期刊文献+
共找到163篇文章
< 1 2 9 >
每页显示 20 50 100
Hydrogenation and Doping Induced One-Dimensional High-Temperature Superconductivity in carbon Nanotube
1
作者 Hao Wang Bao-Tong Liu +5 位作者 Shu-Xiang Qiao Na Jiao Guili Yu Ping Zhang C.S.Ting Hong-Yan Lu 《Chinese Physics Letters》 2026年第1期198-210,共13页
In recent years,the research on superconductivity in one-dimensional(1D)materials has been attracting increasing attention due to its potential applications in low-dimensional nanodevices.However,the critical temperat... In recent years,the research on superconductivity in one-dimensional(1D)materials has been attracting increasing attention due to its potential applications in low-dimensional nanodevices.However,the critical temperature(T_(c))of 1D superconductors is low.In this work,we theoretically investigate the possible high T_(c) superconductivity of(5,5)carbon nanotube(CNT).The pristine(5,5)CNT is a Dirac semimetal and can be modulated into a semiconductor by full hydrogenation.Interestingly,by further hole doping,it can be regulated into a metallic state with the sp3-hybridized𝜎electrons metalized,and a giant Kohn anomaly appears in the optical phonons.The two factors together enhance the electron–phonon coupling,and lead to high-T_(c) superconductivity.When the hole doping concentration of hydrogenated-(5,5)CNT is 2.5 hole/cell,the calculated T_(c) is 82.3 K,exceeding the boiling point of liquid nitrogen.Therefore,the predicted hole-doped hydrogenated-(5,5)CNT provides a new platform for 1D high-T_(c) superconductivity and may have potential applications in 1D nanodevices. 展开更多
关键词 high temperature superconductivity DOPING critical temperature dirac semimetal one dimensional materials HYDROGENATION full hydrogenationinterestinglyby hole dopingit
原文传递
Informationization of coal enterprises and digital mine 被引量:3
2
作者 卢建军 王晓路 +1 位作者 马莉 赵安新 《Journal of Coal Science & Engineering(China)》 2008年第3期512-516,共5页
Analyzed the main problems which were found in current conditions and prob- lems of informationization in coal enterprises.It clarified how to achieve informationization in coal mine and put forward a general configur... Analyzed the main problems which were found in current conditions and prob- lems of informationization in coal enterprises.It clarified how to achieve informationization in coal mine and put forward a general configuration of informationization construction in which informationization in coal enterprises was divided into two parts: informationization of safety production and informationization of management.Planned a platform of inte- grated management of informationization in coal enterprises.Ultimately,it has brought forward that an overall integrated digital mine is the way to achieve the goal of informa- tionization in coal enterprises,which can promote the application of automation,digitaliza- tion,networking,informaitionization to intellectualization.At the same time,the competi- tiveness of enterprises can be improved entirely,and new type of coal industry can be supported by information technology. 展开更多
关键词 informationization coal enterprises digital mine safety production MANAGEMENT
在线阅读 下载PDF
Tailoring d-band center over electron traversing effect of Ni M@C-CoP(M=Zn,Mo,Ni,Co)for high-performance electrocatalysis hydrogen evolution 被引量:2
3
作者 Hao Luo Xudong Zhang +5 位作者 Hui Zhu Kexin Zhang Fan Yang Kewei Xu Sen Yu Dagang Guo 《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 2023年第35期164-172,共9页
Attaining a highly efficient and inexpensive electrocatalyst is significant for the hydrogen evolution reaction(HER)but still challenging nowadays.The transition-metal phosphides(TMPs)catalysts with platinum-like elec... Attaining a highly efficient and inexpensive electrocatalyst is significant for the hydrogen evolution reaction(HER)but still challenging nowadays.The transition-metal phosphides(TMPs)catalysts with platinum-like electronic structures are a potential candidate for the HER,but those are prone to be strongly bound with hydrogen intermediates(H∗),resulting in sluggish HER kinetics.Herein we report a unique hybrid structure of CoP anchored on graphene nanoscrolls@carbon nano tubes(CNTs)scaffold(Ni M@C-CoP)encapsulating various Ni M(M=Zn,Mo,Ni,Co)bimetal nanoalloy via chemical vapor deposi-tion(CVD)growth of CNT on graphene nanoscrolls followed by the impregnation of cobalt precursors and phosphorization for efficiently electrocatalytic hydrogen evolution.CoP nanoparticles mainly scattered at the tip of CNT branches which exhibited the analogical“Three-layer core-shell”structures.Experiments and density functional theory(DFT)calculations consistently disclose that the encapsulated various NiMs can offer different numbers of electrons to weaken the interactions of outmost CoP with H∗and push the downshift of the d-band center to different degrees as well as stabilize the outmost CoP nanopar-ticles to gain catalytic stability via the electron traversing effect.The electrocatalytic HER activity can be maximumly enhanced with low overpotentials of 78 mV(alkaline)and 89 mV(acidic)at a current density of 10 mA/cm^(2) and sustained at least 24 h especially for NiZn@C-CoP catalyst.This novel system is distinct from conventional three-layer heterostructure,providing a specially thought of d-band center control engineering strategy for the design of heterogeneous catalysts and expanding to other electrocat-alysts,energy storage,sensing,and other applications. 展开更多
