期刊文献+
共找到7,591篇文章
< 1 2 250 >
每页显示 20 50 100
Energy efficiency optimization of relay-assisted D2D two-way communications with SWIPT
1
作者 HE Jiai CHEN Yanjiao WANG Tong 《High Technology Letters》 EI CAS 2022年第3期252-258,共7页
Aiming at the energy consumption of long-distance device-to-device(D2D) devices for two-way communications in a cellular network,this paper proposes a strategy that combines two-way relay technology(TWRT) and simultan... Aiming at the energy consumption of long-distance device-to-device(D2D) devices for two-way communications in a cellular network,this paper proposes a strategy that combines two-way relay technology(TWRT) and simultaneous wireless information and power transfer(SWIPT) technology to achieve high energy efficiency(EE) communication.The scheme first establishes a fractional programming problem to maximize EE of D2D,and transforms it into a non-fractional optimization problem that can be solved easily.Then the problem is divided into three sub-problems:power control,power splitting ratios optimization,and relay selection.In order to maximize EE of the D2D pair,the Dinkelbach iterative algorithm is used to optimize the transmitted power of two D2D devices simultaneously;the one-dimensional search algorithm is proposed to optimize power splitting ratios;an improved optimal relay selection scheme based on EE is proposed to select relay.Finally,experiments are carried out on the Matlab simulation platform.The simulation results show that the proposed algorithm has faster convergence.Compared with the one-way relay transmission and fixed relay algorithms,the proposed scheme has higher EE. 展开更多
关键词 device-to-device(D2D) energy efficiency(EE) simultaneous wireless information and power transfer(SWIPT) two-way communications power control relay selection
下载PDF
A Retrodirective Array Enabled by CMOS Chips for Two-Way Wireless Communication with Automatic Beam Tracking
2
作者 Jiacheng Guo Yizhu Shen +2 位作者 Guoqing Dong Zhuang Han Sanming Hu 《Engineering》 SCIE EI CAS CSCD 2024年第6期196-207,共12页
This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic comple... This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic complementary metal-oxide semiconductor(CMOS)process.The highly integrated CMOS chip includes a receiving(Rx)chain,a transmitting(Tx)chain,and a unique tracking phaselocked loop(PLL)for the crucial conjugated phase recovery in the RDA.This article also proposes a method to reduce the beam pointing error(BPE)in a conventional RDA.To validate the above ideas simply yet without loss of generality,a 2.4 GHz RDA is demonstrated through two-way communication links between the Rx and Tx chains,and an on-chip quadrature coupler is designed to achieve a nonretrodirective signal suppression of 23 dBc.The experimental results demonstrate that the proposed RDA,which incorporates domestically manufactured low-cost 0.18 lm CMOS chips,is capable of automatically tracking beams covering±40with a reduced BPE.Each CMOS chip in the RDA has a compact size of 4.62 mm^(2) and a low power consumption of 0.15 W.To the best of the authors’knowledge,this is the first research to demonstrate an RDA with a fully customized CMOS chip for wireless communication with automatic beam tracking。 展开更多
关键词 Automatic beam tracking CMOS Retrodirective array two-way communication
下载PDF
Reference-frame-independent quantum key distribution with two-way classical communication
3
作者 Chun Zhou Hai-Tao Wang +9 位作者 Yi-Fei Lu Xiao-Lei Jiang Yan-Mei Zhao Yu Zhou Yang Wang Jia-Ji Li Yan-Yang Zhou Xiang Wang Hong-Wei Li Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期146-152,共7页
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In... The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest. 展开更多
关键词 quantum key distribution reference-frame-independent two-way classical communication
下载PDF
Exosomes originating from neural stem cells undergoing necroptosis participate in cellular communication by inducing TSC2 upregulation of recipient cells following spinal cord injury
4
作者 Shiming Li Jianfeng Li +5 位作者 Guoliang Chen Tao Lin Penghui Zhang Kuileung Tong Ningning Chen Shaoyu Liu 《Neural Regeneration Research》 SCIE CAS 2025年第11期3273-3286,共14页
