Showing 2,001 - 2,020 results of 3,139 for search '"wireless"', query time: 0.06s Refine Results
  1. 2001

    Power control for full-duplex D2D communications underlaying cellular networks by Jihong ZHAO, Qiang HE, Hua QU, Zhirong LUAN

    Published 2017-03-01
    “…Device-to-device (D2D) communications that based on the wireless full-duplex transmission mode can not only reuse the cellular users' spectrum resource, but also significantly improve the spectral efficiency and the system throughout in wireless cellular networks. …”
    Get full text
    Article
  2. 2002

    A Novel Ultrawideband Planar Inverted-F Antenna with Capacitive Ground Plane by Haixia Liu, Fei Wang, Yang Yang, Xiaowei Shi, Long Li

    Published 2013-01-01
    “…With the trend of the miniaturization, broadband, and integration of multisystems of wireless communication terminals, a new ultrawideband planar inverted-F antenna (PIFA) with capacitive ground plane is proposed in this paper. …”
    Get full text
    Article
  3. 2003

    Slice scheduling for industrial time-critical services in 5G TSN integration network by GUAN Wanqing, LIU Nuoyan, LI Wei, FU Meixia, ZHANG Haijun

    Published 2024-03-01
    “…The integrated deployment of 5G and time sensitive network (TSN) is an important foundation for realizing wireless industrial Internet and flexible manufacturing. …”
    Get full text
    Article
  4. 2004

    Optimal cooperative strategy based on quantum bat for cognitive radio of energy harvesting by Hongyuan GAO, Yanan DU, Shibo ZHANG, Dandan LIU

    Published 2018-09-01
    “…In order to reduce energy consumption and improve spectral efficiency of the cognitive relay wireless communication system in 5G network,an optimal cooperative transmission strategy of information and energy was designed for cognitive relay radio with wireless energy harvesting.For the proposed optimal cooperative strategy,the maximal throughput formula and outage probability of secondary user were deduced.In order to resolve the derived maximum throughput equation,a quantum bat algorithm which was based on the optimization mechanism of quantum computing and bat algorithm was designed to solve the deduced equation,and the optimal cooperative transmission scheme for information and energy could be obtained.Simulation results show that the proposed optimal cooperative strategy not only can meet the information transfer demand of primary user,but also can realize the energy self-supply of the secondary user system and improve the communication quality of the secondary user.The proposed optimal cooperative strategy has a better performance than the cooperative strategy of existing cognitive relay radio for different simulation scenarios.…”
    Get full text
    Article
  5. 2005

    Online auction-based resource scheduling in grid computing networks by Lili Ding, Long Chang, Lei Wang

    Published 2016-10-01
    “…The aim of this article is to introduce a novel auction-based algorithm for grid computing wireless networks and resolve some incompetence with dynamic mechanisms. …”
    Get full text
    Article
  6. 2006

    Cooperative secret key generation for multi-hop relaying systems in Internet of things by Shuaifang XIAO, Yunfei GUO, Kaizhi HUANG, Liang JIN

    Published 2018-03-01
    “…The achievable key rate of secret key generation method in multi-hop relaying systems was relative low in Internet of things.A cooperative secret key generation algorithm based on network coding was proposed to improve the achievable key rate.Firstly,all the nodes send training sequences in turn to estimate the channels.After that the relays employ secure network coding technique to assist the two legitimate users to obtain the correlative observations of the same wireless channel,with nothing leakage about the channel information to the eavesdropper.Finally,the two legitimate users agreed on a common secret key directly over the public channel.Theoretical and simulation results validate the performance of the proposed secret key generation algorithm,and obtain that increasing the wireless transmission paths,selecting the transmission path with less hops and larger variance channels can further improve the achievable secret key rate.…”
    Get full text
    Article
  7. 2007

    The evolution of NB-IoT standard system and development of Internet of things industry by Yunzhou XIE

    Published 2018-03-01
    “…Looking at the development of the Internet of things industry system,the birth of NB-IoT standard is the inevitable product of the development of the Internet of things.But in the development process of NB-IoT standard,it has gone through the business interests of the game,the market environment competition,and the secret contest of various groups,eventually forming a 3GPP international standard that people all accept.Different from the multi country and multi system pattern of wireless communication in the past,NB-IoT is a globally unified Internet of things wireless communication network.With the freeze of the Rel-13 version and the iterative evolution of the Rel-14 and Rel-15 versions,NB-IoT technology will also be the basis for the future 5G Internet of things standard system.From the perspective of the development of the whole pattern,the NB-IoT standard will be more suitable for the application scenarios of the Internet of things.The evolution of NB-IoT standard system and development of Internet of things industry were analyzed,which helped readers understand the super impetus of technology development to industry transformation.…”
    Get full text
    Article
  8. 2008

    Research on the Influence of Sensor Network Communication in the Electromagnetic Environment of Smart Grid by Yiying Zhang, Suxiang Zhang, Yuemin Ding

    Published 2016-01-01
    “…However, due to the wireless and open communication, the electromagnetic phenomena in the communication and the electric network of the sensor network usually produce the mutual interference. …”
    Get full text
    Article
  9. 2009

