Showing 201 - 220 results of 447 for search '"wireless network"', query time: 0.08s Refine Results
  1. 201
  2. 202
  3. 203
  4. 204

    Application Research on Wireless Communication Private Network of Distrbution Power Grid for Special Areas by Zhihua Guo, Xiaohui Xue, Na Li, Jiangfei Wan, Ping Chen, Xi Lin, Qinfeng Jing

    Published 2015-05-01
    “…The needs and urgency of wireless network construction in the less complex areas were analyzed. …”
    Get full text
    Article
  5. 205

    Customer-centered mobile network intelligent operation approach by Kai LI, Wei LIU, Guiyang LUO, Jinglin LI

    Published 2020-02-01
    “…The rapid development of new types of services places greater demands on support ability of the personalized service in mobile communication systems.Traditional intelligent pipe carriers only consider limited factors such as current traffic status of the network and number of loading binding quantity,indicating that they don’t take account of the demands and features of wireless customers.Meanwhile,the rule-based method is overwhelmed due to numerous metrics of the wireless network,the complicated correlation among them and heterogeneous requirements of metrics from various users.Therefore,a user-centric intelligent network operation service was proposed,which utilized machine learning and deep learning method.The service had the ability to learn the correlation between user QoS guarantee requirements and wireless network metric status to construct a joint support architecture based on user requirements and wireless network status.The validity of the method on real data was verified.…”
    Get full text
    Article
  6. 206

    Available Bandwidth Estimation in Network-Aware Applications for Wireless Campus e-Learning System by Mohd Faisal Ibrahim, Masita Jamal, Saadiah Yahya, Mohd Nasir Taib

    Published 2012-01-01
    “…The constraint of a wireless network has motivated many researchers to develop network-aware applications that can dynamically adjust the users' demand based on network resources. …”
    Get full text
    Article
  7. 207

    Design and implement of integrative access layer in campus network by Zhong-nan FU, Qun SHANG, Xu-xiao GONG

    Published 2014-10-01
    “…At the moment,the access layer network in campus network has some problems,including hysteretic wireless network,resource deployment imbalance between the wired network and wireless network and weak support for private local network.To resolve these problems and make the access layer network satisfy the developing user request better,we give the definition of the integrative access layer network and implement it in Peking University.The result shows that the integrative access layer network works well and improves the service provided by campus network.…”
    Get full text
    Article
  8. 208

    Building of Future Intelligent Content Pipeline Based on Unified CDN by Qin Yin, Xinhai Hua

    Published 2015-04-01
    “…The evolution from the traditional CDN to the unified CDN,and how the unified CDN build intelligent content pipeline and its role in the pipeline were introduced.In order to better support the service development,the unified CDN needs the inter infiltration with the barer network,equipped with ability of network awareness,business awareness and user perception.In order to ensure a better experience of mobile service,the CDN could be dropped to the wireless network,the adaptation and optimization could also be proposed based on the wireless network characteristic.…”
    Get full text
    Article
  9. 209

    A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks by Yuxin Mao, Ping Zhu, Guiyi Wei

    Published 2013-08-01
    “…In this paper, we propose to apply game theory into solving the network security problem of wireless network. We explore game theory algorithms to model situation for wireless network with malicious nodes and investigate the attack and detection problem by modeling it as pairwise simultaneous game and spatial structured game. …”
    Get full text
    Article
  10. 210

    Charging wireless sensor network security technology based on encryption algorithms and dynamic model by Yuanming Li, Wei Guo, Xuejun Meng, Wen Xia

    Published 2020-02-01
    “…This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. …”
    Get full text
    Article
  11. 211

    Crop Growth Monitoring Through integration of WSN and IoT by Haoran yu

    Published 2022-09-01
    “…The paper also highlights the importance and usefulness of wireless network and other related terminology in this area. …”
    Get full text
    Article
  12. 212

    Interference mitigation for satellite-terrestrial heterogeneous coexistence cognitive MIMO system based on DBF by Yong LIAO, Tao WANG, Huan CHEN, Xin ZHOU, Yu-feng LI

