-
2321
Study on end-to-end QoS parameters of TDD-LTE about the services of mobile internet
Published 2016-10-01“…Aiming at the high bandwidth and service quality demand of wireless access network because of rapid development of mobile internet, the common mobile internet services were analyzed. …”
Get full text
Article -
2322
-
2323
An Energy-Efficient Node Selection Algorithm in Bearings-Only Target Tracking Sensor Networks
Published 2014-02-01“…This paper discusses a node selection problem for bearings-only tracking in wireless sensor networks (WSNs). Saving energy and prolonging the lifetime of the network are the research focuses due to the severely constrained resource of WSNs. …”
Get full text
Article -
2324
Self-attention mechanism-based CSI eigenvector feedback for massive MIMO
Published 2023-11-01“…Massive multiple-input multiple-output (MIMO) system can provide satisfying gain of spectrum efficiency for 5G and future wireless communication systems.In frequency-division duplex (FDD) mode, downlink channel state information (CSI) needs to be accurately fed back to the base station side to obtain this gain.To improve the feedback accuracy of downlink CSI eigenvector, a self-attention mechanism-based CSI feedback method named SA-CsiNet was proposed.SA-CsiNet respectively deployed self-attention modules at the encoder and the decoder to achieve feature extraction and reconstruction of CSI.Experimental results show that compared with codebook-based and conventional deep learning-based CSI feedback approaches, SA-CsiNet provides higher reconstruction accuracy of CSI.…”
Get full text
Article -
2325
RSS-TOA based localization algorithm in non-line-of-sight environment
Published 2019-09-01“…The existence of non-line-of-sight (NLOS) error can degrade the positioning performance in wireless sensor network localization system,especially in indoor localization.To overcome the localization error caused by NLOS propagation,a localization algorithm was proposed based on received signal strength (RSS) and time-of-arrival (TOA).Firstly,a non-convex optimization problem was established based on RSS and TOA.Then,the original non-convex optimization problem was transformed into a convex optimization problem through the second-order cone relaxation technique,therefore a sub-optimal solution to the original problem could be obtained efficiently.Finally,computer simulation results show that the proposed method can provide higher estimation accuracy and better performance.…”
Get full text
Article -
2326
Transceiver design and performance analysis for uplink SCMA based on CP-free OFDM
Published 2021-06-01“…A typical sparse code multiple access (SCMA) system utilizes orthogonal frequency division multiplexing (OFDM) technology with cyclic prefix (CP) to combat multipath fading in wireless channels.Therefore, its capacity is reduced by the CP-insertion.To address this issue, the SCMA scheme based on CP-free OFDM using the time domain precoding (TDP) algorithm was proposed and the proposed scheme was termed as TDP-OFDM SCMA.The transceiver structure was designed, and the capacity plus the bit error rate (BER) performances under various channels with different overload rates and with channel estimation errors were evaluated via the simulations.Also, the power consumption problem in TDP-OFDM SCMA was discussed.The simulation results show that under the same overload rate, the capacity of TDP-OFDM SCMA can be increased by up to 25% if compared with the SCMA based on CP-OFDM.…”
Get full text
Article -
2327
A compressive data gathering method based on El Gamal cryptography
Published 2019-12-01“…As a hot researching area,compressive sensing has advantages in signal process,image processing and data gathering and analysis.How to effectively and safely apply compressive sensing technology to collect data in wireless sensor networks is studied.Conventional compressive sensing technology based data collection method does not consider the security issue.Furthermore,every nod in the network must participate in the process of collecting measurements.The El Gamal cryptography and sparse matrices based compressive sensing technology were combined,and the El Gamal based sparse compressive data gathering (ESCDG) method was proposed.Theoretical analysis and numerical experiments show that ESCDG not only decreases the network resource consumption but also be able to defense the internal and external attacks.…”
Get full text
Article -
2328
Error exponent for TAS/MRC fading channel
