期刊文献+
共找到3,593篇文章
< 1 2 180 >
每页显示 20 50 100
Intelligent Spectrum Management Based on Radio Map for Cloud-Based Satellite and Terrestrial Spectrum Shared Networks 被引量:3
1
作者 Ximu Zhang Min Jia +1 位作者 Xuemai Gu Qing Guo 《China Communications》 SCIE CSCD 2021年第12期108-118,共11页
Cloud-based satellite and terrestrial spectrum shared networks(CB-STSSN)combines the triple advantages of efficient and flexible net-work management of heterogeneous cloud access(H-CRAN),vast coverage of satellite net... Cloud-based satellite and terrestrial spectrum shared networks(CB-STSSN)combines the triple advantages of efficient and flexible net-work management of heterogeneous cloud access(H-CRAN),vast coverage of satellite networks,and good communication quality of terrestrial networks.Thanks to the complementary coverage characteristics,any-time and anywhere high-speed communications can be achieved to meet the various needs of users.The scarcity of spectrum resources is a common prob-lem in both satellite and terrestrial networks.In or-der to improve resource utilization,the spectrum is shared not only within each component but also be-tween satellite beams and terrestrial cells,which intro-duces inter-component interferences.To this end,this paper first proposes an analytical framework which considers the inter-component interferences induced by spectrum sharing(SS).An intelligent SS scheme based on radio map(RM)consisting of LSTM-based beam prediction(BP),transfer learning-based spec-trum prediction(SP)and joint non-preemptive prior-ity and preemptive priority(J-NPAP)-based propor-tional fair spectrum allocation is than proposed.The simulation result shows that the spectrum utilization rate of CB-STSSN is improved and user blocking rate and waiting probability are decreased by the proposed scheme. 展开更多
关键词 cloud-based satellite and terrestrial spec-trum shared networks spectrum management inter-ference analysis spectrum utilization rate
下载PDF
Core-based Shared Tree Multicast Routing Algorithms for LEO Satellite IP Networks 被引量:6
2
作者 Cheng Lianzhen Zhang Jun Liu Kai 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2007年第4期353-361,共9页
A new core-based shared tree algorithm, viz core-cluster combination-based shared tree (CCST) algorithm and the weighted version (i.e. w-CCST algorithm) are proposed in order to resolve the channel resources waste... A new core-based shared tree algorithm, viz core-cluster combination-based shared tree (CCST) algorithm and the weighted version (i.e. w-CCST algorithm) are proposed in order to resolve the channel resources waste problem in typical source-based multicast routing algorithms in low earth orbit (LEO) satellite IP networks. The CCST algorithm includes the dynamic approximate center (DAC) core selection method and the core-cluster combination multicast route construction scheme. Without complicated onboard computation, the DAC method is uniquely developed for highly dynamic networks of periodical and regular movement. The core-cluster combination method takes core node as the initial core-cluster, and expands it stepwise to construct an entire multicast tree at the lowest tree cost by a shortest path scheme between the newly-generated core-cluster and surplus group members, which results in great bandwidth utilization. Moreover, the w-CCST algorithm is able to strike a balance between performance of tree cost and that of end-to-end propagation delay by adjusting the weighted factor to meet strict end-to-end delay requirements of some real-time multicast services at the expense of a slight increase in tree cost. Finally, performance comparison is conducted between the proposed algorithms and typical algorithms in LEO satellite IP networks. Simulation results show that the CCST algorithm significantly decreases the average tree cost against to the others, and also the average end-to-end propagation delay ofw-CCST algorithm is lower than that of the CCST algorithm. 展开更多
关键词 satellite IP networks LEO multicast routing shared tree CORE
下载PDF
A Shared Multi-buffer Banyan Network
3
作者 南华 《High Technology Letters》 EI CAS 1997年第1期67-69,共3页
A Shared Multi-buffer Banyan Network is presented in this letter. Its control algorithm and switching fabric are simple, and it fits the high speed ATM network well. The simulation results show that the throughput of ... A Shared Multi-buffer Banyan Network is presented in this letter. Its control algorithm and switching fabric are simple, and it fits the high speed ATM network well. The simulation results show that the throughput of the proposed model is high. 展开更多
