-
2361
Active defense technology against intelligent jammer
Published 2022-10-01“…In the complex electromagnetic countermeasure environment, the intelligent development of jammer has caused a serious threat to wireless communication, while the traditional anti-jamming methods often passively adjusted the working mode or parameters, which will be at a disadvantage or even suppressed in the face of intelligent jammer.To solve this problem, a technical framework of active defense against jammer was proposed, aiming to disrupt the learning process of the intelligent jammer and reduce the jamming efficacy.In order to gradually achieve the goals of “understanding opponent”“controlling opponent” and “defeating opponent”, under the guidance of game theory and adversarial machine learning, the key technologies were discussed from three aspects: backward reasoning of jammer, algorithm vulnerability analysis and confrontational strategy design, independent optimization and online decision-making of anti-jamming strategy.Finally, combined with two specific cases, the feasibility and effectiveness of the proposed technical framework were verified.…”
Get full text
Article -
2362
Multi-domain collaborative anti-jamming based on multi-agent deep reinforcement learning
Published 2022-12-01“…Dynamic transmission requirements and the limited cache space bring great challenges to wireless data transmission in the malicious jamming environment.Aiming at the above problems, a collaborative anti-jamming channel selection and data scheduling joint decision method for distributed internet of things was studied from the perspective of frequency domain and time domain.A data transmission model based on multi-user Markov decision process was constructed and a collaborativeanti-jamming joint-channel-and-data decision algorithm based on multi-agent deep reinforcement learning was proposed.Simulation results show that the proposed algorithm can effectively avoid the malicious jamming and the co-channel interference.Compared with the comparison algorithm, the network throughput is significantly improved, and the number of packet dropout is significantly reduced.…”
Get full text
Article -
2363
APPLICATION OF THE INTERNET OF THINGS IN PHARMACEUTICAL INDUSTRY SUPPLY CHAINS
Published 2019-10-01“…The first level is radio frequency object identification, and the second level is organization of wireless sensor network. By adapting the proposed system, the pharmaceutical company can easily monitor and control the quality of the goods during transportation.…”
Get full text
Article -
2364
Asymptotic quadratic price game mechanism for video stream extensible feedback unloading
Published 2020-01-01“…A progressive quadratic price game mechanism with scalable feedback offloading of video streams was proposed.Firstly,the congestion of cellular network could be alleviated by effectively uninstalling some video traffic from all video streaming services to Wi-Fi network,thus providing seamless video streaming services.Several physi-cal paths were integrated in an economical and efficient way.The fountain coded symbols of compressed video data were transmitted simultaneously through LTE and Wi-Fi network to flexibly control the viewing through Wi-Fi net-work and reduce the video quality degradation caused by wireless channel errors.Secondly,a progressive secondary price auction mechanism was used to allocate limited LTE resources to multiple user devices to maximize social wel-fare and achieve Nash equilibrium.The scalability and convergence of the system were verified theoretically.Finally,the performance advantages of the proposed algorithm in video streaming transmission quality and energy consump-tion were verified by experimental simulation.…”
Get full text
Article -
2365
Wide-Band High-Gain DGS Antenna System for Indoor Robot Positioning
Published 2019-01-01“…Based on multisource wireless signal fusion technology, the autonomous positioning systems of robots have been widely employed. …”
Get full text
Article -
2366
New flexible sensor for the internet of things
Published 2023-06-01“…The new flexible sensing technology integrates electronic information, material chemistry, biomedical engineering and nano-processing, to provide intelligent sensing terminals for the internet of things, which will be widely used in health monitoring, smart home, smart manufacturing and other fields.For the development of new materials and research on novel mechanisms, flexible sensors have gained much progress in basic parameters, such as sensitivity, response range, response time, linearity, hysteresis, and stability.The flexible sensing technology is not only limited to materials and devices, but also expands from a single device to system-level integrations.Aimed at the hot research issues in recent years, the development of new flexible sensors was introduced from four aspects: multimode integrated sensors, bionic electronic sensors, wireless signal transmission and energy supply, and intelligent information processing.…”
Get full text
Article -
2367
A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and CRT