We previously demonstrated that inhibiting neural stem cells necroptosis enhances functional recovery after spinal cord injury.While exosomes are recognized as playing a pivotal role in neural stem cells exocrine func... We previously demonstrated that inhibiting neural stem cells necroptosis enhances functional recovery after spinal cord injury.While exosomes are recognized as playing a pivotal role in neural stem cells exocrine function,their precise function in spinal cord injury remains unclear.To investigate the role of exosomes generated following neural stem cells necroptosis after spinal cord injury,we conducted singlecell RNA sequencing and validated that neural stem cells originate from ependymal cells and undergo necroptosis in response to spinal cord injury.Subsequently,we established an in vitro necroptosis model using neural stem cells isolated from embryonic mice aged 16-17 days and extracted exosomes.The results showed that necroptosis did not significantly impact the fundamental characteristics or number of exosomes.Transcriptome sequencing of exosomes in necroptosis group identified 108 differentially expressed messenger RNAs,104 long non-coding RNAs,720 circular RNAs,and 14 microRNAs compared with the control group.Construction of a competing endogenous RNA network identified the following hub genes:tuberous sclerosis 2(Tsc2),solute carrier family 16 member 3(Slc16a3),and forkhead box protein P1(Foxp1).Notably,a significant elevation in TSC2 expression was observed in spinal cord tissues following spinal cord injury.TSC2-positive cells were localized around SRY-box transcription factor 2-positive cells within the injury zone.Furthermore,in vitro analysis revealed increased TSC2 expression in exosomal receptor cells compared with other cells.Further assessment of cellular communication following spinal cord injury showed that Tsc2 was involved in ependymal cellular communication at 1 and 3 days post-injury through the epidermal growth factor and midkine signaling pathways.In addition,Slc16a3 participated in cellular communication in ependymal cells at 7 days post-injury via the vascular endothelial growth factor and macrophage migration inhibitory factor signaling pathways.Collectively,these findings confirm that exosomes derived from neural stem cells undergoing necroptosis play an important role in cellular communication after spinal cord injury and induce TSC2 upregulation in recipient cells. 展开更多
关键词 cellular communication competing endogenous RNA EXOSOMES Foxp1 NECROPTOSIS neural stem cells Slc16a3 spinal cord injury transcriptome sequencing Tsc2
下载PDF
Achievable Secrecy Rate Region of Two-Way Communication with Secret Key Feedback 被引量:1
5
作者 Tao Li Shidong Zhou 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第2期126-134,共9页
This paper investigates the achievable secrecy rate region of the Gaussian two-way wiretap channel,which describes the simultaneous secure two-way transmission of a confidential message. Through adjusting the time-sha... This paper investigates the achievable secrecy rate region of the Gaussian two-way wiretap channel,which describes the simultaneous secure two-way transmission of a confidential message. Through adjusting the time-sharing factor and the rate at which the random secret key is fed back, the allocation and optimization for the secrecy rates of two-way communication are achieved. Under peak and average power constraints, the achievable secrecy rate regions of the two-way communication are derived respectively. 展开更多
关键词 physical layer security two-way communication feed back one-time-pad random secret key secrecy rate region
原文传递
Two-Way Cooperative Quantum Communication with Partial Entanglement Analysis
6
作者 Yunkai Deng Zhujun Gao Ying Guo 《ZTE Communications》 2013年第3期36-40,共5页
In this paper, we describe an improved cooperative two-way quantum communication scheme that works in a forward-and-backward fashion. In this scheme, partial entanglement analysis based on five-qubit entangled Brown s... In this paper, we describe an improved cooperative two-way quantum communication scheme that works in a forward-and-backward fashion. In this scheme, partial entanglement analysis based on five-qubit entangled Brown state allows for the simultaneous exchange of arbitrary unknown states between Alice and Bob (with the help of trusted Charlie). Security is guaranteed because opposing unknown states are transmitted by performing the suitable recovery operations in a deterministic way or, in the case of irregularities, no results are generated. The current two-way quantum communication scheme can also be extended to transmit arbitrary unknown states. This is done in a probabilistic way by using two-way quantum teleportation based on the generalized Brown-like state. 展开更多
关键词 quantum teleportation two-way communication brown state bell states ENTANGLEMENT
