期刊文献+
共找到32,841篇文章
< 1 2 250 >
每页显示 20 50 100
Fair rate control for wireless ad-hoc networks with time varying channel capacities
1
作者 Meiqin TANG Kai MA Xinping GUAN 《控制理论与应用(英文版)》 EI 2010年第1期69-74,共6页
We consider the problem of fair rate control for wireless ad-hoc networks with time varying channel capacities. The interaction between links in wireless ad-hoc networks introduces additional constraints on the flow r... We consider the problem of fair rate control for wireless ad-hoc networks with time varying channel capacities. The interaction between links in wireless ad-hoc networks introduces additional constraints on the flow rate. A primal-dual algorithm that guarantees fair rate control is proved to be trajectory stable. Various fairness indexes are obtained by choosing the specified form of the utility functions, and the numerical results validate the effectiveness of the proposed algorithm. 展开更多
关键词 wireless ad-hoc networks Rate control Trajectory stability FAIRNESS
在线阅读 下载PDF
Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite 被引量:1
2
作者 Sadan Cambazoglu Arif Sari 《International Journal of Communications, Network and System Sciences》 2015年第13期533-542,共10页
Jamming attack is quite serious threat for Mobile networks that collapses all necessary communication infrastructure. Since mobile nodes in Mobile Ad Hoc Networks (MANET) communicate in a multi-hop mode, there is alwa... Jamming attack is quite serious threat for Mobile networks that collapses all necessary communication infrastructure. Since mobile nodes in Mobile Ad Hoc Networks (MANET) communicate in a multi-hop mode, there is always a possibility for an intruder to launch a jamming attack in order to intercept communication among communication nodes. In this study, a network simulation has been carried out in order to explore and evaluate the possible impacts of jamming attack on MACAW protocol. Ad-hoc network modelling is used to provide communication infrastructure among mobile nodes in order to modelling the simulation scenarios. In simulation model, these nodes have used AODV routing protocol which is designed for MANET while second scenario contains simulated MACAW node models for comparison. On the other hand, this paper is the first study that addresses performance evaluation of MACAW protocol under a constant Jamming Attack. The performance of MACAW protocol is simulated through OPNET Modeler 14.5 software. 展开更多
关键词 OPNET Simulation MACAW Mobile ad-hoc networks COLLISION Jamming AODV
在线阅读 下载PDF
Throughput Maximizing Frequency and Power Scheduling for Wireless Ad-Hoc Networks in the Low-SINR Regime
3
作者 Nahid Saberi 《Wireless Engineering and Technology》 2012年第3期106-112,共7页
We study the problem of frequency and power allocation and scheduling at a time-slotted cognitive ad-hoc wireless network, where cognitive nodes share a number of frequency bands and frequency reuse is allowed. In suc... We study the problem of frequency and power allocation and scheduling at a time-slotted cognitive ad-hoc wireless network, where cognitive nodes share a number of frequency bands and frequency reuse is allowed. In such a network the throughput maximization problem generally results in a mixed zero-one nonlinear non-convex problem. Interestingly, in the low-SINR regime, the power allocation policy that maximizes the total throughput follows an “on/off” strategy with maximum power usage in the “on” state. In this paper we show that the on/off strategy in the low-SINR regime is also optimal with respect to throughput when scheduling users over time and frequency subject to minimum SINR requirements. We show that these additional constraints will not change the optimum strategy, but may affect the set of “on” or “off” transmitters. Also we present an approach that transforms the mixed zero-one nonlinear problem to an equivalent mixed zero-one linear problem at the expense of extra variables. 展开更多
关键词 ad-hoc networkS Cognitive networkS Optimization Mixed Zero-One Linear PROBLEM Zero-One Nonlinear PROBLEM
在线阅读 下载PDF
Performance Evaluation of Queuing Management Algorithms in Hybrid Wireless Ad-Hoc Network
4
作者 Ertshag Hamza Honge Ren +1 位作者 Elmustafa Sayed Xiaolong Zhu 《国际计算机前沿大会会议论文集》 2018年第1期53-53,共1页
在线阅读 下载PDF
An Anonymous Authentication and Key Exchange Protocol for UAVs in Flying Ad-Hoc Networks
5
作者 Yanan Liu Suhao Wang +4 位作者 Lei Cao Pengfei Wang Zheng Zhang Shuo Qiu Ruchan Dong 《Computers, Materials & Continua》 2026年第3期1262-1286,共25页
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to... Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks. 展开更多
关键词 AUTHENTICATION key exchange one-way accumulator flying ad-hoc networks SECURITY
在线阅读 下载PDF
Beyond Wi-Fi 7:Enhanced Decentralized Wireless Local Area Networks with Federated Reinforcement Learning
6
作者 Rashid Ali Alaa Omran Almagrabi 《Computers, Materials & Continua》 2026年第3期391-409,共19页
