks and learn about their structures. Network visualization is a perfect instrument to better communicate the results of analysis. The precondition for effective information visualization and successful visual reasoning is the capability to draw "good" pictures. Even though communication networks are often large, including thousands or even millions of people, underlying visualization principles are identical to those used for visualizing smaller networks. In this article, you will learn about these principles, giving you the ability to assess the quality of network visualizations and to draw better network pictures by yourself. 展开更多
关键词 communication networks information visualization human perception
下载PDF
AR Display Method of a Person's Identifier near the Head on a Camera Screen Based on the GPS Information and Face Detection Using Ad hoc and P2P Networking
13
作者 Masahiro Gotou Kazumasa Takami 《Computer Technology and Application》 2016年第4期196-208,共13页
The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find ... The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find it useful to have a tool that enables them to associate the faces in fiont of them with the account names they know. This paper proposes a method that enables a person to identify the account name of the person ("target") in front of him/her using a smartphone. The attendees to a meeting exchange their identifiers (i.e., the account name) and GPS information using smartphones. When the user points his/her smartphone towards a target, the target's identifier is displayed near the target's head on the camera screen using AR (augmented reality). The position where the identifier is displayed is calculated from the differences in longitude and latitude between the user and the target and the azimuth direction of the target from the user. The target is identified based on this information, the face detection coordinates, and the distance between the two. The proposed method has been implemented using Android terminals, and identification accuracy has been examined through experiments. 展开更多
关键词 Ad hoc networking AR (augmented reality) face detection GPS information person's identifier P2P communication smartphone.
下载PDF
Design and Experimental Demonstration of Software Defined Space Optical Network (SDSON) Architecture Based on Cloud Platform
14
作者 Fangyuan Xing Hongxi Yin +3 位作者 Bin Wu Jianxin Liu Ming Li Jingchao Wang 《Journal of Computer and Communications》 2016年第3期7-13,共7页
Space information network is used for real time acquiring, transmitting and processing the space information on the space platform, which provides significant communication services for communication, navigation posit... Space information network is used for real time acquiring, transmitting and processing the space information on the space platform, which provides significant communication services for communication, navigation positioning and science exploration. In this paper, the architecture of Software Defined Space Optical Network (SDSON) based on cloud platform is designed by means of Software Defined Optical Network (SDON) and cloud services. The new architecture combining centralized and distributed management-control mechanism is a multi-layer and multi-domain architecture with powerful computing and storage ability. Moreover, reliable service and unreliable service communication models employed in the space information network are proposed considering the characteristic of Disruption/Delay Tolerant Network (DTN). Finally, the functional verification and demonstration are performed on our optical experimental network platform. 展开更多
关键词 Space information network SDON Cloud Control Plane communication Model
下载PDF
Research on IPv6 Transition Evolvement and Security Architecture of Smart Distribution Grid Data Communication System
15
作者 Xin Miao Xi Chen 《Journal of Energy and Power Engineering》 2012年第1期146-149,共4页
Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethe... Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems. 展开更多
关键词 Smart distribution grid data communication network IPV6 transition evolvement safety threaten security architecture.
