-
3401
Ternary complementary sets and its application in UWB
Published 2005-01-01“…Ternary complementary set based UWB signaling employing a set of orthogonal chip pulses was proposed for DS-UWB.It had many advantages in indoor high-speed short range communications.First the system model of multiple access communications was founded,then ternary complementary set and its recursive construction method were analyzed,and then the performance evaluation structure of multiple access communications based the ternary complementary sets by use of the Rake receiver was put forward.Ternary complementary sets assigned to two users had good aperiodic autocorrelation functions.Hence,the multipath interference as well as multiple access interference were mitigated.Simulation results show that ternary MO complementary sets have better performances compared with other random sequences in the SV/IEEE 802.15.3a channel model.…”
Get full text
Article -
3402
AC Optimal Power Flow: a Conic Programming relaxation and an iterative MILP scheme for Global Optimization
Published 2022-11-01“…We apply this iterative MILP scheme on the IEEE PES PGLib [2] benchmark and compare the results with two recent Global Optimization approaches.…”
Get full text
Article -
3403
A survey of key protocol and application scenario of time-sensitive network
Published 2019-10-01“…With the development of information technology,the demand for scenarios with objects as the main body of communication is increasing,such as factory automation control,automatic driving,etc.The time delay requirements of such communication for data transmission far exceed the controllable range of traditional ethernet,then time-sensitive network have emerged.Time-sensitive network is a standardized technology that provides deterministic information transmission based on standard ethernet.It minimizes jitter through time-aware scheduling mechanism and provides reliable guarantee of data transmission for time-sensitive applications.The core characteristics and mechanism of time-sensitive network were introduced through the description of IEEE standards and its application scenarios were analyzed in vehicle network,industrial internet,aircraft data network and mobile fronthaul network.…”
Get full text
Article -
3404
Studi Empiris terhadap Kinerja & Keamanan Wifi (Studi Kasus di Kota Depok)
Published 2019-12-01“…Oleh karena itu penilaian kinerja dan keamanan jaringan wifi di Kota Depok dinilai sudah baik sesuai dengan standar IEEE 802.11i yaitu tentang peningkatan pengamanan pada jaringan Wifi menggunakan WPA2 dan 802.11b tentang pengaturan channel wifi yang tidak menimbulkan interferensi. …”
Get full text
Article -
3405
Ultrawideband Vivaldi Antenna for DVB-T, WLAN, and WiMAX Applications
Published 2014-01-01“…This antenna is suitable for portable DVB-T which extended from 450 MHz to 850 MHz receiver applications and the WLAN (Wireless Local Area Network) IEEE 802.11b,g (5.1–5.8) GHz frequency bands and WiMAX band (3.3–3.8) GHz. …”
Get full text
Article -
3406
Models and Methods for Planning Hydrogen Supply Chain Systems
Published 2024-01-01Get full text
Article -
3407
Distortion-Based Slice Level Prioritization for Real-Time Video over QoS-Enabled Wireless Networks
Published 2012-01-01“…The proposed scheme is demonstrated for an IEEE 802.11e quality-of-service- (QoS-) enabled wireless LAN. …”
Get full text
Article -
3408
Pilot Position Optimization Design of WLAN System Based on Experiment
Published 2015-08-01“…Considering the frame structure of IEEE 802.11ac with “leading preamble plus comb-like pilot”,the performance evaluation formula of the correction scheme based on maximum likelihood estimation was derived,according to which the effect of pilot location,channel fading and subcarrier correlation was studied.Furthermore,a signalling exchange method was proposed,which ensured pilot position synchronization on both end,and a low complexity algorithm of pilot optimization according to the frequency channel amplitude information.In this way,the pilot overhead can be reduced without loss of correction performance.The experiment and simulation result shows that for ideal Rayleigh channel data,correction performance improves by 1.85 dB and 7.15 dB for unknown channel amplitude information in frequency domain and known cases respectively.For field experiment channel data,correction performance improves by 1.67 dB and 2.68 dB respectively.…”
Get full text
Article -
3409
Voltage Stability Bifurcation Analysis for AC/DC Systems with VSC-HVDC
Published 2013-01-01“…At last, the modified IEEE test systems are adopted to illustrate the effectiveness of the proposed method.…”
Get full text
Article -
3410
Research on Distributed Wireless Multi-Step Attack Pattern Mining Method for WLAN
Published 2013-11-01“…A distributed wireless multi-step attack pattern mining(DWMAPM)method based on correlation analysis with the IEEE 802.11 protocol frame attributes was proposed. …”
Get full text
Article -
3411
SWAMI: A SWARM-INTELLIGENT OPTIMIZATION TECHNIQUE FOR VOLTAGE COLLAPSE MITIGATION
Published 2022-09-01“…Several simulation studies have been conducted considering three very popular and successful SWAMI agents – the PSOM, BCOM and ACOM on an IEEE benchmark power network with promising results. …”
Get full text
Article -
3412
Symbol timing recovery algorithm based on ordered statistic of maximum mean power timing for WBAN
Published 2015-05-01“…The symbol timing algorithm based on maximum mean power timing is independent of carrier phase offset,and has the property of capturing timing information fast,which meets the demand of wireless body area networks (WBAN).According to IEEE 802.15.6 standard,the ordered statistic of maximum mean power timing was used to reduce the computational complexity in the symbol timing process.The theoretical analysis and simulation results shows that the proposed algorithm can achieve symbol timing within 32 symbols and reduce the computational complexity by ninety percent at most compared to the original maximum mean power algorithm.The fast synchronization and car-rier-independence property of the proposed algorithm can also make room for carrier-offset recovery and frame synchro-nization.…”
