-
2261
CFO-CR: Carrier Frequency Offset Methodology for High-Rate Common Randomness Generation
Published 2025-01-01“…We develop and evaluate a Carrier Frequency Offset (CFO) based methodology for high-rate CR generation from reciprocal observations of a common wireless channel between two distinct wireless terminals. …”
Get full text
Article -
2262
Image Transmission Utilizing Amplitude Modulation in Rydberg Atomic Antenna
Published 2024-01-01“…This study establishes an experimental groundwork for the utilization of Rydberg atomic antennas in ultra-wideband wireless communication and measurement.…”
Get full text
Article -
2263
Additively manufactured conductive and dielectric 3D metasurfaces for independent manipulation of broadband orbital angular momentum
Published 2025-01-01“…The structure of the dual-band metasurface features four distinct silver layers yet is fabricated on a single ultra-thin planar substrate, demonstrating its potential for applications in future wireless communication systems.…”
Get full text
Article -
2264
Research on low complexity decoding for SCMA based on serial strategies of variable node
Published 2017-09-01“…Sparse code multiple access technology,as a competitive non orthogonal multiple access scheme for the fifth generation wireless communication network,has a broad application prospect.However,current SCMA uplink use the flooding scheme of message passing algorithm for decoding,both the detection complexity and convergence properties are not ideal.A serial message passing algorithm which changed the information updating strategy was proposed,which performed message processing and deliveried according to the order of the variable nodes.Each of variable node simultaneously performed the reception of the verification message and the transmission of the variable message.The theoretical and simulation results show that the proposed algorithm not only maintains good performance,but also has low decoding complexity.…”
Get full text
Article -
2265
Resource management in sliced networks with mobile edge computing for B5G and 6G
Published 2021-06-01“…With the time-delay sensitive compute-intensive tasks growing exponentially, 5G and future 6G mobile cellular communication networks will form differentiated network slices with edge computing resource to service the multiple communication services.To achieve this, the wireless frequency and edge computing resources will be shared among the network slices, thus the efficient management of the resources is of great importance.The demands of resources management in the life duration of the network slice was analyzed.Then the research progress of the corresponding technologies for slices, i.e., access control, resources allocation and stimulating cooperation among terminals, were summarized.And the open research issue was given.Thus, the resources are managed efficiently for the slices with edge computing resource.…”
Get full text
Article -
2266
Call Admission Scheme for Multidimensional Traffic Assuming Finite Handoff User
Published 2017-01-01“…The fading condition of the wireless channel access to a handoff call is prioritized compared to newly originated calls.…”
Get full text
Article -
2267
IEDR:an infrastructure enhanced DTN routing protocol
Published 2013-08-01“…To cope with un-ideal conditions in mobile network where connectivity is only intermittent,a novel DTN (delay tolerant network) routing protocol,IEDR,was proposed,which incorporates experiences gained before and strives to fully utilize node contacts for data exchange,in order to maximize delivery ratio and minimize delivery delay,while still with controlled overhead.Additionally,IEDR attempted to use wireless access points for data propagation,as access points were supposed to be widely deployed and interconnected with high speed,providing an opportunity to efficiently distribute data in large areas.The evaluation proves that IEDR is better than many classic DTN routing protocols.…”
Get full text
Article -
2268
Next generation IP network test system framework based on microservices architecture
Published 2019-09-01“…The next generation IP network is a new type of public network.It integrates wire and wireless,broad-band and narrow-band,transmit and receive,passive and active,which leads to the diverse and complex service scenarios.However,different scenario has different needs and standards,and there remains gaps with the current techniques,protocols and standards.In order to ensure the completeness and security of all kinds of techniques and facilities in the new application scenarios,and the upcoming new characteristics in the process of network development,a comprehensive test system framework needs to be established.The next generation IP network test framework based on micro services architecture was proposed,combined with different new application characteristics,which provided support for the development of network technology.…”
Get full text
Article -
2269
Realization of smart home key management mechanism based on ECC
Published 2017-06-01“…At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this basis,the key management mechanism based on ECC was designed to achieve the purpose of guaranteeing key security.The key management mechanism includes an ECC-based data encryption key management mechanism and an ECC-based digital signature key management mechanism.So that the wireless network node in the identity authentication,the key generation,distribution,storage,update and other aspects of the key security were guaranteed.Finally,the security,time-consuming and scalability of this mechanism were analyzed.The results show that the mechanism has strong security and expansibility,and it is superior to E-G key management scheme in time-consuming.…”
Get full text
Article -
2270
Opportunistic cooperative spectrum sensing based on eigenvalue ratio of random matrix
Published 2020-02-01“…To overcome the deficiencies of low detection probability of traditional spectrum sensing,an EROC spectrum sensing algorithm based on the eigenvalue ratio of a random matrix was proposed.Based on the random detection theory,it used double thresholds and opportunistic cooperation to improve of traditional maximum and minimum eigenvalue (MME) algorithm,and it retained the advantages of the traditional energy detection algorithm.Moreover,on the premise of known false alarm probability,the decision threshold was deduced,and the odd-even slot division was used to effectively realize opportunistic cooperation in reception.Simulation results show that the proposed spectrum sensing algorithm has higher detection probability than MME algorithms in case of low signal-to-noise ratio and low false alarm probability.Therefore,it is suitable for application in wireless communications with deteriorate transmission channels.…”
