期刊文献+
共找到2,243篇文章
< 1 2 113 >
每页显示 20 50 100
Adjustable random linear network coding(ARLNC): A solution for data transmission in dynamic IoT computational environments
1
作者 Raffi Dilanchian Ali Bohlooli Kamal Jamshidi 《Digital Communications and Networks》 2025年第2期574-586,共13页
In mobile computing environments, most IoT devices connected to networks experience variable error rates and possess limited bandwidth. The conventional method of retransmitting lost information during transmission, c... In mobile computing environments, most IoT devices connected to networks experience variable error rates and possess limited bandwidth. The conventional method of retransmitting lost information during transmission, commonly used in data transmission protocols, increases transmission delay and consumes excessive bandwidth. To overcome this issue, forward error correction techniques, e.g., Random Linear Network Coding(RLNC) can be used in data transmission. The primary challenge in RLNC-based methodologies is sustaining a consistent coding ratio during data transmission, leading to notable bandwidth usage and transmission delay in dynamic network conditions. Therefore, this study proposes a new block-based RLNC strategy known as Adjustable RLNC(ARLNC), which dynamically adjusts the coding ratio and transmission window during runtime based on the estimated network error rate calculated via receiver feedback. The calculations in this approach are performed using a Galois field with the order of 256. Furthermore, we assessed ARLNC's performance by subjecting it to various error models such as Gilbert Elliott, exponential, and constant rates and compared it with the standard RLNC. The results show that dynamically adjusting the coding ratio and transmission window size based on network conditions significantly enhances network throughput and reduces total transmission delay in most scenarios. In contrast to the conventional RLNC method employing a fixed coding ratio, the presented approach has demonstrated significant enhancements, resulting in a 73% decrease in transmission delay and a 4 times augmentation in throughput. However, in dynamic computational environments, ARLNC generally incurs higher computational costs than the standard RLNC but excels in high-performance networks. 展开更多
关键词 Random linear network coding Adjust redundancy Galois field Internet of Things data transfer
在线阅读 下载PDF
Spatial-Modulated Physical-Layer Network Coding Based on Block Markov Superposition Transmission for Maritime Relay Communications 被引量:1
2
作者 Yao Shi Liming Zheng +1 位作者 Wenchao Lin Xiao Ma 《China Communications》 SCIE CSCD 2020年第3期26-35,共10页
As an alternative to satellite communications,multi-hop relay networks can be deployed for maritime long-distance communications.Distinct from terrestrial environment,marine radio signals are affected by many factors,... As an alternative to satellite communications,multi-hop relay networks can be deployed for maritime long-distance communications.Distinct from terrestrial environment,marine radio signals are affected by many factors,e.g.,weather conditions,evaporation ducting,and ship rocking caused by waves.To ensure the data transmission reliability,the block Markov superposition transmission(BMST)codes,which are easily configurable and have predictable performance,are applied in this study.Meanwhile,the physical-layer network coding(PNC)scheme with spatial modulation(SM)is adopted to improve the spectrum utilization.For the BMST-SMPNC system,we propose an iterative algorithm,which utilizes the channel observations and the a priori information from BMST decoder,to compute the soft information corresponding to the XORed bits constructed by the relay node.The results indicate that the proposed scheme outperforms the convolutional coded SM-PNC over fast-fading Rician channels.Especially,the performance can be easily improved in high spatial correlation maritime channel by increasing the memory m. 展开更多
关键词 block Markov superposition transmission maritime relay communications physical-layer network coding Rician fading spatial modulation
在线阅读 下载PDF
Efficient Broadcast Retransmission Based on Network Coding for InterPlaNetary Internet 被引量:1
3
作者 苟亮 边东明 +2 位作者 张更新 徐志平 申振 《China Communications》 SCIE CSCD 2013年第8期111-124,共14页
