With the increasing types of smart terminals in the power Internet of Things and the continuous improvement of the network environment, the communication services and communication protocols between various terminals ...
详细信息
The digital spread frequency watermark identity authentication based on orthogonal frequency division multiplexing (OFDM) technology under satellite-ground communication is studied. The OFDM-based watermark generation...
详细信息
The encryption domain Reversible data hiding algorithm differs from the plaintext domain in that after encrypting the image information, the redundant space decreases, leading to difficulties in embedding and low embe...
详细信息
This paper proposes an independent component analysis (ICA) method to solve the problem of cross polarization interference caused by imperfect antenna isolation and channel environment in polarization multiplexing tec...
详细信息
In order to solve the problems of multipath fading and polarization rotation in high frequency (HF) channel signal transmission in long distance, first, spatial diversity technology is used to realize array signal rec...
详细信息
In this manuscript, we introduce an innovative approach to attenuate both Inter-symbol Interference (ISI) and Co-channel Interference (CCI) in the realm of aeronautical telemetry applications, employing Shaped Offset ...
详细信息
With the increasing demand for data, mobile operator face the challenge of resource reuse and cost reduction, while also needing to improve network performance and support dynamic scaling. In this paper, we propose a ...
详细信息
Aiming to address the challenges presented by limited samples of bearing faults and complex working conditions, this study attempts to overcome the problem of shallow deep learning models ignoring the temporal charact...
详细信息
The traditional optical fiber communication is limited by economy, flexibility and other factors, and it is difficult to provide flexible and effective support in online monitoring of transmission lines, operation and...
详细信息
network security is the main content of network management, but in the process of network security management, it is vulnerable to hacker intrusion and communication interference, which reduces the level of network se...
详细信息
暂无评论