期刊文献+
共找到3,345篇文章
< 1 2 168 >
每页显示 20 50 100
3D tomographic analysis of equatorial plasma bubble using GNSS-TEC data from Indonesian GNSS Network
1
作者 Ihsan Naufal Muafiry Prayitno Abadi +5 位作者 Teguh N.Pratama Dyah R.Martiningrum Sri Ekawati Yuandhika GWismaya Febrylian FChabibi Gatot HPramono 《Earth and Planetary Physics》 EI CAS 2025年第1期127-136,共10页
Equatorial Plasma Bubbles(EPBs)are ionospheric irregularities that take place near the magnetic equator.EPBs most commonly occur after sunset during the equinox months,although they can also be observed during other s... Equatorial Plasma Bubbles(EPBs)are ionospheric irregularities that take place near the magnetic equator.EPBs most commonly occur after sunset during the equinox months,although they can also be observed during other seasons.The phenomenon significantly disrupts radio wave signals essential to communication and navigation systems.The national network of Global Navigation Satellite System(GNSS)receivers in Indonesia(>30°longitudinal range)provides an opportunity for detailed EPB studies.To explore this,we conducted preliminary 3D tomography of total electron content(TEC)data captured by GNSS receivers following a geomagnetic storm on December 3,2023,when at least four EPB clusters occurred in the Southeast Asian sector.TEC and extracted TEC depletion with a 120-minute running average were then used as inputs for a 3D tomography program.Their 2D spatial distribution consistently captured the four EPB clusters over time.These tomography results were validated through a classical checkerboard test and comparisons with other ionospheric data sources,such as the Global Ionospheric Map(GIM)and International Reference Ionosphere(IRI)profile.Validation of the results demonstrates the capability of the Indonesian GNSS network to measure peak ionospheric density.These findings highlight the potential for future three-dimensional research of plasma bubbles in low-latitude regions using existing GNSS networks,with extensive longitudinal coverage. 展开更多
关键词 EPB Indonesian gNSS network 3d tomography
下载PDF
Modeling and Comprehensive Review of Signaling Storms in 3GPP-Based Mobile Broadband Networks:Causes,Solutions,and Countermeasures
2
作者 Muhammad Qasim Khan Fazal Malik +1 位作者 Fahad Alturise Noor Rahman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期123-153,共31页
Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important a... Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject. 展开更多
关键词 Signaling storm problems control signaling load analytical modeling 3gPP networks smart devices diameter signaling mobile broadband data access data traffic mobility management signaling network architecture 5g mobile communication
下载PDF
Estimation of the anisotropy of hydraulic conductivity through 3D fracture networks using the directional geological entropy 被引量:1
3
作者 Chuangbing Zhou Zuyang Ye +2 位作者 Chi Yao Xincheng Fan Feng Xiong 《International Journal of Mining Science and Technology》 SCIE EI CAS CSCD 2024年第2期137-148,共12页
With an extension of the geological entropy concept in porous media,the approach called directional entrogram is applied to link hydraulic behavior to the anisotropy of the 3D fracture networks.A metric called directi... With an extension of the geological entropy concept in porous media,the approach called directional entrogram is applied to link hydraulic behavior to the anisotropy of the 3D fracture networks.A metric called directional entropic scale is used to measure the anisotropy of spatial order in different directions.Compared with the traditional connectivity indexes based on the statistics of fracture geometry,the directional entropic scale is capable to quantify the anisotropy of connectivity and hydraulic conductivity in heterogeneous 3D fracture networks.According to the numerical analysis of directional entrogram and fluid flow in a number of the 3D fracture networks,the hydraulic conductivities and entropic scales in different directions both increase with spatial order(i.e.,trace length decreasing and spacing increasing)and are independent of the dip angle.As a result,the nonlinear correlation between the hydraulic conductivities and entropic scales from different directions can be unified as quadratic polynomial function,which can shed light on the anisotropic effect of spatial order and global entropy on the heterogeneous hydraulic behaviors. 展开更多
关键词 3d fracture network geological entropy directional entropic scale ANISOTROPY Hydraulic conductivity
下载PDF
Numerical Study of the Biomechanical Behavior of a 3D Printed Polymer Esophageal Stent in the Esophagus by BP Neural Network Algorithm 被引量:1
4
作者 Guilin Wu Shenghua Huang +7 位作者 Tingting Liu Zhuoni Yang Yuesong Wu Guihong Wei Peng Yu Qilin Zhang Jun Feng Bo Zeng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2709-2725,共17页
