Showing 2,281 - 2,300 results of 3,139 for search '"wireless"', query time: 0.08s Refine Results
  1. 2281

    Distributed high-efficiency entropy energy-saving clustering routing algorithm for SDWSN by Qiaoqiao MA, Ligang DONG, Xian JIANG

    Published 2023-03-01
    “…In order to improve the life of software defined wireless sensor network (SDWSN) and reduce the energy consumption of data transmission, a hybrid optimization algorithm based on firefly algorithm (FA) and biogeography-based optimization (BBO) were designed, and based on the hybrid optimization algorithm, a distributed high-efficiency entropy energy-saving clustering routing algorithm (DHEEC) was designed, using energy entropy and hybrid optimization algorithm for cluster head selection.The simulation results show that the hybrid optimization algorithm outperforms other algorithms on standard functions.The number of death rounds of 10% nodes of DHEEC is about 13.89% higher than that of IFCEER, and about 41.05% higher than that of DEEC-FA, and the energy utilization is improved.…”
    Get full text
    Article
  2. 2282

    Modeling and simulation of the non-stationary fading channels under fast time-variant environment by Boyu HUA, Qiuming ZHU, Xiaoxiang HE, Kai MAO

    Published 2020-05-01
    “…For solving the problem of non-stationary features in rapid time-varying scenarios,such as high-speed railway,unmanned aerial vehicle and V2X communication,an improved simulation method for non-stationary fading channels was proposed.Introducing the integral items and random offset,this method can revive non-stationary channels under time-variant scattering scenarios and ensure a smooth transition between two adjacent channel states.Numerical simulations show that simulated statistical properties,such as,the probability density function,auto-correlation function,and Doppler power spectral density have good agreements with the theoretical ones.Thus,this method can be applied for wireless channel modeling and communication system evaluation of future high-speed mobile scenarios.…”
    Get full text
    Article
  3. 2283

    A Novel Two-Terminal Reliability Analysis for MANET by Xibin Zhao, Zhiyang You, Hai Wan

    Published 2013-01-01
    “…Mobile ad hoc network (MANET) is a dynamic wireless communication network. Because of the dynamic and infrastructureless characteristics, MANET is vulnerable in reliability. …”
    Get full text
    Article
  4. 2284

    New certificateless aggregate signature scheme with universal designated verifier by Zhi-yan XU, Li-bing WU, Li LI, De-biao HE

    Published 2017-11-01
    “…Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key escrow,but also realize batch validation and the signer’s privacy protection.A security analysis for a certificateless aggregate signature scheme with universal designated verifier was firstly provided,and two attack methods to demonstrate that their scheme was forgeable was presented.To enhance security,a new certificateless aggregate signature scheme with universal designated verifier was proposed,and then the security of the scheme in the random oracle model was proved.The performance of our proposed scheme was finally evaluated.Compared with the original scheme,the pvoposed scheme fixes the security flaws and the total computational cost is greatly reduced.…”
    Get full text
    Article
  5. 2285

    Random access for massive Internet of things:current status, challenges and opportunities by Pingzhi FAN, Li LI, Huan CHEN, Gaofeng CHENG, Linjie YANG, Xiaobo TANG

    Published 2021-04-01
    “…In conventional communication systems, the random access (RA) is a necessary procedure for a user equipment (UE) to establish wireless connection to the network before actual data transmission.Focusing on the massive IoT with large number of nodes, the fundamental characteristics and limitations of conventional grant-based RA were firstly discussed.Then, the grant-free RA, semi-grant-free RA and unsourced RA for massive IoT were addressed in details from multiple perspectives, including their system models, protocol frameworks, algorithm procedures, system performance, related pros and cons, as well as critical challenges and potential opportunities.Finally, some highlights on the related key techniques and common issues in random access for massive IoT were concluded.…”
    Get full text
    Article
  6. 2286

    A Trust Value-Based Spectrum Allocation Algorithm in CWSNs by Qing-Qi Pei, Zi Li, Li-Chuan Ma

    Published 2013-05-01
    “…With the increase of congestible frequency spectrums and the rapid development of wireless sensor networks (WSNs) applications, the new technology—combing cogitative radio technology with WSNs—called CWSNs will bring broad prospects to the field of radio and sensor networks. …”
    Get full text
    Article
  7. 2287

    Computation task offloading algorithm and system level simulation for vehicles by Qicheng ZENG, Yuxuan SUN, Sheng ZHOU

