期刊文献+
共找到58篇文章
< 1 2 3 >
每页显示 20 50 100
TMN数据通信网的构造
1
作者 熊开盛 董兆鑫 《电子展望与决策》 1997年第6期40-42,共3页
本文在分析了TMN管理信息和几种数据通信网的特点的基础上。
关键词 电信管理网 数据通信网 tmn
下载PDF
DCGAN Based Spectrum Sensing Data Enhancement for Behavior Recognition in Self-Organized Communication Network 被引量:4
2
作者 Kaixin Cheng Lei Zhu +5 位作者 Changhua Yao Lu Yu Xinrong Wu Xiang Zheng Lei Wang Fandi Lin 《China Communications》 SCIE CSCD 2021年第11期182-196,共15页
Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately ... Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately analyze the communication behavior.Traditional means can hardly utilize the scarce and crude spectrum sensing data captured in a real scene.Thus,communication behavior recognition using raw sensing data under smallsample condition has become a new challenge.In this paper,a data enhanced communication behavior recognition(DECBR)scheme is proposed to meet this challenge.Firstly,a preprocessing method is designed to make the raw spectrum data suitable for the proposed scheme.Then,an adaptive convolutional neural network structure is exploited to carry out communication behavior recognition.Moreover,DCGAN is applied to support data enhancement,which realize communication behavior recognition under small-sample condition.Finally,the scheme is verified by experiments under different data size.The results show that the DECBR scheme can greatly improve the accuracy and efficiency of behavior recognition under smallsample condition. 展开更多
关键词 spectrum sensing communication behavior recognition small-sample data enhancement selforganized network
下载PDF
Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Application
3
作者 Ibraheem Al-Hejri Farag Azzedin +1 位作者 Sultan Almuhammadi Naeem Firdous Syed 《Computers, Materials & Continua》 SCIE EI 2024年第6期4197-4218,共22页
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ... The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes. 展开更多
关键词 IoT LIGHTWEIGHT computation complexity communication overhead cybersecurity threats threat prevention secure data transmission Wireless Sensor networks(WSNs) elliptic curve cryptography
下载PDF
Create Your Own Data and Energy Integrated Communication Network:A Brief Tutorial and a Prototype System 被引量:2
4
作者 Yali Zheng Yitian Zhang +2 位作者 Yang Wang Jie Hu Kun Yang 《China Communications》 SCIE CSCD 2020年第9期193-209,共17页
In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The... In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation. 展开更多
关键词 data and energy integrated communication network(DEIN) wireless power transfer(WPT) simultaneously wireless information and power transfer(SWIPT) RF charging hardware implementation
下载PDF
Design of Power Communication Data Network Management System and Implementation of Data Acquisition Module 被引量:1
5
作者 Yue Zhang Zefeng Jian Hao Wang 《Journal of Electronic Research and Application》 2021年第6期1-5,共5页
The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network managem... The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network management architecture of the power communication data network and the implementation of the data acquisition module in the network management system through theoretical analysis,for the reference of relevant personnel,in order to better promote the collection of power grid communication network data. 展开更多
关键词 Electric power communication network management system design data acquisition
下载PDF
Scheduling for constantly-evolving data broadcasting in asymmetric communication networks
6
作者 许华杰 李国徽 《Journal of Shanghai University(English Edition)》 CAS 2008年第6期508-514,共7页
Recent advances in wireless sensor networks and GPS have made constantly-evolving data a new type of data which bring a new challenge to traditional data processing methods. Data broadcasting is an effective means for... Recent advances in wireless sensor networks and GPS have made constantly-evolving data a new type of data which bring a new challenge to traditional data processing methods. Data broadcasting is an effective means for data dissemination in asymmetric communication networks, such as wireless networks. In this paper, definition of the mean uncertainty ratio of data is presented and a broadcasting scheme is proposed for constantly-evolving data dissemination. Simulation results show that the scheme can reduce the uncertainty of the broadcasted constantly-evolving data effectively at the cost of minor increase in data access time, in the case of no transmission error, transmission errors present, and multiple broadcast channels. As a result it benefits the qualities of the query results based on the data. 展开更多
关键词 symmetric communication networks constantly-evolving data BROADCASTING SCHEDULING
下载PDF
Model-based predictive controller design for a class of nonlinear networked systems with communication delays and data loss
7
作者 安宝冉 刘国平 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第8期211-216,共6页
This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems,... This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems, the model-based networked predictive control strategy can compensate for communication delay and data loss in an active way. The designed model-based predictive controller can also guarantee the stability of the closed-loop networked system. The simulation re- suits demonstrate the feasibility and efficacy of the proposed model-based predictive controller design scheme. 展开更多
