共查询到20条相似文献,搜索用时 781 毫秒
1.
位置更新过程由移动终端发起,一般位置更新的失败率在10%以内,造成位置更新失败的原因多为无线链路故障、HLR无用户数据、网络传输故障等,单个LAC区位置更新成功率下降30%基本可以认定为异常。本文通过中创信令监测系统数据,针对上海移动网络发生的位置更新指标恶化进行深入分析,定位了产生位置更新失败的终端型号。 相似文献
2.
在低轨(LEO)卫星通信系统中,航行在国外的特殊终端位置更新时需查询国内地面站访问位置寄存器(VLR),导致了长距离的信令开销.为此,提出一种星上VLR数据库管理方案,使移动终端能通过查询星上VLR进行位置更新操作.将该方案运用于具体低轨卫星系统进行仿真.结果表明,该方案能优化系统的位置管理性能. 相似文献
3.
4.
物联网的关键理论、技术和应用已成为业界和学术界的研究热点,涵盖了从信息获取、传输、存储、处理直至应用的全过程。通过CDMA网络A信令接口获取信令变化信息,设计高速公路路况分析系统的体系架构和业务流程,在此基础上针对特定C网终端的信令交互数据研究统计分析算法,考虑用户位置更新间隔和基站关联数据密度两个关键属性,以省内部分... 相似文献
5.
6.
IMS域的位置管理策略研究 总被引:1,自引:0,他引:1
UMTS(Universal Mobile Telecommunications System)R6中IMS(IP Multimedia Subsystem)域的用户的位置都要注册到归属地网络,而且终端的所有SIP信令都要经过注册服务器,导致用户在漫游状态下控制信令的迂回路径变长并限制了用户对网络中应用的使用.该文对UMTS R6的IMS位置管理方案进行了改进,提出了IMS用户位置信息的分布式管理和联系人位置信息自适应缓存机制,使得其漫游状态下的位置注册和呼叫建立过程更加迅速.分析及仿真显示:新的位置管理策略从网络信令花费上优于原位置管理策略. 相似文献
7.
8.
9.
10.
11.
指挥系统是现代战争的重要武器装备,其通信性能关乎武器装备的正常工作。在研究前人工作的基础上,为了更加快速、高效地测试系统通信性能,提出了基于报文的指挥系统通信测试模型及其软件、硬件实现的基本思路。对指挥系统通信性能测试具有指导意义。 相似文献
12.
Theoretical Limits Analysis of Indoor Positioning System Using Visible Light and Image Sensor 下载免费PDF全文
To solve the problem of parameter optimization in image sensor‐based visible light positioning systems, theoretical limits for both the location and the azimuth angle of the image sensor receiver (ISR) are calculated. In the case of a typical indoor scenario, maximum likelihood estimations for both the location and the azimuth angle of the ISR are first deduced. The Cramer‐Rao Lower Bound (CRLB) is then derived, under the condition that the observation values of the image points are affected by white Gaussian noise. For typical parameters of LEDs and image sensors, simulation results show that accurate estimates for both the location and azimuth angle can be achieved, with positioning errors usually on the order of centimeters and azimuth angle errors being less than 1°. The estimation accuracy depends on the focal length of the lens and on the pixel size and frame rate of the ISR, as well as on the number of transmitters used. 相似文献
13.
Euisin Lee Fucai Yu Soochang Park Sang-Ha Kim Youngtae Noh Eun-Kyu Lee 《Wireless Networks》2014,20(3):493-509
Geographic routing in wireless sensor networks requires sources nodes to be aware of the location information of sinks to send their data. To provide the sink location service, quorum-based schemes have been proposed, which exploit crossing points between a quorum of a sink location announcement (SLA) message from a sink and a quorum of a sink location query (SLQ) message from a source node. For guaranteeing at least one crossing point in irregular sensor networks with void areas or irregular boundaries, the previous schemes however collect and flood the network boundary information or forward a SLA and SLQ message along the whole network boundary. In this paper, we design a novel quorum-based sink location service scheme that exploits circle and line quorums, which does not require the network boundary information and send a SLA and SLQ message along the whole network boundary. In the proposed scheme, a source node sends a SLQ message to the network center and sends another SLQ message to an edge node in the network boundary, thus generating a SLQ line quorum. On the other hand, a sink node sends a SLA message along a circle path whose center is the network center, thus forming a SLQ circle quorum. By this way, it is guaranteed that the SLQ and SLA quorums have at least one crossing point in irregular sensor networks. Both numerical analysis and extensive simulation results verify that the proposed scheme outperforms the existing schemes in terms of the delivery distance, the delivery hop count, and the energy consumption for providing sink location service. 相似文献
14.
15.
