期刊文献+
共找到1,739篇文章
< 1 2 87 >
每页显示 20 50 100
A SDN-Based Energy Saving Strategy in Wireless Access Networks 被引量:2
1
作者 PENG Hongyu WANG Weidong +2 位作者 WANG Chaowei CHEN Gang ZHANG Yinghai 《China Communications》 SCIE CSCD 2015年第8期132-145,共14页
This paper investigates on the base stations(BSs) sleeping control and energy saving in wireless network. The objective is to find the sleeping control and energy saving configuration between total power consumption a... This paper investigates on the base stations(BSs) sleeping control and energy saving in wireless network. The objective is to find the sleeping control and energy saving configuration between total power consumption and average video's quality. On the Software Defined Network(SDN) access network architecture, a type of sleeping control and active BSs' optimal transmitting time strategy is considered, the BS sleeps when there is no active users, and wakes up after a period of vacation time. In this paper, we study the active users grouping strategy, In order to spare more BSs into sleeping mode. Then this paper proposes an active BS transmitting time optimal strategy according to the users' Qo S. In the proposed strategy, the active BSs' transmitting time is minimized in order to save energy. This paper employs the mixed integer-programming model to present this optimization problem. Then we utilized a novel algorithm to save the energy in access networks and also meet the Qo S requirements. Both the analytical and simulation results show that the algorithm can effectively save energy in the access network BSs. 展开更多
关键词 SDN wireless access network energy efficiency MOBILITY
在线阅读 下载PDF
Polling Algorithm Based on Traffic Burst Characteristics of Broadband Wireless Access Systems
2
作者 李秀媛 李炜 +1 位作者 吴晓娟 张云峰 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期429-435,共7页
In this paper,we propose a novel polling algorithm to decrease the number of idle slots and collission slots during the polling cycle by evaluating the bandwidth request of the subscribe stations(SSs) in the next poll... In this paper,we propose a novel polling algorithm to decrease the number of idle slots and collission slots during the polling cycle by evaluating the bandwidth request of the subscribe stations(SSs) in the next polling cycle for broadband wireless access(BWA) systems.We firstly analyze the feature of silent time intervals and deduce the Hurst index which symbolizes the degree of self-similarity and long-relative nature.Then we represent the inactive OFF time intervals by the Pareto model and estimate the shape parameterαby the group measured data.Finally we can evaluate the transmission probability of a silent SS before the next polling cycle. By this algorithm,we can find the optimal transmission opportunities for the base station(BS) to achieve the least collision or void timeslots in order to achieve the largest bandwidth efficiency.The theoretical analysis and simulation results show that this polling algorithm can improve the performance for BWA system. 展开更多
关键词 broadband wireless access(BWA) systems polling algorithm bandwidth allocation SELF-SIMILARITY
原文传递
Short-Distance Low-Power Wireless Access System
3
作者 Tan Zhenhui, Qiao Xiaoyu (Beijing Jiaotong University, Beijing 100044 , P . R . China ) 《ZTE Communications》 2009年第4期39-44,共6页
