-
2201
Durability of Wearable Antennas Based on Nonwoven Conductive Fabrics: Experimental Study on Resistance to Washing and Ironing
Published 2018-01-01“…Adhesive nonwoven conductive fabrics are appealing materials for fabricating fully textile antennas for wearable wireless systems. Wearable antennas should be flexible, lightweight, and mechanically resistant. …”
Get full text
Article -
2202
Analysis of Network Demand and Research on the Key Technology for Integration of 5G and Wi-Fi
Published 2014-08-01“…The integration network of 5G and Wi-Fi can well solve the problem of rapid growing wireless traffic and user experience pursuit in 5G. …”
Get full text
Article -
2203
Network architecture in the 5Gmobile systems
Published 2018-08-01“…In ordeRtomeet the performance requirements of 5G networking such as huge traffic,large links,and ultra-low latency,the traditional wireless access network architecture for wide coverage and high capacity design needs to evolve.Firstly,combining the 5G vision and needs,the characteristics and importance of the 5G access network architecture were clarified.Then the design principle and specific composition of the 5G access network architecture was introduced from the perspectives of academia and industry,and the advantages and disadvantages were analyzed.Finally,the challenges of access network architecture and possible future development directions were discussed.…”
Get full text
Article -
2204
On the coding rate for differential modulation and detections
Published 2016-07-01“…Differential demodulation is an important method of solving the information transmission which is used in the high dynamic condition of the wireless communication.The coding rate for differential modulation and detec-tions neither be too high,nor be too low.To find the optimal coding rate,the Shannon limit of error free transmis-sions with different rates for differential BPSK and differential QPSK were derived.Thereafter,the optimal coding rate was obtained from the view point of information theory.Convolutional codes and Turbo codes with different rates were employed,and simulations were conducted for the verification of the result.…”
Get full text
Article -
2205
Multi-tier cooperative caching in fog radio access network
Published 2019-09-01“…Aiming at the problem of reducing the load of the backward link in the edge buffer and fog wireless access network technology,a multi-tier cooperative caching scheme in F-RAN was proposed to further reduce the backhaul traffic load.In particular,by considering the network topology,content popularity prediction and link capacity,the optimization problem was decomposed into knapsack subproblems in multi-tiers,and effective greedy algorithms were proposed to solve the corresponding subproblems.Simulation results show that the proposed multi-tier cooperative caching scheme can effectively reduce the backhaul traffic and achieve relatively high cache hit rate.…”
Get full text
Article -
2206
Analysis of physical layer secret key capacity in the uniform scattering environment
Published 2016-09-01“…Physical layer secret key capacity was affected by time difference of channel sounding,mobility of terminals,and additive noise.Effects on the physical layer secret key capacity were quantitatively analyzed in the uniform scattering environment.Based on the time domain statistical characteristics of narrow band wireless channel parameters with noise,a closed-form solution to physical layer secret key capacity in the time domain was derived.Afterwards,simulations in the uniform and non-uniform scattering environment were carried out to demonstrate its validity and applicability,respectively.…”
Get full text
Article -
2207
Study on Market Situation and Management Specifications of Short-Range Radio Communication Devices
Published 2014-11-01“…Micro-power(short-range radio communication)wireless devices are widely used, and numerous, they play a more and more important role in people's daily life. …”
Get full text
Article -
2208
Situation description and critical technology analysis for industrial connection of intelligent manufacturing
Published 2017-11-01“…With the formally issue of the industrial internet in USA,the industry 4.0 in German and made in China 2025,the integration of the IT,Internet and industrialization has became the trend of intelligent manufacturing.Industrial connection is the basic ability for intelligent manufacturing.Firstly,the technology situation of OT and IT industrial connection was described.And then combined with made in China 2025,the eight demands for industrial internet scenarios and industrial connectivity key technology were analyzed,including data acquisition,IP network,wireless network,identifier resolution and network security,Finally,according to the domestic situation,the future trend of industrial connection was prospected.…”
Get full text
Article -
2209
A model of group mobility management based on user behavior prediction
Published 2017-08-01“…Mobility management (MM) is a vital part of future 5G mobile communication.How to balance the paging loads and reduce the location update costs is a key topic in wireless communication research.A novel model of group mobility management based on user behavior prediction was proposed,in which users with the similar moving characteristics could be under unified management,thereby repeated costs from the traditional model of single mobility management (SMM) could be reduced.Simulation results show that GMM can get better running cost than SMM.…”
