期刊文献+
共找到185篇文章
< 1 2 10 >
每页显示 20 50 100
An EfficientNet integrated ResNet deep network and explainable AI for breast lesion classification from ultrasound images
1
作者 Kiran Jabeen Muhammad Attique Khan +4 位作者 Ameer Hamza Hussain Mobarak Albarakati Shrooq Alsenan Usman Tariq Isaac Ofori 《CAAI Transactions on Intelligence Technology》 2025年第3期842-857,共16页
Breast cancer is one of the major causes of deaths in women.However,the early diagnosis is important for screening and control the mortality rate.Thus for the diagnosis of breast cancer at the early stage,a computer-a... Breast cancer is one of the major causes of deaths in women.However,the early diagnosis is important for screening and control the mortality rate.Thus for the diagnosis of breast cancer at the early stage,a computer-aided diagnosis system is highly required.Ultrasound is an important examination technique for breast cancer diagnosis due to its low cost.Recently,many learning-based techniques have been introduced to classify breast cancer using breast ultrasound imaging dataset(BUSI)datasets;however,the manual handling is not an easy process and time consuming.The authors propose an EfficientNet-integrated ResNet deep network and XAI-based framework for accurately classifying breast cancer(malignant and benign).In the initial step,data augmentation is performed to increase the number of training samples.For this purpose,three-pixel flip mathematical equations are introduced:horizontal,vertical,and 90°.Later,two pretrained deep learning models were employed,skipped some layers,and fine-tuned.Both fine-tuned models are later trained using a deep transfer learning process and extracted features from the deeper layer.Explainable artificial intelligence-based analysed the performance of trained models.After that,a new feature selection technique is proposed based on the cuckoo search algorithm called cuckoo search controlled standard error mean.This technique selects the best features and fuses using a new parallel zeropadding maximum correlated coefficient features.In the end,the selection algorithm is applied again to the fused feature vector and classified using machine learning algorithms.The experimental process of the proposed framework is conducted on a publicly available BUSI and obtained 98.4%and 98%accuracy in two different experiments.Comparing the proposed framework is also conducted with recent techniques and shows improved accuracy.In addition,the proposed framework was executed less than the original deep learning models. 展开更多
关键词 augmentation breast cancer CLASSIFICATION deep learning OPTIMIZATION ultrasound images
在线阅读 下载PDF
Network Intrusion Traffic Detection Based on Feature Extraction 被引量:3
2
作者 Xuecheng Yu Yan Huang +2 位作者 Yu Zhang Mingyang Song Zhenhong Jia 《Computers, Materials & Continua》 SCIE EI 2024年第1期473-492,共20页
With the increasing dimensionality of network traffic,extracting effective traffic features and improving the identification accuracy of different intrusion traffic have become critical in intrusion detection systems(... With the increasing dimensionality of network traffic,extracting effective traffic features and improving the identification accuracy of different intrusion traffic have become critical in intrusion detection systems(IDS).However,both unsupervised and semisupervised anomalous traffic detection methods suffer from the drawback of ignoring potential correlations between features,resulting in an analysis that is not an optimal set.Therefore,in order to extract more representative traffic features as well as to improve the accuracy of traffic identification,this paper proposes a feature dimensionality reduction method combining principal component analysis and Hotelling’s T^(2) and a multilayer convolutional bidirectional long short-term memory(MSC_BiLSTM)classifier model for network traffic intrusion detection.This method reduces the parameters and redundancy of the model by feature extraction and extracts the dependent features between the data by a bidirectional long short-term memory(BiLSTM)network,which fully considers the influence between the before and after features.The network traffic is first characteristically downscaled by principal component analysis(PCA),and then the downscaled principal components are used as input to Hotelling’s T^(2) to compare the differences between groups.For datasets with outliers,Hotelling’s T^(2) can help identify the groups where the outliers are located and quantitatively measure the extent of the outliers.Finally,a multilayer convolutional neural network and a BiLSTM network are used to extract the spatial and temporal features of network traffic data.The empirical consequences exhibit that the suggested approach in this manuscript attains superior outcomes in precision,recall and F1-score juxtaposed with the prevailing techniques.The results show that the intrusion detection accuracy,precision,and F1-score of the proposed MSC_BiLSTM model for the CIC-IDS 2017 dataset are 98.71%,95.97%,and 90.22%. 展开更多
