期刊文献+
共找到33篇文章
< 1 2 >
每页显示 20 50 100
Multi-Antenna Jammer Assisted Covert Communications in Data Collected IoT with NOMA 被引量:3
1
作者 Liwei Tao Weiwei Yang +3 位作者 Xingbo Lu Ruiqian Ma Ling Yang Yi Song 《China Communications》 SCIE CSCD 2023年第5期217-231,共15页
In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie... In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie).To confuse the detection at Willie,an extra multi-antenna friendly jammer(Jammer)has been employed to transmit artificial noise(AN)with random power.Based on the CSI of Willie is available or not at Jammer,three AN transmission schemes,including null-space artificial noise(NAN),transmit antenna selection(TAS),and zeroforcing beamforming(ZFB),are proposed.Furthermore,the closed-form expressions of expected minimum detection error probability(EMDEP)and joint connection outage probability(JCOP)are derived to measure covertness and reliability,respectively.Finally,the maximum effective covert rate(ECR)is obtained with a given covertness constraint.The numerical results show that ZFB scheme has the best maximum ECR in the case of the number of antennas satisfies N>2,and the same maximum ECR can be achieved in ZFB and NAN schemes with N=2.Moreover,TAS scheme also can improve the maximum ECR compared with the benchmark scheme(i.e.,signal-antenna jammer).In addition,a proper NOMA node pairing can further improve the maximum ECR. 展开更多
关键词 IOT covert communications NOMA node pairing multi-antenna jammer
在线阅读 下载PDF
Placement of unmanned aerial vehicles as communication relays in two-tiered multi-agent system:clustering based methods 被引量:3
2
作者 WU Gaofeng WAN Kaifang +1 位作者 GAO Xiaoguang FU Xiaowei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第2期231-242,共12页
The network performance and the unmanned aerial vehicle(UAV)number are important objectives when UAVs are placed as communication relays to enhance the multi-agent information exchange.The problem is a non-determinist... The network performance and the unmanned aerial vehicle(UAV)number are important objectives when UAVs are placed as communication relays to enhance the multi-agent information exchange.The problem is a non-deterministic polynomial hard(NP-hard)multi-objective optimization problem,instead of generating a Pareto solution,this work focuses on considering both objectives at the same level so as to achieve a balanced solution between them.Based on the property that agents connected to the same UAV are a cluster,two clustering-based algorithms,M-K-means(MKM)and modified fast search and find density of peaks(MFSFDP)methods,are first proposed.Since the former algorithm requires too much computational time and the latter one requires too many relays,an algorithm for the balanced network performance and relay number(BPN)is proposed by discretizing the area to avoid missing the optimal relay positions and defining a new local density function to reflect the network performance metric.Simulation results demonstrate that the proposed algorithms are feasible and effective.Comparisons between these algorithms show that the BPN algorithm uses fewer relay UAVs than the MFSFDP and classic set-covering based algorithm,and its computational time is far less than the MKM algorithm. 展开更多
关键词 unmanned AERIAL vehicle(UAV) RELAY communication CLUSTERING RELAY node PLACEMENT wireless network
在线阅读 下载PDF
Cooperative Communication and Cognitive Radio (2) 被引量:1
3
作者 Luo Tao, Hao Jianjun, Yue Guangxin (Beijing University of Posts and Telecommunications, Beijing 100876, P. R. China) 《ZTE Communications》 2009年第2期61-65,共5页
Cooperative communication and cognitive radio have become hot topics in recent research of communication networks, attracting a widespread attention. Cooperative communication technique can enhance the transmission ca... Cooperative communication and cognitive radio have become hot topics in recent research of communication networks, attracting a widespread attention. Cooperative communication technique can enhance the transmission capacity of a communication system, while cognitive radio technique can improve the spectrum utilization ratio. As a result, the combination of the two techniques will have a significant impact on the future wireless mobile communication system. This lecture comes in four parts. This part analyzes the impacts of cooperative communication technology on modern wireless communication systems. 展开更多
关键词 Cooperative communication and Cognitive Radio node CR AS
在线阅读 下载PDF
Cooperative Communication and Cognitive Radio (1) 被引量:1