Published 2016-05-01“…Using Meijer-G function,exact expression for the random coding error exponent,ergodic capacity,cutoff rate,expurgated exponent of TAS/MRC Nakagami-m fading channel were derived.Numerical results show that the random coding error exponent is related to channel fading coefficient,coding rate,the number of transmitting and receiving antennas,and signal symbol period.With the coding rate,the number of the receiving and transmitting antennas and the average signal to noise ratio increasing,the RCEE of the system will become larger and the BER performance of the system will be better.For a given decoding error probability of a wireless communication system,necessary coding length,number of antennas,channel coherence time,and spatial fading correlation could be estimated by computing the random coding error exponent.…”
Get full text
Article -
2329
Research Status of CPM for Satellite-Terrestrial Integrated Network
Published 2023-03-01“…Around the vision of "full coverage" of the new generation of mobile communication system (6G), satelliteterrestrial integration, as one of the key technologies, is the development direction of the future wireless communication system.The construction of satellite-terrestrial integration network and deep integration need reasonable waveforms at physical layer.In view of the problems of transmission in satellite-terrestrial integration, the signifi cant advantages and practicability of continuous phase modulation (CPM) signal in spectral effi ciency and energy effi ciency were analyzed.The research progress of CPM signal at receiver in mobile communication system from the time and frequency domain were discussed, which provided support for CPM related research in satellite-terrestrial integration in the future.…”
Get full text
Article -
2330
GreyFan:a network attack framework using Wi-Fi covert channel
Published 2019-09-01“…For traditional physical attacks such as side channel attacks and HID attacks in real networks,physical isolation is considered to be a relatively complete security protection against network attacks.In 2018,a Wi-Fi hidden channel method in the physical isolation environment——Ghost Tunnel was firstly proposed,that is,in the state that Wi-Fi didn’t connected,the wireless AP could successfully transmit data to the computer that initiates the connection request.An attack framework based on the Ghost Tunnel method——GreyFan was proposed.This attack framework enabled attackers to implement non-aware attacks on users who didn’t connected to Wi-Fi,such as file concealed transmission and arbitrary code execution,etc.The corresponding defense technology was also analyzed.…”
Get full text
Article -
2331
A Zone-Based Self-Organized Handover Scheme for Heterogeneous Mobile and Ad Hoc Networks
Published 2014-06-01“…This paper proposes a handover management scheme by dividing the total coverage area of the base station (BS) or access point (AP) into three different zones (strong, average, and weak zones), respectively, on the basis of receive signal strength indication (RSSI) to provide fast vertical handover support in heterogeneous wireless networks. Furthermore, a new event is proposed and added to the IEEE 802.21: media independent handover (MIH) standard to integrate the functionality of multithreshold. …”
Get full text
Article -
2332
Overview of marine internet
Published 2018-06-01“…Marine internet is an extension of the internet in the marine environment.Marine internet is very different from the existing terrestrial internet and needs extensive and in-depth research.Several common network structures in the marine internet were summarized and compared.The existing marine internet services are mainly provided through maritime satellites.Therole of shore-based networks,underwater acoustic communication and underwater acoustic networks in the Ad Hoc networks of the sea were introduced,and how to apply wireless Ad Hoc network technologies to the marine internet was introduced,such as ship Ad Hoc networks,aviation Ad Hoc networks and underwater Ad Hoc networks.From the multiple perspectives of air,water,and underwater,the advantages and disadvantages,limitations,and future development trends of many different networking technologies were analyzed,and possible future networking strategies for the marine internet were proposed .…”
Get full text
Article -
2333
Evolved Programmable Network
Published 2014-09-01“…This success has been driven by continuous technical innovation in both computer (semiconductor)technologies along with improved optical and wireless transmission technology enabling faster and lower priced bandwidth. …”
Get full text
Article -
2334
Two-way relaying protocol tailored for sensor network
Published 2014-03-01“…A three-time-slot two-way relaying protocol,named as two-way selective decode-and-forward (TW-SDF) protocol,was proposed.This relaying protocol integrates network coding and the selective decode-and-forward method,and was tailored for wireless networks with simple devices,like sensor networks.Compared with the well-known physical-layer network coding protocol,the considered TW-SDF has the merits of full diversity order gain,low encoding and decoding complexity and easy-to-implement.Provided block codes,an upper bound on the block error rate of TW-SDF was derived and proved,which is valid for all hard decoders.Simulation results further verify that the upper bound is remarkably tight if BCH codes are utilized.…”
