-
2021
Low-Profile Folded-Coupling Planar Inverted-F Antenna for 2.4/5 GHz WLAN Communications
Published 2014-01-01“…By using the folded-coupling technique, the proposed antenna provides two distinct impedance bandwidths of 159 MHz (about 6.5% centered at 2.45 GHz) and 1512 MHz (about 27.5% centered at 5.5 GHz), which cover the required bandwidths for the 2.4/5 GHz wireless local area network (WLAN) communications. …”
Get full text
Article -
2022
Opportunistic routing algorithm based on trust model for ad hoc network
Published 2013-09-01“…Due to the absence of enough physical protection,dynamic topology,distributed collaboration,the limited bandwidth and computing ability in ad hoc network,traditional routing security mechanism cannot adapt to the design of routing protocols.Recently,opportunistic routing is of the research hotspots,which can cope with the unreliable transmissions to improve throughput of the whole network by exploiting the broadcast nature of the wireless medium and spatial diversity of multi-hop wireless network.The concept of trust-based similarity in opportunistic routing for ad hoc network was incorporated,and a novel trusted opportunistic forwarding model based on trust degree of node and least cost of opportunistic routing were also built.Then a trusted minimum cost routing algorithm (MCOR) was proposed and the correctness and effectiveness of this algorithm from theoretical ana ysis were proved.Finally,MCOR algorithm was verified by simulation and was compared with the classic protocols:ExOR,TAODV and Watchdog-DSR.The simulation results show that MCOR scheme can detect and mitigate node misbehaviors.Furthermore,MCOR scheme outperforms the other protocols in terms of throughput,delay,expected ETX and cost of routing.…”
Get full text
Article -
2023
Reliable Multicasting Service for Densely Deployed Military Sensor Networks
Published 2015-08-01“…Wireless sensor networks (WSNs) have drawn attention for military applications where a large number of light-weight sensor nodes can detect enemies and intruders in the battlefield and alert a command post (CP) to our forces. …”
Get full text
Article -
2024
MAC mechanism based on link prediction and network coding
Published 2016-01-01“…A MAC mechanism was proposed based on network coding and link prediction for wireless sensor network. Firstly, an adaptive-window scheme was given based on EasiLQE which uses improved EWMA link quality estimation method and combines the methods of hardware and software, so the accuracy is increased.As a result of the instantaneous active detection, reaction rate became more rapid when unexpected situation was occurring in the network. …”
Get full text
Article -
2025
Radio resource and trajectory optimization for UAV assisted communication based on user route
Published 2022-03-01“…Recently, research on the application of unmanned aerial vehicle (UAV) in wireless communication networks has been widely studied.Aiming at the downlink wireless transmission system of UAV assisted mobile user communication, a method of resource allocation and trajectory optimization based on user route was proposed.According to the known user route, the estimated large-scale channel state information was obtained in advance, and a joint optimization problem of communication bandwidth allocation and trajectory optimization was established to maximize the minimum average rate of users.The problem was a nonconvex optimization problem, and there was nonlinear coupling between the variables.By introducing the method of alternating optimization of auxiliary variables and separated variables, the original problem was decomposed into two approximate convex optimization subproblems which could be solved, and the successive convex approximation was used to iteratively optimize the two subproblems, and an approximate suboptimal solution of the original nonconvex problem was obtained.Simulation results show that the proposed method of resource allocation and trajectory optimization can effectively improve the average data throughput of users, and improve the efficiency of UAV assisted communication on the premise of ensuring the communication quality of all users.…”
Get full text
Article -
2026
Persistent homology based topological analysis on the gestalt patterns during human brain cognition process
Published 2021-07-01“…The integrated development of information communication technology and neuroscience heralds the possibility and great potential of brain-to-brain wireless communication(B2BC).The physiologically meaningful features of brain responses were extracted to different contour and shape in images in Gestalt cognitive tests by combining persistent homology analysis with electroencephalogram (EEG).The experimental results show that more brain regions in the frontal lobe were involved when the subject perceives the random and disordered combination of images compared to the ordered Gestalt images.Meanwhile, the persistence entropy of EEG data evoked by random sequence diagram (RSD) was observed to be significantly different from that by the ordered Gestalt images(GST) in several frequency bands, which indicated that human cognition of shapes and contours, such as a preliminary advanced cognition process, could be separated to some extent through topological analysis.This method can digitize the neural signals while preserving the whole and local features of the original signals.In general, the cognitively related neural correlates by persistent homology features of EEG signal are revaluated and quantified, which provides an approach to realize the digitization of neural signals in brain-to-brain wireless communication.…”
