共查询到20条相似文献,搜索用时 156 毫秒
1.
提出了基于移动IP的内河船舶主动识别模型—即MIP-AIS。在研究主动识别搜索算法和模型原理的基础上,解决船舶在无线公网通信条件下,发现"邻近"船舶,实时信息传输和网络通信压力最小化等问题。 相似文献
2.
3.
基于AIS的船舶避碰系统研究 总被引:1,自引:0,他引:1
船舶自动识别系统AIS的诞生为船舶避碰提供了一种新方法,研究了船舶自动识别系统AIS的关键技术及其组成,设计了基于AIS的船舶避碰系统.该系统对AIS等设备采集的数据进行变换与接收,以DSP为信息处理和控制元件,采用FPGA以解决多接口的问题.AIS技术的引入,使船舶碰撞危险系数的计算更为精确,船舶与船舶之间、船舶与岸台之间的通信更加迅速. 相似文献
4.
针对船舶动力远程决策系统对信息通信的需求,本文基于现有大型船舶通信系统和北斗卫星通信系统,提出了两种切实可行的总体构想,并梳理了远程通信需要解决的关键技术。 所提总体构想可为解决船舶动力远程决策系统的信息通信问题提供研制思路。 相似文献
5.
本文介绍的一种基于主流移动操作系统的移动终端视频监控指挥通信技术,提出使用移动中间件模式来解决视频监控软件在各种移动平台上的复杂性、差异性问题,将远程视频监控、会议、控制等重要功能有效地扩展到移动系统上,兼容各种无线网络和主流移动操作系统,能够很好地解决由于无线网络带宽的局限性以及视频编解码技术瓶颈所造成的分辨率低、延时等问题,可满足应急指挥过程实时监控、视频通信、可视化调度的应用需求;能让决策者及相关专家同步"巡视现场",制定科学的指挥调度方案,做到快速判断、科学决策、精准指挥,有效提高相关部门处置突发公共安全事件的能力。 相似文献
6.
随着信息技术的快速发展和普及,移动通信产业发展势头十分迅猛,技术在不断地发展和更新,各种移动通信系统能够提供更大的通信容量和覆盖范围,满足用户对业务多种多样的需求.定位技术、报警功能、导航功能、监控功能等也逐渐进入移动通信的日常运用中.但对于小型船艇的海上用户,移动通信系统的业务和技术仍急需发展和改进.介绍了在移动通信系统中增强海上定位功能,为海上搜救工作提供技术支持;建立船舶用户手机自动识别系统,改进海上船舶识别能力;建立手机导航功能,建设移动通信电子海图系统等,不断增强手机有关功能,发展移动通信的业务,为小型船舶航海提供通信服务 相似文献
7.
考虑到在船舶航行的实际过程中,船舶自动识别系统(AIS)设备提供的船舶运动点迹往往呈现出信息缺失、非线性、多机动的问题,导致利用AIS设备辅助海上指挥系统难以准确判断船舶位置。针对以上问题,本文在传统卡尔曼滤波理论的基础上构建多项式卡尔曼滤波器拟合非线性系统,补偿航迹定位数据信息缺失、更新较慢等问题,并基于经纬度信息预测船舶运动轨迹。结果表明,该方法实现简单且收敛迅速,能够有效解决实际过程中船舶轨迹的预测问题,满足基本的实效性与准确性,能够为相关海事部门预测船舶目的、行为提供较为可靠的辅助手段。 相似文献
8.
基于单一通信手段的海上通信网络存在业务局限性,难以满足日益增多的海上通信需求,文中提出了一种多类型通信手段融合的新型组网方案,利用海上平台搭载各类传输速率、覆盖范围不同的无线通信手段,组成适应各类海上通信需求的一体化通信网络,实现海上机动区域动态组网、快速建网、融合补网的目标。依托国家重大工程应急通信试验网络建设项目的建设,通过对语音通信、数据传输、视频会商、水下通信与导航定位、船舶自动识别系统(Automatic Identification System, AIS)、SOS等各类通信业务的测试,验证了文中所提的多平台、多手段融合组网方案。 相似文献
9.
10.
随着经济的快速发展,远洋旅游、运输等商业活动愈发频繁。但由于远离陆地,没有移动通信信号,远洋船舶上无法使用移动通信来满足电话、短信收发和娱乐等通信业务的需求。为了解决远洋船舶融合通信的问题,本文提出基于5G与通信卫星相融合的天地一体化新型网络信息技术方案,构建了“卫星回传+边缘计算+网络切片”的组网模式,并通过实际案例验证了该组网模式的可行性,该组网模式可以有效解决远洋融合通信的问题。 相似文献
11.
