期刊文献+
共找到53篇文章
< 1 2 3 >
每页显示 20 50 100
Low power Viterbi decoder design for low altitude adhoc networks
1
作者 FEI Yingying XIAO Chunlu +3 位作者 JING Wenhao MA Tianming WANG Jiahan JIN Jie 《High Technology Letters》 2025年第2期154-163,共10页
With the rapid development of low altitude economic industry,low altitude adhoc network technology has been getting more and more intensive attention.In the adhoc network protocol designed in this paper,the convolutio... With the rapid development of low altitude economic industry,low altitude adhoc network technology has been getting more and more intensive attention.In the adhoc network protocol designed in this paper,the convolutional code used is(3,1,7),and the design of a low power Viterbi decoder adapted to multi-rate variations is proposed.In the traditional Viterbi decoding method,the high complexity of path metric(PM)accumulation and Euclidean distance computation leads to the problems of low efficiency and large storage resources in the decoder.In this paper,an improved add compare select(ACS)algorithm,a generalized formula for branch metric(BM)based on Manhattan distance,and a method to reduce the accumulated PM for different Viterbi decoders are put forward.A simulation environment based on Vivado and Matlab to verify the accuracy and effectiveness of the proposed Viterbi decoder is also established.The experimental results show that the total power consumption is reduced by 15.58%while the decoding accuracy of the Viterbi decoder is guaranteed,which meets the design requirements of a low power Viterbi decoder. 展开更多
关键词 low altitude adhoc network Manhattan distance network protocol Viterbi decoder field programmable gate array(FPGA)
在线阅读 下载PDF
Multi-agent cooperative intrusion response in mobile adhoc networks 被引量:6
2
作者 Yi Ping Zou Futai +1 位作者 Jiang Xinghao Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期785-794,共10页
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s... The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation. 展开更多
关键词 computer networks SECURITY mobile agent mobile adhoc networks intrusion detection intrusion response
在线阅读 下载PDF
Cooperative Channel and Optimized Route Selection in Adhoc Network 被引量:2
3
作者 D.Manohari M.S.Kavitha +1 位作者 K.Periyakaruppan B.Chellapraba 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1547-1560,共14页
Over the last decade,mobile Adhoc networks have expanded dramati-cally in popularity,and their impact on the communication sector on a variety of levels is enormous.Its uses have expanded in lockstep with its growth.D... Over the last decade,mobile Adhoc networks have expanded dramati-cally in popularity,and their impact on the communication sector on a variety of levels is enormous.Its uses have expanded in lockstep with