Jen-Yi Pan Wei-Tsong Lee Nen-Fu Huang 《Vehicular Technology, IEEE Transactions on》2003,52(1):240-253
The short message service (SMS), a bidirectional service for short alphanumeric (up to 160 bytes) messages, is a unique feature of GSM not found in older analog systems. Multireceiver short message traffic has increased amazingly over the years. We propose a multicast SMS architecture over our backbone network. Then, we demonstrate some approaches to maintain the SMS center location information consistent with the home location register and illustrate our scheme for mobile terminated short message transfer. Finally, we simulate and evaluate this architecture. Our simulation indicates that the proposed strong consistency approaches have optimal efficiency by adjusting parameters, and the proposed architecture efficiently provides self-routing capability and multicast functionality in our cellular backbone network. The study also provides a further insight on the issues of multicast wireless cellular backbone network and demonstrates a referable methodology to propose and analyze a multicast cellular backbone network, which can promote the technology of a personal communication network. 相似文献
16.
Aravamudhan Vanitha Ratnam Karunaharan Rangarajan Sampath 《Mobile Networks and Applications》1997,2(4):333-344
In a Personal Communication Services (PCS) network, mobile hosts communicate with other mobile hosts through base stations on a wired (static) network. The mobile hosts connect to different base stations through wireless links and the base stations to which mobile hosts are connected change depending on the current location of the mobile hosts. In this environment, the problem of efficiently delivering a multicast message from one mobile host to a group of other mobile hosts becomes challenging. In this paper, we present a multicast protocol that delivers multicast messages from a mobile host to a group of other mobile hosts without flooding the wired network. The multicast protocol is built on top of a user location strategy that should follow one of the three models of user location described in the paper. The basic multicast protocol proposed guarantees exactlyonce message delivery to all mobile hosts in the multicast group and also ensures that multicast messages are delivered in FIFO order from the point of view of the base station that originates the multicast message (referred to as BSFIFO). More importantly, an extension of the basic protocol is provided that, unlike earlier work, delivers multicast messages in FIFO order from the point of view of the mobile host that initiates the multicast message (referred to as MHFIFO). The modifications to be made to the multicast protocol to accommodate each of the three models of user location is also described. 相似文献
17.
Pillonetto G. Sparacino G. Cobelli C. 《IEEE transactions on bio-medical engineering》2001,48(11):1352-1354
Reconstructing insulin secretion rate (ISR) after a glucose stimulus by deconvolution is difficult because of its biphasic pattern, i.e., a rapid secretion peak is followed by a slower release. Here, we refine a recently proposed stochastic deconvolution method by modeling ISR as the multiple integration of a white noise process with time-varying statistics. The unknown parameters are estimated from the data by employing a maximum likelihood criterion. A fast computational scheme implementing the method is presented. Monte Carlo simulation results are developed which numerically show a more reliable ISR profile reconstructed by the new method. 相似文献
18.
Yang Xiao Hui Chen Hsiao-Hwa Chen Bo Sun Chen C.L.P. 《Wireless Communications, IEEE Transactions on》2007,6(6):2086-2095
Mobility databases such as home location register and visitor location register are adopted to support mobility management in personal communications services networks. If a visitor location register fails or crashes, the subscribers' services will be seriously degraded due to the loss or corruption of location information. In this paper, we optimize utilization of demand re-registration messages for an adaptive p-persistent backoff database failure restoration scheme. An analytical model is developed and validated with simulations to obtain the optimal utilization using appropriate parameters so that the failed visitor location register is restored with the fastest speed. Some interesting aspects on the performance are studied and their deep insights are observed, such as effects of message sizes on choices of system parameters, effects of the inaccurate estimated number of stations, etc. One observation is that optimizations of utilization and successful transmission probability are two different goals, and a value to achieve the optimal successful transmission probability does not necessarily ensure optimal utilization. Furthermore, we also propose a scheme how to handle the problem with inaccurate (estimated) number of stations. 相似文献
19.
A Privacy-Preserving Location Assurance Protocol for Location-Aware Services in VANETs 总被引:1,自引:1,他引:0
A location-aware service on a vehicular ad hoc networks (VANETs) is to provide services that distribute on-demand information for a certain geographic area of interest by taking advantage of vehicular communications. In this paper, we propose a secure and location assurance protocol in order to guarantee privacy preservation in vehicular communications and trustworthiness of location-aware services over VANETs. The proposed protocol enables a message verifier to have confidence that the location-aware information was responded from the vehicles passing through the target location area of interest without violating location privacy of the responders. To achieve our security objectives, we consider a pseudonym-based privacy-preserving authentication and a hierarchical identity-based cryptographic scheme. Furthermore, we demonstrate experimental results to confirm the efficiency and effectiveness of the proposed protocol. 相似文献
20.
基于信息熵的美军C4ISR系统效能评估 总被引:9,自引:1,他引:8
随着美军信息化水平的不断提高,C^4ISR系统“战斗力倍增器”的作用更加突出,对美军C^4ISR系统的效能进行评估并分析其对作战效能的影响,具有重要的理论和现实意义。对影响C^4ISR系统效能的相关因素进行了分析,利用香农信息熵和图论的方法,建立了C^4ISR系统效能评估方法,研究了信息、网络、作战流程等因素对作战效能的影响,并建立了数学模型;以美军航母战斗群空袭作战为例,比较了“平台中心战”和“网络中心战”两种作战方式中C^4ISR系统的效能。 相似文献