期刊文献+
共找到385篇文章
< 1 2 20 >
每页显示 20 50 100
System Performance of Wireless Sensor Network Using LoRa–Zigbee Hybrid Communication 被引量:4
1
作者 Van-Truong Truong Anand Nayyar Showkat Ahmad Lone 《Computers, Materials & Continua》 SCIE EI 2021年第8期1615-1635,共21页
Wireless sensor network(WSN)is considered as the fastest growing technology pattern in recent years because of its applicability in varied domains.Many sensor nodes with different sensing functionalities are deployed ... Wireless sensor network(WSN)is considered as the fastest growing technology pattern in recent years because of its applicability in varied domains.Many sensor nodes with different sensing functionalities are deployed in the monitoring area to collect suitable data and transmit it to the gateway.Ensuring communications in heterogeneous WSNs,is a critical issue that needs to be studied.In this research paper,we study the system performance of a heterogeneous WSN using LoRa–Zigbee hybrid communication.Specifically,two Zigbee sensor clusters and two LoRa sensor clusters are used and combined with two Zigbee-to-LoRa converters to communicate in a network managed by a LoRa gateway.The overall system integrates many different sensors in terms of types,communication protocols,and accuracy,which can be used in many applications in realistic environments such as on land,under water,or in the air.In addition to this,a synchronous management software on ThingSpeak Web server and Blynk app is designed.In the proposed system,the token ring protocol in Zigbee network and polling mechanism in LoRa network is used.The system can operate with a packet loss rate of less than 0.5%when the communication range of the Zigbee network is 630 m,and the communication range of the LoRa network is 3.7 km.On the basis of the digital results collected on the management software,this study proves tremendous improvements in the system performance. 展开更多
关键词 wireless sensor network ZIGBEE LoRa communication protocol CONVERTER packet loss
下载PDF
Real-Time Monitoring System for Rotor Temperature of a Large Turbogenerator Based on SmartMesh IP Wireless Network Communication Technology 被引量:1
2
作者 Zhiting Zhou Hui Li +2 位作者 Yong Yang Haibo Zhang Zhennan Fan 《China Communications》 SCIE CSCD 2022年第5期150-163,共14页
In this study,a real-time rotor temperature monitoring system for large turbogenerators using SmartMesh IP wireless network communication technology was designed and tested.The system is capable of providing comprehen... In this study,a real-time rotor temperature monitoring system for large turbogenerators using SmartMesh IP wireless network communication technology was designed and tested.The system is capable of providing comprehensive,accurate,continuous,and reliable real-time temperature monitoring for turbogenerators.Additionally,it has demonstrated satisfactory results in a real-time monitoring test of the rotor temperature of various famous large-scale turbogenerators and giant nuclear power half-speed turbogenerators designed and manufactured in China.The development and application of this wireless temperature measurement system would aid in improving the intelligent operation quality,safety,and stability of China’s large turbine generators and even the entire power system. 展开更多
关键词 SmartMesh IP wireless network communication turbine generator rotor temperature realtime monitoring
下载PDF
FLBS: Fuzzy lion Bayes system for intrusion detection in wireless communication network
3
作者 NARENDRASINH B Gohil VDEVYAS Dwivedi 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第11期3017-3033,共17页
An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detecti... An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detection system (IDS). In this paper, the fuzzy lion Bayes system (FLBS) is proposed for intrusion detection mechanism. Initially, the data set is grouped into a number of clusters by the fuzzy clustering algorithm. Here, the Naive Bayes classifier is integrated with the lion optimization algorithm and the new lion naive Bayes (LNB) is created for optimally generating the probability measures. Then, the LNB model is applied to each data group, and the aggregated data is generated. After generating the aggregated data, the LNB model is applied to the aggregated data, and the abnormal nodes are identified based on the posterior probability function. The performance of the proposed FLBS system is evaluated using the KDD Cup 99 data and the comparative analysis is performed by the existing methods for the evaluation metrics accuracy and false acceptance rate (FAR). From the experimental results, it can be shown that the proposed system has the maximum performance, which shows the effectiveness of the proposed system in the intrusion detection. 展开更多