its growth.Due to its instability in usage and the fact that numerous nodes communicate data concur-rently,adequate channel and forwarder selection is essential.In this proposed design for a Cognitive Radio Cognitive Network(CRCN),we gain the confidence of each forwarding node by contacting one-hop and second level nodes,obtaining reports from them,and selecting the forwarder appropriately with the use of an optimization technique.At that point,we concentrate our efforts on their channel,selection,and lastly,the transmission of data packets via the designated forwarder.The simulation work is validated in this section using the MATLAB program.Additionally,steps show how the node acts as a confident forwarder and shares the channel in a compatible method to communicate,allowing for more packet bits to be transmitted by conveniently picking the channel between them.We cal-culate the confidence of the node at the start of the network by combining the reliability report for thefirst hop and the reliability report for the secondary hop.We then refer to the same node as the confident node in order to operate as a forwarder.As a result,we witness an increase in the leftover energy in the output.The percentage of data packets delivered has also increased. 展开更多
关键词 adhoc network confident FORWARDER one-hop optimized route selection secondary report channel selection
在线阅读 下载PDF
Performance of unique and secure routing protocol(USRP)in flying Adhoc Networks for healthcare applications
4
作者 J.Vijitha Ananthi P.Subha Hency Jose 《High-Confidence Computing》 EI 2024年第1期24-31,共8页
Nowadays,Flying Adhoc Networks play a vital role due to its high efficiency in fast communication.Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication.I... Nowadays,Flying Adhoc Networks play a vital role due to its high efficiency in fast communication.Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication.In healthcare applications,wireless body area network transmits the data,whereas the security,which is the most important concern to be focused in a flying adhoc network is not satisfactory.Many intruders tamper the network,degrading the overall network performance.To avoid security issues,a unique and secure routing protocol that provides a single solution for five different types of attacks such as,black hole attacks,grey hole attacks,yoyo attacks,conjoint attack and jamming attacks,is proposed.The simulation results analyses the network performance by using the proposed routing table.In comparison to the other solutions rendered to resolve the affected network,this proposed routing protocol has a higher throughput,higher delivery rate,and lower delay.The Unique and Secure Routing Protocol(USRP)provides an integrated solution for an efficient and secure communication in a flying adhoc network. 展开更多
