Showing 2,521 - 2,540 results of 3,139 for search '"wireless"', query time: 0.05s Refine Results
  1. 2521

    AI-enabled 5G energy-saving technology by Dan XU, Yu ZENG, Weiye MENG, Lika LI

    Published 2021-05-01
    “…With the development of 5G commercialization, the number of 5G wireless base station sites has increased sharply, 5G core networks need to be deployed in regions/provinces/cities data centers, as well as the data centers were developing on a larger scale, the problem of energy consumption was becoming increasingly prominent.Based on the main proportion of energy consumption in the whole network, the energy efficiency evaluation methods of 5G access network, core network and data center was investigated.The AI-enabled energy-saving technology of base stations and pilot application scheme, 5G core network energy-saving methods by using AI, as well as the AI-enabled energy-saving technology of data centers and pilot application scheme were introduced, and the challenges and future research directions of energy-saving technology were finally discussed.The summary and prospect on the energy-saving technology of the overall communication system, will help to improve the understanding of energy efficiency and green network development.…”
    Get full text
    Article
  2. 2522

    Link-Disjoint Broadcasting Algorithm in Wormhole-Routed 3D Petersen-Torus Networks by Jung-hyun Seo, HyeongOk Lee

    Published 2013-12-01
    “…A 3D Petersen-Torus (3D PT) network has been proposed recently. the three-dimensionally magnified Petersen-Torus topology, 3D PT, is suitable for establishing a wireless sensor network (WSN) in 3D rectangular or cylindrical structures such as buildings. …”
    Get full text
    Article
  3. 2523

    An indoor positioning system based on distributed LTE network by Yu YANG, Ming CHEN, Daqing LIU

    Published 2018-06-01
    “…Indoor positioning technology has important applications in the business and security fields,but there are still existing problems with low positioning accuracy and high deployment costs.An indoor positioning system based on long term evolution ( LTE ) network was introduced.The system was defined on the Huawei distributed pico base station and was used to measure the reference signal strength (RSRP) or time of arrival (ToA) of mobile terminals to multiple access points.To overcome the uplink power control in LTE network,the absolute RSRP or ToA was converted to differential values.The system relied on widely deployed LTE networks to provide seamless location services to terminal devices in a wireless network connection state.It didn’t rely on third-party software or affect network performance.The experimental results show that the average positioning accuracy of Huawei indoor positioning system using time difference of arrival (TDoA) can reach 3~5 m in indoor scenarios such as shopping malls,showing good application potential.…”
    Get full text
    Article
  4. 2524

    Intelligent Control of Surgical Robot for Telesurgery: An Application to Smart Healthcare Systems by Shailu Sachan, Tanmay Shukla, Pankaj Swarnkar, Apsara Adhikari

    Published 2024-01-01
    “…Wireless communication network in robotic telesurgery can be a huge advantage to smart healthcare systems that allows the surgeon to perform surgery on remote patients utilizing a surgical robot. …”
    Get full text
    Article
  5. 2525

    Sensor Relocation Technique Based Lightweight Integrated Protocol for WSN by J. Joy Winston, B. Balan Paramasivan

    Published 2014-06-01
    “…It is also noted that our proposed model maximizes the lifetime of wireless sensor networks.…”
    Get full text
    Article
  6. 2526

    AI based scheme on voice service quality evaluation and assurance by Guangyu LI, Yanping LIANG, Li YU, Kun WANG, Yangming CHEN, Sijia LIU

    Published 2021-05-01
    “…The voice service is one of the mainstream services under the telecommunications network.The mainstream voice service quality evaluation method in the industry is to compare the voice and audio of the transceiver and calculate the POLQA MOS, which is the standard benchmark for voice quality analysis.For telecom operators, perceive voice service quality efficiently without any infringement of user privacy, and carry out precise service quality assurance, is one of the key tasks.A system using mathematical statistics and neural network to learn the mapping between voice service feature data from network side and voice quality from user side to generate evaluation model with high accuracy and precision was proposed.On this basis, the system made use of data information from multiple fields including wireless network user level and cell level, to analyze reasons and work out solutions for poor service quality, so as to assure service quality efficiently and accurately.The result shows that the scheme has achieved good practical application results.…”
    Get full text
    Article
  7. 2527