关键词 Network intrusion traffic detection PCA Hotelling’s T^(2) BiLSTM
在线阅读 下载PDF
Joint Allocation of Computing and Connectivity Resources in Survivable Inter-Datacenter Elastic Optical Networks
3
作者 Yang Tao Li Yang Chen Xue 《China Communications》 SCIE CSCD 2024年第8期172-181,共10页
Inter-datacenter elastic optical networks(EON)need to provide the service for the requests of cloud computing that require not only connectivity and computing resources but also network survivability.In this paper,to ... Inter-datacenter elastic optical networks(EON)need to provide the service for the requests of cloud computing that require not only connectivity and computing resources but also network survivability.In this paper,to realize joint allocation of computing and connectivity resources in survivable inter-datacenter EONs,a survivable routing,modulation level,spectrum,and computing resource allocation algorithm(SRMLSCRA)algorithm and three datacenter selection strategies,i.e.Computing Resource First(CRF),Shortest Path First(SPF)and Random Destination(RD),are proposed for different scenarios.Unicast and manycast are applied to the communication of computing requests,and the routing strategies are calculated respectively.Simulation results show that SRMLCRA-CRF can serve the largest amount of protected computing tasks,and the requested calculation blocking probability is reduced by 29.2%,28.3%and 30.5%compared with SRMLSCRA-SPF,SRMLSCRA-RD and the benchmark EPS-RMSA algorithms respectively.Therefore,it is more applicable to the networks with huge calculations.Besides,SRMLSCRA-SPF consumes the least spectrum,thereby exhibiting its suitability for scenarios where the amount of calculation is small and communication resources are scarce.The results demonstrate that the proposed methods realize the joint allocation of computing and connectivity resources,and could provide efficient protection for services under single-link failure and occupy less spectrum. 展开更多
关键词 computing and connectivity interdatacenter networks joint resource allocation service protection
在线阅读 下载PDF
The Caching and Pricing Strategy for Information-Centric Networking with Advertisers’Participation
4
作者 Zheng Quan Yan Wenliang +4 位作者 Wu Rong Tan Xiaobin Yang Jian Yuan Liu Xu Zhenghuan 《China Communications》 SCIE CSCD 2024年第3期283-295,共13页
As users’access to the network has evolved into the acquisition of mass contents instead of IP addresses,the IP network architecture based on end-to-end communication cannot meet users’needs.Therefore,the Informatio... As users’access to the network has evolved into the acquisition of mass contents instead of IP addresses,the IP network architecture based on end-to-end communication cannot meet users’needs.Therefore,the Information-Centric Networking(ICN)came into being.From a technical point of view,ICN is a promising future network architecture.Researching and customizing a reasonable pricing mechanism plays a positive role in promoting the deployment of ICN.The current research on ICN pricing mechanism is focused on paid content.Therefore,we study an ICN pricing model for free content,which uses game theory based on Nash equilibrium to analysis.In this work,advertisers are considered,and an advertiser model is established to describe the economic interaction between advertisers and ICN entities.This solution can formulate the best pricing strategy for all ICN entities and maximize the benefits of each entity.Our extensive analysis and numerical results show that the proposed pricing framework is significantly better than existing solutions when it comes to free content. 展开更多
关键词 ADVERTISERS CACHE free content Information-Centric Networking pricing strategy
在线阅读 下载PDF
Bridging 2D and 3D Object Detection:Advances in Occlusion Handling through Depth Estimation
5
作者 Zainab Ouardirhi Mostapha Zbakh Sidi Ahmed Mahmoudi 《Computer Modeling in Engineering & Sciences》 2025年第6期2509-2571,共63页