关键词 Secure routing protocol Flying adhoc networks Unmanned aerial vehicles Mobile adhoc network Attackers Denial of service attacks
在线阅读 下载PDF
基于相对移动性预测的k跳AdHoc网络分簇算法 被引量:11
5
作者 孟洛明 江彦馥 +3 位作者 刘彦君 苏汉 徐思雅 亓峰 《电子与信息学报》 EI CSCD 北大核心 2018年第12期2954-2961,共8页
针对网络节点随机移动造成的AdHoc网络分簇结构变化和路由失效问题,该文提出一种基于相对移动性预测的k跳分簇算法,分析和预测网络节点运动状态,自适应地调整分簇结构,提高簇结构稳定性。首先,使用多普勒频移计算节点间相对移动速度,预... 针对网络节点随机移动造成的AdHoc网络分簇结构变化和路由失效问题,该文提出一种基于相对移动性预测的k跳分簇算法,分析和预测网络节点运动状态,自适应地调整分簇结构,提高簇结构稳定性。首先,使用多普勒频移计算节点间相对移动速度,预测节点移动性,得到节点间链路保持时间。然后,在簇形成阶段,采用面向节点稳定性的MAX-MIN启发式算法,根据节点的平均链路保持时间对簇首进行选择。进而,在簇保持阶段,提出一种基于节点运动状态的网络自适应调整算法,一方面调整节点信息数据发送周期以平衡数据开销和精确度,另一方面通过预测节点间链路通断情况调整分簇结构,以减少链路失效时的链路重建时间,提高网络运行质量。仿真实验表明,所提算法可以有效延长簇首持续时间,提高簇结构在动态环境下的稳定性。 展开更多
关键词 adhoc网络 分簇 移动性预测 多普勒频移 MAX—MIN算法
在线阅读 下载PDF
Modeling Delay and Packet Drop in Networked Control Systems Using Network Simulator NS2 被引量:9
6
作者 Mohammad Shahidul Hasan Christopher Harding Alison Griffiths 《International Journal of Automation and computing》 EI 2005年第2期187-194,共8页
Wireless Networked Control Systems (WNCS) are used to implement a control mechanism over a wireless network that is capable of carrying real-time traffic. This field has drawn enormous attention from current researche... Wireless Networked Control Systems (WNCS) are used to implement a control mechanism over a wireless network that is capable of carrying real-time traffic. This field has drawn enormous attention from current researchers because of its flexibility and robustness. However, designing efficient WNCS over Mobile Ad Hoc Networks (MANET) is still a challenging topic because of its less-predictable aspects, such as inconsistent delay, packet drop probability, and dynamic topology. This paper presents design guidelines for WNCS over MANET using the Network Simulator version 2, NS2 software. It investigates the impact of packet delay and packet drop under the AODV and DSR routing protocols. The simulation results have been compared to MATLAB results for validation. Keywords Adhoc On-Demand Distance Vector (AODV) routing - Dynamic Source routing (DSR) - Mobile Adhoc Networks (MANET) - Wireless Networked Control Systems (WNCS) Mohammad Shahidul Hasan received his BSc and first MSc in Computer Science from the University of Dhaka, Bangladesh. He obtained his 2nd MSc in Computer & Network Engineering from Sheffield Hallam University, Sheffield, UK. Currently he is pursuing his PhD under the Faculty of Computing, Engineering and Technology, Staffordshire University, Stafford, UK in Networked Control Systems over MANET.Chris Harding received his BSc in Computing Science and Masters by Research from Staffordshire University, UK. Currently he is pursuing his PhD in Wireless Networked Control