期刊文献+
共找到180篇文章
< 1 2 9 >
每页显示 20 50 100
Call for Papers─Feature Topic Vol.23,No.2,2026 Beyond Terrestrial Infrastructure: Meteor Burst Communications for Next-Generation Emergency Communication Networks
1
《China Communications》 2025年第8期I0002-I0002,共1页
Meteor Burst Communication(MBC),a niche yet revolutionary wireless communication paradigm,exploits the transient ionized trails generated by meteors ablating in Earth’s atmosphere to enable sporadic yet resilient lon... Meteor Burst Communication(MBC),a niche yet revolutionary wireless communication paradigm,exploits the transient ionized trails generated by meteors ablating in Earth’s atmosphere to enable sporadic yet resilient long-distance radio links.Known for its exceptional resilience,robustness,and sustained connectivity,MBC holds significant promise for applications in emergency communications,remote area connectivity,military/defense systems,and environmental monitoring.However,the scientific exploration and application of MBC have long been highly challenging.In particular,under the combined influence of multiple physical field factors,the channel experiences superimposed multiple random fading effects,exhibiting bursty,highly time-varying,and strongly random characteristics.This persistent technical challenge has resulted in the absence of a practical statistical channel model for MBC to date. 展开更多
关键词 wireless communication paradigmexploits earth s atmosphere Resilient Long Distance Radio Links Emergency Communication networks Meteor Burst communications emergency communicationsremote area connectivitymilitary defense transient ionized trails meteor burst communication mbc
在线阅读 下载PDF
Secure Channel Estimation Using Norm Estimation Model for 5G Next Generation Wireless Networks
2
作者 Khalil Ullah Song Jian +4 位作者 Muhammad Naeem Ul Hassan Suliman Khan Mohammad Babar Arshad Ahmad Shafiq Ahmad 《Computers, Materials & Continua》 SCIE EI 2025年第1期1151-1169,共19页
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile networks.These networks are sufficiently scaled to interconnect billions of user... The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile networks.These networks are sufficiently scaled to interconnect billions of users and devices.Researchers in academia and industry are focusing on technological advancements to achieve highspeed transmission,cell planning,and latency reduction to facilitate emerging applications such as virtual reality,the metaverse,smart cities,smart health,and autonomous vehicles.NextG continuously improves its network functionality to support these applications.Multiple input multiple output(MIMO)technology offers spectral efficiency,dependability,and overall performance in conjunctionwithNextG.This article proposes a secure channel estimation technique in MIMO topology using a norm-estimation model to provide comprehensive insights into protecting NextG network components against adversarial attacks.The technique aims to create long-lasting and secure NextG networks using this extended approach.The viability of MIMO applications and modern AI-driven methodologies to combat cybersecurity threats are explored in this research.Moreover,the proposed model demonstrates high performance in terms of reliability and accuracy,with a 20%reduction in the MalOut-RealOut-Diff metric compared to existing state-of-the-art techniques. 展开更多
关键词 Next generation networks massive mimo communication network artificial intelligence 5G adversarial attacks channel estimation information security
在线阅读 下载PDF
When Communication Networks Meet Federated Learning for Intelligence Interconnecting:A Comprehensive Survey and Future Perspective
3
作者 Sha Zongxuan Huo Ru +3 位作者 Sun Chuang Wang Shuo Huang Tao F.Richard Yu 《China Communications》 2025年第7期74-94,共21页
With the rapid development of network technologies,a large number of deployed edge devices and information systems generate massive amounts of data which provide good support for the advancement of data-driven intelli... With the rapid development of network technologies,a large number of deployed edge devices and information systems generate massive amounts of data which provide good support for the advancement of data-driven intelligent models.However,these data often contain sensitive information of users.Federated learning(FL),as a privacy preservation machine learning setting,allows users to obtain a well-trained model without sending the privacy-sensitive local data to the central server.Despite the promising prospect of FL,several significant research challenges need to be addressed before widespread deployment,including network resource allocation,model security,model convergence,etc.In this paper,we first provide a brief survey on some of these works that have been done on FL and discuss the motivations of the Communication Networks(CNs)and FL to mutually enable each other.We analyze the support of network technologies for FL,which requires frequent communication and emphasizes security,as well as the studies on the intelligence of many network scenarios and the improvement of network performance and security by the methods based on FL.At last,some challenges and broader perspectives are explored. 展开更多