关键词 ASYNCHRONOUS TRANSFER MODE Banyan network shareD multi-buffer
下载PDF
ZTE Holds 1/4 Global CDMA Network Market Share
4
作者 Frost&Sullivan 《ZTE Communications》 2009年第3期2-2,共1页
ZTE Corporation,a leading global provider of telecommunications equipment and network solutions,announced on July 30,2009 that it has been ranked as the second largest global CDMA network supplier with 25%
关键词 ZTE Holds 1/4 Global CDMA network Market share CDMA
下载PDF
Green Multicast Grooming Based on Cross-Shared Protection in Optical WDM Networks
5
作者 YU Cunqian LIU Yejun JIANG Peipei ZHU Lijiao GOU Lei HAO Liyuan 《China Communications》 SCIE CSCD 2014年第5期105-113,共9页
Currently,multicast survivability in optical network obtains more attention.This paper focuses on the field of multicast grooming shared protection in green optical network and designs a novel auxiliary graph and a sh... Currently,multicast survivability in optical network obtains more attention.This paper focuses on the field of multicast grooming shared protection in green optical network and designs a novel auxiliary graph and a shared matrix to address the survivable multicast resource consumption.This paper also proposes a new heuristic called Green Multicast Grooming algorithm based on spanning path Cross-Shared protection(GMGCSP),in which network reliability,energy efficiency and resource utilization are jointly considered.Simulation results testify that,compared to other algorithms,the proposed GMG-CSP not only has lower blocking probability and higher bandwidth utilization ratio,but also saves more energy. 展开更多
关键词 green optical network multicast cross-shared grooming shared matrix
下载PDF
M/S Controller Area Network(CAN) System Using Shared-Clock Scheduler
6
作者 LIU Jianxin1,TAN Ping2,LIU Yu1 (1.School of Mechanical Engineering & Automation,Xihua University,Chengdu 610039,China 2.School of Mathematical & Computer Science,Xihua University,ChengDu 610039,China) 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S1期284-288,共5页
The Controller Area Network (CAN) is a well established control network for automotive and automation control applications. Time-Triggered Controller Area Network (TTCAN) is a recent development which introduces a ses... The Controller Area Network (CAN) is a well established control network for automotive and automation control applications. Time-Triggered Controller Area Network (TTCAN) is a recent development which introduces a session layer,for message scheduling,to the existing CAN standard,which is a two layer standard comprising of a physical layer and a data link layer. TTCAN facilitates network communication in a time-triggered fashion,by introducing a Time Division Multiple Access style communication scheme. This allows deterministic network behavior,where maximum message latency times can be quantified and guaranteed. In order to solve the problem of determinate time latency and synchronization among several districted units in one auto panel CAN systems,this paper proposed a prototype design implementation for a shared-clock scheduler based on PIC18F458 MCU. This leads to improved CAN system performance and avoid the latency jitters and guarantee a deterministic communication pattern on the bus. The real runtime performance is satisfied. 展开更多
关键词 TIME-TRIGGERED controller area network auto PANEL shared-clock SCHEDULER embedded SYSTEM
下载PDF
Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust
7
作者 Xiaoyan Zhu Ruchun Jia +1 位作者 Tingrui Zhang Song Yao 《Computers, Materials & Continua》 SCIE EI 2024年第3期4363-4377,共15页
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ... The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system. 展开更多
关键词 Zero trust access policy air traffic information sharing network privacy data tam-per-proof certification features
下载PDF
ZTE Gains Second Largest Share of the Global Optical Networking Market in 2011
8
作者 ZTE Corporation 《ZTE Communications》 2012年第3期F0002-F0002,共1页
22 August 2012 -- ZTE Corporation, a publicly listed global provider of telecommunications equipment and network solutions, announced its interim results for the six months ended 30 June 2012. Based on both HKFRS and... 22 August 2012 -- ZTE Corporation, a publicly listed global provider of telecommunications equipment and network solutions, announced its interim results for the six months ended 30 June 2012. Based on both HKFRS and PRC ASBE, ZTE recorded revenue of RMB 42.64 billion for the period, an increase of 15.2% year-on-year. Pre-tax profit in the period was RMB 656 million, a decrease of 48.5% year-on-year. Basic earnings per share for the period were RMB 0.07. During the reporting period, 展开更多
