期刊文献+
共找到54篇文章
< 1 2 3 >
每页显示 20 50 100
Wavelet Transform-Based Bayesian Inference Learning with Conditional Variational Autoencoder for Mitigating Injection Attack in 6G Edge Network
1
作者 Binu Sudhakaran Pillai Raghavendra Kulkarni +1 位作者 Venkata Satya Suresh kumar Kondeti Surendran Rajendran 《Computer Modeling in Engineering & Sciences》 2025年第10期1141-1166,共26页
Future 6G communications will open up opportunities for innovative applications,including Cyber-Physical Systems,edge computing,supporting Industry 5.0,and digital agriculture.While automation is creating efficiencies... Future 6G communications will open up opportunities for innovative applications,including Cyber-Physical Systems,edge computing,supporting Industry 5.0,and digital agriculture.While automation is creating efficiencies,it can also create new cyber threats,such as vulnerabilities in trust and malicious node injection.Denialof-Service(DoS)attacks can stop many forms of operations by overwhelming networks and systems with data noise.Current anomaly detection methods require extensive software changes and only detect static threats.Data collection is important for being accurate,but it is often a slow,tedious,and sometimes inefficient process.This paper proposes a new wavelet transformassisted Bayesian deep learning based probabilistic(WT-BDLP)approach tomitigate malicious data injection attacks in 6G edge networks.The proposed approach combines outlier detection based on a Bayesian learning conditional variational autoencoder(Bay-LCVariAE)and traffic pattern analysis based on continuous wavelet transform(CWT).The Bay-LCVariAE framework allows for probabilistic modelling of generative features to facilitate capturing how features of interest change over time,spatially,and for recognition of anomalies.Similarly,CWT allows emphasizing the multi-resolution spectral analysis and permits temporally relevant frequency pattern recognition.Experimental testing showed that the flexibility of the Bayesian probabilistic framework offers a vast improvement in anomaly detection accuracy over existing methods,with a maximum accuracy of 98.21%recognizing anomalies. 展开更多
关键词 Bayesian inference learning automaton convolutional wavelet transform conditional variational autoencoder malicious data injection attack edge environment 6G communication
在线阅读 下载PDF
Secrecy performance analysis of UAV-assisted CR-NOMA wireless communication systems
2
作者 Haiyan HUANG Yuxin AI +2 位作者 Linlin LIANG Fuhui ZHOU Tony Q.S.QUEK 《Chinese Journal of Aeronautics》 2025年第10期260-270,共11页
Aerial access networks are considered by one of the promising solutions for 6G technology with Unmanned Aerial Vehicles(UAVs)acting as aerial relays to fill coverage gaps,enhance line-of-sight communication,and improv... Aerial access networks are considered by one of the promising solutions for 6G technology with Unmanned Aerial Vehicles(UAVs)acting as aerial relays to fill coverage gaps,enhance line-of-sight communication,and improve network performance and user experience.To improve spectrum utilization,this paper studies a UAV-assisted wireless communication network based on Cognitive Radio(CR)and Non-Orthogonal Multiple Access(NOMA)technologies.Considering the presence of potential malicious eavesdroppers in complex practical communication scenarios,multiple transmitting nodes cooperate through UAVs.To enhance physical layer security performance,an efficient low-complexity transmitter-relay selection scheme is proposed,which selects the optimal transmitting node based on link channel quality,referred to as the Suboptimal Node Transmission Strategy(SNTS).To further enhance system security performance,another scheme is proposed,which selects the optimal transmitting node by maximizing the transmission capacity of the far user,known as the Optimal Node Transmission Strategy(ONTS).Under the decode-and-forward relay strategy,the security performance of the network under both schemes is studied.Under the joint constraints imposed by the primary interference power and secondary maximum transmission power,the secrecy outage probability for users is derived and validated through simulations.The results indicate that under identical conditions,as the number of transmitting nodes increases,the probability of establishing a line-of-sight link in ground-air communications rises,leading to a decrease in the system’s secrecy outage probability.Furthermore,in terms of multi-user diversity gain,ONTS significantly outperforms SNTS.However,the computational overhead of ONTS is relatively high.Therefore,when meeting the actual communication needs of users,a trade-off between complexity and performance must be considered. 展开更多