下载PDF
Distributed Nash Equilibrium Seeking Strategies Under Quantized Communication 被引量:2
7
作者 Maojiao Ye Qing-Long Han +2 位作者 Lei Ding Shengyuan Xu Guobiao Jia 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期103-112,共10页
This paper is concerned with distributed Nash equi librium seeking strategies under quantized communication. In the proposed seeking strategy, a projection operator is synthesized with a gradient search method to achi... This paper is concerned with distributed Nash equi librium seeking strategies under quantized communication. In the proposed seeking strategy, a projection operator is synthesized with a gradient search method to achieve the optimization o players' objective functions while restricting their actions within required non-empty, convex and compact domains. In addition, a leader-following consensus protocol, in which quantized informa tion flows are utilized, is employed for information sharing among players. More specifically, logarithmic quantizers and uniform quantizers are investigated under both undirected and connected communication graphs and strongly connected digraphs, respec tively. Through Lyapunov stability analysis, it is shown that play ers' actions can be steered to a neighborhood of the Nash equilib rium with logarithmic and uniform quantizers, and the quanti fied convergence error depends on the parameter of the quan tizer for both undirected and directed cases. A numerical exam ple is given to verify the theoretical results. 展开更多
关键词 CONSENSUS distributed Nash equilibrium seeking projected gradient play quantized communication
下载PDF
Communication Resource-Efficient Vehicle Platooning Control With Various Spacing Policies 被引量:4
8
作者 Xiaohua Ge Qing-Long Han +1 位作者 Xian-Ming Zhang Derui Ding 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第2期362-376,共15页
Platooning represents one of the key features that connected automated vehicles may possess as it allows multiple automated vehicles to be maneuvered cooperatively with small headways on roads. However, a critical cha... Platooning represents one of the key features that connected automated vehicles may possess as it allows multiple automated vehicles to be maneuvered cooperatively with small headways on roads. However, a critical challenge in accomplishing automated vehicle platoons is to deal with the effects of intermittent and sporadic vehicle-to-vehicle data transmissions caused by limited wireless communication resources. This paper addresses the co-design problem of dynamic event-triggered communication scheduling and cooperative adaptive cruise control for a convoy of automated vehicles with diverse spacing policies. The central aim is to achieve automated vehicle platooning under various gap references with desired platoon stability and spacing performance requirements, while simultaneously improving communication efficiency. Toward this aim, a dynamic event-triggered scheduling mechanism is developed such that the intervehicle data transmissions are scheduled dynamically and efficiently over time. Then, a tractable co-design criterion on the existence of both the admissible event-driven cooperative adaptive cruise control law and the desired scheduling mechanism is derived. Finally, comparative simulation results are presented to substantiate the effectiveness and merits of the obtained results. 展开更多
关键词 Automated vehicles constant time headway spacing constant spacing cooperative adaptive cruise control event-triggered communication vehicle platooning
下载PDF
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks 被引量:1
9
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 Vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
下载PDF
Cooperative User-Scheduling and Resource Allocation Optimization for Intelligent Reflecting Surface Enhanced LEO Satellite Communication 被引量:1
10
作者 Meng Meng Bo Hu +1 位作者 Shanzhi Chen Jianyin Zhang 《China Communications》 SCIE CSCD 2024年第2期227-244,共18页