Systems, specifically looking at NCS over MANETs, with research interests in this area concentrating on the network routing and effect of routing protocols on the NCS system.Hongnian Yu is Professor of Computer Science at Staffordshire University. He was a lecturer in Control and Systems Engineering at Yanshan University, China in 1985–1990, did his PhD in Robotics at King’s College London (1990–1994), was a research fellow in Manufacturing Systems at Sussex University (1994–1996), a lecturer in Artificial Intelligence at Liver-pool John Moore’s University (1996–1999), a lecturer in Control and Systems Engineering at the University of Exeter (1999–2002), and a Senior Lecturer in Computing at the University of Bradford (2002–2004). He now leads the Mobile Computing and Distributed Systems Research Group at Staffordshire University. He was a founding member of the Modeling Optimisation Scheduling and Intelligent Control research group at the University of Bradford. He has extensive research experience in neural networks, mobile computing, modeling, control of robot manipulators, and modeling, scheduling, planning, and simulations of large discrete event dynamic systems with applications to manufacturing systems, supply chains, transportation networks, and computer networks. He has published over 100 research papers focusing on the following: neural networks, computer networks, adaptive and robust control of robot manipulators, analysis and control of hybrid machines, control of timed delay systems, predictive control, manufacturing system modeling and scheduling, planning, and supply chains. He has held several research grants from EPSRC, the Royal Society, and the EU, as well as from industry. He was awarded the F.C. William Premium for his paper on adaptive and robust control of robot manipulators by the IEE Council in 1997. Professor Yu is an EPSRC college member, a member of IEEE, and a committee member of several conferences and journal editorial boards.Alison Griffiths has been a Senior Lecturer in Telecommunications at Staffordshire University since 2003. She was a lecturer in Computing at Staffordshire University in 2002–2003. She was a Research Associate on an EPSRC funded project whilst doing her PhD on the convergence of Mobile Computing and Telecommunications at Staffordshire University (1999–2003). The investigation consisted of the communication of different types of media (voice, video conferencing, web browsing, and downloading) over a common network, using a mobile device. Problems considered were the complications that occurred when a user moves, and consequently changes their end-point in the network during communication, with respect to the type of service the user is provided with (delays and losses). She