首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
对移动云接入平台下的网络信息云服务的稳定性设计是保证网络运行和服务质量重点。传统的云接入设计算法采用移动通信频分复用算法,当在快速运动空间和自然界中进行云接入信道切换时,云服务的稳定性不好。提出一种基于移动通信节点衰减性能检测的高速移动环境下云接入平台下的网络信息云服务稳定设计方法。预测通信节点接收信号幅值的信噪比,对组合服务进行评价,实现云服务随机相位集成,提高系统稳定性。仿真结果表明,采用该算法能有效实现网络信息云服务稳定性增强,降低系统运行时间,提高系统可靠性,展示了较好的应用价值。  相似文献   

2.
在移动通信系统中,不同时段的通信负载不均匀导致了信道分配不均衡,需要进行信道分配均衡模型设计,传统方法采用移相键控的信道分配均衡模型设计,产生强烈的信道畸变和零点附近的幅度衰落,均衡效果不好。提出一种基于多时段随机超预算期望用户估计的移动通信信道分配均衡模型。计算路径的通信时间预算和通信超额时间,对所有信道进行实时计算,将性能值大于增益谱的信道取出,定义底层物理链路的距离,根据Central Limit Theorem理论,得到移动通信的多时段信道均衡强度的分配概率密度函数,进行多时段信道分配优化设计,基于多时段随机超预算期望用户估计结果,提高信道分配均衡性能。仿真结果表明,该算法能提高信号传输增益和移动通信信道抗干扰性能。  相似文献   

3.
移动通信WiFi网络与无线传感网络交叉组网时,容易产生同频干扰,影响通信质量和信道传输性能。在交叉组网过程中需要对同频干扰进行有效抑制,提高通信可靠性。传统的交叉组网同频干扰抑制算法采用盲源分离抗干扰算法,在交叉组网被动相干定位时时延较大,通信出现延迟。针对上述问题,提出一种改进的交叉组网同频干扰抑制算法,采用传统的盲源分离技术进行信道同频带内干扰噪声分离,对WiFi信道进行信息编码,采用OQPSK调制方法让整个网络都切换到选定的无干扰信道上,引入干扰避免机制,实现交叉组网信道优化设计。仿真实验表明,采用该算法进行同频干扰抑制和优化组网设计,有能效抑制重度的同频干扰,提高组网节点的吞吐量,保证了通信的可靠性。  相似文献   

4.
在多维异质网络中,由于承载不同的协议和网络,导致信道拥挤和分配不均衡。传统的多维异质网络信道分配算法采用基于信道切换的动态分配算法,在动态切换过程中易导致数据丢失和信道失衡。提出一种基于数据交叉项补偿机制的多维异质网络信道分配算法,进行多维异质网络信道协议分析与模型分析和求解,考虑用户间接收SINR的公平性,构建信道性能因子,引入一个局部性交叉项补偿信道切换中的失衡性实现算法改进。实验结果表明,改进算法使异质网络生命周期得到扩展,有利于数据的准确传输,避免在信道分配动态切换过程中导致的数据丢失和信道失衡,提高了分配效率和准确性,有效地保证了各用户接收SINR的公平性,信道分配性能上优越于传统算法,展示了较好的应用价值。  相似文献   

5.
为了提高入侵破坏后网络信道通信性能,按照入侵破坏后网络信道的衰减特征,融合自适应比特以及功率划分方法,提出基于节点可信度子信道等效改进的网络衰减信道通信优化方法,采用基于节点可信度的信道分配方案,对关键链路优先分配信道,降低链路冲突,实现网络通信信道的初步优化,再通过子信道等效改进方法,在信道已经被入侵破坏的基础上,在传递总比特数一定时,依据发送功率最小化模型,综合分析特性相同或相近的子信道,降低已经被入侵破坏后的网络信道通信信令负荷,完成被破坏网络信道通信的再次优化。仿真结果表明,该方法可有效降低被破坏网络链路冲突率和数据丢包率,提高了衰减网络通信性能。  相似文献   

