期刊文献+
共找到555,096篇文章
< 1 2 250 >
每页显示 20 50 100
An Improved Dictionary Cracking Scheme Based on Multiple GPUs for Wi-Fi Network 被引量:1
1
作者 Majdi K.Qabalin Zaid A.Arida +4 位作者 Omar A.Saraereh Falin Wu Imran Khan Peerapong Uthansakul Moath Alsafasfeh 《Computers, Materials & Continua》 SCIE EI 2021年第3期2957-2972,共16页
The Internet has penetrated all aspects of human society and has promoted social progress.Cyber-crimes in many forms are commonplace and are dangerous to society and national security.Cybersecurity has become a major ... The Internet has penetrated all aspects of human society and has promoted social progress.Cyber-crimes in many forms are commonplace and are dangerous to society and national security.Cybersecurity has become a major concern for citizens and governments.The Internet functions and software applications play a vital role in cybersecurity research and practice.Most of the cyber-attacks are based on exploits in system or application software.It is of utmost urgency to investigate software security problems.The demand for Wi-Fi applications is proliferating but the security problem is growing,requiring an optimal solution from researchers.To overcome the shortcomings of the wired equivalent privacy(WEP)algorithm,the existing literature proposed security schemes forWi-Fi protected access(WPA)/WPA2.However,in practical applications,the WPA/WPA2 scheme still has some weaknesses that attackers exploit.To destroy a WPA/WPA2 security,it is necessary to get a PSK pre-shared key in pre-shared key mode,or an MSK master session key in the authentication mode.Brute-force cracking attacks can get a phase-shift keying(PSK)or a minimum shift keying(MSK).In real-world applications,many wireless local area networks(LANs)use the pre-shared key mode.Therefore,brute-force cracking of WPA/WPA2-PSK is important in that context.This article proposes a new mechanism to crack theWi-Fi password using a graphical processing unit(GPU)and enhances the efficiency through parallel computing of multiple GPU chips.Experimental results show that the proposed algorithm is effective and provides a procedure to enhance the security of Wi-Fi networks. 展开更多
关键词 networks PASSWORD CYBERSECURITY password cracking mechanism
在线阅读 下载PDF
Security Threat and Data Consumption as Mojor Nuisance of Social Media on Wi-Fi Network 被引量:1
2
作者 Fuseini Inusah Ibrahim Mohammed Gunu Gaddafi Abdul-Salaam 《International Journal of Communications, Network and System Sciences》 2021年第2期15-29,共15页
This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data cons... This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance. 展开更多
关键词 Data Consumption Device Accounting Mobile Devices Social Media WiFi network Rockus Outdoor AP
在线阅读 下载PDF
WiMA:Towards a Multi-Criterion Association in Software Defined Wi-Fi Networks
3
作者 Sohaib Manzoor Hira Manzoor +5 位作者 Saddaf Rubab Muhammad Attique Khan Majed Alhaisoni Abdullah Alqahtani Ye Jin Kim Byoungchol Chang 《Computers, Materials & Continua》 SCIE EI 2023年第5期2347-2363,共17页
Despite the planned installation and operations of the traditional IEEE 802.11 networks,they still experience degraded performance due to the number of inefficiencies.One of the main reasons is the received signal str... Despite the planned installation and operations of the traditional IEEE 802.11 networks,they still experience degraded performance due to the number of inefficiencies.One of the main reasons is the received signal strength indicator(RSSI)association problem,in which the user remains connected to the access point(AP)unless