期刊文献+
共找到295篇文章
< 1 2 15 >
每页显示 20 50 100
Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems
1
作者 Hemant Kumar Narsani Ali Ranjha +2 位作者 Kapal Dev Fida Hussain Memon Nawab Muhammad Faseeh Qureshi 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1458-1464,共7页
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabil... Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G networks.In this regard,UAVs have appeared as a winning candidate to mitigate security risks.In this paper,we leverage UAVs to propose two methods.The first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver devices.Moreover,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,i.e.increasing secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF relay.Additionally,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation distance.Lastly,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations. 展开更多
关键词 URLLC UAV-Assisted communications 6G systems Secrecy rate
下载PDF
Machine Learning-Based Channel State Estimators for 5G Wireless Communication Systems
2
作者 Mohamed Hassan Essai Ali Fahad Alraddady +1 位作者 Mo’ath Y.Al-Thunaibat Shaima Elnazer 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第4期755-778,共24页
For a 5G wireless communication system,a convolutional deep neural network(CNN)is employed to synthesize a robust channel state estimator(CSE).The proposed CSE extracts channel information from transmit-and-receive pa... For a 5G wireless communication system,a convolutional deep neural network(CNN)is employed to synthesize a robust channel state estimator(CSE).The proposed CSE extracts channel information from transmit-and-receive pairs through offline training to estimate the channel state information.Also,it utilizes pilots to offer more helpful information about the communication channel.The proposedCNN-CSE performance is compared with previously published results for Bidirectional/long short-term memory(BiLSTM/LSTM)NNs-based CSEs.The CNN-CSE achieves outstanding performance using sufficient pilots only and loses its functionality at limited pilots compared with BiLSTM and LSTM-based estimators.Using three different loss function-based classification layers and the Adam optimization algorithm,a comparative study was conducted to assess the performance of the presented DNNs-based CSEs.The BiLSTM-CSE outperforms LSTM,CNN,conventional least squares(LS),and minimum mean square error(MMSE)CSEs.In addition,the computational and learning time complexities for DNN-CSEs are provided.These estimators are promising for 5G and future communication systems because they can analyze large amounts of data,discover statistical dependencies,learn correlations between features,and generalize the gotten knowledge. 展开更多
关键词 DLNNs channel state estimator 5G and beyond communication systems robust loss functions
下载PDF
UAV-supported intelligent truth discovery to achieve low-cost communications in mobile crowd sensing
3
作者 Jing Bai Jinsong Gui +2 位作者 Guosheng Huang Shaobo Zhang Anfeng Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第4期837-852,共16页
Unmanned and aerial systems as interactors among different system components for communications,have opened up great opportunities for truth data discovery in Mobile Crowd Sensing(MCS)which has not been properly solve... Unmanned and aerial systems as interactors among different system components for communications,have opened up great opportunities for truth data discovery in Mobile Crowd Sensing(MCS)which has not been properly solved in the literature.In this paper,an Unmanned Aerial Vehicles-supported Intelligent Truth Discovery(UAV-ITD)scheme is proposed to obtain truth data at low-cost communications for MCS.The main innovations of the UAV-ITD scheme are as follows:(1)UAV-ITD scheme takes the first step in employing UAV joint Deep Matrix Factorization(DMF)to discover truth data based on the trust mechanism for an Information Elicitation Without Verification(IEWV)problem in MCS.(2)This paper introduces a truth data discovery scheme for the first time that only needs to collect a part of n data samples to infer the data of the entire network with high accuracy,which saves more communication costs than most previous data collection schemes,where they collect n or kn data samples.Finally,we conducted extensive experiments to evaluate the UAV-ITD scheme.The results show that compared with previous schemes,our scheme can reduce estimated truth error by 52.25%–96.09%,increase the accuracy of workers’trust evaluation by 0.68–61.82 times,and save recruitment costs by 24.08%–54.15%in truth data discovery. 展开更多
