期刊文献+
共找到118篇文章
< 1 2 6 >
每页显示 20 50 100
Echo state network based symbol detection in chaotic baseband wireless communication
1
作者 Huiping Yin Chao Bai Haipeng Ren 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1319-1330,共12页
The Chaotic Baseband Wireless Communication System(CBWCS)is expected to eliminate the Inter-Symbol Interference(ISI)caused by multipath propagation by using the optimal decoding threshold that is the sum of the ISI ca... The Chaotic Baseband Wireless Communication System(CBWCS)is expected to eliminate the Inter-Symbol Interference(ISI)caused by multipath propagation by using the optimal decoding threshold that is the sum of the ISI caused by past decoded bits and the ISI caused by future transmitting bits.However,the current technique is only capable of removing partial effects of the ISI,because only past decoded bits are available for the suboptimal decoding threshold calculation.The unavailability of the future information needed for the optimal decoding threshold is an obstacle to further improve the Bit Error Rate(BER)performance.In contrast to the previous method using Echo State Network(ESN)to predict one future bit,the proposed method in this paper predicts the optimal decoding threshold directly using ESN.The proposed ESN-based threshold prediction method simplifies the symbol decoding operation by avoiding the iterative prediction of the output waveform points using ESN and accumulated error caused by the iterative operation.With this approach,the calculation complexity is reduced compared to the previous ESN-based approach.The proposed method achieves better BER performance compared to the previous method.The reason for this superior result is twofold.First,the proposed ESN is capable of using more future symbols information conveyed by the ESN input to obtain more accurate threshold rather than the previous method in which only one future symbol was available.Second,the proposed method here does not need to estimate the channel information using Least Squared(LS)method,which avoids the extra error caused by inaccurate channel information estimation.Simulation results and experiment based on a wireless open-access research platform under a practical wireless channel show the effectiveness and superiority of the proposed method. 展开更多
关键词 Chaotic baseband wireless communication system(CBWCS) Inter-symbol interference(ISI) Echo state network(ESN) Threshold prediction
下载PDF
Call for Papers--Feature Topic Vol. 22, No. 3, 2025 Special Issue of China Communications: Convergence of 6G empowered Edge Intelligence and Generative AI: Theories, Algorithms, and Applications
2
《China Communications》 SCIE CSCD 2024年第4期I0002-I0002,共1页
Generative artificial intelligence(AI), as an emerging paradigm in content generation, has demonstrated its great potentials in creating high-fidelity data including images, texts, and videos. Nowadays wireless networ... Generative artificial intelligence(AI), as an emerging paradigm in content generation, has demonstrated its great potentials in creating high-fidelity data including images, texts, and videos. Nowadays wireless networks and applications have been rapidly evolving from achieving “connected things” to embracing “connected intelligence”. 展开更多
关键词 communicationS wireless networks
下载PDF
Intelligent UAV Based Energy Supply for 6G Wireless Powered IoT Networks
3
作者 Miao Jiansong Chen Haoqiang +4 位作者 Wang Pengjie Li Hairui Zhao Yan Mu Junsheng Yan Shi 《China Communications》 SCIE CSCD 2024年第9期321-337,共17页
In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with... In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with a constant power supply,transmits energy to charge the IoT devices on the ground,whereas UAV-B serves the IoT devices by data collection as a base station.In this framework,the system's energy efficiency is maximized,which we define as a ratio of the sum rate of IoT devices to the energy consumption of two UAVs during a fixed working duration.With the constraints of duration,transmit power,energy,and mobility,a difficult non-convex issue is presented by optimizing the trajectory,time duration allocation,and uplink transmit power of concurrently.To tackle the non-convex fractional optimization issue,we deconstruct it into three subproblems and we solve each of them iteratively using the descent method in conjunction with sequential convex approximation(SCA)approaches and the Dinkelbach algorithm.The simulation findings indicate that the suggested cooperative design has the potential to greatly increase the energy efficiency of the 6G intelligent UAV-assisted wireless powered IoT system when compared to previous benchmark systems. 展开更多
关键词 6G wireless powered network energy efficiency IoT intelligent network UAV communication
下载PDF
Stackelberg Game for Wireless Powered and Backscattering Enabled Sensor Networks
4
作者 Lyu Bin Cao Yi +2 位作者 Wang Shuai Guo Haiyan Hao Chengyao 《China Communications》 SCIE CSCD 2024年第3期189-204,共16页
