期刊文献+
共找到912篇文章
< 1 2 46 >
每页显示 20 50 100
Slice-Based 6G Network with Enhanced Manta Ray Deep Reinforcement Learning-Driven Proactive and Robust Resource Management
1
作者 Venkata Satya Suresh kumar Kondeti Raghavendra Kulkarni +1 位作者 Binu Sudhakaran Pillai Surendran Rajendran 《Computers, Materials & Continua》 2025年第9期4973-4995,共23页
Next-generation 6G networks seek to provide ultra-reliable and low-latency communications,necessitating network designs that are intelligent and adaptable.Network slicing has developed as an effective option for resou... Next-generation 6G networks seek to provide ultra-reliable and low-latency communications,necessitating network designs that are intelligent and adaptable.Network slicing has developed as an effective option for resource separation and service-level differentiation inside virtualized infrastructures.Nonetheless,sustaining elevated Quality of Service(QoS)in dynamic,resource-limited systems poses significant hurdles.This study introduces an innovative packet-based proactive end-to-end(ETE)resource management system that facilitates network slicing with improved resilience and proactivity.To get around the drawbacks of conventional reactive systems,we develop a cost-efficient slice provisioning architecture that takes into account limits on radio,processing,and transmission resources.The optimization issue is non-convex,NP-hard,and requires online resolution in a dynamic setting.We offer a hybrid solution that integrates an advanced Deep Reinforcement Learning(DRL)methodology with an Improved Manta-Ray Foraging Optimization(ImpMRFO)algorithm.The ImpMRFO utilizes Chebyshev chaotic mapping for the formation of a varied starting population and incorporates Lévy flight-based stochastic movement to avert premature convergence,hence facilitating improved exploration-exploitation trade-offs.The DRL model perpetually acquires optimum provisioning strategies via agent-environment interactions,whereas the ImpMRFO enhances policy performance for effective slice provisioning.The solution,developed in Python,is evaluated across several 6G slicing scenarios that include varied QoS profiles and traffic requirements.The DRL model perpetually acquires optimum provisioning methods via agent-environment interactions,while the ImpMRFO enhances policy performance for effective slice provisioning.The solution,developed in Python,is evaluated across several 6G slicing scenarios that include varied QoS profiles and traffic requirements.Experimental findings reveal that the proactive ETE system outperforms DRL models and non-resilient provisioning techniques.Our technique increases PSSRr,decreases average latency,and optimizes resource use.These results demonstrate that the hybrid architecture for robust,real-time,and scalable slice management in future 6G networks is feasible. 展开更多
关键词 sliced network manta ray foraging optimization Chebyshev chaotic map levy flight
在线阅读 下载PDF
An Intelligent Admission Control Scheme for Dynamic Slice Handover Policy in 5G Network Slicing
2
作者 Ratih Hikmah Puspita Jehad Ali Byeong-hee Roh 《Computers, Materials & Continua》 SCIE EI 2023年第5期4611-4631,共21页
5G use cases,for example enhanced mobile broadband(eMBB),massive machine-type communications(mMTC),and an ultra-reliable low latency communication(URLLC),need a network architecture capable of sustaining stringent lat... 5G use cases,for example enhanced mobile broadband(eMBB),massive machine-type communications(mMTC),and an ultra-reliable low latency communication(URLLC),need a network architecture capable of sustaining stringent latency and bandwidth requirements;thus,it should be extremely flexible and dynamic.Slicing enables service providers to develop various network slice architectures.As users travel from one coverage region to another area,the callmust be routed to a slice thatmeets the same or different expectations.This research aims to develop