With the acceleration of the intelligent transformation of power systems,the requirements for communication technology are increasingly stringent.The application of 5G mobile communication technology in power communic...With the acceleration of the intelligent transformation of power systems,the requirements for communication technology are increasingly stringent.The application of 5G mobile communication technology in power communication is analyzed.In this study,5G technology features,application principles,and practical strategies are discussed,and methods such as network slicing,customized deployment,edge computing collaborative application,communication equipment integration and upgrading,and multi-technology collaboration and complementation are proposed.It aims to effectively improve the efficiency,reliability,and security of power communication,solve the problem that traditional communication technology is difficult to meet the diversified needs of power business,and achieve the effect of optimizing the power communication network and supporting the intelligent development of the power system.展开更多
1.Introduction Mobile communications have catalyzed a new era of informa-tion technology revolution,significantly broadening and deepen-ing human-to-human,human-to-machine,and machine-to-machine connections.With their...1.Introduction Mobile communications have catalyzed a new era of informa-tion technology revolution,significantly broadening and deepen-ing human-to-human,human-to-machine,and machine-to-machine connections.With their incredible speed of development and wide-reaching impact,mobile communications serve as the cornerstone of the Internet of Everything,profoundly reshaping human cognitive abilities and ways of thinking.Furthermore,mobile communications are altering the patterns of production and life,driving leaps in productivity quality,and strongly promot-ing innovation within human civilization.展开更多
Multiple quantum well(MQW) Ⅲ-nitride diodes that can simultaneously emit and detect light feature an overlapping region between their electroluminescence and responsivity spectra, which allows them to be simultaneous...Multiple quantum well(MQW) Ⅲ-nitride diodes that can simultaneously emit and detect light feature an overlapping region between their electroluminescence and responsivity spectra, which allows them to be simultaneously used as both a transmitter and a receiver in a wireless light communication system. Here, we demonstrate a mobile light communication system using a time-division multiplexing(TDM) scheme to achieve bidirectional data transmission via the same optical channel.Two identical blue MQW diodes are defined by software as a transmitter or a receiver. To address the light alignment issue, an image identification module integrated with a gimbal stabilizer is used to automatically detect the locations of moving targets;thus, underwater audio communication is realized via a mobile blue-light TDM communication mode. This approach not only uses a single link but also integrates mobile nodes in a practical network.展开更多
The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents ...The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency.展开更多
The widespread use of advanced electronic devices has led to the emergence of spatial crowdsourcing,a method that taps into collective efforts to perform real-world tasks like environmental monitoring and traffic surv...The widespread use of advanced electronic devices has led to the emergence of spatial crowdsourcing,a method that taps into collective efforts to perform real-world tasks like environmental monitoring and traffic surveillance.Our research focuses on a specific type of spatial crowdsourcing that involves ongoing,collaborative efforts for continuous spatial data acquisition.However,due to limited budgets and workforce availability,the collected data often lacks completeness,posing a data deficiency problem.To address this,we propose a reciprocal framework to optimize task assignments by leveraging the mutual benefits of spatiotemporal subtask execution.We introduce an entropy-based quality metric to capture the combined effects of incomplete data acquisition and interpolation imprecision.Building on this,we explore a quality-aware task assignment method,corresponding to spatiotemporal assignment strategies.Since the assignment problem is NP-hard,we develop a polynomial-time algorithm with the guaranteed approximation ratio.Novel indexing and pruning techniques are proposed to further enhance performance.Extensive experiments conducted on datasets validate the effectiveness of our methods.展开更多
A remote antenna unit (RAU) selection model is presented, and two kinds of handoffs, intra-cell handoff (HO) and inter-cell HO, are defined in distributed mobile communications systems (DAS). After that, an inte...A remote antenna unit (RAU) selection model is presented, and two kinds of handoffs, intra-cell handoff (HO) and inter-cell HO, are defined in distributed mobile communications systems (DAS). After that, an inter-cell HO model is proposed, in which the average power of the active set (AS) is used to predict the position of the mobile station (MS). The total power of the AS and the handoff set (HOS) are utilized to determine whether an inter-cell HO is necessary. Furthermore, the relationship between HO parameters and performance metrics is studied in detail based on RAU selection. Simulation results show that both the intra-cell HO and the inter-cell HO can achieve oerfect performance by aoprooriate settings of HO parameters.展开更多
Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important a...Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject.展开更多