Get full text
Article -
2027
Throughput optimization of multi-hop and multi-path cooperation in WPSNs with hardware noises
Published 2021-06-01“…This paper proposes a novel multi-path and multi-hop wireless powered sensor network in case of hardware impairment, constituting an energy node, one source node, single sink node, and a series of distributed relay sensor nodes, where the energy node transmits wireless energy to all terminals in the first stage, and the relay sensor nodes relay the information of the source node to the sink node in the second stage. …”
Get full text
Article -
2028
The Effectiveness of Hybrid Beamforming in Enhancing the Performance of NOMA-mmWave and Massive MIMO Systems
Published 2024-01-01“…As wireless networks evolve, the integration of Non-Orthogonal Multiple Access (NOMA), Massive Multiple Input Multiple Output (mMIMO), and millimeter wave (mmWave) technologies emerges as an effective approach to drive this advancement. …”
Get full text
Article -
2029
QoS-aware enhanced proportional faire scheduling algorithm for real-time services in LTE networks
Published 2023-06-01“…The new generation of wireless networks (LTE advance and WIMAX) supports many services that consume many resources (such as VOIP, video conference …). …”
Get full text
Article -
2030
Software based agricultural monitoring with the integration of sensor technology
Published 2023-12-01“…This study investigates how the current academic literature discusses Wireless Sensor Network (WSN) applications in agriculture. …”
Get full text
Article -
2031
Distributed Sensor Network-Based Virtual FDR System
Published 2013-11-01“…The functionality of the proposed system was also verified by establishing a ZigBee-based wireless network for power monitoring and diagnosis of disturbances.…”
Get full text
Article -
2032
Performance analysis for cooperative NOMA networks based SWIPT with adaptive power splitting
Published 2023-01-01“…In order to improve the spectrum effectiveness, decrease the power consumption of wireless communication system, for a two-way cooperative non-orthogonal multiple access (NOMA) network with simultaneous wireless information and power transfer (SWIPT), an adaptive power splitting scheme of SWIPT was proposed.Based on the decode-and-forward protocol and the users’ distance information, the successive interference cancellation was carried out at the relay to decode the users’ messages and harvest the energy from the sources.An adaptive power splitting scheme was proposed based on users’ channel state information, which the relay could successfully decode the users’ information and harvest the most energy from the sources.Based on the harvested energy, the relay forwarded the decoded information of the users in the next time slot.According to the proposed adaptive power splitting scheme, the overall outage probability, end-to-end outage probability, and the diversity gain at high signal-to-noise ratio were derived.Compared with three-way cooperative orthogonal multiple access network with fixed power splitting of SWIPT, the proposed adaptive power splitting of SWIPT for two-way cooperative NOMA networks can achieve much better outage performance.…”
Get full text
Article -
2033
Design and Construct a Forest Fire Detection and Control System.
Published 2025“…The system utilizes a network of wireless sensors, deployed in the forest, to detect early signs of fire. …”
Get full text
Thesis -
2034
Power and data simultaneous transmission using double-clad fibers towards 6G
Published 2025-02-01“…The deployed FiWi (fiber/wireless) system makes use of the DCF core and first cladding for simultaneously and optically transmitting data and power using the same fiber-optics link. …”
Get full text
Article -
2035
Who is WithMe? EEG features for attention in a visual task, with auditory and rhythmic support
Published 2025-01-01Get full text
Article -
2036
Feasibility and Acceptability of a Real-Time Adherence Device among HIV-Positive IDU Patients in China
Published 2013-01-01“…We collected data on feasibility and acceptability of a real-time web-linked adherence monitoring container among HIV-positive injection drug users (IDU) in China. “Wisepill” uses wireless technology to track on-time medication dosing. …”
Get full text
Article -
2037
Research and application prospects on key technologies of 50 Gbit/s front-haul modules
Published 2024-05-01“…With the large-scale commercial use of the global 5G network and the rapid growth of mobile Internet traffic, more abundant wireless spectrum resources can be released, and the demand for high-speed optical modules in wireless front-haul networks is increasingly prominent. …”
Get full text
Article -
2038
Smart contract-based secure cooperative spectrum sensing algorithm
Published 2021-12-01Get full text
Article -
2039
An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks.
Published 2025-01-01“…The widespread use of wireless networks to transfer an enormous amount of sensitive information has caused a plethora of vulnerabilities and privacy issues. …”
Get full text
Article -
2040
A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
Published 2016-01-01“…The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs). With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. …”
Get full text
Article