期刊文献+
共找到1,702篇文章
< 1 2 86 >
每页显示 20 50 100
Multi-access performance of DS UWB systemunder indoor dense multi-path channel
1
作者 樊祥宁 倪剑强 毕光国 《Journal of Southeast University(English Edition)》 EI CAS 2005年第4期393-397,共5页
The performance of multi-user code to direct spreading bi-phase shift keying (DS-BPSK) direct impulse ultra wideband (UWB) systems under indoor multi-user and multi-path environment is analyzed and simulated. The ... The performance of multi-user code to direct spreading bi-phase shift keying (DS-BPSK) direct impulse ultra wideband (UWB) systems under indoor multi-user and multi-path environment is analyzed and simulated. The system output signals with Rake receiver are derived, then a simple and practical code selection scheme is given; i. e., with a large occupation to empty ratio of the repeating pulses, directly choosing those random or pseudo-random user codes with enough length and good co-relative orthogonal features will make the performance of DS-BPSK approximate the optimum and, so there is no need to carefully design the code or its type. The system multi-access performances are simulated using Gold sequence and PN codes as multi-user codes under CMI-CM4 multi-path channels. Simulation results prove that the proposed scheme is feasible. 展开更多
关键词 ultra wideband multi-access MULTI-PATH Gold code direct sequence RAKE
在线阅读 下载PDF
Deep Reinforcement Learning-Based Computation Offloading for 5G Vehicle-Aware Multi-Access Edge Computing Network 被引量:20
2
作者 Ziying Wu Danfeng Yan 《China Communications》 SCIE CSCD 2021年第11期26-41,共16页
Multi-access Edge Computing(MEC)is one of the key technologies of the future 5G network.By deploying edge computing centers at the edge of wireless access network,the computation tasks can be offloaded to edge servers... Multi-access Edge Computing(MEC)is one of the key technologies of the future 5G network.By deploying edge computing centers at the edge of wireless access network,the computation tasks can be offloaded to edge servers rather than the remote cloud server to meet the requirements of 5G low-latency and high-reliability application scenarios.Meanwhile,with the development of IOV(Internet of Vehicles)technology,various delay-sensitive and compute-intensive in-vehicle applications continue to appear.Compared with traditional Internet business,these computation tasks have higher processing priority and lower delay requirements.In this paper,we design a 5G-based vehicle-aware Multi-access Edge Computing network(VAMECN)and propose a joint optimization problem of minimizing total system cost.In view of the problem,a deep reinforcement learningbased joint computation offloading and task migration optimization(JCOTM)algorithm is proposed,considering the influences of multiple factors such as concurrent multiple computation tasks,system computing resources distribution,and network communication bandwidth.And,the mixed integer nonlinear programming problem is described as a Markov Decision Process.Experiments show that our proposed algorithm can effectively reduce task processing delay and equipment energy consumption,optimize computing offloading and resource allocation schemes,and improve system resource utilization,compared with other computing offloading policies. 展开更多
