In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this neces...In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this necessitates effective management of computation and wireless resources tailored to the requirements of various services.The heterogeneity of computation resources and interference among shared wireless resources pose significant coordination and management challenges.To solve these problems,this work provides an overview of multi-dimensional resource management in 6G SIG RAN,including computation and wireless resource.Firstly it provides with a review of current investigations on computation and wireless resource management and an analysis of existing deficiencies and challenges.Then focusing on the provided challenges,the work proposes an MEC-based computation resource management scheme and a mixed numerology-based wireless resource management scheme.Furthermore,it outlines promising future technologies,including joint model-driven and data-driven resource management technology,and blockchain-based resource management technology within the 6G SIG network.The work also highlights remaining challenges,such as reducing communication costs associated with unstable ground-to-satellite links and overcoming barriers posed by spectrum isolation.Overall,this comprehensive approach aims to pave the way for efficient and effective resource management in future 6G networks.展开更多
It is difficult to improve both energy consumption and detection accuracy simultaneously,and even to obtain the trade-off between them,when detecting and tracking moving targets,especially for Underwater Wireless Sens...It is difficult to improve both energy consumption and detection accuracy simultaneously,and even to obtain the trade-off between them,when detecting and tracking moving targets,especially for Underwater Wireless Sensor Networks(UWSNs).To this end,this paper investigates the relationship between the Degree of Target Change(DoTC)and the detection period,as well as the impact of individual nodes.A Hierarchical Detection and Tracking Approach(HDTA)is proposed.Firstly,the network detection period is determined according to DoTC,which reflects the variation of target motion.Secondly,during the network detection period,each detection node calculates its own node detection period based on the detection mutual information.Taking DoTC as pheromone,an ant colony algorithm is proposed to adaptively adjust the network detection period.The simulation results show that the proposed HDTA with the optimizations of network level and node level significantly improves the detection accuracy by 25%and the network energy consumption by 10%simultaneously,compared to the traditional adaptive period detection schemes.展开更多
This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD...This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD)approach based on multi-agent deep reinforcement learning(MADRL).In high-dynamic and multi-target aviation communication environments,the rapid changes in channels make it difficult for sensors to accurately capture instantaneous channel state information.This poses a challenge to make centralized jamming decisions with single-agent deep reinforcement learning(DRL)approaches.In response,we design a distributed multi-agent decision architecture(DMADA).We formulate multi-jammer resource allocation as a multiagent Markov decision process(MDP)and propose a fingerprint-based double deep Q-Network(FBDDQN)algorithm for solving it.Each jammer functions as an agent that interacts with the environment in this framework.Through the design of a reasonable reward and training mechanism,our approach enables jammers to achieve distributed cooperation,significantly improving the jamming success rate while considering jamming power cost,and reducing the transmission rate of links.Our experimental results show the FBDDQN algorithm is superior to the baseline methods.展开更多
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of personnel.Most studies focus on optimizing base station deploym...In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of personnel.Most studies focus on optimizing base station deployment under the assumption of static obstacles,aiming to maximize the perception coverage of wireless RF(Radio Frequency)signals and reduce positioning blind spots.However,in practical security systems,obstacles are subject to change,necessitating the consideration of base station deployment in dynamic environments.Nevertheless,research in this area still needs to be conducted.This paper proposes a Dynamic Indoor Environment Beacon Deployment Algorithm(DIE-BDA)to address this problem.This algorithm considers the dynamic alterations in obstacle locations within the designated area.It determines the requisite number of base stations,the requisite time,and the area’s practical and overall signal coverage rates.The experimental results demonstrate that the algorithm can calculate the deployment strategy in 0.12 s following a change in obstacle positions.Experimental results show that the algorithm in this paper requires 0.12 s to compute the deployment strategy after the positions of obstacles change.With 13 base stations,it achieves an effective coverage rate of 93.5%and an overall coverage rate of 97.75%.The algorithm can rapidly compute a revised deployment strategy in response to changes in obstacle positions within security systems,thereby ensuring the efficacy of signal coverage.展开更多
