期刊文献+
共找到31篇文章
< 1 2 >
每页显示 20 50 100
Microstructure and properties of 35 kg large aluminum alloy flywheel housing components formed by squeeze casting with local pressure compensation
1
作者 Ju-fu Jiang Jing Yan +4 位作者 Ying-ze Liu ning ge Ying Wang Chang-jie Ding De-chao Zou 《China Foundry》 SCIE EI CAS CSCD 2024年第5期563-576,共14页
The squeeze casting method with local pressure compensation was proposed to form a flywheel housing component with a weight of 35 kg.The numerical simulation,microstructure observation and phase characterization were ... The squeeze casting method with local pressure compensation was proposed to form a flywheel housing component with a weight of 35 kg.The numerical simulation,microstructure observation and phase characterization were performed,and the influence of local pressure compensation on feeding of thick-wall position,microstructure and mechanical properties of the formed components were discussed.Results show that the molten metal keeps a good fluidity and the filling is complete during the filling process.Although the solidification at thick-wall positions of the mounting ports is slow,the local pressure compensation effectively realizes the local forced feeding,significantly eliminating the shrinkage cavity defects.In the microstructure of AlSi9Mg alloy,α-Al primarily consists of fragmented dendrites and rosette grains,while eutectic Si predominantly comprises needles and short rods.The impact of local pressure compensation on strength is relatively minimal,yet its influence on elongation is considerable.Following local pressure compensation,the average elongation at the compensated areas is 9.18%,which represents a 44.90%higher than that before compensation.The average tensile strength is 209.1 MPa,and the average yield strength is 100.6 MPa.The local pressure compensation can significantly reduce or even eliminate the internal defects in the 35 kg large-weight components formed by squeeze casting. 展开更多
关键词 squeeze casting local pressure compensation aluminum alloy microstructure mechanical properties large flywheel housing components
在线阅读 下载PDF
Fairness-Oriented Hybrid Precoding for Massive MIMO Maritime Downlink Systems with Large-Scale CSIT 被引量:25
2
作者 Chengxiao Liu Wei Feng +1 位作者 Te Wei ning ge 《China Communications》 SCIE CSCD 2018年第1期52-61,共10页
Different from conventional cellular networks, a maritime communication base station(BS) has to cover a much wider area due to the limitation of available BS sites. Accordingly the performance of users far away from t... Different from conventional cellular networks, a maritime communication base station(BS) has to cover a much wider area due to the limitation of available BS sites. Accordingly the performance of users far away from the BS is poor in general. This renders the fairness among users a challenging issue for maritime communications. In this paper, we consider a practical massive MIMO maritime BS with hybrid digital and analog precoding. Only the large-scale channel state information at the transmitter(CSIT) is considered so as to reduce the implementation complexity and overhead of the system. On this basis, we address the problem of fairness-oriented precoding design. A max-min optimization problem is formulated and solved in an iterative way. Simulation results demonstrate that the proposed scheme performs much better than conventional hybrid precoding algorithms in terms of minimum achievable rate of all the users, for the typical three-ray maritime channel model. 展开更多
关键词 maritime communication massive MIMO hybrid precoding large-scale channel state information at the transmitter(CSIT) max-min fairness
在线阅读 下载PDF
NOMA-Based UAV Communications for Maritime Coverage Enhancement 被引量:13
3
作者 Rui Tang Wei Feng +1 位作者 Yunfei Chen ning ge 《China Communications》 SCIE CSCD 2021年第4期230-243,共14页
