期刊文献+
共找到62篇文章
< 1 2 4 >
每页显示 20 50 100
Networking Technologies Based on IEEE 802.16 and WiMAX
1
作者 Wang Bin L Dengfang Ma Fengguo (Institute of Xi’an, Central Academy of ZTE Corporation, Xi’an 710065, China) 《ZTE Communications》 2006年第2期23-28,共6页
It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications. As a standard of broadband wireless access systems, IEEE 802.16 adopts Orthogonal Frequency Divi... It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications. As a standard of broadband wireless access systems, IEEE 802.16 adopts Orthogonal Frequency Division Multiplexing (OFDM) and multi-modulation/coding techniques at the physical layer, combines contend and pre-contract mechanisms at the Medium Access Control (MAC) layer. Based on the QoS-related concepts such as connection and service flow, IEEE 802.16 optimizes network entry and initialization, and frame format in order to improve network throughput, reduce network delay, and increase the flexibility of network configuration. Based on IEEE 802.16, WiMAX adopts Point-to-Multipoint (PMP) network topology to realize flexible networking. It is a typical application technology of broadband wireless access systems. 展开更多
关键词 IEEE networking technologies Based on IEEE 802.16 and WiMAX MAC
在线阅读 下载PDF
WiMAX Networking Technologies and Solutions
2
作者 Liu Hongchun (CDMA Division of ZTE Corporation, Shanghai 201203, China) 《ZTE Communications》 2005年第2期21-25,共5页
Based on the introduction of the WiMAX standards, relevant technologies and applications, three essential factors for WiMAX networking are analyzed. They are the frequency plan, Authentication Authorization Accounting... Based on the introduction of the WiMAX standards, relevant technologies and applications, three essential factors for WiMAX networking are analyzed. They are the frequency plan, Authentication Authorization Accounting (AAA) and the mobility management. Networking solutions for the fixed and mobile applications are presented respectively. It is noted that the evolution of wireless WiMAX networking will go through four phases: the outdoor access phase, the indoor access phase, the seamed roaming phase and the seamless mobility phase. It is predicted that WiMAX will eventually converge with the NGN and the mobile cellular networks. 展开更多
关键词 WiMAX networking technologies and Solutions MODE
在线阅读 下载PDF
Ultra-Dense Networking Architectures and Technologies for 5G 被引量:1
3
作者 victor c.m.leung zhang haijun 《ZTE Communications》 2018年第2期1-2,共2页
With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth... With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth in demand for communications services. 展开更多
关键词 In Ultra-Dense networking Architectures and technologies for 5G
在线阅读 下载PDF
Innovation in Key Technologies of 5G-R System
4
作者 LIN Wei WANG Fang +2 位作者 GAO Shangyong SHI Bo CHEN Min(Translated) 《Chinese Railways》 2024年第2期55-65,共11页
This paper analyzes the communication business needs and application characteristics based on China's railway operation scenarios.Focusing on the specific needs of railways,the 5G-Railway(5G-R)system adds railway-... This paper analyzes the communication business needs and application characteristics based on China's railway operation scenarios.Focusing on the specific needs of railways,the 5G-Railway(5G-R)system adds railway-specific functional network elements on the basis of general architecture.In terms of system networking,it focuses on the innovative key technologies of 5G-R core network and wireless network networking to adapt to the railway management mechanism and reliability requirements.It analyzes the technical optimization and innovation of 5G-R railway common equipment in terms of redundancy mode,function sinking,fault detection and reversal mechanism,etc.;5G-R wireless network adopts the same-site equipment redundancy mode,and the paper analyzes the technological innovation of RRU redundancy,BBU redundancy and PCI planning,etc.;it also highlights the benefits of the train-ground integrated transmission system,including reduced roof antennas,decoupling of services and communication,unified spatial and temporal benchmarks,and cost savings. 展开更多
关键词 intelligent HSR railway mobile communication 5G-R system architecture networking technology terminal application train-ground integrated transmission
原文传递
A Review of Artificial Intelligence Applications in Contemporary Computer Network Technologies
5
作者 Ackim Lutepo Kai Zhang 《Communications and Network》 2024年第3期90-107,共18页
Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought conveni... Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology. 展开更多