Get full text
Article -
3413
Research on accurate ranging of UWB under indoor environments
Published 2007-01-01“…The accurate ranging ability of ultra wideband(UWB) signal under IEEE 802.15.4a indoor channel model was studied.An improved time-of-arrival(TOA) estimation algorithm which utilizes region search and threshold comparison was proposed.By statistical analysis on certain characteristics of the CM1 and CM2 channel profiles,the probability model of TOA estimation error was deduced.The thresholds of the proposed TOA estimation algorithm were then set by limiting the error probability to the lowest level.The mean absolute ranging errors under different SNR were simulated.Results show that high enough SNR should be guaranteed in order to obtain centimeter-level ranging precision under in-door environments,while extremely high SNR would not help to improve the ranging precision any more but lead to a performance floor.The results have instructional significance on designing localization algorithms and transmission power control in practical ranging.…”
Get full text
Article -
3414
Low-complexity despreading scheme with repetition code for wireless body area networks
Published 2015-08-01“…To improve the reliability of data transmission and reduce the complexity of the narrow band receiver for wireless body area networks(WBAN),spreading with repetition code is used in IEEE 802.15.6 standard.A despreading structure in which the metrics of reliability were calculated selectively according to the dynamic threshold was designed.Combined with hard decision,hard threshold-combine and hard threshold-delete despreading methods by simplifying maximal ratio combining and generalized minimum distance principle respectively were proposed,which had low complexity and near-optimal performance.The theoretical analysis and simulation results show that compared to despreading based on maximum likelihood method,the spreading gain of the proposed methods is close to the theoretical value and the computational complexity can be reduced by 86% at most under high SNR circumstances.…”
Get full text
Article -
3415
Analytic Normalized Solutions of 2D Fractional Saint-Venant Equations of a Complex Variable
Published 2021-01-01Get full text
Article -
3416
Receiver scheme of rake equalization for 60GHz pulse communication system
Published 2016-01-01“…Dispersion of the signal energy and the inter symbol interference(ISI)is caused by the multipath fading in 60GHz pulse communication environment.To solve this problem,the severity of the ISI in the system was analyzed,and the method to eliminate interference was studied.Based on the 60GHz wireless channel model established by IEEE 802.15.3c,the simulation platform of 60GHz pulse communication system was built.Theoretical analysis and numerical simulation of ISI in the system were carried out,and a receiver scheme of combining Rake receiver and equalizer was designed.Results show that,the two taps MRC-Rake receiver module combined with MMSE linear equalization module can not only improve the signal energy by multipath diversity,but also eliminate ISI.The performance of the system was improved without increasing the complexity.The scheme provides a reference for the design of 60GHz pulse communication system in the future.…”
Get full text
Article -
3417
A Simplified Sine Cosine Algorithm for the Solution of Optimal Reactive Power Dispatch
Published 2022-01-01“…Furthermore, the efficacy of SSCA is validated with other recently used algorithms considering three case studies, i.e., IEEE-30, -57, and -118 bus test system. The results show that the SSCA approach finds more precise and superior ORPD solutions. …”
Get full text
Article -
3418
Detection of sybil attacks based on periodic ultra wide band distance information in WSN
Published 2016-08-01“…Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes,a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed.Firstly,the distance between the adjacent nodes was ranging and the hello data packet was exchanged.Then,the distance estimation form was constructed by local estimation,and the form was contained in each node.Meanwhile,multiple distance matching check was periodically executed for each node in the network.Finally,when there was the distance matching between the legitimate node at least two different nodes,it would give an alarm and discard the sybil nodes.If there was no distance matching,the node continued normal operations.IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments.Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks,but also can successfully deal with the occurrence of complicated,malleable sybil attack.In addition,the probability of false alarm is very small,the entire network performance and its consistency are not affected.…”
Get full text
Article -
3419
Instantaneous Power Theory with Fourier and Optimal Predictive Controller Design for Shunt Active Power Filter
Published 2014-01-01“…In addition, the %THD also follows the IEEE Std.519-1992.…”
Get full text
Article -
3420
Decentralized Kalman Filtering with Multilevel Quantized Innovation in Wireless Sensor Networks
Published 2015-07-01“…Since the new quantization scheme and algorithm take into consideration the features of real WSNs which are based on the universal network protocol IEEE 802.15.4 standard, they can almost be applied into all practical WSNs with low energy consumption.…”
Get full text
Article