Wireless Power Transmission(WPT)has been widely used to replenish energy for various rechargeable devices.The ElectroMagnetic Radiation(EMR)of WPT has attracted great attention of safety concerns.It is possible for th...Wireless Power Transmission(WPT)has been widely used to replenish energy for various rechargeable devices.The ElectroMagnetic Radiation(EMR)of WPT has attracted great attention of safety concerns.It is possible for the malicious attacker to launch the EMR attack by capturing multiple wireless chargers.Little work has studied the EMR attack itself.In this paper,we propose a realistic EMR hazard model,which outputs the diminishing marginal hazard with EMR,with adjustable parameters to the target entities.We formulate three EMR attack models,termed Cumulative EMR Attack(CEA),Overall EMR Attack(OEA)and Unsafety EMR Attack(UEA),and propose the performance guaranteed algorithm of EMR attack for each model.We conduct extensive simulations and field experiments on a testbed.The results show that the proposed algorithms can output the near-optimal solution with much less running time than the optimal algorithms.The results of field experiments in a small testbed show that the utilities of CEAA and OEAA are increased by 70.5%and 12.9%than the comparison algorithms,respectively.Moreover,the number of captured chargers of UEAA is 5.9%less than the comparison algorithms.Our simulations also show the designed algorithms can perform better in a large-scale charging network.展开更多
Wireless Sensor Networks(WSN)have gained significant attention over recent years due to their extensive applications in various domains such as environmentalmonitoring,healthcare systems,industrial automation,and smar...Wireless Sensor Networks(WSN)have gained significant attention over recent years due to their extensive applications in various domains such as environmentalmonitoring,healthcare systems,industrial automation,and smart cities.However,such networks are inherently vulnerable to different types of attacks because they operate in open environments with limited resources and constrained communication capabilities.Thepaper addresses challenges related to modeling and analysis of wireless sensor networks and their susceptibility to attacks.Its objective is to create versatile modeling tools capable of detecting attacks against network devices and identifying anomalies caused either by legitimate user errors or malicious activities.A proposed integrated approach for data collection,preprocessing,and analysis in WSN outlines a series of steps applicable throughout both the design phase and operation stage.This ensures effective detection of attacks and anomalies within WSNs.An introduced attackmodel specifies potential types of unauthorized network layer attacks targeting network nodes,transmitted data,and services offered by the WSN.Furthermore,a graph-based analytical framework was designed to detect attacks by evaluating real-time events from network nodes and determining if an attack is underway.Additionally,a simulation model based on sequences of imperative rules defining behaviors of both regular and compromised nodes is presented.Overall,this technique was experimentally verified using a segment of a WSN embedded in a smart city infrastructure,simulating a wormhole attack.Results demonstrate the viability and practical significance of the technique for enhancing future information security measures.Validation tests confirmed high levels of accuracy and efficiency when applied specifically to detecting wormhole attacks targeting routing protocols in WSNs.Precision and recall rates averaged above the benchmark value of 0.95,thus validating the broad applicability of the proposed models across varied scenarios.展开更多
To elucidate the effect of calcite-regulated activated carbon(AC)structure on low-temperature denitrification performance of SCR catalysts,this work prepared a series of Mn-Ce/De-AC-xCaCO_(3)(x is the calcite content ...To elucidate the effect of calcite-regulated activated carbon(AC)structure on low-temperature denitrification performance of SCR catalysts,this work prepared a series of Mn-Ce/De-AC-xCaCO_(3)(x is the calcite content in coal)catalysts were prepared by the incipient wetness impregnation method,followed by acid washing to remove calcium-containing minerals.Comprehensive characterization and low-temperature denitrification tests revealed that calcite-induced structural modulation of coal-derived AC significantly enhances catalytic activity.Specifically,NO conversion increased from 88.3%of Mn-Ce/De-AC to 91.7%of Mn-Ce/De-AC-1CaCO_(3)(210℃).The improved SCR denitrification activity results from the enhancement of physicochemical properties including higher Mn^(4+)content and Ce^(4+)/Ce^(3+)ratio,an abundance of chemisorbed oxygen and acidic sites,which could strengthen the SCR reaction pathways(richer NH_(3)activated species and bidentate nitrate active species).Therefore,NO removal is enhanced.展开更多
