期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
An improved pulse coupled neural networks model for semantic IoT
1
作者 Rong Ma Zhen Zhang +3 位作者 Yide Ma Xiping Hu Edith C.H.Ngai victor c.m.leung 《Digital Communications and Networks》 SCIE CSCD 2024年第3期557-567,共11页
In recent years,the Internet of Things(IoT)has gradually developed applications such as collecting sensory data and building intelligent services,which has led to an explosion in mobile data traffic.Meanwhile,with the... In recent years,the Internet of Things(IoT)has gradually developed applications such as collecting sensory data and building intelligent services,which has led to an explosion in mobile data traffic.Meanwhile,with the rapid development of artificial intelligence,semantic communication has attracted great attention as a new communication paradigm.However,for IoT devices,however,processing image information efficiently in real time is an essential task for the rapid transmission of semantic information.With the increase of model parameters in deep learning methods,the model inference time in sensor devices continues to increase.In contrast,the Pulse Coupled Neural Network(PCNN)has fewer parameters,making it more suitable for processing real-time scene tasks such as image segmentation,which lays the foundation for real-time,effective,and accurate image transmission.However,the parameters of PCNN are determined by trial and error,which limits its application.To overcome this limitation,an Improved Pulse Coupled Neural Networks(IPCNN)model is proposed in this work.The IPCNN constructs the connection between the static properties of the input image and the dynamic properties of the neurons,and all its parameters are set adaptively,which avoids the inconvenience of manual setting in traditional methods and improves the adaptability of parameters to different types of images.Experimental segmentation results demonstrate the validity and efficiency of the proposed self-adaptive parameter setting method of IPCNN on the gray images and natural images from the Matlab and Berkeley Segmentation Datasets.The IPCNN method achieves a better segmentation result without training,providing a new solution for the real-time transmission of image semantic information. 展开更多
关键词 Internet of things(IoT) Semantic information Real-time application Improved pulse coupled neural network Image segmentation
下载PDF
Advancements in Web3 Infrastructure for the Metaverse
2
作者 victor c.m.leung CAI Wei 《ZTE Communications》 2024年第2期1-2,共2页
Web3,also known as Web 3.0,has recently been attracting increasing attention from industry and academia.Leveraging the potential of blockchain technologies,Web3 has emerged as a pivotal foundation in the realm of meta... Web3,also known as Web 3.0,has recently been attracting increasing attention from industry and academia.Leveraging the potential of blockchain technologies,Web3 has emerged as a pivotal foundation in the realm of metaverse development,which is considered by many as the next-generation Internet.Specifically,Web3 technologies such as smart contracts and protocols like non-fungible tokens(NFTs)have supported the immersive and content-rich experience of current Web3 metaverse projects. 展开更多
关键词 WEB TOKEN attracting
下载PDF
Ultra-Dense Networking Architectures and Technologies for 5G 被引量:1
3
作者 victor c.m.leung zhang haijun 《ZTE Communications》 2018年第2期1-2,共2页
With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth... With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth in demand for communications services. 展开更多
关键词 In Ultra-Dense Networking Architectures and Technologies for 5G
下载PDF
Wireless Acoustic Sensor Networks and Edge Computing for Rapid Acoustic Monitoring 被引量:6
4
作者 Zhengguo Sheng Saskia Pfersich +3 位作者 Alice Eldridge Jianshan Zhou Daxin Tian victor c.m.leung 《IEEE/CAA Journal of Automatica Sinica》 EI CSCD 2019年第1期64-74,共11页
Passive acoustic monitoring is emerging as a promising solution to the urgent, global need for new biodiversity assessment methods. The ecological relevance of the soundscape is increasingly recognised, and the afford... Passive acoustic monitoring is emerging as a promising solution to the urgent, global need for new biodiversity assessment methods. The ecological relevance of the soundscape is increasingly recognised, and the affordability of robust hardware for remote audio recording is stimulating international interest in the potential for acoustic methods for biodiversity monitoring.The scale of the data involved requires automated methods,however, the development of acoustic sensor networks capable of sampling the soundscape across time and space and relaying the data to an accessible storage location remains a significant technical challenge, with power management at its core. Recording and transmitting large quantities of audio data is power intensive,hampering long-term deployment in remote, off-grid locations of key ecological interest. Rather than transmitting heavy audio data, in this paper, we propose a low-cost and energy efficient wireless acoustic sensor network integrated with edge computing structure for remote acoustic monitoring and in situ analysis.Recording and computation of acoustic indices are carried out directly on edge devices built from low noise primo condenser microphones and Teensy microcontrollers, using internal FFT hardware support. Resultant indices are transmitted over a ZigBee-based wireless mesh network to a destination server.Benchmark tests of audio quality, indices computation and power consumption demonstrate acoustic equivalence and significant power savings over current solutions. 展开更多