    Published 2019-09-01
    “…With the development of autonomous driving and vehicular network,more and more vehicles will have powerful computing capabilities and connection with each other via wireless network.These computing resources can not only be applied to automatic driving,but also provide a wide range of edge computing services.Aiming at the task offloading among vehicles,a distributed task offloading algorithm based on online learning was proposed to minimize the average offloading delay.Furthermore,a system-level simulation platform was built to evaluate the impact of vehicle density and number of tasks on the average offloading delay in both highway and urban scenarios.The results provide a reference for the resource allocation and deployment of task offloading in different traffic situations.…”
    Get full text
    Article
  8. 2288

    A Hybrid Algorithm of GA + Simplex Method in the WSN Localization by Feng Wang, Cong Wang, ZiZhong Wang, Xue-ying Zhang

    Published 2015-07-01
    “…Localization provides the key support for wireless sensor networks (WSNs). In order to solve the large-error problem in the third phase and the poor position accuracy of the least square method in the weighted DV-Hop algorithm, a hybrid algorithm of GA + simplex method was proposed in this paper. …”
    Get full text
    Article
  9. 2289

    Angle of Arrival Estimation Using Cholesky Decomposition by Saleh O. Al-Jazzar

    Published 2012-01-01
    “…Many applications require accurate AOA estimates such as wireless positioning and signal enhancement using space-processing techniques. …”
    Get full text
    Article
  10. 2290

    Nanocell:an Aggregation Solution of TD-LTE and WLAN by Xi Cao, Ning Yang, Tao Sun, Guangyi Liu, Hui Deng

    Published 2013-05-01
    “…The rapid development of mobile internet and explosive growth of wireless data traffic especially for indoor scenarios,bring forward various challenges to mobile network operators. …”
    Get full text
    Article
  11. 2291

    Integrity verification protocol based on privacy homomorphism data aggregation by Xing LI, Chun-yan LI, Liang-min WANG

    Published 2014-11-01
    “…Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage,data tampering and other issues,it also achieves efficient data transmission.An integrity verification protocol based on privacy homomorphism data aggregation (IV-PHDA) was presented.The protocol uses homomorphism encryption to ensure data privacy,then it used random detection nodes to detect the integrity of the aggregated results to verify whether the aggregation node faithfully transmit each data packet.The theoretical analysis and simulation comparison verify the performance of the algorithm,the results show that this protocol can detect data integrity through transmission,and achieve better privacy protection and higher data accuracy.…”
    Get full text
    Article
  12. 2292

    CPW-Fed Slot Antenna for Wideband Applications by T. Shanmuganantham, K. Balamanikandan, S. Raghavan

    Published 2008-01-01
    “…This antenna can be part of various wireless communication systems.…”
    Get full text
    Article
  13. 2293

    Provable secure mutual RFID authentication protocol based on QC-MDPC code by Ze-hui LI, Ya-tao YANG, Zi-chen LI

    Published 2014-11-01
    “…The security of radio frequency identification (RFID) has become an increasingly severe issue.In order to protect the security of information interaction in wireless channel of RFID system,a mutual RFID authentication secure protocol was proposed.It was like the Niederreiter type public cryptography which based on the quasi-cyclic medium density parity check code(QC-MDPC).The security proof for this novel protocol was given by using a reduction method ,and the hardness of attacking was reduced to the decoding problem of the linear codes.Besides the performance results also exhibit that compared with other RFID authentication protocols,this protocol is more suitable for RFID system in areas of interaction,computation and storage,which owns limited resource and needs high efficiency.…”
    Get full text
    Article
  14. 2294

    Particle filtering based semi-blind estimation for MIMO-OFDM time-varying channel by JING Yuan, YIN Fu-liang, ZENG Shuo

    Published 2007-01-01
    “…A semi-blind channel estimation method based on the particle filtering was proposed for the MIMO-OFDM wireless communication system.By optimizing the particles distribution locally,the traditional particle filtering algorithm was modified,and a local optimized particle filtering was proposed.This local optimized particle filtering can achieve the low MSE,and improve the precision of the MIMO-OFDM time-varying channel estimation.Since this method was per-formed in frequency domain,it was not necessary to know(or estimate) the length of the channel.Compared with exist-ing approaches,the proposed method was more robust to the non-gauss distribution noise and the detection performance is nearly optimal.The simulation results show the effectiveness of the proposed method.…”
    Get full text
    Article
  15. 2295