and evaluate an algorithm to make handover decisions appearing in 5G sliced networks.Rules of thumb which indicates the accuracy regarding the training data classification schemes within machine learning should be considered for validation and selection of the appropriate machine learning strategies.Therefore,this study discusses the network model’s design and implementation of self-optimization Fuzzy Qlearning of the decision-making algorithm for slice handover.The algorithm’s performance is assessed by means of connection-level metrics considering the Quality of Service(QoS),specifically the probability of the new call to be blocked and the probability of a handoff call being dropped.Hence,within the network model,the call admission control(AC)method is modeled by leveraging supervised learning algorithm as prior knowledge of additional capacity.Moreover,to mitigate high complexity,the integration of fuzzy logic as well as Fuzzy Q-Learning is used to discretize state and the corresponding action spaces.The results generated from our proposal surpass the traditional methods without the use of supervised learning and fuzzy-Q learning. 展开更多
关键词 5g network slice fuzzy q-Learning slice handover
在线阅读 下载PDF
Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks 被引量:6
3
作者 Peng Li Chao Xu +2 位作者 He Xu Lu Dong Ruchuan Wang 《China Communications》 SCIE CSCD 2019年第5期158-170,共13页
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn... Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy. 展开更多
关键词 wireless sensor network PRIVACY PROTECTION slice TECHNOLOGY PRIVACY HOMOMORPHISM collection tree protocol
在线阅读 下载PDF
Demand Prediction Based Slice Reconfiguration Using Dueling Deep Q-Network
4
作者 Wanqing Guan Haijun Zhang 《China Communications》 SCIE CSCD 2022年第5期267-285,共19页
To satisfy diversified service demands of vertical industries,network slicing enables efficient resource allocation of a common infrastructure by creating isolated logical networks.However,uncertainty and dynamics of ... To satisfy diversified service demands of vertical industries,network slicing enables efficient resource allocation of a common infrastructure by creating isolated logical networks.However,uncertainty and dynamics of service demands will cause performance degradation.Due to operation costs and resource constraints,it is challenging to maintain high quality of user experience while obtaining high revenue for service providers(SPs).This paper develops an optimal and fast slice reconfiguration(OFSR)framework based on reinforcement learning,where a novel scheme is proposed to offer optimal decisions for reconfiguring diverse slices.A demand prediction model is proposed to capture changes in resource requirements,based on which the OFSR scheme is triggered to determine whether to perform slice reconfiguration.Considering the large state and action spaces generated from uncertain service time and resource requirements,deep dueling architecture is adopted to improve the convergence rate.Extensive simulations validate the effectiveness of the proposed framework in achieving higher long-term revenue for SPs. 展开更多
关键词 network slicing slice reconfiguration reinforcement learning resource allocation
在线阅读 下载PDF
Incentive Scheme for Slice Cooperation Based on D2D Communication in 5G Networks 被引量:5
5
作者 Qian Sun Lin Tian +2 位作者 Yiqing Zhou Jinglin Shi Zongshuai Zhang 《China Communications》 SCIE CSCD 2020年第1期28-41,共14页