关键词 intrusion detection wireless communication network fuzzy clustering naive Bayes classifier lion naive Bayes system
下载PDF
Distribution algorithm of entangled particles for wireless quantum communication mesh networks
4
作者 王霄峻 施丽慧 +2 位作者 占海涛 项睿清 余旭涛 《Journal of Southeast University(English Edition)》 EI CAS 2015年第4期450-456,共7页
With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes ... With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes selection in order to save cost and reduce complexity. A minimum spanning tree( MST)-based quantum distribution algorithm( QDMST) is presented to construct the mesh backbone network. First, the articulation points are found,and for each connected block uncovered by the articulation points, the general centers are solved. Then, both articulation points and general centers are classified as backbone nodes and an M ST is formed. The quantum path between every two neighbor nodes on the MST is calculated. The nodes on these paths are also classified as backbone nodes. Simulation results validate the advantages of QDMST in the average backbone nodes number and average quantum channel distance compared to the existing random selection algorithm under multiple network scenarios. 展开更多
关键词 wireless quantum communication networks entangled particles distribution wireless mesh networks minimum spanning tree
下载PDF
Intelligent UAV Based Energy Supply for 6G Wireless Powered IoT Networks
5
作者 Miao Jiansong Chen Haoqiang +4 位作者 Wang Pengjie Li Hairui Zhao Yan Mu Junsheng Yan Shi 《China Communications》 SCIE CSCD 2024年第9期321-337,共17页
In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with... In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with a constant power supply,transmits energy to charge the IoT devices on the ground,whereas UAV-B serves the IoT devices by data collection as a base station.In this framework,the system's energy efficiency is maximized,which we define as a ratio of the sum rate of IoT devices to the energy consumption of two UAVs during a fixed working duration.With the constraints of duration,transmit power,energy,and mobility,a difficult non-convex issue is presented by optimizing the trajectory,time duration allocation,and uplink transmit power of concurrently.To tackle the non-convex fractional optimization issue,we deconstruct it into three subproblems and we solve each of them iteratively using the descent method in conjunction with sequential convex approximation(SCA)approaches and the Dinkelbach algorithm.The simulation findings indicate that the suggested cooperative design has the potential to greatly increase the energy efficiency of the 6G intelligent UAV-assisted wireless powered IoT system when compared to previous benchmark systems. 展开更多
关键词 6G wireless powered network energy efficiency IoT intelligent network UAV communication
下载PDF
Stackelberg Game for Wireless Powered and Backscattering Enabled Sensor Networks
6
作者 Lyu Bin Cao Yi +2 位作者 Wang Shuai Guo Haiyan Hao Chengyao 《China Communications》 SCIE CSCD 2024年第3期189-204,共16页
This paper investigates a wireless powered and backscattering enabled sensor network based on the non-linear energy harvesting model, where the power beacon(PB) delivers energy signals to wireless sensors to enable th... This paper investigates a wireless powered and backscattering enabled sensor network based on the non-linear energy harvesting model, where the power beacon(PB) delivers energy signals to wireless sensors to enable their passive backscattering and active transmission to the access point(AP). We propose an efficient time scheduling scheme for network performance enhancement, based on which each sensor can always harvest energy from the PB over the entire block except its time slots allocated for passive and active information delivery. Considering the PB and wireless sensors are from two selfish service providers, we use the Stackelberg game to model the energy interaction among them. To address the non-convexity of the leader-level problem, we propose to decompose the original problem into two subproblems and solve them iteratively in an alternating manner. Specifically, the successive convex approximation, semi-definite relaxation(SDR) and variable substitution techniques are applied to find a nearoptimal solution. To evaluate the performance loss caused by the interaction between two providers, we further investigate the social welfare maximization problem. Numerical results demonstrate that compared to the benchmark schemes, the proposed scheme can achieve up to 35.4% and 38.7% utility gain for the leader and the follower, respectively. 展开更多
关键词 backscatter communication energy interaction stackelberg game wireless powered sensor network
下载PDF
Design and performance analysis of wireless sensor network location node system for underground mine 被引量:10