Esophageal disease is a common disorder of the digestive system that can severely affect the quality of life andprognosis of patients. Esophageal stenting is an effective treatment that has been widely used in clinica... Esophageal disease is a common disorder of the digestive system that can severely affect the quality of life andprognosis of patients. Esophageal stenting is an effective treatment that has been widely used in clinical practice.However, esophageal stents of different types and parameters have varying adaptability and effectiveness forpatients, and they need to be individually selected according to the patient’s specific situation. The purposeof this study was to provide a reference for clinical doctors to choose suitable esophageal stents. We used 3Dprinting technology to fabricate esophageal stents with different ratios of thermoplastic polyurethane (TPU)/(Poly-ε-caprolactone) PCL polymer, and established an artificial neural network model that could predict the radial forceof esophageal stents based on the content of TPU, PCL and print parameter. We selected three optimal ratios formechanical performance tests and evaluated the biomechanical effects of different ratios of stents on esophagealimplantation, swallowing, and stent migration processes through finite element numerical simulation and in vitrosimulation tests. The results showed that different ratios of polymer stents had different mechanical properties,affecting the effectiveness of stent expansion treatment and the possibility of postoperative complications of stentimplantation. 展开更多
关键词 Finite element method 3d printing polymer esophageal stent artificial neural network
下载PDF
Graph neural network-based scheduling for multi-UAV-enabled communications in D2D networks 被引量:1
5
作者 Pei Li Lingyi Wang +3 位作者 Wei Wu Fuhui Zhou Baoyun Wang Qihui Wu 《Digital Communications and Networks》 SCIE CSCD 2024年第1期45-52,共8页
In this paper,we jointly design the power control and position dispatch for Multi-Unmanned Aerial Vehicle(UAV)-enabled communication in Device-to-Device(D2D)networks.Our objective is to maximize the total transmission... In this paper,we jointly design the power control and position dispatch for Multi-Unmanned Aerial Vehicle(UAV)-enabled communication in Device-to-Device(D2D)networks.Our objective is to maximize the total transmission rate of Downlink Users(DUs).Meanwhile,the Quality of Service(QoS)of all D2D users must be satisfied.We comprehensively considered the interference among D2D communications and downlink transmissions.The original problem is strongly non-convex,which requires high computational complexity for traditional optimization methods.And to make matters worse,the results are not necessarily globally optimal.In this paper,we propose a novel Graph Neural Networks(GNN)based approach that can map the considered system into a specific graph structure and achieve the optimal solution in a low complexity manner.Particularly,we first construct a GNN-based model for the proposed network,in which the transmission links and interference links are formulated as vertexes and edges,respectively.Then,by taking the channel state information and the coordinates of ground users as the inputs,as well as the location of UAVs and the transmission power of all transmitters as outputs,we obtain the mapping from inputs to outputs through training the parameters of GNN.Simulation results verified that the way to maximize the total transmission rate of DUs can be extracted effectively via the training on samples.Moreover,it also shows that the performance of proposed GNN-based method is better than that of traditional means. 展开更多
关键词 Unmanned aerial vehicle d2 dcommunication graph neural network Power control Position planning
下载PDF
A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments 被引量:1
6
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期631-654,共24页
Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control l... Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks. 展开更多
关键词 6g networks noise injection attacks gaussian mixture model Bessel function traffic filter Volterra filter
下载PDF
Inhibiting ceramide synthase 5 expression in microglia decreases neuroinflammation after spinal cord injury
7
作者 Wei Zhang Yubao Lu +6 位作者 Ruoqi Shen Yingjie Wu Chenrui Liu Xingxing Fang Liangming Zhang Bin Liu Limin Rong 《Neural Regeneration Research》 SCIE CAS 2025年第10期2955-2968,共14页