Object detection in occluded environments remains a core challenge in computer vision(CV),especially in domains such as autonomous driving and robotics.While Convolutional Neural Network(CNN)-based twodimensional(2D)a... Object detection in occluded environments remains a core challenge in computer vision(CV),especially in domains such as autonomous driving and robotics.While Convolutional Neural Network(CNN)-based twodimensional(2D)and three-dimensional(3D)object detection methods havemade significant progress,they often fall short under severe occlusion due to depth ambiguities in 2D imagery and the high cost and deployment limitations of 3D sensors such as Light Detection and Ranging(LiDAR).This paper presents a comparative review of recent 2D and 3D detection models,focusing on their occlusion-handling capabilities and the impact of sensor modalities such as stereo vision,Time-of-Flight(ToF)cameras,and LiDAR.In this context,we introduce FuDensityNet,our multimodal occlusion-aware detection framework that combines Red-Green-Blue(RGB)images and LiDAR data to enhance detection performance.As a forward-looking direction,we propose a monocular depth-estimation extension to FuDensityNet,aimed at replacing expensive 3D sensors with a more scalable CNN-based pipeline.Although this enhancement is not experimentally evaluated in this manuscript,we describe its conceptual design and potential for future implementation. 展开更多
关键词 Object detection occlusion handling multimodal fusion MONOCULAR 3D sensors depth estimation
在线阅读 下载PDF
Ultrashort-Term Power Prediction of Distributed Photovoltaic Based on Variational Mode Decomposition and Channel Attention Mechanism
6
作者 Zhebin Sun Wei Wang +6 位作者 Mingxuan Du Tao Liang Yang Liu Hailong Fan Cuiping Li Xingxu Zhu Junhui Li 《Energy Engineering》 2025年第6期2155-2175,共21页
Responding to the stochasticity and uncertainty in the power height of distributed photovoltaic power generation.This paper presents a distributed photovoltaic ultra-short-term power forecasting method based on Variat... Responding to the stochasticity and uncertainty in the power height of distributed photovoltaic power generation.This paper presents a distributed photovoltaic ultra-short-term power forecasting method based on Variational Mode Decomposition(VMD)and Channel Attention Mechanism.First,Pearson’s correlation coefficient was utilized to filter out the meteorological factors that had a high impact on historical power.Second,the distributed PV power data were decomposed into a relatively smooth power series with different fluctuation patterns using variational modal decomposition(VMD).Finally,the reconstructed distributed PV power as well as other features are input into the combined CNN-SENet-BiLSTM model.In this model,the convolutional neural network(CNN)and channel attention mechanism dynamically adjust the weights while capturing the spatial features of the input data to improve the discriminative ability of key features.The extracted data is then fed into the bidirectional long short-term memory network(BiLSTM)to capture the time-series features,and the final output is the prediction result.The verification is conducted using a dataset from a distributed photovoltaic power station in the Northwest region of China.The results show that compared with other prediction methods,the method proposed in this paper has a higher prediction accuracy,which helps to improve the proportion of distributed PV access to the grid,and can guarantee the safe and stable operation of the power grid. 展开更多
关键词 Distributed photovoltaic power channel attention mechanism convolutional neural network bidirectional long short-term memory network
在线阅读 下载PDF
ONTDAS: An Optimized Noise-Based Traffic Data Augmentation System for Generalizability Improvement of Traffic Classifiers
7
作者 Rongwei Yu Jie Yin +2 位作者 Jingyi Xiang Qiyun Shao Lina Wang 《Computers, Materials & Continua》 2025年第7期365-391,共27页