The maritime communication networks(MCNs)for industry require reliable,efficient,and wide coverage to deploy emerging intelligent marine applications.To this end,unmanned aerial vehicles(UAVs)can be integrated into MC...The maritime communication networks(MCNs)for industry require reliable,efficient,and wide coverage to deploy emerging intelligent marine applications.To this end,unmanned aerial vehicles(UAVs)can be integrated into MCNs to extend flexibility and mobility.However,harsh maritime environments and open line-of-sight(LoS)links increase the UAV onboard energy consumption and worsen communication security.In this work,we aim to propose a collaborative beamforming-based physical layer secure and energy-efficient communication method for UAV-assisted MCNs,in which the energy limitations of UAVs and the interference from both known and unknown eavesdroppers as well as the possible collusion among eavesdroppers are considered.Specifically,we formulate a multi-objective optimization problem(MOP)to improve the system confidentiality rate,reduce the level ratio of the UAV virtual antenna array,and decrease the energy consumption of the UAVs by jointly optimizing the UAV positions and synthesizing the UAV virtual antenna array.This MOP is non-convex and NP-hard,and thus we propose an enhanced non-dominated sorted whale optimization algorithm(ENSWOA)to solve the problem.In ENSWOA,the introduced chaotic solution initialization,adaptive weighting,and optimal position updating methods can increase the searching capability of the algorithm.Simulation results show that the proposed ENSWOA outperforms the baseline algorithms,and can effectively enhance the security and energy efficiency of the considered system.展开更多
Due to the high flexibility of Unmanned Aerial Vehicles(UAVs),equipping Mobile Edge Computing(MEC)servers on UAVs can effectively and rapidly handle the high computing requirements of computation-intensive tasks.Howev...Due to the high flexibility of Unmanned Aerial Vehicles(UAVs),equipping Mobile Edge Computing(MEC)servers on UAVs can effectively and rapidly handle the high computing requirements of computation-intensive tasks.However,the Line-of-Sight(LoS)transmission between the UAV and ground users makes the offloading information be easily monitored.Therefore,this paper proposes a covert communication scheme against a flying warden in UAV-assisted MEC system.In the proposed scheme,the UAV server assists ground users in completing the computation of offloading tasks.To reduce the possibility of the flying warden detecting the transmission behavior of ground users to the UAV server,a ground jamming device sends jamming signals to the flying warden.The minimum computing capacity of the system is maximized by jointly optimizing ground users’resources and the UAV server’s trajectory under the constraint of system covertness.Due to the multivariable coupling,the optimization problem is non-convex.The optimization problem is first transformed into a tractable form,and then the optimizing solution is iteratively obtained using Successive Convex Approximation(SCA)and Block Coordinate Descent(BCD)algorithms.Numerical results show that,compared to the benchmark schemes,the proposed scheme effectively enhances the computing capacity of the system while meeting the system’s covertness requirements.展开更多
The rapid spread of information and communication technologies has precipitated the emergence of a novel e-commerce paradigm:mobile ordering.In conjunction with conventional online shopping,this development has signif...The rapid spread of information and communication technologies has precipitated the emergence of a novel e-commerce paradigm:mobile ordering.In conjunction with conventional online shopping,this development has significantly altered the travel pat-terns of urban residents and has the potential to either mitigate or exacerbate disparities in the distribution of amenities and resources.Behavioural research has concentrated on online shopping;there is a dearth of studies on the differences between online shopping and mobile ordering,two distinct types of e-commerce.Using the setting of the Wuhan Metropolitan Development Area in 2022,this study uses distribution probability indices,exploratory spatial data analysis,and a quantile regression model to investigate the spatial distribu-tion patterns of online shopping and mobile ordering and to assess the differential impacts of these two types of e-commerce on travel behaviour across urban and suburban locations.The main findings are as follows:1)the likelihood of engaging in online shopping is greater in suburban regions than urban regions,whereas mobile ordering is more prevalent in central urban areas.The high-value zones for both activities are concentrated in the suburban-rural fringe,approximately 24 km from the city’s geometric centre.2)The bivariate global Moran’s I indices for the impacts of both types of e-commerce on travel distance and travel frequency demonstrate significant spatial positive correlations(0.15±0.02),with P-values that are less than 0.001,indicating spatial heterogeneity in the impacts of e-commerce on travel behaviour.3)Online shopping exerts a positive influence on both travel distance and frequency,with a weaker in-fluence in central urban than suburban areas.Mobile ordering positively affects travel frequency,with a more pronounced influence in central urban than suburban areas.Additionally,mobile ordering has a negative impact on travel distance,with the impact being margin-ally less pronounced in the central urban area than in the suburban periphery.The results offer insights into the complex interplay between e-commerce and comprehensive travel behaviours across various geographical locations.展开更多
