EURASIP Journal on Wireless Communications and Networking

http://link.springer.com/journal/13638

List of Papers (Total 3,030)

Multi-objective virtual network embedding algorithm based on Q-learning and curiosity-driven

Network virtualization is a vital technology that helps overcome shortcomings such as network ossification of the current Internet architecture. However, virtual network embedding (VNE) involving the allocation of resources for heterogeneous virtual network requests (VNRs) on the substrate network (SN) is considered as NP-hard problem. VNE process may involve conflicting...

The cost calculation method of construction 3D printing aligned with internet of things

It is controversial that the cost of construction 3D printing is lower than the conventional construction in academic field. The reason is that some scholars have confused attributes between construction 3D printing and traditional construction. The cost calculation of construction 3D printing cannot follow the rules in conventional construction because construction 3D printing...

Realizing 5G vision through Cloud RAN: technologies, challenges, and trends

Achieving the fifth-generation (5G) vision will introduce new technology innovations and substantial changes in delivering cutting-edge applications and services in current mobile and cellular networks. The Cloud Radio Access Network (C-RAN) concept emerged as one of the most compelling architectures to meet the requirements of the 5G vision. In essence, C-RAN provides an...

A virtual grid-based real-time data collection algorithm for industrial wireless sensor networks

Industrial wireless sensor networks (IWSNs) have been widely used in many application scenarios, and data collection is an extremely significant part of IWSNs. Moreover, a mobile sink is widely used in industrial wireless sensor networks to collect sensory data and alleviate the “hot spot” problem effectively. However, usage of a mobile sink introduces some challenges, such as...

Improved demapping for channels with data-dependent noise

A new demapper is presented for communication channels that can be modeled with data-dependent noise on the received symbols. This includes optical and satellite channels with various types of distortion. The demapper incorporates the covariance information of the received symbol clusters to capture noise variation across the constellation and any dependency between the in-phase...

Spatial spectral and energy efficiencies of cellular networks limited by co-channel interference and path loss in Nakagami-m fading environment

A comprehensive framework for design of hexagonal cellular network system in terms of spatial spectral and energy efficiencies is presented. The communication environment in the system is assumed to be Nakagami-m fading coupled with simplified path loss model and co-channel interference. Three base station antenna configurations namely, omni, 120° and 60° are considered. Closed...

Research on mathematical model and calculation simulation of wireless sensor solar cells in Internet of Things

Wireless sensor is an important part of the Internet of Things, which uses solar cells as power supply. Therefore, it is of great significance to study the characteristics of solar cells. In this paper, a new mathematical model of photovoltaic power generation is established, and the tuning methods of light intensity, temperature, photocurrent, reverse current, and open-circuit...

Multi-domain SDN controller federation in hybrid FiWi-MANET networks

Traditionally, mobile ad hoc networks (MANET) and hybrid optical-wireless networks, also known as fiber-wireless (FiWi), have been considered disjointly and independently, with no synergic management solutions. The former has primarily focused on dispatching packets among mobile nodes in infrastructure-less and very dynamic environments, the latter on offering high-bandwidth and...

The research of query expansion based on medical terms reweighting in medical information retrieval

In recent years, information retrieval technology is widely used in the medical industry. How to effectively retrieve electronic medical record has become a hot issue in the field of information retrieval. Medical terms occupy an important position in the electronic medical record (EMR) retrieval, and they are usually used to limit the retrieval conditions, so they suggest the...

Hybrid energy-efficient APTEEN protocol based on ant colony algorithm in wireless sensor network

Due to the limited energy of the sensor nodes, the unreasonable clustering routing algorithm will cause node premature death and low utilization of energy efficiency in wireless sensor network (WSN). In Adaptive Threshold-sensitive Energy Efficient Network (APTEEN), the assignments of the cluster head (CH) are much heavier than other nodes. The CH unbalanced energy dissipation...

A chaotic simulated annealing and particle swarm improved artificial immune algorithm for flexible job shop scheduling problem

Reasonable scheduling of flexible job shop is key to improve production efficiency and economic benefits; in order to solve the problem in flexible job shop scheduling problem, a novel flexible job shop scheduling method based on improved artificial immune algorithm is proposed. Firstly, a mathematical model of the flexible job shop scheduling is established, and the total...

Dynamic analysis of a class of neutral delay model based on the Runge-Kutta algorithm

In this paper, we study the dynamics of a class of second-order neutral delay nonlinear models. This study is applicable to many fields, such as engineering, cybernetics, and physics. We use the Runge-Kutta algorithm and the Riccati transform method. First, we give a neutral delay nonlinear model based on the Runge-Kutta algorithm. Then, we study the dynamic characteristics of...

