期刊文献+
共找到3,640篇文章
< 1 2 182 >
每页显示 20 50 100
Mutual Information Maximization via Joint Power Allocation in Integrated Sensing and Communications System
1
作者 Jia Zhu Junsheng Mu +1 位作者 Yuanhao Cui Xiaojun Jing 《China Communications》 SCIE CSCD 2024年第2期129-142,共14页
In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ... In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance. 展开更多
关键词 COEXISTENCE COMMUNICATIONS multicarrier radar mutual information spectrum sharing
下载PDF
Joint Optimization of Resource Allocation and Trajectory Based on User Trajectory for UAV-Assisted Backscatter Communication System
2
作者 Peizhong Xie Junjie Jiang +1 位作者 Ting Li Yin Lu 《China Communications》 SCIE CSCD 2024年第2期197-209,共13页
The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backsca... The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backscatter communication based on user trajectory. This paper will establish an optimization problem of jointly optimizing the UAV trajectories, UAV transmission power and BD scheduling based on the large-scale channel state signals estimated in advance of the known user trajectories, taking into account the constraints of BD data and working energy consumption, to maximize the energy efficiency of the system. The problem is a non-convex optimization problem in fractional form, and there is nonlinear coupling between optimization variables.An iterative algorithm is proposed based on Dinkelbach algorithm, block coordinate descent method and continuous convex optimization technology. First, the objective function is converted into a non-fractional programming problem based on Dinkelbach method,and then the block coordinate descent method is used to decompose the original complex problem into three independent sub-problems. Finally, the successive convex approximation method is used to solve the trajectory optimization sub-problem. The simulation results show that the proposed scheme and algorithm have obvious energy efficiency gains compared with the comparison scheme. 展开更多
关键词 energy efficiency joint optimization UAV-assisted backscatter communication user trajectory
下载PDF
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
3
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
Federated Learning on Internet of Things:Extensive and Systematic Review
4
作者 Meenakshi Aggarwal Vikas Khullar +4 位作者 Sunita Rani Thomas AndréProla Shyama Barna Bhattacharjee Sarowar Morshed Shawon Nitin Goyal 《Computers, Materials & Continua》 SCIE EI 2024年第5期1795-1834,共40页
The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and ... The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT. 展开更多
关键词 Internet of Things federated learning PRISMA framework of FL applications of FL data privacy COMMUNICATION
下载PDF
Design of Protograph LDPC-Coded MIMO-VLC Systems with Generalized Spatial Modulation
5
作者 Dai Lin Fang Yi +1 位作者 Guan Yongliang Mohsen Guizani 《China Communications》 SCIE CSCD 2024年第3期118-136,共19页
This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID ... This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID scheme, the information bits conveyed by the signal-domain(SiD) symbols and the spatial-domain(SpD) light emitting diode(LED)-index patterns are coded by a protograph low-density parity-check(P-LDPC) code. Specifically, we propose a signal-domain symbol expanding and re-allocating(SSER) method for constructing a type of novel generalized spatial modulation(GSM) constellations, referred to as SSERGSM constellations, so as to boost the performance of the BICGSM-ID MIMO-VLC systems.Moreover, by applying a modified PEXIT(MPEXIT) algorithm, we further design a family of rate-compatible P-LDPC codes, referred to as enhanced accumulate-repeat-accumulate(EARA) codes,which possess both excellent decoding thresholds and linear-minimum-distance-growth property. Both analysis and simulation results illustrate that the proposed SSERGSM constellations and P-LDPC codes can remarkably improve the convergence and decoding performance of MIMO-VLC systems. Therefore, the proposed P-LDPC-coded SSERGSM-mapped BICGSMID configuration is envisioned as a promising transmission solution to satisfy the high-throughput requirement of MIMO-VLC applications. 展开更多
关键词 bit-interleaved coded modulation generalized spatial modulation multiple-input multipleoutput protograph LDPC codes visible light communication
下载PDF
Dynamic Event-Triggered Consensus Control for Input Constrained Multi-Agent Systems With a Designable Minimum Inter-Event Time
6
作者 Meilin Li Yue Long +2 位作者 Tieshan Li Hongjing Liang C.L.Philip Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第3期649-660,共12页
This paper investigates the consensus control of multi-agent systems(MASs) with constrained input using the dynamic event-triggered mechanism(ETM).Consider the MASs with small-scale networks where a centralized dynami... This paper investigates the consensus control of multi-agent systems(MASs) with constrained input using the dynamic event-triggered mechanism(ETM).Consider the MASs with small-scale networks where a centralized dynamic ETM with global information of the MASs is first designed.Then,a distributed dynamic ETM which only uses local information is developed for the MASs with large-scale networks.It is shown that the semi-global consensus of the MASs can be achieved by the designed bounded control protocol where the Zeno phenomenon is eliminated by a designable minimum inter-event time.In addition,it is easier to find a trade-off between the convergence rate and the minimum inter-event time by an adjustable parameter.Furthermore,the results are extended to regional consensus of the MASs with the bounded control protocol.Numerical simulations show the effectiveness of the proposed approach. 展开更多