Wi-Fi technology has evolved significantly since its introduction in 1997,advancing to Wi-Fi 6 as the latest standard,with Wi-Fi 7 currently under development.Despite these advancements,integrating machine learning in... Wi-Fi technology has evolved significantly since its introduction in 1997,advancing to Wi-Fi 6 as the latest standard,with Wi-Fi 7 currently under development.Despite these advancements,integrating machine learning into Wi-Fi networks remains challenging,especially in decentralized environments with multiple access points(mAPs).This paper is a short review that summarizes the potential applications of federated reinforcement learning(FRL)across eight key areas of Wi-Fi functionality,including channel access,link adaptation,beamforming,multi-user transmissions,channel bonding,multi-link operation,spatial reuse,and multi-basic servic set(multi-BSS)coordination.FRL is highlighted as a promising framework for enabling decentralized training and decision-making while preserving data privacy.To illustrate its role in practice,we present a case study on link activation in a multi-link operation(MLO)environment with multiple APs.Through theoretical discussion and simulation results,the study demonstrates how FRL can improve performance and reliability,paving the way for more adaptive and collaborative Wi-Fi networks in the era of Wi-Fi 7 and beyond. 展开更多
关键词 Artificial intelligence reinforcement learning channels selection wireless local area networks 802.11ax 802.11be WI-FI
在线阅读 下载PDF
Grey Wolf Optimizer for Cluster-Based Routing in Wireless Sensor Networks:A Methodological Survey
7
作者 Mohammad Shokouhifar Fakhrosadat Fanian +4 位作者 Mehdi Hosseinzadeh Aseel Smerat Kamal M.Othman Abdulfattah Noorwali Esam Y.O.Zafar 《Computer Modeling in Engineering & Sciences》 2026年第1期191-255,共65页
Wireless Sensor Networks(WSNs)have become foundational in numerous real-world applications,ranging from environmental monitoring and industrial automation to healthcare systems and smart city development.As these netw... Wireless Sensor Networks(WSNs)have become foundational in numerous real-world applications,ranging from environmental monitoring and industrial automation to healthcare systems and smart city development.As these networks continue to grow in scale and complexity,the need for energy-efficient,scalable,and robust communication protocols becomes more critical than ever.Metaheuristic algorithms have shown significant promise in addressing these challenges,offering flexible and effective solutions for optimizing WSN performance.Among them,the Grey Wolf Optimizer(GWO)algorithm has attracted growing attention due to its simplicity,fast convergence,and strong global search capabilities.Accordingly,this survey provides an in-depth review of the applications of GWO and its variants for clustering,multi-hop routing,and hybrid cluster-based routing in WSNs.We categorize and analyze the existing GWO-based approaches across these key network optimization tasks,discussing the different problem formulations,decision variables,objective functions,and performance metrics used.In doing so,we examine standard GWO,multi-objective GWO,and hybrid GWO models that incorporate other computational intelligence techniques.Each method is evaluated based on how effectively it addresses the core constraints of WSNs,including energy consumption,communication overhead,and network lifetime.Finally,this survey outlines existing gaps in the literature and proposes potential future research directions aimed at enhancing the effectiveness and real-world applicability of GWO-based techniques for WSN clustering and routing.Our goal is to provide researchers and practitioners with a clear,structured understanding of the current state of GWO in WSNs and inspire further innovation in this evolving field. 展开更多
关键词 wireless sensor networks data transmission energy efficiency LIFETIME CLUSTERING ROUTING optimization metaheuristic algorithms grey wolf optimizer
在线阅读 下载PDF
Improved ant colony-based multi-constrained QoS energy-saving routing and throughput optimization in wireless Ad-hoc networks 被引量:5
8
作者 WANG Ya-li SONG Mei +2 位作者 WEI Yi-fei WANG Ying-he WANG Xiao-jun 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第1期43-53,59,共12页
In order to establish a route supporting multi-constrained quality of service(QoS), increase network throughput and reduce network energy consumption, an improved ant colony-based multi-constrained QoS energy-saving... In order to establish a route supporting multi-constrained quality of service(QoS), increase network throughput and reduce network energy consumption, an improved ant colony-based multi-constrained QoS energy-saving routing algorithm(IAMQER) is proposed. The ant colony algorithm, as one of the available heuristic algorithms, is used to find the optimal route from source node to destination node. The proposed IAMQER algorithm, which is based on the analysis of local node information such as node queue length, node forwarding number of data packets and node residual energy, balances the relationship between the network throughput and the energy consumption, thus improving the performance of network in multi-constrained QoS routing. Simulation results show that this IAMQER algorithm can find the QoS route that reduce average energy consumption and improves network packet delivery ratio under the end-to-end delay and packet loss ratio constraints. 展开更多