The lack of communication infrastructure in the ocean inevitably leads to coverage blind zones.In addition to high-throughput marine satellites,unmanned aerial vehicles(UAVs)can be used to provide coverage for these b... The lack of communication infrastructure in the ocean inevitably leads to coverage blind zones.In addition to high-throughput marine satellites,unmanned aerial vehicles(UAVs)can be used to provide coverage for these blind zones along with onshore base stations.In this paper,we consider the use of UAV for maritime coverage enhancement.Particularly,to serve more ships on the vast oceanic area with limited spectrum resources,we employ non-orthogonal multiple access(NOMA).A joint power and transmission duration allocation problem is formulated to maximize the minimum ship throughput,with the constraints on onboard communication energy.Different from previous works,we only assume the slowly time-varying large-scale channel state information(CSI)to reduce the system cost,as the large-scale CSI is locationdependent and can be obtained according to a priori radio map.To solve the non-convex problem,we decompose it into two subproblems and solve them in an iterative way.Simulation results show the effectiveness of the proposed solution. 展开更多
关键词 large-scale channel state information(CSI) maritime communications non-orthogonal multiple access(NOMA) unmanned aerial vehicle(UAV)
在线阅读 下载PDF
Detecting While Accessing:A Semi-Supervised Learning-Based Approach for Malicious Traffic Detection in Internet of Things 被引量:2
4
作者 Yantian Luo Hancun Sun +3 位作者 Xu Chen ning ge Wei Feng Jianhua Lu 《China Communications》 SCIE CSCD 2023年第4期302-314,共13页
In the upcoming large-scale Internet of Things(Io T),it is increasingly challenging to defend against malicious traffic,due to the heterogeneity of Io T devices and the diversity of Io T communication protocols.In thi... In the upcoming large-scale Internet of Things(Io T),it is increasingly challenging to defend against malicious traffic,due to the heterogeneity of Io T devices and the diversity of Io T communication protocols.In this paper,we propose a semi-supervised learning-based approach to detect malicious traffic at the access side.It overcomes the resource-bottleneck problem of traditional malicious traffic defenders which are deployed at the victim side,and also is free of labeled traffic data in model training.Specifically,we design a coarse-grained behavior model of Io T devices by self-supervised learning with unlabeled traffic data.Then,we fine-tune this model to improve its accuracy in malicious traffic detection by adopting a transfer learning method using a small amount of labeled data.Experimental results show that our method can achieve the accuracy of 99.52%and the F1-score of 99.52%with only 1%of the labeled training data based on the CICDDoS2019 dataset.Moreover,our method outperforms the stateof-the-art supervised learning-based methods in terms of accuracy,precision,recall and F1-score with 1%of the training data. 展开更多
关键词 malicious traffic detection semi-supervised learning Internet of Things(Io T) TRANSFORMER masked behavior model
在线阅读 下载PDF
Deep Learning-Based Symbol Detection for Time-Varying Nonstationary Channels 被引量:2
5
作者 Xuantao Lyu Wei Feng +1 位作者 ning ge Xianbin Wang 《China Communications》 SCIE CSCD 2022年第3期158-171,共14页
The highly dynamic channel(HDC)in an extremely dynamic environment mainly has fast timevarying nonstationary characteristics.In this article,we focus on the most difficult HDC case,where the channel coherence time is ... The highly dynamic channel(HDC)in an extremely dynamic environment mainly has fast timevarying nonstationary characteristics.In this article,we focus on the most difficult HDC case,where the channel coherence time is less than the symbol period.To this end,we propose a symbol detector based on a long short-term memory(LSTM)neural network.Taking the sampling sequence of each received symbol as the LSTM unit's input data has the advantage of making full use of received information to obtain better performance.In addition,using the basic expansion model(BEM)as the preprocessing unit significantly reduces the number of neural network parameters.Finally,the simulation part uses the highly dynamic plasma sheath channel(HDPSC)data measured from shock tube experiments.The results show that the proposed BEM-LSTM-based detector has better performance and does not require channel estimation or channel model information. 展开更多
关键词 highly dynamic channel deep neural network long short-term memory basis expansion model symbol detection