Data collection in sensornets with heterogeneous duty cycles: pursuit of efficient opportunity

For sensornets with heterogeneous duty cycles, sensor nodes wake up with different sleeping periods, which combined with unreliable links, making it very challenging to enhance the network performance. This paper presents a new opportunistic routing protocol, called EOF (Efficient Opportunistic Forwarding), which mainly involves a forwarding metric that can efficiently exploit...

Mapping hotspots and emerging trends of business model innovation under networking in Internet of Things

Networking in Internet of Things (IoT) has had an immeasurable impact on the existing business models. In this context, exploring the hotspots and trends of business model innovation has become particularly necessary. For the topic literature over the past 20 years retrieved from Science Citation Index and Social Sciences Citation Index databases, scientometrics with information...

Delay-aware tree construction and scheduling for data aggregation in duty-cycled wireless sensor networks

Data aggregation is one of the most essential operations in wireless sensor networks (WSNs), in which data from all sensor nodes is collected at a sink node. A lot of studies have been conducted to assure collision-free data delivery to the sink node, with the goal of minimizing aggregation delay. The minimum delay data aggregation problem gets more complex when recent WSNs have...

Vehicle target detection methods based on color fusion deformable part model

In this paper, the traditional vehicle target detection method is improved, and a vehicle target detection method based on color fusion deformable part model (DPM) is proposed. Firstly, the traffic image is conducted with HSI color space conversion, and then, the information of each channel in color space is extracted, the DPM of each channel is trained, and then the color fusion...

The modeling and simulation of collision protection system between the driver of non-motor vehicle and car door

Collision between the driver of non-motor vehicle and car door often happens when the car driver or the passenger in the parking car opens the door suddenly ignoring a non-motor vehicle passing by. The collision protection system is proposed by installing an airbag in the car door. When the collision accident between the driver of non-motor vehicle and the car is unavoidable, the...

Wideband partial response CPM demodulation via multirate frequency transformations and decision feedback equalization

■■■Continuous phase modulation (CPM) is a popular frequency modulation technique used in mobile communications due to its power efficiency and constant modulus properties. Conventional narrowband CPM demodulation employs the Viterbi algorithm after phase demodulation and requires that the phase states be rational and contain additive white noise. The complexity of the Viterbi...

Multi-mobile agent itinerary planning-based energy and fault aware data aggregation in wireless sensor networks

Mobile agent (MA)-based wireless sensor networks present a good alternative to the traditional client/server paradigm. Instead of sending the data gathered by each node to the sink as in client/server, MAs migrate to the sensor nodes (SNs) to collect data, thus reducing energy consumption and bandwidth usage. For MAs, to migrate among SNs, an itinerary should be planned before...

Current problems in China’s manufacturing and countermeasures for industry 4.0

Industry 4.0 was proposed by Germany, which will bring a revolution in manufacturing. How does China’s manufacturing sector deal with this revolution? The key is to identify problems and provide solutions. Based on the analysis of statistical data and the qualitative analysis, the paper carries out an in-depth analysis of current situation of China’s manufacturing. Then, main...

High-speed hardware architecture for implementations of multivariate signature generations on FPGAs

Multivariate signature belongs to Multivariate-Quadratic-Equations Public Key Cryptography (MPKC), which is secure to quantum computer attacks. Compared with RSA and ECC, it is required to speed up multivariate signature implementations. A high-speed hardware architecture for signature generations of a multivariate scheme is proposed in this paper. The main computations of...

Nearfield target localization with a few snapshots for sonar array

Sonars can be used for detection of targets located on the sea floor where the signal undergoes multipath propagations which may arise large localization errors. Besides, underwater environment is often highly unstable so that a large number of snapshots which means long time sampling are not reliable. In sonar systems, the wideband chirp signals are usually used. This paper...

Computer simulation of the entrepreneurial conduction in virtual e-business clusters

The development of virtual e-business cluster is an effective way to cultivate new industries and realize the transformation and upgrading of traditional industries. Based on computer simulation, in this paper, the conduction of entrepreneurial behavior of enterprises in the virtual e-business cluster on their network is studied, and simulation on conductive process and effect is...

Fuzzy Logic-based Virtual Cell Design in Ultra-Dense Networks

One of the main trends in the fifth generation (5G) cellular network is the bifurcation of systems that enable network densification. With this trend, ultra-dense networks (UDN) become a pillar technology to provide high data rates gains. However, these gains come at the expense of more complex interference and higher handover frequency. The user-centric virtual cell conception...

RTGOR: Reliability and Timeliness Guaranteed Opportunistic Routing in wireless sensor networks

Cyber-physical systems (CPSs) connect physical equipment and the information system to realize real-time perception and intelligent control of the equipment. With the rapid development of wireless sensors, wireless sensor networks (WSNs) now play a major role in CPS and have become a focus of research. However, WSNs in CPS face great challenges in ensuring the high reliability...