期刊文献+
共找到122篇文章
< 1 2 7 >
每页显示 20 50 100
For LEO Satellite Networks: Intelligent Interference Sensing and Signal Reconstruction Based on Blind Separation Technology
1
作者 Chengjie Li Lidong Zhu Zhen Zhang 《China Communications》 SCIE CSCD 2024年第2期85-95,共11页
In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signal... In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system. 展开更多
关键词 blind source separation greedy optimization algorithm interference sensing LEO satellite communication networks signal reconstruction
下载PDF
Sum-Rate Maximization in Active RIS-Assisted Multi-Antenna WPCN
2
作者 Jiang Jie Lyu Bin +1 位作者 Chen Pengcheng Yang Zhen 《China Communications》 SCIE CSCD 2024年第6期23-39,共17页
In this paper,we propose an active reconfigurable intelligent surface(RIS)enabled hybrid relaying scheme for a multi-antenna wireless powered communication network(WPCN),where the active RIS is employed to assist both... In this paper,we propose an active reconfigurable intelligent surface(RIS)enabled hybrid relaying scheme for a multi-antenna wireless powered communication network(WPCN),where the active RIS is employed to assist both wireless energy transfer(WET)from the power station(PS)to energyconstrained users and wireless information transmission(WIT)from users to the receiving station(RS).For further performance enhancement,we propose to employ both transmit beamforming at the PS and receive beamforming at the RS.We formulate a sumrate maximization problem by jointly optimizing the RIS phase shifts and amplitude reflection coefficients for both the WET and the WIT,transmit and receive beamforming vectors,and network resource allocation.To solve this non-convex problem,we propose an efficient alternating optimization algorithm with the linear minimum mean squared error criterion,semidefinite relaxation(SDR)and successive convex approximation techniques.Specifically,the tightness of applying the SDR is proved.Simulation results demonstrate that our proposed scheme with 10 reflecting elements(REs)and 4 antennas can achieve 17.78%and 415.48%performance gains compared to the single-antenna scheme with 10 REs and passive RIS scheme with 100 REs,respectively. 展开更多
关键词 active reconfigurable intelligent surface BEAMFORMING sum-rate maximization wireless powered communication network
下载PDF
Enabling Efficient Caching in High Mobility UAV Communications Network under Limited Backhaul
3
作者 Yan Wu Jiandong Li +2 位作者 Junyu Liu Min Sheng Chenxi Zhao 《China Communications》 SCIE CSCD 2022年第10期207-219,共13页
Due to flexible deployment,unmanned aerial vehicle(UAV)mounted aerial access points are capable of expanding the coverage capabilities of existing terrestrial base stations(TBSs).Different from TBSs,however,UAV access... Due to flexible deployment,unmanned aerial vehicle(UAV)mounted aerial access points are capable of expanding the coverage capabilities of existing terrestrial base stations(TBSs).Different from TBSs,however,UAV access points(UAPs)are of high mobility in horizontal and vertical dimensions,which may deteriorate the coverage performance.Worsestill,the mobility of UAPs would as well increase the pressure of wireless backhaul.In this light,we investigate the performance of the cache-enabled UAV communications network(CUCN)in terms of network spatial throughput(ST)by analyzing the line of sight(LoS)connections and non-line of sight(NLoS)connections.It is found that the network ST is exponentially decreased with the square of UAP altitude.Furthermore,contrary to intuition,a large cache size may deteriorate the network ST when UAPs are over-deployed.The reason is that a large cache size increases the hit probability,which may increase the activation of UAPs and consequently result in complicated interference.Aiming to maximize the network ST,we optimize the cache strategy under limited backhaul.Remarkably,the results show that network ST could be substantially improved by the optimized cache strategy and the performance degeneration brought by UAP high mobility could be even eliminated especially when the UAP altitude is high. 展开更多
关键词 caching optimization UAV communications network spatial throughput stochastic geometry aerial access point
下载PDF
Trajectory Design for UAV-Enabled Maritime Secure Communications:A Reinforcement Learning Approach
4
作者 Jintao Liu Feng Zeng +3 位作者 Wei Wang Zhichao Sheng Xinchen Wei Kanapathippillai Cumanan 《China Communications》 SCIE CSCD 2022年第9期26-36,共11页