Mobile communication standards have been developed into a new era of B5G and 6G.In recent years,low earth orbit(LEO)satellites and space Internet have become hot topics.The integrated satellite and terrestrial systems...Mobile communication standards have been developed into a new era of B5G and 6G.In recent years,low earth orbit(LEO)satellites and space Internet have become hot topics.The integrated satellite and terrestrial systems have been widely discussed by industries and academics,and even are expected to be applied in those huge constellations in construction.This paper points out the trends of two stages towards system integration of the terrestrial mobile communication and the satellite communications:to be compatible with 5G,and to be integrated within 6G.Based on analysis of the challenges of both stages,key technologies are thereafter analyzed in detail,covering both air interface currently discussed in 3GPP for B5G and also novel network architecture and related transmission technologies toward future 6G.展开更多
This paper considers a UAV communication system with mobile edge computing(MEC).We minimize the energy consumption of the whole system via jointly optimizing the UAV's trajectory and task assignment as well as CPU...This paper considers a UAV communication system with mobile edge computing(MEC).We minimize the energy consumption of the whole system via jointly optimizing the UAV's trajectory and task assignment as well as CPU's computational speed under the set of resource constrains.To this end,we first derive the energy consumption model of data processing,and then obtain the energy consumption model of fixed-wing UAV's flight.The optimization problem is mathematically formulated.To address the problem,we first obtain the approximate optimization problem by applying the technique of discrete linear state-space approximation,and then transform the non-convex constraints into convex by using linearization.Furthermore,a concave-convex procedure(CCCP) based algorithm is proposed in order to solve the optimization problem approximately.Numerical results show the efficacy of the proposed algorithm.展开更多
To further promote the achievable average secrecy rate for UAV-ground communications, a UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional cooperative UAV is employed as a mobile...To further promote the achievable average secrecy rate for UAV-ground communications, a UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional cooperative UAV is employed as a mobile jammer to transmit the jamming signal to help keep the source UAV closer to the ground destination, thus establishing more favorable legitimate link and enhancing the secrecy performance. We aimed to maximize the achievable secrecy rate by jointly optimizing the trajectories and transmit power of both source UAV and jammer UAV. To solve the considered non-convex optimization problem, we presented a block coordinate descent based iterative algorithm to address a sequence of approximated convex problems for the optimized parameter block by block to find a local optimal solution. Numerical results verify that the proposed algorithm can achieve significant secrecy rate gain compared to all the benchmark schemes.展开更多
With the increasing maritime activities and the rapidly developing maritime economy, the fifth-generation(5G) mobile communication system is expected to be deployed at the ocean. New technologies need to be explored t...With the increasing maritime activities and the rapidly developing maritime economy, the fifth-generation(5G) mobile communication system is expected to be deployed at the ocean. New technologies need to be explored to meet the requirements of ultra-reliable and low latency communications(URLLC) in the maritime communication network(MCN). Mobile edge computing(MEC) can achieve high energy efficiency in MCN at the cost of suffering from high control plane latency and low reliability. In terms of this issue, the mobile edge communications, computing, and caching(MEC3) technology is proposed to sink mobile computing, network control, and storage to the edge of the network. New methods that enable resource-efficient configurations and reduce redundant data transmissions can enable the reliable implementation of computing-intension and latency-sensitive applications. The key technologies of MEC3 to enable URLLC are analyzed and optimized in MCN. The best response-based offloading algorithm(BROA) is adopted to optimize task offloading. The simulation results show that the task latency can be decreased by 26.5’ ms, and the energy consumption in terminal users can be reduced to 66.6%.展开更多
This paper is a preliminary and illustrative case study of Beijing's emergingmobile communication industrial (MCI) cluster, which helps understand the cluster by qualitativeanalysis and description. Beijing's ...This paper is a preliminary and illustrative case study of Beijing's emergingmobile communication industrial (MCI) cluster, which helps understand the cluster by qualitativeanalysis and description. Beijing's MCI cluster is emerging as far as the competence of the industryand its spatial concentration are concerned, although it is not the type of the cluster describedby PORTER due to the low competence of indigenous firms. The formation of the cluster can beexplained by means of the factor and demand conditions of Beijing. However, it is mostly determinedby the multinationals that promote the growth of the industry and the formation of the cluster, andby the government that also plays a key role in many ways. As a matter of fact, the interactionbetween the multinationals and the local government is the key to understanding the formation of thecluster. All in all, Beijing's emerging MCI cluster is a value-chain, geographically concentratedbut non-localized cluster, which is highly dominated by the multinationals and the local government.Its special characteristics bear some policy implications as to the change of the roles of thelocal government and the localization of multinationals, etc.展开更多
