期刊文献+
共找到316篇文章
< 1 2 16 >
每页显示 20 50 100
Data Aggregation Scheduling with Guaranteed Lifetime and Efficient Latency in Wireless Sensor Networks 被引量:4
1
作者 Chen Zhengyu Yang Geng +3 位作者 Chen Lei Xu Jian Wang Haiyong Yang Zhen 《China Communications》 SCIE CSCD 2012年第9期11-21,共11页
In scenarios of real-time data collection of long-term deployed Wireless Sensor Networks (WSNs), low-latency data collection with long net- work lifetime becomes a key issue. In this paper, we present a data aggrega... In scenarios of real-time data collection of long-term deployed Wireless Sensor Networks (WSNs), low-latency data collection with long net- work lifetime becomes a key issue. In this paper, we present a data aggregation scheduling with guaran- teed lifetime and efficient latency in WSNs. We first Construct a Guaranteed Lifetime Mininmm Ra- dius Data Aggregation Tree (GLMRDAT) which is conducive to reduce scheduling latency while pro- viding a guaranteed network lifetime, and then de-sign a Greedy Scheduling algorithM (GSM) based on finding the nmzximum independent set in conflict graph to schedule he transmission of nodes in the aggregation tree. Finally, simulations show that our proposed approach not only outperfonm the state-of-the-art solutions in terms of schedule latency, but also provides longer and guaranteed network lifetilre. 展开更多
关键词 WSNs data aggregation aggregationscheduling network lifetime LATENCY
在线阅读 下载PDF
A Survey on the Privacy-Preserving Data Aggregation in Wireless Sensor Networks 被引量:4
2
作者 XU Jian YANG Geng +1 位作者 CHEN Zhengyu WANG Qianqian 《China Communications》 SCIE CSCD 2015年第5期162-180,共19页
Wireless sensor networks(WSNs)consist of a great deal of sensor nodes with limited power,computation,storage,sensing and communication capabilities.Data aggregation is a very important technique,which is designed to s... Wireless sensor networks(WSNs)consist of a great deal of sensor nodes with limited power,computation,storage,sensing and communication capabilities.Data aggregation is a very important technique,which is designed to substantially reduce the communication overhead and energy expenditure of sensor node during the process of data collection in a WSNs.However,privacy-preservation is more challenging especially in data aggregation,where the aggregators need to perform some aggregation operations on sensing data it received.We present a state-of-the art survey of privacy-preserving data aggregation in WSNs.At first,we classify the existing privacy-preserving data aggregation schemes into different categories by the core privacy-preserving techniques used in each scheme.And then compare and contrast different algorithms on the basis of performance measures such as the privacy protection ability,communication consumption,power consumption and data accuracy etc.Furthermore,based on the existing work,we also discuss a number of open issues which may intrigue the interest of researchers for future work. 展开更多
关键词 wireless sensor networks data aggregation PRIVACY-PRESERVING
在线阅读 下载PDF
An Efficient and Privacy-Preserving Data Aggregation Scheme Supporting Arbitrary Statistical Functions in IoT 被引量:2
3
作者 Haihui Liu Jianwei Chen +2 位作者 Liwei Lin Ayong Ye Chuan Huang 《China Communications》 SCIE CSCD 2022年第6期91-104,共14页
