首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   23篇
  免费   0篇
综合类   2篇
无线电   16篇
一般工业技术   1篇
自动化技术   4篇
  2022年   4篇
  2021年   1篇
  2019年   3篇
  2018年   4篇
  2016年   1篇
  2014年   1篇
  2013年   3篇
  2012年   3篇
  2009年   2篇
  1989年   1篇
排序方式: 共有23条查询结果,搜索用时 31 毫秒
1.

We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to generate apt aftermaths. Privacy and security are the colossal perturb in the domain space of extensive data analysis. In this paper, our foremost priority is the computing technologies that focus on big data, IoT (Internet of Things), Cloud Computing, Blockchain, and fog computing. Among these, Cloud Computing follows the role of providing on-demand services to their customers by optimizing the cost factor. AWS, Azure, Google Cloud are the major cloud providers today. Fog computing offers new insights into the extension of cloud computing systems by procuring services to the edges of the network. In collaboration with multiple technologies, the Internet of Things takes this into effect, which solves the labyrinth of dealing with advanced services considering its significance in varied application domains. The Blockchain is a dataset that entertains many applications ranging from the fields of crypto-currency to smart contracts. The prospect of this research paper is to present the critical analysis and review it under the umbrella of existing extensive data systems. In this paper, we attend to critics' reviews and address the existing threats to the security of extensive data systems. Moreover, we scrutinize the security attacks on computing systems based upon Cloud, Blockchain, IoT, and fog. This paper lucidly illustrates the different threat behaviour and their impacts on complementary computational technologies. The authors have mooted a precise analysis of cloud-based technologies and discussed their defense mechanism and the security issues of mobile healthcare.

  相似文献   
2.
3.
Overcoming periodic blockage of the received signal and the carrier frequency fluctuations caused by rotor blades and Doppler shift, respectively, are considered the most challenging issues in helicopter-satellite communication systems. In this study, we propose an automatic frequency control method based on an adaptive modulation scheme. We employ a hybrid modulation not only depending on quadrature phase shift keying, but also based on binary phase shift keying for accurate cancellation of periodic blockage. On the other hand, we apply a chaotic interleaving scheme with a hybrid modulation scheme in order to achieve a better Bit Error Rate (BER) performance in LOS and NLOS environments. Finally, we validate the mathematical analysis of the proposed scheme through simulations. We evaluated the performance of the proposed scheme and performed a comparison with conventional schemes. Our results show that the proposed scheme is significantly capable of reducing the acquisition time and working with various velocities of helicopter blades in addition to providing a better BER performance in shadow fading environments.  相似文献   
4.
The teletraffic performance of a highway microcellular digital mobile radio system having an oversailing macrocell that spans many microcells is presented. The microcellular cluster is composed of concatenated segments of the highway where each segment is a microcell, typically 500-2000 m in length, with the base stations located at lamp-post elevations. A narrowband time-division-multiple-access arrangement supporting ten channels per carrier and one carrier per base station is used. The teletraffic analysis assumes there are n-up and n-down lanes, and that the vehicular speeds conform to a truncated Gaussian distribution whose mean speed is 100 or 50 km/h when the vehicular traffic is free-flowing or in traffic-congested conditions, respectively  相似文献   
5.
This paper presents a new approach for efficient image transmission over Multi-Carrier Code Division Multiple Access (MC-CDMA) systems using chaotic interleaving. The chaotic interleaving scheme based on Baker map is applied on the image data prior to transmission. The proposed approach transmits images over wireless channels, efficiently, without posing significant constraints on the wireless communication system bandwidth and noise. The performance of the proposed approach is further improved by applying Frequency-Domain Equalization (FDE) at the receiver. Two types of frequency-domain equalizers are considered and compared for performance evaluation of the proposed MC-CDMA system; the Zero-Forcing equalizer and the Linear Minimum Mean Square Error (LMMSE) equalizer. Several experiments are carried out to test the performance of the image transmission with different sizes over the proposed MC-CDMA system. Simulation results show that image transmission over wireless channels using the proposed chaotic interleaving approach is much more immune to noise and fading. Moreover this chaotic interleaving process adds a degree of encryption to the transmitted data. The results also show a noticeable performance improvement in terms of the Root Mean Square Error and Peak Signal-to-Noise Ratio values when applying FDE in the proposed approach, especially with the LMMSE equalizer.  相似文献   
6.