    Accurate Empirical Path Loss Models with Route Classification for mmWave Communications by Supachai Phaiboon, Pisit Phokharatkul

    Published 2022-01-01
    “…This paper presents accurate empirical path loss models with route classification for the high band frequency of 5 G wireless. Propagation path routes are mainly classified into line of sight (LOS) and non-line-of-sight (NLOS). …”
    Get full text
    Article
  8. 2528

    Covariance matrix opportunistic cooperative spectrum sensing of high detection probability by Shunlan LIU, Jing WANG, Jianrong BAO

    Published 2019-01-01
    “…Moreover, the proposed algorithm has high energy efficiency as well as the moderate computational complexity, so it is especially suited for the spectrum cognition applications in the new generation wireless communication.…”
    Get full text
    Article
  9. 2529

    The evolution of personalized medicine: literature review by I. S. Dolgopolov, M. Yu. Rykov

    Published 2022-09-01
    “…This belief was to somehow confirmed by the use of the latest technologies, such as DNA sequencing, proteomics, imaging protocols and the use of wireless devices for health monitoring, which revealed inter-individual differences in gene expression and penetrance levels. …”
    Get full text
    Article
  10. 2530

    Research on computing resource allocation strategy for cloud radio access network based on demand forecasting by Zhipeng WANG, Bin CAO, Qinyu ZHANG

    Published 2019-12-01
    “…Cloud radio access network(CRAN) is a new network architecture commonly used in 5G network.It uses network function virtualization and software defined network technology to support end-to-end network slicing so that access network can share the same infrastructure.A computing resource allocation scheme based on virtualized network function(VNF) computing resource demand forecasting was proposed for cloud wireless network supporting end-to-end network slicing.Data-driven operation and maintenance framework established by the control plane collects network information and performs data processing to predict the demand for computing traffic in a period of time,which used the discrete particle swarm optimization based on best-fit-decreasing to dynamically and dynamically allocate CRAN computing resources,reducing the migration energy consumption and migration times of VNF.…”
    Get full text
    Article
  11. 2531

    Research on security defense of mobile edge computing by Lu CHEN, Hongbo TANG, Wei YOU, Yi BAI

    Published 2021-02-01
    “…Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed.…”
    Get full text
    Article
  12. 2532

    Spectrum prediction algorithm in ISM band based on two-dimensional LMBP neural network by Xiaoyu WAN, Pan HU, Zhengqiang WANG

    Published 2016-03-01
    “…With the rapid development and application of short-range wireless communications technology,the electromagnetic interference of ISM(2.4 GHz)band has become more apparent.Using the spectral prediction algorithm to predict the information of spectrum occupancy has become an effective way to solve the problem of compatible coexistence between devices.On the basis of verifying the time-domain and frequency-domain correlation of ISM band,an LMBP neural network of time and frequency domain was proposed and applied in the spectral prediction of ISM band.Through simulations and theoretical analysis,the best training combination of time-frequency point (△t=5,△f=2)was obtained.This point improves 95% of the spectrum prediction accuracy under the conditions of the input vector N=9 of the neural network.It increased 9% and 4% prediction accuracy compared with Markov algorithm and time-domain LMBP neural network and it had a better convergence time of training.…”
    Get full text
    Article
  13. 2533

    Database energy saving strategy using blockchain and Internet of Things by Dexian Yang, Jiong Yu, Zhenzhen He, Ping Li

    Published 2025-01-01
    “…The protocol classification of wireless sensor networks is examined within the context of the rapid growth of information technology. …”
    Get full text
    Article
  14. 2534