The Internet of Things(IoT)has profoundly impacted our lives and has greatly revolutionized our lifestyle.The terminal devices in an IoT data aggregation application sense real-time data for the remote cloud server to... The Internet of Things(IoT)has profoundly impacted our lives and has greatly revolutionized our lifestyle.The terminal devices in an IoT data aggregation application sense real-time data for the remote cloud server to achieve intelligent decisions.However,the high frequency of collecting user data will raise people concerns about personal privacy.In recent years,many privacy-preserving data aggregation schemes have been proposed.Unfortunately,most existing schemes cannot support either arbitrary aggregation functions,or dynamic user group management,or fault tolerance.In this paper,we propose an efficient and privacy-preserving data aggregation scheme.In the scheme,we design a lightweight encryption method to protect the user privacy by using a ring topology and a random location sequence.On this basis,the proposed scheme supports not only arbitrary aggregation functions,but also flexible dynamic user management.Furthermore,the scheme achieves faulttolerant capabilities by utilizing a future data buffering mechanism.Security analysis reveals that the scheme can achieve the desired security properties,and experimental evaluation results show the scheme's efficiency in terms of computational and communication overhead. 展开更多
关键词 Internet of Things data aggregation privacy protection arbitrary aggregation functions
在线阅读 下载PDF
A Path-Based Approach for Data Aggregation in Grid-Based Wireless Sensor Networks 被引量:1
4
作者 Neng-Chung Wang Yung-Kuei Chiang Chih-Hung Hsieh 《Journal of Electronic Science and Technology》 CAS 2014年第3期313-317,共5页
Sensor nodes in a wireless sensor network (WSN) are typically powered by batteries, thus the energy is constrained. It is our design goal to efficiently utilize the energy of each sensor node to extend its lifetime,... Sensor nodes in a wireless sensor network (WSN) are typically powered by batteries, thus the energy is constrained. It is our design goal to efficiently utilize the energy of each sensor node to extend its lifetime, so as to prolong the lifetime of the whole WSN. In this paper, we propose a path-based data aggregation scheme (PBDAS) for grid-based wireless sensor networks. In order to extend the lifetime of a WSN, we construct a grid infrastructure by partitioning the whole sensor field into a grid of cells. Each cell has a head responsible for aggregating its own data with the data sensed by the others in the same cell and then transmitting out. In order to efficiently and rapidly transmit the data to the base station (BS), we link each cell head to form a chain. Each cell head on the chain takes turn becoming the chain leader responsible for transmitting data to the BS. Aggregated data moves from head to head along the chain, and finally the chain leader transmits to the BS. In PBDAS, only the cell heads need to transmit data toward the BS. Therefore, the data transmissions to the BS substantially decrease. Besides, the cell heads and chain leader are designated in turn according to the energy level so that the energy depletion of nodes is evenly distributed. Simulation results show that the proposed PBDAS extends the lifetime of sensor nodes, so as to make the lifetime of the whole network longer. 展开更多
关键词 Base station cell head data aggregation grid-based wireless sensor networks
在线阅读 下载PDF
Secure Data Aggregation Approach Based on Monitoring in Wireless Sensor Networks 被引量:1
5
作者 Dong Xiaomei Li Shanshan 《China Communications》 SCIE CSCD 2012年第6期14-27,共14页
In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid... In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption. 展开更多
关键词 data aggregation wireless sensor net-work MONITORING on-off attack RECOVERY
在线阅读 下载PDF
