首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32篇
  免费   0篇
化学工业   3篇
水利工程   1篇
无线电   27篇
冶金工业   1篇
  2018年   1篇
  2010年   1篇
  2008年   1篇
  2007年   4篇
  2006年   5篇
  2005年   3篇
  2004年   4篇
  2003年   2篇
  2002年   4篇
  2001年   2篇
  2000年   2篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
排序方式: 共有32条查询结果,搜索用时 15 毫秒
21.
We investigate the following issue: if fast fades are Markovian and known at the receiver, while the transmitter has only a coarse quantization of the fading process, what capacity penalty comes from having the transmitter act on the current coarse quantization alone? For time-varying channels which experience rapid time variations, sender and receiver typically have asymmetric channel side information. To avoid the expense of providing, through feedback, detailed channel side information to the sender, the receiver offers the sender only a coarse, generally time-averaged, representation of the state of the channel, which we term slow variations. Thus, the receiver tracks the fast variations of the channel (and the slow ones perforce) while the sender receives feedback only about the slow variations. While the fast variations (micro-states) remain Markovian, the slow variations (macro-states) are not. We compute an approximate channel capacity in the following sense: each rate smaller than the "approximate" capacity, computed using results by Caire and Shamai, can be achieved for sufficiently large separation between the time scales for the slow and fast fades. The difference between the true capacity and the approximate capacity is O(/spl epsi/log/sup 2/(/spl epsi/)log(-log(/spl epsi/))), where /spl epsi/ is the ratio between the speed of variation of the channel in the macro- and micro-states. The approximate capacity is computed by power allocation between the slowly varying states using appropriate water filling.  相似文献   
22.
We present a model for time-varying communication single-access and multiple-access channels without feedback. We consider the difference between mutual information when the receiver knows the channel perfectly and mutual information when the receiver only has an estimate of the channel. We relate the variance of the channel measurement error at the receiver to upper and lower bounds for this difference in mutual information. We illustrate the use of our bounds on a channel modeled by a Gauss-Markov process, measured by a pilot tone. We relate the rate of time variation of the channel to the loss in mutual information due to imperfect knowledge of the measured channel  相似文献   
23.
Security issues in all-optical networks   总被引:2,自引:0,他引:2  
All-optical networks are emerging as a promising technology for terabit per second class communications. However, they are intrinsically different from electro-optical networks, particularly because they do not regenerate signals in the network. The characteristics of all-optical network components and architectures manifest new and still unstudied security vulnerabilities but also offer a new array of possible countermeasures. We focus on two types of attacks on the physical security of the network: service disruption, which prevents communication or degrades quality of service (QoS), and tapping, which compromises privacy by providing unauthorized users access to data which may be used for eavesdropping or traffic analysis  相似文献   
24.
In May 2017, the African Great Lakes community convened for a region-wide conference in Entebbe, Uganda. The African Great Lakes Conference (AGLC) focused on 6 regionally-important themes, and 300+ attendees presented over 100 talks and posters. The AGLC culminated in the adoption of a set of Conference Resolutions designed to direct the future of African Great Lakes conservation and management. As an Introduction to this Journal of Great Lakes Research special section on African Great Lakes, we report on the impetus for the African Great Lakes Conference as well as discuss three major advances and investments that were a direct result of conference resolutions adopted at the meeting. First, we present the AGLC Resolutions, a set of management issues and solutions developed at the conference. Second, we discuss the African Great Lakes Conference Fund, a conservation fund that has awarded $500,000 USD to launch four new initiatives. Finally, we describe African Great Lakes Inform, a knowledge management platform designed to promote collaboration in the region. The AGLC in general, and these three major conference outcomes specifically, provide a set of basic building blocks to advance partnerships, research and capacity in the African Great Lakes region.  相似文献   
25.
Link recovery in high-speed four-fiber networks can be achieved using dynamic searches, covers of rings, or generalized loopback. We present a method to provide link recovery for all links in a network without using all links for backup traffic transmission. The method extends generalized loopback to operate on a subgraph of the full backup graph. The backup capacity on such links can then be used to carry unprotected traffic, i.e., traffic that is not recovered in case of a failure, while primary fibers on the links retain failure protection. Although all primary fibers remain fully robust to single-link failures, reserving links for unprotected traffic reduces a network's ability to recover from multiple failures. We explore the tradeoff between capacity and robustness to two-link failures for several typical high-speed optical fiber networks, comparing the properties of three link-restoration algorithms based on generalized loopback with the properties of covers of rings. Our results demonstrate robustness comparable or superior to that available with covers of rings while providing an additional unprotected traffic capacity of roughly 20% of the network's primary capacity  相似文献   
26.
