期刊文献+
共找到7,070篇文章
< 1 2 250 >
每页显示 20 50 100
Latency minimization for multiuser computation offloading in fog-radio access networks
1
作者 Wei Zhang Shafei Wang +3 位作者 Ye Pan Qiang Li Jingran Lin Xiaoxiao Wu 《Digital Communications and Networks》 2025年第1期160-171,共12页
Recently,the Fog-Radio Access Network(F-RAN)has gained considerable attention,because of its flexible architecture that allows rapid response to user requirements.In this paper,computational offloading in F-RAN is con... Recently,the Fog-Radio Access Network(F-RAN)has gained considerable attention,because of its flexible architecture that allows rapid response to user requirements.In this paper,computational offloading in F-RAN is considered,where multiple User Equipments(UEs)offload their computational tasks to the F-RAN through fog nodes.Each UE can select one of the fog nodes to offload its task,and each fog node may serve multiple UEs.The tasks are computed by the fog nodes or further offloaded to the cloud via a capacity-limited fronhaul link.In order to compute all UEs'tasks quickly,joint optimization of UE-Fog association,radio and computation resources of F-RAN is proposed to minimize the maximum latency of all UEs.This min-max problem is formulated as a Mixed Integer Nonlinear Program(MINP).To tackle it,first,MINP is reformulated as a continuous optimization problem,and then the Majorization Minimization(MM)method is used to find a solution.The MM approach that we develop is unconventional in that each MM subproblem is solved inexactly with the same provable convergence guarantee as the exact MM,thereby reducing the complexity of MM iteration.In addition,a cooperative offloading model is considered,where the fog nodes compress-and-forward their received signals to the cloud.Under this model,a similar min-max latency optimization problem is formulated and tackled by the inexact MM.Simulation results show that the proposed algorithms outperform some offloading strategies,and that the cooperative offloading can exploit transmission diversity better than noncooperative offloading to achieve better latency performance. 展开更多
关键词 Fog-radio access network Fog computing Majorization minimization WMMSE
在线阅读 下载PDF
6G smart fog radio access network: Architecture, key technologies, and research challenges
2
作者 Lincong Zhang Mingyang Zhang +1 位作者 Xiangyu Liu Lei Guo 《Digital Communications and Networks》 2025年第3期898-911,共14页
The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devic... The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devices.However,the performance of current 6G network intelligence technologies and its level of integration with the architecture,along with the system-level requirements for the number of access devices and limitations on energy consumption,have impeded further improvements in the 6G smart F-RAN.To better analyze the root causes of the network problems and promote the practical development of the network,this study used structured methods such as segmentation to conduct a review of the topic.The research results reveal that there are still many problems in the current 6G smart F-RAN.Future research directions and difficulties are also discussed. 展开更多
关键词 6G Smart technology Smart fog radio access network Artificial intelligence Non-orthogonal multiple access Reconfigurable intelligent surface
在线阅读 下载PDF
Institution Attribute Mining Technology for Access Control Based on Hybrid Capsule Network
3
作者 Aodi Liu Xuehui Du +1 位作者 Na Wang Xiangyu Wu 《Computers, Materials & Continua》 2025年第4期1495-1513,共19页
Security attributes are the premise and foundation for implementing Attribute-Based Access Control(ABAC)mechanisms.However,when dealing with massive volumes of unstructured text big data resources,the current attribut... Security attributes are the premise and foundation for implementing Attribute-Based Access Control(ABAC)mechanisms.However,when dealing with massive volumes of unstructured text big data resources,the current attribute management methods based on manual extraction face several issues,such as high costs for attribute extraction,long processing times,unstable accuracy,and poor scalability.To address these problems,this paper proposes an attribute mining technology for access control institutions based on hybrid capsule networks.This technology leverages transfer learning ideas,utilizing Bidirectional Encoder Representations from Transformers(BERT)pre-trained language models to achieve vectorization of unstructured text data resources.Furthermore,we have designed a novel end-to-end parallel hybrid network structure,where