The short-distance low-power technologies for wireless access communications, including Bluetooth, Ultra-Wideband (UWB) and Wireless Fidelity (Wi-Fi), focus on the physical layer and Medium Access Control (MAC) layer.... The short-distance low-power technologies for wireless access communications, including Bluetooth, Ultra-Wideband (UWB) and Wireless Fidelity (Wi-Fi), focus on the physical layer and Medium Access Control (MAC) layer. Bluetooth is a wireless protocol for exchanging data over short distances. It is an alternative to RS232 data cables. UWB is a radio technology that can be used at very low energy levels for short range. It provides flexible high-bandwidth wireless access. Wi-Fi enables the wireless connection of fast-access devices and mobile devices in Wireless Local Access Network (WLAN) and it is suitable for long distances. The standardizations of the above technologies have been developed and published soon after the emergence of these technologies. Among all the standards, Bluetooth and Wi-Fi are the most important ones. 展开更多
关键词 UWB access Short-Distance Low-Power wireless access System IEEE MAC mode
在线阅读 下载PDF
ZTE's Broadband Wireless Access System
4
作者 Zou Tie (Mobile Division of ZTE Corporation,Shanghai 201203,China) 《ZTE Communications》 2004年第1期30-33,共4页
1 IntroductionWith the rapid development of backbonenetworks,the subscriber accessnetwork,a major component of publictelecom network equipment and so-called the“last kilometer”,has turned out to bethe focus of atten... 1 IntroductionWith the rapid development of backbonenetworks,the subscriber accessnetwork,a major component of publictelecom network equipment and so-called the“last kilometer”,has turned out to bethe focus of attention.Among various access technologies,thebroadband wireless access system featuresquick network construction,rapid investmentreturn and large bandwidth.It enables newnetwork operators to provide services quickly 展开更多
关键词 BTS BWA In FIGURE access ZTE’s Broadband wireless access System
在线阅读 下载PDF
Thinking About Developing 3G and Broadband Wireless Access Technologies
5
作者 Hou Ziqiang (Institute of Acoustics,Chinese Academy of Sciences,Beijing 100080,China) 《ZTE Communications》 2004年第2期50-52,55,共4页
It is wise for fixed operators to make use of broadband wireless access technologies,such as IEEE802.16d,to develop mobile access based on their existing fixed broadband IP networks.Mobile operators have to evolve the... It is wise for fixed operators to make use of broadband wireless access technologies,such as IEEE802.16d,to develop mobile access based on their existing fixed broadband IP networks.Mobile operators have to evolve their networks from 2G to 3G for making full use of their current resources. However,the AII-IP core network will be a general trend since broadband wireless access adopts the connectionless statistical packet multiplexing technology.Based on the introduction of IEEE802.16d,High Speed Downlink Packet Access (HSDPA) and CDMA2000 1x EV-DV technologies,this paper discusses the development trend of broadband wireless access technologies, and concludes that 3G's packet access technologies are the same as IEEE802.16d/e,and AII-IP is the goal.It emphasizes that Chinese TD-SCDMA should develop toward connectionless statistical packet multiplexing as early as possible. 展开更多