With the emergence of new attack techniques,traffic classifiers usually fail to maintain the expected performance in real-world network environments.In order to have sufficient generalizability to deal with unknown ma... With the emergence of new attack techniques,traffic classifiers usually fail to maintain the expected performance in real-world network environments.In order to have sufficient generalizability to deal with unknown malicious samples,they require a large number of new samples for retraining.Considering the cost of data collection and labeling,data augmentation is an ideal solution.We propose an optimized noise-based traffic data augmentation system,ONTDAS.The system uses a gradient-based searching algorithm and an improved Bayesian optimizer to obtain optimized noise.The noise is injected into the original samples for data augmentation.Then,an improved bagging algorithm is used to integrate all the base traffic classifiers trained on noised datasets.The experiments verify ONTDAS on 6 types of base classifiers and 4 publicly available datasets respectively.The results show that ONTDAS can effectively enhance the traffic classifiers’performance and significantly improve their generalizability on unknown malicious samples.The system can also alleviate dataset imbalance.Moreover,the performance of ONTDAS is significantly superior to the existing data augmentation methods mentioned. 展开更多
关键词 Unknown malicious traffic classification data augmentation optimized noise generalizability improvement ensemble learning
在线阅读 下载PDF
Wavelength- and structure-insensitive on-chip mode manipulation based on the Thouless pumping mechanism
8
作者 Yingdi Pan Lu Sun +8 位作者 Jingchi Li Qiyao Sun Pan Hu Songyue Liu Qi Lu Xiong Ni Xintao He Jianwen Dong Yikai Su 《Advanced Photonics Nexus》 2025年第3期131-140,共10页
Coupled-waveguide devices are essential in photonic integrated circuits for coupling,polarization handling,and mode manipulation.However,the performance of these devices usually suffers from high wavelength and struct... Coupled-waveguide devices are essential in photonic integrated circuits for coupling,polarization handling,and mode manipulation.However,the performance of these devices usually suffers from high wavelength and structure sensitivity,which makes it challenging to realize broadband and reliable on-chip optical functions.Recently,topological pumping of edge states has emerged as a promising solution for implementing robust optical couplings.In this paper,we propose and experimentally demonstrate broadband on-chip mode manipulation with very large fabrication tolerance based on the Rice–Mele modeled silicon waveguide arrays.The Thouless pumping mechanism is employed in the design to implement broadband and robust mode conversion and multiplexing.The experimental results prove that various mode-order conversions with low insertion losses and intermodal crosstalk can be achieved over a broad bandwidth of 80 nm ranging from 1500 to 1580 nm.Thanks to such a topological design,the device has a remarkable fabrication tolerance of±70 nm for the structural deviations in waveguide width and gap distance,which is,to the best of our knowledge,the highest among the coupled-waveguide mode-handling devices reported so far.As a proof-of-concept experiment,we cascade the topological mode-order converters to form a four-channel mode-division multiplexer and demonstrate the transmission of a 200-Gb/s 16-quadrature amplitude modulation signal for each mode channel,with the bit error rates below the 7%forward error correction threshold of 3.8×10^(-3).We reveal the possibility of developing new classes of broadband and fabrication-tolerant coupled-waveguide devices with topological photonic approaches,which may find applications in many fields,including optical interconnects,quantum communications,and optical computing. 展开更多
关键词 topological photonics Thouless pumping coupled-waveguide device on-chip mode manipulation
在线阅读 下载PDF
Direct detection with an optimal transfer function:toward the electrical spectral efficiency of coherent homodyne detection
9
作者 Xingfeng Li Jingchi Li +5 位作者 Xiong Ni Hudi Liu Qunbi Zhuge Haoshuo Chen William Shieh Yikai Su 《Opto-Electronic Science》 2025年第2期1-15,共15页
Complex-valued double-sideband direct detection(DD)can reconstruct the optical field and achieve a high electrical spectral efficiency(ESE)comparable to that of a coherent homodyne receiver,and DD does not require a c... Complex-valued double-sideband direct detection(DD)can reconstruct the optical field and achieve a high electrical spectral efficiency(ESE)comparable to that of a coherent homodyne receiver,and DD does not require a costly local oscillator laser.However,a fundamental question remains if there is an optimal DD receiver structure with the simplest design to approach the performance of the coherent homodyne detection.This study derives the optimal DD receiver structure with an optimal transfer function to recover a quadrature amplitude modulation(QAM)signal with a near-zero guard band at the central frequency of the signal.We derive the theoretical ESE limit for various detection schemes by invoking Shannon’s formula.Our proposed scheme is closest to coherent homodyne detection in terms of the theoretical ESE limit.By leveraging a WaveShaper to construct the optimal transfer function,we conduct a proof-of-concept experiment to transmit a net 228.85-Gb/s 64-QAM signal over an 80-km single-mode fiber with a net ESE of 8.76 b/s/Hz.To the best of our knowledge,this study reports the highest net ESE per polarization per wavelength for DD transmission beyond 40-km single-mode fiber.For a comprehensive metric,denoted as 2ESE×Reach,we achieve the highest 2ESE×Reach per polarization per wavelength for DD transmission. 