the parallel networks handle global and local information features of the text that they excel at,respectively.By employing techniques such as attention mechanisms,capsule networks,and dynamic routing,effective mining of security attributes for access control resources has been achieved.Finally,we evaluated the performance level of the proposed attribute mining method for access control institutions through experiments on the medical referral text resource dataset.The experimental results show that,compared with baseline algorithms,our method adopts a parallel network structure that can better balance global and local feature information,resulting in improved overall performance.Specifically,it achieves a comprehensive performance enhancement of 2.06%to 8.18%in the F1 score metric.Therefore,this technology can effectively provide attribute support for access control of unstructured text big data resources. 展开更多
关键词 access control ABAC model attribute mining capsule network deep learning
在线阅读 下载PDF
Computation and wireless resource management in 6G space-integrated-ground access networks
4
作者 Ning Hui Qian Sun +2 位作者 Lin Tian Yuanyuan Wang Yiqing Zhou 《Digital Communications and Networks》 2025年第3期768-777,共10页
In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this neces... In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this necessitates effective management of computation and wireless resources tailored to the requirements of various services.The heterogeneity of computation resources and interference among shared wireless resources pose significant coordination and management challenges.To solve these problems,this work provides an overview of multi-dimensional resource management in 6G SIG RAN,including computation and wireless resource.Firstly it provides with a review of current investigations on computation and wireless resource management and an analysis of existing deficiencies and challenges.Then focusing on the provided challenges,the work proposes an MEC-based computation resource management scheme and a mixed numerology-based wireless resource management scheme.Furthermore,it outlines promising future technologies,including joint model-driven and data-driven resource management technology,and blockchain-based resource management technology within the 6G SIG network.The work also highlights remaining challenges,such as reducing communication costs associated with unstable ground-to-satellite links and overcoming barriers posed by spectrum isolation.Overall,this comprehensive approach aims to pave the way for efficient and effective resource management in future 6G networks. 展开更多
关键词 Space-integrated-ground Radio access network MEC-based computation resource management Mixed numerology-based wireless resource management
在线阅读 下载PDF
A Successful Transmission Probability Based AP Clustering Scheme in User-Centric Cell-Free Networks 被引量:2
5
作者 Xiaokang Zhou Huiyun Xia Shaochuan Wu 《China Communications》 SCIE CSCD 2022年第12期118-128,共11页
Cell-free network is a promising architecture with numerous merits in energy efficiency and macro diversity,which is easy and flexible to integrate with other communication technologies.However,its current network top... Cell-free network is a promising architecture with numerous merits in energy efficiency and macro diversity,which is easy and flexible to integrate with other communication technologies.However,its current network topology where access points(APs)are connected to a central processing unit(CPU)to jointly serve the users,causes huge burden to the fronthaul network.To deal with this problem,in this paper,we first combine thoughts in user-centric(UC)network where users are served by selected subset of APs.Then,we propose a successful transmission probability(STP)based AP clustering scheme to reduce the fronthaul capacity requirement(FCR).By using stochastic geometry and proper approximation methods,the approximated STP calculation expression is derived.Numerical simulations demonstrate that the obtained STP expression can provide a tight approximation compared to Monte Carlo simulation results under different system parameters while keeping the computation tractable.Furthermore,the relationship between the FCR and the STP threshold is formulated as a clustering optimization problem,which gives insights on clustering design in UC-CF network systems.We show by simulation results that the proposed scheme requires less fronthaul capacity than the original CF approach while ensuring the STP performance. 展开更多
关键词 cell-free network user-centric network AP clustering
