期刊文献+
共找到702篇文章
< 1 2 36 >
每页显示 20 50 100
Secrecy Outage Probability Minimization in Wireless-Powered Communications Using an Improved Biogeography-Based Optimization-Inspired Recurrent Neural Network
1
作者 Mohammad Mehdi Sharifi Nevisi Elnaz Bashir +3 位作者 Diego Martín Seyedkian Rezvanjou Farzaneh Shoushtari Ehsan Ghafourian 《Computers, Materials & Continua》 SCIE EI 2024年第3期3971-3991,共21页
This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The mai... This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The main contribution of the paper is a novel approach to minimize the secrecy outage probability(SOP)in these systems.Minimizing SOP is crucial for maintaining the confidentiality and integrity of data,especially in situations where the transmission of sensitive data is critical.Our proposed method harnesses the power of an improved biogeography-based optimization(IBBO)to effectively train a recurrent neural network(RNN).The proposed IBBO introduces an innovative migration model.The core advantage of IBBO lies in its adeptness at maintaining equilibrium between exploration and exploitation.This is accomplished by integrating tactics such as advancing towards a random habitat,adopting the crossover operator from genetic algorithms(GA),and utilizing the global best(Gbest)operator from particle swarm optimization(PSO)into the IBBO framework.The IBBO demonstrates its efficacy by enabling the RNN to optimize the system parameters,resulting in significant outage probability reduction.Through comprehensive simulations,we showcase the superiority of the IBBO-RNN over existing approaches,highlighting its capability to achieve remarkable gains in SOP minimization.This paper compares nine methods for predicting outage probability in wireless-powered communications.The IBBO-RNN achieved the highest accuracy rate of 98.92%,showing a significant performance improvement.In contrast,the standard RNN recorded lower accuracy rates of 91.27%.The IBBO-RNN maintains lower SOP values across the entire signal-to-noise ratio(SNR)spectrum tested,suggesting that the method is highly effective at optimizing system parameters for improved secrecy even at lower SNRs. 展开更多
关键词 Wireless-powered communications secrecy outage probability improved biogeography-based optimization recurrent neural network
下载PDF
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks 被引量:1
2
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 Vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
下载PDF
Call for Papers--Feature Topic Vol. 22, No. 3, 2025 Special Issue of China Communications: Convergence of 6G empowered Edge Intelligence and Generative AI: Theories, Algorithms, and Applications
3
《China Communications》 SCIE CSCD 2024年第4期I0002-I0002,共1页
Generative artificial intelligence(AI), as an emerging paradigm in content generation, has demonstrated its great potentials in creating high-fidelity data including images, texts, and videos. Nowadays wireless networ... Generative artificial intelligence(AI), as an emerging paradigm in content generation, has demonstrated its great potentials in creating high-fidelity data including images, texts, and videos. Nowadays wireless networks and applications have been rapidly evolving from achieving “connected things” to embracing “connected intelligence”. 展开更多
关键词 communications wireless networks
下载PDF
Covert LEO Satellite Communication Aided by Generative Adversarial Network Based Cooperative UAV Jamming
4
作者 Shi Jia Li Xiaomeng +2 位作者 Liao Xiaomin Tie Zhuangzhuang Hu Junfan 《China Communications》 SCIE CSCD 2024年第9期27-39,共13页
In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LE... In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LEO satellite transmission,a multi-objective problem is formulated to jointly optimize the UAV’s jamming power and trajectory.For practical consideration,we assume that the UAV can only have partial environmental information,and can’t know the detection threshold and exact location of the eavesdropper on the ground.To solve the multiobjective problem,we propose the data-driven generative adversarial network(DD-GAN)based method to optimize the power and trajectory of the UAV,in which the sample data is collected by using genetic algorithm(GA).Simulation results show that the jamming solution of UAV generated by DD-GAN can achieve an effective trade-off between covert rate and probability of detection errors when only limited prior information is obtained. 展开更多
关键词 covert communication generative adversarial network LEO satellite UAV jammer
下载PDF
Ultimately Bounded Output Feedback Control for Networked Nonlinear Systems With Unreliable Communication Channel: A Buffer-Aided Strategy
5
作者 Yuhan Zhang Zidong Wang +2 位作者 Lei Zou Yun Chen Guoping Lu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1566-1578,共13页
This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication... This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication constraints.These transmissions are carried out over an unreliable communication channel. In order to enhance the utilization rate of measurement data, a buffer-aided strategy is novelly employed to store historical measurements when communication networks are inaccessible. Using the neural network technique, a novel observer-based controller is introduced to address effects of signal transmission behaviors and unknown nonlinear dynamics.Through the application of stochastic analysis and Lyapunov stability, a joint framework is constructed for analyzing resultant system performance under the introduced controller. Subsequently, existence conditions for the desired output-feedback controller are delineated. The required parameters for the observerbased controller are then determined by resolving some specific matrix inequalities. Finally, a simulation example is showcased to confirm method efficacy. 展开更多