Microglia,the resident monocyte of the central nervous system,play a crucial role in the response to spinal cord injury.However,the precise mechanism remains unclear.To investigate the molecular mechanisms by which mi... Microglia,the resident monocyte of the central nervous system,play a crucial role in the response to spinal cord injury.However,the precise mechanism remains unclear.To investigate the molecular mechanisms by which microglia regulate the neuroinflammatory response to spinal cord injury,we performed single-cell RNA sequencing dataset analysis,focusing on changes in microglial subpopulations.We found that the MG1 subpopulation emerged in the acute/subacute phase of spinal cord injury and expressed genes related to cell pyroptosis,sphingomyelin metabolism,and neuroinflammation at high levels.Subsequently,we established a mouse model of contusive injury and performed intrathecal injection of siRNA and molecular inhibitors to validate the role of ceramide synthase 5 in the neuroinflammatory responses and pyroptosis after spinal cord injury.Finally,we established a PC12-BV2 cell co-culture system and found that ceramide synthase 5 and pyroptosis-associated proteins were highly expressed to induce the apoptosis of neuron cells.Inhibiting ceramide synthase 5 expression in a mouse model of spinal cord injury effectively reduced pyroptosis.Furthermore,ceramide synthase 5-induced pyroptosis was dependent on activation of the NLRP3 signaling pathway.Inhibiting ceramide synthase 5 expression in microglia in vivo reduced neuronal apoptosis and promoted recovery of neurological function.Pla2g7 formed a“bridge”between sphingolipid metabolism and ceramide synthase 5-mediated cell death by inhibiting the NLRP3 signaling pathway.Collectively,these findings suggest that inhibiting ceramide synthase 5 expression in microglia after spinal cord injury effectively suppressed microglial pyroptosis mediated by NLRP3,thereby exerting neuroprotective effects. 展开更多
关键词 ceramide synthase 5 gasdermin d MICROgLIA NEUROINFLAMMATION NLRP3 nuclear factor kappa B Pla2g7 PYROPTOSIS sphingomyelin metabolism spinal cord injury
下载PDF
Advancing 5G Network Applications Lifecycle Security:An ML-Driven Approach
8
作者 Ana Hermosilla Jorge Gallego-Madrid +3 位作者 Pedro Martinez-Julia Jordi Ortiz Ved P.Kafle Antonio Skarmeta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1447-1471,共25页
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa... As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security. 展开更多
关键词 network application network function virtualization machine learning SECURITY 5g
下载PDF
A Review and Bibliometric Analysis of the Current Studies for the 6G Networks
9
作者 Qusay M.Salih Md.Arafatur Rahman +4 位作者 Ahmad Firdaus Mohammed Rajih Jassim Hasan Kahtan Jasni Mohamad Zain Ahmed Hussein Ali 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2165-2206,共42页
The race to develop the next generation of wireless networks,known as Sixth Generation(6G)wireless,which will be operational in 2030,has already begun.To realize its full potential over the next decade,6G will undoubt... The race to develop the next generation of wireless networks,known as Sixth Generation(6G)wireless,which will be operational in 2030,has already begun.To realize its full potential over the next decade,6G will undoubtedly necessitate additional improvements that integrate existing solutions with cutting-edge ones.However,the studies about 6G are mainly limited and scattered,whereas no bibliometric study covers the 6G field.Thus,this study aims to review,examine,and summarize existing studies and research activities in 6G.This study has examined the Scopus database through a bibliometric analysis of more than 1,000 papers published between 2017 and 2021.Then,we applied the bibliometric analysis methods by including(1)document type,(2)subject area,(3)author,and(4)country of publication.The study’s results reflect the research 6G community’s trends,highlight important research challenges,and elucidate potential directions for future research in this interesting area. 展开更多
关键词 6g BIBLIOMETRIC wireless networks REVIEW
下载PDF
Intelligent UAV Based Energy Supply for 6G Wireless Powered IoT Networks
10
作者 Miao Jiansong Chen Haoqiang +4 位作者 Wang Pengjie Li Hairui Zhao Yan Mu Junsheng Yan Shi 《China Communications》 SCIE CSCD 2024年第9期321-337,共17页
In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with... In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with a constant power supply,transmits energy to charge the IoT devices on the ground,whereas UAV-B serves the IoT devices by data collection as a base station.In this framework,the system's energy efficiency is maximized,which we define as a ratio of the sum rate of IoT devices to the energy consumption of two UAVs during a fixed working duration.With the constraints of duration,transmit power,energy,and mobility,a difficult non-convex issue is presented by optimizing the trajectory,time duration allocation,and uplink transmit power of concurrently.To tackle the non-convex fractional optimization issue,we deconstruct it into three subproblems and we solve each of them iteratively using the descent method in conjunction with sequential convex approximation(SCA)approaches and the Dinkelbach algorithm.The simulation findings indicate that the suggested cooperative design has the potential to greatly increase the energy efficiency of the 6G intelligent UAV-assisted wireless powered IoT system when compared to previous benchmark systems. 展开更多