在线阅读 下载PDF
Deep Learning Social Network Access Control Model Based on User Preferences
6
作者 Fangfang Shan Fuyang Li +3 位作者 Zhenyu Wang Peiyu Ji Mengyi Wang Huifang Sun 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1029-1044,共16页
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw... A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model. 展开更多
关键词 Graph neural networks user preferences access control social network
在线阅读 下载PDF
Downlink network-coded multiple access with diverse power
7
作者 Bohao Cao Zheng Xiang +2 位作者 Peng Ren Qiao Li Baoyi Xu 《Digital Communications and Networks》 SCIE CSCD 2024年第4期956-964,共9页
Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have differen... Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have different Quality of Service(QoS)requirements.Hence,we study the power allocation in the downlink NCMA system in this paper,and propose a downlink Network-Coded Multiple Access with Diverse Power(NCMA-DP),wherein different amounts of power are allocated to different users.In terms of the Bit Error Rate(BER)of the multi-user decoder,and the number of packets required to correctly decode the message,the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA(NCMA-C).Meanwhile,the performance of the user with less allocated power is still much better than NCMA-C.Furthermore,the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C.The simulation results demonstrate the remarkable performance of the proposed NCMA-DP. 展开更多
关键词 network-coded multiple access Physical-layer network coding Multi-user decoder Power allocation Throughput Downlink network
在线阅读 下载PDF
Scenario Modeling-Aided AP Placement Optimization Method for Indoor Localization and Network Access
8
作者 Pan Hao Chen Yu +1 位作者 Qi Xiaogang Liu Meili 《China Communications》 SCIE CSCD 2024年第3期37-50,共14页
Owing to the ubiquity of wireless networks and the popularity of WiFi infrastructures,received signal strength(RSS)-based indoor localization systems have received much attention.The placement of access points(APs)sig... Owing to the ubiquity of wireless networks and the popularity of WiFi infrastructures,received signal strength(RSS)-based indoor localization systems have received much attention.The placement of access points(APs)significantly influences localization accuracy and network access.However,the indoor scenario and network access are not fully considered in previous AP placement optimization methods.This study proposes a practical scenario modelingaided AP placement optimization method for improving localization accuracy and network access.In order to reduce the gap between simulation-based and field measurement-based AP placement optimization methods,we introduce an indoor scenario modeling and Gaussian process-based RSS prediction method.After that,the localization and network access metrics are implemented in the multiple objective particle swarm optimization(MOPSO)solution,Pareto front criterion and virtual repulsion force are applied to determine the optimal AP placement.Finally,field experiments demonstrate the effectiveness of the proposed indoor scenario modeling method and RSS prediction model.A thorough comparison confirms the localization and network access improvement attributed to the proposed anchor placement method. 展开更多
关键词 indoor localization MOPSO network access RSS prediction
在线阅读 下载PDF
Load Statistics Priority Random Access Technology Based on Air-Space-Ground Integrated Network
9
作者 Enze Li Hao Huan +1 位作者 Jingyu Wang Kunshan Yang 《Journal of Beijing Institute of Technology》 EI CAS 2024年第6期493-506,共14页
In today's world where everything is interconnected, air-space-ground integrated networks have become a current research hotspot due to their characteristics of high, long and wide area coverage. Given the constan... In today's world where everything is interconnected, air-space-ground integrated networks have become a current research hotspot due to their characteristics of high, long and wide area coverage. Given the constantly changing and dynamic characteristics of air and space networks, along with the sheer number and complexity of access nodes involved, the process of rapid networking presents substantial challenges. In order to achieve rapid and dynamic networking of air-space-ground integrated networks, this paper focuses on the study of methods for large-scale nodes to randomly access satellites. This paper utilizes a cross-layer design methodology to enhance the access success probability by jointly optimizing the physical layer and medium access control(MAC) layer aspects. Load statistics priority random access(LSPRA) technology is proposed.Experiments show that when the number of nodes is greater than 1 000, this method can also ensure stable access performance, providing ideas for the design of air-space-ground integrated network access systems. 展开更多