Lower Earth Orbit(LEO) satellite becomes an important part of complementing terrestrial communication due to its lower orbital altitude and smaller propagation delay than Geostationary satellite. However, the LEO sate... Lower Earth Orbit(LEO) satellite becomes an important part of complementing terrestrial communication due to its lower orbital altitude and smaller propagation delay than Geostationary satellite. However, the LEO satellite communication system cannot meet the requirements of users when the satellite-terrestrial link is blocked by obstacles. To solve this problem, we introduce Intelligent reflect surface(IRS) for improving the achievable rate of terrestrial users in LEO satellite communication. We investigated joint IRS scheduling, user scheduling, power and bandwidth allocation(JIRPB) optimization algorithm for improving LEO satellite system throughput.The optimization problem of joint user scheduling and resource allocation is formulated as a non-convex optimization problem. To cope with this problem, the nonconvex optimization problem is divided into resource allocation optimization sub-problem and scheduling optimization sub-problem firstly. Second, we optimize the resource allocation sub-problem via alternating direction multiplier method(ADMM) and scheduling sub-problem via Lagrangian dual method repeatedly.Third, we prove that the proposed resource allocation algorithm based ADMM approaches sublinear convergence theoretically. Finally, we demonstrate that the proposed JIRPB optimization algorithm improves the LEO satellite communication system throughput. 展开更多
关键词 convex optimization intelligent reflecting surface LEO satellite communication OFDM
下载PDF
Measurement-Device-Independent Quantum Key Distribution with Two-Way Local Operations and Classical Communications 被引量:1
11
作者 谭勇刚 刘强 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第9期10-13,共4页
Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doub... Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doubled when compared with the prepare-and-measure QKD. An interesting question is whether the transmission distance can be extended further. In this work, we consider the contributions of the two-way local operations and classical communications to the key generation rate and transmission distance of the MDI-QKD. Our numerical results show that the secure transmission distances are increased by about 12kin and 8 km when the 1 13 and the 2 B steps are implemented, respectively. 展开更多
关键词 QKD MDI is on Measurement-Device-Independent Quantum Key Distribution with two-way Local Operations and Classical communications EPR QBER of with
下载PDF
Cooperative UAV search strategy based on DMPC-AACO algorithm in restricted communication scenarios 被引量:1
12
作者 Shiyuan Chai Zhen Yang +3 位作者 Jichuan Huang Xiaoyang Li Yiyang Zhao Deyun Zhou 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第1期295-311,共17页
Improvement of integrated battlefield situational awareness in complex environments involving dynamic factors such as restricted communications and electromagnetic interference(EMI)has become a contentious research pr... Improvement of integrated battlefield situational awareness in complex environments involving dynamic factors such as restricted communications and electromagnetic interference(EMI)has become a contentious research problem.In certain mission environments,due to the impact of many interference sources on real-time communication or mission requirements such as the need to implement communication regulations,the mission stages are represented as a dynamic combination of several communication-available and communication-unavailable stages.Furthermore,the data interaction between unmanned aerial vehicles(UAVs)can only be performed in specific communication-available stages.Traditional cooperative search algorithms cannot handle such situations well.To solve this problem,this study constructed a distributed model predictive control(DMPC)architecture for a collaborative control of UAVs and used the Voronoi diagram generation method to re-plan the search areas of all UAVs in real time to avoid repetition of search areas and UAV collisions while improving the search efficiency and safety factor.An attention mechanism ant-colony optimization(AACO)algorithm is proposed for UAV search-control decision planning.The search strategy is adaptively updated by introducing an attention mechanism for regular instruction information,a priori information,and emergent information of the mission to satisfy different search expectations to the maximum extent.Simulation results show that the proposed algorithm achieves better search performance than traditional algorithms in restricted communication constraint scenarios. 展开更多
关键词 Unmanned aerial vehicles(UAV) Cooperative search Restricted communication Mission planning DMPC-AACO
下载PDF
Effect of sequential nursing care combined with communication intervention on visual recovery and pain after cataract ultrasound emulsification 被引量:1
13