关键词 Cognitive Radio Non-Orthogonal Multiple Access Physical layer security Secrecy outage probability Unmanned Aerial Vehicles
原文传递
Slice-Based 6G Network with Enhanced Manta Ray Deep Reinforcement Learning-Driven Proactive and Robust Resource Management
3
作者 Venkata Satya Suresh kumar Kondeti Raghavendra Kulkarni +1 位作者 Binu Sudhakaran Pillai Surendran Rajendran 《Computers, Materials & Continua》 2025年第9期4973-4995,共23页
Next-generation 6G networks seek to provide ultra-reliable and low-latency communications,necessitating network designs that are intelligent and adaptable.Network slicing has developed as an effective option for resou... Next-generation 6G networks seek to provide ultra-reliable and low-latency communications,necessitating network designs that are intelligent and adaptable.Network slicing has developed as an effective option for resource separation and service-level differentiation inside virtualized infrastructures.Nonetheless,sustaining elevated Quality of Service(QoS)in dynamic,resource-limited systems poses significant hurdles.This study introduces an innovative packet-based proactive end-to-end(ETE)resource management system that facilitates network slicing with improved resilience and proactivity.To get around the drawbacks of conventional reactive systems,we develop a cost-efficient slice provisioning architecture that takes into account limits on radio,processing,and transmission resources.The optimization issue is non-convex,NP-hard,and requires online resolution in a dynamic setting.We offer a hybrid solution that integrates an advanced Deep Reinforcement Learning(DRL)methodology with an Improved Manta-Ray Foraging Optimization(ImpMRFO)algorithm.The ImpMRFO utilizes Chebyshev chaotic mapping for the formation of a varied starting population and incorporates Lévy flight-based stochastic movement to avert premature convergence,hence facilitating improved exploration-exploitation trade-offs.The DRL model perpetually acquires optimum provisioning strategies via agent-environment interactions,whereas the ImpMRFO enhances policy performance for effective slice provisioning.The solution,developed in Python,is evaluated across several 6G slicing scenarios that include varied QoS profiles and traffic requirements.The DRL model perpetually acquires optimum provisioning methods via agent-environment interactions,while the ImpMRFO enhances policy performance for effective slice provisioning.The solution,developed in Python,is evaluated across several 6G slicing scenarios that include varied QoS profiles and traffic requirements.Experimental findings reveal that the proactive ETE system outperforms DRL models and non-resilient provisioning techniques.Our technique increases PSSRr,decreases average latency,and optimizes resource use.These results demonstrate that the hybrid architecture for robust,real-time,and scalable slice management in future 6G networks is feasible. 展开更多
关键词 Sliced network manta ray foraging optimization Chebyshev chaotic map levy flight
在线阅读 下载PDF
Reactivating T cell immunity in Wnt-hyperactivated non-small cell lung cancer through a supramolecular droplet of carnosic acid and peptide
4
作者 Na Liu Yuzhen Tu +8 位作者 Hanyu Wang Xiaoqiang Zheng Fanpu Ji Mingsha Geng Xin Wei Jingman Xin Wangxiao He Qian Zhao Tianya Liu 《Journal of Pharmaceutical Analysis》 2025年第12期2900-2912,共13页
The Wnt/b-catenin signaling pathway is renowned for its contribution to the immunosuppressive microenvironment in non-small cell lung cancer(NSCLC).Consequently,inhibiting this pathway has emerged as a promising strat... The Wnt/b-catenin signaling pathway is renowned for its contribution to the immunosuppressive microenvironment in non-small cell lung cancer(NSCLC).Consequently,inhibiting this pathway has emerged as a promising strategy to enhance immune activation and reinstate T cell responses in cancer treatment.In this study,we initially investigate the metabolic characteristics of Wnt-hyperactivated NSCLC using mass spectroscopic detection in a mouse in-situ model and unveil its significant feature of acid accumulation at tumor sites.Building upon this discovery,we design an acid-sensitive peptidecarnosic acid(CA)supramolecular droplet(Pep1@CA),which leverages the acidic microenvironment characteristic of NSCLC for controlled release.By doing so,we aim to enhance targeting efficiency while minimizing off-target effects.As anticipated,Pep1@CA demonstrates potent tumor-specific inhibition of the Wnt signaling pathway and effectively reactivates T cell immunity in Wnt-hyperactivated NSCLC.Importantly,comprehensive in vivo evaluations reveal significant antitumor efficacy alongside excellent biosafety profiles.Collectively,this study provides a therapeutic strategy with promising clinical translational potential for targeting the Wnt signaling pathway and offers theoretical support for its application in immunotherapy.This innovative approach underscores that targeting pathways beyond traditional immunotherapy can also activate tumor immunity,thereby expanding the potential of cancer immunotherapy. 展开更多
关键词 Tumor microenvironment Cancer therapy Wnt/b-catenin signal Non-small cell lung cancer IMMUNOTHERAPY
暂未订购
Blockchain-Assisted Improved Cryptographic Privacy-Preserving FL Model with Consensus Algorithm for ORAN
5
作者 Raghavendra Kulkarni Venkata Satya Suresh kumar Kondeti +1 位作者 Binu Sudhakaran Pillai Surendran Rajendran 《Computers, Materials & Continua》 2026年第1期1862-1884,共23页
The next-generation RAN,known as Open Radio Access Network(ORAN),allows for several advantages,including cost-effectiveness,network flexibility,and interoperability.Now ORAN applications,utilising machine learning(ML)... The next-generation RAN,known as Open Radio Access Network(ORAN),allows for several advantages,including cost-effectiveness,network flexibility,and interoperability.Now ORAN applications,utilising machine learning(ML)and artificial intelligence(AI)techniques,have become standard practice.The need for Federated Learning(FL)for ML model training in ORAN environments is heightened by the modularised structure of the ORAN architecture and the shortcomings of conventional ML techniques.However,the traditional plaintext model update sharing of FL in multi-BS contexts is susceptible to privacy violations such as deep-leakage gradient assaults and inference.Therefore,this research presents a novel blockchain-assisted improved cryptographic privacy-preserving federated learning(BICPPFL)model,with the help of ORAN,to safely carry out federated learning and protect privacy.This model improves on the conventional masking technique for sharing model parameters by adding new characteristics.These features include the choice of distributed aggregators,validation for final model aggregation,and individual validation for BSs.To manage the security and privacy of FL processes,a combined homomorphic proxy-reencryption(HPReE)and lattice-cryptographic method(HPReEL)has been used.The upgraded delegated proof of stake(Up-DPoS)consensus protocol,which will provide quick validation of model exchanges and protect against malicious attacks,is employed for effective consensus across blockchain nodes.Without sacrificing performance metrics,the BICPPFL model strengthens privacy and adds security layers while facilitating the transfer of sensitive data across several BSs.The framework is deployed on top of a Hyperledger Fabric blockchain to evaluate its effectiveness.The experimental findings prove the reliability and privacy-preserving capability of the BICPPFL model. 展开更多
关键词 Open radio access network homomorphic proxy-re-encryption lattice-cryptography hyperledger fabric blockchain technology upgraded delegated proof of stake federated learning
在线阅读 下载PDF
Geographical mapping and Bayesian spatial modeling of malaria incidence in Sistan and Baluchistan province,Iran 被引量:2
6
作者 Farid Zayeri Masoud Salehi Hasan Pirhosseini 《Asian Pacific Journal of Tropical Medicine》 SCIE CAS 2011年第12期985-992,共8页
