期刊文献+
共找到552,834篇文章
< 1 2 250 >
每页显示 20 50 100
The Adaptive Random Access Carrier Allocation Scheme in NB-IoT Networks
1
作者 Yen-Wen Chen Guan-Yi Xue 《Communications and Network》 2022年第1期1-11,共11页
The rapid progress of the deployment of IoT services pushes the evolution of wireless communication techniques. Because the number of IoT devices is much more than that of the human-held devices for traditional servic... The rapid progress of the deployment of IoT services pushes the evolution of wireless communication techniques. Because the number of IoT devices is much more than that of the human-held devices for traditional services. It introduces the random access issue in radio networks. In order to support massive IoT devices to transmit data in NB-IoT, the release 14 of 3 GPP provides the preambles in non-anchor carrier for random access. However, if more non-anchor carriers are provided for random access, the resource of uplink shared channel will be compressed. The use of non-anchor carrier for random access preambles shall be carefully allocated for effective resource utilization. In this paper, we propose the adaptive non-anchor allocation algorithm by referring to the collision report flag (CRF) from the user equipment. The proposed CRF algorithm considers the congestion status of uplink to adjust the number of non-anchor carriers in flexible way for better random access experience of huge random access attempts condition. The simulation results show that the proposed algorithm achieves high success access ratio and effective non-anchor carrier utilization when comparing to that of the fixed allocation schemes. The proposed scheme can save 5 - 10 numbers of non-anchor carriers for the number of UEs varies from 15,000 to 37,500 when comparing to the fixed 15 non-anchor carriers scheme under the similar successful access ratio. 展开更多
关键词 nb-iot Random Access PREAMBLE Radio Resource Allocation
在线阅读 下载PDF
面向低轨卫星的NB-IoT资源切片动态管理方法
2
作者 洪涛 李治 +2 位作者 倪一天 丁晓进 张更新 《南京邮电大学学报(自然科学版)》 北大核心 2026年第1期66-75,共10页
针对低轨卫星高动态场景下多服务质量(Quality of Service,QoS)时变物联业务资源调度问题,提出了一种基于Lyapunov优化的窄带物联网(Narrow Band Internet of Things,NB-IoT)多业务资源切片动态管理方法。该方法综合考虑多物联业务QoS... 针对低轨卫星高动态场景下多服务质量(Quality of Service,QoS)时变物联业务资源调度问题,提出了一种基于Lyapunov优化的窄带物联网(Narrow Band Internet of Things,NB-IoT)多业务资源切片动态管理方法。该方法综合考虑多物联业务QoS需求、不同QoS业务队列状态以及切片大小的动态划分,构建了资源切片动态管理的资源调度优化问题。基于Lyapunov优化理论将非凸的多时隙动态资源切片划分问题转化为单时隙多QoS业务资源切片配置问题,从而在动态业务场景下实现资源切片与多QoS业务队列之间的动态适配。仿真结果表明,与传统NB-IoT上行资源调度方法相比,所提方法在低轨高动态场景下能够显著提升时延确定性业务的QoS保障和吞吐量。 展开更多
关键词 低轨卫星物联网 窄带物联网 资源调度 李雅普诺夫优化 吞吐量
在线阅读 下载PDF
基于NB-IoT的智慧路灯系统设计
3
作者 付瑞玲 李佳琦 +2 位作者 靳亚鹏 宋姿含 张楠 《黄河科技学院学报》 2026年第2期47-53,共7页
作为智慧城市基础设施的重要组成部分,智慧路灯正以其独特的创新应用和广阔的前景,引领着城市照明与管理的新一轮变革。设计了一个基于NB-IoT的智慧路灯系统,主要有主控、传感器、声光报警、无线通信、按键和显示6个模块;系统根据环境... 作为智慧城市基础设施的重要组成部分,智慧路灯正以其独特的创新应用和广阔的前景,引领着城市照明与管理的新一轮变革。设计了一个基于NB-IoT的智慧路灯系统,主要有主控、传感器、声光报警、无线通信、按键和显示6个模块;系统根据环境光线强度、路灯亮度以及人或车的经过情况,控制声光报警电路、灯光调节等,同时利用通信模块NB-IoT将数据传输至云平台。系统有手动、自动和定时3种模式。系统构建起一个互联互通、高效协同的智慧路灯体系,为智慧城市建设贡献重要组成部分。 展开更多
关键词 光线传感器 nb-iot 智慧路灯
在线阅读 下载PDF
基于NB-IoT技术的黄河水质监测系统研究与设计 被引量:1
4
作者 杨昊弋 冯锋 《物联网技术》 2026年第3期9-11,共3页
针对黄河日益严重的水污染问题,提出一种基于NB-IoT技术的黄河水质监测系统。该系统利用NB-IoT的低功耗、广覆盖和高容量特性,结合多种高精度传感器,实现了黄河水质参数的实时监测、数据远程传输、智能分析及预警信息的及时发布。系统... 针对黄河日益严重的水污染问题,提出一种基于NB-IoT技术的黄河水质监测系统。该系统利用NB-IoT的低功耗、广覆盖和高容量特性,结合多种高精度传感器,实现了黄河水质参数的实时监测、数据远程传输、智能分析及预警信息的及时发布。系统采用分层架构设计,包括感知层、传输层、平台层和应用层。感知层通过多种传感器采集关键水质参数,传输层利用NB-IoT技术将数据稳定传输至云服务器,平台层进行数据分析和预警生成,应用层提供用户交互界面。该系统具有低功耗、多参数集成、智能预警和便捷管理等创新性特点,为黄河水质监测和管理提供了高效、可靠的解决方案,具有广阔的应用前景和推广价值。 展开更多
关键词 nb-iot技术 STM32 黄河水质监测 分层架构 实时监测 智能预警
在线阅读 下载PDF
小区居民用电数据监测中NB-IoT技术方案设计与效果验证
