期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
基于神经网络算法的无线网络安全模型设计
1
作者 何明阳 张光治 柴炜 《无线互联科技》 2024年第11期125-129,共5页
为实现对无线网络的有效保护,文章运用BP神经网络和GA遗传算法,完成对无线网络安全模型设计。首先,将BP神经网络与GA遗传算法进行有效的融合,提出一种GABP神经网络算法。其次,针对无线网络安全问题,运用该算法,从无线网络拓扑结构设计... 为实现对无线网络的有效保护,文章运用BP神经网络和GA遗传算法,完成对无线网络安全模型设计。首先,将BP神经网络与GA遗传算法进行有效的融合,提出一种GABP神经网络算法。其次,针对无线网络安全问题,运用该算法,从无线网络拓扑结构设计、无线网络入侵检测单位模型构建入手,完成对无线网络安全模型的设计。最后,对该模型进行仿真分析。结果表明:将BP神经网络与GA遗传算法应用到无线网络攻击类型中从而提高识别率,降低了误报率,确保了无线网络的安全性和可靠性。笔者希望该研究可以为相关人员提供有效的借鉴和参考。 展开更多
关键词 BP神经网络 GA遗传算法 无线网络安全模型
在线阅读 下载PDF
无线网络信号模型的自回归参数估计
2
作者 韩睿 来晓东 《山西广播电视大学学报》 2012年第2期48-50,共3页
以傅里叶变换为基础的传统技术所提供的频率分辨率是非常有限的,而基于有理传递函数模型的技术则可以提供更高的频率分辨率。有理传递函数模型比较适合在连续频谱条件下建模,而对于离散频谱,则采用谐波模型更加合适。
关键词 无线网络信号模型 频谱估计 自回归模型
在线阅读 下载PDF
网络仿真及OPNET应用研究 被引量:3
3
作者 谭春红 梁虹 +1 位作者 周园 李春芬 《系统仿真技术》 2007年第4期233-237,共5页
网络仿真技术是进行网络规划与设计的有效方法和工具。本文在系统地分析网络仿真基本方法和仿真流程的基础上,阐述了网络仿真平台OPNET的主要特性、建模机制及其仿真方法和步骤。基于OPNET对一个点对点的无线网络模型进行仿真,给出仿真... 网络仿真技术是进行网络规划与设计的有效方法和工具。本文在系统地分析网络仿真基本方法和仿真流程的基础上,阐述了网络仿真平台OPNET的主要特性、建模机制及其仿真方法和步骤。基于OPNET对一个点对点的无线网络模型进行仿真,给出仿真结果并对其进行了分析。 展开更多
关键词 网络仿真 OPNET 无线网络模型 移动干扰
在线阅读 下载PDF
基于OPNET的车用Ad hoc网可靠性评估研究 被引量:3
4
作者 张桃改 谢辉 《计算机应用研究》 CSCD 北大核心 2009年第10期3807-3811,共5页
通过搭建车用Ad hoc网络(VANET)的仿真平台,将一个真实的车辆节点移动模型与标准的无线移动Ad hoc网络模型进行结合来对车用网络的可靠性进行评估。反映了车辆的移动特性对整个VANET可靠性的影响,利于更详细、更直观地刻画VANET的重要特... 通过搭建车用Ad hoc网络(VANET)的仿真平台,将一个真实的车辆节点移动模型与标准的无线移动Ad hoc网络模型进行结合来对车用网络的可靠性进行评估。反映了车辆的移动特性对整个VANET可靠性的影响,利于更详细、更直观地刻画VANET的重要特性,为将来VANET相关协议的设计提供具体、详实的参考数据和建议。 展开更多
关键词 车用Ad HOC网络 车辆移动模型 无线网络模型 可靠性
在线阅读 下载PDF
A Hybrid Handover Forecasting Mechanism Based on Fuzzy Forecasting Model in Cellular Networks 被引量:1
5
作者 Hua Qu Yanpeng Zhang +2 位作者 Jihong Zhao Gongye Ren Weipeng Wang 《China Communications》 SCIE CSCD 2018年第6期84-97,共14页
As the increasing demand for mobile communications and the shrinking of the coverage of cells, handover mechanism will play an important role in future wireless networks to provide users with seamless mobile communica... As the increasing demand for mobile communications and the shrinking of the coverage of cells, handover mechanism will play an important role in future wireless networks to provide users with seamless mobile communication services. In order to guarantee the user experience, the handover decision should be made timely and reasonably. To achieve this goal, this paper presents a hybrid handover forecasting mechanism, which contains long-term and short-term forecasting models. The proposed mechanism could cooperate with the standard mechanisms, and improve the performance of standard handover decision mechanisms. Since most of the parameters involved are imprecise, fuzzy forecasting model is applied for dealing with predictions of them. The numerical results indicate that the mechanism could significantly decrease the rate of ping-pong handover and the rate of handover failure. 展开更多
关键词 handover forecasting mechanism fuzzy forecasting model long-term forecasting model short-term forecasting model
在线阅读 下载PDF
Generalized Physical Layer Channel Model for RelayBased Super Dense Networks 被引量:1
6
作者 ZHANG Lingwen LIU Chang +1 位作者 ZHANG Jiayi WU Faen 《China Communications》 SCIE CSCD 2015年第8期123-131,共9页
The κ-μ fading model is an advanced channel model in super dense wireless networks.In this paper,we evaluate the performance of the system over κ-μ fading channel in super dense relay networks with consideration o... The κ-μ fading model is an advanced channel model in super dense wireless networks.In this paper,we evaluate the performance of the system over κ-μ fading channel in super dense relay networks with consideration of multiple independent but not necessarily identically distributed(i.n.i.d.) cochannel interference(CCI) under interferencelimited environment.More specifically,we derive a useful and accurate cumulative distribution function(CDF) expression of the end-to-end signal-to-interference plus noise(SINR) ratio.Moreover,we derive novel analytical expressions of the outage probability(OP),average bit error probability(ABEP) and average capacity for binary modulation types and arbitrary positive values of κ-and μ of such system.Furthermore,we propose asymptotic analysis for both the OP and ABEP to give physical insights.A simplified analytical form for the ABEP at high-SNR regimes is provided as well.Finally,the accuracy of the derived expressions is well validated by Monte Carlo simulations. 展开更多
关键词 super dense generalized fadingmodel RELAY co-channel interference DECODE-AND-FORWARD outage probability average biterror probability average capacity.
在线阅读 下载PDF
