首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16篇
  免费   0篇
无线电   16篇
  2022年   2篇
  2021年   1篇
  2019年   2篇
  2018年   3篇
  2016年   1篇
  2014年   1篇
  2013年   3篇
  2012年   1篇
  2009年   1篇
  1989年   1篇
排序方式: 共有16条查询结果,搜索用时 687 毫秒
1.

We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to generate apt aftermaths. Privacy and security are the colossal perturb in the domain space of extensive data analysis. In this paper, our foremost priority is the computing technologies that focus on big data, IoT (Internet of Things), Cloud Computing, Blockchain, and fog computing. Among these, Cloud Computing follows the role of providing on-demand services to their customers by optimizing the cost factor. AWS, Azure, Google Cloud are the major cloud providers today. Fog computing offers new insights into the extension of cloud computing systems by procuring services to the edges of the network. In collaboration with multiple technologies, the Internet of Things takes this into effect, which solves the labyrinth of dealing with advanced services considering its significance in varied application domains. The Blockchain is a dataset that entertains many applications ranging from the fields of crypto-currency to smart contracts. The prospect of this research paper is to present the critical analysis and review it under the umbrella of existing extensive data systems. In this paper, we attend to critics' reviews and address the existing threats to the security of extensive data systems. Moreover, we scrutinize the security attacks on computing systems based upon Cloud, Blockchain, IoT, and fog. This paper lucidly illustrates the different threat behaviour and their impacts on complementary computational technologies. The authors have mooted a precise analysis of cloud-based technologies and discussed their defense mechanism and the security issues of mobile healthcare.

  相似文献   
2.
Overcoming periodic blockage of the received signal and the carrier frequency fluctuations caused by rotor blades and Doppler shift, respectively, are considered the most challenging issues in helicopter-satellite communication systems. In this study, we propose an automatic frequency control method based on an adaptive modulation scheme. We employ a hybrid modulation not only depending on quadrature phase shift keying, but also based on binary phase shift keying for accurate cancellation of periodic blockage. On the other hand, we apply a chaotic interleaving scheme with a hybrid modulation scheme in order to achieve a better Bit Error Rate (BER) performance in LOS and NLOS environments. Finally, we validate the mathematical analysis of the proposed scheme through simulations. We evaluated the performance of the proposed scheme and performed a comparison with conventional schemes. Our results show that the proposed scheme is significantly capable of reducing the acquisition time and working with various velocities of helicopter blades in addition to providing a better BER performance in shadow fading environments.  相似文献   
3.
The teletraffic performance of a highway microcellular digital mobile radio system having an oversailing macrocell that spans many microcells is presented. The microcellular cluster is composed of concatenated segments of the highway where each segment is a microcell, typically 500-2000 m in length, with the base stations located at lamp-post elevations. A narrowband time-division-multiple-access arrangement supporting ten channels per carrier and one carrier per base station is used. The teletraffic analysis assumes there are n-up and n-down lanes, and that the vehicular speeds conform to a truncated Gaussian distribution whose mean speed is 100 or 50 km/h when the vehicular traffic is free-flowing or in traffic-congested conditions, respectively  相似文献   
4.
This paper presents a new approach for efficient image transmission over Multi-Carrier Code Division Multiple Access (MC-CDMA) systems using chaotic interleaving. The chaotic interleaving scheme based on Baker map is applied on the image data prior to transmission. The proposed approach transmits images over wireless channels, efficiently, without posing significant constraints on the wireless communication system bandwidth and noise. The performance of the proposed approach is further improved by applying Frequency-Domain Equalization (FDE) at the receiver. Two types of frequency-domain equalizers are considered and compared for performance evaluation of the proposed MC-CDMA system; the Zero-Forcing equalizer and the Linear Minimum Mean Square Error (LMMSE) equalizer. Several experiments are carried out to test the performance of the image transmission with different sizes over the proposed MC-CDMA system. Simulation results show that image transmission over wireless channels using the proposed chaotic interleaving approach is much more immune to noise and fading. Moreover this chaotic interleaving process adds a degree of encryption to the transmitted data. The results also show a noticeable performance improvement in terms of the Root Mean Square Error and Peak Signal-to-Noise Ratio values when applying FDE in the proposed approach, especially with the LMMSE equalizer.  相似文献   
5.
Wireless Personal Communications - Femtocells are the solution to improve cellular system capacity in indoor coverage. In two-tier networks, co-channel interference is a serious problem. In this...  相似文献   
6.