关键词 communication networks federated learning intelligence interconnecting machine learning privacy preservation
在线阅读 下载PDF
Dynamic Multi-Target Jamming Channel Allocation and Power Decision-Making in Wireless Communication Networks:A Multi-Agent Deep Reinforcement Learning Approach
4
作者 Peng Xiang Xu Hua +4 位作者 Qi Zisen Wang Dan Zhang Yue Rao Ning Gu Wanyi 《China Communications》 2025年第5期71-91,共21页
This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD... This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD)approach based on multi-agent deep reinforcement learning(MADRL).In high-dynamic and multi-target aviation communication environments,the rapid changes in channels make it difficult for sensors to accurately capture instantaneous channel state information.This poses a challenge to make centralized jamming decisions with single-agent deep reinforcement learning(DRL)approaches.In response,we design a distributed multi-agent decision architecture(DMADA).We formulate multi-jammer resource allocation as a multiagent Markov decision process(MDP)and propose a fingerprint-based double deep Q-Network(FBDDQN)algorithm for solving it.Each jammer functions as an agent that interacts with the environment in this framework.Through the design of a reasonable reward and training mechanism,our approach enables jammers to achieve distributed cooperation,significantly improving the jamming success rate while considering jamming power cost,and reducing the transmission rate of links.Our experimental results show the FBDDQN algorithm is superior to the baseline methods. 展开更多
关键词 jamming resource allocation JCAPD MADRL wireless communication countermeasure wireless communication networks
在线阅读 下载PDF
Encoding converters for quantum communication networks
5
作者 Hua-Xing Xu Shao-Hua Wang +2 位作者 Ya-Qi Song Ping Zhang Chang-Lei Wang 《Chinese Physics B》 2025年第5期64-69,共6页
Quantum communication networks,such as quantum key distribution(QKD)networks,typically employ the measurement-resend mechanism between two users using quantum communication devices based on different quantum encoding ... Quantum communication networks,such as quantum key distribution(QKD)networks,typically employ the measurement-resend mechanism between two users using quantum communication devices based on different quantum encoding types.To achieve direct communication between the devices with different quantum encoding types,in this paper,we propose encoding conversion schemes between the polarization bases(rectilinear,diagonal and circular bases)and the time-bin phase bases(two phase bases and time-bin basis)and design the quantum encoding converters.The theoretical analysis of the encoding conversion schemes is given in detail,and the basis correspondence of encoding conversion and the property of bit flip are revealed.The conversion relationship between polarization bases and time-bin phase bases can be easily selected by controlling a phase shifter.Since no optical switches are used in our scheme,the converter can be operated with high speed.The converters can also be modularized,which may be utilized to realize miniaturization in the future. 展开更多
关键词 quantum communication networks encoding conversion polarization encoding time-bin phase encoding
原文传递
Detection and Tracking of a UAV Based on Low-Frequency Communication Network
6
作者 Hongmei Shi Yifan Zhou +1 位作者 Mengxin Yang Dan Zeng 《Journal of Beijing Institute of Technology》 2025年第3期231-242,共12页
When tracking a unmanned aerial vehicle(UAV)in complex backgrounds,environmen-tal noise and clutter often obscure it.Traditional radar target tracking algorithms face multiple lim-itations when tracking a UAV,includin... When tracking a unmanned aerial vehicle(UAV)in complex backgrounds,environmen-tal noise and clutter often obscure it.Traditional radar target tracking algorithms face multiple lim-itations when tracking a UAV,including high vulnerability to target occlusion and shape variations,as well as pronounced false alarms and missed detections in low signal-to-noise ratio(SNR)envi-ronments.To address these issues,this paper proposes a UAV detection and tracking algorithm based on a low-frequency communication network.The accuracy and effectiveness of the algorithm are validated through simulation experiments using field-measured point cloud data.Additionally,the key parameters of the algorithm are optimized through a process of selection and comparison,thereby improving the algorithm's precision.The experimental results show that the improved algo-rithm can significantly enhance the detection and tracking performance of the UAV under high clutter density conditions,effectively reduce the false alarm rate and markedly improve overall tracking performance metrics. 展开更多