Published 2023-12-01“…A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and Chinese remainder theorem (CRT) was proposed to solve the problems such as the incomplete reliability of ZigBee network trust center and the lack of identity authentication when accessing the network.The proposed scheme can not only realize two-way authentication of anonymous identity, but also ensure the security of key distribution when ZigBee network structure changes dynamically.It is mainly based on a ZigBee and NB-IoT wireless heterogeneous gateway, so that the server can effectively manage the nodes in the network through this gateway.From security analysis and comparison with other related literature, the proposed scheme has higher security, with anonymity and unlink ability.In addition, the results show that the proposed scheme has more advantages than other schemes on the computational overhead.…”
Get full text
Article -
2368
An incentive mechanism with bandwidth allocation for federated learning
Published 2022-12-01“…Federated learning (FL) is an emerging machine learning paradigm that can make full use of crowd sourced mobile resources for training on decentralized data.However, it is challenging to deploy FL over a wireless network because of the limited bandwidth and clients’ selfishness.To address these challenges, an incentive mechanism with bandwidth allocation (IMBA) was proposed.Considering the difference between clients' data quality and computing power, IMBA designs a payment scheme to incentivize high-quality clients to contribute their computing resources, thus improving the training accuracy of the model.By minimizing the weight sum of training time and payment cost, the optimal payment and bandwidth allocation scheme was determined, and the training delay was reduced by optimizing bandwidth allocation.Experiments show that IMBA effectively improves training accuracy, reduces the training delay and helps the server flexibly balance training delay and hiring payment.…”
Get full text
Article -
2369
Edge computing and network slicing technology in 5G
Published 2017-06-01“…As a cost-efficient way to meet the wide range of use cases that the fifth generation wireless network will provide,network slicing and edge computing have been advocated by both academia and industry.In the concept of network slicing,the network entities are sliced into several logical networks to provide the requested services for different use cases.The edge computing pushes the frontier of computing applications,data,and services away from centralized nodes to the logical extremes of a network and even the user equipments,which can improve the traditional mobile broadband service capability,and handle with the emerging machine type service.The edge computing based radio access network slicing was proposed as a combination of edge computing and network slicing.The radio access network slicing can meet the diverse use cases and business models in 5G,and enable operators to flexibly provide personalized network services based on third-party need and network situation in a cost-efficient way.…”
Get full text
Article -
2370
Application of Intelligent Sensor in Mining Electrical Equipment Collection
Published 2022-01-01“…The system uses a variety of sensor fusion methods, with the help of Zigbee wireless network nodes, and passes the data collected by the sensor to the MCU core processor; thus, the collected data are processed, and then, the RS-485 communication protocol is used to upload the data to the upper station; finally, the monitoring of coal mine safety is realized through the background monitoring interface. …”
Get full text
Article -
2371
Broadcast Network Coverage with Multicell Cooperation
Published 2010-01-01“…Multicell cooperation has been identified as one of the underlying principles for future wireless communication systems. This paper studies the benefits of multicell cooperation in broadcast TV network from an information theoretical perspective. …”
Get full text
Article -
2372
A bidirectional authentication protocol for RFID based on Syn
Published 2018-12-01“…The RFID system is made up of three parts:tags,readers and databases.The information between tags and readers are transmitted through wireless channel,which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol,the difficulty of cracking was increased; In the process of each round of communication encryption,a random number was added to make the communication messages inconsistent,so that the tracking attacks could not be initiated by attackers.In the communication message encryption,the word synthesis algorithms was adopted at the same time,the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database,enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security,and performance analysis shows that the protocol has the standard of lightweight computation.…”
Get full text
Article -
2373
RW-MC:self-adaptive random walk based matrix completion algorithm
