共查询到19条相似文献,搜索用时 109 毫秒
1.
文章介绍了移动通信系统中无线定位技术的应用,对基于网络的无线定位方案中几类常用的无线定位方法以及影响定位精度的主要因素、对策进行了分析和讨论,最后提出了无线定位技术中有待进一步研究的课题。 相似文献
2.
定位技术在无线传感器网络中的应用 总被引:3,自引:0,他引:3
被誉为21世纪三大技术之一的无线传感器网络出现于20世纪90年代,之后受到了越来越多的关注。定位技术是无线传感器网络的核心技术之一,是网络大范围应用的基础。文章介绍了无线传感器网络定位技术在网络中的应用,描述了常用的定位方法及目前无线传感器网络定位算法的研究现状,结合网络特征讨论了下一步研究中需要解决的问题。 相似文献
3.
4.
5.
6.
7.
在CDMA系统中采用的定位技术被叫做“混合定位技术”,也就是说,为了达到定位的目的,采用了多种定位技术。这些技术大致可以分为两类:基于网络的定位技术和基于移动台(MS)的技术。 相似文献
8.
9.
10.
浅谈蜂窝移动系统中的定位技术 总被引:1,自引:1,他引:0
随着CDMA技术的应用与发展,蜂窝移动通信系统呈现出迅猛发展的势头。蜂窝网络中各种基于移动台位置的服务,如公共安全服务、基于移动台位置的计费、网络规划与设计、网络QoS和无线资源管理等,无不与准确定位移动台位置有关,使得对蜂窝网络中移动台定位技术的研究日趋活跃。本文综合论述了无线定位技术在第三代移动通信系统中的发展与应用现状,并对影响蜂窝网络无线定位精度的原因进行了详细分析与研究,最后指出了以后的研究方向。 相似文献
11.
近年来基于蜂窝网络对移动台进行定位估计的无线定位技术受到广泛的关注,目前的几种基于网络的定位方法在不同的信道和网络环境中表现出的性能各不相同,还没有一种技术能在各种不同信道和网络环境中都能表现出最佳性能,满足对蜂窝网络移动台定位的精度要求。数据融合是一种对不同类型数据进行融合,以取得比单一方法和技术更佳的数据输出的技术。论文将信息融合应用于无线定位之中,对无线定位的信息融合模型进行了深入的研究。 相似文献
12.
This paper considers the problem of the optimal introduction of digital switching equipment into an existing analog local telephone network. The criterion used is the present worth of annual charges. Using certain plausible assumptions, this multilocation dynamic problem is shown to reduce to an equivalent static problem. The latter can be expressed as a classical plant location problem for which several solution techniques are available in the operations research literature. 相似文献
13.
Fault diagnosis of analog circuits 总被引:9,自引:0,他引:9
《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1985,73(8):1279-1325
In this paper, various fault location techniques in analog networks are described and compared. The emphasis is on the more recent developments in the subject. Four main approaches for fault location are addressed, examined, and illustrated using simple network examples. In particular, we consider the fault dictionary approach, the parameter identification approach, the fault verification approach, and the approximation approach. Theory and algorithms that are associated with these approaches are reviewed and problems of their practical application are identified. Associated with the fault dictionary approach we consider fault dictionary construction techniques, methods of optimum measurement selection, different fault isolation criteria, and efficient fault simulation techniques. Parameter identification techniques that either utilize linear or nonlinear systems of equations to identify all network elements are examined very thoroughly. Under fault verification techniques we discuss node-fault diagnosis, branch-fault diagnosis, subnetwork testability conditions as well as combinatorial techniques, the failure bound technique, and the network decomposition technique. For the approximation approach we consider probabilistic methods and optimization-based methods. The artificial intelligence technique and the different measures of testability are also considered. The main features of the techniques considered are summarized in a comparative table. An extensive, but not exhaustive, bibliography is provided. 相似文献
14.