4
作者 Luo Tao,Hao Jianjun,Yue Guangxin(Beijing University of Posts and Telecommunications,Beijing 100876,P.R.China) 《ZTE Communications》 2009年第1期59-64,共6页
Cooperative communication and cognitive radio have become hot topics in recent researches of communication networks,attracting a widespread attention.Cooperative communication technique can enhance the transmission ca... Cooperative communication and cognitive radio have become hot topics in recent researches of communication networks,attracting a widespread attention.Cooperative communication technique can enhance the transmission capacity of a communication system,while cognitive radio technique can improve the spectrum utilization ratio.As a result,the combination of the two techniques will have significant impact on the future wireless mobile communication system.This lecture comes in four parts.This part introduces the history of cooperative communication as well as several cooperation schemes. 展开更多
关键词 Cooperative communication and Cognitive Radio node FIGURE AS
在线阅读 下载PDF
Optimization of Communication for Commanding and Controlling Systems
5
作者 BAI Jun-hai (Department of Automation, Xiamen University, Xiamen 361005, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期242-,共1页
This paper mainly discussed some special requiremen ts for communication system and specific implement methods during the cause of cam paign cooperation in modern times. That system is the Advanced Field Tactical Da t... This paper mainly discussed some special requiremen ts for communication system and specific implement methods during the cause of cam paign cooperation in modern times. That system is the Advanced Field Tactical Da ta System which was developed to meet the requirements for controlling every fir e nodes, through which Army can achieve their campaign and tactical goals. The c ourse of dealing with communication message mainly include Emery’s situation rep orted, Message change (generally referred to taxis and how to choice best ways), Fire distribute, Evaluating for enemy’s casualty, cooperation among all fire no des, etc. The primary focus for this paper is how to deal with overall throughp ut, message latency, immunity from transmission errors, terrain effects on links and jamming. The system must balance all of these factors to provide within lit tle delay and that some messages are received with a specified time, finally we can make all fire nodes have best control in order to realize the aim of make th is system more optimized. 展开更多
关键词 communication MESSAGE fire nodes TRANSMISSION OPTIMIZATION
在线阅读 下载PDF
Covert Communication in Integrated High Altitude Platform Station Terrestrial Networks
6
作者 Zeke Wu Kefeng Guo +1 位作者 Rui Liu Shibin Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第4期583-598,共16页
In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network n... In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network needs to be developed into the sixth generation(6G)network.However,with the increasingly prominent security problems of wireless communication networks such as 6G,covert communication has been recognized as one of the most promising solutions.Covert communication can realize the transmission of hidden information between both sides of communication to a certain extent,which makes the transmission content and transmission behavior challenging to be detected by noncooperative eavesdroppers.In addition,the integrated high altitude platform station(HAPS)terrestrial network is considered a promising development direction because of its flexibility and scalability.Based on the above facts,this article investigates the covert communication in an integrated HAPS terrestrial network,where a constant power auxiliary node is utilized to send artificial noise(AN)to realize the covert communication.Specifically,the covert constraint relationship between the transmitting and auxiliary nodes is derived.Moreover,the closed-form expressions of outage probability(OP)and effective covert communication rate are obtained.Finally,numerical results are provided to verify our analysis and reveal the impacts of critical parameters on the system performance. 展开更多
关键词 Covert communication the integrated HAPS terrestrial network constant power auxiliary node artificial noise(AN) effective covert communication rate
在线阅读 下载PDF
AEECA for Reliable Communication to Enhance the Network Life Time for WSN
7
作者 Ganesh Jayaraman V R Sarma Dhulipala 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1705-1719,共15页