关键词 multi-access edge computing computation offloading 5G vehicle-aware deep reinforcement learning deep q-network
在线阅读 下载PDF
DQN-Based Proactive Trajectory Planning of UAVs in Multi-Access Edge Computing 被引量:3
3
作者 Adil Khan Jinling Zhang +3 位作者 Shabeer Ahmad Saifullah Memon Babar Hayat Ahsan Rafiq 《Computers, Materials & Continua》 SCIE EI 2023年第3期4685-4702,共18页
The main aim of future mobile networks is to provide secure,reliable,intelligent,and seamless connectivity.It also enables mobile network operators to ensure their customer’s a better quality of service(QoS).Nowadays... The main aim of future mobile networks is to provide secure,reliable,intelligent,and seamless connectivity.It also enables mobile network operators to ensure their customer’s a better quality of service(QoS).Nowadays,Unmanned Aerial Vehicles(UAVs)are a significant part of the mobile network due to their continuously growing use in various applications.For better coverage,cost-effective,and seamless service connectivity and provisioning,UAVs have emerged as the best choice for telco operators.UAVs can be used as flying base stations,edge servers,and relay nodes in mobile networks.On the other side,Multi-access EdgeComputing(MEC)technology also emerged in the 5G network to provide a better quality of experience(QoE)to users with different QoS requirements.However,UAVs in a mobile network for coverage enhancement and better QoS face several challenges such as trajectory designing,path planning,optimization,QoS assurance,mobilitymanagement,etc.The efficient and proactive path planning and optimization in a highly dynamic environment containing buildings and obstacles are challenging.So,an automated Artificial Intelligence(AI)enabled QoSaware solution is needed for trajectory planning and optimization.Therefore,this work introduces a well-designed AI and MEC-enabled architecture for a UAVs-assisted future network.It has an efficient Deep Reinforcement Learning(DRL)algorithm for real-time and proactive trajectory planning and optimization.It also fulfills QoS-aware service provisioning.A greedypolicy approach is used to maximize the long-term reward for serving more users withQoS.Simulation results reveal the superiority of the proposed DRL mechanism for energy-efficient and QoS-aware trajectory planning over the existing models. 展开更多
关键词 multi-access edge computing UAVS trajectory planning QoS assurance reinforcement learning deep Q network
在线阅读 下载PDF
Intelligent Immunity Based Security Defense System for Multi-Access Edge Computing Network 被引量:3
4
作者 Chengcheng Zhou Yanping Yu +1 位作者 Shengsong Yang Haitao Xu 《China Communications》 SCIE CSCD 2021年第1期100-107,共8页
In this paper,the security problem for the multi-access edge computing(MEC)network is researched,and an intelligent immunity-based security defense system is proposed to identify the unauthorized mobile users and to p... In this paper,the security problem for the multi-access edge computing(MEC)network is researched,and an intelligent immunity-based security defense system is proposed to identify the unauthorized mobile users and to protect the security of whole system.In the proposed security defense system,the security is protected by the intelligent immunity through three functions,identification function,learning function,and regulation function,respectively.Meanwhile,a three process-based intelligent algorithm is proposed for the intelligent immunity system.Numerical simulations are given to prove the effeteness of the proposed approach. 展开更多
