The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Full-duplex wireless communication is deemed to have remarkable application prospect for the possibility in enhancing the spectrum efficiency by 2 times. However, the strong transmitted leakage signal causes serious self-interference for the full-duplex system. To address this question, a new sectional type full-360° phase-shifter and a gm-tunable LNA are proposed for the feed-forward self-interference...
In this paper, we propose an improved design of expanding window fountain (EWF) codes over the binary input additive white Gaussian noise (BIAWGN) channels. The encoding process is modified to get almost regular variable node degree distributions. Compared with the conventional EWF codes, our proposed scheme can lower the error floor. Furthermore, we combine the EWF encoding process with unequal power...
Vehicular ad hoc networks (VANET) have attracted considerable attentions in recent times for promising applications like vehicular safety, traffic monitoring, etc. Due to fast topological change and frequent network disruption, multihop data dissemination is an important issue. In this paper, we propose a greedy intersection-based optimal routing protocol, in which we formulate the data forwarding...
Security plays an important role in wireless communication. While the cryptographic system is widely used in wireless communication, recent trends shift attention to security in some new ways. In this study, we propose a new strategy about how to identify and defense the impersonation attacks. The strategy utilize the transmission data information to generate the differential flag byte, establishing...
In this paper, a novel hierarchical modulation symbol sharing scheme for multiuser cellular networks is proposed. In order to achieve the maximum channel capacity, various modulation and coding schemes have been developed on Wireless Communication Systems. With good modulation and coding schemes, very high channel capacity could be achieved for 1-to-1 communication systems. Due to different channel...
This paper develops a modulated platform for the resource management of wireless public network to offer monthly analysis and comparison of data communication cards. The platform is consisted of three modules, namely the management module for public communication resource, operator bill module and distribution and measurement automation module. Compared with the conventional management platform, the...
In this work, by using random access and priority considerations we develop a mobile healthcare network. We assign 4 medical information priorities to the nodes of wireless body area network. Accurate and quick prioritization of personal healthcare information is crucial for making efficient and real-time decisions. We transfer the medical data to the access point in wireless body area network by...
With the rapid development of modern communication technology, the communication network environment becomes more and more complex. Aiming to meet the requirement of identifying the wireless signal, which is located in the same frequency band of WCDMA defining as an intelligent monitoring method based on spectral correlation has been identified effectively. Firstly, the power spectrum of the frequency...
With the rapid development of modern communication technology, communication networks become increasingly complex environment. In order to monitor if the wireless signal with the same frequency is illegal, this paper proposes a method of intelligent recognition to CDMA2000 based on spectral correlation. First, the power spectrum is used for initial comparison, then, we use spectral correlation to...
Currently, there are increasing demands for unmanned aerial vehicle (UAV) in urban application. UAV based on mobile communication network has further breached the limit of transmission distances. Taking into account the inherent characteristics of communication network infrastructures such as blind spots in distribution and space loss, this paper uses the wireless communication model of base station...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.