This paper investigates an unmanned aerial vehicle(UAV)-enabled maritime secure communication network,where the UAV aims to provide the communication service to a legitimate mobile vessel in the presence of multiple e... This paper investigates an unmanned aerial vehicle(UAV)-enabled maritime secure communication network,where the UAV aims to provide the communication service to a legitimate mobile vessel in the presence of multiple eavesdroppers.In this maritime communication networks(MCNs),it is challenging for the UAV to determine its trajectory on the ocean,since it cannot land or replenish energy on the sea surface,the trajectory should be pre-designed before the UAV takes off.Furthermore,the take-off location of the UAV and the sea lane of the vessel may be random,which leads to a highly dynamic environment.To address these issues,we propose two reinforcement learning schemes,Q-learning and deep deterministic policy gradient(DDPG)algorithms,to solve the discrete and continuous UAV trajectory design problem,respectively.Simulation results are provided to validate the effectiveness and superior performance of the proposed reinforcement learning schemes versus the existing schemes in the literature.Additionally,the proposed DDPG algorithm converges faster and achieves higher utilities for the UAV,compared to the Q-learning algorithm. 展开更多
关键词 maritime communication networks(MCNs) unmanned aerial vehicles(UAV) reinforcement learning physical layer security trajectory design
下载PDF
Packet Transport for Maritime Communications:A Streaming Coded UDP Approach
5
作者 Ye Li Jianhao Yu +3 位作者 Liang Chen Yingdong Hu Xiaomin Chen Jue Wang 《China Communications》 SCIE CSCD 2022年第9期10-25,共16页
The maritime communication network(MCN)plays an important role in the 6th generation(6G)system development.In MCNs,packet transport over long-distance lossy links will be ubiquitous.Transmission control protocol(TCP),... The maritime communication network(MCN)plays an important role in the 6th generation(6G)system development.In MCNs,packet transport over long-distance lossy links will be ubiquitous.Transmission control protocol(TCP),the dominant transport protocol in the past decades,have had performance issues in such links.In this paper,we propose a novel transport approach which uses user datagram protocol(UDP)along with a simple yet effective bandwidth estimator for congestion control,and with a proactive packet-level forward erasure correction(FEC)code called streaming code to provide low-delay loss recovery without data retransmissions at all.We show that the approach can effectively address two issues of the state-of-the-art TCP variants in the long-distance lossy links,namely 1)the low bandwidth utilization caused by the slow increase of the congestion window(CWND)due to long roundtrip time(RTT)and the frequent CWND drop due to random and congestion losses,and 2)the high endto-end in-order delivery delay when re-transmissions are incurred to recover lost packets.In addition,we show that the scheme’s goodput has good smoothness and short-term intra-protocol fairness properties,which are beneficial for multimedia streaming and interactive applications that are prominent parts of today’s wireless traffic. 展开更多
关键词 maritime communication network forward-erasure correction congestion control
下载PDF
Vehicular Communications,Networks,and Applications
6
作者 ZHUANG Weihua ZHU Hongzi 《ZTE Communications》 2016年第3期1-2,共2页
Avehicular ad hoc network (VANET) is a packet-switched network, consisting of mobile communication nodes mounted on vehicles, with very limited or no infrastructure support [1]. It supports communications among near... Avehicular ad hoc network (VANET) is a packet-switched network, consisting of mobile communication nodes mounted on vehicles, with very limited or no infrastructure support [1]. It supports communications among nearby vehicles, 展开更多
关键词 VANETS Vehicular communications Networks and Applications DSRC
下载PDF
Study on QoS and Communications Capacity in Heterogeneous Network Convergence
7
作者 Xia Weiwei,Shen Lianfeng(National Mobile Communications Research Laboratory,Southeast University,Nanjing 210096,China) 《ZTE Communications》 2008年第3期6-9,共4页
To provide any subscriber from anywhere at anytime with services that have both secured Quality of Service(QoS) and simultaneous expansion of network coverage and communications capacity is a key problem that has to b... To provide any subscriber from anywhere at anytime with services that have both secured Quality of Service(QoS) and simultaneous expansion of network coverage and communications capacity is a key problem that has to be considered and solved in heterogeneous network convergence.Key technologies for a secured QoS and communications capacity analysis under heterogeneous environment are important subjects for research.Key technologies for a secured QoS are mainly on radio resource management algorithms covering Call Admission Control(CAC) algorithm,vertical handover algorithm,heterogeneous resource allocation algorithm and network selection algorithm.The applications of a novel multi-hop in heterogeneous convergence system serve the purposes of network coverage expansion,transmission power reduction,system communication capacity and throughput increase. 展开更多
关键词 QOS Study on QoS and communications Capacity in Heterogeneous Network Convergence WLAN IEEE
下载PDF
Power Line Communications Networking Method Based on Hybrid Ant Colony and Genetic Algorithm
8
