-
2341
MND for Helping People with Different Disabilities
Published 2014-07-01“…The proposed system is based on wireless sensor networks. In the MND WSN system, each disabled person uses a handheld smart phone device. …”
Get full text
Article -
2342
Study on integrated sensing and communication for 6G RAN
Published 2022-09-01“…The integrated sensing and communication technology has become one of the important research directions for 6G system.The necessity of integrated sensing and communication at the air inter face was analyzed and summarized, as not only for improving the service capacity for 6G system but also for effectively improving the spectrum utilization.One integrated sensing and communication scheme at the air interface level for 6G RAN was proposed, including the high level framework of RAN system, the multiplexing mode of wireless sensing signal and communication signal, the design of integrated channel/signal, etc.for further study.The challenges of integrated sensing and communication at the air interface were analyzed.It was pointed out that integrated sensing and communication at the air interface would have an important impact on the design of 6G RAN protocol stack, which needed to be focused on.…”
Get full text
Article -
2343
An Improved Group-Based Neighbor Discovery Algorithm for Mobile Sensor Networks
Published 2014-04-01“…Wireless sensor networks have been widely used in a variety of commercial and military applications, which often require neighbor nodes to establish connection quickly. …”
Get full text
Article -
2344
Design of infrastructure-free Wi-Fi indoor localization
Published 2012-11-01“…A RSS-based infrastructure-free localization algorithm was proposed,which is only based on Wi-Fi signals and does not require any additional infrastructure.It reduces the database construction cost by a special dynamic method.By picking the hot spot,it can effectively alleviate the interference from other wireless signals in the nearby region.It also enhances the RSS–based matching algorithm and hence improves the localization accuracy.The algorithm is easy to operate and doesn’t need any complex participation from end users.The algorithm is suitable for those who can provide positioning service in some special locations.Through the deployment of dedicated hot spots,it will reduce the environment interference and improve the quality of location-based service.…”
Get full text
Article -
2345
6G endogenous security:architecture and key technologies
Published 2020-01-01“…At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.…”
Get full text
Article -
2346
Buffer-aided cooperative NOMA with power transfer
Published 2023-06-01“…To improve the throughput of multiuser simultaneous wireless information and power transfer systems, a buffer-aided cooperative non-orthogonal multiple access scheme with power transfer was designed to maximize the average throughput under the constraints of average/peak power, user’s rate, and the buffer stability.To reduce the optimization complexity, the Lyapunov’s method was introduced to convert the long-term average optimization problem into a series of time-discrete subproblems, and an adaptive transmission and resource allocation optimization algorithm was proposed, where the working mode, the user scheduling and the power allocation were dynamically optimized according to the time-varying channel/buffer state.Simulation results demonstrate that compared with the existing schemes, the proposed scheme can significantly enhance the average throughput whilst achieving the tradeoff between the delay and throughput.…”
Get full text
Article -
2347
Two-factor wearable device authentication protocol based on PUF and IPI
Published 2017-06-01“…Wearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait,the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes,the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA.…”
Get full text
Article -
2348
Peritoneal Lipomatosis: A Case Report of a 12-Year-Old Boy
Published 2013-01-01“…His diagnostic work up included an abdominal MRI, wireless capsule endoscopy and single-balloon enteroscopy. …”
Get full text
Article -
2349
Channel estimation method based on compressive sensing for FBMC/OQAM system
Published 2019-12-01“…In mobile-to-mobile sensor networks,the channel estimation for FBMC/OQAM system can be investigated as a compressive sensing problem to raise frequency spectrum efficiency by exploiting the sparse nature of wireless channels.Firstly,a novel orthogonal matching pursuit algorithm with selection weak strategy and regularization based on Tanimoto coefficient (T-SWROMP) was proposed to improve the accuracy of LS channel estimation.Then,T-SWROMP methods with auxiliary pilot and coding were used to estimate channel frequency response for FBMC/OQAM system.The experimental results demonstrate the proposed method has lower complexity than the traditional SWOMP method.In addition,it achieve best performance among the traditional OMP,SWOMP and ROMP methods under dual-selective channels.…”
Get full text
Article -
2350
Reconfigurable mmWave Planar Phased Array Featuring Wide Elevation and Full Azimuth Spatial Coverage for 5G Vehicular Application
Published 2025-01-01“…A wide-spatial coverage, low-profile, pattern reconfigurable, millimeter-wave antenna array designed for Vehicle-to-Everything (V2X) communication systems, crucial for fifth-generation wireless networks. The array features a hybrid structure and beam-scanning capabilities, ensuring extensive spatial coverage in the n257 band. …”
Get full text
Article -
2351
-
2352
Antenna Element Index Modulation for Frequency Diverse Array