5
作者 王宇新 张阔 +2 位作者 薛涵 王竑晟 刘芳芳 《消费电子》 2026年第4期149-151,共3页
研究聚焦于现阶段部分老旧小区用电管理效率提升缓慢、线损程度难以控制、异常现象预警难度高等问题,对小区居民用电数据监测中窄带物联网(Narrow Band Internet of Things,NB-IoT)技术方案的应用进行设计与验证。通过构建分布式架构,... 研究聚焦于现阶段部分老旧小区用电管理效率提升缓慢、线损程度难以控制、异常现象预警难度高等问题,对小区居民用电数据监测中窄带物联网(Narrow Band Internet of Things,NB-IoT)技术方案的应用进行设计与验证。通过构建分布式架构,优化软硬件模块,在某老旧小区开展实证验证。结果表明,该方案可以对用电数据进行实时、精准采集,数据传输安全高效,且数据分析结果准确,有助于降低线损率与运维成本,为小区用电智能化管理工作的高质量开展提供技术支持。 展开更多
关键词 小区居民 用电数据 监测系统 nb-iot技术 分布式架构
在线阅读 下载PDF
Joint Optimization of Routing and Resource Allocation in Decentralized UAV Networks Based on DDQN and GNN
6
作者 Nawaf Q.H.Othman YANG Qinghai JIANG Xinpei 《电讯技术》 北大核心 2026年第1期1-10,共10页
Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combinin... Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks. 展开更多
关键词 decentralized UAV network resource allocation routing algorithm GNN DDQN DRL
在线阅读 下载PDF
Exploring the material basis and mechanisms of the action of Hibiscus mutabilis L. for its anti-inflammatory effects based on network pharmacology and cell experiments
7
作者 Wenyuan Chen Xiaolan Chen +2 位作者 Jing Wan Qin Deng Yong Gao 《日用化学工业(中英文)》 北大核心 2026年第1期55-64,共10页
To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review a... To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review and SwissADME platform.Genes related to the inflammation were collected using Genecards and OMIM databases,and the intersection genes were submitted on STRING and DAVID websites.Then,the protein interaction network(PPI),gene ontology(GO)and pathway(KEGG)were analyzed.Cytoscape 3.7.2 software was used to construct the“Hibiscus mutabilis L.-active ingredient-target-inflammation”network diagram,and AutoDockTools-1.5.6 software was used for the molecular docking verification.The antiinflammatory effect of Hibiscus mutabilis L.active ingredient was verified by the RAW264.7 inflammatory cell model.The results showed that 11 active components and 94 potential targets,1029 inflammatory targets and 24 intersection targets were obtained from Hibiscus mutabilis L..The key anti-inflammatory active ingredients of Hibiscus mutabilis L.are quercetin,apigenin and luteolin.Its action pathway is mainly related to NF-κB,cancer pathway and TNF signaling pathway.Cell experiments showed that total flavonoids of Hibiscus mutabilis L.could effectively inhibit the expression of tumor necrosis factor(TNF-α),interleukin 8(IL-8)and epidermal growth factor receptor(EGFR)in LPS-induced RAW 264.7 inflammatory cells.It also downregulates the phosphorylation of human nuclear factor ĸB inhibitory protein α(IĸBα)and NF-κB p65 subunit protein(p65).Overall,the anti-inflammatory effect of Hibiscus mutabilis L.is related to many active components,many signal pathways and targets,which provides a theoretical basis for its further development and application. 展开更多
关键词 Hibiscus mutabilis L. INFLAMMATION network pharmacology molecular docking cell validation
在线阅读 下载PDF
A Multi-Scale Graph Neural Networks Ensemble Approach for Enhanced DDoS Detection
8
作者 Noor Mueen Mohammed Ali Hayder Seyed Amin Hosseini Seno +2 位作者 Hamid Noori Davood Zabihzadeh Mehdi Ebady Manaa 《Computers, Materials & Continua》 2026年第4期1216-1242,共27页
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t... Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist. 展开更多
关键词 DDoS detection graph neural networks multi-scale learning ensemble learning network security stealth attacks network graphs
在线阅读 下载PDF
Networked Predictive Control:A Survey
9
作者 Zhong-Hua Pang Tong Mu +3 位作者 Yi Yu Haibin Guo Guo-Ping Liu Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期3-20,共18页