关键词 wireless ad-hoc networks multi-constrained QoS routing ant colony algorithm ENERGY-SAVING throughput optimization
原文传递
Load-balanced broadcast routing in wireless Ad-hoc networks
9
作者 HU Tian ZHAO Bao-hua 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第3期1-4,42,共5页
In wireless Ad-hoc networks, where mobile hosts are powered by batteries, the entire network may be partitioned because of the drainage of a small set of batteries. Therefore, the crucial issue is to improve the energ... In wireless Ad-hoc networks, where mobile hosts are powered by batteries, the entire network may be partitioned because of the drainage of a small set of batteries. Therefore, the crucial issue is to improve the energy efficiency, with an objective of balancing energy consumption. A greedy algorithm called weighted minimum spanning tree (WMST) has been proposed, in which time complexity is O(n^2). This algorithm takes into account the initial energy of each node and energy consumption of each communication. Simulation has demonstrated that the performance of the proposed algorithm improves the load balance and prolongs the lifetime. 展开更多
关键词 wireless ad-hoc networks broadcast routing load balance LIFETIME
原文传递
A Situational Awareness-Based Framework for Wireless Network Management:Innovations and Applications 被引量:1
10
作者 Gao Peng Zhang Dongchen +3 位作者 Jiang Tao Li Xingzheng Tan Youheng Liu Guanghua 《China Communications》 2025年第7期95-108,共14页
Wireless networks support numerous terminals,manage large data volumes,and provide diverse services,but the vulnerability to environmental changes leads to increased complexity and costs.Situational awareness has been... Wireless networks support numerous terminals,manage large data volumes,and provide diverse services,but the vulnerability to environmental changes leads to increased complexity and costs.Situational awareness has been widely applied in network management,but existing methods fail to find optimal solutions due to the high heterogeneity of base stations,numerous metrics,and complex intercell dependencies.To address this gap,this paper proposes a specialized framework for wireless networks,integrating an evaluation model and control approach.The framework expands the indicator set into four key areas,introduces an evaluation method,and proposes the indicator perturbation greedy(IPG)algorithm and the adjustment scheme selection method based on damping coefficient(DCSS)for effective network optimization.A case study in an urban area demonstrates the framework’s ability to balance and improve network performance,enhancing situational awareness and operational efficiency under dynamic conditions. 展开更多
关键词 communication system control system situation awareness wireless communication system wireless network optimization
在线阅读 下载PDF
A Near-Optimal Optimization Algorithm for Link Assignment in Wireless Ad-Hoc Networks 被引量:2
11
作者 刘恒昌 赵保华 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第1期89-94,共6页
Over the past few years, wireless networking technologies have made vast forays in our daily lives. In wireless ad-hoc networks, links are set up by a number of units without any permanent infrastructures. In this pap... Over the past few years, wireless networking technologies have made vast forays in our daily lives. In wireless ad-hoc networks, links are set up by a number of units without any permanent infrastructures. In this paper, the resource optimization is considered to maximize the network throughput by efficiently using the network capacity, where multi-hop functionality and spatial TDMA (STDMA) access scheme are used. The objective is to find the minimum frame length with given traffic distributions and corresponding routing information. Because of the complex structure of the underlying mathematical problem, previous work and analysis become intractable for networks of realistic sizes. The problem is addressed through mathematical programming approach, the linear integer formulation is developed for optimizing the network throughput, and then the similarity between the original problem and the graph edge coloring problem is shown through the conflict graph concept. A column generation solution is proposed and several enhancements are made in order to fasten its convergence. Numerical results demonstrate that the theoretical limit of the throughput can be efficiently computed for networks of realistic sizes. 展开更多
关键词 link scheduling STDMA wireless network mathematical modeling column generation
原文传递
Application Research of Wireless Sensor Networks and the Internet of Things 被引量:1
12
作者 Changjian Lv Rui Wang Man Zhao 《Journal of Electronic Research and Application》 2025年第4期283-289,共7页
In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),dee... In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers. 展开更多
关键词 wireless Sensor networks Internet of Things Key technologies Application fields