the RSSI becomes too weak.In this paper,we propose a multi-criterion association(WiMA)scheme based on software defined networking(SDN)in Wi-Fi networks.An association solution based on multi-criterion such as AP load,RSSI,and channel occupancy is proposed to satisfy the quality of service(QoS).SDNhaving an overall view of the network takes the association and reassociation decisions making the handoffs smooth in throughput performance.To implementWiMA extensive simulations runs are carried out on Mininet-NS3-Wi-Fi network simulator.The performance evaluation shows that the WiMA significantly reduces the average number of retransmissions by 5%–30%and enhances the throughput by 20%–50%,hence maintaining user fairness and accommodating more wireless devices and traffic load in the network,when compared to traditional client-driven(CD)approach and state of the art Wi-Balance approach. 展开更多
关键词 ASSOCIATION multi-criterion SDN wi-fi
在线阅读 下载PDF
Beyond Wi-Fi 7:Enhanced Decentralized Wireless Local Area Networks with Federated Reinforcement Learning
4
作者 Rashid Ali Alaa Omran Almagrabi 《Computers, Materials & Continua》 2026年第3期391-409,共19页
Wi-Fi technology has evolved significantly since its introduction in 1997,advancing to Wi-Fi 6 as the latest standard,with Wi-Fi 7 currently under development.Despite these advancements,integrating machine learning in... Wi-Fi technology has evolved significantly since its introduction in 1997,advancing to Wi-Fi 6 as the latest standard,with Wi-Fi 7 currently under development.Despite these advancements,integrating machine learning into Wi-Fi networks remains challenging,especially in decentralized environments with multiple access points(mAPs).This paper is a short review that summarizes the potential applications of federated reinforcement learning(FRL)across eight key areas of Wi-Fi functionality,including channel access,link adaptation,beamforming,multi-user transmissions,channel bonding,multi-link operation,spatial reuse,and multi-basic servic set(multi-BSS)coordination.FRL is highlighted as a promising framework for enabling decentralized training and decision-making while preserving data privacy.To illustrate its role in practice,we present a case study on link activation in a multi-link operation(MLO)environment with multiple APs.Through theoretical discussion and simulation results,the study demonstrates how FRL can improve performance and reliability,paving the way for more adaptive and collaborative Wi-Fi networks in the era of Wi-Fi 7 and beyond. 展开更多
关键词 Artificial intelligence reinforcement learning channels selection wireless local area networks 802.11ax 802.11be wi-fi
在线阅读 下载PDF
基于Wi-Fi技术的智能温室大棚控制系统研究
5
作者 张庆松 《消费电子》 2026年第6期125-127,共3页
文章针对传统温室大棚控制系统硬件成本高、交互方式单一、数据传输安全性不足、场景适配性差等行业痛点,提出一种基于消费电子技术重构农业应用场景的智能控制方案。该系统以ESP32-WROOM-32消费级Wi-Fi模块为核心控制器,替代传统工业... 文章针对传统温室大棚控制系统硬件成本高、交互方式单一、数据传输安全性不足、场景适配性差等行业痛点,提出一种基于消费电子技术重构农业应用场景的智能控制方案。该系统以ESP32-WROOM-32消费级Wi-Fi模块为核心控制器,替代传统工业可编程逻辑控制器(Programmable Logic Controller,PLC)设备,集成DHT11、FC-28、BH1750等低成本消费级传感器,开发支持手势/语音双模态交互的手机APP,并融合WPA3-SAE加密协议与轻量化联盟链认证机制,构建双重安全防护体系。通过硬件选型优化、软件模块化开发和场景化适配设计,实现温室环境参数的实时监测、远程闭环控制和安全数据传输。该系统创新性地将农业场景转化为消费电子技术验证平台,突出成本优化、交互创新和场景适配核心优势,为智能终端在农业领域的规模化应用提供了兼具理论价值与实践意义的技术路径。 展开更多
关键词 wi-fi技术 智能温室 ESP32 手势交互 区块链安全 物联网
在线阅读 下载PDF
5G行业终端的Wi-Fi接入多用户管控方案设计与应用
6
作者 杜宝林 杜长坤 +1 位作者 李少晖 杨立伟 《邮电设计技术》 2026年第1期77-81,共5页
在电信运营商管控5G SIM卡的基础上,针对5G行业终端的Wi-Fi接入多用户实名管控需求,提出了对接入5G终端的多用户管控方案,验证了对5G CPE的Wi-Fi接入用户管控的可行性,能够满足5G终端的Wi-Fi接入用户管控需求。
关键词 5G终端CPE 用户管控 公用wi-fi
在线阅读 下载PDF
Wi-Fi 8—下一代无线局域网技术
7