Published 2017-09-01“…Concerning the continually perceiving performance of virtual access points (VAP) was urgent in software-defined wireless network (SDWN),with the features of VAPs’ measurement data (VMD),a self-adaptive matrix completion algorithm based on random walk was proposed,named RW-MC.Firstly,the discrete ratio and covering ratio of VMD account for a sample determination model was used to claim initial samples.Secondly,random walk model was implemented for generating sampling data points in the next iteration.Finally,a self-adaptive sampling redress model concerning the differences between the current error rates and normalize error rates of neighboring completion matrices.The experiments show that the approach can collect the real-time sensory data,meanwhile,maintain a relatively low error rate for a small sampling rate.…”
Get full text
Article -
2374
RSS localization algorithm based on second-order cone programming in non-line-of-sight environment
Published 2021-03-01“…Aiming at the problem that the accuracy of localization using received signal strength (RSS) in wireless sensor network is insufficient in non-line-of-sight (NLOS) environment, a new robust localization algorithm based on second-order cone programming (SOCP) was proposed.Based on the assumption of the upper bound of NLOS biases, a location equation with robustness to NLOS biases was constructed to suppress the interference of NLOS biases, then convex optimization was used to transform the robust localization problem into a second-order cone programming problem with the intention of accurate estimation, thereby improved the localization accuracy.In addition, the localization problem was extended to the case of unknown transmission power, and an iterative SOCP algorithm was proposed.Simulation results show that the proposed algorithm can effectively solve the problems existing in NLOS localization, and the localization accuracy is better than Newton iteration method, UT method and SOCP method.…”
Get full text
Article -
2375
Design and FPGA implementation of an efficient parallel Turbo decoder for combining state metric calculations
Published 2022-02-01“…In order to achieve the requirement of high throughput and low-power in wireless communication, a parallel Turbo decoder has attracted extensive attention.By analyzing the calculating of the state metrics, a low-resource parallel Turbo decoder architecture scheme based on merging the forward and backward state metrics calculation modules was proposed, and effectiveness of the new architecture was demonstrated through field-programmable gate array (FPGA) hardware realization.The results show that, compared with the existing parallel Turbo decoder architectures, the proposed design architecture reduces the logic resource of state metrics calculation module about 50%, while the dynamic power dissipation of the decoder architecture is decreased by 5.26% at the frequency of 125 MHz.Meanwhile the decoding algorithm is close to the decoding performance of the parallel algorithm.…”
Get full text
Article -
2376
Modulation Transfer Function of a Gaussian Beam Based on the Generalized Modified Atmospheric Spectrum
Published 2016-01-01“…The numerical results indicate that the atmospheric turbulence would produce less negative effects on the wireless optical communication system with an increase in the inner scale of turbulence. …”
Get full text
Article -
2377
A Multiuser Subcarrier and Power Allocation Scheme to Improve the Performance of Cell Edge Users
Published 2015-05-01“…To restrain the inter cell interference effectively and greatly enhance the performance of wireless networks especially the performance of cell edge users is one of the goals of 5G mobile communication system. …”
Get full text
Article -
2378
Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN
Published 2016-04-01“…Considering the conflicts among anonymity, network load and transmission latency for most of the existing event source-location privacy (SLP) in wireless sensor network (WSN).Firstly,the effect of the data mixing and fake packet injec-tion on the privacy and network performance was analyzed. …”
Get full text
Article -
2379
Adaptive energy-saving routing algorithm for inter-clustering communications in WSN
Published 2012-03-01“…An adaptive routing algorithm was proposed for saving nter-clustering communication energy in wireless sensor networks (WSN).In the network,the end-to-end route discovery mechanism was based on the primary principle of the minimum communication costs.An algorithm was prop sed for inter-clustering communication optimization by adaptively selecting the most energy-efficient communication mode among direct,relaying and cooperative communications.The proposed routing algorithm guarantees that the source node can discover the minimum or sub-minimum energy consumption route to the base station.It also decreases the probability that the communications are interrupted due to the coverage holes.Compared with the other routing algorithms,the simu tion results show that the proposed routing algorithm makes WSN consume less energy in each round under the same throughput and bit error ratio (BER).It can also prolong the network lifetimes and operation times under the different node densities.…”
Get full text
Article -
2380
Energy- and Cognitive-Radio-Aware Routing in Cognitive Radio Sensor Networks
Published 2012-12-01“…Cognitive radio sensor networks (CRSNs) are the next generation wireless sensor networks (WSNs) that mitigate overcrowded unlicensed spectrum bands by opportunistically using temporally unoccupied unlicensed and licensed spectrum bands. …”
Get full text
Article