Nowadays,wireless sensor networks play a vital role in our day to day life.Wireless communication is preferred for many sensing applications due its convenience,flexibility and effectiveness.The sensors to sense the en... Nowadays,wireless sensor networks play a vital role in our day to day life.Wireless communication is preferred for many sensing applications due its convenience,flexibility and effectiveness.The sensors to sense the environmental factor are versatile and send sensed data to central station wirelessly.The cluster based protocols are provided an optimal solution for enhancing the lifetime of the sensor networks.In this paper,modified K-means++algorithm is used to form the cluster and cluster head in an efficient way and the Advanced Energy-Efficient Cluster head selection Algorithm(AEECA)is used to calculate the weighted fac-tor of the transmission path and effective data collection using gateway node.The experimental results show the proposed algorithm outperforms the existing routing algorithms. 展开更多
关键词 Wireless sensor network reliable communication energy management energy clustering SENSORS base station gateway node
在线阅读 下载PDF
An Improved AOMDV Routing Protocol for Airspace Communication Network
8
作者 Xi Zhang Tao Zhang 《International Journal of Communications, Network and System Sciences》 2017年第8期157-166,共10页
The airspace communication network based on spacecraft has a wide range of applications in regional information enhancement and emergency communication. In this paper, a routing algorithm for congestion degree detecti... The airspace communication network based on spacecraft has a wide range of applications in regional information enhancement and emergency communication. In this paper, a routing algorithm for congestion degree detection of multipath routing (CD_AOMDV) is proposed. The method of combining the whole congestion degree detection and local congestion degree detection before service initiation is adopted. Timely and accurate judgment of the congestion degree reduced the loss rate of the hot nodes, so the average packet loss rate reduced. Simulation results show that compared with the traditional AOMDV protocol, the CD_AOMDV proposed in this paper has reduced the packet loss and improved delay performance, which is more suitable for the airspace communication network. 展开更多
关键词 Airspace communication Network AOMDV ROUTING Protocol nodeS MOBILITY SNS Simulation Platform
在线阅读 下载PDF
Security for Industrial Communication Systems
9
《可编程控制器与工厂自动化(PLC FA)》 2006年第7期29-31,共3页
B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later secti... B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi- 展开更多
关键词 Security for Industrial communication Systems WORK PRO node
在线阅读 下载PDF
A Reliable and Secure Smart Grid Communication Network Using a Comprehensive Cost Function
10
作者 Vahid Kouhdaragh 《Journal of Energy and Power Engineering》 2017年第2期115-126,共12页
SG (smart grids) is an intelligent power grid in which the diverse nodes should communicate different types of information which have different communication requirements with CS (control stations). There exist se... SG (smart grids) is an intelligent power grid in which the diverse nodes should communicate different types of information which have different communication requirements with CS (control stations). There exist several RATs (radio access technologies), with diversification in quality of service character which respect to the SG nodes communication requirements. On the other side, spectrum is becoming a rare source and its demands request is increasing exponentially. Therefore, resource allocation to support different types of SG nodes should be elaborated so that the resource efficiency is maximized while the SG communication requirements are respected. Using a CF (cost function) based on the SG node requirements and RATs characteristics to find the desirability value of every RATs for a certain node type accomplish this goal in combination with prioritizing the different SG nodes types based on SG goals by creating a priority table for RATs and different SG node types. The main node communication requirements are formulized to be used in the CF in this paper. The numerical results show that the proposed method defines the desirability value of each RAT for a certain SG node type that helps to make a priority table by using the SG node prioritization table. 展开更多
关键词 Smart grid node prioritization cost function communication requirements spectral efficiency heterogeneous network.