关键词 6g wireless powered network energy efficiency IoT intelligent network UAV communication
下载PDF
Mural Anomaly Region Detection Algorithm Based on Hyperspectral Multiscale Residual Attention Network
11
作者 Bolin Guo Shi Qiu +1 位作者 Pengchang Zhang Xingjia Tang 《Computers, Materials & Continua》 SCIE EI 2024年第10期1809-1833,共25页
Mural paintings hold significant historical information and possess substantial artistic and cultural value.However,murals are inevitably damaged by natural environmental factors such as wind and sunlight,as well as b... Mural paintings hold significant historical information and possess substantial artistic and cultural value.However,murals are inevitably damaged by natural environmental factors such as wind and sunlight,as well as by human activities.For this reason,the study of damaged areas is crucial for mural restoration.These damaged regions differ significantly from undamaged areas and can be considered abnormal targets.Traditional manual visual processing lacks strong characterization capabilities and is prone to omissions and false detections.Hyperspectral imaging can reflect the material properties more effectively than visual characterization methods.Thus,this study employs hyperspectral imaging to obtain mural information and proposes a mural anomaly detection algorithm based on a hyperspectral multi-scale residual attention network(HM-MRANet).The innovations of this paper include:(1)Constructing mural painting hyperspectral datasets.(2)Proposing a multi-scale residual spectral-spatial feature extraction module based on a 3D CNN(Convolutional Neural Networks)network to better capture multiscale information and improve performance on small-sample hyperspectral datasets.(3)Proposing the Enhanced Residual Attention Module(ERAM)to address the feature redundancy problem,enhance the network’s feature discrimination ability,and further improve abnormal area detection accuracy.The experimental results show that the AUC(Area Under Curve),Specificity,and Accuracy of this paper’s algorithm reach 85.42%,88.84%,and 87.65%,respectively,on this dataset.These results represent improvements of 3.07%,1.11%and 2.68%compared to the SSRN algorithm,demonstrating the effectiveness of this method for mural anomaly detection. 展开更多
关键词 MURALS anomaly detection HYPERSPECTRAL 3d CNN(Convolutional Neural networks) residual network
下载PDF
Design,progress and challenges of 3D carbon-based thermally conductive networks
12
作者 JING Yuan LIU Han-qing +2 位作者 ZHOU Feng DAI Fang-na WU Zhong-shuai 《新型炭材料(中英文)》 SCIE EI CAS CSCD 北大核心 2024年第5期844-871,共28页
The advent of the 5G era has stimulated the rapid development of high power electronics with dense integration.Three-dimensional(3D)thermally conductive networks,possessing high thermal and electrical conductivities a... The advent of the 5G era has stimulated the rapid development of high power electronics with dense integration.Three-dimensional(3D)thermally conductive networks,possessing high thermal and electrical conductivities and many different structures,are regarded as key materials to improve the performance of electronic devices.We provide a critical overview of carbonbased 3D thermally conductive networks,emphasizing their preparation-structure-property relationships and their applications in different scenarios.A detailed discussion of the microscopic principles of thermal conductivity is provided,which is crucial for increasing it.This is followed by an in-depth account of the construction of 3D networks using different carbon materials,such as graphene,carbon foam,and carbon nanotubes.Techniques for the assembly of two-dimensional graphene into 3D networks and their effects on thermal conductivity are emphasized.Finally,the existing challenges and future prospects for 3D carbon-based thermally conductive networks are discussed. 展开更多
关键词 Carbon material 3d network gRAPHENE Thermal conductivity Heat transfer
下载PDF
Channel assignment and power allocation for throughput improvement with PPO in B5G heterogeneous edge networks
13
作者 Xiaoming He Yingchi Mao +3 位作者 Yinqiu Liu Ping Ping Yan Hong Han Hu 《Digital Communications and Networks》 SCIE CSCD 2024年第1期109-116,共8页
