首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
Symmetric relaying is a method of relaying in which the relays can decode the message of other relays in the network in addition to the source message. In this paper an achievable rate is presented for a symmetric two-relay network based on partial decoding. The strategy make use of familiar techniques such as product binning, regular encoding/sliding window decoding and regular encoding/backward decoding. The proposed rate is shown to subsume the previously proposed rate for feed-forward relay network based on decode-andforward. This rate is also used to establish the capacity of a generalisation of Aref network called `semideterministic relay network with no interference at the relays? and independent relay inputs.  相似文献   

2.
Abstract

Quantum cryptography has been shown to be an effective technology for the secure distribution of keys on point-to-point optical links. We show how the existing techniques can be extended to allow multi-user secure key distribution on optical networks. We demonstrate that using network configurations typical of those found in passive optical network architectures any of the current quantum key distribution protocols can be adapted to implement secure key distribution from any user to any other user. An important feature of these adapted protocols is that the broadcaster, or service provider on the network, does not have to be trusted by the two users who wish to establish a key.  相似文献   

3.
In this article, we introduce a new bi-directional dual-relay selection strategy with its bit error rate (BER) performance analysis. During the first step of the proposed strategy, two relays out of a set of N relay-nodes are selected in a way to optimize the system performance in terms of BER, based on the suggested algorithm which checks if the selected relays using the max-min criterion are the best ones. In the second step, the chosen relay-nodes perform an orthogonal space-time coding scheme using the two-phase relaying protocol to establish a bi-directional communication between the communicating terminals, leading to a significant improvement in the achievable coding and diversity gain. To further improve the overall system performance, the selected relay-nodes apply also a digital network coding scheme. Furthermore, this paper discusses the analytical approximation of the BER performance of the proposed strategy, where we prove that the analytical results match almost perfectly the simulated ones. Finally, our simulation results show that the proposed strategy outperforms the current state-of-the-art ones.  相似文献   

4.
This article presents a network design problem with relays considering the two-edge network connectivity. The problem arises in telecommunications and logistic networks where a constraint is imposed on the distance that a commodity can travel on a route without being processed by a relay, and the survivability of the network is critical in case of a component failure. The network design problem involves selecting two-edge disjoint paths between source and destination node pairs and determining the location of relays to minimize the network design cost. The formulated problem is solved by a hybrid approach of a genetic algorithm (GA) and a Lagrangian heuristic such that the GA searches for two-edge disjoint paths for each commodity, and the Lagrangian heuristic is used to determine relays on these paths. The performance of the proposed hybrid approach is compared to the previous approaches from the literature, with promising results.  相似文献   

5.
The identification of an effective network which can efficiently meet the service requirements of the target, while maintaining ultimate performance at an increased level is significant and challenging in a fully interconnected wireless medium. The wrong selection can contribute to unwanted situations like frustrated users, slow service, traffic congestion issues, missed and/or interrupted calls, and wastefulness of precious network components. Conventional schemes estimate the handoff need and cause the network screening process by a single metric. The strategies are not effective enough because traffic characteristics, user expectations, network terminology and other essential device metrics are not taken into account. This article describes an intelligent computing technique based on Multiple-Criteria Decision-Making (MCDM) approach developed based on integrated Fuzzy AHP-TOPSIS which ensures flexible usability and maximizes the experience of end-users in miscellaneous wireless settings. In different components the handover need is assessed and the desired network is chosen. Further, fuzzy sets provide effective solutions to address decision making problems where experts counter uncertainty to make a decision. The proposed research endeavor will support designers and developers to identify, select and prioritize best attributes for ensuring flexible usability in miscellaneous wireless settings. The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the usability and experience of end-users.  相似文献   

6.
Opportunistic multihop networks with mobile relays recently have drawn much attention from researchers across the globe due to their wide applications in various challenging environments. However, because of their peculiar intrinsic features like lack of continuous connectivity, network partitioning, highly dynamic behavior, and long delays, it is very arduous to model and effectively capture the temporal variations of such networks with the help of classical graph models. In this work, we utilize an evolving graph to model the dynamic network and propose a matrix‐based algorithm to generate all minimal path sets between every node pair of such network. We show that these time‐stamped‐minimal‐path sets (TS‐MPS) between each given source‐destination node pair can be used, by utilizing the well‐known Sum‐of‐Disjoint Products technique, to generate various reliability metrics of dynamic networks, ie, two‐terminal reliability of dynamic network and its related metrics, ie, two‐terminal reliabilities of the foremost, shortest, and fastest TS‐MPS, and Expected Hop Count. We also introduce and compute a new network performance metric?Expected Slot Count. We use two illustrative examples of dynamic networks, one of four nodes, and the other of five nodes, to show the salient features of our technique to generate TS‐MPS and reliability metrics.  相似文献   

