期刊文献+
共找到2,729篇文章
< 1 2 137 >
每页显示 20 50 100
Integration of data science with the intelligent IoT(IIoT):Current challenges and future perspectives 被引量:4
1
作者 Inam Ullah Deepak Adhikari +3 位作者 Xin Su Francesco Palmieri Celimuge Wu Chang Choi 《Digital communications and networks》 2025年第2期280-298,共19页
The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,s... The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions. 展开更多
关键词 Data science Internet of things(IoT) Big data Communication systems Networks Security Data science analytics
在线阅读 下载PDF
Technologies of blockchain interoperability:A survey 被引量:3
2
作者 Haonan Yuan Shufan Fei Zheng Yan 《Digital communications and networks》 2025年第1期210-224,共15页
Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields... Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out. 展开更多
关键词 Blockchain Blockchain interoperability Cross-chain technology
在线阅读 下载PDF
Chinese satellite frequency and orbit entity relation extraction method based on dynamic integrated learning 被引量:2
3
作者 Yuanzhi He Zhiqiang Li Zheng Dou 《Digital communications and networks》 2025年第3期787-794,共8页
Given the scarcity of Satellite Frequency and Orbit(SFO)resources,it holds paramount importance to establish a comprehensive knowledge graph of SFO field(SFO-KG)and employ knowledge reasoning technology to automatical... Given the scarcity of Satellite Frequency and Orbit(SFO)resources,it holds paramount importance to establish a comprehensive knowledge graph of SFO field(SFO-KG)and employ knowledge reasoning technology to automatically mine available SFO resources.An essential aspect of constructing SFO-KG is the extraction of Chinese entity relations.Unfortunately,there is currently no publicly available Chinese SFO entity Relation Extraction(RE)dataset.Moreover,publicly available SFO text data contain numerous NA(representing for“No Answer”)relation category sentences that resemble other relation sentences and pose challenges in accurate classification,resulting in low recall and precision for the NA relation category in entity RE.Consequently,this issue adversely affects both the accuracy of constructing the knowledge graph and the efficiency of RE processes.To address these challenges,this paper proposes a method for extracting Chinese SFO text entity relations based on dynamic integrated learning.This method includes the construction of a manually annotated Chinese SFO entity RE dataset and a classifier combining features of SFO resource data.The proposed approach combines integrated learning and pre-training models,specifically utilizing Bidirectional Encoder Representation from Transformers(BERT).In addition,it incorporates one-class classification,attention mechanisms,and dynamic feedback mechanisms to improve the performance of the RE model.Experimental results show that the proposed method outperforms the traditional methods in terms of F1 value when extracting entity relations from both balanced and long-tailed datasets. 展开更多
关键词 Knowledge graph Relation extraction One-class classification Satellite frequency and orbit resources BERT
在线阅读 下载PDF
A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks 被引量:1
4
作者 Xin Fan Guangkai Li +5 位作者 Jianqiang Li Yue Wang Chuanwen Luo Yi Hong Ting Chen Yan Huo 《Digital communications and networks》 2025年第3期925-936,共12页
Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving a... Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving as mobile base stations,leading to suboptimal service for edge users.To address this,the collaborative formation of Coordinated Multi-Point(CoMP)networks proves instrumental in alleviating the issue of the poor Quality of Service(QoS)at edge users in the network periphery.This paper introduces a groundbreaking solution,the Hybrid Uplink-Downlink Non-Orthogonal Multiple Access(HUD-NOMA)scheme for UAV-aided CoMP networks.Leveraging network coding and NOMA technology,our proposed HUD-NOMA effectively enhances transmission rates for edge users,notwithstanding a minor reduction in signal reception reliability for strong signals.Importantly,the system’s overall sum rate is elevated.The proposed HUD-NOMA demonstrates resilience against eavesdroppers by effectively managing intended interferences without the need for additional artificial noise injection.The study employs a stochastic geometry approach to derive the Secrecy Outage Probability(SOP)for the transmissions in the CoMP network,revealing superior performance in transmission rates and lower SOP compared to existing methods through numerical verification.Furthermore,guided by the theoretical SOP derivation,this paper proposes a power allocation strategy to further reduce the system’s SOP. 展开更多
