The network coding is a new technology in the field of information in 21st century. It could enhance the network throughput and save the energy consumption, and is mainly based on the single transmission rate. However...The network coding is a new technology in the field of information in 21st century. It could enhance the network throughput and save the energy consumption, and is mainly based on the single transmission rate. However, with the development of wireless network and equipment, wireless local network MAC protocols have already supported the multi-rate transmission. This paper investigates the optimal relay selection problem based on network coding. Firstly, the problem is formulated as an optimization problem. Moreover, a relay algorithm based on network coding is proposed and the transmission time gain of our algorithm over the traditional relay algorithm is analyzed. Lastly, we compare total transmission time and the energy consumption of our proposed algorithm, Network Coding with Relay Assistance (NCRA), Transmission Request (TR), and the Direct Transmission (DT) without relay algorithm by adopting IEEE 802.11b. The simulation results demonstrate that our algorithm that improves the coding opportunity by the cooperation of the relay nodes leads to the transmission time decrease of up to 17% over the traditional relay algorithms.展开更多
This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The...This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The WLAN technology is used in the robot. It solves the problem of shielding generated by iron boiler and 11Mbps bandwidth made it possible for video and control stream real-time transmit within the same channel. Though TCP/IP protocol is robust, serial server is a transparent channel but cannot detect error and retransmit the data. In order to improve the reliability of serial communication, a new communication protocol is proposed. Key words boiler tubes - mobile robotics - wireless local area network Project Supported by the National High-Tech Program (Grant No. 2002AA420080)展开更多
This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then ...This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then becoming more and more extensive, the campus network will grow rapidly on wireless LAN applications especially the research and higher education institutions on the wireless LAN demand is increasing with wireless LAN will have a very broad market development space. GIS business circle analysis model is to determine business enterprise location or expand their existing business outlets of information necessary to say on the map by G1S visual function of the model. This paper makes the combination of the mentioned items that will then and later influence the performance of the model.展开更多
The sparse nature of location finding in the spatial domain makes it possible to exploit the Compressive Sensing (CS) theory for wireless location.CS-based location algorithm can largely reduce the number of online me...The sparse nature of location finding in the spatial domain makes it possible to exploit the Compressive Sensing (CS) theory for wireless location.CS-based location algorithm can largely reduce the number of online measurements while achieving a high level of localization accuracy,which makes the CS-based solution very attractive for indoor positioning.However,CS theory offers exact deterministic recovery of the sparse or compressible signals under two basic restriction conditions of sparsity and incoherence.In order to achieve a good recovery performance of sparse signals,CS-based solution needs to construct an efficient CS model.The model must satisfy the practical application requirements as well as following theoretical restrictions.In this paper,we propose two novel CS-based location solutions based on two different points of view:the CS-based algorithm with raising-dimension pre-processing and the CS-based algorithm with Minor Component Analysis (MCA).Analytical studies and simulations indicate that the proposed novel schemes achieve much higher localization accuracy.展开更多
The planning of wireless communication networks in underdeveloped countries is studied for landline telephone, fixed broadband wireless access and PLMN systems via investigation and discussion of the LDC networks' ch...The planning of wireless communication networks in underdeveloped countries is studied for landline telephone, fixed broadband wireless access and PLMN systems via investigation and discussion of the LDC networks' characteristic, technology selection, deployment consideration, network configuring, civil work evaluation and investment estimation. An example is embedded all through providing a general展开更多
The concept and the characteristic of spread spectrum technology of knowledge network based on information integration environment are given at first. And the basic principle of the wireless network of knowledge and i...The concept and the characteristic of spread spectrum technology of knowledge network based on information integration environment are given at first. And the basic principle of the wireless network of knowledge and information is recommended. Then a project alternatives using the spread spectrum technology and wireless network is given to build a across-the abroad knowledge network system.展开更多