Get full text
Article -
2271
Breaking novel and lightweight digital <sub>s</sub> ignature scheme
Published 2013-07-01“…The signature schemes based on RSA and ECC do not seem suitable for special application area such as wire-less sensor network, smart card and wireless RFID since they suffer from low computing efficiency. …”
Get full text
Article -
2272
Two-level cache based streaming media scheduling algorithm for mobile network
Published 2007-01-01“…A novel caching system architecture for mobile streaming was proposed,which was named 2CMSA(two-level cache mobile streaming architecture).In this system,limitations for mobile streaming system such as small memory size in mobile terminal and low bandwidth in wireless access network were avoided.According to the 2CMSA,a scheduling algorithm of 2CMSS(two-level cache based mobile streaming scheduling) was designed;mathematical models were also achieved to analyze the performance of this scheduling algorithm.Simulation experiment proves that,comparing to the original mobile streaming system,by using the new two-level cache architecture and cache based scheduling algorithm,the network transmission cost and the client startup delay of the mobile streaming services can be decreased effectively.…”
Get full text
Article -
2273
UWSP: sleeping algorithms for underwater sensor network
Published 2013-08-01“…Sleeping scheme is one of the key means of saving energy for wireless sensor network. However, existing MAC protocols for underwater sensor network (UWSN) mainly focus on maximizing throughput but ignore sleeping schemes. …”
Get full text
Article -
2274
Comparative Performance Evaluation of TCP Variants in WiMAX (and WLANs) Network Configurations
Published 2012-01-01“…In this paper we study through extensive simulation scenarios the performance characteristics of five representative TCP schemes, namely, TCP New Reno, Vegas, Veno, Westwood, and BIC, in WiMAX (and WLANs) networks, under the conditions of correlated wireless errors, asymmetric end-to-end capabilities, and link congestion. …”
Get full text
Article -
2275
Bandwidth allocation games based on network selection for video communication
Published 2015-02-01“…A bandwidth allocation game based on network selection (BAG-NS) was proposed for video communication in heterogeneous wireless networks.Firstly,according to the video characteristics of different users and current network conditions,the algorithm calculated the weights of network factors and selected the optimum network by combining analytic hierarchy process and entropy theory.Secondly,the user’s utility function with payoff and cost was designed,and a distributed iterative algorithm is used to obtain the Nash equilibrium.Then the existence and uniqueness of the Nash equilibrium are proved.Simulation results show that the proposed algorithm enables different users to reasonably distribute in different networks and takes users’ fairness and network congestion control into consideration,which increases the utilization of network resources,reduces the users’ video distortion,and improves the users’ video quality.…”
Get full text
Article -
2276
Survey on network function virtualization in RAN
Published 2019-01-01“…Finally, the challenges of network function virtualization applying in wireless network were proposed.…”
Get full text
Article -
2277
Study of energy efficient WBAN topology optimization in IEEE 802.15.6
Published 2016-06-01“…An optimization model was proposed to design the network topology of wireless body area network(WBAN).Focusing on the two hops extended star topology given in IEEE 802.15.6 standard,a mixed integer non-linear programming model was constructed to minimize the energy consumption of WBAN.Then,the optimized network topology was obtained by adjusting the number and location of relays to be deployed and the data routing towards the hub.The experimental results show that,compared with Elias’s model (EAWD,energy aware WBAN design),the proposed model can reduce network energy consumption by 40.5%,decrease network delay by 52.4% on average,and extend network lifetime by double.…”
Get full text
Article -
2278
60 GHz Modular Antenna Array Link Budget Estimation with WiGig Baseband and Millimeter-Wave Specific Attenuation
Published 2017-01-01“…Based on the practical link budget analysis results, we can estimate fundamental limits in terms of achievable data rates over 60 GHz millimeter-wave wireless links.…”
Get full text
Article -
2279
Bridge monitoring system based on Internet of things technology
Published 2018-09-01“…The Internet of everything is the trend of today’s smart cities.With the rapid development of Internet of things technology,a good opportunity is provided to obtain real-time status information on important infrastructures.Aiming at the problem such as low monitoring efficiency,poor flexibility and rigorous testing results with traditional artificial bridge monitoring methods a bridge monitoring system based on the Internet of things technology was designed.A variety of sensors and cameras were used in the system to collect the data of bridge’s dynamic status in real-time,and the wireless multi-hop network was used to transfer the perception data to the bridge health monitoring cloud platform for further processing and analysis.Real-time monitoring,early warning,analysis and assessment of bridge safety conditions could be realized by the system,and is very important to the bridge safety engineering.…”
Get full text
Article -
2280
Fog computing based radio access networks:architecture,principles and challenges
Published 2016-06-01“…To reduce the burden of fronthaul link,avoid large-scale wireless signal processing in centralized baseband unit(BBU)pool,and take full advantage of processing and storage capabilities in edge devices,a fog computing based radio access network(F-RAN)was presented as an evolution form of heterogeneous cloud radio access networks.The core idea of F-RAN was to take full advantage of processing and storage capabilities in edge devices which could achieve the local distributed content delivery,the local distributed collaboration radio signal processing and the local distributed cooperative radio resource management functions.System architectures of F-RAN,promising key techniques,and researching open issues of F-RAN were discussed in detail.…”
Get full text
Article