关键词 ZTE Gains Second Largest share of the Global Optical networking Market in 2011
下载PDF
ZTE Gains Second Largest Share of the Global Optical Networking Market in 2011
9
《ZTE Communications》 2012年第2期F0002-F0002,共1页
ZTE gained the second largest share of the global optical networking market of any company for the second year in a row. ZTE gained 1.8 share points on 2010. In two years, the company moved from world No. 5 to world N... ZTE gained the second largest share of the global optical networking market of any company for the second year in a row. ZTE gained 1.8 share points on 2010. In two years, the company moved from world No. 5 to world No. 2 in the global optical network market, and its annual revenues now surpass $1.7 billion. 展开更多
关键词 ZTE Gains Second Largest share of the Global Optical networking Market in 2011
下载PDF
Resource Allocation based on Shared Criterion in OFDMA Distributed Radio Access Network 被引量:1
10
作者 Yang Bo Tang Youxi 《China Communications》 SCIE CSCD 2010年第1期16-22,共7页
Distributed radio access network (DRAN) is a novel wireless access architecture and can solve the problem of the available spectrum scarcity in wireless communications. In this paper, we investigate resource allocatio... Distributed radio access network (DRAN) is a novel wireless access architecture and can solve the problem of the available spectrum scarcity in wireless communications. In this paper, we investigate resource allocation for the downlink of OFDMA DRAN. Unlike previous exclusive criterion based algorithms that allocate each subcarrier to only one user in the system, the proposed algorithms are based on shared criterion that allow each subcarrier to be allocated to multiple users through different antennas and to only one user through same antenna. First, an adaptive resource allocation algorithm based on shared criterion is proposed to maximize total system rate under each user's minimal rate and each antenna's maximal power constraints. Then we improve the above algorithm by considering the influence of the resource allocation scheme on single user. The simulation results show that the shared criterion based algorithm provide much higher total system rate than that of the exclusive criterion based algorithm at the expense of the outage performance and the fairness, while the improved algorithm based on shared criterion can achieve a good tradeoff performance. 展开更多
关键词 resource ALLOCATION distributed radio ACCESS network (DRAN) ORTHOGONAL frequency DIVISION multiple ACCESS (OFDMA) shareD criterion
下载PDF
含产消者租赁共享储能的主动配电网协同优化决策
11
作者 王国英 王成福 +2 位作者 牛远方 姚文亮 王康 《电力系统自动化》 北大核心 2025年第1期105-116,共12页
共享储能作为一种新兴储能运营模式,在降低产消者投资成本、提高储能利用效率等方面发挥了重要作用。但是,当前产消者彼此间以及其与共享储能运营商之间的复杂交互和利益竞争加剧了主动配电网优化调控的难度。因此,提出一种含产消者租... 共享储能作为一种新兴储能运营模式,在降低产消者投资成本、提高储能利用效率等方面发挥了重要作用。但是,当前产消者彼此间以及其与共享储能运营商之间的复杂交互和利益竞争加剧了主动配电网优化调控的难度。因此,提出一种含产消者租赁共享储能的主动配电网协同优化决策方法。首先,构建了一种考虑配电系统运营商、产消者和共享储能运营商间交互影响的多主体协同交易框架。其次,建立了计及共享储能参与的点对点电力共享交易机制,并据此提出了产消者租赁共享储能的两阶段定价策略,采用议价因子指标量化价格制定过程中各主体的议价能力。然后,建立了基于改进纳什议价的主动配电网博弈优化模型,在指数项中引入议价因子用以设定其在目标中的权重,实现收益的合理分配。最后,采用改进的IEEE 33节点配电系统进行算例仿真,验证了所提方法的有效性。 展开更多
关键词 主动配电网 共享储能 产消者 多主体协同交易 点对点共享交易机制 改进纳什议价 优化
下载PDF
面向分布式数据安全共享的高速公路路网拥堵监测
12
作者 李林锋 陈羽中 +1 位作者 姚毅楠 邵伟杰 《福建师范大学学报(自然科学版)》 北大核心 2025年第1期11-20,共10页
应用人工智能技术对高速公路路网道路状态进行监测已成为热点,然而,数据孤岛及隐私保护是高速路网智能决策面临的挑战。为实现分布式数据安全共享及智能决策,以拥堵问题为例,提出基于联邦学习的高速路网道路拥堵状态监测策略。利用摄像... 应用人工智能技术对高速公路路网道路状态进行监测已成为热点,然而,数据孤岛及隐私保护是高速路网智能决策面临的挑战。为实现分布式数据安全共享及智能决策,以拥堵问题为例,提出基于联邦学习的高速路网道路拥堵状态监测策略。利用摄像头实时数据,在密态可计算的同态加密联邦学习智能决策架构下,建立基于道路区间优化的拥堵状态监测模型。结果表明,在确保分布式数据安全共享的前提下,能够有效实现高速路网道路拥堵状态监测。 展开更多
关键词 高速公路路网 道路拥堵状态 数据安全共享 智能决策 联邦学习 同态加密
下载PDF
SHARING AND PLANNING OF DISTRIBUTED EQUIPMENT FOR NETWORKED MANUFACTURING 被引量:2
13
作者 CAO Le LIU Fei 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2007年第1期73-76,共4页
Efficient utilization of the equipment distributed in different enterprises and optimal allocation of these resources is an important concern for networked manufacturing. The third party based equipment sharing approa... Efficient utilization of the equipment distributed in different enterprises and optimal allocation of these resources is an important concern for networked manufacturing. The third party based equipment sharing approach is put forward to optimize the utilization of distributed equipment for networked manufacturing; Taking advantage of the shared equipment offered by equipment providers by means of lease agreement, the third party carries out production by establishing networked virtual factory. Operational mechanism of the third party based equipment sharing is discussed, and characteristics of this approach in achieving resource allocation are analyzed. Shared equipment planning is formulated as an optimization problem with the objective of maximizing profits for equipment coordinator, a mathematical model for shared equipment planning is developed. Finally a case study is discussed to show the effectiveness of the planning model. 展开更多