In the wireless localization application, multipath propagation seriously affects the localization accuracy. This paper presents two algorithms to solve the multipath problem. Firstly, we improve the Line of Possible ...In the wireless localization application, multipath propagation seriously affects the localization accuracy. This paper presents two algorithms to solve the multipath problem. Firstly, we improve the Line of Possible Mobile Device(LPMD) algorithm by optimizing the utilization of the direct paths for single-bound scattering scenario. Secondly, the signal path reckoning method with the assistance of geographic information system is proposed to solve the problem of localization with multi-bound scattering paths. With the building model's idealization, the proposed method refers to the idea of ray tracing and dead reckoning. According to the rule of wireless signal reflection, the signal propagation path is reckoned using the measurements of emission angle and propagation distance, and then the estimated location can be obtained. Simulation shows that the proposed method obtains better results than the existing geometric localization methods in multipath environment when the angle error is controlled.展开更多
To solve the problem of variations in radio frequency characteristics among different devices,transfer learning is applied to transform device diversity to domain adaptation in the indoor localization algorithm.A robu...To solve the problem of variations in radio frequency characteristics among different devices,transfer learning is applied to transform device diversity to domain adaptation in the indoor localization algorithm.A robust indoor localization algorithm based on the aligned fingerprints and ensemble learning called correlation alignment for localization(CALoc)is proposed with low computational complexity.The second-order statistical properties of fingerprints in the offline and online phase are needed to be aligned.The real-time online calibration method mitigates the impact of device heterogeneity largely.Without any time-consuming deep learning retraining process,CALoc online only needs 0.11 s.The effectiveness and efficiency of CALoc are verified by realistic experiments.The results show that compared to the traditional algorithms,a significant performance gain is achieved and that it achieves better positioning accuracy with a 19%improvement.展开更多
With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to o...With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to overcome signal time-varying. A novel fingerprint positioning algorithm, known as the adaptive radio map with updated method based on hidden Markov model (HMM), is proposed. It is shown that by using a collection of user traces that can be cheaply obtained, the proposed algorithm can take advantage of these data to update the labeled calibration data to further improve the position estimation accuracy. This algorithm is a combination of machine learning, information gain theory and fingerprinting. By collecting data and testing the algorithm in a realistic indoor WLAN environment, the experiment results indicate that, compared with the widely used K nearest neighbor algorithm, the proposed algorithm can improve the positioning accuracy while greatly reduce the calibration effort.展开更多
For indoor location estimation based on received signal strength( RSS) in wireless local area networks( WLAN),in order to reduce the influence of noise on the positioning accuracy,a large number of RSS should be colle...For indoor location estimation based on received signal strength( RSS) in wireless local area networks( WLAN),in order to reduce the influence of noise on the positioning accuracy,a large number of RSS should be collected in offline phase. Therefore,collecting training data with positioning information is time consuming which becomes the bottleneck of WLAN indoor localization. In this paper,the traditional semisupervised learning method based on k-NN and ε-NN graph for reducing collection workload of offline phase are analyzed,and the result shows that the k-NN or ε-NN graph are sensitive to data noise,which limit the performance of semi-supervised learning WLAN indoor localization system. Aiming at the above problem,it proposes a l1-graph-algorithm-based semi-supervised learning( LG-SSL) indoor localization method in which the graph is built by l1-norm algorithm. In our system,it firstly labels the unlabeled data using LG-SSL and labeled data to build the Radio Map in offline training phase,and then uses LG-SSL to estimate user's location in online phase. Extensive experimental results show that,benefit from the robustness to noise and sparsity ofl1-graph,LG-SSL exhibits superior performance by effectively reducing the collection workload in offline phase and improving localization accuracy in online phase.展开更多