obtained both her MEng and 1st Class BEng (Hons) from Staffordshire University in 1999 and 1998 respectively. She is now part of the Mobile Computing and Distributed Systems Research Group at Staffordshire University. She has published 8 research papers focusing on quality of service and access between cellular and IP packet switched networks. Future directions include mobile agents and control of mobile wireless ad-hoc networks. Her current research interests have extended to Wireless Networked Control Systems, specifically looking at NCS over MANETs, with research interests in this area concentrating on the network routing and effect of routing protocols on the NCS system. 展开更多
关键词 adhoc On-Demand Distance Vector (AODV) routing Dynamic Source routing (DSR) Mobile adhoc networks (MANET) Wireless networked Control Systems (WNCS)
在线阅读 下载PDF
Wi-Fi AdHoc与4G通信在无线地震数据采集站中的应用 被引量:9
7
作者 张正峰 陈炳贵 刘宁 《地球物理学进展》 CSCD 北大核心 2015年第5期2337-2341,共5页
针对野外地震勘探施工环境复杂,对无线地震仪数据传输与监控的可靠性要求比较高,在介绍Wi-Fi AdHoc无线通信模式的技术特点和组网原理以及4G通信网络结构与特点的基础上,结合Wi-Fi AdHoc技术的组网方便灵活、低成本、数据传输率高和4G... 针对野外地震勘探施工环境复杂,对无线地震仪数据传输与监控的可靠性要求比较高,在介绍Wi-Fi AdHoc无线通信模式的技术特点和组网原理以及4G通信网络结构与特点的基础上,结合Wi-Fi AdHoc技术的组网方便灵活、低成本、数据传输率高和4G网络设施强大、通信稳定可靠等诸多优点,设计出Wi-Fi模块与4G通信模块相结合的低功耗无线监测传输方案,通过4G网络定位监测技术,提高了无线地震仪野外施工效率,使无线地震仪野外施工更具可行性和实用性. 展开更多
关键词 无线网络 WI-FI adhoc 4G通信 无线地震仪 监测
原文传递
基于i.MX21的AdHoc网络终端的设计与实现 被引量:1
8
作者 侯战胜 姚放吾 《计算机技术与发展》 2010年第1期5-8,共4页
随着嵌入式技术和无线AdHoc网络技术的发展,无线AdHoc网络应用成为研究的热点。文中设计了基于应用处理器MC9823MX21的无线AdHoc网络终端系统,论述了各个模块的设计思想,给出了设计结构原理框图。采用基于Memory接口的方式,首次将WT4无... 随着嵌入式技术和无线AdHoc网络技术的发展,无线AdHoc网络应用成为研究的热点。文中设计了基于应用处理器MC9823MX21的无线AdHoc网络终端系统,论述了各个模块的设计思想,给出了设计结构原理框图。采用基于Memory接口的方式,首次将WT4无线网卡成功移植到i.MX21平台上。在嵌入式Linux系统上实现对无线通信模块的支持,成功构建了具有移动自组网和多跳传输的功能的无线移动AdHoc网络,并且实现了各个无线网络终端之间的数据传输通信。 展开更多
关键词 adhoc网络 嵌入式系统 中断服务程序
在线阅读 下载PDF
基于LoRa自组网的山区高边坡集成监测预警技术及应用
9
作者 刘正兴 王华 金鑫 《公路交通科技》 北大核心 2025年第2期97-102,130,共7页
【目标】通过对公路边坡实时监测,进行智能化解算分析,实现预警预报,旨在提高山区边坡变形监测的准确性和自动化程度,解决山区边坡监测受暴雨等影响通讯不畅及人工监测存在的不足。【方法】依托广西地区某高边坡工程,开发了适用于偏远... 【目标】通过对公路边坡实时监测,进行智能化解算分析,实现预警预报,旨在提高山区边坡变形监测的准确性和自动化程度,解决山区边坡监测受暴雨等影响通讯不畅及人工监测存在的不足。【方法】依托广西地区某高边坡工程,开发了适用于偏远山区的智能监测预警系统。该系统采用LoRa自组网串联各类别监测原件,集成开发实现了边坡地表位移、深部变形、地下水位、锚固结构内力等关键项目监测设备的局地物联网。设立工程现场数据解算单元,实现监测数据的初步处理和自动处置。【结果】经改进的智能监测系统能持续精确地反映边坡体实时工作状态。在工程建设过程中监测系统数据的变化规律,可以反映各加固设施的工作状态,预警结果与实际情况相符,能够及时发现边坡存在的危险隐患。【结论】基于LoRa自组网的北斗监测系统完全适用于偏远山区高边坡安全监测和预警,结果可靠,值得推广应用。 展开更多
关键词 道路工程 公路边坡 北斗监测技术 顺层滑坡 LoRa自组网 监测预警
原文传递
一种基于权值的AdHoc网络分簇算法 被引量:2
10
作者 郭胜召 《信息技术与信息化》 2012年第2期41-43,共3页
AdHoc网络是动态变化的拓扑结构,具有无中心和自组织的特点,为了解决大规模AdHoc网络的组播路由,分簇算法是最高效的解决办法。该文提出了一种基于权值的新型分簇算法,提高了簇的稳定性和可靠性,使之更适合于管理大规模、多环境的AdHoc... AdHoc网络是动态变化的拓扑结构,具有无中心和自组织的特点,为了解决大规模AdHoc网络的组播路由,分簇算法是最高效的解决办法。该文提出了一种基于权值的新型分簇算法,提高了簇的稳定性和可靠性,使之更适合于管理大规模、多环境的AdHoc无线网络。 展开更多
关键词 adhoc网络 权值 分簇算法
在线阅读 下载PDF