Get full text
Article -
2335
Research on theoretical ultimate value of 5G flow residence ratio based on big data
Published 2023-10-01“…The 5G flow residence ratio is an important indicator used by communication operators to evaluate the coverage capacity of 5G networks, and it is also an important starting point for the networks’ planning, optimization, maintenance and operation.To ensure user perception, the actual wireless transmission influencing factors, existing network structure and network coordination strategy, etc., need to be considered.The resident capacity of a 5G network in the 3.5 GHz frequency band was evaluated, analyzed and calculated, and the theoretical ultimate value of the 5G traffic resident ratio based on the analysis of network and users’ big data was put forward, which explained the positive relationship between user perception and residence ratio, and provided a reference for the reasonable theoretical ultimate value of 5G traffic resident ratio.…”
Get full text
Article -
2336
TD-LTE Coverage Planning Targets and UL/DL Subframe Configuration
Published 2013-05-01“…Common reference signal received power(CRS RSRP)and signal interference noise ratio(CRS SINR)are two important wireless network planning factors,which are directly related to indoor deep coverage and edge data rate. …”
Get full text
Article -
2337
MIMO iterative channel estimation based on extended Kalman filter
Published 2017-09-01“…In high-speed environment,fast fading and non-stationary limits the channel estimation performance,so a channel estimation method for high-speed mobility in MIMO downlink was proposed.A self-feedback extended Kalman filter (EKF) was set up to track the channel response and correlation parameters.An iterative detector & decoder receiver was adopted to deal with the problem that the observation equation is an underdetermined equation.The simulation results show that compared with least squares(LS) in high speed environment,the proposed method improves the channel estimation accuracy and performance of whole system.And it could be applied in baseband signal processing of wireless receiver in high-speed train.…”
Get full text
Article -
2338
Research on hierarchical service guarantee scheme for 5G network
Published 2022-05-01“…The digital transformation process of economic society is accelerating.As the first of "new infrastructure", 5G will effectively enable the industry digital transformation.Facing the diverse needs of the industry in terms of network performance, operators need to provide the industry with hierarchical wireless service levels.Based on the analysis of 5G network performance requirements of industry services, the RAN-based service guarantee capability of 5G network was introduced from three aspects: data rate, delay and reliability.At the same time, based on the demands, various service guarantee technical technologies were combined and associated with network slice ID and 5QI to form a hierarchical service guarantee scheme.By matching industry service demands and network capacities, the integration and development of communication and vertical industry will be better promoted.…”
Get full text
Article -
2339
Performance analysis and improvement of link adaptation techniques in TDD-HSDPA/SA system
Published 2006-01-01“…The wireless channel fluctuation resulted from smart antennas in TDD-HSDPA/SA(time division duplex-high speed downlink packet access /smart antennas)system,which caused traditional link adaptation technologies invalid,was theoretically investigated.Two kinds of novel link adaptation schemes were proposed to deal with this issue.A dynamic system level simulator was established to evaluate the performances of the two schemes.Simulation results indicate that both of them have great improvement in system residual BLER and have certain system throughput gain.The first one suits for the hybrid networking case of TDD and FDD(frequency division duplex)mode,while the second one can serve the case of alone TDD networking.…”
Get full text
Article -
2340
Small Bowel Obstruction with Perforation Secondary to PillCam
Published 2018-01-01“…After unremarkable upper and lower gastrointestinal endoscopies and biopsies, she was referred for wireless capsule endoscopy (WCE). Four days afterwards she re-presented with small bowel obstruction and perforation related to the PillCam, which was confirmed on X-ray, on computed topography (CT), and at laparotomy.…”
Get full text
Article