关键词 unmanned aerial vehicl(UAV)detection and tracking low-frequency communication network field-measurement data
在线阅读 下载PDF
Enabling Efficient Caching in High Mobility UAV Communications Network under Limited Backhaul 被引量:1
7
作者 Yan Wu Jiandong Li +2 位作者 Junyu Liu Min Sheng Chenxi Zhao 《China Communications》 SCIE CSCD 2022年第10期207-219,共13页
Due to flexible deployment,unmanned aerial vehicle(UAV)mounted aerial access points are capable of expanding the coverage capabilities of existing terrestrial base stations(TBSs).Different from TBSs,however,UAV access... Due to flexible deployment,unmanned aerial vehicle(UAV)mounted aerial access points are capable of expanding the coverage capabilities of existing terrestrial base stations(TBSs).Different from TBSs,however,UAV access points(UAPs)are of high mobility in horizontal and vertical dimensions,which may deteriorate the coverage performance.Worsestill,the mobility of UAPs would as well increase the pressure of wireless backhaul.In this light,we investigate the performance of the cache-enabled UAV communications network(CUCN)in terms of network spatial throughput(ST)by analyzing the line of sight(LoS)connections and non-line of sight(NLoS)connections.It is found that the network ST is exponentially decreased with the square of UAP altitude.Furthermore,contrary to intuition,a large cache size may deteriorate the network ST when UAPs are over-deployed.The reason is that a large cache size increases the hit probability,which may increase the activation of UAPs and consequently result in complicated interference.Aiming to maximize the network ST,we optimize the cache strategy under limited backhaul.Remarkably,the results show that network ST could be substantially improved by the optimized cache strategy and the performance degeneration brought by UAP high mobility could be even eliminated especially when the UAP altitude is high. 展开更多
关键词 caching optimization UAV communications network spatial throughput stochastic geometry aerial access point
在线阅读 下载PDF
For LEO Satellite Networks: Intelligent Interference Sensing and Signal Reconstruction Based on Blind Separation Technology 被引量:1
8
作者 Chengjie Li Lidong Zhu Zhen Zhang 《China Communications》 SCIE CSCD 2024年第2期85-95,共11页
In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signal... In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system. 展开更多
关键词 blind source separation greedy optimization algorithm interference sensing LEO satellite communication networks signal reconstruction
在线阅读 下载PDF
Vehicular Communications,Networks,and Applications
9
作者 ZHUANG Weihua ZHU Hongzi 《ZTE Communications》 2016年第3期1-2,共2页
Avehicular ad hoc network (VANET) is a packet-switched network, consisting of mobile communication nodes mounted on vehicles, with very limited or no infrastructure support [1]. It supports communications among near... Avehicular ad hoc network (VANET) is a packet-switched network, consisting of mobile communication nodes mounted on vehicles, with very limited or no infrastructure support [1]. It supports communications among nearby vehicles, 展开更多
关键词 VANETS Vehicular communications networks and Applications DSRC
在线阅读 下载PDF
Study on QoS and Communications Capacity in Heterogeneous Network Convergence
10
作者 Xia Weiwei,Shen Lianfeng(National Mobile Communications Research Laboratory,Southeast University,Nanjing 210096,China) 《ZTE Communications》 2008年第3期6-9,共4页
To provide any subscriber from anywhere at anytime with services that have both secured Quality of Service(QoS) and simultaneous expansion of network coverage and communications capacity is a key problem that has to b... To provide any subscriber from anywhere at anytime with services that have both secured Quality of Service(QoS) and simultaneous expansion of network coverage and communications capacity is a key problem that has to be considered and solved in heterogeneous network convergence.Key technologies for a secured QoS and communications capacity analysis under heterogeneous environment are important subjects for research.Key technologies for a secured QoS are mainly on radio resource management algorithms covering Call Admission Control(CAC) algorithm,vertical handover algorithm,heterogeneous resource allocation algorithm and network selection algorithm.The applications of a novel multi-hop in heterogeneous convergence system serve the purposes of network coverage expansion,transmission power reduction,system communication capacity and throughput increase. 展开更多
