-
2281
Distributed high-efficiency entropy energy-saving clustering routing algorithm for SDWSN
Published 2023-03-01“…In order to improve the life of software defined wireless sensor network (SDWSN) and reduce the energy consumption of data transmission, a hybrid optimization algorithm based on firefly algorithm (FA) and biogeography-based optimization (BBO) were designed, and based on the hybrid optimization algorithm, a distributed high-efficiency entropy energy-saving clustering routing algorithm (DHEEC) was designed, using energy entropy and hybrid optimization algorithm for cluster head selection.The simulation results show that the hybrid optimization algorithm outperforms other algorithms on standard functions.The number of death rounds of 10% nodes of DHEEC is about 13.89% higher than that of IFCEER, and about 41.05% higher than that of DEEC-FA, and the energy utilization is improved.…”
Get full text
Article -
2282
Modeling and simulation of the non-stationary fading channels under fast time-variant environment
Published 2020-05-01“…For solving the problem of non-stationary features in rapid time-varying scenarios,such as high-speed railway,unmanned aerial vehicle and V2X communication,an improved simulation method for non-stationary fading channels was proposed.Introducing the integral items and random offset,this method can revive non-stationary channels under time-variant scattering scenarios and ensure a smooth transition between two adjacent channel states.Numerical simulations show that simulated statistical properties,such as,the probability density function,auto-correlation function,and Doppler power spectral density have good agreements with the theoretical ones.Thus,this method can be applied for wireless channel modeling and communication system evaluation of future high-speed mobile scenarios.…”
Get full text
Article -
2283
A Novel Two-Terminal Reliability Analysis for MANET
Published 2013-01-01“…Mobile ad hoc network (MANET) is a dynamic wireless communication network. Because of the dynamic and infrastructureless characteristics, MANET is vulnerable in reliability. …”
Get full text
Article -
2284
New certificateless aggregate signature scheme with universal designated verifier
Published 2017-11-01“…Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key escrow,but also realize batch validation and the signer’s privacy protection.A security analysis for a certificateless aggregate signature scheme with universal designated verifier was firstly provided,and two attack methods to demonstrate that their scheme was forgeable was presented.To enhance security,a new certificateless aggregate signature scheme with universal designated verifier was proposed,and then the security of the scheme in the random oracle model was proved.The performance of our proposed scheme was finally evaluated.Compared with the original scheme,the pvoposed scheme fixes the security flaws and the total computational cost is greatly reduced.…”
Get full text
Article -
2285
Random access for massive Internet of things:current status, challenges and opportunities
Published 2021-04-01“…In conventional communication systems, the random access (RA) is a necessary procedure for a user equipment (UE) to establish wireless connection to the network before actual data transmission.Focusing on the massive IoT with large number of nodes, the fundamental characteristics and limitations of conventional grant-based RA were firstly discussed.Then, the grant-free RA, semi-grant-free RA and unsourced RA for massive IoT were addressed in details from multiple perspectives, including their system models, protocol frameworks, algorithm procedures, system performance, related pros and cons, as well as critical challenges and potential opportunities.Finally, some highlights on the related key techniques and common issues in random access for massive IoT were concluded.…”
Get full text
Article -
2286
A Trust Value-Based Spectrum Allocation Algorithm in CWSNs
Published 2013-05-01“…With the increase of congestible frequency spectrums and the rapid development of wireless sensor networks (WSNs) applications, the new technology—combing cogitative radio technology with WSNs—called CWSNs will bring broad prospects to the field of radio and sensor networks. …”
Get full text
Article -
2287
Computation task offloading algorithm and system level simulation for vehicles
Published 2019-09-01“…With the development of autonomous driving and vehicular network,more and more vehicles will have powerful computing capabilities and connection with each other via wireless network.These computing resources can not only be applied to automatic driving,but also provide a wide range of edge computing services.Aiming at the task offloading among vehicles,a distributed task offloading algorithm based on online learning was proposed to minimize the average offloading delay.Furthermore,a system-level simulation platform was built to evaluate the impact of vehicle density and number of tasks on the average offloading delay in both highway and urban scenarios.The results provide a reference for the resource allocation and deployment of task offloading in different traffic situations.…”
Get full text
Article -
2288
A Hybrid Algorithm of GA + Simplex Method in the WSN Localization
Published 2015-07-01“…Localization provides the key support for wireless sensor networks (WSNs). In order to solve the large-error problem in the third phase and the poor position accuracy of the least square method in the weighted DV-Hop algorithm, a hybrid algorithm of GA + simplex method was proposed in this paper. …”
Get full text
Article -
2289
Angle of Arrival Estimation Using Cholesky Decomposition
Published 2012-01-01“…Many applications require accurate AOA estimates such as wireless positioning and signal enhancement using space-processing techniques. …”
Get full text
Article -
2290
Nanocell:an Aggregation Solution of TD-LTE and WLAN
Published 2013-05-01“…The rapid development of mobile internet and explosive growth of wireless data traffic especially for indoor scenarios,bring forward various challenges to mobile network operators. …”
Get full text
Article -
2291
Integrity verification protocol based on privacy homomorphism data aggregation
Published 2014-11-01“…Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage,data tampering and other issues,it also achieves efficient data transmission.An integrity verification protocol based on privacy homomorphism data aggregation (IV-PHDA) was presented.The protocol uses homomorphism encryption to ensure data privacy,then it used random detection nodes to detect the integrity of the aggregated results to verify whether the aggregation node faithfully transmit each data packet.The theoretical analysis and simulation comparison verify the performance of the algorithm,the results show that this protocol can detect data integrity through transmission,and achieve better privacy protection and higher data accuracy.…”
