期刊文献+
共找到3,062篇文章
< 1 2 154 >
每页显示 20 50 100
Cooperative Relaying and Jamming Design for Secure LPWAN Wireless Communication
1
作者 Chen Dianxia Ma Xiaoshan +2 位作者 Yang Lin Yu Kan Feng Zhiyong 《China Communications》 2025年第4期100-116,共17页
Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed th... Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed that the global channel state information(CSI)of the eavesdroppers(Eves)was known beforehand,then the optimal relaying and jamming relays were determined.More importantly,the time complexity of selecting optimal jamming relay is O(N^(2)),where N is the maximum number of relays/Eves.In this paper,for the scenario where the source wants to exchange the message with the destination,via relaying scheme due to longer communication distance and limited transmission power,in the presence of multiple Eves,with the assumption of Eves'perfect CSI and average CSI,we propose two kinds of JRJS methods.In particular,the time complexity of finding the optimal jammer can be reduced to O(N).Furthermore,we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination.Finally,simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance. 展开更多
关键词 joint relay and jammer selection physical layer security secrecy outage probability
在线阅读 下载PDF
Stackelberg Game for Wireless Powered and Backscattering Enabled Sensor Networks
2
作者 Lyu Bin Cao Yi +2 位作者 Wang Shuai Guo Haiyan Hao Chengyao 《China Communications》 SCIE CSCD 2024年第3期189-204,共16页
This paper investigates a wireless powered and backscattering enabled sensor network based on the non-linear energy harvesting model, where the power beacon(PB) delivers energy signals to wireless sensors to enable th... This paper investigates a wireless powered and backscattering enabled sensor network based on the non-linear energy harvesting model, where the power beacon(PB) delivers energy signals to wireless sensors to enable their passive backscattering and active transmission to the access point(AP). We propose an efficient time scheduling scheme for network performance enhancement, based on which each sensor can always harvest energy from the PB over the entire block except its time slots allocated for passive and active information delivery. Considering the PB and wireless sensors are from two selfish service providers, we use the Stackelberg game to model the energy interaction among them. To address the non-convexity of the leader-level problem, we propose to decompose the original problem into two subproblems and solve them iteratively in an alternating manner. Specifically, the successive convex approximation, semi-definite relaxation(SDR) and variable substitution techniques are applied to find a nearoptimal solution. To evaluate the performance loss caused by the interaction between two providers, we further investigate the social welfare maximization problem. Numerical results demonstrate that compared to the benchmark schemes, the proposed scheme can achieve up to 35.4% and 38.7% utility gain for the leader and the follower, respectively. 展开更多
关键词 backscatter communication energy interaction stackelberg game wireless powered sensor network
在线阅读 下载PDF
Deep learning-based channel estimation for wireless ultraviolet MIMO communication systems 被引量:1
3
作者 ZHAO Taifei SUN Yuxin +1 位作者 Lü Xinzhe ZHANG Shuang 《Optoelectronics Letters》 EI 2024年第1期35-41,共7页
To solve the problems of pulse broadening and channel fading caused by atmospheric scattering and turbulence,multiple-input multiple-output(MIMO)technology is a valid way.A wireless ultraviolet(UV)MIMO channel estimat... To solve the problems of pulse broadening and channel fading caused by atmospheric scattering and turbulence,multiple-input multiple-output(MIMO)technology is a valid way.A wireless ultraviolet(UV)MIMO channel estimation approach based on deep learning is provided in this paper.The deep learning is used to convert the channel estimation into the image processing.By combining convolutional neural network(CNN)and attention mechanism(AM),the learning model is designed to extract the depth features of channel state information(CSI).The simulation results show that the approach proposed in this paper can perform channel estimation effectively for UV MIMO communication and can better suppress the fading caused by scattering and turbulence in the MIMO scattering channel. 展开更多
关键词 CHANNEL SCATTERING MIMO
原文传递
Intelligence Driven Wireless Networks in B5G and 6G Era:A Survey 被引量:2
4
作者 GAO Yin CHEN Jiajun LI Dapeng 《ZTE Communications》 2024年第3期99-105,共7页
As the wireless communication network undergoes continuous expansion,the challenges associated with network management and optimization are becoming increasingly complex.To address these challenges,the emerging artifi... As the wireless communication network undergoes continuous expansion,the challenges associated with network management and optimization are becoming increasingly complex.To address these challenges,the emerging artificial intelligence(AI)and machine learning(ML)technologies have been introduced as a powerful solution.They empower wireless networks to operate autonomously,predictively,ondemand,and with smart functionality,offering a promising resolution to intricate optimization problems.This paper aims to delve into the prevalent applications of AI/ML technologies in the optimization of wireless networks.The paper not only provides insights into the current landscape but also outlines our vision for the future and considerations regarding the development of an intelligent 6G network. 展开更多
