期刊文献+
共找到8,897篇文章
< 1 2 250 >
每页显示 20 50 100
NOMA-ISAC系统资源分配研究综述
1
作者 王正强 陈淼 +1 位作者 万晓榆 樊自甫 《电讯技术》 北大核心 2026年第1期152-162,共11页
将非正交多址接入(Non-orthogonal Multiple Access,NOMA)与通信感知一体化(Integrated Sensing and Communications,ISAC)结合的NOMA-ISAC系统成为6G的一个重要研究方向。通过文献梳理,将NOMA-ISAC系统的资源分配问题分成两个大类和四... 将非正交多址接入(Non-orthogonal Multiple Access,NOMA)与通信感知一体化(Integrated Sensing and Communications,ISAC)结合的NOMA-ISAC系统成为6G的一个重要研究方向。通过文献梳理,将NOMA-ISAC系统的资源分配问题分成两个大类和四个小类进行概述。首先,从技术理论创新的角度对NOMA-ISAC系统功率资源分配和时频资源分配进行了概述;其次,从系统架构创新的角度对可重构智能反射面(Intelligent Reconfigurable Surfaces,IRS)结合的NOMA-ISAC系统资源分配、其他新兴技术结合的NOMA-ISAC系统资源分配两方面概述了NOMA-ISAC系统资源分配的研究现状;最后,总结了当前研究中面临的主要挑战,并展望了NOMA-ISAC系统未来的研究趋势。 展开更多
关键词 非正交多址接入(NOMA) 通信感知一体化(isac) 可重构智能反射面(IRS) 资源分配
在线阅读 下载PDF
双窃听威胁下ISAC系统的保密速率折中分析与安全预编码设计
2
作者 焦世恒 钟州 +2 位作者 马克明 胡晓言 华浩江 《电信科学》 北大核心 2026年第1期145-158,共14页
研究了存在双窃听威胁的单站通信感知一体化(integrated sensing and communication,ISAC)系统。该系统中,基站与合法用户通信的同时,接收其反射的回波信号进行感知,而环境中存在窃听通信信息的通信窃听者(communication eavesdropper,C... 研究了存在双窃听威胁的单站通信感知一体化(integrated sensing and communication,ISAC)系统。该系统中,基站与合法用户通信的同时,接收其反射的回波信号进行感知,而环境中存在窃听通信信息的通信窃听者(communication eavesdropper,ComEve)和监听合法用户回波信号进行被动感知窃听的感知窃听者(sensing eavesdropper,SenEve)。针对感知窃听问题,推导了感知保密速率的表达式,并建立了通信和感知保密速率的加权优化模型,求得兼顾两者安全性能的系统性能上界。为解决实际ISAC系统中的安全性能优化问题,建立了不同约束条件下最大化感知或通信保密速率的优化问题,得到了不同需求下的最优安全预编码设计方案。仿真结果表明,所提预编码方案相较于单一考虑通信或感知安全的预编码方案,系统整体安全性能平均提升约30%。 展开更多
关键词 通信感知一体化 双窃听威胁 安全预编码 保密速率 安全性能上界
在线阅读 下载PDF
UAV-assisted full-duplex ISAC:Joint communication scheduling,beamforming,and trajectory optimization
3
作者 Yuanshuo Gang Yuexia Zhang Xinyi Wang 《Digital Communications and Networks》 2025年第5期1628-1638,共11页
This paper proposes the Unmanned Aerial Vehicle(UAV)-assisted Full-Duplex(FD)Integrated Sensing And Communication(ISAC)system.In this system,the UAV integrates sensing and communication functions,capable of receiving ... This paper proposes the Unmanned Aerial Vehicle(UAV)-assisted Full-Duplex(FD)Integrated Sensing And Communication(ISAC)system.In this system,the UAV integrates sensing and communication functions,capable of receiving transmission signals from Uplink(UL)users and echo signal from target,while communicating with Downlink(DL)users and simultaneously detecting target.With the objective of maximizing the Average Sum Rate(ASR)for both UL and DL users,a composite non-convex optimization problem is established,which is decomposed into sub-problems of communication scheduling optimization,transceiver beamforming design,and UAV trajectory optimization.An alternating iterative algorithm is proposed,employing relaxation optimization,extremum traversal search,augmented weighted minimum mean square error,and successive convex approximation methods to solve the aforementioned sub-problems.Simulation results demonstrate that,compared to the traditional UAV-assisted Half-Duplex(HD)ISAC scheme,the proposed FD ISAC scheme effectively improves the ASR. 展开更多
关键词 Integrated sensing and communication Unmanned aerial vehicle Full-duplex communication BEAMFORMING Trajectory optimization
在线阅读 下载PDF
Aerial-networked ISAC-empowered collaborative energy-efficient covert communications
4
作者 Jun WU Weijie YUAN +2 位作者 Qin TAO Hongjia HUANG Derrick Wing Kwan NG 《Chinese Journal of Aeronautics》 2025年第10期185-200,共16页
