基于环境感知的无线泛在网络自适应优化理论及技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
本文主要针对无线泛在网络中的自适应优化问题进行研究。在分析无线泛在网络的架构、需求和特点的基础上,以提高网络性能、增强网络自适应性为目标,分别从数据分析、模式识别、信息论和控制论出发,在不同的层次上对无线泛在网络中的自适应优化问题进行研究,并形成了具体的优化方案。相关研究对于无线泛在网络未来的应用和发展具有重要的理论和实际意义。
     本文首先基于环境感知技术研究了无线泛在网络中自适应优化的方法。在无线泛在网络中,存在着大量的数据,有效利用这些数据中的信息将对网络性能产生极大提升。本文提出采用小波分析中的多分辨分析对信号进行处理从而实现环境感知的算法,并以此为基础提升了切换过程的准确性;接着研究了通过利用滤波器上的数据实现更精确的接入选择的机制。最后,针对网络环境的时变特性,提出了一种通过对历史数据分析来获得影响网络性能的因素并估计其重要性的算法。仿真表明,通过对网络中数据更有效的利用,将可以在不增加额外设备的条件下提升无线泛在网络的可靠性和自适应性。
     为了更好通过环境感知实现自适应优化,无线泛在网络需要处理形如“好”、“坏”、“正常”、“异常”等抽象的概念信息,并基于这些信息对优化过程进行决策。本文基于模式识别的思想,首先以切换过程为例,分析了对网络中“正常”和“异常”状态判断的方法,并给出了调整切换参数的决策方法;接着对业务的QoS参数是否满足业务需求的标准进行了探讨;最后,提出了一种新的、更合理的评价用户体验的方法。理论分析和仿真表明,模式识别技术可以有效地提高无线泛在网络对于信息的获取和处理能力,从而保证网络自适应优化过程的准确和有效。
     继而,本文在研究环境感知的基础上,从更高的层次,对信息与系统性能的关系进行了探讨,并基于信息论提出了优化系统性能的具体方案。本文从信息论中的基本概念出发,首先基于Fanbo不等式提出了降低信息传递中信息损失的方法;接着,研究了信息中的不确定性对通信过程性能的影响,并在此基础上提出了采用随机算法提高系统性能的机制。最后,本文从Kolmogorov复杂度的概念出发,提出了信息熵与计算复杂度的关系,并给出一种通过独立成分分析提高计算效率的方法。
     更为宏观的讲,无线泛在网络是一个复杂的动力系统,为了保证这样一个复杂系统运行中的可靠性,使得系统状态的变化过程达到最优,就需要不断进行控制。本文基于控制论的思想,采用变分法和泛函分析研究了无线泛在网络中两种典型的功率控制问题,提出了不同情况下的最优控制方法。最后,基于极小值原理提出了最优的TCP传输控制机制,实现了系统的自适应优化。
     本文从多个角度对无线泛在网络中的自适应优化过程进行了研究,为无线泛在网络技术的应用和发展提供了支持。本文的研究思路也将对其它领域研究提供一定的启发。
This thesis investigates the self-optimization method and theory in the wireless ubiquitous network. Based on the analysis of the network architectures, requirements, and characteristics, this thesis proposes different perspectives on self-optimization mechanisms and algorithms in wireless ubiquitous network to improve the network performance. To study the self-optimization in the wireless ubiquitous network, data analysis, pattern recognition, information theory and cybernetics are emploied. The research of this thesis has important theoretical and practical significance in the application, development and research of wireless ubiquitous network.
     Firstly, this thesis studied method for context awareness by the network parameters. There are large amounts of data in wireless Ubiquitous Network, and effective usage of the information in these data will greatly enhance the performance of the network. This thesis studies the algorithm of multi-resolution analysis in wavelet analysis to process the received signal for contextual information. Then, to enhance the accuracy of the access selection process, the equalizer is used to collect information on surrounding environment. To deal with time-varying characteristics of the environment, a dynamically weight updating algorithm is proposed for access selection process. Simulation results show that with more efficient usage of the data in the network, the performance, reliability, and adaptability of the wireless ubiquitous network can be improved without extra equipment.