关键词 Constrained input designable minimum inter-event time directed communication topology dynamic event-triggered mechanism MASs consensus control
下载PDF
A framework of force of information influence and application for C4KISR system
7
作者 MAO Shaojie DIAO Lianwang +6 位作者 SUN Yu WANG Heng YI Kan XU Xin MAO Xiaobin ZHANG Kecheng SHENG Long 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期430-443,共14页
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e... The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture. 展开更多
关键词 information warfare command control communications computer KILL intelligence surveillance reconnaissance(C4KISR)system information circulation force of information influence information entropy
下载PDF
Channel Capacity and Power Allocation of MIMO Visible Light Communication System 被引量:1
8
作者 Shuai Ma Ruixin Yang +5 位作者 Guanjie Zhang Hang Li Wen Cao Linqiong Jia Yanyu Zhang Shiyin Li 《China Communications》 SCIE CSCD 2023年第2期122-138,共17页
In this paper,the channel capacity of the multiple-input multiple-output(MIMO)visible light communication(VLC)system is investigated under the peak,average optical and electrical power constraints.Finding the channel ... In this paper,the channel capacity of the multiple-input multiple-output(MIMO)visible light communication(VLC)system is investigated under the peak,average optical and electrical power constraints.Finding the channel capacity of MIMO VLC is shown to be a mixed integer programming problem.To address this open problem,we propose an inexact gradient projection method to find the channel capacity-achieving discrete input distribution and the channel capacity of MIMO VLC.Also we derive both upper and lower bounds of the capacity of MIMO VLC with the closed-form expressions.Furthermore,by considering practical discrete constellation inputs,we develop the optimal power allocation scheme to maximize transmission rate of MIMO VLC system.Simulation results show that more discrete points are needed to achieve the channel capacity as SNR increases.Both the upper and lower bounds of channel capacity are tight at low SNR region.In addition,comparing the equal power allocation,the proposed power allocation scheme can significantly increase the rate for the low-order modulation inputs. 展开更多
关键词 visible light communication MIMO discrete constellation inputs power allocation
下载PDF
Anti-Jamming and Anti-Eavesdropping in A2G Communication System with Jittering UAV 被引量:1
9
作者 Huici Wu Yang Wen +1 位作者 Xiaofeng Tao Jin Xu 《China Communications》 SCIE CSCD 2023年第10期230-244,共15页
This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesd... This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground(A2G)communication networks considering the impact of body jitter of unmanned aerial vehicle(UAV).A full-duplex(FD)active ground eavesdropper launches jamming attack while eavesdropping to stimulate the legitimate transmitter(i.e.,UAV)to increase its transmission power.The legitimate transmitter’s objective is to against the simultaneous wiretapping and jamming with a robust and power-efficient transmission scheme.The active eavesdropper aims to minimize the system secrecy rate.To study the interaction between the legitimate transmitter and the active eavesdropper,a non-cooperative game framework is formulated.Detailed,considering the impact of UAV jitter on antenna array response and secrecy performance,we first investigate the UAV’s transmission power minimization problem for the worst scenario with minimum legitimate data rate and maximum eavesdropping data rate under UAV jitter.Then,the active eavesdropper’s secrecy rate minimization problem with the worst scenario is investigated by optimizing its jamming strategy.Nash equilibrium is proved to be existed and obtained with the proposed iterative algorithm.Finally,extensive numerical results are provided to evaluate the system secrecy performance and to show the secrecy performance gains of the proposed method. 展开更多
关键词 UAV jitter A2G communication active eavesdropper non-cooperative game
下载PDF
SR-DCSK Cooperative Communication System with Code Index Modulation:A New Design for 6G New Radios 被引量:1
10
作者 Yi Fang Wang Chen +2 位作者 Pingping Chen Yiwei Tao Mohsen Guizani 《China Communications》 SCIE CSCD 2023年第10期1-16,共16页