在线阅读 下载PDF
Computation and wireless resource management in 6G space-integrated-ground access networks 被引量:1
13
作者 Ning Hui Qian Sun +2 位作者 Lin Tian Yuanyuan Wang Yiqing Zhou 《Digital Communications and Networks》 2025年第3期768-777,共10页
In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this neces... In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this necessitates effective management of computation and wireless resources tailored to the requirements of various services.The heterogeneity of computation resources and interference among shared wireless resources pose significant coordination and management challenges.To solve these problems,this work provides an overview of multi-dimensional resource management in 6G SIG RAN,including computation and wireless resource.Firstly it provides with a review of current investigations on computation and wireless resource management and an analysis of existing deficiencies and challenges.Then focusing on the provided challenges,the work proposes an MEC-based computation resource management scheme and a mixed numerology-based wireless resource management scheme.Furthermore,it outlines promising future technologies,including joint model-driven and data-driven resource management technology,and blockchain-based resource management technology within the 6G SIG network.The work also highlights remaining challenges,such as reducing communication costs associated with unstable ground-to-satellite links and overcoming barriers posed by spectrum isolation.Overall,this comprehensive approach aims to pave the way for efficient and effective resource management in future 6G networks. 展开更多
关键词 Space-integrated-ground Radio access network MEC-based computation resource management Mixed numerology-based wireless resource management
在线阅读 下载PDF
Hierarchical detection and tracking for moving targets in underwater wireless sensor networks 被引量:1
14
作者 Yudong Li Hongcheng Zhuang +2 位作者 Long Xu Shengquan Li Haibo Lu 《Digital Communications and Networks》 2025年第2期556-562,共7页
It is difficult to improve both energy consumption and detection accuracy simultaneously,and even to obtain the trade-off between them,when detecting and tracking moving targets,especially for Underwater Wireless Sens... It is difficult to improve both energy consumption and detection accuracy simultaneously,and even to obtain the trade-off between them,when detecting and tracking moving targets,especially for Underwater Wireless Sensor Networks(UWSNs).To this end,this paper investigates the relationship between the Degree of Target Change(DoTC)and the detection period,as well as the impact of individual nodes.A Hierarchical Detection and Tracking Approach(HDTA)is proposed.Firstly,the network detection period is determined according to DoTC,which reflects the variation of target motion.Secondly,during the network detection period,each detection node calculates its own node detection period based on the detection mutual information.Taking DoTC as pheromone,an ant colony algorithm is proposed to adaptively adjust the network detection period.The simulation results show that the proposed HDTA with the optimizations of network level and node level significantly improves the detection accuracy by 25%and the network energy consumption by 10%simultaneously,compared to the traditional adaptive period detection schemes. 展开更多
关键词 Underwater wireless sensor networks The degree of target change Mutual information PHEROMONE Adaptive period
在线阅读 下载PDF
Joint routing and rate allocation for multiple video streams in ad-hoc wireless networks
15
作者 SINGH Jatinder Pal GIROD Bernd 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第5期727-736,共10页
The support for multiple video streams in an ad-hoc wireless network requires appropriate routing and rate allocation measures ascertaining the set of links for transmitting each stream and the encoding rate of the vi... The support for multiple video streams in an ad-hoc wireless network requires appropriate routing and rate allocation measures ascertaining the set of links for transmitting each stream and the encoding rate of the video to be delivered over the chosen links. The routing and rate allocation procedures impact the sustained quality of each video stream measured as the mean squared error (MSE) distortion at the receiver, and the overall network congestion in terms of queuing delay per link. We study the trade-off between these two competing objectives in a convex optimization formulation, and discuss both centralized and dis- tributed solutions for joint routing and rate allocation for multiple streams. For each stream, the optimal allocated rate strikes a balance between the selfish motive of minimizing video distortion and the global good of minimizing network congestions, while the routes are chosen over the least-congested links in the network. In addition to detailed analysis, network simulation results using ns-2 are presented for studying the optimal choice of parameters and to confirm the effectiveness of the proposed measures. 展开更多