作者 Qianghui Xiao Huan Jin Xueyi Zhang 《Engineering(科研)》 2020年第8期581-590,共10页
When solving the routing problem with traditional ant colony algorithm, there is scarce in initialize pheromone and a slow convergence and stagnation for the complex network topology and the time-varying characteristi... When solving the routing problem with traditional ant colony algorithm, there is scarce in initialize pheromone and a slow convergence and stagnation for the complex network topology and the time-varying characteristics of channel in power line carrier communication of low voltage distribution grid. The algorithm is easy to fall into premature and local optimization. Proposed an automatic network algorithm based on improved transmission delay and the load factor as the evaluation factors. With the requirements of QoS, a logical topology of power line communication network is established. By the experiment of MATLAB simulation, verify that the improved Dynamic hybrid ant colony genetic algorithm (DH_ACGA) algorithm has improved the communication performance, which solved the QoS routing problems of power communication to some extent. 展开更多
关键词 Power Line Carrier Communication Network Quality of Service Hybrid Ant Colony and Genetic Algorithm
下载PDF
ZTE Communications Special Issue on Vehicular Communications,Networks,and Applications
9
《ZTE Communications》 2015年第3期50-50,共1页
Vehicular communications and networking can improve road safety, faeilitate intelligenl transporlation, support infotainment, dala sharing, and location based serviees, and will be a eritical component in the Internet... Vehicular communications and networking can improve road safety, faeilitate intelligenl transporlation, support infotainment, dala sharing, and location based serviees, and will be a eritical component in the Internet of Things. This special issue aims to present the state of the art in research and development of vehicular communication technology and its potential applications. We are soliciting original contribulions. The topics of interest include, but arc not limited to: 展开更多
关键词 ZTE communications Special Issue on Vehicular communications Networks and Applications
下载PDF
Hubei: Building a Modern Communications Network
10
《China Today》 2000年第10期22-25,共4页
关键词 CO Building a Modern communications Network HUBEI
下载PDF
Generative Adversarial Networks Based Digital Twin Channel Modeling for Intelligent Communication Networks 被引量:1
11
作者 Yuxin Zhang Ruisi He +5 位作者 Bo Ai Mi Yang Ruifeng Chen Chenlong Wang Zhengyu Zhang Zhangdui Zhong 《China Communications》 SCIE CSCD 2023年第8期32-43,共12页
Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With D... Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With DT channel modeling,the generated channel data can be closer to realistic channel measurements without requiring a prior channel model,and amount of channel data can be significantly increased.Artificial intelligence(AI)based modeling approach shows outstanding performance to solve such problems.In this work,a channel modeling method based on generative adversarial networks is proposed for DT channel,which can generate identical statistical distribution with measured channel.Model validation is conducted by comparing DT channel characteristics with measurements,and results show that DT channel leads to fairly good agreement with measured channel.Finally,a link-layer simulation is implemented based on DT channel.It is found that the proposed DT channel model can be well used to conduct link-layer simulation and its performance is comparable to using measurement data.The observations and results can facilitate the development of DT channel modeling and provide new thoughts for DT channel applications,as well as improving the performance and reliability of intelligent communication networking. 展开更多
关键词 digital twin channel modeling generative adversarial networks intelligent communication networking
下载PDF
RAISE:A Resilient Anonymous Information Sharing Environment
12
作者 Ning Hu Ling Liu +2 位作者 Xin Liu Kaijun Wu Yue Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第12期2743-2759,共17页
With the widespread application of cloud computing and network virtualization technologies,more and more enterprise applications are directly deployed in the cloud.However,the traditional TCP/IP network transmission m... With the widespread application of cloud computing and network virtualization technologies,more and more enterprise applications are directly deployed in the cloud.However,the traditional TCP/IP network transmission model does not fully consider the information security issues caused by the uncontrollable internet environment.Network security communication solutions represented by encrypted virtual private networks(VPN)are facing multiple security threats.In fact,during the communication process,the user application needs to protect not only the content of the communication but also the behavior of the communication,such as the communication relationship,the