期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
PDA利用模拟无线集群传输数据信息
1
作者 夏建康 《山东通信技术》 2006年第1期41-43,共3页
PDA是体积小、重量轻、操作方便的掌上电脑。由于市场价位不断降低,而质量、功能不断提高,所以在我国迅速得到推广。PDA本身具备通信功能.大多都提供软件的开发平台和工具软件,可以让有能力开发软件的单位在PDA上写自己的应用程序实现... PDA是体积小、重量轻、操作方便的掌上电脑。由于市场价位不断降低,而质量、功能不断提高,所以在我国迅速得到推广。PDA本身具备通信功能.大多都提供软件的开发平台和工具软件,可以让有能力开发软件的单位在PDA上写自己的应用程序实现自定义的功能。本文将对PDA在无线集群中的应用情况做个简单的介绍。 展开更多
关键词 PDA 集群 传输数据信息
在线阅读 下载PDF
按ISM要求设计船舶机务管理系统 被引量:2
2
作者 牛洪波 贾传荧 《中国水运》 北大核心 2004年第1期42-43,共2页
关键词 船舶机务管理系统 ISM 文件信息 SMS体系信息 传输数据信息 系统结构 数据库接口 网络结构
在线阅读 下载PDF
按ISM规则设计船舶机务管理系统
3
作者 牛洪波 贾传荧 《交通标准化》 2003年第12期36-39,共4页
现代通信与计算机技术的发展,特别是卫星通信技术的不断完善,为进一步提高机务管理水平创造了条件,通过机务管理系统可以提高企业的管理效率和管理水平,为企业带来显著的经济效益。
关键词 ISM规则 船舶 机务管理 信息管理系统 国际海事组织 文件信息 传输数据信息 数据库接口 网络结构 备件管理模块 油品管理模块 日常管理模块
在线阅读 下载PDF
A Survey on Information-Centric Networking: Rationales, Designs and Debates 被引量:8
4
作者 JIANG Xiaoke BI Jun +1 位作者 NAN Guoshun LI Zhaogeng 《China Communications》 SCIE CSCD 2015年第7期1-12,共12页
The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data.... The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data. The fundamental mismatch between data delivery and naming attachment points leads to a lot of challenges, e.g., mapping from data name to IP address, handling dynamics of underlying topology, scaling up the data distribution, and securing communication, etc. Informationcentric networking(ICN) is proposed to shift the focus of communication paradigm from where to what, by making the named data the first-class citizen in the network, The basic consensus of ICN is to name the data independent from its container(space dimension) and session(time dimension), which breaks the limitation of point-to-point IP semantic. It scales up data distribution by utilizing available resources, and facilitates communication to fit diverse connectivity and heterogeneous networks. However, there are only a few consensuses on the detailed design of ICN, and quite a few different ICN architectures are proposed. This paper reveals the rationales of ICN from the perspective of the Internet evolution, surveys different design choices, and discusses on two debatable topics in ICN, i.e.,self-certifying versus hierarchical names, and edge versus pervasive caching. We hope this survey helps clarify some mis-understandings on ICN and achieve more consensuses. 展开更多
关键词 information-centric networking content-centric networking future internet architecture named-data networking PUBLISH-SUBSCRIBE
在线阅读 下载PDF
Topology-Based Data Dissemination Approaches for Large Scale Data Centric Networking Architecture
5
作者 陈佳 张宏科 周华春 《China Communications》 SCIE CSCD 2013年第9期80-96,共17页
Massive information flows are gen- erated from interactive processing and visua- lizations. To efficiently support information transmission over the Interact, information cen- tric architecture has been recently propo... Massive information flows are gen- erated from interactive processing and visua- lizations. To efficiently support information transmission over the Interact, information cen- tric architecture has been recently proposed. In this paper, we consider an information centric architecture, called the data centric networking architecture to provide communication servi- ces to big data, where a service identifier is used to name the data objects. We propose dif- ferent approaches for the dissemination of data objects in a large-scale data centric network. In particular, we propose various approaches to link the data dissemination approach with the topology of the Internet. Further, we eva- luate the proposed approaches with respect to data delivery efficiency, round-trip time imp- rovement, and deployment cost. Based on the results obtained from this study, it can be sh- own that by disseminating data objects to small ISPs, the data delivery efficiency can be significantly improved within an acceptable deployment cost. 展开更多
关键词 data centric networking data dis-semination topology-based
在线阅读 下载PDF
A Reliable Routing Algorithm with Network Coding in Internet of Vehicles 被引量:1
6
作者 Zhen Wang Jianqing Li +2 位作者 Manlin Fang Yang Li Botao Feng 《China Communications》 SCIE CSCD 2017年第5期174-184,共11页
