共查询到20条相似文献,搜索用时 15 毫秒
1.
Chih-Ming Fu Wen-Liang Hwang Chung-Lin Huang 《Communications, IEEE Transactions on》2007,55(6):1111-1115
We propose a subspace-based maximum-likelihood approach for acquiring the timing of wavelet-based multirate transmission systems. The S-curve analysis shows that our approach can correctly acquire the initial timing of a symbol from anywhere within a symbol-time interval at a cost of increasing jitter variance. 相似文献
2.
The paper considers a TCP/IP-style network with flow control at end-systems based on congestion feedback and routing decisions at network nodes on a per-destination basis. The main generalization with respect to standard IP is to allow routers to split their traffic in a controlled way between the outgoing links. We formulate global optimization criteria, combining those used in the congestion control and traffic engineering, and propose decentralized controllers at sources and routers to reach these optimal points, based on congestion price feedback. We first consider adapting the traffic splits at routers to follow the negative price gradient; we prove this is globally stabilizing when combined with primal congestion control, but can exhibit oscillations in the case of dual congestion control. We then propose an alternative anticipatory control of routing, proving its stability for the case of dual congestion control. We present a concrete implementation of such algorithms, based on queueing delay as congestion price. We use TCP-FAST for congestion control and develop a multipath variant of the distance vector routing protocol RIP. We demonstrate through ns2-simulations the collective behavior of the system, in particular that it reaches the desired equilibrium points. 相似文献
3.
4.
Dogu Arifler Gustavo de Veciana Brian L. Evans 《Networking, IEEE/ACM Transactions on》2007,15(1):67-79
Internet traffic primarily consists of packets from elastic flows, i.e., Web transfers, file transfers, and e-mail, whose transmissions are mediated via the Transmission Control Protocol (TCP). In this paper, we develop a methodology to process TCP flow measurements in order to analyze throughput correlations among TCP flow classes that can be used to infer congestion sharing in the Internet. The primary contributions of this paper are: 1) development of a technique for processing flow records suitable for inferring congested resource sharing; 2) evaluation of the use of factor analysis on processed flow records to explore which TCP flow classes might share congested resources; and 3)validation of our inference methodology using bootstrap methods and nonintrusive, flow level measurements collected at a single network site. Our proposal for using flow level measurements to infer congestion sharing differs significantly from previous research that has employed packet level measurements for making inferences. Possible applications of our method include network monitoring and root cause analysis of poor performance 相似文献
5.
We propose a new wavelet method for steady-state analysis of nonlinear circuits. The new method inherits the robustness of wavelet-based technique in handling very strong nonlinear circuits while offering significant reduction of simulation costs for circuits with widely separated time scales 相似文献
6.
7.
In accordance with the detecting process of multi-frequency signals between the offices in telephone networks, and in contrast with the autocorrelation method used to handle the multi-frequency signals, a fast,inexpensive and unbiased of cumulants estimation method is adopted in detecting signals. This detecting method is better for resisting noise performance and more practical than the autocorrelation method. 相似文献
8.
9.
1 Introduction There are two kinds of signals in distance telephone networks. One is a line signal, the other, a multifrequency signal. The multifrequency signals are divided into forward ones and backward ones. The forward signals adopt the coding patter… 相似文献
10.
The scheduling logic at the base station of a shared wireless medium supports time-dependent (synchronous) applications by allocating timely transmission grants. To this end, it must take into account not only the deadlines of the pending packets, but also the channel conditions for each potential sender, the requirements of nonsynchronous applications, and the packet retransmission strategy. With respect to these factors, we identify three scheduling scenarios and show that the scheduler logic faces a different challenge in addressing each of them. We then present a generic scheduling algorithm that translates all the factors relevant to each scenario into a common profit parameter, and selects the most profitable transmission instances. 相似文献
11.
12.
This paper proposes the use of scattering parameters (S-parameters) in the wavelet domain for the analysis of coupled multiconductor transmission lines, high-speed integrated circuits, and interconnects. S-parameters-based computing techniques are widely used in the analysis of networks characterized by a large number of integrated devices and interconnects. The theoretical and practical definition of the wavelet-based S matrix is shown, and then some numerical examples of its use and potential in the analysis of systems with linear and nonlinear terminations is shown and compared with other numerical techniques. The computational costs and the memory requirements of the wavelet representation of scattering matrix are also addressed 相似文献
13.
角点与边缘信息相结合的遥感图像飞机检测新方法 总被引:2,自引:1,他引:2
利用遥感图像中飞机目标的边缘特征和角点特征,提出边缘与角点信息相结合的遥感图像飞机检测新方法.首先,进行Canny边缘检测,提取遥感图像中飞机目标边缘信息,并利用OTSU算法二值化处理图像;然后,进行Harris角点检测,找出满足飞机角点分布特征的区域,去除伪目标;最后,进行区域生长式聚类,通过求取类心最终确定飞机位置.对60幅高分辨率遥感图像进行飞机检测测试,正确检测出238架飞机中的220架,漏检18架,48个虚警.实验表明,该方法可以有效解决复杂背景下飞机检测问题,具有良好的检测性能. 相似文献
14.
Jain Ankit Kumar Debnath Ninmoy Jain Arvind Kumar 《Wireless Personal Communications》2022,122(4):3227-3245
Wireless Personal Communications - The recent trend in wireless technology has been tremadously increased the demand of higher frequency bands from every corners of the mobile technology. As next... 相似文献
15.
16.
通过研究当今恶意程序的发展趋势,系统比较在通信隐藏和检测方面的诸多技术和方法,综合分析它们存在的不足,提出了一种基于NDIS来进行恶意程序隐藏检测的方法,很好的补充了恶意程序检测体系,实验表明该方法可以检测出当前所有进行通信隐藏的恶意程序。 相似文献
17.
When developers need to make a system available for a particular culture, the specific aspects of the target group are evaluated and then the content and navigation are ldquolocalizedrdquo for it. However, there are many situations in which Web media cannot be localized and hence, culturally heterogeneous users must interact with the same interface. The emerging strategy for this kind of usability is known as the shared meaning or shared context approach. This paper presents results of a between-group study of culturally heterogeneous users who provided shared contextual meanings and performance measures from interaction with a Web interface. Results were mixed but do suggest methods for how Websites may be developed in shared situations. 相似文献
18.
Jan Syed Rooh Ullah Jan Mian Ahmad Khan Rahim Ullah Hakeem Alam Muhammad Usman Muhammad 《Mobile Networks and Applications》2019,24(4):1295-1305
Mobile Networks and Applications - In Wireless Sensor Networks (WSNs), a dense deployment of sensor nodes produce data that contain intra-temporal and inter-spatial correlation. To reduce the... 相似文献
19.
20.
一种定量检验多维信号非线性的方法 总被引:1,自引:0,他引:1
利用多变量时间序列替代数据生成原理生成了实测多变量时间序列的多组替代时间序列,由广义关联积分计算了实测时间序列和替代时间序列的广义冗余,提出了一种用线性冗余和广义冗余作为显著性检验统计量定量检验多维信号非线性的方法。一个线性自回归模型和Lorenz系统的仿真计算验证了这种方法的有效性。 相似文献