communication protocol,and so on.Inspired by blockchain and software-defined networking technology,this paper proposes a resilient anonymous information sharing environment,RAISE.The RAISE system consists of user agents,a core switching network and a control cluster based on a consortium blockchain.User agents are responsible for segmenting,encrypting,and encapsulating user traffic.The core switching network forwards user traffic according to the rules issued by the controller,and the controller dynamically calculates the forwarding rules according to the security policy.Different from onion routing technology,RAISE adopts the controller to replace the onion routing model,which effectively overcomes the uncontrollability of nodes.The dispersed computing model is introduced to replace the TCP/IP pipeline transmission models,which overcomes the problems of anti-tracking and traffic hijacking that cannot be solved by VPNs.We propose a blockchain control plane framework,design the desired consensus algorithmand deploy a RAISE systemconsisting of 150 nodes in an internet environment.The experimental results show that the use of blockchain technology can effectively improve the reliability and security of the control plane.While maintaining high-performance network transmission,it further provides network communication security. 展开更多
关键词 Software-defined anonymous communication network blockchain network communication security
下载PDF
Reliable Scheduling Method for Sensitive Power Business Based on Deep Reinforcement Learning
13
作者 Shen Guo Jiaying Lin +2 位作者 Shuaitao Bai Jichuan Zhang Peng Wang 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期1053-1066,共14页
The main function of the power communication business is to monitor,control and manage the power communication network to ensure normal and stable operation of the power communication network.Commu-nication services r... The main function of the power communication business is to monitor,control and manage the power communication network to ensure normal and stable operation of the power communication network.Commu-nication services related to dispatching data networks and the transmission of fault information or feeder automation have high requirements for delay.If processing time is prolonged,a power business cascade reaction may be triggered.In order to solve the above problems,this paper establishes an edge object-linked agent business deployment model for power communication network to unify the management of data collection,resource allocation and task scheduling within the system,realizes the virtualization of object-linked agent computing resources through Docker container technology,designs the target model of network latency and energy consumption,and introduces A3C algorithm in deep reinforcement learning,improves it according to scene characteristics,and sets corresponding optimization strategies.Mini-mize network delay and energy consumption;At the same time,to ensure that sensitive power business is handled in time,this paper designs the business dispatch model and task migration model,and solves the problem of server failure.Finally,the corresponding simulation program is designed to verify the feasibility and validity of this method,and to compare it with other existing mechanisms. 展开更多
关键词 Power communication network dispatching data networks resource allocation A3C algorithm deep reinforcement learning
下载PDF
IoT data analytic algorithms on edge-cloud infrastructure:A review
14
作者 Abel E.Edje M.S.Abd Latiff Weng Howe Chan 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1486-1515,共30页
The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime services.However,it is constrained by limited data storage and processing power.It offloads its massiv... The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime services.However,it is constrained by limited data storage and processing power.It offloads its massive data stream to edge devices and the cloud for adequate storage and processing.This further leads to the challenges of data outliers,data redundancies,and cloud resource load balancing that would affect the execution and outcome of data streams.This paper presents a review of existing analytics algorithms deployed on IoT-enabled edge cloud infrastructure that resolved the challenges of data outliers,data redundancies,and cloud resource load balancing.The review highlights the problems solved,the results,the weaknesses of the existing algorithms,and the physical and virtual cloud storage servers for resource load balancing.In addition,it discusses the adoption of network protocols that govern the interaction between the three-layer architecture of IoT sensing devices enabled edge cloud and its prevailing challenges.A total of 72 algorithms covering the categories of classification,regression,clustering,deep learning,and optimization have been reviewed.The classification approach has been widely adopted to solve the problem of redundant data,while clustering and optimization approaches are more used for outlier detection and cloud resource allocation. 展开更多