     In order to provide better services, wireless ubiquitous network needs to address the information like "good","bad" or "normal","abnormal". But traditional data analysis can not effectively deal with such conceptual information. In this thesis, many new methods are proposed to deal with conceptual information in Wireless Ubiquitous Network based on the idea of pattern recognition. Aimed at handoff failure recognition, quality of service (QoS) evaluation and quality of experience (QoE) evaluation, this thesis employs hypothesis testing, support vector machines and Bayesian networks respectively. The theoretical analysis and simulation both show that pattern recognition technology can effectively improve the performance of the wireless ubiquitous network.
     Then, from a higher level, this thesis studies the network optimization through an information theoretic perspective. Starting from the basic concepts of information theory, the way to reduce the information loss in the transmission of information based on Fanbo inequality is propoesd. Then, this thesis investigates the effect of uncertainty of information on the communication process; and a randomized algorithm is then proposed to improve system performance. This thesis also employs the concept of Kolmogorov complexity to investigate the relationship between information entropy and the computational complexity. Finally a method to improve the computational efficiency by independent component analysis is proposed.
     More macro, wireless ubiquitous network is a complex dynamic system, in order to ensure the reliability of such a system and realize the self-optimiztion; it is necessary to keep on carrying out the control of the system. This paper employs cybernetics to analyze the control process in the network. This thesis uses the variational methods and functional theory to deal with two kinds of typical power control problems in wireless ubiquitous network. Then, based on the principle of minimum optimal; then studies the TCP transmission from the cybernetic view to achieve the optimal control of the process.
引文
[1]2012, The WWRF website:http://www.wireless-world-research.org/
    [2]2012, EU IST website:URL http://cordis.europa.eu/ist/
    [3]2012, mITF website:URL http://www.mitf.org/index_e.html.
    [4]2012,中通信标准化协会网站:URL http://www.ccsa.org.cn/.
    [5]Zhang, P., Ji, Y., Zhang, Y., Wang, X., Hu, Z., MUSE:a vision of service and architecture for beyond 3G networks, In Proceedings of International Symposium on Autonomous Decentralized Systems,2005. ISADS 2005, Jiuzhaigou, China, pp 09-115.
    [6]Ji, Y., Zhang, P., Hu, Z, Wang, X., Li, Y., Tang, X., Towards Mobile Ubiquitous Service Environment, Wireless Personal Communications,38(1), pp.67-78. June 2006
    [7]B. Schilit, N. Adams, and R. Want, Context-aware computing applications, In Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, pp.85-90, Santa Cruz, California, December 1994, IEEE Computer Society Press.
    [8]N. Ryan, J. Pascoe, D. Morse, Enhanced Reality Fieldwork:the Context-Aware Archaeological Assistant, Computer Applications in Archaeology,1997.
    [9]D. Franklin, J. Flaschbart, All Gadget and No Representation Makes Jack a Dull Environment. AAAI 1998 Spring Symposium on Intelligent Environments, Technical Report SS-98-02 pp.155-160.1998
    [10]T. Rodden, K. Cheverst, K. Davies, A. Dix, Exploiting Context in HCI Design for Mobile Systems, Workshop on Human Computer Interaction with Mobile Devices,1998.
    [11]A. Dey and G. Abowd, Towards a Better Understanding of context and context-awareness, Technical Report GIT-GVU-99-22, Georgia Institute of Technology, College of Computing, June 1999.
    [12]2011, the goldmansachs http://www.goldmansachs.com/
    [13]T. Buchholz, A. Kupper and M. Schiffers, Quality of Context:What it is and why we need it, In Procedings of the workshop of the HP Open View University Association,2003.
    [14]K. Sheikh, M. Wegdam and M. Sinderen, Middleware support for quality of context in pervasive context-aware systems, In Fifth Annual IEEE International Conference on Pervasive Computing and Communications (Percom 2007), March 2007.
