期刊文献+

一种强干扰下无线拼接组网临界跨越分析算法

Critical Cross Analysis Algorithm Under Strong Disturbance Networking
下载PDF
导出
摘要 强干扰环境下的无线拼接组网是恶劣环境下组网应用的难点所在。传统方法通常采用盲信号分离算法以及普通小波噪声分离对噪声及干扰进行抑制,但是效果并不理想。提出一种强干扰下基于临界跨越分析算法的无线拼接组网技术,首先对组网呼叫信号与噪声进行分离计算,再对处理后的信号进行白化、临界跨越分析,从而提高系统抗干扰能力,实现可靠组网。在实际恶劣环境下进行仿真实验,结果表明采用临界跨越分析算法,系统的组网干扰分布得到了很好的抑制,组网系统具有很好的抗干扰能力,可以被广泛应用。 It was the most difficult for the wireless network application in strong interference environment. In conventional method, the common blind signal separation algorithm was used as well as ordinary wavelet noise separation on noise and interference suppression, but the effect was not ideal. So a wireless network stitching method with across critical analysis in high interference was proposed, firstly, the signal was calculated with wavelet noise separator, and then the processed sig-nal after whitening was calculated across critical analysis to improve anti-jamming capability. The actual simulation experi-ment result shows that with across critical analysis algorithms, the distribution of network interference suppression is better than traditional method, network system has good anti-jamming capability, and which can be widely used.
出处 《科技通报》 北大核心 2014年第6期194-196,共3页 Bulletin of Science and Technology
基金 郑州市无线与移动通信网络应用技术科技创新团队(121PCXTD511)
关键词 临界跨越分析 强干扰 无线组网 across critical analysis anti-jamming capability wireless network stitching
  • 相关文献

参考文献4

二级参考文献24

  • 1白林林,严斌宇,罗敬文,苟旭,卢苇.基于节点信任的LEACH协议簇头选举改进算法[J].四川大学学报(工程科学版),2012,44(S1):218-223. 被引量:12
  • 2刘敏华,萧德云.基于相似度的多传感器数据融合[J].控制与决策,2004,19(5):534-537. 被引量:35
  • 3孙家旭 张林波.网络并行计算与分布式编程环境[M].北京:科学出版社,1996.. 被引量:5
  • 4吴晓平,付钰.信息系统安全风险评估理论与方法[M].北京:科学出版社,2010. 被引量:7
  • 5Wu Xiaoping, Yu Fu, Wang Jiasheng. Information Security Risk Assessment On Improved Fuzzy AHP[C]. In: 2009 ISECS International Colloquium on Computing, Communica- tion, Control, and Management. SanYa.. IEEE Press, 2009 : 365- 369. 被引量:1
  • 6Zahariadis T, Vaxevanakis K G, Tsantilas C P. Glob- al romancing in next--Generation networks[J]. IEEE Communications Magazine, 2002, (2) : 145-151. 被引量:1
  • 7Virendra M, Upadhyaya S. Securing information through trust management in wireless networks[C]// Proceedings of Workshop on Secure Knowledge Man- agement (SKM2004). Buffalo:IEEE, 2004: 201-206. 被引量:1
  • 8Hur J,Lee Y,Hong SM,etal. Trust management for resilient wireless sensor networks [C]//Proc of the ICISC 2005, LNCS 3935. Berlin, Heidelberg: Spring- Verlag, 2006 : 56-68. 被引量:1
  • 9Yang Yi,Wang Xinran, Zhu Sencun. SDAP: A secure hop by hop data aggregation protocol for sensor net- works[C]//Proc of the Seventh ACM International Symposium on Mobile Ad Hoc Netuorking and Com- puting. Florence : ACM Press, 2006:356-367. 被引量:1
  • 10Safa H, Artail H, Tabet D. A cluster-based trust- aware routing protocol for mobile Ad Hoc networks [J]. Wireless Networks, 2010,16:969-984. 被引量:1

共引文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部