This research presents a reputation-based blockchain consensus mechanism called Proof of Intelligent Reputation(PoIR)as an alternative to traditional Proof of Work(PoW).PoIR addresses the limitations of existing reput...This research presents a reputation-based blockchain consensus mechanism called Proof of Intelligent Reputation(PoIR)as an alternative to traditional Proof of Work(PoW).PoIR addresses the limitations of existing reputationbased consensus mechanisms by proposing a more decentralized and fair node selection process.The proposed PoIR consensus combines Bidirectional Long Short-Term Memory(BiLSTM)with the Network Entity Reputation Database(NERD)to generate reputation scores for network entities and select authoritative nodes.NERD records network entity profiles based on various sources,i.e.,Warden,Blacklists,DShield,AlienVault Open Threat Exchange(OTX),and MISP(Malware Information Sharing Platform).It summarizes these profile records into a reputation score value.The PoIR consensus mechanism utilizes these reputation scores to select authoritative nodes.The evaluation demonstrates that PoIR exhibits higher centralization resistance than PoS and PoW.Authoritative nodes were selected fairly during the 1000-block proposal round,ensuring a more decentralized blockchain ecosystem.In contrast,malicious nodes successfully monopolized 58%and 32%of transaction processes in PoS and PoW,respectively,but failed to do so in PoIR.The findings also indicate that PoIR offers efficient transaction times of 12 s,outperforms reputation-based consensus such as PoW,and is comparable to reputation-based consensus such as PoS.Furthermore,the model evaluation shows that BiLSTM outperforms other Recurrent Neural Network models,i.e.,BiGRU(Bidirectional Gated Recurrent Unit),UniLSTM(Unidirectional Long Short-Term Memory),and UniGRU(Unidirectional Gated Recurrent Unit)with 0.022 Root Mean Squared Error(RMSE).This study concludes that the PoIR consensus mechanism is more resistant to centralization than PoS and PoW.Integrating BiLSTM and NERD enhances the fairness and efficiency of blockchain applications.展开更多
The radial basis function (RBF), a kind of neural networks algorithm, is adopted to select clusterheads. It has many advantages such as simple parallel distributed computation, distributed storage, and fast learning...The radial basis function (RBF), a kind of neural networks algorithm, is adopted to select clusterheads. It has many advantages such as simple parallel distributed computation, distributed storage, and fast learning. Four factors related to a node becoming a cluster-head are drawn by analysis, which are energy ( energy available in each node), number (the number of neighboring nodes), centrality ( a value to classify the nodes based on the proximity how central the node is to the cluster), and location (the distance between the base station and the node). The factors are as input variables of neural networks and the output variable is suitability that is the degree of a node becoming a cluster head. A group of cluster-heads are selected according to the size of network. Then the base station broadcasts a message containing the list of cluster-heads' IDs to all nodes. After that, each cluster-head announces its new status to all its neighbors and sets up a new cluster. If a node around it receives the message, it registers itself to be a member of the cluster. After identifying all the members, the cluster-head manages them and carries out data aggregation in each cluster. Thus data flowing in the network decreases and energy consumption of nodes decreases accordingly. Experimental results show that, compared with other algorithms, the proposed algorithm can significantly increase the lifetime of the sensor network.展开更多
In the target tracking, the nodes aggregate their observations of the directions of arrival of the target. The network then uses an extended Kalman filter (EKF) to combine the measurements from multiple snapshots to...In the target tracking, the nodes aggregate their observations of the directions of arrival of the target. The network then uses an extended Kalman filter (EKF) to combine the measurements from multiple snapshots to track the target. In order to rapidly select the best subset of nodes to localize the target with the minimum mean square position error and low power consumption, this paper proposes a simple algorithm, which uses the location information of the target and the network. The lower botmd of localization error is utilized according to the distances between the target and the selected active nodes. Furthermore, the direction likelihoods of the active nodes is predicted by way of the node/target bearing distributing relationships.展开更多