Injury severity analysis: comparison of multilevel logistic regression models and effects of collision data aggregation 被引量:1
6
作者 Taimur Usman Liping Fu Luis F.Miranda-Moreno 《Journal of Modern Transportation》 2016年第1期73-87,共15页
This paper describes an empirical study aiming at identifying the main differences between different logistic regression models and collision data aggregation methods that are commonly applied in road safety literatur... This paper describes an empirical study aiming at identifying the main differences between different logistic regression models and collision data aggregation methods that are commonly applied in road safety literature for modeling collision severity. In particular, the research compares three popular multilevel logistic models (i.e., sequential binary logit models, ordered logit models, and multinomial logit models) as well as three data aggregation methods (i.e., occupant based, vehicle based, and collision based). Six years of collision data (2001-2006) from 31 highway routes from across the province of Ontario, Canada were used for this analysis. It was found that a multilevel multinomial logit model has the best fit to the data than the other two models while the results obtained from occupant-based data are more reliable than those from vehicle- and collision-based data. More importantly, while generally consistent in terms of factors that were found to be significant between different models and data aggregation methods, the effect size of each factor differ sub- stantially, which could have significant implications forevaluating the effects of different safety-related policies and countermeasures. 展开更多
关键词 Injury severity - Multilevel logistic regressionmodels Collision data aggregation
在线阅读 下载PDF
Green Architecture for Dense Home Area Networks Based on Radio-over-Fiber with Data Aggregation Approach
7
作者 Mohd Sharil Abdullah Mohd Adib Sarijari +4 位作者 Abdul Hadi Fikri Abdul Hamid Norsheila Fisal Anthony Lo Rozeha A.Rashid Sharifah Kamilah Syed Yusof 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第2期133-144,共12页
The high-density population leads to crowded cities. The future city is envisaged to encompass a large-scale network with diverse applications and a massive number of interconnected heterogeneous wireless-enabled devi... The high-density population leads to crowded cities. The future city is envisaged to encompass a large-scale network with diverse applications and a massive number of interconnected heterogeneous wireless-enabled devices. Hence, green technology elements are crucial to design sustainable and future-proof network architectures. They are the solutions for spectrum scarcity, high latency, interference, energy efficiency, and scalability that occur in dense and heterogeneous wireless networks especially in the home area network (HAN). Radio-over-fiber (ROF) is a technology candidate to provide a global view of HAN's activities that can be leveraged to allocate orthogonal channel communications for enabling wireless-enabled HAN devices transmission, with considering the clustered-frequency-reuse approach. Our proposed network architecture design is mainly focused on enhancing the network throughput and reducing the average network communications latency by proposing a data aggregation unit (DAU). The performance shows that with the DAU, the average network communications latency reduces significantly while the network throughput is enhanced, compared with the existing ROF architecture without the DAU. 展开更多
关键词 data aggregation unit dense homearea network green architecture heterogeneousnetwork radio-over-fiber.