关键词 Unmanned aerial systems Trust computing Truth discovery Deep matrix factorization Low-cost communications
下载PDF
Physical Layer Security of 6G Vehicular Networks with UAV Systems:First Order Secrecy Metrics,Optimization,and Bounds
4
作者 Sagar Kavaiya Hiren Mewada +3 位作者 Sagarkumar Patel Dharmendra Chauhan Faris A.Almalki Hana Mohammed Mujlid 《Computers, Materials & Continua》 SCIE EI 2024年第9期3685-3711,共27页
The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundes... The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers. 展开更多
关键词 Physical layer security 3D positioning 6G communications UAV systems
下载PDF
Energy-efficient joint UAV secure communication and 3D trajectory optimization assisted by reconfigurable intelligent surfaces in the presence of eavesdroppers
5
作者 Huang Hailong Mohsen Eskandari +1 位作者 Andrey V.Savkin Wei Ni 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第1期537-543,共7页
We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reco... We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs) help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV,subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control(MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations. 展开更多
关键词 Unmanned aerial systems(UASs) Unmanned aerial vehicle(UAV) communication security Eaves-dropping Reconfigurable intelligent surfaces(RIS) Autonomous navigation and placement Path planning Model predictive control
下载PDF
Therapeutic Communication Methods Targeting Families and Family Members: A Literature Review
6
作者 Taketo Watsuji Naohiro Hohashi 《Open Journal of Nursing》 2024年第1期11-26,共16页
Background and Purpose: Therapeutic communication is a new term in family health care nursing, defined by Hohashi (2019) as a method of family intervention, and characterized by inclusion of not only verbal conversati... Background and Purpose: Therapeutic communication is a new term in family health care nursing, defined by Hohashi (2019) as a method of family intervention, and characterized by inclusion of not only verbal conversation but also nonverbal interaction. However, specific therapeutic communication methods have not been systematized. The purpose of this study was to clarify therapeutic communication methods for families/family members from the perspectives of verbal communication and non-verbal communication through a review of existing literature. Methods: We conducted a search using the medical literature databases PubMed and Ichushi-Web using the keywords “therapeutic communication”. Analysis was performed on seven articles from PubMed and 14 articles from Ichushi-Web that described therapeutic communication methods performed by healthcare professionals for families/family members. Through directed content analysis, therapeutic communication methods were subcategorized, and classified into three categories: verbal communication, non-verbal communication, and verbal/non-verbal communication. Results: A total of 23 subcategories were extracted. Verbal communication included 11 subcategories, such as “asking questions using the communicatee’s words as they are”. Non-verbal communication included five subcategories, such as “noticing changes in the content of the communicatee’s story”. And verbal/non-verbal communication featured seven subcategories, such as “making the communicatee aware of one’s own beliefs”. Conclusion: Therapeutic communication methods included basic care/caring in family interviews/meetings, as well as verbal communication and non-verbal communication that act on family/family members’ beliefs. It is believed that changes in family/family members’ beliefs can be used to eliminate, reduce, or improve problematic conditions in the family. . 展开更多
关键词 Therapeutic communication Family Nursing Family Interview/Meeting Family Belief systems Theory Literature Review
下载PDF
Reliable transmission of consultative committee for space data systems file delivery protocol in deep space communication 被引量:7
7
作者 Hui Li Hao Luo Faxin Yu Zheming Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期349-354,共6页
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac... In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification. 展开更多
关键词 deep space communication consultative committee for space data systems (CCSDS) CCSDS file delivery protocol (CFDP) RELIABLE delay.