研究异构传感网节能优化拓扑控制优化问题.在异构传感器网络中,每个传感器节点普遍存在初始能量异构,节点在无线通信过程中通信链路异构等异构现象.为了延长网络的生存期,提出一种自适应优化异构无线传感器网络拓扑结构控制算法.算法主要难点技术问题在于对参数E的选择控制问题.该算法基于传输数据跳数和相邻传感器之间通信距离,依据相似三角形几何原理,结合具体应用场景对传感器节点的分簇、成簇等操作进行自适应优化控制.仿真实验表明,改进的算法可以高效控制给定数据采集监测区域所有节点的网络拓扑同时极大地延长了异构传感网的生命周期. 相似文献
12.
13.
14.
Jingliang Chen Vasyl Yatskiv Anatoly Sachenko Jun Su 《Radioelectronics and Communications Systems》2017,60(5):215-224
The authors propose the method for data coding in wireless sensor networks (WSN) based on the transformation of the residue number system and multipath routing. It enables to utilize efficiently the bandwidth of communication channels as well as reduce message delivery time. It is explored the ant algorithm to search an optimal route of data transmission in the wireless sensor network. There is introduced a limitation for the communication radius of the wireless unit that shorts a number of the search decision modes and improves the accuracy of the wireless network simulation. The correspondent software is designed, it allowes exploring the dynamics of finding the optimal transmission path in WSN in case of different algorithm settings, and exploring the impact of the elite ants on the accuracy of the found path. 相似文献
15.
16.
Myung‐Sun Choi Han‐Kyu Park Youn‐Hyoung Heo Sang‐Hoon Oh Noh‐Hoon Myung 《ETRI Journal》2006,28(2):247-249
In the development of a new wireless communications system, a versatile and accurate radio channel for indoor communications is needed. In particular, the investigation of radio transmission into buildings is very important. In this letter, we present an improved three‐dimensional electromagnetic wave propagation prediction model for indoor wireless communications that takes into consideration building penetration loss. A ray tracing technique based on an image method is also employed in this study. Three‐dimensional models can predict any complex indoor environment composed of arbitrarily shaped walls. A speed‐up algorithm, which is a modified deterministic ray tube method, is also introduced for efficient prediction and computation. 相似文献
17.
This paper presents an analysis of resource assignment for multihop communications in millimeter‐wave (mm‐wave) wireless personal area networks. The purpose of this paper is to figure out the effect of using directional antennas and relaying devices (DEVs) in communications. The analysis is performed based on a grouping algorithm, categorization of the flows, and the relaying DEV selection policy. Three schemes are compared: direct and relaying concurrent transmission (DRCT), direct concurrent transmission (DCT), and direct nonconcurrent transmission (DNCT). Numerical results show that DRCT is better than DCT and DCT is better than DNCT for any antenna beamwidths under the proposed algorithm and policy. The results also show that using relaying DEVs increases the throughput up to 30% and that there is an optimal beamwidth that maximizes spatial reuse and depends on parameters such as the number of flows in the networks. This analysis can provide guidelines for improving the performance of mm‐wave band communications with relaying DEVs. 相似文献
18.
Cooperative communication based on relaying nodes has been considered as a promising technique to increase the physical layer security (PLS) performance in wireless communications. In this paper, an optimal power allocation (OPA) scheme based on Nelder‐Mead (NM) algorithm is proposed for improving the secrecy rate of amplify‐and‐forward (AF) cooperative relay networks employing cooperative jamming (CJ) scheme. The proposed hybrid jamming scheme allows the source and selected relay to transmit the jamming signal along with the information to confound the eavesdropper. The path selection probability of ant colony optimization (ACO) algorithm is used for selecting the relay for transmission. The performance based on secrecy rate is evaluated for “n” trusted relays distributed dispersedly between the source and destination. Gradient‐based optimization and three‐dimensional exhaustive search methods are used as benchmark schemes for comparison of the proposed power optimization algorithm. The secrecy performance is also compared with conventional AF scheme and CJ scheme without power optimization (EPA). The impact of single and multiple relays on secrecy performance is also evaluated. Numerical results reveal that, compared with the gradient method and exhaustive search algorithm, the proposed power allocation strategy achieves optimal performance. Also, the derived OPA results show a significantly higher secrecy rate than the EPA strategy for both CJ and AF schemes. 相似文献
19.