    [15]J. Gwizdka, What's in the context?, Proceedings of Workshop on The What, Who, Where, When, and How of Context-Awareness, Conference on Human Factors in Computing Systems(CHI 2000), April 2000.
    [16]D. Petrelli, E. Not, C. Strapparava, O. Stock, and M. Zancanaro, Modeling context is like taking pictures, Proceedings of Workshop on Context Awareness (CHI 2000),2000.
    [17]http://gaia.cs.uiuc.edu/html/cfs.htm
    [18]V.Bellotti,andW.K.Edwards, Intelligibilityand accountability:Human considerations in context-aware systems, Human-Computer Interaction,2001,16(2-4):pp.193-212.
    [19]2012中华人民共和国科技部http://www. most.gov.cn/
    [20]2012 工业和信息化部电信研究院http://main.catr.cn/
    [21]Gregory D.Abowd and Elizabeth D.Mynatt Charting Past,Present and Future Research on Ubiquitous Computing
    [22]Albrecht Schmidt,beigl,and Hans W. Gellersen. There is more to context than location In Proceedings of Workshop on Interactive Applications of Mobile Computing(IMC 98)
    [23]Albrecht Schmidt,Asante Aidoo,Autti Takaluoma,Urpo Tuomela, Kristof Van Laerhoven, and Walter an de Velde. Advanced interaction in contect. In Proceedings of First International Symposium on Handheld and Ubiquitous Computing
    [24]Deborah Estrin,David Culler,Kris Pister,et al. Connecting the physical world with pervasive networks.
    [25]Stephen S. Yau,Fariaz Karim,Yu Wang.et al.Reconfigurable context-sensitive middleware for pervasive computing.
    [26]Dong S H, WangJ,Dai G Z.Human-Computer Interaction and multimodal User Interface
    [27]L. Giuri and P, Iglio. Role templates for content-based access control, In Sencond ACM Workshop on Role-Based Access Control, Fairfax, Virginia, November 1997, pp.153-159.
    [28]Bertino E, Bonatti PA, Ferrari E, TRBAC:A temporal role-based access control model, ACM Trans. on Information and System Security,2001,4(3):pp.191-233.
    [29]Hansmann, Uwe. "Pervasive Computing:The Mobile World". Springer. ISBN 3540002189.
    [30]Poslad, Stefan. "Ubiquitous Computing Smart Devices, Smart Environments and Smart Interaction".2009,Wiley. ISBN 978-0-470-03560-3.
    [31]P.Bahl, A.Balachandran and V.Padmanabhan, Enhancements to the RADAR User Location and Tracking System, Microsoft Reasearch, Technical Report, Feb.2000.
    [32]A.Ladd, K.Bekris, GMarceau, A.Ruddys, L.Kavraki and D.Wallach, Robotics-based location sensing using wireless Ethernet, In proceedings of the Tenth ACM International Conference on Mobile Computing and Networking,2002.
    [33]M.Youssef, A.Agrawala and U.Shankar, WLAN Location Determination via Clustering and Probability Distributions, In IEEE Percom 2003, March 2003.
    [34]K P. Bahl and V.N. Padmanabhan, "RADAR:An in-building RF-based user location and tracking system", In Infocom,2000, pp.775-784.