关键词 HSDPA rate IEEE GPP Thinking About Developing 3G and Broadband wireless access Technologies WCDMA access SCDMA UTRAN UMTS OFDM MBWA
在线阅读 下载PDF
Research and Development of New Broadband Wireless Access System
6
作者 Zhang Xiaodong 1 Bu Zhiyong 2 You Xiaohu 3 (1. Shanghai Research Center for Wireless Communications,Shanghai 200050,China 2. Jushri Technologies,Inc.,Shanghai 200050,China 3. State Key Laboratory of Mobile Communication,Southeast University,Nanjing 210096,China) 《ZTE Communications》 2007年第3期23-27,共5页
Broadband Wireless Access (BWA) has become one of the major evolution trends in the fields of broadband access and mobile communications. However,some difficulties emerged during the application and industrialization ... Broadband Wireless Access (BWA) has become one of the major evolution trends in the fields of broadband access and mobile communications. However,some difficulties emerged during the application and industrialization of the BWA system,which calls for typical service models,key technology innovations and backbone support from broadband Internet. This article introduces a Broadband Wireless Multimedia (BWM) access system. It aims to build a new-type "triple play" BWA network by integrating terrestrial digital TV system and the BWA system,and by taking broadband Internet as its core network platform. A primary research shows that the new BWA system is an effective solution to the existing difficulties of BWA system. Moreover,it is quite competitive in service provision,service coverage,frequency planning,terminal power consumption and cost for network construction. 展开更多
关键词 access BWA Research and Development of New Broadband wireless access System MODE
在线阅读 下载PDF
Integral sliding-mode robust observer-based congestion control for wireless access networks
7
作者 Ladan Khoshnevisan Farzad R.Salmasia Xinzhi Liub 《Journal of Control and Decision》 EI 2022年第2期152-164,共13页
Designing a robust active queue management(RAQM)is mandatory to avoid congestion in networks with wireless access links,because transmission control protocol(TCP)can detect con-gestion after its occurrence in a commun... Designing a robust active queue management(RAQM)is mandatory to avoid congestion in networks with wireless access links,because transmission control protocol(TCP)can detect con-gestion after its occurrence in a communication network and wireless links suffer from bottleneck capacity variations caused by fading and packet error rate(PER)in the acknowledgement pack-ets.Furthermore,the average window size cannot be measured explicitly from the output signal and input and state delay are imposed to a network,which complicate theRAQMdesign problem in nonlinear models.So,the main contribution of this study is to design a robust observer based control procedure based on integral sliding mode protocol to estimate the average window size,to control congestion in a TCP/RAQM network and to compensate input and state delay.Sim-ulation results via professional simulator NS-2 and SIMULINK confirm that the procedure can effectively estimate the window size and can robustly avoid congestion. 展开更多
关键词 Congestion control integral sliding mode robust active queue management(RAQM) robust observer-based control(ROBC) transmission control protocol(TCP) wireless access network
原文传递
An Offloading Scheme Leveraging on Neighboring Node Resources for Edge Computing over Fiber-Wireless (FiWi) Access Networks 被引量:3