Wireless Personal Communications - Femtocells are the solution to improve cellular system capacity in indoor coverage. In two-tier networks, co-channel interference is a serious problem. In this...  相似文献   
7.
In this paper, we propose a chaotic interleaving scheme for the continuous phase modulation based single-carrier frequency-domain equalization (CPM-SC-FDE) system. Chaotic interleaving is used in this scheme to generate permuted versions from the sample sequences to be transmitted, with low correlation among their samples, and hence a better bit error rate (BER) performance can be obtained. The proposed CPM-SC-FDE system with chaotic interleaving combines the advantages of the frequency diversity, the low complexity, and the high power efficiency of the CPM-SC-FDE system and the performance improvements due to chaotic interleaving. The BER performance of the CPM-SC-FDE system with and without chaotic interleaving is evaluated by computer simulations. Also, a comparison between the proposed chaotic interleaving and the conventional block interleaving is performed. Simulation results show that, the proposed chaotic interleaving scheme can greatly improve the performance of the CPM-SC-FDE system. Furthermore, the results show that this scheme outperforms the conventional block interleaving scheme in the CPM-SC-FDE system. The results also show that, the proposed CPM-SC-FDE system with chaotic interleaving provides a good trade-off between system performance and bandwidth efficiency.  相似文献   
8.
Multimedia Tools and Applications - In the last years, most researches proved that spectrum holes are not efficiently utilized in wireless communications. Cognitive radio (CR) is an efficient...  相似文献   
9.
The selective mapping (SLM) scheme is one of the most popular peak-to-average power ratio (PAPR) reduction techniques proposed for multi-input multi-output orthogonal frequency division multiplexing (MIMO-OFDM) systems. One of the major disadvantages of this scheme is the need for the transmission of side information (SI) bits to enable the receiver to recover the transmitted data. The authors present a small overhead SLM (s-SLM) scheme for space-time block coded (STBC) MIMO-OFDM systems. This proposed scheme improves the system bandwidth efficiency and achieves a significantly lower bit error rate (BER) than the individual SLM (i-SLM) and direct SLM (d-SLM) schemes. In addition, approximate expressions for the complementary cumulative distribution function (CCDF) of the PAPR and the average BER of the proposed s-SLM scheme are derived. The simulation results show that the proposed s-SLM scheme improves the detection probability of the SI bits and hence gives a better performance than the i-SLM and the d-SLM schemes.  相似文献   
10.
This paper presents different relay and jammer selection schemes for one-way cooperative networks to increase the security against malicious eavesdroppers. We consider a single source-destination cooperative network with multiple intermediate nodes and one or more eavesdroppers. The selection in the proposed schemes is made with the presence of direct links and the assumption that the broadcast phase is unsecured. The proposed schemes select three intermediate nodes. The first selected node operates in the conventional relay mode and assists the source to deliver its data to the corresponding destination via a Decode-and-Forward strategy. The second and third selected nodes are used in different communication phases as jammers to create intentional interference at the eavesdroppers’ nodes. Moreover, a hybrid scheme which switches between jamming and non-jamming modes is introduced in this paper. The proposed schemes are analyzed in terms of ergodic secrecy capacity and secrecy outage probability. Extensive analysis and a set of simulation results are presented to demonstrate the effectiveness of the different schemes presented in this work. The obtained results show that the proposed schemes with jamming outperform the conventional non-jamming schemes and the hybrid switching scheme further improves the secrecy capacity. The impact of changing both the eavesdroppers and the relays location on ergodic secrecy capacity and secrecy outage probability is also discussed. Finally, the impact of the presence of multiple eavesdroppers is studied in this paper.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号