在线阅读 下载PDF
Web Data Aggregation in MOLAP:Approach,Language,and Implementation
8
作者 朱焱 唐慧佳 马永强 《Journal of Southwest Jiaotong University(English Edition)》 2007年第3期179-186,共8页
This paper investigates the Web data aggregation issues in multidimensional on-line analytical processing (MOLAP) and presents a rule-driven aggregation approach. The core of the approach is defining aggregate rules... This paper investigates the Web data aggregation issues in multidimensional on-line analytical processing (MOLAP) and presents a rule-driven aggregation approach. The core of the approach is defining aggregate rules. To define the rules for reading warehouse data and computing aggregates, a rule definition language - array aggregation language (AAL) is developed. This language treats an array as a function from indexes to values and provides syntax and semantics based on monads. External functions can be called in aggregation rules to specify array reading, writing, and aggregating. Based on the features of AAL, array operations are unified as function operations, which can be easily expressed and automatically evaluated. To implement the aggregation approach, a processor for computing aggregates over the base cube and for materializing them in the data warehouse is built, and the component structure and working principle of the aggregation processor are introduced. 展开更多
关键词 Web data aggregation aggregation language MOLAP aggregation processor
在线阅读 下载PDF
PVF-DA: Privacy-Preserving, Verifiable and FaultTolerant Data Aggregation in MEC
9
作者 Jianhong Zhang Qijia Zhang +1 位作者 Shenglong Ji Wenle Bai 《China Communications》 SCIE CSCD 2020年第8期58-69,共12页
As an emergent-architecture, mobile edge computing shifts cloud service to the edge of networks. It can satisfy several desirable characteristics for Io T systems. To reduce communication pressure from Io T devices, d... As an emergent-architecture, mobile edge computing shifts cloud service to the edge of networks. It can satisfy several desirable characteristics for Io T systems. To reduce communication pressure from Io T devices, data aggregation is a good candidate. However, data processing in MEC may suffer from many challenges, such as unverifiability of aggregated data, privacy-violation and fault-tolerance. To address these challenges, we propose PVF-DA: privacy-preserving, verifiable and fault-tolerant data aggregation in MEC based on aggregator-oblivious encryption and zero-knowledge-proof. The proposed scheme can not only provide privacy protection of the reported data, but also resist the collusion between MEC server and corrupted Io T devices. Furthermore, the proposed scheme has two outstanding features: verifiability and strong fault-tolerance. Verifiability can make Io T device to verify whether the reported sensing data is correctly aggregated. Strong fault-tolerance makes the aggregator to compute an aggregate even if one or several Io Ts fail to report their data. Finally, the detailed security proofs are shown that the proposed scheme can achieve security and privacy-preservation properties in MEC. 展开更多
关键词 MEC data aggregation verifiability PRIVACY-PRESERVING FAULT-TOLERANCE
在线阅读 下载PDF
Clustered Federated Learning with Weighted Model Aggregation for Imbalanced Data
10
作者 Dong Wang Naifu Zhang Meixia Tao 《China Communications》 SCIE CSCD 2022年第8期41-56,共16页