关键词 intelligent network native AI load prediction trajectory prediction
在线阅读 下载PDF
Design and Implementation of Nonlinear Precoding for MIMO-SDMA Toward 6G Wireless
5
作者 Chaowu Wu Yue Xiao +1 位作者 Shu Fang Gang Wu 《China Communications》 SCIE CSCD 2024年第1期69-87,共19页
In this paper,we present a novel and robust nonlinear precoding(NLP)design and detection structure specifically tailored for multiple-input multipleoutput space division multiple access(MIMO-SDMA)systems toward 6G wir... In this paper,we present a novel and robust nonlinear precoding(NLP)design and detection structure specifically tailored for multiple-input multipleoutput space division multiple access(MIMO-SDMA)systems toward 6G wireless.Our approach aims to effectively mitigate the impact of imperfect channel estimation by leveraging the channel fluctuation mean square error(MSE)for reconstructing a highly accurate precoding matrix at the transmitter.Furthermore,we introduce a simplified receiver structure that eliminates the need for equalization,resulting in reduced interference and notable enhancements in overall system performance.We conduct both computer simulations and experimental tests to validate the efficacy of our proposed approach.The results reveals that the proposed NLP scheme offers significant performance improvements,making it particularly well-suited for the forthcoming 6G wireless. 展开更多
关键词 MIMO-SDMA nonlinear precoding Tomlinson-Harashima precoding(THP) vector perturbation(VP)
在线阅读 下载PDF
Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network
6
作者 Weidong Fang Wuxiong Zhang +3 位作者 QianQian Zhao Xiaohong Ji Wei Chen Biruk Assefa 《Computers, Materials & Continua》 SCIE EI 2019年第8期583-599,共17页
As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protoco... As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating,alternately,the aim at enhancing the security of data.The performances of the secure data aggregation protocols are the trade-off of several metrics,which involves the transmission/fusion,the energy efficiency and the security in Wireless Sensor Network(WSN).Unfortunately,there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN.In consideration of IWSN,we firstly review the security requirements and techniques in WSN data aggregation in this paper.Then,we give a holistic overview of the classical secure data aggregation protocols,which are divided into three categories:hop-by-hop encrypted data aggregation,end-to-end encrypted data aggregation and unencrypted secure data aggregation.Along this way,combining with the characteristics of industrial applications,we analyze the pros and cons of the existing security schemes in each category qualitatively,and realize that the security and the energy efficiency are suitable for IWSN.Finally,we make the conclusion about the techniques and approach in these categories,and highlight the future research directions of privacy preserving data aggregation in IWSN. 展开更多
关键词 Industrial wireless sensor network wireless sensor network cyber security secure data aggregation protocol
在线阅读 下载PDF
Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks 被引量:6
7
作者 Peng Li Chao Xu +2 位作者 He Xu Lu Dong Ruchuan Wang 《China Communications》 SCIE CSCD 2019年第5期158-170,共13页
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn... Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy. 展开更多
关键词 wireless sensor network PRIVACY PROTECTION SLICE TECHNOLOGY PRIVACY HOMOMORPHISM collection tree protocol
在线阅读 下载PDF
Channel Estimation and Throughput Evaluation for 5G Wireless Communication Systems in Various Scenarios on High Speed Railways 被引量:7
8
作者 yanrong zhao xiyu wang +3 位作者 gongpu wang ruisi he yulong zou zhuyan zhao 《China Communications》 SCIE CSCD 2018年第4期86-97,共12页
The fifth generation (5G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways (HSR) are important applications of 5G technologies. Existing stud- ies ... The fifth generation (5G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways (HSR) are important applications of 5G technologies. Existing stud- ies about 5G wireless systems on high speed railways (HSR) often utilize ideal channel parameters and are usually based on simple scenarios. In this paper, we evaluate the down- link throughput of 5G HSR communication systems on three typical scenarios including urban, cutting and viaduct with three different channel estimators. The channel parameters of each scenario are generated with tapped delay line (TDL) models through ray-tracing sim- ulations, which can be considered as a good match to practical situations. The channel estimators including least square (LS), linear minimum mean square error (LMMSE), and our proposed historical information based ba- sis expansion model (HiBEM). We analyze the performance of the HiBEM estimator in terms of mean square error (MSE) and evaluate the system throughputs with different channel estimates over each scenario. Simulation results are then provided to corroborate our proposed studies. It is shown that our HiBEM estimator outperforms other estimators and that the sys-tem throughput can reach the highest point in the viaduct scenario. 展开更多
关键词 5G channel estimation HSR tapped delay line throughput pertbrmanceanalysis wireless communication.