Covert unmanned aerial vehicle(UAV)communication has garnered considerable attention in wireless systems for realizing the sustainable low-altitude economy(LAE).This paper investigates the system policy,trajectory des... Covert unmanned aerial vehicle(UAV)communication has garnered considerable attention in wireless systems for realizing the sustainable low-altitude economy(LAE).This paper investigates the system policy,trajectory design,and resource allocation for energy-efficient aerial networked systems with the aid of an integrated sensing and communications(ISAC)framework,in which multiple UAVs are employed to simultaneously conduct cooperative sensing and covert downlink transmissions to multiple ground users(GUs)in the presence of a mobile warden(Willie).Specifically,to improve the communication covertness,UAVs are strategically switched between jamming(JUAV)and information(IUAV)modes.Additionally,to cope with the mobility of Willie,an unscented Kalman filtering(UKF)-based method is employed to track and predict Willie’s location relying on the delay and Doppler measurements extracted from the ISAC echoes.Capitalizing on the predicted Willie’s location,a real-time energy efficiency(EE)maximization problem is formulated by jointly optimizing the JUAV selection strategy,IUAV-GU scheduling,communication/jamming power allocation,and UAV trajectories design.The formulation takes into account the communication covertness requirement and the maximum transmit power budget,leading to a mixed-integer non-convex fractional programming.To tackle this challenge,the alternating optimization(AO)approach is adopted,which decomposes the original problem into a series of sub-problems,allowing us to obtain an efficient sub-optimal solution.Simulation results demonstrate that the proposed scheme is capable of tracking Willie accurately and offering excellent system EE performance compared to various benchmark schemes adopting existing designs. 展开更多
关键词 Integrated sensing and communication Unmanned aerial vehicles Low-altitude economy Trajectory design Jammer selection
原文传递
Energy Efficient Covert Communication in a Direct Uplink Satellite-Ground Communication Scenario
5
作者 Fu Shu Zeng Wen +1 位作者 Yin Liuguo Zhao Lian 《China Communications》 2026年第1期166-174,共9页
Efficient energy utilization in covert communication sustains covertness while assuring communication quality and efficiency.This paper investigates covert communication energy efficiency(EE)in direct uplink satellite... Efficient energy utilization in covert communication sustains covertness while assuring communication quality and efficiency.This paper investigates covert communication energy efficiency(EE)in direct uplink satellite-ground communications,focusing on enhancing system EE via optimized transmit beamforming and satellite orbit altitude selection.This paper first establishes an optimization problem to maximize system EE in a direct uplink satelliteground covert communication scenario.To solve this non-convex optimization problem,it is decomposed into two subproblems and solved using the successive convex approximation(SCA)method.Based on the above methods,this paper proposes an overall iterative optimization algorithm.Simulation results demonstrate that the proposed algorithm surpasses the conventional baseline algorithms in terms of system EE.Furthermore,they elucidate the correlation between the amount of information received by the receiver and the variations in the satellite’s orbital altitude. 展开更多
关键词 covert communication direct uplink satellite-ground communication energy efficiency
在线阅读 下载PDF
Enhancing Disaster Response with IoFT:An Adaptive Communication Model for UAV-Based Surveillance
6
作者 A.F.M.Suaib Akhter 《Computer Modeling in Engineering & Sciences》 2026年第2期893-921,共29页
The modern world remains vulnerable to natural disasters,including floods,earthquakes,wildfires,and others.These events remain unpredictable and inevitable,and recovering quickly and effectively requires significant e... The modern world remains vulnerable to natural disasters,including floods,earthquakes,wildfires,and others.These events remain unpredictable and inevitable,and recovering quickly and effectively requires significant effort and expense.Monitoring is becoming more efficient thanks to technologies such as Unmanned Aerial Vehicles(UAVs),which can access hard-to-reach areas and provide real-time data.However,in disaster-affected areas,these monitoring systems may encounter many obstacles when communicating with servers or transmitting monitored data.This paper proposes an adaptive communication model to overcome the challenges faced in disaster-affected areas.A base station is responsible for collecting data(such as images and videos)captured by UAVs performing surveillance within its communication range.This station is typically a tower providing fixed cellular network service.However,in the absence of such a tower,a selected UAV may serve as the station,depending on the situation.If surveillance needs to be performed outside the coverage area,it can continue to communicate via nearby UAVs through cooperative communication.UAVs with internet support,known as the Internet of Flying Things(IoFT),will also be utilized to enhance communication capacity and efficiency.The proposed communication model is validated through experiments,showing superior data transmission performance and higher throughput.Analysis indicates it outperforms traditional systems,even in rural areas,with or without internet access. 展开更多
关键词 UAV communication IoFT natural disaster IOT
在线阅读 下载PDF
Analysis of Ningxia’s Tourism Culture and Ethnic Exchange,Communication and Integration
7
作者 SHI Ruiqing 《Cultural and Religious Studies》 2026年第1期78-82,共5页
Ningxia is an ethnic gathering area boasting abundant tourism and cultural resources.Developing the cause of tourism and culture is an important way to encourage all ethnic groups to respect differences,embrace divers... Ningxia is an ethnic gathering area boasting abundant tourism and cultural resources.Developing the cause of tourism and culture is an important way to encourage all ethnic groups to respect differences,embrace diversity,and demonstrate their interactions,exchanges,and integration in tourism activities.As an important preserve of the distinctive cultures of the Chinese nation and a prominent world tourist destination,Ningxia should strive to foster and consolidate the sense of a community with a shared future for the Chinese nation in developing its tourism and culture under the new historical conditions.It is imperative to advance the prosperity and development of tourism and culture in boosting ethnic interactions,exchanges,and integration through the formulation of tourism and cultural policies and plans,as well as the development and design of tourism and cultural projects. 展开更多
关键词 Ningxia tourism culture EXCHANGE communication and integration
在线阅读 下载PDF
Bias Calibration under Constrained Communication Using Modified Kalman Filter:Algorithm Design and Application to Gyroscope Parameter Error Calibration
8
作者 Qi Li Yifan Wang +2 位作者 Yuxi Liu Xingjing She Yixuan Wu 《Computer Modeling in Engineering & Sciences》 2026年第1期680-697,共18页