8
作者 Wei Chang Yihong Hu +2 位作者 Guochu Shou Yaqiong Liu Zhigang Guo 《China Communications》 SCIE CSCD 2019年第11期107-119,共13页
The computation resources at a single node in Edge Computing(EC)are commonly limited,which cannot execute large scale computation tasks.To face the challenge,an Offloading scheme leveraging on NEighboring node Resourc... The computation resources at a single node in Edge Computing(EC)are commonly limited,which cannot execute large scale computation tasks.To face the challenge,an Offloading scheme leveraging on NEighboring node Resources(ONER)for EC over Fiber-Wireless(FiWi)access networks is proposed in this paper.In the ONER scheme,the FiWi network connects edge computing nodes with fiber and converges wireless and fiber connections seamlessly,so that it can support the offloading transmission with low delay and wide bandwidth.Based on the ONER scheme supported by FiWi networks,computation tasks can be offloaded to edge computing nodes in a wider range of area without increasing wireless hops(e.g.,just one wireless hop),which achieves low delay.Additionally,an efficient Computation Resource Scheduling(CRS)algorithm based on the ONER scheme is also proposed to make offloading decision.The results show that more offloading requests can be satisfied and the average completion time of computation tasks decreases significantly with the ONER scheme and the CRS algorithm.Therefore,the ONER scheme and the CRS algorithm can schedule computation resources at neighboring edge computing nodes for offloading to meet the challenge of large scale computation tasks. 展开更多
关键词 EDGE COMPUTING OFFLOADING Fiber-wireless access networks delay
在线阅读 下载PDF
Virus spreading in wireless sensor networks with a medium access control mechanism 被引量:4
9
作者 王亚奇 杨晓元 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期70-74,共5页
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical a... In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. 展开更多
关键词 wireless sensor networks medium access control virus spreading susceptible-infected model
原文传递
Minimizing the Impact of Long Propagation Delay on Multiple Access for Wireless Networks 被引量:1
10
作者 刘凯 李亚燕 王新 《China Communications》 SCIE CSCD 2011年第7期21-33,共13页
A multiple access protocol is proposed to greatly improve multiple access performance of wireless networks with long propagation delay. All the nodes with packets to send can make rapid successful reservation in acces... A multiple access protocol is proposed to greatly improve multiple access performance of wireless networks with long propagation delay. All the nodes with packets to send can make rapid successful reservation in access reservation mini-slots, which is adaptively adjusted according to current traffic load and idle channel resources. A Central Control Node (CCN) coordinates channel reservation and allocates on-demand channel resources to the successfully accessed nodes on two channels. Each node can employ only one handshake to accomplish each communication session, and transmit one or multiple data packets piggybacked with acknowledgment (ACK) information to one or multiple destination nodes in each frame until the end of their communication sessions, which greatly minimizes the impact of long propagation delay caused by handshakes and improves channel efficiency. Simulation results show that the proposed protocol obviously outperforms the Centralized Scheduling-based Medium Access Control (CSMAC) protocol, especially in the presence of long propagation delay. 展开更多