This work is about the development of a super low noise amplifier with minimum power consumption and high gain for several wireless applications.The amplifier operates at frequency bands of 0.9-2.4 GHz and can be used...This work is about the development of a super low noise amplifier with minimum power consumption and high gain for several wireless applications.The amplifier operates at frequency bands of 0.9-2.4 GHz and can be used in many applications like Wireless local area network(WLAN),WiFi,Bluetooth,ZigBee and Global System for mobile communications(GSM).This new design can be employed for the IEEE 802.15.4 standard in industrial,scientific and medical(ISM) Band.The enhancement mode pseudomorphic high electron mobility transistor PHEMT is used here due to its high linearity,better performance and less noisy operation.The common source inductive degeneration method is employed here to enhance the gain of amplifier.The amplifier produces a gain of more than 17 dB and noise figure of about 0.5 dB.The lower values of S11 and S22 reflect the accuracy of impedance matching network placed at the input and output sides of amplifier.Agilent Advance Design System(ADS) is used for the design and simulation purpose.Further the layout of design is developed on the FR4 substrate.展开更多
Mobile location using angle of arrival (AOA) measurements has received considerable attention. This paper presents an approximation of maximum likelihood estimator (MLE) for localizing a source based on AOA measur...Mobile location using angle of arrival (AOA) measurements has received considerable attention. This paper presents an approximation of maximum likelihood estimator (MLE) for localizing a source based on AOA measurements. By introducing an intermediate variable, the nonlinear equations relating AOA estimates can be transformed into a set of equations which are linear in the unknown parameters. It is an approximate realization of the MLE. Simulations show that the proposed algorithm outperforms the previous contribution.展开更多
In order to improve the performance of time difference of arrival(TDOA)localization,a nonlinear least squares algorithm is proposed in this paper.Firstly,based on the criterion of the minimized sum of square error of ...In order to improve the performance of time difference of arrival(TDOA)localization,a nonlinear least squares algorithm is proposed in this paper.Firstly,based on the criterion of the minimized sum of square error of time difference of arrival,the location estimation is expressed as an optimal problem of a non-linear programming.Then,an initial point is obtained using the semi-definite programming.And finally,the location is extracted from the local optimal solution acquired by Newton iterations.Simulation results show that when the number of anchor nodes is large,the performance of the proposed algorithm will be significantly better than that of semi-definite programming approach with the increase of measurement noise.展开更多
To guarantee the real-time transmission of a video stream, based on the stochastic optimal control method, a frame layer adaptive rate control algorithm for the wireless transcoder is proposed, which is capable of dyn...To guarantee the real-time transmission of a video stream, based on the stochastic optimal control method, a frame layer adaptive rate control algorithm for the wireless transcoder is proposed, which is capable of dynamically determining the transcoder's objective bit rate, according to the bandwidth variation of the wireless channel and the buffer occupancy. Then the transient performance, steady performance, and computational complexity of the algorithm are analyzed. Finally, the experiment results demonstrate that the algorithm can improve the synthetic performance of rate control through the compromise between the end-to-end delay and the playout quality.展开更多
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local ...IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection.展开更多
A novel link adaptation scheme using linear Auto Regressive (AR) model channel estimation algorithm to enhance the performance of auto rate selection mechanism in IEEE 802.11g is proposed. This scheme can overcome t...A novel link adaptation scheme using linear Auto Regressive (AR) model channel estimation algorithm to enhance the performance of auto rate selection mechanism in IEEE 802.11g is proposed. This scheme can overcome the low efficiency caused by time interval between the time when Received Signal Strength (RSS) is measured and the time when rate is selected. The best rate is selected based on data payload length, frame retry count and the estimated RSS, which is estimated from recorded RSSs. Simulation results show that the proposed scheme enhances mean throughput performance up to 7%, in saturation state, and up to 24% in finite load state compared with those non-estimation schemes, performance enhancements in average drop rate and average number of transmission attempts per data frame delivery also validate the effectiveness of the proposed schelne.展开更多
