首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
对多校区校园网络中的关键节点进行准确检测识别,优化网络路由设计,提高网络的安全稳定性。提出一种基于自适应融合探测的多校区校园网络关键节点识别方法,构建多校区校园网络的有向图分析模型,对网络节点传输信道模型进行均衡处理,对关键节点传输数据进行自适应融合,通过路由探测算法实现节点定位识别和优化部署。仿真结果表明,采用该方法构建多校区校园网络,实现关键节点识别的精度较高,降低了网络传输的丢包率和误码率,网络稳定性和安全性较好。  相似文献   

2.
《信息技术》2019,(8):93-97
为了提高移动无线通信网络路由节点的传输均衡性,提出一种基于最优分集均衡配置的无线网络传输信道优化模型,构建移动无线通信组网下的路由节点部署模型,采用最短路径寻优方法进行路由探测算法设计,构建无线网络传输信道模型,计算信道的冲激响应特征量,采用量化信息融合识别方法提取移动通信无线网络传输链路层的相关功率谱特征信息,根据特征提取结果进行大数据融合聚类处理,采用最优分集聚类方法实现传输数据的均衡配置,实现通信负载与信道的最优配置,提高无线网络传输信道的均衡性和输出稳定性。测试结果表明,采用该方法进行无线通信网络组网设计的信道均衡性较好,输出误码率较低。  相似文献   

3.
研究无线传感器节点优化选择。传统LEACH分簇算法中,节点选择的随机性很大,没有很好地参考节点中的多个属性,通信的簇头分布也无规律,算法把能量消耗分摊到所有的节点上,一旦选择边沿节点作为簇头,一些节点必须经过长距离的路由转发才能到达簇头,造成通信效率较低。为了避免上述缺陷,提出了一种基于自适应逃逸粒子群算法的网络节点覆盖优化方法。建立自适应逃逸粒子群算法的数学模型,准确描述网络节点覆盖问题。利用自适应逃逸粒子群方法,计算无线传感网络节点最优位置,从而实现网络节点覆盖优化。实验结果表明,这种算法能够实现网络节点覆盖优化处理,从而提高无线传感网络数据传递的效率。  相似文献   

4.
《现代电子技术》2016,(18):65-68
分布式通信网络在遭受病毒感染后,通信节点之间的数据传输和通信的稳定性将受到影响,通过通信节点优化路由协议设计和选择,可提高网络在遭到病毒感染后的自我修复和保护控制的能力。设计病毒感染的信息融合滤波器和病毒入侵的检测器,采用贪婪算法进行自适应评估,软件设计中考虑通信节点在最近时刻获得的节点间距动态变化特征,进行节点选择优化,提高网络在病毒感染后的稳定性控制能力。实验结果表明,该方法能降低网络遭到病毒感染后的节点失效数量,提高节点的吞吐性能,实现网络的自我保护控制和稳定性控制。  相似文献   

5.
层次型的拓扑控制结构是适合资源严格受限的无线传感器网络的数据转发拓扑结构。低能耗自适应分层成簇(LEACH)协议是其中较经典的成簇协议,但该协议在设计时并没有考虑安全问题,因而潜藏着各种安全问题。文章着重介绍近年来在无线传感器网络分层路由中的安全成簇所呈现的一些成果(如S-LEACH、F-LEACH和Sec-LEACH)以及对被俘获节点的探测机制,并提出它们存在的问题及安全成簇路由协议进一步的研究方向。  相似文献   

6.
传统渔业水产养殖系统安全监控技术存在监控数据传输不稳定的问题,为此,提出基于传感组网节点优化的智慧渔业水产养殖系统物联设备安全监控技术.构建监控节点优化定位模型,采用路由自适应探测协议实现监控组网协议设计;通过分布式均衡控制模型设计监控节点优化部署和物联网节点传输路由;构建全网功耗均衡模型,均衡监控信道;结合自适应路由...  相似文献   

7.
《现代电子技术》2017,(20):22-24
针对传统的节点损伤定位一直存在精度低的问题,提出基于自适应波束形成的关联节点损伤定位器设计方法。建立网络入侵中的关联节点拓扑结构模型,提取损伤节点输出信息的异常频谱特征,采用自适应波束形成方法进行关联节点损伤部位的物理特征参量估计,实现节点准确定位。仿真结果表明,采用该方法进行关联节点损伤定位的精度较高,收敛性较好。  相似文献   