关键词 Artificial Intelligence Network Technology Internet of Things (IoT) CYBERSECURITY Mobile Communication
在线阅读 下载PDF
Non-targeted screening and toxicity study of safety risk substances in facial skincare products:Molecular networking and computational toxicology strategy
6
作者 Dong Guo Yaxiong Liu +4 位作者 Jingwen Liang Yayang Huang Yangjie Li Jihui Fang Sheng Yin 《Journal of Dermatologic Science and Cosmetic Technology》 2024年第4期26-37,共12页
Background:Risk substances in cosmetics have long been associated with adverse reactions.However,as risk substances become more concealed and diversified,conventional targeted analysis methods are no longer sufficient... Background:Risk substances in cosmetics have long been associated with adverse reactions.However,as risk substances become more concealed and diversified,conventional targeted analysis methods are no longer sufficient to meet regulatory requirements.Objective:To construct a rapid and effective non-targeted screening method for the identification of risk substances,and to provide a high-throughput method for toxicity assessment.Methods:Molecular networking was utilized for the non-targeted screening of risk substances in facial skincare products,and the toxicity of these risk substances was evaluated through molecular docking and quantitative structure-activity relationship(QSAR)models.Results:Through molecular networking,we identified seven known prohibited ingredients,six of which were confirmed using standard substances.In addition,17 potential risk substances were discovered within molecular clusters containing prohibited ingredients,including antibiotics,antihistamines,and phthalates,etc.Notably,chloramphenicol base and N-desmethyl chlorpheniramine exhibited stronger binding affinity to keratin 5/14 than chloramphenicol and chlorpheniramine through molecular docking,respectively.Additionally,toxicity prediction results indicated that the carcinogenicity of antibiotics presented gender differences in mice and rats,and two chlorpheniramine derivatives also showed carcinogenicity in mice.Moreover,of the 24 compounds,11 showed skin sensitization,while 14 caused skin irritation.Furthermore,half of these compounds demonstrated potential developmental toxicity,and only 4-nitrobenzenethiol was found to be mutagenic.Conclusion:In this study,we developed a visualization strategy for non-targeted screening of risk substances and a high-throughput method for initial toxicity assessment of risk substances. 展开更多
关键词 Risk substances Non-targeted screening Molecular networking technology Computational toxicology
暂未订购
Impact of Online Music Teaching Platforms on Student Learning Outcomes
7
作者 Rong Zhou 《Journal of Contemporary Educational Research》 2025年第9期373-382,共10页
To address the widespread challenges of insufficient classroom participation,difficulty maintaining learning interest,and inaccurate learning outcome assessment in existing teaching models,this study introduces a hybr... To address the widespread challenges of insufficient classroom participation,difficulty maintaining learning interest,and inaccurate learning outcome assessment in existing teaching models,this study introduces a hybrid and dual-teacher classroom model.Based on big data and online platforms,this study constructs a music teaching resource system that integrates online micro-lessons,real-time interaction,virtual choirs,collaborative composition,and learning behavior tracking to enhance the openness and personalization of teaching.Through comparative experiments,the study focuses on changes in student knowledge acquisition,musical skills,learning interest,and classroom engagement.Results show that the experimental group significantly outperforms the control group in terms of improvement in knowledge test scores,rhythm and pitch performance,task completion rate,and scores on the learning motivation questionnaire.Differences are particularly prominent in interaction frequency and the expressiveness of the work.The study shows that Group A demonstrates significant improvement in all three dimensions:interest increases from 3.1 to 4.2;autonomous learning motivation increases from 3.0 to 4.1;emotional engagement increases from 3.2 to 4.3,demonstrating strong positive effects.Experimental Group B shows the greatest improvement,with interest increasing from 3.0 to 4.5,autonomous learning motivation from 2.9 to 4.4,and emotional engagement from 3.1 to 4.6,indicating the most significant improvements in learning attitudes and emotions. 展开更多
关键词 Online music teaching platform Student learning outcomes Blended learning Dual-teacher classroom Network technology
