-
281
Scheme analysis of transmission network for 5G mobile communication system
Published 2019-07-01“…At the same time, the changes of the wireless network and the core network architecture propose the requirements of network slicing and enhanced routing and forwarding functions. …”
Get full text
Article -
282
Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid
Published 2012-01-01“…A key element of Smart Grid is the energy home area network (HAN), for which an implementation is proposed, dealing with its security aspects and showing some solutions for realizing a wireless network based on ZigBee. Possible hardware-software architectures and implementations using COTS (Commercial Off The Shelf) components are presented for key building blocks of the energy HAN such as smart power meters and plugs and a home smart information box providing energy management policy and supporting user's energy awareness.…”
Get full text
Article -
283
Two-way relaying protocol tailored for sensor network
Published 2014-03-01“…A three-time-slot two-way relaying protocol,named as two-way selective decode-and-forward (TW-SDF) protocol,was proposed.This relaying protocol integrates network coding and the selective decode-and-forward method,and was tailored for wireless networks with simple devices,like sensor networks.Compared with the well-known physical-layer network coding protocol,the considered TW-SDF has the merits of full diversity order gain,low encoding and decoding complexity and easy-to-implement.Provided block codes,an upper bound on the block error rate of TW-SDF was derived and proved,which is valid for all hard decoders.Simulation results further verify that the upper bound is remarkably tight if BCH codes are utilized.…”
Get full text
Article -
284
Multi-agent reinforcement learning based dynamic optimization algorithm of CRE offset for heterogeneous networks
Published 2023-12-01“…To cope with the high throughput demand caused by the proliferation of wireless network users, a multi-agent reinforcement learning based dynamic optimization algorithm of cell range expansion (CRE) offset was proposed for interference scenarios in macro-pico heterogeneous networks.Based on the value decomposition network framework of collaborative multi-agent reinforcement learning, a personalized online local decision of CRE offset for all pico-base stations was achieved by reasonably utilizing and interacting the intra-system user distribution and their interference levels among pico-base stations.Simulation results show that the proposed algorithm has significant advantages in increasing system throughput, balancing the throughput of each base station and improving edge-user throughput, compared to CRE=5 dB and distributed Q-learning algorithms.…”
Get full text
Article -
285
Bandwidth allocation games based on network selection for video communication
Published 2015-02-01“…A bandwidth allocation game based on network selection (BAG-NS) was proposed for video communication in heterogeneous wireless networks.Firstly,according to the video characteristics of different users and current network conditions,the algorithm calculated the weights of network factors and selected the optimum network by combining analytic hierarchy process and entropy theory.Secondly,the user’s utility function with payoff and cost was designed,and a distributed iterative algorithm is used to obtain the Nash equilibrium.Then the existence and uniqueness of the Nash equilibrium are proved.Simulation results show that the proposed algorithm enables different users to reasonably distribute in different networks and takes users’ fairness and network congestion control into consideration,which increases the utilization of network resources,reduces the users’ video distortion,and improves the users’ video quality.…”
Get full text
Article -
286
Delay-Tolerant, Low-Power Protocols for Large Security-Critical Wireless Sensor Networks
Published 2012-01-01“…The solution proposed takes advantages from different domains considering as a guideline the low power consumption and facing the problems of seamless and lossy connectivity offered by the wireless medium along with very limited resources offered by a wireless network node. The paper is organized as follows: first we give an overview on delay-tolerant wireless sensor networking (DTN); then we perform a simulation-based comparative analysis of state-of-the-art DTN approaches and illustrate the improvement offered by the proposed protocol; finally we present experimental data gathered from the implementation of the proposed protocol on a proprietary hardware node.…”
Get full text
Article -
287
Research on Spectrum Access Mechanism Based on Polling Scheduling
Published 2013-11-01“…Numerical analysis and simulation results show that the mechanism improves the queuing performance and the bandwidth utilization of spectrum holes, and reveal its potential application in cognitive wireless network for data services.…”
Get full text
Article -
288
Research and practice of 5G edge cloud based port unified communication scheme
Published 2022-11-01“…With the advantages of distribution, flexible networking, rapid deployment, and local data offloading, 5G edge cloud has a wide range of application prospects in the vertical industrial field such as ports, and also puts forward certain requirements for the realization of unified communications in ports.On the basis of studying the unified communication architecture of ports based on 5G edge cloud, a functional framework of the 5G edge cloud that realized a comprehensive perception of various elements of the port site and supported the transformation of automated services was proposed.The functional framework could be well applied to the unified hosting of wired and wireless network integration in port scenarios, and could be used as the network infrastructure of unified communication of port networks in the current complex environment.Finally, the scheme was applied to a port terminal for practical verification.…”
Get full text
Article -
289
4kUHD H264 Wireless Live Video Streaming Using CUDA
Published 2014-01-01“…We therefore present for the first time a novel implementation of 4kUHD live encoding for streaming over a wireless network at low bitrate indoors, using CUDA for parallel H264 encoding. …”