关键词 QOS Study on QoS and communications Capacity in Heterogeneous network Convergence WLAN IEEE
在线阅读 下载PDF
Power Line Communications Networking Method Based on Hybrid Ant Colony and Genetic Algorithm
11
作者 Qianghui Xiao Huan Jin Xueyi Zhang 《Engineering(科研)》 2020年第8期581-590,共10页
When solving the routing problem with traditional ant colony algorithm, there is scarce in initialize pheromone and a slow convergence and stagnation for the complex network topology and the time-varying characteristi... When solving the routing problem with traditional ant colony algorithm, there is scarce in initialize pheromone and a slow convergence and stagnation for the complex network topology and the time-varying characteristics of channel in power line carrier communication of low voltage distribution grid. The algorithm is easy to fall into premature and local optimization. Proposed an automatic network algorithm based on improved transmission delay and the load factor as the evaluation factors. With the requirements of QoS, a logical topology of power line communication network is established. By the experiment of MATLAB simulation, verify that the improved Dynamic hybrid ant colony genetic algorithm (DH_ACGA) algorithm has improved the communication performance, which solved the QoS routing problems of power communication to some extent. 展开更多
关键词 Power Line Carrier Communication network Quality of Service Hybrid Ant Colony and Genetic Algorithm
在线阅读 下载PDF
Hubei: Building a Modern Communications Network
12
《China Today》 2000年第10期22-25,共4页
关键词 CO Building a Modern communications network HUBEI
在线阅读 下载PDF
A 5G Perspective of an SDN-Based Privacy-Preserving Scheme for IoT Networks 被引量:2
13
作者 Isaac Appiah Xiaoming Jiang +1 位作者 Edward Kwadwo Boahen Ebenezer Owusu 《International Journal of Communications, Network and System Sciences》 2023年第8期169-190,共22页
The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as techno... The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as technology advances, and its use expands. As a consequence, boosting the capacity of these networks has garnered widespread attention. As a result, 5G, the next phase of cellular networks, is expected to be a game-changer, bringing with it faster data transmission rates, more capacity, improved service quality, and reduced latency. However, 5G networks continue to confront difficulties in establishing pervasive and dependable connections amongst high-speed IoT devices. Thus, to address the shortcomings in current recommendations, we present a unified architecture based on software-defined networks (SDNs) that provides 5G-enabled devices that must have complete secrecy. Through SDN, the architecture streamlines network administration while optimizing network communications. A mutual authentication protocol using elliptic curve cryptography is introduced for mutual authentication across certificate authorities and clustered heads in IoT network deployments based on IoT. Again, a dimensionality reduction intrusion detection mechanism is introduced to decrease computational cost and identify possible network breaches. However, to leverage the method’s potential, the initial module's security is reviewed. The second module is evaluated and compared to modern models. 展开更多
关键词 Internet of Things 5G SDNs Security and Privacy INTRUSION network communications
在线阅读 下载PDF
Modeling of Intelligent Integrated Network Management System Using Object Oriented Approach *
14
作者 费翔 罗军舟 +1 位作者 顾冠群 吴介一 《Journal of Southeast University(English Edition)》 EI CAS 1998年第1期3-7,共5页
The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficien... The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently. 展开更多
关键词 object oriented approach computer communication network network management
在线阅读 下载PDF
Distribution algorithm of entangled particles for wireless quantum communication mesh networks
15
作者 王霄峻 施丽慧 +2 位作者 占海涛 项睿清 余旭涛 《Journal of Southeast University(English Edition)》 EI CAS 2015年第4期450-456,共7页
With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes ... With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes selection in order to save cost and reduce complexity. A minimum spanning tree( MST)-based quantum distribution algorithm( QDMST) is presented to construct the mesh backbone network. First, the articulation points are found,and for each connected block uncovered by the articulation points, the general centers are solved. Then, both articulation points and general centers are classified as backbone nodes and an M ST is formed. The quantum path between every two neighbor nodes on the MST is calculated. The nodes on these paths are also classified as backbone nodes. Simulation results validate the advantages of QDMST in the average backbone nodes number and average quantum channel distance compared to the existing random selection algorithm under multiple network scenarios. 展开更多