关键词 networked manufacturing Equipment sharing Equipment planning
下载PDF
Impact of utilization of hepatitis C positive organs in liver transplant:Analysis of united network for organ sharing database 被引量:2
14
作者 Amaninder Dhaliwal Banreet Dhindsa +3 位作者 Daryl Ramai Harlan Sayles Saurabh Chandan Rajani Rangray 《World Journal of Hepatology》 2022年第5期984-991,共8页
BACKGROUND The utility of hepatitis C virus(HCV)organs has increased after the Food and Drug Administration approval of direct acting anti-viral(DAA)medications for the HCV treatment.The efficacy of DAA in treating HC... BACKGROUND The utility of hepatitis C virus(HCV)organs has increased after the Food and Drug Administration approval of direct acting anti-viral(DAA)medications for the HCV treatment.The efficacy of DAA in treating HCV is nearly 100%.AIM To analyze the United Network for Organ Sharing(UNOS)database to compare the survival rates between the hepatitis C positive donors and negative recipients and hepatitis C negative donors and recipients.METHODS We analyzed the adult patients in UNOS database who underwent deceased donor liver transplant from January 2014 to December 2017.The primary endpoint was to compare the survival rates among the four groups with different hepatitis C donor and recipient status:(Group 1)Both donor and recipient negative for HCV(Group 2)Negative donor and positive recipient for HCV(Group 3)Positive donor and negative recipient for HCV(Group 4)Both positive donor and recipient for HCV.SAS 9.4 software was used for the data analysis.Kaplan Meier log rank test was used to analyze the estimated survival rates among the four groups.RESULTS A total of 24512 patients were included:Group 1:16436,Group 2:6174,Group 3:253 and Group 4:1649.The 1-year(Group 1:91.8%,Group 2:92.12%,Group 3:87%,Group 4:92.8%),2-year(Group 1:88.4%,Group 2:88.1%,Group 3:84.3%,Group 4:87.5%),3-year(Group 1:84.9%,Group 2:84.3%,Group 3:75.9%,Group 4:83.2%)survival rates showed no statistical significance among the four groups.Kaplan Meier log rank test did not show any statistical significance difference in the estimated survival rates between Group 3 vs all the other groups.CONCLUSION The survival rates in hepatitis C positive donors and negative recipients are similar as compared to both hepatitis C negative donors and recipients.This could be due to the use of DAA therapy with cure rates of nearly 100%.This study supports the use of hepatitis C positive organs in the selected group of recipients with and without HCV infection.Further long-term studies are needed to further validate these findings. 展开更多
关键词 Hepatitis C Liver transplant Survival United network for Organ Sharing Direct acting antiviral
下载PDF
Proactive Spectrum Monitoring for Suspicious Wireless Powered Communications in Dynamic Spectrum Sharing Networks 被引量:1
15
作者 Yu Zhang Guojie Hu Yueming Cai 《China Communications》 SCIE CSCD 2021年第12期119-138,共20页
This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamm... This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamming-assisted spec-trum monitoring scheme via spectrum monitoring data(SMD)transmission is proposed to maximize the sum ergodic monitoring rate at SM.In SWPC,the suspi-cious communications of each data block occupy mul-tiple independent blocks,with a block dedicated to the wireless energy transfer by the energy-constrained suspicious nodes with locations in a same cluster(symmetric scene)or randomly distributed(asymmet-ric scene)and the remaining blocks used for the in-formation transmission from suspicious transmitters(STs)to suspicious destination(SD).For the sym-metric scene,with a given number of blocks for SMD transmission,namely the jamming operation,we first reveal that SM should transmit SMD signal(jam the SD)with tolerable maximum power in the given blocks.The perceived suspicious signal power at SM could be maximized,and thus so does the correspond-ing sum ergodic monitoring rate.Then,we further reveal one fundamental trade-off in deciding the op-timal number of given blocks for SMD transmission.For the asymmetric scene,a low-complexity greedy block selection scheme is proposed to guarantee the optimal performance.Simulation results show that the jamming-assisted spectrum monitoring schemes via SMD transmission achieve much better perfor-mance than conventional passive spectrum monitor-ing,since the proposed schemes can obtain more accu-rate and effective spectrum characteristic parameters,which provide basic support for fine-grained spectrum management and a solution for spectrum security in dynamic spectrum sharing network. 展开更多