In the 5th generation(5G)wireless communication networks,network slicing emerges where network operators(NPs)form isolated logical slices by the same cellular network infrastructure and spectrum resource.In coverage r... In the 5th generation(5G)wireless communication networks,network slicing emerges where network operators(NPs)form isolated logical slices by the same cellular network infrastructure and spectrum resource.In coverage regions of access points(APs)shared by slices,device to device(D2D)communication can occur among different slices,i.e.,one device acts as D2D relay for another device serving by a different slice,which is defined as slice cooperation in this paper.Since selfish slices will not help other slices by cooperation voluntarily and unconditionally,this paper designs a novel resource allocation scheme to stimulate slice cooperation.The main idea is to encourage slice to perform cooperation for other slices by rewarding it with higher throughput.The proposed incentive scheme for slice cooperation is formulated by an optimal problem,where cooperative activities are introduced to the objective function.Since optimal solutions of the formulated problem are long term statistics,though can be obtained,a practical online slice scheduling algorithm is designed,which can obtain optimal solutions of the formulated maximal problem.Lastly,the throughput isolation indexes are defined to evaluate isolation performance of slice.According to simulation results,the proposed incentive scheme for slice cooperation can stimulate slice cooperation effectively,and the isolation of slice is also simulated and discussed. 展开更多
关键词 slice cooperation incentive cooperation resource allocation for slice slice scheduling wireless communication networks
在线阅读 下载PDF
Slice-GCN:基于程序切片与图神经网络的智能合约漏洞检测方法
6
作者 张人娄 吴胜 +1 位作者 张浩 刘方宇 《信息安全学报》 2025年第1期105-118,共14页
智能合约是一段由计算机代码构成的程序。随着智能合约数量的暴涨,如何利用漏洞检测方法来提升智能合约的安全性显得更加重要。已有的符号执行、模糊测试与形式化验证等漏洞检测方法自动化程度低,而基于序列模型的深度学习方法由于对智... 智能合约是一段由计算机代码构成的程序。随着智能合约数量的暴涨,如何利用漏洞检测方法来提升智能合约的安全性显得更加重要。已有的符号执行、模糊测试与形式化验证等漏洞检测方法自动化程度低,而基于序列模型的深度学习方法由于对智能合约源代码的特征挖掘不足导致检测结果的精度偏低。因此,本文提出一个基于程序切片与图神经网络的以太坊智能合约(简称智能合约)漏洞检测方法Slice-GCN。该方法先对程序进行代码预处理简化程序,再使用基于图可达性和数据流方程的程序切片方法对预处理后的程序进行切片,并将切片结果输入长短期记忆网络(LSTM)中提取智能合约的程序语义特征。接着,简化程序依赖图后将其输入图卷积神经网络中,并提取智能合约的程序结构特征。然后,将智能合约的程序语义特征和结构特征拼接后输入多层感知机(MLP)中,并对智能合约进行漏洞检测。在提出Slice-GCN方法的基础上,针对重入攻击、时间戳依赖及整数溢出三类漏洞,本文对Slice-GCN方法与Oyente、Osiris和Soliditycheck三款智能漏洞检测工具进行了对比实验,并且通过消融实验分析了程序切片、图神经网络及图收缩比例对实验结果的影响。实验结果表明本文提出的方法在各类指标上均有较大提升,能有效提升检测准确度和精度,降低误报率,同时在检测速度上也明显优于传统的智能合约漏洞检测工具。 展开更多
关键词 智能合约 漏洞检测 图神经网络 程序切片
在线阅读 下载PDF
Ensemble Encoder-Based Attack Traffic Classification for Secure 5G Slicing Networks
7
作者 Min-Gyu Kim Hwankuk Kim 《Computer Modeling in Engineering & Sciences》 2025年第5期2391-2415,共25页
This study proposes an efficient traffic classification model to address the growing threat of distributed denial-of-service(DDoS)attacks in 5th generation technology standard(5G)slicing networks.The proposed method u... This study proposes an efficient traffic classification model to address the growing threat of distributed denial-of-service(DDoS)attacks in 5th generation technology standard(5G)slicing networks.The proposed method utilizes an ensemble of encoder components from multiple autoencoders to compress and extract latent representations from high-dimensional traffic data.These representations are then used as input for a support vector machine(SVM)-based metadata classifier,enabling precise detection of attack traffic.This architecture is designed to achieve both high detection accuracy and training efficiency,while adapting flexibly to the diverse service requirements and complexity of 5G network slicing.The model was evaluated using the DDoS Datasets 2022,collected in a simulated 5G slicing environment.Experiments were conducted under both class-balanced and class-imbalanced conditions.In the balanced setting,the model achieved an accuracy of 89.33%,an F1-score of 88.23%,and an Area Under the Curve(AUC)of 89.45%.In the imbalanced setting(attack:normal 7:3),the model maintained strong robustness,=achieving a recall of 100%and an F1-score of 90.91%,demonstrating its effectiveness in diverse real-world scenarios.Compared to existing AI-based detection methods,the proposed model showed higher precision,better handling of class imbalance,and strong generalization performance.Moreover,its modular structure is well-suited for deployment in containerized network function(NF)environments,making it a practical solution for real-world 5G infrastructure.These results highlight the potential of the proposed approach to enhance both the security and operational resilience of 5G slicing networks. 展开更多