In Beyond the Fifth Generation(B5G)heterogeneous edge networks,numerous users are multiplexed on a channel or served on the same frequency resource block,in which case the transmitter applies coding and the receiver u... In Beyond the Fifth Generation(B5G)heterogeneous edge networks,numerous users are multiplexed on a channel or served on the same frequency resource block,in which case the transmitter applies coding and the receiver uses interference cancellation.Unfortunately,uncoordinated radio resource allocation can reduce system throughput and lead to user inequity,for this reason,in this paper,channel allocation and power allocation problems are formulated to maximize the system sum rate and minimum user achievable rate.Since the construction model is non-convex and the response variables are high-dimensional,a distributed Deep Reinforcement Learning(DRL)framework called distributed Proximal Policy Optimization(PPO)is proposed to allocate or assign resources.Specifically,several simulated agents are trained in a heterogeneous environment to find robust behaviors that perform well in channel assignment and power allocation.Moreover,agents in the collection stage slow down,which hinders the learning of other agents.Therefore,a preemption strategy is further proposed in this paper to optimize the distributed PPO,form DP-PPO and successfully mitigate the straggler problem.The experimental results show that our mechanism named DP-PPO improves the performance over other DRL methods. 展开更多
关键词 B5g Heterogeneous edge networks PPO Channel assignment Power allocation THROUgHPUT
下载PDF
Regression Method for Rail Fastener Tightness Based on Center-Line Projection Distance Feature and Neural Network
14
作者 Yuanhang Wang Duxin Liu +4 位作者 Sheng Guo Yifan Wu Jing Liu Wei Li Hongjie Wang 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2024年第2期356-371,共16页
In the railway system,fasteners have the functions of damping,maintaining the track distance,and adjusting the track level.Therefore,routine maintenance and inspection of fasteners are important to ensure the safe ope... In the railway system,fasteners have the functions of damping,maintaining the track distance,and adjusting the track level.Therefore,routine maintenance and inspection of fasteners are important to ensure the safe operation of track lines.Currently,assessment methods for fastener tightness include manual observation,acoustic wave detection,and image detection.There are limitations such as low accuracy and efficiency,easy interference and misjudgment,and a lack of accurate,stable,and fast detection methods.Aiming at the small deformation characteristics and large elastic change of fasteners from full loosening to full tightening,this study proposes high-precision surface-structured light technology for fastener detection and fastener deformation feature extraction based on the center-line projection distance and a fastener tightness regression method based on neural networks.First,the method uses a 3D camera to obtain a fastener point cloud and then segments the elastic rod area based on the iterative closest point algorithm registration.Principal component analysis is used to calculate the normal vector of the segmented elastic rod surface and extract the point on the centerline of the elastic rod.The point is projected onto the upper surface of the bolt to calculate the projection distance.Subsequently,the mapping relationship between the projection distance sequence and fastener tightness is established,and the influence of each parameter on the fastener tightness prediction is analyzed.Finally,by setting up a fastener detection scene in the track experimental base,collecting data,and completing the algorithm verification,the results showed that the deviation between the fastener tightness regression value obtained after the algorithm processing and the actual measured value RMSE was 0.2196 mm,which significantly improved the effect compared with other tightness detection methods,and realized an effective fastener tightness regression. 展开更多
关键词 Railway system Fasteners Tightness inspection Neural network regression 3d point cloud processing
下载PDF
Energy-optimal DNN model placement in UAV-enabled edge computing networks
15
作者 Jianhang Tang Guoquan Wu +3 位作者 Mohammad Mussadiq Jalalzai Lin Wang Bing Zhang Yi Zhou 《Digital Communications and Networks》 SCIE CSCD 2024年第4期827-836,共10页
