期刊文献+

基于深度生成网络的无线网拓扑估计方法

A Wireless Network Topology Estimation MethodBased on Deep Generative Networks
在线阅读 下载PDF
导出
摘要 非合作方快速估计无线网络拓扑可支撑认知无线电多种应用。针对无线网络拓扑估计结果中虚警链路多的问题,首先对典型无线通信网络特性进行深入分析,提出了一种多步联合生成式无线网络拓扑估计方法,具体通过多维霍克斯过程进行网络拓扑的预生成,并结合深度自编码器对预生成拓扑进行链路辨识与修正,实现了高准确率的无线网拓扑估计。仿真实验验证了所提算法的有效性。 Rapid wireless network topology estimation from non-collaborative perspective supports diverse applications in cognitive radio.To address the issue of numerous false-alarm links in wireless network topology estimation results,this paper firstly conducts an in-depth analysis on typical wireless communication network characteristics,and proposes a multi-step joint generative wireless network topology estimation method.To be specific,the network topology is pre-generated through the multi-dimension Hawkes process,and the links of the pre-generated topology are identified and corrected by combining the deep anto-encode,which achieves high-accuracy wireless network topology estimation.Simulation experiments validate the effectiveness of proposed algorithm.
作者 毛昱 刘俊 吴园园 王坚 黄华 王湛 MAO Yu;LIU Jun;WU Yuanyuan;WANG Jian;HUANG Hua;WANG Zhan(The 8th Research Academy of CSSC,Yangzhou 225101,China)
出处 《舰船电子对抗》 2025年第6期70-73,90,共5页 Shipboard Electronic Countermeasure
关键词 网络拓扑估计 无线网络 自编码器 多维霍克斯过程 network topology estimation wireless network auto-encoder multi-dimension Hawkes process
  • 相关文献

参考文献3

二级参考文献17

  • 1Cheung D W, Han J, Ng V T, et al.Maintenance of Dis- covered Association Rules in LargeDatabase: An Incre- mental Updating Technique [C]//Proceedings of the 12th International Conference on Data Engineering, New Or- leans, LA, 26 Feb-01 Mar, 1996:106-114.
  • 2KwokJ T,Zhao H. Incremental Eigen Decomposition[C]// Proceedings of the International Conference on Artificial Neural Networks (ICANN'03), Istanbul, Turkey, June 2003: 270-273.
  • 3Jolliffe T. Principal Component Analysis[M]. 2nd Edition. Berlin, Germany: Springer-Verlag, 2002.
  • 4Ould-Khaoua M, Takai M. Proc Second ACM Int'l Work- shop Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN)[C]. 2005.
  • 5Golub G, Van Loan C F. Matrix Computations [M]. 3rd Edition. Baltimore, Md, USA: Johns Hopkins University Press, 1996.
  • 6Kurland O, Lee L. Respect My Authority! HITS Without Hyperlinks, Utilizing Cluster-based Language Models [C] //Proceedings of the 29th Annual International ACM SI- GI1Z Conference on Research and Development in Infor- marion Retrieval(Proc ACM SIGIK' 06) :83-90.
  • 7Wang K, Su M Y T. Item Selection by "Hub-Authority" Profit Ranking[C]//Proc ACM SIGKDD, 2002.
  • 8Akyildiz I F, Stuntebeck E P. Wireless Underground Sensor Networks: Research Challenges [J]. Ad Hoc Networks, 2006, 4(6): 669-686.
  • 9Boukerche A. Handbook of Algorithms for Wireless Net- working and Mobile Computing [M].United Kingdom: Chapman and Hall/CRC, 2008.
  • 10Zha H, Simon H D. On Updating Problemsin Latent Se- mantic Indexing [J]. SIAM Journal on Scientific Comput- ing, 1999,21 (2): 782-791.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部