共查询到20条相似文献,搜索用时 0 毫秒
1.
Dehghan S. Lister D. Owen R. Jones P. 《Electronics & Communication Engineering Journal》2000,12(3):101-118
Third generation (3G) mobile networks are due to become reality in the next few years as governments world-wide start to auction or `release' new spectrum to new and existing cellular operators. A major differentiation of 3G over second generation networks is the provision of multiple-data-rate services, higher spectrum efficiency and greater flexibility of the air interface. This paper addresses FDD W-CDMA planning and capacity estimation issues. As well as addressing the planning steps, link budgets and simplistic uplink capacity estimation the paper goes into more detail on simulation methods and considerations. Finally an example W-CDMA network, based on realistic site locations in central London, is provided. Capacity estimations are given with some indications of network stability and operating points 相似文献
2.
Uncertainties in load growth, fuel prices, and regulation are all factors leading to complexity in power-system planning. The criteria and constraints that are important in system planning are reliability, environmental standards, economics, financial ability, and societal impacts. Some of the criteria conflict with the others, requiring some tradeoffs in making planning decisions. To plan a system considering these criteria, detailed analytical studies that typically simulate the operation of the system under the projected future conditions are performed. Attributes such as reliability levels and price of electricity estimated form these studies for different plans are compared to choose the robust plan. Least-cost or integrated resource planning, nonutility generation, and capacity purchases are specifically addressed to illustrate the technical and institutional issues involved in the electric utility planning process 相似文献
3.
What is simulation good for and how do you use it? Simulation can be applied to a wide variety of network planning and design issues. This paper describes a number of such issues of interest, suggesting the most relevant simulated performance and the benefits derived from a simulated network performance analysis and then demonstrates the simulation technology through a detailed case study using Plan NetTM. 相似文献
4.
5.
The history of the application of formal methods to cryptographic protocol analysis spans over 20 years and has been showing signs of new maturity and consolidation. Not only have a number of specialized tools been developed, and general-purpose ones been adapted, but people have begun applying these tools to realistic protocols, in many cases supplying feedback to designers that can be used to improve the protocol's security. In this paper, we describe some of the ongoing work in this area, as well as describe some of the new challenges and the ways in which they are being met. 相似文献
6.
张玉胜 《电信工程技术与标准化》2015,(2):1-6
本文结合中国移动TD-LTE网络建设情况,针对TD-LTE无线网络规划设计特点,总结了当前TD-LTE无线网络规划技术发展趋势和面临的挑战,提出了工程规划设计中相关的应对措施。 相似文献
7.
Ching-Chir Shyur Shan-Hsin Tsao Ying-Ming Wu 《Communications Magazine, IEEE》1995,33(9):100-107
The capability of telecommunications networks to restore services affected by failures is a key consideration in designing a broadband network architecture. The authors describe the survivable transport network planning methods and tools of the Telecommunication Laboratories of DGT in Taiwan. The paper consists of three major parts: conventional survivable architecture planning, hubbing architecture based on DCS restoration network planning, and SDH network architecture planning 相似文献
8.
This paper describes the system dimensioning and the radio network planning methodology for a third generation wcdma system. The applicability of each method is demonstrated using examples of likely system scenarios. The challenges of modeling the multiservice environment are described and the implications to the system performance simulations are introduced. 相似文献
9.
Subhas Chandra Misra Virender Singh Naveen Kumar Jha Sandip Bisui 《International Journal of Communication Systems》2016,29(2):378-401
With extensive usage and dependence on communication networks, ‘privacy’ issues in enterprise distributed systems have become fundamentally important. Privacy concerns have flooded the market especially in the public domain, and with the changing environment of software usage and involvement of malicious substances associated with any network, it becomes essential to safeguard and ascertain privacy among users and incorporate the same safeguard to protect privacy in software as well. The methodologies and tools architecting distributed enterprise resource planning (ERP) systems are primarily new and are vulnerable to malicious attacks. This paper aims at identifying some of critical privacy issues by collecting data from ERP practitioners. This work models variables associated with ERP with the variables of privacy to establish a robust adoption of ERP practices. Privacy issues concerning ERP are listed. Several variables associated with the development, implementation, and control of ERP are identified in the existing literature. A questionnaire instrument was distributed among a set of ERP practitioners. The response data collected thereby were analyzed statistically. Based upon the statistical analysis, an attempt has been made in the paper to make a ranking of the privacy factors. The observations are discussed in detail, and some specific conclusions have been made. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
10.
由于军事侦察任务的复杂性不断提高,且侦察方式逐渐向多无人机协同的方向发展,而任务规划是无人机执行侦察任务的关键技术,因此研究多无人机协同侦察任务规划方法具有重要意义。根据侦察对象的不同将其分为“点对点”协同侦察和“点对面”协同侦察两种任务模式。对于“点对点”协同侦察,对其目标分配算法与航迹规划算法的原理、优势与不足及改进方法进行了分析,介绍了航迹平滑的常用方法。对于“点对面”协同侦察,从环境信息是否可知的角度对当前的侦察方法进行了分析并总结。最后指出了未来多无人机协同侦察的发展趋势为多无人机携带多种载荷对环境未知的区域进行多角度覆盖侦察。 相似文献
11.