ObjectiveTo present the geographical map of malaria and identify some of the important environmental factors of this disease in Sistan and Baluchistan province, Iran.MethodsWe used the registered malaria data to compu... ObjectiveTo present the geographical map of malaria and identify some of the important environmental factors of this disease in Sistan and Baluchistan province, Iran.MethodsWe used the registered malaria data to compute the standard incidence rates (SIRs) of malaria in different areas of Sistan and Baluchistan province for a nine-year period (from 2001 to 2009). Statistical analyses consisted of two different parts: geographical mapping of malaria incidence rates, and modeling the environmental factors. The empirical Bayesian estimates of malaria SIRs were utilized for geographical mapping of malaria and a Poisson random effects model was used for assessing the effect of environmental factors on malaria SIRs.ResultsIn general, 64 926 new cases of malaria were registered in Sistan and Baluchistan Province from 2001 to 2009. Among them, 42 695 patients (65.8%) were male and 22 231 patients (34.2%) were female. Modeling the environmental factors showed that malaria incidence rates had positive relationship with humidity, elevation, average minimum temperature and average maximum temperature, while rainfall had negative effect on malaria SIRs in this province.ConclusionsThe results of the present study reveals that malaria is still a serious health problem in Sistan and Baluchistan province, Iran. Geographical map and related environmental factors of malaria can help the health policy makers to intervene in high risk areas more efficiently and allocate the resources in a proper manner. 展开更多
关键词 MALARIA Standard INCIDENCE rate GEOGRAPHICAL map Empirical BAYESIAN ESTIMATE Sistan and Baluchistan
暂未订购
Complex field network-coded cooperation based on multi-user detection in wireless networks 被引量:2
7
作者 Jing Wang Xiangyang Liu +1 位作者 Kaikai Chi Xiangmo Zhao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第2期215-221,共7页
Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC... Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values. 展开更多
关键词 network coding complex field wireless network cooperative communication multi-user detection
在线阅读 下载PDF
Power Control and Routing Selection for Throughput Maximization in Energy Harvesting Cognitive Radio Networks 被引量:2
8
作者 Xiaoli He Hong Jiang +1 位作者 Yu Song Muhammad Owais 《Computers, Materials & Continua》 SCIE EI 2020年第6期1273-1296,共24页
This paper investigates the power control and routing problem in the communication process of an energy harvesting(EH)multi-hop cognitive radio network(CRN).The secondary user(SU)nodes(i.e.,source node and relay nodes... This paper investigates the power control and routing problem in the communication process of an energy harvesting(EH)multi-hop cognitive radio network(CRN).The secondary user(SU)nodes(i.e.,source node and relay nodes)harvest energy from the environment and use the energy exclusively for transmitting data.The SU nodes(i.e.,relay nodes)on the path,store and forward the received data to the destination node.We consider a real world scenario where the EH-SU node has only local causal knowledge,i.e.,at any time,each EH-SU node only has knowledge of its own EH process,channel state and currently received data.In order to study the power and routing issues,an optimization problem that maximizes path throughput considering quality of service(QoS)and available energy constraints is proposed.To solve this optimization problem,we propose a hybrid game theory routing and power control algorithm(HGRPC).The EH-SU nodes on the same path cooperate with each other,but EH-SU nodes on the different paths compete with each other.By selecting the best next hop node,we find the best strategy that can maximize throughput.In addition,we have established four steps to achieve routing,i.e.,route discovery,route selection,route reply,and route maintenance.Compared with the direct transmission,HGRPC has advantages in longer distances and higher hop counts.The algorithm generates more energy,reduces energy consumption and increases predictable residual energy.In particular,the time complexity of HGRPC is analyzed and its convergence is proved.In simulation experiments,the performance(i.e.,throughput and bit error rate(BER))of HGRPC is evaluated.Finally,experimental results show that HGRPC has higher throughput,longer network life,less latency,and lower energy consumption. 展开更多
关键词 Cognitive radio networks power control routing selection energy harvesting game theory amplify-and-forward(AF) THROUGHPUT
在线阅读 下载PDF
Genetic Algorithm Based Node Deployment in Hybrid Wireless Sensor Networks 被引量:3
9
