Showing 2,261 - 2,280 results of 3,139 for search '"wireless"', query time: 0.05s Refine Results
  1. 2261

    CFO-CR: Carrier Frequency Offset Methodology for High-Rate Common Randomness Generation by Prashanth Kumar Herooru Sheshagiri, Martin Reisslein, Juan A. Cabrera, Frank H. P. Fitzek

    Published 2025-01-01
    “…We develop and evaluate a Carrier Frequency Offset (CFO) based methodology for high-rate CR generation from reciprocal observations of a common wireless channel between two distinct wireless terminals. …”
    Get full text
    Article
  2. 2262

    Image Transmission Utilizing Amplitude Modulation in Rydberg Atomic Antenna by Peng Zhang, Shaoxin Yuan, Mingyong Jing, Jinpeng Yuan, Hao Zhang, Linjie Zhang

    Published 2024-01-01
    “…This study establishes an experimental groundwork for the utilization of Rydberg atomic antennas in ultra-wideband wireless communication and measurement.…”
    Get full text
    Article
  3. 2263

    Additively manufactured conductive and dielectric 3D metasurfaces for independent manipulation of broadband orbital angular momentum by Mengze Li, Jiaqi Cai, Li Deng, Xiaopeng Li, Francesca Iacopi, Yang Yang

    Published 2025-01-01
    “…The structure of the dual-band metasurface features four distinct silver layers yet is fabricated on a single ultra-thin planar substrate, demonstrating its potential for applications in future wireless communication systems.…”
    Get full text
    Article
  4. 2264

    Research on low complexity decoding for SCMA based on serial strategies of variable node by Mingming JI, Jianhong ZHENG

    Published 2017-09-01
    “…Sparse code multiple access technology,as a competitive non orthogonal multiple access scheme for the fifth generation wireless communication network,has a broad application prospect.However,current SCMA uplink use the flooding scheme of message passing algorithm for decoding,both the detection complexity and convergence properties are not ideal.A serial message passing algorithm which changed the information updating strategy was proposed,which performed message processing and deliveried according to the order of the variable nodes.Each of variable node simultaneously performed the reception of the verification message and the transmission of the variable message.The theoretical and simulation results show that the proposed algorithm not only maintains good performance,but also has low decoding complexity.…”
    Get full text
    Article
  5. 2265

    Resource management in sliced networks with mobile edge computing for B5G and 6G by Qian SUN, Lin TIAN, Yiqing ZHOU, Chen FENG, Yuanyuan WANG, Jihua ZHOU

    Published 2021-06-01
    “…With the time-delay sensitive compute-intensive tasks growing exponentially, 5G and future 6G mobile cellular communication networks will form differentiated network slices with edge computing resource to service the multiple communication services.To achieve this, the wireless frequency and edge computing resources will be shared among the network slices, thus the efficient management of the resources is of great importance.The demands of resources management in the life duration of the network slice was analyzed.Then the research progress of the corresponding technologies for slices, i.e., access control, resources allocation and stimulating cooperation among terminals, were summarized.And the open research issue was given.Thus, the resources are managed efficiently for the slices with edge computing resource.…”
    Get full text
    Article
  6. 2266

    Call Admission Scheme for Multidimensional Traffic Assuming Finite Handoff User by Md. Baitul Al Sadi, Afsana Nadia

    Published 2017-01-01
    “…The fading condition of the wireless channel access to a handoff call is prioritized compared to newly originated calls.…”
    Get full text
    Article
  7. 2267

    IEDR:an infrastructure enhanced DTN routing protocol by Zhen YU, Jing-dong XU, Jian-zhong ZHANG, Yu ZHANG

    Published 2013-08-01
    “…To cope with un-ideal conditions in mobile network where connectivity is only intermittent,a novel DTN (delay tolerant network) routing protocol,IEDR,was proposed,which incorporates experiences gained before and strives to fully utilize node contacts for data exchange,in order to maximize delivery ratio and minimize delivery delay,while still with controlled overhead.Additionally,IEDR attempted to use wireless access points for data propagation,as access points were supposed to be widely deployed and interconnected with high speed,providing an opportunity to efficiently distribute data in large areas.The evaluation proves that IEDR is better than many classic DTN routing protocols.…”
    Get full text
    Article
  8. 2268