关键词 Electron traversing effect 3D graphene/CNT CoP nanoparticle d-band center Hydrogen evolution
原文传递
A Survey of Security Issues in Cognitive Radio Networks 被引量:9
4
作者 LI Jianwu FENG Zebing +1 位作者 FENG Zhiyong ZHANG Ping 《China Communications》 SCIE CSCD 2015年第3期132-150,共19页
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili... In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs. 展开更多
关键词 CRNs security physical layer security security capacity active attacks passive attacks
在线阅读 下载PDF
Application-aware routing with QoS support in SDN networks 被引量:1
5
作者 张泽鑫 Li Jun Wu Haibo 《High Technology Letters》 EI CAS 2016年第4期404-411,共8页
Software defined networking( SDN) offers programmable interface to effectively control their networks by decoupling control and data plane. The network operators utilize a centralized controller to deploy advanced net... Software defined networking( SDN) offers programmable interface to effectively control their networks by decoupling control and data plane. The network operators utilize a centralized controller to deploy advanced network management strategies. An architecture for application-aware routing which can support dynamic quality of service( Qo S) in SDN networks is proposed. The applicationaware routing as a multi-constrained optimal path( MCOP) problem is proposed,where applications are treated as Qo S flow and best-effort flows. With the SDN controller applications,it is able to dynamically lead routing decisions based on application characteristics and requirements,leading to a better overall user experience and higher utilization of network resources. The simulation results show that the improvement of application-aware routing framework on discovering appropriate routes,which can provide Qo S guarantees for a specific application in SDN networks. 展开更多
关键词 application aware software defined networking(SDN) networks quality of service(Qo S) multiple constraints path selection
在线阅读 下载PDF
Power Control and Routing Selection for Throughput Maximization in Energy Harvesting Cognitive Radio Networks 被引量:2
6
作者 Xiaoli He Hong Jiang +1 位作者 Yu Song Muhammad Owais 《Computers, Materials & Continua》 SCIE EI 2020年第6期1273-1296,共24页
This paper investigates the power control and routing problem in the communication process of an energy harvesting(EH)multi-hop cognitive radio network(CRN).The secondary user(SU)nodes(i.e.,source node and relay nodes... This paper investigates the power control and routing problem in the communication process of an energy harvesting(EH)multi-hop cognitive radio network(CRN).The secondary user(SU)nodes(i.e.,source node and relay nodes)harvest energy from the environment and use the energy exclusively for transmitting data.The SU nodes(i.e.,relay nodes)on the path,store and forward the received data to the destination node.We consider a real world scenario where the EH-SU node has only local causal knowledge,i.e.,at any time,each EH-SU node only has knowledge of its own EH process,channel state and currently received data.In order to study the power and routing issues,an optimization problem that maximizes path throughput considering quality of service(QoS)and available energy constraints is proposed.To solve this optimization problem,we propose a hybrid game theory routing and power control algorithm(HGRPC).The EH-SU nodes on the same path cooperate with each other,but EH-SU nodes on the different paths compete with each other.By selecting the best next hop node,we find the best strategy that can maximize throughput.In addition,we have established four steps to achieve routing,i.e.,route discovery,route selection,route reply,and route maintenance.Compared with the direct transmission,HGRPC has advantages in longer distances and higher hop counts.The algorithm generates more energy,reduces energy consumption and increases predictable residual energy.In particular,the time complexity of HGRPC is analyzed and its convergence is proved.In simulation experiments,the performance(i.e.,throughput and bit error rate(BER))of HGRPC is evaluated.Finally,experimental results show that HGRPC has higher throughput,longer network life,less latency,and lower energy consumption. 展开更多