在线阅读 下载PDF
Reflected shock/turbulent boundary layer interaction structure analysis based on large eddy simulation 被引量:1
6
作者 Dongdong ZHONG Lixu WANG ning ge 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2021年第5期364-372,共9页
In order to understand the physical phenomenon of the reflected shock/turbulent boundary layer interaction,the Large Eddy Simulation(LES)is conducted to investigate shock wave and turbulent boundary layer interaction ... In order to understand the physical phenomenon of the reflected shock/turbulent boundary layer interaction,the Large Eddy Simulation(LES)is conducted to investigate shock wave and turbulent boundary layer interaction in a 12°compression ramp with inlet high Mach number of 2.9.Rescaling/recycling method is used as inflow turbulence generation technique and validated on a supersonic flat plate turbulent boundary layer.The flow field of recycling plane in the plate computation domain is obtained to give the inlet boundary condition for the LES computation.This paper focuses on the reflected shock/turbulent boundary layer interaction region,where the fine flow structure and instantaneous flow field are analyzed in detail.It is found that the unsteady motion of the shock wave leads to the increase of wall pressure fluctuation. 展开更多
关键词 Large eddy simulation Reflected STBLI Rescaling/recycling method Shock motion TURBULENT
原文传递
k-NN Based Bypass Entropy and Mutual Information Estimation for Incremental Remote-Sensing Image Compressibility Evaluation 被引量:2
7
作者 Xijia Liu Xiaoming Tao +1 位作者 Yiping Duan ning ge 《China Communications》 SCIE CSCD 2017年第8期54-62,共9页
Incremental image compression techniques using priori information are of significance to deal with the explosively increasing remote-sensing image data. However, the potential benefi ts of priori information are still... Incremental image compression techniques using priori information are of significance to deal with the explosively increasing remote-sensing image data. However, the potential benefi ts of priori information are still to be evaluated quantitatively for effi cient compression scheme designing. In this paper, we present a k-nearest neighbor(k-NN) based bypass image entropy estimation scheme, together with the corresponding mutual information estimation method. Firstly, we apply the k-NN entropy estimation theory to split image blocks, describing block-wise intra-frame spatial correlation while avoiding the curse of dimensionality. Secondly, we propose the corresponding mutual information estimator based on feature-based image calibration and straight-forward correlation enhancement. The estimator is designed to evaluate the compression performance gain of using priori information. Numerical results on natural and remote-sensing images show that the proposed scheme obtains an estimation accuracy gain by 10% compared with conventional image entropy estimators. Furthermore, experimental results demonstrate both the effectiveness of the proposed mutual information evaluation scheme, and the quantitative incremental compressibility by using the priori remote-sensing frames. 展开更多
关键词 remote-sensing incremental image compression entropy mutual information
在线阅读 下载PDF
Switching the coordination geometry to enhance erbium(Ⅲ)single-molecule magnets
8
作者 Qian-Cheng Luo ning ge +6 位作者 Yuan-Qi Zhai Tengbo Wang Lin Sun Qi Sun Fanni Li Zhendong Fu Yan-Zhen Zheng 《Chinese Chemical Letters》 SCIE CAS CSCD 2023年第5期535-538,共4页
Two erbium(Ⅲ)complexes[ErCl(OAr^(Ad))_(3)][Na(THF)_(6)](1)and Er(OAr^(Ad))_(3)(2)are successfully prepared by using one variety of"hard"base ligand with large steric hindrance.The coordination geometry arou... Two erbium(Ⅲ)complexes[ErCl(OAr^(Ad))_(3)][Na(THF)_(6)](1)and Er(OAr^(Ad))_(3)(2)are successfully prepared by using one variety of"hard"base ligand with large steric hindrance.The coordination geometry around the Er(Ⅲ)site changes from distorted tetrahedral to flat trigonal pyramid geometry in different solvent environment due to the removal of the coordinated chloride.Such an alternation significantly enhances the single-molecule magnet(SMM)behavior and makes the field-induced effective energy barrier(Ueff)arrive at 43(1)cm-1for the latter.Together with theoretical calculations,this study shows that strong equatorial ligand field and high local symmetry are critical to suppress the quantum tunneling of the magnetization(QTM)and achieve high-performance erbium(Ⅲ)based SMMs. 展开更多