Structural controllability is critical for operating and controlling large-scale complex networks. In real applications, for a given network, it is always desirable to have more selections for driver nodes which make ...Structural controllability is critical for operating and controlling large-scale complex networks. In real applications, for a given network, it is always desirable to have more selections for driver nodes which make the network structurally controllable. Different from the works in complex network field where structural controllability is often used to explore the emergence properties of complex networks at a macro level,in this paper, we investigate it for control design purpose at the application level and focus on describing and obtaining the solution space for all selections of driver nodes to guarantee structural controllability. In accord with practical applications,we define the complete selection rule set as the solution space which is composed of a series of selection rules expressed by intuitive algebraic forms. It explicitly indicates which nodes must be controlled and how many nodes need to be controlled in a node set and thus is particularly helpful for freely selecting driver nodes. Based on two algebraic criteria of structural controllability, we separately develop an input-connectivity algorithm and a relevancy algorithm to deduce selection rules for driver nodes. In order to reduce the computational complexity,we propose a pretreatment algorithm to reduce the scale of network's structural matrix efficiently, and a rearrangement algorithm to partition the matrix into several smaller ones. A general procedure is proposed to get the complete selection rule set for driver nodes which guarantee network's structural controllability. Simulation tests with efficiency analysis of the proposed algorithms are given and the result of applying the proposed procedure to some real networks is also shown, and these all indicate the validity of the proposed procedure.展开更多
In recent years,position information has become a key feature to drive location and context aware services in mobile communication.Researchers from all over the world have proposed many solu-tions for indoor positioni...In recent years,position information has become a key feature to drive location and context aware services in mobile communication.Researchers from all over the world have proposed many solu-tions for indoor positioning over the past several years.However,due to weak signals,multipath or non-line-of-sight signal propagation,accurately and efficiently localizing targets in harsh indoor environments re-mains a challenging problem.To improve the perfor-mance in harsh environment with insufficient anchors,cooperative localization has emerged.In this paper,a novel cooperative localization algorithm,named area optimization and node selection based sum-product al-gorithm over a wireless network(AN-SPAWN),is de-scribed and analyzed.To alleviate the high compu-tational complexity and build optimized cooperative cluster,a node selection method is designed for the cooperative localization algorithm.Numerical experi-ment results indicate that our proposed algorithm has a higher accuracy and is less impacted by NLOS errors than other conventional cooperative localization algo-rithms in the harsh indoor environments.展开更多
A novel dual-band ISGW cavity filter with enhanced frequency selectivity is proposed in this paper by utilizing a multi-mode coupling topology.Its cavity is designed to control the number of modes,and then the ports a...A novel dual-band ISGW cavity filter with enhanced frequency selectivity is proposed in this paper by utilizing a multi-mode coupling topology.Its cavity is designed to control the number of modes,and then the ports are determined by analyzing the coupling relationship between these selected modes.By synthesizing the coupling matrix of the filter,a nonresonating node(NRN)structure is introduced to flexibly tune the frequency of modes,which gets a dualband and quad-band filtering response from a tri-band filter no the NRN.Furthermore,a frequency selective surface(FSS)has been newly designed as the upper surface