关键词 air-space-ground integrated network random access satellite-to-ground statistics priority access success probability
在线阅读 下载PDF
Ultra-Dense LEO Satellite-Aircraft Access and Service Management in Civil Aviation 被引量:1
10
作者 Wang Yilei Ma Ting +3 位作者 Liu Xiaoyu Gao Zhuxuan Zhou Haibo Shen Xuemin 《China Communications》 2025年第1期277-292,共16页
With the deployment of ultra-dense low earth orbit(LEO)satellite constellations,LEO satellite access network(LEO-SAN)is envisioned to achieve global Internet coverage.Meanwhile,the civil aviation communications have i... With the deployment of ultra-dense low earth orbit(LEO)satellite constellations,LEO satellite access network(LEO-SAN)is envisioned to achieve global Internet coverage.Meanwhile,the civil aviation communications have increased dramatically,especially for providing airborne Internet services.However,due to dynamic service demands and onboard LEO resources over time and space,it poses huge challenges in satellite-aircraft access and service management in ultra-dense LEO satellite networks(UDLSN).In this paper,we propose a deep reinforcement learning-based approach for ultra-dense LEO satellite-aircraft access and service management.Firstly,we develop an airborne Internet architecture based on UDLSN and design a management mechanism including medium earth orbit satellites to guarantee lightweight management.Secondly,considering latency-sensitive and latency-tolerant services,we formulate the problem of satellite-aircraft access and service management for civil aviation to ensure service continuity.Finally,we propose a proximal policy optimization-based access and service management algorithm to solve the formulated problem.Simulation results demonstrate the convergence and effectiveness of the proposed algorithm with satisfying the service continuity when applying to the UDLSN. 展开更多
关键词 civil aviation deep reinforcement learning satellite-aircraft access service management ultra-dense LEO satellite network
在线阅读 下载PDF
Performance Analysis in Cloud Radio Access Networks:User-Centralized Coordination Approach
11
作者 Munzali Ahmed Abana SUN Yaohua +2 位作者 Manzoor Ahmed Lukman A.Olawoyin LI Yong 《China Communications》 SCIE CSCD 2015年第11期12-23,共12页
The cloud radio access network(C-RAN) has recently been proposed as an important component of the next generation wireless networks providing opportunities for improving both spectral and energy effi ciencies. The per... The cloud radio access network(C-RAN) has recently been proposed as an important component of the next generation wireless networks providing opportunities for improving both spectral and energy effi ciencies. The performance of this network structure is however constrained by severe inter-cell interference due to the limited capacity of fronthaul between the radio remote heads(RRH) and the base band unit(BBU) pool. To achieve performance improvement taking full advantage of centralized processing capabilities of C-RANs,a set of RRHs can jointly transmit data to the same UE for improved spectral effi ciency. In this paper,a user centralized joint coordinated transmission(UC-JCT) scheme is put forth to investigate the downlink performance of C-RANs. The most important benefit the proposed strategy is the ability to translate what would have been the most dominant interfering sources to usable signal leading to a signifi cantly improved performance. Stochastic geometry is utilized to model the randomness of RRH location and provides a reliable performance analysis. We derive an analytical expression for the closed integral form of the coverage probability of a typical UE. Simulation results confirm the accuracy of our analysis and demonstrate that significant performance gain can be achieved from the proposed coordination schemes. 展开更多
关键词 CLOUD radio access network POISSON point process COVERAGE probability joint COORDINATED transmission BASEBAND unit
在线阅读 下载PDF
Modeling and Comprehensive Review of Signaling Storms in 3GPP-Based Mobile Broadband Networks:Causes,Solutions,and Countermeasures
12
作者 Muhammad Qasim Khan Fazal Malik +1 位作者 Fahad Alturise Noor Rahman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期123-153,共31页
Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important a... Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject. 展开更多