    [35]Veljo Otsason, Alex Varshavsky, Anthony LaMarca and Eyal de Lara, Accurate GSM Indoor Localization
    [36]Hao Y, Ted S, Context-aware office assistant
    [37]Frazer B, Tristian R, Andy H, Teleporting-making application mobile
    [38]Noble BD, Satyanarayanan, Agile applicaton-aware adaptation for mobility
    [1]Saraydar, C.U., Mandayam, N.B., Goodman, D.J., Efficient power control via pricing in wireless data networks, IEEE Transations on Communications, Vol.50, pp.47-51. Apr.2009,
    [2]Demestichas P, Dimitrakopoulos G, Strassner J, et al. Introducing reconfigurability and cognitive networks concepts in the wireless world [J]. IEEE Vehicular Technology Magazine, pp.32-39,2006,1(2)
    [3]Thomas R W, Friend D H, DaSilva L A, et al. Cognitive networks: adaptation and learning to achieve end-to-end performance objectives[J]. IEEE Communications Magazine, pp.51-57. 2006,44(12),
    [4]Cheng Peng, Yu Guanding, Zhang Zhaoyang, et al. Analysis and optimization of power control in multiuser cognitive wireless networks[C]//ICC07. Glasgow:[s.n.], pp.5395-5400, 2007
    [5]Mishra A. A multi-channel MAC for opportunistic spectrum sharing in cognitive networks[C]//MILCOM 2006. [S.I.]:IEEE,2006:1-6.
    [6]Hong Y Ge, Park J S. Considerations of multi network in cognitive network[C]//ICACT 2008. Phoenix Park:[s.n.],2008, pp.341-344.
    [7]V. Srivastava and M. Motani, "Cross-Layer Design:A Survey and the Road Ahead," IEEE Communications Magazine, Dec 2005.
    [8]"Cross-layer Resource Allocation for Wireless Networks via Signomial Programming, "
    [9]F.P. Kelly, A. Maulloo, and D. Tan, "Rate Control for Communication Networks:Shadow Prices, Proportional Fairness and Stability," J. Op. Research Soc., vol.49, pp.237-252,1998.
    [10]X. Lin and N.B. Shroff, "Joint Rate Control and Scheduling in Multi Hop Wireless Networks," Proc. IEEE Conf. Decision and Control, Paradise Island, Bahamas, vol.5, pp.1484-1489, Dec 2004.
    [11]Steuer, R.E. "Multiple Criteria Optimization:Theory, Computations, and Application". New York:John Wiley & Sons, Inc.1986
    [12]Sawaragi, Y.; Nakayama, H. and Tanino, T. "Theory of Multiobjective Optimization (vol. 176 of Mathematics in Science and Engineering". Orlando, FL:Academic Press Inc 1985
    [13]A. Eryilmaz and R.Srikant, "Joint Congestion Control, Routing and MAC for Stability and Fairness in Wireless Networks," IEEE J. Select. Areas Commun., vol.24, no.8, pp.1514-1524, Aug 2006.
    [14]A. Eryilmaz and R. Srikant, "Fair Resource Allocation in Wireless Networks using Queue-length-based Scheduling and Congestion Control," IEEE/ACM Transactions on Networking, vol.15, no.6, pp.1333-1344, Dec 2007.
    [15]Jonathon Shlens, "A Tutorial on Principal Component Analysis".
    [16]S. Shakkottai, T. S. Rappaport and P. C. Karlsson, "Cross-Layer Design for Wireless Networks," IEEE Commun. Mag., vol.41, no.10, pp.74-80, Oct 2003.
    [17]P. D. Dalal and K. S. Dasgupta, "TCP Cross Layer Adaptive Policy," 2010 National Conference on Communications, Jan 2010.
    [18]M. Heidarinezhad, M. Mirhoseini and H. Khosravi, "A Connection Selection Method and Vertical Handoff in Hybrid Wireless Environment," 2009 International Conference on Future Networks, pp.161-165, March 2009.
    [19]Lionel Husson and Jean-Claude Dany, "A New Method for Reducing the Power Consumption of Portable Handsets in TDMA Mobile Systems:Conditional Equalization", IEEE Trans on vehicular technology, vol 48, no.6, Nov 1999
    [20]Novak, V., Perfilieva, I. and Mockor, J. "Mathematical principles of fuzzy logic", Dodrecht: Kluwer Academic,1999
    [21]Paul S. Addison, "The Illustrated Wavelet Transform Handbook", Institute of Physics,2002,
    [22]H. Luo, S. Ci and D. Wu, "Quality-Driven Cross-Layer Optimized Video Delivery over LTE," IEEE Communications Magazine, vol.48, no.2, pp.102-109, Feb 2010.