Networked predictive control(NPC) has gained significant attention in recent years for its ability to effectively and actively address communication constraints in networked control systems(NCSs),such as network-induc... Networked predictive control(NPC) has gained significant attention in recent years for its ability to effectively and actively address communication constraints in networked control systems(NCSs),such as network-induced delays,packet dropouts,and packet disorders.Despite significant advancements,the increasing complexity and dynamism of network environments,along with the growing complexity of systems,pose new challenges for NPC.These challenges include difficulties in system modeling,cyber attacks,component faults,limited network bandwidth,and the necessity for distributed collaboration.This survey aims to provide a comprehensive review of NPC strategies.It begins with a summary of the primary challenges faced by NCSs,followed by an introduction to the control structure and core concepts of NPC.The survey then discusses several typical NPC schemes and examines their extensions in the areas of secure control,fault-tolerant control,distributed coordinated control,and event-triggered control.Moreover,it reviews notable works that have implemented these schemes.Finally,the survey concludes by exploring typical applications of NPC schemes and highlighting several challenging issues that could guide future research efforts. 展开更多
关键词 Communication constraints cyber attacks networked control systems networked multi-agent systems networked predictive control
在线阅读 下载PDF
Multi-Criteria Discovery of Communities in Social Networks Based on Services
10
作者 Karim Boudjebbour Abdelkader Belkhir Hamza Kheddar 《Computers, Materials & Continua》 2026年第3期984-1005,共22页
Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for so... Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement. 展开更多
关键词 Social network communities discovery complex network CLUSTERING web services similarity measure
在线阅读 下载PDF
A Comprehensive Evaluation of Distributed Learning Frameworks in AI-Driven Network Intrusion Detection
11
作者 Sooyong Jeong Cheolhee Park +1 位作者 Dowon Hong Changho Seo 《Computers, Materials & Continua》 2026年第4期310-332,共23页
With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intr... With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments. 展开更多
关键词 network intrusion detection network security distributed learning
在线阅读 下载PDF
基于北斗和NB-IoT智能应急救援头盔
12
作者 张帆 卢超 +3 位作者 解伟峰 师向南 周昱琛 杨怡丹 《现代信息科技》 2026年第2期181-186,共6页
为了减少在紧急救援活动中的伤亡并提高紧急救援效率,设计了一种智能应急救援头盔,该设计采用北斗定位技术与NB-IoT通信技术,通过MQ-2与DHT11传感器分别采集烟雾浓度及环境温湿度数据,并借助BC26与ATK-1218-BD模块,基于LwM2M协议和NMEA-... 为了减少在紧急救援活动中的伤亡并提高紧急救援效率,设计了一种智能应急救援头盔,该设计采用北斗定位技术与NB-IoT通信技术,通过MQ-2与DHT11传感器分别采集烟雾浓度及环境温湿度数据,并借助BC26与ATK-1218-BD模块,基于LwM2M协议和NMEA-0183协议实现低功耗的数据上云,系统可实时监测测量数据,通过北斗定位人员位置,并具有智能报警功能。测试结果表明,该头盔能够有效提升救援效率,在实际应用中展现较好的反馈和推广前景。 展开更多
关键词 紧急救援 北斗定位 nb-iot通信 LwM2M协议
在线阅读 下载PDF
HGS-ATD:A Hybrid Graph Convolutional Network-GraphSAGE Model for Anomaly Traffic Detection
13
作者 Zhian Cui Hailong Li Xieyang Shen 《Journal of Harbin Institute of Technology(New Series)》 2026年第1期33-50,共18页