关键词 NOMA UAV COMP Physical layer security Stochastic geometry approaches Secrecy outage probability
在线阅读 下载PDF
The DNN-based DBP scheme for nonlinear compensation and longitudinal monitoring of optical fiber links 被引量:1
5
作者 Feiyu Li Xian Zhou +3 位作者 Yuyuan Gao Jiahao Huo Rui Li Keping Long 《Digital communications and networks》 2025年第1期43-51,共9页
In this paper,a double-effect DNN-based Digital Back-Propagation(DBP)scheme is proposed and studied to achieve the Integrated Communication and Sensing(ICS)ability,which can not only realize nonlinear damage mitigatio... In this paper,a double-effect DNN-based Digital Back-Propagation(DBP)scheme is proposed and studied to achieve the Integrated Communication and Sensing(ICS)ability,which can not only realize nonlinear damage mitigation but also monitor the optical power and dispersion profile over multi-span links.The link status information can be extracted by the characteristics of the learned optical fiber parameters without any other measuring instruments.The efficiency and feasibility of this method have been investigated in different fiber link conditions,including various launch power,transmission distance,and the location and the amount of the abnormal losses.A good monitoring performance can be obtained while the launch optical power is 2 dBm which does not affect the normal operation of the optical communication system and the step size of DBP is 20 km which can provide a better distance resolution.This scheme successfully detects the location of single or multiple optical attenuators in long-distance multi-span fiber links,including different abnormal losses of 2 dB,4 dB,and 6 dB in 360 km and serval combinations of abnormal losses of(1 dB,5 dB),(3 dB,3 dB),(5 dB,1 dB)in 360 km and 760 km.Meanwhile,the transfer relationship of the estimated coefficient values with different step sizes is further investigated to reduce the complexity of the fiber nonlinear damage compensation.These results provide an attractive approach for precisely sensing the optical fiber link status information and making correct strategies timely to ensure optical communication system operations. 展开更多
关键词 Digital back-propagation Deep neural network Nonlinear interference mitigation Optical fiber communications Power profile estimation Split-step fourier method
在线阅读 下载PDF
6G smart fog radio access network: Architecture, key technologies, and research challenges 被引量:1
6
作者 Lincong Zhang Mingyang Zhang +1 位作者 Xiangyu Liu Lei Guo 《Digital communications and networks》 2025年第3期898-911,共14页
The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devic... The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devices.However,the performance of current 6G network intelligence technologies and its level of integration with the architecture,along with the system-level requirements for the number of access devices and limitations on energy consumption,have impeded further improvements in the 6G smart F-RAN.To better analyze the root causes of the network problems and promote the practical development of the network,this study used structured methods such as segmentation to conduct a review of the topic.The research results reveal that there are still many problems in the current 6G smart F-RAN.Future research directions and difficulties are also discussed. 展开更多
关键词 6G Smart technology Smart fog radio access network Artificial intelligence Non-orthogonal multiple access Reconfigurable intelligent surface
在线阅读 下载PDF
DB-FL: DAG blockchain-enabled generalized federated dropout learning 被引量:1
7
作者 Sa Xiao Xiaoge Huang +2 位作者 Xuesong Deng Bin Cao Qianbin Chen 《Digital communications and networks》 2025年第3期886-897,共12页
To protect user privacy and data security,the integration of Federated Learning(FL)and blockchain has become an emerging research hotspot.However,the limited throughput and high communication complexity of traditional... To protect user privacy and data security,the integration of Federated Learning(FL)and blockchain has become an emerging research hotspot.However,the limited throughput and high communication complexity of traditional blockchains limit their application in large-scale FL tasks,and the synchronous traditional FL will also reduce the training efficiency.To address these issues,in this paper,we propose a Directed Acyclic Graph(DAG)blockchain-enabled generalized Federated Dropout(FD)learning strategy,which could improve the efficiency of FL while ensuring the model generalization.Specifically,the DAG maintained by multiple edge servers will guarantee the security and traceability of the data,and the Reputation-based Tips Selection Algorithm(RTSA)is proposed to reduce the blockchain consensus delay.Second,the semi-asynchronous training among Intelligent Devices(IDs)is adopted to improve the training efficiency,and a reputation-based FD technology is proposed to prevent overfitting of the model.In addition,a Hybrid Optimal Resource Allocation(HORA)algorithm is introduced to minimize the network delay.Finally,simulation results demonstrate the effectiveness and superiority of the proposed algorithms. 展开更多