In the coexisted world of 3G,4G,5G and many other specialized wireless communication systems,billions of connections could be existing for various information transmission types.Unluckily,data show that the increase o...In the coexisted world of 3G,4G,5G and many other specialized wireless communication systems,billions of connections could be existing for various information transmission types.Unluckily,data show that the increase of network capacity is heavily more than the increase of the network energy efficiency in recent years,which could lead to more energy consumption per transmitted bit in the future network.As basic units in mobile communication systems,microwave/RF components and modules play key roles展开更多
With the popularization of wireless multimedia communications,the wireless traffic is predicated to be increased more than 1000time in the next decade.Some new technologies,e.g.,massive multi.input multi.output antenn...With the popularization of wireless multimedia communications,the wireless traffic is predicated to be increased more than 1000time in the next decade.Some new technologies,e.g.,massive multi.input multi.output antennas,millimeter wave and small展开更多
Based on the characteristics of the radio propagation in land mobile communications environment, a theoretical model for the reflecting(scattering) number of each radio path is derived firstly. This model can be used ...Based on the characteristics of the radio propagation in land mobile communications environment, a theoretical model for the reflecting(scattering) number of each radio path is derived firstly. This model can be used to predict the variation of radio path strength, which is important for practical mobile communications engineering. Using this model, a method for simulating radio path strength is developed, with numerical results presented.展开更多
The cooperative localization(CL)is affected by the communication topology among the platforms.Based on the unscented Kalman filtering,the distributed CL(DCL)oriented to the unpredicted communication topology is invest...The cooperative localization(CL)is affected by the communication topology among the platforms.Based on the unscented Kalman filtering,the distributed CL(DCL)oriented to the unpredicted communication topology is investigated.To improve the adaptability,the character of the look-up Cholesky decomposition is exploited for the covariance matrix decomposing.Then,the distributed U transformation can be dynamically implemented according to the available communication topology.In the proposed algorithm,the global information is not required for the individual,and only the available information from the neighbor is used.Each platform’s state can be estimated independently.The error covariance of the state estimates can be updated in the single platform.The algorithm is adaptive to any serial communication topologies where the measuring to the measured platform is a starting path.The applicability of the proposed algorithm to unpredicted communication topology is improved,remaining equivalent localization performance to free connection communication.展开更多
In view of the many scenes of unmanned aerial vehicle(UAV)detection,a third-party signal source is used to design a receiver to monitor the UAV.It is of great significance to understand the reflection of the signal il...In view of the many scenes of unmanned aerial vehicle(UAV)detection,a third-party signal source is used to design a receiver to monitor the UAV.It is of great significance to understand the reflection of the signal illuminating the UAV.Taking the communication base station(BS)signal as the third-party signal source,and considering the complete transmission link,reflection changes and loss fading of the communication signal,this study conducts model fitting for irregular UAV targets,simplifying complex targets into a combination of simple targets.Furthermore,the influence of the dielectric constant of the target surface and the signal irradiation angle on the signal reflection is analyzed.The analysis shows that the simulation results of this model fitting method are consistent with the results of other literature,which provides theoretical support for the detection of low and slow small targets such as UAVs.展开更多
文摘With the acceleration of the intelligent transformation of power systems,the requirements for communication technology are increasingly stringent.The application of 5G mobile communication technology in power communication is analyzed.In this study,5G technology features,application principles,and practical strategies are discussed,and methods such as network slicing,customized deployment,edge computing collaborative application,communication equipment integration and upgrading,and multi-technology collaboration and complementation are proposed.It aims to effectively improve the efficiency,reliability,and security of power communication,solve the problem that traditional communication technology is difficult to meet the diversified needs of power business,and achieve the effect of optimizing the power communication network and supporting the intelligent development of the power system.
