wireless communication network
Recently Published Documents


TOTAL DOCUMENTS

298
(FIVE YEARS 117)

H-INDEX

12
(FIVE YEARS 3)

2022 ◽  
Vol 2022 ◽  
pp. 1-8
Author(s):  
Ruicheng Li ◽  
Heng Chen

Nowadays, individuals with and without technical knowledge have started utilizing the technology to a broader extent. The utilization of technology has gone deeper concerning gadgets that aid in wireless communication with anyone or anything. This advancement has paved the way for a trending technology named wireless communication network (WCN) in recent years. In addition to this, there has been a significant change and development in the field of trading goods. Manual ordering of goods has changed to online ordering, and hence, supply chain management. This research focuses on applying WCN to a logistic tracking information system (LTIS) for a university with automatic control of the system. A novel algorithm named intelligent logistics system construction algorithm is implemented to evaluate the efficiency and performance of data. This model aids in the tracking goods and automatic control of university logistics.


2022 ◽  
Vol 2022 ◽  
pp. 1-11
Author(s):  
Hongyi Wang ◽  
Meichang Zhang

The sublevel caving method without sill pillar is used to improve the cost of mining. The analysis is performed according to unique geographical environment and the current mining technology of the mine. The wireless communication network is used to budget and control the work cost of mining. Simulation operation about unit explosive dosage, fan-shaped deep hole interval, hole bottom distance, and collapse step distance is performed. Experiments have shown that budget and control of the cost of mining workers with wireless communication technology can manage mining data and guide the design of mining data.


Author(s):  
Prince Breja

Abstract: The fifth-generation (5G) mobile network system is the next huge thing in the world of mobile communication. With the rapid development of wireless communication network, It is expected that a fifth-generation network system will provide seamlessly higher data transfer speeds and various capabilities. 5G has evolved in such a way that it can be beneficial for each and every individual who is using it by giving them an ultimate experience. In this article we give a brief overview on working of the electromagnetic spectrum of 5G and its various applications and at the end, the overall opportunities arise in the 5G network system on the basis of their applications. Keywords: 5G Communication, Network, working, speed, Application, Evolution, MIMO,3GPP


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Wei Zhang ◽  
Xiangwen Deng ◽  
Jie Cai

With the advent of the era of big data, people have higher requirements for material and spiritual gains and happiness, and their demands for various services in the communications field are diversified. The most significant change is the 3D printing technology. With its unique advantages, 3D printing is gradually sweeping the world. In order to explore whether the technology or digital model based on wireless network communication can realize the automation and intelligence of 3D printing, this article applies a variety of scientific methods such as simulation experiment method, data collection method, and sample analysis method; collects samples; and simplifies the algorithm, using basic experimental methods, orthogonal experiments, and single-factor experiments to study the various influencing factors in the automatic printing process to obtain the optimal parameter combination. Experimental results show that with the support of wireless communication network hardware and data, the timeliness and quality of 3D printing can be significantly improved. These are the basis for realizing 3D printing automation and intelligence. Further experiments show that the wireless communication network intelligent automatic 3D printing machinery adjusts 3D printing parameters through wireless communication technology, combined with intelligent real-time monitoring and sensing equipment; we can find that the printing efficiency of the 3D printing machinery is increased by about 15%, and the economic cost is saved by about 20%. It basically shows the practicality of the experimental research results.


Author(s):  
M. Khaleel Ullah Khan ◽  

This paper propose a method to design an “Intelligent Transportation System” for forecasting wireless communication network issues with cyber attacks. Wireless communication networks(WCN) is a broadly classified and critical gateway for any communication devices because the wireless communication networks is operated at various frequency ranges in different locations. In order to maintain its performance and also to prevent any attacks due to its high data handling, we need an Intelligent transportation system (ITS) to analyse and detect the cyber-attacks before going to implement it in real time transportation. In general wireless communication networks is an IEEE 802.11 standard which can be operated at physical Transfer control protocol/Internet protocol(TCP/IP) layer as well OSI model. In this paper a novel approach to design, analyse and detect cyber-attacks is proposed for wireless communication networks transport system, called Intelligent transportation system (ITS) based cyber-attack detection. Stacked firewall system is used for reducing fake attacks and detecting real time attacks in transportation system. Hence any fake attacks or real time attacks captured by the ITS will be informed to the system controller to make decision to whether it is a false-positive or real attack. ITS is the main process of the stacked firewall system which in turn take responsible to control, maintain, and prevent any cyber-attack.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Xin Liu