在线阅读 下载PDF
Wireless Mesh Networks and Cooperative Relaying Technologies 被引量:2
8
作者 Jiang Xiaokui (Wireless Pre- research Department of ZTE Corporation, Xi’an 710065, China ) 《ZTE Communications》 2008年第2期20-24,共5页
The Wireless Mesh Network (WMN) has become a focus in research of wireless broadband communications . In a switching technologies - based wireless Mesh network, the entire network is regarded as an IP subnet, so it ca... The Wireless Mesh Network (WMN) has become a focus in research of wireless broadband communications . In a switching technologies - based wireless Mesh network, the entire network is regarded as an IP subnet, so it cannot be applied in situations where large coverage is required . The use of cooperative relaying technologies can improve the transmission rate and reliability of wireless link; while the wireless Mesh network, once integrated with cooperative relaying technologies and routing technologies , can improve its spectrum efficiency and cover a wide area . However, there are many problems to be solved with respect to standardization, key technologies research and industrialization. Therefore , the application of cooperative relaying technologies in wireless Mesh networks is still a great challenge . 展开更多
关键词 MESH Wireless Mesh Networks and Cooperative Relaying technologies WMN
在线阅读 下载PDF
Key Technologies of Wireless Heterogeneous Network Security 被引量:2
9
作者 Wu Meng,Ji Lina,Wang Kun(Nanjing University of Posts and Telecommunications,Nanjing 210003,China) 《ZTE Communications》 2008年第3期34-39,共6页
Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to imp... Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to improve the coverage and capacity of public mobile network, to enable communication services, to provide Internet access and to enable mobile computing from everywhere, has drawn widespread attention for its good prospects in application. Construction of security system for wireless heterogeneous networks and development of new security models, key security techniques and approaches are critical and mandatory in heterogeneous networks development. Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc. 展开更多
关键词 Key technologies of Wireless Heterogeneous Network Security NODE WLAN
在线阅读 下载PDF
Scalability Technologies for Wireless Mesh Networks 被引量:1
10
作者 Hu Honglin (Shanghai Research Center for Wireless Communications , Shanghai 200050, China ) 《ZTE Communications》 2008年第2期11-14,共4页
The continuous increase of data transmission density in wireless mobile communications has posed a challenge to the system performance of Wireless Mesh Networks (WMNs ). There is a rule for wireless Ad hoc networks th... The continuous increase of data transmission density in wireless mobile communications has posed a challenge to the system performance of Wireless Mesh Networks (WMNs ). There is a rule for wireless Ad hoc networks that the average node capacity decreases while the number of nodes increases , so it is hard to establish a large - scale wireless Mesh network. Network scalability is very important for enhancing the adaptive networking capability of the wireless Mesh network. This article discusses key scalability technologies for Mesh Base Stations (BSs ) and Mesh Mobile Stations (MSs ), such as channel allocation, intelligent routing , multi- antenna , node classification, Quality of Service (QoS) differentiation and cooperative transmission. 展开更多
关键词 MESH QOS Scalability technologies for Wireless Mesh Networks WMNS
在线阅读 下载PDF
Key Technologies of Wireless Mesh Network 被引量:1
11
作者 Wu Fan, Mao Yuming, Zhang Ke (University of Electronic Science and Technology of China , Chengdu 610054, China ) 《ZTE Communications》 2008年第2期25-29,共5页
The Wireless Mesh Network (WMN) is a special kind of Ad hoc network with a hierarchical network structure . Its backbone transmission network has such characteristics as multi- hop , topology stability, no electricity... The Wireless Mesh Network (WMN) is a special kind of Ad hoc network with a hierarchical network structure . Its backbone transmission network has such characteristics as multi- hop , topology stability, no electricity supply constraints , convergence of flows . Improving the spatial reuse of spectrum is an effective approach to increase network capacity. The linchpin of this approach is to effectively control the interference range between wireless links . The multi- channel networking technology is one of the key technologies of WMN, and its core is the channel allocation through which the channel utilization can be maximized . The mutual interference between multi- hop wireless links should be considered when choosing the routing metrics in WMN. Through the load - balancing routing method , the network capacity and throughput of nodes can be improved . 展开更多