关键词 ACOUSTIC sensor networks EDGE COMPUTING energy EFFICIENCY
下载PDF
Evolutionary Algorithms in Software Defined Networks: Techniques, Applications, and Issues 被引量:1
5
作者 LIAO Lingxia victor c.m.leung LAI Chin-Feng 《ZTE Communications》 2017年第3期20-36,共17页
A software defined networking(SDN) system has a logically centralized control plane that maintains a global network view and enables network-wide management, optimization, and innovation. Network-wide management and o... A software defined networking(SDN) system has a logically centralized control plane that maintains a global network view and enables network-wide management, optimization, and innovation. Network-wide management and optimization problems are typicallyvery complex with a huge solution space, large number of variables, and multiple objectives. Heuristic algorithms can solve theseproblems in an acceptable time but are usually limited to some particular problem circumstances. On the other hand, evolutionaryalgorithms(EAs), which are general stochastic algorithms inspired by the natural biological evolution and/or social behavior of species, can theoretically be used to solve any complex optimization problems including those found in SDNs. This paper reviewsfour types of EAs that are widely applied in current SDNs: Genetic Algorithms(GAs), Particle Swarm Optimization(PSO), Ant Colony Optimization(ACO), and Simulated Annealing(SA) by discussing their techniques, summarizing their representative applications, and highlighting their issues and future works. To the best of our knowledge, our work is the first that compares the tech-niques and categorizes the applications of these four EAs in SDNs. 展开更多
关键词 SDN evolutionary algorithms Genetic Algorithms Particle Swarm Optimization Ant Colony Optimization Simulated Annealing
下载PDF
RecCac:Recommendation-Empowered Cooperative Edge Caching for Internet of Things 被引量:1
6
作者 HAN Suning LI Xiuhua +2 位作者 SUN Chuan WANG Xiaofei victor c.m.leung 《ZTE Communications》 2021年第2期2-10,共9页
Edge caching is an emerging technology for supporting massive content access in mobile edge networks to address rapidly growing Internet of Things(IoT)services and content applications.However,the edge server is limit... Edge caching is an emerging technology for supporting massive content access in mobile edge networks to address rapidly growing Internet of Things(IoT)services and content applications.However,the edge server is limited with the computation/storage capacity,which causes a low cache hit.Cooperative edge caching jointing neighbor edge servers is regarded as a promising technique to improve cache hit and reduce congestion of the networks.Further,recommender systems can provide personalized content services to meet user’s requirements in the entertainment-oriented mobile networks.Therefore,we investigate the issue of joint cooperative edge caching and recommender systems to achieve additional cache gains by the soft caching framework.To measure the cache profits,the optimization problem is formulated as a 0-1 Integer Linear Programming(ILP),which is NP-hard.Specifically,the method of processing content requests is defined as server actions,we determine the server actions to maximize the quality of experience(QoE).We propose a cachefriendly heuristic algorithm to solve it.Simulation results demonstrate that the proposed framework has superior performance in improving the QoE. 展开更多
关键词 IoT recommender systems cooperative edge caching soft caching
下载PDF
Outage Probability of Composite Microscopic and Macroscopic Diversity over Correlated Shadowed Fading Channels
7
作者 张锐 魏急波 victor c.m.leung 《China Communications》 SCIE CSCD 2013年第11期129-142,共14页
The outage probability of a composite microscopic and macroscopic diversity system is evaluated over correlated shadowed fading channels.The correlations on both a microlevel and macrolevel are taken into account for ... The outage probability of a composite microscopic and macroscopic diversity system is evaluated over correlated shadowed fading channels.The correlations on both a microlevel and macrolevel are taken into account for the evaluations.The expression of the desired outage probability is explicitly presented,and two evaluation approaches,i.e.a compact Gaussian-Hermite quadrature method and an effective iterative algorithm,are proposed.The accuracy and efficiency of the proposed approaches are analysed,and a guideline is provided for their application.By employing the proposed evaluation approaches,results and demonstrations are presented,which display the implied effects of the corresponding parameters on the system outage performance,and reveal the potential to facilitate the design and analysis of such composite diversity systems. 展开更多
关键词 outage probability maximal ratiocombining selection combining composite div-ersity shadowing correlation Nakagami-log-normal
下载PDF
Subcarrier Intensity Modulated Optical Wireless Communications:A Survey from Communication Theory Perspective
8
作者 Md.Zoheb Hassan Md.Jahangir Hossain +1 位作者 Julian Cheng victor c.m.leung 《ZTE Communications》 2016年第2期2-12,共11页