关键词 ad-hoc wireless networks VIDEO streaming Rate allocation MULTI-PATH ROUTING
在线阅读 下载PDF
Mitigating Hotspot Problem Using Northern Goshawk Optimization Based Energy Aware Multi-Hop Communication for Wireless Sensor Networks
16
作者 S.Leones Sherwin Vimalraj J.Lydia 《China Communications》 2025年第2期283-298,共16页
Wireless Sensor Network(WSN)comprises a set of interconnected,compact,autonomous,and resource-constrained sensor nodes that are wirelessly linked to monitor and gather data from the physical environment.WSNs are commo... Wireless Sensor Network(WSN)comprises a set of interconnected,compact,autonomous,and resource-constrained sensor nodes that are wirelessly linked to monitor and gather data from the physical environment.WSNs are commonly used in various applications such as environmental monitoring,surveillance,healthcare,agriculture,and industrial automation.Despite the benefits of WSN,energy efficiency remains a challenging problem that needs to be addressed.Clustering and routing can be considered effective solutions to accomplish energy efficiency in WSNs.Recent studies have reported that metaheuristic algorithms can be applied to optimize cluster formation and routing decisions.This study introduces a new Northern Goshawk Optimization with boosted coati optimization algorithm for cluster-based routing(NGOBCO-CBR)method for WSN.The proposed NGOBCO-CBR method resolves the hot spot problem,uneven load balancing,and energy consumption in WSN.The NGOBCO-CBR technique comprises two major processes such as NGO based clustering and BCO-based routing.In the initial phase,the NGObased clustering method is designed for cluster head(CH)selection and cluster construction using five input variables such as residual energy(RE),node proximity,load balancing,network average energy,and distance to BS(DBS).Besides,the NGOBCO-CBR technique applies the BCO algorithm for the optimum selection of routes to BS.The experimental results of the NGOBCOCBR technique are studied under different scenarios,and the obtained results showcased the improved efficiency of the NGOBCO-CBR technique over recent approaches in terms of different measures. 展开更多
关键词 CLUSTERING energy efficiency metaheuristics multihop communication network lifetime wireless sensor networks
在线阅读 下载PDF
Data Gathering Based on Hybrid Energy Efficient Clustering Algorithm and DCRNN Model in Wireless Sensor Network
17
作者 Li Cuiran Liu Shuqi +1 位作者 Xie Jianli Liu Li 《China Communications》 2025年第3期115-131,共17页
In order to solve the problems of short network lifetime and high data transmission delay in data gathering for wireless sensor network(WSN)caused by uneven energy consumption among nodes,a hybrid energy efficient clu... In order to solve the problems of short network lifetime and high data transmission delay in data gathering for wireless sensor network(WSN)caused by uneven energy consumption among nodes,a hybrid energy efficient clustering routing base on firefly and pigeon-inspired algorithm(FF-PIA)is proposed to optimise the data transmission path.After having obtained the optimal number of cluster head node(CH),its result might be taken as the basis of producing the initial population of FF-PIA algorithm.The L′evy flight mechanism and adaptive inertia weighting are employed in the algorithm iteration to balance the contradiction between the global search and the local search.Moreover,a Gaussian perturbation strategy is applied to update the optimal solution,ensuring the algorithm can jump out of the local optimal solution.And,in the WSN data gathering,a onedimensional signal reconstruction algorithm model is developed by dilated convolution and residual neural networks(DCRNN).We conducted experiments on the National Oceanic and Atmospheric Administration(NOAA)dataset.It shows that the DCRNN modeldriven data reconstruction algorithm improves the reconstruction accuracy as well as the reconstruction time performance.FF-PIA and DCRNN clustering routing co-simulation reveals that the proposed algorithm can effectively improve the performance in extending the network lifetime and reducing data transmission delay. 展开更多
关键词 CLUSTERING data gathering DCRNN model network lifetime wireless sensor network
在线阅读 下载PDF
Dynamic Multi-Target Jamming Channel Allocation and Power Decision-Making in Wireless Communication Networks:A Multi-Agent Deep Reinforcement Learning Approach
18
作者 Peng Xiang Xu Hua +4 位作者 Qi Zisen Wang Dan Zhang Yue Rao Ning Gu Wanyi 《China Communications》 2025年第5期71-91,共21页
This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD... This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD)approach based on multi-agent deep reinforcement learning(MADRL).In high-dynamic and multi-target aviation communication environments,the rapid changes in channels make it difficult for sensors to accurately capture instantaneous channel state information.This poses a challenge to make centralized jamming decisions with single-agent deep reinforcement learning(DRL)approaches.In response,we design a distributed multi-agent decision architecture(DMADA).We formulate multi-jammer resource allocation as a multiagent Markov decision process(MDP)and propose a fingerprint-based double deep Q-Network(FBDDQN)algorithm for solving it.Each jammer functions as an agent that interacts with the environment in this framework.Through the design of a reasonable reward and training mechanism,our approach enables jammers to achieve distributed cooperation,significantly improving the jamming success rate while considering jamming power cost,and reducing the transmission rate of links.Our experimental results show the FBDDQN algorithm is superior to the baseline methods. 展开更多