关键词 communication delays data loss model-based networked predictive control
下载PDF
Secure vehicular data communication in Named Data Networking
8
作者 Xiaonan Wang Xilan Chen Xingwei Wang 《Digital Communications and Networks》 SCIE CSCD 2023年第1期203-210,共8页
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data N... Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives. 展开更多
关键词 Named data networking Reverse path Secure data communication
下载PDF
Traffic Scheduling Mechanism Based on Interference Avoidance for Meter Data Collection in Wireless Smart Grid Communication Networks
9
作者 SHAO Sujie GUO Shaoyong +2 位作者 QIU Xuesong MENG Luoming LEI Min 《China Communications》 SCIE CSCD 2015年第7期142-153,共12页
Meter Data Collection Building Area Network(MDCBAN) deployed in high rises is playing an increasingly important role in wireless multi-hop smart grid meter data collection. Recently, increasingly numerous application ... Meter Data Collection Building Area Network(MDCBAN) deployed in high rises is playing an increasingly important role in wireless multi-hop smart grid meter data collection. Recently, increasingly numerous application layer data traffic makes MDCBAN be facing serious communication pressure. In addition, large density of meter data collection devices scattered in the limited geographical space of high rises results in obvious communication interference. To solve these problems, a traffic scheduling mechanism based on interference avoidance for meter data collection in MDCBAN is proposed. Firstly, the characteristics of network topology are analyzed and the corresponding traffic distribution model is proposed. Next, a wireless multi-channel selection scheme for different Floor Gateways and a single-channel time unit assignment scheme for data collection devices in the same Floor Network are proposed to avoid interference. At last, a data balanced traffic scheduling algorithm is proposed. Simulation results show that balanced traffic distribution and highly efficient and reliable data transmission can be achieved on the basis of effective interference avoidance between data collection devices. 展开更多
关键词 smart grid communication meter data collection traffic scheduling interference avoidance building area network
下载PDF
Information-Defined Networks:A Communication Network Approach for Network Studies 被引量:2
10
作者 Wenjie Jia Tao Jiang 《China Communications》 SCIE CSCD 2021年第7期197-210,共14页
The research of complex networks facilitates the progress of various disciplines,including biology,chemistry,social science,computer,and communication engineering.Recently,it is popular to utilize complex networks to ... The research of complex networks facilitates the progress of various disciplines,including biology,chemistry,social science,computer,and communication engineering.Recently,it is popular to utilize complex networks to study the communication networks,such as designing efficient routing strategies and robust communication networks.However,exploiting the advantages of communication networks to investigate networks in various disciplines beyond telecommunications is still in infancy.Because of this situation,this paper proposes an information-defined network(IDN)framework by which a complex network can be abstracted as a communication network associated with multiple intelligent agents.Specifically,each component and dynamic process in this framework can be defined by information.We show that the IDN framework promotes the research of unsolved problems in the current complex network field,especially for detecting new interaction types in realworld networks. 展开更多
关键词 network data analysis label detection complex network communication network network evolution
下载PDF
Energy-Efficient Mobile Data Collection Adopting Node Cooperation in an Underwater Acoustic Sensor Network
11
作者 Yougan Chen Xiaoting Jin Xiaomei Xu 《China Communications》 SCIE CSCD 2017年第6期32-42,共11页
This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node ind... This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node individually employing traditional automatic-repeat-request(ARQ) protocol.We propose a practical node cooperation(NC) protocol to enhance the collection efficiency,utilizing the fact that underwater nodes can overhear the transmission of others.To reduce the source level of underwater nodes,the underwater data collection area is divided into several sub-zones,and in each sub-zone,the mobile surface node adopting the NC protocol could switch adaptively between selective relay cooperation(SRC) and dynamic network coded cooperation(DNC) .The difference of SRC and DNC lies in whether or not the selected relay node combines the local data and the data overheard from undecoded node(s) to form network coded packets in the retransmission phase.The NC protocol could also be applied across the sub-zones due to the wiretap property.In addition,we investigate the effects of different mobile collection paths,collection area division and cooperative zone design for energy saving.The numerical results showthat the proposed NC protocol can effectively save energy compared with the traditional ARQ scheme. 展开更多
关键词 underwater acoustic sensor networks mobile data collection node cooperation cooperative communications energy efficiency
下载PDF
Guest Editorial Special Issue on Network and Communication Security
12
作者 Chin-Chen Chang Ming-Shiang Hwang 《Journal of Electronic Science and Technology》 CAS 2012年第3期193-194,共2页
Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. ... Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users can buy a lot of products through the e-commerce market. Thus, how to protect users' private data from being compromised on the Internet has become a very important research issue in recent years. 展开更多
关键词 data Guest Editorial Special Issue on network and communication Security very CHEN OVER
下载PDF
Data Aggregation-based Transmission Method in Ultra-Dense Wireless Networks
13
作者 Dae-Young Kim Seokhoon Kim 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期727-737,共11页
As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-t... As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-type communication(MTC),whereby numerous,various are generated.MTC devices generally have resource constraints and use wireless communication.In this kind of network,data aggregation is a key function to provide transmission efficiency.It can reduce the number of transmitted data in the network,and this leads to energy saving and reducing transmission delays.In order to effectively operate data aggregation in UDNs,it is important to select an aggregation point well.The total number of transmitted data may vary,depending on the aggregation point to which the data are delivered.Therefore,in this paper,we propose a novel data aggregation scheme to select the appropriate aggregation point and describe the data transmission method applying the proposed aggregation scheme.In addition,we evaluate the proposed scheme with extensive computer simulations.Better performances in the proposed scheme are achieved compared to the conventional approach. 展开更多
关键词 data aggregation data transmission ultra-dense network machine-type communication Internet of Things
下载PDF
Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security
14
作者 V.Sridhar K.V.Ranga Rao +4 位作者 Saddam Hussain Syed Sajid Ullah Roobaea Alroobaea Maha Abdelhaq Raed Alsaqour 《Computers, Materials & Continua》 SCIE EI 2023年第1期1693-1708,共16页
NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of servic... NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of services(QoS).In order to improve throughput and minimum latency,aMultivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access(MRRWPBA-NOMA)technique is introduced for network communication.In the downlink transmission,each mobile device’s resources and their characteristics like energy,bandwidth,and trust are measured.Followed by,the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different weak hypotheses i.e.,Multivariate Renkonen Regression functions.Based on the classification,resource and trust-aware devices are selected for transmission.Simulation of the proposed MRRWPBA-NOMA technique and existing methods are carried out with different metrics such as data delivery ratio,throughput,latency,packet loss rate,and energy efficiency,signaling overhead.The simulation results assessment indicates that the proposed MRRWPBA-NOMA outperforms well than the conventional methods. 展开更多
关键词 Mobile network multivariate renkonen regression weighted preference bootstrap aggregation resource-aware secure data communication NOMA
下载PDF
Anonymous data collection scheme for cloud-aided mobile edge networks
15
作者 Anxi Wang Jian Shen +2 位作者 Chen Wang Huijie Yang Dengzhi Liu 《Digital Communications and Networks》 SCIE 2020年第2期223-228,共6页
With the rapid spread of smart sensors,data collection is becoming more and more important in Mobile Edge Networks(MENs).The collected data can be used in many applications based on the analysis results of these data ... With the rapid spread of smart sensors,data collection is becoming more and more important in Mobile Edge Networks(MENs).The collected data can be used in many applications based on the analysis results of these data by cloud computing.Nowadays,data collection schemes have been widely studied by researchers.However,most of the researches take the amount of collected data into consideration without thinking about the problem of privacy leakage of the collected data.In this paper,we propose an energy-efficient and anonymous data collection scheme for MENs to keep a balance between energy consumption and data privacy,in which the privacy information of senors is hidden during data communication.In addition,the residual energy of nodes is taken into consideration in this scheme in particular when it comes to the selection of the relay node.The security analysis shows that no privacy information of the source node and relay node is leaked to attackers.Moreover,the simulation results demonstrate that the proposed scheme is better than other schemes in aspects of lifetime and energy consumption.At the end of the simulation part,we present a qualitative analysis for the proposed scheme and some conventional protocols.It is noteworthy that the proposed scheme outperforms the existing protocols in terms of the above indicators. 展开更多
关键词 Cloud-aided mobile edge networks Anonymous data collection communication model Path selection
下载PDF
Research on IPv6 Transition Evolvement and Security Architecture of Smart Distribution Grid Data Communication System
16
作者 Xin Miao Xi Chen 《Journal of Energy and Power Engineering》 2012年第1期146-149,共4页
Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethe... Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems. 展开更多
关键词 Smart distribution grid data communication network IPV6 transition evolvement safety threaten security architecture.