下载PDF
A hierarchical autonomous system based space information network architecture and topology control 被引量:1
16
作者 ZHANG Wei ZHANG Gengxin +2 位作者 XIE Zhidong BIAN Dongming LI Yongqiang 《Journal of Communications and Information Networks》 2016年第3期77-89,共13页
SIN(Space Information Network)has recently emerged as a promising approach to solving the collaboration difficulty among current space programs.However,because of the SIN’s large scale,high component complexity,and d... SIN(Space Information Network)has recently emerged as a promising approach to solving the collaboration difficulty among current space programs.However,because of the SIN’s large scale,high component complexity,and dynamic characteristics,designing a proper SIN architecture is challenging.Firstly,we propose a novel SIN architecture,which is composed of GEO(Geostationary Earth Orbit)satellites as backbone network nodes,LEO(Low Earth Orbit)or other types of satellites as enhanced coverage nodes,and high-altitude platforms to meet the service requirements of emergency or hot-spot applications.Unlike most existing studies,the proposed architecture is AS(Autonomous-System)based.We decouple the complex SIN into simpler sub-networks using a hierarchical AS model.Then,we propose a topology control algorithm to minimize the time delay among sub-AS networks.We prove that the proposed algorithm achieves logical k-connectivity provided that the original physical topology has k-connectivity.Simulation results validate the theoretic analysis and effectiveness of the algorithm. 展开更多
关键词 space information network architecture autonomous system topology control time delay strong connectivity
原文传递
Study of An Integrated Security Solution for Network Information System
17
作者 Yangqing Zhu 《通讯和计算机(中英文版)》 2006年第3期35-39,56,共6页
下载PDF
Architecture and critical technologies of space information networks 被引量:6
18
作者 YU Quan WANG Jingchao BAI Lin 《Journal of Communications and Information Networks》 2016年第3期1-9,共9页
Focusing on its main requirements and challenges and by analyzing the characteristics of different space platforms,an overall architecture for space information networks is proposed based on national strategic plannin... Focusing on its main requirements and challenges and by analyzing the characteristics of different space platforms,an overall architecture for space information networks is proposed based on national strategic planning and the present development status of associated technologies.Furthermore,the core scientific problems that need to be solved are expounded.In addition,the primary considerations and a preliminary integrated demonstration environment for verification of key technologies are presented. 展开更多
关键词 space information networks system architecture distributed satellite clusters
原文传递
Architecture for Cellular Enabled Integrated Communication and Sensing Services 被引量:1
19
作者 Bo Liu Qixun Zhang +5 位作者 Zheng Jiang Dongsheng Xue Chenlong Xu Bowen Wang Xiaoming She Jinlin Peng 《China Communications》 SCIE CSCD 2023年第9期59-77,共19页
There is growing interest in the integrated sensing and communication(ISAC)to extend the 5G+/6G network capabilities by introducing sensing capability.While the solutions for mono-static or bi-static ISAC have shown f... There is growing interest in the integrated sensing and communication(ISAC)to extend the 5G+/6G network capabilities by introducing sensing capability.While the solutions for mono-static or bi-static ISAC have shown feasibility and benefits based on existing 5G physical layer design,whether and how to coordinate multiple ISAC devices to better exert networking performance are rarely discussed.3 rd Partnership Project(3GPP)has initiated the ISAC use cases study,and the follow-up studies for network architecture could be anticipated.In this article,we focus on gNB-based sensing mode and propose ISAC functional framework with given of highlevel service procedures to enable cellular based ISAC services.In the proposed ISAC framework,three types of network functions for sensing service as Sensing Function(SF),lightweight-Edge Sensing Function(ESF)and full-version-ESF are designed with interaction with network nodes to fulfill the latency requirements of ISAC use cases.Finally,with simulation evaluations and hardware testbed results,we further verify the performance benefit and feasibility to enable ISAC in 5G for the gNB-based sensing mode with new design on SF and related signaling protocols. 展开更多
关键词 integrated sensing and communication(ISAC) network architecture 5G system
下载PDF
Sonar Image Target Detection for Underwater Communication System Based on Deep Neural Network
20
作者 Lilan Zou Bo Liang +2 位作者 Xu Cheng Shufa Li Cong Lin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第12期2641-2659,共19页
Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and mo... Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and model detection performance is degraded due to the complex imaging environment,we proposed a more effective and robust target detection framework based on deep learning,which can make full use of the acoustic shadow information in the forward-looking sonar images to assist underwater target detection.Firstly,the weighted box fusion method is adopted to generate a fusion box by weighted fusion of prediction boxes with high confidence,so as to obtain accurate acoustic shadow boxes.Further,the acoustic shadow box is cut down to get the feature map containing the acoustic shadow information,and then the acoustic shadow feature map and the target information feature map are adaptively fused to make full use of the acoustic shadow feature information.In addition,we introduce a threshold processing module to improve the attention of the model to important feature information.Through the underwater sonar dataset provided by Pengcheng Laboratory,the proposed method improved the average accuracy by 3.14%at the IoU threshold of 0.7,which is better than the current traditional target detection model. 展开更多
关键词 Underwater communication intelligent sensor network target detection weighted frame fusion shadow information
下载PDF
上一页 1 2 22 下一页 到第
使用帮助 返回顶部