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
11
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
Design and performance analysis of wireless sensor network location node system for underground mine 被引量:10
12
作者 CHEN Guang-zhu SHEN Chun-feng ZHOU Li-juan 《Mining Science and Technology》 EI CAS 2009年第6期813-818,共6页
Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety... Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety. The location node system consists of a mobile node,several fixed nodes,and a sink node,all of whose circuits were designed based on CC2430. A varistor and a RC circuit were used in the reset circuit of a sensor node to guarantee the intrinsic safety by reducing discharge energy,the theoretical analysis of the discharge energy shows that the reset circuit is an intrinsic safety one. The analysis and simulation about the performance of the location node system are discussed,such as network communication delay and packet loss rate,the results show that the highest network communication delay of the system is about 0.11 seconds,and the highest packet loss rate is about 0.13,which assures the location node system has a high reliability,and can locate miners in the underground mine. 展开更多
关键词 wireless sensor network location node network communication delay packet loss rate
在线阅读 下载PDF
Improved Performance for a Heterogeneous Satellite-Cooperative Network with Best Relay Node Selection 被引量:2
13
作者 Pedram hajipour Ali Shahzadi Saeed Ghazi-Maghrebi 《China Communications》 SCIE CSCD 2019年第5期93-105,共13页
Nowadays, hybrid satellite-terrestrial cooperative network has emerged as a key technology to provide a great variety of communication services. The deployment of this network will improve coverage and capacity in rem... Nowadays, hybrid satellite-terrestrial cooperative network has emerged as a key technology to provide a great variety of communication services. The deployment of this network will improve coverage and capacity in remote areas. Despite the benefits of this network, by increasing the number of users, communication efficiency based on interference management is a major challenge in satellite-based system. Also, the direct links between satellite system and the terrestrial equipment do not always have desirable channel condition. In order to avoid serious throughput degradation, choosing a cooperative relay node is very important. In this paper, Stackelberg game is exploited for interference management that is raised by satellites in down link over terrestrial equipment. Then, for interference management between ground station and relay node with other mobile users, CVX is used to allocate optimum power. Also, the best relay node in this structure is selected based on the harmonic mean function. Thus, the performance of the heterogeneous satellite-cooperative network is investigated based on three benchmarks, namely, successful transmission, energy consumption and outage probability. Finally, the simulation results showed the effect of proposed system model on the performance of next generation satellite networks. 展开更多
关键词 HETEROGENEOUS STACKELBERG GAME CONVEX optimization RELAY node cooperative communication
在线阅读 下载PDF
Critical Nodes Identification: A Non-Cooperative Method for Unknown Topology Information in Ad Hoc Networks
14
作者 Wenwei Yue Peiang Zuo +4 位作者 Wengang Li Yao Zhang Yunfeng Zhang Changle Li Jun Huang 《China Communications》 SCIE CSCD 2023年第7期217-232,共16页
The foundation of ad hoc networks lies in the guarantee of continuous connectivity.However,critical nodes,whose failure can easily destroy network connectivity,will influence the ad hoc network connectivity significan... The foundation of ad hoc networks lies in the guarantee of continuous connectivity.However,critical nodes,whose failure can easily destroy network connectivity,will influence the ad hoc network connectivity significantly.To protect the network efficiently,critical nodes should be identified accurately and rapidly.Unlike existing critical node identification methods for unknown topology that identify critical nodes according to historical information,this paper develops a critical node identification method to relax the prior topology information condition about critical nodes.Specifically,we first deduce a theorem about