期刊文献+
共找到172篇文章
< 1 2 9 >
每页显示 20 50 100
Distributed Weighted Data Aggregation Algorithm in End-to-Edge Communication Networks Based on Multi-armed Bandit 被引量:1
1
作者 Yifei ZOU Senmao QI +1 位作者 Cong'an XU Dongxiao YU 《计算机科学》 CSCD 北大核心 2023年第2期13-22,共10页
As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when ... As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when learning agents are deployed on the edge side,the data aggregation from the end side to the designated edge devices is an important research topic.Considering the various importance of end devices,this paper studies the weighted data aggregation problem in a single hop end-to-edge communication network.Firstly,to make sure all the end devices with various weights are fairly treated in data aggregation,a distributed end-to-edge cooperative scheme is proposed.Then,to handle the massive contention on the wireless channel caused by end devices,a multi-armed bandit(MAB)algorithm is designed to help the end devices find their most appropriate update rates.Diffe-rent from the traditional data aggregation works,combining the MAB enables our algorithm a higher efficiency in data aggregation.With a theoretical analysis,we show that the efficiency of our algorithm is asymptotically optimal.Comparative experiments with previous works are also conducted to show the strength of our algorithm. 展开更多
关键词 Weighted data aggregation End-to-edge communication Multi-armed bandit Edge intelligence
下载PDF
Secure vehicular data communication in Named Data Networking
2
作者 Xiaonan Wang Xilan Chen Xingwei Wang 《Digital Communications and Networks》 SCIE CSCD 2023年第1期203-210,共8页
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data N... Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data communications.This paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure rates.This paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure rates.SCD constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse paths.Only the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are achieved.SCD is evaluated,and the data results demonstrate that SCD achieves the above objectives. 展开更多
关键词 Named data networking Reverse path Secure data communication
下载PDF
Coati Optimization-Based Energy Efficient Routing Protocol for Unmanned Aerial Vehicle Communication 被引量:1
3
作者 Hanan Abdullah Mengash Hamed Alqahtani +5 位作者 Mohammed Maray Mohamed K.Nour Radwa Marzouk Mohammed Abdullah Al-Hagery Heba Mohsen Mesfer Al Duhayyim 《Computers, Materials & Continua》 SCIE EI 2023年第6期4805-4820,共16页
With the flexible deployment and high mobility of Unmanned Aerial Vehicles(UAVs)in an open environment,they have generated con-siderable attention in military and civil applications intending to enable ubiquitous conn... With the flexible deployment and high mobility of Unmanned Aerial Vehicles(UAVs)in an open environment,they have generated con-siderable attention in military and civil applications intending to enable ubiquitous connectivity and foster agile communications.The difficulty stems from features other than mobile ad-hoc network(MANET),namely aerial mobility in three-dimensional space and often changing topology.In the UAV network,a single node serves as a forwarding,transmitting,and receiving node at the same time.Typically,the communication path is multi-hop,and routing significantly affects the network’s performance.A lot of effort should be invested in performance analysis for selecting the optimum routing system.With this motivation,this study modelled a new Coati Optimization Algorithm-based Energy-Efficient Routing Process for Unmanned Aerial Vehicle Communication(COAER-UAVC)technique.The presented COAER-UAVC technique establishes effective routes for communication between the UAVs.It is primarily based on the coati characteristics in nature:if attacking and hunting iguanas and escaping from predators.Besides,the presented COAER-UAVC technique concentrates on the design of fitness functions to minimize energy utilization and communication delay.A varied group of simulations was performed to depict the optimum performance of the COAER-UAVC system.The experimental results verified that the COAER-UAVC technique had assured improved performance over other approaches. 展开更多
关键词 Artificial intelligence unmanned aerial vehicle data communication routing protocol energy efficiency
下载PDF
Reliable transmission of consultative committee for space data systems file delivery protocol in deep space communication 被引量:7
4
作者 Hui Li Hao Luo Faxin Yu Zheming Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期349-354,共6页
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac... In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification. 展开更多
关键词 deep space communication consultative committee for space data systems (CCSDS) CCSDS file delivery protocol (CFDP) RELIABLE delay.