In traditional wireless broadcast networks,a corrupted packet must be retransmitted even if it has been lost by only one receiver.Obviously,this is not bandwidth-efficient for the receivers that already hold the retra... In traditional wireless broadcast networks,a corrupted packet must be retransmitted even if it has been lost by only one receiver.Obviously,this is not bandwidth-efficient for the receivers that already hold the retransmitted packet.Therefore,it is important to develop a method to realise efficient broadcast transmission.Network coding is a promising technique in this scenario.However,none of the proposed schemes achieves both high transmission efficiency and low computational complexity simultaneously so far.To address this problem,a novel Efficient Opportunistic Network Coding Retransmission(EONCR)scheme is proposed in this paper.This scheme employs a new packet scheduling algorithm which uses a Packet Distribution Matrix(PDM)directly to select the coded packets.The analysis and simulation results indicate that transmission efficiency of EONCR is over 0.1,more than the schemes proposed previously in some simulation conditions,and the computational overhead is reduced substantially.Hence,it has great application prospects in wireless broadcast networks,especially energyand bandwidth-limited systems such as satellite broadcast systems and Planetary Networks(PNs). 展开更多
关键词 wireless broadcast retransmission opportunistic network coding packet scheduling transmission efficiency computational complexity PN
在线阅读 下载PDF
Research on Railway 5G-R Comprehensive Data Transmission Platform and Security Strategy
4
作者 ZUO Zihui LIU Shipeng +2 位作者 ZHANG Ziliang ZHANG Hongchuan ZHENG Mingda(Translated) 《Chinese Railways》 2025年第1期37-43,共7页
5G-R is the main type of next-generation mobile communication system for railways,offering highly reliable broadband data transmission services for intelligent railway operations.In the light of meeting the bearing de... 5G-R is the main type of next-generation mobile communication system for railways,offering highly reliable broadband data transmission services for intelligent railway operations.In the light of meeting the bearing demands of the 5G-R network,a comprehensive data transmission platform is proposed.This platform enables unified accession for various data service systems and applies Software Defined Network(SDN)technology for dynamic routing selection and high-effective data forwarding.Based on shared key lightweight access authentication technology,two-way identity authentication is performed for mobile terminals and network-side devices,ensuring the legitimacy verification of heterogeneous terminals within the application domain. 展开更多
关键词 5G-R comprehensive data transmission platform intelligent railway Software Defined network(SDN) access authentication
原文传递
Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Application
5
作者 Ibraheem Al-Hejri Farag Azzedin +1 位作者 Sultan Almuhammadi Naeem Firdous Syed 《Computers, Materials & Continua》 SCIE EI 2024年第6期4197-4218,共22页
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ... The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes. 展开更多
关键词 IoT LIGHTWEIGHT computation complexity communication overhead cybersecurity threats threat prevention secure data transmission Wireless Sensor networks(WSNs) elliptic curve cryptography
在线阅读 下载PDF
Power Line Monitoring Data Transmission Using Wireless Sensor Network 被引量:4
6
作者 Lifen Li Huaiyu Zhao 《Journal of Power and Energy Engineering》 2015年第8期83-88,共6页
The WSN used in power line monitoring is long chain structure, and the bottleneck near the Sink node is more obvious. In view of this, A Sink nodes’ cooperation mechanism is presented. The Sink nodes from different W... The WSN used in power line monitoring is long chain structure, and the bottleneck near the Sink node is more obvious. In view of this, A Sink nodes’ cooperation mechanism is presented. The Sink nodes from different WSNs are adjacently deployed. Adopting multimode and spatial multiplexing network technology, the network is constructed into multi-mode-level to achieve different levels of data streaming. The network loads are shunted and the network resources are rationally utilized. Through the multi-sink nodes cooperation, the bottlenecks at the Sink node and its near several jump nodes are solved and process the competition of communication between nodes by channel adjustment. Finally, the paper analyzed the method and provided simulation experiment results. Simulation results show that the method can solve the funnel effect of the sink node, and get a good QoS. 展开更多
关键词 WIRELESS Sensor network (WSN) Power Line Monitoring data transmission MULTIMODE network
在线阅读 下载PDF
Linear Network Coding Based Fast Data Synchronization for Wireless Ad Hoc Networks with Controlled Topology
7
作者 Die Hu Xuejun Zhu +1 位作者 Min Gong Shaoshi Yang 《China Communications》 SCIE CSCD 2022年第5期46-53,共8页