7
作者 CHEN Guang-zhu SHEN Chun-feng ZHOU Li-juan 《Mining Science and Technology》 EI CAS 2009年第6期813-818,共6页
Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety... Aiming at the application of a wireless sensor network to locating miners in underground mine,we design a wireless sensor network location node system,considering the communication performance and the intrinsic safety. The location node system consists of a mobile node,several fixed nodes,and a sink node,all of whose circuits were designed based on CC2430. A varistor and a RC circuit were used in the reset circuit of a sensor node to guarantee the intrinsic safety by reducing discharge energy,the theoretical analysis of the discharge energy shows that the reset circuit is an intrinsic safety one. The analysis and simulation about the performance of the location node system are discussed,such as network communication delay and packet loss rate,the results show that the highest network communication delay of the system is about 0.11 seconds,and the highest packet loss rate is about 0.13,which assures the location node system has a high reliability,and can locate miners in the underground mine. 展开更多
关键词 wireless sensor network location node network communication delay packet loss rate
下载PDF
Constructing of wireless emergency communication system for underground coal mine based on WMN technology 被引量:7
8
作者 YANG Wei ZHANG Yu LIU Yang 《Journal of Coal Science & Engineering(China)》 2010年第4期441-448,共8页
Based on the Wireless Mesh Network (WMN), a wireless emergency communicationsystem for underground coal mine which was designed to be capable of videosurveillance, voice communication, and environment monitoring at th... Based on the Wireless Mesh Network (WMN), a wireless emergency communicationsystem for underground coal mine which was designed to be capable of videosurveillance, voice communication, and environment monitoring at the same time wasproposed.The network architecture of the system was proposed, and its service model,extensible technology, medium access control, routing algorithm, channel allocation andsystem management technologies were analyzed according to the actual rescue requirementsof underground coal mine and the characteristics of underground spatial structureand radio transmissions.The relevant theories and key technologies were extracted,which would provide theoretical support for the system development. 展开更多
关键词 coal mine wireless Mesh network (WMN) emergency rescue communication ser- vice model
下载PDF
Enhanced Energy Efficient Multipath Routing Protocol for Wireless Sensor Communication Networks Using Cuckoo Search Algorithm 被引量:1
9
作者 D. Antony Arul Raj P. Sumathi 《Wireless Sensor Network》 2014年第4期49-55,共7页
Energy efficient routing is one of the major thrust areas in Wireless Sensor Communication Networks (WSCNs) and it attracts most of the researchers by its valuable applications and various challenges. Wireless sensor ... Energy efficient routing is one of the major thrust areas in Wireless Sensor Communication Networks (WSCNs) and it attracts most of the researchers by its valuable applications and various challenges. Wireless sensor networks contain several nodes in its terrain region. Reducing the energy consumption over the WSCN has its significance since the nodes are battery powered. Various research methodologies were proposed by researchers in this area. One of the bio-inspired computing paradigms named Cuckoo search algorithm is used in this research work for finding the energy efficient path and routing is performed. Several performance metrics are taken into account for determining the performance of the proposed routing protocol such as throughput, packet delivery ratio, energy consumption and delay. Simulation is performed using NS2 and the results shows that the proposed routing protocol is better in terms of average throughput, and average energy consumption. 展开更多
关键词 wireless Sensor communication networks CUCKOO SEARCH Algorithm AODV AOMDV
下载PDF
Deployment of Polar Codes for Mission-Critical Machine-Type Communication Over Wireless Networks
10
作者 Najib Ahmed Mohammed Ali Mohammed Mansoor +1 位作者 Rodina Binti Ahmad Saaidal Razalli Bin Azzuhri 《Computers, Materials & Continua》 SCIE EI 2022年第4期573-592,共20页
Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research hotspot.It is primarily characterized by communication that provides ultra-h... Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research hotspot.It is primarily characterized by communication that provides ultra-high reliability and very low latency to concurrently transmit short commands to a massive number of connected devices.While the reduction in physical(PHY)layer overhead and improvement in channel coding techniques are pivotal in reducing latency and improving reliability,the current wireless standards dedicated to support mcMTC rely heavily on adopting the bottom layers of general-purpose wireless standards and customizing only the upper layers.The mcMTC has a significant technical impact on the design of all layers of the communication protocol stack.In this paper,an innovative bottom-up approach has been proposed for mcMTC applications through PHY layer targeted at improving the transmission reliability by implementing ultra-reliable channel coding scheme in the PHY layer of IEEE 802.11a standard bearing in mind short packet transmission system.To achieve this aim,we analyzed and compared the channel coding performance of convolutional codes(CCs),low-density parity-check(LDPC)codes,and polar codes in wireless network on the condition of short data packet transmission.The Viterbi decoding algorithm(VA),logarithmic belief propagation(Log-BP)algorithm,and cyclic redundancy check(CRC)successive cancellation list(SCL)(CRC-SCL)decoding algorithm were adopted to CC,LDPC codes,and polar codes,respectively.Consequently,a new PHY layer for mcMTC has been proposed.The reliability of the proposed approach has been validated by simulation in terms of Bit error rate(BER)and packet error rate(PER)vs.signal-to-noise ratio(SNR).The simulation results demonstrate that the reliability of IEEE 802.11a standard has been significantly improved to be at PER=10−5 or even better with the implementation of polar codes.The results also show that the general-purpose wireless networks are prominent inproviding short packet mcMTC with the modification needed. 展开更多
关键词 Machine-type communication mission-critical applications MTC URLLC M2M wireless networks polar codes
下载PDF
Resource provisioning for computation and communication in multi-cell wireless networks
11
作者 Yang Xiumei Chen Huaxia Zhang Mengying 《High Technology Letters》 EI CAS 2021年第2期121-128,共8页
The convergence of computation and communication at network edges plays a significant role in coping with computation-intensive and delay-critical tasks.During the stage of network planning,the resource provisioning p... The convergence of computation and communication at network edges plays a significant role in coping with computation-intensive and delay-critical tasks.During the stage of network planning,the resource provisioning problem for edge nodes has to be investigated to provide prior information for future system configurations.This work focuses on how to quantify the computation capabilities of access points at network edges when provisioning resources of computation and communication in multi-cell wireless networks.The problem is formulated as a discrete and non-convex minimization problem,where practical constraints including delay requirements,the inter-cell interference,and resource allocation strategies are considered.An iterative algorithm is also developed based on decomposition theory and fractional programming to solve this problem.The analysis shows that the necessary computation capability needed for certain delay guarantee depends on resource allocation strategies for delay-critical tasks.For delay-tolerant tasks,it can be approximately estimated by a derived lower bound which ignores the scheduling strategy.The efficiency of the proposed algorithm is demonstrated using numerical results. 展开更多
关键词 resource provisioning computation and communication multi-cell wireless network network edge
下载PDF
THE NOVEL COMMUNICATION ALGORITHM AND THE THROUGHPUT ANALYSIS FOR WIRELESS SENSOR NETWORKS
12
作者 Yu Genjian Zheng Baoyu Xu Li 《Journal of Electronics(China)》 2007年第4期550-556,共7页
Aiming at the significance of the energy controls of wireless sensor networks, an economical energy consumption algorithm for wireless communicating in Wireless Sensor Networks (WSN) is presented. Based on the algorit... Aiming at the significance of the energy controls of wireless sensor networks, an economical energy consumption algorithm for wireless communicating in Wireless Sensor Networks (WSN) is presented. Based on the algorithm, the maximal system throughput of WSN is analyzed, and the upper bound of throughput of WSN is proposed and proved. Some numerical simulations are conducted and analyzed. The conclusions include that the transmitting radius of sensor node and the parameters of the energy cost function have significant influence upon the throughput, but the monitoring region radius has little influence. For the same transmitting distance, the more the hopping of information trans- mitting, the better the throughput of WSN. On the other hand, for the energy optimization of the whole WSN, the trade-off problem between the throughput capacity and the relay nodes is proposed, and the specific expression of relay hops that minimized the energy consumptions and the maximal throughput of WSN under the specific situation is derived. 展开更多