下载PDF
Robust control for a class of nonlinear networked systems with stochastic communication delays via sliding mode conception 被引量:2
8
作者 Lifeng MA Zidong WANG +1 位作者 Xuemin CHEN Zhi GUO 《控制理论与应用(英文版)》 EI 2010年第1期34-39,共6页
This paper deals with the robust control problem for a class of uncertain nonlinear networked systems with stochastic communication delays via sliding mode conception (SMC). A sequence of variables obeying Bernoulli... This paper deals with the robust control problem for a class of uncertain nonlinear networked systems with stochastic communication delays via sliding mode conception (SMC). A sequence of variables obeying Bernoulli distribution are employed to model the randomly occurring communication delays which could be different for different state variables. A discrete switching function that is different from those in the existing literature is first proposed. Then, expressed as the feasibility of a linear matrix inequality (LMI) with an equality constraint, sufficient conditions are derived in order to ensure the globally mean-square asymptotic stability of the system dynamics on the sliding surface. A discrete-time SMC controller is then synthesized to guarantee the discrete-time sliding mode reaching condition with the specified sliding surface. Finally, a simulation example is given to show the effectiveness of the proposed method. 展开更多
关键词 Sliding mode control Nonlinear systems Networked systems Stochastic communication delays
下载PDF
H-infinity performance optimization for networked control systems with limited communication channels 被引量:3
9
作者 Yulong WANG Guanghong YANG 《控制理论与应用(英文版)》 EI 2010年第1期99-104,共6页
This paper studies the problems of H-infinity performance optimization and controller design for continuous-time NCSs with both sensor-to-controller and controller-to-actuator communication constraints (limited commu... This paper studies the problems of H-infinity performance optimization and controller design for continuous-time NCSs with both sensor-to-controller and controller-to-actuator communication constraints (limited communication channels). By taking the derivative character of network-induced delay into full consideration and defining new Lyapunov functions, linear matrix inequalities (LMIs)-based H-infinity performance optimization and controller design are presented for NCSs with limited communication channels. If there do not exist any constraints on the communication channels, the proposed design methods are also applicable. The merit of the proposed methods lies in their Jess conservativeness, which is achieved by avoiding the utilization of bounding inequalities for cross products of vectors. The simulation results illustrate the merit and effectiveness of the proposed H-infinity controller design for NCSs with limited communication channels. 展开更多
关键词 Networked control systems (NCSs) Limited communication channels Performance optimization Controller design
下载PDF
Relay-Assisted Cooperative Communication Networks 被引量:2
10
作者 Zhao Rui,Yu Fei,Yang L xi(School of Information Science and Engineering, Southeast University,Nanjing 210096, China) 《ZTE Communications》 2008年第3期24-28,共5页
To facilitate the demand for a higher spectrum and power efficiency arising from the next generation mobile communication system, the introduction of relay-aided cooperative communication into the existing cellular in... To facilitate the demand for a higher spectrum and power efficiency arising from the next generation mobile communication system, the introduction of relay-aided cooperative communication into the existing cellular infrastructure is considered as the most practical improvement under high rate and coverage. In comparison with the legacy cellular network, relay-aided cooperative communication network enjoys relative advantages over coverage efficiency, operation cost and transmission capacity. Transmission in relay-aided cooperative system falls into three types: the three-terminal transmission model, two-hop multi-relay parallel transmission model, and multi-hop multi-relay transmission model. For the extensive perspective of relay-aided cooperative communication in application, a profound research has been carried out in communication standards such as Worldwide Interoperability for Microwave Access (WiMAX) and Wireless World Initiative New Radio (WINNER). 展开更多
关键词 WiMAX relay-assisted Cooperative communication Networks Access IEEE GPP Radio ZTE SDMA Figure
下载PDF
A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems 被引量:3