With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a ... With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a promising Deep Learning(DL)approach,has proven to be highly effective in identifying intricate patterns in graph⁃structured data and has already found wide applications in the field of network security.In this paper,we propose a hybrid Graph Convolutional Network(GCN)⁃GraphSAGE model for Anomaly Traffic Detection,namely HGS⁃ATD,which aims to improve the accuracy of anomaly traffic detection by leveraging edge feature learning to better capture the relationships between network entities.We validate the HGS⁃ATD model on four publicly available datasets,including NF⁃UNSW⁃NB15⁃v2.The experimental results show that the enhanced hybrid model is 5.71%to 10.25%higher than the baseline model in terms of accuracy,and the F1⁃score is 5.53%to 11.63%higher than the baseline model,proving that the model can effectively distinguish normal traffic from attack traffic and accurately classify various types of attacks. 展开更多
关键词 anomaly traffic detection graph neural network deep learning graph convolutional network
在线阅读 下载PDF
Information Diffusion Models and Fuzzing Algorithms for a Privacy-Aware Data Transmission Scheduling in 6G Heterogeneous ad hoc Networks
14
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 2026年第2期1214-1234,共21页
In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic h... In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services. 展开更多
关键词 6G networks ad hoc networks PRIVACY scheduling algorithms diffusion models fuzzing algorithms
在线阅读 下载PDF
Tensor Low-Rank Orthogonal Compression for Convolutional Neural Networks
15
作者 Yaping He Xin Luo 《IEEE/CAA Journal of Automatica Sinica》 2026年第1期227-229,共3页
Dear Editor,The letter proposes a tensor low-rank orthogonal compression(TLOC)model for a convolutional neural network(CNN),which facilitates its efficient and highly-accurate low-rank representation.Model compression... Dear Editor,The letter proposes a tensor low-rank orthogonal compression(TLOC)model for a convolutional neural network(CNN),which facilitates its efficient and highly-accurate low-rank representation.Model compression is crucial for deploying deep neural network(DNN)models on resource-constrained embedded devices. 展开更多
关键词 model compression convolutional neural network cnn which tensor low rank orthogonal compression deep neural network dnn models embedded devices convolutional neural networks
在线阅读 下载PDF
Multi-Label Classification Model Using Graph Convolutional Neural Network for Social Network Nodes
16
作者 Junmin Lyu Guangyu Xu +4 位作者 Feng Bao Yu Zhou Yuxin Liu Siyu Lu Wenfeng Zheng 《Computer Modeling in Engineering & Sciences》 2026年第2期1235-1256,共22页
Graph neural networks(GNN)have shown strong performance in node classification tasks,yet most existing models rely on uniform or shared weight aggregation,lacking flexibility in modeling the varying strength of relati... Graph neural networks(GNN)have shown strong performance in node classification tasks,yet most existing models rely on uniform or shared weight aggregation,lacking flexibility in modeling the varying strength of relationships among nodes.This paper proposes a novel graph coupling convolutional model that introduces an adaptive weighting mechanism to assign distinct importance to neighboring nodes based on their similarity to the central node.Unlike traditional methods,the proposed coupling strategy enhances the interpretability of node interactions while maintaining competitive classification performance.The model operates in the spatial domain,utilizing adjacency list structures for efficient convolution and addressing the limitations of weight sharing through a coupling-based similarity computation.Extensive experiments are conducted on five graph-structured datasets,including Cora,Citeseer,PubMed,Reddit,and BlogCatalog,as well as a custom topology dataset constructed from the Open University Learning Analytics Dataset(OULAD)educational