This paper investigates a wireless powered and backscattering enabled sensor network based on the non-linear energy harvesting model, where the power beacon(PB) delivers energy signals to wireless sensors to enable th... This paper investigates a wireless powered and backscattering enabled sensor network based on the non-linear energy harvesting model, where the power beacon(PB) delivers energy signals to wireless sensors to enable their passive backscattering and active transmission to the access point(AP). We propose an efficient time scheduling scheme for network performance enhancement, based on which each sensor can always harvest energy from the PB over the entire block except its time slots allocated for passive and active information delivery. Considering the PB and wireless sensors are from two selfish service providers, we use the Stackelberg game to model the energy interaction among them. To address the non-convexity of the leader-level problem, we propose to decompose the original problem into two subproblems and solve them iteratively in an alternating manner. Specifically, the successive convex approximation, semi-definite relaxation(SDR) and variable substitution techniques are applied to find a nearoptimal solution. To evaluate the performance loss caused by the interaction between two providers, we further investigate the social welfare maximization problem. Numerical results demonstrate that compared to the benchmark schemes, the proposed scheme can achieve up to 35.4% and 38.7% utility gain for the leader and the follower, respectively. 展开更多
关键词 backscatter communication energy interaction stackelberg game wireless powered sensor network
下载PDF
Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Application
5
作者 Ibraheem Al-Hejri Farag Azzedin +1 位作者 Sultan Almuhammadi Naeem Firdous Syed 《Computers, Materials & Continua》 SCIE EI 2024年第6期4197-4218,共22页
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ... The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes. 展开更多
关键词 IoT LIGHTWEIGHT computation complexity communication overhead cybersecurity threats threat prevention secure data transmission wireless Sensor networks(WSNs) elliptic curve cryptography
下载PDF
Distribution algorithm of entangled particles for wireless quantum communication mesh networks
6
作者 王霄峻 施丽慧 +2 位作者 占海涛 项睿清 余旭涛 《Journal of Southeast University(English Edition)》 EI CAS 2015年第4期450-456,共7页
With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes ... With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes selection in order to save cost and reduce complexity. A minimum spanning tree( MST)-based quantum distribution algorithm( QDMST) is presented to construct the mesh backbone network. First, the articulation points are found,and for each connected block uncovered by the articulation points, the general centers are solved. Then, both articulation points and general centers are classified as backbone nodes and an M ST is formed. The quantum path between every two neighbor nodes on the MST is calculated. The nodes on these paths are also classified as backbone nodes. Simulation results validate the advantages of QDMST in the average backbone nodes number and average quantum channel distance compared to the existing random selection algorithm under multiple network scenarios. 展开更多
关键词 wireless quantum communication networks entangled particles distribution wireless mesh networks minimum spanning tree
下载PDF
AEECA for Reliable Communication to Enhance the Network Life Time for WSN
7
作者 Ganesh Jayaraman V R Sarma Dhulipala 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1705-1719,共15页
Nowadays,wireless sensor networks play a vital role in our day to day life.Wireless communication is preferred for many sensing applications due its convenience,flexibility and effectiveness.The sensors to sense the en... Nowadays,wireless sensor networks play a vital role in our day to day life.Wireless communication is preferred for many sensing applications due its convenience,flexibility and effectiveness.The sensors to sense the environmental factor are versatile and send sensed data to central station wirelessly.The cluster based protocols are provided an optimal solution for enhancing the lifetime of the sensor networks.In this paper,modified K-means++algorithm is used to form the cluster and cluster head in an efficient way and the Advanced Energy-Efficient Cluster head selection Algorithm(AEECA)is used to calculate the weighted fac-tor of the transmission path and effective data collection using gateway node.The experimental results show the proposed algorithm outperforms the existing routing algorithms. 展开更多
关键词 wireless sensor network reliable communication energy management energy clustering SENSORS base station gateway node
下载PDF
Distributed wireless quantum communication networks with partially entangled pairs 被引量:9
8
作者 余旭涛 张在琛 徐进 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第1期66-73,共8页
Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks ... Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks with partially entangled pairs. A quantum routing scheme with multi-hop teleportation is proposed. With the proposed scheme, is not necessary for the quantum path to be consistent with the classical path. The quantum path and its associated classical path are established in a distributed way. Direct multi-hop teleportation is conducted on the selected path to transfer a quantum state from the source to the destination. Based on the feature of multi-hop teleportation using partially entangled pairs, if the node number of the quantum path is even, the destination node will add another teleportation at itself. We simulated the performance of distributed wireless quantum communication networks with a partially entangled state. The probability of transferring the quantum state successfully is statistically analyzed. Our work shows that multi-hop teleportation on distributed wireless quantum networks with partially entangled pairs is feasible. 展开更多
关键词 distributed wireless quantum communication networks partially entangled pairs routing multi-hop teleportation
下载PDF
System Performance of Wireless Sensor Network Using LoRa–Zigbee Hybrid Communication 被引量:4
9
作者 Van-Truong Truong Anand Nayyar Showkat Ahmad Lone 《Computers, Materials & Continua》 SCIE EI 2021年第8期1615-1635,共21页
Wireless sensor network(WSN)is considered as the fastest growing technology pattern in recent years because of its applicability in varied domains.Many sensor nodes with different sensing functionalities are deployed ... Wireless sensor network(WSN)is considered as the fastest growing technology pattern in recent years because of its applicability in varied domains.Many sensor nodes with different sensing functionalities are deployed in the monitoring area to collect suitable data and transmit it to the gateway.Ensuring communications in heterogeneous WSNs,is a critical issue that needs to be studied.In this research paper,we study the system performance of a heterogeneous WSN using LoRa–Zigbee hybrid communication.Specifically,two Zigbee sensor clusters and two LoRa sensor clusters are used and combined with two Zigbee-to-LoRa converters to communicate in a network managed by a LoRa gateway.The overall system integrates many different sensors in terms of types,communication protocols,and accuracy,which can be used in many applications in realistic environments such as on land,under water,or in the air.In addition to this,a synchronous management software on ThingSpeak Web server and Blynk app is designed.In the proposed system,the token ring protocol in Zigbee network and polling mechanism in LoRa network is used.The system can operate with a packet loss rate of less than 0.5%when the communication range of the Zigbee network is 630 m,and the communication range of the LoRa network is 3.7 km.On the basis of the digital results collected on the management software,this study proves tremendous improvements in the system performance. 展开更多
关键词 wireless sensor network ZIGBEE LoRa communication protocol CONVERTER packet loss
下载PDF
Distributed wireless quantum communication networks 被引量:1
10
作者 余旭涛 徐进 张在琛 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第9期271-277,共7页
The distributed wireless quantum communication network (DWQCN) ha~ a distributed network topology and trans- mits information by quantum states. In this paper, we present the concept of the DWQCN and propose a syste... The distributed wireless quantum communication network (DWQCN) ha~ a distributed network topology and trans- mits information by quantum states. In this paper, we present the concept of the DWQCN and propose a system scheme to transfer quantum states in the DWQCN. The system scheme for transmitting information between any two nodes in the DWQCN includes a routing protocol and a scheme for transferring quantum states. The routing protocol is on-demand and the routing metric is selected based on the number of entangled particle pairs. After setting up a route, quantum tele- portation and entanglement swapping are used for transferring quantum states. Entanglement swapping is achieved along with the process of routing set up and the acknowledgment packet transmission. The measurement results of each entan- glement swapping are piggybacked with route reply packets or acknowledgment packets. After entanglement swapping, a direct quantum link between source and destination is set up and quantum states are transferred by quantum teleportation. Adopting this scheme, the measurement results of entanglement swapping do not need to be transmitted specially, which decreases the wireless transmission cost and transmission delay. 展开更多
关键词 distributed wireless networks quantum communication networks quantum teleportation routingprotocol
下载PDF
Multi-path based secure communication in wireless mesh networks 被引量:1
11
作者 Ding Xuyang Fan Mingyu Lu Xiaojun Zhu Dayong Wang Jiahao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期818-824,共7页
Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarant... Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarantee the communication security, a novel communication security mechanism is proposed. The mechanism uses a communication encryption scheme to encrypt data packets and employs a risk avoidance scheme to avoid the malicious nodes during communications. Simulation results indicate that the mechanism is able to provide secure communication effectively and reduce the damage of attacks through multiple paths. 展开更多
关键词 wireless mesh network secure communication key exchange risk avoidance
下载PDF
Milestones of Wireless Communication Networks and Technology Prospect of Next Generation(6G) 被引量:1