关键词 5G slicing networks attack traffic classification ensemble encoders autoencoder AI-based security
在线阅读 下载PDF
Coordinated Management of 5G Core Slices by MANO and OSS/BSS
8
作者 Wei-Cheng Chang Fuchun Joseph Lin 《Journal of Computer and Communications》 2021年第6期52-72,共21页
To manage and orchestrate Network Slices (NSs) for 5G Core (5GC), the MANO (MANagement and Orchestration) framework is proposed by European Telecommunications Standard Institute (ETSI). In most research testbeds, MANO... To manage and orchestrate Network Slices (NSs) for 5G Core (5GC), the MANO (MANagement and Orchestration) framework is proposed by European Telecommunications Standard Institute (ETSI). In most research testbeds, MANO systems such as Tacker, OSM and ONAP are used to initiate network slices. However, this doesn’t comply with the 3GPP 5G standards as MANO should only be responsible for dynamic management of NSs, and the static management such as provisioning or unprovisioning a network slice should be left to OSS/BSS (Operation/Business Support System). Thus, in our testbed, an integrated architecture was designed in which the management of network slices will be coordinated by both MANO and OSS/BSS. MANO would handle on-boarding, instantiating, scaling and terminating of network slices while OSS/BSS is responsible for static management of slices including provisioning and unprovisioning of network slices. To evaluate our system, it was compared with the management systems equipped with only OSS/BSS or MANO in order to analyze the shortfalls of those systems when used to deploy network slices. Through this analysis, this research confirms the necessity of applying both OSS/BSS and MANO for the coordinated management of 5G core slices as adopted by 3GPP. 展开更多
关键词 network slice 5G MANO OSS/BSS network Management
在线阅读 下载PDF
Evaluating Dedicated Slices of Different Configurations in 5G Core
9
作者 Yu-Herng Chai Fuchun Joseph Lin 《Journal of Computer and Communications》 2021年第7期55-72,共18页
Network slicing is one of the most important concepts in 5G networks. It is enabled by the Network Function Virtualization (NFV) technology to allow a set of Virtual Network Functions (VNFs) to be interconnected to fo... Network slicing is one of the most important concepts in 5G networks. It is enabled by the Network Function Virtualization (NFV) technology to allow a set of Virtual Network Functions (VNFs) to be interconnected to form a Network Service (NS). When network slices are created in 5G, some are shared among different 5G services while the others are dedicated to specific 5G services. The latter are called dedicated slices. Dedicated slices can be constructed with different configurations. In this research, dedicated slices of different configurations in 5G Core were evaluated in order to discover which one would perform better than the others. The performance of three systems would be compared: 1) Free5GC Stage 2 with each dedicated slice consisting of only UPF;2) Free5GC Stage 3 with each dedicated slice consisting of only UPF;3) Free5GC Stage 3 with each dedicated slice consisting of both SMF and UPF in terms of their registration time, response time, throughput, resource cost, and CPU utilization. It is shown that not one of the above systems will always be the best choice;based on the requirements, a specific system may be the best under a specific situation. 展开更多
关键词 network Function Virtualization (NFV) Next Generation networking Resource Management network slice Dedicated slice Free5GC
在线阅读 下载PDF
6G service-oriented space-air-ground integrated network: A survey 被引量:14