Preeti Yadav Subhash Chandra Sharma 《International Journal of Communication Systems》2023,36(4):e5397
In recent years, wireless sensor networks (WSNs) have been widely used in various applications. The localization problem has been identified as one of the biggest problems faced by WSNs. The traditional localization techniques may not be able to handle the issues during the scenario to estimate the location of sensor nodes due to anchor mobility, mobile WSNs, latency, energy harvesting, unfavorable environmental states, and many more issues. However, these issues open the door for the amalgamation of machine learning (ML) and optimization techniques with localization techniques. Motivated by the earlier discussion, we explored various ML and optimization techniques to estimate the location coordinates in a sensor network in this paper. Finally, a comparison of existing ML algorithms concerning optimization techniques has been presented, highlighting their improved outcomes. This research offers a detailed survey by exploring the various parameters for location estimation through tabular forms by incorporating ML and optimized localization techniques. A survey of surveys is also presented to identify the key limitations of existing surveys and to introduce the novelty in the comprehensive study done in this paper. A year-wise evaluation of ML Techniques with localization (2011–2022) is also discussed and presented over various performance parameters, including energy-efficiency, accuracy, error, and complexity. This discussion concluded that Hybrid Techniques are least explored for using optimized localization machine learning. Further, a summarized discussion of the various comparison tables paves the path for future research in the area of localization in WSN. 相似文献
15.
Privacy is a necessary component of any security discussion. Privacy and security must be considered separately as well as together. Threads of privacy are visible throughout the procedure of building security solutions for any system. The notions for privacy also play an important role in the technical implications of privacy preservation within any network or its subsystems. Analyzing the mitigations and protections for privacy are considered in privacy notions. The privacy notions being theoretical systems and identified vulnerabilities in the sensor networks not being mapped to such privacy preservation notions necessities the analytical review of privacy provisioning in wireless sensor network (WSN) being formalized within a framework consisting or the vulnerabilities associated with each component of the network and mechanisms of privacy preservation along with the privacy notions. The current research paper provides an analytical review of the privacy provisioning in WSNs with the perspective of development of a proposed framework for privacy notions and quantitative as well as qualitative measures associated with the privacy preservation in sensor network mapped with the various techniques implemented for privacy preservation of different components of the network and the network as a whole. This analytical review has been done on the basis of set of beliefs that an adversary has while launching an attack on the network. Further the existing techniques for privacy preservation of receiver and source node location, location of sink node, traffic analysis prevention and preserving temporal privacy in WSN have been analyses on the basis of adversary’s set of beliefs’ mitigated by them and the notion of privacy implemented by these techniques like k-anonymity, l-diversity or t-closeness. The present effort aims to provide the researchers with an insight of the new concept of belief mitigation for privacy provisioning in WSN. 相似文献
16.
17.
Maaz Rehan Halabi Hasbullah Ibrahima Faye Waqas Rehan Omer Chughtai Mubashir Husain Rehmani 《Wireless Networks》2018,24(6):1885-1903
In location management services, a destination advertises its position attributes to a set of vehicles called location servers while, a source obtains these attributes from such location servers to track destination. The location management techniques in VANET have been categorized into flooding-based, flat hashing-based, hierarchical hashing-based and hierarchical quorum-based techniques. In flooding-based location service, destination information is flooded to the entire network which results into high congestion, low throughput and non-scalable network. In flat hashing, a global hash function is applied to compute location servers of each destination which results into higher delay, drop and signaling overhead in large VANETs. In hierarchical hashing, global hash function computes location servers of destination in hierarchical order. It therefore suffers from handover signaling between servers, high load on the top hierarchy and location query delay when source and destination are apart. In hierarchical quorum-based, location servers are identified cluster-wise and therefore it also suffers from the problems similar to hierarchical techniques. To overcome these problems, ZoomOut Geographic Location Service (ZGLS) protocol is proposed which introduces flat quorum-based location management service. In contrast to the aforementioned techniques, the novelty of ZGLS lies in the fact that it has shifted the location server role from hashing-based or clustering-based geographic areas to few 1-hop neighbours, called relatives. The proposed protocol creates a chain of relatives to provide positioning and tracking service. To evaluate signalling overhead, timeliness and the reliability of update and query packets, ZGLS is compared with RLSMP and HRHLS through ns-2 simulations. The results reveal that ZGLS stands out as a better choice for large-scale sparse and dense VANETs. 相似文献
18.