作者 Omar Banimelhem Moad Mowafi Walid Aljoby 《Communications and Network》 2013年第4期273-279,共7页
In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after t... In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after the initial deployment to overcome the coverage holes problem. To achieve optimal coverage, an efficient algorithm should be employed to find the best positions of the additional mobile nodes. This paper presents a genetic algorithm that searches for an optimal or near optimal solution to the coverage holes problem. The proposed algorithm determines the minimum number and the best locations of the mobile nodes that need to be added after the initial deployment of the stationary nodes. The performance of the genetic algorithm was evaluated using several metrics, and the simulation results demonstrated that the proposed algorithm can optimize the network coverage in terms of the overall coverage ratio and the number of additional mobile nodes. 展开更多
关键词 TARGET COVERAGE NODE DEPLOYMENT GENETIC Algorithm WIRELESS Sensor Networks
在线阅读 下载PDF
Energy-Efficient and Coverage-Aware Clustering in Wireless Sensor Networks 被引量:1
10
作者 Fahed Awad Eyad Taqieddin Asmaa Seyam 《Wireless Engineering and Technology》 2012年第3期142-151,共10页
Energy efficiency and sensing coverage are essential metrics for enhancing the lifetime and the utilization of wireless sensor networks. Many protocols have been developed to address these issues, among which, cluster... Energy efficiency and sensing coverage are essential metrics for enhancing the lifetime and the utilization of wireless sensor networks. Many protocols have been developed to address these issues, among which, clustering is considered a key technique in minimizing the consumed energy. However, few clustering protocols address the sensing coverage metric. This paper proposes a general framework that addresses both metrics for clustering algorithms in wireless sensor networks. The proposed framework is based on applying the principles of Virtual Field Force on each cluster within the network in order to move the sensor nodes towards proper locations that maximize the sensing coverage and minimize the transmitted energy. Two types of virtual forces are used: an attractive force that moves the nodes towards the cluster head in order to reduce the energy used for communication and a repulsive force that moves the overlapping nodes away from each other such that their sensing coverage is maximized. The performance of the proposed mechanism was evaluated by applying it to the well-known LEACH clustering algorithm. The simulation results demonstrate that the proposed mechanism improves the performance of the LEACH protocol considerably in terms of the achieved sensing coverage, and the network lifetime. 展开更多
关键词 WSN CLUSTERING LEACH Virtual Field Force LIFETIME Sensing COVERAGE
在线阅读 下载PDF
High-Throughput and Area-Efficient FPGA Implementations of Data Encryption Standard (DES) 被引量:1
11
作者 Raed Bani-Hani Salah Harb +1 位作者 Khaldoon Mhaidat Eyad Taqieddin 《Circuits and Systems》 2014年第3期45-56,共12页
One of the most popular standards for protecting confidential information is the Data Encryption Standard (DES). Although it has been replaced by the Advanced Encryption Standard (AES), it is still widely used in Auto... One of the most popular standards for protecting confidential information is the Data Encryption Standard (DES). Although it has been replaced by the Advanced Encryption Standard (AES), it is still widely used in Automatic Teller Machines (ATM’s), smartcards, and mobile phone SIM cards. In this paper, we present area-efficient and high-throughput FPGA implementations of the DES which are developed using the Xilinx FPGA ISE design suite. In fact, we propose modifications on the fastest DES design reported in the literature and achieve 1.1 times higher speed. Also, we introduce an 8-stage pipelined design that needs only 0.75 times the registers and consumes 0.65 times the power of a similar 16-stages pipelined design. High-speed design and synthesis optimization techniques including pipelining, register retiming, and logic replication are used. Post- layout synthesis results show that the proposed implementations achieve high throughput-to-area ratio. To make a fair comparison, the proposed designs were synthesized using matching FPGA devices as being used by other implementations reported in the literature. 展开更多