关键词 proactive spectrum monitoring sum er-godic monitoring rate jamming-assisted proactive spectrum monitoring HALF-DUPLEX fundamental trade-off dynamic spectrum sharing network
下载PDF
On Measuring the Privacy of Anonymized Data in Multiparty Network Data Sharing 被引量:1
16
作者 陈晓云 苏玉洁 +2 位作者 唐晓晟 黄小红 马严 《China Communications》 SCIE CSCD 2013年第5期120-127,共8页
This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the sce... This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the scenario involving multiparty network data sharing with Trusted Third Party (TTP) is proposed. Simulations are then conducted using network data from different sources, and show that the measurement indicators defined in this paper can adequately quantify the privacy of the network. In particular, it can indicate the effect of the auxiliary information of the adversary on privacy. 展开更多
关键词 privacy network data anonymization multiparty network data sharing
下载PDF
Supply Chain Network Equilibrium with Revenue Sharing Contract under Demand Disruptions 被引量:4
17
作者 A-Ting Yang Lin-Du Zhao 《International Journal of Automation and computing》 EI 2011年第2期177-184,共8页
Contract is a common and effective mechanism for supply chain coordination,which has been studied extensively in recent years.For a supply chain network model,contracts can be used to coordinate it because it is too i... Contract is a common and effective mechanism for supply chain coordination,which has been studied extensively in recent years.For a supply chain network model,contracts can be used to coordinate it because it is too ideal to obtain the network equilibrium state in practical market competition.In order to achieve equilibrium,we introduce revenue sharing contract into a supply chain network equilibrium model with random demand in this paper.Then,we investigate the influence on this network equilibrium state from demand disruptions caused by unexpected emergencies.When demand disruptions happen,the supply chain network equilibrium state will be broken and change to a new one,so the decision makers need to adjust the contract parameters to achieve the new coordinated state through bargaining.Finally,a numerical example with a sudden demand increase as a result of emergent event is provided for illustrative purposes. 展开更多
关键词 Supply chain network EQUILIBRIUM revenue sharing contract demand disruptions coordination.
下载PDF
A distributed authentication and authorization scheme for in-network big data sharing 被引量:3
18
作者 Ruidong Li Hitoshi Asaeda +1 位作者 Jie Li Xiaoming Fu 《Digital Communications and Networks》 SCIE 2017年第4期226-235,共10页
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, w... Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes. 展开更多
关键词 Big data Security Authentication ACCESS control In-network data sharing Information-centric network
下载PDF
A distributed adaptive multi-hop certification authority schemefor mobile Ad Hoc networks 被引量:1
19
作者 TanXuezhi WuShaochuan JiaShilou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期265-272,共8页
This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification aut... This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design. 展开更多
关键词 mobile Ad Hoc networks threshold secret share certification authority.
下载PDF
Key Technologies of 3G WCDMA Network Sharing
20
作者 Zhang Jian (Mobile Division of ZTE Corporation, Shanghai 201203, China) 《ZTE Communications》 2005年第2期5-8,共4页
Based on the latest research findings of 3GPP on network sharing, this paper introduces 4 solutions to WCDMA 3G network sharing: site sharing, common network sharing, geographically split network sharing, and radio ac... Based on the latest research findings of 3GPP on network sharing, this paper introduces 4 solutions to WCDMA 3G network sharing: site sharing, common network sharing, geographically split network sharing, and radio access network sharing. It also analyzes the key network sharing technologies, including the lu-Flex function in Release 5, the UTRAN sharing mechanism in the connected mode in Release 5 and the mechanism of network sharing support enhancement in Release 6. 展开更多
关键词 WCDMA SGSN UTRAN PLMN Key Technologies of 3G WCDMA network Sharing
下载PDF
上一页 1 2 180 下一页 到第
使用帮助 返回顶部