Showing 1,061 - 1,080 results of 2,398 for search 'MyRadio~', query time: 3.12s Refine Results
  1. 1061
  2. 1062
  3. 1063

    Power allocation of MIMO system with RF mismatch in TD-LTE power wireless private network by Bao FENG, Tao MA, Shilong CAI, Yang LI

    Published 2018-03-01
    “…With the development of smart distribution network,the power wireless private network using TD-LTE technology has gradually become a hot research topic.Among them,multiple-input multiple-output (MIMO) system is a key technology of TD-LTE power wireless private network.In TD-LTE,time-division duplex is often used to estimate channel information and perform appropriate power allocation to maximize the spectral efficiency of the communication system.However,due to the mismatch of radio frequency link,the complete uplink and downlink channels in the actual communication system can not achieve complete symmetry.The performance of MIMO system under radio frequency mismatch was analyzed and the suboptimal power allocation scheme was given.Combining with the approximate capacity expression,the spectral efficiency of the system under radio frequency mismatch and matching was analyzed.Simulation results show that compared with the optimal power allocation,the system capacity will suffer some loss due to the sub-optimal power allocation algorithm,but there is still some performance improvement compared with the equal power allocation algorithm,and does not require complicated calibration process.The realization of the operation proves the validity of the sub-optimal power allocation algorithm.…”
    Get full text
    Article
  4. 1064

    Electron-ion collider transverse instabilities due to the crab cavity fundamental impedance by T. Mastoridis, T. Loe, M. Blaskiewicz

    Published 2025-01-01
    “…The electron-ion collider crab Cavities will present a significant transverse impedance to the beam. The low-level radio frequency system will have to reduce the crab cavity impedance to prevent transverse instabilities, while regulating the crabbing voltage and minimizing the radio frequency noise levels injected into the beam. …”
    Get full text
    Article
  5. 1065

    Password authentication scheme for mobile computing environment by LIU Jun, LIAO Jian-xin, ZHU Xiao-min, WANG Chun

    Published 2007-01-01
    “…By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,the scheme was designed as a one-roundtrip protocol to meet the computation-constraint terminals and narrow-bandwidth radio interface.Moreover,the passwords in use could be changed by users without any interaction with servers over the radio.The performance of the scheme was measured by making use of M/G/1/N queuing model and compared with that of TLS.…”
    Get full text
    Article
  6. 1066
  7. 1067

    Racismo ambiental e saúde: um estudo do bairro Santa Maria, em Aracaju (SE) by Josiane Soares Santos, Dalila Silva Ribeiro, Mylena da Silva, Ingrid Chaiane Conceição Santos

    Published 2023-01-01
    “…Ademais, expressa-se também na negligência do poder público quanto às medidas de saneamento ambiental necessárias àquela área de moradia, que conviveu por 27 anos com o depósito de lixo. …”
    Get full text
    Article
  8. 1068

    Modified COST-235 Empirical Pathloss Model for Agricultural WSN Using Particle Swarm Optimization by Syahfrizal Tahcfulloh, Etty Wahyuni, Dwi Santoso, Rizkyandi Juliannanda

    Published 2025-01-01
    “…This paper explicitly examines and analyzes radio wave propagation modeling for measuring radio frequency (RF) signal strength in local agriculture's 2.4 GHz WSN system, such as Adan rice, corn, and peanuts. …”
    Get full text
    Article
  9. 1069

    Detecting the Black Hole Candidate Population in M51’s Young Massive Star Clusters: Constraints on Accreting Intermediate-mass Black Holes by Kristen C. Dage, Evangelia Tremou, Bolivia Cuevas Otahola, Eric W. Koch, Kwangmin Oh, Richard M. Plotkin, Vivian L. Tang, Muhammad Ridha Aldhalemi, Zainab Bustani, Mariam Ismail Fawaz, Hans J. Harff, Amna Khalyleh, Timothy McBride, Jesse Mason, Anthony Preston, Cortney Rinehart, Ethan Vinson, Gemma Anderson, Edward M. Cackett, Shih Ching Fu, Sebastian Kamann, Teresa Panurach, Renuka Pechetti, Payaswini Saikia, Susmita Sett, Ryan Urquhart, Christopher Usher

