Showing 241 - 260 results of 447 for search '"wireless network"', query time: 0.07s Refine Results
  1. 241

    A Multiple Collision Channel Assignment Based on Imperfect Game Theory by Haofeng Dai, Shibiao He, Mian Tan, Pengyu Zheng, Hui Zhang

    Published 2014-05-01
    “…The channel allocation in wireless network will greatly affect the whole performance of the network. …”
    Get full text
    Article
  2. 242

    Realization of smart home key management mechanism based on ECC by Wenbin CHENG, Jia LIU

    Published 2017-06-01
    “…At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this basis,the key management mechanism based on ECC was designed to achieve the purpose of guaranteeing key security.The key management mechanism includes an ECC-based data encryption key management mechanism and an ECC-based digital signature key management mechanism.So that the wireless network node in the identity authentication,the key generation,distribution,storage,update and other aspects of the key security were guaranteed.Finally,the security,time-consuming and scalability of this mechanism were analyzed.The results show that the mechanism has strong security and expansibility,and it is superior to E-G key management scheme in time-consuming.…”
    Get full text
    Article
  3. 243

    Survey on network function virtualization in RAN by Haiyu JIA, Jia CHEN, Mingxin WANG

    Published 2019-01-01
    “…Finally, the challenges of network function virtualization applying in wireless network were proposed.…”
    Get full text
    Article
  4. 244

    Research on WiFi Penetration Testing with Kali Linux by He-Jun Lu, Yang Yu

    Published 2021-01-01
    “…Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. …”
    Get full text
    Article
  5. 245

    Computation task offloading algorithm and system level simulation for vehicles by Qicheng ZENG, Yuxuan SUN, Sheng ZHOU

    Published 2019-09-01
    “…With the development of autonomous driving and vehicular network,more and more vehicles will have powerful computing capabilities and connection with each other via wireless network.These computing resources can not only be applied to automatic driving,but also provide a wide range of edge computing services.Aiming at the task offloading among vehicles,a distributed task offloading algorithm based on online learning was proposed to minimize the average offloading delay.Furthermore,a system-level simulation platform was built to evaluate the impact of vehicle density and number of tasks on the average offloading delay in both highway and urban scenarios.The results provide a reference for the resource allocation and deployment of task offloading in different traffic situations.…”
    Get full text
    Article
  6. 246

    Research on secret key generation based on wireless channel characteristics in body area network by Jingjing HUANG

    Published 2021-12-01
    “…Wireless body area network (WBAN) is a human-centered wireless network.With limitations of power and computation capabilities of WBAN, the significant challenge of ensuring security is how to generate a shared key between two entities based on a lightweight symmetric cryptography.To investigate this issue, a secret key generation scheme in ultra-wideband (UWB) WBAN was designed.In this scheme, the difference of multipath relative delay and its average value were chosen as common random source to reduce key mismatch probability.Furthermore, with the aid of relay, secret key generation rate could be increased.Simulation and test results demonstrate that the proposed scheme can achieve a good tradeoff between key match probability and key generation rate.Furthermore, security analysis of the scheme was also provided to validate its feasibility.…”
    Get full text
    Article
  7. 247

    LoRaWAN technologies for enabling new generation Internet of things by Chaojie GU, Rui TAN

    Published 2021-06-01
    “…., communication performance target localization, wireless network security, and heterogeneous network.The opportunities and challenges were also discussed regarding the wide adoption of LoRaWAN in China’s context in four aspects, i.e., business models, supervision methods, technology innovations, and emerging applications.…”
    Get full text
    Article
  8. 248

    A Voice Data Storage Strategy of Record Server in Broadband Cluster System by Chunbin Dou, Zhihui Xiao, Yishan Chen

    Published 2013-05-01
    “…With the rapid development of wireless high-speed data services,broadband has become an inexorable trend of the development of wireless network. In the process of cluster communication system for command and control,the system will provide data on the direction of broadband and business diversification. …”
    Get full text
    Article
  9. 249

    Research on Spectrum Access Mechanism Based on Polling Scheduling by Jin Lu, Ming Huang, Zhijun Yang

    Published 2013-11-01
    “…Numerical analysis and simulation results show that the mechanism improves the queuing performance and the bandwidth utilization of spectrum holes, and reveal its potential application in cognitive wireless network for data services.…”
    Get full text
    Article
  10. 250

    Enhanced zebra optimization algorithm and applications of power allocation in SDWN by LI Jiajia, DONG Ligang, JIANG Xian

    Published 2025-01-01
    “…To address the issue of interference caused by shared resources in multi-user communications in software defined wireless network (SDWN), an enhanced zebra optimization algorithm (EZOA) was proposed to achieve power allocation that maximizes the secrecy rate. …”
    Get full text
    Article
  11. 251

    Research of platform identity attestation based on trusted chip by Qian-ying ZHANG, Deng-guo FENG, Shi-jun ZHAO

    Published 2014-08-01
    “…The experiment result in a devel-oped prototype system shows that the proposed scheme provides good performances in computation and communication, and is especially suitable for the wireless network.…”
    Get full text
    Article
  12. 252

    Implementation of a prototype real-time multi-mode wireless video transmission system by HU Dong, LIU Feng, ZHU Xiu-chang

    Published 2006-01-01
    “…A novel prototype wireless video transmission system was presented.The characteristic of the design was that the wireless terminal used high performance multimedia DSP as video processing and control core,and the interface board integrates various wireless network interfaces.By software control,not only the system could work in single net-work mode,but also could select appropriate transmission channel in multi-mode network environment,so as to present best video quality.The system configuration,hardware and software design,as well as the control policy of the wireless terminal were described in details.Experiments show that in the GPRS/WLAN and CDMA/WLAN test conditions,the system can select the proper network and present satisfactory reconstructed video.…”
    Get full text
    Article
  13. 253

