期刊文献+
共找到4,802篇文章
< 1 2 241 >
每页显示 20 50 100
Kolmogorov-Arnold networks modeling of wall pressure wavenumber-frequency spectra under turbulent boundary layers
1
作者 Zhiteng Zhou Yi Liu +1 位作者 Shizhao Wang Guowei He 《Theoretical & Applied Mechanics Letters》 2025年第2期115-121,共7页
The empirical models for wavenumber-frequency spectra of wall pressure are broadly used in the fast prediction of aerodynamic and hydrodynamic noise.However,it needs to fit the parameter using massive data and is only... The empirical models for wavenumber-frequency spectra of wall pressure are broadly used in the fast prediction of aerodynamic and hydrodynamic noise.However,it needs to fit the parameter using massive data and is only used for limited cases.In this letter,we propose Kolmogorov-Arnold networks(KAN)base models for wavenumber-frequency spectra of pressure fluctuations under turbulent boundary layers.The results are compared with DNS results.In turbulent channel flows,it is found that the KAN base model leads to a smooth wavenumber-frequency spectrum with sparse samples.In the turbulent flow over an axisymmetric body of revolution,the KAN base model captures the wavenumber-frequency spectra near the convective peak. 展开更多
关键词 Wavenumber-frequency spectra Kolmogorov-Arnold networks modeling Turbulent boundary layers
在线阅读 下载PDF
Multi-scale physics-informed neural networks for solving high Reynolds number boundary layer flows based on matched asymptotic expansions 被引量:3
2
作者 Jianlin Huang Rundi Qiu +1 位作者 Jingzhu Wang Yiwei Wang 《Theoretical & Applied Mechanics Letters》 CAS CSCD 2024年第2期76-81,共6页
Multi-scale system remains a classical scientific problem in fluid dynamics,biology,etc.In the present study,a scheme of multi-scale Physics-informed neural networks is proposed to solve the boundary layer flow at hig... Multi-scale system remains a classical scientific problem in fluid dynamics,biology,etc.In the present study,a scheme of multi-scale Physics-informed neural networks is proposed to solve the boundary layer flow at high Reynolds numbers without any data.The flow is divided into several regions with different scales based on Prandtl's boundary theory.Different regions are solved with governing equations in different scales.The method of matched asymptotic expansions is used to make the flow field continuously.A flow on a semi infinite flat plate at a high Reynolds number is considered a multi-scale problem because the boundary layer scale is much smaller than the outer flow scale.The results are compared with the reference numerical solutions,which show that the msPINNs can solve the multi-scale problem of the boundary layer in high Reynolds number flows.This scheme can be developed for more multi-scale problems in the future. 展开更多
关键词 Physics-informed neural networks(PINNs) MULTI-SCALE Fluid dynamics Boundary layer
在线阅读 下载PDF
EECLP:AWireless Sensor Networks Energy Efficient Cross-Layer Protocol
3
作者 Mohammed Kaddi Mohammed Omari Moamen Alnatoor 《Computers, Materials & Continua》 SCIE EI 2024年第8期2611-2631,共21页
Recent advancements in wireless communications have allowed the birth of novel wireless sensor networks(WSN).A sensor network comprises several micro-sensors deployed randomly in an area of interest.A micro-sensor is ... Recent advancements in wireless communications have allowed the birth of novel wireless sensor networks(WSN).A sensor network comprises several micro-sensors deployed randomly in an area of interest.A micro-sensor is provided with an energy resource to supply electricity to all of its components.However,the disposed energy resource is limited and battery replacement is generally infeasible.With this restriction,the sensors must conserve energy to prolong their lifetime.Various energy conservation strategies for WSNs have been presented in the literature,from the application to the physical layer.Most of these solutions focus only on optimizing a single layer in terms of energy consumption.In this research,a novel cross-layer technique for WSNs’effective energy usage is presented.Because most energy consumption factors exist in the Medium Access Control(MAC)layer and network layer,our EECLP protocol(Energy Efficient Cross-Layer Protocol for Wireless Sensor Networks)integrates these two layers to satisfy energy efficiency criteria.To gain access to the transmission channel,we implement a communication regime at the MAC layer based on CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance)techniques.Next,depending on the activity and a standby period,we employ the RTS/CTS(Request to Send/Clear to Send)method to prevent collisions and resolve hidden node concerns by utilizing the network allocation vector(NAV)to calculate the transmission