期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
A Novel UWB Signal Sampling Method for Localization based on Compressive Sensing 被引量:4
1
作者 Zhang Lingwen Tan Zhenhui 《China Communications》 SCIE CSCD 2010年第1期65-72,共8页
Ultra-wide-band (UWB) signals are suitable for localization, since their high time resolution can provide precise time of arrival (TOA) estimation. However, one major challenge in UWB signal processing is the requirem... Ultra-wide-band (UWB) signals are suitable for localization, since their high time resolution can provide precise time of arrival (TOA) estimation. However, one major challenge in UWB signal processing is the requirement of high sampling rate which leads to complicated signal processing and expensive hardware. In this paper, we present a novel UWB signal sampling method called UWB signal sampling via temporal sparsity (USSTS). Its sampling rate is much lower than Nyquist rate. Moreover, it is implemented in one step and no extra processing unit is needed. Simulation results show that USSTS can not recover the signal precisely, but for the use in localization, the accuracy of TOA estimation is the same as that in traditional methods. Therefore, USSTS gives a novel and effective solution for the use of UWB signals in localization. 展开更多
关键词 LOCALIZATION sampling Ultra-Wide-Band (UWB) SIGNAL COMPRESSIVE SENSING (CS)
在线阅读 下载PDF
Behavior Measurement Model Based on Prediction and Control of Trusted Network 被引量:5
2
作者 Gong Bei Zhang Jianbiao +1 位作者 Shen Changxiang Zhang Xing 《China Communications》 SCIE CSCD 2012年第5期117-128,共12页
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation... In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones. 展开更多
关键词 trusted network behavioral predic-tive control SIMILARITY trust measurement
在线阅读 下载PDF
G-MER: Green Mobility Estimation- Based Routing Protocol in Wireless Sensor Network 被引量:3
3
作者 Quan Wei Guan Jianfeng +1 位作者 Xu Changqiao Zhang Hongke 《China Communications》 SCIE CSCD 2012年第5期10-21,共12页
As a core technology of Intemet of Things (loT), Wireless Sensor Network (WSN) has become a research hotspot recently. More and more WSNs are being deployed in highly mobile environments. The fast moving sensor no... As a core technology of Intemet of Things (loT), Wireless Sensor Network (WSN) has become a research hotspot recently. More and more WSNs are being deployed in highly mobile environments. The fast moving sensor nodes bring significant challenges for the routing decision. In this paper, we propose an efficient logical location method, and designe a mobility estimating metric and derive a novel Green Mobility Estirmtion- based Routing protocol (G-MER) for WSNs. We also set up a full framework to evaluate its per- formance. Simulation results illustrate that G-MER achieves a fairly better perforrmnce in terrm of broadcast times and link failures than AODV. What's more, it decreases the mean hops by about 0.25 and reduces energy consumption by about 10% during the whole experiment. All the results show that G-MER can be effectively used in fast- moving and limited resource scenarios. 展开更多
关键词 IoT WSN green routing protocol rmbility estimation dynamic window energy con-suming model
在线阅读 下载PDF
Security Model for Analyzing Data Privacy in Multipath Transport 被引量:2
4
作者 Song Fei Xue Miao Zhang Sidong 《China Communications》 SCIE CSCD 2012年第5期32-41,共10页
In order to investigate the enhancement of data privacy by distributing data packets via multiple paths, this paper fommlates a security model and analyzes the privacy problem in mul- tipath scenarios leveraging infor... In order to investigate the enhancement of data privacy by distributing data packets via multiple paths, this paper fommlates a security model and analyzes the privacy problem in mul- tipath scenarios leveraging inforrmtion theoretic concept. Based on proposed model, a privacy function related to the path number is discussed. We heuristically recommend the optin^al path num- ber and analyze the tradeoff among the perform- ance, resource consumption and privacy. For re- ducing the inforlmtion leakage, the data schedule algorithms are also proposed. The analytical model can provide guidelines for the multipath protocol design. 展开更多
关键词 data privacy multipath transport in-formation theory TRADEOFF
在线阅读 下载PDF
Receiver Detection Employing Semaphore in Cognitive Radio
5
作者 Wang Weidong Li Fan +2 位作者 Zhang Yinghai Wang Shoufeng Wang Yongtao 《China Communications》 SCIE CSCD 2010年第1期41-49,共9页
Interference from secondary users to primary users should be avoided in cognitive radio. However, it is difficult to solve the interference problem if the secondary users cannot get the information of the primary rece... Interference from secondary users to primary users should be avoided in cognitive radio. However, it is difficult to solve the interference problem if the secondary users cannot get the information of the primary receivers. Insufficient information of primary users would result in inaccurate spectrum detecting result. To deliver the information of primary users, Receiver Detection Employing Semaphore (ReDES) is proposed in this paper. Primary receiver informs secondary users of its licensed receive frequency according to semaphore architecture directly in ReDES. The semaphore is used to determine the spectrum holes by secondary users. Frequency mapping method is come up with as a realization of ReDES. The procedure and the detailed techniques are illustrated to make ReDES scheme reasonable and feasible. Simulation results show that the proposed scheme can effectively detect the frequencies of primary receivers, and improve the accuracy of spectrum detection. 展开更多
关键词 COGNITIVE RADIO RECEIVER detection hidden TERMINAL problem.
在线阅读 下载PDF
An Integrated Architecture for Vertical Handover Management
6
作者 Yan Zhiwei Zhou Huachun +1 位作者 Zhang Hongke Zhang Sidong 《China Communications》 SCIE CSCD 2010年第1期30-40,共11页
Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, an IEEE 802.21 Media Independent Handover (MIH) based handover man... Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, an IEEE 802.21 Media Independent Handover (MIH) based handover management architecture containing four modules is proposed and the multihoming technology is adopted to achieve Make-Before-Break vertical handover. Then the paper presents the performance analysis of the architecture and simulation in ns-2. The results substantiate the effi cacy of the architecture in improving the handover performance signifi cantly compared with the traditional Mobile IPv6 (MIPv6) based vertical handover. Besides, we design and implement this handover management architecture in our test-bed. The experimental results in a real network environment show that our proposed architecture can not only support the Make-before-break handover, but also guarantee the scalability because of the modulized design. 展开更多
关键词 MIH VERTICAL HANDOVER MULTIHOMING MCoA
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部