-
261
Comparative Study of Crosstalk Reduction Techniques in RF Printed Circuit Board Using FDTD Method
Published 2015-01-01Get full text
Article -
262
Development of a Family of Chaotic Systems with Infinite Equilibria and Its Application for Image Encryption
Published 2022-01-01“…The circuit simulation results coincide with the numerical simulation results, which verifies the circuit feasibility of the system. …”
Get full text
Article -
263
Distributed Box Particle Filtering for Target Tracking in Sensor Networks
Published 2015-07-01“…We propose a distributed BPF (d-BPF) that each sensor communicates with its direct neighbors to collaboratively estimate the states of the target. …”
Get full text
Article -
264
Formation Tracking for High-Order Time-Invariant Swarm Systems with Limited Energy and Fixed Topologies
Published 2020-01-01“…The current paper investigates design and analysis problems of formation tracking for high-order linear time-invariant swarm systems, where communication topologies among agents have leader-following structures and the whole energy supply is limited. …”
Get full text
Article -
265
-
266
A frailty model for intervention effectiveness against disease transmission when implemented with unobservable heterogeneity
Published 2018-01-01“…This makes the results in this paper valid for a wide spectrum of acute and chronic infectious diseases. Quantitative analysis by comparing numerical results shows that they are also robust with respect to assumptions on disease progression structure and distributions, such as with or without the latent period and the assumed distributions of latent and infectious periods.…”
Get full text
Article -
267
Cooperative secure transmission against collusive eavesdroppers in Internet of Things
Published 2020-06-01“…In addition, considering the energy limitation of Internet of Things devices, we propose a power allocation algorithm to minimize the total transmission power given the security requirements. The numerical results show the effectiveness of our schemes and are consistent with the theoretical analysis.…”
Get full text
Article -
268
-
269
A Double-Threshold Based Spectrum Allocation Algorithm in Cognitive Radio System
Published 2013-08-01“…Based on the spectrum allocation of Underlay model in cognitive radio systems,a double-threshold based spectrum allocation algorithm was proposed.Two signal-to-noise radio(SNR)thresholds were also given.If SNR is less than the small threshold,aiming to maximize the channel capacity of the primary users,some second users are chosen to cooperate with primary users to communicate data.If SNR is larger than the big threshold,considering to maximize the number of the second users accessing the spectrum,some second users are allowed to use the occupied spectrum with low power.If SNR is between the two thresholds,primary users occupy the spectrum alone.Simulation and numerical results illustrate the reliability of the theoretical analysis.…”
Get full text
Article -
270
Capacity effectiveness of multihop cellular based aggregation network model
Published 2008-01-01Get full text
Article -
271
Design of Highly Isolated Compact Antenna Array for MIMO Applications
Published 2014-01-01Get full text
Article -
272
Synchronization for a Class of Fractional-Order Hyperchaotic System and Its Application
Published 2012-01-01“…Numerical simulations coincide with the theoretical analysis.…”
Get full text
Article -
273
Stability Switches of Arbitrary High-Order Consensus in Multiagent Networks with Time Delays
Published 2013-01-01“…This paper presents stability switches analysis of arbitrary high-order consensus in multiagent networks with time delays. …”
Get full text
Article -
274
-
275
Resources Scheduling Algorithm in Power Wireless Private Network Based on SDON
Published 2017-01-01Get full text
Article -
276
Cache privacy protection strategy in content centric networking
Published 2015-12-01Get full text
Article -
277
-
278
Efficient Wireless Vibration Data Sensing and Signal Processing Technique Based on the Android Platform
Published 2014-09-01“…Recently, many researches on big-data sensing and analysis have been actively promoted. The big data, which is generated by the digital and networked environment, is referred to to form not only numerical data, but also large-scale data for storing image data and character. …”
Get full text
Article -
279
Wideband and UWB Antennas for Wireless Applications: A Comprehensive Review
Published 2017-01-01“…A comprehensive review concerning the geometry, the manufacturing technologies, the materials, and the numerical techniques, adopted for the analysis and design of wideband and ultrawideband (UWB) antennas for wireless applications, is presented. …”
Get full text
Article -
280
Interference Avoidance and Mitigation Techniques for Hybrid Satellite-Terrestrial Mobile Backhaul System
Published 2021-03-01“…One of the best ways is to assume that satellite and terrestrial segments share the same spectrum in order to utilize more eff ciently the scarce and expensive spectrum resource.The interference avoidance and mitigation technologies such as antenna arrays, multi-antenna communication technologies, intelligent backhaul nodes, interference-aware power allocation method, and licensed shared access (LSA) were deployed in a hybrid satellite-terrestrial mobile backhaul (MBH) system to demonstrated how to enhance the overall capacity of the hybrid system and reuse the spectrum at diff erent systems on a noninterfering basis.Through theoretical analysis and numerical simulations, it is observed that these interference avoidance and mitigation techniques mentioned above could be used eff ciently to meet the enormous capacity demands of future backhaul networks, off -load the terrestrial segment, manage intrasystem (terrestrial) and the intersystem (satellite-terrestrial) co-channel interference (CCI), lead to hardware costs and energy-consumption savings, and improve spectrum utilization eff ciency.…”
Get full text
Article