关键词 Signaling storm problems control signaling load analytical modeling 3GPP networks smart devices diameter signaling mobile broadband data access data traffic mobility management signaling network architecture 5G mobile communication
在线阅读 下载PDF
A Proactive Selection Method for Dynamic Access Points Grouping in User-centric UDN
13
作者 Bo Hu Fangxia Zuo +1 位作者 Chuan’anWang Shanzhi Chen 《China Communications》 SCIE CSCD 2021年第4期153-165,共13页
Network densification is a promising solution to fulfill network capacity requirement and transmission rate for beyond 5G and 6G wireless communications.Ultra-dense network(UDN)integrates heterogeneous network resourc... Network densification is a promising solution to fulfill network capacity requirement and transmission rate for beyond 5G and 6G wireless communications.Ultra-dense network(UDN)integrates heterogeneous network resources and coordinates technologies on quality of service controlling,to provide users with flexible service.However,dense deployment reduces coverage radius of the cell,resulting in an increase on handover frequency,which makes a serious impact on service continuity.In this paper,we propose a proactive selection method for dynamic access points grouping(DAPGing)in accordance with“user-centric”philosophy,which selects target Access Points(AP)and reduces handover times to ensure communication continuity.This method includes two criteria:1)the user’s sojourn time,which is determined by analyzing the AP coverage area;2)neighbor relationship between APs,which is determined by coverage area and signal strength characteristics between neighboring APs.Therefore,candidate APs become the proactive selected ones to update the AP group.Stochastic geometry is used to build system model and performance metrics are analyzed,including AP group coverage probability and average update frequency.Experimental analysis shows that the proposed proactive selection method brings similar coverage probability to traditional handover method,while average update frequency is reduced more than 20%selection criteria. 展开更多
关键词 proactive selection user-centric ultradense network stochastic geometry model
在线阅读 下载PDF
Model and service for privacy in decentralized online social networks
14
作者 George Pacheco Pinto JoséRonaldo Leles Jr +3 位作者 Cíntia da Costa Souza Paulo Rde Souza Frederico Araújo Durão Cássio Prazeres 《Journal of Electronic Science and Technology》 2025年第1期76-97,共22页
Intensely using online social networks(OSNs)makes users concerned about privacy of data.Given the centralized nature of these platforms,and since each platform has a particular storage mechanism,authentication,and acc... Intensely using online social networks(OSNs)makes users concerned about privacy of data.Given the centralized nature of these platforms,and since each platform has a particular storage mechanism,authentication,and access control,their users do not have the control and the right over their data.Therefore,users cannot easily switch between similar platforms or transfer data from one platform to another.These issues imply,among other things,a threat to privacy since such users depend on the interests of the service provider responsible for administering OSNs.As a strategy for the decentralization of the OSNs and,consequently,as a solution to the privacy problems in these environments,the so-called decentralized online social networks(DOSNs)have emerged.Unlike OSNs,DOSNs are decentralized content management platforms because they do not use centralized service providers.Although DOSNs address some of the privacy issues encountered in OSNs,DOSNs also pose significant challenges to consider,for example,access control to user profile information with high granularity.This work proposes developing an ontological model and a service to support privacy in DOSNs.The model describes the main concepts of privacy access control in DOSNs and their relationships.In addition,the service will consume the model to apply access control according to the policies represented in the model.Our model was evaluated in two phases to verify its compliance with the proposed domain.Finally,we evaluated our service with a performance evaluation,and the results were satisfactory concerning the response time of access control requests. 展开更多
关键词 access control Decentralized online social network ONTOLOGY PRIVACY
在线阅读 下载PDF
A Dynamic Self Organizing TDMA MAC for Long-Range Ad Hoc Networks
15
作者 Ding Lianghui Sheng Wenfeng +2 位作者 Tian Feng Sun Baichang Yang Feng 《China Communications》 2025年第9期212-225,共14页
