Netinfo Security ›› 2015, Vol. 15 ›› Issue (2): 40-45.doi: 10.3969/j.issn.1671-1122.2015.02.007
Previous Articles Next Articles
QU Le-cheng(), LI Xin, SUN Fa-jiang
Received:
2014-12-26
Online:
2015-02-10
Published:
2015-07-05
CLC Number:
QU Le-cheng, LI Xin, SUN Fa-jiang. System Design for Ocean Sensor Data Transmission Based on Wireless Networks[J]. Netinfo Security, 2015, 15(2): 40-45.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2015.02.007
[1] | 朱光文. 我国海洋监测技术研究和开发的现状和未来发展[J]. 海洋技术,2002,21(2):27-32. |
[2] | 韩华,刘风鸣,丁永生. 基于海洋综合观测平台的海洋智能预警的研究[J]. 计算机工程与应用,2008,44(30):226-228. |
[3] | 刘伟. 水声通信数字调制器的设计与实现[D]. 武汉:华中科技大学,2004. |
[4] | 朱昌平,韩庆邦. 水声通信基本原理与应用[M]. 北京:电子工业出版社,2009. |
[5] | 张春荣,范寒柏. 基于GPRS远程监控系统数据终端的研究[J]. 现代电子技术,2006,(15):110-112. |
[6] | 张绪鹏,王长松,许江枫. 新型感应式电能传输系统[J]. 机械设计与制造,2009,(3):106-108. |
[7] | 陈为刚,杨晋生,马建国,等. 海洋通信的最新进展综述[J]. 中国通信,2012,(2):31-42. |
[8] | 舒展. 嵌入式系统综述[J]. 现代计算机(专业版),2011,(5):44-46. |
[9] | 王宗. 海洋远程浮标数据传输与处理系统研制[D]. 杭州:杭州电子科技大学,2011. |
[10] | 王晖. 海洋剖面环境多参数采集系统研制[D]. 杭州:杭州电子科技大学,2012. |
[11] | 邵媛媛. 基于Web的远程监控系统的设计与实现[D]. 沈阳:沈阳理工大学,2008. |
[12] | 郎为民,张国峰,王逢东,等. 基于流行病理论的无线认知传感网抗攻击模型[J]. 信息网络安全,2013,(6):26-29. |
[13] | 李建中,高宏. 无线传感器网络的研究进展[J]. 计算机研究与发展,2008,45(1):1-15. |
[14] | 沈波,张世永,钟亦平. 无线传感器网络分簇路由协议[J]. 软件学报,2006,17(7):1588-1600. |
[15] | 徐浚诚,游林. 异构WSN 中基于参考值的可恢复隐私保护数据融合[J]. 信息网络安全,2014,(3):74-79. |
[16] | 李成法,陈贵海,叶懋,等. 一种基于非均匀分簇的无线传感器网络路由协议[J].计算机学报,2007,30(1):27-36. |
[17] | 李慕峰,田宇,徐鸿飞. 基于链路质量的应急无线传感网络路由算法研究[J]. 信息网络安全,2014,(5):59-62. |
[1] | HUANG Wangwang, ZHOU Hua, WANG Daiqiang, ZHAO Qi. Design of Reconfigurable Key Security Authentication Protocol for IoT Based on National Cryptography SM9 [J]. Netinfo Security, 2024, 24(7): 1006-1014. |
[2] | ZHANG Xiaojun, ZHANG Nan, HAO Yunpu, WANG Zhouyang, XUE Jingting. Three-Factor Authentication and Key Agreement Protocol Based on Chaotic Map for Industrial Internet of Things Systems [J]. Netinfo Security, 2024, 24(7): 1015-1026. |
[3] | ZHANG Jiwei, WANG Wenjun, NIU Shaozhang, GUO Xiangkuo. Blockchain Scaling Solutions: ZK-Rollup Review [J]. Netinfo Security, 2024, 24(7): 1027-1037. |
[4] | ZHANG Liqiang, LU Mengjun, YAN Fei. A Cross-Contract Fuzzing Scheme Based on Function Dependencies [J]. Netinfo Security, 2024, 24(7): 1038-1049. |
[5] | DONG Yunyun, ZHU Yuling, YAO Shaowen. High-Quality Full-Size Image Steganography Method Based on Improved U-Net and Hybrid Attention Mechanism [J]. Netinfo Security, 2024, 24(7): 1050-1061. |
[6] | ZHOU Shucheng, LI Yang, LI Chuanrong, GUO Lulu, JIA Xinhong, YANG Xinghua. Context-Based Abnormal Root Cause Algorithm [J]. Netinfo Security, 2024, 24(7): 1062-1075. |
[7] | REN Changyu, ZHANG Ling, JI Hangyuan, YANG Liqun. Research on TTP Extraction Method Based on Pre-Trained Language Model and Chinese-English Threat Intelligence [J]. Netinfo Security, 2024, 24(7): 1076-1087. |
[8] | CAI Manchun, XI Rongkang, ZHU Yi, ZHAO Zhongbin. A Fingerprint Identification Method of Multi-Page and Multi-Tag Targeting Tor Website [J]. Netinfo Security, 2024, 24(7): 1088-1097. |
[9] | XIANG Hui, XUE Yunhao, HAO Lingxin. Large Language Model-Generated Text Detection Based on Linguistic Feature Ensemble Learning [J]. Netinfo Security, 2024, 24(7): 1098-1109. |
[10] | SHEN Xiuyu, JI Weifeng. Optimization of Cost of Edge-Cloud Collaborative Computing Offloading Considering Security [J]. Netinfo Security, 2024, 24(7): 1110-1121. |
[11] | ZHAO Xinqiang, FAN Bo, ZHANG Dongju. Research on APT Attack Defense System Based on Threat Discovery [J]. Netinfo Security, 2024, 24(7): 1122-1128. |
[12] | WEN Wen, LIU Qinju, KUANG Lin, REN Xuejing. Research and Scheme Design of Cyber Threat Intelligence Sharing under Privacy Protection System [J]. Netinfo Security, 2024, 24(7): 1129-1137. |
[13] | LIU Yidan, MA Yongliu, DU Yibin, CHENG Qingfeng. A Certificateless Anonymous Authentication Key Agreement Protocol for VANET [J]. Netinfo Security, 2024, 24(7): 983-992. |
[14] | LUO Ming, ZHAN Qibang, QIU Minrong. A Heterogeneous Cross-Domain Conditional Privacy Protection Ring Signcryption Scheme for V2I Communication [J]. Netinfo Security, 2024, 24(7): 993-1005. |
[15] | LI Zengpeng, WANG Siyang, WANG Mei. Research of Privacy-Preserving Proximity Test [J]. Netinfo Security, 2024, 24(6): 817-830. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||