10
作者 Nan CHENG Jingchao HE +5 位作者 Zhisheng YIN Conghao ZHOU Huaqing WU Feng LYU Haibo ZHOU Xuemin SHEN 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2022年第9期1-18,共18页
As an indispensable component of the emerging 6G networks,Space-Air-Ground Inte-grated Networks(SAGINs)are envisioned to provide ubiquitous network connectivity and services by integrating satellite networks,aerial ne... As an indispensable component of the emerging 6G networks,Space-Air-Ground Inte-grated Networks(SAGINs)are envisioned to provide ubiquitous network connectivity and services by integrating satellite networks,aerial networks,and terrestrial networks.In 6G SAGINs,a wide variety of network services with the features of diverse requirements,complex mobility,and multi-dimensional resources will pose great challenges to service provisioning,which urges the develop-ment of service-oriented SAGINs.In this paper,we conduct a comprehensive review of 6G SAGINs from a new perspective of service-oriented network.First,we present the requirements of service-oriented networks,and then propose a service-oriented SAGINs management architec-ture.Two categories of critical technologies are presented and discussed,i.e.,heterogeneous resource orchestration technologies and the cloud-edge synergy technologies,which facilitate the interoperability of different network segments and cooperatively orchestrate heterogeneous resources across different domains,according to the service features and requirements.In addition,the potential future research directions are also presented and discussed. 展开更多
关键词 Mobile Edge Computing(MEC) network Function Virtual-ization(NFV) network slicing Service-oriented network Software Defined network-ing(SDN) Space-Air-Ground Inte-grated networks(SAGINs)
原文传递
Downlink Resource Allocation for NOMA-Based Hybrid Spectrum Access in Cognitive Network 被引量:5
11
作者 Yong Zhang Zhenjie Cheng +3 位作者 Da Guo Siyu Yuan Tengteng Ma Zhenyu Zhang 《China Communications》 SCIE CSCD 2023年第9期171-184,共14页
To solve the contradiction between limited spectrum resources and increasing communication demand,this paper proposes a wireless resource allocation scheme based on the Deep Q Network(DQN)to allocate radio resources i... To solve the contradiction between limited spectrum resources and increasing communication demand,this paper proposes a wireless resource allocation scheme based on the Deep Q Network(DQN)to allocate radio resources in a downlink multi-user cognitive radio(CR)network with slicing.Secondary users(SUs)are multiplexed using non-orthogonal multiple access(NOMA).The SUs use the hybrid spectrum access mode to improve the spectral efficiency(SE).Considering the demand for multiple services,the enhanced mobile broadband(eMBB)slice and ultrareliable low-latency communication(URLLC)slice were established.The proposed scheme can maximize the SE while ensuring Quality of Service(QoS)for the users.This study established a mapping relationship between resource allocation and the DQN algorithm in the CR-NOMA network.According to the signal-to-interference-plusnoise ratio(SINR)of the primary users(PUs),the proposed scheme can output the optimal channel selection and power allocation.The simulation results reveal that the proposed scheme can converge faster and obtain higher rewards compared with the Q-Learning scheme.Additionally,the proposed scheme has better SE than both the overlay and underlay only modes. 展开更多
关键词 cognitive network network slicing non-orthogonal multiple access hybrid spectrum access resource allocation deep reinforcement learning
在线阅读 下载PDF
Flex Ethernet Technology and Application in 5G Mobile Transport Network 被引量:3
12
作者 Meng Zhang 《China Communications》 SCIE CSCD 2021年第2期250-258,共9页