    Published 2025-01-01
    “…We explore the optical properties of the remaining 17 sources, including cluster age and mass estimates, and search for radio counterparts in the 8–12 GHz band. The lack of radio counterparts to X-ray sources we know to be associated with young massive star clusters in M51 suggests that we do not significantly detect hard-state intermediate-mass black holes (IMBHs)  ~10 ^4 M _⊙   or above. …”
    Get full text
    Article
  10. 1070
  11. 1071

    Research on LoRa network security schemes based on RF fingerprint by Yu JIANG, Siqing CHEN, Wen SUN

    Published 2021-12-01
    “…Long range radio (LoRa) is widely used in the IoT due to its advantages of long distance and low power consumption.However, LoRa network has no reliable security scheme currently, making it unable to guarantee the communication security.Therefore, based on the uniqueness and tamper-resistance of radio frequency fingerprint, it was proposed to receive radio frequency signals of the LoRa end nodes which requested access, extract the fingerprints from them, mark it and match with the customized multi-scale security rules according to demands to decide whether the identities of the LoRa end nodes were safe, taking security measures accordingly.Based on this, original LoRa gateway and LoRa network architecture were improved, new workflows were designed, and two LoRa network security schemes were proposed.The two LoRa network security schemes were proposed which implement identity authentication and access control of the LoRa end nodes from the physical layer.It is only needed to improve the original LoRa gateway in the LoRa network architecture and its workflow, which adds new security measures and guarantees for LoRa applications on the basis of not affecting the original LoRaWAN security mechanism, with no need to modify a huge number of LoRa end nodes.The security schemes proposed have high practical value.…”
    Get full text
    Article
  12. 1072

    Collaborative Cognitive Wireless Network Optimization Model and Network Parameter Optimization Algorithm by Tao Zhang

    Published 2023-01-01
    “…Such cognitive radio networks that use user collaboration to improve channel capacity and spectrum utilization are called collaborative cognitive radio networks. …”
    Get full text
    Article
  13. 1073

    Survey: Discovery in Wireless Sensor Networks by Valerie Galluzzi, Ted Herman

    Published 2012-01-01
    “…Wireless sensor networks often must operate under a more severe low-power regimen than do traditional ad hoc networks, notably by turning off radio for extended periods. Turning off a radio is problematic for neighbor discovery, and a balance is needed between adequate open communication for discovery and silence to conserve power. …”
    Get full text
    Article
  14. 1074

    Analysis of operator’s flow middle platform in 5G<sup>+</sup>native system by Yingqi WEI, Weiping LIN, Ying LI, Hua TAN

    Published 2020-10-01
    “…Based on the 5G mobile network,the traffic middle station was proposed,and the structure of the traffic middle station was introduced in detail.Flow middle platform highly abstracts the 5G connection management and flow delicacy control functions,simplify the operator’s traditional complicated IT interfaces,combines with data intelligent analysis.It helps massive industrial endpoints to access the 5G networks,build data connections to applications.It supports radio connection functions out of the box,frees the 5G industry internet application developers from intricacy radio connection development.…”
    Get full text
    Article
  15. 1075
  16. 1076
  17. 1077
  18. 1078

    Los orígenes de la radiodifusión y los modelos de investigación del discurso radiofónico by Josep V. Gavaldà Roca, Diego Mollá Furió, Nel·lo Pellisser Rossell

    Published 2024-12-01
    “…Las estrategias de legitimación de la programación radiofónica, del vínculo pragmático que aspira a crear este nuevo dominio cultural, son esenciales en la evaluación del mapa disciplinar en el que se inscribe la fundamentación de la teoría de la radio. En la formulación de las distintas propuestas teóricas y metodológicas son determinantes las políticas de regulación, los modelos de negocio de la economía radiofónica y la función política y cultural reconocida a la radio. …”
    Get full text
    Article
  19. 1079
  20. 1080

    Public Relations in Librarianship and Mass Media by Erol Yılmaz

    Published 1997-03-01
    “…İn this study to examine to see if radio, television and nevospa- pers, which are effective tools in public relations practices, are used in Turkish librar­ianship. …”
    Get full text
    Article