在线阅读 下载PDF
Online Computation Offloading and Trajectory Scheduling for UAV-Enabled Wireless Powered Mobile Edge Computing 被引量:6
9
作者 Han Hu Xiang Zhou +1 位作者 Qun Wang Rose Qingyang Hu 《China Communications》 SCIE CSCD 2022年第4期257-273,共17页
The unmanned aerial vehicle(UAV)-enabled mobile edge computing(MEC) architecture is expected to be a powerful technique to facilitate 5 G and beyond ubiquitous wireless connectivity and diverse vertical applications a... The unmanned aerial vehicle(UAV)-enabled mobile edge computing(MEC) architecture is expected to be a powerful technique to facilitate 5 G and beyond ubiquitous wireless connectivity and diverse vertical applications and services, anytime and anywhere. Wireless power transfer(WPT) is another promising technology to prolong the operation time of low-power wireless devices in the era of Internet of Things(IoT). However, the integration of WPT and UAV-enabled MEC systems is far from being well studied, especially in dynamic environments. In order to tackle this issue, this paper aims to investigate the stochastic computation offloading and trajectory scheduling for the UAV-enabled wireless powered MEC system. A UAV offers both RF wireless power transmission and computation services for IoT devices. Considering the stochastic task arrivals and random channel conditions, a long-term average energyefficiency(EE) minimization problem is formulated.Due to non-convexity and the time domain coupling of the variables in the formulated problem, a lowcomplexity online computation offloading and trajectory scheduling algorithm(OCOTSA) is proposed by exploiting Lyapunov optimization. Simulation results verify that there exists a balance between EE and the service delay, and demonstrate that the system EE performance obtained by the proposed scheme outperforms other benchmark schemes. 展开更多
关键词 energy efficiency mobile edge computing UAV-enabled wireless power transfer trajectorys cheduling
在线阅读 下载PDF
Traffic Characteristics Based Dynamic Radio Resource Management in Heterogeneous Wireless Networks 被引量:4
10
作者 WEN Juan SHENG Min ZHANG Yan WANG Xijun LI Yuzhou 《China Communications》 SCIE CSCD 2014年第1期1-11,共11页
The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy R... The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy Resource Management(SDHRM)algorithm exploiting the resources dynamically and intelligently is proposed with the consideration of tidal traffic.In network-level resource allocation,the proposed algorithm first adopts wavelet neural network to forecast the traffic of each sub-area and then allocates the resources to those sub-areas to maximise the network utility.In connection-level network selection,based on the above resource allocation and the pre-defined QoS requirement,three typical network selection policies are provided to assign traffic flow to the most appropriate network.Furthermore,based on multidimensional Markov model,we analyse the performance of SDHRM in HWNs with heavy tailed traffic.Numerical results show that our theoretical values coincide with the simulation results and the SDHRM can improve the resource utilization. 展开更多
关键词 heterogeneous wireless networks radio resource management multidimensional Markov analysis tidal traffic performance analysis
在线阅读 下载PDF
The Way to Apply Machine Learning to IoT Driven Wireless Network from Channel Perspective 被引量:6
11
作者 Wei Li Jianhua Zhang +3 位作者 Xiaochuan Ma Yuxiang Zhang Hua Huang Yongmei Cheng 《China Communications》 SCIE CSCD 2019年第1期148-164,共17页
Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning... Internet of Things(IoT) is one of the targeted application scenarios of fifth generation(5 G) wireless communication.IoT brings a large amount of data transported on the network.Considering those data,machine learning(ML) algorithms can be naturally utilized to make network efficiently and reliably.However,how to fully apply ML to IoT driven wireless network is still open.The fundamental reason is that wireless communication pursuits the high capacity and quality facing the challenges from the varying and fading wireless channel.So in this paper,we explore feasible combination for ML and IoT driven wireless network from wireless channel perspective.Firstly,a three-level structure of wireless channel fading features is defined in order to classify the versatile propagation environments.This three-layer structure includes scenario,meter and wavelength levels.Based on this structure,there are different tasks like service prediction and pushing,self-organization networking,self adapting largescale fading modeling and so on,which can be abstracted into problems like regression,classification,clustering,etc.Then,we introduce corresponding ML methods to different levelsfrom channel perspective,which makes their interdisciplinary research promisingly. 展开更多