platform.Results demonstrate that the proposed model achieves good classification accuracy,while significantly reducing training time through direct second-order neighbor fusion and data preprocessing.Moreover,analysis of neighborhood order reveals that considering third-order neighbors offers limited accuracy gains but introduces considerable computational overhead,confirming the efficiency of first-and second-order convolution in practical applications.Overall,the proposed graph coupling model offers a lightweight,interpretable,and effective framework for multi-label node classification in complex networks. 展开更多
关键词 GNN social networks nodes multi-label classification model graphic convolution neural network coupling principle
在线阅读 下载PDF
Artificial Intelligence (AI)-Enabled Unmanned Aerial Vehicle (UAV) Systems for Optimizing User Connectivity in Sixth-Generation (6G) Ubiquitous Networks
17
作者 Zeeshan Ali Haider Inam Ullah +2 位作者 Ahmad Abu Shareha Rashid Nasimov Sufyan Ali Memon 《Computers, Materials & Continua》 2026年第1期534-549,共16页
The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-gener... The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment. 展开更多
关键词 6G networks UAV-based communication cooperative reinforcement learning network optimization user connectivity energy efficiency
在线阅读 下载PDF
Conditional Generative Adversarial Network-Based Travel Route Recommendation
18
作者 Sunbin Shin Luong Vuong Nguyen +3 位作者 Grzegorz J.Nalepa Paulo Novais Xuan Hau Pham Jason J.Jung 《Computers, Materials & Continua》 2026年第1期1178-1217,共40页
Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of... Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of user preferences.To address this,we propose a Conditional Generative Adversarial Network(CGAN)that generates diverse and highly relevant itineraries.Our approach begins by constructing a conditional vector that encapsulates a user’s profile.This vector uniquely fuses embeddings from a Heterogeneous Information Network(HIN)to model complex user-place-route relationships,a Recurrent Neural Network(RNN)to capture sequential path dynamics,and Neural Collaborative Filtering(NCF)to incorporate collaborative signals from the wider user base.This comprehensive condition,further enhanced with features representing user interaction confidence and uncertainty,steers a CGAN stabilized by spectral normalization to generate high-fidelity latent route representations,effectively mitigating the data sparsity problem.Recommendations are then formulated using an Anchor-and-Expand algorithm,which selects relevant starting Points of Interest(POI)based on user history,then expands routes through latent similarity matching and geographic coherence optimization,culminating in Traveling Salesman Problem(TSP)-based route optimization for practical travel distances.Experiments on a real-world check-in dataset validate our model’s unique generative capability,achieving F1 scores ranging from 0.163 to 0.305,and near-zero pairs−F1 scores between 0.002 and 0.022.These results confirm the model’s success in generating novel travel routes by recommending new locations and sequences rather than replicating users’past itineraries.This work provides a robust solution for personalized travel planning,capable of generating novel and compelling routes for both new and existing users by learning from collective travel intelligence. 展开更多
关键词 Travel route recommendation conditional generative adversarial network heterogeneous information network anchor-and-expand algorithm
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部