The intelligent vehicle network uses advanced information technology to establish an efficient integrated vehicle transport system, which has received great attention in industry and academia, lnternet of Vehicles (... The intelligent vehicle network uses advanced information technology to establish an efficient integrated vehicle transport system, which has received great attention in industry and academia, lnternet of Vehicles (loV) in an urban environment is operated in a wireless environment with high bit error rate and interference. In addition, the wireless link between vehicles is likely to be lost. All of this makes it an important challenge to provide reliable mobile routing in an urban traffic environment. In this paper, a reliable routing algorithm with network coding (RR_ NC) is proposed to solve the above problems. A routing node sequence is discovered in IoV from source to destination by multi-metric ant colony optimization algorithm (MACO), and then clusters are formed around every node in the sequence. By adding linear encoding into the transmission of data between vehicle's clusters, the RR_NC provides much more reliable transmission and can recover the original message in the event of disorder and loss of message. Simulations are taken under different scenarios, and the results prove that this novel algorithm can deliver the information more reliably between vehicles in real-time with lower data loss and communication overhead. 展开更多
关键词 intelligent transportation system (ITS) internet of vehicles (IoV) ROUTING CLUSTER network coding MOBILITY
在线阅读 下载PDF
Opportunistic Vector Perturbation with Superposition Signalling
7
作者 CHEN Rui LI Changle LI Jiandong 《China Communications》 SCIE CSCD 2015年第12期160-165,共6页
In this letter,we first put forward a new basic problem to the famous vector perturbation(VP) precoding that whether the extended constellation of VP could transmit more information bits.Then,we propose an opportunist... In this letter,we first put forward a new basic problem to the famous vector perturbation(VP) precoding that whether the extended constellation of VP could transmit more information bits.Then,we propose an opportunistic vector perturbation(OVP) precoding with superposition signalling scheme,which is aimed at getting the performance of VP closer to capacity limit.The main idea is using subsequent recoverable data symbol vector to perturb currently transmitting data symbol vector opportunistically.Analysis and simulation results show that the proposed OVP can transmit more valid information bits than conventional VP at the same transmit power,modulation order and number of antennas. 展开更多
关键词 transmit symbol opportunistic constellation perturbation subsequent closer downlink aimed antenna
在线阅读 下载PDF
Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud
8
作者 Yilun Wu Xicheng Lu +3 位作者 Jinshu Su Peixin Chen Xiaofeng Wang Bofeng Zhang 《China Communications》 SCIE CSCD 2017年第5期124-133,共10页
Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support ... Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support the keyword search in a public cloud. However,they have some potential limitations. First,most of the existing schemes only consider the scenario with the single data owner. Second,they need secure channels to guarantee the secure transmission of secret keys from the data owner to data users. Third,in some schemes,the data owner should be online to help data users when data users intend to perform the search,which is inconvenient.In this paper,we propose a novel searchable scheme which supports the multi-owner keyword search without secure channels. More than that,our scheme is a non-interactive solution,in which all the users only need to communicate with the cloud server. Furthermore,the analysis proves that our scheme can guarantee the security even without secure channels. Unlike most existing public key encryption based searchable schemes,we evaluate the performance of our scheme,which shows that our scheme is practical. 展开更多
关键词 keyword search cloud security secure channels proxy re-encryption
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部