This paper proposes a high-throughput short reference differential chaos shift keying cooperative communication system with the aid of code index modulation,referred to as CIM-SR-DCSK-CC system.In the proposed CIM-SR-... This paper proposes a high-throughput short reference differential chaos shift keying cooperative communication system with the aid of code index modulation,referred to as CIM-SR-DCSK-CC system.In the proposed CIM-SR-DCSK-CC system,the source transmits information bits to both the relay and destination in the first time slot,while the relay not only forwards the source information bits but also sends new information bits to the destination in the second time slot.To be specific,the relay employs an N-order Walsh code to carry additional log_(2)N information bits,which are superimposed onto the SRDCSK signal carrying the decoded source information bits.Subsequently,the superimposed signal carrying both the source and relay information bits is transmitted to the destination.Moreover,the theoretical bit error rate(BER)expressions of the proposed CIMSR-DCSK-CC system are derived over additive white Gaussian noise(AWGN)and multipath Rayleigh fading channels.Compared with the conventional DCSKCC system and SR-DCSK-CC system,the proposed CIM-SR-DCSK-CC system can significantly improve the throughput without deteriorating any BER performance.As a consequence,the proposed system is very promising for the applications of the 6G-enabled lowpower and high-rate communication. 展开更多
关键词 differential chaos shift keying cooperative communication short reference code index modulation high throughput bit error rate
下载PDF
A Semi-Looped-Functional for Stability Analysis of Sampled-Data Systems
11
作者 Zhaoliang Sheng Chong Lin Shengyuan Xu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1332-1335,共4页
Dear Editor, In recent decades, owing to the significance of sampled-data control way on reducing the burden of communication transmission and improving the control capability of networked control systems, the researc... Dear Editor, In recent decades, owing to the significance of sampled-data control way on reducing the burden of communication transmission and improving the control capability of networked control systems, the research of sampled-data systems has become increasingly important(see [1]–[5]). 展开更多
关键词 NETWORK COMMUNICATION FUNCTIONAL
下载PDF
Minimum-energy leader-following formation of distributed multiagent systems with communication constraints
12
作者 QIN Donghao WANG Le +1 位作者 GAO Jiuan XI Jianxiang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第6期1419-1431,共13页
This paper concerns minimum-energy leader-following formation design and analysis problems of distributed multiagent systems(DMASs)subjected to randomly switching topologies and aperiodic communication pauses.The crit... This paper concerns minimum-energy leader-following formation design and analysis problems of distributed multiagent systems(DMASs)subjected to randomly switching topologies and aperiodic communication pauses.The critical feature of this paper is that the energy consumption during the formation control process is restricted by the minimum-energy constraint in the sense of the linear matrix inequality.Firstly,the leader-following formation control protocol is proposed based on the relative state information of neighboring agents,where the total energy consumption is considered.Then,minimum-energy leader-following formation design and analysis criteria are presented in the form of the linear matrix inequality,which can be checked by the generalized eigenvalue method.Especially,the value of the minimum-energy constraint is determined.An illustrative simulation is provided to show the effectiveness of the main results. 展开更多
关键词 multi-agent system leader-following formation communication pause minimum energy.
下载PDF
Faithful and efficient hyperentanglement purification for spatial-polarization-time-bin photon system
13
作者 杜芳芳 樊钢 +1 位作者 吴一鸣 任宝藏 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第6期140-150,共11页
We present a faithful and efficient hyperentanglement purification protocol(hyper-EPP)for nonlocal two-photon systems in spatial-polarization-time-bin hyperentangled Bell states.As the single-photon detectors can dete... We present a faithful and efficient hyperentanglement purification protocol(hyper-EPP)for nonlocal two-photon systems in spatial-polarization-time-bin hyperentangled Bell states.As the single-photon detectors can detect and herald the undesirable properties caused by side leakage and finite coupling strength,the parity-check gates and swap gates of our hyper-EPP in the spatial,polarization and time-bin mode degrees of freedom(DoFs)work faithfully.The qubit-flip errors in photon systems in three DoFs can be corrected effectively with the faithful parity-check gates and the photon pairs can be reused to distill high-fidelity ones by introducing the faithful swap gates,which greatly increases the efficiency of our hyper-EPP.Further,the maximal hyperentanglement can be obtained in principle by operating multiple rounds of the hyper-EPP. 展开更多
关键词 quantum communication hyperentanglement purification photon system multiple degrees of freedom
下载PDF
UAV-Assisted FSO Communication System with Amplify-and-Forward Protocol under AOA Fluctuations:A Performance Analysis
14
作者 Maozhe Xu Guanjun Xu +3 位作者 Youran Dong Weizhi Wang Qinyu Zhang Zhaohui Song 《China Communications》 SCIE CSCD 2023年第11期111-130,共20页