关键词 Federated learning Blockchain Directed acyclic graph Federated dropout Resource allocation
在线阅读 下载PDF
A blockchain-based anonymous and regulated e-taxing protocol for art trading 被引量:1
8
作者 Xuejing Liu Hongli Liu +1 位作者 Xingyu Liang Yuchao Yao 《Digital communications and networks》 2025年第3期681-688,共8页
Taxation,the primary source of fiscal revenue,has profound implications in guiding resource allocation,promoting economic growth,adjusting social wealth distribution,and enhancing cultural influence.The development of... Taxation,the primary source of fiscal revenue,has profound implications in guiding resource allocation,promoting economic growth,adjusting social wealth distribution,and enhancing cultural influence.The development of e-taxation provides a enhanced security for taxation,but it still faces the risk of inefficiency and tax data leakage.As a decentralized ledger,blockchain provides an effective solution for protecting tax data and avoiding tax-related errors and fraud.The introduction of blockchain into e-taxation protocols can ensure the public verification of taxes.However,balancing taxpayer identity privacy with regulation remains a challenge.In this paper,we propose a blockchain-based anonymous and regulatory e-taxation protocol.This protocol ensures the supervision and tracking of malicious taxpayers while maintaining honest taxpayer identity privacy,reduces the storage needs for public key certificates in the public key infrastructure,and enables selfcertification of taxpayers’public keys and addresses.We formalize the security model of unforgeability for transactions,anonymity for honest taxpayers,and traceability for malicious taxpayers.Security analysis shows that the proposed protocol satisfies unforgeability,anonymity,and traceability.The experimental results of time consumption show that the protocol is feasible in practical applications. 展开更多
关键词 E-taxing Blockchain Schnorr signature Regulation ANONYMITY
在线阅读 下载PDF
Performance optimization and parameters estimation for MIMO-OFDM dual-functional communication-radar systems 被引量:1
9
作者 Chen Zhong Mengting Lou +2 位作者 Chunrong Gu Lan Tang Yechao Bai 《Digital communications and networks》 2025年第2期387-400,共14页
Dual-function communication radar systems use common Radio Frequency(RF)signals are used for both communication and detection.For better compatibility with existing communication systems,we adopt Multiple-Input Multip... Dual-function communication radar systems use common Radio Frequency(RF)signals are used for both communication and detection.For better compatibility with existing communication systems,we adopt Multiple-Input Multiple-Output(MIMO)Orthogonal Frequency Division Multiplexing(OFDM)signals as integrated signals and investigate the estimation performance of MIMO-OFDM signals.First,we analyze the Cramer-Rao Lower Bound(CRLB)of parameter estimation.Then,the transmit powers over different subcarriers are optimized to achieve the best tradeoff between the transmission rate and the estimation performance.Finally,we propose a more accurate estimation method that uses Canonical Polyadic Decomposition(CPD)of the third-order tensor to obtain the parameter matrices.Due to the characteristic of the column structure of the parameter matrices,we only need to use DFT/IDFT to recover the parameters of multiple targets.The simulation results show that tensor-based estimation method can achieve a performance close to CRLB,and the estimation performance can be improved by optimizing the transmit powers. 展开更多
关键词 Bistatic dual-function communication-radar systems MIMO-OFDM CRLB Power allocation CPD
在线阅读 下载PDF
Jamming recognition method based on wavelet packet decomposition and improved deep learning 被引量:1
10
作者 Qi Wu Gang Li +4 位作者 Xiang Wang Hao Luo Lianghong Li Qianbin Chen Xiaorong Jing 《Digital communications and networks》 2025年第5期1469-1478,共10页