关键词 Internet of things Cloud platform Edge Analytic algorithms Processes Network communication protocols
下载PDF
Computation of PoA for Selfish Node Detection and Resource Allocation Using Game Theory
15
作者 S.Kanmani M.Murali 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2583-2598,共16页
The introduction of new technologies has increased communication network coverage and the number of associating nodes in dynamic communication networks(DCN).As the network has the characteristics like decentralized an... The introduction of new technologies has increased communication network coverage and the number of associating nodes in dynamic communication networks(DCN).As the network has the characteristics like decentralized and dynamic,few nodes in the network may not associate with other nodes.These uncooperative nodes also known as selfish nodes corrupt the performance of the cooperative nodes.Namely,the nodes cause congestion,high delay,security concerns,and resource depletion.This study presents an effective selfish node detection method to address these problems.The Price of Anarchy(PoA)and the Price of Stability(PoS)in Game Theory with the Presence of Nash Equilibrium(NE)are discussed for the Selfish Node Detection.This is a novel experiment to detect selfish nodes in a network using PoA.Moreover,the least response dynamic-based Capacitated Selfish Resource Allocation(CSRA)game is introduced to improve resource usage among the nodes.The suggested strategy is simulated using the Solar Winds simulator,and the simulation results show that,when compared to earlier methods,the new scheme offers promising performance in terms of delivery rate,delay,and throughput. 展开更多
关键词 Dynamic communication network(DCN) price of anarchy(PoA) nash equilibrium(NE) capacitated selfish resource allocation(CSRA)game game theory price of stability(PoS)
下载PDF
A Transmission Design in Dynamic Heterogeneous V2V Networks Through Multi-Agent Deep Reinforcement Learning
16
作者 Nong Qu Chao Wang +1 位作者 Zuxing Li Fuqiang Liu 《China Communications》 SCIE CSCD 2023年第7期273-289,共17页
In highly dynamic and heterogeneous vehicular communication networks,it is challenging to efficiently utilize network resources and ensure demanding performance requirements of safetyrelated applications.This paper in... In highly dynamic and heterogeneous vehicular communication networks,it is challenging to efficiently utilize network resources and ensure demanding performance requirements of safetyrelated applications.This paper investigates machinelearning-assisted transmission design in a typical multi-user vehicle-to-vehicle(V2V)communication scenario.The transmission process proceeds sequentially along the discrete time steps,where several source nodes intend to deliver multiple different types of messages to their respective destinations within the same spectrum.Due to rapid movement of vehicles,real-time acquirement of channel knowledge and central coordination of all transmission actions are in general hard to realize.We consider applying multi-agent deep reinforcement learning(MADRL)to handle this issue.By transforming the transmission design problem into a stochastic game,a multi-agent proximal policy optimization(MAPPO)algorithm under a centralized training and decentralized execution framework is proposed such that each source decides its own transmission message type,power level,and data rate,based on local observations of the environment and feedback,to maximize its energy efficiency.Via simulations we show that our method achieves better performance over conventional methods. 展开更多
关键词 V2V communication networks SEQUENTIAL
下载PDF
A 5G Perspective of an SDN-Based Privacy-Preserving Scheme for IoT Networks
17
作者 Isaac Appiah Xiaoming Jiang +1 位作者 Edward Kwadwo Boahen Ebenezer Owusu 《International Journal of Communications, Network and System Sciences》 2023年第8期169-190,共22页
The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as techno... The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as technology advances, and its use expands. As a consequence, boosting the capacity of these networks has garnered widespread attention. As a result, 5G, the next phase of cellular networks, is expected to be a game-changer, bringing with it faster data transmission rates, more capacity, improved service quality, and reduced latency. However, 5G networks continue to confront difficulties in establishing pervasive and dependable connections amongst high-speed IoT devices. Thus, to address the shortcomings in current recommendations, we present a unified architecture based on software-defined networks (SDNs) that provides 5G-enabled devices that must have complete secrecy. Through SDN, the architecture streamlines network administration while optimizing network communications. A mutual authentication protocol using elliptic curve cryptography is introduced for mutual authentication across certificate authorities and clustered heads in IoT network deployments based on IoT. Again, a dimensionality reduction intrusion detection mechanism is introduced to decrease computational cost and identify possible network breaches. However, to leverage the method’s potential, the initial module's security is reviewed. The second module is evaluated and compared to modern models. 展开更多
