-
2661
Research on task offloading and resource allocation in edge computing network of RIS assisted UAV based on Lyapunov
Published 2024-09-01“…To address the problem that unmanned aerial vehicle (UAV) face complex time-varying fading channels, which could affect wireless transmission, a joint optimization problem of UAV's trajectory, reconfigurable intelligent surface (RIS) phase shift, offloading slot allocation, CPU frequency allocation, and user equipment transmission power was constructed. …”
Get full text
Article -
2662
A Dual-Broadband Printed Dipole Antenna for 2G/3G/4G Base Station Applications
Published 2019-01-01“…The two studied bands are both broadened which, respectively, achieve 36.7% (690–1000MHz) and 47.3% (1710–2770MHz) for the lower and higher bands so as to satisfy the 2G/3G/4G wireless communication, and the corresponding gains of 4-5dBi and 5-6dBi are also obtained.…”
Get full text
Article -
2663
Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS
Published 2016-01-01“…Wireless Health Monitoring Systems (WHMS) have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. …”
Get full text
Article -
2664
Experimental Investigation of Cavitation Signatures in an Automotive Torque Converter Using a Microwave Telemetry Technique
Published 2003-01-01“…The data were transmitted by a wireless telemetry system mounted on the pump housing. …”
Get full text
Article -
2665
3G Long Term Evolution Baseband Processing with Application-Specific Processors
Published 2009-01-01Get full text
Article -
2666
A Novel 5G LTE Antenna Design for Portable Devices
Published 2020-01-01“…This paper presents the low profile, planar, and small-size antenna design for WWAN, LTE, and 5G (5th generation wireless systems) for use in portable communication equipment. …”
Get full text
Article -
2667
-
2668
Quality-of-Service Routing Using Path and Power Aware Techniques in Mobile Ad Hoc Networks
Published 2008-01-01“…Mobile ad hoc network (MANET) is a collection of wireless mobile hosts dynamically forming a temporary network without the aid of any existing established infrastructure. …”
Get full text
Article -
2669
Convergence Research Directions in Cognitive Sensor Networks for Elderly Housing Design
Published 2015-09-01“…After that, this paper proposes research directions for cognitive wireless sensor networks not only for the elderly smart home services, but also for cooperating with architecture technologies. …”
Get full text
Article -
2670
Miniaturization Design for 8 × 8 Butler Matrix Based on Back-to-Back Bilayer Microstrip
Published 2014-01-01“…For application of indoor wireless communication, a compact broadband 8 × 8 Butler matrix has been designed and fabricated. …”
Get full text
Article -
2671
Throughput model of Wi-Fi cascading based on saturated TCP traffic
Published 2023-09-01“…At present, the importance and commercial value of wireless fidelity (Wi-Fi) technology have been widely recognized.And people are also pursuing better quality of service (QoS).Transmission control protocol (TCP) as a connection-oriented communication protocol that provides end-to-end reliability services, its importance is also increasing, and it is the dominant transmission protocol in the Internet.Besides, since the coverage of a single access point (AP) is limited, it is often necessary to extend the coverage through cascading in many scenarios.However, the current research on cascading scenarios is based on the user datagram protocol (UDP), which means that only downlink traffic exists in the scenario.Actually, uplink and downlink traffic often exist at the same time in many scenarios, which means TCP traffic is running.How to calculate the TCP throughput obtained by users in the cascading scenario has always been an unresolved problem.To solve this problem, firstly, a Wi-Fi throughput model under the condition of saturated TCP traffic was established in the cascading scenario, and the calculation of user throughput was realized through two Markov chains.Secondly, a cascading system was built and actual tests were conducted.The validity of the model is verified by comparing the theoretical simulation results with the actual test results.…”
Get full text
Article -
2672
Secure opportunistic access control in D2D-enabled cellular network
Published 2018-01-01“…The mutual interference between cellular links and D2D links can bring the secrecy gain to cellular users in D2D-enable cellular networks.To make full use of them,a cooperative secrecy transmission scheme was proposed based on wireless channels.The channel direction information and gains depict the interference from D2D links to cellular links and other D2D links in the proposed scheme.Firstly,only the D2D users which meet the limited interference conditions were accessed to cellular networks to ensure their reliable communications.It was assumed that legitimate users and eavesdroppers were independent two-dimensional homogeneous Poisson point processes (PPP) distribution.Then the security outage probability (SOP) was derived for cellular users and the connection outage probability (COP) for D2D users,and the impacts of interference thresholds were discussed on their performances.Next,an optimization model was given to minimize D2D users’ COP while ensuring the secrecy performance requirements of cellular users,thus achieving the optimal performance.Finally,simulation results verify the validity of the proposed scheme.…”