    [23]王景尧,宋梅,张勇,张英海.“认知网络中基于小波分析的切换判决”,北京邮电大学学报,Vol.33 no.6 Dec.2010.
    [24]Wang Jingyao,Li Mengjia, Song Mei, Zhang Yinghai "A Novel Cross Layer Design Scheme based on Principal Component Analysis in Cognitive Network",2010 International Conference on Advanced Intelligence and Awareness Internet, AIAI 2010, pp.246-249 2010
    [1]R.W. Thomas, L.A. DaSilva and A.B. MacKenzie. Cognitive Networks.20051st IEEE International Symposium on New Frontiers in Dynamic Spectru Access Networks, pp.352-360, Nov.2005.
    [2]J. Kishigami. The Role of QoE on IPTV Services style. Ninth IEEE International Symposium on Multimedia, pp.11-13, Dec.2007.
    [3]H.J. Kim, D.H. Lee and J.M. Lee. The QoE Evaluation Method through the QoS-QoE Correlation Model. Fourth International Conference on Networked Computing and Advanced Information Management, pp.719-725, Sept.2008.
    [4]Y. Du, W.A. Zhou and B.F. Chen. A QoE Based Evaluation of Service Quality in Wireless Communication Network.2009 International Conference on New Trends in Information and Service Science, pp552-557, Jun.2009.
    [5]H.J. Kim and S.G. Choi. A study on a QoS/QoE correlation model for QoE evaluation on IPTV service. The 12th International Conference on Advanced Communication Technology, pp.1377-1382, Feb.2010.
    [6]K. Piamrat, A. Ksentini and C. Viho. QoE-aware Admission Control for Multimedia Applications in IEEE 802.11 Wireless Networks. IEEE 68th Vehicular Technology Conference, pp.1-5, Sept.2008.
    [7]M. Reza, H. Nezhad and Z.A. Zukrnain. A connection selection method for vertical handoff in hybrid wireless environment. First International Symposium on Applied Sciences on Biomedical and Communication Technologies. pp.1-5, Oct.2008.
    [8]W.B. Jomaa, H. Youssef and G. Pujolle. A cross-layer autonomic architecture for QoS support in wireless networks. Wireless Days. pp.1-6, Nov.2008.
    [9]K. Mitra, A. Zaslavsky and C. Ahlund. PRONET:Proactive context-aware support for mobility in heterogeneous access networks. The 34th annual IEEE conference on Local Computer Networks. pp.675-676, Oct.2009.
    [10]Y. Yu. Cross-Layer Architecture in Cognitive Ad Hoc Networks. International Conference on Communications and Mobile Computing. Vol 2, pp.47-51, Jan.2009.
    [11]J.L. Chen, M.C. Chen and S.W. Liu. Cross-layer QOS architecture for 4G heterogeneous network services.11th International Conference on Advanced Communication Technology. Vol 1, pp.73-77, Feb.2009.
    [12]Seunghoon Nam, Mai Vu,Tarokh. V, Relay selection methods for wireless cooperative communications Information Sciences and Systems,42nd Annual Conference CISS, pp.859-864. March 2008,
    [13]Beres. E, Adve. R, Selection Cooperation in multi-source cooperative networks, IEEE Trans. Vol 7, pp.118-127. Jan.2008,
    [14]Zhao B, Valenti M C. Cooperative diversity using distributed Turbo Codes [J] Proc.Virginia Tech Symp. On Wireless Personal Comm.,(Blacksburg, VA),2003. Shenker. S, Fundamental design issues for the future Internet, IEEE Journal Vol 13, Sept. pp.1176-1188.1995,
    [15]Seungwan Ryu, Byunghan Ryu, Hyunhwa Seo, Mooyong Shin, Urgency and Efficiency based Packet Scheduling Algorithm for OFDMA wireless system, Vol.4, ICC. pp.2779-2785.2005
    [16]Katoozian, M., Navaie, K.; Yanikomeroglu, H., Optimal utility-based resource allocation for OFDM networks with multiple types of traffic, VTC Spring, pp.2223-2227.2008
    [17]Yinglei Teng, Yong Zhang, Mei Song, Yu Dong, Li Wang, Genetic Algorithm based Adaptive Resource Allocation in OFDMA System for Heterogeneous Traffic,2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications(PIMRC 2009), pp.2060-2064. Sep.2009,.