In data communication,limited communication resources often lead to measurement bias,which adversely affects subsequent system estimation if not effectively handled.This paper proposes a novel bias calibration algorit... In data communication,limited communication resources often lead to measurement bias,which adversely affects subsequent system estimation if not effectively handled.This paper proposes a novel bias calibration algorithm under communication constraints to achieve accurate system states of the interested system.An output-based event-triggered scheme is first employed to alleviate transmission burden.Accounting for the limited-communication-induced measurement bias,a novel bias calibration algorithm following the Kalman filtering line is developed to restrain the effect of the measurement bias on system estimation,thereby achieving accurate system state estimates.Subsequently,the Field Programmable Gate Array(FPGA)implementation of the proposed algorithm is also realized with the hope of providing fast bias calibration in practical scenarios.A simulation about a numerical example and a practical example(for gyroscope’s angular velocity bias calibration)on MATLAB is provided to demonstrate the feasibility and effectiveness of the proposed algorithm. 展开更多
关键词 Bias calibration state estimation limited communication event-Triggered scheme
在线阅读 下载PDF
Channel Characteristics Analysis in Semi-Basement Scenarios for Smart Meter Communication Systems
9
作者 Wang Qing Zhang Zhaolei +1 位作者 Liu Yu Ren Yi 《China Communications》 2026年第1期92-106,共15页
The smart meter communication system has substantial application value for the construction and upgrading of the entire power system.The deployment of the transmitter(Tx)of the smart meter system in the residential sc... The smart meter communication system has substantial application value for the construction and upgrading of the entire power system.The deployment of the transmitter(Tx)of the smart meter system in the residential scenarios is vexed by the need for more theoretical support.This paper mainly studies the communication channel between the Tx at semibasement and receiver(Rx)at outdoor.The design of an effective communication system relies on an accurate understanding of channel characteristics.Channel measurements and ray-tracing channel modeling are conducted to obtain channel data.The influence of different positions at same semi-basement is studied.Typical channel characteristics are analyzed,such as power delay profile(PDP),power angular profile(PAP),root-mean-square(RMS)delay spread(DS),channel capacity,received power,and path loss.The influence of different semi-basement placements and different floor heights is also compared.Besides,the channel measurements and simulation data fit well,which can illustrate the validity and reliability of the acquired channel data.This paper can provide theoretical support for the design and optimization of smart meter communication systems in semi-basement scenarios. 展开更多
关键词 channel characteristics channel measurements ray-tracing method semi-basement scenarios smart meter communication
在线阅读 下载PDF
A Distributed Anonymous Reputation System for V2X Communication
10
作者 Shahidatul Sadiah Toru Nakanishi 《Computers, Materials & Continua》 2026年第4期1030-1050,共21页
V2X communication enables vehicles to share real-time traffic and road-condition data,but binding messages to persistent identifiers enables location tracking.Furthermore,since forged reports from malicious vehicles c... V2X communication enables vehicles to share real-time traffic and road-condition data,but binding messages to persistent identifiers enables location tracking.Furthermore,since forged reports from malicious vehicles can distort trust decisions and threaten road safety,privacy-preserving trust management is essential.Lu et al.previously presented BARS,an anonymous reputation