基金supported by the National Key Research and Develop-ment Program of China(2019YFB1803400).
文摘1.Introduction Mobile communications have catalyzed a new era of informa-tion technology revolution,significantly broadening and deepen-ing human-to-human,human-to-machine,and machine-to-machine connections.With their incredible speed of development and wide-reaching impact,mobile communications serve as the cornerstone of the Internet of Everything,profoundly reshaping human cognitive abilities and ways of thinking.Furthermore,mobile communications are altering the patterns of production and life,driving leaps in productivity quality,and strongly promot-ing innovation within human civilization.
基金jointly supported by the National Natural Science Foundation of China (U21A20495)Natural Science Foundation of Jiangsu Province (BG2024023)+1 种基金National Key Research and Development Program of China (2022YFE0112000)111 Project (D17018)。
文摘Multiple quantum well(MQW) Ⅲ-nitride diodes that can simultaneously emit and detect light feature an overlapping region between their electroluminescence and responsivity spectra, which allows them to be simultaneously used as both a transmitter and a receiver in a wireless light communication system. Here, we demonstrate a mobile light communication system using a time-division multiplexing(TDM) scheme to achieve bidirectional data transmission via the same optical channel.Two identical blue MQW diodes are defined by software as a transmitter or a receiver. To address the light alignment issue, an image identification module integrated with a gimbal stabilizer is used to automatically detect the locations of moving targets;thus, underwater audio communication is realized via a mobile blue-light TDM communication mode. This approach not only uses a single link but also integrates mobile nodes in a practical network.
文摘The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency.
文摘The widespread use of advanced electronic devices has led to the emergence of spatial crowdsourcing,a method that taps into collective efforts to perform real-world tasks like environmental monitoring and traffic surveillance.Our research focuses on a specific type of spatial crowdsourcing that involves ongoing,collaborative efforts for continuous spatial data acquisition.However,due to limited budgets and workforce availability,the collected data often lacks completeness,posing a data deficiency problem.To address this,we propose a reciprocal framework to optimize task assignments by leveraging the mutual benefits of spatiotemporal subtask execution.We introduce an entropy-based quality metric to capture the combined effects of incomplete data acquisition and interpolation imprecision.Building on this,we explore a quality-aware task assignment method,corresponding to spatiotemporal assignment strategies.Since the assignment problem is NP-hard,we develop a polynomial-time algorithm with the guaranteed approximation ratio.Novel indexing and pruning techniques are proposed to further enhance performance.Extensive experiments conducted on datasets validate the effectiveness of our methods.
基金The National Natural Science Foundation of China(No60496311)
文摘A remote antenna unit (RAU) selection model is presented, and two kinds of handoffs, intra-cell handoff (HO) and inter-cell HO, are defined in distributed mobile communications systems (DAS). After that, an inter-cell HO model is proposed, in which the average power of the active set (AS) is used to predict the position of the mobile station (MS). The total power of the AS and the handoff set (HOS) are utilized to determine whether an inter-cell HO is necessary. Furthermore, the relationship between HO parameters and performance metrics is studied in detail based on RAU selection. Simulation results show that both the intra-cell HO and the inter-cell HO can achieve oerfect performance by aoprooriate settings of HO parameters.