    Next generation IP network test system framework based on microservices architecture by Jingyi XU, Zeyu ZHAO, Minhu SHEN, ·ibin ·ING, Weiqiang ZHOU

    Published 2019-09-01
    “…The next generation IP network is a new type of public network.It integrates wire and wireless,broad-band and narrow-band,transmit and receive,passive and active,which leads to the diverse and complex service scenarios.However,different scenario has different needs and standards,and there remains gaps with the current techniques,protocols and standards.In order to ensure the completeness and security of all kinds of techniques and facilities in the new application scenarios,and the upcoming new characteristics in the process of network development,a comprehensive test system framework needs to be established.The next generation IP network test framework based on micro services architecture was proposed,combined with different new application characteristics,which provided support for the development of network technology.…”
    Get full text
    Article
  9. 2269

    Realization of smart home key management mechanism based on ECC by Wenbin CHENG, Jia LIU

    Published 2017-06-01
    “…At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this basis,the key management mechanism based on ECC was designed to achieve the purpose of guaranteeing key security.The key management mechanism includes an ECC-based data encryption key management mechanism and an ECC-based digital signature key management mechanism.So that the wireless network node in the identity authentication,the key generation,distribution,storage,update and other aspects of the key security were guaranteed.Finally,the security,time-consuming and scalability of this mechanism were analyzed.The results show that the mechanism has strong security and expansibility,and it is superior to E-G key management scheme in time-consuming.…”
    Get full text
    Article
  10. 2270

    Opportunistic cooperative spectrum sensing based on eigenvalue ratio of random matrix by Wuji ZHANG, Shunlan LIU, Jianrong BAO

    Published 2020-02-01
    “…To overcome the deficiencies of low detection probability of traditional spectrum sensing,an EROC spectrum sensing algorithm based on the eigenvalue ratio of a random matrix was proposed.Based on the random detection theory,it used double thresholds and opportunistic cooperation to improve of traditional maximum and minimum eigenvalue (MME) algorithm,and it retained the advantages of the traditional energy detection algorithm.Moreover,on the premise of known false alarm probability,the decision threshold was deduced,and the odd-even slot division was used to effectively realize opportunistic cooperation in reception.Simulation results show that the proposed spectrum sensing algorithm has higher detection probability than MME algorithms in case of low signal-to-noise ratio and low false alarm probability.Therefore,it is suitable for application in wireless communications with deteriorate transmission channels.…”
    Get full text
    Article
  11. 2271

    Breaking novel and lightweight digital <sub>s</sub> ignature scheme by Chun-sheng GU

    Published 2013-07-01
    “…The signature schemes based on RSA and ECC do not seem suitable for special application area such as wire-less sensor network, smart card and wireless RFID since they suffer from low computing efficiency. …”
    Get full text
    Article
  12. 2272

    Two-level cache based streaming media scheduling algorithm for mobile network by LIAO Jian-xin, YANG Bo, ZHU Xiao-min, WANG Chun

    Published 2007-01-01
    “…A novel caching system architecture for mobile streaming was proposed,which was named 2CMSA(two-level cache mobile streaming architecture).In this system,limitations for mobile streaming system such as small memory size in mobile terminal and low bandwidth in wireless access network were avoided.According to the 2CMSA,a scheduling algorithm of 2CMSS(two-level cache based mobile streaming scheduling) was designed;mathematical models were also achieved to analyze the performance of this scheduling algorithm.Simulation experiment proves that,comparing to the original mobile streaming system,by using the new two-level cache architecture and cache based scheduling algorithm,the network transmission cost and the client startup delay of the mobile streaming services can be decreased effectively.…”
    Get full text
    Article
  13. 2273

    UWSP: sleeping algorithms for underwater sensor network by Lu HONG, Feng HONG

    Published 2013-08-01
    “…Sleeping scheme is one of the key means of saving energy for wireless sensor network. However, existing MAC protocols for underwater sensor network (UWSN) mainly focus on maximizing throughput but ignore sleeping schemes. …”
    Get full text
    Article
  14. 2274

    Comparative Performance Evaluation of TCP Variants in WiMAX (and WLANs) Network Configurations by Konstantinos Tsiknas, George Stamatelos