基于AdHoc的校园寝室无线网络搭建 被引量:1
11
作者 张瑞 张官海 王艳 《电脑知识与技术》 2011年第1期72-73,共2页
论文给出了一种校园寝室AdHoc无线局域网解决方案。实施该方案不仅能让笔记本电脑免费蹭网,而且让台式机也能免费蹭网,大大节省了网络通信费用。
关键词 adhoc 校园寝室 无线网络
在线阅读 下载PDF
MOCHA:一种面向移动自组织网络的分布式机器学习优化方法
12
作者 赵玮 赵佳 《长春工程学院学报(自然科学版)》 2025年第2期87-93,共7页
针对移动自组织网络中设备性能的异构性和网络拓扑的动态变化,提出了一种面向移动自组织网络的分布式机器学习优化方法(A Distributed Machine Learning Optimization Method for Mobile Adhoc Networks,MOCHA),MOCHA创新性地引入了基... 针对移动自组织网络中设备性能的异构性和网络拓扑的动态变化,提出了一种面向移动自组织网络的分布式机器学习优化方法(A Distributed Machine Learning Optimization Method for Mobile Adhoc Networks,MOCHA),MOCHA创新性地引入了基于设备计算能力、电量等性能指标的通信概率机制,并通过目标值子矩阵法完成最优适配,最后以模型参数的传递完成设备间信息的交互。理论分析与试验结果表明,相比传统的分布式学习方法,MOCHA在移动环境下展现出了显著的性能提升优势,为移动分布式机器学习实践提供了新的思路。 展开更多
关键词 移动自组织网络 分散式训练 目标值子矩阵法
在线阅读 下载PDF
AdHoc网络中语音传输的分析及性能测试 被引量:1
13
作者 杜智敏 谢维波 杨大力 《微型机与应用》 2012年第10期49-51,共3页
基于AdHoc网络的语音通信研发需要对AdHoc网络路由机制、语音通信特性等有深入理解。阐述了AdHoc网络中语音通信模型,网络机制、性能评估分析。最后对AdHoc网络及其上的语音通信性能进行评估分析。
关键词 语音通信 adhoc 网络机制
在线阅读 下载PDF
二代移动ADHOC网络中的路由分析
14
作者 王雪飞 《黄山学院学报》 2005年第6期63-67,共5页
第一代ADHOC路由技术的算法,完成了有线或移动路由技术向ADHOC路由技术的过渡,第二代ADHOC路由技术的发展,进一步指出了“自组织”网络的动态特征,在总结第二代ADHOC路由的节点识别与网络重构等特征应用上,提出第二代路由的动态拓扑下... 第一代ADHOC路由技术的算法,完成了有线或移动路由技术向ADHOC路由技术的过渡,第二代ADHOC路由技术的发展,进一步指出了“自组织”网络的动态特征,在总结第二代ADHOC路由的节点识别与网络重构等特征应用上,提出第二代路由的动态拓扑下典型算法特征。 展开更多
关键词 adhoc路由 QOS 传感网路由 按需路由 表驱动路由
在线阅读 下载PDF
一种基于Zigbee与Adhoc网络模式的无线振动检测系统 被引量:1
15
作者 汪泽浩 于基睿 李培玉 《物理测试》 CAS 2015年第4期27-31,共5页
目前无线振动传感器应用非常广泛,为了达到大量监测数据传输以及降低节点功耗的目的,通过分析现在流行的几种网络模式,比较它们的优缺点,提出了基于Zigbee网络与Adhoc网络模式相结合的无线振动传感器节点的设计方案。重点介绍了该方案... 目前无线振动传感器应用非常广泛,为了达到大量监测数据传输以及降低节点功耗的目的,通过分析现在流行的几种网络模式,比较它们的优缺点,提出了基于Zigbee网络与Adhoc网络模式相结合的无线振动传感器节点的设计方案。重点介绍了该方案中传感器振动节点的硬件设计及与其相关的嵌入式开发,然后对上位机软件的编译加以详细描述。与此同时,对整个检测系统的功能进行了概述,并描述了无线振动传感器系统的应用实例。无线振动传感器系统为某些特殊环境下的振动测量提供了可能性,并且拥有广泛的应用前景。 展开更多
关键词 无线网络 ZIGBEE adhoc 振动器节点 振动监测
原文传递
一种低压台区本地HPLC+RF双模自组织通信网络身份认证方法 被引量:6
16
作者 薛激光 王珺 +2 位作者 张笑怡 范宇辰 瞿俊吉 《电测与仪表》 北大核心 2024年第1期219-224,共6页
低压台区“源网荷储”友好互动带来用户侧智能控制设备、传感器接入需求,迫切需要面向本地HPLC+RF自组织网络技术体制,设计针对外部设备接入的安全高效身份认证方法。文中提出一种适应自组织网络的、去中心化的安全认证方案,通过台区边... 低压台区“源网荷储”友好互动带来用户侧智能控制设备、传感器接入需求,迫切需要面向本地HPLC+RF自组织网络技术体制,设计针对外部设备接入的安全高效身份认证方法。文中提出一种适应自组织网络的、去中心化的安全认证方案,通过台区边设备、可信代理、端设备建立本地认证链,相比现采集终端到主站的集中式认证方式,该方案可以有效降低因本地自组网网络层级加深而不断增长的安全交互开销,同时有效抵御本地自组织网络多级中继节点被挟持、流量嗅探等网络攻击。通过模拟低压台区本地自组织网络不同中继深度、不同规模外部设备接入多种场景,仿真计算获得外部设备接入台区本地通信网络安全认证交互所消耗通信资源定量分析结果,通过对比集中式认证方式,文中所提认证方案的平均资源消耗量可降低25%,且随着网络拓扑与终端规模的增长,通信资源节省效果更加明显。 展开更多
关键词 双模通信 分布式认证 自组织网络 身份认证 数字证书
在线阅读 下载PDF
基于探测信息的车辆自组织网络功率控制算法 被引量:3
17
作者 吴怡 沈连丰 +2 位作者 邵震洪 苏倩 林潇 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第4期659-664,共6页
提出一种应用于车辆自组织网络的功率控制算法.首先给出系统吞吐量优化的理论分析和仿真分析,指出当网络中车辆节点数为15时,系统吞吐量达到最大.然后设计了基于车辆探测消息的功率控制算法,算法中每个车辆节点周期性地发送探测信息,并... 提出一种应用于车辆自组织网络的功率控制算法.首先给出系统吞吐量优化的理论分析和仿真分析,指出当网络中车辆节点数为15时,系统吞吐量达到最大.然后设计了基于车辆探测消息的功率控制算法,算法中每个车辆节点周期性地发送探测信息,并根据接收到的其他车辆信息,分析出网络中车辆节点数目以及网络的前后连通状态,继而通过自动调整发射功率来改变网络拥塞状况,给出了算法的详细流程.仿真结果表明,采用功率控制算法的VANET系统,其传输时延随车辆节点数的变化几乎始终保持在约24 ms的较低水平,同时系统吞吐量稳定在最大值. 展开更多