下载PDF
DCGAN Based Spectrum Sensing Data Enhancement for Behavior Recognition in Self-Organized Communication Network 被引量:3
5
作者 Kaixin Cheng Lei Zhu +5 位作者 Changhua Yao Lu Yu Xinrong Wu Xiang Zheng Lei Wang Fandi Lin 《China Communications》 SCIE CSCD 2021年第11期182-196,共15页
Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately ... Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately analyze the communication behavior.Traditional means can hardly utilize the scarce and crude spectrum sensing data captured in a real scene.Thus,communication behavior recognition using raw sensing data under smallsample condition has become a new challenge.In this paper,a data enhanced communication behavior recognition(DECBR)scheme is proposed to meet this challenge.Firstly,a preprocessing method is designed to make the raw spectrum data suitable for the proposed scheme.Then,an adaptive convolutional neural network structure is exploited to carry out communication behavior recognition.Moreover,DCGAN is applied to support data enhancement,which realize communication behavior recognition under small-sample condition.Finally,the scheme is verified by experiments under different data size.The results show that the DECBR scheme can greatly improve the accuracy and efficiency of behavior recognition under smallsample condition. 展开更多
关键词 spectrum sensing communication behavior recognition small-sample data enhancement selforganized network
下载PDF
Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security
6
作者 V.Sridhar K.V.Ranga Rao +4 位作者 Saddam Hussain Syed Sajid Ullah Roobaea Alroobaea Maha Abdelhaq Raed Alsaqour 《Computers, Materials & Continua》 SCIE EI 2023年第1期1693-1708,共16页
NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of servic... NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of services(QoS).In order to improve throughput and minimum latency,aMultivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access(MRRWPBA-NOMA)technique is introduced for network communication.In the downlink transmission,each mobile device’s resources and their characteristics like energy,bandwidth,and trust are measured.Followed by,the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different weak hypotheses i.e.,Multivariate Renkonen Regression functions.Based on the classification,resource and trust-aware devices are selected for transmission.Simulation of the proposed MRRWPBA-NOMA technique and existing methods are carried out with different metrics such as data delivery ratio,throughput,latency,packet loss rate,and energy efficiency,signaling overhead.The simulation results assessment indicates that the proposed MRRWPBA-NOMA outperforms well than the conventional methods. 展开更多
关键词 Mobile network multivariate renkonen regression weighted preference bootstrap aggregation resource-aware secure data communication NOMA
下载PDF
Measurement-Device-Independent Quantum Key Distribution with Two-Way Local Operations and Classical Communications 被引量:1
7
作者 谭勇刚 刘强 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第9期10-13,共4页
Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doub... Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doubled when compared with the prepare-and-measure QKD. An interesting question is whether the transmission distance can be extended further. In this work, we consider the contributions of the two-way local operations and classical communications to the key generation rate and transmission distance of the MDI-QKD. Our numerical results show that the secure transmission distances are increased by about 12kin and 8 km when the 1 13 and the 2 B steps are implemented, respectively. 展开更多
关键词 QKD MDI is on Measurement-Device-Independent Quantum Key Distribution with two-way Local Operations and Classical communications EPR QBER of with
下载PDF
Robust and Efficient Data Transmission over Noisy Communication Channels Using Stacked and Denoising Autoencoders 被引量:1
8
作者 Faisal Nadeem Khan Alan Pak Tao Lau 《China Communications》 SCIE CSCD 2019年第8期82-92,共11页
We study the effects of quantization and additive white Gaussian noise(AWGN) in transmitting latent representations of images over a noisy communication channel. The latent representations are obtained using autoencod... We study the effects of quantization and additive white Gaussian noise(AWGN) in transmitting latent representations of images over a noisy communication channel. The latent representations are obtained using autoencoders(AEs). We analyze image reconstruction and classification performance for different channel noise powers, latent vector sizes, and number of quantization bits used for the latent variables as well as AEs’ parameters. The results show that the digital transmission of latent representations using conventional AEs alone is extremely vulnerable to channel noise and quantization effects. We then propose a combination of basic AE and a denoising autoencoder(DAE) to denoise the corrupted latent vectors at the receiver. This approach demonstrates robustness against channel noise and quantization effects and enables a significant improvement in image reconstruction and classification performance particularly in adverse scenarios with high noise powers and significant quantization effects. 展开更多