关键词 wireless quantum communication networks entangled particles distribution wireless mesh networks minimum spanning tree
在线阅读 下载PDF
Provisioning Intelligent Water Wave Optimization Approach for Underwater Acoustic Wireless Sensor Networks
16
作者 M.Manikandan A.Rajiv Kannan 《Computer Systems Science & Engineering》 SCIE EI 2022年第11期625-641,共17页
In the Acoustics channel,it is incredibly challenging to offer data transfer for time-sourced applications in an energy-efficient manner due to higher error rate and propagation delay.Subsequently,conventional re-tran... In the Acoustics channel,it is incredibly challenging to offer data transfer for time-sourced applications in an energy-efficient manner due to higher error rate and propagation delay.Subsequently,conventional re-transmission over any failure generally initiates significantly larger end-to-end delay,and therefore it is not probable for time-based services.Moreover,standard techniques without any re-transmission consume enormous energy.This investigation proposes a novel multi-hop energy-aware transmission-based intelligent water wave optimization strategy.It ensures reduced end-to-end while attaining potential amongst overall energy efficiency end-to-end packet delay.It merges a naturally inspired meta-heuristic approach with multi-hop routing for data packets to reach the destination.The appropriate design of this Meta heuristic-based energy-aware scheme consumes lesser energy than the conventional one-hop transmission strategy without re-transmission.However,there is no hop-by-hop re-transmission facilitated.The proposed model shows only lesser delay than conventional methods with re-transmission.This work facilitates extensive work to carry out the proposed model performance with the MATLAB simulation environment.The results illustrate that the model is exceptionally energyefficient with lesser packet delays.With 500 nodes,the packet delivery ratio of proposed model is 100%,average delay is reduced by 2%,total energy consumption is 8 J,average packet redundancy is 1.856,and idle energy is 6.9Mwh.The proposed model outperforms existing approaches like OSF,AOR,and DMR respectively. 展开更多
关键词 Acoustic applications energy efficiency network communications underwater sensor networks meta-heuristic approach intelligent water wave optimization
在线阅读 下载PDF
Time Evolution of Orbital Angular Momentum Modes for Deep-Routing Multiplexing Channels
17
作者 Zebin Huang Peipei Wang +6 位作者 Jiafu Chen Wenjie Xiong Huapeng Ye Xinxing Zhou Ze Dong Dianyuan Fan Shuqing Chen 《Engineering》 2025年第2期97-104,共8页
Optical orbital angular momentum(OAM)mode multiplexing has emerged as a promising technique for boosting communication capacity.However,most existing studies have concentrated on channel(de)-multiplexing,overlooking t... Optical orbital angular momentum(OAM)mode multiplexing has emerged as a promising technique for boosting communication capacity.However,most existing studies have concentrated on channel(de)-multiplexing,overlooking the critical aspect of channel routing.This challenge involves the reallocation of multiplexed OAM modes across both spatial and temporal domains—a vital step for developing versatile communication networks.To address this gap,we introduce a novel approach based on the time evolution of OAM modes,utilizing the orthogonal conversion and diffractive modulation capabilities of unitary transformations.This approach facilitates high-dimensional orthogonal transformations of OAM mode vectors,altering both the propagation direction and the spatial location.Using Fresnel diffraction matrices as unitary operators,it manipulates the spatial locations of light beams during transmission,breaking the propagation invariance and enabling temporal evolution.As a demonstration,we have experimentally implemented the deep routing of four OAM modes within two distinct time sequences.Achieving an average diffraction efficiency above 78.31%,we have successfully deep-routed 4.69 Tbit-s^(-1)quadrature phase-shift keying(QPSK)signals carried by four multiplexed OAM channels,with a bit error rate below 10^(-6).These results underscore the efficacy of our routing strategy and its promising prospects for practical applications. 展开更多
关键词 Orbital angular momentum Time evolution modulation Deep-routing technology Unitary transformation Mode-division communication networks
在线阅读 下载PDF
Trajectory Design and Resource Allocation for RIS-Assisted UAV-Enabled WPCNs Using Deep Reinforcement Learning
18
