Search scope:
排序: Display mode:
Beamforming and fronthaul compression design for intelligent reflecting surface aided cloud radio access Research Article
Yu ZHANG, Xuelu WU, Hong PENG, Caijun ZHONG, Xiaoming CHEN,yzhang@zjut.edu.cn,ph@zjut.edu.cn,caijunzhong@zju.edu.cn,chen_xiaoming@zju.edu.cn
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 1, Pages 31-46 doi: 10.1631/FITEE.2100307
Keywords: Cloud radio access network (C-RAN) Intelligent reflecting surface (IRS) Transmit beamforming Fronthaul
Joint uplink and downlink resource allocation for low-latency mobile virtual reality delivery in fog radioaccess networks Research Article
Tian DANG, Chenxi LIU, Xiqing LIU, Shi YAN,tiandang@bupt.edu.cn,chenxi.liu@bupt.edu.cn,liuxiqing@bupt.edu.cn,yanshi01@bupt.edu.cn
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 1, Pages 73-85 doi: 10.1631/FITEE.2100308
Keywords: Virtual reality delivery Fog radio access network (F-RAN) Round-trip latency Resource allocation
Tayyab MEHMOOD, Hina QAYYUM, Salman GHAFOOR
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2, Pages 300-306 doi: 10.1631/FITEE.1700056
A radio-over-fiber (RoF) distributed antenna system (DAS) architecture is proposed, where millimeterwave (mm-wave) signals are transmitted to four different radio access units (RAUs) arranged in a ringThe radio frequency (RF) signals are transmitted by polarization multiplexing a multi-wavelength source
Keywords: Radio over fiber Millimeter wave Radio access units
Resource allocation for network profit maximization in NOMA-based F-RANs: a game-theoretic approach Research Article
Xueyan CAO, Shi YAN, Hongming ZHANG
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 10, Pages 1546-1561 doi: 10.1631/FITEE.2100341
Keywords: Fog radio access network Non-orthogonal multiple access Game theory Cache placement Resource allocation
Intelligent radio access networks: architectures, key techniques, and experimental platforms Review Article
Zeyu WANG, Yaohua SUN, Shuo YUAN,sunyaohua@bupt.edu.cn
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 1, Pages 5-18 doi: 10.1631/FITEE.2100305
Keywords: Intelligent network architecture Artificial intelligence Experimental platforms
Generic user revocation systems for attribute-based encryption in cloud storage None
Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 11, Pages 1362-1384 doi: 10.1631/FITEE.1800405
Cloud-based storage is a service model for businesses and individual users that involves paid or freeBecause most cloud storage is provided by third-party service providers, the trust required for the cloudproviders and the shared multi-tenant environment present special challenges for data protection and accessonly protects data secrecy, but also has ciphertexts or decryption keys associated with fine-grained accessThis enforcement puts data access under control at each data item level.
Keywords: Attribute-based encryption Generic user revocation User privacy Cloud storage Access control
On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things Research Article
Xinyao WANG, Xuyan BAO, Yuzhen HUANG, Zhong ZHENG, Zesong FEI
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 2, Pages 259-274 doi: 10.1631/FITEE.2200188
Keywords: Cognitive radio network Physical layer security Cooperative multi-input multi-output (C-MIMO) Eigenspace-adaptive
Generic attribute revocation systems for attribute-based encryption in cloud storage Research Papers
Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6, Pages 773-786 doi: 10.1631/FITEE.1800512
Keywords: Attribute-based encryption Generic attribute revocation User privacy Cloud storage Access control
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers
Mukti PADHYA, Devesh C. JINWALA
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12, Pages 1717-1748 doi: 10.1631/FITEE.1800192
Keywords: Searchable encryption Cloud storage Key-aggregate encryption Data sharing
Design and Developing of the Network Device Driver on Embedded Access Point
Wang Zhili,Hu Aiqun,Song Yubo
Strategic Study of CAE 2005, Volume 7, Issue 10, Pages 91-94
This paper systematically introduces the main structure of network device driver based on embeddedWith the PCMCIA API, the software modules of embedded AP (access point) and the developing course areThe testing results of the network device driver are given at the end of the paper.