Two States CBR Modeling of Data Source in Dynamic Traffic Monitoring Sensor Networks 被引量:1
7
作者 罗俊 蒋铃鸽 +2 位作者 何晨 冯宸 郑春雷 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期618-622,共5页
Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic mo... Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic monitoring sensor networks. Analysis of autocorrelation of the models shows that the proposed TSCBR model matches with the statistical characteristics of real data source closely. To further verify the validity of the TSCBR data source model, the performance metrics of power consumption and network lifetime was studied in the evaluation of sensor media access control (SMAC) algorithm. The simulation results show that compared with traditional data source models, TSCBR model can significantly improve accuracy of the algorithm evaluation. 展开更多
关键词 wireless sensor network (WSN) traffic monitoring data source model AUTOCORRELATION
在线阅读 下载PDF
Throughput analysis for relay-aided interference channel in cognitive radio networks
8
作者 Lou Jia Luo Tao Yue Guangxin 《High Technology Letters》 EI CAS 2011年第4期344-349,共6页
This paper considers a two-user Gaussian interference channel aided by a single relay. Two source-destination pairs and the relay share a single common chaunel, and the relay assists both sources in communicating the ... This paper considers a two-user Gaussian interference channel aided by a single relay. Two source-destination pairs and the relay share a single common chaunel, and the relay assists both sources in communicating the messages to their respective destinations. This paper mainly focuses on the "amplify-and-forward" (AF) relaying strategy for relay, and derives upper bound and lower bound on achievable sum rate accordingly. Next, the application of the above model in cognitive radio (CR) networks is considered. The schemes that can ensure the coexistence of the secondary user with the primary user are proposed, in the sense that there is no rate degradation for the primary user due to sharing of the channel. Further, the throughput of the secondary user in different communication scenarios is investigated. 展开更多
关键词 interference channel RELAY achievable sum rate cognitive radio(CR) THROUGHPUT
在线阅读 下载PDF
Intrusion Detection Model Based on Incomplete Information Ga me in Wireless Mesh Networks 被引量:1
9
作者 Chen Jing Du Ruiying +2 位作者 Yu Fajiang Zheng Minghui Zhang Huanguo 《China Communications》 SCIE CSCD 2012年第10期23-32,共10页
Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the sec... Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the security of wireless mesh networks is a precondition for practical use. Intrusion detection is pivotal for increasing network security. Considering the energy limitations in wireless mesh networks, we adopt two types of nodes: Heavy Intrusion Detection Node (HIDN) and Light Intrusion Detection Node (LIDN). To conserve energy, the LIDN detects abnorrml behavior according to probability, while the HIDN, which has sufficient energy, is always operational. In practice, it is very difficult to acquire accurate information regarding attackers. We propose an intrusion detection model based on the incomplete inforrmtion game (ID-IIG). The ID-IIG utilizes the Harsanyi transformation and Bayesian Nash equilibrium to select the best strategies of defenders, although the exact attack probability is unknown. Thus, it can effectively direct the deployment of defenders. Through experiments, we analyze the perforrmnce of ID-IIG and verify the existence and attainability of the Bayesian Nash equilibrium. 展开更多
关键词 game theory intrusion detection model WMNS
在线阅读 下载PDF
Interference Coordination for Secrecy Enhancement in Random Wireless Networks
10
作者 BAI Juan TAO Xiaofeng XU Jin 《China Communications》 SCIE CSCD 2014年第8期28-36,共9页
The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference m... The co-channel interference modeling is vital for evaluating the secrecy performance in random wireless networks,where the legitimate nodes and eavesdroppers are randomly distributed.In this paper,a new interference model is proposed from the userdominant perspective.The model can provide a better analytical assessment of secrecy performance with interference coordination for the presence of eavesdroppers.The typical legitimate is assumed to be located at the origin,and chooses the closest base station(BS) as its serving BS.The field of interferers is obtained by excluding the desired BSs(including the serving BS and its cooperative BS(s)).In contract with the exiting interference model,it is assumed that desired BSs and interferers belong to the same Poisson Point Process(PPP),and eavesdroppers are distributed according to another independent PPP.Based on this model,the average secrecy transmission capacity is derived in simply analytical forms with interference coordination.Analysis and simulation results show that the secrecy performance can be significantly enhanced by exploiting interference coordination.Furthermore,the average secrecy transmission capacity increases with increasing number of cooperative BSs. 展开更多