Get full text
Article -
2673
Decoupling Control Strategy of IPT System Based on Optimal Efficiency Load Tracking
Published 2019-01-01“…However, in the application of dynamic wireless charging in urban rail transit, the primary and secondary side coils are in the process of relative movement, so it is relatively difficult to establish reliable real-time communication, and it is easy to be interfered by electromagnetic transmission process, resulting in large errors. …”
Get full text
Article -
2674
An Asymmetric-Anticipation Car-following Model in the Era of Autonomous-Connected and Human-Driving Vehicles
Published 2020-01-01“…., human-driving (HD) and autonomous and connected (AC) vehicles platoon) via wireless data transmission. The linear stability approach was used to evaluate the properties of the AAFVD model. …”
Get full text
Article -
2675
Research on gating alignment strategy for flow scheduling in satellite formation
Published 2024-08-01“…Aiming at the time-sensitive network (TSN) gating scheduling required high synchronization accuracy of adjacent nodes, the delay fluctuation of inter-satellite wireless links caused the deviation of gate opening of adjacent nodes, resulting in the problem of inconsistent flow scheduling, a gating alignment strategy for flow scheduling in satellite formation was proposed. …”
Get full text
Article -
2676
Research on integrated communication and positioning technology based on visible light
Published 2023-05-01“…Visible light wireless technology transmits information through visible light, utilizing light-emitting diode (LED) light sources to achieve communication and positioning while illuminating.Visible light communication positioning integration (VLCP) technology is one of the key supporting technologies for future large-scale Internet of things (IoT) applications.Orthogonal frequency division multiplexing (OFDM) technology can be used to allocate different spectral resources to visible light communication (VLC) and visible light positioning (VLP) systems, while achieving communication and positioning functions.Resource allocation is the key to improving the efficiency of VLCP systems and expanding their applicability.A new resource allocation method based on error vector magnitude(EVM) was proposed.EVM was utilized to allocate subcarriers for positioning and communication in VLCP systems, communication and positioning performance was dynamically adjusted based on channel parameters, system quality of service (QoS) was ensured, and system channel utilization was improved.The experimental results indicate that at 1.5 m×1.5 m×1.5 m indoor environment, the proposed resource allocation algorithm can improve channel utilization by at least 19.5% compared to fixed resource allocation algorithms.Under the premise of comparable performance to algorithms that use signal-to-noise ratio (SNR) for resource allocation, it greatly saves system resources and is easy to apply in practice.…”
Get full text
Article -
2677
Capacity analysis for MISO-UWOC systems over GGD weak turbulence with zero boresight pointing error
Published 2023-08-01“…Generalized Gamma distribution (GGD) was chosen to describe the weak oceanic turbulence, and a new hybrid fading channel model that integrated the GGD weak turbulence, the zero boresight pointing error, and the implicit path loss plus multipath propagation characterized by the fading free impulse response (FFIR) was proposed.Subsequently, mathematical expressions for the ergodic capacity and outage capacity of the multiple-input single-output underwater wireless optical communication (MISO-UWOC) systems were derived through the Meijer-G function under a selective transmission (ST) diversity scheme especially while inter-symbol interference (ISI) effects were considered or not.Finally, the correctness of the theoretical formulas derived above was verified by some numerical results.The simulation results show that with the introduction of the ST diversity, the ergodic capacity of the MISO-UWOC systems, taking the transmission ports N=2 as an example, is at least 1.3 times better than that of the conventional point-to-point (P2P) transmission under the same channel condition and system parameters, while the maximum outage capacity decreases is also more than 60% compared with the conventional P2P one.However, the introduction of the ISI will severely reduce this performance improvement.…”
Get full text
Article -
2678
Near-Field Hierarchical Localization for Integrated Sensing and Communication
Published 2025-01-01“…Localization is expected to play a significant role in future wireless networks, as positioning and situational awareness, navigation and tracking, are integral parts of 6G usage scenarios. …”
Get full text
Article -
2679
Research on Behavior Monitoring of Elderly Living Alone Based on Wearable Devices and Sensing Technology
Published 2021-01-01“…With the development of sensor technology, low-power IC chips, and wireless body sensors, miniature sensor networks can be popularized and applied in daily life. …”
Get full text
Article -
2680
An inside look into the complexity of box-office revenue prediction in China
Published 2017-01-01Get full text
Article