关键词 DES FPGA PIPELINED ITERATIVE SECURITY Efficiency ENCRYPTION
暂未订购
A Data Transmission Path Optimization Protocol for Heterogeneous Wireless Sensor Networks Based on Deep Reinforcement Learning 被引量:1
12
作者 Yu Song Zhigui Liu Xiaoli He 《Journal of Computer and Communications》 2023年第8期165-180,共16页
Wireless sensor networks had become a hot research topic in Information science because of their ability to collect and process target information periodically in a harsh or remote environment. However, wireless senso... Wireless sensor networks had become a hot research topic in Information science because of their ability to collect and process target information periodically in a harsh or remote environment. However, wireless sensor networks were inherently limited in various software and hardware resources, especially the lack of energy resources, which is the biggest bottleneck restricting their further development. A large amount of research had been conducted to implement various optimization techniques for the problem of data transmission path selection in homogeneous wireless sensor networks. However, there is still great room for improvement in the optimization of data transmission path selection in heterogeneous wireless sensor networks (HWSNs). This paper proposes a data transmission path selection (HDQNs) protocol based on Deep reinforcement learning. In order to solve the energy consumption balance problem of heterogeneous nodes in the data transmission path selection process of HWSNs and shorten the communication distance from nodes to convergence, the protocol proposes a data collection algorithm based on Deep reinforcement learning DQN. The algorithm uses energy heterogeneous super nodes as AGent to take a series of actions against different states of HWSNs and obtain corresponding rewards to find the best data collection route. Simulation analysis shows that the HDQN protocol outperforms mainstream HWSN data transmission path selection protocols such as DEEC and SEP in key performance indicators such as overall energy efficiency, network lifetime, and system robustness. 展开更多
关键词 HWSNs Clusting Deep Reinforcement Learning DQN
在线阅读 下载PDF
Robust Joint Timing and Frequency Synchronization Algorithm for IEEE802.16e OFDM System
13
作者 董国军 戴居丰 魏志成 《Transactions of Tianjin University》 EI CAS 2007年第5期360-364,共5页
Based on the structures of the short preamble and long preamble, which are defined for synchronization in IEEES02.16e specification, the robust synchronization algorithm for IEEES02.16e OFDM system is proposed. The co... Based on the structures of the short preamble and long preamble, which are defined for synchronization in IEEES02.16e specification, the robust synchronization algorithm for IEEES02.16e OFDM system is proposed. The correlations among the sample sequences in the preamble are investigated, especially the correlation between the first sample sequence and the last sample sequence in the long preamble. The conventional joint timing and frequency synchronization algorithm is reviewed based on the short preamble referring to the algorithm proposed by Schmidl, then a robust joint timing and frequency synchronization algorithm is proposed based on the long preamble. The simulations in the multi-path and frequency selective fading channel show that the proposed algorithm has improved the performances of timing metric plateau, timing offset and synchronization acquisition time even when signal-to-noise ratio is less than -5 dB. 展开更多
关键词 IEEE802.16E OFDM SYNCHRONIZATION PREAMBLE correlation estimation training sequence
在线阅读 下载PDF
CASE-CONTROL ASSOCIATION STUDIES OF THE UBAP1 GENE AND NASOPHARYNGEAL CARCINOMA IN SOUTHERN CHINESE
14
作者 曾朝阳 熊炜 +5 位作者 熊芳 李小玲 王蓉 李伟芳 钱骏 李桂源 《Chinese Journal of Cancer Research》 SCIE CAS CSCD 2003年第3期157-160,共4页
