-
301
On the Experimental Investigation of Bone Fracture Recovery Process Using an Ultra-Wideband Planar Monopole Antenna
Published 2023-01-01“…In addition, a microcontroller with a wireless communication module is developed to monitor the data in an Android application. …”
Get full text
Article -
302
Fabrication of CPW-Fed Fractal Antenna for UWB Applications with Omni-Directional Patterns
Published 2014-01-01“…The characteristics of the proposed antenna are suitable for UWB wireless communication requiring low profile antennas.…”
Get full text
Article -
303
Research and implementation of pedestrian detection technology based on smart road
Published 2019-09-01“…Aiming at the problem of single detection function,higher cost and lower detection efficiency and reliability for current pedestrian detection,which was mostly realized by vehicle mounted equipment,a pedestrian detection technology based on smart road was proposed.By deploying a large number of low-cost,highly reliable Internet of things devices on the road,real-time detection of pedestrian information in the surrounding environment was realized.Early warning information can be provided to vehicles with very low latency wireless communication technology,which can improve road safety.At present,the prototype of the pedestrian detection system has been developed,and verified by field test,the pedestrian detection system can detect pedestrians effectively.Within the detection range of 4 meters,the accuracy of single device can reach 80%,and the accuracy of multiple cross-deployed devices can reach 100%.…”
Get full text
Article -
304
Research on 5G base station energy saving system based on DCNN-LSTM load prediction algorithm
Published 2023-04-01“…With the rapid construction of the 5G wireless communication network, the energy consumption pressure of operators, and even the overall communication industry, is simultaneously highlighted.Achieving sustainable development of the industry through energy conservation and consumption reduction has become a new research direction for the current 5G network development.Taking the PRB rate as the load evaluation index, LSTM model was improved by using DCNN to extract the depth feature of the cell’s indicators.A set of DCNN-LSTM deep learning model that could predict the future value of PRB rate was proposed.On the basis of the improved algorithm, the network topology of the current 5G access network was optimized.An additional network element and its working system were designed.An intelligent energy-saving system, which ensured the network experience, of 5G base stations was realized.…”
Get full text
Article -
305
Research Developments in Generative Adversarial Networks for Image Restoration and Communication
Published 2025-01-01“…It proposes an End-to-End(E-to-E) communication encryption system based on Deep Convolutional GAN (DCGAN) to solve the secure transmission problem in wireless communication systems based on E-to-E learning. The system can realize encoding and decoding of input bits of arbitrary length with good generalization ability. …”
Get full text
Article -
306
Performance of Convolution Codes Based on 60 GHz Inter-Chip Wireless Interconnection System
Published 2015-05-01“…Comprehensive considering the coding gain,the energy consumption and the critical distance of convolution codes,the priority coding scheme was proposed,which provided a kind of ECC technical reference for 60 GHz inter-chip wireless interconnection system and other 60 GHz short-range wireless communication systems.…”
Get full text
Article -
307
Research on Energy Efficiency and Resource Optimized Hyper-Cellular Mobile Communication System
Published 2014-12-01“…The development of wireless communication networks is now facing severe challenges from limited spectrum resources and stringent energy consumption constraints, which calls for system level theories and methods to efficiently utilizethe spectrum and energy. …”
Get full text
Article -
308
A Game Theory Based Strategy for Reducing Energy Consumption in Cognitive WSN
Published 2014-01-01“…Wireless sensor networks (WSNs) are one of the most important users of wireless communication technologies in the coming years and some challenges in this area must be addressed for their complete development. …”
Get full text
Article -
309
Application of time-aware retransmission against reflection signal interferences in Internet of things
Published 2019-12-01“…In the enclosed spaces,wireless transmissions lead to the strong interferences of reflection signals,because of multipath effects.However,how to reduce the reflection signal effect on wireless transmissions is a kernel problem to expand the application scope of Internet of things.The time-aware retransmission MAC (TR-MAC) was proposed,which can adjust the time delay of each frame and reduce the interference caused by the reflected signal by using the reflection loss of the space conductor surface.In order to prove the adaptability of TR-MAC,an experimental environment that can generate strong reflection interference signals was used.The experimental results proved the feasibility and effectiveness of the TR-MAC in different environments.In a sense,TR-MAC extends the application of wireless communication in strongly reflective space.Besides,in the application of the Internet of things in the aircraft,ship and satellite,TR-MAC can realize wireless transmission instead of part of the wired transmission,so as to improve the system reliability,effective weight reduction and other important goals.…”
Get full text
Article -
310
On-board Multi-User Detection Algorithm Based on Conditional Neural Process
Published 2021-12-01“…With the characteristics of all-terrain, all-weather and seamless coverage, satellite communications have become a potentially important part of 6G.An important prerequisite for achieving satellite intelligence is that the satellite have on-board processing capabilities.Multi-user detection (MUD) is a classic method of suppressing multiple access interference (MAI) in wireless communication, such as MMSE, Gaussian processregression (GPR) and other algorithms.Due to the inverse matrix required in the detection process, the algorithm complexity is usually cubic, and it is diff cult to directly apply to satellite platforms because of its limited processing capabilities.The conditional neural process combined the characteristics of the low complexity of the neural network and the data-eff cient of the Gaussian process.The neural network was used to parameterized the Gaussian process to avoided the inversion of the matrix, thereby reduced the computational complexity.The application of conditional neural process in MUD was studied.The simulation results showed that, while reduced complexity, conditional neural process also greatly improved the performance of bit error rate (BER).…”