Metasurfaces offer exceptional capabilities for controlling electromagnetic waves,enabling the realization of unique electromagnetic properties.As communication technology continues to evolve,metasurfaces present prom...Metasurfaces offer exceptional capabilities for controlling electromagnetic waves,enabling the realization of unique electromagnetic properties.As communication technology continues to evolve,metasurfaces present promising applications in wireless communications.This paper reviews the latest advancements in metasurface research within the communication sector,explores metasurface-based wireless relay technologies,and summarizes various wireless communication methods employing different types of metasurfaces across diverse modulation schemes.This paper provides a detailed discussion on the design of wireless communication systems based on coding metasurfaces to simplify transmitter architecture,as well as the development of intelligent coding metasurfaces in the communication field.It also elaborates on the application of vector vortex light fields in metasurface communication.Finally,it offers a forward-looking perspective on wireless communication systems that incorporate coded metasurfaces.This review aims to furnish researchers with a thorough understanding of the current state and future directions of coded metasurface applications in communications.展开更多
Demand Side Management(DSM)is a vital issue in smart grids,given the time-varying user demand for electricity and power generation cost over a day.On the other hand,wireless communications with ubiquitous connectivity...Demand Side Management(DSM)is a vital issue in smart grids,given the time-varying user demand for electricity and power generation cost over a day.On the other hand,wireless communications with ubiquitous connectivity and low latency have emerged as a suitable option for smart grid.The design of any DSM system using a wireless network must consider the wireless link impairments,which is missing in existing literature.In this paper,we propose a DSM system using a Real-Time Pricing(RTP)mechanism and a wireless Neighborhood Area Network(NAN)with data transfer uncertainty.A Zigbee-based Internet of Things(IoT)model is considered for the communication infrastructure of the NAN.A sample NAN employing XBee and Raspberry Pi modules is also implemented in real-world settings to evaluate its reliability in transferring smart grid data over a wireless link.The proposed DSM system determines the optimal price corresponding to the optimum system welfare based on the two-way wireless communications among users,decision-makers,and energy providers.A novel cost function is adopted to reduce the impact of changes in user numbers on electricity prices.Simulation results indicate that the proposed system benefits users and energy providers.Furthermore,experimental results demonstrate that the success rate of data transfer significantly varies over the implemented wireless NAN,which can substantially impact the performance of the proposed DSM system.Further simulations are then carried out to quantify and analyze the impact of wireless communications on the electricity price,user welfare,and provider welfare.展开更多
Space-Based Solar Power(SBSP) presents a promising solution for achieving carbon neutrality and Renewable Electricity 100%(RE100) goals by offering a stable and continuous energy supply. However, its commercialization...Space-Based Solar Power(SBSP) presents a promising solution for achieving carbon neutrality and Renewable Electricity 100%(RE100) goals by offering a stable and continuous energy supply. However, its commercialization faces significant obstacles due to the technical challenges of long-distance microwave Wireless Power Transmission(WPT) from geostationary orbit. Even ground-based kilometer-scale WPT experiments remain difficult because of limited testing infrastructure, high costs, and strict electromagnetic wave regulations. Since the 1975 NASA-Raytheon experiment, which successfully recovered 30 kW of power over 1.55 km, there has been little progress in extending the transmission distance or increasing the retrieved power. This study proposes a cost-effective methodology for conducting long-range WPT experiments in constrained environments by utilizing existing infrastructure. A deep space antenna operating at 2.08 GHz with an output power of 2.3 kW and a gain of 55.3 dBi was used as the transmitter. Two test configurations were implemented: a 1.81 km ground-to-air test using an aerostat to elevate the receiver and a 1.82 km ground-to-ground test using a ladder truck positioned on a plateau. The rectenna consists of a lightweight 3×3 patch antenna array(0.9 m × 0.9 m), accompanied by a steering device and LED indicators to verify power reception. The aerostat-based test achieved a power density of 154.6 mW/m2, which corresponds to approximately 6.2% of the theoretical maximum. The performance gap is primarily attributed to near-field interference, detuning of the patch antenna, rectifier mismatch, and alignment issues. These limitations are expected to be mitigated through improved patch antenna fabrication, a transition from GaN to GaAs rectifiers optimized for lower input power, and the implementation of an automated alignment system. With these enhancements, the recovered power is expected to improve by approximately four to five times. The results demonstrate a practical and scalable framework for long-range WPT experiments under constrained conditions and provide key insights for advancing SBSP technology.展开更多
