首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Third generation (3G) mobile networks are due to become reality in the next few years as governments world-wide start to auction or `release' new spectrum to new and existing cellular operators. A major differentiation of 3G over second generation networks is the provision of multiple-data-rate services, higher spectrum efficiency and greater flexibility of the air interface. This paper addresses FDD W-CDMA planning and capacity estimation issues. As well as addressing the planning steps, link budgets and simplistic uplink capacity estimation the paper goes into more detail on simulation methods and considerations. Finally an example W-CDMA network, based on realistic site locations in central London, is provided. Capacity estimations are given with some indications of network stability and operating points  相似文献   

2.
Uncertainties in load growth, fuel prices, and regulation are all factors leading to complexity in power-system planning. The criteria and constraints that are important in system planning are reliability, environmental standards, economics, financial ability, and societal impacts. Some of the criteria conflict with the others, requiring some tradeoffs in making planning decisions. To plan a system considering these criteria, detailed analytical studies that typically simulate the operation of the system under the projected future conditions are performed. Attributes such as reliability levels and price of electricity estimated form these studies for different plans are compared to choose the robust plan. Least-cost or integrated resource planning, nonutility generation, and capacity purchases are specifically addressed to illustrate the technical and institutional issues involved in the electric utility planning process  相似文献   

3.
What is simulation good for and how do you use it? Simulation can be applied to a wide variety of network planning and design issues. This paper describes a number of such issues of interest, suggesting the most relevant simulated performance and the benefits derived from a simulated network performance analysis and then demonstrates the simulation technology through a detailed case study using Plan NetTM.  相似文献   

4.
5.
Formal methods for cryptographic protocol analysis: emerging issues and trends   总被引:25,自引:0,他引:25  
The history of the application of formal methods to cryptographic protocol analysis spans over 20 years and has been showing signs of new maturity and consolidation. Not only have a number of specialized tools been developed, and general-purpose ones been adapted, but people have begun applying these tools to realistic protocols, in many cases supplying feedback to designers that can be used to improve the protocol's security. In this paper, we describe some of the ongoing work in this area, as well as describe some of the new challenges and the ways in which they are being met.  相似文献   

6.
本文结合中国移动TD-LTE网络建设情况,针对TD-LTE无线网络规划设计特点,总结了当前TD-LTE无线网络规划技术发展趋势和面临的挑战,提出了工程规划设计中相关的应对措施。  相似文献   

7.
The capability of telecommunications networks to restore services affected by failures is a key consideration in designing a broadband network architecture. The authors describe the survivable transport network planning methods and tools of the Telecommunication Laboratories of DGT in Taiwan. The paper consists of three major parts: conventional survivable architecture planning, hubbing architecture based on DCS restoration network planning, and SDH network architecture planning  相似文献   

8.
This paper describes the system dimensioning and the radio network planning methodology for a third generation wcdma system. The applicability of each method is demonstrated using examples of likely system scenarios. The challenges of modeling the multiservice environment are described and the implications to the system performance simulations are introduced.  相似文献   

9.
With extensive usage and dependence on communication networks, ‘privacy’ issues in enterprise distributed systems have become fundamentally important. Privacy concerns have flooded the market especially in the public domain, and with the changing environment of software usage and involvement of malicious substances associated with any network, it becomes essential to safeguard and ascertain privacy among users and incorporate the same safeguard to protect privacy in software as well. The methodologies and tools architecting distributed enterprise resource planning (ERP) systems are primarily new and are vulnerable to malicious attacks. This paper aims at identifying some of critical privacy issues by collecting data from ERP practitioners. This work models variables associated with ERP with the variables of privacy to establish a robust adoption of ERP practices. Privacy issues concerning ERP are listed. Several variables associated with the development, implementation, and control of ERP are identified in the existing literature. A questionnaire instrument was distributed among a set of ERP practitioners. The response data collected thereby were analyzed statistically. Based upon the statistical analysis, an attempt has been made in the paper to make a ranking of the privacy factors. The observations are discussed in detail, and some specific conclusions have been made. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

10.
由于军事侦察任务的复杂性不断提高,且侦察方式逐渐向多无人机协同的方向发展,而任务规划是无人机执行侦察任务的关键技术,因此研究多无人机协同侦察任务规划方法具有重要意义。根据侦察对象的不同将其分为“点对点”协同侦察和“点对面”协同侦察两种任务模式。对于“点对点”协同侦察,对其目标分配算法与航迹规划算法的原理、优势与不足及改进方法进行了分析,介绍了航迹平滑的常用方法。对于“点对面”协同侦察,从环境信息是否可知的角度对当前的侦察方法进行了分析并总结。最后指出了未来多无人机协同侦察的发展趋势为多无人机携带多种载荷对环境未知的区域进行多角度覆盖侦察。  相似文献   