基金the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2024-9/1).
文摘Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject.
基金supported in part by the National Natural Science Foundation of China(Nos.62172186,62002133,61872158,61806083)in part by the Key Research of Science and Technology Development Plan Project of Jilin Province,China(No.20240302075GX)+2 种基金in part by the Postdoctoral Fellowship Program of China Postdoctoral Science Foundation(No.GZC20240592)in part by the China Postdoctoral Science Foundation General Fund(No.2024M761123)in part by the Scientific Research Project of Jilin Provincial Department of Education,China(No.JJKH20250117KJ).
文摘The maritime communication networks(MCNs)for industry require reliable,efficient,and wide coverage to deploy emerging intelligent marine applications.To this end,unmanned aerial vehicles(UAVs)can be integrated into MCNs to extend flexibility and mobility.However,harsh maritime environments and open line-of-sight(LoS)links increase the UAV onboard energy consumption and worsen communication security.In this work,we aim to propose a collaborative beamforming-based physical layer secure and energy-efficient communication method for UAV-assisted MCNs,in which the energy limitations of UAVs and the interference from both known and unknown eavesdroppers as well as the possible collusion among eavesdroppers are considered.Specifically,we formulate a multi-objective optimization problem(MOP)to improve the system confidentiality rate,reduce the level ratio of the UAV virtual antenna array,and decrease the energy consumption of the UAVs by jointly optimizing the UAV positions and synthesizing the UAV virtual antenna array.This MOP is non-convex and NP-hard,and thus we propose an enhanced non-dominated sorted whale optimization algorithm(ENSWOA)to solve the problem.In ENSWOA,the introduced chaotic solution initialization,adaptive weighting,and optimal position updating methods can increase the searching capability of the algorithm.Simulation results show that the proposed ENSWOA outperforms the baseline algorithms,and can effectively enhance the security and energy efficiency of the considered system.
基金supported in part by the Zhejiang Provincial Natural Science Foundation of China(No.LR25F010003)in part by the National Natural Science Foundation of China(Nos.62271447,61871348 and 62471090)+1 种基金in part by the Natural Science Foundation of Sichuan Province of China(No.2023NSFSC047)in part by the Fundamental Research Funds for the Provincial Universities of Zhejiang,China(No.RF-C2023008).
文摘Due to the high flexibility of Unmanned Aerial Vehicles(UAVs),equipping Mobile Edge Computing(MEC)servers on UAVs can effectively and rapidly handle the high computing requirements of computation-intensive tasks.However,the Line-of-Sight(LoS)transmission between the UAV and ground users makes the offloading information be easily monitored.Therefore,this paper proposes a covert communication scheme against a flying warden in UAV-assisted MEC system.In the proposed scheme,the UAV server assists ground users in completing the computation of offloading tasks.To reduce the possibility of the flying warden detecting the transmission behavior of ground users to the UAV server,a ground jamming device sends jamming signals to the flying warden.The minimum computing capacity of the system is maximized by jointly optimizing ground users’resources and the UAV server’s trajectory under the constraint of system covertness.Due to the multivariable coupling,the optimization problem is non-convex.The optimization problem is first transformed into a tractable form,and then the optimizing solution is iteratively obtained using Successive Convex Approximation(SCA)and Block Coordinate Descent(BCD)algorithms.Numerical results show that,compared to the benchmark schemes,the proposed scheme effectively enhances the computing capacity of the system while meeting the system’s covertness requirements.