Fast data synchronization in wireless ad hoc networks is a challenging and critical problem.It is fundamental for efficient information fusion,control and decision in distributed systems.Previously,distributed data sy... Fast data synchronization in wireless ad hoc networks is a challenging and critical problem.It is fundamental for efficient information fusion,control and decision in distributed systems.Previously,distributed data synchronization was mainly studied in the latency-tolerant distributed databases,or assuming the general model of wireless ad hoc networks.In this paper,we propose a pair of linear network coding(NC)and all-to-all broadcast based fast data synchronization algorithms for wireless ad hoc networks whose topology is under operator’s control.We consider both data block selection and transmitting node selection for exploiting the benefits of NC.Instead of using the store-and-forward protocol as in the conventional uncoded approach,a compute-and-forward protocol is used in our scheme,which improves the transmission efficiency.The performance of the proposed algorithms is studied under different values of network size,network connection degree,and per-hop packet error rate.Simulation results demonstrate that our algorithms significantly reduce the times slots used for data synchronization compared with the baseline that does not use NC. 展开更多
关键词 all-to-all broadcast data synchronization distributed system network coding wireless ad hoc network UAV
在线阅读 下载PDF
Unveiling the Challenges in Improving Data Availability in Vehicular Networks with Network Codingin
8
作者 Zhenni Feng Yanmin Zhu +1 位作者 Qian Zhang Min Gao 《ZTE Communications》 2014年第1期26-32,共7页
Retrieving data from mobile source vehicles is a crucial routine operation for a wide spectrum of vehicular network applications, in- cluding road surface monitoring and sharing. Network coding has been widely exploit... Retrieving data from mobile source vehicles is a crucial routine operation for a wide spectrum of vehicular network applications, in- cluding road surface monitoring and sharing. Network coding has been widely exploited and is an effective technique for diffusing in- formation over a network. The use of network coding to improve data availability in vehicular networks is explored in this paper. With random linear network codes, simple replication is avoided, and instead, a node forwards a coded block that is a random combination of all data received by the node. We use a network-coding-based approach to improve data availability in vehicular networks. To deter- mine the feasibility of this approach, we conducted an empirical study with extensive simulations based on two real vehicular GPS traces, both of which contain records from thousands of vehicles over more than a year. We observed that, despite significant improve- ment in data availability, there is a serious issue with linear correlation between the received codes. This reduces the data-retrieval success rate. By analyzing the real vehicular traces, we discovered that there is a strong community structure within a real vehicular network. We verify that such a structure contributes to the issue of linear dependence. Then, we point out opportunities to improve the network-coding-based approach by developing community-aware code-distribution techniques. 展开更多
关键词 vehicular networks network coding data availability
在线阅读 下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells 被引量:1
9
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
在线阅读 下载PDF
Controlled Quantum Network Coding Without Loss of Information 被引量:1
10
作者 Xiu-Bo Pan Xiu-Bo Chen +4 位作者 Gang Xu Haseeb Ahmad Tao Shang Zong-Peng Li Yi-Xian Yang 《Computers, Materials & Continua》 SCIE EI 2021年第12期3967-3979,共13页
Quantum network coding is used to solve the congestion problem in quantum communication,which will promote the transmission efficiency of quantum information and the total throughput of quantum network.We propose a no... Quantum network coding is used to solve the congestion problem in quantum communication,which will promote the transmission efficiency of quantum information and the total throughput of quantum network.We propose a novel controlled quantum network coding without information loss.The effective transmission of quantum states on the butterfly network requires the consent form a third-party controller Charlie.Firstly,two pairs of threeparticle non-maximum entangled states are pre-shared between senders and controller.By adding auxiliary particles and local operations,the senders can predict whether a certain quantum