To overcome the challenges of poor real-time performance,limited scalability,and low intelligence in conventional jamming pattern recognition methods,this paper proposes a method based on Wavelet Packet Decomposition(... To overcome the challenges of poor real-time performance,limited scalability,and low intelligence in conventional jamming pattern recognition methods,this paper proposes a method based on Wavelet Packet Decomposition(WPD)and enhanced deep learning techniques.In the proposed method,an agent at the receiver processes the received signal using WPD to generate an initial Spectrogram Waterfall(SW),which is subsequently segmented using a sliding window to serve as the input for the jamming recognition network.The network employs a bilateral filter to preprocess the input SW,thereby enhancing the edge features of the jamming signals.To extract abstract features,depthwise separable convolution is utilized instead of traditional convolution,thereby reducing the network’s parameter count and enhancing real-time performance.A pyramid pooling layer is integrated before the fully connected layer to enable the network to process input SW of varying sizes,thus enhancing scalability.During network training,adaptive moment estimation is employed as the optimizer,allowing the network to dynamically adjust the learning rate and accelerate convergence.A comprehensive comparison between the proposed jamming recognition network and six other models is conducted,along with Ablation Experiments(AE)based on numerical simulations.Simulation results demonstrate that the proposed method based on WPD and enhanced deep learning achieves high-precision recognition of various jamming patterns while maintaining a favorable balance among prediction accuracy,network complexity,and prediction time. 展开更多
关键词 Wavelet packet decomposition Improved deep learning Spectrogram waterfall Pyramid pooling Jamming recognition
在线阅读 下载PDF
Hierarchical detection and tracking for moving targets in underwater wireless sensor networks 被引量:1
11
作者 Yudong Li Hongcheng Zhuang +2 位作者 Long Xu Shengquan Li Haibo Lu 《Digital communications and networks》 2025年第2期556-562,共7页
It is difficult to improve both energy consumption and detection accuracy simultaneously,and even to obtain the trade-off between them,when detecting and tracking moving targets,especially for Underwater Wireless Sens... It is difficult to improve both energy consumption and detection accuracy simultaneously,and even to obtain the trade-off between them,when detecting and tracking moving targets,especially for Underwater Wireless Sensor Networks(UWSNs).To this end,this paper investigates the relationship between the Degree of Target Change(DoTC)and the detection period,as well as the impact of individual nodes.A Hierarchical Detection and Tracking Approach(HDTA)is proposed.Firstly,the network detection period is determined according to DoTC,which reflects the variation of target motion.Secondly,during the network detection period,each detection node calculates its own node detection period based on the detection mutual information.Taking DoTC as pheromone,an ant colony algorithm is proposed to adaptively adjust the network detection period.The simulation results show that the proposed HDTA with the optimizations of network level and node level significantly improves the detection accuracy by 25%and the network energy consumption by 10%simultaneously,compared to the traditional adaptive period detection schemes. 展开更多
关键词 Underwater wireless sensor networks The degree of target change Mutual information PHEROMONE Adaptive period
在线阅读 下载PDF
Joint jammer selection and power optimization in covert communications against a warden with uncertain locations 被引量:1
12
作者 Zhijun Han Yiqing Zhou +3 位作者 Yu Zhang Tong-Xing Zheng Ling Liu Jinglin Shi 《Digital communications and networks》 2025年第4期1113-1123,共11页
In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(... In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(CSI),which is difficult to achieve in practice.To be more practical,it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI,which makes it difficult for legitimate transceivers to estimate the detection probability of the warden.First,the uncertainty caused by the unknown warden location must be removed,and the Optimal Detection Position(OPTDP)of the warden is derived which can provide the best detection performance(i.e.,the worst case for a covert communication).Then,to further avoid the impractical assumption of perfect CSI,the covert throughput is maximized using only the channel distribution information.Given this OPTDP based worst case for covert communications,the jammer selection,the jamming power,the transmission power,and the transmission rate are jointly optimized to maximize the covert throughput(OPTDP-JP).To solve this coupling problem,a Heuristic algorithm based on Maximum