    Development of an Inexpensive Sensor Network for Recognition of Sitting Posture by Ricardo Barba, Ángel P. de Madrid, Jesús G. Boticario

    Published 2015-08-01
    “…The aim of this work is the development of a network of wireless devices to determine, along with a time-stamp, postural changes of users that are to be used in personalized learning environments. …”
    Get full text
    Article
  10. 2010

    Ultra-Wideband Fractal Ring Antenna for Biomedical Applications by Ilyas Saleem, Umair Rafique, Shobit Agarwal, Hüseyin Şerif SAVCI, Syed Muzahir Abbas, Subhas Mukhopadhyay

    Published 2023-01-01
    “…In UWB technology, short-range wireless communication is possible with low transceiving power, a characteristic that is particularly advantageous in the context of microwave and millimeter-wave (mmWave) medical imaging. …”
    Get full text
    Article
  11. 2011

    Blockchain-driven distributed consensus mechanism in defensing Byzantine attack for the Internet of spectrum device by Jian YANG, Xi CHEN, Guoru DING, Hangsheng ZHAO, Linyuan ZHANG, Jiachen SUN

    Published 2020-03-01
    “…To meet the requirement of the precisely spectrum sharing triggered by large-scale and ultra-dense deployment of mobile internet and internet of things,a framework based on blockchain technology for networking the massive personal wireless devices to form the Internet of spectrum device (IoSD) was proposed.The architecture of cloud with edge computing was proposed as the architecture of IoSD,which consists of spectrum management server,mobile base station,and personal wireless devices.The mechanism of spectrum data acquisition,spectrum block appending,spectrum data transmission,and spectrum sensing incentive,consist of basic operational mechanism of IoSD.The distributed consensus mechanism,including fusion consensus among sensing-nodes,verification consensusamong checking-nodes,and confirmation consensus among head-nodes,was applied to determine whether the spectrum data was falsified by the Byzantine attack of malicious sensing-nodesunder the hypothesis test of certain confidence.The simulation results show the effectiveness and robustness of proposed distributed consensus mechanism in preventing spectrum sensing data falsification by the malicious nodes.…”
    Get full text
    Article
  12. 2012

    Optimization strategies in NOMA-based vehicle edge computing network by Jianbo DU, Nana XUE, Yan SUN, Jing JIANG, Shulei LI, Guangyue LU

    Published 2021-03-01
    “…Nowadays, vehicular network is confronting the challenges to support ubiquitous connections and vast computation-intensive and delay-sensitive smart service for numerous vehicles.To address these issues, non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) are considered as two promising technologies by letting multiple vehicles to share the same wireless resources, and the powerful edge computing resources were adopted at the edge of vehicular wireless access network respectively.A NOMA-based vehicular edge computing network was studied.Under the condition of guaranteeing task processing delay, the joint optimization problem of task offloading, user clustering, computing resource allocation and transmission power control was proposed to minimize the task processing cost.Since the proposed problem was difficult to solve, it was divided into sub-problems, and a low-complexity and easy-to-implement method was proposed to solve it.The simulation results show that compared with other benchmark algorithms, the proposed algorithm performs well in minimizing costs.…”
    Get full text
    Article
  13. 2013

    Application sensors in smart cities deployment by Victoria Nozick

    Published 2023-03-01
    “…In this place division, we will present the freedom attacks and challenges confronted engaged of SDN and IoT and again the impromptu design for IoT in the foundation of SDN. Wireless Sensor Network, WSN, efficient system for forest fire detection, efficient detection method for forest fire systems, Wireless Sensor Network for Forest Fire Detection and Decision Making.…”
    Get full text
    Article
  14. 2014

    Fault early warning model of 4G base station out of service based on centralized monitoring data resources by Yang WANG, Yi MAN, Zhipeng CHEN

    Published 2016-07-01
    “…4G wireless base station equipment is an important link which has direct impact on information communication network customer service quality,and 4G wireless base stations out of service fault will directly block users' normal communication.Aiming at these problems,based on the centralized monitoring warning message data resources through association rule mining and time trace deduction analysis,4G base stations out of service fault short-term warning was achieved.Based on centralized monitoring equipment performance data resources,by the classification of network elements (data cleaning,feature selection,network elements clustering),index dimension reduction (grouped by cluster,principal component analysis),principal component expression and out of service fault correlation analysis,performance indicators selection and threshold analysis,4G base stations out of service fault long-term warning was achieved.The test can accurately predict the 27.8% of 4G base station equipment out of service fault next month.…”
    Get full text
    Article
  15. 2015

    Low Mismatch Key Agreement Based on Wavelet-Transform Trend and Fuzzy Vault in Body Area Network by Yang Wu, Yongmei Sun, Lei Zhan, Yuefeng Ji

    Published 2013-06-01
    “…Body area network (BAN) is an emerging branch of wireless sensor networks for personalized applications in many fields, such as health monitoring. …”
    Get full text
    Article
  16. 2016

    Compact Dual-Band Dipole Antenna with Asymmetric Arms for WLAN Applications by Chung-Hsiu Chiu, Chun-Cheng Lin, Chih-Yu Huang, Tsai-Ku Lin