state can be successfully transmitted within the butterfly network based on the Z-{10>,|1>}basis.Secondly,when trans-mission fails upon prediction,the quantum state will not be lost,and it will sill be held by the sender.Subsequently,the controller Charlie re-prepares another three-particle non-maximum entangled state to start a new round.When the predicted transmission is successful,the quantum state can be transmitted successfully within the butterfly network.If the receiver wants to receive the effective quantum state,the quantum measurements from Charlie are needed.Thirdly,when the transmission fails,Charlie does not need to integrate the X-{1+>,1->}basis to measure its own particles,by which quantum resources are saved.Charlie not only controls the effective transmission of quantum states,but also the usage of classical and quantum channels.Finally,the implementation of the quantum circuits,as well as a flow chart and safety analysis of our scheme,is proposed. 展开更多
关键词 Controlled quantum network coding without information loss quantum teleportation perfect transmission
在线阅读 下载PDF
Channel Estimation and Data Transmission in Massive MIMO TDD Systems 被引量:1
11
作者 Youjie Kang Tianyang Lu 《International Journal of Communications, Network and System Sciences》 2019年第10期170-187,共18页
This paper mainly elaborates the studies of channel estimation and downlink data transmission in Massive MIMO. As there are different types of interference in single-cell and multi-cell systems, this paper establishes... This paper mainly elaborates the studies of channel estimation and downlink data transmission in Massive MIMO. As there are different types of interference in single-cell and multi-cell systems, this paper establishes different models for them separately. In terms of uplink training, for getting channel state information, we introduce LS and MMSE channel estimation algorithms and make a comparison between them. At the same time, the problem of pilot contamination is solved by cell classification and pilot identification. Next, this paper defines mathematical models for downlink data transmission. We use pre-coding methods (including Zero-forcing and Maximal Ratio Combining schemes) and optimize power distribution to improve channel capacity and transmission rate. Furthermore, this paper provides numerical results to show the simulation performance in both single-cell and multi-cell systems and extends to prospects in the future. 展开更多
关键词 Channel Estimation PILOT CONTAMINATION DOWNLINK data transmission Pre-coding Schemes Power Distribution
在线阅读 下载PDF
Reliable Data Collection Model and Transmission Framework in Large-Scale Wireless Medical Sensor Networks
12
作者 Haosong Gou Gaoyi Zhang +2 位作者 RenêRipardo Calixto Senthil Kumar Jagatheesaperumal Victor Hugo C.de Albuquerque 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1077-1102,共26页
Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present ... Large-scale wireless sensor networks(WSNs)play a critical role in monitoring dangerous scenarios and responding to medical emergencies.However,the inherent instability and error-prone nature of wireless links present significant challenges,necessitating efficient data collection and reliable transmission services.This paper addresses the limitations of existing data transmission and recovery protocols by proposing a systematic end-to-end design tailored for medical event-driven cluster-based large-scale WSNs.The primary goal is to enhance the reliability of data collection and transmission services,ensuring a comprehensive and practical approach.Our approach focuses on refining the hop-count-based routing scheme to achieve fairness in forwarding reliability.Additionally,it emphasizes reliable data collection within clusters and establishes robust data transmission over multiple hops.These systematic improvements are designed to optimize the overall performance of the WSN in real-world scenarios.Simulation results of the proposed protocol validate its exceptional performance compared to other prominent data transmission schemes.The evaluation spans varying sensor densities,wireless channel conditions,and packet transmission rates,showcasing the protocol’s superiority in ensuring reliable and efficient data transfer.Our systematic end-to-end design successfully addresses the challenges posed by the instability of wireless links in large-scaleWSNs.By prioritizing fairness,reliability,and efficiency,the proposed protocol demonstrates its efficacy in enhancing data collection and transmission services,thereby offering a valuable contribution to the field of medical event-drivenWSNs. 展开更多