关键词 intelligent immunity security defense multi-access edge computing network security
在线阅读 下载PDF
Integration of Communication and Computing in Blockchain-Enabled Multi-Access Edge Computing Systems 被引量:2
5
作者 Zhonghua Zhang Jie Feng +2 位作者 Qingqi Pei Le Wang Lichuan Ma 《China Communications》 SCIE CSCD 2021年第12期297-314,共18页
Blockchain and multi-access edge com-puting(MEC)are two emerging promising tech-nologies that have received extensive attention from academia and industry.As a brand-new information storage,dissemination and managemen... Blockchain and multi-access edge com-puting(MEC)are two emerging promising tech-nologies that have received extensive attention from academia and industry.As a brand-new information storage,dissemination and management mechanism,blockchain technology achieves the reliable transmis-sion of data and value.While as a new computing paradigm,multi-access edge computing enables the high-frequency interaction and real-time transmission of data.The integration of communication and com-puting in blockchain-enabled multi-access edge com-puting networks has been studied without a systemat-ical view.In the survey,we focus on the integration of communication and computing,explores the mu-tual empowerment and mutual promotion effects be-tween the blockchain and MEC,and introduces the resource integration architecture of blockchain and multi-access edge computing.Then,the paper sum-marizes the applications of the resource integration ar-chitecture,resource management,data sharing,incen-tive mechanism,and consensus mechanism,and ana-lyzes corresponding applications in real-world scenar-ios.Finally,future challenges and potentially promis-ing research directions are discussed and present in de-tail. 展开更多
关键词 blockchain multi-access edge computing mutual empowerment network architecture
在线阅读 下载PDF
A Review in the Core Technologies of 5G: Device-to-Device Communication, Multi-Access Edge Computing and Network Function Virtualization 被引量:2
6
作者 Ruixuan Tu Ruxun Xiang +1 位作者 Yang Xu Yihan Mei 《International Journal of Communications, Network and System Sciences》 2019年第9期125-150,共26页
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ... 5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances. 展开更多
关键词 5th Generation Network VIRTUALIZATION Device-To-Device COMMUNICATION Base STATION Direct COMMUNICATION INTERFERENCE multi-access EDGE COMPUTING Mobile EDGE COMPUTING
在线阅读 下载PDF
Policy Network-Based Dual-Agent Deep Reinforcement Learning for Multi-Resource Task Offloading in Multi-Access Edge Cloud Networks 被引量:1
7
作者 Feng Chuan Zhang Xu +2 位作者 Han Pengchao Ma Tianchun Gong Xiaoxue 《China Communications》 SCIE CSCD 2024年第4期53-73,共21页