作者 Jing-Cao Wang Qing Zhang +2 位作者 Man-Rong Yu Yun-Xia Yang Hui-Min Jiang 《World Journal of Clinical Cases》 SCIE 2024年第27期6087-6093,共7页
BACKGROUND Cataracts are a common ophthalmic disease and postoperative vision recovery is crucial to patient quality of life.Rational and efficient care models play an impor-tant role in promoting vision recovery.AIM ... BACKGROUND Cataracts are a common ophthalmic disease and postoperative vision recovery is crucial to patient quality of life.Rational and efficient care models play an impor-tant role in promoting vision recovery.AIM To evaluate the clinical effectiveness of procedural nursing care combined with communication intervention in vision recovery after cataract ultrasound emulsi-fication.METHODS A randomized controlled study was conducted on 100 patients with cataracts who underwent ultrasound emulsification surgery.They were randomly assigned to an experimental group or a control group.The experimental group received procedural nursing combined with Connect,Introduce,Communicate,Ask,Respond,Exit(CICARE)communication intervention,whereas the control group received conventional nursing.The effectiveness of the nursing model was assessed by comparing differences in vision recovery,pain scores,and mental health status between the two groups.RESULTS It was found that over time the visual acuity of patients in both groups gradually recovered and patients in the experimental group had lower pain scores and superior mental health status than the control group(P<0.05).CONCLUSION Procedural nursing combined with CICARE communication intervention has positive effects on vision recovery in patients after cataract ultrasound emulsification. 展开更多
关键词 Sequential nursing communication intervention CICARE Cataract ultrasound emulsification Vision restoration
下载PDF
A survey on semantic communications:Technologies,solutions,applications and challenges
14
作者 Yating Liu Xiaojie Wang +3 位作者 Zhaolong Ning MengChu Zhou Lei Guo Behrouz Jedari 《Digital Communications and Networks》 SCIE CSCD 2024年第3期528-545,共18页
Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networ... Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networks,beyond the theoretical capacity limit.Despite the extensive research on SC,there is a lack of comprehensive survey on technologies,solutions,applications,and challenges for SC.In this article,the development of SC is first reviewed and its characteristics,architecture,and advantages are summarized.Next,key technologies such as semantic extraction,semantic encoding,and semantic segmentation are discussed and their corresponding solutions in terms of efficiency,robustness,adaptability,and reliability are summarized.Applications of SC to UAV communication,remote image sensing and fusion,intelligent transportation,and healthcare are also presented and their strategies are summarized.Finally,some challenges and future research directions are presented to provide guidance for further research of SC. 展开更多
关键词 Semantic communication Semantic coding Semantic extraction Semantic communication framework Semantic communication applications
下载PDF
Building Semantic Communication System via Molecules:An End-to-End Training Approach
15
作者 Cheng Yukun Chen Wei Ai Bo 《China Communications》 SCIE CSCD 2024年第7期113-124,共12页
The concept of semantic communication provides a novel approach for applications in scenarios with limited communication resources.In this paper,we propose an end-to-end(E2E)semantic molecular communication system,aim... The concept of semantic communication provides a novel approach for applications in scenarios with limited communication resources.In this paper,we propose an end-to-end(E2E)semantic molecular communication system,aiming to enhance the efficiency of molecular communication systems by reducing the transmitted information.Specifically,following the joint source channel coding paradigm,the network is designed to encode the task-relevant information into the concentration of the information molecules,which is robust to the degradation of the molecular communication channel.Furthermore,we propose a channel network to enable the E2E learning over the non-differentiable molecular channel.Experimental results demonstrate the superior performance of the semantic molecular communication system over the conventional methods in classification tasks. 展开更多
关键词 deep learning end-to-end learning molecular communication semantic communication
下载PDF
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
16