下载PDF
Internet of Vehicles in Big Data Era 被引量:22
17
作者 Wenchao Xu Haibo Zhou +4 位作者 Nan Cheng Feng Lyu Weisen Shi Jiayin Chen Xuemin (Sherman) Shen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期19-35,共17页
As the rapid development of automotive telematics,modern vehicles are expected to be connected through heterogeneous radio access technologies and are able to exchange massive information with their surrounding enviro... As the rapid development of automotive telematics,modern vehicles are expected to be connected through heterogeneous radio access technologies and are able to exchange massive information with their surrounding environment. By significantly expanding the network scale and conducting both real-time and long-term information processing, the traditional Vehicular AdHoc Networks(VANETs) are evolving to the Internet of Vehicles(Io V), which promises efficient and intelligent prospect for the future transportation system. On the other hand, vehicles are not only consuming but also generating a huge amount and enormous types of data, which is referred to as Big Data. In this article, we first investigate the relationship between Io V and big data in vehicular environment, mainly on how Io V supports the transmission, storage, computing of the big data, and how Io V benefits from big data in terms of Io V characterization,performance evaluation and big data assisted communication protocol design. We then investigate the application of Io V big data in autonomous vehicles. Finally, the emerging issues of the big data enabled Io V are discussed. 展开更多
关键词 Autonomous vehicles big data big data applications data communication IoV vehicular networks
下载PDF
Coal mine gas monitoring system based on wireless sensor network 被引量:2
18
作者 王建 王汝琳 +1 位作者 王学民 沈传河 《Journal of Coal Science & Engineering(China)》 2007年第1期107-111,共5页
Based on the nowadays' condition, it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems. The wireless sensors distributed in the environment can achieve... Based on the nowadays' condition, it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems. The wireless sensors distributed in the environment can achieve the intelligent gas monitoring system. Apply with multilayer data fuse to design working tactics, and import the artificial neural networks to analyze detecting result. The wireless sensors system communicates with the control center through the optical fiber cable. All the gas sensor nodes distributed in coal mine are combined into an intelligent, flexible structure wireless network system, forming coal mine gas monitoring system based on wireless sensor network. 展开更多
关键词 GAS communication system wireless sensor network data fuse artificial neural networks
下载PDF
Secure Remote Access IPSEC Virtual Private Network to University Network System 被引量:1
19
作者 Gajendra Sharma 《Journal of Computer Science Research》 2021年第1期16-27,共12页
With the popularity of the Internet and improvement of information technology,digital information sharing increasingly becomes the trend.More and More universities pay attention to the digital campus,and the construct... With the popularity of the Internet and improvement of information technology,digital information sharing increasingly becomes the trend.More and More universities pay attention to the digital campus,and the construction of digital library has become the focus of digital campus.A set of manageable,authenticated and secure solutions are needed for remote access to make the campus network be a transit point for the outside users.Remote Access IPSEC Virtual Private Network gives the solution of remote access to e-library resources,networks resources and so on very safely through a public network.It establishes a safe and stable tunnel which encrypts the data passing through it with robust secured algorithms.It is to establish a virtual private network in Internet,so that the two long-distance network users can transmit data to each other in a dedicated network channel.Using this technology,multi-network campus can communicate securely in the unreliable public internet. 展开更多
关键词 IPSEC VPN network communication data ENCRYPTION Integrity authentication Remote access UNIVERSITY Security Server CLIENT PEER
下载PDF
A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System
20
作者 ZHANG Xiao-Hong MIN Le-Quan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第6X期1115-1124,共10页
Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital ... Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital image with 8 bits into unrecognizable disorder codes and then transforms the disorder codes into an RGB digital image with 16 bits for transmitting. A receiver uses a non-symmetric key to verify the authentication of the received data origin, and decrypts the ciphertext. The scheme can encrypt and decz:Fpt most formatted digital RGB images recognized by computers, and recover the plaintext almost without any errors. The scheme is suitable to be applied in network image communications. The analysis of the key space, sensitivity of key parameters, and correlation of encrypted images imply that this scheme has sound security. 展开更多
关键词 generalized chaos synchronization Sinai map image confusion non-symmetric key data origin authentication network communication
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部