期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A survey on semantic communications:Technologies,solutions,applications and challenges
1
作者 Yating Liu Xiaojie Wang +3 位作者 zhaolong ning MengChu Zhou Lei Guo Behrouz Jedari 《Digital Communications and Networks》 SCIE CSCD 2024年第3期528-545,共18页
Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networ... Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networks,beyond the theoretical capacity limit.Despite the extensive research on SC,there is a lack of comprehensive survey on technologies,solutions,applications,and challenges for SC.In this article,the development of SC is first reviewed and its characteristics,architecture,and advantages are summarized.Next,key technologies such as semantic extraction,semantic encoding,and semantic segmentation are discussed and their corresponding solutions in terms of efficiency,robustness,adaptability,and reliability are summarized.Applications of SC to UAV communication,remote image sensing and fusion,intelligent transportation,and healthcare are also presented and their strategies are summarized.Finally,some challenges and future research directions are presented to provide guidance for further research of SC. 展开更多
关键词 Semantic communication Semantic coding Semantic extraction Semantic communication framework Semantic communication applications
下载PDF
NOMA-Based Energy-Efficient Task Scheduling in Vehicular Edge Computing Networks: A Self-Imitation Learning-Based Approach 被引量:8
2
作者 Peiran Dong zhaolong ning +3 位作者 Rong Ma Xiaojie Wang Xiping Hu Bin Hu 《China Communications》 SCIE CSCD 2020年第11期1-11,共11页
Mobile Edge Computing(MEC)is promising to alleviate the computation and storage burdens for terminals in wireless networks.The huge energy consumption of MEC servers challenges the establishment of smart cities and th... Mobile Edge Computing(MEC)is promising to alleviate the computation and storage burdens for terminals in wireless networks.The huge energy consumption of MEC servers challenges the establishment of smart cities and their service time powered by rechargeable batteries.In addition,Orthogonal Multiple Access(OMA)technique cannot utilize limited spectrum resources fully and efficiently.Therefore,Non-Orthogonal Multiple Access(NOMA)-based energy-efficient task scheduling among MEC servers for delay-constraint mobile applications is important,especially in highly-dynamic vehicular edge computing networks.The various movement patterns of vehicles lead to unbalanced offloading requirements and different load pressure for MEC servers.Self-Imitation Learning(SIL)-based Deep Reinforcement Learning(DRL)has emerged as a promising machine learning technique to break through obstacles in various research fields,especially in time-varying networks.In this paper,we first introduce related MEC technologies in vehicular networks.Then,we propose an energy-efficient approach for task scheduling in vehicular edge computing networks based on DRL,with the purpose of both guaranteeing the task latency requirement for multiple users and minimizing total energy consumption of MEC servers.Numerical results demonstrate that the proposed algorithm outperforms other methods. 展开更多
关键词 NOMA energy-efficient scheduling vehicular edge computing imitation learning
下载PDF
FOG COMPUTING ENABLED INTERNET OF EVERYTHING
3
作者 zhaolong ning Lei Guo +1 位作者 Joel Rodrigues Mohammad S.Obaidat 《China Communications》 SCIE CSCD 2019年第3期I0001-I0003,共3页
With the rapid development of ubiquitous networks and smart cities,the connection and communication of Internet of Everything(IoE)have drawn great attention from both academia and industry.The main challenge for const... With the rapid development of ubiquitous networks and smart cities,the connection and communication of Internet of Everything(IoE)have drawn great attention from both academia and industry.The main challenge for constructing IoE is to enable real-time communication and high-efficiency computing among mobile devices.Mobile fog computing is promising to lower communication delay and offload network traffic.However,how to realize fog-enabled communication and computing in IoE with high-dynamic and heterogeneous network characters has not been fully investigated.Furthermore,deployment and reliable communications among fog nodes are also challenging. 展开更多
关键词 FOG COMPUTING INTERNET OF EVERYTHING
下载PDF
A secure routing scheme based on social network analysis in wireless mesh networks 被引量:2
4
作者 Yao YU zhaolong ning Lei GUO 《Science China Earth Sciences》 SCIE EI CAS CSCD 2016年第12期139-150,共12页
As an extension of wireless ad hoc and sensor networks, wireless mesh networks(WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guara... As an extension of wireless ad hoc and sensor networks, wireless mesh networks(WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guarantees, WMNs are susceptible to various kinds of attack. In this paper, we focus on node social selfish attack, which decreases network performance significantly. Since this type of attack is not obvious to detect, we propose a security routing scheme based on social network and reputation evaluation to solve this attack issue. First, we present a dynamic reputation model to evaluate a node's routing behavior, from which we can identify selfish attacks and selfish nodes. Furthermore, a social characteristic evaluation model is studied to evaluate the social relationship among nodes. Groups are built based on the similarity of node social status and we can get a secure routing based on these social groups of nodes. In addition, in our scheme, nodes are encouraged to enter into multiple groups and friend nodes are recommended to join into groups to reduce the possibility of isolated nodes. Simulation results demonstrate that our scheme is able to reflect node security status, and routings are chosen and adjusted according to security status timely and accurately so that the safety and reliability of routing are improved. 展开更多
关键词 wireless mesh networks node selfish social network analysis secure routing Markov chain
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部