Subcarrier intensity modulation with direet detection is a modulatiou/detection technique tbr optical wireless communication systems, where a pre-modulated and properly biased radio frequency signal is modulated on th... Subcarrier intensity modulation with direet detection is a modulatiou/detection technique tbr optical wireless communication systems, where a pre-modulated and properly biased radio frequency signal is modulated on the intensity of the optical carrier. The most important benefits of subcarrier intensity modulation are as follows: 1) it does not provide irreducible error floor like the conventional on-off keying intensity modulation with a fixed detection threshold; 2) it provides improved spectral efficiency and supports higher order modulation schemes; and 3) it has much less implementation complexity compared to coherent optical wireless communications with heterodyne or homodyne detection. In this paper, we present an up-to-date review of subcarrier intensity modulated optical wireless communication systems. We survey the error rate and outage performance of subcarrier intensity modulations in the atmospheric turbulence channels considering different modulation and coding schemes. We also explore different contemporary atmospheric turbulence fading mitigation solutions that can be employed for subcarrier intensity modulation. These solutions include diversity combining, adaptive transmission, relay assisted transmission, multiple-subcarrier intensity modulations, and optical orthogonal frequency division multiplexing. Moreover, we review the performance of subcarrier intensity modulations due to the pointing error and synchronization error. 展开更多
关键词 Atmospheric turbulence fading optical wireless communications subcarrier intensity modulation
下载PDF
Wireless Body Area Networks for Pervasive Healthcare and Smart Environments
9
作者 victor c.m.leung Hongke Zhang 《ZTE Communications》 2014年第3期1-2,共2页
Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, a... Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, and body position to be continuously monitored. 展开更多
关键词 WBAN BODY LEACH Wireless Body Area Networks for Pervasive Healthcare and Smart Environments
下载PDF
Arm PSA-Certified IoT Chip Security: A Case Study
10
作者 Fei Chen Duming Luo +3 位作者 Jianqiang Li victor c.m.leung Shiqi Li Junfeng Fan 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第2期244-257,共14页
With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on th... With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on the security of the underlying hardware chip,which often contains critical information,such as encryption key.To understand existing IoT chip security,this study analyzes the security of an IoT security chip that has obtained an Arm Platform Security Architecture(PSA)Level 2 certification.Our analysis shows that the chip leaks part of the encryption key and presents a considerable security risk.Specifically,we use commodity equipment to collect electromagnetic traces of the chip.Using a statistical T-test,we find that the target chip has physical leakage during the AES encryption process.We further use correlation analysis to locate the detailed encryption interval in the collected electromagnetic trace for the Advanced Encryption Standard(AES)encryption operation.On the basis of the intermediate value correlation analysis,we recover half of the 16-byte AES encryption key.We repeat the process for three different tests;in all the tests,we obtain the same result,and we recover around 8 bytes of the 16-byte AES encryption key.Therefore,experimental results indicate that despite the Arm PSA Level 2 certification,the target security chip still suffers from physical leakage.Upper layer application developers should impose strong security mechanisms in addition to those of the chip itself to ensure IoT application security. 展开更多
关键词 Internet of Things(IoT)security chip Arm Platform Security Architecture(PSA)certification electromagnetic side-channel attack Advanced Encryption Standard(AES)encryption key leakage
原文传递
Anchor Vertex Selection for Enhanced Reliability of Traffic Offloading Service in Edge-Enabled Mobile P2P Social Networks
11
作者 Hengda Zhang Xiaofei Wang +4 位作者 Hao Fan Taotao Cai Jianxin Li Xiuhua Li victor c.m.leung 《Journal of Communications and Information Networks》 CSCD 2020年第2期217-224,共8页
As the rapid growth of mobile social networks,mobile peer-to-peer(P2P)communications and mobile edge computing(MEC)have been developed to reduce the traffic load and improve the computation capacity of cellular networ... As the rapid growth of mobile social networks,mobile peer-to-peer(P2P)communications and mobile edge computing(MEC)have been developed to reduce the traffic load and improve the computation capacity of cellular networks.However,the stability of social network is largely ignored in the advances of P2P and MEC,which is related to the social relations between users.It plays a vital role in improving the efficiency and reliability of traffic offloading service.In this paper,we integrate an edge node and the nearby P2P users as a mobile P2P social network and introduce the problem of adaptive anchored(k,r)-core to maintain the stability of multiple mobile P2P networks.It aims to adaptively select and retain a set of critical users for each network,whose participation is critical to overall stability of the network,and allocate certain resource for them so that the maximum number of users of all networks will remain engaged and the traffic of cellular network can be minimized.We called the retained users as anchor vertices.To address it,we devise a peer-edge-cloud framework to achieve the adaptive allocation of resources.We also develop a similarity based onion layers anchored(k,r)-core(S-OLAK)algorithm to explore the anchor vertices.Experimental results based on a real large-scale mobile P2P data set demonstrate the effectiveness of our method. 展开更多
关键词 traffic offloading service mobile P2P communications mobile edge computing anchored k-core problem adaptive allocation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部