Get full text
Article -
2292
CPW-Fed Slot Antenna for Wideband Applications
Published 2008-01-01“…This antenna can be part of various wireless communication systems.…”
Get full text
Article -
2293
Provable secure mutual RFID authentication protocol based on QC-MDPC code
Published 2014-11-01“…The security of radio frequency identification (RFID) has become an increasingly severe issue.In order to protect the security of information interaction in wireless channel of RFID system,a mutual RFID authentication secure protocol was proposed.It was like the Niederreiter type public cryptography which based on the quasi-cyclic medium density parity check code(QC-MDPC).The security proof for this novel protocol was given by using a reduction method ,and the hardness of attacking was reduced to the decoding problem of the linear codes.Besides the performance results also exhibit that compared with other RFID authentication protocols,this protocol is more suitable for RFID system in areas of interaction,computation and storage,which owns limited resource and needs high efficiency.…”
Get full text
Article -
2294
Particle filtering based semi-blind estimation for MIMO-OFDM time-varying channel
Published 2007-01-01“…A semi-blind channel estimation method based on the particle filtering was proposed for the MIMO-OFDM wireless communication system.By optimizing the particles distribution locally,the traditional particle filtering algorithm was modified,and a local optimized particle filtering was proposed.This local optimized particle filtering can achieve the low MSE,and improve the precision of the MIMO-OFDM time-varying channel estimation.Since this method was per-formed in frequency domain,it was not necessary to know(or estimate) the length of the channel.Compared with exist-ing approaches,the proposed method was more robust to the non-gauss distribution noise and the detection performance is nearly optimal.The simulation results show the effectiveness of the proposed method.…”
Get full text
Article -
2295
LoRaWAN technologies for enabling new generation Internet of things
Published 2021-06-01“…., communication performance target localization, wireless network security, and heterogeneous network.The opportunities and challenges were also discussed regarding the wide adoption of LoRaWAN in China’s context in four aspects, i.e., business models, supervision methods, technology innovations, and emerging applications.…”
Get full text
Article -
2296
Analysis of the communication standardization and industry development of internet of vehicles
Published 2020-04-01“…The internet of vehicles has become an important strategic direction for the development of the global automobile industry.China accelerates the top-level design,takes the research and deployment of a wireless communication network for vehicles based on C-V2X (now including LTE-V2X and NR-V2X) technology.And it is also required to promote the collaborative deployment of 5G and the internet of vehicles.On the basis of reviewing the latest standardization progress of 3GPP and CCSA in C-V2X,the technical standards problems found in the C-V2X“Four Layers” interoperability application demonstration were refined,and some reference suggestions were proposed for China to improve the C-V2X technical standards.…”
Get full text
Article -
2297
Hybrid genetic algorithm based optimization of pilotpattern
Published 2016-09-01“…In OFDM system,sparse channel estimation based on compressed sensing(CS)can make full use of the inherent sparse degree of the wireless channel,which can reduce the pilot overhead and improve the spectrum efficiency.Therefore,a new method based on hybrid genetic algorithm was investigated for the pilot design of CS channel estimation,which was based on the minimization of the matrix cross correlation in the CS theory.In this method,genetic algorithm was used to obtain the initial sub-optimal pilot sequence,and then combined with the pilot position and pilot power,each entry of pilot pattern could be sequentially updated and optimized to make the minimum correlation of measurement matrix.Simulation results show that the proposed method can ensure a better mean square error and bit error rate compared to the pseudo-random pilot design and the equal distance pilot design.…”
Get full text
Article -
2298
Multi-antenna diversity receiving scheme for mobile communication system in high-speed railway
Published 2014-06-01“…Under the signal model of differential modulation and demodulation, two multi-antenna diversity receptions (linear combiner and statistic combiner) were proposed, and then the effective diversity reception scheme of train-to-ground wireless broadband communication for high-speed railway scenarios was concluded. …”
Get full text
Article -
2299
Research on Space-Ground Network Security Guarantee Technology
Published 2020-09-01“…The characteristics of space-ground network was combed.Against security threats in space-ground network,the security risks faced by measurement control,operation control,terminal access,wireless transmission,transmission,business information system,maintenance management were analyzed.Further,by dividing space-ground network security into four layers:foundation layer,access layer,network layer and application layer,a security architecture to protect space-ground network was proposed.An implement mechanism (including unifi ed security management and security situation aware,entity authentication and access protection,interconnection control,cipher on-demand service,dynamic reconstruction of security service ) was designed to guarantee the security of space-ground network.…”
Get full text
Article -
2300
QoS guaranteed multi-user and multi-traffic scheduling algorithm for IEEE 802.16 network
Published 2009-01-01“…Based on IEEE 802.16 protocol,the QoS guaranteed multi-user and multi-traffic resourle allocat scheduling problem were studiedin broadband wireless access network.Tirst,the cross-layer analysis model was given by TDM-OFDMA based on multi-access queuing scheduling system.Then,based on convex optimization method,the minimum residual integrated workload algorithm was proposed.It can be shown that the algorithm has guaranteed the QoS requirements asymptotically when the QoS parameters of arriving traffic are in the stability region of this algorithm;meanwhile,the residual integrated workload of the scheduling system has been minimized.It is also verified by the numerical results of simulation experiments that the algorithm can guarantee the QoS requirements of four types of services actually.…”
Get full text
Article