关键词 wireless networks multiple access on-demand reservation conflict-free transmission long propagation delay
在线阅读 下载PDF
Modelling a Learning-Based Dynamic Tree Routing Model for Wireless Mesh Access Networks
11
作者 N.Krishnammal C.Kalaiarasan A.Bharathi 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1531-1549,共19页
Link asymmetry in wireless mesh access networks(WMAN)of Mobile ad-hoc Networks(MANETs)is due mesh routers’transmission range.It is depicted as significant research challenges that pose during the design of network pro... Link asymmetry in wireless mesh access networks(WMAN)of Mobile ad-hoc Networks(MANETs)is due mesh routers’transmission range.It is depicted as significant research challenges that pose during the design of network protocol in wireless networks.Based on the extensive review,it is noted that the substantial link percentage is symmetric,i.e.,many links are unidirectional.It is identified that the synchronous acknowledgement reliability is higher than the asynchronous message.Therefore,the process of establishing bidirectional link quality through asynchronous beacons underrates the link reliability of asym-metric links.It paves the way to exploit an investigation on asymmetric links to enhance network functions through link estimation.Here,a novel Learning-based Dynamic Tree routing(LDTR)model is proposed to improve network performance and delay.For the evaluation of delay measures,asymmetric link,interference,probability of transmission failure is evaluated.The proportion of energy consumed is used for monitoring energy conditions based on the total energy capacity.This learning model is a productive way for resolving the routing issues over the network model during uncertainty.The asymmetric path is chosen to achieve exploitation and exploration iteratively.The learning-based Dynamic Tree routing model is utilized to resolve the multi-objective routing problem.Here,the simulation is done with MATLAB 2020a simulation environment and path with energy-efficiency and lesser E2E delay is evaluated and compared with existing approaches like the Dyna-Q-network model(DQN),asymmetric MAC model(AMAC),and cooperative asymmetric MAC model(CAMAC)model.The simulation outcomes demonstrate that the anticipated LDTR model attains superior network performance compared to others.The average energy consump-tion is 250 J,packet energy consumption is 6.5 J,PRR is 50 bits/sec,95%PDR,average delay percentage is 20%. 展开更多
关键词 wireless mesh access networks mobile ad-hoc network reinforcement learning multi-objective constraint asymmetric link
在线阅读 下载PDF
Ubiquitous Access Technology for Wireless Digital Home Networks
12
作者 Peng Mugen 1Jiang Yong 2Wang Wenbo 1(1. School of Telecommunication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China 2. China Potevio Co., Ltd., Beijing 100053, China) 《ZTE Communications》 2006年第4期40-46,共7页