11
作者 LEI Ao Chibueze Ogah +2 位作者 Philip Asuquo Haitham Cruickshank SUN Zhili 《ZTE Communications》 2016年第B06期21-31,共11页
Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highl... Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highly depends on the security level of vehicular communication systems (VCS). Security applications in VCS are fulfilled through secured group broadcast. Therefore, secure key management schemes are considered as a critical research topic for network security. In this paper, we propose a framework for providing secure key management within heterogeneous network. The seeurity managers (SMs) play a key role in the framework by retrieving the vehicle departnre infi^rmation, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel Group Key Management (GKM) scheme basing on leaving probability (LP) of vehicles to depart current VCS region. Vehicle's LP factor is introduced into GKM scheme to achieve a more effieient rekeying scheme and less rekeying costs. The second component of the framework using the blockchain concept to simplify the distributed key management in heterogeneous VCS domains. Extensive simulations and analysis are provided to show the effectiveness and effieiency of the proposed framework: Our GKM results demonstrate that probability-based BR reduees rekeying eost compared to the benchmark scheme, while the blockchain deereases the time eost of key transmission over heterogeneous net-works. 展开更多
关键词 leaving probability bloekchain group key management HETEROGENEOUS vehicular communication systems (VCS)
下载PDF
Frequency Reconfigurable Antenna for Multi Standard Wireless and Mobile Communication Systems 被引量:1
12
作者 Ikhlas Ahmad Haris Dildar +5 位作者 Wasi Ur Rehman Khan Sadiq Ullah Shakir Ullah Mahmoud AAlbreem Mohammed HAlsharif Peerapong Uthansakul 《Computers, Materials & Continua》 SCIE EI 2021年第8期2563-2578,共16页
In this paper,low profile frequency reconfigurable monopole antenna is designed on FR-4 substrate with a compact size of 30 mm^(3)×20 mm^(3)×1.6 mm^(3).The antenna is tuned to four different modes through th... In this paper,low profile frequency reconfigurable monopole antenna is designed on FR-4 substrate with a compact size of 30 mm^(3)×20 mm^(3)×1.6 mm^(3).The antenna is tuned to four different modes through three pin diode switches.In Mode 1(SW1 to SW3=OFF),antenna covers a wideband of 3.15–8.51 GHz.For Mode 2(SW1=ON,SW2 to SW3=OFF),the proposed antenna resonates at 3.5 GHz.The antenna shows dual band behavior and covers 2.6 and 6.4 GHz in Mode 3(SW1 and SW2=ON,SW3=OFF).The same antenna covers three different bands of 2.1,5 and 6.4 GHz when operating in Mode 4(SW1 to SW3=ON).The proposed antenna has good radiation efficiency ranges from 70%∼84%,providing adequate average gain of 2.05 dBi in mode 1,1.87 dBi in mode 2,1.4–1.75 dBi in mode 3 and 1.05–1.56 dBi in mode 4.The achieved impedance bandwidths at respective frequencies ranges from 240 to 5000 MHz.The Voltage Standing Waves Ratio(VSWR)of less than 1.5 is achieved for all operating bands.To validate the simulation results,the proposed antenna is fabricated and experimentally tested in antenna measurement laboratory.Due to its reasonably small size and support of multiple bands operation,the proposed antenna can be used in modern communication systems for supporting various applications such as fifth generation(5G)mobile and wireless local area networks(WLAN). 展开更多
关键词 Reconfigurable antenna pin diode communication systems 5G WLAN
下载PDF
International Journal of Systems, Control and Communications(IJSCC) 被引量:1
13
《控制理论与应用(英文版)》 EI 2007年第4期427-427,共1页
ISSN (Online): 1755-9359; ISSN (Print): 1755-9340Published in 4 issues per year. Description One of the most dramatic technological developments in the era of information is the deployment of communication networks. T... ISSN (Online): 1755-9359; ISSN (Print): 1755-9340Published in 4 issues per year. Description One of the most dramatic technological developments in the era of information is the deployment of communication networks. This on-going revolution 展开更多
关键词 ISSN International Journal of systems Control and communications IJSCC
下载PDF
Exponential networked synchronization of master-slave chaotic systems with timevarying communication topologies 被引量:1
14
作者 杨东升 刘振伟 +1 位作者 赵琰 刘兆冰 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第4期151-158,共8页