关键词 Cognitive radio networks power control routing selection energy harvesting game theory amplify-and-forward(AF) THROUGHPUT
在线阅读 下载PDF
Safety Protection Design of Virtual Machine Drift Flow in Cloud Data Center Based on VXLAN Technology 被引量:1
7
作者 Heping Pu Yijun Wang Xinke An 《Journal of Computer and Communications》 2020年第8期45-58,共14页
Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper... Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper focuses on the overall architecture of cloud platform as well as the design of virtualization security architecture. Meantime, it introduces the key technologies of VXLAN in detail. The scheme realizes flexible scheduling of security resources through virtual pooling of independent security gateway and virtual machine isolation through VXLAN technology. Moreover, it guides all horizontal traffic to independent security gateway for processing, unified management of security gateway through cloud platform by using Huawei NSH business chain technology. This scheme effectively solves the horizontal transmission of security threat among virtual machines, and realizes the fine security control and protection for the campus data center. 展开更多
关键词 Network Security Cloud Platform Virtualization Technology VXLAN Horizontal Traffic
在线阅读 下载PDF
Identifier Management of Industrial Internet Based on Multi-Identifier Network Architecture 被引量:1
8
作者 WANG Yunmin LI Hui +4 位作者 XING Kaixuan HOU Hanxu Yunghsiang SHAN LIU Ji SUN Tao 《ZTE Communications》 2020年第1期36-43,共8页
The industrial Internet realizes intelligent control and optimized operation of the industrial system through network interconnection.The industrial Internet identifier is the core element to accomplish this task.The ... The industrial Internet realizes intelligent control and optimized operation of the industrial system through network interconnection.The industrial Internet identifier is the core element to accomplish this task.The traditional industrial Internet identifier resolution technologies depend excessively on IP networks,and cannot meet the requirements of ubiquitous resource-restraint Internet of Things(IoT)devices.An industrial Internet identifier resolution management strategy based on multi-identifier network architecture is proposed in this paper,which supports content names,identities,locations,apart from the traditional IP address.The application of multiple types of identifiers not only solves the problem of IP addresses exhaustion,but also enhances the security,credibility,and availability of the industrial Internet identification resolution system.An inter-translation scheme between multiple identifiers is designed to support multiple identifiers and the standard ones.We present an addressing and routing algorithm for identifier resolution to make it convenient to put our strategy into practice. 展开更多
关键词 identifier resolution industrial Internet inter-translation multiple identifier routing and addressing
在线阅读 下载PDF
Super Node Routing Strategy in Content-Centric Networking
9
作者 苗春浇 张宏科 +2 位作者 周华春 董平 沈烁 《Transactions of Tianjin University》 EI CAS 2015年第2期122-128,共7页
There were two strategies for the data forwarding in the content-centric networking(CCN): forwarding strategy and routing strategy. Forwarding strategy only considered a separated node rather than the whole network pe... There were two strategies for the data forwarding in the content-centric networking(CCN): forwarding strategy and routing strategy. Forwarding strategy only considered a separated node rather than the whole network performance, and Interest flooding led to the network overhead and redundancy as well. As for routing strategy in CCN, each node was required to run the protocol. It was a waste of routing cost and unfit for large-scale deployment.This paper presents the super node routing strategy in CCN. Some super nodes selected from the peer nodes in CCN were used to receive the routing information from their slave nodes and compute the face-to-path to establish forwarding information base(FIB). Then FIB was sent to slave nodes to control and manage the slave nodes. The theoretical analysis showed that the super node routing strategy possessed robustness and scalability, achieved load balancing,reduced the redundancy and improved the network performance. In three topologies, three experiments were carried out to test the super node routing strategy. Network performance results showed that the proposed strategy had a shorter delay, lower CPU utilization and less redundancy compared with CCN. 展开更多
关键词 content-centric NETWORKING ROUTING STRATEGY super NODES SLAVE NODES
在线阅读 下载PDF