关键词 wireless Sensor networks (WSN) communication algorithm THROUGHPUT Energy cost function Trade-off
下载PDF
Cooperative algorithm for improving network connectivity in clustered wireless sensor networks
13
作者 李文峰 邵震洪 沈连丰 《Journal of Southeast University(English Edition)》 EI CAS 2011年第1期1-7,共7页
In order to improve network connectivity in clustered wireless sensor networks,a node cooperative algorithm based on virtual antenna arrays is proposed.All the nodes in the network are assumed to be clustered via Pois... In order to improve network connectivity in clustered wireless sensor networks,a node cooperative algorithm based on virtual antenna arrays is proposed.All the nodes in the network are assumed to be clustered via Poisson Voronoi tessellation(PVT).The activation of the node cooperative algorithm is determined by the cluster heads(CHs) according to communication links.When the cooperative algorithm is activated,the CH selects cooperative nodes(CNs) from its members to form a virtual antenna array.With the cooperation,nodes can extend the inter-cluster communication range to directly contact with further nodes after a coverage hole is detected,or compensate for channel gains while inter-cluster transmission fails due to deep channel fading.Simulation results show that the proposed algorithm achieves better network connectivity and energy efficiency.It can reduce outage probability,sustain network connectivity and maintain operations as long as possible,which prolongs network operation time. 展开更多
关键词 wireless sensor network COVERAGE cooperative communication operation time
下载PDF
Distributed wireless quantum communication networks with partially entangled pairs 被引量:9
14
作者 余旭涛 张在琛 徐进 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第1期66-73,共8页
Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks ... Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks with partially entangled pairs. A quantum routing scheme with multi-hop teleportation is proposed. With the proposed scheme, is not necessary for the quantum path to be consistent with the classical path. The quantum path and its associated classical path are established in a distributed way. Direct multi-hop teleportation is conducted on the selected path to transfer a quantum state from the source to the destination. Based on the feature of multi-hop teleportation using partially entangled pairs, if the node number of the quantum path is even, the destination node will add another teleportation at itself. We simulated the performance of distributed wireless quantum communication networks with a partially entangled state. The probability of transferring the quantum state successfully is statistically analyzed. Our work shows that multi-hop teleportation on distributed wireless quantum networks with partially entangled pairs is feasible. 展开更多
关键词 distributed wireless quantum communication networks partially entangled pairs routing multi-hop teleportation
下载PDF
Event-Triggered Differentially Private Average Consensus for Multi-agent Network 被引量:14
15
作者 Aijuan Wang Xiaofeng Liao Haibo He 《IEEE/CAA Journal of Automatica Sinica》 EI CSCD 2019年第1期75-83,共9页
This paper investigates the differentially private problem of the average consensus for a class of discrete-time multi-agent network systems(MANSs). Based on the MANSs,a new distributed differentially private consensu... This paper investigates the differentially private problem of the average consensus for a class of discrete-time multi-agent network systems(MANSs). Based on the MANSs,a new distributed differentially private consensus algorithm(DPCA) is developed. To avoid continuous communication between neighboring agents, a kind of intermittent communication strategy depending on an event-triggered function is established in our DPCA. Based on our algorithm, we carry out the detailed analysis including its convergence, its accuracy, its privacy and the trade-off between the accuracy and the privacy level, respectively. It is found that our algorithm preserves the privacy of initial states of all agents in the whole process of consensus computation. The trade-off motivates us to find the best achievable accuracy of our algorithm under the free parameters and the fixed privacy level. Finally, numerical experiment results testify the validity of our theoretical analysis. 展开更多
关键词 Average consensus differentially private event-triggered communication multi-agent network systems (MANSs)
下载PDF
Call for Papers--Feature Topic Vol. 22, No. 3, 2025 Special Issue of China Communications: Convergence of 6G empowered Edge Intelligence and Generative AI: Theories, Algorithms, and Applications
16