关键词 interference coordination poissonpoint process secrecy transmission capacity random wireless networks
在线阅读 下载PDF
Node scattering manipulation based on trajectory model in wireless sensor network 被引量:2
11
作者 裴智强 徐昌庆 藤劲 《Journal of Central South University》 SCIE EI CAS 2010年第5期991-999,共9页
To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity ... To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity and direction,were manipulated so that it would land in a region with a certain probability;every sensor was relocated in order to improve the coverage and connectivity.Simultaneously,to easily analyze the process of scattering sensors,a trajectory model was also proposed.Integrating node scattering manipulation with trajectory model,the node deployment in wireless sensor network was thoroughly renovated,that is,this scheme can scatter sensors.In practice,the scheme was operable compared with the previous achievements.The simulation results demonstrate the superiority and feasibility of the scheme,and also show that the energy consumption for sensors relocation is reduced. 展开更多
关键词 WORK node scattering manipulation trajectory model energy consumption
在线阅读 下载PDF
Research on stateful public key based secure data aggregation model for wireless sensor networks 被引量:2
12
作者 秦丹阳 Jia Shuang +2 位作者 Yang Songxiang Wang Erfu Ding Qun 《High Technology Letters》 EI CAS 2017年第1期38-47,共10页
Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggreg... Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time. 展开更多
关键词 wireless sensor networks WSNs) secure data aggregation homomorphic encryp-tion simple power analysis
在线阅读 下载PDF
ON THE CAPACITY REGION OF WIRELESS AD HOC RELAY NETWORKS
13
作者 Dai Qinyun Yao Wangsheng +1 位作者 Peng Jianmin Su Gang 《Journal of Electronics(China)》 2006年第6期825-830,共6页
Network capacity is a key characteristic to evaluate the performance of wireless networks, The goal of this paper is to study the capacity of wireless ad hoe relay network. In the model, there is at lnost ns source no... Network capacity is a key characteristic to evaluate the performance of wireless networks, The goal of this paper is to study the capacity of wireless ad hoe relay network. In the model, there is at lnost ns source nodes transmitting signal simultaneously in the network and the arbitrarily complex network coding is allowed. The upper capacity bound of the network model are derived From the max-flow rain-cut theorem and the lower capacity bound are obtained by the rate-distortion function For the Gaussian source. Finally, simulation results show that the upper network capacity will decrease as the number of source nodes is increased. 展开更多
关键词 Capacity region Network capacity Wireless ad hoc relay network Gaussian channel model
在线阅读 下载PDF
Energy-Efficient Multi-Mode Clusters Maintenance(M^2CM) for Hierarchical Wireless Sensor Networks
14
作者 Xiangdong Hu Zhulin Liu 《China Communications》 SCIE CSCD 2017年第6期1-12,共12页
How to energy-efficiently maintain the topology of wireless sensor networks(WSNs) is still a difficult problem because of their numerous nodes,highly dynamic nature,varied application scenarios and limited resources.A... How to energy-efficiently maintain the topology of wireless sensor networks(WSNs) is still a difficult problem because of their numerous nodes,highly dynamic nature,varied application scenarios and limited resources.An energy-efficient multi-mode clusters maintenance(M2CM) method is proposed based on localized and event-driven mechanism in this work,which is different from the conventional clusters maintenance model with always periodically re-clustered among the whole network style based on time-trigger for hierarchical WSNs.M2 CM can meet such demands of clusters maintenance as adaptive local maintenance for the damaged clusters according to its changes in time and space field.,the triggers of M2 CM include such events as nodes' residual energy being under the threshold,the load imbalance of cluster head,joining in or exiting from any cluster for new node or disable one,etc.Based on neighboring relationship of the damaged clusters,one can start a single cluster(inner-cluster) maintenance or clusters(inter-cluster) maintenance program to meet diverse demands in the topology management of hierarchical WSNs.The experiment results based on NS2 simulation show that the proposed method can significantly save energy used in maintaining a damaged network,effectively narrow down the influenced area of clusters maintenance,and increase transmitted data and prolong lifetime of network compared to the traditional schemes. 展开更多