mechanism founded on blockchain technology to establish a privacy-preserving trust architecture for V2X communication.In this system,reputation certificates without a vehicle identifier ensure anonymity,while two authorities jointly manage certificate issuance and reputation updates.However,the centralized certificate updates introduce scalability limitations,and the authorities can trace vehicle behavioral information,which threatens privacy guarantees.Several subsequent systems derived from BARS still rely on centralized certificate management and are subject to authority-side privacy leakage.As a result,a key challenge in this line of research remains unresolved:how to decentralize the certificate-update process while preserving privacy against the authorities in privacy-preservingV2X trustmanagement.In this paper,we propose a distributed anonymous reputation system for V2X communication,based on an anonymous reputation system for crowdsensing.In our proposed system for V2X communication,the server is distributed to a certificate authority(CA)and roadside units(RSUs).Each vehicle shows the reputation level to the nearest RSU at the beginning of each time interval,and registers a short-time public key.In the interval,the messages from the vehicle are authenticated under the public key and are scored.At the end of the interval,the nearest RSU updates the certificate anonymously.Our solution decentralizes the certificate-update process by assigning each update to the nearest RSU.A zero-knowledge-proof-based show protocol removes the need for any central authority to handle vehicle certificates and thus prevents the authorities from tracing vehicle activities.Compared with BARS,where centralized authorities must update the reputation certificates of many vehicles and may incur communication and processing delays,our system performs each update locally at the nearest RSUonce per interval.The required interaction consists only of a fewkilobytes of communication and a zero-knowledge proof that is almost fully precomputed on the vehicle side,while the RSU-side processing is estimated to take about 40 ms based on timingmeasurements of the underlying cryptographic operations.This distributed updatemodel avoids the centralized bottleneck of BARS and simultaneously removes the privacy risk arising from authority collusion. 展开更多
关键词 V2X communication anonymous reputation system proof of knowledge
在线阅读 下载PDF
Integrating Ideological Education With Competency Cultivation:Teaching Practices for an Intercultural Communication Course Under the New Liberal Arts Background
11
作者 WU Yuan 《Sino-US English Teaching》 2026年第1期10-16,共7页
This study investigates how to pedagogically integrate ideological education with competency development in the Intercultural Communication course,a challenge arising from China’s dual reform contexts of the New Libe... This study investigates how to pedagogically integrate ideological education with competency development in the Intercultural Communication course,a challenge arising from China’s dual reform contexts of the New Liberal Arts initiative and the national curriculum ideology policy.As global interactions intensify,cultivating foreign language professionals who possess both firm cultural confidence and sophisticated intercultural competence have become a critical educational imperative.This exploratory study investigates how a three-dimensional“Value-Knowledge-Competency”framework can guide the redesign of course content,task design,and assessment to achieve organic fusion.Drawing on qualitative data from a case study,it analyzes specific implementation pathways,synthesizes teacher and student feedback,and discusses the resultant challenges and broader implications for foreign language curriculum reform.The findings suggest that such an integrated approach can effectively synergize value guidance with skill cultivation,though its success hinges on overcoming issues related to pedagogical naturalness,resource allocation,and standardized evaluation. 展开更多
