Showing 2,301 - 2,320 results of 3,139 for search '"wireless"', query time: 0.04s Refine Results
  1. 2301

    Survey of security for Android smart terminal by Yan-ping XU, Zhao-feng MA, Zhong-hua WANG, Xin-xin NIU, Yi-xian YANG

    Published 2016-06-01
    “…Aiming at the security,the layered security system was constructed.Firstly,the devices safety protection based on remote anti-theft,biometric identity verification and hardware security module was expounded.Secondly,network security referring to the wireless security network,virus propagation killing and anti-phishing was illustrated.Thirdly,the OS safety was introduced from the perspective of system kernel,runtime environment and application framework.Fourthly,application security was showed containing the reverse engineering static analysis,behavior dynamic analysis,safety reinforcement and safety assessment.Fifthly,the privacy data protection was summarized including tracking,encryption and backup.Finally,the future development direction was prospected on the security framework and intelligent behavior analysis.…”
    Get full text
    Article
  2. 2302

    Congestion-Aware Signaling Aggregation and Barring Scheme for LTE Based Machine-to-Machine Network by Fangmin Xu, Chao Qiu, Pengbiao Wang, Xiaokai Liu

    Published 2015-10-01
    “…With the recently progress of Machine-to-Machine (M2M) communication technology, especially the enormous M2M devices and unique service of M2M, some challenges are emerging to the traditional wireless access and core networks, especially the congestion problem due to simultaneously bursty M2M service. …”
    Get full text
    Article
  3. 2303

    V2R communication in internet of vehicles by Xiaoting MA, Junhui ZHAO, Chuanyun WANG, Yiguo XU

    Published 2016-08-01
    “…With the tremendous advantages of wireless technologies,it has been put forward higher requirements for intelligent transportation systems(ITS).Pure Ad Hoc network or V2V communication is not reliable and sufficient for many applications.V2R communication is reliable,safe and comfortable.It can easily and quickly obtain real-time traffic information,because of the cooperation between V2V communication and V2R communication which can achieve the exchange of information between vehicles,drivers,and roads,and improve the convenience and comfort of the trip.Firstly,the characteristics of V2R communication were studied,then the network architecture was introduced.In addition,the connection for V2R communication was analyzed.Finally,the challenges of V2R communication were explored.…”
    Get full text
    Article
  4. 2304

    On coding over the spatial-temporal diversity for reliable transmission scheme in low-duty-cycle WSN by Yu-bo YAN, Pan-long YANG, Lei ZHANG, Zheng-lun QIU, Shan-lin HONG

    Published 2012-06-01
    “…A reliable data delivery scheme for low-duty-cycle wireless sensor networks(WSN)was proposed.Using this scheme,the unique spatial-temporal diversity in low-duty-cycle WSN was explored and exploited.Combining with coding schemes,the proposed scheme could achieve higher energy efficiency and lower delivery delay.The coding block allocation problem over multiple paths was formulated.As it was NP-hard,an approximate algorithm to tackle this difficulty was proposed.The impact of network parameters was further analyzed with experimental methods.Extensive simulations also show that,the coding over the spatial-temporal diversity scheme could achieve relatively reliable and low delay delivery with relatively less energy.…”
    Get full text
    Article
  5. 2305

    TOC: Lightweight Event Tracing Using Online Compression for Networked Embedded Systems by Chenhong Cao, Wen Liu, Wei Dong, Jiajun Bu

    Published 2015-11-01
    “…Many trace-based diagnostic techniques have been proposed for abnormal detection and fault diagnosis in networked embedded systems such as wireless sensor networks (WSNs). Event tracing is a nontrivial task for resource-constrained embedded devices. …”
    Get full text
    Article
  6. 2306

    Measurement of Baseline and Orientation between Distributed Aerospace Platforms by Wen-Qin Wang

    Published 2013-01-01
    “…Distributed platforms play an important role in aerospace remote sensing, radar navigation, and wireless communication applications. However, besides the requirement of high accurate time and frequency synchronization for coherent signal processing, the baseline between the transmitting platform and receiving platform and the orientation of platform towards each other during data recording must be measured in real time. …”
    Get full text
    Article
  7. 2307