Founded in September 2020,the International SparkLink Alliance(iSLA)now has approximately 1,200 members in diverse sectors including terminals,homes,vehicles,manufacturing,transportation,finance and healthcare.The iSL...Founded in September 2020,the International SparkLink Alliance(iSLA)now has approximately 1,200 members in diverse sectors including terminals,homes,vehicles,manufacturing,transportation,finance and healthcare.The iSLA has established a technical standards system for wireless short-range communication covering full-stack standards such as the end-to-end protocol system.展开更多
In wireless sensor networks,ensuring communication security via specific emitter identification(SEI)is crucial.However,existing SEI methods are limited to closed-set scenarios and lack the ability to detect unknown de...In wireless sensor networks,ensuring communication security via specific emitter identification(SEI)is crucial.However,existing SEI methods are limited to closed-set scenarios and lack the ability to detect unknown devices and perform classincremental training.This study proposes a class-incremental open-set SEI approach.The open-set SEI model calculates radiofrequency fingerprints(RFFs)prototypes for known signals and employs a self-attention mechanism to enhance their discriminability.Detection thresholds are set through Gaussian fitting for each class.For class-incremental learning,the algorithm freezes the parameters of the previously trained model to initialize the new model.It designs specific losses:the RFFs extraction distribution difference loss and the prototype transformation distribution difference loss,which force the new model to retain old knowledge while learning new knowledge.The training loss enables learning of new class RFFs.Experimental results demonstrate that the open-set SEI model achieves state-of-theart performance and strong noise robustness.Moreover,the class-incremental learning algorithm effectively enables the model to retain old device RFFs knowledge,acquire new device RFFs knowledge,and detect unknown devices simultaneously.展开更多
基金supported by the National Key Research and Development Program of China(No.2021YFB2900504).
文摘In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this necessitates effective management of computation and wireless resources tailored to the requirements of various services.The heterogeneity of computation resources and interference among shared wireless resources pose significant coordination and management challenges.To solve these problems,this work provides an overview of multi-dimensional resource management in 6G SIG RAN,including computation and wireless resource.Firstly it provides with a review of current investigations on computation and wireless resource management and an analysis of existing deficiencies and challenges.Then focusing on the provided challenges,the work proposes an MEC-based computation resource management scheme and a mixed numerology-based wireless resource management scheme.Furthermore,it outlines promising future technologies,including joint model-driven and data-driven resource management technology,and blockchain-based resource management technology within the 6G SIG network.The work also highlights remaining challenges,such as reducing communication costs associated with unstable ground-to-satellite links and overcoming barriers posed by spectrum isolation.Overall,this comprehensive approach aims to pave the way for efficient and effective resource management in future 6G networks.
文摘It is difficult to improve both energy consumption and detection accuracy simultaneously,and even to obtain the trade-off between them,when detecting and tracking moving targets,especially for Underwater Wireless Sensor Networks(UWSNs).To this end,this paper investigates the relationship between the Degree of Target Change(DoTC)and the detection period,as well as the impact of individual nodes.A Hierarchical Detection and Tracking Approach(HDTA)is proposed.Firstly,the network detection period is determined according to DoTC,which reflects the variation of target motion.Secondly,during the network detection period,each detection node calculates its own node detection period based on the detection mutual information.Taking DoTC as pheromone,an ant colony algorithm is proposed to adaptively adjust the network detection period.The simulation results show that the proposed HDTA with the optimizations of network level and node level significantly improves the detection accuracy by 25%and the network energy consumption by 10%simultaneously,compared to the traditional adaptive period detection schemes.
基金supported in part by the National Natural Science Foundation of China(No.61906156).