A network consisting of transparent optical nodes (TONs) can provide high speed end-to-end communication paths with very low bit-error rates (BERs). However, owing to component crosstalk and other degradations at TONs, the BER of a particular communication path traversing several TONs can be degraded by a few orders of magnitude even in the absence of component failure. Monitoring the quality-of-service (QoS) of a communication path has typically relied on sporadic BER testing and operation monitoring by the nodes using probe signals. Intermittent BER testing cannot provide continuous monitoring of the network QoS. On the other hand, the use of probe signals is not sensitive enough to detect the BER degradation. This work investigates a novel approach of monitoring service degradation at individual nodes using a wrap-around device which taps and compares signals from the input and the output at each TON along the lightpath. We propose a modification using hard limiters at TON inputs and derive the BER value that this modified method can guarantee in the presence of signal degradation due to coherent crosstalk at TONs  相似文献   
27.
We analyze the error probability of peaky signaling on bandlimited multipath fading channels, the signaling strategy that achieves the capacity of such channels in the limit of infinite bandwidth under an average power constraint. We first derive an upper bound for general fading, then specialize to the case of Rayleigh fading, where we obtain upper and lower bounds that are exponentially tight and, therefore, yield the reliability function. These bounds constitute a strong coding theorem for the channel, as they not only delimit the range of achievable rates, but also give us a relationship among the error probability, data rate, bandwidth, peakiness, and fading parameters, such as the coherence time. They can be used to compare peaky signaling systems to other large bandwidth systems over fading channels, such as ultra-wideband radio and wideband code-division multiple access. We find that the error probability decreases slowly with the bandwidth W; under Rayleigh fading, the error probability varies roughly as W/sup -/spl alpha//, where /spl alpha/>0. With parameters typical of indoor wireless situations, we study the behavior of the upper and lower bounds on the error probability and the reliability function numerically.  相似文献   
28.
We study different notions of capacity for time-slotted ALOHA systems. In these systems, multiple users synchronously send packets in a bursty manner over a common additive white Gaussian noise (AWGN) channel. The users do not coordinate their transmissions, which may collide at the receiver. For such a system, we define both single-slot capacity and multiple-slot capacity. We then construct a coding and decoding scheme for single-slot capacity that achieves any rate within this capacity region. This coding and decoding scheme for a single time slot combines aspects of multiple access rate splitting and of broadcast codes for degraded AWGN channels. This design allows some bits to be reliably received even when collisions occur and more bits to be reliably received in the absence of collisions. The exact number of bits reliably received under both of these scenarios is part of the code design process, which we optimize to maximize the expected rate in each slot. Next, we examine the behavior of the system asymptotically over multiple slots. We show that there exist coding and decoding strategies such that regardless of the burstiness of the traffic, the system is stable as long as the average rate of the users is within the multiple access capacity region of the channel. In other words, we show that bursty traffic does not decrease the Cover-Wyner capacity region of the multiple access channel. A vast family of codes, which includes the type of codes we introduce for the single-slot transmission, achieve the capacity region, in a sense we define, for multiple-slot transmissions. These codes are stabilizing, using only local information at each of the individual queues. The use of information regarding other queues or the use of scheduling does not improve the multiple-slot capacity region.  相似文献   
29.
On approaching wideband capacity using multitone FSK   总被引:1,自引:0,他引:1  
In the wideband limit, certain types of "flash" signaling, such as flash frequency-shift keying (FSK), achieve the capacity of multipath fading channels. It is not clear, however, whether these asymptotic results translate into insights for practical fading channels in the finite-bandwidth, power-limited regime. It is known that, for flash FSK, the size of the input alphabet grows slowly with increasing bandwidth, leading to very high-peak power per tone. Thus, for flash FSK, the codeword probability of error decays very slowly with bandwidth and feasible rates approach the wideband capacity limit extremely slowly. Without contradicting the above results, our results in this paper point to a more optimistic outlook, from the point of view of error exponents and achievable rates, for the applicability of flash techniques in practical scenarios. We consider multitone FSK (MFSK), which has the same asymptotic capacity-achieving property as flash FSK in the wideband limit, but allows a larger input alphabet size with the same bandwidth. First, we show, using an error exponent approach, that multitone FSK allows lower peak power per tone than flash FSK. Next, we present the capacity of single-tone and two-tone FSK schemes with hard-decision detection at finite bandwidths. For typical channel parameters, the capacities are close to the wideband capacity limit.  相似文献   
30.
A Random Linear Network Coding Approach to Multicast   总被引:11,自引:0,他引:11  
We present a distributed random linear network coding approach for transmission and compression of information in general multisource multicast networks. Network nodes independently and randomly select linear mappings from inputs onto output links over some field. We show that this achieves capacity with probability exponentially approaching 1 with the code length. We also demonstrate that random linear coding performs compression when necessary in a network, generalizing error exponents for linear Slepian-Wolf coding in a natural way. Benefits of this approach are decentralized operation and robustness to network changes or link failures. We show that this approach can take advantage of redundant network capacity for improved success probability and robustness. We illustrate some potential advantages of random linear network coding over routing in two examples of practical scenarios: distributed network operation and networks with dynamically varying connections. Our derivation of these results also yields a new bound on required field size for centralized network coding on general multicast networks  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号