8.
以结构化拓扑为基础,采用CAN(content addressable network)协议,提出了一种新的云计算网络路由算法。该算法以M-CRP技术为基础,改进传统CAN协议,组网时在物理上相近的节点会处于逻辑上相邻的位置;相应的路由机制也对物理拓扑结构给予充分的考虑,优先考虑物理临近并且通信成本较低的节点;自适应机制网络状态不断变化,M-CRP-CAN(multiple-CDN-based relative network positioning)在组网、路由、自适应等机制都有较强底层物理拓扑结构感知性。实验表明,算法能够提高数据的交换效率,减少了网络中不必要的跨域流量,减少骨干链路的负载,提高了云计算网络性能。  相似文献   

9.
无线传感器网络拓扑控制策略研究   总被引:2,自引:1,他引:1  
吴雪  马兴凯 《通信技术》2009,42(3):161-163
节能设计是无线传感器网络的首要设计目标,拓扑控制是实现该目标的重要技术之一,其主要目标是在保证网络连通和覆盖的前提下剔除不必要的通信链路,降低节点能耗和减少通信干扰,为MAC协议和路由协议的顺利执行提供基础。文中对传感器网络拓扑控制策略进行了的分析。最后针对目前传感器节点成本仍然很高这一特点,通过仿真得出了在节点随机配置的情况下,保证网络连通和覆盖所需的至少节点数目。并通过仿真分析证明了方案的可行性。  相似文献   

10.
为了提高实验室安全预警能力,提出一种基于无线网络监控技术的实验室安全预警系统设计方案。构建实验室安全预警的无线网络监控节点部署模型,采用最短路由协议部署方法进行实验室安全预警的网络传输节点控制,采用全网能量均衡控制方法进行实验室安全预警无线监控网络节点室内定位和信道均衡控制。结合K-邻居节点覆盖方法提高实验室安全预警无线监控的信道均衡性,根据节点的传输功耗特征检测结果实现实验室安全预警无线监控网络节点优化部署和室内定位。结合嵌入式的ARM实现实验室安全预警系统的硬件设计。测试结果表明,采用该方法进行实验室安全预警无线监控网络设计的误码率较低,监控性能较好。  相似文献   

11.
This paper studies the performance of a submillimeter wave antenna operating between frequencies 0.1 THz and 10 THz with a 4-cyano-4-pentylbiphenyl [5CB] substrate. Since the size and shape of the antenna impact its gain/directivity, resonant frequency, bandwidth, and efficiency, the two antenna types considered in this paper are: (a) Rectangular Patch Antenna (RPA), and (b) Cylindrical Dielectric Resonator Antenna (CDRA). Here a submillimeter wave antenna is compared with a millimeter wave (a few GHz to 100 GHz) antenna. These popular mm-wave antennas are chosen for the submillimeter wave antenna in order to understand changes in their performance as the result of changes in their geometrical shape. FEldberechnung bei Korpern mit beliebiger Oberflache (FEKO) software is used for the design and calculation of the Three-Dimensional (3D) ElectroMagnetic (EM) patterns. This paper also concentrates on the design and analysis of a massive submillimeter wave Multiple-Input Multiple-Output (MIMO) (8 by 8) RPA and CDRA.  相似文献   

12.
激光通信及其在潜艇通信中的应用   总被引:2,自引:0,他引:2  
张杨  张芳  卞勇 《光通信技术》2006,30(7):43-45
概述了激光通信的发展现状,分析了长波对潜通讯方式及存在的问题,指出ELF和VLF潜艇通信系统在潜艇安全深度与信息传输速度方面存在着矛盾.分析了蓝绿激光对潜通信的特点及实现方案,我国在此方面已取得了可喜的进展.  相似文献   

13.
陈艳 《信息技术》2013,(9):114-116
微博传播是刚刚兴起的一种传播新媒体,是网络传播的新模式。将微博作为信息传播平台,发布品牌、服务业务信息,让粉丝了解品牌内涵、获悉新服务项目及业务优惠活动信息。从而树立品牌形象、提升市场认知度、提高营销效率、减少营销成本、达到产品营销和提供服务的目的。随着微博的发展,越来越多的人或企业也都注册了自己的微博,加入了微博传播信息的行列。但是,怎样扩大微博传播的范围,缩短微博传播的时间,防控引发负面影响的办法,是微博传播管理者必须研究的问题。  相似文献   