关键词 MESH WMN Key technologies of Wireless Mesh Network
在线阅读 下载PDF
Investigation of Architecture and Essential Technologies of Wireless Sensor Network 被引量:1
12
作者 Peng Mugen, Wang Yingjie, Wang Wenbo (School of Telecommunications Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2005年第4期25-32,共8页
This paper introduces the architecture of wireless sensor networks, presents a cross-layer network management and control mechanism. The key technologies, such as Medium Access Control (MAC) and wireless routing proto... This paper introduces the architecture of wireless sensor networks, presents a cross-layer network management and control mechanism. The key technologies, such as Medium Access Control (MAC) and wireless routing protocols are discussed and compared. A proposal of applying the simple IEEE 802 MAC protocol into the wireless sensor network is introduced. In addition, in order to improve the system capacity, a multi-channel strategy for the sensor nodes is presented for decreasing the blocking probability and suppressing the accessing time delay. It is concluded that there are still a number of problems to be solved, including decreasing power consumption, improving capacity and avoiding access collision, to promote the successful commercial application of wireless sensor network. 展开更多
关键词 IEEE WSN Investigation of Architecture and Essential technologies of Wireless Sensor Network NODE MAC
在线阅读 下载PDF
Wireless Network Technologies Supporting M2M Applications
13
作者 Lei Zhenzhou (China Academy of Telecommunications Research of Mil, Beijing 100083, China) 《ZTE Communications》 2005年第1期6-9,共4页
When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) commun... When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) communication. Someday, the traffic generated by machines will greatly exceed those of man-machine and man-man applications. Large numbers of M2M applications will need various wireless networks to support them. This paper introduces the characteristics, advantages and disadvantages of the currently available various wireless network technologies, including WiFi, Bluetooth, ZigBee, passive RFID and the 802.15 standard networks. 展开更多
关键词 ZIGBEE UWB Wireless Network technologies Supporting M2M Applications RFID WiFi
在线阅读 下载PDF
Ambient Network and Its Key Technologies
14
作者 Cheng Jie,Feng Chunyan(Institute of Communication Networks Integrated Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China) 《ZTE Communications》 2008年第3期40-43,共4页
The Ambient Networks project of European Union has carried out in-depth research on heterogeneous network convergence, where the Ambient Control Space (ACS) is proposed to support dynamic, distributed, self-managing a... The Ambient Networks project of European Union has carried out in-depth research on heterogeneous network convergence, where the Ambient Control Space (ACS) is proposed to support dynamic, distributed, self-managing and self-maintaining management for heterogeneous networks. With the Multi-Radio Access (MRA) architecture, the Ambient Networks take full advantage of multiple access technologies to provide all users with the 'Always Best Connected' services. 展开更多
关键词 RADIO MRA Ambient Network and Its Key technologies MAC ACCESS
在线阅读 下载PDF
Study on Security Technologies for Wireles Network Integration
15
作者 Feng Min (Department of Communication Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China) 《ZTE Communications》 2006年第2期43-47,共5页
The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated netw... The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated network. This will cause all kinds of existing and some new security problems in the operation of the integrated network. A complete protection based on recovery is proposed in the paper. It uses the public-key algorithm to authorize and private-key algorithm to encrypt the communicating data. This solution can provide the system with reliable security, and avoid Denial of Service (DoS) of the user. This solution has been proposed lately, and we should further identify the correct action of all the layers and figure out how to react when a legal node is framed by multiple malicious nodes. 展开更多
关键词 SECURITY USA WLAN NODE IEEE IPSEC Study on Security technologies for Wireles Network Integration
在线阅读 下载PDF
Research on Traffic Identification Technologies for Peer-to-Peer Networks
16
作者 Zhou Shijie Qin Zhiguang Wu Chunjiang(School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu,Sichuan 610054,China) 《ZTE Communications》 2007年第4期14-18,共5页