展开更多
关键词 optical communication direct detection optical field recovery electrical spectral efficiency
在线阅读 下载PDF
Computing Power Network:The Architecture of Convergence of Computing and Networking towards 6G Requirement 被引量:53
10
作者 Xiongyan Tang Chang Cao +4 位作者 Youxiang Wang Shuai Zhang Ying Liu Mingxuan Li Tao He 《China Communications》 SCIE CSCD 2021年第2期175-185,共11页
In 6G era,service forms in which computing power acts as the core will be ubiquitous in the network.At the same time,the collaboration among edge computing,cloud computing and network is needed to support edge computi... In 6G era,service forms in which computing power acts as the core will be ubiquitous in the network.At the same time,the collaboration among edge computing,cloud computing and network is needed to support edge computing service with strong demand for computing power,so as to realize the optimization of resource utilization.Based on this,the article discusses the research background,key techniques and main application scenarios of computing power network.Through the demonstration,it can be concluded that the technical solution of computing power network can effectively meet the multi-level deployment and flexible scheduling needs of the future 6G business for computing,storage and network,and adapt to the integration needs of computing power and network in various scenarios,such as user oriented,government enterprise oriented,computing power open and so on. 展开更多
关键词 6G edge computing cloud computing convergence of cloud and network computing power network
在线阅读 下载PDF
A Novel Optical Burst Mesh Network with Optical Time Slot Interchange at Source Nodes 被引量:1
11
作者 熊前进 邓宁 +2 位作者 薛青松 李沫 龚国伟 《China Communications》 SCIE CSCD 2013年第4期70-78,共9页
In this paper, we propose an optical burst network architecture supporting the ge- netic mesh topology. The intermediate node architecture of the mesh network can be the same with current wavelength switching Wave- le... In this paper, we propose an optical burst network architecture supporting the ge- netic mesh topology. The intermediate node architecture of the mesh network can be the same with current wavelength switching Wave- length Division Multiplexing (WDM) net- works, and thus can reuse existing deployed infrastructure. We employ a novel Optical Time Slot Interchange (OTSI) at the source nodes for the first time to mitigate the burst conten- tion and to increase the bandwidth utilization. Time- and wavelength-domain reuse in the OTSI significantly saves optical components and red- uces blocking probability. 展开更多
关键词 SDN OTN MPLS OTSI ROADM Optical Burst Mesh Network WDM WSS
在线阅读 下载PDF
Automatic Classification of Superimposed Modulations for 5G MIMO Two-Way Cognitive Relay Networks 被引量:1
12
作者 Haithem Ben Chikha Ahmad Almadhor 《Computers, Materials & Continua》 SCIE EI 2022年第1期1799-1814,共16页
To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the cl... To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the classification of superimposed modulations dedicated to 5G multipleinput multiple-output(MIMO)two-way cognitive relay network in realistic channels modeled with Nakagami-m distribution.Our purpose consists of classifying pairs of users modulations from superimposed signals.To achieve this goal,we apply the higher-order statistics in conjunction with the Multi-BoostAB classifier.We use several efficiency metrics including the true positive(TP)rate,false positive(FP)rate,precision,recall,F-Measure and receiver operating characteristic(ROC)area in order to evaluate the performance of the proposed algorithm in terms of correct superimposed modulations classification.Computer simulations prove that our proposal allows obtaining a good probability of classification for ten superimposed modulations at a low signal-to-noise ratio,including the worst case(i.e.,m=0.5),where the fading distribution follows a one-sided Gaussian distribution.We also carry out a comparative study between our proposal usingMultiBoostAB classifier with the decision tree(J48)classifier.Simulation results show that the performance of MultiBoostAB on the superimposed modulations classifications outperforms the one of J48 classifier.In addition,we study the impact of the symbols number,path loss exponent and relay position on the performance of the proposed automatic classification superimposed modulations in terms of probability of correct classification. 展开更多