关键词 Single-molecule magnets ERBIUM Lanthanide complexes Magnetic anisotropy Slow magnetic relaxation
原文传递
Robustness Evaluation of Remote-Sensing Image Feature Detectors with TH Priori-Information Data Set
9
作者 Yiping Duan Xiaoming Tao +1 位作者 Xijia Liu ning ge 《China Communications》 SCIE CSCD 2020年第10期218-228,共11页
In this paper,we build a remote-sensing satellite imagery priori-information data set,and propose an approach to evaluate the robustness of remote-sensing image feature detectors.The building TH Priori-Information(TPI... In this paper,we build a remote-sensing satellite imagery priori-information data set,and propose an approach to evaluate the robustness of remote-sensing image feature detectors.The building TH Priori-Information(TPI)data set with 2297 remote sensing images serves as a standardized high-resolution data set for studies related to remote-sensing image features.The TPI contains 1)raw and calibrated remote-sensing images with high spatial and temporal resolutions(up to 2 m and 7 days,respectively),and 2)a built-in 3-D target area model that supports view position,view angle,lighting,shadowing,and other transformations.Based on TPI,we further present a quantized approach,including the feature recurrence rate,the feature match score,and the weighted feature robustness score,to evaluate the robustness of remote-sensing image feature detectors.The quantized approach gives general and objective assessments of the robustness of feature detectors under complex remote-sensing circumstances.Three remote-sensing image feature detectors,including scale-invariant feature transform(SIFT),speeded up robust features(SURF),and priori information based robust features(PIRF),are evaluated using the proposed approach on the TPI data set.Experimental results show that the robustness of PIRF outperforms others by over 6.2%. 展开更多
关键词 REMOTE-SENSING TH data set image feature robustness evaluation
在线阅读 下载PDF
超采区浅层地下水数值模拟及预测分析 被引量:6
10
作者 宁阁 苏冬阳 +2 位作者 高春杰 苏澳 卢德喜 《中国水利水电科学研究院学报(中英文)》 北大核心 2024年第3期283-297,共15页
超采区的地下水变化趋势分析对于区域水资源可持续管理具有重要意义。本文以大同盆地浅层地下水超采区为研究对象,分析了含水层结构和地下水的补给、径流、排泄条件,明确了潜水含水层为影响地下水变化的主要区域。基于GMS与MODFLOW软件... 超采区的地下水变化趋势分析对于区域水资源可持续管理具有重要意义。本文以大同盆地浅层地下水超采区为研究对象,分析了含水层结构和地下水的补给、径流、排泄条件,明确了潜水含水层为影响地下水变化的主要区域。基于GMS与MODFLOW软件,建立了大同盆地潜水含水层各向同性非均质二维非稳定流模型,利用实测地下水流场对模型进行了验证,开展了未来不同场景条件下地下水位预测模拟与分析。结果表明,大同盆地2010—2019年平均地下水开采量(6.0861亿m^(3))大于2001—2016年平均地下水补给量(5.6254亿m^(3)),地下水位下降趋势明显。若地下水开采量下降至2019年开采量的85%,至2035年平均地下水位可回升11.6 m,恢复速度约0.68 m a;若综合考虑未来水源替换工程,至2035年地下水位可显著回升,恢复速率可达1.4 m a。本文研究成果可为大同盆地地下水管控提供科学依据,同时对于我国北方类似地下水超采区的水资源管理和评价具有一定参考价值。 展开更多
关键词 大同盆地 浅层地下水 地下水超采区 数值模拟 预测分析
在线阅读 下载PDF
Robot-Oriented 6G Satellite-UAV Networks: Requirements, Paradigm Shifts, and Case Studies 被引量:3
11
作者 Peng Wei Wei Feng +2 位作者 Yunfei Chen ning ge Wei Xiang 《China Communications》 SCIE CSCD 2024年第2期74-84,共11页
Networked robots can perceive their surroundings, interact with each other or humans,and make decisions to accomplish specified tasks in remote/hazardous/complex environments. Satelliteunmanned aerial vehicle(UAV) net... Networked robots can perceive their surroundings, interact with each other or humans,and make decisions to accomplish specified tasks in remote/hazardous/complex environments. Satelliteunmanned aerial vehicle(UAV) networks can support such robots by providing on-demand communication services. However, under traditional open-loop communication paradigm, the network resources are usually divided into user-wise mostly-independent links,via ignoring the task-level dependency of robot collaboration. Thus, it is imperative to develop a new communication paradigm, taking into account the highlevel content and values behind, to facilitate multirobot operation. Inspired by Wiener’s Cybernetics theory, this article explores a closed-loop communication paradigm for the robot-oriented satellite-UAV network. This paradigm turns to handle group-wise structured links, so as to allocate resources in a taskoriented manner. It could also exploit the mobility of robots to liberate the network from full coverage,enabling new orchestration between network serving and positive mobility control of robots. Moreover,the integration of sensing, communications, computing and control would enlarge the benefit of this new paradigm. We present a case study for joint mobile edge computing(MEC) offloading and mobility control of robots, and finally outline potential challenges and open issues. 展开更多