作者 Chen Wei Zou Yulong Zhai Liangsen 《China Communications》 2025年第5期204-219,共16页
This paper investigates a wireless powered communication network(WPCN)facilitated by an unmanned aerial vehicle(UAV)in Internet of Things(IoT)networks,where multiple IoT devices(IoTDs)gather energy from a terrestrial ... This paper investigates a wireless powered communication network(WPCN)facilitated by an unmanned aerial vehicle(UAV)in Internet of Things(IoT)networks,where multiple IoT devices(IoTDs)gather energy from a terrestrial energy station(ES)during the wireless energy transfer(WET)stage,followed by the UAV collecting data from these powered IoTDs with the time division multiple access(TDMA)protocol in the wireless information transfer(WIT)stage.To overcome the challenges of radio propagation caused by obstructions,we incorporate a reconfigurable intelligent surface(RIS)to enhance the link quality of the ES-IoTDs and IoTDs-UAV.The primary objective is to maximize the average sum rate of all IoTDs by jointly optimizing UAV trajectory,ES transmit power,and RIS phase shifts,along with the time allocation for WET and WIT.To this end,we reformulate the optimization problem as a markov decision process(MDP)and introduce a deep reinforcement learning(DRL)approach for addressing the formulated problem,called the proximal policy optimization(PPO)based energy harvesting with trajectory design and phase shift optimization(PPO-EHTDPS)algorithm.By continuously exploring within the environment,the PPO algorithm refines its policy to optimize the UAV trajectory,the energy phase shifts,ES transmit power,and WET/WIT time allocation.Additionally,a continuous phase shift optimization algorithm is employed to determine the information phase shifts for each IoTD to maximize average sum rate.Finally,numerical results demonstrate that the proposed PPOEHTDPS algorithm can significantly achieve higher average sum rate and show better convergence performance over the benchmark algorithms. 展开更多
关键词 deep reinforcement learning reconfigurable intelligent surface(RIS) unmanned aerial vehicle(UAV) wireless powered communication network
在线阅读 下载PDF
Network-based products detection system:congestion control and self diagnosis
19
作者 易乔木 程金树 +1 位作者 方宏超 陈幼平 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期244-249,共6页
The problems that arise while developing a real-time distributed information-processing software system are studied. And based on the TCP/IP protocols and socket, for its facility in client/server (C/S) model networ... The problems that arise while developing a real-time distributed information-processing software system are studied. And based on the TCP/IP protocols and socket, for its facility in client/server (C/S) model networking programming, a prototype is designed for data transmission between the server and clients and it is applied on an on-line products automatic detection system. The probability analysis on network congestion was also made. A proper mechanism based on the ARCC (adapted RTT congestion control) algorithm is employed for detecting and resolving congestion, the purpose of which is mainly to achieve congestion avoidance under the particular conditions in this network-based system and reach the desired performance. Furthermore, a method is proposed for a client to diagnose automatically the connection status between the server and the client and to re-connect to the server when the disconnection is detected. 展开更多
关键词 distributed system network communication network congestion SELF-DIAGNOSIS
在线阅读 下载PDF
Design and performance analysis of wireless sensor network location node system for underground mine 被引量:10
20
作者 CHEN Guang-zhu SHEN Chun-feng ZHOU Li-juan 《Mining Science and Technology》 EI CAS 2009年第6期813-818,共6页
Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety... Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety. The location node system consists of a mobile node,several fixed nodes,and a sink node,all of whose circuits were designed based on CC2430. A varistor and a RC circuit were used in the reset circuit of a sensor node to guarantee the intrinsic safety by reducing discharge energy,the theoretical analysis of the discharge energy shows that the reset circuit is an intrinsic safety one. The analysis and simulation about the performance of the location node system are discussed,such as network communication delay and packet loss rate,the results show that the highest network communication delay of the system is about 0.11 seconds,and the highest packet loss rate is about 0.13,which assures the location node system has a high reliability,and can locate miners in the underground mine. 展开更多
关键词 wireless sensor network location node network communication delay packet loss rate
在线阅读 下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部