duration.Employing a greedy strategy,we establish chains amongst cluster members to mitigate the issue of high energy consumption in routing data.An objective function was utilized to determine the optimal cross-chain path based on the distances to the base station(BS)and residual energy(RE).The simulation,testing,and comparison of the proposed protocol to peer protocols have shown superior outcomes and a prolonged network lifespan.Using the suggested protocol,the network lifetime increases by 10%compared to FAMACO(Fuzzy and Ant Colony Optimization based MAC/Routing Cross-layer)protocol,and it increases by 90%and 95%compared to IFUC(Improved Fuzzy Unequal Clustering)and UHEED(Unequal Hybrid Energy Efficient and Distributed)protocols successively. 展开更多
关键词 WSN energy consumption MAC layer network layer EECLP ENERGY-EFFICIENT LIFESPAN
在线阅读 下载PDF
A Kind of Second-Order Learning Algorithm Based on Generalized Cost Criteria in Multi-Layer Feed-Forward Neural Networks
4
作者 张长江 付梦印 金梅 《Journal of Beijing Institute of Technology》 EI CAS 2003年第2期119-124,共6页
A kind of second order algorithm--recursive approximate Newton algorithm was given by Karayiannis. The algorithm was simplified when it was formulated. Especially, the simplification to matrix Hessian was very reluct... A kind of second order algorithm--recursive approximate Newton algorithm was given by Karayiannis. The algorithm was simplified when it was formulated. Especially, the simplification to matrix Hessian was very reluctant, which led to the loss of valuable information and affected performance of the algorithm to certain extent. For multi layer feed forward neural networks, the second order back propagation recursive algorithm based generalized cost criteria was proposed. It is proved that it is equivalent to Newton recursive algorithm and has a second order convergent rate. The performance and application prospect are analyzed. Lots of simulation experiments indicate that the calculation of the new algorithm is almost equivalent to the recursive least square multiple algorithm. The algorithm and selection of networks parameters are significant and the performance is more excellent than BP algorithm and the second order learning algorithm that was given by Karayiannis. 展开更多
关键词 multi layer feed forward neural networks BP algorithm Newton recursive algorithm
在线阅读 下载PDF
Non-Terrestrial Network: Architecture, Technologies and Applications
5
作者 Gao Yuan Wu Gang +3 位作者 Hao Zhangcheng Zhao Nan Dusit Niyato Arumugam Nallanathan 《China Communications》 2025年第10期I0002-I0005,共4页
With the advent of the digital era,the field of communications is undergoing profound transformation.Among the most groundbreaking developments is the emergence of non-terrestrial networks(NTN),which represent not onl... With the advent of the digital era,the field of communications is undergoing profound transformation.Among the most groundbreaking developments is the emergence of non-terrestrial networks(NTN),which represent not only a technological leap forward but also a major trend shaping the future of global connectivity.As a layered heterogeneous network,NTN integrates multiple aerial platforms—including satellites,high-altitude platform systems(HAPS),and unmanned aerial systems(UAS)—to provide flexible and composable solutions aimed at achieving seamless worldwide communication coverage. 展开更多
关键词 unmanned aerial systems uas non terrestrial networks SATELLITES layered heterogeneous networkntn aerial platforms layered heterogeneous network high altitude platform systems unmanned aerial systems
在线阅读 下载PDF
A blockchain-assisted lightweight UAV network authentication mechanism via covert communication
6
作者 Yuwen QIAN Huan CAI +4 位作者 Long SHI Zhen MEI Yumeng SHAO Feng SHU Xiangwei ZHOU 《Chinese Journal of Aeronautics》 2025年第10期216-229,共14页
The increasing importance of terminal privacy in the Unmanned Aerial Vehicle(UAV)network has led to a growing recognition of the crucial role of authentication technology in UAV network security.However,traditional au... The increasing importance of terminal privacy in the Unmanned Aerial Vehicle(UAV)network has led to a growing recognition of the crucial role of authentication technology in UAV network security.However,traditional authentication approaches are vulnerable due to the transmission of identity information between UAVs and cryptographic paradigm management centers over a public channel.These vulnerabilities include brute-force attacks,single point of failure,and information leakage.Blockchain,as a decentralized distributed ledger with blockchain storage,tamper-proof,secure,and trustworthy features,can solve problems such as single-point-of-failure and trust issues,while the