7.
In multihop cellular networks (MCN), the user nodes can act as relays and forward other nodes' traffic to/from base stations. There are several advantages of MCN such as the improved signal quality and higher coverage. However, it is known that multihop relaying networks require extra radio resources. Therefore the performance of MCN depends to a great extent on the availability of adequate radio resources. The performance of a time division multiple access (TDMA)-based multihop fixed cellular network is analysed with highlighting the dependence of the system performance on the amount of available radio resources, namely, the number of frequency carriers. Results show that in a fixed cellular network, the multihop architecture significantly outperforms the traditional single-hop architecture in terms of the outage probability and throughput if an adequate amount of frequency carriers is available in the network. Otherwise, the multihop fixed cellular networks architecture loses its superiority and might even lead to performance degradation, particularly at high loading levels.  相似文献   

8.
提出了一种基于尺度的协同中继自主转发跨层QoS路由算法(MCRICQR).节点根据能量、信道、拥塞以及与汇点的距离等综合因素形成一个选择度量,度量最大的节点根据自己所处状态自主选择直接转发、中继转发以及跃进转发数据包.仿真结果表明,该算法能根据网络状况及时转发数据,提高网络可靠性,对网络负载进行均衡,提高网络吞吐量和能量效率,从而延长网络寿命,保障了无线传感器网络的QoS需求.  相似文献   

9.
Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn’t address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.  相似文献   

10.
Intelligent Transportation System (ITS) is essential for effective identification of vulnerable units in the transport network and its stable operation. Also, it is necessary to establish an urban transport network vulnerability assessment model with solutions based on Internet of Things (IoT). Previous research on vulnerability has no congestion effect on the peak time of urban road network. The cascading failure of links or nodes is presented by IoT monitoring system, which can collect data from a wireless sensor network in the transport environment. The IoT monitoring system collects wireless data via Vehicle-to-Infrastructure (V2I) channels to simulate key segments and their failure probability. Finally, the topological structure vulnerability index and the traffic function vulnerability index of road network are extracted from the vulnerability factors. The two indices are standardized by calculating the relative change rate, and the comprehensive index of the consequence after road network unit is in a failure state. Therefore, by calculating the failure probability of road network unit and comprehensive index of road network unit in failure state, the comprehensive vulnerability of road network can be evaluated by a risk calculation formula. In short, the IoT-based solutions to the new vulnerability assessment can help road network planning and traffic management departments to achieve the ITS goals.  相似文献   

11.
Here, a comprehensive characterisation of the performance of voltage relays, focusing on their capability to detect islanding of embedded synchronous generators is presented. Such characterisation is done by using the performance curves and the concept of critical reactive power imbalance, which allows a systematic analysis of voltage relays considering a wide range of system operating points. The impacts of important factors on the relay performance are evaluated, such as the presence of voltage-dependent loads and the generator exciter control mode. Moreover, a graphical approach that allows protection engineers to adjust voltage relays to reach two objectives simultaneously: (i) to be sensitive enough to detect islanding efficiently and (ii) to satisfy the protection requirements against abnormal voltage variation is proposed. Results can be quite attractive to understand voltage relays behaviour and limitations and thus, they can be adjusted more efficiently  相似文献   

12.
In this paper, we combine inertial sensing and sensor network technology to create a pedestrian dead reckoning system. The core of the system is a lightweight sensor-and-wireless-embedded device called NavMote that is carried by a pedestrian. The NavMote gathers information about pedestrian motion from an integrated magnetic compass and accelerometers. When the NavMote comes within range of a sensor network (composed of NetMotes), it downloads the compressed data to the network. The network relays the data via a RelayMote to an information center where the data are processed into an estimate of the pedestrian trajectory based on a dead reckoning algorithm. System details including the NavMote hardware/software, sensor network middleware services, and the dead reckoning algorithm are provided. In particular, simple but effective step detection and step length estimation methods are implemented in order to reduce computation, memory, and communication requirements on the Motes. Static and dynamic calibrations of the compass data are crucial to compensate the heading errors. The dead reckoning performance is further enhanced by wireless telemetry and map matching. Extensive testing results show that satisfactory tracking performance with relatively long operational time is achieved. The paper also serves as a brief survey on pedestrian navigation systems, sensors, and techniques.  相似文献   

13.
A new systematic approach for water network design   总被引:2,自引:2,他引:0  
This paper presents a systematic procedure involving two key steps for water minimization. In the first step, water targeting, the load problem table (LPT) has been used to establish the minimum water requirement for maximum water recovery and minimum wastewater generated. This table has been adapted from the load interval diagram (LID) recently proposed by El-Halwagi and Almutlaq (2004). In the next step, the design approach, designers can select the most practical network from a range of options, all of which can satisfy the raw water and wastewater targets. It is based on a special strategy of mixing the water sources in order to satisfy the given water demands, and on some guidelines about water distribution within a network. Several test problems are solved to illustrate the ease and applicability of the proposed methodology.  相似文献   