关键词 closed-loop communication mobility control satellite-UAV network structured resource allocation
在线阅读 下载PDF
大壁厚差复杂形状铝合金飞轮壳挤压铸造数值模拟 被引量:5
12
作者 姜巨福 葛宁 +4 位作者 黄敏杰 李明星 王迎 丁长杰 邹德超 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2023年第5期1345-1360,共16页
利用ProCAST软件对大壁厚差复杂形状ZL104铝合金飞轮壳挤压铸造过程进行数值模拟。结果表明:充型过程稳定且可分为4个阶段:流道连通、水平区域填充、竖直方向填充和难充填区填充。凝固过程中存在6个凝固滞后的特征区域,特征区域的缩孔... 利用ProCAST软件对大壁厚差复杂形状ZL104铝合金飞轮壳挤压铸造过程进行数值模拟。结果表明:充型过程稳定且可分为4个阶段:流道连通、水平区域填充、竖直方向填充和难充填区填充。凝固过程中存在6个凝固滞后的特征区域,特征区域的缩孔缩松缺陷明显。缺陷位置预测准确,对预测的缺陷体积进行极差分析,确定最佳工艺参数为浇注温度650℃、比压48 MPa、模具温度220℃、补压比压800 MPa、补压延时10 s(A侧)和12 s(B侧)。最大铸造应力出现在凝固速度快、曲率大的薄壁结构中。仿真结果得到了实际工艺验证。 展开更多
关键词 数值模拟 挤压铸造 大壁厚差 复杂形状 定域补压
在线阅读 下载PDF
林业院校“蛋白质与酶工程”课程立体化教学研究
13
作者 王永红 宁歌 +1 位作者 王元清 吴顺 《科教文汇》 2018年第35期59-60,63,共3页
作为一门应用型较强的必修专业课——"蛋白质与酶工程"在中南林业科技大学多个专业中开展,包括生物技术、生物工程、生态学等。在该门课程的教学研究与革新过程中,应将教学资源作为基础,充分联动各个教学元素,建立多层次、全... 作为一门应用型较强的必修专业课——"蛋白质与酶工程"在中南林业科技大学多个专业中开展,包括生物技术、生物工程、生态学等。在该门课程的教学研究与革新过程中,应将教学资源作为基础,充分联动各个教学元素,建立多层次、全面的综合教学体系。在此目标上,本文总结了该门课程的改革措施,在实践中取得了满意的教学效果。同时将该模式推广至同类院校的同类型、相关联课程中以供参考。 展开更多
关键词 林业院校 蛋白质与酶工程 教学改革 立体化教学
在线阅读 下载PDF
Physical Layer Security for UAV Communications:A Comprehensive Survey 被引量:9
14
作者 Jue Wang Xuanxuan Wang +5 位作者 Ruifeng Gao Chengleyang Lei Wei Feng ning ge Shi Jin Tony Q.S.Quek 《China Communications》 SCIE CSCD 2022年第9期77-115,共39页
Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an... Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an open environment,UAV communications benefit from dominant line-of-sight links;however,this on the other hand renders the communications more vulnerable to malicious attacks.Recently,physical layer security(PLS)has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches.In this paper,a comprehensive survey on the current achievements of UAV-PLS is conducted.We first introduce the basic concepts including typical static/-mobile UAV deployment scenarios,the unique air-toground channel and aerial nodes distribution models,as well as various roles that a UAV may act when PLS is concerned.Then,we start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems,and extend the discussion to the more general scenario where the UAVs’mobility is further exploited.For both cases,respectively,we summarize the commonly adopted methodologies,then describe important works in the litera ture in detail.Finally,potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS. 展开更多
关键词 physical layer security UAV communications static/mobile UAV deployment air-to-ground channel trajectory optimization
在线阅读 下载PDF
Unsteady supercritical/critical dual flowpath inlet flow and its control methods 被引量:4
15
作者 Jun LIU Huacheng YUAN +1 位作者 Yunfei WANG ning ge 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2017年第6期1877-1884,共8页
The characteristics of unsteady flow in a dual-flowpath inlet,which was designed for a Turbine Based Combined Cycle(TBCC)propulsion system,and the control methods of unsteady flow were investigated experimentally and ... The characteristics of unsteady flow in a dual-flowpath inlet,which was designed for a Turbine Based Combined Cycle(TBCC)propulsion system,and the control methods of unsteady flow were investigated experimentally and numerically.It was characterized by large-amplitude pressure oscillations and traveling shock waves.As the inlet operated in supercritical condition,namely the terminal shock located in the throat,the shock oscillated,and the period of oscillation was about 50 ms,while the amplitude was 6 mm.The shock oscillation was caused by separation in the diffuser.This shock oscillation can be controlled by extending the length of diffuser which reduces pressure gradient along the flowpath.As the inlet operated in critical condition,namely the terminal shock located at the shoulder of the third compression ramp,the shock oscillated,and the period of oscillation was about 7.5 ms,while the amplitude was 12 mm.At this condition,the shock oscillation was caused by an incompatible backpressure in the bleed region.It can be controlled by increasing the backpressure of the bleed region. 展开更多