关键词 communication CHANNELS data compression DEEP learning autoencoders DENOISING autoencoders
下载PDF
Achieving Fuzzy Matching Data Sharing for Secure Cloud-Edge Communication 被引量:1
9
作者 Chuan Zhang Mingyang Zhao +4 位作者 Yuhua Xu Tong Wu Yanwei Li Liehuang Zhu Haotian Wang 《China Communications》 SCIE CSCD 2022年第7期257-276,共20页
In this paper,we propose a novel fuzzy matching data sharing scheme named FADS for cloudedge communications.FADS allows users to specify their access policies,and enables receivers to obtain the data transmitted by th... In this paper,we propose a novel fuzzy matching data sharing scheme named FADS for cloudedge communications.FADS allows users to specify their access policies,and enables receivers to obtain the data transmitted by the senders if and only if the two sides meet their defined certain policies simultaneously.Specifically,we first formalize the definition and security models of fuzzy matching data sharing in cloud-edge environments.Then,we construct a concrete instantiation by pairing-based cryptosystem and the privacy-preserving set intersection on attribute sets from both sides to construct a concurrent matching over the policies.If the matching succeeds,the data can be decrypted.Otherwise,nothing will be revealed.In addition,FADS allows users to dynamically specify the policy for each time,which is an urgent demand in practice.A thorough security analysis demonstrates that FADS is of provable security under indistinguishable chosen ciphertext attack(IND-CCA)in random oracle model against probabilistic polynomial-time(PPT)adversary,and the desirable security properties of privacy and authenticity are achieved.Extensive experiments provide evidence that FADS is with acceptable efficiency. 展开更多
关键词 fuzzy-matching privacy-preserving set intersection cloud-edge communication data sharing
下载PDF
Federated Learning for 6G:A Survey From Perspective of Integrated Sensing,Communication and Computation
10
作者 ZHAO Moke HUANG Yansong LI Xuan 《ZTE Communications》 2023年第2期25-33,共9页
With the rapid advancements in edge computing and artificial intelligence,federated learning(FL)has gained momentum as a promising approach to collaborative data utilization across organizations and devices,while ensu... With the rapid advancements in edge computing and artificial intelligence,federated learning(FL)has gained momentum as a promising approach to collaborative data utilization across organizations and devices,while ensuring data privacy and information security.In order to further harness the energy efficiency of wireless networks,an integrated sensing,communication and computation(ISCC)framework has been proposed,which is anticipated to be a key enabler in the era of 6G networks.Although the advantages of pushing intelligence to edge devices are multi-fold,some challenges arise when incorporating FL into wireless networks under the umbrella of ISCC.This paper provides a comprehensive survey of FL,with special emphasis on the design and optimization of ISCC.We commence by introducing the background and fundamentals of FL and the ISCC framework.Subsequently,the aforementioned challenges are highlighted and the state of the art in potential solutions is reviewed.Finally,design guidelines are provided for the incorporation of FL and ISCC.Overall,this paper aims to contribute to the understanding of FL in the context of wireless networks,with a focus on the ISCC framework,and provide insights into addressing the challenges and optimizing the design for the integration of FL into future 6G networks. 展开更多
关键词 integrated sensing communication and computation federated learning data heterogeneity limited resources
下载PDF
Create Your Own Data and Energy Integrated Communication Network:A Brief Tutorial and a Prototype System 被引量:2
11
作者 Yali Zheng Yitian Zhang +2 位作者 Yang Wang Jie Hu Kun Yang 《China Communications》 SCIE CSCD 2020年第9期193-209,共17页
In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The... In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation. 展开更多
关键词 data and energy integrated communication network(DEIN) wireless power transfer(WPT) simultaneously wireless information and power transfer(SWIPT) RF charging hardware implementation