关键词 车辆自组织网络 功率控制 系统吞吐量 传输时延
在线阅读 下载PDF
Ad hoc网络中多种移动模型的TCP性能分析 被引量:3
18
作者 张晓琴 黄玉清 梁靓 《计算机工程》 CAS CSCD 北大核心 2009年第23期95-97,101,共4页
传统的TCP是为有线网设计的,研究TCP在Adhoc网络中的性能,是改进TCP以适应Adhoc网络的前提。在移动Adhoc网络中,通过大量仿真实验比较了多个TCP版本在AODV和OLSR下对于不同移动模型的性能表现,包括有效吞吐率、端到端延迟、丢包率等,为... 传统的TCP是为有线网设计的,研究TCP在Adhoc网络中的性能,是改进TCP以适应Adhoc网络的前提。在移动Adhoc网络中,通过大量仿真实验比较了多个TCP版本在AODV和OLSR下对于不同移动模型的性能表现,包括有效吞吐率、端到端延迟、丢包率等,为改进TCP提供了依据。 展开更多
关键词 adhoc网络 移动模型 性能
在线阅读 下载PDF
MANET自组织按需认证模型的研究 被引量:2
19
作者 沈明玉 杨伟杰 陈娟 《计算机工程与应用》 CSCD 北大核心 2010年第19期91-93,131,共4页
构建安全可信的MANET必须考虑到其自身的特性。目前关于MANET的安全认证研究大多是利用中心认证服务器为用户颁发证书,较少考虑到MANET自身的自组织特点,很难完成网络的快速部署。结合MANET的特性,提出一种自组织按需式认证方案。该方... 构建安全可信的MANET必须考虑到其自身的特性。目前关于MANET的安全认证研究大多是利用中心认证服务器为用户颁发证书,较少考虑到MANET自身的自组织特点,很难完成网络的快速部署。结合MANET的特性,提出一种自组织按需式认证方案。该方案不需要中心认证服务器,充分利用节点自身功能,在完成身份认证的同时具有良好的伸缩性。 展开更多
关键词 无线移动adhoc网络 安全认证 自组织 按需式
在线阅读 下载PDF
A Progressive Deployment Strategy for Cooperative Adaptive Cruise Control to Improve Trafc Dynamics 被引量:8
20
作者 Georges M.Arnaout Shannon Bowling 《International Journal of Automation and computing》 EI CSCD 2014年第1期10-18,共9页
Cooperative adaptive cruise control(CACC)vehicles are intelligent vehicles that use vehicular ad hoc networks(VANETs)to share trafc information in real time.Previous studies have shown that CACC could have an impact o... Cooperative adaptive cruise control(CACC)vehicles are intelligent vehicles that use vehicular ad hoc networks(VANETs)to share trafc information in real time.Previous studies have shown that CACC could have an impact on increasing highway capacities at high market penetration.Since reaching a high CACC market penetration level is not occurring in the near future,this study presents a progressive deployment approach that demonstrates to have a great potential of reducing trafc congestions at low CACC penetration levels.Using a previously developed microscopic trafc simulation model of a freeway with an on-ramp—created to induce perturbations and trigger stop-and-go trafc,the CACC system s efect on the trafc performance is studied.The results show signifcance and indicate the potential of CACC systems to improve trafc characteristics which can be used to reduce trafc congestion.The study shows that the impact of CACC is positive and not only limited to a high market penetration.By giving CACC vehicles priority access to high-occupancy vehicle(HOV)lanes,the highway capacity could be signifcantly improved with a CACC penetration as low as 20%. 展开更多
关键词 Intelligent transportation systems TELEMATICS vehicular adhoc networks cooperative adaptive cruise control trafc simulation agent-based trafc simulation
原文传递
上一页 1 2 3 下一页 到第
使用帮助 返回顶部