With the advent of 5G era,the rise of cloud services,virtual reality/virtual reality(AR/VR),vehicle networking and other technologies has put forward new requirements for the bandwidth and delay of the bearer network.... With the advent of 5G era,the rise of cloud services,virtual reality/virtual reality(AR/VR),vehicle networking and other technologies has put forward new requirements for the bandwidth and delay of the bearer network.Traditional Ethernet technology cannot meet the new requirements very well.Flex Ethernet(FlexE)technology has emerged as the times require.This paper introduces the background,standardization process,functional principle,application mode and technical advantages of FlexE technology,and finally analyses its application prospects and shortcomings in 5G mobile transport network. 展开更多
关键词 Flex Ethernet(FlexE) 5G mobile transport network network slicing
在线阅读 下载PDF
Enabling IoT Network Slicing with Network Function Virtualization 被引量:2
13
作者 Ting-An Tsai Fuchun Joseph Lin 《Advances in Internet of Things》 2020年第3期17-35,共19页
Numerous Internet of Things (IoT) devices are being connected to the net-works to offer services. To cope with a large diversity and number of IoT ser-vices, operators must meet those needs with a more flexible and ef... Numerous Internet of Things (IoT) devices are being connected to the net-works to offer services. To cope with a large diversity and number of IoT ser-vices, operators must meet those needs with a more flexible and efficient net-work architecture. Network slicing in 5G promises a feasible solution for this issue with network virtualization and programmability enabled by NFV (Net-work Functions Virtualization). In this research, we use virtualized IoT plat-forms as the Virtual Network Functions (VNFs) and customize network slices enabled by NFV with different QoS to support various kinds of IoT services for their best performance. We construct three different slicing systems including: 1) a single slice system, 2) a multiple customized slices system and 3) a single but scalable network slice system to support IoT services. Our objective is to compare and evaluate these three systems in terms of their throughput, aver-age response time and CPU utilization in order to identify the best system de-sign. Validated with our experiments, the performance of the multiple slicing system is better than those of the single slice systems whether it is equipped with scalability or not. 展开更多
关键词 NFV NFV MANO network Slicing SCALABILITY IOT OPENSTACK Kubernetes
在线阅读 下载PDF
Efficient Network Slicing with Dynamic Resource Allocation 被引量:1
14
作者 JI Hong ZHANG Tianxiang +2 位作者 ZHANG Kai WANG Wanyuan WU Weiwei 《ZTE Communications》 2021年第1期11-19,共9页
With the rapid development of wireless network technologies and the growing de⁃mand for a high quality of service(QoS),the effective management of network resources has attracted a lot of attention.For example,in a pr... With the rapid development of wireless network technologies and the growing de⁃mand for a high quality of service(QoS),the effective management of network resources has attracted a lot of attention.For example,in a practical scenario,when a network shock oc⁃curs,a batch of affected flows needs to be rerouted to respond to the network shock to bring the entire network deployment back to the optimal state,and in the process of rerouting a batch of flows,the entire response time needs to be as short as possible.Specifically,we re⁃duce the time consumed for routing by slicing,but the routing success rate after slicing is re⁃duced compared with the unsliced case.In this context,we propose a two-stage dynamic net⁃work resource allocation framework that first makes decisions on the slices to which flows are assigned,and coordinates resources among slices to ensure a comparable routing suc⁃cess rate as in the unsliced case,while taking advantage of the time efficiency gains from slicing. 展开更多
关键词 network slicing dynamic resource allocation reinforcement learning
在线阅读 下载PDF
Satellite E2E Network Slicing Based on 5G Technology 被引量:1
