Showing 1,181 - 1,200 results of 29,875 for search '"communication"', query time: 0.10s Refine Results
  1. 1181

    Privacy Protection for Personal Health Device Communication and Healthcare Building Applications by Soon Seok Kim, Yong Hee Lee, Jong Mo Kim, Deok Seok Seo, Gwang Hee Kim, Yoon Seok Shin

    Published 2014-01-01
    “…This paper proposes a new method for protecting patient privacy when communicating with a gateway which collects bioinformation through using personal health devices, a type of biosensor for telemedicine, at home and in other buildings. …”
    Get full text
    Article
  2. 1182
  3. 1183
  4. 1184

    Throughput-Optimal Scheduling for Cooperative Communications in Wireless Ad Hoc Networks by Thong Huynh, Won-Joo Hwang, Suk-Hwan Lee

    Published 2013-09-01
    “…Cooperative communications that take advantage of the broadcasting nature of wireless environments can help to increase system throughput in wireless ad hoc networks. …”
    Get full text
    Article
  5. 1185

    A Context Aware Cooperative Communication Method in Wireless Sensor Networks by Hyunduk Kim, Chulki Kim, Jaehun Kim, Minah Seo, Seok Lee, Taikjin Lee

    Published 2015-06-01
    “…Moreover, existing cooperative communication methods, for example, CoopLEACH, waste energy because of the unilateral cooperative communication method, which does not consider the distance between the sink and cluster heads. …”
    Get full text
    Article
  6. 1186

    Research on Dynamic Equalization of Optical Power for Satellite-Ground Laser Communication by Yuefeng CAI, Haifeng LIU, Bo LIU, Wei LIN

    Published 2021-06-01
    “…Aiming at the problem of light intensity scintillation caused by atmospheric turbulence at the receiver of satellite-ground laser communication will aff ect the communication quality, an optical power balance system based on gain competition was studied.The experiment verifi ed that the received power fl uctuation increased the communication bit error rate.The static output curve of the equalization system under gain competition was studied and the equalization performance of the dynamic time domain signal was tested.The experimental results showed that the system could compress the power fl uctuation range of the dynamic signal to 4 dB.…”
    Get full text
    Article
  7. 1187
  8. 1188
  9. 1189
  10. 1190

    Provable security EPC information service communication scheme for EPC network by Jing-feng LI, Heng PAN, Wei-feng GUO

    Published 2013-08-01
    “…Furthermore, the ESCM has efficient computation and communication cost.…”
    Get full text
    Article
  11. 1191
  12. 1192
  13. 1193

    Guest editorial: Advanced signal processing for integration of radar and communication (IRC) by Bin Liao, Wei Liu, Ziyang Cheng, Tianyao Huang

    Published 2022-09-01
    “…Abstract Radar and communication are two key applications of radio technology, and they occupy a large portion of the frequency spectrum. …”
    Get full text
    Article
  14. 1194

    Joint power control for untrusted relay cooperation-based confidential communication by Wen-jiang FENG, Wei-heng JIANG, Yi-na DENG, Yang YUAN

    Published 2014-11-01
    “…The scenario that multiple cell-edge mobile stations (MS) all without direct-links to the base station (BS) but have confidential messages in the uplink in the presence of untrusted relay (UR) cooperation was considered.In order to implement the secure communication between BS and multiple MS,destination-based jamming (DBJ) scheme was adopted.With the assumption that all MS had fixed transmit power,the joint UR and BS power control which aims at maximizing system sum secrecy rate was discussed.For this problem,analysis indicated that it was equivalent to joint access control and power allocation problem thus its NP-hard.Through problem relaxation,a suboptimal MS access control and alternatively power allocation algorithm was provided.This algorithm is proved to have polynomial complexity and can converge to at least a suboptimal solution for original problem.Simulation results show that compared with the benchmark algorithms,the proposed suboptimal algorithm is better in the achievable secrecy rate performance.…”
    Get full text
    Article
  15. 1195
  16. 1196
  17. 1197
  18. 1198

    Research on mobile edge computing and caching in massive wireless communication network by Yongming HUANG, Chong ZHENG, Zhengming ZHANG, Xiaohu YOU

    Published 2021-04-01
    “…For the large-scale network mobile edge computing and caching technology of future 6G mobile communications, firstly, the architectures and principles of mobile edge computing and caching in large-scale wireless networks were introduced, and the necessity and universality were clarified.Then, from the perspective of the five key issues in the mobile edge computing and caching enabled large-scale wireless network, including computing offloading, edge caching, multi-dimensional resource allocation, user association and privacy protection, the recent researches and further pointed out the future development trends and research directions were reviewed and analyzed.Finally, for the privacy preservation issue, a federated learning based privacy-preserving scheme was proposed.Simulation results show that the proposed scheme can simultaneously preserve user privacy and improve the quality of service.…”
    Get full text
    Article
  19. 1199
  20. 1200