hidden communication in the physical layer can effectively resist information leakage and violent attacks.In this paper,we propose a lightweight UAV network authentication mechanism that leverages blockchain and covert communication,where the identity information is transmitted as covert tags carried by normal modulated signals.In addition,a weight-based Practical Byzantine Fault-Tolerant(wPBFT)consensus protocol is devised,where the weights are determined by the channel states of UAVs and the outcomes of past authentication scenarios.Simulation results demonstrate that the proposed mechanism outperforms traditional benchmarks in terms of security and robustness,particularly under conditions of low Signal-to-Noise Ratio(SNR)and short tag length. 展开更多
关键词 Unmanned Aerial Vehicle(UAV)network Covert communication Blockchain Physical layer AUTHENTICATION
原文传递
Morphology and dynamics of sporadic E layers observed by amateur radio
7
作者 WenYu Hao Tao Yu +2 位作者 Yang-Yi Sun Jin Wang LiHui Qiu 《Earth and Planetary Physics》 2025年第4期980-987,共8页
The E_(s) layer is a thin layer that concentrates metallic ions in the mesosphere and lower thermosphere(MLT)region.When it occurs,it can affect the performance of the Global Navigation Satellite System and high/very ... The E_(s) layer is a thin layer that concentrates metallic ions in the mesosphere and lower thermosphere(MLT)region.When it occurs,it can affect the performance of the Global Navigation Satellite System and high/very high frequency(HF/VHF)radio communications.Previous studies mainly focused on the one-dimensional structure of E_(s) layer in the vertical direction.However,due to the limitation of observations,the horizontal structure of E_(s) layers is not yet fully understood.This study investigated the horizontal structure of E_(s) layers using amateur radio data in the European sector during the summer of 2020.Statistical analysis shows that the horizontal structure of E_(s) layer is mainly elongated in the east-west direction.In addition,we investigated the dynamics of the E_(s) layers,which primarily propagates in the northeast-southwest direction with a speed of 50-200 m/s.The results provide us a way for obtaining the horizontal structure and dynamic features of E_(s) layers,which can help improve our understanding of the formation and evolution of E_(s) layers. 展开更多
关键词 amateur radio reporting networks sporadic E layer horizontal structure wind shear dynamic feature
在线阅读 下载PDF
Resource allocation algorithm for downlink secure transmission in wireless EH cooperative networks with idle relay-assisted jamming
8
作者 Xintong Zhou Kun Xiao Feng Ke 《Digital Communications and Networks》 2025年第3期829-836,共8页
In wireless Energy Harvesting(EH)cooperative networks,we investigate the problem of secure energy-saving resource allocation for downlink physical layer security transmission.Initially,we establish a model for a multi... In wireless Energy Harvesting(EH)cooperative networks,we investigate the problem of secure energy-saving resource allocation for downlink physical layer security transmission.Initially,we establish a model for a multi-relay cooperative network incorporating wireless energy harvesting,spectrum sharing,and system power constraints,focusing on physical layersecurity transmission in the presence of eavesdropping nodes.In this model,the source node transmits signals while injecting Artificial Noise(AN)to mitigate eavesdropping risks,and an idle relay can act as a jamming node to assist in this process.Based on this model,we formulate an optimization problem for maximizing system secure harvesting energy efficiency,this problem integrates constraints on total power,bandwidth,and AN allocation.We proceed by conducting a mathematical analysis of the optimization problem,deriving optimal solutions for secure energy-saving resource allocation,this includes strategies for power allocation at the source and relay nodes,bandwidth allocation among relays,and power splitting for the energy harvesting node.Thus,we propose a secure resource allocation algorithm designed to maximize secure harvesting energy efficiency.Finally,we validate the correctness of the theoretical derivation through Monte Carlo simulations,discussing the impact of parameters such as legitimate channel gain,power splitting factor,and the number of relays on secure harvesting energy efficiency of the system.The simulation results show that the proposed secure energy-saving resource allocation algorithm effectively enhances the security performance of the system. 展开更多
关键词 Wireless cooperative network Physical layer security Energy harvesting Resource allocation Spectrum sharing Secure energy efficiency
在线阅读 下载PDF