Free space optical(FSO)communication has recently aroused great interest in academia due to its unique features,such as large transmission band,high data rates,and strong anti-electromagnetic interference.With the aim... Free space optical(FSO)communication has recently aroused great interest in academia due to its unique features,such as large transmission band,high data rates,and strong anti-electromagnetic interference.With the aim of evaluating the performance of an FSO communication system and extending the line-of-sight transmission distance,we propose an unmanned aerial vehicle(UAV)-assisted dual-hop FSO communication system equipped with amplifyand-forward protocol at the relay node.Specifically,we consider impairments of atmospheric absorption,pointing errors,atmospheric turbulence,and link interruptions due to angle-of-arrival fluctuations in the relay system.The Gamma-Gamma and Malaga distributions are used to model the influence of atmospheric turbulence on the source-to-UAV and UAVto-destination links,respectively.We derive closedform expressions of the probability density function(PDF)and cumulative distribution function(CDF)for the proposed communication system,in terms of the Meijer-G function.Based on the precise PDF and CDF,analytical expressions for the outage probability,average bit error rate,and ergodic capacity are proposed with the aid of the extended generalized bivariate Fox’s H function.Finally,we show that there is a match between the analytical results and numerical results,and we analyze the influence of the system and channel parameters on the performance. 展开更多
关键词 amplify-and-forward protocol angle-ofarrival fluctuations FSO communication Malaga distribution UAV relay
下载PDF
Energy Efficiency in ARQ-Based Multi-Hop Systems and the Tradeoff with Throughput
15
作者 Ali Asghar Haghighi 《China Communications》 SCIE CSCD 2023年第6期60-71,共12页
The minimum energy per bit(EPB)as the energy efficiency(EE)metric in an automatic retransmission request(ARQ)based multi-hop system is analyzed under power and throughput constraints.Two ARQ protocols including type-I... The minimum energy per bit(EPB)as the energy efficiency(EE)metric in an automatic retransmission request(ARQ)based multi-hop system is analyzed under power and throughput constraints.Two ARQ protocols including type-I(ARQ-I)and repetition redundancy(ARQ-RR)are considered and expressions for the optimal power allocation(PA)are obtained.Using the obtained optimal powers,the EE-throughput tradeoff(EETT)is analyzed and the EETT closed-form expressions for both ARQ protocols and in arbitrary average channel gain values are obtained.It is shown that how different throughput requirements,especially the high levels,affect the EE performance.Additionally,asymptotic analysis is made in the feasible high throughput values and lower and upper EETT bounds are derived for ARQ-I protocol.To evaluate the EE a distributed PA scenario,as a benchmark,is presented and the energy savinggain obtained from the optimal PA in comparison with the distributed PA for ARQ-I and ARQ-RR protocols is discussed in different throughput values and node locations. 展开更多
关键词 ARQ cooperative relaying energy efficiency green communication multi-hop systems routing algorithms throughput analysis
下载PDF
Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems
16
作者 Hemant Kumar Narsani Ali Ranjha +2 位作者 Kapal Dev Fida Hussain Memon Nawab Muhammad Faseeh Qureshi 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1458-1464,共7页
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabil... Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G networks.In this regard,UAVs have appeared as a winning candidate to mitigate security risks.In this paper,we leverage UAVs to propose two methods.The first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver devices.Moreover,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,i.e.increasing secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF relay.Additionally,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation distance.Lastly,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations. 展开更多
关键词 URLLC UAV-Assisted communications 6G systems Secrecy rate
下载PDF
Radiofrequency sensing systems based on emerging two-dimensional materials and devices
17
作者 Honglei Xue Wanshuo Gao +3 位作者 Jianwei Gao Grégory F Schneider Chen Wang Wangyang Fu 《International Journal of Extreme Manufacturing》 SCIE EI CAS CSCD 2023年第3期319-340,共22页
As one of the most promising platforms for wireless communication,radiofrequency(RF)electronics have been widely advocated for the development of sensing systems.In particular,monolayer and few-layer two-dimensional(2... As one of the most promising platforms for wireless communication,radiofrequency(RF)electronics have been widely advocated for the development of sensing systems.In particular,monolayer and few-layer two-dimensional(2D)materials exhibiting extraordinary electrical properties not only can be integrated to improve the performance of RF circuits,but also to display exceptional sensing capabilities.This review provides an in-depth perspective of current trends and challenges in the application of 2D materials for RF biochemical sensing,including:(i)theoretical bases to achieve different sensing schemes;(ii)unique properties of 2D materials for reasoning their applications in RF sensing;(iii)developments in 2D RF sensors to facilitate the practice of biochemical sensors with ever-demanding sensitivities,as well as their potential uses in meeting the requirements and challenges of biochemical sensors in the Internet-of-Things era. 展开更多