As an important branch of telecommunication technology, digital home networks have quickly developed in recent years. Although architecture of the digital home network based on telecommunication networks has been stan... As an important branch of telecommunication technology, digital home networks have quickly developed in recent years. Although architecture of the digital home network based on telecommunication networks has been standardized in China, only wireless access is defined to be allowable. Therefore, it becomes the focus of further research how to establish a wireless digital home network. This article proposes the concept and shows the architecture of ubiquitous access for wireless digital home networks. Moreover, key technologies for ubiquitous access are discussed here, including cognitive radio, the concept of wireless Mesh, generic link transfer mechanism, Quality of Service (QoS) guarantee mechanism, Electromagnetic Compatibility (EMC) and coexistence of heterogeneous systems. 展开更多
关键词 access Ubiquitous access Technology for wireless Digital Home Networks WPAN HOME
在线阅读 下载PDF
Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach
13
作者 Adeniran Ishola Oluwaranti Tayo Dorcas Obasanya 《Wireless Sensor Network》 2014年第7期129-135,共7页
Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on en... Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on energy efficiency. This work seeks to develop an improved mobility conscious medium access control scheme for wireless sensor networks with a view to enhance energy conservation on mobile sensor nodes. On this note, mobility patterns of different scenarios are modelled using Gauss Markov Mobility Model (GMMM) to determine the position and distance of the sensor nodes and how they are correlated in time. 展开更多
关键词 MOBILITY Medium access Control wireless Sensor Networks GAUSS MARKOV MOBILITY Model
在线阅读 下载PDF
计及非理想传输的虚拟电厂设备异构通信网络接入选择算法
14
作者 陈智雄 唐逸凡 苏新鹏 《电力系统保护与控制》 北大核心 2025年第13期105-116,共12页
虚拟电厂(virtual power plant,VPP)可利用异构网络实现分布式新能源聚合调度,实现综合效益提升。为了提高VPP在不同网络下的丢包与时延等非理想传输能力,提出面向异构通信网络的设备接入优化算法。首先,分析总结了VPP设备充放电容量、... 虚拟电厂(virtual power plant,VPP)可利用异构网络实现分布式新能源聚合调度,实现综合效益提升。为了提高VPP在不同网络下的丢包与时延等非理想传输能力,提出面向异构通信网络的设备接入优化算法。首先,分析总结了VPP设备充放电容量、出力特性、接入网络时延、网络承载能力等约束条件,考虑异构网络下设备接入的丢包率和时延理论性能构建了以收益损失最小化为目标的优化模型。然后,利用分层求解和贪婪算法进行模型求解,获得设备的接入方式。最后,仿真验证了所提模型和算法的有效性和可靠性。结果表明,所提算法可提高网络接入容量并降低系统收益损失,实现收益最大化。 展开更多
关键词 虚拟电厂 功率调度 无线接入 异构通信网络 数据丢包 通信时延
在线阅读 下载PDF
基于MHA-MAD的近海光无线融合接入网络部署算法
15
作者 李学华 郗童 +1 位作者 王鑫 黄翔 《光通信研究》 北大核心 2025年第4期79-85,共7页
【目的】随着近海区域业务量的快速增长,带宽需求呈现出指数级增长趋势,承载业务的第五代移动通信技术(5G)及后5G(B5G)下一代无线接入网络(NG-RAN)资源即将枯竭,波分复用无源光网络(WDM-PON)因其高带宽等优势,成为支持5G/B5G NG-RAN的... 【目的】随着近海区域业务量的快速增长,带宽需求呈现出指数级增长趋势,承载业务的第五代移动通信技术(5G)及后5G(B5G)下一代无线接入网络(NG-RAN)资源即将枯竭,波分复用无源光网络(WDM-PON)因其高带宽等优势,成为支持5G/B5G NG-RAN的有效承载方案。然而,近海复杂多变的环境为WDM-PON的网络部署带来了严峻挑战,如高昂的部署成本、大规模的路径损耗以及恶劣的水下环境等,亟需通过优化网络部署策略降低成本、风险和传输损耗等,以构建适应近海环境的网络。【方法】文章提出了一种多头注意力增强的多智能体深度Q网络(MHA-MAD)算法,通过多头注意力机制高效提取网络环境的关键特征,并为不同特征赋予动态权重,从而提升建模精度。同时,采用多智能体框架,使多个智能体在共享网络环境中协作与同步决策,实现网络部署的全局优化。【结果】与现有基准方法相比,MHA-MAD算法在网络部署中使性能提高了近42%,其结果接近理论最优解。此外,与未利用多头注意力机制的多智能体深度Q网络(DQN)算法相比,MHAMAD算法在最小化网络部署总成本、节点功耗、链路衰减和网络风险的联合优化目标上,性能提高了近8%。【结论】MHAMAD算法为面向近海场景5G/B5G NG-RAN的WDM-PON部署与优化提供了新思路。 展开更多
关键词 网络部署 近海网络 无线和光纤接入网络 深度Q网络 多头注意力机制
在线阅读 下载PDF
基于深度强化学习的无人机辅助RSMA中继通信技术
16
作者 樊自甫 张珂瑞 王正强 《重庆邮电大学学报(自然科学版)》 北大核心 2025年第5期668-676,共9页