关键词 Automatic classification MIMO two-way cognitive relay network Nakagami-m channels superimposed modulations 5G
在线阅读 下载PDF
The Acquisition of Sand Vibration Information in Hinterland of Desert Based on Advanced Remote Sensing System and Network Technologies
13
作者 马鑫 邓顺戈 李新碗 《Journal of Shanghai Jiaotong university(Science)》 EI 2018年第1期28-32,共5页
The deep understanding on sand and sand dunes scale can be useful to reveal the formation mechanism of the sandstorm for early sandstorm forecast. The current sandstorm observation methods are mainly based on conventi... The deep understanding on sand and sand dunes scale can be useful to reveal the formation mechanism of the sandstorm for early sandstorm forecast. The current sandstorm observation methods are mainly based on conventional meteorological station and satellites remote sensing, which are difficult to acquire sand scale information. A wireless sensing network is implemented in the hinterland of desert, which includes ad hoc network,sensor, global positioning system(GPS) and system integration technology. The wireless network is a three-layer architecture and daisy chain topology network, which consists of control station, master robots and slave robots.Every three robots including one master robot and its two slave robots forms an ad hoc network. Master robots directly communicate with radio base station. Information will be sent to remote information center. Data sensing system including different kinds of sensors and desert robots is developed. A desert robot is designed and implemented as unmanned probing movable nodes and sensors' carrier. A new optical fiber sensor is exploited to measure vibration of sand in particular. The whole system, which is delivered to the testing field in hinterland of desert(25 km far from base station), has been proved efficient for data acquisition. 展开更多
关键词 SANDSTORM sand-scale information optical fiber sensor desert robot wireless sensor network
原文传递
Performance analysis of quantum access network using code division multiple access model
14
作者 胡林曦 杨灿 何广强 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第6期37-41,共5页
A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of ... A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently,the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. 展开更多
关键词 quantum access network chaotic phase shifter code division multiple access
原文传递
Enhancement of MTC Performance in LTE Networks by Maximizing Random Access Procedure Throughput
15
作者 Ibraheem M. Fayed Eman S. El-Din 《Journal of Electrical Engineering》 2018年第1期40-45,共6页
A fundamental requirement for any cellular system is the possibility for the device to request a connection setup, commonly referred to as random access procedure. In LTE (long term evolution) networks, the distribu... A fundamental requirement for any cellular system is the possibility for the device to request a connection setup, commonly referred to as random access procedure. In LTE (long term evolution) networks, the distribution of a limited number of radio resources among H2H (Human-to-Human) users and increasing number of MTC (Machine-Type-Communication) devices in M2M (Machine-to-Machine) communications is one of the main problems. An analytical model is conducted to compute the throughput for message 1 and message 2. This is done using a Markov chain model for the four messages signaling flow with buffering for message 4. This model is used in LTE 3GPP (Third-Generation Partnership Project) random access. The network performance will be enhanced by determining a dedicated arrival rate corresponding to maximum throughput of message 2 that will assist the network planner to optimize the network performance. In this paper, a deduced arrival rate less than 3.333 requests/ms will maximize network throughput. 展开更多
关键词 MTC (machine type communication) M2M LTE network random access procedure.