of the cavity,which significantly improves the bad out-of-band suppression and frequency selectivity that often exists in most traditional cavity filter designs and measurements.The results show that its two center frequencies are f01=27.50 GHz and f02=32.92GHz,respectively.Compared with the dual-band filter that there is no the FSS metasurface,the out-of-band suppression level is improved from measured 5 dB to18 dB,and its finite transmission zero(FTZ)numbers is increased from measured 1 to 4 between the two designed bands.Compared with the tri-band and quadband filter,its passband bandwidth is expanded from measured 1.17%,1.14%,and 1.13% or 1.31%,1.50%,0.56%,and 0.57% to 1.71% and 1.87%.In addition,the filter has compact,small,and lightweight characteristics.展开更多
In this editorial,we proceed to comment on the article by Chua et al,addressing the management of metastatic lateral pelvic lymph nodes(mLLN)in stage II/III rectal cancer patients below the peritoneal reflection.The t...In this editorial,we proceed to comment on the article by Chua et al,addressing the management of metastatic lateral pelvic lymph nodes(mLLN)in stage II/III rectal cancer patients below the peritoneal reflection.The treatment of this nodal area sparks significant controversy due to the strategic differences followed by Eastern and Western physicians,albeit with a higher degree of convergence in recent years.The dissection of lateral pelvic lymph nodes without neoadjuvant therapy is a standard practice in Eastern countries.In contrast,in the West,preference leans towards opting for neoadjuvant therapy with chemoradiotherapy or radiotherapy,that would cover the treatment of this area without the need to add the dissection of these nodes to the total mesorectal excision.In the presence of high-risk nodal characteristics for mLLN related to radiological imaging and lack of response to neoadjuvant therapy,the risk of lateral local recurrence increases,suggesting the appropriate selection of strategies to reduce the risk of recurrence in each patient profile.Despite the heterogeneous and retrospective nature of studies addressing this area,an international consensus is necessary to approach this clinical scenario uniformly.展开更多
Vehicular Ad hoc Networks (VANETs) which is a special form of Mobile Ad hoc Networks (MANETs) has promising application prospects in the future. Due to the rapid changing of topology structure, how to find a route whi...Vehicular Ad hoc Networks (VANETs) which is a special form of Mobile Ad hoc Networks (MANETs) has promising application prospects in the future. Due to the rapid changing of topology structure, how to find a route which can guarantee Quality of Service (QoS) is an important issue in VANETs. This paper presents an improved Greedy Perimeter Stateless Routing (GPSR) protocol based on our proposed next-hop node selection mechanism. Firstly, we define the link reliability in two cases which take the movement direction angle between two vehicles into consideration. Then we propose a next-hop node selection mechanism based on a weighted function which consists of link reliability between the sender node and next-hop candidate node, distance between next-hop candidate node and the destination, movement direction angle of next-hop candidate node. At last, an improved GPSR protocol is proposed based on the next-hop node selection mechanism. Simulation results are presented to evaluate the performance of the improved GPSR protocol, which shows that the performance including packet delivery ratio and average end-to-end delay of the proposed protocol is better in some situations.展开更多
The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider at...The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm.展开更多
The deployment of Relay Nodes (RNs) in 4G LTE-A networks, mainly originating from the wireless backhaul link, provides an excellent network planning tool to enhance system performance. Better coordination between the ...The deployment of Relay Nodes (RNs) in 4G LTE-A networks, mainly originating from the wireless backhaul link, provides an excellent network planning tool to enhance system performance. Better coordination between the base station and relays to mitigate inter-cell interference becomes an important aspect of achieving the required system performance, not only in the single-cell scenario, but also in multi-cell scenarios. In this paper, we model and analyze two basic approaches for