关键词 HIERARCHICAL iterative clustering MULTI-MODE EVENT-DRIVEN adaptive ENERGY-EFFICIENT
在线阅读 下载PDF
A novel dynamic call admission control policy for wireless network 被引量:1
15
作者 黄国盛 陈志刚 +2 位作者 李庆华 赵明 郭真 《Journal of Central South University》 SCIE EI CAS 2010年第1期110-116,共7页
To address the issue of resource scarcity in wireless communication, a novel dynamic call admission control scheme for wireless mobile network was proposed. The scheme established a reward computing model of call admi... To address the issue of resource scarcity in wireless communication, a novel dynamic call admission control scheme for wireless mobile network was proposed. The scheme established a reward computing model of call admission of wireless cell based on Markov decision process, dynamically optimized call admission process according to the principle of maximizing the average system rewards. Extensive simulations were conducted to examine the performance of the model by comparing with other policies in terms of new call blocking probability, handoff call dropping probability and resource utilization rate. Experimental results show that the proposed scheme can achieve better adaptability to changes in traffic conditions than existing protocols. Under high call traffic load, handoff call dropping probability and new call blocking probability can be reduced by about 8%, and resource utilization rate can be improved by 2%-6%. The proposed scheme can achieve high source utilization rate of about 85%. 展开更多
关键词 wireless network call admission control quality of service Markov decision process
在线阅读 下载PDF
An uplink power control algorithm using traditional iterative model for cognitive radio networks
16
作者 李枫 谭学治 王丽 《Journal of Central South University》 SCIE EI CAS 2012年第10期2816-2822,共7页
Based on the analysis of the feature of cognitive radio networks, a relevant interference model was built. Cognitive users should consider especially the problem of interference with licensed users and satisfy the sig... Based on the analysis of the feature of cognitive radio networks, a relevant interference model was built. Cognitive users should consider especially the problem of interference with licensed users and satisfy the signal-to-interference noise ratio (SINR) requirement at the same time. According to different power thresholds, an approach was given to solve the problem of coexistence between licensed user and cognitive user in cognitive system. Then, an uplink distributed power control algorithm based on traditional iterative model was proposed. Convergence analysis of the algorithm in case of feasible systems was provided. Simulations show that this method can provide substantial power savings as compared with the power balancing algorithm while reducing the achieved SINR only slightly, since 6% S1NR loss can bring 23% power gain. Through further simulations, it can be concluded that the proposed solution has better effect as the noise power or system load increases. 展开更多
关键词 cognitive radio UPLINK power control INTERFERENCE iterative algorithm
在线阅读 下载PDF
Distributed multichannel medium access control protocol without common control channel for single-hop cognitive radio networks
17
作者 徐贵森 谭学治 《Journal of Central South University》 SCIE EI CAS 2011年第5期1532-1544,共13页