在线阅读 下载PDF
A NOVEL FRAMEWORK OF ONLINE NETWORK CODING FOR MULTICAST SWITCHES WITH CONSTRAINED BUFFERS
16
作者 Wang Wei Yu Li +1 位作者 Zhu Guangxi Li Hui 《Journal of Electronics(China)》 2011年第4期460-467,共8页
Network coding is able to address output conflicts when fanout splitting is allowed for multicast switching.Hence,it successfully achieves a larger rate region than non-coding approaches in crossbar switches.However,n... Network coding is able to address output conflicts when fanout splitting is allowed for multicast switching.Hence,it successfully achieves a larger rate region than non-coding approaches in crossbar switches.However,network coding requires large coding buffers and a high computational cost on encoding and decoding.In this paper,we propose a novel Online Network Coding framework called Online NC for multicast switches,which is adaptive to constrained buffers.Moreover,it enjoys a much lower decoding complexity by a Vandermonde matrix based approach,as compared to conven-tional randomized network coding Our approach realizes online coding with one coding algo-rithm that synchronizes buffering and coding.Therefore,we significantly reduce requirements on buffer space,while also sustaining high throughputs.We confirm the superior advantages of our contributions using empirical studies. 展开更多
关键词 Packet switching MULTICAST Network coding Vandermonde matrix
在线阅读 下载PDF
Analysis of Different Call Admission Control Strategies and Its Impact on the Performance of LTE-Advanced Networks
17
作者 Mahammad A. Safwat Hesham M. El-Badawy +1 位作者 Ahmad Yehya Hosni El-Motaafy 《Communications and Network》 2014年第2期137-154,共18页
The call admission control (CAC) optimizes the use of allocated channels against offered traffic maintaining the required quality of service (QoS). Provisioning QoS to user at cell-edge is a challenge where there is l... The call admission control (CAC) optimizes the use of allocated channels against offered traffic maintaining the required quality of service (QoS). Provisioning QoS to user at cell-edge is a challenge where there is limitation in cell resources due to inter-cell interference (ICI). Soft Frequency Reuse is ICI mitigation scheme that controls the distribution of resources between users. In this paper, the Impact of four CAC schemes (Cutoff Priority scheme (CP), Uniform Fractional Guard Channel (UFGC), Limited Fractional Guard Channel (LFGC), New Call Bounding (NCB) scheme) at cell-edge have investigated using queuing analysis in a comparative manner. The comparison is based on two criteria. The first criterion guarantees a particular level of service to already admitted users while trying to optimize the revenue obtained. The second criterion determines the minimum of number of radio resources that provides hard constraints in both of blocking and dropping probabilities. The four schemes are compared at different scenarios of new and handover call arrival rates. 展开更多
关键词 CALL ADMISSION Control SOFT Frequency REUSE QOS
在线阅读 下载PDF
Performance Assessment for LTE-Advanced Networks with Uniform Fractional Guard Channel over Soft Frequency Reuse Scheme
18
作者 Mahammad A. Safwat Hesham M. El-Badawy +1 位作者 Ahmad Yehya Hosni El-Motaafy 《Wireless Engineering and Technology》 2013年第4期161-170,共10页
Dropping probability of handoff calls and blocking probability of new calls are two important Quality of Service (QoS) measures for LTE-Advanced networks. Applying QoS for Cell edge users in soft frequency reuse schem... Dropping probability of handoff calls and blocking probability of new calls are two important Quality of Service (QoS) measures for LTE-Advanced networks. Applying QoS for Cell edge users in soft frequency reuse scheme in LTE system is a challenge as they already suffer from limited resources. Assigning some resources for handover calls may enhance dropping probability but this is in price of degradation in the blocking probability for new calls in cell-edge. Uniform Fractional Guard Channel (UFGC) is a call admission policy that provides QoS without reserving resources for handover calls. In this paper, the performance of Soft Frequency Reuse (SFR) in presence of Uniform Fractional Guard Channel (UFGC) will be investigated using queuing analysis. The mathematical model and performance metrics will be deduced in this assessment. The impact of UFGC will be evaluated in edge and core part separately. Then the optimal value for the parameter of UFGC will be obtained to minimize the blocking probability of new calls with the constraint on the upper bound on the dropping probability of handoff calls. 展开更多
关键词 Soft Frequency REUSE QUEUING UNIFORM FRACTIONAL GUARD Channel
在线阅读 下载PDF
Beyond 200-Gb/s O-band intensity modulation and direct detection optics with joint look-uptable- based predistortion and digital resolution enhancement for low-cost data center interconnects 被引量:1