    Published 2014-01-01
    “…This feature enables it to cover the required bandwidths for wireless local area network (WLAN) operation at the 2.4 GHz band and 5.2/5.8 GHz bands for IEEE 802.11 a/b/g standards. …”
    Get full text
    Article
  17. 2017

    Physical layer security performance of MF relay selection systems by Ying CHENG, Guangqiu LI, Jingjie SHEN, Liang WEI

    Published 2021-09-01
    “…Aimed at the poor security performance of single antenna multi-relay modify-and-forward (MF) cooperative wireless systems in collusion eavesdropping scenario, MF cooperative physical layer security systems combining source node transmit antenna selection (TAS) and multi-relay selection in collusion eavesdropping scenario were proposed.Two relay selection schemes were considered, namely, the optimal maximization of the main channel signal-to-noise ratio (SNR) and the suboptimal maximization of the source-relay link SNR.The closed-form expressions of the secrecy outage probability (SOP) and ergodic secure capacity (ESC) for the above MF cooperative wireless systems were derived.The numerical results of SOP and ESC of MF secure relay systems with optimal or suboptimal relay selection were consistent with the simulation results, which verifies the correctness of the above theoretical analysis.It also shows that the more the number of transmit antennas at the source node and relay nodes, and the less the number of eavesdropping nodes, the better the physical layer security performance of MF secure relay systems with optimal or suboptimal relay selection.…”
    Get full text
    Article
  18. 2018

    Environment-aware based access point deployment optimization for cell-free massive MIMO system by Jing JIANG, Yongqiang LIU, Fengyang YAN, Sha TAO, Sutthiphan WORAKRIN

    Published 2024-02-01
    “…Cell-free massive multiple-input multiple-output (MIMO) systems deploy a large number of access point (AP) across the coverage area which can provide uniform high-rate services to users.However, the quality of coverage would be affected by path loss, shadow fading scatters, and environmental occlusions around the randomly placed AP in conventional cell-free massive MIMO systems that do not consider their impact.Considering the impact of actual wireless propagation environments, an AP deployment scheme was proposed to acquire uniform and consistent coverage.Firstly, a hybrid probabilistic path loss model was utilized to characterize various wireless propagation environments.Then, the AP deployment optimization problem was solved with the objective of maximizing the average throughput.Finally, the problem was transformed into a Markov game process and solved by the multi-agent deep deterministic policy gradient (MADDPG) algorithm.The simulation results demonstrate that the proposed scheme can provide more uniform coverage in complex environments and serve users with reliable and consistent service compared to random AP deployment and existing AP deployment methods.…”
    Get full text
    Article
  19. 2019

    An Energy-Efficient Multi-User’s Resource Allocation Scheme by Zhao Wang, Youming Li, Ting Zou, Xiaoqing Liu, Bin Chen

    Published 2013-04-01
    “…In wireless environment,the increases in the number of users and the demand for a higher rate have triggered rapidly booming energy consumption at the base station.Therefore,energy efficient design in wireless network has become very essential.An energy efficient multi-user OFDM downlink resource allocation scheme was studied,using the distributed way.Firstly,according to user’s average channel gain and the minimum requirements of user’s bits,subcarriers were allocated,combined with the idea of proposed energy-efficient criterion.Then better channels were assigned to each user in accordance with each user’s allocated subcarrier numbers.Again each user’s average bits were assigned on the user’s allocated subcarriers and optimal adjustment using energy-efficient criterion had to be made to ensure the minimum power.The simulation results show that under the conditions of satisfying bit-error rate and transmission rate for users,the power can be reduced by 5~6 dB in the proposed algorithm,compared with the power in the static frequency division multiple access resource allocation.Furthermore,the power can be reduced by 2~4 dB,compared with the power in a existing classical distributed algorithm.…”
    Get full text
    Article
  20. 2020

    Interference mitigation for satellite-terrestrial heterogeneous coexistence cognitive MIMO system based on DBF by Yong LIAO, Tao WANG, Huan CHEN, Xin ZHOU, Yu-feng LI

    Published 2014-10-01
    “…For the coexistence and increasing interference of satellite-terrestrial network and terrestrial wireless network,a typical scenario where the geostationary earth orbit (GEO) satellite-terrestrial network and the 4G mobile communication network coexist heterogeneously was analyzed.Besides,a multi-user cognitive system model that secondary satellite terminals interfere the primary multiple input multiple output (MIMO) 4G based stations was also proposed,with whose general signal processing was deduced.Meanwhile,digital beam forming (DBF) technology in 4G based station system was adopted to minimize the cognitive interference caused by multi-antennas and multi-users.And an optimal beam weight based on fixed azimuth interference (OBW-FAI) was proposed.Weight vector was only related to the azimuth of the interferences,thus the proposed algorithm does not need real-time and repeat calculations,and had small complexity.Finally,the numerical simulation results verify that the proposed system and algorithm can effectively reduce interference between satellite-terrestrial network and terrestrial wireless network to a certain extent.…”
    Get full text
    Article