    [18]Koutroumbas, Konstantinos; Theodoridis, Sergios. "Pattern Recognition (4th ed.)." Boston: Academic Press.2008, ISBN 1-59749-272-8.
    [19]Richard.O.Duda, Peter.E.Hart and David.GStork. "Pattern Classcation(2nd ed)"
    [20]Theodoridis, Sergios; and Koutroumbas, Konstantinos; "Pattern Recognition",4th Edition, Academic Press,2009
    [21]Scholkopf, Bernhard; and Smola, Alexander J. "Learning with Kernels", MIT Press, Cambridge, MA,2002.
    [22]Steinwart, Ingo; and Christmann, Andreas; "Support Vector Machines", Springer-Verlag, New York,2008
    [23]ITU-T Recommendation G.1000. "Quality of Service:A Famwwork and Definitions",2011.
    [24]赵其刚,王建成,彭虎,“NGN运营网络及其QoS问题”,西南交通大学出版社,2008
    [25]IETF, RFC 2990, "Next step for IP QoS Architecture."2000
    [26]IETF, RFC 3260, "New Terminology and Clarifications for Diffeserv.",3260
    [1]Claude E. Shannon, "A Mathematical Theory of Communication," Bell System Technical Journal, Vol.27, pp.379-423,623-656,1948.
    [2]Yanhui Geng and Li, V.O.K. "A Framework to Analyze Network Performance Based on Information Quality" ICC 2010 pp 1-5
    [3]Jun Hong; Li, V.O.K. "Impact of Information on Network Performance-An Information-Theoretic Perspective", GLOBECOM 2009. pp 1-6
    [4]Eng Hwee Ong and JamilY.Khan. One Optimal Network Selection in a Dynamic Multi-RAT Environment [J].IEEE COMMUNICATIONS LETTERS,2010,14(3):217-219.
    [5]T. Cover and J. Thomas, Elements of Information Theory. New York, Wiley,2006.
    [6]Wei Shen and Qing-An Zeng. Cost-Function-Based Network Selection Strategy in Integrated Wireless and Mobile Networks [J].IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,2008,57(6):3778-3788.
    [7]M. Stemm and R. H. Katz.Vertical handoffs in wireless overlay networks [J]. Mobile Netw. Appl.—Special Issue on Mobile Networking in the Internet,1998,3(4):335-350.
    [8]Q. Zhang, C. Guo, Z. Guo, and W. Zhu. Efficient mobility management for vertical handoff betweenWWAN andWLAN [J]. IEEE Commun. Mag,2003,41(11):102-108.
    [9]M. Nam, N. Choi, Y. Seok, and Y. Choi. WISE:Energy-efficient interface selection on vertical handoff between 3G networks and WLANs [C]//. IEEE Int. Symp. PIMRC, Barcelona, SPAIN:IEEE Press,2004:692-698.
    [10]H. Wang, R. Katz, and J. Giese. Policy-enabled handoffs across heterogeneous wireless networks [C]//Proceeding of IEEE WMCSA, New Orleans, US:IEEE Press,1999:51-60.
    [11]F. Zhu and J. McNair. Optimizations for vertical handoff decision algorithms[C]//Proceeding of IEEE WCNC, Atlanta, GA, USA:IEEE Press,2004:867-872.
    [12]Q.Y. Song and A. Jamalipour.Network selection in an integrated wireless LAN and UMTS environment using mathematical modeling and computing techniques [J]. IEEE Wireless Commun,2005,12(3):42-48.
    [13]Dusit Niyato and Ekram Hossain. Dynamics of Network Selection in Heterogenrous Wreless Networks:An Evolutionary Game Approach [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.58, NO.4, MAY 2009, pp:2008-2017.