designing a 4G LTE-A tri-sectored cellular system. The approaches are based on Antenna Selection Sectored Relaying (ASSR) and Beam Selection Sectored Relaying (BSSR). The main purpose of the proposed schemes is to enhance system performance by improving the quality of the wireless relay backhaul link. In this technique, antenna selection takes into consideration Non-Line-Of-Sight (NLOS) communication, whereas BSSR considers the case of Line-Of-Sight (LOS) communication using heuristic beam forming approach. The resource allocation problem has also been investigated for relay based cooperative LTE-A trisectored cell in the downlink. The best possible location for relay node in the sector, power allocation and MIMO channel modeling is formulated as an optimization problem with the aim of maximizing the end to end link rate and the Signal to Interference plus Noise Ratio (SINR) of 4G LTE-A systems. Power allocation/optimization has been solved by means of the duality equation of the stationary Karush-Kuhn-Tucker (KKT) cond让ion and is used to derive optimal values for the beam forming vector on both the relay as well as the access link. The performance of the proposed scheme is verified through simulations carried out using MATLAB software. The simulation results show a significant improvement in the SINR, throughput capacity, and coverage area of the 4G LTE-A cell, while guaranteeing better quality of service.展开更多
为应对开放型无线接入网(Open Radio Access Network,O-RAN)中的数据传输成本过高及网络兼容不足等问题,研究了面向O-RAN的多级边缘服务资源分配与部署联合优化问题。首先,利用四层融合模型将多目标联合优化问题转化为异构边缘服务器数...为应对开放型无线接入网(Open Radio Access Network,O-RAN)中的数据传输成本过高及网络兼容不足等问题,研究了面向O-RAN的多级边缘服务资源分配与部署联合优化问题。首先,利用四层融合模型将多目标联合优化问题转化为异构边缘服务器数量选择及位置确定问题,并提出了一种负载约束和迭代优化的异构边缘服务器资源分配算法,解决了O-RAN网络中的异构资源分配与数据传输问题。然后,提出了一种能效驱动的异构节点部署优化算法,解决了多级异构资源最佳部署位置问题。最后,利用上海电信基站的真实数据集,验证了所提资源优化与部署算法的有效性,实验结果表明,所提算法较其它算法在部署成本上至少降低了22.5%,能效比值上至少提高了25.96%。展开更多
针对无线传感器网络的选择性转发攻击行为,提出了一种结合节点特征和非合作博弈的选择性转发攻击检测(node characteristics and non-cooperative game for selective forwarding attack detection,NC-NCG)方法。该方法通过设置独立监...针对无线传感器网络的选择性转发攻击行为,提出了一种结合节点特征和非合作博弈的选择性转发攻击检测(node characteristics and non-cooperative game for selective forwarding attack detection,NC-NCG)方法。该方法通过设置独立监督网络环境,将节点特征中的转发率与门限阈值进行比较,计算小于阈值节点的当前转发率与T时间内平均转发率的偏离程度,根据偏离程度进行二次判定,以提高选择性转发攻击的检测率。同时为提高网络吞吐量,构建了不完全信息的非合作博弈模型,迫使可疑节点参与网络功能,实现节点快速识别。仿真实验结果表明,该方法不仅能够有效识别选择性转发攻击,而且在资源有限的情况下,可以提高网络吞吐量并延长网络生命周期。展开更多
基金funded by the Ministry of Education,Culture,Research,and Technology(Kemendikbudristek)of Indonesia under PDD Grant with Grant Number NKB1016/UN2.RST/HKP.05.00/2022.
文摘This research presents a reputation-based blockchain consensus mechanism called Proof of Intelligent Reputation(PoIR)as an alternative to traditional Proof of Work(PoW).PoIR addresses the limitations of existing reputationbased consensus mechanisms by proposing a more decentralized and fair node selection process.The proposed PoIR consensus combines Bidirectional Long Short-Term Memory(BiLSTM)with the Network Entity Reputation Database(NERD)to generate reputation scores for network entities and select authoritative nodes.NERD records network entity profiles based on various sources,i.e.,Warden,Blacklists,DShield,AlienVault Open Threat Exchange(OTX),and MISP(Malware Information Sharing Platform).It summarizes these profile records into a reputation score value.The PoIR consensus mechanism utilizes these reputation scores to select authoritative nodes.The evaluation demonstrates that PoIR exhibits higher centralization resistance than PoS and PoW.Authoritative nodes were selected fairly during the 1000-block proposal round,ensuring a more decentralized blockchain ecosystem.In contrast,malicious nodes successfully monopolized 58%and 32%of transaction processes in PoS and PoW,respectively,but failed to do so in PoIR.The findings also indicate that PoIR offers efficient transaction times of 12 s,outperforms reputation-based consensus such as PoW,and is comparable to reputation-based consensus such as PoS.Furthermore,the model evaluation shows that BiLSTM outperforms other Recurrent Neural Network models,i.e.,BiGRU(Bidirectional Gated Recurrent Unit),UniLSTM(Unidirectional Long Short-Term Memory),and UniGRU(Unidirectional Gated Recurrent Unit)with 0.022 Root Mean Squared Error(RMSE).This study concludes that the PoIR consensus mechanism is more resistant to centralization than PoS and PoW.Integrating BiLSTM and NERD enhances the fairness and efficiency of blockchain applications.