作者 戴星亚 万国伟 康凯 《电信科学》 北大核心 2026年第1期65-85,共21页
为了进一步降低无线保真(wireless fidelity,Wi-Fi)系统时延、提高系统可靠性,新一代Wi-Fi技术——Wi-Fi 8(IEEE 802.11bn)的协议正在制定中,预计于2028年正式发布并商用。Wi-Fi 8提出了多项新技术来满足用户对高可靠、大容量、低时延... 为了进一步降低无线保真(wireless fidelity,Wi-Fi)系统时延、提高系统可靠性,新一代Wi-Fi技术——Wi-Fi 8(IEEE 802.11bn)的协议正在制定中,预计于2028年正式发布并商用。Wi-Fi 8提出了多项新技术来满足用户对高可靠、大容量、低时延、高速率的需求。从Wi-Fi 8的协议草案入手,深入介绍与分析了多接入点(access point,AP)协调技术、非主信道接入技术、动态子信道操作技术及降低传输时延等多项新技术,并对新技术的演进方向进行了初步的分析与评估。最后,对Wi-Fi 8的未来应用进行了展望。 展开更多
关键词 wi-fi 8 高可靠性 低时延 多接入点协调 非主信道接入 动态子信道操作
在线阅读 下载PDF
Joint Optimization of Routing and Resource Allocation in Decentralized UAV Networks Based on DDQN and GNN
8
作者 Nawaf Q.H.Othman YANG Qinghai JIANG Xinpei 《电讯技术》 北大核心 2026年第1期1-10,共10页
Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combinin... Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks. 展开更多
关键词 decentralized UAV network resource allocation routing algorithm GNN DDQN DRL
在线阅读 下载PDF
Wi-Fi与机器学习结合的综合分析
9
作者 成刚 罗晔 《电子技术应用》 2026年第1期1-7,共7页
系统性地分析了当前AI/ML在Wi-Fi领域的技术研究和应用情况。首先对Wi-Fi技术特征以及发展趋势所带来的复杂度进行阐述。然后提出机器学习对优化Wi-Fi网络参数的必要性,以及综合介绍和分析AI/ML在提升Wi-Fi性能和用户体验的研究及可行性... 系统性地分析了当前AI/ML在Wi-Fi领域的技术研究和应用情况。首先对Wi-Fi技术特征以及发展趋势所带来的复杂度进行阐述。然后提出机器学习对优化Wi-Fi网络参数的必要性,以及综合介绍和分析AI/ML在提升Wi-Fi性能和用户体验的研究及可行性,并对IEEE 802.11 AI/ML兴趣组四个具体的AI/ML用例进行说明和评估。接着探讨和建议Wi-Fi与AI/ML相结合的系统设计框架,以及相应的基本用例分析。最后对Wi-Fi与AI/ML结合的技术挑战和行业发展做了归纳和总结。 展开更多
关键词 wi-fi 7 人工智能 机器学习 IEEE 802.11bn wi-fi 8
在线阅读 下载PDF
Exploring the material basis and mechanisms of the action of Hibiscus mutabilis L. for its anti-inflammatory effects based on network pharmacology and cell experiments
10
作者 Wenyuan Chen Xiaolan Chen +2 位作者 Jing Wan Qin Deng Yong Gao 《日用化学工业(中英文)》 北大核心 2026年第1期55-64,共10页
To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review a... To explore the material basis and mechanisms of the anti-inflammatory effects of Hibiscus mutabilis L..The active ingredients and potential targets of Hibiscus mutabilis L.were obtained through the literature review and SwissADME platform.Genes related to the inflammation were collected using Genecards and OMIM databases,and the intersection genes were submitted on STRING and DAVID websites.Then,the protein interaction network(PPI),gene ontology(GO)and pathway(KEGG)were analyzed.Cytoscape 3.7.2 software was used to construct the“Hibiscus mutabilis L.-active ingredient-target-inflammation”network diagram,and AutoDockTools-1.5.6 software was used for the molecular docking verification.The antiinflammatory effect of Hibiscus mutabilis L.active ingredient was verified by the RAW264.7 inflammatory cell model.The results showed that 11 active components and 94 potential targets,1029 inflammatory targets and 24 intersection targets were obtained from Hibiscus mutabilis L..The key anti-inflammatory active ingredients of Hibiscus mutabilis L.are quercetin,apigenin and luteolin.Its action pathway is mainly related to NF-κB,cancer pathway and TNF signaling pathway.Cell experiments showed that total flavonoids of Hibiscus mutabilis L.could effectively inhibit the expression of tumor necrosis factor(TNF-α),interleukin 8(IL-8)and epidermal growth factor receptor(EGFR)in LPS-induced RAW 264.7 inflammatory cells.It also downregulates the phosphorylation of human nuclear factor ĸB inhibitory protein α(IĸBα)and NF-κB p65 subunit protein(p65).Overall,the anti-inflammatory effect of Hibiscus mutabilis L.is related to many active components,many signal pathways and targets,which provides a theoretical basis for its further development and application. 展开更多
关键词 Hibiscus mutabilis L. INFLAMMATION network pharmacology molecular docking cell validation
