首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   42篇
  免费   0篇
化学工业   3篇
无线电   38篇
自动化技术   1篇
  2022年   1篇
  2021年   2篇
  2020年   1篇
  2019年   1篇
  2018年   6篇
  2016年   3篇
  2015年   1篇
  2014年   4篇
  2013年   4篇
  2012年   7篇
  2011年   3篇
  2010年   3篇
  2009年   1篇
  2008年   1篇
  2006年   1篇
  2004年   2篇
  2001年   1篇
排序方式: 共有42条查询结果,搜索用时 15 毫秒
1.
2.
3.
Wireless Personal Communications - Internet of things (IoTs) has been the smartest technology proven worldwide these days. The application products of IoTs are Mobile ad hoc network (MANET) and...  相似文献   
4.
Wireless Personal Communications - The integration of everyday objects into the Internet represents the foundation of the forthcoming Internet of Things (IoT). Smart objects will be the building...  相似文献   
5.
6.
5G Based on Cognitive Radio   总被引:2,自引:1,他引:1  
Both the cognitive radio (CR) and the fifth generation of cellular wireless standards (5G) are considered to be the future technologies: on one hand, CR offers the possibility to significantly increase the spectrum efficiency, by smart secondary users (CR users) using the free licensed users spectrum holes; on the other hand, the 5G implies the whole wireless world interconnection (WISDOM—Wireless Innovative System for Dynamic Operating Megacommunications concept), together with very high data rates Quality of Service (QoS) service applications. In this paper, they are combined together into a “CR based 5G”. With this aim, two novel ideas are advanced: the 5G terminal is a CR terminal and the CR technology is chosen for WISDOM concept. Thus, the 5G takes CR flexibility and adaptability and makes the first step through a commercial and tangible form.  相似文献   
7.
Wireless sensor networks (WSNs) enable a wide variety of applications resulting in still increasing requirements for the protocols supporting the operations. The medium access control (MAC) layer protocols are essential for improving the performance of an application and its quality of service because MAC protocols influence channel capacity utilization, network delay, energy consumption, and scalability. The contribution of this paper is two novel cluster-based time division multiple access (TDMA) scheduling MACs for WSNs and an analysis of the mobility impact on both. The proposed MAC layer protocols support real time applications where the cluster-based scheduling improves the scalability and also improves the performance in varying network conditions. The paper presents the design, implementation and performance evaluation of the proposed cluster based TDMA scheduling algorithms green conflict free (GCF) and multicolor-GCF (M-GCF) for high complexity and high requirement applications of WSNs under both low and high mobility conditions. The comparative evaluation shows that the M-GCF algorithm has better slot sharing and less conflicts with reduced communication energy consumption, delay, and good throughput under static and low mobility conditions while the GCF algorithm has better performance in high mobility scenarios. The paper also defines the mobility threshold that decides the use of the GCF- and M-GCF algorithms according to the mobility requirement of application.  相似文献   
8.
In recent years, energy consumption and data gathering is a foremost concern in many applications of wireless sensor networks (WSNs). The major issue in WSNs is effective utilization of the resource as energy and bandwidth with a large gathering of data from the monitoring and control applications. This paper proposes novel Bandwidth Efficient Cluster based Packet Aggregation algorithm for heterogeneous WSNs. It combines the idea of variable packet generation rate of each node with random data. The nodes are randomly distributed with different energy level and are equal in numbers. It uses the perfectly compressible aggregation function at cluster head based on the correlation of packets and data generated by each node. Compare to state-of-the-art solutions, the algorithm shows 4.43 % energy savings with reduced packet delivery ratio (62.62 %) at the sink. It shows better bandwidth utilization in packet aggregation than data aggregation.  相似文献   
9.
Wireless Sensor Networks are often used for monitoring and control applications where sensor nodes collect data and send it to the sink. Direct transmission of data packets to the sink from nodes in the network causes increased communication costs in terms of energy, network lifetime and bandwidth utilization. In this context, this paper proposes Two Tier Cluster-based Data Aggregation (TTCDA) algorithm for the randomly distributed nodes in the network to minimize computation and communication cost. The TTCDA effectively considers the packet and data aggregation using additive and divisible aggregation functions at cluster head and sink. The aggregation functions are applied according to spatial and temporal correlation of packets and data generated by each node. It also prevents transmission of redundant data by improving energy consumption and bandwidth utilization as compared with state-of-the-art solution. The performance of the algorithm is validated using examples and simulations. Also, it is seen that packet aggregation in TTCDA is better for the bandwidth utilization as it reduces average energy consumption by 3.13 % as compared to data aggregation.  相似文献   
10.
Security and privacy architecture for various access networks have often been considered on the upper service layers in the form of application and transport security and from lower layers in the form of security over wireless networks. Today there is no trust relationship between the stakeholders of different access network types for e.g. wireless mesh network, wireless PAN, wireless LAN, cellular network, satellite etc. and each have their own security mechanism. What is common for these access networks is the networking layer which is IP based. In order to provide seamless service across these heterogeneous access networks there must be a trust relationship among the stakeholders for authentication, authorization, accounting and billing of end user. However, what is still missing is a general solution which is both adaptable to the network types and conditions and also takes into account end system capabilities as well as enabling inter-domain AAA negotiation. This paper proposes a light-weight AAA infrastructure providing continuous, on-demand, end-to-end security in heterogeneous networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号