《China Communications》 SCIE CSCD 2024年第4期I0002-I0002,共1页
Generative artificial intelligence(AI), as an emerging paradigm in content generation, has demonstrated its great potentials in creating high-fidelity data including images, texts, and videos. Nowadays wireless networ... Generative artificial intelligence(AI), as an emerging paradigm in content generation, has demonstrated its great potentials in creating high-fidelity data including images, texts, and videos. Nowadays wireless networks and applications have been rapidly evolving from achieving “connected things” to embracing “connected intelligence”. 展开更多
关键词 communicationS wireless networks
下载PDF
Incentive Scheme for Slice Cooperation Based on D2D Communication in 5G Networks 被引量:5
17
作者 Qian Sun Lin Tian +2 位作者 Yiqing Zhou Jinglin Shi Zongshuai Zhang 《China Communications》 SCIE CSCD 2020年第1期28-41,共14页
In the 5th generation(5G)wireless communication networks,network slicing emerges where network operators(NPs)form isolated logical slices by the same cellular network infrastructure and spectrum resource.In coverage r... In the 5th generation(5G)wireless communication networks,network slicing emerges where network operators(NPs)form isolated logical slices by the same cellular network infrastructure and spectrum resource.In coverage regions of access points(APs)shared by slices,device to device(D2D)communication can occur among different slices,i.e.,one device acts as D2D relay for another device serving by a different slice,which is defined as slice cooperation in this paper.Since selfish slices will not help other slices by cooperation voluntarily and unconditionally,this paper designs a novel resource allocation scheme to stimulate slice cooperation.The main idea is to encourage slice to perform cooperation for other slices by rewarding it with higher throughput.The proposed incentive scheme for slice cooperation is formulated by an optimal problem,where cooperative activities are introduced to the objective function.Since optimal solutions of the formulated problem are long term statistics,though can be obtained,a practical online slice scheduling algorithm is designed,which can obtain optimal solutions of the formulated maximal problem.Lastly,the throughput isolation indexes are defined to evaluate isolation performance of slice.According to simulation results,the proposed incentive scheme for slice cooperation can stimulate slice cooperation effectively,and the isolation of slice is also simulated and discussed. 展开更多
关键词 slice cooperation incentive cooperation resource allocation for slice slice scheduling wireless communication networks
下载PDF
Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Application
18
作者 Ibraheem Al-Hejri Farag Azzedin +1 位作者 Sultan Almuhammadi Naeem Firdous Syed 《Computers, Materials & Continua》 SCIE EI 2024年第6期4197-4218,共22页
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ... The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes. 展开更多
关键词 IoT LIGHTWEIGHT computation complexity communication overhead cybersecurity threats threat prevention secure data transmission wireless Sensor networks(WSNs) elliptic curve cryptography
下载PDF
Coal mine gas monitoring system based on wireless sensor network 被引量:2
19
作者 王建 王汝琳 +1 位作者 王学民 沈传河 《Journal of Coal Science & Engineering(China)》 2007年第1期107-111,共5页
Based on the nowadays' condition, it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems. The wireless sensors distributed in the environment can achieve... Based on the nowadays' condition, it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems. The wireless sensors distributed in the environment can achieve the intelligent gas monitoring system. Apply with multilayer data fuse to design working tactics, and import the artificial neural networks to analyze detecting result. The wireless sensors system communicates with the control center through the optical fiber cable. All the gas sensor nodes distributed in coal mine are combined into an intelligent, flexible structure wireless network system, forming coal mine gas monitoring system based on wireless sensor network. 展开更多
关键词 GAS communication system wireless sensor network data fuse artificial neural networks
下载PDF
Create Your Own Data and Energy Integrated Communication Network:A Brief Tutorial and a Prototype System 被引量:2
20
作者 Yali Zheng Yitian Zhang +2 位作者 Yang Wang Jie Hu Kun Yang 《China Communications》 SCIE CSCD 2020年第9期193-209,共17页
In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The... In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation. 展开更多
关键词 data and energy integrated communication network(DEIN) wireless power transfer(WPT) simultaneously wireless information and power transfer(SWIPT) RF charging hardware implementation
下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部