Research on wide area ad hoc networks is of great significance due to its application prospect in long-range networks such as aeronautical and maritime networks,etc.The design of MAC protocols is one of the most impor... Research on wide area ad hoc networks is of great significance due to its application prospect in long-range networks such as aeronautical and maritime networks,etc.The design of MAC protocols is one of the most important parts impacting the whole network performance.In this paper,we propose a dis-tributed TDMA-based MAC protocol called Dynamic Self Organizing TDMA(DSO-TDMA)for wide area ad hoc networks.DSO-TDMA includes three main features:(1)In a distributed way,nodes in the network select transmitting slots according to the congestion situation of the local air interface.(2)In a selforganization way,nodes dynamically adjust the resource occupancy ratio according to the queue length of neighbouring nodes within two-hop range.(3)In a piggyback way,the control information is transmitted together with the payload to reduce the overhead.We design the whole mechanisms,implement them in NS-3 and evaluate the performance of DSO-TDMA compared with another dynamic TDMA MAC protocol,EHR-TDMA.Results show that the end-to-end throughput of DSO-TDMA is at most 51.4%higher than that of EHR-TDMA,and the average access delay of DSO-TDMA is at most 66.05%lower than that of EHR-TDMA. 展开更多
关键词 dynamic TDMA media access control wide area broadband ad hoc networks
在线阅读 下载PDF
Multi-Band Integrated Networking for Efficient Spectrum Utilization in 6G
16
作者 Wang Ailing Kong Lei +4 位作者 Liu Jianjun Xia Liang Wang Xiaoqian Wang Qixing Liu Guangyi 《China Communications》 2025年第4期42-54,共13页
The sixth-generation(6G)networks will consist of multiple bands such as low-frequency,midfrequency,millimeter wave,terahertz and other bands to meet various business requirements and networking scenarios.The dynamic c... The sixth-generation(6G)networks will consist of multiple bands such as low-frequency,midfrequency,millimeter wave,terahertz and other bands to meet various business requirements and networking scenarios.The dynamic complementarity of multiple bands are crucial for enhancing the spectrum efficiency,reducing network energy consumption,and ensuring a consistent user experience.This paper investigates the present researches and challenges associated with deployment of multi-band integrated networks in existing infrastructures.Then,an evolutionary path for integrated networking is proposed with the consideration of maturity of emerging technologies and practical network deployment.The proposed design principles for 6G multi-band integrated networking aim to achieve on-demand networking objectives,while the architecture supports full spectrum access and collaboration between high and low frequencies.In addition,the potential key air interface technologies and intelligent technologies for integrated networking are comprehensively discussed.It will be a crucial basis for the subsequent standards promotion of 6G multi-band integrated networking technology. 展开更多
关键词 full spectrum access high and low frequency collaboration multi-band integrated networking 6G spectrum efficiency
在线阅读 下载PDF
System Modeling and Deep Learning-Based Security Analysis of Uplink NOMA Relay Networks with IRS and Fountain Codes
17
作者 Phu Tran Tin Minh-Sang Van Nguyen +2 位作者 Quy-Anh Bui Agbotiname Lucky Imoize Byung-Seo Kim 《Computer Modeling in Engineering & Sciences》 2025年第8期2521-2543,共23页
Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and ... Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions. 展开更多
关键词 Copyright management deep neural network fountain codes intelligent reflecting surface non-orthogonal multiple access physical layer security UPLINK
在线阅读 下载PDF
MATD3-Based End-Edge Collaborative Resource Optimization for NOMA-Assisted Industrial Wireless Networks
18
作者 Ru Hao Chi Xu Jing Liu 《Computers, Materials & Continua》 2025年第2期3203-3222,共20页