A Data Transmission Path Optimization Protocol for Heterogeneous Wireless Sensor Networks Based on Deep Reinforcement Learning 被引量:1
10
作者 Yu Song Zhigui Liu Xiaoli He 《Journal of Computer and Communications》 2023年第8期165-180,共16页
Wireless sensor networks had become a hot research topic in Information science because of their ability to collect and process target information periodically in a harsh or remote environment. However, wireless senso... Wireless sensor networks had become a hot research topic in Information science because of their ability to collect and process target information periodically in a harsh or remote environment. However, wireless sensor networks were inherently limited in various software and hardware resources, especially the lack of energy resources, which is the biggest bottleneck restricting their further development. A large amount of research had been conducted to implement various optimization techniques for the problem of data transmission path selection in homogeneous wireless sensor networks. However, there is still great room for improvement in the optimization of data transmission path selection in heterogeneous wireless sensor networks (HWSNs). This paper proposes a data transmission path selection (HDQNs) protocol based on Deep reinforcement learning. In order to solve the energy consumption balance problem of heterogeneous nodes in the data transmission path selection process of HWSNs and shorten the communication distance from nodes to convergence, the protocol proposes a data collection algorithm based on Deep reinforcement learning DQN. The algorithm uses energy heterogeneous super nodes as AGent to take a series of actions against different states of HWSNs and obtain corresponding rewards to find the best data collection route. Simulation analysis shows that the HDQN protocol outperforms mainstream HWSN data transmission path selection protocols such as DEEC and SEP in key performance indicators such as overall energy efficiency, network lifetime, and system robustness. 展开更多
关键词 HWSNs Clusting Deep Reinforcement Learning DQN
在线阅读 下载PDF
Cost management based security framework in mobile ad hoc networks
11
作者 YANG Rui-jun XIA Qi +2 位作者 PAN Qun-hua WANG Wei-nong LI Ming-lu 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期493-501,共9页
Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their ... Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks. 展开更多
关键词 Network attacks Mobile ad hoc Cost management Security framework
在线阅读 下载PDF
Optimization of Route Repair in Mobile Ad-hoc Network
12
作者 李承 汪为农 《Journal of Shanghai University(English Edition)》 CAS 2004年第2期169-176,共8页
A main shortcoming of mobile Ad-hoc network's reactive routing protocols is the large volume of far-reaching control traffic required to support the route discovery (RD) and route repair (RR) mechanism. Using a ra... A main shortcoming of mobile Ad-hoc network's reactive routing protocols is the large volume of far-reaching control traffic required to support the route discovery (RD) and route repair (RR) mechanism. Using a random mobility model, this paper derives the probability equation of the relative distance (RDIS) between any two mobile hosts in an ad-hoc network. Consequently, combining with average equivalent hop distance (AEHD), a host can estimate the routing hops between itself and any destination host each time the RD/RR procedure is triggered, and reduce the flooding area of RD/RR messages. Simulation results show that this optimized route repair (ORR) algorithm can significantly decrease the communication overhead of RR process by about 35%. 展开更多
关键词 mobile ad-hoc network mobility model routing protocol optimized routing repair
在线阅读 下载PDF
Edge computing oriented virtual optical network mapping scheme based on fragmentation prediction
13
作者 何烁 BAI Huifeng +1 位作者 HUO Chao ZHANG Ganghong 《High Technology Letters》 EI CAS 2024年第2期158-163,共6页
As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model... As edge computing services soar,the problem of resource fragmentation situation is greatly worsened in elastic optical networks(EON).Aimed to solve this problem,this article proposes the fragmentation prediction model that makes full use of the gate recurrent unit(GRU)algorithm.Based on the fragmentation prediction model,one virtual optical network mapping scheme is presented for edge computing driven EON.With the minimum of fragmentation degree all over the whole EON,the virtual network mapping can be successively conducted.Test results show that the proposed approach can reduce blocking rate,and the supporting ability for virtual optical network services is greatly improved. 展开更多
关键词 elastic optical networks virtual optical network fragmentation self-awareness edge computing
在线阅读 下载PDF
Social Network Analysis of COVID-19 Research and the Changing International Collaboration Structure