Distance Ratio(H-MAXDR)is proposed to provide a sub-optimal solution.First,according to the analysis of the covert throughput,the node with the maximum distance ratio(i.e.,the ratio of the distances from the jammer to the receiver and that to the warden)is selected as the friendly jammer(MAXDR).Then,the optimal transmission and jamming power can be derived,followed by the optimal transmission rate obtained via the bisection method.In numerical and simulation results,it is shown that although the location of the warden is unknown,by assuming the OPTDP of the warden,the proposed OPTDP-JP can always satisfy the covertness constraint.In addition,with an uncertain warden and imperfect CSI,the covert throughput provided by OPTDP-JP is 80%higher than the existing schemes when the covertness constraint is 0.9,showing the effectiveness of OPTDP-JP. 展开更多
关键词 Covert communications Uncertain warden Jammer selection Power optimization Throughput maximization
在线阅读 下载PDF
Nondestructive detection and classification of impurities-containing seed cotton based on hyperspectral imaging and one-dimensional convolutional neural network 被引量:1
13
作者 Yeqi Fei Zhenye Li +2 位作者 Tingting Zhu Zengtao Chen Chao Ni 《Digital communications and networks》 2025年第2期308-316,共9页
The cleanliness of seed cotton plays a critical role in the pre-treatment of cotton textiles,and the removal of impurity during the harvesting process directly determines the quality and market value of cotton textile... The cleanliness of seed cotton plays a critical role in the pre-treatment of cotton textiles,and the removal of impurity during the harvesting process directly determines the quality and market value of cotton textiles.By fusing band combination optimization with deep learning,this study aims to achieve more efficient and accurate detection of film impurities in seed cotton on the production line.By applying hyperspectral imaging and a one-dimensional deep learning algorithm,we detect and classify impurities in seed cotton after harvest.The main categories detected include pure cotton,conveyor belt,film covering seed cotton,and film adhered to the conveyor belt.The proposed method achieves an impurity detection rate of 99.698%.To further ensure the feasibility and practical application potential of this strategy,we compare our results against existing mainstream methods.In addition,the model shows excellent recognition performance on pseudo-color images of real samples.With a processing time of 11.764μs per pixel from experimental data,it shows a much improved speed requirement while maintaining the accuracy of real production lines.This strategy provides an accurate and efficient method for removing impurities during cotton processing. 展开更多
关键词 Seed cotton Film impurity Hyperspectral imaging Band optimization CLASSIFICATION
在线阅读 下载PDF
Computation and wireless resource management in 6G space-integrated-ground access networks 被引量:1
14
作者 Ning Hui Qian Sun +2 位作者 Lin Tian Yuanyuan Wang Yiqing Zhou 《Digital communications and networks》 2025年第3期768-777,共10页
In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this neces... In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this necessitates effective management of computation and wireless resources tailored to the requirements of various services.The heterogeneity of computation resources and interference among shared wireless resources pose significant coordination and management challenges.To solve these problems,this work provides an overview of multi-dimensional resource management in 6G SIG RAN,including computation and wireless resource.Firstly it provides with a review of current investigations on computation and wireless resource management and an analysis of existing deficiencies and challenges.Then focusing on the provided challenges,the work proposes an MEC-based computation resource management scheme and a mixed numerology-based wireless resource management scheme.Furthermore,it outlines promising future technologies,including joint model-driven and data-driven resource management technology,and blockchain-based resource management technology within the 6G SIG network.The work also highlights remaining challenges,such as reducing communication costs associated with unstable ground-to-satellite links and overcoming barriers posed by spectrum isolation.Overall,this comprehensive approach aims to pave the way for efficient and effective resource management in future 6G networks. 展开更多
关键词 Space-integrated-ground Radio access network MEC-based computation resource management Mixed numerology-based wireless resource management
在线阅读 下载PDF