The wireless communication network has a huge promotion effect on data processing. As an important standard for internet data transmission, XML markup language is currently widely used in the internet. The rapid development of XML has brought fresh blood to the research of database. This article is aimed at studying the application of wireless network communication in the storage of the XML metadata database of Wushu Historical Archives. One part uses data load-balancing algorithms and two-way path constraint algorithms to conduct research on the metadata storage of XML databases, such as document size, document loading, and document query. Combining wireless technology and comparing with SGML and HTML, it highlights the flexibility and importance of XML database. The other part analyzes the XML database of Wushu Historical Archives itself and uses questionnaire surveys combined with the experience of 30 users randomly checked to provide constructive suggestions for the construction of XML database, such as strengthening the operation page design, text, and graphics. The experimental results show that the time consumed by the XML database in the case of bidirectional path indexing is 0.37 s, and the time consumed in the case of unidirectional path indexing is 0.27 s. This data shows that the application of wireless network communication technology has played an important role in the easy update and flexibility of the XML database. The data load capacity presented by the two path indexes is inconsistent; the current experience of XML database mainly focuses on the copy of the database quantity.


2021 ◽  
Author(s):  
Xavier Alejandro Flores Cabezas ◽  
Diana Pamela Moya Osorio ◽  
Matti Latva-aho

Abstract Unmanned Aerial Vehicles (UAVs) are becoming increasingly attractive for the ambitious expectations for 5G and beyond networks due to their several benefits. Indeed, UAV-assisted communications introduce a new range of challenges and opportunities regarding the security of these networks. Thus, in this paper we explore the opportunities that UAVs can provide for physical layer security solutions. Particularly, we analize the secrecy performance of a ground wireless communication network assisted by two friendly UAV jammers in the presence of an eavesdropper. To tackle the secrecy performance of this system, we introduce a new area-based metric, the weighted secrecy coverage, that measures the improvement on the secrecy performance of a system over a certain physical area given by the introduction of friendly jamming. Herein, the optimal 3D positioning of the UAVs and the power allocation is addressed in order to maximize the WSC. For that purpose, we provide a Reinforcement Learning-based solution by modeling the positioning problem as a Multi-Armed Bandit problem over three positioning variables for the UAVs: angle, height and orbit radius. Our results show that there is a trade-off between expediency of the positioning of the UAVs to positions of better secrecy outcome and energy expenditure, and that the proposed algorithm efficiently converges into a stable state.


2021 ◽  
Vol 2083 (3) ◽  
pp. 032045
Author(s):  
Hongkun Liu ◽  
Nianci Wang ◽  
Sirong Liang

Abstract Aiming at the problems of traditional wireless communication network security vulnerability monitoring systems such as low monitoring accuracy and time-consuming, a machine learning-based intelligent monitoring system for wireless communication network security vulnerabilities is proposed. In the hardware design of the monitoring system, based on the overall architecture of the wireless communication network and the data characteristics of the wireless communication network, it is divided into a vulnerability data collection module, a vulnerability data scanning module, and a network security vulnerability intelligent monitoring module. In the vulnerability data collection module, the wireless data collector is used to collect vulnerability data in the vulnerability database, and according to the attributes of the vulnerability data, the XSS vulnerability detection plug-in is connected to the vulnerability scanner to scan for wireless communication network vulnerabilities; When the communication network vulnerability data signal is traced, the system session operation of monitoring the vulnerability data. The software part introduces the neural network algorithm in the machine learning intelligent algorithm to process the hidden data in the security vulnerability data. The experimental results show that the wireless communication network security vulnerability intelligent monitoring system based on machine learning can effectively improve the system monitoring accuracy and the efficiency of wireless communication network security vulnerability monitoring.


Sign in / Sign up

Export Citation Format

Share Document