Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social ...Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social Relations(MSRR)in SIoT to solve this problem.The proposed algorithm separates message forwarding into intra-and cross-community forwarding by analyzing interest traits and social connections among nodes.Three new metrics are defined:the intensity of node social relationships,node activity,and community connectivity.Within the community,messages are sent by determining which node is most similar to the sender by weighing the strength of social connections and node activity.When a node performs cross-community forwarding,the message is forwarded to the most reasonable relay community by measuring the node activity and the connection between communities.The proposed algorithm was compared to three existing routing algorithms in simulation experiments.Results indicate that the proposed algorithmsubstantially improves message delivery efficiency while lessening network overhead and enhancing connectivity and coordination in the SIoT context.展开更多
The cloud radio access network(C-RAN) has recently been proposed as an important component of the next generation wireless networks providing opportunities for improving both spectral and energy effi ciencies. The per...The cloud radio access network(C-RAN) has recently been proposed as an important component of the next generation wireless networks providing opportunities for improving both spectral and energy effi ciencies. The performance of this network structure is however constrained by severe inter-cell interference due to the limited capacity of fronthaul between the radio remote heads(RRH) and the base band unit(BBU) pool. To achieve performance improvement taking full advantage of centralized processing capabilities of C-RANs,a set of RRHs can jointly transmit data to the same UE for improved spectral effi ciency. In this paper,a user centralized joint coordinated transmission(UC-JCT) scheme is put forth to investigate the downlink performance of C-RANs. The most important benefit the proposed strategy is the ability to translate what would have been the most dominant interfering sources to usable signal leading to a signifi cantly improved performance. Stochastic geometry is utilized to model the randomness of RRH location and provides a reliable performance analysis. We derive an analytical expression for the closed integral form of the coverage probability of a typical UE. Simulation results confirm the accuracy of our analysis and demonstrate that significant performance gain can be achieved from the proposed coordination schemes.展开更多
Advanced wireless standards of communication like 3GPP and LTE are becoming more and more efficient and with this evolution of communication systems mobile equipment is also become smaller and smaller. Power amplifier...Advanced wireless standards of communication like 3GPP and LTE are becoming more and more efficient and with this evolution of communication systems mobile equipment is also become smaller and smaller. Power amplifier designing has become a very crucial task in this era where efficiency and size are the main concern of any designer. In this paper we have design and analyzed X-band Class E Metal-semiconductor field effect transistor(MESFET) based Power Amplifier. This device targets the devices which use OFDM technique to improve their spectral efficiency for the next generation communication systems. Microstrip lines are used to achieve small size for our design instead of lumped components. Load Pull measurements are used to get MESFET input and output impedances optimum values. For linear and non linear operation small signal mathematical model of the design is used. To reduce thermal losses FR4 substrate is used to increase PA efficiency. Our designs shows small values of input and output return loss of about-22.3d B and-23.716 d B achieving a high gain of about25.6 d B respectively, with PAE of about 30 % having stability factor greater than 1 and 21.894 d Bm of output power.展开更多
Non-Orthogonal Multiple Access(NOMA)has emerged as a novel air interface technology for massive connectivity in Sixth-Generation(6G)era.The recent integration of NOMA in Backscatter Communication(BC)has triggered sign...Non-Orthogonal Multiple Access(NOMA)has emerged as a novel air interface technology for massive connectivity in Sixth-Generation(6G)era.The recent integration of NOMA in Backscatter Communication(BC)has triggered significant research interest due to its applications in low-powered Internet of Things(IoT)networks.However,the link security aspect of these networks has not been well investigated.This article provides a new optimization framework for improving the physical layer security of the NOMA ambient BC system.Our system model takes into account the simultaneous operation of NOMA IoT users and the Backscatter Node(BN)in the presence of multiple EavesDroppers(EDs).The EDs in the surrounding area can overhear the communication of Base Station(BS)and BN due to the wireless broadcast transmission.Thus,the chief aim is to enhance link security by optimizing the BN reflection coefficient and BS transmit power.To gauge the performance of the proposed scheme,we also present the suboptimal NOMA and conventional orthogonal multiple access as benchmark schemes.Monte Carlo simulation results demonstrate the superiority of the NOMA BC scheme over the pure NOMA scheme without the BC and conventional orthogonal multiple access schemes in terms of system secrecy rate.展开更多