The Multi-access Edge Cloud(MEC) networks extend cloud computing services and capabilities to the edge of the networks. By bringing computation and storage capabilities closer to end-users and connected devices, MEC n... The Multi-access Edge Cloud(MEC) networks extend cloud computing services and capabilities to the edge of the networks. By bringing computation and storage capabilities closer to end-users and connected devices, MEC networks can support a wide range of applications. MEC networks can also leverage various types of resources, including computation resources, network resources, radio resources,and location-based resources, to provide multidimensional resources for intelligent applications in 5/6G.However, tasks generated by users often consist of multiple subtasks that require different types of resources. It is a challenging problem to offload multiresource task requests to the edge cloud aiming at maximizing benefits due to the heterogeneity of resources provided by devices. To address this issue,we mathematically model the task requests with multiple subtasks. Then, the problem of task offloading of multi-resource task requests is proved to be NP-hard. Furthermore, we propose a novel Dual-Agent Deep Reinforcement Learning algorithm with Node First and Link features(NF_L_DA_DRL) based on the policy network, to optimize the benefits generated by offloading multi-resource task requests in MEC networks. Finally, simulation results show that the proposed algorithm can effectively improve the benefit of task offloading with higher resource utilization compared with baseline algorithms. 展开更多
关键词 benefit maximization deep reinforcement learning multi-access edge cloud task offloading
在线阅读 下载PDF
New strategies for collision resolution of multi-access channel
8
作者 凌永发 孟德宇 张继洁 《Journal of Pharmaceutical Analysis》 SCIE CAS 2007年第1期56-59,共4页
The truncated binary exponential back-off algorithm is one of the most effective methods applied in collision resolution process of random multi-access channel.In this study,two new strategies are presented to improve... The truncated binary exponential back-off algorithm is one of the most effective methods applied in collision resolution process of random multi-access channel.In this study,two new strategies are presented to improve the capability of the truncated binary exponential back-off algorithm.In the new strategies,the sizes of the initial window size or the operating window sizes are adjusted dynamically,which always bring a significant improvement for the self-adaptability of the original algorithm.A series of experiments are simulated and the results verify that the new strategies can make the implementation more stable and effective than the original algorithm. 展开更多
关键词 back-off algorithm collision resolution multi-access channel
在线阅读 下载PDF
A Random Multi-Access Method for Data Services in CDMA Cellular System
9
作者 李振 尤肖虎 《Journal of Southeast University(English Edition)》 EI CAS 1997年第2期8-12,共5页
ARandomMultiAccessMethodforDataServicesinCDMACelularSystemLiZhen(李振)YouXiaohu(尤肖虎)(NationalMobileCommunicat... ARandomMultiAccessMethodforDataServicesinCDMACelularSystemLiZhen(李振)YouXiaohu(尤肖虎)(NationalMobileCommunicationsResearchLabor... 展开更多
关键词 multiple ACCESS CODE DIVISION multi ACCESS mobile communication
在线阅读 下载PDF
Analysis of Multi-Channel and Slotted Random Multi-Access Protocol with Two-Dimensional Probability for Ad Hoc Network 被引量:4
10
作者 周宁玉 赵东风 丁洪伟 《Tsinghua Science and Technology》 SCIE EI CAS 2008年第6期747-753,共7页