    Study on extended reality enhancement technology in 5G-Advanced by XIAO Yang

    Published 2024-04-01
    “…To realize extended reality, it is necessary to enhance the existing wireless network technology to meet the requirements of extended reality services. …”
    Get full text
    Article
  15. 2535

    Research on the UAV-aided data collection and trajectory design based on the deep reinforcement learning by Zhiyu MOU, Yu ZHANG, Dian FAN, Jun LIU, Feifei GAO

    Published 2020-09-01
    “…The Internet of things (IoT) era needs to realize the wide coverage and connections for the IoT nodes.However,the IoT communication technology cannot collect data timely in the remote area.UAV has been widely used in the IoT wireless sensor network for the data collection due to its flexibility and mobility.The trajectory design of the UAV assisted sensor network data acquisition was discussed in the proposed scheme,as well as the UAV charging demand in the data collection process was met.Specifically,based on the hierarchical reinforcement learning with the temporal abstraction,a novel option-DQN (option-deep Q-learning) algorithm targeted for the discrete action was proposed to improve the performance of the data collection and trajectory design,and control the UAV to recharge in time to ensure its normal flight.The simulation results show that the training rewards and speed of the proposed method are much better than the conventional DQN (deep Q-learning) algorithm.Besides,the proposed algorithm can guarantee the sufficient power supply of UAV by controlling it to recharge timely.…”
    Get full text
    Article
  16. 2536

    Denoising MEMS accelerometer sensors based on L2‐norm total variation algorithm by R. Abbasi‐Kesbi, A. Nikfarjam

    Published 2017-03-01
    “…In order to collect accelerometer data, a wireless accelerometer sensor was developed that is directly connected to a central node. …”
    Get full text
    Article
  17. 2537

    Study on network reconfiguration algorithms in software-defined sensor networks by Lian-feng SHEN, Ya-ping ZHU, Zhao-ming DING, Feng YAN, Shu-guang DENG

    Published 2016-07-01
    “…In order to improve the performances and adaptabilities of wireless sensor networks the architecture of soft-ware-defined sensor network (SDSN) was proposed and the studies were focused on the network reconfiguration algo-rithm of SDSN. …”
    Get full text
    Article
  18. 2538

    Space-Air-Ground Integrated Network Architecture Based on Mobile Edge Computing by Jian WU, Min JIA, Qing GUO

    Published 2024-03-01
    “…The next generation of wireless communication technologies will enhance the quality of user experience by supporting services such as intelligent transportation, intelligent healthcare, virtual/augmented reality, and more.These emerging services are typically computation-intensive and delay-sensitive, and must meet stringent delay, energy consumption, and reliability requirements that cloud-based services struggle to meet.In order to solve the above problems, mobile edge computing (MEC) technology was proposed to solve the problems of high latency and high bandwidth consumption when sending offloading requests back to the cloud computing centers.As an important research direction of 6G , space-air-ground integrated network (SAGIN) could make up for the huge coverage gap in the world, and had been widely concerned.This paper introduced MEC technology, federated learning technology and artificial intelligence technology into SAGIN to efficiently manage massive and heterogeneous resources in the network, and builded low-delay, low-energy consumption and high-reliability SAGIN to support various emerging services.…”
    Get full text
    Article
  19. 2539

    Hexahedral Localization (HL): A Three-Dimensional Hexahedron Localization Based on Mobile Beacons by Linlan Liu, Haili Zhang, Xiaotian Geng, Xin Shu

    Published 2013-01-01
    “…In wireless sensor networks, localization is one of the fundamental technologies and is essential to its applications. …”
    Get full text
    Article
  20. 2540

    Enhanced-throughput multipath routing algorithm based on network coding in IoVs by Cun-qun FAN, Shang-guang WANG, Wen-zhe GU, Qi-bo SUN, Fang-chun YANG

    Published 2013-08-01
    “…In Internet of Vehicles (IoVs), the frequent interruptions of wireless links between the vehicles cause data retrans-mission, which makes the whole vehicle network performance fall sharply. …”
    Get full text
    Article