15
作者 ZHANG Jing WEI Xiao +1 位作者 CHENG Junfeng FENG Xu 《ZTE Communications》 2020年第4期26-33,共8页
We investigate the design of satellite network slicing for the first time to provide customized services for the diversified applications,and propose a novel scheme for satellite end-to-end(E2E) network slicing based ... We investigate the design of satellite network slicing for the first time to provide customized services for the diversified applications,and propose a novel scheme for satellite end-to-end(E2E) network slicing based on 5G technology,which provides a view of common satellite network slicing and supports flexible network deployment between the satellite and the ground.Specifically,considering the limited satellite network resource and the characteristics of the satellite channel,we propose a novel satellite E2E network slicing architecture.Therein,the deployment of the network functions between the satellite and the ground is coordinately considered.Subsequently,the classification and the isolation technologies of satellite network sub-slices are proposed adaptively based on 5G technology to support resource allocation on demand.Then,we develop the management technologies for the satellite E2E network slicing including slicing key performance indicator(KPI) design,slicing deployment,and slicing management.Finally,the analysis of the challenges and future work shows the potential research in the future. 展开更多
关键词 satellite communications E2E network slicing diversified applications 5G technology
在线阅读 下载PDF
Resource Allocation for Cognitive Network Slicing in PD-SCMA System Based on Two-Way Deep Reinforcement Learning
16
作者 Zhang Zhenyu Zhang Yong +1 位作者 Yuan Siyu Cheng Zhenjie 《China Communications》 SCIE CSCD 2024年第6期53-68,共16页
In this paper,we propose the Two-way Deep Reinforcement Learning(DRL)-Based resource allocation algorithm,which solves the problem of resource allocation in the cognitive downlink network based on the underlay mode.Se... In this paper,we propose the Two-way Deep Reinforcement Learning(DRL)-Based resource allocation algorithm,which solves the problem of resource allocation in the cognitive downlink network based on the underlay mode.Secondary users(SUs)in the cognitive network are multiplexed by a new Power Domain Sparse Code Multiple Access(PD-SCMA)scheme,and the physical resources of the cognitive base station are virtualized into two types of slices:enhanced mobile broadband(eMBB)slice and ultrareliable low latency communication(URLLC)slice.We design the Double Deep Q Network(DDQN)network output the optimal codebook assignment scheme and simultaneously use the Deep Deterministic Policy Gradient(DDPG)network output the optimal power allocation scheme.The objective is to jointly optimize the spectral efficiency of the system and the Quality of Service(QoS)of SUs.Simulation results show that the proposed algorithm outperforms the CNDDQN algorithm and modified JEERA algorithm in terms of spectral efficiency and QoS satisfaction.Additionally,compared with the Power Domain Non-orthogonal Multiple Access(PD-NOMA)slices and the Sparse Code Multiple Access(SCMA)slices,the PD-SCMA slices can dramatically enhance spectral efficiency and increase the number of accessible users. 展开更多
关键词 cognitive radio deep reinforcement learning network slicing power-domain non-orthogonal multiple access resource allocation
在线阅读 下载PDF
Virtualization Technology in Cloud Computing Based Radio Access Networks:A Primer 被引量:2
17
作者 ZHANG Xian PENG Mugen 《ZTE Communications》 2017年第4期47-66,共20页