14
作者 秦野 陈蓉蓉 《Journal of Shanghai Jiaotong university(Science)》 EI 2024年第1期150-160,共11页
Research in Information Science and interdisciplinary areas suggested the formation of a growing network of international research collaboration.The massive transmission of COVID-19 worldwide especially after the iden... Research in Information Science and interdisciplinary areas suggested the formation of a growing network of international research collaboration.The massive transmission of COVID-19 worldwide especially after the identification of the Omicron variant could fundamentally alter the factors shaping the network's development.This study employs network analysis methods to analyze the structure of the COVID-19 research collaboration from 2020 to 2022,using two major academic publication databases and the VOSviewer software.A novel temporal view is added by examining the dynamic changes of the network,and a fractional counting method is adopted as methodological improvements to previous research.Analysis reveals that the COVID-19 research network structure has undergone substantial changes over time,as collaborating countries and regions form and re-form new clusters.Transformations in the network can be partly explained by key developments in the pandemic and other social-political events.China as one of the largest pivots in the network formed a relatively distinct cluster,with potential to develop a larger Asia-Pacific collaboration cluster based on its research impact. 展开更多
关键词 COVID-19 international research collaboration network analysis high interdisciplinary research
原文传递
Situational Awareness Technology in Network Security
15
作者 YeZheng-wang 《International Journal of Technology Management》 2014年第4期42-44,共3页
With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security ri... With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security risks and the type of attack, and provide preventive strategy is to network managers have been pursuing the goal of network security situational awareness can speak a variety of services and associated data as a highly organic whole, summarized network security and dependency relationships come more comprehensive, complete, accurate decision-making for network security assessment and countermeasures. 展开更多
关键词 NETWORK SAFETY situational awareness INVASION APPLICATION
在线阅读 下载PDF
Energy Aware Routing Protocol for Cognitive Radio Networks
16
作者 Yu Song Xiaoli He Ralf Volker Binsack 《Wireless Sensor Network》 2017年第3期103-115,共13页
In this article, a routing protocol EARP (Energy Aware Routing Protocol) with the terminal node is proposed, to deal with the impact of the limited energy resources of Cognitive Radio Networks on the whole network rou... In this article, a routing protocol EARP (Energy Aware Routing Protocol) with the terminal node is proposed, to deal with the impact of the limited energy resources of Cognitive Radio Networks on the whole network routing. The protocol allows choosing the route from the neighbor nodes in different transmission paths, according to energy consumption of a single node and the full path. If the path breaks, the protocol will increase local routing maintenance strategy. It effectively reduces the retransmission caused by the situation, and improves the routing efficiency. It also can prevent the link transmission process selecting the fault route due to the energy depletion. Through simulation experiments compared with the LEACH (Low Energy Adaptive Clustering Hierarchy) routing protocol, the results showed that in the same experimental environment, the proposed EARP could obviously balance the load, protect low energy nodes, prolong the network survival time and reduce packet loss rate and packet delay of data delivery. So it can improve the energy consumption of sensing node and provide routing capabilities. 展开更多
关键词 ENERGY Aware Routing Protocol ROUTE STRATEGY ROUTE Maintenance STRATEGY Network LIFETIME Packet Loss Rate Relative Residual ENERGY
在线阅读 下载PDF
A Graph Neural Network Recommendation Based on Long-and Short-Term Preference
17
作者 Bohuai Xiao Xiaolan Xie Chengyong Yang 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期3067-3082,共16页