A higher quality of service (QoS) is provided for ad hoc networks through a multi-channel and slotted random multi-access (MSRM) protocol with two-dimensional probability. For this protocol, the system time is slo... A higher quality of service (QoS) is provided for ad hoc networks through a multi-channel and slotted random multi-access (MSRM) protocol with two-dimensional probability. For this protocol, the system time is slotted into a time slot with high channel utilization realized by the choice of two parameters p1 and p2, and the channel load equilibrium. The protocol analyzes the throughput of the MSRM protocol for a load equilibrium state and the throughput based on priority. Simulations agree with the theoretical analysis. The simulations also show that the slotted-time system is better than the continuous-time system. 展开更多
关键词 MULTI-CHANNEL slotted random multi-access two-dimensional probability carrier sense multiple access quality of service ad hoc networks
原文传递
面向国产多核DSP的张量转置并行优化技术
11
作者 刘根程 王庆林 +6 位作者 洪楚河 彭兴 夏睿 梁亚玲 张庆阳 车永刚 刘杰 《计算机研究与发展》 北大核心 2026年第2期419-433,共15页
张量转置(tensor transposition)作为基础张量运算原语,广泛应用于信号处理、科学计算以及深度学习等各种领域,在张量数据密集型应用及高性能计算中具有重要作用。随着能效指标在高性能计算系统中的重要性日益凸显,基于数字信号处理器(d... 张量转置(tensor transposition)作为基础张量运算原语,广泛应用于信号处理、科学计算以及深度学习等各种领域,在张量数据密集型应用及高性能计算中具有重要作用。随着能效指标在高性能计算系统中的重要性日益凸显,基于数字信号处理器(digital signal processors,DSPs)的加速器已被集成至通用计算系统。然而,传统面向多核CPU和GPU的张量转置库因架构差异无法充分适配DSP架构。一方面,DSP架构的向量化计算潜力尚未得到充分挖掘;另一方面,其复杂的片上存储体系与多层次共享内存结构为张量并行程序设计带来了显著挑战。针对国产多核DSP的架构特点,提出ftmTT算法,并设计实现了一个面向多核DSP架构的通用张量转置库。ftmTT算法通过设计适配DSP架构的高效内存访问模式充分挖掘其并行化和向量化潜力,其核心创新包括:1)采用分块策略将高维张量转置转化为多核DSP平台所提供的矩阵转置内核操作;2)提出基于DMA点对点传输的张量数据块访存合并方案来降低数据搬运开销;3)通过双缓冲设计异步重叠转置计算与DMA传输实现计算通信隐藏,最终面向多核DSP实现高性能并行张量转置。在国产多核DSP平台FT-M7032的实验表明,ftmTT张量转置算法取得了最高达理论带宽75.96%的性能,达到FT-M7032平台STREAM带宽99.23%的性能。 展开更多
关键词 张量转置 DMA传输 多核DSP 向量化 访存合并
在线阅读 下载PDF
面向高电能质量需求的工业园区5G+MEC融合通信系统设计
12
作者 蒋国臻 虞子萱 +1 位作者 许章茁 田佳 《通信电源技术》 2026年第1期43-45,共3页
针对工业园区高电能质量保障场景下通信时延与边缘处理能力不足的问题,设计一种5G与多接入边缘计算(Multi-access Edge Computing,MEC)融合的通信系统。通过网络切片与边缘侧实时分析协同,实现电能质量数据的快速传输、就近计算与事件... 针对工业园区高电能质量保障场景下通信时延与边缘处理能力不足的问题,设计一种5G与多接入边缘计算(Multi-access Edge Computing,MEC)融合的通信系统。通过网络切片与边缘侧实时分析协同,实现电能质量数据的快速传输、就近计算与事件响应。工程应用测试验证了该系统在复杂工业环境中的工程适用性与运行可靠性。 展开更多
关键词 工业园区 融合通信系统 5G 多接入边缘计算(MEC) 电能质量
在线阅读 下载PDF
基于5G技术的光伏耦合储能电站配置方案研究
13
作者 刘烜铤 《通信电源技术》 2026年第1期85-87,共3页
针对光伏耦合储能电站在平抑电网瞬时波动时面临的通信时延瓶颈和传统配置方案响应滞后问题,研究一种基于5G的电站配置方案。该方案构建了融合多接入边缘计算(Multi-access Edge Computing,MEC)的通信拓扑,利用超可靠低时延通信(Ultra-R... 针对光伏耦合储能电站在平抑电网瞬时波动时面临的通信时延瓶颈和传统配置方案响应滞后问题,研究一种基于5G的电站配置方案。该方案构建了融合多接入边缘计算(Multi-access Edge Computing,MEC)的通信拓扑,利用超可靠低时延通信(Ultra-Reliable Low Latency Communication,URLLC)特性优化功率指令传输链路。通过建立包含通信服务质量约束的容量配置双层规划模型,引入自适应粒子群算法求解最优解。测试结果表明,该方案将平均端到端时延控制在10 ms以内,光伏弃光率低至0.8%,在提升电站源储协同与电网接纳能力方面具有工程适用性。 展开更多
关键词 光伏耦合储能电站 5G 多接入边缘计算(MEC)
在线阅读 下载PDF
异构电力通信网的多接入边缘计算资源分配方法
14
作者 苏文志 《无线互联科技》 2026年第2期41-44,共4页
针对多接入、多业务并发条件下的计算和通信协同优化问题,文章以异构电力通信系统为对象,建立了异构电力通信系统的数学模型,在此基础上提出了面向关键业务的多接入边缘计算资源分配方案。为了改善电力通信系统在复杂负载环境下的鲁棒... 针对多接入、多业务并发条件下的计算和通信协同优化问题,文章以异构电力通信系统为对象,建立了异构电力通信系统的数学模型,在此基础上提出了面向关键业务的多接入边缘计算资源分配方案。为了改善电力通信系统在复杂负载环境下的鲁棒性和自适应性,文章通过结合时延预测与反馈控制调节方法,提出动态资源调度算法。文章从理论上证明了基于动态资源分配调度策略的电力通信系统具有较小的时延和更高的资源利用率,在电力通信网络中有广阔的应用前景。 展开更多
关键词 异构电力通信网络 多接入边缘计算 资源分配优化 低时延保障机制
在线阅读 下载PDF
城市街道健康功能供需评估与优化策略——以北京市典型街道为例
15
作者 张楚晗 《规划师》 北大核心 2026年第1期58-65,共8页