关键词 Wireless sensor networks reliable data transmission medical emergencies CLUSTER data collection routing scheme
在线阅读 下载PDF
Data Aggregation-based Transmission Method in Ultra-Dense Wireless Networks
13
作者 Dae-Young Kim Seokhoon Kim 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期727-737,共11页
As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-t... As the Internet of Things(IoT)advances,machine-type devices are densely deployed and massive networks such as ultra-dense networks(UDNs)are formed.Various devices attend to the network to transmit data using machine-type communication(MTC),whereby numerous,various are generated.MTC devices generally have resource constraints and use wireless communication.In this kind of network,data aggregation is a key function to provide transmission efficiency.It can reduce the number of transmitted data in the network,and this leads to energy saving and reducing transmission delays.In order to effectively operate data aggregation in UDNs,it is important to select an aggregation point well.The total number of transmitted data may vary,depending on the aggregation point to which the data are delivered.Therefore,in this paper,we propose a novel data aggregation scheme to select the appropriate aggregation point and describe the data transmission method applying the proposed aggregation scheme.In addition,we evaluate the proposed scheme with extensive computer simulations.Better performances in the proposed scheme are achieved compared to the conventional approach. 展开更多
关键词 data aggregation data transmission ultra-dense network machine-type communication Internet of Things
在线阅读 下载PDF
DGR:dynamic gradient-based routing protocol for unbalanced and persistent data transmission in wireless sensor and actor networks
14
作者 Yi GUO Zhe-zhuang XU +1 位作者 Cai-lian CHEN Xin-ping GUAN 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2011年第4期273-279,共7页
This paper is concerned with the routing protocol design for large-scale wireless sensor and actor networks(WSANs).The actor-sensor-actor communication(ASAC)strategy is first proposed to guarantee the reliability of p... This paper is concerned with the routing protocol design for large-scale wireless sensor and actor networks(WSANs).The actor-sensor-actor communication(ASAC)strategy is first proposed to guarantee the reliability of persistent actor-actor communication.To keep network connectivity and prolong network lifetime,we propose a dynamic gradient-based routing protocol(DGR)to balance the energy consumption of the network.With the different communication ranges of sensors and actors,the DGR protocol uses a data load expansion strategy to significantly prolong the network lifetime.The balance coefficient and the routing re-establishment threshold are also introduced to make the tradeoff between network lifetime and routing efficiency.Simulation results show the effectiveness of the proposed DGR protocol for unbalanced and persistent data transmission. 展开更多
关键词 Wireless sensor and actor networks Unbalanced and persistent data transmission Gradient-based routing
原文传递
Grey Wolf Optimizer for Cluster-Based Routing in Wireless Sensor Networks:A Methodological Survey
15
作者 Mohammad Shokouhifar Fakhrosadat Fanian +4 位作者 Mehdi Hosseinzadeh Aseel Smerat Kamal M.Othman Abdulfattah Noorwali Esam Y.O.Zafar 《Computer Modeling in Engineering & Sciences》 2026年第1期191-255,共65页
Wireless Sensor Networks(WSNs)have become foundational in numerous real-world applications,ranging from environmental monitoring and industrial automation to healthcare systems and smart city development.As these netw... Wireless Sensor Networks(WSNs)have become foundational in numerous real-world applications,ranging from environmental monitoring and industrial automation to healthcare systems and smart city development.As these networks continue to grow in scale and complexity,the need for energy-efficient,scalable,and robust communication protocols becomes more critical than ever.Metaheuristic algorithms have shown significant promise in addressing these challenges,offering flexible and effective solutions for optimizing WSN performance.Among them,the Grey Wolf Optimizer(GWO)algorithm has attracted growing attention due to its simplicity,fast convergence,and strong global search capabilities.Accordingly,this survey provides an in-depth review of the applications of GWO and its variants for clustering,multi-hop routing,and hybrid cluster-based routing in WSNs.We categorize and analyze the existing GWO-based approaches across these key network optimization tasks,discussing the