关键词 Airbreathing hypersonic vehicle Dual flowpath inlet Terminal shock oscillation Turbine based combined CYCLE Unsteady flow
原文传递
Secrecy Rate Maximization for 6G Cognitive Satellite-UAV Networks 被引量:5
16
作者 Chengleyang Lei Wei Feng +1 位作者 Yunfei Chen ning ge 《China Communications》 SCIE CSCD 2023年第1期246-260,共15页
To cover remote areas where terrestrial cellular networks may not be available,non-terrestrial infrastructures such as satellites and unmanned aerial vehicles(UAVs)can be utilized in the upcoming sixth-generation(6G)e... To cover remote areas where terrestrial cellular networks may not be available,non-terrestrial infrastructures such as satellites and unmanned aerial vehicles(UAVs)can be utilized in the upcoming sixth-generation(6G)era.Considering the spectrum scarcity problem,satellites and UAVs need to share the spectrum to save costs,leading to a cognitive satellite-UAV network.Due to the openness of both satellite links and UAV links,communication security has become a major concern in cognitive satelliteUAV networks.In this paper,we safeguard a cognitive satellite-UAV network from a physical layer security(PLS)perspective.Using only the slowlyvarying large-scale channel state information(CSI),we jointly allocate the transmission power and subchannels to maximize the secrecy sum rate of UAV users.The optimization problem is a mixed integer nonlinear programming(MINLP)problem with coupling constraints.We propose a heuristic algorithm which relaxes the coupling constraints by the penalty method and obtains a sub-optimal low-complexity solution by utilizing random matrix theory,the max-min optimization tool,and the bipartite graph matching algorithm.The simulation results corroborate the superiority of our proposed scheme. 展开更多
关键词 channel allocation cognitive satellite-UAV network physical layer security power allocation
在线阅读 下载PDF
MEC-Empowered Non-Terrestrial Network for 6G Wide-Area Time-Sensitive Internet of Things 被引量:3
17
作者 Chengxiao Liu Wei Feng +1 位作者 Xiaoming Tao ning ge 《Engineering》 SCIE EI 2022年第1期96-107,共12页
In the upcoming sixth-generation(6G)era,the demand for constructing a wide-area time-sensitive Internet of Things(IoT)continues to increase.As conventional cellular technologies are difficult to directly use for wide-... In the upcoming sixth-generation(6G)era,the demand for constructing a wide-area time-sensitive Internet of Things(IoT)continues to increase.As conventional cellular technologies are difficult to directly use for wide-area time-sensitive IoT,it is beneficial to use non-terrestrial infrastructures,including satellites and unmanned aerial vehicles(UAVs).Thus,we can build a non-terrestrial network(NTN)using a cell-free architecture.Driven by the time-sensitive requirements and uneven distribution of IoT devices,the NTN must be empowered using mobile edge computing(MEC)while providing oasisoriented on-demand coverage for devices.Nevertheless,communication and MEC systems are coupled with each other under the influence of a complex propagation environment in the MEC-empowered NTN,which makes it difficult to coordinate the resources.In this study,we propose a process-oriented framework to design communication and MEC systems in a time-division manner.In this framework,large-scale channel state information(CSI)is used to characterize the complex propagation environment at an affordable cost,where a nonconvex latency minimization problem is formulated.Subsequently,the approximated problem is provided,and it can be decomposed into sub-problems.These sub-problems are then solved iteratively.The simulation results demonstrated the superiority of the proposed process-oriented scheme over other algorithms,implied that the payload deployments of UAVs should be appropriately predesigned to improve the efficiency of using resources,and confirmed that it is advantageous to integrate NTN with MEC for wide-area time-sensitive IoT. 展开更多