12
作者 Mohammed H.Alsharif Md.Sanwar Hossain +3 位作者 Abu Jahid Muhammad Asghar Khan Bong Jun Choi Samih M.Mostafa 《Computers, Materials & Continua》 SCIE EI 2022年第6期4803-4818,共16页
Since around 1980,a new generation of wireless technology has arisen approximately every 10 years.First-generation(1G)and secondgeneration(2G)began with voice and eventually introduced more and more data in third-gene... Since around 1980,a new generation of wireless technology has arisen approximately every 10 years.First-generation(1G)and secondgeneration(2G)began with voice and eventually introduced more and more data in third-generation(3G)and became highly popular in the fourthgeneration(4G).To increase the data rate along with low latency and mass connectivity the fifth-generation(5G)networks are being installed from 2020.However,the 5G technology will not be able to fulfill the data demand at the end of this decade.Therefore,it is expected that 6G communication networks will rise,providing better services through the implementation of new enabling technologies and allowing users to connect everywhere.6G technology would not be confined to cellular communications networks,but would also comply with non-terrestrial communication system requirements,such as satellite communication.The ultimate objectives of this work are to address the major challenges of the evolution of cellular communication networks and to discourse the recent growth of the industry based on the key scopes of application and challenges.The main areas of research topics are summarized into(i)major 6G wireless networkmilestones;(ii)key performance indicators;(iii)future new applications;and(iv)potential fields of research,challenges,and open issues. 展开更多
关键词 wireless networks beyond 5G 6G communications terahertz frequency terahertz communications holographic calls
下载PDF
Real-Time Monitoring System for Rotor Temperature of a Large Turbogenerator Based on SmartMesh IP Wireless Network Communication Technology 被引量:1
13
作者 Zhiting Zhou Hui Li +2 位作者 Yong Yang Haibo Zhang Zhennan Fan 《China Communications》 SCIE CSCD 2022年第5期150-163,共14页
In this study,a real-time rotor temperature monitoring system for large turbogenerators using SmartMesh IP wireless network communication technology was designed and tested.The system is capable of providing comprehen... In this study,a real-time rotor temperature monitoring system for large turbogenerators using SmartMesh IP wireless network communication technology was designed and tested.The system is capable of providing comprehensive,accurate,continuous,and reliable real-time temperature monitoring for turbogenerators.Additionally,it has demonstrated satisfactory results in a real-time monitoring test of the rotor temperature of various famous large-scale turbogenerators and giant nuclear power half-speed turbogenerators designed and manufactured in China.The development and application of this wireless temperature measurement system would aid in improving the intelligent operation quality,safety,and stability of China’s large turbine generators and even the entire power system. 展开更多
关键词 SmartMesh IP wireless network communication turbine generator rotor temperature realtime monitoring
下载PDF
Enhanced Energy Efficient Multipath Routing Protocol for Wireless Sensor Communication Networks Using Cuckoo Search Algorithm 被引量:1
14
作者 D. Antony Arul Raj P. Sumathi 《Wireless Sensor Network》 2014年第4期49-55,共7页
Energy efficient routing is one of the major thrust areas in Wireless Sensor Communication Networks (WSCNs) and it attracts most of the researchers by its valuable applications and various challenges. Wireless sensor ... Energy efficient routing is one of the major thrust areas in Wireless Sensor Communication Networks (WSCNs) and it attracts most of the researchers by its valuable applications and various challenges. Wireless sensor networks contain several nodes in its terrain region. Reducing the energy consumption over the WSCN has its significance since the nodes are battery powered. Various research methodologies were proposed by researchers in this area. One of the bio-inspired computing paradigms named Cuckoo search algorithm is used in this research work for finding the energy efficient path and routing is performed. Several performance metrics are taken into account for determining the performance of the proposed routing protocol such as throughput, packet delivery ratio, energy consumption and delay. Simulation is performed using NS2 and the results shows that the proposed routing protocol is better in terms of average throughput, and average energy consumption. 展开更多
关键词 wireless Sensor communication networks CUCKOO SEARCH Algorithm AODV AOMDV
下载PDF
FLBS: Fuzzy lion Bayes system for intrusion detection in wireless communication network
15
作者 NARENDRASINH B Gohil VDEVYAS Dwivedi 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第11期3017-3033,共17页
