In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The...In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation.展开更多
Multimedia data have become popularly transmitted content in opportunistic networks. A large amount of video data easily leads to a low delivery ratio. Breaking up these big data into small pieces or fragments is a re...Multimedia data have become popularly transmitted content in opportunistic networks. A large amount of video data easily leads to a low delivery ratio. Breaking up these big data into small pieces or fragments is a reasonable option. The size of the fragments is critical to transmission efficiency and should be adaptable to the communication capability of a network. We propose a novel communication capacity calculation model of opportunistic network based on the classical random direction mobile model, define the restrain facts model of overhead, and present an optimal fragment size algorithm. We also design and evaluate the methods and algorithms with video data fragments disseminated in a simulated environment. Experiment results verified the effectiveness of the network capability and the optimal fragment methods.展开更多
This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without c...This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without compromising the imperceptibility of the channels. Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert Vo IP communications. By taking into account the variation characteristics of Vo IP audio streams in the time domain, a hiding vector negotiation mechanism was suggested to achieve dynamic self-adaptive steganography in media streams. Experimental results on Vo IP steganography show that the proposed steganographic method effectively depicted the spatial and temporal characteristics of Vo IP audio streams, and enhanced robustness against detection of steganalysis tools, thereby improving the security of covert Vo IP communications.展开更多
基金financial support of National Natural Science Foundation of China(NSFC),No.U1705263 and 61971102GF Innovative Research Programthe Sichuan Science and Technology Program,No.2019YJ0194。
文摘In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation.
基金supported by the Shaanxi Natural Science Foundation Research Plan (No. 2015JQ6238)the China Scholarship Council+3 种基金the National Natural Science Foundation of China(Nos. 61373083 and 61402273)the Fundamental Research Funds for the Central Universities of China (No. GK201401002)the Program of Shaanxi Science and Technology Innovation Team of China (No. 2014KTC18)the 111 Programme of Introducing Talents of Discipline to Universities (No. B16031)
文摘Multimedia data have become popularly transmitted content in opportunistic networks. A large amount of video data easily leads to a low delivery ratio. Breaking up these big data into small pieces or fragments is a reasonable option. The size of the fragments is critical to transmission efficiency and should be adaptable to the communication capability of a network. We propose a novel communication capacity calculation model of opportunistic network based on the classical random direction mobile model, define the restrain facts model of overhead, and present an optimal fragment size algorithm. We also design and evaluate the methods and algorithms with video data fragments disseminated in a simulated environment. Experiment results verified the effectiveness of the network capability and the optimal fragment methods.
基金supported by the National Natural Science Foundation of China(Grant Nos.61271392U1405254&61272469)the British Government(Grant No.ktp008263)
文摘This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without compromising the imperceptibility of the channels. Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert Vo IP communications. By taking into account the variation characteristics of Vo IP audio streams in the time domain, a hiding vector negotiation mechanism was suggested to achieve dynamic self-adaptive steganography in media streams. Experimental results on Vo IP steganography show that the proposed steganographic method effectively depicted the spatial and temporal characteristics of Vo IP audio streams, and enhanced robustness against detection of steganalysis tools, thereby improving the security of covert Vo IP communications.