Get full text
Article -
2210
Vehicular social network:a survey
Published 2015-01-01“…Combining techniques of social networks and wireless communications,vehicular social network (VSN) aim to provide a variety of data delivery services based on the social relationship among vehicle users.With the extensive survey and analysis of existing research work on mobile social network (MSN) and vehicle networks,the architecture and applications of vehicular social network (VSN) as well as the relationship between vehicle networks and social network from a technical viewpoint are presented.The key technologies in VSN are summarized,including the problems and solutions in terms of information delivery,bandwidth allocation,distributed caching,security and privacy.Moreover,future research directions and challenges are presented.…”
Get full text
Article -
2211
Novel and lightweight digital signature scheme
Published 2010-01-01“…Digital signatures have many applications in information security,including authentication,data integrity and non-repudiation.However,the number theoretic-based schemes such as RSA and ECC are relatively slow in performance.These schemes do not seem to be suitable for small computing devices with limited computing capacity,such as smart cards,wireless sensor networks,and active RFID tags.Based on the hash authentication technology,a novel lightweight digital signature scheme was proposed for achieving secure and efficient signature function.Security analysis and experimental results show that it can be used as a possible alternative to the current public key cryptosystems.…”
Get full text
Article -
2212
-
2213
Measurement Stand and Methodology for Research of the Off-Body and Body-to-Body Radio Channels in WBANs with Different Diversity Schemes
Published 2019-01-01“…The concept of an experimental test bed for system loss and channel impulse response measurements for off-body and body-to-body radio channels in wireless body area networks (WBANs) is fully described. …”
Get full text
Article -
2214
A survey of semantic applications in communications
Published 2022-05-01“…With the development of artificial intelligence technology and wireless communication technology, the future communication networks for all things intelligent connected uses semantic segmentation, semantic network and other technologies more and more frequently, and the semantic information-based technologies are applied to various fields.Semantic communication is a communication method for multi-agent interaction.By extracting the requirements and information characteristics of agents, coding and transmission, the accurate transmission of semantics from agents can be realized.Firstly, the development of semantic related technology in artificial intelligence was analyzed.And then the application of semantics in communication was summarized.Finally, the application of semantic information in other fields was analyzed, and the development trend of semantics in other fields was discussed.…”
Get full text
Article -
2215
Construction and Application for Operation-BusinessOriented Mobile GIS Service Platform
Published 2015-06-01“…Therefore,based on geographic information system,GPS and wireless communications technology,a unified mobile GIS application platform was constructed. …”
Get full text
Article -
2216
VISION AND STRATEGY REGARDING THE PARKING LOTS WITH ELEVATORS
Published 2022-05-01“…The design and accomplishment of the intelligent parking lot equipped with elevators and wireless systems is also efficient and profitable. …”
Get full text
Article -
2217
Design and Realization of Transmission Testbench for Cooperated and Converged Ubiquitous Network
Published 2013-02-01“…Under the existing heterogeneous wireless network environment,the multi-path para11e1 transmission testbench used to transmit the high speed video media service was constructed. …”
Get full text
Article -
2218
Research on beam management of non-coaxial OAM communication system
Published 2021-12-01“…As a new modulated degree of freedom, orbital angular momentum (OAM) could greatly improve the spectrum utilization of wireless communication.However, the uniform circular array (UCA)-based OAM communication system requires the transceiver array to be static and perfectly aligned, which makes it difficult for OAM to be practically applied.A beam management method based on OAM was proposed, which determined the best beam matching by scanning the beam of receiver and receiver, and the matched beam was used to communicate.Simulation results show that the proposed scheme could effectively reduce the system performance degradation caused by non-coaxial of receiver and transmitter arrays.…”
Get full text
Article -
2219
A resource allocation algorithm based on double slots
Published 2016-05-01“…A resource allocation algorithm based on double slots was proposed to minimize the transmitting power in wireless communications.Being aware of the channel difference between the two adjacent slots,the second slot was allocated in advance partial of the data rate conventionally scheduled to the first slot when the corresponding user had perfect channel state.Consequently,most of the required data was loaded by the sub-carriers with fine channel gain and finally less transmitting power was needed.The simulation results indicate that the proposed algorithm can effectively decrease the transmitting power while meeting the users' target rate requirement.…”
Get full text
Article -
2220