下载PDF
A Message Transmission Protocol of a Mobile Data Communication Network
12
作者 顾学迈 郭庆 刘忠 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1996年第4期16-20,共5页
AMessageTransmissionProtocolofaMobileDataCommunicationNetworkGUXuemai;GUOQing;LIUZhong(顾学迈)(郭庆)(刘忠)(Research... AMessageTransmissionProtocolofaMobileDataCommunicationNetworkGUXuemai;GUOQing;LIUZhong(顾学迈)(郭庆)(刘忠)(ResearchInstituteofCommun... 展开更多
关键词 ss: data communication MOBILE communication PROTOCOL
下载PDF
Parametric down-conversion with local operation and two-way classical communication
13
作者 刘强 谭勇刚 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期44-47,共4页
The decoy-state quantum key distribution protocol suggested by Adachi et al. (Phys. Rev. Lett 99 180503 (2007)) is proven to be secure and feasible with current techniques. It owns two attractive merits, i.e., its... The decoy-state quantum key distribution protocol suggested by Adachi et al. (Phys. Rev. Lett 99 180503 (2007)) is proven to be secure and feasible with current techniques. It owns two attractive merits, i.e., its longer secure transmission distance and more convenient operation design. In this paper, we first improve the protocol with the aid of local operation and two-way classical communication (2-LOCC). After our modifications, the secure transmission distance is increased by about 20 km, which will make the protocol more practicable. 展开更多
关键词 parametric down-conversion local operation and two-way classical communication B step
下载PDF
Model-based predictive controller design for a class of nonlinear networked systems with communication delays and data loss
14
作者 安宝冉 刘国平 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第8期211-216,共6页
This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems,... This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems, the model-based networked predictive control strategy can compensate for communication delay and data loss in an active way. The designed model-based predictive controller can also guarantee the stability of the closed-loop networked system. The simulation re- suits demonstrate the feasibility and efficacy of the proposed model-based predictive controller design scheme. 展开更多
关键词 communication delays data loss model-based networked predictive control
下载PDF
Two-Way Cooperative Quantum Communication with Partial Entanglement Analysis
15
作者 Yunkai Deng Zhujun Gao Ying Guo 《ZTE Communications》 2013年第3期36-40,共5页
In this paper, we describe an improved cooperative two-way quantum communication scheme that works in a forward-and-backward fashion. In this scheme, partial entanglement analysis based on five-qubit entangled Brown s... In this paper, we describe an improved cooperative two-way quantum communication scheme that works in a forward-and-backward fashion. In this scheme, partial entanglement analysis based on five-qubit entangled Brown state allows for the simultaneous exchange of arbitrary unknown states between Alice and Bob (with the help of trusted Charlie). Security is guaranteed because opposing unknown states are transmitted by performing the suitable recovery operations in a deterministic way or, in the case of irregularities, no results are generated. The current two-way quantum communication scheme can also be extended to transmit arbitrary unknown states. This is done in a probabilistic way by using two-way quantum teleportation based on the generalized Brown-like state. 展开更多
关键词 quantum teleportation two-way communication brown state bell states ENTANGLEMENT
下载PDF
Data Logging and Control of a Remote Inverter Using LoRa and Power Line Communication
16
作者 K. A. Terashmila Lasagani Tariq Iqbal George K. Mann 《Energy and Power Engineering》 2018年第8期351-365,共15页
For decades, the power system was highly centralized. With the growing integration of distributed generations into the system, there is a necessity for bi-directional communication methods to monitor and control the r... For decades, the power system was highly centralized. With the growing integration of distributed generations into the system, there is a necessity for bi-directional communication methods to monitor and control the remote assets. The primary objective of this paper is to develop a communication link for monitoring and controlling a grid-connected inverter in a remote location. Furthermore, the paper presents developments that have been incorporated to improve the communication link. The literature survey indicates that LoRa is superior compared to other technologies, but has some security and reliability issues. This paper also presents an encryption algorithm to improve the security of the LoRa link. Local data storage added to the system before transmitting data increases the system reliability. A display at the transmission end is added to improve the user-friendliness of the communication link. A Powerline Communication link is parallelly added to the LoRa link to improve the reliability. Finally, tests are conducted with an actual inverter and the results are presented. The tests show that the developed communication link has improved security and reliability, while its open nature makes it highly scalable and adaptable for employment in other smart grid applications. 展开更多