    Research on caching strategy based on transmission delay in Cell-Free massive MIMO systems by Rui WANG, Min SHEN, Yun HE, Xiangyan LIU

    Published 2021-12-01
    “…To meet the ultra-low latency and ultra-high reliability requirements of users in the future mobile Internet, the wireless caching technology was combined with Cell-Free massive MIMO systems.The caching model was designed based on AP cooperative caching and regional popularity evaluation.The transmission delay expression involving AP clustering, cooperative caching, and regional popularity was derived, and the content placement problem was expressed as total content transmission delay minimization.Through the demonstration of the NP-hard and submodular monotony of the optimization problem, the greedy algorithm-based optimization strategy was proposed.Simulation results show that the proposed strategy can effectively reduce the content transmission delay and improve the cache hit rate.…”
    Get full text
    Article
  8. 2308

    Research on Spectrum Access Mechanism Based on Polling Scheduling by Jin Lu, Ming Huang, Zhijun Yang

    Published 2013-11-01
    “…Numerical analysis and simulation results show that the mechanism improves the queuing performance and the bandwidth utilization of spectrum holes, and reveal its potential application in cognitive wireless network for data services.…”
    Get full text
    Article
  9. 2309

    Technical solution and application of 5G slicing private network based on cloud-network integration by Kai CHEN

    Published 2022-07-01
    “…Facing the diversified and personalized business needs of vertical industries, 5G network slicing can provide customized, secure, and intelligent services.Combined with OTN, IPRAN/STN resources, cloud resources, cloud-network integration, and fixed-mobile integration system capabilities, 5G network slicing enables customer terminals, wireless base stations, bearers, cores and intranet service platforms communicate through private network isolation channels.The architecture scheme and key technologies of the 5G end-to-end private slicing network were introduced, the difficulties encountered in the automatic opening of private slicing networks under the new-generation operating system was analyzed, and solutions was proposed, which would promote operators from traffic management to resource management era.…”
    Get full text
    Article
  10. 2310

    Certificateless strong designated verifier multi-signature by Hong-zhen DU, Qiao-yan WEN

    Published 2016-06-01
    “…,one bilinear pairing.So,it can be applied in wireless networks of the limited computing resources and network bandwidth.…”
    Get full text
    Article
  11. 2311
  12. 2312

    The Security Weakness of Block Cipher Piccolo against Fault Analysis by Junghwan Song, Kwanhyung Lee, Younghoon Jung

    Published 2014-03-01
    “…Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware environments such as a wireless sensor network. Fault analysis is a type of side channel attack and cube attack is an algebraic attack finding sufficiently low-degree polynomials in a cipher. …”
    Get full text
    Article
  13. 2313

    Research on high security G function algorithm by Rui CHEN, Zan LI, Jia SHI, Lei GUAN

    Published 2019-06-01
    “…The differential frequency hopping (DFH) overcomes the limitation of frequency hopping and improves the ability to resist tracking interference.The G function determines the DFH sequence and directly affects the performance of DFH communication systems.However,with the complication of wireless communication system such as large capacity DFH network,which poses huge challenges to the use of the number theory based and chaos theory assisted sequence.As a result,in order to improve the security of the system,the novel G function construction was proposed with the aid of hybrid encryption algorithm and the security of hybrid algorithm was analyzed.Moreover,the equivalence principle of G function algorithm and the encryption algorithm was proved.The simulation results show that the DFH sequence generated by the new G function has excellent performance and the performance of the DFH systems is improved greatly.…”
    Get full text
    Article
  14. 2314

    Efficient parallel MAP timing recovery algorithm for TDS-OFDM systems by Yangguang LI, Jianrong BAO, Bin JIANG, Chao LIU

    Published 2018-01-01
    “…According to the problems of the existing timing recovery algorithm with the time-domain orthogonal frequency division multiplexing (TDS-OFDM) modulation in the wireless multimedia transmissions of 5G communications,such as slow processing speed and big theoretical distance,a parallel MAP timing recovery algorithm was proposed.Specifically,the Lagrangian interpolation was used and the amplitude and polarity change of the optimal sampling points were extracted to detect the timing error efficiently.Meanwhile,with the parallel maximum a posteriori (MAP) criterion,the timing error estimate was obtained at high speed.The simulation results show that the accuracy of the proposed algorithm is improved,when comparing with the existing MM algorithm,Gardner algorithm and others.The estimation result is very close to the MAP timing recovery algorithm,the difference is about 2 dB.…”
    Get full text
    Article
  15. 2315

