Computer Science ›› 2021, Vol. 48 ›› Issue (11A): 464-470.doi: 10.11896/jsjkx.201200026
• Network & Communication • Previous Articles Next Articles
GUAN Zheng1, LYU Wei1, JIA Yao1, YANG Zhi-jun1,2
CLC Number:
[1]QIN Y,ZHANG H,REN J.Frame design of heterogeneous cognitive wireless sensor network based on energy efficiency optimization[J].Communications Technology,2019,52(10):2401-2409. [2]HYEONGTAE A,YOUNG J S.Full-duplex MAC protocol using buffer status reportsduring unused uplink periods in WLAN[OL]. https://doi.org/10.1016/j.adhoc.2019.101950. [3]YANG Y,XU M W,CHEN H.Analysis and modeling of the impact of 5G/ POST-5G deployment on Internet Backbone[J].Journal of Communications,2019,40(8):36-44. [4]HU J Z,DI B Y,LIAO Y,et al.Hybrid MAC Protocol Design and Optimization for Full Duplex Wi-Fi Networks[J].IEEE Transactions on Wireless Communications,2018,17(6):3615-3630. [5]THILINA K M,TABASSUM H,HOSSAIN E,et al.Medium access control design for full duplex wireless systems:Challenges and approaches[J].IEEE Communications Magazine,2015,53(5):112-120. [6]CHOI W Y.Hybrid MAC protocol for IEEE 802.11 wireless LANs with hidden node problem[J].Journal of Electrical Engineering,2018,69(4):323-325. [7]ANIQUE A,SINEM C E.Directional MAC protocol for IEEE 802.11ad based wireless local area networks[J].Ad Hoc Networks,2018,69(C):49-64. [8]GAN Z,JIA Y,HE M.A Bidirectional Polling MAC Mechanism for IoT[J].Electronics,2019,8(6):715. [9]KORPI D.Full-duplex mobile device:Pushing the limits[J].IEEE Communication Magazine,2016,54(9):80-87. [10]KIM D,LEE H,HONG D.A survey of in-band full-duplextransmission:From the perspective of PHY and MAC layers[J].IEEE Communications Surveys and Tutorials,2015,17(4):2017-2046. [11]KIM J Y,MASHAYEKHIO,QU H,et al.Janus:A novel mac protocol for full duplex radio[OL].https://www.researchgate.net/publication/312662637_Janus_A_novel_MAC_protocol_for_full_duplex_radio. [12]LIU S,HAN B,PENG W.A Polling-Based Traffic-Aware MAC Protocol for Centralized Full-Duplex Wireless Networks[J].IEEE Access,2018(6):28225- 28238. [13]WU H W,ZOU Y T,SUN C,et al.A hybrid duplex MAC protocol for WLAN[J].Journal of Automation,2017,39(4):840-846. [14]WAN Z P,PAN Z H,NI W C,et al.A Vehicle Mobile Internet of Things Coverage Enhancement Algorithm Based on Communication Duration Probability Analysis[J].IEEE Access,2019(7):98356-98365. [15]PENG X,LI R F,LI Z T,et al.Vehicle Networking data distribution scheme based on intersection delay boundary[J].Journal of Communications,2017,38(4):25-34. [16]LI D X,WU H,SHAN C L.Internet of things in industries:A survey[J].IEEE Transactions on Industrial Informatics,2014(10):2233-2243. [17]KIRAN M P,SUBRAHMANYAM V,RAJALAKSHMI P.Novel power management scheme and effects of constrained on-node storage on performance of mac layer for industrial IoT networks[J].IEEE Transactions on Industrial Informatics,2018(14):2146-2158. |
[1] | LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214. |
[2] | TANG Qing-hua, WANG Mei, TANG Chao-chen, LIU Xin, LIANG Wen. PDR Indoor Positioning Method Based on M2M Encounter Region [J]. Computer Science, 2022, 49(9): 283-287. |
[3] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[4] | LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266. |
[5] | ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343. |
[6] | HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11. |
[7] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[8] | XIAO Zhi-hong, HAN Ye-tong, ZOU Yong-pan. Study on Activity Recognition Based on Multi-source Data and Logical Reasoning [J]. Computer Science, 2022, 49(6A): 397-406. |
[9] | JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479. |
[10] | TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484. |
[11] | YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515. |
[12] | SHAN Xiao-ying, REN Ying-chun. Fishing Type Identification of Marine Fishing Vessels Based on Support Vector Machine Optimized by Improved Sparrow Search Algorithm [J]. Computer Science, 2022, 49(6A): 211-216. |
[13] | CHEN Jing-nian. Acceleration of SVM for Multi-class Classification [J]. Computer Science, 2022, 49(6A): 297-300. |
[14] | WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789. |
[15] | LI Ya-ru, ZHANG Yu-lai, WANG Jia-chen. Survey on Bayesian Optimization Methods for Hyper-parameter Tuning [J]. Computer Science, 2022, 49(6A): 86-92. |
|