Communication delay-aware cooperative adaptive cruise control with dynamic network topologies——A convergence of communication and control 被引量:1
15
作者 Jihong Liu Yiqing Zhou Ling Liu 《Digital communications and networks》 2025年第1期191-199,共9页
Wireless communication-enabled Cooperative Adaptive Cruise Control(CACC)is expected to improve the safety and traffic capacity of vehicle platoons.Existing CACC considers a conventional communication delay with fixed ... Wireless communication-enabled Cooperative Adaptive Cruise Control(CACC)is expected to improve the safety and traffic capacity of vehicle platoons.Existing CACC considers a conventional communication delay with fixed Vehicular Communication Network(VCN)topologies.However,when the network is under attack,the communication delay may be much higher,and the stability of the system may not be guaranteed.This paper proposes a novel communication Delay Aware CACC with Dynamic Network Topologies(DADNT).The main idea is that for various communication delays,in order to maximize the traffic capacity while guaranteeing stability and minimizing the following error,the CACC should dynamically adjust the VCN network topology to achieve the minimum inter-vehicle spacing.To this end,a multi-objective optimization problem is formulated,and a 3-step Divide-And-Conquer sub-optimal solution(3DAC)is proposed.Simulation results show that with 3DAC,the proposed DADNT with CACC can reduce the inter-vehicle spacing by 5%,10%,and 14%,respectively,compared with the traditional CACC with fixed one-vehicle,two-vehicle,and three-vehicle look-ahead network topologies,thereby improving the traffic efficiency. 展开更多
关键词 Communication delay Cooperative adaptive Cruise control Network topology String stability
在线阅读 下载PDF
Sensing accuracy gain,unified performance analysis and optimization in 6G cooperative ISAC systems 被引量:1
16
作者 Guangyi Liu Lincong Han +3 位作者 Rongyan Xi Jing Dong Jing Jin Qixing Wang 《Digital communications and networks》 2025年第5期1657-1667,共11页
Sixth Generation(6G)mobile communication networks will involve sensing as a new function,with the overwhelming trend of Integrated Sensing And Communications(ISAC).Although expanding the serving range of the networks,... Sixth Generation(6G)mobile communication networks will involve sensing as a new function,with the overwhelming trend of Integrated Sensing And Communications(ISAC).Although expanding the serving range of the networks,there exists performance trade-offbetween communication and sensing,in that they have competitions on the physical resources.Different resource allocation schemes will result in different sensing and communication performance,thus influencing the system’s overall performance.Therefore,how to model the system’s overall performance,and how to optimize it are key issues for ISAC.Relying on the large-scale deployment of the networks,cooperative ISAC has the advantages of wider coverage,more robust performance and good compatibility of multiple monostatic and multistatic sensing,compared to the non-cooperative ISAC.How to capture the performance gain of cooperation is a key issue for cooperative ISAC.To address the aforementioned vital problems,in this paper,we analyze the sensing accuracy gain,propose a unified ISAC performance evaluation framework and design several optimization methods in cooperative ISAC systems.The cooperative sensing accuracy gain is theoretically analyzed via Cramér Rao lower bound.The unified ISAC performance evaluation model is established by converting the communication mutual information to the effective minimum mean squared error.To optimize the unified ISAC performance,we design the optimization algorithms considering three factors:base stations’working modes,power allocation schemes and waveform design.Through simulations,we show the performance gain of the cooperative ISAC system and the effectiveness of the proposed optimization methods. 展开更多
关键词 6G Integrated sensing and communications Cooperative sensing Cramér Rao lower bound Orthogonal frequency division multiplexing
在线阅读 下载PDF
CMBA-FL: Communication-mitigated and blockchain-assisted federated learning for traffic flow predictions 被引量:1
17
作者 Kaiyin Zhu Mingming Lu +2 位作者 Haifeng Li Neal NXiong Wenyong He 《Digital communications and networks》 2025年第3期724-733,共10页