Non-orthogonal multiple access (NOMA) technology has recently been widely integrated into multi-access edge computing (MEC) to support task offloading in industrial wireless networks (IWNs) with limited radio resource... Non-orthogonal multiple access (NOMA) technology has recently been widely integrated into multi-access edge computing (MEC) to support task offloading in industrial wireless networks (IWNs) with limited radio resources. This paper minimizes the system overhead regarding task processing delay and energy consumption for the IWN with hybrid NOMA and orthogonal multiple access (OMA) schemes. Specifically, we formulate the system overhead minimization (SOM) problem by considering the limited computation and communication resources and NOMA efficiency. To solve the complex mixed-integer nonconvex problem, we combine the multi-agent twin delayed deep deterministic policy gradient (MATD3) and convex optimization, namely MATD3-CO, for iterative optimization. Specifically, we first decouple SOM into two sub-problems, i.e., joint sub-channel allocation and task offloading sub-problem, and computation resource allocation sub-problem. Then, we propose MATD3 to optimize the sub-channel allocation and task offloading ratio, and employ the convex optimization to allocate the computation resource with a closed-form expression derived by the Karush-Kuhn-Tucker (KKT) conditions. The solution is obtained by iteratively solving these two sub-problems. The experimental results indicate that the MATD3-CO scheme, when compared to the benchmark schemes, significantly decreases system overhead with respect to both delay and energy consumption. 展开更多
关键词 Industrial wireless networks(IWNs) multi-access edge computing(MEC) non-orthogonal multiple access(NOMA) task offloading resource allocation
在线阅读 下载PDF
Dynamic Task Offloading and Resource Allocation for Air-Ground Integrated Networks Based on MADDPG
19
作者 Jianbin Xue Peipei Mao +2 位作者 Luyao Wang Qingda Yu Changwang Fan 《Journal of Beijing Institute of Technology》 2025年第3期243-267,共25页
With the rapid growth of connected devices,traditional edge-cloud systems are under overload pressure.Using mobile edge computing(MEC)to assist unmanned aerial vehicles(UAVs)as low altitude platform stations(LAPS)for ... With the rapid growth of connected devices,traditional edge-cloud systems are under overload pressure.Using mobile edge computing(MEC)to assist unmanned aerial vehicles(UAVs)as low altitude platform stations(LAPS)for communication and computation to build air-ground integrated networks(AGINs)offers a promising solution for seamless network coverage of remote internet of things(IoT)devices in the future.To address the performance demands of future mobile devices(MDs),we proposed an MEC-assisted AGIN system.The goal is to minimize the long-term computational overhead of MDs by jointly optimizing transmission power,flight trajecto-ries,resource allocation,and offloading ratios,while utilizing non-orthogonal multiple access(NOMA)to improve device connectivity of large-scale MDs and spectral efficiency.We first designed an adaptive clustering scheme based on K-Means to cluster MDs and established commu-nication links,improving efficiency and load balancing.Then,considering system dynamics,we introduced a partial computation offloading algorithm based on multi-agent deep deterministic pol-icy gradient(MADDPG),modeling the multi-UAV computation offloading problem as a Markov decision process(MDP).This algorithm optimizes resource allocation through centralized training and distributed execution,reducing computational overhead.Simulation results show that the pro-posed algorithm not only converges stably but also outperforms other benchmark algorithms in han-dling complex scenarios with multiple devices. 展开更多
关键词 air-ground integrated network(AGIN) resource allocation dynamic task offloading multi-agent deep deterministic policy gradient(MADDPG) non-orthogonal multiple access(NOMA)
暂未订购
0.6μm CMOS Laser Diode Driver for Optical Access Networks
20
作者 梁帮立 王志功 +3 位作者 田俊 夏春晓 章丽 熊明珍 《Journal of Semiconductors》 EI CAS CSCD 北大核心 2003年第10期1021-1024,共4页
Using native CMOS technology,EDA tool,and adopting full-custom design methodology,a laser diode driver for the use of STM-1 and STM-4 optical access network,is realized by CSMC-HJ 0.6μm CMOS technology to modulate la... Using native CMOS technology,EDA tool,and adopting full-custom design methodology,a laser diode driver for the use of STM-1 and STM-4 optical access network,is realized by CSMC-HJ 0.6μm CMOS technology to modulate laser diodes at 155Mb/s (STM-1),622Mb/s (STM-4) with adjustable modulation current from 0 to 50mA for an equivalent 50Ω load.The maximum modulation voltage is over 2.5V pp corresponding to a 3V DC bias for output stage.The time range of rise and fall from 360ps to 471ps is measured from the output voltage pulse.The RMS jitter is no more than 30ps for four bit rates.The power consumption is less than 410mW under a power supply voltage of 5V.According to the experimental results,the laser diode driver achieves the same level as their counterparts worldwide. 展开更多
关键词 laser diode driver CMOS optical access networks
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部