We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks(WLANs)in the presence of path l...We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks(WLANs)in the presence of path loss,Rayleigh fading and log-normal shadowing.For a data packet transmission,we formulate an optimization problem,solve the problem,and propose a rate and transmission power adaptation scheme with a restriction methodology of data packet transmission for achieving the optimal energy efficiency.In the restriction methodology of data packet transmission,a user does not transmit a data packet if the instantaneous channel gain of the user is lower than a threshold.To evaluate the performance of the proposed scheme,we develop analytical models for computing the throughput and energy efficiency of WLANs under the proposed scheme considering a saturation traffic condition.We then validate the analytical models via simulation.We find that the proposed scheme provides better throughput and energy efficiency with acceptable throughput fairness if the restriction methodology of data packet transmission is included.By means of the analytical models and simulations,we demonstrate that the proposed scheme provides significantly higher throughput,energy efficiency and fairness index than a traditional non-adaptive scheme and an existing most relevant adaptive scheme.Throughput and energy efficiency gains obtained by the proposed scheme with respect to the existing adapting scheme are about 75%and 103%,respectively,for a fairness index of 0.8.We also study the effect of various system parameters on throughput and energy efficiency and provide various engineering insights.展开更多
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries l...This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy.展开更多
Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is ...Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security.展开更多
A simple and compact microstrip-fed ultra wideband (UWB) printed monopole antenna is presented. The antenna is composed of a circular radiator and a finitely grounded plane. The antenna occupies about 16.62 GHz abso...A simple and compact microstrip-fed ultra wideband (UWB) printed monopole antenna is presented. The antenna is composed of a circular radiator and a finitely grounded plane. The antenna occupies about 16.62 GHz absolute bandwidth and 142.7% relative bandwidth covering from 3.38 GHz to 20 GHz with voltage standing wave ratio (VSWR) below two. A quasi-omnidirectional and quasi-symmetrical radiation pattern in H plane is obtained in the whole bandwidth. The high performance of the antenna is validated with measured and simulated results given. The antenna can be applied for the system design of UWB wireless communication.展开更多
基金Supported by Anhui Natural Science Foundation, China(No.1308085MF87, 128085MF89)Open Fund of State Key Laboratory for Novel Software Technology,Nanjing University,China (No.KFKT2011B18)Hefei University of Technology Ph.D. Foundation (No.2010HGBZ-0552)
文摘The network coding is a new technology in the field of information in 21st century. It could enhance the network throughput and save the energy consumption, and is mainly based on the single transmission rate. However, with the development of wireless network and equipment, wireless local network MAC protocols have already supported the multi-rate transmission. This paper investigates the optimal relay selection problem based on network coding. Firstly, the problem is formulated as an optimization problem. Moreover, a relay algorithm based on network coding is proposed and the transmission time gain of our algorithm over the traditional relay algorithm is analyzed. Lastly, we compare total transmission time and the energy consumption of our proposed algorithm, Network Coding with Relay Assistance (NCRA), Transmission Request (TR), and the Direct Transmission (DT) without relay algorithm by adopting IEEE 802.11b. The simulation results demonstrate that our algorithm that improves the coding opportunity by the cooperation of the relay nodes leads to the transmission time decrease of up to 17% over the traditional relay algorithms.
文摘This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The WLAN technology is used in the robot. It solves the problem of shielding generated by iron boiler and 11Mbps bandwidth made it possible for video and control stream real-time transmit within the same channel. Though TCP/IP protocol is robust, serial server is a transparent channel but cannot detect error and retransmit the data. In order to improve the reliability of serial communication, a new communication protocol is proposed. Key words boiler tubes - mobile robotics - wireless local area network Project Supported by the National High-Tech Program (Grant No. 2002AA420080)
文摘This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then becoming more and more extensive, the campus network will grow rapidly on wireless LAN applications especially the research and higher education institutions on the wireless LAN demand is increasing with wireless LAN will have a very broad market development space. GIS business circle analysis model is to determine business enterprise location or expand their existing business outlets of information necessary to say on the map by G1S visual function of the model. This paper makes the combination of the mentioned items that will then and later influence the performance of the model.