The recommendation system(RS)on the strength of Graph Neural Networks(GNN)perceives a user-item interaction graph after collecting all items the user has interacted with.Afterward the RS performs neighborhood aggregat... The recommendation system(RS)on the strength of Graph Neural Networks(GNN)perceives a user-item interaction graph after collecting all items the user has interacted with.Afterward the RS performs neighborhood aggregation on the graph to generate long-term preference representations for the user in quick succession.However,user preferences are dynamic.With the passage of time and some trend guidance,users may generate some short-term preferences,which are more likely to lead to user-item interactions.A GNN recommendation based on long-and short-term preference(LSGNN)is proposed to address the above problems.LSGNN consists of four modules,using a GNN combined with the attention mechanism to extract long-term preference features,using Bidirectional Encoder Representation from Transformers(BERT)and the attention mechanism combined with Bi-Directional Gated Recurrent Unit(Bi-GRU)to extract short-term preference features,using Convolutional Neural Network(CNN)combined with the attention mechanism to add title and description representations of items,finally inner-producing long-term and short-term preference features as well as features of items to achieve recommendations.In experiments conducted on five publicly available datasets from Amazon,LSGNN is superior to state-of-the-art personalized recommendation techniques. 展开更多
关键词 Recommendation systems graph neural networks deep learning data mining
在线阅读 下载PDF
Development Trend Analysis of Computer Management Information System
18
作者 Weili Zhang Changsheng Zhang +1 位作者 Chenghao Han Hongquan Li 《Journal of Electronic Research and Application》 2020年第1期7-13,共7页
Based on the retrospect and analysis of the main points of the development of computer management information system,on the basis of the study of relevant data such as enterprise units,mass media,personal information ... Based on the retrospect and analysis of the main points of the development of computer management information system,on the basis of the study of relevant data such as enterprise units,mass media,personal information and information security,and according to the actual situation of our country,this paper intentionally and systematically collects relevant research materials on the role of management information system in the survival and development of enterprises,and aims at one or more merits.To study its impact,this paper focuses on three aspects:application analysis,development direction and implementation strategy,which can provide strong reference and guidance for the application of enterprise computer management system. 展开更多
关键词 Management INFORMATION system DEVELOPMENT TREND REALIZATION STRATEGY
在线阅读 下载PDF
Resource Allocation for Throughput Maximization in Cognitive Radio Network with NOMA
19
作者 Xiaoli He Yu Song +3 位作者 Yu Xue Muhammad Owais Weijian Yang Xinwen Cheng 《Computers, Materials & Continua》 SCIE EI 2022年第1期195-212,共18页
Spectrum resources are the precious and limited natural resources.In order to improve the utilization of spectrum resources and maximize the network throughput,this paper studies the resource allocation of the downlin... Spectrum resources are the precious and limited natural resources.In order to improve the utilization of spectrum resources and maximize the network throughput,this paper studies the resource allocation of the downlink cognitive radio network with non-orthogonalmultiple access(CRN-NOMA).NOMA,as the key technology of the fifth-generation communication(5G),can effectively increase the capacity of 5G networks.The optimization problem proposed in this paper aims to maximize the number of secondary users(SUs)accessing the system and the total throughput in the CRN-NOMA.Under the constraints of total power,minimum rate,interference and SINR,CRN-NOMA throughput is maximized by allocating optimal transmission power.First,for the situation of multiple sub-users,an adaptive optimization method is proposed to reduce the complexity of the optimization solution.Secondly,for the optimization problem of nonlinear programming,a maximization throughput optimization algorithm based on Chebyshev and convex(MTCC)for CRN-NOMA is proposed,which converts multi-objective optimization problem into single-objective optimization problem to solve.At the same time,the convergence and time complexity of the algorithm are verified.Theoretical analysis and simulation results show that the algorithm can effectively improve the system throughput.In terms of interference and throughput,the performance of the sub-optimal solution is better than that of orthogonal-frequency-division-multiple-access(OFDMA).This paper provides important insights for the research and application of NOMA in future communications. 展开更多
关键词 Resource allocation non-orthogonal multiple access cognitive radio network throughput maximization CHEBYSHEV CONVEX
在线阅读 下载PDF
Imrusion Detection and Firewall Technology Combines Applied Research in the Campus Network
20
作者 Zhengwang Ye Yuhong Zheng 《Journal of Zhouyi Research》 2014年第1期39-41,共3页
关键词 校园网络管理 入侵检测技术 防火墙技术 校园网络安全 应用 网络入侵 网络信息安全 安全威胁
在线阅读 下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部