As a promising edge learning framework in future 6G networks,federated learning(FL)faces a number of technical challenges due to the heterogeneous network environment and diversified user behaviors.Data imbalance is o... As a promising edge learning framework in future 6G networks,federated learning(FL)faces a number of technical challenges due to the heterogeneous network environment and diversified user behaviors.Data imbalance is one of these challenges that can significantly degrade the learning efficiency.To deal with data imbalance issue,this work proposes a new learning framework,called clustered federated learning with weighted model aggregation(weighted CFL).Compared with traditional FL,our weighted CFL adaptively clusters the participating edge devices based on the cosine similarity of their local gradients at each training iteration,and then performs weighted per-cluster model aggregation.Therein,the similarity threshold for clustering is adaptive over iterations in response to the time-varying divergence of local gradients.Moreover,the weights for per-cluster model aggregation are adjusted according to the data balance feature so as to speed up the convergence rate.Experimental results show that the proposed weighted CFL achieves a faster model convergence rate and greater learning accuracy than benchmark methods under the imbalanced data scenario. 展开更多
关键词 clustered federated learning data imbalance convergence rate analysis model aggregation
在线阅读 下载PDF
An Efficient and Secure Aggregation Encryption Scheme in Edge Computing 被引量:2
11
作者 Junhua Wu Xiaofei Sheng +2 位作者 Guangshun Li Kan Yu Junke Liu 《China Communications》 SCIE CSCD 2022年第3期245-257,共13页
Edge computing is a highly virtualized paradigm that can services the Internet of Things(Io T)devices more efficiently.It is a non-trivial extension of cloud computing,which can not only meet the big data processing r... Edge computing is a highly virtualized paradigm that can services the Internet of Things(Io T)devices more efficiently.It is a non-trivial extension of cloud computing,which can not only meet the big data processing requirements of cloud computing,but also collect and analyze distributed data.However,it inherits many security and privacy challenges of cloud computing,such as:authentication and access control.To address these problem,we proposed a new efficient privacy-preserving aggregation scheme for edge computing.Our scheme consists of two steps.First,we divided the data of the end users with the Simulated Annealing Module Partition(SAMP)algorithm.And then,the end sensors and edge nodes performed respectively differential aggregation mechanism with the Differential Aggregation Encryption(DAE)algorithm which can make noise interference and encryption algorithm with trusted authority(TA).Experiment results show that the DAE can preserve user privacy,and has significantly less computation and communication overhead than existing approaches. 展开更多
关键词 Edge computing data aggregation ENCRYPTION Simulated annealing
在线阅读 下载PDF
CONSERVATIVE ESTIMATING FUNCTION IN THE NONLINEAR REGRESSION MODEL WITH AGGREGATED DATA 被引量:1
12
作者 林路 《Acta Mathematica Scientia》 SCIE CSCD 2000年第3期335-340,共6页
The purpose of this paper is to study the theory of conservative estimating functions in nonlinear regression model with aggregated data. In this model, a quasi-score function with aggregated data is defined. When thi... The purpose of this paper is to study the theory of conservative estimating functions in nonlinear regression model with aggregated data. In this model, a quasi-score function with aggregated data is defined. When this function happens to be conservative, it is projection of the true score function onto a class of estimation functions. By constructing, the potential function for the projected score with aggregated data is obtained, which have some properties of log-likelihood function. 展开更多