基金supported by the National Natural Science Foundation of China under Grant No.61001119the Fund for Creative Research Groups of China under Grant No.61121001
文摘The sparse nature of location finding in the spatial domain makes it possible to exploit the Compressive Sensing (CS) theory for wireless location.CS-based location algorithm can largely reduce the number of online measurements while achieving a high level of localization accuracy,which makes the CS-based solution very attractive for indoor positioning.However,CS theory offers exact deterministic recovery of the sparse or compressible signals under two basic restriction conditions of sparsity and incoherence.In order to achieve a good recovery performance of sparse signals,CS-based solution needs to construct an efficient CS model.The model must satisfy the practical application requirements as well as following theoretical restrictions.In this paper,we propose two novel CS-based location solutions based on two different points of view:the CS-based algorithm with raising-dimension pre-processing and the CS-based algorithm with Minor Component Analysis (MCA).Analytical studies and simulations indicate that the proposed novel schemes achieve much higher localization accuracy.
文摘The planning of wireless communication networks in underdeveloped countries is studied for landline telephone, fixed broadband wireless access and PLMN systems via investigation and discussion of the LDC networks' characteristic, technology selection, deployment consideration, network configuring, civil work evaluation and investment estimation. An example is embedded all through providing a general
基金This paper is supported by National Natural Science Foundation of China (NSFC) (No. 70472039, 70272023).
文摘The concept and the characteristic of spread spectrum technology of knowledge network based on information integration environment are given at first. And the basic principle of the wireless network of knowledge and information is recommended. Then a project alternatives using the spread spectrum technology and wireless network is given to build a across-the abroad knowledge network system.
基金supported by the National Natural Science Foundation of China (61471031)the Fundamental Research Funds for the Central Universities,Beijing Jiaotong University (2013JBZ001)+2 种基金National Science and Technology Major Project (2016ZX03001014006)the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University (No.2017D14)Shenzhen Peacock Program under Grant No.KQJSCX20160226193545
文摘In the wireless localization application, multipath propagation seriously affects the localization accuracy. This paper presents two algorithms to solve the multipath problem. Firstly, we improve the Line of Possible Mobile Device(LPMD) algorithm by optimizing the utilization of the direct paths for single-bound scattering scenario. Secondly, the signal path reckoning method with the assistance of geographic information system is proposed to solve the problem of localization with multi-bound scattering paths. With the building model's idealization, the proposed method refers to the idea of ray tracing and dead reckoning. According to the rule of wireless signal reflection, the signal propagation path is reckoned using the measurements of emission angle and propagation distance, and then the estimated location can be obtained. Simulation shows that the proposed method obtains better results than the existing geometric localization methods in multipath environment when the angle error is controlled.
基金The National Key Research and Development Program of China(No.2018YFB1802400)the National Natural Science Foundation of China(No.61571123)the Research Fund of National M obile Communications Research Laboratory,Southeast University(No.2020A03)
文摘To solve the problem of variations in radio frequency characteristics among different devices,transfer learning is applied to transform device diversity to domain adaptation in the indoor localization algorithm.A robust indoor localization algorithm based on the aligned fingerprints and ensemble learning called correlation alignment for localization(CALoc)is proposed with low computational complexity.The second-order statistical properties of fingerprints in the offline and online phase are needed to be aligned.The real-time online calibration method mitigates the impact of device heterogeneity largely.Without any time-consuming deep learning retraining process,CALoc online only needs 0.11 s.The effectiveness and efficiency of CALoc are verified by realistic experiments.The results show that compared to the traditional algorithms,a significant performance gain is achieved and that it achieves better positioning accuracy with a 19%improvement.