    Virtual backbone formation algorithm based on GBG for wireless sensor networks by SUN Yan-jing, QIAN Jian-sheng

    Published 2008-01-01
    “…An approximation algorithm of virtual backbone formation (VBF) based on a more generalized and realistic wireless network communication model of bounded growth graph (GBG) was proposed. …”
    Get full text
    Article
  14. 254

    TD-LTE Coverage Planning Targets and UL/DL Subframe Configuration by Qiuxiang Li, Xiaodong Xu, Baihui Zhou

    Published 2013-05-01
    “…Common reference signal received power(CRS RSRP)and signal interference noise ratio(CRS SINR)are two important wireless network planning factors,which are directly related to indoor deep coverage and edge data rate. …”
    Get full text
    Article
  15. 255

    An Intelligent Traffic Flow Control System Based on Radio Frequency Identification and Wireless Sensor Networks by Kuei-Hsiang Chao, Pi-Yun Chen

    Published 2014-05-01
    “…In addition, the traffic flow situation is also transmitted to a remote monitoring control system through ZigBee wireless network communication technology. The traffic flow control system developed in this study can perform remote transmission and reduce traffic accidents. …”
    Get full text
    Article
  16. 256

    Multi-agent reinforcement learning based dynamic optimization algorithm of CRE offset for heterogeneous networks by Cheng ZHANG, Jiaye ZHU, Zening LIU, Yongming HUANG

    Published 2023-12-01
    “…To cope with the high throughput demand caused by the proliferation of wireless network users, a multi-agent reinforcement learning based dynamic optimization algorithm of cell range expansion (CRE) offset was proposed for interference scenarios in macro-pico heterogeneous networks.Based on the value decomposition network framework of collaborative multi-agent reinforcement learning, a personalized online local decision of CRE offset for all pico-base stations was achieved by reasonably utilizing and interacting the intra-system user distribution and their interference levels among pico-base stations.Simulation results show that the proposed algorithm has significant advantages in increasing system throughput, balancing the throughput of each base station and improving edge-user throughput, compared to CRE=5 dB and distributed Q-learning algorithms.…”
    Get full text
    Article
  17. 257

    Design method of energy efficiency optimization in PLC-RF wireless transmission networks by Yueyu JIANG, Haoxin CHENG, Kang WANG, Wenjun DAI, Xiaoyu LIU

    Published 2023-04-01
    “…An energy efficiency optimization transmission scheme using angular information-based channel state information (AI-CSI) was proposed for indoor communications, which integrated the power line communication (PLC) with radio frequency (RF) wireless communication.Specifically, by considering that the Wi-Fi wireless network and the PLC network were the primary and secondary networks, an optimization problem was established to maximize the total energy efficiency of the secondary network.Then, in order to solve the problem, the beam forming weight vector was obtained by using zero-forcing method based on AI-CSI, and an optimization algorithm joint Dinkelbach with Lagrange multiplier was further presented to achieve the optimal power allocation.Finally, computer simulations were given to verify the effectiveness and superiority of the proposed scheme.Besides, the influence of key parameters such as the number of employed antennas and served users was also analyzed.…”
    Get full text
    Article
  18. 258

    Enabling Collaborative Musical Activities through Wireless Sensor Networks by Santiago J. Barro, Tiago M. Fernández-Caramés, Carlos J. Escudero

    Published 2012-03-01
    “…This network has been named collaborative musical wireless network (CMWN): it eases device configuration, enables musical collaboration, and allows artists to explore new ways of expression. …”
    Get full text
    Article
  19. 259

    An incentive mechanism with bandwidth allocation for federated learning by Yingyun GUO, Bo GAO, Zhifei ZHANG, Yu ZHANG, Ke XIONG

    Published 2022-12-01
    “…Federated learning (FL) is an emerging machine learning paradigm that can make full use of crowd sourced mobile resources for training on decentralized data.However, it is challenging to deploy FL over a wireless network because of the limited bandwidth and clients’ selfishness.To address these challenges, an incentive mechanism with bandwidth allocation (IMBA) was proposed.Considering the difference between clients' data quality and computing power, IMBA designs a payment scheme to incentivize high-quality clients to contribute their computing resources, thus improving the training accuracy of the model.By minimizing the weight sum of training time and payment cost, the optimal payment and bandwidth allocation scheme was determined, and the training delay was reduced by optimizing bandwidth allocation.Experiments show that IMBA effectively improves training accuracy, reduces the training delay and helps the server flexibly balance training delay and hiring payment.…”
    Get full text
    Article
  20. 260

    Edge computing and network slicing technology in 5G by Hongyu XIANG, Yangwen XIAO, Xian ZHANG, Zhuying PIAO, Mugen PENG

    Published 2017-06-01
    “…As a cost-efficient way to meet the wide range of use cases that the fifth generation wireless network will provide,network slicing and edge computing have been advocated by both academia and industry.In the concept of network slicing,the network entities are sliced into several logical networks to provide the requested services for different use cases.The edge computing pushes the frontier of computing applications,data,and services away from centralized nodes to the logical extremes of a network and even the user equipments,which can improve the traditional mobile broadband service capability,and handle with the emerging machine type service.The edge computing based radio access network slicing was proposed as a combination of edge computing and network slicing.The radio access network slicing can meet the diverse use cases and business models in 5G,and enable operators to flexibly provide personalized network services based on third-party need and network situation in a cost-efficient way.…”
    Get full text
    Article