基金Under the auspices of National Natural Science Foundation of China(No.52278075)the Shenzhen Philosophy and Social Science Planning Program(No.SZ2024B009)。
文摘The rapid spread of information and communication technologies has precipitated the emergence of a novel e-commerce paradigm:mobile ordering.In conjunction with conventional online shopping,this development has significantly altered the travel pat-terns of urban residents and has the potential to either mitigate or exacerbate disparities in the distribution of amenities and resources.Behavioural research has concentrated on online shopping;there is a dearth of studies on the differences between online shopping and mobile ordering,two distinct types of e-commerce.Using the setting of the Wuhan Metropolitan Development Area in 2022,this study uses distribution probability indices,exploratory spatial data analysis,and a quantile regression model to investigate the spatial distribu-tion patterns of online shopping and mobile ordering and to assess the differential impacts of these two types of e-commerce on travel behaviour across urban and suburban locations.The main findings are as follows:1)the likelihood of engaging in online shopping is greater in suburban regions than urban regions,whereas mobile ordering is more prevalent in central urban areas.The high-value zones for both activities are concentrated in the suburban-rural fringe,approximately 24 km from the city’s geometric centre.2)The bivariate global Moran’s I indices for the impacts of both types of e-commerce on travel distance and travel frequency demonstrate significant spatial positive correlations(0.15±0.02),with P-values that are less than 0.001,indicating spatial heterogeneity in the impacts of e-commerce on travel behaviour.3)Online shopping exerts a positive influence on both travel distance and frequency,with a weaker in-fluence in central urban than suburban areas.Mobile ordering positively affects travel frequency,with a more pronounced influence in central urban than suburban areas.Additionally,mobile ordering has a negative impact on travel distance,with the impact being margin-ally less pronounced in the central urban area than in the suburban periphery.The results offer insights into the complex interplay between e-commerce and comprehensive travel behaviours across various geographical locations.
基金This work was supported in part by the National Science Fund for Distinguished Young Scholars in China under grant 61425012the National Science Foundation Project in China under grant 61931005 and 61731017.
文摘Mobile communication standards have been developed into a new era of B5G and 6G.In recent years,low earth orbit(LEO)satellites and space Internet have become hot topics.The integrated satellite and terrestrial systems have been widely discussed by industries and academics,and even are expected to be applied in those huge constellations in construction.This paper points out the trends of two stages towards system integration of the terrestrial mobile communication and the satellite communications:to be compatible with 5G,and to be integrated within 6G.Based on analysis of the challenges of both stages,key technologies are thereafter analyzed in detail,covering both air interface currently discussed in 3GPP for B5G and also novel network architecture and related transmission technologies toward future 6G.
基金supported in part by National Natural Science Foundation of China(Grant No.61702149,U1709220)
文摘This paper considers a UAV communication system with mobile edge computing(MEC).We minimize the energy consumption of the whole system via jointly optimizing the UAV's trajectory and task assignment as well as CPU's computational speed under the set of resource constrains.To this end,we first derive the energy consumption model of data processing,and then obtain the energy consumption model of fixed-wing UAV's flight.The optimization problem is mathematically formulated.To address the problem,we first obtain the approximate optimization problem by applying the technique of discrete linear state-space approximation,and then transform the non-convex constraints into convex by using linearization.Furthermore,a concave-convex procedure(CCCP) based algorithm is proposed in order to solve the optimization problem approximately.Numerical results show the efficacy of the proposed algorithm.
基金partly supported by National Natural Science Foundation of China (No. 41504026, 61362009)Natural Science Foundation of Jiangxi (No.20152ACB21003)Foundation for Distinguished Young Talents Training Programme of Jiangxi (No.20171BCB23006)
文摘To further promote the achievable average secrecy rate for UAV-ground communications, a UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional cooperative UAV is employed as a mobile jammer to transmit the jamming signal to help keep the source UAV closer to the ground destination, thus establishing more favorable legitimate link and enhancing the secrecy performance. We aimed to maximize the achievable secrecy rate by jointly optimizing the trajectories and transmit power of both source UAV and jammer UAV. To solve the considered non-convex optimization problem, we presented a block coordinate descent based iterative algorithm to address a sequence of approximated convex problems for the optimized parameter block by block to find a local optimal solution. Numerical results verify that the proposed algorithm can achieve significant secrecy rate gain compared to all the benchmark schemes.