Unmanned aerial vehicle(UAV)-enabled edge computing is emerging as a potential enabler for Artificial Intelligence of Things(AIoT)in the forthcoming sixth-generation(6G)communication networks.With the use of flexible ... Unmanned aerial vehicle(UAV)-enabled edge computing is emerging as a potential enabler for Artificial Intelligence of Things(AIoT)in the forthcoming sixth-generation(6G)communication networks.With the use of flexible UAVs,massive sensing data is gathered and processed promptly without considering geographical locations.Deep neural networks(DNNs)are becoming a driving force to extract valuable information from sensing data.However,the lightweight servers installed on UAVs are not able to meet the extremely high requirements of inference tasks due to the limited battery capacities of UAVs.In this work,we investigate a DNN model placement problem for AIoT applications,where the trained DNN models are selected and placed on UAVs to execute inference tasks locally.It is impractical to obtain future DNN model request profiles and system operation states in UAV-enabled edge computing.The Lyapunov optimization technique is leveraged for the proposed DNN model placement problem.Based on the observed system overview,an advanced online placement(AOP)algorithm is developed to solve the transformed problem in each time slot,which can reduce DNN model transmission delay and disk I/O energy cost simultaneously while keeping the input data queues stable.Finally,extensive simulations are provided to depict the effectiveness of the AOP algorithm.The numerical results demonstrate that the AOP algorithm can reduce 18.14%of the model placement cost and 29.89%of the input data queue backlog on average by comparing it with benchmark algorithms. 展开更多
关键词 UAV-Enabled edge computing dNN model Placement 6g networks Inference tasks
下载PDF
RWNeRF:Robust Watermarking Scheme for Neural Radiance Fields Based on Invertible Neural Networks
16
作者 Wenquan Sun Jia Liu +2 位作者 Weina Dong Lifeng Chen Fuqiang Di 《Computers, Materials & Continua》 SCIE EI 2024年第9期4065-4083,共19页
As neural radiance fields continue to advance in 3D content representation,the copyright issues surrounding 3D models oriented towards implicit representation become increasingly pressing.In response to this challenge... As neural radiance fields continue to advance in 3D content representation,the copyright issues surrounding 3D models oriented towards implicit representation become increasingly pressing.In response to this challenge,this paper treats the embedding and extraction of neural radiance field watermarks as inverse problems of image transformations and proposes a scheme for protecting neural radiance field copyrights using invertible neural network watermarking.Leveraging 2D image watermarking technology for 3D scene protection,the scheme embeds watermarks within the training images of neural radiance fields through the forward process in invertible neural networks and extracts them from images rendered by neural radiance fields through the reverse process,thereby ensuring copyright protection for both the neural radiance fields and associated 3D scenes.However,challenges such as information loss during rendering processes and deliberate tampering necessitate the design of an image quality enhancement module to increase the scheme’s robustness.This module restores distorted images through neural network processing before watermark extraction.Additionally,embedding watermarks in each training image enables watermark information extraction from multiple viewpoints.Our proposed watermarking method achieves a PSNR(Peak Signal-to-Noise Ratio)value exceeding 37 dB for images containing watermarks and 22 dB for recovered watermarked images,as evaluated on the Lego,Hotdog,and Chair datasets,respectively.These results demonstrate the efficacy of our scheme in enhancing copyright protection. 展开更多
关键词 Neural radiance fields 3d scene ROBUST watermarking invertible neural networks
下载PDF
Design of an Interconnection Architecture and Sizing of Two (2) EPC Core Networks: The Case of Orange-Guinea
17
作者 Mamadou Sadigou Diallo Kadiatou Aissatou Barry +4 位作者 Amadou Lamarana Bah Mamadou Sanoussy Camara Janvier Fotsing Amadou Barry Amadou Oury Bah 《Journal of Energy and Power Engineering》 CAS 2024年第2期59-70,共12页
With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to res... With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to respond to the growing demand of users.This rapid evolution has given the operators to adapt,their methods to the new technologies that increase.This complexity becomes more important,when these networks include several technologies to access different from the heterogeneous network like in the 4G network.The dimensional new challenges tell the application and the considerable increase in demand for services and the compatibility with existing networks,the management of mobility intercellular of users and it offers a better quality of services.Thus,the proposed solution to meet these new requirements is the sizing of the EPC(Evolved Packet Core)core network to support the 5G access network.For the case of Orange Guinea,this involves setting up an architecture for interconnecting the core networks of Sonfonia and Camayenne.The objectives of our work are of two orders:(1)to propose these solutions and recommendations for the heart network EPC sizing and the deployment to be adopted;(2)supply and architectural interconnection in the heart network EPC and an existing heart network.In our work,the model of traffic in communication that we use to calculate the traffic generated with each technology has link in the network of the heart. 展开更多