The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple li... The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple linear state feedback controller is designed to synchronize the master chaotic system and the slave chaotic systems with a time- varying communication topology connection. The exponential stability of the closed-loop networked synchronization error system is guaranteed by applying Lyapunov stability theory. The derived novel criteria are in the form of linear matrix inequalities (LMIs), which are easy to examine and tremendously reduce the computation burden from the feedback matrices. This paper provides an alternative networked secure communication scheme which can be extended conveniently. An illustrative example is given to demonstrate the effectiveness of the proposed networked synchronization method. 展开更多
关键词 exponential networked synchronization master-slave chaotic systems algebraic graph theory communication topology
下载PDF
Learning-Based Switched Reliable Control of Cyber-Physical Systems With Intermittent Communication Faults 被引量:1
15
作者 Xin Huang Jiuxiang Dong 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第3期711-724,共14页
This study deals with reliable control problems in data-driven cyber-physical systems(CPSs) with intermittent communication faults, where the faults may be caused by bad or broken communication devices and/or cyber at... This study deals with reliable control problems in data-driven cyber-physical systems(CPSs) with intermittent communication faults, where the faults may be caused by bad or broken communication devices and/or cyber attackers. To solve them, a watermark-based anomaly detector is proposed, where the faults are divided to be either detectable or undetectable.Secondly, the fault's intermittent characteristic is described by the average dwell-time(ADT)-like concept, and then the reliable control issues, under the undetectable faults to the detector, are converted into stabilization issues of switched systems. Furthermore,based on the identifier-critic-structure learning algorithm, a datadriven switched controller with a prescribed-performance-based switching law is proposed, and by the ADT approach, a tolerated fault set is given. Additionally, it is shown that the presented switching laws can improve the system performance degradation in asynchronous intervals, where the degradation is caused by the fault-maker-triggered switching rule, which is unknown for CPS operators. Finally, an illustrative example validates the proposed method. 展开更多
关键词 Adaptive dynamic programming(ADP) communication fault cyber-physical systems(CPSs) DATA-DRIVEN CONTROL RELIABLE CONTROL
下载PDF
Threshold Characteristics Enhancement of a Single Mode 1.55 µm InGaAsP Photonic Crystal VCSEL for Optical Communication Systems 被引量:1
16
作者 Abbas Majdabadi Saeid Marjani Masoud Sabaghi 《Optics and Photonics Journal》 2014年第10期296-303,共8页
In the present work, we investigate threshold characteristics of a single mode 1.55 μm InGaAsP vertical cavity surface emitting laser (VCSEL) with two different optical confinement structures. The device employs InGa... In the present work, we investigate threshold characteristics of a single mode 1.55 μm InGaAsP vertical cavity surface emitting laser (VCSEL) with two different optical confinement structures. The device employs InGaAsP active region, which is sandwiched between GaAs/AlGaAs and GaAs/AlAs distributed Bragg reflectors (DBRs). The optical confinement introduced by the oxide aperture or a single defect photonic crystal design with holes etched throughout the whole structure, is compared with previous work. Photonic crystal VCSEL shows 30.86% and 57.02% lower threshold current than that of the similar oxide confined VCSEL and previous results, respectively. This paper provides key results of the threshold characteristics, including the threshold current and the threshold power. Results suggest that, the 1.55 μm InGaAsP photonic crystal VCSEL seems to be the most optimal one for light sources in high performance optical communication systems. 展开更多
关键词 THRESHOLD Characteristics Single Mode VCSEL Optical communication systems
下载PDF
Nonlocality Distillation and Trivial Communication Complexity for High-Dimensional Systems
17
作者 李艳 叶向军 陈景灵 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第8期5-9,共5页