文摘This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD)approach based on multi-agent deep reinforcement learning(MADRL).In high-dynamic and multi-target aviation communication environments,the rapid changes in channels make it difficult for sensors to accurately capture instantaneous channel state information.This poses a challenge to make centralized jamming decisions with single-agent deep reinforcement learning(DRL)approaches.In response,we design a distributed multi-agent decision architecture(DMADA).We formulate multi-jammer resource allocation as a multiagent Markov decision process(MDP)and propose a fingerprint-based double deep Q-Network(FBDDQN)algorithm for solving it.Each jammer functions as an agent that interacts with the environment in this framework.Through the design of a reasonable reward and training mechanism,our approach enables jammers to achieve distributed cooperation,significantly improving the jamming success rate while considering jamming power cost,and reducing the transmission rate of links.Our experimental results show the FBDDQN algorithm is superior to the baseline methods.
文摘In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of personnel.Most studies focus on optimizing base station deployment under the assumption of static obstacles,aiming to maximize the perception coverage of wireless RF(Radio Frequency)signals and reduce positioning blind spots.However,in practical security systems,obstacles are subject to change,necessitating the consideration of base station deployment in dynamic environments.Nevertheless,research in this area still needs to be conducted.This paper proposes a Dynamic Indoor Environment Beacon Deployment Algorithm(DIE-BDA)to address this problem.This algorithm considers the dynamic alterations in obstacle locations within the designated area.It determines the requisite number of base stations,the requisite time,and the area’s practical and overall signal coverage rates.The experimental results demonstrate that the algorithm can calculate the deployment strategy in 0.12 s following a change in obstacle positions.Experimental results show that the algorithm in this paper requires 0.12 s to compute the deployment strategy after the positions of obstacles change.With 13 base stations,it achieves an effective coverage rate of 93.5%and an overall coverage rate of 97.75%.The algorithm can rapidly compute a revised deployment strategy in response to changes in obstacle positions within security systems,thereby ensuring the efficacy of signal coverage.
基金supported by National Natural Science Foundation of China(No.62372249,No.62072254)Jiangsu Graduate Scientific Research Innovation Program(No.KYCX210796).
文摘Wireless Power Transmission(WPT)has been widely used to replenish energy for various rechargeable devices.The ElectroMagnetic Radiation(EMR)of WPT has attracted great attention of safety concerns.It is possible for the malicious attacker to launch the EMR attack by capturing multiple wireless chargers.Little work has studied the EMR attack itself.In this paper,we propose a realistic EMR hazard model,which outputs the diminishing marginal hazard with EMR,with adjustable parameters to the target entities.We formulate three EMR attack models,termed Cumulative EMR Attack(CEA),Overall EMR Attack(OEA)and Unsafety EMR Attack(UEA),and propose the performance guaranteed algorithm of EMR attack for each model.We conduct extensive simulations and field experiments on a testbed.The results show that the proposed algorithms can output the near-optimal solution with much less running time than the optimal algorithms.The results of field experiments in a small testbed show that the utilities of CEAA and OEAA are increased by 70.5%and 12.9%than the comparison algorithms,respectively.Moreover,the number of captured chargers of UEAA is 5.9%less than the comparison algorithms.Our simulations also show the designed algorithms can perform better in a large-scale charging network.
基金the International Scientific Complex“Astana”was funded by the Committee of Science of the Ministry of Science and Higher Education of the Republic of Kazakhstan(Grant No.AP19680345).