关键词 nonlinear regression model with aggregated data quasi-score function conservative vector field potential function
在线阅读 下载PDF
A Service-Based Intelligent Time-Domain and Spectral-Domain Flow Aggregation in IP-over-EON Based on SDON
13
作者 NI Dong LI Hui +2 位作者 JI Yuefeng LI Hongbiao ZHU Yinan 《ZTE Communications》 2019年第3期56-62,共7页
The rapid growth of IP traffic has contributed to wide deployment of optical devices in elastic optical network.However,the passband shape of wavelength selective switches(WSSs)that are used in reconfigurable optical ... The rapid growth of IP traffic has contributed to wide deployment of optical devices in elastic optical network.However,the passband shape of wavelength selective switches(WSSs)that are used in reconfigurable optical add-drop multiplexer(ROADM)/optical cross connect(OXC)is not ideal,causing the narrowing of spectrum.Spectral narrowing will lead to signal impairment.Therefore,guard-bands need to be inserted between adjacent paths which will cause the waste of resources.In this paper,we propose a service-based intelligent aggregation node selection and area division(ANS-AD)algorithm.For the rationality of the aggregation node selection,the ANS-AD algorithm chooses the aggregation nodes according to historical traffic information based on big data analysis.Then the ANS-AD algorithm divides the topology into areas according to the result of the aggregation node selection.Based on the ANS-AD algorithm,we propose a time-domain and spectral-domain flow aggregation(TS-FA)algorithm.For the purpose of reducing resources'waste,the TS-FA algorithm attempts to reduce the insertion of guard-bands by time-domain and spectral-domain flow aggregation.Moreover,we design a time-domain and spectral-domain flow aggregation module on software defined optical network(SDON)architecture.Finally,a simulation is designed to evaluate the performance of the proposed algorithms and the results show that our proposed algorithms can effectively reduce the resource waste. 展开更多
关键词 IP-over-EON TIME-DOMAIN SPECTRAL-DOMAIN FLOW aggregation big data analysis SDON
在线阅读 下载PDF
车载网中一种基于区块链的隐私保护数据聚合系统
14
作者 杨睿成 董国芳 徐正楠 《信息安全研究》 北大核心 2025年第4期367-376,共10页
针对车载网中数据聚合面临的隐私风险及挑战,提出了一种安全的车载网中基于区块链的安全匿名数据聚合方案.方案将云计算与区块链相融合,设计了一种基于区块链的隐私保护数据聚合系统,可以帮助车载网实现高效且安全的数据收集和数据分析... 针对车载网中数据聚合面临的隐私风险及挑战,提出了一种安全的车载网中基于区块链的安全匿名数据聚合方案.方案将云计算与区块链相融合,设计了一种基于区块链的隐私保护数据聚合系统,可以帮助车载网实现高效且安全的数据收集和数据分析任务.方案中利用密钥托管弹性保证了系统中密钥的安全性,防止以往密钥由第三方独自生成所导致的安全问题;通过2次数据聚合实现了细粒度的数据聚合,为车载网的云服务提供了有效支持.通过安全性分析和性能评估验证了该方案的安全性,并证明了该方案具有更高的计算效率和通信效率. 展开更多
关键词 车载网 数据聚合 区块链 密钥托管弹性 匿名
在线阅读 下载PDF
虚拟摄制中镜头和位姿元数据聚合技术应用研究
15
作者 解沛 周令非 王木旺 《现代电影技术》 2025年第2期25-31,共7页
近年来,影视制作技术出现巨大的变革与更新,虚拟摄制技术被广泛应用于电影制作。基于目前影视虚拟摄制中存在无法有效整合镜头与位姿元数据,相关设备稳定性差、易被干扰等问题,本文通过对现有摄影机追踪与跟焦设备进行分析,针对不同场景... 近年来,影视制作技术出现巨大的变革与更新,虚拟摄制技术被广泛应用于电影制作。基于目前影视虚拟摄制中存在无法有效整合镜头与位姿元数据,相关设备稳定性差、易被干扰等问题,本文通过对现有摄影机追踪与跟焦设备进行分析,针对不同场景,提出一种虚拟摄制中镜头和位姿元数据聚合技术方案,搭建相关系统并进行了实验与测试。结果表明,本文提出的镜头和位姿元数据聚合技术能够有效聚合输出稳定且平滑的镜头和位姿元数据,为虚拟摄制现场创制的灵活性与稳定性提供可靠保障。 展开更多
关键词 虚拟摄制 镜头跟焦 摄影机追踪 数据聚合 摄影机位姿元数据
在线阅读 下载PDF
数据中台在重载铁路基础设施智能运维中的应用与实践探索
16
作者 单伟 苏天祺 +2 位作者 焦晨 薛肖遥 耿小亮 《铁路物流》 2025年第3期9-14,共6页
随着重载铁路信息化、智能化建设,重载铁路相关单位积累了海量的监测检测数据。重载铁路基础设施智能运维系统对这些数据进行收集处理,实现包含设备全生命周期、维检修、监测检测一体化等在内的综合性运维,数据中台在其中扮演着重要角... 随着重载铁路信息化、智能化建设,重载铁路相关单位积累了海量的监测检测数据。重载铁路基础设施智能运维系统对这些数据进行收集处理,实现包含设备全生命周期、维检修、监测检测一体化等在内的综合性运维,数据中台在其中扮演着重要角色。通过介绍数据中台的架构、核心功能和关键技术,针对重载铁路基础设施智能运维系统的目标和挑战,阐述数据中台的解决策略,并详细描述了数据中台在运维核心场景中发挥的作用。在实践探索部分,展示了智能运维数据中台的设计与实现,并提供了应用案例分析,能够为重载铁路相关领域的研究和发展提供一定的理论和实践参考。 展开更多