Get full text
Article -
290
Research on 4G/5G voice quality optimization based on data mining and geographic visualization
Published 2022-10-01“…Traditional voice quality optimization relies on field test, case accumulation and expert experience.It is costly and inefficient to analyze problems by manual test.Through the application of data mining, decision tree machine learning algorithm, geographic visualization and other technologies, a voice experience optimization visualization platform based on big data analysis was developed, which could effectively identify the laws in voice big data, and realize the functions of correlation analysis between user voice experience index and wireless network performance index, intelligent recognition of degradation threshold and image analysis of poor quality areas.It is conducive to reduce the skill threshold of network engineers, improve the work efficiency of network optimization, save network operation and maintenance costs, and provide accurate and effective voice experience improvement solutions for the industry.…”
Get full text
Article -
291
Research on space focusing virtual coverage based on orthogonal frequency time reversal method
Published 2019-10-01“…To solve the problem of information leakage and coverage efficiency in ultra-dense wireless network,the orthogonal frequency-time reversal virtual coverage scheme was proposed.At first,different wireless reversal channels with lower correlation were distinguished by orthogonal carries.Next,after time reversal,the space focusing of each target signal was realized around the terminal.Then,theoretical expressions of the signal coverage and the signal-interference-to-noise ratio were derived and proved.Ultimately,the virtual coverage was shaped,meeting the requirements of users.The coverage of unrelated user not belonging to system was reduced.The results show that those unrelated users are difficult to receive the target signal because of virtual coverage.In addition,the system has higher capacity and security rate of reliable transmission without any more power or antennas.…”
Get full text
Article -
292
Enhanced zebra optimization algorithm and applications of power allocation in SDWN
Published 2025-01-01“…To address the issue of interference caused by shared resources in multi-user communications in software defined wireless network (SDWN), an enhanced zebra optimization algorithm (EZOA) was proposed to achieve power allocation that maximizes the secrecy rate. …”
Get full text
Article -
293
Research of platform identity attestation based on trusted chip
Published 2014-08-01“…The experiment result in a devel-oped prototype system shows that the proposed scheme provides good performances in computation and communication, and is especially suitable for the wireless network.…”
Get full text
Article -
294
An Intelligent Traffic Flow Control System Based on Radio Frequency Identification and Wireless Sensor Networks
Published 2014-05-01“…In addition, the traffic flow situation is also transmitted to a remote monitoring control system through ZigBee wireless network communication technology. The traffic flow control system developed in this study can perform remote transmission and reduce traffic accidents. …”
Get full text
Article -
295
QoS-aware enhanced proportional faire scheduling algorithm for real-time services in LTE networks
Published 2023-06-01“…The new generation of wireless networks (LTE advance and WIMAX) supports many services that consume many resources (such as VOIP, video conference …). …”
Get full text
Article -
296
Realization of smart home key management mechanism based on ECC
Published 2017-06-01“…At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this basis,the key management mechanism based on ECC was designed to achieve the purpose of guaranteeing key security.The key management mechanism includes an ECC-based data encryption key management mechanism and an ECC-based digital signature key management mechanism.So that the wireless network node in the identity authentication,the key generation,distribution,storage,update and other aspects of the key security were guaranteed.Finally,the security,time-consuming and scalability of this mechanism were analyzed.The results show that the mechanism has strong security and expansibility,and it is superior to E-G key management scheme in time-consuming.…”
Get full text
Article -
297
Survey on network function virtualization in RAN
Published 2019-01-01“…Finally, the challenges of network function virtualization applying in wireless network were proposed.…”
Get full text
Article -
298
Research on secret key generation based on wireless channel characteristics in body area network
Published 2021-12-01“…Wireless body area network (WBAN) is a human-centered wireless network.With limitations of power and computation capabilities of WBAN, the significant challenge of ensuring security is how to generate a shared key between two entities based on a lightweight symmetric cryptography.To investigate this issue, a secret key generation scheme in ultra-wideband (UWB) WBAN was designed.In this scheme, the difference of multipath relative delay and its average value were chosen as common random source to reduce key mismatch probability.Furthermore, with the aid of relay, secret key generation rate could be increased.Simulation and test results demonstrate that the proposed scheme can achieve a good tradeoff between key match probability and key generation rate.Furthermore, security analysis of the scheme was also provided to validate its feasibility.…”
Get full text
Article -
299
Certificateless strong designated verifier multi-signature
Published 2016-06-01“…,one bilinear pairing.So,it can be applied in wireless networks of the limited computing resources and network bandwidth.…”
Get full text
Article -
300
Virtual backbone formation algorithm based on GBG for wireless sensor networks
Published 2008-01-01“…An approximation algorithm of virtual backbone formation (VBF) based on a more generalized and realistic wireless network communication model of bounded growth graph (GBG) was proposed. …”
Get full text
Article