Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 381-386.
• Network & Communication • Previous Articles Next Articles
WANG Xu, LIN Zhi-gui, LIU Xiao-feng, MENG De-jun
CLC Number:
[1]KURS A,KARALIS A,MOFFATT R,et al.Wireless power transfer via strongly coupled magnetic resonances[J].Science,2007,317(5834):83-86. [2]XU W Z,LIANG W F,JIA X H,et al.Maximizing Sensor Lifetime with the Minimal Service Cost of a Mobile Charger in Wireless[J].IEEE Transactions on Mobile Computing,2018,17(11):2564-2577. [3]GUO S T,WANG C,YANG Y Y.Joint mobile data gathering and energy provisioning in wireless rechargeable sensor networks [J].IEEE Transactions on Mobile Computing,2014,13(12):2836-2852. [4]KURS A,MOFFATT R,SOLJAČIC' M.Simultaneous mid-range power transfer to multiple devices[J].Applied Physics Letters,201096(4):044102-044104. [5]KIM J W,SON H C,KIM D H,et al.Analysis of wireless energy transfer to multiple devices using CMT[C]∥Asia-Pacific Microwave Conference Proceedings(APMC).Yokohama,2010:2149-2152. [6]KHELLADI L,DJENOURI D,LASLA N,et al.MSR:Mini-mum-Stop Recharging Scheme for Wireless Rechargeable Sensor Networks[C]∥IEEE International Conference on Ubiquitous Intelligence and Computing (UIC).Denpasar,Bali,Indonesia,2014:378-383. [7]SHI Y,XIE L,HOU Y T,et al.On renewable sensor networks with wireless energy transfer[C]∥IEEE INFOCOM.Shanghai,2011:1350-1358. [8]AHN D,HONG S.Effect of Coupling Between Multiple Transmitters or Multiple Receivers on Wireless Power Transfer[J].IEEE Transactions on Industrial Electronics,2013,60(7):2602-2613. [9]张波,张青.两个负载接收线圈的谐振耦合无线输电系统特性分析[J].华南理工大学学报(自然科学版),2012,40(10):152-158. [10]皇甫国庆.两圆线圈间互感及耦合系数讨论[J].渭南师范学院学报,2015(14):24-29. [11]陈俊斌,朱霞.任意同轴圆线圈互感系数的近似解析公式[J].后勤工程学院学报,2010,26(5):86-91. [12]罗垚,陈柏超,袁佳歆,等.倾斜轴空心矩形截面圆柱线圈互感计算[J].电工技术学报,2012,27(5):132-136. [13]BABIC S I,AKYEL C.Calculating Mutual Inductance Between Circular Coils With Inclined Axes in Air[J].IEEE Transactions on Magnetics,2008,44(7):1743-1750. [14]李荣华.测定互感器互感系数的方法[J].实验技术与管理,2005,22(8):33-35. |
[1] | LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267. |
[2] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[3] | HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332. |
[4] | JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339. |
[5] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[6] | WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9. |
[7] | ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270. |
[8] | FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349. |
[9] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[10] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[11] | Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54. |
[12] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[13] | TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484. |
[14] | HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507. |
[15] | GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522. |
|