基金The National Natural Science Foundation of China(No.60472053),the Natural Science Foundation of Jiangsu Province(No.BK2003055),the Specialized Research Fund for the Doctoral Pro-gram of Higher Education (No.20030286017).
文摘The radial basis function (RBF), a kind of neural networks algorithm, is adopted to select clusterheads. It has many advantages such as simple parallel distributed computation, distributed storage, and fast learning. Four factors related to a node becoming a cluster-head are drawn by analysis, which are energy ( energy available in each node), number (the number of neighboring nodes), centrality ( a value to classify the nodes based on the proximity how central the node is to the cluster), and location (the distance between the base station and the node). The factors are as input variables of neural networks and the output variable is suitability that is the degree of a node becoming a cluster head. A group of cluster-heads are selected according to the size of network. Then the base station broadcasts a message containing the list of cluster-heads' IDs to all nodes. After that, each cluster-head announces its new status to all its neighbors and sets up a new cluster. If a node around it receives the message, it registers itself to be a member of the cluster. After identifying all the members, the cluster-head manages them and carries out data aggregation in each cluster. Thus data flowing in the network decreases and energy consumption of nodes decreases accordingly. Experimental results show that, compared with other algorithms, the proposed algorithm can significantly increase the lifetime of the sensor network.
基金National Natural Science Foundation of China(60532030)National Basic Research Program of China(973-61361)National Science Fund for Distinguished Young Scholars(60625102)
文摘In the target tracking, the nodes aggregate their observations of the directions of arrival of the target. The network then uses an extended Kalman filter (EKF) to combine the measurements from multiple snapshots to track the target. In order to rapidly select the best subset of nodes to localize the target with the minimum mean square position error and low power consumption, this paper proposes a simple algorithm, which uses the location information of the target and the network. The lower botmd of localization error is utilized according to the distances between the target and the selected active nodes. Furthermore, the direction likelihoods of the active nodes is predicted by way of the node/target bearing distributing relationships.
基金supported by the National Science Foundation of China(61333009,61473317,61433002,61521063,61590924,61673366)the National High Technology Research and Development Program of China(2015AA043102)
文摘Structural controllability is critical for operating and controlling large-scale complex networks. In real applications, for a given network, it is always desirable to have more selections for driver nodes which make the network structurally controllable. Different from the works in complex network field where structural controllability is often used to explore the emergence properties of complex networks at a macro level,in this paper, we investigate it for control design purpose at the application level and focus on describing and obtaining the solution space for all selections of driver nodes to guarantee structural controllability. In accord with practical applications,we define the complete selection rule set as the solution space which is composed of a series of selection rules expressed by intuitive algebraic forms. It explicitly indicates which nodes must be controlled and how many nodes need to be controlled in a node set and thus is particularly helpful for freely selecting driver nodes. Based on two algebraic criteria of structural controllability, we separately develop an input-connectivity algorithm and a relevancy algorithm to deduce selection rules for driver nodes. In order to reduce the computational complexity,we propose a pretreatment algorithm to reduce the scale of network's structural matrix efficiently, and a rearrangement algorithm to partition the matrix into several smaller ones. A general procedure is proposed to get the complete selection rule set for driver nodes which guarantee network's structural controllability. Simulation tests with efficiency analysis of the proposed algorithms are given and the result of applying the proposed procedure to some real networks is also shown, and these all indicate the validity of the proposed procedure.