文摘Wireless Sensor Networks(WSN)have gained significant attention over recent years due to their extensive applications in various domains such as environmentalmonitoring,healthcare systems,industrial automation,and smart cities.However,such networks are inherently vulnerable to different types of attacks because they operate in open environments with limited resources and constrained communication capabilities.Thepaper addresses challenges related to modeling and analysis of wireless sensor networks and their susceptibility to attacks.Its objective is to create versatile modeling tools capable of detecting attacks against network devices and identifying anomalies caused either by legitimate user errors or malicious activities.A proposed integrated approach for data collection,preprocessing,and analysis in WSN outlines a series of steps applicable throughout both the design phase and operation stage.This ensures effective detection of attacks and anomalies within WSNs.An introduced attackmodel specifies potential types of unauthorized network layer attacks targeting network nodes,transmitted data,and services offered by the WSN.Furthermore,a graph-based analytical framework was designed to detect attacks by evaluating real-time events from network nodes and determining if an attack is underway.Additionally,a simulation model based on sequences of imperative rules defining behaviors of both regular and compromised nodes is presented.Overall,this technique was experimentally verified using a segment of a WSN embedded in a smart city infrastructure,simulating a wormhole attack.Results demonstrate the viability and practical significance of the technique for enhancing future information security measures.Validation tests confirmed high levels of accuracy and efficiency when applied specifically to detecting wormhole attacks targeting routing protocols in WSNs.Precision and recall rates averaged above the benchmark value of 0.95,thus validating the broad applicability of the proposed models across varied scenarios.
基金Supported by the Science and Technology Cooperation and Exchange special project of Cooperation of Shanxi Province(202404041101014)the Fundamental Research Program of Shanxi Province(202403021212333)+3 种基金the Joint Funds of the National Natural Science Foundation of China(U24A20555)the Lvliang Key R&D of University-Local Cooperation(2023XDHZ10)the Initiation Fund for Doctoral Research of Taiyuan University of Science and Technology(20242026)the Outstanding Doctor Funding Award of Shanxi Province(20242080).
文摘To elucidate the effect of calcite-regulated activated carbon(AC)structure on low-temperature denitrification performance of SCR catalysts,this work prepared a series of Mn-Ce/De-AC-xCaCO_(3)(x is the calcite content in coal)catalysts were prepared by the incipient wetness impregnation method,followed by acid washing to remove calcium-containing minerals.Comprehensive characterization and low-temperature denitrification tests revealed that calcite-induced structural modulation of coal-derived AC significantly enhances catalytic activity.Specifically,NO conversion increased from 88.3%of Mn-Ce/De-AC to 91.7%of Mn-Ce/De-AC-1CaCO_(3)(210℃).The improved SCR denitrification activity results from the enhancement of physicochemical properties including higher Mn^(4+)content and Ce^(4+)/Ce^(3+)ratio,an abundance of chemisorbed oxygen and acidic sites,which could strengthen the SCR reaction pathways(richer NH_(3)activated species and bidentate nitrate active species).Therefore,NO removal is enhanced.
基金supported in part by National Natural Science Foundation of China(U24A20307 and 62175224)in part by the science and technology innovation leading talent project of special support plan for high-level talents in Zhejiang Province(2021R52032)+2 种基金in part by the China Jiliang University Basic Research ExpensesZhejiang University Students Science and Technology Innovation Activity Plan-New Talent Plan(2024R409C054)in part by the Natural Science Foundation of Zhejiang Province under Grant(ZCLZ25F0502).
文摘Metasurfaces offer exceptional capabilities for controlling electromagnetic waves,enabling the realization of unique electromagnetic properties.As communication technology continues to evolve,metasurfaces present promising applications in wireless communications.This paper reviews the latest advancements in metasurface research within the communication sector,explores metasurface-based wireless relay technologies,and summarizes various wireless communication methods employing different types of metasurfaces across diverse modulation schemes.This paper provides a detailed discussion on the design of wireless communication systems based on coding metasurfaces to simplify transmitter architecture,as well as the development of intelligent coding metasurfaces in the communication field.It also elaborates on the application of vector vortex light fields in metasurface communication.Finally,it offers a forward-looking perspective on wireless communication systems that incorporate coded metasurfaces.This review aims to furnish researchers with a thorough understanding of the current state and future directions of coded metasurface applications in communications.