基金supported by the National Natural Science Foundation of China(61571162)the Major National Science and Technology Project(2014ZX03004003-005)
文摘With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to overcome signal time-varying. A novel fingerprint positioning algorithm, known as the adaptive radio map with updated method based on hidden Markov model (HMM), is proposed. It is shown that by using a collection of user traces that can be cheaply obtained, the proposed algorithm can take advantage of these data to update the labeled calibration data to further improve the position estimation accuracy. This algorithm is a combination of machine learning, information gain theory and fingerprinting. By collecting data and testing the algorithm in a realistic indoor WLAN environment, the experiment results indicate that, compared with the widely used K nearest neighbor algorithm, the proposed algorithm can improve the positioning accuracy while greatly reduce the calibration effort.
基金Sponsored by the National Natural Science Foundation of China(Grant No.61101122)the National High Technology Research and Development Program of China(Grant No.2012AA120802)the National Science and Technology Major Project of the Ministry of Science and Technology of China(Grant No.2012ZX03004-003)
文摘For indoor location estimation based on received signal strength( RSS) in wireless local area networks( WLAN),in order to reduce the influence of noise on the positioning accuracy,a large number of RSS should be collected in offline phase. Therefore,collecting training data with positioning information is time consuming which becomes the bottleneck of WLAN indoor localization. In this paper,the traditional semisupervised learning method based on k-NN and ε-NN graph for reducing collection workload of offline phase are analyzed,and the result shows that the k-NN or ε-NN graph are sensitive to data noise,which limit the performance of semi-supervised learning WLAN indoor localization system. Aiming at the above problem,it proposes a l1-graph-algorithm-based semi-supervised learning( LG-SSL) indoor localization method in which the graph is built by l1-norm algorithm. In our system,it firstly labels the unlabeled data using LG-SSL and labeled data to build the Radio Map in offline training phase,and then uses LG-SSL to estimate user's location in online phase. Extensive experimental results show that,benefit from the robustness to noise and sparsity ofl1-graph,LG-SSL exhibits superior performance by effectively reducing the collection workload in offline phase and improving localization accuracy in online phase.
基金supported by the National Natural Science Foundation of China(Grant no. 61202399,61571063)
文摘This work is about the development of a super low noise amplifier with minimum power consumption and high gain for several wireless applications.The amplifier operates at frequency bands of 0.9-2.4 GHz and can be used in many applications like Wireless local area network(WLAN),WiFi,Bluetooth,ZigBee and Global System for mobile communications(GSM).This new design can be employed for the IEEE 802.15.4 standard in industrial,scientific and medical(ISM) Band.The enhancement mode pseudomorphic high electron mobility transistor PHEMT is used here due to its high linearity,better performance and less noisy operation.The common source inductive degeneration method is employed here to enhance the gain of amplifier.The amplifier produces a gain of more than 17 dB and noise figure of about 0.5 dB.The lower values of S11 and S22 reflect the accuracy of impedance matching network placed at the input and output sides of amplifier.Agilent Advance Design System(ADS) is used for the design and simulation purpose.Further the layout of design is developed on the FR4 substrate.
文摘Mobile location using angle of arrival (AOA) measurements has received considerable attention. This paper presents an approximation of maximum likelihood estimator (MLE) for localizing a source based on AOA measurements. By introducing an intermediate variable, the nonlinear equations relating AOA estimates can be transformed into a set of equations which are linear in the unknown parameters. It is an approximate realization of the MLE. Simulations show that the proposed algorithm outperforms the previous contribution.
基金This study was supported by the“High level research and training project for professional leaders of teachers in Higher Vocational Colleges in Jiangsu Province”.
文摘In order to improve the performance of time difference of arrival(TDOA)localization,a nonlinear least squares algorithm is proposed in this paper.Firstly,based on the criterion of the minimized sum of square error of time difference of arrival,the location estimation is expressed as an optimal problem of a non-linear programming.Then,an initial point is obtained using the semi-definite programming.And finally,the location is extracted from the local optimal solution acquired by Newton iterations.Simulation results show that when the number of anchor nodes is large,the performance of the proposed algorithm will be significantly better than that of semi-definite programming approach with the increase of measurement noise.