关键词 New Liberal Arts ideological-political education Intercultural communication teaching practice integrated framework
在线阅读 下载PDF
FedCCM:Communication-Efficient Federated Learning via Clustered Client Momentum in Non-IID Settings
12
作者 Hang Wen Kai Zeng 《Computers, Materials & Continua》 2026年第3期1690-1707,共18页
Federated learning often experiences slow and unstable convergence due to edge-side data heterogeneity.This problem becomes more severe when edge participation rate is low,as the information collected from different e... Federated learning often experiences slow and unstable convergence due to edge-side data heterogeneity.This problem becomes more severe when edge participation rate is low,as the information collected from different edge devices varies significantly.As a result,communication overhead increases,which further slows down the convergence process.To address this challenge,we propose a simple yet effective federated learning framework that improves consistency among edge devices.The core idea is clusters the lookahead gradients collected from edge devices on the cloud server to obtain personalized momentum for steering local updates.In parallel,a global momentum is applied during model aggregation,enabling faster convergence while preserving personalization.This strategy enables efficient propagation of the estimated global update direction to all participating edge devices and maintains alignment in local training,without introducing extra memory or communication overhead.We conduct extensive experiments on benchmark datasets such as Cifar100 and Tiny-ImageNet.The results confirm the effectiveness of our framework.On CIFAR-100,our method reaches 55%accuracy with 37 fewer rounds and achieves a competitive final accuracy of 65.46%.Even under extreme non-IID scenarios,it delivers significant improvements in both accuracy and communication efficiency.The implementation is publicly available at https://github.com/sjmp525/CollaborativeComputing/tree/FedCCM(accessed on 20 October 2025). 展开更多
关键词 Federated learning distributed computation communication efficient momentum clustering non-independent and identically distributed(non-IID)
在线阅读 下载PDF
Cascading failure modeling and survivability analysis of weak-communication underwater unmanned swarm networks
13
作者 Yifan Yuan Xiaohong Shen +3 位作者 Lin Sun Ke He Yongsheng Yan Haiyan Wang 《Defence Technology(防务技术)》 2026年第2期66-82,共17页
Cascading failures pose a serious threat to the survivability of underwater unmanned swarm networks(UUSNs),significantly limiting their service ability in collaborative missions such as military reconnaissance and env... Cascading failures pose a serious threat to the survivability of underwater unmanned swarm networks(UUSNs),significantly limiting their service ability in collaborative missions such as military reconnaissance and environmental monitoring.Existing failure models primarily focus on power grids and traffic systems,and don't address the unique challenges of weak-communication UUSNs.In UUSNs,cascading failure present a complex and dynamic process driven by the coupling of unstable acoustic channels,passive