6.
为了保证无线传感网络中任务节点负载的水平相当,延长网络的生命周期,需要对物联网环境下任务节点负载动态非对称分配系统进行设计。为此,提出一种基于单片机的任务节点负载动态非对称分配系统设计方法。该方法首先对任务节点负载动态非对称分配系统硬件进行设计,硬件部分主要由微处理器、节点电压的采样电路、节点电流的采样电路、节点传输的模块以及电路模块和节点通信模块构成。软件部分利用节点分配算法对任务节点负载动态非对称分配进行计算,结合硬件与软件部分设计完成对物联网环境下任务节点负载动态非对称分配系统设计。实验结果表明,该方法能有效地解决节点负载动态非对称分配不均衡的问题,提高了无线传感网络的生命周期。  相似文献   

7.
为提高网络节点负载能力和网络整体安全性能,根据网络节点拓扑中有限节点资源具有局部选择性和多样安全性,提出一种基于"业务—服务—构件"BSC模型的网络节点拓扑异构安全建模思想。构造一种混合核函数,进行网络负载局部选择性最优模型构建。通过网络平台构建和仿真实验,结果表明,采用局部选择性异构设计,能在增加网络节点平均负载率的情况下可降低网络节点最大负载率从而使得网络负载均衡。异构后的网络节点安全承载能力增加了5%左右。网络中节点负载更趋均衡,保证网络使用性能和安全性能。  相似文献   

8.
在移动云计算中,通过无线通信方式实现数据调度和传输,移动云计算通信信道具有时变特性,对其有效的信道均衡和相位估计是保证云计算质量的基础。传统的时变通信信道估计算法采用多模盲均衡算法,出现码间干扰和相位失衡。提出一种基于二次调频双稳态检测的移动云计算中的时变通信信道估计算法。首先进行移动云计算的通信信道模型构建,基于协议信道邻居构建的通信功率增益模型,进行信道划分协议设计,设计二次调频双稳态检测算法,采用同步算法减少系统子载波间的正交性抑制,得到移动云计算通信系统信道均衡系统,检测移动云计算信道的时变特征,实现准确估计,通过仿真实验进行性能验证。仿真结果表明,该算法具有较大的信道估计性能,抗干扰能力提高,信息增益提高,在云计算通信中具有较好的稳健性。  相似文献   

9.
在多媒体无线传感器网络中,网络信道密集,路由表转发和链路估计过程中会在网络密集信道中产生间歇性混叠谱。混叠谱频段消耗大量能量,需要对间歇性混叠谱频段的功耗进行负载均衡设计,提高网络的生存能力。提出一种基于路由引擎链路转发机制的网络密集信道间歇性混叠谱频段功耗测试方法,实现网络的负载与功耗的均衡。构建WMSN路由节点数据传输模型与网络模型,分析网络密集信道中的间歇性混叠谱的产生激励及能量消耗计算方法,得到无线传感器网络中各个节点发射信号能量脉冲偏移,计算路由引擎链路转发机制下的间歇性混叠频段联合特征均方误差,实现网络的负载与功耗的均衡,达到网络密集信道中间歇性混叠频段功耗测试的目的。仿真实验表明,该算法具有较好的功耗负载均衡性能,传输相同多媒体视频信息数据,功耗测试表明算法能节省能量开销45%,从而提高了网络的生存能力。  相似文献   

10.
一种基于模糊控制的3G-WLAN垂直切换算法   总被引:1,自引:0,他引:1  
何晴  陈光 《科技通报》2010,26(2):261-264
3G蜂窝网络与无线局域网(WLAN)的融合是下一代移动通信的发展趋势。在两种异构网络间实现垂直切换,保持移动节点的服务不中断,是解决融合问题的关键技术。本文提出一种基于模糊控制的3G-WLAN垂直切换算法。该算法从信噪比、网络带宽、费用3个方面进行考虑,采用模糊控制的方法,判断网络综合性能,最终做出切换决定。仿真分析表明,与传统算法相比,本文提出的算法能够综合多种影响切换的因素,做出准确的切换决定,有效消除乒乓效应。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

14.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

15.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

16.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

17.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

18.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号