关键词 Internet of Things 5G SDNs Security and Privacy INTRUSION Network communications
下载PDF
一类活动发射平台驱动控制系统网络设计
18
作者 LI Daoping ZHU Maioxin +2 位作者 LI Chunlin CHEN Yaozu ZHENG Guokun 《Aerospace China》 2023年第3期26-30,共5页
In order to ensure that a mobile launch platform is able to transport a launch vehicle which is assembled vertically on a complex orbit,a communication network for the drive control system was designed.Based on the ch... In order to ensure that a mobile launch platform is able to transport a launch vehicle which is assembled vertically on a complex orbit,a communication network for the drive control system was designed.Based on the char-acteristics of equipment of the drive control system and its position,Industrial Ethernet and Profibus were selected.To meet the requirements for reliability and maintainability of aerospace products,the communication network featured a hot redundant to avoid single point failure risk,so that if any point in the system fails,the control strategy of standby switches using heartbeat detection and parity check would ensure the normal communication and failure diagnostics,which could enable the transport mission of the launch vehicle to be completed smoothly. 展开更多
关键词 mobile launch platform drive control system communication network Industrial Ethernet PROFIBUS hot redundancy
下载PDF
Distributed wireless quantum communication networks with partially entangled pairs 被引量:9
19
作者 余旭涛 张在琛 徐进 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第1期66-73,共8页
Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks ... Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks with partially entangled pairs. A quantum routing scheme with multi-hop teleportation is proposed. With the proposed scheme, is not necessary for the quantum path to be consistent with the classical path. The quantum path and its associated classical path are established in a distributed way. Direct multi-hop teleportation is conducted on the selected path to transfer a quantum state from the source to the destination. Based on the feature of multi-hop teleportation using partially entangled pairs, if the node number of the quantum path is even, the destination node will add another teleportation at itself. We simulated the performance of distributed wireless quantum communication networks with a partially entangled state. The probability of transferring the quantum state successfully is statistically analyzed. Our work shows that multi-hop teleportation on distributed wireless quantum networks with partially entangled pairs is feasible, 展开更多
关键词 distributed wireless quantum communication networks partially entangled pairs routing multi-hop teleportation
下载PDF
Joint Computing and Communication Resource Allocation for Satellite Communication Networks with Edge Computing 被引量:9
20
作者 Shanghong Zhang Gaofeng Cui +1 位作者 Yating Long Weidong Wang 《China Communications》 SCIE CSCD 2021年第7期236-252,共17页
Benefit from the enhanced onboard processing capacities and high-speed satellite-terrestrial links,satellite edge computing has been regarded as a promising technique to facilitate the execution of the computation-int... Benefit from the enhanced onboard processing capacities and high-speed satellite-terrestrial links,satellite edge computing has been regarded as a promising technique to facilitate the execution of the computation-intensive applications for satellite communication networks(SCNs).By deploying edge computing servers in satellite and gateway stations,SCNs can achieve significant performance gains of the computing capacities at the expense of extending the dimensions and complexity of resource management.Therefore,in this paper,we investigate the joint computing and communication resource management problem for SCNs to minimize the execution latency of the computation-intensive applications,while two different satellite edge computing scenarios and local execution are considered.Furthermore,the joint computing and communication resource allocation problem for the computation-intensive services is formulated as a mixed-integer programming problem.A game-theoretic and many-to-one matching theorybased scheme(JCCRA-GM)is proposed to achieve an approximate optimal solution.Numerical results show that the proposed method with low complexity can achieve almost the same weight-sum latency as the Brute-force method. 展开更多
关键词 satellite communication networks edge computing resource allocation matching theory
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部