14.
Two high-definition television (HDTV) communication systems created for broadband communication networks are discussed. Nationwide HDTV transmission and distribution services and HDTV subscriber distribution services are examined. A network architecture for high-quality HDTV transmission is described. The transmission bit rates of HDTV services, which are the basic factors in constructing the network frame, are considered. Two HDTV coding algorithms, subband discrete cosine transform (DCT) and subband differential pulse-code modulation (DPCM) are described, and their coding bit rates discussed. A synchronous-digital-hierarchy-based synchronous transfer mode network design suitable for the transmission of HDTV signals in broadband communication networks are described  相似文献   

15.
Context-aware communication   总被引:1,自引:0,他引:1  
This article describes how the changing information about an individual's location, environment, and social situation can be used to initiate and facilitate people's interactions with one another, individually and in groups. Context-aware communication is contrasted with other forms of context-aware computing, and we characterize applications in terms of design decisions along two dimensions: the extent of autonomy in context sensing and the extent of autonomy in communication action. A number of context-aware communication applications from the research literature are presented in five application categories. Finally, a number of issues related to the design of context-aware communication applications are presented.  相似文献   

16.
This paper reports results from wireless chip-to-chip communication experiments. Sixteen bit words pass from one chip to another in parallel without detectable error at 1.35 billion data items per second for a total data rate of 21.6 Gigabits per second. The experiment transmits pseudo random patterns between chips built in a 350-nm CMOS technology. Chips touch face-to-face to communicate. The same pseudorandom data pattern is loaded onto both chips so that the receiving chip can check the accuracy of every bit communicated. Each communication channel consumes a static power of 3.6 mW, and a dynamic power of 3.9 pJ per bit communicated. The channels lie on 50-/spl mu/m centers. Because the capacitive communication works through covering oxide, ESD protection is unnecessary. Vernier position measuring circuits built into the chips indicate the relative position of transmitting and receiving arrays to assist mechanical alignment. The test chip includes a Vernier measurement circuit that provides inter-chip position measurements with a resolution of 1.4 /spl mu/m.  相似文献   

17.
Multimedia communication deals with the transfer, protocols, services, and mechanisms of discrete media data (such as text and graphics) and continuous media data (like audio and video) in/over digital networks. Such a communication requires all involved components to be capable of handling a well-defined quality of service (QoS). The most important QoS parameters are used to request: (1) the required capacities of the involved resources, (2) compliance to end-to-end delay and jitter as timing restrictions, and (3) restriction of the loss characteristics. In this paper, we describe the necessary issues and study the ability of current networks and communication systems to support distributed multimedia applications. Further, we discuss upcoming approaches and systems that promise to provide the necessary mechanisms and consider which issues are missing for a complete multimedia communication infrastructure  相似文献   

18.
《Spectrum, IEEE》2006,43(1):11-12
This paper reports how European researchers were able to use the chaos phenomenon to send digital messages at gigabit per second speeds over 115 km of commercial optical fiber beneath the streets of Athens, Greece. A distinct advantage of chaotic communication is that it is often easier to generate robust, high-power chaotic signals than conventional ones. A chaotic signal is also harder for an eavesdropper to identify because it is difficult to distinguish from background noise.  相似文献   

19.
20.
Eigenvalue communication   总被引:2,自引:0,他引:2  
The authors propose a communication method for a nonlinear and dispersive medium such as an optical fiber that is based on eigenvalues of associated equations for the wave amplitude. In optical communications, the communication distance measured by the carrier wavelength reaches the order of 10/sup 11/-10/sup 13/. As a result, dispersive and nonlinear effects, even if small, contribute significantly to the distortion of signal information contained in waveforms or in frequency spectra. Thus, it is desirable to use other parameters which remain unaltered. The eigenvalues of the associated equation for the nonlinear Schrodinger equation which describes the lightwave envelope in fibers constitute such parameters. Soliton-based communication corresponds to the case of one eigenvalue.<>  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号