System Modeling and Deep Learning-Based Security Analysis of Uplink NOMA Relay Networks with IRS and Fountain Codes
9
作者 Phu Tran Tin Minh-Sang Van Nguyen +2 位作者 Quy-Anh Bui Agbotiname Lucky Imoize Byung-Seo Kim 《Computer Modeling in Engineering & Sciences》 2025年第8期2521-2543,共23页
Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and ... Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions. 展开更多
关键词 Copyright management deep neural network fountain codes intelligent reflecting surface non-orthogonal multiple access physical layer security UPLINK
在线阅读 下载PDF
Computational Optimization of RIS-Enhanced Backscatter and Direct Communication for 6G IoT:A DDPG-Based Approach with Physical Layer Security
10
作者 Syed Zain Ul Abideen Mian Muhammad Kamal +4 位作者 Eaman Alharbi Ashfaq Ahmad Malik Wadee Alhalabi Muhammad Shahid Anwar Liaqat Ali 《Computer Modeling in Engineering & Sciences》 2025年第3期2191-2210,共20页
The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet ofThings(IoT)applications,particularly in terms of ultra-reliable,secure,and energyeffic... The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet ofThings(IoT)applications,particularly in terms of ultra-reliable,secure,and energyefficient communication.This study explores the integration of Reconfigurable Intelligent Surfaces(RIS)into IoT networks to enhance communication performance.Unlike traditional passive reflector-based approaches,RIS is leveraged as an active optimization tool to improve both backscatter and direct communication modes,addressing critical IoT challenges such as energy efficiency,limited communication range,and double-fading effects in backscatter communication.We propose a novel computational framework that combines RIS functionality with Physical Layer Security(PLS)mechanisms,optimized through the algorithm known as Deep Deterministic Policy Gradient(DDPG).This framework adaptively adapts RIS configurations and transmitter beamforming to reduce key challenges,including imperfect channel state information(CSI)and hardware limitations like quantized RIS phase shifts.By optimizing both RIS settings and beamforming in real-time,our approach outperforms traditional methods by significantly increasing secrecy rates,improving spectral efficiency,and enhancing energy efficiency.Notably,this framework adapts more effectively to the dynamic nature of wireless channels compared to conventional optimization techniques,providing scalable solutions for large-scale RIS deployments.Our results demonstrate substantial improvements in communication performance setting a new benchmark for secure,efficient and scalable 6G communication.This work offers valuable insights for the future of IoT networks,with a focus on computational optimization,high spectral efficiency and energy-aware operations. 展开更多
关键词 Computational optimization reconfigurable intelligent surfaces(RIS) 6G networks IoT and DDPG physical layer security(PLS) backscatter communication
在线阅读 下载PDF
Distributed Cooperative Regulation for Networked Re-Entrant Manufacturing Systems
11
作者 Chenguang Liu Qing Gao +1 位作者 Wei Wang Jinhu Lü 《IEEE/CAA Journal of Automatica Sinica》 2025年第3期636-638,共3页
Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the p... Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the production line,the manufacturing layer and the workshop layer.The dynamics of re-entrant production lines are governed by hyperbolic partial differential equations(PDEs)based on the law of mass conservation. 展开更多
关键词 production line networked re entrant manufacturing systems three tier architecture production linethe distributed cooperative regulation hyperbolic partial differential equations pdes based distributed cooperative regulation problem manufacturing layer
在线阅读 下载PDF
Physical layer design of wireless sensor network nodes 被引量:5
12
作者 钟子果 胡爱群 王丹 《Journal of Southeast University(English Edition)》 EI CAS 2006年第1期21-25,共5页
Major consideration dimensions for the physical layer design of wireless sensor network (WSN) nodes is analyzed by comparing different wireless communication approaches, diverse mature standards, important radio fre... Major consideration dimensions for the physical layer design of wireless sensor network (WSN) nodes is analyzed by comparing different wireless communication approaches, diverse mature standards, important radio frequency (RF) parameters and various microcontroller unit (MCU) solutions. An implementation of the WSN node is presented with experimental results and a novel "one processor working at two frequencies" energy saving strategy. The lifetime estimation issue is analyzed with consideration to the periodical listen required by common WSN media access control (MAC) algorithms. It can be concluded that the startup time of the RF which determines the best sleep time ratio and the shortest backoff slot time of MAC, the RF frequency and modulation methods which determinate the RX and TX current, and the overall energy consumption of the dual frequency MCU SOC ( system on chip) are the most essential factors for the WSN node physical layer design. 展开更多