the minimum communication range for a node through the number of nodes and deployment ranges,and prove the universality of the theorem in a realistic two-dimensional scenario.After that,we analyze the relationship between communication range and degree value for each node and prove that the greater number of nodes within the communication range of a node,the greater degree value of nodes with high probability.Moreover,we develop a novel strategy to improve the accuracy of critical node identification without topology information.Finally,simulation results indicate the proposed strategy can achieve high accuracy and low redundancy while ensuring low time consumption in the scenarios with unknown topology information in ad hoc networks. 展开更多
关键词 Ad hoc networks node location informa-tion ID generation strategy communication range critical nodes
在线阅读 下载PDF
Quantum Artificial Intelligence Based Node Localization Technique for Wireless Networks
15
作者 Hanan Abdullah Mengash Radwa Marzouk +3 位作者 Siwar Ben Haj Hassine Anwer Mustafa Hilal Ishfaq Yaseen Abdelwahed Motwakel 《Computers, Materials & Continua》 SCIE EI 2022年第10期327-342,共16页
Artificial intelligence(AI)techniques have received significant attention among research communities in the field of networking,image processing,natural language processing,robotics,etc.At the same time,a major proble... Artificial intelligence(AI)techniques have received significant attention among research communities in the field of networking,image processing,natural language processing,robotics,etc.At the same time,a major problem in wireless sensor networks(WSN)is node localization,which aims to identify the exact position of the sensor nodes(SN)using the known position of several anchor nodes.WSN comprises a massive number of SNs and records the position of the nodes,which becomes a tedious process.Besides,the SNs might be subjected to node mobility and the position alters with time.So,a precise node localization(NL)manner is required for determining the location of the SNs.In this view,this paper presents a new quantum bird migration optimizer-based NL(QBMA-NL)technique for WSN.The goal of the QBMA-NL approach is for determining the position of unknown nodes in the network by the use of anchor nodes.The QBMA-NL technique is mainly based on the mating behavior of bird species at the time of mating season.In addition,an objective function is derived based on the received signal strength indicator(RSSI)and Euclidean distance from the known to unknown SNs.For demonstrating the improved performance of the QBMA-NL technique,a wide range of simulations take place and the results reported the supreme performance over the recent NL techniques. 展开更多
关键词 Artificial intelligence wireless communication wireless sensor networks metaheuristics quantum computing node localization
在线阅读 下载PDF
Energy-Efficient Mobile Data Collection Adopting Node Cooperation in an Underwater Acoustic Sensor Network
16
作者 Yougan Chen Xiaoting Jin Xiaomei Xu 《China Communications》 SCIE CSCD 2017年第6期32-42,共11页
This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node ind... This paper considers an underwater acoustic sensor network with one mobile surface node to collect data from multiple underwater nodes,where the mobile destination requests retransmission from each underwater node individually employing traditional automatic-repeat-request(ARQ) protocol.We propose a practical node cooperation(NC) protocol to enhance the collection efficiency,utilizing the fact that underwater nodes can overhear the transmission of others.To reduce the source level of underwater nodes,the underwater data collection area is divided into several sub-zones,and in each sub-zone,the mobile surface node adopting the NC protocol could switch adaptively between selective relay cooperation(SRC) and dynamic network coded cooperation(DNC) .The difference of SRC and DNC lies in whether or not the selected relay node combines the local data and the data overheard from undecoded node(s) to form network coded packets in the retransmission phase.The NC protocol could also be applied across the sub-zones due to the wiretap property.In addition,we investigate the effects of different mobile collection paths,collection area division and cooperative zone design for energy saving.The numerical results showthat the proposed NC protocol can effectively save energy compared with the traditional ARQ scheme. 展开更多