关键词 5G Internet of THINGS MACHINE learning WIRELESS CHANNEL
在线阅读 下载PDF
Compressive Sensing Based Wireless Localization in Indoor Scenarios 被引量:3
12
作者 Cui Qimei Deng Jingang Zhang Xuefei 《China Communications》 SCIE CSCD 2012年第4期1-12,共12页
The sparse nature of location finding in the spatial domain makes it possible to exploit the Compressive Sensing (CS) theory for wireless location.CS-based location algorithm can largely reduce the number of online me... The sparse nature of location finding in the spatial domain makes it possible to exploit the Compressive Sensing (CS) theory for wireless location.CS-based location algorithm can largely reduce the number of online measurements while achieving a high level of localization accuracy,which makes the CS-based solution very attractive for indoor positioning.However,CS theory offers exact deterministic recovery of the sparse or compressible signals under two basic restriction conditions of sparsity and incoherence.In order to achieve a good recovery performance of sparse signals,CS-based solution needs to construct an efficient CS model.The model must satisfy the practical application requirements as well as following theoretical restrictions.In this paper,we propose two novel CS-based location solutions based on two different points of view:the CS-based algorithm with raising-dimension pre-processing and the CS-based algorithm with Minor Component Analysis (MCA).Analytical studies and simulations indicate that the proposed novel schemes achieve much higher localization accuracy. 展开更多
关键词 wireless localization fingerprinting compressive sensing minor component analysis received signal strength
在线阅读 下载PDF
RESEARCH ON ADAPTIVE COMPRESSION CODING FOR NETWORK CODING IN WIRELESS SENSOR NETWORK 被引量:4
13
作者 Liu Ying Yang Zhen +1 位作者 Mei Zhonghui Kong Yuanyuan 《Journal of Electronics(China)》 2012年第5期415-421,共7页
Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences ... Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences at the network coding node in the multi-sources and multi-receivers network in order to compress the data redundancy. Theoretical analysis and computer simulation results show that this proposed scheme not only further improves the efficiency of network transmission and enhances the throughput of the network, but also reduces the energy consumption of sensor nodes and extends the network life cycle. 展开更多
关键词 Network coding Wireless Sensor Network (WSN) Sequence similarity Sequence entropy
在线阅读 下载PDF
Directional neighbor discovery in mmWave wireless networks 被引量:3
14
作者 Yu Wang Ticao Zhang +1 位作者 Shiwen Mao Theodore(Ted)S.Rappaport 《Digital Communications and Networks》 SCIE CSCD 2021年第1期1-15,共15页
The directional neighbor discovery problem,i.e,spatial rendezvous,is a fundamental problem in millimeter wave(mmWave)wireless networks,where directional transmissions are used to overcome the high attenuation.The chal... The directional neighbor discovery problem,i.e,spatial rendezvous,is a fundamental problem in millimeter wave(mmWave)wireless networks,where directional transmissions are used to overcome the high attenuation.The challenge is how to let the transmitter and the receiver beams meet in space under deafness caused by directional transmission and reception,where no control channel,prior information,and coordination are available.In this paper,we present a Hunting based Directional Neighbor Discovery(HDND)scheme for ad hoc mmWave networks,where a node follows a unique sequence to determine its transmission or reception mode,and continuously r0-tates its directional beam to scan the neighborhood for other mmWave nodes.Through a rigorous analysis,we derive the conditions for ensured neighbor discovery,as well as a bound for the worst-case discovery time and the impact of sidelobes.We validate the analysis with extensive simulations and demonstrate the superior perfor-mance of the proposed scheme over several baseline schemes. 展开更多