Since virtualization technology enables the abstraction and sharing of resources in a flexible management way, the overall expenses of network deployment can be significantly reduced. Therefore, the technology has bee... Since virtualization technology enables the abstraction and sharing of resources in a flexible management way, the overall expenses of network deployment can be significantly reduced. Therefore, the technology has been widely applied in the core network. With the tremendous growth in mobile traffic and services, it is natural to extend virtualization technology to the cloud computing based radio access networks(CCRANs) for achieving high spectral efficiency with low cost.In this paper, the virtualization technologies in CC-RANs are surveyed, including the system architecture, key enabling techniques, challenges, and open issues. The enabling key technologies for virtualization in CC-RANs mainly including virtual resource allocation, radio access network(RAN) slicing, mobility management, and social-awareness have been comprehensively surveyed to satisfy the isolation, customization and high-efficiency utilization of radio resources. The challenges and open issues mainly focus on virtualization levels for CC-RANs, signaling design for CC-RAN virtualization, performance analysis for CC-RAN virtualization, and network security for virtualized CC-RANs. 展开更多
关键词 network VIRTUALIZATION CC-RAN RAN SLICING FOG computing
在线阅读 下载PDF
Strengthening network slicing for Industrial Internet with deep reinforcement learning
18
作者 Yawen Tan Jiadai Wang Jiajia Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第4期863-872,共10页
Industrial Internet combines the industrial system with Internet connectivity to build a new manufacturing and service system covering the entire industry chain and value chain.Its highly heterogeneous network structu... Industrial Internet combines the industrial system with Internet connectivity to build a new manufacturing and service system covering the entire industry chain and value chain.Its highly heterogeneous network structure and diversified application requirements call for the applying of network slicing technology.Guaranteeing robust network slicing is essential for Industrial Internet,but it faces the challenge of complex slice topologies caused by the intricate interaction relationships among Network Functions(NFs)composing the slice.Existing works have not concerned the strengthening problem of industrial network slicing regarding its complex network properties.Towards this end,we aim to study this issue by intelligently selecting a subset of most valuable NFs with the minimum cost to satisfy the strengthening requirements.State-of-the-art AlphaGo series of algorithms and the advanced graph neural network technology are combined to build the solution.Simulation results demonstrate the superior performance of our scheme compared to the benchmark schemes. 展开更多
关键词 Industrial Internet network slicing Deep reinforcement learning Graph neural network
在线阅读 下载PDF
基于多时间尺度协同的无蜂窝RAN切片资源分配算法 被引量:2
19
作者 夏玮玮 王博业 +5 位作者 夏雅星 缪巍巍 汪大洋 景栋盛 燕锋 沈连丰 《通信学报》 北大核心 2025年第7期60-77,共18页
针对6G无蜂窝无线接入网切片资源分配在业务动态变化时难以保障用户服务质量的问题,提出了一种基于多时间尺度协同优化的资源分配算法。首先,将大时间尺度的面向切片的资源配置问题构建为基于均方误差最小化且以用户平均时延为约束的资... 针对6G无蜂窝无线接入网切片资源分配在业务动态变化时难以保障用户服务质量的问题,提出了一种基于多时间尺度协同优化的资源分配算法。首先,将大时间尺度的面向切片的资源配置问题构建为基于均方误差最小化且以用户平均时延为约束的资源需求预测模型,并通过长短期记忆时序预测网络实现切片资源的精准配置。其次,将小时间尺度的面向用户的资源分配问题构建为最大化系统效用,同时保障用户传输速率服务质量指标的资源分配模型。最后,通过引入基于多智能体协作的近端策略优化算法进行资源的动态分配与实时调整。仿真结果表明,所提算法能够实现切片资源需求的准确预测,有效提高系统传输速率,降低用户平均时延和业务阻塞率。 展开更多
关键词 无蜂窝 网络切片 资源分配 多时间尺度 多智能体强化学习
在线阅读 下载PDF
基于差异性隔离和复用的网络切片无线资源分配方案 被引量:5
20
作者 孙君 霭振宇 《通信学报》 北大核心 2025年第3期109-121,共13页
为研究网络切片无线资源复用,同时考虑复用、隔离和优先级三者之间的权衡问题,提出了一种基于差异性隔离和复用的网络切片无线资源分配方案。在现有文献成果基础上,重新定义复用增益和隔离因子2个参数,以复用增益和隔离因子构建加权和函... 为研究网络切片无线资源复用,同时考虑复用、隔离和优先级三者之间的权衡问题,提出了一种基于差异性隔离和复用的网络切片无线资源分配方案。在现有文献成果基础上,重新定义复用增益和隔离因子2个参数,以复用增益和隔离因子构建加权和函数,并引入切片优先级。为求解优化问题设计了复用隔离优先级无线接入(MIPWA)算法,该算法基于改进的遗传算法(GA),引入矩阵编码、轮盘赌选择和最优保留方法来解决问题。结果表明,MIPWA算法使切片1、切片2和切片3的隔离性能分别提高了66.37%、52.73%和21.16%,复用增益仅损失了5.82%、3.86%和3.50%。与仅考虑隔离的算法相比,复用增益分别提高了65.35%、52.74%和22.81%,隔离增益仅损失了2.85%、3.85%和1.86%。以复用增益为例,3个切片下MIPWA算法的优化结果要比传统GA分别高出5.07%、1.81%和1.4%。 展开更多
关键词 网络切片 资源分配 无线资源隔离 无线资源复用 矩阵编码
在线阅读 下载PDF
上一页 1 2 46 下一页 到第
使用帮助 返回顶部