关键词 Buffer-aided strategy neural networks nonlinear control output-feedback control unreliable communication channel
下载PDF
A CSMA/CA based MAC protocol for hybrid Power-line/Visible-light communication networks:Design and analysis
6
作者 Sheng Hao Huyin Zhang +2 位作者 Fei Yang Chenghao Li Jing Wang 《Digital Communications and Networks》 SCIE CSCD 2024年第2期481-497,共17页
Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and har... Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and hardware efficiency.Current research on HPVC networks focuses on the performance analysis and optimization of the Physical(PHY)layer,where the Power Line Communication(PLC)component only serves as the backbone to provide power to light Emitting Diode(LED)devices.So designing a Media Access Control(MAC)protocol remains a great challenge because it allows both PLC and Visible Light Communication(VLC)components to operate data transmission,i.e.,to achieve a true HPVC network CC.To solve this problem,we propose a new HPC network MAC protocol(HPVC MAC)based on Carrier Sense Multiple Access/Collision Avoidance(CSMA/CA)by combining IEEE 802.15.7 and IEEE 1901 standards.Firstly,we add an Additional Assistance(AA)layer to provide the channel selection strategies for sensor stations,so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism,respectively.Based on this,we give a detailed working principle of the HPVC MAC,followed by the construction of a joint analytical model for mathematicalmathematical validation of the HPVC MAC.In the modeling process,the impacts of PHY layer settings(including channel fading types and additive noise feature),CSMA/CA mechanisms of 802.15.7 and 1901,and practical configurations(such as traffic rate,transit buffer size)are comprehensively taken into consideration.Moreover,we prove the proposed analytical model has the solvability.Finally,through extensive simulations,we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62%between the simulation and analytical results. 展开更多
关键词 Hybrid power-line/Visible light communication (HPVC)networks MAC protocol CSMA/CA IEEE 802.15.7 IEEE 1901 Performance analysis
下载PDF
Space/Air Covert Communications:Potentials,Scenarios,and Key Technologies
7
作者 Mao Haobin Liu Yanming +5 位作者 Zhu Lipeng Mao Tianqi Xiao Zhenyu Zhang Rui Han Zhu Xia Xianggen 《China Communications》 SCIE CSCD 2024年第3期1-18,共18页
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel... Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation. 展开更多
关键词 artificial intelligence(AI) sixth generation(6G) space-air-ground integrated networks(SAGINs) space/air covert communications
下载PDF
Sensing and Communication Integrated Fast Neighbor Discovery for UAV Networks
8
作者 WEI Zhiqing ZHANG Yongji +1 位作者 JI Danna LI Chenfei 《ZTE Communications》 2024年第3期69-82,共14页
In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communicati... In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communication(ISAC),as an emerging technology in 6G mobile networks,has shown great potential in improving communication performance with the assistance of sensing information.ISAC obtains the prior information about node distribution,reducing the ND time.However,the prior information obtained through ISAC may be imperfect.Hence,an ND algorithm based on reinforcement learning is proposed.The learning automaton(LA)is applied to interact with the environment and continuously adjust the probability of selecting beams to accelerate the convergence speed of ND algorithms.Besides,an efficient ND algorithm in the neighbor maintenance phase is designed,which applies the Kalman filter to predict node movement.Simulation results show that the LA-based ND algorithm reduces the ND time by up to 32%compared with the Scan-Based Algorithm(SBA),which proves the efficiency of the proposed ND algorithms. 展开更多
关键词 unmanned aerial vehicle networks neighbor discovery integrated sensing and communication reinforcement learning Kalman filter
下载PDF
Cutting-Edge Challenges in Communication Technology and Computer Network Security
9
作者 Haikang Gu 《Journal of Electronic Research and Application》 2024年第5期26-31,共6页
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev... The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks. 展开更多
关键词 communication technology Computer network SECURITY
下载PDF
Generative Adversarial Networks Based Digital Twin Channel Modeling for Intelligent Communication Networks 被引量:1
10
作者 Yuxin Zhang Ruisi He +5 位作者 Bo Ai Mi Yang Ruifeng Chen Chenlong Wang Zhengyu Zhang Zhangdui Zhong 《China Communications》 SCIE CSCD 2023年第8期32-43,共12页
Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With D... Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With DT channel modeling,the generated channel data can be closer to realistic channel measurements without requiring a prior channel model,and amount of channel data can be significantly increased.Artificial intelligence(AI)based modeling approach shows outstanding performance to solve such problems.In this work,a channel modeling method based on generative adversarial networks is proposed for DT channel,which can generate identical statistical distribution with measured channel.Model validation is conducted by comparing DT channel characteristics with measurements,and results show that DT channel leads to fairly good agreement with measured channel.Finally,a link-layer simulation is implemented based on DT channel.It is found that the proposed DT channel model can be well used to conduct link-layer simulation and its performance is comparable to using measurement data.The observations and results can facilitate the development of DT channel modeling and provide new thoughts for DT channel applications,as well as improving the performance and reliability of intelligent communication networking. 展开更多
关键词 digital twin channel modeling generative adversarial networks intelligent communication networking
下载PDF
Guest editorial: Network architectures and communication protocols for smart industrial IoT applications
11
作者 Fazlullah Khan Joel J.P.C.Rodrigues Mian Ahmad Jan 《Digital Communications and Networks》 SCIE CSCD 2023年第2期293-295,共3页
The rapid growth in hardware technologies and the fourth industrial revolution-Industry 4.0 have enabled the Internet of Things(IoT)to be smarter.One of the main drivers in Industry 4.0 is smart and secured Industrial... The rapid growth in hardware technologies and the fourth industrial revolution-Industry 4.0 have enabled the Internet of Things(IoT)to be smarter.One of the main drivers in Industry 4.0 is smart and secured Industrial IoT(IIoT)[1].The IIoT results from the widespread use of computers and the interconnectedness of machines.It has made software a crucial tool for almost every industry,from bakeries and arts to manufacturing facilities and healthcare systems[2].The IIoT devices can be mobile and geographically distributed over a long distance,which exposes them to network disturbances,Quality of Service(QoS)degradation,and security vulnerabilities.In addition,the IIoT is a complex network at a large scale,and there is a dire need for network architecture and protocol design to accommodate these diverse domains and competencies and handle the increasing levels of complexity.Therefore,in this special issue,we aim to focus on the challenges of network architectures and communication protocol design in the context of the smart industry.This special issue has attracted numerous high-quality research articles and has accepted fourteen research papers[3–16]. 展开更多
关键词 IOT network communicATION
下载PDF
Covert Communication in Integrated High Altitude Platform Station Terrestrial Networks
12
作者 Zeke Wu Kefeng Guo +1 位作者 Rui Liu Shibin Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第4期583-598,共16页
In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network n... In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network needs to be developed into the sixth generation(6G)network.However,with the increasingly prominent security problems of wireless communication networks such as 6G,covert communication has been recognized as one of the most promising solutions.Covert communication can realize the transmission of hidden information between both sides of communication to a certain extent,which makes the transmission content and transmission behavior challenging to be detected by noncooperative eavesdroppers.In addition,the integrated high altitude platform station(HAPS)terrestrial network is considered a promising development direction because of its flexibility and scalability.Based on the above facts,this article investigates the covert communication in an integrated HAPS terrestrial network,where a constant power auxiliary node is utilized to send artificial noise(AN)to realize the covert communication.Specifically,the covert constraint relationship between the transmitting and auxiliary nodes is derived.Moreover,the closed-form expressions of outage probability(OP)and effective covert communication rate are obtained.Finally,numerical results are provided to verify our analysis and reveal the impacts of critical parameters on the system performance. 展开更多
关键词 Covert communication the integrated HAPS terrestrial network constant power auxiliary node artificial noise(AN) effective covert communication rate
下载PDF
New Optimal Power Allocation for Bidirectional Communications in Cognitive Relay Network Using Analog Network Coding 被引量:2
13
作者 LU Luxi JIANG Wei XIANG Haige LUO Wu 《China Communications》 SCIE CSCD 2010年第4期144-148,共5页
Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information w... Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information with the assistance of a relay node under interference power constraints.In order to enhance the transmit rate and maintain fairness between two source terminals,a practical 2-phase analog network coding protocol is adopted and its optimal power allocation algorithm is proposed.Numerical results verify the superiority of the proposed algorithm over the conventional direct transmission protocol and 4-phase amplify-and-forward relay protocol. 展开更多
关键词 Cognitive Radio Cooperative communication Analog network Coding Bidirectional communications Interference power constraint
下载PDF
Training-based symbol detection with temporal convolutional neural network in single-polarized optical communication system
14
作者 Yingzhe Luo Jianhao Hu 《Digital Communications and Networks》 SCIE CSCD 2023年第4期920-930,共11页