关键词 Fifth generation(5G)wireless BEAMFORMING Spatial fltering Directional antenna Directional neighbor discovery Initial access Milimeter wave(mmWave)networks Spatial rendezvous
在线阅读 下载PDF
POWER CONTROL BASED COOPERATIVE OPPORTUNISTIC ROUTING IN WIRELESS SENSOR NETWORKS 被引量:4
15
作者 Hu Haifeng Zhu Qi 《Journal of Electronics(China)》 2009年第1期52-63,共12页
This paper proposes an approach called PC-CORP (Power Control based Cooperative Opportunistic Routing Protocol) for WSN (Wireless Sensor Networks), providing robustness to the random variations in network connectivity... This paper proposes an approach called PC-CORP (Power Control based Cooperative Opportunistic Routing Protocol) for WSN (Wireless Sensor Networks), providing robustness to the random variations in network connectivity while ensuring better data forwarding efficiency in an energy efficient manner. Based on the realistic radio model, we combine the region-based routing, rendezvous scheme, sleep discipline and cooperative communication together to model data forwarding by cross layer design in WSN. At the same time, a lightweight transmission power control algorithm called PC-AIMD (Power Control Additive Increase Multiplicative Decrease) is introduced to utilize the co- operation of relay nodes to improve the forwarding efficiency performance and increase the robustness of the routing protocol. In the simulation, the performance of PC-COPR is investigated in terms of the adaptation of variations in network connectivity and satisfying the QoS requirements of application. 展开更多
关键词 COOPERATIVE Opportunistic routing Power control Wireless Sensor Networks (WSN)
在线阅读 下载PDF
A Cooperative MIMO Transmission Scheme for Cluster-based Wireless Sensor Networks 被引量:3
16
作者 Ding Jie Liu Danpu Wu Huari 《China Communications》 SCIE CSCD 2010年第5期14-22,共9页
Wireless sensor network is becoming more and more popular in recent years, but energy- constrained characteristic of sensor nodes is one of the critical issues that we must consider in system design. In this paper, a ... Wireless sensor network is becoming more and more popular in recent years, but energy- constrained characteristic of sensor nodes is one of the critical issues that we must consider in system design. In this paper, a cluster-based virtual VBLAST transmission scheme is proposed to achieve energy savings for energy-constrained wireless sensor networks. In the proposed scheme, instead of using cluster member as cooperative nodes, multiple cluster heads cooperate to form virtual antenna array so that V-BLAST based virtual MIMO transmission can be implemented. Based on the communication energy consumption model, a way to optimize the parameters for the scheme is given. In addition, detailed simulation is performed to evaluate the performance of the proposed scheme for both densely and sparsely deployed sensor networks. Theoretical analysis and simulation results verify the energy efficiency of the proposed scheme. 展开更多
关键词 energy efficiency virtual MIMO VBLAST CLUSTER wireless sensor networks
在线阅读 下载PDF
A SDN-Based Energy Saving Strategy in Wireless Access Networks 被引量:2
17
作者 PENG Hongyu WANG Weidong +2 位作者 WANG Chaowei CHEN Gang ZHANG Yinghai 《China Communications》 SCIE CSCD 2015年第8期132-145,共14页
This paper investigates on the base stations(BSs) sleeping control and energy saving in wireless network. The objective is to find the sleeping control and energy saving configuration between total power consumption a... This paper investigates on the base stations(BSs) sleeping control and energy saving in wireless network. The objective is to find the sleeping control and energy saving configuration between total power consumption and average video's quality. On the Software Defined Network(SDN) access network architecture, a type of sleeping control and active BSs' optimal transmitting time strategy is considered, the BS sleeps when there is no active