    [14]Peng Cheng, Guanding Yu, Zhaoyang Zhang. Peiliang Qiu. Analysis and Optimization of Power Control in Multiuser Cognitive Wireless Networks[C]//Proceeding of IEEE International Conference on Communications (ICC), Glasgow, Scotland, UK:IEEE Press, 2007:5395-5400.
    [15]Chan Ho, Fan Pingyi, Cao Zhigang. A utility-based network selection scheme for multiple services in heterogeneous networks[C]//International Conference on Wireless Networks, Communications and Mobile Computing. Hawaii, USA,2005:1175-1180.
    [16]Ormond Olga, Murphy John. Utility-based intelligent network selection in beyond 3G systems communications[C]//IEEE International Conference on Communications. Istanbul: IEEE Press.2006:1831-1836.
    [17]Wu Haisang, Ravindran Binoy, Douglas E. Utility accrual scheduling under joint utility and resource constraints[C]//Seventh IEEE International Symposium on Object-Oriented Real-Time Distributed Computing. Vienna:IEEE Press.2004:307-314.
    [18]Murray K, Pesch D. Policy based access management and handover control in heterogeneous wireless networks[C]//VTC 2004-Fall, Los Angeles, California, USA:IEEE Press, 2004:3319-3323.
    [19]Demestichas, G. Dimitrakopoulos, J. Strassner, D. Bourse. Introducing reconfigurability and cognitive networks concepts in the wireless world, [J]. IEEE Vehicular Technology Magazine, 2006,1(2):32-39.
    [20]R. W. Thomas, D. H. Friend, L. A. DaSilva, A. B. MacKenzie. Cognitive networks: adaptation and learning to achieve end-to-end performance objectives [J]. IEEE Communications Magazine,2006,44(12):51-57.
    [21]TMF, "Wireless Service Measurements Handbook",GB923, Version 3.0,2004
    [22]Jun Hong; Li, V.O.K. Impact of Information on Network Performance-An Information-Theoretic Perspective[C]//Proceeding of IEEE GLOBECOM, Hawaii, USA: IEEE Press,2009:1-6.
    [23]Roy, A.Das, S.K. and Misra, A. Exploiting Information Theory for Adaptive Mobility and Resource Management in Future Cellular Networks [J]. IEEE Wireless Communications, 2004,11(4):59-65.
    [1]Athans, M. A. and Falb, P. L., "Optimal Control", McGraw-Hill, New York,1966.
    [2]李传江,马广富,“最优控制“,科学出版社,北京,2011年
    [3]Sethi, S. P., and Thompson, G. L. " Optimal Control Theory:Applications to Management Science and Economics",2nd edition, Springer,2000
    [4]谢希仁,“计算机网络(第五版)”,电子工业出版社,北京,2009年
    [5]N. D. Bambos, S. C. Chen, and G. J. Pottie. "Radio link admission algorithm for wireless networks with power control and active link quality protection" In INFOCOM'95,1995.
    [6]R. Cruz and A. Santhanam. "Optimal link scheduling and power control in cdma multihop wireless networks". Globecom,2002.
    [7]F. Cuomo, C. Martello, A. Baiocchi, and F. Capriotti. "Radio resource sharing for ad hoc networking with uwb. IEEE Journal on Selected Areas in Communications", 20(9):1722-1732, December 2002.
    [8]T. Elbatt and A. Ephremides. "Joint scheduling and power control for wireless ad-hoc networks". In Proceedings INFOCOM,2002.
    [9]吴伟陵,牛凯,“移动通信原理”,电子工业出版社,北京,2005年
    [10]David Tse, Pramod Viswanath, "Fundamentals of Wireless Communication", Press of Cambridge University, Cambridge, England,2005.
    [11]G. J. Foschini and Z. Miljanic. "A simple distributed autonomous power control algorithm and its convergence". IEEE Transactions on Vehicular Technology,42(4):641-646, November 1993.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700