基金the National S&T Major Project (No. 2018ZX03001011)the National Key R&D Program(No.2018YFB1801102)+1 种基金the National Natural Science Foundation of China (No. 61671072)the Beijing Natural Science Foundation (No. L192025)
文摘With the increasing maritime activities and the rapidly developing maritime economy, the fifth-generation(5G) mobile communication system is expected to be deployed at the ocean. New technologies need to be explored to meet the requirements of ultra-reliable and low latency communications(URLLC) in the maritime communication network(MCN). Mobile edge computing(MEC) can achieve high energy efficiency in MCN at the cost of suffering from high control plane latency and low reliability. In terms of this issue, the mobile edge communications, computing, and caching(MEC3) technology is proposed to sink mobile computing, network control, and storage to the edge of the network. New methods that enable resource-efficient configurations and reduce redundant data transmissions can enable the reliable implementation of computing-intension and latency-sensitive applications. The key technologies of MEC3 to enable URLLC are analyzed and optimized in MCN. The best response-based offloading algorithm(BROA) is adopted to optimize task offloading. The simulation results show that the task latency can be decreased by 26.5’ ms, and the energy consumption in terminal users can be reduced to 66.6%.
文摘This paper is a preliminary and illustrative case study of Beijing's emergingmobile communication industrial (MCI) cluster, which helps understand the cluster by qualitativeanalysis and description. Beijing's MCI cluster is emerging as far as the competence of the industryand its spatial concentration are concerned, although it is not the type of the cluster describedby PORTER due to the low competence of indigenous firms. The formation of the cluster can beexplained by means of the factor and demand conditions of Beijing. However, it is mostly determinedby the multinationals that promote the growth of the industry and the formation of the cluster, andby the government that also plays a key role in many ways. As a matter of fact, the interactionbetween the multinationals and the local government is the key to understanding the formation of thecluster. All in all, Beijing's emerging MCI cluster is a value-chain, geographically concentratedbut non-localized cluster, which is highly dominated by the multinationals and the local government.Its special characteristics bear some policy implications as to the change of the roles of thelocal government and the localization of multinationals, etc.
文摘In the coexisted world of 3G,4G,5G and many other specialized wireless communication systems,billions of connections could be existing for various information transmission types.Unluckily,data show that the increase of network capacity is heavily more than the increase of the network energy efficiency in recent years,which could lead to more energy consumption per transmitted bit in the future network.As basic units in mobile communication systems,microwave/RF components and modules play key roles
文摘With the popularization of wireless multimedia communications,the wireless traffic is predicated to be increased more than 1000time in the next decade.Some new technologies,e.g.,massive multi.input multi.output antennas,millimeter wave and small
文摘Based on the characteristics of the radio propagation in land mobile communications environment, a theoretical model for the reflecting(scattering) number of each radio path is derived firstly. This model can be used to predict the variation of radio path strength, which is important for practical mobile communications engineering. Using this model, a method for simulating radio path strength is developed, with numerical results presented.
文摘The cooperative localization(CL)is affected by the communication topology among the platforms.Based on the unscented Kalman filtering,the distributed CL(DCL)oriented to the unpredicted communication topology is investigated.To improve the adaptability,the character of the look-up Cholesky decomposition is exploited for the covariance matrix decomposing.Then,the distributed U transformation can be dynamically implemented according to the available communication topology.In the proposed algorithm,the global information is not required for the individual,and only the available information from the neighbor is used.Each platform’s state can be estimated independently.The error covariance of the state estimates can be updated in the single platform.The algorithm is adaptive to any serial communication topologies where the measuring to the measured platform is a starting path.The applicability of the proposed algorithm to unpredicted communication topology is improved,remaining equivalent localization performance to free connection communication.
基金supported by the State Major Research and Development Project(2018YFB1802004)the State Key Laboratory of Air Traffic Management System and Technology(SKLATM201807)。
文摘In view of the many scenes of unmanned aerial vehicle(UAV)detection,a third-party signal source is used to design a receiver to monitor the UAV.It is of great significance to understand the reflection of the signal illuminating the UAV.Taking the communication base station(BS)signal as the third-party signal source,and considering the complete transmission link,reflection changes and loss fading of the communication signal,this study conducts model fitting for irregular UAV targets,simplifying complex targets into a combination of simple targets.Furthermore,the influence of the dielectric constant of the target surface and the signal irradiation angle on the signal reflection is analyzed.The analysis shows that the simulation results of this model fitting method are consistent with the results of other literature,which provides theoretical support for the detection of low and slow small targets such as UAVs.