users, and wakes up after a period of vacation time. In this paper, we study the active users grouping strategy, In order to spare more BSs into sleeping mode. Then this paper proposes an active BS transmitting time optimal strategy according to the users' Qo S. In the proposed strategy, the active BSs' transmitting time is minimized in order to save energy. This paper employs the mixed integer-programming model to present this optimization problem. Then we utilized a novel algorithm to save the energy in access networks and also meet the Qo S requirements. Both the analytical and simulation results show that the algorithm can effectively save energy in the access network BSs. 展开更多
关键词 SDN wireless access network energy efficiency MOBILITY
在线阅读 下载PDF
State estimation with quantized innovations in wireless sensor networks: Gaussian mixture estimator and posterior Cramér–Rao lower bound 被引量:2
18
作者 Zhang Zhi Li Jianxun +2 位作者 Liu Liu Liu Zhaolei Han Shan 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第6期1735-1746,共12页
Since the features of low energy consumption and limited power supply are very impor- tant for wireless sensor networks (WSNs), the problems of distributed state estimation with quan- tized innovations are investiga... Since the features of low energy consumption and limited power supply are very impor- tant for wireless sensor networks (WSNs), the problems of distributed state estimation with quan- tized innovations are investigated in this paper. In the first place, the assumptions of prior and posterior probability density function (PDF) with quantized innovations in the previous papers are analyzed. After that, an innovative Gaussian mixture estimator is proposed. On this basis, this paper presents a Gaussian mixture state estimation algorithm based on quantized innovations for WSNs. In order to evaluate and compare the performance of this kind of state estimation algo- rithms for WSNs, the posterior Cram6r-Rao lower bound (CRLB) with quantized innovations is put forward. Performance analysis and simulations show that the proposed Gaussian mixture state estimation algorithm is efficient than the others under the same number of quantization levels and the performance of these algorithms can be benchmarked by the theoretical lower bound. 展开更多
关键词 Posterior Cramer-Rao lower bounds Quantiation State estimation Target tracking Wireless sensor network
原文传递
Efficient Scheduling with Random Network Coding in Multi-Relay Wireless Network 被引量:1
19
作者 丁良辉 毕琰 +2 位作者 孙大佳 杨峰 钱良 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第1期59-64,共6页
In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(... In this paper, we propose two novel efficient scheduling schemes with network coding in multi-relay wireless network to maximize the transmission efficiency. The first one uses adaptive forwarding with network coding(AF-NC), in which each relay adaptively calculates the number of packets having innovative information according to the feedback from the sink. With AF-NC, duplicate packets are not sent, and the total number of time slots needed to complete transmission can be significantly reduced. The second scheme, named adaptive forwarding with network coding and retransmission(AFR-NC), combines AF-NC with automatic repeat request(ARQ) to guarantee reliable end-to-end communication with limited resource occupation. Numerical results show that compared with simple forwarding with network coding(F-NC), AF-NC has close successful delivery rate with dramatically less time slots, while AFR-NC achieves strict reliability with limited resource cost. 展开更多
关键词 random network coding SCHEDULING automatic repeat request (ARQ) multi-relay wireless networks
原文传递
ENERGY EFFICIENT DISTRIBUTED STEGANOGRAPHY FOR SECURE COMMUNICATION IN WIRELESS MULTIMEDIA SENSOR NETWORKS 被引量:1
20
作者 Lin Qiaomin Wang Ruchuan +1 位作者 Ye Ning Wang Zhongqin 《Journal of Electronics(China)》 2013年第1期9-16,共8页
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give... A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously. 展开更多
关键词 Discrete Wavelet Transform (DWT) Distributed steganography Energy efficiency Perfect hash Wireless Multimedia Sensor Networks (WMSNs)
在线阅读 下载PDF
上一页 1 2 154 下一页 到第
使用帮助 返回顶部