基金the Nation-alKey Research&Development Program of China un-der Grant No.2020YFC1511702 and Open Fund of IPOC(BUPT)No.IPOC2021ZT20.
文摘In recent years,position information has become a key feature to drive location and context aware services in mobile communication.Researchers from all over the world have proposed many solu-tions for indoor positioning over the past several years.However,due to weak signals,multipath or non-line-of-sight signal propagation,accurately and efficiently localizing targets in harsh indoor environments re-mains a challenging problem.To improve the perfor-mance in harsh environment with insufficient anchors,cooperative localization has emerged.In this paper,a novel cooperative localization algorithm,named area optimization and node selection based sum-product al-gorithm over a wireless network(AN-SPAWN),is de-scribed and analyzed.To alleviate the high compu-tational complexity and build optimized cooperative cluster,a node selection method is designed for the cooperative localization algorithm.Numerical experi-ment results indicate that our proposed algorithm has a higher accuracy and is less impacted by NLOS errors than other conventional cooperative localization algo-rithms in the harsh indoor environments.
基金supported by the National key research and development program of China(No.2021YFB2900401)by the National Natural Science Foundation of China(No.61861046)+1 种基金the key Natural Science Foundation of shenzhen(No.JCYJ20220818102209020)the key research and development program of shenzhen(No.ZDSYS20210623091807023)。
文摘A novel dual-band ISGW cavity filter with enhanced frequency selectivity is proposed in this paper by utilizing a multi-mode coupling topology.Its cavity is designed to control the number of modes,and then the ports are determined by analyzing the coupling relationship between these selected modes.By synthesizing the coupling matrix of the filter,a nonresonating node(NRN)structure is introduced to flexibly tune the frequency of modes,which gets a dualband and quad-band filtering response from a tri-band filter no the NRN.Furthermore,a frequency selective surface(FSS)has been newly designed as the upper surface of the cavity,which significantly improves the bad out-of-band suppression and frequency selectivity that often exists in most traditional cavity filter designs and measurements.The results show that its two center frequencies are f01=27.50 GHz and f02=32.92GHz,respectively.Compared with the dual-band filter that there is no the FSS metasurface,the out-of-band suppression level is improved from measured 5 dB to18 dB,and its finite transmission zero(FTZ)numbers is increased from measured 1 to 4 between the two designed bands.Compared with the tri-band and quadband filter,its passband bandwidth is expanded from measured 1.17%,1.14%,and 1.13% or 1.31%,1.50%,0.56%,and 0.57% to 1.71% and 1.87%.In addition,the filter has compact,small,and lightweight characteristics.
文摘In this editorial,we proceed to comment on the article by Chua et al,addressing the management of metastatic lateral pelvic lymph nodes(mLLN)in stage II/III rectal cancer patients below the peritoneal reflection.The treatment of this nodal area sparks significant controversy due to the strategic differences followed by Eastern and Western physicians,albeit with a higher degree of convergence in recent years.The dissection of lateral pelvic lymph nodes without neoadjuvant therapy is a standard practice in Eastern countries.In contrast,in the West,preference leans towards opting for neoadjuvant therapy with chemoradiotherapy or radiotherapy,that would cover the treatment of this area without the need to add the dissection of these nodes to the total mesorectal excision.In the presence of high-risk nodal characteristics for mLLN related to radiological imaging and lack of response to neoadjuvant therapy,the risk of lateral local recurrence increases,suggesting the appropriate selection of strategies to reduce the risk of recurrence in each patient profile.Despite the heterogeneous and retrospective nature of studies addressing this area,an international consensus is necessary to approach this clinical scenario uniformly.