Fog Radio Access Networks(F-RANs)have been considered a groundbreaking technique to support the services of Internet of Things by leveraging edge caching and edge computing.However,the current contributions in computa...Fog Radio Access Networks(F-RANs)have been considered a groundbreaking technique to support the services of Internet of Things by leveraging edge caching and edge computing.However,the current contributions in computation offloading and resource allocation are inefficient;moreover,they merely consider the static communication mode,and the increasing demand for low latency services and high throughput poses tremendous challenges in F-RANs.A joint problem of mode selection,resource allocation,and power allocation is formulated to minimize latency under various constraints.We propose a Deep Reinforcement Learning(DRL)based joint computation offloading and resource allocation scheme that achieves a suboptimal solution in F-RANs.The core idea of the proposal is that the DRL controller intelligently decides whether to process the generated computation task locally at the device level or offload the task to a fog access point or cloud server and allocates an optimal amount of computation and power resources on the basis of the serving tier.Simulation results show that the proposed approach significantly minimizes latency and increases throughput in the system.展开更多
Verifiable computation (VC) paradigm has got the captivation that in real term is highlighted by the concept of third party computation. In more explicate terms, VC allows resource constrained clients/organizations ...Verifiable computation (VC) paradigm has got the captivation that in real term is highlighted by the concept of third party computation. In more explicate terms, VC allows resource constrained clients/organizations to securely outsource expensive computations to untrusted service providers, while acquiring the publicly or privately verifiable results. Many mainstream solutions have been proposed to address the diverse problems within the VC domain. Some of them imposed assumptions over performed computations, while the others took advantage of interactivity /non-interactivity, zero knowledge proofs, and arguments. Further proposals utilized the powers of probabilistic checkable or computationally sound proofs. In this survey, we present a chronological study and classify the VC proposals based on their adopted domains. First, we provide a broader overview of the theoretical advancements while critically analyzing them. Subsequently, we present a comprehensive view of their utilization in the state of the art VC approaches. Moreover, a brief overview of recent proof based VC systems is also presented that lifted up the VC domain to the verge of practicality. We use the presented study and reviewed resuits to identify the similarities and alterations, modifications, and hybridization of different approaches, while comparing their advantages and reporting their overheads. Finally, we discuss implementation of such VC based systems, their applications, and the likely future directions.展开更多
基金supported by the NationalNatural Science Foundation of China(61972136)the Hubei Provincial Department of Education Outstanding Youth Scientific Innovation Team Support Foundation(T201410,T2020017)+1 种基金the Natural Science Foundation of Xiaogan City(XGKJ2022010095,XGKJ2022010094)the Science and Technology Research Project of Education Department of Hubei Province(No.Q20222704).
文摘Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social Relations(MSRR)in SIoT to solve this problem.The proposed algorithm separates message forwarding into intra-and cross-community forwarding by analyzing interest traits and social connections among nodes.Three new metrics are defined:the intensity of node social relationships,node activity,and community connectivity.Within the community,messages are sent by determining which node is most similar to the sender by weighing the strength of social connections and node activity.When a node performs cross-community forwarding,the message is forwarded to the most reasonable relay community by measuring the node activity and the connection between communities.The proposed algorithm was compared to three existing routing algorithms in simulation experiments.Results indicate that the proposed algorithmsubstantially improves message delivery efficiency while lessening network overhead and enhancing connectivity and coordination in the SIoT context.
基金supported in part by the National Natural Science Foundation of China (Grant No. 61222103)the Beijing Natural Science Foundation (Grant No. 4131003)+1 种基金the Specialized Research Fund for the Doctoral Program of Higher Education (SRFDP) (Grant No. 20120005140002)the National High Technology Research and Development Program (863 Program) of China under Grant No. 2014AA01A707
文摘The cloud radio access network(C-RAN) has recently been proposed as an important component of the next generation wireless networks providing opportunities for improving both spectral and energy effi ciencies. The performance of this network structure is however constrained by severe inter-cell interference due to the limited capacity of fronthaul between the radio remote heads(RRH) and the base band unit(BBU) pool. To achieve performance improvement taking full advantage of centralized processing capabilities of C-RANs,a set of RRHs can jointly transmit data to the same UE for improved spectral effi ciency. In this paper,a user centralized joint coordinated transmission(UC-JCT) scheme is put forth to investigate the downlink performance of C-RANs. The most important benefit the proposed strategy is the ability to translate what would have been the most dominant interfering sources to usable signal leading to a signifi cantly improved performance. Stochastic geometry is utilized to model the randomness of RRH location and provides a reliable performance analysis. We derive an analytical expression for the closed integral form of the coverage probability of a typical UE. Simulation results confirm the accuracy of our analysis and demonstrate that significant performance gain can be achieved from the proposed coordination schemes.