An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detecti... An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detection system (IDS). In this paper, the fuzzy lion Bayes system (FLBS) is proposed for intrusion detection mechanism. Initially, the data set is grouped into a number of clusters by the fuzzy clustering algorithm. Here, the Naive Bayes classifier is integrated with the lion optimization algorithm and the new lion naive Bayes (LNB) is created for optimally generating the probability measures. Then, the LNB model is applied to each data group, and the aggregated data is generated. After generating the aggregated data, the LNB model is applied to the aggregated data, and the abnormal nodes are identified based on the posterior probability function. The performance of the proposed FLBS system is evaluated using the KDD Cup 99 data and the comparative analysis is performed by the existing methods for the evaluation metrics accuracy and false acceptance rate (FAR). From the experimental results, it can be shown that the proposed system has the maximum performance, which shows the effectiveness of the proposed system in the intrusion detection. 展开更多
关键词 intrusion detection wireless communication network fuzzy clustering naive Bayes classifier lion naive Bayes system
下载PDF
Deployment of Polar Codes for Mission-Critical Machine-Type Communication Over Wireless Networks
16
作者 Najib Ahmed Mohammed Ali Mohammed Mansoor +1 位作者 Rodina Binti Ahmad Saaidal Razalli Bin Azzuhri 《Computers, Materials & Continua》 SCIE EI 2022年第4期573-592,共20页
Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research hotspot.It is primarily characterized by communication that provides ultra-h... Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research hotspot.It is primarily characterized by communication that provides ultra-high reliability and very low latency to concurrently transmit short commands to a massive number of connected devices.While the reduction in physical(PHY)layer overhead and improvement in channel coding techniques are pivotal in reducing latency and improving reliability,the current wireless standards dedicated to support mcMTC rely heavily on adopting the bottom layers of general-purpose wireless standards and customizing only the upper layers.The mcMTC has a significant technical impact on the design of all layers of the communication protocol stack.In this paper,an innovative bottom-up approach has been proposed for mcMTC applications through PHY layer targeted at improving the transmission reliability by implementing ultra-reliable channel coding scheme in the PHY layer of IEEE 802.11a standard bearing in mind short packet transmission system.To achieve this aim,we analyzed and compared the channel coding performance of convolutional codes(CCs),low-density parity-check(LDPC)codes,and polar codes in wireless network on the condition of short data packet transmission.The Viterbi decoding algorithm(VA),logarithmic belief propagation(Log-BP)algorithm,and cyclic redundancy check(CRC)successive cancellation list(SCL)(CRC-SCL)decoding algorithm were adopted to CC,LDPC codes,and polar codes,respectively.Consequently,a new PHY layer for mcMTC has been proposed.The reliability of the proposed approach has been validated by simulation in terms of Bit error rate(BER)and packet error rate(PER)vs.signal-to-noise ratio(SNR).The simulation results demonstrate that the reliability of IEEE 802.11a standard has been significantly improved to be at PER=10−5 or even better with the implementation of polar codes.The results also show that the general-purpose wireless networks are prominent inproviding short packet mcMTC with the modification needed. 展开更多
关键词 Machine-type communication mission-critical applications MTC URLLC M2M wireless networks polar codes
下载PDF
Resource provisioning for computation and communication in multi-cell wireless networks
17
作者 Yang Xiumei Chen Huaxia Zhang Mengying 《High Technology Letters》 EI CAS 2021年第2期121-128,共8页
The convergence of computation and communication at network edges plays a significant role in coping with computation-intensive and delay-critical tasks.During the stage of network planning,the resource provisioning p... The convergence of computation and communication at network edges plays a significant role in coping with computation-intensive and delay-critical tasks.During the stage of network planning,the resource provisioning problem for edge nodes has to be investigated to provide prior information for future system configurations.This work focuses on how to quantify the computation capabilities of access points at network edges when provisioning resources of computation and communication in multi-cell wireless networks.The problem is formulated as a discrete and non-convex minimization problem,where practical constraints including delay requirements,the inter-cell interference,and resource allocation strategies are considered.An iterative algorithm is also developed based on decomposition theory and fractional programming to solve this problem.The analysis shows that the necessary computation capability needed for certain delay guarantee depends on resource allocation strategies for delay-critical tasks.For delay-tolerant tasks,it can be approximately estimated by a derived lower bound which ignores the scheduling strategy.The efficiency of the proposed algorithm is demonstrated using numerical results. 展开更多
关键词 resource provisioning computation and communication multi-cell wireless network network edge