关键词 jamming resource allocation JCAPD MADRL wireless communication countermeasure wireless communication networks
在线阅读 下载PDF
Wireless Sensor Network Modeling and Analysis for Attack Detection
19
作者 Tamara Zhukabayeva Vasily Desnitsky Assel Abdildayeva 《Computer Modeling in Engineering & Sciences》 2025年第8期2591-2625,共35页
Wireless Sensor Networks(WSN)have gained significant attention over recent years due to their extensive applications in various domains such as environmentalmonitoring,healthcare systems,industrial automation,and smar... Wireless Sensor Networks(WSN)have gained significant attention over recent years due to their extensive applications in various domains such as environmentalmonitoring,healthcare systems,industrial automation,and smart cities.However,such networks are inherently vulnerable to different types of attacks because they operate in open environments with limited resources and constrained communication capabilities.Thepaper addresses challenges related to modeling and analysis of wireless sensor networks and their susceptibility to attacks.Its objective is to create versatile modeling tools capable of detecting attacks against network devices and identifying anomalies caused either by legitimate user errors or malicious activities.A proposed integrated approach for data collection,preprocessing,and analysis in WSN outlines a series of steps applicable throughout both the design phase and operation stage.This ensures effective detection of attacks and anomalies within WSNs.An introduced attackmodel specifies potential types of unauthorized network layer attacks targeting network nodes,transmitted data,and services offered by the WSN.Furthermore,a graph-based analytical framework was designed to detect attacks by evaluating real-time events from network nodes and determining if an attack is underway.Additionally,a simulation model based on sequences of imperative rules defining behaviors of both regular and compromised nodes is presented.Overall,this technique was experimentally verified using a segment of a WSN embedded in a smart city infrastructure,simulating a wormhole attack.Results demonstrate the viability and practical significance of the technique for enhancing future information security measures.Validation tests confirmed high levels of accuracy and efficiency when applied specifically to detecting wormhole attacks targeting routing protocols in WSNs.Precision and recall rates averaged above the benchmark value of 0.95,thus validating the broad applicability of the proposed models across varied scenarios. 展开更多
关键词 wireless sensor network MODELING SECURITY ATTACK DETECTION MONITORING
在线阅读 下载PDF
A DNN-based MIMO signal detector using transformer architecture for next-generation wireless networks
20
作者 Gevira Omondi Thomas O.Olwal 《Journal of Information and Intelligence》 2025年第6期526-546,共21页
Multiple input multiple output(MIMO)communication systems have emerged as a key technology to enhance spectral efficiency and reliability in wireless communications.In recent years,deep neural network(DNN)-based appro... Multiple input multiple output(MIMO)communication systems have emerged as a key technology to enhance spectral efficiency and reliability in wireless communications.In recent years,deep neural network(DNN)-based approaches have shown promise in addressing the challenges of MIMO signal detection.Among these approaches,the Transformer architecture,known for its effectiveness in capturing long-range dependencies in sequential data,has gained significant attention.Therefore,this paper proposes a revolutionary DNN-based MIMO signal detection scheme using the Transformer-based architecture.This novel scheme leverages the multi-head self-attention mechanism inherent in Transformer architectures,which enables the model to capture both spatial and temporal dependencies in MIMO channels,thereby improving symbol detection accuracy and robustness under varying channel conditions.The proposed scheme's bit error rate(BER)performance is compared with traditional methods through simulations.The results show that the proposed method achieves a signal-to-noise ratio(SNR)gain of nearly 1.5 dB against the traditional detection methods,with the optimal maximum likelihood detector(MLD)only outperforming it by<0.5 dB. 展开更多
关键词 Deep learning MIMO signal detection wireless networks Deep neural network Artificial intelligence Transformer architecture
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部