Objective: To identify the relation between nasopharyngeal carcinoma and the human novel gene UBAP1, which is located in the region of minimal heterozygosity deletion at 9pl3.2 and down-expressed in NPC. Methods: Fiv... Objective: To identify the relation between nasopharyngeal carcinoma and the human novel gene UBAP1, which is located in the region of minimal heterozygosity deletion at 9pl3.2 and down-expressed in NPC. Methods: Five single nucleotide polymorphisms (SNPs) within UBAP1 gene were analysed by sequencing in 105 NPC patients and 183 control subjects which matched to the NPC cases on age, sex and residence. Results: Significant association was found between NPC with one SNP mark (rs1049557), which is located at 3' non-region of UBAP1 gene; the relative risk of this SNP mark is 1.64 (genotype GG) and 1.31 (genotype CG). Conclusion: The result has proved again that UBAP1 gene may play a certain role in the occurrence and development of nasopharyngeal carcinoma. The SNP mark rs1049557, considering its location, may influence the expression of UBAP1 gene. 展开更多
关键词 Case-control association analysis UBAP1 Nasopharyngeal carcinoma
暂未订购
Application Aware Topology Generation for Surface Wave Networks-on-Chip
15
作者 Zhao Fu Zheng-Bing Hu +2 位作者 Cheng Gong Wen-Ming Pan Guo-Bin Lv 《Journal of Electronic Science and Technology》 CAS 2014年第4期366-370,共5页
The networks-on-chip (NoC) communication has an increasingly larger impact on the system power consumption and performance. Emerging technologies, like surface wave, are believed to have lower transmission latency a... The networks-on-chip (NoC) communication has an increasingly larger impact on the system power consumption and performance. Emerging technologies, like surface wave, are believed to have lower transmission latency and power consumption over the conventional wireless NoC. Therefore, this paper studies how to optimize the network performance and power consumption by giving the packet-switching fabric and traffic pattern of each application. Compared with the conventional method of wire-linked, which adds wireless transceivers by using the genetic algorithm (GA), the proposed maximal declining sorting algorithm (MDSA) can effectively reduce time consumption by as much as 20.4% to 35.6%. We also evaluate the power consumption and configuration time to prove the effective of the proposed algorithm. 展开更多
关键词 Maximal declining sorting algorithm networks-on-chip surface wave network performance
在线阅读 下载PDF
Resource Allocation for Throughput Maximization in Cognitive Radio Network with NOMA
16
作者 Xiaoli He Yu Song +3 位作者 Yu Xue Muhammad Owais Weijian Yang Xinwen Cheng 《Computers, Materials & Continua》 SCIE EI 2022年第1期195-212,共18页
Spectrum resources are the precious and limited natural resources.In order to improve the utilization of spectrum resources and maximize the network throughput,this paper studies the resource allocation of the downlin... Spectrum resources are the precious and limited natural resources.In order to improve the utilization of spectrum resources and maximize the network throughput,this paper studies the resource allocation of the downlink cognitive radio network with non-orthogonalmultiple access(CRN-NOMA).NOMA,as the key technology of the fifth-generation communication(5G),can effectively increase the capacity of 5G networks.The optimization problem proposed in this paper aims to maximize the number of secondary users(SUs)accessing the system and the total throughput in the CRN-NOMA.Under the constraints of total power,minimum rate,interference and SINR,CRN-NOMA throughput is maximized by allocating optimal transmission power.First,for the situation of multiple sub-users,an adaptive optimization method is proposed to reduce the complexity of the optimization solution.Secondly,for the optimization problem of nonlinear programming,a maximization throughput optimization algorithm based on Chebyshev and convex(MTCC)for CRN-NOMA is proposed,which converts multi-objective optimization problem into single-objective optimization problem to solve.At the same time,the convergence and time complexity of the algorithm are verified.Theoretical analysis and simulation results show that the algorithm can effectively improve the system throughput.In terms of interference and throughput,the performance of the sub-optimal solution is better than that of orthogonal-frequency-division-multiple-access(OFDMA).This paper provides important insights for the research and application of NOMA in future communications. 展开更多
关键词 Resource allocation non-orthogonal multiple access cognitive radio network throughput maximization CHEBYSHEV CONVEX
在线阅读 下载PDF
Cluster-based Distributed Vertical Handoff Decision Scheme
17
作者 Rami Tawil Jacques Demerjian Guy Pujolle 《通讯和计算机(中英文版)》 2010年第2期62-69,共8页
关键词 垂直切换 决策方案 分布式 集群 下一代无线网络 异构网络环境 信任关系 决策算法
在线阅读 下载PDF