下载PDF
ZTE Communications Special Issue on Wireless Data and Energy Integrated Communication Networks
18
《ZTE Communications》 2017年第2期66-66,共1页
In the vision of the incoming 5G era, billions of people as well as trillions of machines are expected to be connected by the next generation mobile network, as predicted by the standardisation body 5G-PPP (http://5g-... In the vision of the incoming 5G era, billions of people as well as trillions of machines are expected to be connected by the next generation mobile network, as predicted by the standardisation body 5G-PPP (http://5g-ppp.eu/). Functions of massive communication devices have been substantially limited by insufficient power supply. As an efficient solution,dedicated radio-frequency (RF) signals are capable of carrying well-controlled energy towards the rechargeable devices in order to achieve the on-demand energy transfer. However,enabling the wireless charging capability of RF signals may significantly influence the data transfer of the communication network. Although the RF signals are capable of simultaneously carrying both the data and energy, the diverse requirements of data and energy transfers pose huge challenges in their effective integration. For example, the energy receiver and the data receiver have diverse sensitivity to the received power. The received power as low as -80 dBm is sufficient for recovering the contaminated packet, thanks to thestate-of-the-art channel encoding/decoding techniques. However, only when the received power is higher than -20 dBm,the energy reception circuit can be effectively activated for converting a fraction of the energy carried by the RF signals to the direct current (DC). 展开更多
关键词 wireless networkS communication
下载PDF
THE NOVEL COMMUNICATION ALGORITHM AND THE THROUGHPUT ANALYSIS FOR WIRELESS SENSOR NETWORKS
19
作者 Yu Genjian Zheng Baoyu Xu Li 《Journal of Electronics(China)》 2007年第4期550-556,共7页
Aiming at the significance of the energy controls of wireless sensor networks, an economical energy consumption algorithm for wireless communicating in Wireless Sensor Networks (WSN) is presented. Based on the algorit... Aiming at the significance of the energy controls of wireless sensor networks, an economical energy consumption algorithm for wireless communicating in Wireless Sensor Networks (WSN) is presented. Based on the algorithm, the maximal system throughput of WSN is analyzed, and the upper bound of throughput of WSN is proposed and proved. Some numerical simulations are conducted and analyzed. The conclusions include that the transmitting radius of sensor node and the parameters of the energy cost function have significant influence upon the throughput, but the monitoring region radius has little influence. For the same transmitting distance, the more the hopping of information trans- mitting, the better the throughput of WSN. On the other hand, for the energy optimization of the whole WSN, the trade-off problem between the throughput capacity and the relay nodes is proposed, and the specific expression of relay hops that minimized the energy consumptions and the maximal throughput of WSN under the specific situation is derived. 展开更多
关键词 wireless Sensor networks (WSN) communication algorithm THROUGHPUT Energy cost function Trade-off
下载PDF
Study of Wireless Sensor Network Based on Optical Communication:Research Challenges and Current Results
20
作者 Xinrui Li Dandan Li 《Modern Electronic Technology》 2022年第1期33-37,共5页
With the rapid developments of commercial demands,a majority of ad­vanced researches have been investigated for the applications of underwa­ter wireless sensor(WSN)networks.Recently optical communication has... With the rapid developments of commercial demands,a majority of ad­vanced researches have been investigated for the applications of underwa­ter wireless sensor(WSN)networks.Recently optical communication has been considered for underwater wireless sensor network.An experimental set-up for testing optical communication underwater has been provided and designed in present papers to maximize the energy coupled from these displacements to the transduction mechanism that converts the mechanical energy into electrical.The true case has been considered by measuring dif­fuse attenuation coefficients in different seas.One stand out potential opti­cal communication method,Visible Light Communication(VLC)has been talked and several communication methods are compared from many points of view,for example attenuation in salt water.The evaluation of modula­tion techniques for underwater wireless optical communications has been displayed,and further how the data collection and storage with an under­water WSN is introduced.In this paper current researches for an(UWSN)based on optical communication are studied,in particular the potential VLC method and comparisons of VLC with other optical communication approaches.Underwater challenges would be analyzed by comparing a sort of communication methods,applied in underwater.Future work will be de­veloped at last. 展开更多
关键词 Underwater wireless Sensor network(UWSN) Visible Light communication(VLC) ACO-OFDM DCO-OFDM Line of Sight(LoS)
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部