    LoRaWAN technologies for enabling new generation Internet of things by Chaojie GU, Rui TAN

    Published 2021-06-01
    “…., communication performance target localization, wireless network security, and heterogeneous network.The opportunities and challenges were also discussed regarding the wide adoption of LoRaWAN in China’s context in four aspects, i.e., business models, supervision methods, technology innovations, and emerging applications.…”
    Get full text
    Article
  16. 2296

    Analysis of the communication standardization and industry development of internet of vehicles by Lin LIN, Lu LI, Yuming GE

    Published 2020-04-01
    “…The internet of vehicles has become an important strategic direction for the development of the global automobile industry.China accelerates the top-level design,takes the research and deployment of a wireless communication network for vehicles based on C-V2X (now including LTE-V2X and NR-V2X) technology.And it is also required to promote the collaborative deployment of 5G and the internet of vehicles.On the basis of reviewing the latest standardization progress of 3GPP and CCSA in C-V2X,the technical standards problems found in the C-V2X“Four Layers” interoperability application demonstration were refined,and some reference suggestions were proposed for China to improve the C-V2X technical standards.…”
    Get full text
    Article
  17. 2297

    Hybrid genetic algorithm based optimization of pilotpattern by Hanbing ZHENG, Xiang YU, Weiwei WANG

    Published 2016-09-01
    “…In OFDM system,sparse channel estimation based on compressed sensing(CS)can make full use of the inherent sparse degree of the wireless channel,which can reduce the pilot overhead and improve the spectrum efficiency.Therefore,a new method based on hybrid genetic algorithm was investigated for the pilot design of CS channel estimation,which was based on the minimization of the matrix cross correlation in the CS theory.In this method,genetic algorithm was used to obtain the initial sub-optimal pilot sequence,and then combined with the pilot position and pilot power,each entry of pilot pattern could be sequentially updated and optimized to make the minimum correlation of measurement matrix.Simulation results show that the proposed method can ensure a better mean square error and bit error rate compared to the pseudo-random pilot design and the equal distance pilot design.…”
    Get full text
    Article
  18. 2298

    Multi-antenna diversity receiving scheme for mobile communication system in high-speed railway by Wan-tuan LUO, ANGXu-ming F, Meng CHENG, Ya-jun ZHAO

    Published 2014-06-01
    “…Under the signal model of differential modulation and demodulation, two multi-antenna diversity receptions (linear combiner and statistic combiner) were proposed, and then the effective diversity reception scheme of train-to-ground wireless broadband communication for high-speed railway scenarios was concluded. …”
    Get full text
    Article
  19. 2299

    Research on Space-Ground Network Security Guarantee Technology by Fenghua LI, Linjie ZHANG, Yueming LU, Kui GENG, Yunchuan GUO

    Published 2020-09-01
    “…The characteristics of space-ground network was combed.Against security threats in space-ground network,the security risks faced by measurement control,operation control,terminal access,wireless transmission,transmission,business information system,maintenance management were analyzed.Further,by dividing space-ground network security into four layers:foundation layer,access layer,network layer and application layer,a security architecture to protect space-ground network was proposed.An implement mechanism (including unifi ed security management and security situation aware,entity authentication and access protection,interconnection control,cipher on-demand service,dynamic reconstruction of security service ) was designed to guarantee the security of space-ground network.…”
    Get full text
    Article
  20. 2300

    QoS guaranteed multi-user and multi-traffic scheduling algorithm for IEEE 802.16 network by BAI Bo1, CAO Zhi-gang1, CHEN Wei1, I Chih-lin2

    Published 2009-01-01
    “…Based on IEEE 802.16 protocol,the QoS guaranteed multi-user and multi-traffic resourle allocat scheduling problem were studiedin broadband wireless access network.Tirst,the cross-layer analysis model was given by TDM-OFDMA based on multi-access queuing scheduling system.Then,based on convex optimization method,the minimum residual integrated workload algorithm was proposed.It can be shown that the algorithm has guaranteed the QoS requirements asymptotically when the QoS parameters of arriving traffic are in the stability region of this algorithm;meanwhile,the residual integrated workload of the scheduling system has been minimized.It is also verified by the numerical results of simulation experiments that the algorithm can guarantee the QoS requirements of four types of services actually.…”
    Get full text
    Article