A novel distributed cognitive radio multichannel medium access protocol without common control channel was proposed.The protocol divided a transmission interval into two parts for exchanging control information and da... A novel distributed cognitive radio multichannel medium access protocol without common control channel was proposed.The protocol divided a transmission interval into two parts for exchanging control information and data,respectively.In addition to evaluating system saturation throughput of the proposed protocol,a three-dimensional multi channel Markov chain model to describe the sate of the cognitive users (CUs) in dynamic spectrum access was presented.The proposed analysis was applied to the packet transmission schemes employed by the basic,RTS/CTS access mechanism adopted in the normal IEEE 802.11.Analyzing the advantage of the two methods,a hybrid access mechanism was proposed to improve the system throughput.The simulation results show that the experiment results are close to the value computed by the model (less than 5%),and the proposed protocol significantly improves the performance of the system throughput by borrowing the licensed spectrum.By analyzing the dependence of throughput on system parameters,hybrid mechanism dynamically selecting access mechanism can maintain high throughput. 展开更多
关键词 cognitive radio network multichannel cognitive radio MAC (medium access control) protocols performance evaluation saturation throughput
在线阅读 下载PDF
QoS Provisioning Energy Saving Dynamic Access Policy for Overlay Cognitive Radio Networks with Hidden Markov Channels
18
作者 魏翼飞 滕颖蕾 +2 位作者 王莉 宋梅 王小军 《China Communications》 SCIE CSCD 2013年第12期92-101,共10页
Dynamic spectrum access policy is crucial in improving the performance of over- lay cognitive radio networks. Most of the previ- ous works on spectrum sensing and dynamic spe- ctrum access consider the sensing effecti... Dynamic spectrum access policy is crucial in improving the performance of over- lay cognitive radio networks. Most of the previ- ous works on spectrum sensing and dynamic spe- ctrum access consider the sensing effective- ness and spectrum utilization as the design cri- teria, while ignoring the energy related issues and QoS constraints. In this article, we propose a QoS provisioning energy saving dynamic acc- ess policy using stochastic control theory con- sidering the time-varying characteristics of wir- eless channels because of fading and mobility. The proposed scheme determines the sensing action and selects the optimal spectrum using the corresponding power setting in each decis- ion epoch according to the channel state with the objective being to minimise both the flame error rate and energy consumption. We use the Hidden Markov Model (HMM) to model a wir- eless channel, since the channel state is not dir- ectly observable at the receiver, but is instead embedded in the received signal. The proced- ure of dynamic spectrum access is formulated as a Markov decision process which can be sol- ved using linear programming and the primal- dual index heuristic algorithm, and the obta- ined policy has an index-ability property that can be easily implemented in real systems. Sim- ulation results are presented to show the per- formance improvement caused by the propo- sed approach. 展开更多
关键词 energy saving dynamic access cognitive radio hidden Markov model
在线阅读 下载PDF
AN ACCURATE PREDICTION MODEL FOR COMPUTATIONAL OVERHEADS OF SECURITY MECHANISMS IN WIRELESS SENSOR NETWORKS
19
作者 Liu Wei Luo Rong Yang Huazhong 《Journal of Electronics(China)》 2009年第5期699-705,共7页
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ... In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms. 展开更多
关键词 Wireless Sensor Network (WSN) Cryptography algorithm Security mechanism Computational overhead
在线阅读 下载PDF
Distributed fair queuing algorithm based on compensation coordination scheduling in WMN
20
作者 Jiang Fu Peng Jun Kuo Chi LIN 《High Technology Letters》 EI CAS 2012年第3期314-320,共7页
This paper proposes a distributed fair queuing algorithm which is based on compensation coordi- nation scheduling in wireless mesh networks, considering such problems as the location-dependent competition and unfair c... This paper proposes a distributed fair queuing algorithm which is based on compensation coordi- nation scheduling in wireless mesh networks, considering such problems as the location-dependent competition and unfair channel bandwidth allocation among nodes. The data communication process requiring the establishment of compensation coordination scheduling model is divided into three periods: the sending period, the compensation period and the dormancy period. According to model parameters, time constraint functions are designed to limit the execution length of each period. The algorithms guarantee that the nodes complete fair transmission of network packets together in accordance with the fixed coordination scheduling rule of the model. Simulations and analysis demonstrate the effectiveness of the proposed algorithm in network throughput and fairness. 展开更多
关键词 wireless mesh network (WMN) fair queuing distributed scheduling FAIRNESS
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部