关键词 CELL-FREE Mobile edge computing Non-terrestrial networks Sixth-generation Wide-area time-sensitive IoT
在线阅读 下载PDF
DDoS Detection for 6G Internet of Things: Spatial-Temporal Trust Model and New Architecture 被引量:3
18
作者 Yinglun Ma Xu Chen +1 位作者 Wei Feng ning ge 《China Communications》 SCIE CSCD 2022年第5期141-149,共9页
With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originatin... With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows. 展开更多
关键词 sixth generation(6G)network internet of things(IoT) trust model distributed denial of service(DDoS)
在线阅读 下载PDF
Two-Phase Rate Adaptation Strategy for Improving Real-Time Video QoE in Mobile Networks 被引量:3
19
作者 Ailing Xiao Jie Liu +2 位作者 Yizhe Li Qiwei Song ning ge 《China Communications》 SCIE CSCD 2018年第10期12-24,共13页
With the popularity of smart handheld devices, mobile streaming video has multiplied the global network traffic in recent years. A huge concern of users' quality of experience(Qo E) has made rate adaptation method... With the popularity of smart handheld devices, mobile streaming video has multiplied the global network traffic in recent years. A huge concern of users' quality of experience(Qo E) has made rate adaptation methods very attractive. In this paper, we propose a two-phase rate adaptation strategy to improve users' real-time video Qo E. First, to measure and assess video Qo E, we provide a continuous Qo E prediction engine modeled by RNN recurrent neural network. Different from traditional Qo E models which consider the Qo E-aware factors separately or incompletely, our RNN-Qo E model accounts for three descriptive factors(video quality, rebuffering, and rate change) and reflects the impact of cognitive memory and recency. Besides, the video playing is separated into the initial startup phase and the steady playback phase, and we takes different optimization goals for each phase: the former aims at shortening the startup delay while the latter ameliorates the video quality and the rebufferings. Simulation results have shown that RNN-Qo E can follow the subjective Qo E quite well, and the proposed strategy can effectively reduce the occurrence of rebufferings caused by the mismatch between the requested video rates and the fluctuated throughput and attains standout performance on real-time Qo E compared with classical rate adaption methods. 展开更多
关键词 continuous quality of experience (QoE) model recurrent neural network(RNN) real-time video QoE improving dynamic adaptive streaming over HTTP (DASH)
在线阅读 下载PDF
Resource-constrained maximum network throughput on space networks 被引量:1
20
作者 Yanling Xing ning ge Youzheng Wang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第2期215-223,共9页
This paper investigates the maximum network through- put for resource-constrained space networks based on the delay and disruption-tolerant networking (DTN) architecture. Specifically, this paper proposes a methodol... This paper investigates the maximum network through- put for resource-constrained space networks based on the delay and disruption-tolerant networking (DTN) architecture. Specifically, this paper proposes a methodology for calculating the maximum network throughput of multiple transmission tasks under storage and delay constraints over a space network. A mixed-integer linear programming (MILP) is formulated to solve this problem. Simula- tions results show that the proposed methodology can successfully calculate the optimal throughput of a space network under storage and delay constraints, as well as a clear, monotonic relationship between end-to-end delay and the maximum network throughput under storage constraints. At the same time, the optimization re- sults shine light on the routing and transport protocol design in space communication, which can be used to obtain the optimal network throughput. 展开更多
关键词 throughput disruption-tolerant networking(DTN) maximum flow mixed-integer linear programming evolving graph space network
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部