关键词 wireless sensor network node physical layer radio frequency energy consumption node lifetime
在线阅读 下载PDF
A Tractable Approach to Analyzing the Physical-Layer Security in K-Tier Heterogeneous Cellular Networks 被引量:6
13
作者 ZHONG Zhihao PENG Janhua +1 位作者 LUO Wenyu HUANG Kaizhi 《China Communications》 SCIE CSCD 2015年第S1期166-173,共8页
This study proposes a tractable approach to analyze the physical-layer security in the downlink of a multi-tier heterogeneous cellular network. This method is based on stochastic geometry, has low computational comple... This study proposes a tractable approach to analyze the physical-layer security in the downlink of a multi-tier heterogeneous cellular network. This method is based on stochastic geometry, has low computational complexity, and uses the two-dimensional Poisson point process to model the locations of K-tier base stations and receivers, including those of legitimate users and eavesdroppers. Then, the achievable secrecy rates for an arbitrary user are determined and the upper and lower bounds of secrecy coverage probability derived on the condition that cross-tier interference is the main contributor to aggregate interference. Finally, our analysis results reveal the innate connections between information-theoretic security and the spatial densities of legitimate and malicious nodes. 展开更多
关键词 HETEROGENEOUS cellular networks physical layer security stochastic GEOMETRY SECRECY COVERAGE PROBABILITY
在线阅读 下载PDF
Cooperative Jamming for Physical Layer Security in Hybrid Satellite Terrestrial Relay Networks 被引量:9
14
作者 Su Yan Xinyi Wang +2 位作者 Zongling Li Bin Li Zesong Fei 《China Communications》 SCIE CSCD 2019年第12期154-164,共11页
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTR... To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one. 展开更多
关键词 hybrid satellite terrestrial relay networks physical layer security cooperative jamming
在线阅读 下载PDF
THE APPLICATION OF ARTIFICIAL NEURAL NETWORKS TO INVESTIGATION ON THE THICKNESS OF INTERMETALLIC LAYER UNDER SOLID-LIQUID PRESSURE BONDING OF STEEL AND ALUMINIUM 被引量:8
15
作者 P. Zhang J.Z. Cui Y.H. Du and Q.Z. Zhang(Department of Metal Forming, Northeastern University, Shenyang 110006, China)(Department of Mining, Northeastern University, Shenyang 110006, China) 《Acta Metallurgica Sinica(English Letters)》 SCIE EI CAS CSCD 1997年第6期523-526,共4页
Artificial neural networks (ANN), being a sophisticated type of information processing system by imitating the neural system of human brain, can be used to investigate the effects of concentration of flux solution, te... Artificial neural networks (ANN), being a sophisticated type of information processing system by imitating the neural system of human brain, can be used to investigate the effects of concentration of flux solution, temperature of liquid aluminium, temperture of tools and pressure on thickness of the intermetallic layer at the interface between steel and aluminium under solid-liquid pressure bonding of steel and aluminium perfectly. The optimum thickness has been determined according to the value of the optimum shearing strength. 展开更多
关键词 artificial neural network thickness of the intermetallic layer solid-liquid pressure bonding
在线阅读 下载PDF
An Interpretable Denoising Layer for Neural Networks Based on Reproducing Kernel Hilbert Space and its Application in Machine Fault Diagnosis 被引量:9
16
作者 Baoxuan Zhao Changming Cheng +3 位作者 Guowei Tu Zhike Peng Qingbo He Guang Meng 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2021年第3期104-114,共11页
Deep learning algorithms based on neural networks make remarkable achievements in machine fault diagnosis,while the noise mixed in measured signals harms the prediction accuracy of networks.Existing denoising methods ... Deep learning algorithms based on neural networks make remarkable achievements in machine fault diagnosis,while the noise mixed in measured signals harms the prediction accuracy of networks.Existing denoising methods in neural networks,such as using complex network architectures and introducing sparse techniques,always suffer from the difficulty of estimating hyperparameters and the lack of physical interpretability.To address this issue,this paper proposes a novel interpretable denoising layer based on reproducing kernel Hilbert space(RKHS)as the first layer for standard neural networks,with the aim to combine