文摘Demand Side Management(DSM)is a vital issue in smart grids,given the time-varying user demand for electricity and power generation cost over a day.On the other hand,wireless communications with ubiquitous connectivity and low latency have emerged as a suitable option for smart grid.The design of any DSM system using a wireless network must consider the wireless link impairments,which is missing in existing literature.In this paper,we propose a DSM system using a Real-Time Pricing(RTP)mechanism and a wireless Neighborhood Area Network(NAN)with data transfer uncertainty.A Zigbee-based Internet of Things(IoT)model is considered for the communication infrastructure of the NAN.A sample NAN employing XBee and Raspberry Pi modules is also implemented in real-world settings to evaluate its reliability in transferring smart grid data over a wireless link.The proposed DSM system determines the optimal price corresponding to the optimum system welfare based on the two-way wireless communications among users,decision-makers,and energy providers.A novel cost function is adopted to reduce the impact of changes in user numbers on electricity prices.Simulation results indicate that the proposed system benefits users and energy providers.Furthermore,experimental results demonstrate that the success rate of data transfer significantly varies over the implemented wireless NAN,which can substantially impact the performance of the proposed DSM system.Further simulations are then carried out to quantify and analyze the impact of wireless communications on the electricity price,user welfare,and provider welfare.
文摘Space-Based Solar Power(SBSP) presents a promising solution for achieving carbon neutrality and Renewable Electricity 100%(RE100) goals by offering a stable and continuous energy supply. However, its commercialization faces significant obstacles due to the technical challenges of long-distance microwave Wireless Power Transmission(WPT) from geostationary orbit. Even ground-based kilometer-scale WPT experiments remain difficult because of limited testing infrastructure, high costs, and strict electromagnetic wave regulations. Since the 1975 NASA-Raytheon experiment, which successfully recovered 30 kW of power over 1.55 km, there has been little progress in extending the transmission distance or increasing the retrieved power. This study proposes a cost-effective methodology for conducting long-range WPT experiments in constrained environments by utilizing existing infrastructure. A deep space antenna operating at 2.08 GHz with an output power of 2.3 kW and a gain of 55.3 dBi was used as the transmitter. Two test configurations were implemented: a 1.81 km ground-to-air test using an aerostat to elevate the receiver and a 1.82 km ground-to-ground test using a ladder truck positioned on a plateau. The rectenna consists of a lightweight 3×3 patch antenna array(0.9 m × 0.9 m), accompanied by a steering device and LED indicators to verify power reception. The aerostat-based test achieved a power density of 154.6 mW/m2, which corresponds to approximately 6.2% of the theoretical maximum. The performance gap is primarily attributed to near-field interference, detuning of the patch antenna, rectifier mismatch, and alignment issues. These limitations are expected to be mitigated through improved patch antenna fabrication, a transition from GaN to GaAs rectifiers optimized for lower input power, and the implementation of an automated alignment system. With these enhancements, the recovered power is expected to improve by approximately four to five times. The results demonstrate a practical and scalable framework for long-range WPT experiments under constrained conditions and provide key insights for advancing SBSP technology.
文摘Founded in September 2020,the International SparkLink Alliance(iSLA)now has approximately 1,200 members in diverse sectors including terminals,homes,vehicles,manufacturing,transportation,finance and healthcare.The iSLA has established a technical standards system for wireless short-range communication covering full-stack standards such as the end-to-end protocol system.
基金supported by the National Natural Science Foundation of China(62371465)Taishan Scholar Project of Shandong Province(ts201511020)。
文摘In wireless sensor networks,ensuring communication security via specific emitter identification(SEI)is crucial.However,existing SEI methods are limited to closed-set scenarios and lack the ability to detect unknown devices and perform classincremental training.This study proposes a class-incremental open-set SEI approach.The open-set SEI model calculates radiofrequency fingerprints(RFFs)prototypes for known signals and employs a self-attention mechanism to enhance their discriminability.Detection thresholds are set through Gaussian fitting for each class.For class-incremental learning,the algorithm freezes the parameters of the previously trained model to initialize the new model.It designs specific losses:the RFFs extraction distribution difference loss and the prototype transformation distribution difference loss,which force the new model to retain old knowledge while learning new knowledge.The training loss enables learning of new class RFFs.Experimental results demonstrate that the open-set SEI model achieves state-of-theart performance and strong noise robustness.Moreover,the class-incremental learning algorithm effectively enables the model to retain old device RFFs knowledge,acquire new device RFFs knowledge,and detect unknown devices simultaneously.