    Published 2012-01-01
    “…In this paper we study through extensive simulation scenarios the performance characteristics of five representative TCP schemes, namely, TCP New Reno, Vegas, Veno, Westwood, and BIC, in WiMAX (and WLANs) networks, under the conditions of correlated wireless errors, asymmetric end-to-end capabilities, and link congestion. …”
    Get full text
    Article
  15. 2275

    Bandwidth allocation games based on network selection for video communication by Shu-zhi WEI, Qi ZHU

    Published 2015-02-01
    “…A bandwidth allocation game based on network selection (BAG-NS) was proposed for video communication in heterogeneous wireless networks.Firstly,according to the video characteristics of different users and current network conditions,the algorithm calculated the weights of network factors and selected the optimum network by combining analytic hierarchy process and entropy theory.Secondly,the user’s utility function with payoff and cost was designed,and a distributed iterative algorithm is used to obtain the Nash equilibrium.Then the existence and uniqueness of the Nash equilibrium are proved.Simulation results show that the proposed algorithm enables different users to reasonably distribute in different networks and takes users’ fairness and network congestion control into consideration,which increases the utilization of network resources,reduces the users’ video distortion,and improves the users’ video quality.…”
    Get full text
    Article
  16. 2276

    Survey on network function virtualization in RAN by Haiyu JIA, Jia CHEN, Mingxin WANG

    Published 2019-01-01
    “…Finally, the challenges of network function virtualization applying in wireless network were proposed.…”
    Get full text
    Article
  17. 2277

    Study of energy efficient WBAN topology optimization in IEEE 802.15.6 by Zheng-you LIANG, Yu-mei YAO

    Published 2016-06-01
    “…An optimization model was proposed to design the network topology of wireless body area network(WBAN).Focusing on the two hops extended star topology given in IEEE 802.15.6 standard,a mixed integer non-linear programming model was constructed to minimize the energy consumption of WBAN.Then,the optimized network topology was obtained by adjusting the number and location of relays to be deployed and the data routing towards the hub.The experimental results show that,compared with Elias’s model (EAWD,energy aware WBAN design),the proposed model can reduce network energy consumption by 40.5%,decrease network delay by 52.4% on average,and extend network lifetime by double.…”
    Get full text
    Article
  18. 2278

    60 GHz Modular Antenna Array Link Budget Estimation with WiGig Baseband and Millimeter-Wave Specific Attenuation by Joongheon Kim, Liang Xian, Ali S. Sadri

    Published 2017-01-01
    “…Based on the practical link budget analysis results, we can estimate fundamental limits in terms of achievable data rates over 60 GHz millimeter-wave wireless links.…”
    Get full text
    Article
  19. 2279

    Bridge monitoring system based on Internet of things technology by Zheng LI, Sheng ZHANG, Luyu ZHANG, Yang ZHANG

    Published 2018-09-01
    “…The Internet of everything is the trend of today’s smart cities.With the rapid development of Internet of things technology,a good opportunity is provided to obtain real-time status information on important infrastructures.Aiming at the problem such as low monitoring efficiency,poor flexibility and rigorous testing results with traditional artificial bridge monitoring methods a bridge monitoring system based on the Internet of things technology was designed.A variety of sensors and cameras were used in the system to collect the data of bridge’s dynamic status in real-time,and the wireless multi-hop network was used to transfer the perception data to the bridge health monitoring cloud platform for further processing and analysis.Real-time monitoring,early warning,analysis and assessment of bridge safety conditions could be realized by the system,and is very important to the bridge safety engineering.…”
    Get full text
    Article
  20. 2280

    Fog computing based radio access networks:architecture,principles and challenges by Bonan YIN, Yuan AI, Mugen PENG

    Published 2016-06-01
    “…To reduce the burden of fronthaul link,avoid large-scale wireless signal processing in centralized baseband unit(BBU)pool,and take full advantage of processing and storage capabilities in edge devices,a fog computing based radio access network(F-RAN)was presented as an evolution form of heterogeneous cloud radio access networks.The core idea of F-RAN was to take full advantage of processing and storage capabilities in edge devices which could achieve the local distributed content delivery,the local distributed collaboration radio signal processing and the local distributed cooperative radio resource management functions.System architectures of F-RAN,promising key techniques,and researching open issues of F-RAN were discussed in detail.…”
    Get full text
    Article