different problem formulations,decision variables,objective functions,and performance metrics used.In doing so,we examine standard GWO,multi-objective GWO,and hybrid GWO models that incorporate other computational intelligence techniques.Each method is evaluated based on how effectively it addresses the core constraints of WSNs,including energy consumption,communication overhead,and network lifetime.Finally,this survey outlines existing gaps in the literature and proposes potential future research directions aimed at enhancing the effectiveness and real-world applicability of GWO-based techniques for WSN clustering and routing.Our goal is to provide researchers and practitioners with a clear,structured understanding of the current state of GWO in WSNs and inspire further innovation in this evolving field. 展开更多
关键词 Wireless sensor networks data transmission energy efficiency LIFETIME CLUSTERING ROUTING optimization metaheuristic algorithms grey wolf optimizer
在线阅读 下载PDF
Network Coding-based Reliable Broadcast Transmission in Wireless Networks 被引量:4
16
作者 Wang Jing Chi Kaikai Wang Xinmei 《China Communications》 SCIE CSCD 2010年第2期71-77,共7页
Recently, network coding has been applied to the loss recovery of reliable broadcast transmission in wireless networks. Since it was proved that fi nding the optimal set of lost packets for XOR-ing is a complex NP-com... Recently, network coding has been applied to the loss recovery of reliable broadcast transmission in wireless networks. Since it was proved that fi nding the optimal set of lost packets for XOR-ing is a complex NP-complete problem, the available time-based retransmission scheme and its enhanced retransmission scheme have exponential computational complexity and thus are not scalable to large networks. In this paper, we present an efficient heuristic scheme based on hypergraph coloring and also its enhanced heuristic scheme to improve the transmission efficiency. Basically, our proposed schemes fi rst create a hypergraph according to the packet-loss matrix. Then our schemes solve the problem of generating XORed packets by coloring the edges of hypergraph. Extensive simulation results demonstrate that, the heuristic scheme based on hypergraph coloring and its enhanced scheme can achieve almost the same transmission efficiency as the available ones, but have much lower computational complexity, which is very important for the wireless devices without high computation capacity. 展开更多
关键词 network coding reliable broadcast wireless networks transmission bandwidth computational complexity
在线阅读 下载PDF
Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks 被引量:1
17
作者 Lingwei Xu Hao Yin +4 位作者 Hong Jia Wenzhong Lin Xinpeng Zhou Yong Fu Xu Yu 《Digital Communications and Networks》 SCIE CSCD 2023年第2期400-410,共11页
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interc... Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all things.The variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication environments.Ensuring data secure transmission is critical for mobile IIoT networks.This paper investigates the data secure transmission performance prediction of mobile IIoT networks.To cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first derived.Then,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction algorithm.For mobile signals,the important features may be removed by the pooling layers.This will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is designed.Out of the input and output layers,it removes the pooling layer and contains six convolution layers.Elman,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed algorithm.Through simulation analysis,good prediction accuracy is achieved by the CNN algorithm.The prediction accuracy obtains a 59%increase. 展开更多
关键词 Mobile IIoT networks data secure transmission Performance analysis Intelligent prediction Improved CNN
在线阅读 下载PDF
Data Concurrent Transmission MAC Protocol for Application Oriented Underwater Acoustic Sensor Networks 被引量:1
18
作者 Xiaoxiao Zhuo Hong Yang +3 位作者 Meiyan Liu Yan Wei Guanding Yu Fengzhong Qu 《China Communications》 SCIE CSCD 2022年第10期220-237,共18页