    Study on multi-channel reservation based MAC protocol for sensor networks by ZHANG De-sheng1, LI Jin-bao1, GUO Long-jiang1

    Published 2011-01-01
    “…Aiming at triple hidden terminal problems in wireless sensor networks,an adaptive duty cycle based multi-channel MAC protocol was proposed,called MCR.MCR efficiently handled triple hidden terminal problems with multiple channel reservation.By minimizing the lower bound of average times of channel switching in MCR,the optimal duty cycle in theoretical analysis was obtained.To investigate values of multiple channel reservation and dynamic duty cycling in MCR,extensive simulation and real testbed experiments were conducted.The results show that compared with other protocols,when the number of channels is larger or loads are heavy,M-cube improves throughput and energy effi-ciency significantly.…”
    Get full text
    Article
  16. 2316

    Research at flat underlying network architecture of campus by Chu-jian LIN, Si-hai ZHANG

    Published 2014-10-01
    “…By systematic analysis of the status quo on the campus network,via deployment of BRAS and high-density switches,we deployed a flat network core,by deployment of accounting system through a bypass way,using IPOE access technology,combined with local forwarding wireless networking,assisted with linkage logging system,we achieved a unified user access certification,and we optimized the network boundary by integrating of global security policy,strategies for Internet traffic optimization base on application protocols and the deployment of caching system.Practice shows,flat underlying network architecture improves the network performance,meets the inherent requirements of campus network,while also improves users’ experience.Flat network architecture is feasible for campus network.…”
    Get full text
    Article
  17. 2317

    Enhanced zebra optimization algorithm and applications of power allocation in SDWN by LI Jiajia, DONG Ligang, JIANG Xian

    Published 2025-01-01
    “…To address the issue of interference caused by shared resources in multi-user communications in software defined wireless network (SDWN), an enhanced zebra optimization algorithm (EZOA) was proposed to achieve power allocation that maximizes the secrecy rate. …”
    Get full text
    Article
  18. 2318

    Coding technology of passive internet of things by Yibing YANG, Rongtao XU, Xia CHEN, Gongpu WANG, Bo AI

    Published 2023-09-01
    “…Passive backscatter communication can free wireless sensors from limited-life batteries and heavy manual maintenance, and will also reduce their hardware cost.Passive backscatter communication is one of the key technologies to realize the passive internet of things (IoT).Due to the limited resources of passive sensor nodes, how to use coding technology to improve system reliability has become a challenging problem for passive IoT.The coding and decoding technologies of passive nodes in the passive IoT were focused on.Firstly, the development history of traditional channel coding and the existing RFID channel coding and decoding schemes were systematically expounded.Then, three suitable coding schemes were selected for passive backscatter communication technology.Finally, the performance of these three encoding schemes were compared by simulation and the advantages and disadvantages were summarized.…”
    Get full text
    Article
  19. 2319

    Survey on SDN-based network testbeds by Tao HUANG, Jiang LIU, Chen ZHANG, Liang WEI, Yunjie LIU

    Published 2018-06-01
    “…The network testbed based on software defined networking (referred as SDN testbed) has attracted extensive attention in the academic and industrial circles in recent years,and there have been many valuable cases of system/platform construction.Therefore,an overview of the SDN testbed was intended to conduct in the global scope.Firstly,the advantages of the SDN testbed and the basic design principles of the large-scale SDN testbed was explored comparing with the traditional network testbed.Secondly,in-depth analysis of existing SDN testbed projects was provided from the aspects of the project objectives and progress,the key technologies,network deployment,and featured applications.Finally,the challenges faced in this field were described in terms of network slicing,light and wireless convergence,security,and reliability.Future research directions are also suggested.…”
    Get full text
    Article
  20. 2320

    Research of platform identity attestation based on trusted chip by Qian-ying ZHANG, Deng-guo FENG, Shi-jun ZHAO

    Published 2014-08-01
    “…The experiment result in a devel-oped prototype system shows that the proposed scheme provides good performances in computation and communication, and is especially suitable for the wireless network.…”
    Get full text
    Article