关键词 underwater acoustic sensor networks mobile data collection node cooperation cooperative communications energy efficiency
在线阅读 下载PDF
Design and Simulation of Ring Network-on-Chip for Different Configured Nodes
17
作者 Arpit Jain Rakesh Kumar Dwivedi +3 位作者 Hammam Alshazly Adesh Kumar Sami Bourouis Manjit Kaur 《Computers, Materials & Continua》 SCIE EI 2022年第5期4085-4100,共16页
The network-on-chip(NoC)technology is frequently referred to as a front-end solution to a back-end problem.The physical substructure that transfers data on the chip and ensures the quality of service begins to collaps... The network-on-chip(NoC)technology is frequently referred to as a front-end solution to a back-end problem.The physical substructure that transfers data on the chip and ensures the quality of service begins to collapse when the size of semiconductor transistor dimensions shrinks and growing numbers of intellectual property(IP)blocks working together are integrated into a chip.The system on chip(SoC)architecture of today is so complex that not utilizing the crossbar and traditional hierarchical bus architecture.NoC connectivity reduces the amount of hardware required for routing and functions,allowing SoCs with NoC interconnect fabrics to operate at higher frequencies.Ring(Octagons)is a direct NoC that is specifically used to solve the scalability problem by expanding each node in the shape of an octagon.This paper discusses the ring NoC design concept and its simulation in Xilinx ISE 14.7,as well as the communication of functional nodes.For the field-programmable gate array(FPGA)synthesis,the performance of NoC is evaluated in terms of hardware and timing parameters.The design allows 64 to 256 node communication in a single chip with‘N’bit data transfer in the ring NoC.The performance of the NoC is evaluated with variable nodes from 2 to 256 in Digilent manufactured Virtex-5 FPGA hardware. 展开更多
关键词 Ring NoC FPGA synthesis nodes communication SoC design integrated synthesis environment
在线阅读 下载PDF
Secure and covert UAV-aided communication
18
作者 Nan ZHAO Yuan GAO +1 位作者 Feng SHU Chengwen XING 《Chinese Journal of Aeronautics》 2025年第10期1-2,共2页
Unmanned Aerial Vehicle(UAV)-aided communication,prized for its network reconfigurability,operational flexibility,and cost-effectiveness,is a key enabler of the low-altitude economy.However,the high possibilities of l... Unmanned Aerial Vehicle(UAV)-aided communication,prized for its network reconfigurability,operational flexibility,and cost-effectiveness,is a key enabler of the low-altitude economy.However,the high possibilities of line-of-sight links and the broadcast nature of air-ground UAV communications make it vulnerable and prone to eavesdropping by malicious nodes. 展开更多
关键词 network reconfigurability network reconfigurability operational broadcast nature eavesdropping low altitude economy malicious nodes uav aided communication line sight links
原文传递
Bidirectional WDM Self-Healing Ring Network for Hub/Remote Nodes
19
作者 Sung-Bum Park Seung Goo Kang +1 位作者 Sang Bae Lee Chang-Hee Lee 《光学学报》 EI CAS CSCD 北大核心 2003年第S1期715-716,共2页
We demonstrate a bidirectional WDM self-healing ring network for hub/remote nodes with one fiber. In this network, self-healing can be achieved within 8 ms. The transmission capacity can be doubled in the operating st... We demonstrate a bidirectional WDM self-healing ring network for hub/remote nodes with one fiber. In this network, self-healing can be achieved within 8 ms. The transmission capacity can be doubled in the operating state. 展开更多
关键词 WDM on in Bidirectional WDM self-healing Ring Network for Hub/Remote nodes for dBm
原文传递
计算机失效网络中节点可通信性能建模评估方法
20
作者 朱亚东 《信息与电脑》 2020年第19期161-162,共2页
在计算机失效网络中节点可通信性能建模评估时,传统的评估方法没有评估风险度值,因此评估误码率较高。为此,提出计算机失效网络中节点可通信性能建模评估方法。首先建立失效网络节点通信性能评估模型,以失效节点为中心,分析通信需求、... 在计算机失效网络中节点可通信性能建模评估时,传统的评估方法没有评估风险度值,因此评估误码率较高。为此,提出计算机失效网络中节点可通信性能建模评估方法。首先建立失效网络节点通信性能评估模型,以失效节点为中心,分析通信需求、通过信息流并导入通信信息,构成立体的交互式评估模型;计算评估节点可通信性能风险度值,直到二次评估能够达到规定的迭代次数或是评估误差控制在规定的范围内为止,获得计算机失效网络中节点可通信性能建模评估结果。实验结果表明,所提方法评估误码率最低可达0.202%,实现对计算机失效网络中节点可通信性能的精准评估。 展开更多
关键词 计算机 失效网络 节点可通信性能 建模评估
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部