作者 Shafi Ullah Sibghat Ullah Bazai +9 位作者 Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed 《Computers, Materials & Continua》 SCIE EI 2024年第4期93-115,共23页
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency. 展开更多
关键词 AUTHENTICATION cyber security internet of things machine-type communication devices machine-to-machine communication
下载PDF
Satellite Communications with 5G, B5G, and 6G: Challenges and Prospects 被引量:1
17
作者 Mehmet Beyaz 《International Journal of Communications, Network and System Sciences》 2024年第3期31-49,共19页
Satellite communications, pivotal for global connectivity, are increasingly converging with cutting-edge mobile networks, notably 5G, B5G, and 6G. This amalgamation heralds the promise of universal, high-velocity comm... Satellite communications, pivotal for global connectivity, are increasingly converging with cutting-edge mobile networks, notably 5G, B5G, and 6G. This amalgamation heralds the promise of universal, high-velocity communication, yet it is not without its challenges. Paramount concerns encompass spectrum allocation, the harmonization of network architectures, and inherent latency issues in satellite transmissions. Potential mitigations, such as dynamic spectrum sharing and the deployment of edge computing, are explored as viable solutions. Looking ahead, the advent of quantum communications within satellite frameworks and the integration of AI spotlight promising research trajectories. These advancements aim to foster a seamless and synergistic coexistence between satellite communications and next-gen mobile networks. 展开更多
关键词 Satellite communications Spectrum Allocation Edge Computing AI Integration 5G B5G 6G
下载PDF
Single Photon Detection Technology in Underwater Wireless Optical Communication:Modulation Modes and Error Correction Coding Analysis
18
作者 GAI Lei LI Wendong WANG Guoyu 《Journal of Ocean University of China》 CAS CSCD 2024年第2期405-414,共10页
This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding type... This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding types on communication performance.The study investigates the impact of on-off keying(OOK)and 2-pulse-position modulation(2-PPM)on the bit error rate(BER)in single-channel intensity and polarization multiplexing.Furthermore,it compares the error correction performance of low-density parity check(LDPC)and Reed-Solomon(RS)codes across different error correction coding types.The effects of unscattered photon ratio and depolarization ratio on BER are also verified.Finally,a UWOC system based on SPD is constructed,achieving 14.58 Mbps with polarization OOK multiplexing modulation and 4.37 Mbps with polarization 2-PPM multiplexing modulation using LDPC code error correction. 展开更多
关键词 error correction coding modulation mode single photon detection underwater communication wireless optical communication
下载PDF
Call for Papers--Feature Topic Vol. 22, No. 3, 2025 Special Issue of China Communications: Convergence of 6G empowered Edge Intelligence and Generative AI: Theories, Algorithms, and Applications
19
《China Communications》 SCIE CSCD 2024年第4期I0002-I0002,共1页
Generative artificial intelligence(AI), as an emerging paradigm in content generation, has demonstrated its great potentials in creating high-fidelity data including images, texts, and videos. Nowadays wireless networ... Generative artificial intelligence(AI), as an emerging paradigm in content generation, has demonstrated its great potentials in creating high-fidelity data including images, texts, and videos. Nowadays wireless networks and applications have been rapidly evolving from achieving “connected things” to embracing “connected intelligence”. 展开更多
关键词 communicationS wireless networks
下载PDF
INTELLIGENT COVERT COMMUNICATION
20
《China Communications》 SCIE CSCD 2024年第9期I0002-I0004,共3页
As increasing amounts of private and confidential information are transmitted over wireless networks,their openness and broadcast pose significant security risks.In high-security scenarios like healthcare and financia... As increasing amounts of private and confidential information are transmitted over wireless networks,their openness and broadcast pose significant security risks.In high-security scenarios like healthcare and financial activities,initial exposure of transmitted information can lead to serious threats.Covert communication,or low probability of detection(LPD)communication,has gained attention for its ability to hide transmission behaviors. 展开更多
关键词 communication WIRELESS gained
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部