关键词 LoRa Application Supervisory CONTROL and data ACQUISITION System INVERTER REMOTE CONTROL Power LINE communication
下载PDF
Advances in Mobile Data Communications
17
作者 Sean Cai Li Mo ZTE ZTE USA an active member of IEEE,ITU,ETSI,and IETF 《ZTE Communications》 2011年第4期42-42,共1页
This special issue of ZTE Communications focuses on recent advances in mobile data communications for the ICT and telecommunications industries. The ever-increasing amount of mobile data traffic has beenthe subject of... This special issue of ZTE Communications focuses on recent advances in mobile data communications for the ICT and telecommunications industries. The ever-increasing amount of mobile data traffic has beenthe subject of many studies. This research area is widely applicable to contemporary technology and network optimization techniques. 展开更多
关键词 ZTE MIMO OFDMA Advances in Mobile data communications
下载PDF
Energy efficiency optimization of relay-assisted D2D two-way communications with SWIPT
18
作者 何继爱 CHEN Yanjiao WANG Tong 《High Technology Letters》 EI CAS 2022年第3期252-258,共7页
Aiming at the energy consumption of long-distance device-to-device(D2D) devices for two-way communications in a cellular network,this paper proposes a strategy that combines two-way relay technology(TWRT) and simultan... Aiming at the energy consumption of long-distance device-to-device(D2D) devices for two-way communications in a cellular network,this paper proposes a strategy that combines two-way relay technology(TWRT) and simultaneous wireless information and power transfer(SWIPT) technology to achieve high energy efficiency(EE) communication.The scheme first establishes a fractional programming problem to maximize EE of D2D,and transforms it into a non-fractional optimization problem that can be solved easily.Then the problem is divided into three sub-problems:power control,power splitting ratios optimization,and relay selection.In order to maximize EE of the D2D pair,the Dinkelbach iterative algorithm is used to optimize the transmitted power of two D2D devices simultaneously;the one-dimensional search algorithm is proposed to optimize power splitting ratios;an improved optimal relay selection scheme based on EE is proposed to select relay.Finally,experiments are carried out on the Matlab simulation platform.The simulation results show that the proposed algorithm has faster convergence.Compared with the one-way relay transmission and fixed relay algorithms,the proposed scheme has higher EE. 展开更多
关键词 device-to-device(D2D) energy efficiency(EE) simultaneous wireless information and power transfer(SWIPT) two-way communications power control relay selection
下载PDF
ZTE Communications Special Issue on Data Intelligence
19
《ZTE Communications》 2018年第2期2-2,共1页
The new ear of AI is brought about by three eonverging forees: the advanee of AI algorithms, the availability of big data, and the inereasing popularity of high performanee computing platforms. Data-driven intelligen... The new ear of AI is brought about by three eonverging forees: the advanee of AI algorithms, the availability of big data, and the inereasing popularity of high performanee computing platforms. Data-driven intelligenee, or data intelligenee, is a new fore1 of AI teehnologies that leverages the power of big data. 展开更多
关键词 ZTE communications Special Issue on data Intelligence
下载PDF
Design of Power Communication Data Network Management System and Implementation of Data Acquisition Module
20
作者 Yue Zhang Zefeng Jian Hao Wang 《Journal of Electronic Research and Application》 2021年第6期1-5,共5页
The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network managem... The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network management architecture of the power communication data network and the implementation of the data acquisition module in the network management system through theoretical analysis,for the reference of relevant personnel,in order to better promote the collection of power grid communication network data. 展开更多
关键词 Electric power communication Network management system design data acquisition
下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部