在线阅读 下载PDF
A Multi-Scale Graph Neural Networks Ensemble Approach for Enhanced DDoS Detection
11
作者 Noor Mueen Mohammed Ali Hayder Seyed Amin Hosseini Seno +2 位作者 Hamid Noori Davood Zabihzadeh Mehdi Ebady Manaa 《Computers, Materials & Continua》 2026年第4期1216-1242,共27页
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t... Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist. 展开更多
关键词 DDoS detection graph neural networks multi-scale learning ensemble learning network security stealth attacks network graphs
在线阅读 下载PDF
A Comprehensive Evaluation of Distributed Learning Frameworks in AI-Driven Network Intrusion Detection
12
作者 Sooyong Jeong Cheolhee Park +1 位作者 Dowon Hong Changho Seo 《Computers, Materials & Continua》 2026年第4期310-332,共23页
With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intr... With the growing complexity and decentralization of network systems,the attack surface has expanded,which has led to greater concerns over network threats.In this context,artificial intelligence(AI)-based network intrusion detection systems(NIDS)have been extensively studied,and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms.However,most existing works focus on individual distributed learning frameworks,and there is a lack of systematic evaluations that compare different algorithms under consistent conditions.In this paper,we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning(FL),Split Learning(SL),hybrid collaborative learning(SFL),and fully distributed learning—in the context of AI-driven NIDS.Using recent benchmark intrusion detection datasets,a unified model backbone,and controlled distributed scenarios,we assess these frameworks across multiple criteria,including detection performance,communication cost,computational efficiency,and convergence behavior.Our findings highlight distinct trade-offs among the distributed learning frameworks,demonstrating that the optimal choice depends strongly on systemconstraints such as bandwidth availability,node resources,and data distribution.This work provides the first holistic analysis of distributed learning approaches for AI-driven NIDS and offers practical guidelines for designing secure and efficient intrusion detection systems in decentralized environments. 展开更多
关键词 network intrusion detection network security distributed learning
在线阅读 下载PDF
Multi-Criteria Discovery of Communities in Social Networks Based on Services
13
作者 Karim Boudjebbour Abdelkader Belkhir Hamza Kheddar 《Computers, Materials & Continua》 2026年第3期984-1005,共22页
Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for so... Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement. 展开更多
关键词 Social network communities discovery complex network CLUSTERING web services similarity measure
在线阅读 下载PDF
HGS-ATD:A Hybrid Graph Convolutional Network-GraphSAGE Model for Anomaly Traffic Detection
14
作者 Zhian Cui Hailong Li Xieyang Shen 《Journal of Harbin Institute of Technology(New Series)》 2026年第1期33-50,共18页
With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a ... With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a promising Deep Learning(DL)approach,has proven to be highly effective in identifying intricate patterns in graph⁃structured data and has already found wide applications in the field of network security.In this paper,we propose a hybrid Graph Convolutional Network(GCN)⁃GraphSAGE model for Anomaly Traffic Detection,namely HGS⁃ATD,which aims to improve the accuracy of anomaly traffic detection by leveraging edge feature learning to better capture the relationships between network entities.We validate the HGS⁃ATD model on four publicly available datasets,including NF⁃UNSW⁃NB15⁃v2.The experimental results show that the enhanced hybrid model is 5.71%to 10.25%higher than the baseline model in terms of accuracy,and the F1⁃score is 5.53%to 11.63%higher than the baseline model,proving that the model can effectively distinguish normal traffic from attack traffic and accurately classify various types of attacks. 展开更多