In order to reduce the physical impairment caused by signal distortion,in this paper,we investigate symbol detection with Deep Learning(DL)methods to improve bit-error performance in the optical communication system.M... In order to reduce the physical impairment caused by signal distortion,in this paper,we investigate symbol detection with Deep Learning(DL)methods to improve bit-error performance in the optical communication system.Many DL-based methods have been applied to such systems to improve bit-error performance.Referring to the speech-to-text method of automatic speech recognition,this paper proposes a signal-to-symbol method based on DL and designs a receiver for symbol detection on single-polarized optical communications modes.To realize this detection method,we propose a non-causal temporal convolutional network-assisted receiver to detect symbols directly from the baseband signal,which specifically integrates most modules of the receiver.Meanwhile,we adopt three training approaches for different signal-to-noise ratios.We also apply a parametric rectified linear unit to enhance the noise robustness of the proposed network.According to the simulation experiments,the biterror-rate performance of the proposed method is close to or even superior to that of the conventional receiver and better than the recurrent neural network-based receiver. 展开更多
关键词 Deep learning Optical communications Symbol detection Temporal convolutional network
下载PDF
Towards Fully Secure 5G Ultra-Low Latency Communications: A Cost-Security Functions Analysis
15
作者 Borja Bordel Ramón Alcarria +3 位作者 Joaquin Chung Rajkumar Kettimuthu Tomás Robles Iván Armuelles 《Computers, Materials & Continua》 SCIE EI 2023年第1期855-880,共26页
Future components to enhance the basic,native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered,or lightweight solutions adapted to ultrareliable ... Future components to enhance the basic,native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered,or lightweight solutions adapted to ultrareliable low-latency communications(URLLC)but whose security properties remain under discussion.Although different 5G network slices may have different requirements,in general,both visions seem to fall short at provisioning secure URLLC in the future.In this work we address this challenge,by introducing cost-security functions as a method to evaluate the performance and adequacy of most developed and employed non-native enhanced security mechanisms in 5G networks.We categorize those new security components into different groups according to their purpose and deployment scope.We propose to analyze them in the context of existing 5G architectures using two different approaches.First,using model checking techniques,we will evaluate the probability of an attacker to be successful against each security solution.Second,using analytical models,we will analyze the impact of these security mechanisms in terms of delay,throughput consumption,and reliability.Finally,we will combine both approaches using stochastic cost-security functions and the PRISM model checker to create a global picture.Our results are first evidence of how a 5G network that covers and strengthened all security areas through enhanced,dedicated non-native mechanisms could only guarantee secure URLLC with a probability of∼55%. 展开更多
关键词 5G networks security analysis secure low latency communications URLLC eMBBC
下载PDF
Secure vehicular data communication in Named Data Networking
16
作者 Xiaonan Wang Xilan Chen Xingwei Wang 《Digital Communications and Networks》 SCIE CSCD 2023年第1期203-210,共8页
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data N... Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives. 展开更多
关键词 Named data networking Reverse path Secure data communication
下载PDF
Low Altitude Satellite Constellation for Futuristic Aerial-Ground Communications
17
作者 Saifur Rahman Sabuj Mohammad Saadman Alam +2 位作者 Majumder Haider Md Akbar Hossain Al-Sakib Khan Pathan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1053-1089,共37页
This paper discusses the significance and prospects of low altitude small satellite aerial vehicles to ensure smooth aerial-ground communications for next-generation broadband networks.To achieve the generic goals of ... This paper discusses the significance and prospects of low altitude small satellite aerial vehicles to ensure smooth aerial-ground communications for next-generation broadband networks.To achieve the generic goals of fifthgeneration and beyondwireless networks,the existing aerial network architecture needs to be revisited.The detailed architecture of low altitude aerial networks and the challenges in resource management have been illustrated in this paper.Moreover,we have studied the coordination between promising communication technologies and low altitude aerial networks to provide robust network coverage.We talk about the techniques that can ensure userfriendly control and monitoring of the low altitude aerial networks to bring forth wireless broadband connectivity to a new dimension.In the end,we highlight the future research directions of aerial-ground communications in terms of access technologies,machine learning,compressed sensing,and quantum communications. 展开更多
关键词 Aerial-terrestrial network cognitive radio network cooperative communication high altitude platform low altitude platform low earth orbit satellite constellation unmanned aerial vehicle
下载PDF
Sonar Image Target Detection for Underwater Communication System Based on Deep Neural Network
18