A nonlocality distillation protocol for arbitrary high-dimensional systems is proposed. We study the nonlocality distillation in the 2-input d-output bi-partite case. Firstly, we give the one-parameter nonlocal boxes ... A nonlocality distillation protocol for arbitrary high-dimensional systems is proposed. We study the nonlocality distillation in the 2-input d-output bi-partite case. Firstly, we give the one-parameter nonlocal boxes and their correlated distilling protocol. Then, we generalize the one-parameter nonlocality distillation protocol to the twoparameter case. Furthermore, we introduce a contracting protocol testifying that the 2-input d-output nonlocal boxes make communication complexity trivial. 展开更多
关键词 for on of IT in Nonlocality Distillation and Trivial communication Complexity for High-Dimensional systems IS
下载PDF
Mean-square composite-rotating consensus of second-order systems with communication noises
18
作者 Li-po Mo Shao-yan Guo Yong-guang Yu 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第7期242-247,共6页
We study the mean-square composite-rotating consensus problem of second-order multi-agent systems with communication noises, where all agents rotate around a common center and the center of rotation spins around a fix... We study the mean-square composite-rotating consensus problem of second-order multi-agent systems with communication noises, where all agents rotate around a common center and the center of rotation spins around a fixed point simultaneously. Firstly, a time-varying consensus gain is introduced to attenuate to the effect of communication noises. Secondly, sufficient conditions are obtained for achieving the mean-square composite-rotating consensus. Finally, simulations are provided to demonstrate the effectiveness of the proposed algorithm. 展开更多
关键词 multi-agent systems mean-square consensus composite-rotating communication noises
下载PDF
Optimal Bidirectional LSTM for Modulation Signal Classification in Communication Systems
19
作者 Manar Ahmed Hamza Siwar Ben Haj Hassine +5 位作者 Souad Larabi-Marie-Sainte Mohamed K.Nour Fahd N.Al-Wesabi Abdelwahed Motwakel Anwer Mustafa Hilal Mesfer Al Duhayyim 《Computers, Materials & Continua》 SCIE EI 2022年第8期3055-3071,共17页
Modulation signal classification in communication systems can be considered a pattern recognition problem.Earlier works have focused on several feature extraction approaches such as fractal feature,signal constellatio... Modulation signal classification in communication systems can be considered a pattern recognition problem.Earlier works have focused on several feature extraction approaches such as fractal feature,signal constellation reconstruction,etc.The recent advent of deep learning(DL)models makes it possible to proficiently classify the modulation signals.In this view,this study designs a chaotic oppositional satin bowerbird optimization(COSBO)with bidirectional long term memory(BiLSTM)model for modulation signal classification in communication systems.The proposed COSBO-BiLSTM technique aims to classify the different kinds of digitally modulated signals.In addition,the fractal feature extraction process takes place by the use of Sevcik Fractal Dimension(SFD)approach.Moreover,the modulation signal classification process takes place using BiLSTM with fully convolutional network(BiLSTM-FCN).Furthermore,the optimal hyperparameter adjustment of the BiLSTM-FCN technique takes place by the use of COSBO algorithm.In order to ensure the enhanced classification performance of the COSBO-BiLSTM model,a wide range of simulations were carried out.The experimental results highlighted that the COSBO-BiLSTM technique has accomplished improved performance over the existing techniques. 展开更多
关键词 Complex systems communication system signal processing modulation signals CLASSIFICATION artificial intelligence deep learning parameter tuning
下载PDF
FUNDAMENTAL COMMUNICATIONS THEORIES AND SIGNAL PROCESSING TECHNIQUES FOR AMORPHOUS CELLULAR SYSTEMS
20
作者 Shi Jin Feifei Gao +2 位作者 Kai Luo Yongming Huang Wei Peng 《China Communications》 SCIE CSCD 2016年第12期I0002-I0003,共2页
The rapid developing of the fourth generation(4G)wireless communications has aroused tremendous demands for high speed data transmission due to the dissemination of various types of the intelligent user terminals as w... The rapid developing of the fourth generation(4G)wireless communications has aroused tremendous demands for high speed data transmission due to the dissemination of various types of the intelligent user terminals as well as the wireless multi-media services.It is predicted that the network throughput will increase 展开更多
关键词 IEEE FBMC FUNDAMENTAL communicationS THEORIES AND SIGNAL PROCESSING TECHNIQUES FOR AMORPHOUS CELLULAR systems MIMO FIR
下载PDF
上一页 1 2 15 下一页 到第
使用帮助 返回顶部