关键词 anomaly traffic detection graph neural network deep learning graph convolutional network
在线阅读 下载PDF
Information Diffusion Models and Fuzzing Algorithms for a Privacy-Aware Data Transmission Scheduling in 6G Heterogeneous ad hoc Networks
15
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 2026年第2期1214-1234,共21页
In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic h... In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services. 展开更多
关键词 6G networks ad hoc networks PRIVACY scheduling algorithms diffusion models fuzzing algorithms
在线阅读 下载PDF
Multi-Label Classification Model Using Graph Convolutional Neural Network for Social Network Nodes
16
作者 Junmin Lyu Guangyu Xu +4 位作者 Feng Bao Yu Zhou Yuxin Liu Siyu Lu Wenfeng Zheng 《Computer Modeling in Engineering & Sciences》 2026年第2期1235-1256,共22页
Graph neural networks(GNN)have shown strong performance in node classification tasks,yet most existing models rely on uniform or shared weight aggregation,lacking flexibility in modeling the varying strength of relati... Graph neural networks(GNN)have shown strong performance in node classification tasks,yet most existing models rely on uniform or shared weight aggregation,lacking flexibility in modeling the varying strength of relationships among nodes.This paper proposes a novel graph coupling convolutional model that introduces an adaptive weighting mechanism to assign distinct importance to neighboring nodes based on their similarity to the central node.Unlike traditional methods,the proposed coupling strategy enhances the interpretability of node interactions while maintaining competitive classification performance.The model operates in the spatial domain,utilizing adjacency list structures for efficient convolution and addressing the limitations of weight sharing through a coupling-based similarity computation.Extensive experiments are conducted on five graph-structured datasets,including Cora,Citeseer,PubMed,Reddit,and BlogCatalog,as well as a custom topology dataset constructed from the Open University Learning Analytics Dataset(OULAD)educational platform.Results demonstrate that the proposed model achieves good classification accuracy,while significantly reducing training time through direct second-order neighbor fusion and data preprocessing.Moreover,analysis of neighborhood order reveals that considering third-order neighbors offers limited accuracy gains but introduces considerable computational overhead,confirming the efficiency of first-and second-order convolution in practical applications.Overall,the proposed graph coupling model offers a lightweight,interpretable,and effective framework for multi-label node classification in complex networks. 展开更多
关键词 GNN social networks nodes multi-label classification model graphic convolution neural network coupling principle
在线阅读 下载PDF
Conditional Generative Adversarial Network-Based Travel Route Recommendation
17
作者 Sunbin Shin Luong Vuong Nguyen +3 位作者 Grzegorz J.Nalepa Paulo Novais Xuan Hau Pham Jason J.Jung 《Computers, Materials & Continua》 2026年第1期1178-1217,共40页
Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of... Recommending personalized travel routes from sparse,implicit feedback poses a significant challenge,as conventional systems often struggle with information overload and fail to capture the complex,sequential nature of user preferences.To address this,we propose a Conditional Generative Adversarial Network(CGAN)that generates diverse and highly relevant itineraries.Our approach begins by constructing a conditional vector that encapsulates a user’s profile.This vector uniquely fuses embeddings from a Heterogeneous Information Network(HIN)to model complex user-place-route relationships,a Recurrent Neural Network(RNN)to capture sequential path dynamics,and Neural Collaborative Filtering(NCF)to incorporate collaborative signals from the wider user base.This comprehensive condition,further enhanced with features representing user interaction confidence and uncertainty,steers a CGAN stabilized by spectral normalization to generate high-fidelity latent route representations,effectively mitigating the data sparsity problem.Recommendations are then formulated using an Anchor-and-Expand algorithm,which selects relevant starting Points of Interest(POI)based on user history,then expands routes through latent similarity matching and geographic coherence optimization,culminating in Traveling Salesman Problem(TSP)-based route optimization for practical travel distances.Experiments on a real-world check-in dataset validate our model’s unique generative capability,achieving F1 scores ranging from 0.163 to 0.305,and near-zero pairs−F1 scores between 0.002 and 0.022.These results confirm the model’s success in generating novel travel routes by recommending new locations and sequences rather than replicating users’past itineraries.This work provides a robust solution for personalized travel planning,capable of generating novel and compelling routes for both new and existing users by learning from collective travel intelligence. 展开更多
关键词 Travel route recommendation conditional generative adversarial network heterogeneous information network anchor-and-expand algorithm
在线阅读 下载PDF
Artificial Intelligence (AI)-Enabled Unmanned Aerial Vehicle (UAV) Systems for Optimizing User Connectivity in Sixth-Generation (6G) Ubiquitous Networks
18
作者 Zeeshan Ali Haider Inam Ullah +2 位作者 Ahmad Abu Shareha Rashid Nasimov Sufyan Ali Memon 《Computers, Materials & Continua》 2026年第1期534-549,共16页
The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-gener... The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment. 展开更多
关键词 6G networks UAV-based communication cooperative reinforcement learning network optimization user connectivity energy efficiency
在线阅读 下载PDF
基于RS-485与Wi-Fi双模通信的IP68智能电表设计与应用
19
作者 刘剑儒 周海亮 万姝 《通信电源技术》 2026年第1期31-33,共3页
针对高湿环境下电表易失效和单一通信链路不可靠问题,设计一款IP68防护等级的双模智能电表。该电表采用全灌封与透气膜结构,融合RS-485与Wi-Fi通信,通过建立链路质量评估模型实现冗余链路的自适应切换。测试结果表明,该电表防护性能优... 针对高湿环境下电表易失效和单一通信链路不可靠问题,设计一款IP68防护等级的双模智能电表。该电表采用全灌封与透气膜结构,融合RS-485与Wi-Fi通信,通过建立链路质量评估模型实现冗余链路的自适应切换。测试结果表明,该电表防护性能优越且切换逻辑可靠,保障了恶劣工况下数据采集的连续性。 展开更多
关键词 RS-485 wi-fi 双模通信 IP68智能电表
在线阅读 下载PDF
面向Wi-Fi 6产品的辐射杂散快速检测方法
20
作者 才辉 《安全与电磁兼容》 2026年第1期82-86,共5页
针对Wi-Fi 6设备多频点、多模式特性导致的辐射杂散测试效率低下问题,提出一种基于多天线并行测试的快速检测方法,构建了由三台电磁干扰(EMI)接收机、射频开关矩阵及覆盖30 MHz~40 GHz天线组成的自动化测试系统,采用预校准技术补偿系统... 针对Wi-Fi 6设备多频点、多模式特性导致的辐射杂散测试效率低下问题,提出一种基于多天线并行测试的快速检测方法,构建了由三台电磁干扰(EMI)接收机、射频开关矩阵及覆盖30 MHz~40 GHz天线组成的自动化测试系统,采用预校准技术补偿系统损耗。实验结果表明,该方法实现了对Wi-Fi 6设备辐射杂散的同步快速测量,显著提升了测试效率。所提方法为Wi-Fi 6产品的研发与质量监管提供了高效测试平台。 展开更多
关键词 wi-fi 6 辐射杂散 快速检测 自动化测试
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部