针对用户在存在窃听者的复杂通信环境进行中继通信的安全问题,提出了一种多无人机辅助的中继通信网络为用户提供通信服务。通过基于Q混合网络(Q-mixing network,QMIX)的多智能体深度强化学习(multi-agent reinforcement learning,MRAL)... 针对用户在存在窃听者的复杂通信环境进行中继通信的安全问题,提出了一种多无人机辅助的中继通信网络为用户提供通信服务。通过基于Q混合网络(Q-mixing network,QMIX)的多智能体深度强化学习(multi-agent reinforcement learning,MRAL)算法优化无人机轨迹与功率分配,在信息安全敏感度较低用户(次要用户)最低速率得到保障的情况下,提高信息安全敏感较高用户(主要用户)的安全和速率。仿真结果表明,算法相较于双层深度Q网络(double deep Q-network,Double DQN)和对偶深度Q网络(dueling deep Q-network,Dueling DQN),累积奖励分别提高了大约15.5%和1.26%;模型的速率分割多址技术相较于空分多址和非正交多址技术,在系统整体性能和信息安全保障方面都具有显著优势,为多用户通信场景下的安全高效通信提供了更优解决方案。 展开更多
关键词 速率分割多址接入 无线通信网络 深度强化学习 安全和速率
在线阅读 下载PDF
可重构智能超表面使能的协作无线携能同传-非正交多址接入系统安全传输方案 被引量:1
17
作者 季薇 刘子卿 +3 位作者 李飞 李汀 梁彦 宋云超 《电子与信息学报》 北大核心 2025年第2期305-314,共10页
可重构智能超表面(RIS)因能提供额外的无源波束增益被视为一项颇具前景的技术。考虑到未来大型物联网中不同用户服务需求的多样性及信息传输的安全性,该文面向协作无线携能同传-非正交多址接入(SWIPT-NOMA)系统,提出一种RIS使能的安全... 可重构智能超表面(RIS)因能提供额外的无源波束增益被视为一项颇具前景的技术。考虑到未来大型物联网中不同用户服务需求的多样性及信息传输的安全性,该文面向协作无线携能同传-非正交多址接入(SWIPT-NOMA)系统,提出一种RIS使能的安全传输方案。通过合理部署RIS的位置,将其同时作用于直接传输阶段和协作传输阶段。在满足非正交多址接入(NOMA)弱用户信息速率需求、NOMA强用户能量收集需求和基站最小发射功率的条件下,通过联合优化基站的有源波束成形、RIS的相移矩阵、强用户的功率分割系数等来最大化强用户的保密速率。为解决所提的多变量耦合的非凸优化问题,该文基于交替迭代优化算法,对基站的有源波束成形、直接传输阶段的RIS无源波束相移矩阵、协作传输阶段的RIS有源波束相移矩阵以及强用户的功率分割系数等进行了多次交替迭代优化,直至算法收敛。仿真结果验证了该文算法的收敛性,且与其它基准方案相比,所提方案可进一步提高强用户的保密速率。 展开更多
关键词 可重构智能超表面 无线携能同传 非正交多址接入 安全传输
在线阅读 下载PDF
基于跨模态信号的无线资源管理策略
18
作者 王丽娜 李科 +1 位作者 刘向南 张海君 《信号处理》 北大核心 2025年第6期1097-1108,共12页
随着超第五代(Beyond Fifth Generation,B5G)及第六代(Sixth Generation,6G)移动通信网络的快速发展,跨模态数据的共存问题已逐步成为重要挑战,其中视觉数据要求高吞吐量,而触觉数据需满足1 ms端到端时延与极低的丢包率,不同需求下的资... 随着超第五代(Beyond Fifth Generation,B5G)及第六代(Sixth Generation,6G)移动通信网络的快速发展,跨模态数据的共存问题已逐步成为重要挑战,其中视觉数据要求高吞吐量,而触觉数据需满足1 ms端到端时延与极低的丢包率,不同需求下的资源竞争导致资源分配的严重碎片化。针对这一问题,本文提出一种基于重叠架构与非正交多址接入的联合优化方案,结合移动边缘计算的低时延特性,设计高效资源分配策略。首先,构建移动边缘计算场景下的跨模态数据共存模型,将非凸优化问题分解为子信道匹配与功率分配两个子问题。随后,通过匈牙利算法实现低复杂度用户配对,并推导功率分配的闭式解以最小化触觉用户能耗。最后,提出动态迭代算法,适配信道时变性与业务突发性。仿真结果表明,所提算法在保障视觉数据速率约束与触觉数据时延约束的前提下,可降低触觉平均化能耗达20%,且在高用户密度场景中表现稳定。与穷举搜索相比,该算法在保证性能的同时显著降低计算复杂度,为B5G/6G网络中多业务共存提供了高效解决方案。 展开更多
关键词 跨模态通信 无线资源管理 非正交多址接入 移动边缘计算
在线阅读 下载PDF
A New Exposed-terminal-free MAC Protocol for Multi-hop Wireless Networks 被引量:3
19
作者 刘凯 邢小琴 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2009年第3期285-292,共8页
This article presents a new multichannel medium access control (MAC) protocol to solve the exposed-terminal (ET) problem for efficient channel sharing in multi-hop wireless networks. It uses request-to-send and clear-... This article presents a new multichannel medium access control (MAC) protocol to solve the exposed-terminal (ET) problem for efficient channel sharing in multi-hop wireless networks. It uses request-to-send and clear-to-send (RTS/CTS) dialogue on a common channel and flexibly opts for conflict-free traffic channels to carry out the data packet transmission on the basis of a new channel selection scheme. The acknowledgment (ACK) packet for the data packet transmission is sent back to the sender over another ... 展开更多
关键词 wireless networks multiple access channel reservation exposed terminal
原文传递
基于RedCap的低成本5G网络构建与应用研究
20
作者 陈洋 黄庆秋 《通信技术》 2025年第6期616-623,共8页
5G低成本终端(Reduced Capability 5G Devices,RedCap)作为面向物联网和低功耗的新兴技术终端,凭借低成本、低功耗及与现有网络兼容等特性,为5G规模化应用开辟了创新路径。以DITO公司在菲律宾实施的5G固定无线接入(Fixed Wireless Acces... 5G低成本终端(Reduced Capability 5G Devices,RedCap)作为面向物联网和低功耗的新兴技术终端,凭借低成本、低功耗及与现有网络兼容等特性,为5G规模化应用开辟了创新路径。以DITO公司在菲律宾实施的5G固定无线接入(Fixed Wireless Access,FWA)项目为研究对象,重点分析了RedCap技术在降低网络运营成本与提升服务质量方面的核心优势。通过引入轻量化终端网管(Lightweight Terminal Network Management,LTM)系统,该运营商显著优化了运维效率,为新兴市场提供了低成本构建5G网络的成功实践。研究表明,5G RedCap将在全球通信发展中扮演重要角色。 展开更多
关键词 5G RedCap 物联网 固定无线接入 低成本
在线阅读 下载PDF
上一页 1 2 87 下一页 到第
使用帮助 返回顶部