In this paper, we propose a chaotic interleaving scheme for the continuous phase modulation based single-carrier frequency-domain equalization (CPM-SC-FDE) system. Chaotic interleaving is used in this scheme to generate permuted versions from the sample sequences to be transmitted, with low correlation among their samples, and hence a better bit error rate (BER) performance can be obtained. The proposed CPM-SC-FDE system with chaotic interleaving combines the advantages of the frequency diversity, the low complexity, and the high power efficiency of the CPM-SC-FDE system and the performance improvements due to chaotic interleaving. The BER performance of the CPM-SC-FDE system with and without chaotic interleaving is evaluated by computer simulations. Also, a comparison between the proposed chaotic interleaving and the conventional block interleaving is performed. Simulation results show that, the proposed chaotic interleaving scheme can greatly improve the performance of the CPM-SC-FDE system. Furthermore, the results show that this scheme outperforms the conventional block interleaving scheme in the CPM-SC-FDE system. The results also show that, the proposed CPM-SC-FDE system with chaotic interleaving provides a good trade-off between system performance and bandwidth efficiency.  相似文献   
7.
This paper presents different relay and jammer selection schemes for one-way cooperative networks to increase the security against malicious eavesdroppers. We consider a single source-destination cooperative network with multiple intermediate nodes and one or more eavesdroppers. The selection in the proposed schemes is made with the presence of direct links and the assumption that the broadcast phase is unsecured. The proposed schemes select three intermediate nodes. The first selected node operates in the conventional relay mode and assists the source to deliver its data to the corresponding destination via a Decode-and-Forward strategy. The second and third selected nodes are used in different communication phases as jammers to create intentional interference at the eavesdroppers’ nodes. Moreover, a hybrid scheme which switches between jamming and non-jamming modes is introduced in this paper. The proposed schemes are analyzed in terms of ergodic secrecy capacity and secrecy outage probability. Extensive analysis and a set of simulation results are presented to demonstrate the effectiveness of the different schemes presented in this work. The obtained results show that the proposed schemes with jamming outperform the conventional non-jamming schemes and the hybrid switching scheme further improves the secrecy capacity. The impact of changing both the eavesdroppers and the relays location on ergodic secrecy capacity and secrecy outage probability is also discussed. Finally, the impact of the presence of multiple eavesdroppers is studied in this paper.  相似文献   
8.
In this article, we propose a chaotic interleaving scheme for continuous-phase modulation-based orthogonal frequency-division multiplexing (CPM-OFDM) systems. The idea of chaotic maps randomisation (CMR) is exploited in this scheme. CMR generates permuted sequences from the sequences to be transmitted with lower correlation among their samples, and hence a better Bit Error Rate (BER) performance can be achieved. The proposed CMR-CPM-OFDM system combines the advantages of frequency diversity and power efficiency from CPM-OFDM and performance improvement from chaotic interleaving. The BER performance of the CPM-OFDM system with and without chaotic interleaving is evaluated by computer simulations. Also, a comparison between chaotic interleaving and block interleaving is performed. Simulation results show that, the proposed chaotic interleaving scheme can greatly improve the performance of CPM-OFDM systems. Furthermore, the results show that the proposed chaotic interleaving scheme outperforms the traditional block interleaving scheme for CPM-OFDM systems. The results show also that, the proposed CMR-CPM-OFDM system provides a good trade-off between system performance and bandwidth efficiency.  相似文献   
9.
The major issue related to the realization of wireless multimedia system is the design of suitable medium access control (MAC) protocol. The design challenge is to maximize the utilization of the limited wireless resources while guaranteeing the various quality of service requirements for all traffic classes especially for the stringent real-time constraint of real time variable bit rate (rt-VBR) video service. In this paper a novel resource allocation algorithm for video traffic is proposed. The proposed allocation algorithm aims to provide fair delay for video packets by minimizing the delay difference among transmitted video packets. At the same time it adaptively controls the allocated resources (bandwidth) for video traffic around the corresponding average bit rate, and has the ability of controlling the quality of service (QoS) offered for video traffic in terms of packet loss probability and average delay. A minimized control overhead of only two bits is needed to increase the utilization efficiency. Simulation results show that the proposed algorithm achieves very high utilization and provides nearly fair delay among video packets. Its efficiency is also investigated under traffic integration condition with voice and data traffic to show that the QoS offered to video traffic does not change in the presence of the highest priority voice traffic while data traffic increases the channel utilization to 98% by using the remaining bandwidth after voice and video traffic while a good QoS is offered to voice and data traffic.
Mohammed Abd-Elnaby (Corresponding author)Email:
  相似文献   
10.
Wireless Personal Communications - Cognitive radio is considered as the most intelligent solution to enable flexible use of the frequency spectrum. It allows the secondary user to use the band in...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号