11.
该文提出了CDMA网络规划的线性建模方法。该方法用线性方程组对 CDMA系统进行建模,并可用迭代的方法求解,该文同时给出了模型的仿真结果,仿真结果表明,该方法具有较高的准确性,完全可以用于对实际网络的规划,同时,该方法便于用计算机实现,可以作为规划软件的算法模型。  相似文献   

12.
随着人们对无线数据需求的不断增长,尤其是Internet的发展,第三代移动通信系统(3G)也开始步入商用化进程。第三代系统(3G)基于码分多址(CDMA)的接入方式。与第二代系统相比,第三代系统引入了大量的各种比特率和多样化的业务,它最大可支持的数据速率达到2Mb/s。正因为它提供的多种比特率和多样化的业务使得在3G网络规划中对不同业务的预测和对它建模变得特别困难。另外由于第三代系统和第二代系统在无线接入方式的不同,使得在3G网络规划中要考虑更多、更复杂的问题,例如导频污染、软切换增益、容量和覆盖的迭代预测等等。本文结合3G系统…  相似文献   

13.
802.11n标准的众多可选特性增加了其组网规划的复杂性.本文从802.11n关键技术人手,分析了影响802.11n组网规划中网络覆盖、容量、双流工作模式、信道捆绑等关键问题,并结合实际测试,给出了802.11n实际组网规划中应注意的问题和规划设计建议.  相似文献   

14.
Internet technology is so pervasive today, for example, from online social networking to online banking, it has made people’s lives more comfortable. Due the growth of Internet technology, security threats to systems and networks are relentlessly inventive. One such a serious threat is “phishing”, in which, attackers attempt to steal the user’s credentials using fake emails or websites or both. It is true that both industry and academia are working hard to develop solutions to combat against phishing threats. It is therefore very important that organisations to pay attention to end-user awareness in phishing threat prevention. Therefore, aim of our paper is twofold. First, we will discuss the history of phishing attacks and the attackers’ motivation in details. Then, we will provide taxonomy of various types of phishing attacks. Second, we will provide taxonomy of various solutions proposed in literature to protect users from phishing based on the attacks identified in our taxonomy. Moreover, we have also discussed impact of phishing attacks in Internet of Things (IoTs). We conclude our paper discussing various issues and challenges that still exist in the literature, which are important to fight against with phishing threats.  相似文献   

15.
Techniques are described which accelerate the rerunning of programs for each new set of input parameters in the computer simulation for treatment planning in deep regional hyperthermia cancer therapy using the Sigma 60 applicator. This is done by separating the problem into responses by individual quadrants and by using an impulse response to get multiple frequencies per run. The implementation of these techniques using the finite-difference time-domain (FDTD) method is described. The accuracy is tested against three-dimensional measurements made in a homogeneous phantom, and the results are presented. The result is a method capable of planning an optimum treatment for deep regional hyperthermia  相似文献   

16.
移动机器人路径规划方法研究   总被引:3,自引:0,他引:3  
董宇欣 《信息技术》2006,30(6):108-111
移动机器人技术研究中的一个重要领域是路径规划技术,它分为基于模型的环境已知的全局路径规划和基于传感器的环境未知的局部路径规划。综述了移动机器人路径规划技术的发展现状指出了各种方法的优点与不足,最后对移动机器人路径规划技术的发展趋势进行了展望。  相似文献   

17.
1 IntroductionMulticasttechnologyisaboutpointtomulti pointscommunications,namely ,manydestinationnodesreceivemessagesfromthesamesourcenode.Multicasttechnologyhaswideapplicationssuchasreal timevideoandvoicetransmission ,remoteedu cation,distributedcomputin…  相似文献   

18.
针对军事信息基础支撑平台规划建设中需要解决的重点技术问题,从骨干传输、实时性网络、信息安全、时间统一、视频传输与会议系统、多业务网络应用服务平台、物联网应用服务等方面进行阐述,特别是宽带传输、安全互联、时间统一、多业务综合应用、物联网应用等技术手段进行深入探究,对规划中需要解决的七方面技术问题提出了针对性的解决措施。  相似文献   

19.
电网网架规划对于电力系统的安全、优质、经济运行有着重大影响,而科学的规划方案则是其基础所在。介绍了传统的规划方法及其不足之处,运用三种智能算法分别设计IEEE-6节点和18节点系统的规划方案并对方案进行建模和仿真,对比结果表明了在电网规划中人工鱼群算法方案具有全局优化功能和良好的适应性,且投资费用最低。具有较广阔的应用前景和明显的经济效果,并能切实提高电网规划水平。  相似文献   

20.
本文提出一种新的目标覆盖区域规划方法,首先建立了统一的考核指标体系,对覆盖区域进行综合评估。然后,在上述覆盖区域评估结果的基础上,编制网络覆盖区域自动选取的算法,使得通过软件方式计算目标覆盖区域成为可能。通过该技术方法,可更加全面、准确、系统、便捷的完成网络覆盖区域规划。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号