当前,城市街道建成环境供给与居民健康行为需求间存在显著的结构性失衡。从供需视角出发,通过构建整合步行安全性、出行舒适性、交往可达性3大健康功能维度的街道健康功能供需评价框架与指标体系,融合多源地理空间大数据、深度学习技术... 当前,城市街道建成环境供给与居民健康行为需求间存在显著的结构性失衡。从供需视角出发,通过构建整合步行安全性、出行舒适性、交往可达性3大健康功能维度的街道健康功能供需评价框架与指标体系,融合多源地理空间大数据、深度学习技术方法与实地调研验证,对北京市生活服务类(FCM)、交通主导类(ANL)和特色类(MSK)3类典型街道开展精细化供需评估,深入剖析其供需错配格局与内在形成机制。在此基础上,针对不同街道类型和道路等级,从近期精准干预和远期智慧赋能两个层面构建递进式街道健康功能优化策略体系,以为健康导向的城市更新提供可操作的实践框架。 展开更多
关键词 街道健康功能 供需关系 步行安全性 出行舒适性 交往可达性 多源大数据
在线阅读 下载PDF
储能协同下光伏多源接入功率波动GSA控制算法
16
作者 张俨 苏华英 +2 位作者 王融融 姜有泉 李润 《电子设计工程》 2026年第1期97-100,105,共5页
光伏电源的输出功率受到光照、温度等自然因素的影响,呈现出间歇性和随机性的特点,导致功率波动较大。较大的功率波动会对电网的频率和电压稳定性产生严重影响,甚至可能引发电网崩溃等严重事故。为减少光伏接入带来的功率波动,提出储能... 光伏电源的输出功率受到光照、温度等自然因素的影响,呈现出间歇性和随机性的特点,导致功率波动较大。较大的功率波动会对电网的频率和电压稳定性产生严重影响,甚至可能引发电网崩溃等严重事故。为减少光伏接入带来的功率波动,提出储能协同下光伏多源接入功率波动的引力搜索算法(Gravitational Search Algorithm,GSA)。定义光伏与储能协同标准,并按照多源节点设置原则,构建储能协同下的光伏多源接入电网。根据多源接入电网中的功率波动特性,确定GSA参数的取值范围,完成光伏多源接入功率波动GSA控制算法的设计。实验结果表明,所提方法可将功率极值差控制在200 kW以内,且不会对光伏电网的发电能力造成影响,可以提高电网的供电质量。 展开更多
关键词 储能协同 光伏多源接入 功率波动 GSA参数 电能质量
在线阅读 下载PDF
基于多源大数据的中国一线城市院前急救服务可达性与公平性研究
17
作者 朱浩嶙 徐墨 +1 位作者 朱蕗颖 崔彤 《西部人居环境学刊》 北大核心 2026年第1期63-71,共9页
院前急救系统是城市公共医疗系统的重要组成部分,急救效率直接决定了患者的生存结果。为精确评估城市急救服务效率与公平,以“北上广深”四个一线城市为例,构建人居空间矩阵结合开放地图应用编程接口的急救时空可达性研究模型,并通过泰... 院前急救系统是城市公共医疗系统的重要组成部分,急救效率直接决定了患者的生存结果。为精确评估城市急救服务效率与公平,以“北上广深”四个一线城市为例,构建人居空间矩阵结合开放地图应用编程接口的急救时空可达性研究模型,并通过泰尔指数及线性回归模型分析城市急救服务的“空间公平性”以及“群体公平性”。结果显示,在交通通畅期,四个城市人均急救反应时间均不超过12.5 min(12.24~12.49 min);但交通高峰期急救可达性显著降低。同时,四个城市均存在显著的城区差异,且低收入群体急救面临更严重的急救延迟。研究证明,中国一线城市院前急救系统在公平建设中仍存在很大不足,研究结果对城市院前急救系统的全面评价与持续性建设具有现实意义。 展开更多
关键词 院前急救服务 多源大数据 可达性 公平性 线性回归
在线阅读 下载PDF
Wi-Fi 8—下一代无线局域网技术
18
作者 戴星亚 万国伟 康凯 《电信科学》 北大核心 2026年第1期65-85,共21页
为了进一步降低无线保真(wireless fidelity,Wi-Fi)系统时延、提高系统可靠性,新一代Wi-Fi技术——Wi-Fi 8(IEEE 802.11bn)的协议正在制定中,预计于2028年正式发布并商用。Wi-Fi 8提出了多项新技术来满足用户对高可靠、大容量、低时延... 为了进一步降低无线保真(wireless fidelity,Wi-Fi)系统时延、提高系统可靠性,新一代Wi-Fi技术——Wi-Fi 8(IEEE 802.11bn)的协议正在制定中,预计于2028年正式发布并商用。Wi-Fi 8提出了多项新技术来满足用户对高可靠、大容量、低时延、高速率的需求。从Wi-Fi 8的协议草案入手,深入介绍与分析了多接入点(access point,AP)协调技术、非主信道接入技术、动态子信道操作技术及降低传输时延等多项新技术,并对新技术的演进方向进行了初步的分析与评估。最后,对Wi-Fi 8的未来应用进行了展望。 展开更多
关键词 Wi-Fi 8 高可靠性 低时延 多接入点协调 非主信道接入 动态子信道操作
在线阅读 下载PDF
万兆同轴宽带接入网HIMAC 3.0的拆帧重排序方法
19
作者 黄一明 潘伟涛 邱智亮 《电子科技》 2026年第1期25-31,共7页
高性能同轴电缆网络(High Performance Network Over Coax,HINOC)技术是一种光纤同轴混合接入技术,已发展至第3代。为了实现万兆以太网的接入速率,第3代HINOC引入了多信道绑定机制。但该机制在有效扩展HINOC网络信道带宽的同时易导致HIM... 高性能同轴电缆网络(High Performance Network Over Coax,HINOC)技术是一种光纤同轴混合接入技术,已发展至第3代。为了实现万兆以太网的接入速率,第3代HINOC引入了多信道绑定机制。但该机制在有效扩展HINOC网络信道带宽的同时易导致HIMAC(HINOC Medium Access Control)拆帧端接收的数据流失序。针对该问题,文中提出了一种拆帧重排序方法。通过重排序队列缓存管理、入队逻辑地址计算、超时判断及清空以及出队判断等关键技术的设计和实现来解决多信道绑定机制引起的拆帧乱序问题,并对其关键功能点进行仿真验证和板级验证。实验结果表明,所提方法能够有效处理多信道绑定导致的乱序问题,并且能够确保系统在遇到错误情况时稳定运行,具有较强的鲁棒性,满足万兆同轴宽带接入HIMAC 3.0的功能和性能要求。 展开更多
关键词 万兆同轴宽带接入 HIMAC 3.0 多信道绑定 数据帧乱序 拆帧 重排序 超时清空 队列缓存
在线阅读 下载PDF
巨星座跨域多尺度安全传输与接入 被引量:2
20
作者 司江勃 李赞 +3 位作者 王丹洋 刘朋朋 赵浩钦 黄睿 《航天技术与工程学报》 2025年第1期77-85,共9页
针对巨星座通联面临频轨资源稀缺、节点高动态、传输距离跨尺度等挑战,传统无线空口技术较难满足高安全、高可靠、低时延通联的通信需求,研究巨星座跨域多尺度安全传输与接入技术,遵循“感知环境-利用环境-适应环境”的研究思路,提出了... 针对巨星座通联面临频轨资源稀缺、节点高动态、传输距离跨尺度等挑战,传统无线空口技术较难满足高安全、高可靠、低时延通联的通信需求,研究巨星座跨域多尺度安全传输与接入技术,遵循“感知环境-利用环境-适应环境”的研究思路,提出了电磁环境认知驱动传输与接入机制,采用电磁地图知识构建立体电磁态势图,深度挖掘不同维域可用通联资源,在此基础上通过统计预先规划与实时动态操控双驱动,利用自主决策接入方式,实现高动态、多尺度、复杂通联环境下的时/空/频/能等碎片化通信资源高效利用,确保信息高安全传输,进而保障巨星座网络的安全可靠连接,推动天基信息系统支援能力建设。 展开更多
关键词 巨星座通联 电磁安全 多址接入 安全传输
在线阅读 下载PDF
上一页 1 2 86 下一页 到第
使用帮助 返回顶部