Application of Remote Radio Head over Fiber Technology
18
作者 Wang Jianquan Bai Longzhen 《ZTE Communications》 2009年第3期46-48,共3页
The Remote Radio Head(RRH)over Fiber system is a new distributed network coverage mode.It processes the baseband parts concentratively by separating the baseband and Radio Frequency(RF).It moves the RF modules using f... The Remote Radio Head(RRH)over Fiber system is a new distributed network coverage mode.It processes the baseband parts concentratively by separating the baseband and Radio Frequency(RF).It moves the RF modules using fibers from the Base Stations(BSs)to the remote RF units.These RF modules are placed on the stations to be covered.This solution saves many equipment rooms required by conventional solutions.Meanwhile,it supports RRH over a large number of fibers through high-capacity macro BSs to realize the conversion between capacity and coverage.In addition,the RRH system also supports the coverage in other situations,such as high-speed railways and ultra-long distance.It is one of the most widely used technologies in the 3G network. 展开更多
关键词 RRH OVER Application of Remote Radio Head over Fiber Technology RADIO
在线阅读 下载PDF
Energy Aware Routing Protocol for Cognitive Radio Networks
19
作者 Yu Song Xiaoli He Ralf Volker Binsack 《Wireless Sensor Network》 2017年第3期103-115,共13页
In this article, a routing protocol EARP (Energy Aware Routing Protocol) with the terminal node is proposed, to deal with the impact of the limited energy resources of Cognitive Radio Networks on the whole network rou... In this article, a routing protocol EARP (Energy Aware Routing Protocol) with the terminal node is proposed, to deal with the impact of the limited energy resources of Cognitive Radio Networks on the whole network routing. The protocol allows choosing the route from the neighbor nodes in different transmission paths, according to energy consumption of a single node and the full path. If the path breaks, the protocol will increase local routing maintenance strategy. It effectively reduces the retransmission caused by the situation, and improves the routing efficiency. It also can prevent the link transmission process selecting the fault route due to the energy depletion. Through simulation experiments compared with the LEACH (Low Energy Adaptive Clustering Hierarchy) routing protocol, the results showed that in the same experimental environment, the proposed EARP could obviously balance the load, protect low energy nodes, prolong the network survival time and reduce packet loss rate and packet delay of data delivery. So it can improve the energy consumption of sensing node and provide routing capabilities. 展开更多
关键词 ENERGY Aware Routing Protocol ROUTE STRATEGY ROUTE Maintenance STRATEGY Network LIFETIME Packet Loss Rate Relative Residual ENERGY
在线阅读 下载PDF
Convergence Analysis of Iterative Threshold Decoding Process
20
作者 Mohammed Lahmer Mostafa Belkasmi Abdallah Rhattoy 《Journal of Computer and Communications》 2016年第14期98-107,共11页
Today the error correcting codes are present in all the telecom standards, in particular the low density parity check (LDPC) codes. The choice of a good code for a given network is essentially linked to the decoding p... Today the error correcting codes are present in all the telecom standards, in particular the low density parity check (LDPC) codes. The choice of a good code for a given network is essentially linked to the decoding performance obtained by the bit error rate (BER) curves. This approach requires a significant simulation time proportional to the length of the code, to overcome this problem Exit chart was introduced, as a fast technique to predict the performance of a particular class of codes called Turbo codes. In this paper, we success to apply Exit chart to analyze convergence behavior of iterative threshold decoding of one step majority logic decodable (OSMLD) codes. The iterative decoding process uses a soft-input soft-output threshold decoding algorithm as component decoder. Simulation results for iterative decoding of simple and concatenated codes transmitted over a Gaussian channel have shown that the thresholds obtained are a good indicator of the Bit Error Rate (BER) curves. 展开更多
关键词 OSMLD EXIT BER Mutual Information Iterative Threshold Decoding Extrinsic Information LLR
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部