作者 Lilan Zou Bo Liang +2 位作者 Xu Cheng Shufa Li Cong Lin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第12期2641-2659,共19页
Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and mo... Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and model detection performance is degraded due to the complex imaging environment,we proposed a more effective and robust target detection framework based on deep learning,which can make full use of the acoustic shadow information in the forward-looking sonar images to assist underwater target detection.Firstly,the weighted box fusion method is adopted to generate a fusion box by weighted fusion of prediction boxes with high confidence,so as to obtain accurate acoustic shadow boxes.Further,the acoustic shadow box is cut down to get the feature map containing the acoustic shadow information,and then the acoustic shadow feature map and the target information feature map are adaptively fused to make full use of the acoustic shadow feature information.In addition,we introduce a threshold processing module to improve the attention of the model to important feature information.Through the underwater sonar dataset provided by Pengcheng Laboratory,the proposed method improved the average accuracy by 3.14%at the IoU threshold of 0.7,which is better than the current traditional target detection model. 展开更多
关键词 Underwater communication intelligent sensor network target detection weighted frame fusion shadow information
下载PDF
Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks 被引量:2
19
作者 Yuan Zhi Jie Tian +2 位作者 Xiaofang Deng Jingping Qiao Dianjie Lu 《Digital Communications and Networks》 SCIE CSCD 2022年第5期834-842,共9页
Device-to-Device(D2D)communication-enabled Heterogeneous Cellular Networks(HCNs)have been a promising technology for satisfying the growing demands of smart mobile devices in fifth-generation mobile networks.The intro... Device-to-Device(D2D)communication-enabled Heterogeneous Cellular Networks(HCNs)have been a promising technology for satisfying the growing demands of smart mobile devices in fifth-generation mobile networks.The introduction of Millimeter Wave(mm-wave)communications into D2D-enabled HCNs allows higher system capacity and user data rates to be achieved.However,interference among cellular and D2D links remains severe due to spectrum sharing.In this paper,to guarantee user Quality of Service(QoS)requirements and effectively manage the interference among users,we focus on investigating the joint optimization problem of mode selection and channel allocation in D2D-enabled HCNs with mm-wave and cellular bands.The optimization problem is formulated as the maximization of the system sum-rate under QoS constraints of both cellular and D2D users in HCNs.To solve it,a distributed multiagent deep Q-network algorithm is proposed,where the reward function is redefined according to the optimization objective.In addition,to reduce signaling overhead,a partial information sharing strategy that does not observe global information is proposed for D2D agents to select the optimal mode and channel through learning.Simulation results illustrate that the proposed joint optimization algorithm possesses good convergence and achieves better system performance compared with other existing schemes. 展开更多
关键词 Deep reinforcement learning Heterogeneous cellular networks Device-to-device communication Millimeter wave communication Resource allocation
下载PDF
Intelligent Modulation Recognition of Communication Signal for Next-Generation 6G Networks
20
作者 Mrim M.Alnfiai 《Computers, Materials & Continua》 SCIE EI 2023年第3期5723-5740,共18页
In recent years,the need for a fast,efficient and a reliable wireless network has increased dramatically.Numerous 5G networks have already been tested while a few are in the early stages of deployment.In noncooperativ... In recent years,the need for a fast,efficient and a reliable wireless network has increased dramatically.Numerous 5G networks have already been tested while a few are in the early stages of deployment.In noncooperative communication scenarios,the recognition of digital signal modulations assists people in identifying the communication targets and ensures an effective management over them.The recent advancements in both Machine Learning(ML)and Deep Learning(DL)models demand the development of effective modulation recognition models with self-learning capability.In this background,the current research article designs aDeep Learning enabled Intelligent Modulation Recognition of Communication Signal(DLIMR-CS)technique for next-generation networks.The aim of the proposed DLIMR-CS technique is to classify different kinds of digitally-modulated signals.In addition,the fractal feature extraction process is appliedwith the help of the Sevcik Fractal Dimension(SFD)approach.Then,the extracted features are fed into the Deep Variational Autoencoder(DVAE)model for the classification of the modulated signals.In order to improve the classification performance of the DVAE model,the Tunicate Swarm Algorithm(TSA)is used to finetune the hyperparameters involved in DVAE model.A wide range of simulations was conducted to establish the enhanced performance of the proposed DLIMR-CS model.The experimental outcomes confirmed the superior recognition rate of the DLIMR-CS model over recent state-of-the-art methods under different evaluation parameters. 展开更多
关键词 6G networks communication signal modulation recognition deep learning machine learning parameter optimization
下载PDF
上一页 1 2 36 下一页 到第
使用帮助 返回顶部