node drift,adversarial attacks,and network heterogeneity.To address these challenges,a directed weighted graph model of UUSNs is first developed,in which node positions are updated according to ocean-current-driven drift and link weights reflect the probability of successful acoustic transmission.Building on this UUSNs graph model,a cascading failure model is proposed that integrates a normal-failure-recovery state-cycle mechanism,multiple attack strategies,and routingbased load redistribution.Finally,under a five-level connectivity UUSNs scheme,simulations are conducted to analyze how dynamic topology,network load,node recovery delay,and attack modes jointly affect network survivability.The main findings are:(1)moderate node drift can improve survivability by activating weak links;(2)based-energy routing(BER)outperform based-depth routing(BDR)in harsh conditions;(3)node self-recovery time is critical to network survivability;(4)traditional degree-based critical node metrics are inadequate for weak-communication UUSNs.These results provide a theoretical foundation for designing robust survivability mechanisms in weak-communication UUSNs. 展开更多
关键词 Weak communication Underwater unmanned swarm networks(UUSNs) Link success probability Cascading failure Node self-recovery Survivability analysis
在线阅读 下载PDF
Sum V2V Secrecy Rate Maximization for RIS-Assisted Vehicular Communication Systems with Spectrum Sharing
14
作者 LI Zhiwei LI Demin CHEN Xuemin 《Journal of Donghua University(English Edition)》 2026年第1期68-79,共12页
Vehicular communication systems rely on secure vehicle-to-vehicle(V2V)communications for safety-critical information exchange.However,the presence of eavesdropping vehicles poses a significant challenge.This paper inv... Vehicular communication systems rely on secure vehicle-to-vehicle(V2V)communications for safety-critical information exchange.However,the presence of eavesdropping vehicles poses a significant challenge.This paper investigates the security of V2V communications in reconfigurable intelligent surface(RIS)-assisted vehicular communication systems with spectrum sharing.It proposes a three-stage alternating optimization(TSAO)algorithm to address the complex problem of multiple eavesdropped V2V links that reuse the spectrum already occupied by vehicle-toinfrastructure(V2I)links.To solve the mixed-integer and non-convex optimization problem due to coupled variables and complex constraints,the algorithm decomposes the original problem into three easily solvable sub-problems:RIS reflection coefficient optimization,vehicle transmission power optimization,and spectrum sharing optimization.First,the RIS reflection coefficients are optimized by using the penalty convex-concave procedure(CCP)method.Second,the optimal power points are determined in the power optimization sub-problem.Finally,the spectrum sharing optimization sub-problem is constructed as a weighted bipartite graph matching problem and solved by using the optimal matching algorithm.The TSAO algorithm not only maximizes the sum V2V secrecy rate but also ensures the quality-of-service(QoS)requirements of the V2I links.Simulation results validate the superiority of the proposed algorithm and highlight the improvement in the sum V2V secrecy rate achieved by utilizing RIS technology in vehicular communication systems with spectrum sharing. 展开更多
关键词 vehicle-to-vehicle(V2V)communication eavesdropping vehicle reconfigurable intelligent surface(RIS) secrecy rate spectrum sharing
在线阅读 下载PDF
流体天线辅助的ISAC系统通感动态加权联合波束成形设计
15
作者 李飞 张杰 +1 位作者 李汀 宋云超 《通信学报》 北大核心 2025年第6期101-114,共14页