19
作者 Qi Wu Zhaopeng Xu +10 位作者 Yixiao Zhu Tonghui Ji Honglin Ji Yu Yang Junpeng Liang Chen Cheng Gang Qiao Zhixue He Jinlong Wei Qunbi Zhuge Weisheng Hu 《Advanced Photonics Nexus》 2024年第3期58-67,共10页
We propose a joint look-up-table(LUT)-based nonlinear predistortion and digital resolution enhancement scheme to achieve high-speed and low-cost optical interconnects using low-resolution digital-to-analog converters(... We propose a joint look-up-table(LUT)-based nonlinear predistortion and digital resolution enhancement scheme to achieve high-speed and low-cost optical interconnects using low-resolution digital-to-analog converters(DACs).The LUT-based predistortion is employed to mitigate the patterndependent effect(PDE)of a semiconductor optical amplifier(SOA),while the digital resolution enhancer(DRE)is utilized to shape the quantization noise,lowering the requirement for the resolution of DAC.We experimentally demonstrate O-band intensity modulation and direct detection(IM/DD)transmission of 124-GBd 4∕6-level pulse-amplitude modulation ePAMT-4∕6 and 112-GBd PAM-8 signals over a 2-km standard single-mode fiber(SSMF)with 3∕3.5∕4-bit DACs.In the case of 40-km SSMF transmission with an SOAbased preamplifier,124-GBd on-off-keying(OOK)/PAM-3/PAM-4 signals are successfully transmitted with 1.5∕2∕3-bit DACs.To the best of our knowledge,we have achieved the highest net data rates of 235.3-Gb∕s PAM-4,289.7-Gb∕s PAM-6,and 294.7 Gb∕s PAM-8 signals over 2-km SSMF,as well as 117.6-Gb∕s OOK,173.8-Gb∕s PAM-3,and−231.8 Gb∕s PAM-4 signals over 40-km SSMF,employing low-resolution DACs.The experimental results reveal that the joint LUT-based predistortion and DRE effectively mitigate the PDE and improve the signal-to-quantization noise ratio by shaping the noise.The proposed scheme can provide a powerful solution for low-cost IM/DD optical interconnects beyond 200 Gb∕s. 展开更多
关键词 look-up-table digital resolution enhancer quantization noise semiconductor optical amplifier pattern-dependent effect pulse-amplitude modulation.
在线阅读 下载PDF
Spatio-Temporal Variability of Rainfall and Temperature and Their Effects on Pasture Variability over East Africa: Implication on the Cattle Grazing Areas
20
作者 Natiko Peter Wang Wen +2 位作者 Nyasulu Matthews Raharivelo Sitraka Ny Aina Alupot Donnata 《Journal of Geoscience and Environment Protection》 2024年第3期54-69,共16页
Understanding the spatiotemporal variability of climatic parameters and their effects on pasture variability is vital for pasture management interventions over East Africa. The present study aims to assess the spatial... Understanding the spatiotemporal variability of climatic parameters and their effects on pasture variability is vital for pasture management interventions over East Africa. The present study aims to assess the spatial-temporal variability of rainfall, temperature and Normalized Difference Vegetation Index (NDVI) (which is being used to assess pasture quality and productivity) over the region, between the period of 1982 and 2019. This study used annual mean values for rainfall, temperature and NDVI which were calculated for the period mentioned above. NDVI was derived from National Oceanic and Atmospheric Administration (NOAA) Global Area Cover (GAC) (NOAA-07-GAC) data. The rainfall data was acquired from the Climate Hazards Group Infrared Precipitation with Station (CHIRPS) while temperature is ERA5 reanalysis data sourced from the European Centre for Medium-Range Weather Forecasts (ECMWF). The study utilized the empirical orthogonal function (EOF) to identify patterns and dominant relationships between the climate variables. The correlation was calculated between rainfall, temperature and NDVI to assess the relationship among them. A non-parametric Mann-Kendall trends test was used to determine whether annual precipitation, temperature and NDVI had statistically increasing or decreasing trend. Results revealed a positive correlation between rainfall and NDVI while a negative correlation between NDVI and temperature. Positive correlation between rainfall and NDVI indicates that pasture health (quality and productivity), will improve accordingly. A negative correlation between temperature and NDVI indicates that pasture health will decrease with increase in temperature while improving with decreasing temperature. Outcome from this study suggests that changes in climatic variables influence the distribution of pasture in East Africa’s cattle grazing areas. The study hence recommends prioritisation of climatic (weather) information during pasture management over East Africa. 展开更多
关键词 NDVI Climatic Parameters EOF PASTURE East Africa
在线阅读 下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部