With the increasing demand for marine exploration, underwater acoustic sensor networks (UASNs) are prone to have the characteristics of large-scale, long term monitoring, and high data traffic load. Underwater media a... With the increasing demand for marine exploration, underwater acoustic sensor networks (UASNs) are prone to have the characteristics of large-scale, long term monitoring, and high data traffic load. Underwater media access control (MAC) protocols, which allow multiple users to share the common medium fairly and efficiently, are essential for the performance of UASNs. However, the design of MAC protocols is confronted with the challenges of spatial unfairness, data eruption, and low energy efficiency. In this paper, we propose a novel data concurrent transmission (DCT) MAC protocol, which is able to exploit long propagation delay and conduct concurrent transmission. Specifically, we present the theoretical performance analysis of the proposed MAC protocol in detail and give an analytical solution of the success concurrent transmission probability between nodes. In addition, simulation results are provided to demonstrate that our proposed protocol is appropriate for UASNs and can significantly improve the performance in terms of network throughput and energy consumption. Finally, we give some typical future applications of UASNs and discuss the demands on MAC protocol design. 展开更多
关键词 underwater acoustic sensor networks MAC protocols data concurrent transmission
在线阅读 下载PDF
Data Aggregation Point Placement and Subnetwork Optimization for Smart Grids
19
作者 Tien-Wen Sung Wei Li +2 位作者 Chao-Yang Lee Yuzhen Chen Qingjun Fang 《Computers, Materials & Continua》 2025年第4期407-434,共28页
To transmit customer power data collected by smart meters(SMs)to utility companies,data must first be transmitted to the corresponding data aggregation point(DAP)of the SM.The number of DAPs installed and the installa... To transmit customer power data collected by smart meters(SMs)to utility companies,data must first be transmitted to the corresponding data aggregation point(DAP)of the SM.The number of DAPs installed and the installation location greatly impact the whole network.For the traditional DAP placement algorithm,the number of DAPs must be set in advance,but determining the best number of DAPs is difficult,which undoubtedly reduces the overall performance of the network.Moreover,the excessive gap between the loads of different DAPs is also an important factor affecting the quality of the network.To address the above problems,this paper proposes a DAP placement algorithm,APSSA,based on the improved affinity propagation(AP)algorithm and sparrow search(SSA)algorithm,which can select the appropriate number of DAPs to be installed and the corresponding installation locations according to the number of SMs and their distribution locations in different environments.The algorithm adds an allocation mechanism to optimize the subnetwork in the SSA.APSSA is evaluated under three different areas and compared with other DAP placement algorithms.The experimental results validated that the method in this paper can reduce the network cost,shorten the average transmission distance,and reduce the load gap. 展开更多
关键词 Smart grid data aggregation point placement network cost average transmission distance load gap
在线阅读 下载PDF
Multi-Source Spinal Coding for Coded Caching Multicast Transmissions in Wireless Networks
20
作者 Aimin Tang Xudong Wang 《China Communications》 SCIE CSCD 2021年第3期91-104,共14页
Recently,coded caching has been treated as a promising technique to alleviate the traffic burden in wireless networks.To support high efficient coded caching multicast transmissions,the time-varying heterogeneous chan... Recently,coded caching has been treated as a promising technique to alleviate the traffic burden in wireless networks.To support high efficient coded caching multicast transmissions,the time-varying heterogeneous channel conditions need to be considered.In this paper,a practical and novel multi-source spinal coding(MSSC)scheme is developed for coded caching multicast transmissions under heterogeneous channel conditions.By exploring joint design of network coding and spinal coding(SC),MSSC can achieve unequal link rates in multicast transmissions for different users.Moreover,by leveraging the rateless feature of SC in our design,MSSC can well adapt the link rates of all users in multicast transmissions without any feedback of time-varying channel conditions.A maximum likelihood(ML)based decoding process for MSSC is also developed,which can achieve a linear complexity with respect to the user number in the multicast transmission.Simulation results validate the effectiveness of the MSSC scheme.Compared to the existing scheme,the sum rate of MSSC in multicast transmissions is improved by about 20%.When applying MSSC in coded caching systems,the total transmission time can be reduced by up to 48% for time-varying channels. 展开更多
关键词 coded caching spinal code network coding multicast transmission wireless networks
在线阅读 下载PDF
上一页 1 2 113 下一页 到第
使用帮助 返回顶部