14.
In this contribution, the authors investigate the single-user-bound performance of a direct-sequence code-division multiple-access (DS-CDMA) system, where one source mobile terminal (MT) communicates with its base-station (BS) with the assistance of multiple relays. The authors assume that the communications channels experience both propagation pathloss and fast fading, and that the channels from the source MT to the BS and relays as well as that from the relays to the BS may experience different fast fading modelled correspondingly by Nakagami-m distributions. In the study, they assume both the single-user combining using maximal ratio combining and the multiuser combining, which are derived based on the maximum signal-to- interference-plus-noise ratio criterion. The bit-error-rate (BER) performance of the DS-CDMA is investigated associated with considering the locations of the relays as well as the power-allocation among the source MT and relays. From the study and simulation results, it can be shown that the achievable BER performance of the DS-CDMA depends on the locations of the relays and also on the power-allocation among the source MT and relays. When the relays of a source MT are chosen from a different area, the power-allocation should also be adjusted correspondingly in order to achieve the minimum BER. Furthermore, when optimum power- allocation is assumed, the BER performance of the DS-CDMA can be significantly improved, when increasing the number of relays assisting the source MT.  相似文献   

15.
我国天地一体化航天互联网构想   总被引:24,自引:0,他引:24  
地面互联网技术的快速发展以及航天任务的复杂性不断提高,产生了将互联网扩展到空间、建立天地一体化航天互联网的强烈需求,并提供了实现的技术可能性。探讨了我国航天任务中存在的不同卫星天地协议不统一、航天任务数据不能共享、资源综合利用率低等问题,分析了对未来任务的需求,阐述了建设我国天地一体化航天互联网的重要意义;介绍了国外航天互联网发展状况;提出了我国天地一体化航天互联网的总体目标、组成、网络体系结构及网络协议的初步构想;分析了需要突破的关键技术;最后提出了发展步骤建议。  相似文献   

16.
分析了在计算机上实现虚拟装配的流程及如何用VRML创建三维可视化的虚拟场景,提出一种基于VRML和Java的虚拟现实构建方法,用以增强VRML虚拟场景与外界的交互性,并以球阀为例给出了在网络上创建虚拟装配动画演示的具体方案.该方法不仅可用于演示网络环境下的可视化装配,也适合于其它领域基于Web的科学可视化。  相似文献   

17.
刘宏波 《影像技术》2010,22(5):31-36,53
"4K是电影数字中间片向上发展的必经之路。"在以ARRI和RED这些数字电影设备制造商为代表的这次数字影像变革中,Bayer Pattern RAW格式的大量运用与把前期数字影像拍摄技术与数字中间片技术完美地融合在一起,同时也把原有的前期摄影概念拓展到后期领域,配光与调色作为数字中间片的关键环节,不同的硬件与软件支持方都在原有的基础上不断地探索并推出新的产品与解决方案,根据输出媒介与要求的不同选择合适的数字中间片工艺路线,并在技术和品质上不断优化"在线4K"的生产流程将是数字媒体发展未来之路。  相似文献   

18.
为了适应现代超高压电网稳定运行的要求,微机距离保护装置在硬件和软件上都提出了越来越高的要求。本文在总结了输电线路微机距离保护研究现状的基础上,分析了国内现有微机保护硬件的现状,对比了8位、16位单片机(SCM)以及32位DSP的保护方案,并总结了其优缺点,提出了一种基于ARM微处理器的保护方案。本文将实时操作系统μC/OS—II与模块化硬件设计相结合,共同构成一个可以重复利用的软硬件数字系统平台,除了可以最大限度地提高开发的效率、减少资源的浪费外,还可以通过长期对于该平台的研究,逐步优化平台软硬件资源,提高其性能,并满足日益复杂的应用需求。本文尝试了用任务方式实现保护的并行处理,大大提高软件的可读性和可靠性,也为将来任务扩展提供条件。  相似文献   

19.
排队网络可以用来模拟诸如通信网络这样的复杂系统。对排队网络的研究中的一个主要议题是建立其在某些特殊的规则下稳定的充要条件。本文的研究对象是一类具有两类顾客输入的Kelly-型排队网络。利用流体模型以及Lyapunov函数等工具,建立了该排队网络在所有非闲置的规则下稳定的充分条件。最后,对条件的充分性作了说明。  相似文献   

20.
Mobile broadband (MBB) networks are expanding rapidly to deliver higher data speeds. The fifth-generation cellular network promises enhanced-MBB with high-speed data rates, low power connectivity, and ultra-low latency video streaming. However, existing cellular networks are unable to perform well due to high latency and low bandwidth, which degrades the performance of various applications. As a result, monitoring and evaluation of the performance of these network-supported services is critical. Mobile network providers optimize and monitor their network performance to ensure the highest quality of service to their end-users. This paper proposes a Bayesian model to estimate the minimum opinion score (MOS) of video streaming services for any particular cellular network. The MOS is the most commonly used metric to assess the quality of experience. The proposed Bayesian model consists of several input data, namely, round-trip time, stalling load, and bite rates. It was examined and evaluated using several test data sizes with various performance metrics. Simulation results show the proposed Bayesian network achieved higher accuracy overall test data sizes than a neural network. The proposed Bayesian network obtained a remarkable overall accuracy of 90.36% and outperformed the neural network.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号