针对现有流体天线(FA)辅助通感一体化(ISAC)系统难以实现通信与感知动态权衡,且传统优化方法复杂度高的问题,提出一种基于加权联合优化通信与感知性能的FA辅助ISAC波束成形方案。首先,建立通信和速率与感知波束图增益加权和最大化模型,... 针对现有流体天线(FA)辅助通感一体化(ISAC)系统难以实现通信与感知动态权衡,且传统优化方法复杂度高的问题,提出一种基于加权联合优化通信与感知性能的FA辅助ISAC波束成形方案。首先,建立通信和速率与感知波束图增益加权和最大化模型,将通信速率最大化问题转换为加权最小均方误差(WMMSE)最小化形式,在发射功率约束下联合优化波束成形矩阵及收发端天线位置。然后,针对非凸的波束成形矩阵和FA位置优化问题,采用交替优化算法分解波束成形与位置优化子问题,结合泰勒展开与最大最小化(MM)算法构造凸松弛并推导闭式解。仿真结果表明,所提方案在通信与速率和波束图增益上明显优于传统ISAC系统,且通过调节权值可实现通信与感知性能的灵活权衡。 展开更多
关键词 流体天线 通感一体化 波束成形 联合优化 加权最小均方误差
在线阅读 下载PDF
近场ISAC多用户安全通信波束设计 被引量:1
16
作者 邓志祥 张志威 《电子与信息学报》 北大核心 2025年第11期4166-4175,共10页
该文研究了近场通感一体化系统(ISAC)中多用户安全波束设计问题,其中多个单天线通信用户和一个雷达感知目标都位于发射机的近场区域内,雷达目标作为潜在窃听者,可能从联合波束中获取通信信息。为保证系统通信安全性和感知精度,该文以多... 该文研究了近场通感一体化系统(ISAC)中多用户安全波束设计问题,其中多个单天线通信用户和一个雷达感知目标都位于发射机的近场区域内,雷达目标作为潜在窃听者,可能从联合波束中获取通信信息。为保证系统通信安全性和感知精度,该文以多用户可达安全和速率最大化为目标、以基站发射功率和感知性能为约束条件,构建了通信信号与雷达感知信号波束形成向量的联合优化模型。其中,雷达感知信号间兼具双重功能:一方面作为人工噪声,干扰窃听者对合法通信用户信息的解码;另一方面用于实现对目标的感知,其感知性能通过克拉美罗界(CRB)进行量化。为解决该多变量的非凸优化问题,该文提出了基于半正定松弛(SDR)和加权最小均方误差(WMMSE)的优化算法求解该优化问题。仿真结果表明近场模型所提供的距离自由度,以及引入人工噪声信号,能够为多用户ISAC通信安全带来性能增益。 展开更多
关键词 近场通信 通感一体化 物理层安全 加权最小均方误差
在线阅读 下载PDF
大规模STAR-RIS辅助的近场ISAC传输方法
17
作者 王小明 李佳琪 +2 位作者 刘婷 蒋锐 徐友云 《电子与信息学报》 北大核心 2025年第1期147-155,共9页
同时透射和反射可重构智能表面(STAR-RIS)能够创建全空间智能无线电环境,有效提高无线通信系统性能,具有广阔的研究潜力。因此,该文提出一种大规模STAR-RIS辅助的近场通感一体化(ISAC)方法,并对感知目标3维参数估计的克拉美罗界(CRB)进... 同时透射和反射可重构智能表面(STAR-RIS)能够创建全空间智能无线电环境,有效提高无线通信系统性能,具有广阔的研究潜力。因此,该文提出一种大规模STAR-RIS辅助的近场通感一体化(ISAC)方法,并对感知目标3维参数估计的克拉美罗界(CRB)进行优化。首先,搭建近场系统模型,分别推导基站、STAR-RIS、通信用户、感知目标与传感器之间的导向矢量。其次,通过设计基站发射波束成形矩阵、发射信号协方差矩阵和STAR-RIS透射反射系数,实现感知性能最优化。再次,针对非凸优化问题利用半正定松弛方法进行求解。仿真结果表明了所提出ISAC方案的有效性,以及近场额外距离自由度所带来的定位性能优势。 展开更多
关键词 可重构智能表面 通感一体化 近场通信 克拉美罗界
在线阅读 下载PDF
面向OTFS-ISAC系统的智能信道估计现状、挑战与展望
18
作者 廖勇 常星宇 苏畅 《移动通信》 2025年第1期91-100,共10页
OTFS和ISAC技术均是6G移动通信的关键候选技术,OTFS和ISAC的融合系统OTFS-ISAC是当前移动通信研究的前沿。信道估计是接收机的关键处理,对系统性能起着重要的作用。同时,人工智能技术日益成为重要的通信系统信号处理手段。为此,对OTFS-I... OTFS和ISAC技术均是6G移动通信的关键候选技术,OTFS和ISAC的融合系统OTFS-ISAC是当前移动通信研究的前沿。信道估计是接收机的关键处理,对系统性能起着重要的作用。同时,人工智能技术日益成为重要的通信系统信号处理手段。为此,对OTFS-ISAC系统的智能信道估计进行了综述。首先描述OTFS-ISAC的系统模型,包括调制、解调以及雷达和通信模型;其次,详细阐述了三种智能信道估计方法:基于贝叶斯学习的稀疏估计、基于具有自适应阈值的深度卷积残差网络的信道估计和基于迭代深度学习网络的信道估计,这些方法利用了人工智能技术为信道估计问题提供了新的解决途径;然后,探讨了OTFS-ISAC系统中信道估计面临的技术挑战,包括信道特性的复杂性、参数估计的不一致性与复杂性、资源分配和开销问题以及技术融合与兼容性问题;最后,展望了技术创新与突破、标准化与规范化、应用场景的拓展以及跨领域合作与融合的未来发展方向。 展开更多
关键词 OTFS isac 信道估计 人工智能 深度学习 贝叶斯学习 6G
在线阅读 下载PDF
可移动天线赋能的ISAC系统中波束赋形与天线位置联合优化 被引量:1
19
作者 李振东 巴建乐 +3 位作者 苏洲 赵伟淳 陈文 朱政宇 《电子与信息学报》 北大核心 2025年第10期3482-3491,共10页
该文聚焦于通信感知一体化(ISAC)系统性能优化问题,提出一种可移动天线(MA)赋能的创新解决方案。针对传统固定天线阵列因空间自由度受限导致的波束调控能力不足,该研究通过动态调整发射端MA元素的位置来充分利用无线信道空间特性。在满... 该文聚焦于通信感知一体化(ISAC)系统性能优化问题,提出一种可移动天线(MA)赋能的创新解决方案。针对传统固定天线阵列因空间自由度受限导致的波束调控能力不足,该研究通过动态调整发射端MA元素的位置来充分利用无线信道空间特性。在满足用户通信与雷达感知需求的约束条件下,建立了包含MA元素离散位置、波束赋形向量和感知信号协方差矩阵的联合优化模型,以最小化系统发射功率。为解决优化变量耦合度高且包含二元离散变量的难题,该文采用离散二进制粒子群优化(BPSO)算法框架进行求解。具体地,首先,通过适应度函数迭代地确定MA元素的离散位置,并运用半正定松弛(SDR)和逐次凸近似(SCA)技术处理非凸约束,进一步求解波束赋形向量和感知协方差矩阵。仿真结果表明,相较于传统固定天线阵列基准方案,所提方案在降低ISAC系统发射功率方面具有显著优势。该文为MA赋能的ISAC系统能耗优化提供了新的思路,对下一代无线通信系统的通信感知融合网络设计具有重要指导意义。 展开更多
关键词 通信感知一体化 可移动天线 离散二进制粒子群优化 波束赋形
在线阅读 下载PDF
分布式ISAC数据收集处理与资源分配研究综述
20
作者 阙杭 王一卓 +7 位作者 金倬昊 周嘉舜 贺勇臻 尹康 杨杰 李潇 夏树强 金石 《移动通信》 2025年第12期99-108,共10页
ISAC(通信感知一体化)技术在6G网络中具有重要的研究价值和应用前景。综述了分布式ISAC数据收集处理与资源分配的研究进展,重点分析了数据采集与预处理、单目标定位、多目标定位以及资源分配等关键技术。针对上述关键技术中存在的挑战,... ISAC(通信感知一体化)技术在6G网络中具有重要的研究价值和应用前景。综述了分布式ISAC数据收集处理与资源分配的研究进展,重点分析了数据采集与预处理、单目标定位、多目标定位以及资源分配等关键技术。针对上述关键技术中存在的挑战,如多模态数据生成、算法轻量化设计、时钟同步以及交互安全等,探讨了其未来可能的发展方向,并总结了分布式ISAC与包括边缘智能赋能、智能超表面、空天地一体化、太赫兹等关键技术的融合设计方案。通过综述分布式ISAC现有研究工作,总结现有问题挑战,讨论未来研究方向,旨在为分布式ISAC的发展提供参考,并为未来研究奠定基础。 展开更多
关键词 分布式isac 6G 目标定位 资源分配
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部