关键词 重载铁路 数据中台 辅助决策 业务数据 数据汇集
在线阅读 下载PDF
及时汇聚和数据挖掘的信息运维大数据预警算法
17
作者 周小明 李广翱 +2 位作者 朱春艳 李峰 王宇 《信息技术》 2025年第1期158-164,170,共8页
为提高信息运维大数据预警分类效果和预警准确性,研究及时汇聚和数据挖掘的信息运维大数据预警算法。该算法采用及时汇聚分析算法(K-mesns聚类算法),通过获取大数据误差准则函数最小的簇,实现信息运维大数据分类;通过卷积神经网络转换... 为提高信息运维大数据预警分类效果和预警准确性,研究及时汇聚和数据挖掘的信息运维大数据预警算法。该算法采用及时汇聚分析算法(K-mesns聚类算法),通过获取大数据误差准则函数最小的簇,实现信息运维大数据分类;通过卷积神经网络转换经自编码处理的数据维度,实现信息运维大数据预警。结果表明:该算法可实现信息运维大数据分类,有效分类3类数据,且数据聚类的分离性高,达到0.89,处理大小为9×107的数据量时,迭代次数只需约180次。迭代收敛时的统计误差准则函数值较小,并且运维大数据预警结果与实际异常情况一致,预警准确性较高。 展开更多
关键词 及时汇聚 数据挖掘 信息运维 卷积神经网络 大数据预警
在线阅读 下载PDF
基于边缘计算的智能电网实时网络安全监测技术研究
18
作者 陈丽娜 《通信电源技术》 2025年第1期231-233,共3页
针对智能电网中的网络安全监测挑战,提出了一种基于边缘计算的实时监测方法。通过在边缘节点部署改进的异常检测算法和动态阈值调整机制,系统能够在毫秒级别内准确检测并响应潜在的网络威胁。此外,采用轻量级数据聚合方法显著提高数据... 针对智能电网中的网络安全监测挑战,提出了一种基于边缘计算的实时监测方法。通过在边缘节点部署改进的异常检测算法和动态阈值调整机制,系统能够在毫秒级别内准确检测并响应潜在的网络威胁。此外,采用轻量级数据聚合方法显著提高数据传输效率,并通过哈希值校验保障数据传输的完整性。实验结果表明,该方法在实时性、检测准确性、传输效率、数据完整性检测以及资源消耗方面均表现优异,为智能电网的安全运行提供了有力支持。 展开更多
关键词 智能电网 边缘计算 网络安全监测 轻量级数据聚合
在线阅读 下载PDF
铁路地理环境监测信息系统的研究与应用
19
作者 谢雍生 周佳玥 +1 位作者 颜欢 王泽宇 《铁路计算机应用》 2025年第2期49-53,共5页
针对当前铁路地理环境风险监测工作中风险隐患排查过于依赖人工、监测手段单一,以及隐患台账管理方式落后等问题,设计了铁路地理环境监测信息系统。基于卫星遥感影像天地图,通过风险隐患分析技术、风险隐患的临近里程点分析及风险等级... 针对当前铁路地理环境风险监测工作中风险隐患排查过于依赖人工、监测手段单一,以及隐患台账管理方式落后等问题,设计了铁路地理环境监测信息系统。基于卫星遥感影像天地图,通过风险隐患分析技术、风险隐患的临近里程点分析及风险等级评定算法,从卫星遥感影像中获取铁路周边潜在的风险隐患;基于多源异构铁路时空数据汇聚融合技术,实现了无人机视频、三维全景影像和相关资产数据的汇集入库;利用地理信息系统(GIS,Geographic Information System)技术进行铁路内外部数据的图层制作、发布和数据上图。该系统已在中国铁路南宁局集团有限公司得到应用,实现以信息化手段多维度分析隐患、全方位监测环境,可为地理环境监测工作提供技术支撑。 展开更多
关键词 铁路地理环境 风险隐患 地理信息系统(GIS) 卫星遥感影像 数据汇聚融合
在线阅读 下载PDF
Efficient Packet Scheduling Technique for Data Merging in Wireless Sensor Networks 被引量:2
20
作者 V.Akila T.Sheela G.Adiline Macriga 《China Communications》 SCIE CSCD 2017年第4期35-46,共12页
Wireless Sensor Networks(WSNs) has become a popular research topic due to its resource constraints. Energy consumption and transmission delay is crucial requirement to be handled to enhance the popularity of WSNs. In ... Wireless Sensor Networks(WSNs) has become a popular research topic due to its resource constraints. Energy consumption and transmission delay is crucial requirement to be handled to enhance the popularity of WSNs. In order to overcome these issues, we have proposed an Efficient Packet Scheduling Technique for Data Merging in WSNs. Packet scheduling is done by using three levels of priority queue and to reduce the transmission delay. Real-time data packets are placed in high priority queue and Non real-time data packets based on local or remote data are placed on other queues. In this paper, we have used Time Division Multiple Access(TDMA) scheme to efficiently determine the priority of the packet at each level and transmit the data packets from lower level to higher level through intermediate nodes. To reduce the number of transmission, efficient data merge technique is used to merge the data packet in intermediate nodes which has same destination node. Data merge utilize the maximum packet size by appending the merged packets with received packets till the maximum packet size or maximum waiting time is reached. Real-time data packets are directly forwarded to the next node without applying data merge. The performance is evaluated under various metrics like packet delivery ratio, packet drop, energy consumption and delay based on changing the number of nodes and transmission rate. Our results show significant reduction in various performance metrics. 展开更多
关键词 wireless sensor networks data aggregation packet scheduling time division multiple access
在线阅读 下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部