基金supported by the National Natural Science Foundation of China (Grant no.61571063, 61472357, 61501100)
文摘Advanced wireless standards of communication like 3GPP and LTE are becoming more and more efficient and with this evolution of communication systems mobile equipment is also become smaller and smaller. Power amplifier designing has become a very crucial task in this era where efficiency and size are the main concern of any designer. In this paper we have design and analyzed X-band Class E Metal-semiconductor field effect transistor(MESFET) based Power Amplifier. This device targets the devices which use OFDM technique to improve their spectral efficiency for the next generation communication systems. Microstrip lines are used to achieve small size for our design instead of lumped components. Load Pull measurements are used to get MESFET input and output impedances optimum values. For linear and non linear operation small signal mathematical model of the design is used. To reduce thermal losses FR4 substrate is used to increase PA efficiency. Our designs shows small values of input and output return loss of about-22.3d B and-23.716 d B achieving a high gain of about25.6 d B respectively, with PAE of about 30 % having stability factor greater than 1 and 21.894 d Bm of output power.
文摘Non-Orthogonal Multiple Access(NOMA)has emerged as a novel air interface technology for massive connectivity in Sixth-Generation(6G)era.The recent integration of NOMA in Backscatter Communication(BC)has triggered significant research interest due to its applications in low-powered Internet of Things(IoT)networks.However,the link security aspect of these networks has not been well investigated.This article provides a new optimization framework for improving the physical layer security of the NOMA ambient BC system.Our system model takes into account the simultaneous operation of NOMA IoT users and the Backscatter Node(BN)in the presence of multiple EavesDroppers(EDs).The EDs in the surrounding area can overhear the communication of Base Station(BS)and BN due to the wireless broadcast transmission.Thus,the chief aim is to enhance link security by optimizing the BN reflection coefficient and BS transmit power.To gauge the performance of the proposed scheme,we also present the suboptimal NOMA and conventional orthogonal multiple access as benchmark schemes.Monte Carlo simulation results demonstrate the superiority of the NOMA BC scheme over the pure NOMA scheme without the BC and conventional orthogonal multiple access schemes in terms of system secrecy rate.
文摘Fog Radio Access Networks(F-RANs)have been considered a groundbreaking technique to support the services of Internet of Things by leveraging edge caching and edge computing.However,the current contributions in computation offloading and resource allocation are inefficient;moreover,they merely consider the static communication mode,and the increasing demand for low latency services and high throughput poses tremendous challenges in F-RANs.A joint problem of mode selection,resource allocation,and power allocation is formulated to minimize latency under various constraints.We propose a Deep Reinforcement Learning(DRL)based joint computation offloading and resource allocation scheme that achieves a suboptimal solution in F-RANs.The core idea of the proposal is that the DRL controller intelligently decides whether to process the generated computation task locally at the device level or offload the task to a fog access point or cloud server and allocates an optimal amount of computation and power resources on the basis of the serving tier.Simulation results show that the proposed approach significantly minimizes latency and increases throughput in the system.
文摘Verifiable computation (VC) paradigm has got the captivation that in real term is highlighted by the concept of third party computation. In more explicate terms, VC allows resource constrained clients/organizations to securely outsource expensive computations to untrusted service providers, while acquiring the publicly or privately verifiable results. Many mainstream solutions have been proposed to address the diverse problems within the VC domain. Some of them imposed assumptions over performed computations, while the others took advantage of interactivity /non-interactivity, zero knowledge proofs, and arguments. Further proposals utilized the powers of probabilistic checkable or computationally sound proofs. In this survey, we present a chronological study and classify the VC proposals based on their adopted domains. First, we provide a broader overview of the theoretical advancements while critically analyzing them. Subsequently, we present a comprehensive view of their utilization in the state of the art VC approaches. Moreover, a brief overview of recent proof based VC systems is also presented that lifted up the VC domain to the verge of practicality. We use the presented study and reviewed resuits to identify the similarities and alterations, modifications, and hybridization of different approaches, while comparing their advantages and reporting their overheads. Finally, we discuss implementation of such VC based systems, their applications, and the likely future directions.