    Published 2014-10-01
    “…For the coexistence and increasing interference of satellite-terrestrial network and terrestrial wireless network,a typical scenario where the geostationary earth orbit (GEO) satellite-terrestrial network and the 4G mobile communication network coexist heterogeneously was analyzed.Besides,a multi-user cognitive system model that secondary satellite terminals interfere the primary multiple input multiple output (MIMO) 4G based stations was also proposed,with whose general signal processing was deduced.Meanwhile,digital beam forming (DBF) technology in 4G based station system was adopted to minimize the cognitive interference caused by multi-antennas and multi-users.And an optimal beam weight based on fixed azimuth interference (OBW-FAI) was proposed.Weight vector was only related to the azimuth of the interferences,thus the proposed algorithm does not need real-time and repeat calculations,and had small complexity.Finally,the numerical simulation results verify that the proposed system and algorithm can effectively reduce interference between satellite-terrestrial network and terrestrial wireless network to a certain extent.…”
    Get full text
    Article
  13. 213

    Indoor Massive MIMO Channel Modelling Using Ray-Launching Simulation by Jialai Weng, Xiaoming Tu, Zhihua Lai, Sana Salous, Jie Zhang

    Published 2014-01-01
    “…We simulate the models in indoor wireless network deployment environments and compare the simulation results with measurements. …”
    Get full text
    Article
  14. 214

    Cooperative routing algorithm based on game theory by Kun XIE, Shen-lin DUAN, Ji-gang WEN, Shi-ming HE

    Published 2013-08-01
    “…In order to improve the routing performance of selfish wireless network, a VMIMO coop-erative routing algorithm based on game theory was proposed. …”
    Get full text
    Article
  15. 215

    Enabling Cognitive Load-Aware AR with Rateless Coding on a Wearable Network by R. Razavi, M. Fleury, M. Ghanbari

    Published 2008-01-01
    “…Augmented reality (AR) on a head-mounted display is conveniently supported by a wearable wireless network. If, in addition, the AR display is moderated to take account of the cognitive load of the wearer, then additional biosensors form part of the network. …”
    Get full text
    Article
  16. 216

    IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing by Aymen Abdullah Alsaffar, Young-Rok Shin, Eui-Nam Huh

    Published 2015-01-01
    “…User can just receive their IPTV service using any smart devices by accessing the internet via wireless network from anywhere anytime in the world which is convenience for users. …”
    Get full text
    Article
  17. 217

    Data Delivery Method Based on Neighbor Nodes’ Information in a Mobile Ad Hoc Network by Shigeru Kashihara, Takuma Hayashi, Yuzo Taenaka, Takeshi Okuda, Suguru Yamaguchi

    Published 2014-01-01
    “…In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. …”
    Get full text
    Article
  18. 218

    Security flaws and improvement to a wireless authentication protocol with anonymity by PENG Hua-xi, FENG Deng-guo

    Published 2006-01-01
    “…The anonymous security flaw of an authentication protocol with anonymity for wireless networks which was proposed by Zhu, et al. was analyzed, and an improved protocol to a wireless authentication protocol with anonymity (IWAA) was proposed. …”
    Get full text
    Article
  19. 219

    Survey on available bandwidth estimation in ad hoc network by WU Da-peng, WU Mu-qing, ZHEN Yan

    Published 2010-01-01
    “…With analysis of the difference between bandwidth estimation scheme in wired network and wireless network,the available bandwidth in mobile ad hoc network is defined. …”
    Get full text
    Article
  20. 220

    5G scale networking strategy and network construction solution by Chufeng WANG, Yuan DING

    Published 2019-06-01
    “…Three telecom operators in China have issued the frequency bands of 5G trial network,the 5G operation license will be released soon,and the trial scale networking will be launched.The overall deployment strategy of 5G trial networking was expounded,and the network construction ideas and solutions of different professions were elaborated from the aspects of wireless network,bearer network and core network respectively.…”
    Get full text
    Article