该文提出了CDMA网络规划的线性建模方法。该方法用线性方程组对 CDMA系统进行建模,并可用迭代的方法求解,该文同时给出了模型的仿真结果,仿真结果表明,该方法具有较高的准确性,完全可以用于对实际网络的规划,同时,该方法便于用计算机实现,可以作为规划软件的算法模型。 相似文献
12.
随着人们对无线数据需求的不断增长,尤其是Internet的发展,第三代移动通信系统(3G)也开始步入商用化进程。第三代系统(3G)基于码分多址(CDMA)的接入方式。与第二代系统相比,第三代系统引入了大量的各种比特率和多样化的业务,它最大可支持的数据速率达到2Mb/s。正因为它提供的多种比特率和多样化的业务使得在3G网络规划中对不同业务的预测和对它建模变得特别困难。另外由于第三代系统和第二代系统在无线接入方式的不同,使得在3G网络规划中要考虑更多、更复杂的问题,例如导频污染、软切换增益、容量和覆盖的迭代预测等等。本文结合3G系统… 相似文献
13.
802.11n标准的众多可选特性增加了其组网规划的复杂性.本文从802.11n关键技术人手,分析了影响802.11n组网规划中网络覆盖、容量、双流工作模式、信道捆绑等关键问题,并结合实际测试,给出了802.11n实际组网规划中应注意的问题和规划设计建议. 相似文献
14.
B. B. Gupta Nalin A. G. Arachchilage Kostas E. Psannis 《Telecommunication Systems》2018,67(2):247-267
Internet technology is so pervasive today, for example, from online social networking to online banking, it has made people’s lives more comfortable. Due the growth of Internet technology, security threats to systems and networks are relentlessly inventive. One such a serious threat is “phishing”, in which, attackers attempt to steal the user’s credentials using fake emails or websites or both. It is true that both industry and academia are working hard to develop solutions to combat against phishing threats. It is therefore very important that organisations to pay attention to end-user awareness in phishing threat prevention. Therefore, aim of our paper is twofold. First, we will discuss the history of phishing attacks and the attackers’ motivation in details. Then, we will provide taxonomy of various types of phishing attacks. Second, we will provide taxonomy of various solutions proposed in literature to protect users from phishing based on the attacks identified in our taxonomy. Moreover, we have also discussed impact of phishing attacks in Internet of Things (IoTs). We conclude our paper discussing various issues and challenges that still exist in the literature, which are important to fight against with phishing threats. 相似文献
15.
Techniques are described which accelerate the rerunning of programs for each new set of input parameters in the computer simulation for treatment planning in deep regional hyperthermia cancer therapy using the Sigma 60 applicator. This is done by separating the problem into responses by individual quadrants and by using an impulse response to get multiple frequencies per run. The implementation of these techniques using the finite-difference time-domain (FDTD) method is described. The accuracy is tested against three-dimensional measurements made in a homogeneous phantom, and the results are presented. The result is a method capable of planning an optimum treatment for deep regional hyperthermia 相似文献
16.
移动机器人路径规划方法研究 总被引:3,自引:0,他引:3
移动机器人技术研究中的一个重要领域是路径规划技术,它分为基于模型的环境已知的全局路径规划和基于传感器的环境未知的局部路径规划。综述了移动机器人路径规划技术的发展现状指出了各种方法的优点与不足,最后对移动机器人路径规划技术的发展趋势进行了展望。 相似文献
17.
A Controlled Region Rearrangement Dynamic Algorithm for Delay-constrained Least-cost Multicast Routing 总被引:1,自引:1,他引:0
1 IntroductionMulticasttechnologyisaboutpointtomulti pointscommunications,namely ,manydestinationnodesreceivemessagesfromthesamesourcenode.Multicasttechnologyhaswideapplicationssuchasreal timevideoandvoicetransmission ,remoteedu cation,distributedcomputin… 相似文献
18.
针对军事信息基础支撑平台规划建设中需要解决的重点技术问题,从骨干传输、实时性网络、信息安全、时间统一、视频传输与会议系统、多业务网络应用服务平台、物联网应用服务等方面进行阐述,特别是宽带传输、安全互联、时间统一、多业务综合应用、物联网应用等技术手段进行深入探究,对规划中需要解决的七方面技术问题提出了针对性的解决措施。 相似文献
19.
20.
本文提出一种新的目标覆盖区域规划方法,首先建立了统一的考核指标体系,对覆盖区域进行综合评估。然后,在上述覆盖区域评估结果的基础上,编制网络覆盖区域自动选取的算法,使得通过软件方式计算目标覆盖区域成为可能。通过该技术方法,可更加全面、准确、系统、便捷的完成网络覆盖区域规划。 相似文献