Keywords: embedded linux network device driver PCMCIA
The Design and Analysis of Embedded Internet Control System
Zong Qun,Li Ran,Wang Bo
Strategic Study of CAE 2005, Volume 7, Issue 5, Pages 53-56
An embedded Internet control system with embedded Internet nodes, of which the requirements and architecture is analyzed and studied, has been built up successfully and put into practice in REMS. Then the whole system is fully tested to prove that it can meet with the practical requirements well.
Keywords: embedded Internet control system REMS DS80C400 JAVA TINI
Shang LIU, Ishtiaq AHMAD, Ping ZHANG, Zhi ZHANG
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 5, Pages 674-684 doi: 10.1631/FITEE.1700081
Keywords: Massive multi-input multi-output Cognitive radio Relay network Transmission rate Power analysis
The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network
Cao Ping,Pei Wenjiang
Strategic Study of CAE 2005, Volume 7, Issue 12, Pages 78-82
Keywords: public wireless local area network port based network access control (802.1x) flexible authentication
Research Progress and Key Technologies of Quantum Network Systems
Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 80-95 doi: 10.15302/J-SSCAE-2023.06.010
Keywords: quantum information quantum network quantum cryptography network quantum cloud computing network quantum teleportation network
Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10, Pages 1665-1676 doi: 10.1631/FITEE.1700203
Keywords: Cognitive radio network Primary user emulation attack Subspace-based blind channel estimation Channel
Title Author Date Type Operation
Beamforming and fronthaul compression design for intelligent reflecting surface aided cloud radio access
Yu ZHANG, Xuelu WU, Hong PENG, Caijun ZHONG, Xiaoming CHEN,yzhang@zjut.edu.cn,ph@zjut.edu.cn,caijunzhong@zju.edu.cn,chen_xiaoming@zju.edu.cn
Journal Article
Joint uplink and downlink resource allocation for low-latency mobile virtual reality delivery in fog radioaccess networks
Tian DANG, Chenxi LIU, Xiqing LIU, Shi YAN,tiandang@bupt.edu.cn,chenxi.liu@bupt.edu.cn,liuxiqing@bupt.edu.cn,yanshi01@bupt.edu.cn
Journal Article
Polarizationmultiplexing based duplex radio-over-fiber link for millimeterwave signal transmission toa ring of multiple radio access units
Tayyab MEHMOOD, Hina QAYYUM, Salman GHAFOOR
Journal Article
Resource allocation for network profit maximization in NOMA-based F-RANs: a game-theoretic approach
Xueyan CAO, Shi YAN, Hongming ZHANG
Journal Article
Intelligent radio access networks: architectures, key techniques, and experimental platforms
Zeyu WANG, Yaohua SUN, Shuo YUAN,sunyaohua@bupt.edu.cn
Journal Article
Generic user revocation systems for attribute-based encryption in cloud storage
Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI
Journal Article
On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things
Xinyao WANG, Xuyan BAO, Yuzhen HUANG, Zhong ZHENG, Zesong FEI
Journal Article
Generic attribute revocation systems for attribute-based encryption in cloud storage
Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG
Journal Article
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data
Mukti PADHYA, Devesh C. JINWALA
Journal Article
Design and Developing of the Network Device Driver on Embedded Access Point
Wang Zhili,Hu Aiqun,Song Yubo
Journal Article
Multi-user rate and power analysis in a cognitive radio network with massive multi-input multi-output
Shang LIU, Ishtiaq AHMAD, Ping ZHANG, Zhi ZHANG
Journal Article
The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network
Cao Ping,Pei Wenjiang
Journal Article
Research Progress and Key Technologies of Quantum Network Systems
Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping
Journal Article