基金the National High Technology Research and Development Program (2007AA1Z24002003AA1Z2210).
文摘To guarantee the real-time transmission of a video stream, based on the stochastic optimal control method, a frame layer adaptive rate control algorithm for the wireless transcoder is proposed, which is capable of dynamically determining the transcoder's objective bit rate, according to the bandwidth variation of the wireless channel and the buffer occupancy. Then the transient performance, steady performance, and computational complexity of the algorithm are analyzed. Finally, the experiment results demonstrate that the algorithm can improve the synthetic performance of rate control through the compromise between the end-to-end delay and the playout quality.
基金The manuscript APC is supported by the grant name(UMS No.DFK2005)“Smart Vertical farming Technology for Temperate vegetable cultivation in Sabah:practising smart automation system using IR and AI technology in agriculture 4.0”.
文摘IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection.
基金Partly supported by the National Hi-Tech Research and Development Program of China (863 Program) (No.2003AA143040).
文摘A novel link adaptation scheme using linear Auto Regressive (AR) model channel estimation algorithm to enhance the performance of auto rate selection mechanism in IEEE 802.11g is proposed. This scheme can overcome the low efficiency caused by time interval between the time when Received Signal Strength (RSS) is measured and the time when rate is selected. The best rate is selected based on data payload length, frame retry count and the estimated RSS, which is estimated from recorded RSSs. Simulation results show that the proposed scheme enhances mean throughput performance up to 7%, in saturation state, and up to 24% in finite load state compared with those non-estimation schemes, performance enhancements in average drop rate and average number of transmission attempts per data frame delivery also validate the effectiveness of the proposed schelne.
文摘We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks(WLANs)in the presence of path loss,Rayleigh fading and log-normal shadowing.For a data packet transmission,we formulate an optimization problem,solve the problem,and propose a rate and transmission power adaptation scheme with a restriction methodology of data packet transmission for achieving the optimal energy efficiency.In the restriction methodology of data packet transmission,a user does not transmit a data packet if the instantaneous channel gain of the user is lower than a threshold.To evaluate the performance of the proposed scheme,we develop analytical models for computing the throughput and energy efficiency of WLANs under the proposed scheme considering a saturation traffic condition.We then validate the analytical models via simulation.We find that the proposed scheme provides better throughput and energy efficiency with acceptable throughput fairness if the restriction methodology of data packet transmission is included.By means of the analytical models and simulations,we demonstrate that the proposed scheme provides significantly higher throughput,energy efficiency and fairness index than a traditional non-adaptive scheme and an existing most relevant adaptive scheme.Throughput and energy efficiency gains obtained by the proposed scheme with respect to the existing adapting scheme are about 75%and 103%,respectively,for a fairness index of 0.8.We also study the effect of various system parameters on throughput and energy efficiency and provide various engineering insights.
基金the National Science Council (No. NSC-99-2219-E-033-001)the Foundation of the Chung Yuan Christian University (1004) (No. CYCU-EECS.9801)
文摘This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy.
基金The National Basic Research Program of China(973Program) (No.G1999035805)the Natural Science Foundation of ShannxiProvince (No.2007F37)China Postdoctoral Science Foundation (No.20060401008,20070410376).
文摘Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security.
文摘A simple and compact microstrip-fed ultra wideband (UWB) printed monopole antenna is presented. The antenna is composed of a circular radiator and a finitely grounded plane. The antenna occupies about 16.62 GHz absolute bandwidth and 142.7% relative bandwidth covering from 3.38 GHz to 20 GHz with voltage standing wave ratio (VSWR) below two. A quasi-omnidirectional and quasi-symmetrical radiation pattern in H plane is obtained in the whole bandwidth. The high performance of the antenna is validated with measured and simulated results given. The antenna can be applied for the system design of UWB wireless communication.