Published 2019-01-01“…It is shown that this enables the capability for simultaneous wireless communication and FDA Radar that has the range-angle coupling issue resolved.…”
Get full text
Article -
2353
Energy-efficient and intelligent cooperative spectrum sensing algorithm in cognitive radio networks
Published 2022-09-01“…Green communication is the demand of current and future wireless communication. As the next-generation communication network, cognitive radio network also needs to meet the requirements of green communication. …”
Get full text
Article -
2354
Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance
Published 2013-11-01“…Wireless sensor networks (WSNs) integrate sensor technology, communication technology and information processing technology; it is a synthetic discipline. …”
Get full text
Article -
2355
IEEE 802.11 WLAN analytical model for M2M small data service
Published 2011-01-01“…Machine to machine(M2M) communications had a huge potential market.Wireless local area network(WLAN) as the main complement for 3G networks would carry a lot of M2M services.Considering the characteristics of typical M2M small data service which was delay tolerant and retry patient,a large time-scale backoff algorithm was proposed in the network model of IEEE 802.11 DCF.MAC layer service time probability distribution was derived,and IPP/G/1/K discrete-time queuing model was established in order to analyze the QoS performance of M2M under unsaturated traffic condition and imperfect channel in the WLAN.Simulation results indicate that the proposed algorithm effectively enhances system throughput and reduces system blocking rate.…”
Get full text
Article -
2356
Ultrawideband Vivaldi Antenna for DVB-T, WLAN, and WiMAX Applications
Published 2014-01-01“…This antenna is suitable for portable DVB-T which extended from 450 MHz to 850 MHz receiver applications and the WLAN (Wireless Local Area Network) IEEE 802.11b,g (5.1–5.8) GHz frequency bands and WiMAX band (3.3–3.8) GHz. …”
Get full text
Article -
2357
Tablet PC Enabled Body Sensor System for Rural Telehealth Applications
Published 2016-01-01“…This system includes real time continuous collection of physiological parameters (blood pressure, pulse rate, and temperature) and fall detection of a patient with the help of a body sensor unit and wireless transmission of the acquired information to a tablet PC handled by the medical staff in a Primary Health Center (PHC). …”
Get full text
Article -
2358
Novel air-to-air data link system based on millimeter wave communication
Published 2023-04-01“…In order to solve the problems of insufficient communication rate between networked fighters, signals being easily eavesdropped and interfered, and unsatisfactory networking performance in the existing air-to-air inter-aircraft data links, a millimeter wave communication air-to-air data link system was proposed.The millimeter wave communication technology was introduced into the data link system, and reconfigurable intelligent surface, orthogonal time frequency space modulation, integrated sensing and communication, and wireless ad hoc network technology were integrated.The analysis and simulation results show that the proposed system is superior to existing systems in terms of transmission bandwidth, anti-interception and anti-interference performance and hardware complexity and cost.At the same time, the proposed system faces technical challenges such as real-time beam tracking, which need further research to solve.…”
Get full text
Article -
2359
Multi-agent reinforcement learning based dynamic optimization algorithm of CRE offset for heterogeneous networks
Published 2023-12-01“…To cope with the high throughput demand caused by the proliferation of wireless network users, a multi-agent reinforcement learning based dynamic optimization algorithm of cell range expansion (CRE) offset was proposed for interference scenarios in macro-pico heterogeneous networks.Based on the value decomposition network framework of collaborative multi-agent reinforcement learning, a personalized online local decision of CRE offset for all pico-base stations was achieved by reasonably utilizing and interacting the intra-system user distribution and their interference levels among pico-base stations.Simulation results show that the proposed algorithm has significant advantages in increasing system throughput, balancing the throughput of each base station and improving edge-user throughput, compared to CRE=5 dB and distributed Q-learning algorithms.…”
Get full text
Article -
2360
Review on unmanned aerial vehicle covert communication network
Published 2023-08-01“…Unmanned aerial vehicle (UAV) communication network is an important part of the future integrated space-aerial-ground network, and an effective support to achieve the global three-dimensional coverage of the communication network.The open characteristics of wireless channels make UAV communication vulnerable to malicious attacks by illegal users.Covert communication provides a promising solution for improving the security defense and privacy protection capabilities of UAV communication.However, the overlapping characteristics of the mobility of UAV systems and the requirements of covert communication scenarios bring severe challenges to the collaborative optimization of network resources.The UAV covert communication network was investigated from requirements, challenges, framework and main technologies perspectives.The architecture and model, performance characteristic, as well as potential candidate technologies were analyzed and discussed, in an attempt to outline the overall framework of UAV covert communication, and provide guidance for the subsequent research on UAV covert communication.…”
Get full text
Article