As an effective strategy to address urban traffic congestion,traffic flow prediction has gained attention from Federated-Learning(FL)researchers due FL’s ability to preserving data privacy.However,existing methods fa... As an effective strategy to address urban traffic congestion,traffic flow prediction has gained attention from Federated-Learning(FL)researchers due FL’s ability to preserving data privacy.However,existing methods face challenges:some are too simplistic to capture complex traffic patterns effectively,and others are overly complex,leading to excessive communication overhead between cloud and edge devices.Moreover,the problem of single point failure limits their robustness and reliability in real-world applications.To tackle these challenges,this paper proposes a new method,CMBA-FL,a Communication-Mitigated and Blockchain-Assisted Federated Learning model.First,CMBA-FL improves the client model’s ability to capture temporal traffic patterns by employing the Encoder-Decoder framework for each edge device.Second,to reduce the communication overhead during federated learning,we introduce a verification method based on parameter update consistency,avoiding unnecessary parameter updates.Third,to mitigate the risk of a single point of failure,we integrate consensus mechanisms from blockchain technology.To validate the effectiveness of CMBA-FL,we assess its performance on two widely used traffic datasets.Our experimental results show that CMBA-FL reduces prediction error by 11.46%,significantly lowers communication overhead,and improves security. 展开更多
关键词 Blockchain Communication mitigating Federated learning Traffic flow prediction
在线阅读 下载PDF
Adaptor signature based on randomized EdDSA in blockchain 被引量:1
18
作者 Yixing Zhu Huilin Li +1 位作者 Mengze Li Yong Yu 《Digital communications and networks》 2025年第3期689-699,共11页
Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signatu... Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signature,adaptor signature can bind the release of a complete digital signature with the exchange of a secret value.Existing constructions of adaptor signatures are mainly based on Schnorr or ECDSA signature algorithms,which suffer low signing efficiency and long signature length.In this paper,to address these issues,we propose a new construction of adaptor signature using randomized EdDSA,which has Schnorr-like structure with higher signing efficiency and shorter signature length.We prove the required security properties,including unforgeability,witness extractability and pre-signature adaptability,of the new adaptor signature scheme in the random oracle model.We conduct a comparative analysis with an ECDSA-based adaptor signature scheme to demonstrate the effectiveness and feasibility of our new proposal. 展开更多
关键词 Blockchain Adaptor signature Randomized EdDSA Payment channel
在线阅读 下载PDF
A hierarchical blockchain-enabled distributed federated learning system with model contribution based rewarding 被引量:1
19
作者 Haibo Wang Hongwei Gao +2 位作者 Teng Ma Chong Li Tao Jing 《Digital communications and networks》 2025年第1期35-42,共8页
Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privac... Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privacy-preserving Web3 scenarios.However,DFL faces incentive and security challenges in the decentralized framework.To address these issues,this paper presents a Hierarchical Blockchain-enabled DFL(HBDFL)system,which provides a generic solution framework for the DFL-related applications.The proposed system consists of four major components,including a model contribution-based reward mechanism,a Proof of Elapsed Time and Accuracy(PoETA)consensus algorithm,a Distributed Reputation-based Verification Mechanism(DRTM)and an Accuracy-Dependent Throughput Management(ADTM)mechanism.The model contribution-based rewarding mechanism incentivizes network nodes to train models with their local datasets,while the PoETA consensus algorithm optimizes the tradeoff between the shared model accuracy and system throughput.The DRTM improves the system efficiency in consensus,and the ADTM mechanism guarantees that the throughput performance remains within a predefined range while improving the shared model accuracy.The performance of the proposed HBDFL system is evaluated by numerical simulations,with the results showing that the system improves the accuracy of the shared model while maintaining high throughput and ensuring security. 展开更多
关键词 Blockchain Federated learning Consensus scheme Accuracy dependent throughput management
在线阅读 下载PDF
Lightweight consensus mechanisms in the Internet of Blockchained Things:Thorough analysis and research directions 被引量:1
20
作者 Somia Sahraoui Abdelmalik Bachir 《Digital communications and networks》 2025年第4期1245-1260,共16页
The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and ... The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support. 展开更多
关键词 Blockchain Internet of Things Lightweight consensus
在线阅读 下载PDF
上一页 1 2 137 下一页 到第
使用帮助 返回顶部