The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteris... The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteristic in the P2P system,TLI can identify whether or not the network data flow belongs to the P2P system.The DPI method adopts protocol analysis technology and reverting technology.It picks up data from the P2P application layer and analyzes the characteristics of the payload to judge if the network traffic belongs to P2P applications.Due to its accuracy,robustness and classifying ability,DPI is the main method used to identify P2P traffic.Adopting the advantages of TLI and DPI,a precise and efficient technology for P2P network traffic identification can be designed. 展开更多
关键词 PEER NODE Research on Traffic Identification technologies for Peer-to-Peer Networks UDP TLI PAIR TCP
在线阅读 下载PDF
ZTE to Highlight Latest Network Solutions and Technologies at Global Workshops
17
《ZTE Communications》 2005年第3期1-1,共1页
关键词 ZTE to Highlight Latest Network Solutions and technologies at Global Workshops line
在线阅读 下载PDF
Management of transport of dangerous goods based on networking technology
18
作者 GAO Lian-zhou 《International Journal of Technology Management》 2013年第8期44-46,共3页
Networking is the core area of national strategic emerging industry development of information industry; it will play an important role in national economic development. Currently, it is hot issue of global research a... Networking is the core area of national strategic emerging industry development of information industry; it will play an important role in national economic development. Currently, it is hot issue of global research at home and abroad regardless of the mention of its development of a national strategic level, it is called the third wave of the world information industry following the computer, and internet. 展开更多
关键词 Management of transport networking technology Logistics enterprises
在线阅读 下载PDF
The impact of network technologies on Higher Education Management and Countermeasures
19
作者 Yuexin CUI 《International Journal of Technology Management》 2014年第11期66-68,共3页
The 21 st century is an era of information technology, network technology is in all areas of life and production and also higher education administration began to apply network technology and network management. Howev... The 21 st century is an era of information technology, network technology is in all areas of life and production and also higher education administration began to apply network technology and network management. However, in the rapid development of information technology today, due to network with their own information technology, high-speed, information-based features are widely used in educational management in universities, so that some common problems on the network has infiltrated into university education management, making College Educational management in the New face new problems and challenges. Through the influence of network technology for Higher Education Management of the research on network technology we make a few constructive suggestions on education management application and Universities. 展开更多
关键词 network technologies Higher Education Management Information Technology
在线阅读 下载PDF
Research on the Application of Multimedia and Network Technologies in Higher Vocational Public English Reading Teaching
20
《International English Education Research》 2013年第12期23-25,共3页
To find out an effective way to improve higher vocational college students' reading abilities, the author designs an experiment that applying the multimedia and network technologies in the higher vocational public En... To find out an effective way to improve higher vocational college students' reading abilities, the author designs an experiment that applying the multimedia and network technologies in the higher vocational public English reading teaching to test whether the multimedia teaching mode is more effective than the traditional teaching mode in enhancing vocational college students' reading performance. The contrastive experiment is done for one semester and the experiment shows that if applying multimedia and network technologies in higher vocational public English reading teaching, creating authentic language environment, it can improve the classroom efficiency, improve students' English reading ability, thus forming the student-centered modem higher vocational public English reading teaching mode, 展开更多
关键词 Multimedia and network technologies Higher vocational public English reading Teaching mode
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部