文摘Vehicular Ad hoc Networks (VANETs) which is a special form of Mobile Ad hoc Networks (MANETs) has promising application prospects in the future. Due to the rapid changing of topology structure, how to find a route which can guarantee Quality of Service (QoS) is an important issue in VANETs. This paper presents an improved Greedy Perimeter Stateless Routing (GPSR) protocol based on our proposed next-hop node selection mechanism. Firstly, we define the link reliability in two cases which take the movement direction angle between two vehicles into consideration. Then we propose a next-hop node selection mechanism based on a weighted function which consists of link reliability between the sender node and next-hop candidate node, distance between next-hop candidate node and the destination, movement direction angle of next-hop candidate node. At last, an improved GPSR protocol is proposed based on the next-hop node selection mechanism. Simulation results are presented to evaluate the performance of the improved GPSR protocol, which shows that the performance including packet delivery ratio and average end-to-end delay of the proposed protocol is better in some situations.
文摘The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm.
文摘The deployment of Relay Nodes (RNs) in 4G LTE-A networks, mainly originating from the wireless backhaul link, provides an excellent network planning tool to enhance system performance. Better coordination between the base station and relays to mitigate inter-cell interference becomes an important aspect of achieving the required system performance, not only in the single-cell scenario, but also in multi-cell scenarios. In this paper, we model and analyze two basic approaches for designing a 4G LTE-A tri-sectored cellular system. The approaches are based on Antenna Selection Sectored Relaying (ASSR) and Beam Selection Sectored Relaying (BSSR). The main purpose of the proposed schemes is to enhance system performance by improving the quality of the wireless relay backhaul link. In this technique, antenna selection takes into consideration Non-Line-Of-Sight (NLOS) communication, whereas BSSR considers the case of Line-Of-Sight (LOS) communication using heuristic beam forming approach. The resource allocation problem has also been investigated for relay based cooperative LTE-A trisectored cell in the downlink. The best possible location for relay node in the sector, power allocation and MIMO channel modeling is formulated as an optimization problem with the aim of maximizing the end to end link rate and the Signal to Interference plus Noise Ratio (SINR) of 4G LTE-A systems. Power allocation/optimization has been solved by means of the duality equation of the stationary Karush-Kuhn-Tucker (KKT) cond让ion and is used to derive optimal values for the beam forming vector on both the relay as well as the access link. The performance of the proposed scheme is verified through simulations carried out using MATLAB software. The simulation results show a significant improvement in the SINR, throughput capacity, and coverage area of the 4G LTE-A cell, while guaranteeing better quality of service.
文摘为应对开放型无线接入网(Open Radio Access Network,O-RAN)中的数据传输成本过高及网络兼容不足等问题,研究了面向O-RAN的多级边缘服务资源分配与部署联合优化问题。首先,利用四层融合模型将多目标联合优化问题转化为异构边缘服务器数量选择及位置确定问题,并提出了一种负载约束和迭代优化的异构边缘服务器资源分配算法,解决了O-RAN网络中的异构资源分配与数据传输问题。然后,提出了一种能效驱动的异构节点部署优化算法,解决了多级异构资源最佳部署位置问题。最后,利用上海电信基站的真实数据集,验证了所提资源优化与部署算法的有效性,实验结果表明,所提算法较其它算法在部署成本上至少降低了22.5%,能效比值上至少提高了25.96%。
文摘针对无线传感器网络的选择性转发攻击行为,提出了一种结合节点特征和非合作博弈的选择性转发攻击检测(node characteristics and non-cooperative game for selective forwarding attack detection,NC-NCG)方法。该方法通过设置独立监督网络环境,将节点特征中的转发率与门限阈值进行比较,计算小于阈值节点的当前转发率与T时间内平均转发率的偏离程度,根据偏离程度进行二次判定,以提高选择性转发攻击的检测率。同时为提高网络吞吐量,构建了不完全信息的非合作博弈模型,迫使可疑节点参与网络功能,实现节点快速识别。仿真实验结果表明,该方法不仅能够有效识别选择性转发攻击,而且在资源有限的情况下,可以提高网络吞吐量并延长网络生命周期。