Get full text
Article -
311
On the Bivariate Nakagami-Lognormal Distribution and Its Correlation Properties
Published 2014-01-01“…It is shown that the bias and the standard deviation of this sample correlation coefficient are substantially high for large shadowing standard deviations found in wireless communication measurements, even if the number of observations is considerable.…”
Get full text
Article -
312
Suppression of co-channel interference in NGSO constellation system with interference alignment
Published 2021-12-01“…Aiming at the problem that in the current space, non-geostationary satellite orbit (NGSO) constellation systems were increasing day by day, there are more and more satellite networks nearby orbiting using the same frequency band, and the problem of co-channel interference between NGSO constellation systems and between NGSO constellation systems and traditional geostationary satellite orbit (GSO) constellation systems had become increasingly serious, the interference alignment algorithms of wireless communication was proposed, which matches the precoding matrix of the characteristic channel at the transmitter according to the transmission channel information of the satellite network to alleviate the co-channel interference problem of the low-orbit satellite network.The ChinaSat, OneWeb and Fortran systems were used to simulate and compare the interference values before and after using the interference alignment algorithms, which proves the feasibility of the proposed method and provides a reference for future research on such problems.…”
Get full text
Article -
313
A Novel CPW-Fed UWB Antenna with Band-Stop Function
Published 2014-01-01“…Simulated and measured results show that the designed antenna operates at 2.9 GHz–13.08 GHz with band rejection in the frequency band of 7.7 GHz–9.05 GHz for satellite applications, and the proposed antenna is suitable for UWB wireless communication applications.…”
Get full text
Article -
314
SPECTRUM OCCUPANCY MEASUREMENT AND ANALYSIS AT OSUN STATE UNIVERSITY CAMPUS, OSOGBO, NIGERIA
Published 2022-06-01“… The rapid growth of new wireless communication applications and services has increased the demand for effective radio spectrum usage. …”
Get full text
Article -
315
Main directions of implementing research results of artificial intelligence systems into domestic production
Published 2024-03-01“…With the advent of the Internet and space navigation capabilities of modern astronautics, the approach and level of tasks in organizing human life have completely changed. Wireless communication, the Internet of Things, unmanned vehicle including aircraft are the terms of the XXI century. …”
Get full text
Article -
316
A mutual authentication security scheme for mobile NFC devices
Published 2017-08-01“…Near field communication (NFC) is a kind of short-range wireless communication technology which has been applied around the world.The applications of mobile payments and access control are the most common applications of NFC technology.Technically,the NFC device can be used as a bank card or an entrance card with the help of the card emulation mode of NFC,which will be validated by external reader.It is very essential to select a appropriate and safe certification scheme in this scenario.First of all,the existing NFC authentication system and security scheme was introduced and the system security requirements and potential security risks were analyzed.Then,by using Hash,AES and password Key dynamic updating mechanism,a mutual authentication security scheme for mobile NFC devices was proposed,and the synchronization mechanism was designd.Finally,GNY logic was used to prove the security correctness of our proposed scheme.The security analysis shows that our scheme can avoid a number of attacks,such as forgery,replay attack,eavesdropping,tampering attack,asynchronous attack and so on.…”
Get full text
Article -
317
Intent-driven 6G radio access network
Published 2020-03-01“…To satisfy the requirements of full-spectrum,full-scenario and full-service networking in the future Internet of things,the intent-driven radio access network (ID-RAN) is proposed for the 6G wireless communication system to decrease the networking costs and save the labor expense,while enhancing the intelligent capabilities of the radio access network.Based on the artificial intelligence,network function virtualization and software-defined networking,the intents from applications,performance requirements and networking status can be translated to the configuration and optimization strategies by the proposed ID-RAN,which enables 6G work efficiently,flexibility and elastically.The system architecture of ID-RAN was proposed firstly,and then the principles and solutions of key techniques were formulated,including intent translation,conflict resolution,configuration trigger,performance evaluation and optimization.Meanwhile,the open software-defined hardware platform for ID-RAN was built,and the corresponding performances aimed for 6G were presented.…”
Get full text
Article -
318
Three-dimensional polarization amplitude modulator and demodulator
Published 2012-09-01“…Based on the mathematical description of a space electromagnetic field,a novel approach to the three-dimen-sional joint modulation of the signal amplitude,polarization angle and polarization phase angle of an electromagnetic signal in wireless communication was presented.The model of the three-dimensional modulation signal was first given by the equations of the relationship among the parameters of a space electromagnetic field.Then,the transmission im-plementation of the three-dimensional joint modulation signal was discussed by a vector antenna.At the receiving end,a signal amplitude detection and DOA polarization parameter estimation method was given to demodulate the received three-dimensional joint modulation signal.The bit error rate and performance of the proposed three-dimensional joint modulator and demodulator were analyzed.Both the analysis and the simulation results show that a high information transmission and a low bit error rates can simultaneously be obtained by the proposed method.…”
Get full text
Article -
319
Adaptive encoding scheme providing optimal performance for Internet of Things industry in the backscatter system
Published 2017-02-01“…In the wireless communication market, Internet of Things is one of the major issues. …”
Get full text
Article -
320
Attack detection model based on stacking ensemble learning for Internet of vehicles
Published 2024-12-01“…Due to openness of wireless communication, Internet of vehicles (IoV) is vulnerable to many cyber-attacks such as denial of service, spoofing and fuzzy attacks. …”
Get full text
Article