the advantages of both traditional signal processing technology with physical interpretation and network modeling strategy with parameter adaption.By investigating the influencing mechanism of parameters on the regularization procedure in RKHS,the key parameter that dynamically controls the signal smoothness with low computational cost is selected as the only trainable parameter of the proposed layer.Besides,the forward and backward propagation algorithms of the designed layer are formulated to ensure that the selected parameter can be automatically updated together with other parameters in the neural network.Moreover,exponential and piecewise functions are introduced in the weight updating process to keep the trainable weight within a reasonable range and avoid the ill-conditioned problem.Experiment studies verify the effectiveness and compatibility of the proposed layer design method in intelligent fault diagnosis of machinery in noisy environments. 展开更多
关键词 Machine fault diagnosis Reproducing kernel Hilbert space(RKHS) Regularization problem Denoising layer Neural network
在线阅读 下载PDF
Deep Learning Based Physical Layer Security of D2D Underlay Cellular Network 被引量:2
17
作者 Lixin Li Youbing Hu +2 位作者 Huisheng Zhang Wei Liang Ang Gao 《China Communications》 SCIE CSCD 2020年第2期93-106,共14页
In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep le... In order to improve the physical layer security of the device-to-device(D2D)cellular network,we propose a collaborative scheme for the transmit antenna selection and the optimal D2D pair establishment based on deep learning.Due to the mobility of users,using the current channel state information to select a transmit antenna or establish a D2D pair for the next time slot cannot ensure secure communication.Therefore,in this paper,we utilize the Echo State Network(ESN)to select the transmit antenna and the Long Short-Term Memory(LSTM)to establish the D2D pair.The simulation results show that the LSTMbased and ESN-based collaboration scheme can effectively improve the security capacity of the cellular network with D2D and increase the life of the base station. 展开更多
关键词 D2D underlay cellular network physical layer security deep learning transmit antenna selection
在线阅读 下载PDF
STUDY ON STRATEGY OF DYNAMIC JOINT ROUTING AND RESOURCE ALLOCATION IN LAYERED OPTICAL TRANSPORT NETWORKS 被引量:2
18
作者 Su Yang Xu Zhanqi +1 位作者 Zhao Ruiqin Liu Zengji 《Journal of Electronics(China)》 2008年第2期166-173,共8页
A layered network model for optical transport networks is proposed in this paper,which involves Internet Protocol(IP) ,Synchronous Digital Hierarchy(SDH) and Wavelength Division Mul-tiplexing(WDM) layers. The strategy... A layered network model for optical transport networks is proposed in this paper,which involves Internet Protocol(IP) ,Synchronous Digital Hierarchy(SDH) and Wavelength Division Mul-tiplexing(WDM) layers. The strategy of Dynamic Joint Routing and Resource Allocation(DJRRA) and its algorithm description are also presented for the proposed layered network model. DJRRA op-timizes the bandwidth usage of interface links between different layers and the logic links inside all layers. The simulation results show that DJRRA can reduce the blocking probability and increase network throughput effectively,which is in contrast to the classical separate sequential routing and resource allocation solutions. 展开更多
关键词 layered network model Optical transport network Joint routing and resource allocation network throughput
在线阅读 下载PDF
Layered learning of soccer robot based on artificial neural network 被引量:1
19
作者 韩学东 洪炳熔 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2001年第3期276-278,共3页
Discusses the application of artificial neural network for MIROSOT, introduces a layered model of BP network of soccer robot for learning basic behavior and cooperative behavior, and concludes from experimental result... Discusses the application of artificial neural network for MIROSOT, introduces a layered model of BP network of soccer robot for learning basic behavior and cooperative behavior, and concludes from experimental results that the model is effective. 展开更多
关键词 artificial neural network (ANN) MIROSOT layered learning soccer robot
在线阅读 下载PDF
A Physical Layer Network Coding Based Tag Anti-Collision Algorithm for RFID System 被引量:3
20
作者 Cuixiang Wang Xing Shao +1 位作者 Yifan Meng Jun Gao 《Computers, Materials & Continua》 SCIE EI 2021年第1期931-945,共15页
In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w... In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93. 展开更多
关键词 Radio frequency identification(RFID) tag anti-collision algorithm physical layer network coding binary search tree algorithm
在线阅读 下载PDF
上一页 1 2 241 下一页 到第
使用帮助 返回顶部