关键词 5g network 4g network(EPS(evolved packet system)) 3g network(UMTS:Universal Mobile Telecommunications System) EPC network of the heart architecture dimensional Orange guinea technology service
下载PDF
3D Road Network Modeling and Road Structure Recognition in Internet of Vehicles
18
作者 Dun Cao Jia Ru +3 位作者 Jian Qin Amr Tolba Jin Wang Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1365-1384,共20页
Internet of Vehicles (IoV) is a new system that enables individual vehicles to connect with nearby vehicles,people, transportation infrastructure, and networks, thereby realizing amore intelligent and efficient transp... Internet of Vehicles (IoV) is a new system that enables individual vehicles to connect with nearby vehicles,people, transportation infrastructure, and networks, thereby realizing amore intelligent and efficient transportationsystem. The movement of vehicles and the three-dimensional (3D) nature of the road network cause the topologicalstructure of IoV to have the high space and time complexity.Network modeling and structure recognition for 3Droads can benefit the description of topological changes for IoV. This paper proposes a 3Dgeneral roadmodel basedon discrete points of roads obtained from GIS. First, the constraints imposed by 3D roads on moving vehicles areanalyzed. Then the effects of road curvature radius (Ra), longitudinal slope (Slo), and length (Len) on speed andacceleration are studied. Finally, a general 3D road network model based on road section features is established.This paper also presents intersection and road section recognition methods based on the structural features ofthe 3D road network model and the road features. Real GIS data from a specific region of Beijing is adopted tocreate the simulation scenario, and the simulation results validate the general 3D road network model and therecognitionmethod. Therefore, thiswork makes contributions to the field of intelligent transportation by providinga comprehensive approach tomodeling the 3Droad network and its topological changes in achieving efficient trafficflowand improved road safety. 展开更多
关键词 Internet of vehicles road networks 3d road model structure recognition gIS
下载PDF
Distributed Application Addressing in 6G Network
19
作者 Liu Jie Chen Sibo +4 位作者 Liu Yuqin Mo Zhiwei Lin Yilin Zhu Hongmei He Yufeng 《China Communications》 SCIE CSCD 2024年第4期193-207,共15页
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development... To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification. 展开更多
关键词 application addressing CNC(Computing&network Convergence) dNS(domain Name System) ICN(Information-Centric network) 6g
下载PDF
Information Centric Networking Based Cooperative Caching Framework for 5G Communication Systems
20
作者 R.Mahaveerakannan Thanarajan Tamilvizhi +2 位作者 Sonia Jenifer Rayen Osamah Ibrahim Khalaf Habib Hamam 《Computers, Materials & Continua》 SCIE EI 2024年第9期3945-3966,共22页
The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content.In light of the data-centric aspect of contemporary communication,the info... The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content.In light of the data-centric aspect of contemporary communication,the information-centric network(ICN)paradigm offers hope for a solution by emphasizing content retrieval by name instead of location.If 5G networks are to meet the expected data demand surge from expanded connectivity and Internet of Things(IoT)devices,then effective caching solutions will be required tomaximize network throughput andminimize the use of resources.Hence,an ICN-based Cooperative Caching(ICN-CoC)technique has been used to select a cache by considering cache position,content attractiveness,and rate prediction.The findings show that utilizing our suggested approach improves caching regarding the Cache Hit Ratio(CHR)of 84.3%,Average Hop Minimization Ratio(AHMR)of 89.5%,and Mean Access Latency(MAL)of 0.4 s.Within a framework,it suggests improved caching strategies to handle the difficulty of effectively controlling data consumption in 5G networks.These improvements aim to make the network run more smoothly by enhancing content delivery,decreasing latency,and relieving congestion.By improving 5G communication systems’capacity tomanage the demands faced by modern data-centric applications,the research ultimately aids in advancement. 展开更多
关键词 Information-centric networking caching schemes 5g communication non-negative matrix factorization(NMF) weighted clustering algorithm
下载PDF
上一页 1 2 168 下一页 到第
使用帮助 返回顶部