期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Create Your Own Data and Energy Integrated Communication Network:A Brief Tutorial and a Prototype System 被引量:2
1
作者 Yali Zheng Yitian Zhang +2 位作者 Yang Wang Jie Hu Kun Yang 《China Communications》 SCIE CSCD 2020年第9期193-209,共17页
In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The... In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation. 展开更多
关键词 data and energy integrated communication network(DEIN) wireless power transfer(WPT) simultaneously wireless information and power transfer(SWIPT) RF charging hardware implementation
下载PDF
Optimization-Based Fragmental Transmission Method for Video Data in Opportunistic Networks 被引量:1
2
作者 Peng Li Xiaoming Wang +2 位作者 Junling Lu Lichen Zhang Zaobo He 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第4期389-399,共11页
Multimedia data have become popularly transmitted content in opportunistic networks. A large amount of video data easily leads to a low delivery ratio. Breaking up these big data into small pieces or fragments is a re... Multimedia data have become popularly transmitted content in opportunistic networks. A large amount of video data easily leads to a low delivery ratio. Breaking up these big data into small pieces or fragments is a reasonable option. The size of the fragments is critical to transmission efficiency and should be adaptable to the communication capability of a network. We propose a novel communication capacity calculation model of opportunistic network based on the classical random direction mobile model, define the restrain facts model of overhead, and present an optimal fragment size algorithm. We also design and evaluate the methods and algorithms with video data fragments disseminated in a simulated environment. Experiment results verified the effectiveness of the network capability and the optimal fragment methods. 展开更多
关键词 opportunistic network communication capabilities fragment video data
原文传递
Covert voice over internet protocol communications based on spatial model 被引量:3
3
作者 HUANG YongFeng TANG ShanYu 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2016年第1期117-127,共11页
This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without c... This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without compromising the imperceptibility of the channels. Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert Vo IP communications. By taking into account the variation characteristics of Vo IP audio streams in the time domain, a hiding vector negotiation mechanism was suggested to achieve dynamic self-adaptive steganography in media streams. Experimental results on Vo IP steganography show that the proposed steganographic method effectively depicted the spatial and temporal characteristics of Vo IP audio streams, and enhanced robustness against detection of steganalysis tools, thereby improving the security of covert Vo IP communications. 展开更多
关键词 covert communication multimedia networking Vo IP data security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部