关键词 radiofrequency sensing two-dimensional materials wireless communication
下载PDF
Training-based symbol detection with temporal convolutional neural network in single-polarized optical communication system
18
作者 Yingzhe Luo Jianhao Hu 《Digital Communications and Networks》 SCIE CSCD 2023年第4期920-930,共11页
In order to reduce the physical impairment caused by signal distortion,in this paper,we investigate symbol detection with Deep Learning(DL)methods to improve bit-error performance in the optical communication system.M... In order to reduce the physical impairment caused by signal distortion,in this paper,we investigate symbol detection with Deep Learning(DL)methods to improve bit-error performance in the optical communication system.Many DL-based methods have been applied to such systems to improve bit-error performance.Referring to the speech-to-text method of automatic speech recognition,this paper proposes a signal-to-symbol method based on DL and designs a receiver for symbol detection on single-polarized optical communications modes.To realize this detection method,we propose a non-causal temporal convolutional network-assisted receiver to detect symbols directly from the baseband signal,which specifically integrates most modules of the receiver.Meanwhile,we adopt three training approaches for different signal-to-noise ratios.We also apply a parametric rectified linear unit to enhance the noise robustness of the proposed network.According to the simulation experiments,the biterror-rate performance of the proposed method is close to or even superior to that of the conventional receiver and better than the recurrent neural network-based receiver. 展开更多
关键词 Deep learning Optical communications Symbol detection Temporal convolutional network
下载PDF
Approach to Simplify the Development of IoT Systems that Interconnect Embedded Devices Using a Single Program
19
作者 Enol Matilla Blanco Jordán Pascual Espada Rubén Gonzalez Crespo 《Computers, Materials & Continua》 SCIE EI 2023年第11期2463-2480,共18页
Many Internet of Things(IoT)systems are based on the intercommunication among different devices and centralized systems.Nowadays,there are several commercial and research platforms available to simplify the creation o... Many Internet of Things(IoT)systems are based on the intercommunication among different devices and centralized systems.Nowadays,there are several commercial and research platforms available to simplify the creation of such IoT systems.However,developing these systems can often be a tedious task.To address this challenge,a proposed solution involves the implementation of a unified program or script that encompasses the entire system,including IoT devices functionality.This approach is based on an abstraction,integrating the control of the devices in a single program through a programmable object.Subsequently,the proposal processes the unified script to generate the centralized system code and a controller for each device.By adopting this approach,developers will be able to create IoT systems with significantly reduced implementation costs,surpassing current platforms by more than 10%.The results demonstrate that the single program approach can significantly accelerate the development of IoT systems relying on device communication. 展开更多
关键词 IOT interconnected devices IoT platform programing devices devices coordination and communication
下载PDF
Sonar Image Target Detection for Underwater Communication System Based on Deep Neural Network
20
作者 Lilan Zou Bo Liang +2 位作者 Xu Cheng Shufa Li Cong Lin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第12期2641-2659,共19页
Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and mo... Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and model detection performance is degraded due to the complex imaging environment,we proposed a more effective and robust target detection framework based on deep learning,which can make full use of the acoustic shadow information in the forward-looking sonar images to assist underwater target detection.Firstly,the weighted box fusion method is adopted to generate a fusion box by weighted fusion of prediction boxes with high confidence,so as to obtain accurate acoustic shadow boxes.Further,the acoustic shadow box is cut down to get the feature map containing the acoustic shadow information,and then the acoustic shadow feature map and the target information feature map are adaptively fused to make full use of the acoustic shadow feature information.In addition,we introduce a threshold processing module to improve the attention of the model to important feature information.Through the underwater sonar dataset provided by Pengcheng Laboratory,the proposed method improved the average accuracy by 3.14%at the IoU threshold of 0.7,which is better than the current traditional target detection model. 展开更多
关键词 Underwater communication intelligent sensor network target detection weighted frame fusion shadow information
下载PDF
上一页 1 2 182 下一页 到第
使用帮助 返回顶部