期刊文献+

二次检索

题名
关键词
文摘
作者
第一作者
机构
刊名
分类号
参考文献
作者简介
基金资助
栏目信息

年份

学科

共找到713篇文章
< 1 2 36 >
每页显示 20 50 100
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks 被引量:1
1
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 Vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
下载PDF
Trust-based co-operative routing for secure communication in mobile ad hoc networks
2
作者 Ankita A.Mahamune M.M.Chandane 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1079-1087,共9页
The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents ... The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency. 展开更多
关键词 Mobile Ad hoc network Secure communication AODV Co-operative routing Trust metric
下载PDF
A CSMA/CA based MAC protocol for hybrid Power-line/Visible-light communication networks:Design and analysis
3
作者 Sheng Hao Huyin Zhang +2 位作者 Fei Yang Chenghao Li Jing Wang 《Digital Communications and Networks》 SCIE CSCD 2024年第2期481-497,共17页
Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and har... Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and hardware efficiency.Current research on HPVC networks focuses on the performance analysis and optimization of the Physical(PHY)layer,where the Power Line Communication(PLC)component only serves as the backbone to provide power to light Emitting Diode(LED)devices.So designing a Media Access Control(MAC)protocol remains a great challenge because it allows both PLC and Visible Light Communication(VLC)components to operate data transmission,i.e.,to achieve a true HPVC network CC.To solve this problem,we propose a new HPC network MAC protocol(HPVC MAC)based on Carrier Sense Multiple Access/Collision Avoidance(CSMA/CA)by combining IEEE 802.15.7 and IEEE 1901 standards.Firstly,we add an Additional Assistance(AA)layer to provide the channel selection strategies for sensor stations,so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism,respectively.Based on this,we give a detailed working principle of the HPVC MAC,followed by the construction of a joint analytical model for mathematicalmathematical validation of the HPVC MAC.In the modeling process,the impacts of PHY layer settings(including channel fading types and additive noise feature),CSMA/CA mechanisms of 802.15.7 and 1901,and practical configurations(such as traffic rate,transit buffer size)are comprehensively taken into consideration.Moreover,we prove the proposed analytical model has the solvability.Finally,through extensive simulations,we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62%between the simulation and analytical results. 展开更多
关键词 Hybrid power-line/Visible light communication (HPVC)networks MAC protocol CSMA/CA IEEE 802.15.7 IEEE 1901 Performance analysis
下载PDF
Sensing and Communication Integrated Fast Neighbor Discovery for UAV Networks
4
作者 WEI Zhiqing ZHANG Yongji +1 位作者 JI Danna LI Chenfei 《ZTE Communications》 2024年第3期69-82,共14页
In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communicati... In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communication(ISAC),as an emerging technology in 6G mobile networks,has shown great potential in improving communication performance with the assistance of sensing information.ISAC obtains the prior information about node distribution,reducing the ND time.However,the prior information obtained through ISAC may be imperfect.Hence,an ND algorithm based on reinforcement learning is proposed.The learning automaton(LA)is applied to interact with the environment and continuously adjust the probability of selecting beams to accelerate the convergence speed of ND algorithms.Besides,an efficient ND algorithm in the neighbor maintenance phase is designed,which applies the Kalman filter to predict node movement.Simulation results show that the LA-based ND algorithm reduces the ND time by up to 32%compared with the Scan-Based Algorithm(SBA),which proves the efficiency of the proposed ND algorithms. 展开更多
关键词 unmanned aerial vehicle networks neighbor discovery integrated sensing and communication reinforcement learning Kalman filter
下载PDF
Secure Channel Estimation Using Norm Estimation Model for 5G Next Generation Wireless Networks
5
作者 Khalil Ullah Song Jian +4 位作者 Muhammad Naeem Ul Hassan Suliman Khan Mohammad Babar Arshad Ahmad Shafiq Ahmad 《Computers, Materials & Continua》 SCIE EI 2025年第1期1151-1169,共19页
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile networks.These networks are sufficiently scaled to interconnect billions of user... The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile networks.These networks are sufficiently scaled to interconnect billions of users and devices.Researchers in academia and industry are focusing on technological advancements to achieve highspeed transmission,cell planning,and latency reduction to facilitate emerging applications such as virtual reality,the metaverse,smart cities,smart health,and autonomous vehicles.NextG continuously improves its network functionality to support these applications.Multiple input multiple output(MIMO)technology offers spectral efficiency,dependability,and overall performance in conjunctionwithNextG.This article proposes a secure channel estimation technique in MIMO topology using a norm-estimation model to provide comprehensive insights into protecting NextG network components against adversarial attacks.The technique aims to create long-lasting and secure NextG networks using this extended approach.The viability of MIMO applications and modern AI-driven methodologies to combat cybersecurity threats are explored in this research.Moreover,the proposed model demonstrates high performance in terms of reliability and accuracy,with a 20%reduction in the MalOut-RealOut-Diff metric compared to existing state-of-the-art techniques. 展开更多
关键词 Next generation networks massive mimo communication network artificial intelligence 5G adversarial attacks channel estimation information security
下载PDF
Distribution algorithm of entangled particles for wireless quantum communication mesh networks
6
作者 王霄峻 施丽慧 +2 位作者 占海涛 项睿清 余旭涛 《Journal of Southeast University(English Edition)》 EI CAS 2015年第4期450-456,共7页
With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes ... With ensured network connectivity in quantum channels, the issue of distributing entangled particles in wireless quantum communication mesh networks can be equivalently regarded as a problem of quantum backbone nodes selection in order to save cost and reduce complexity. A minimum spanning tree( MST)-based quantum distribution algorithm( QDMST) is presented to construct the mesh backbone network. First, the articulation points are found,and for each connected block uncovered by the articulation points, the general centers are solved. Then, both articulation points and general centers are classified as backbone nodes and an M ST is formed. The quantum path between every two neighbor nodes on the MST is calculated. The nodes on these paths are also classified as backbone nodes. Simulation results validate the advantages of QDMST in the average backbone nodes number and average quantum channel distance compared to the existing random selection algorithm under multiple network scenarios. 展开更多
关键词 wireless quantum communication networks entangled particles distribution wireless mesh networks minimum spanning tree
下载PDF
Covert LEO Satellite Communication Aided by Generative Adversarial Network Based Cooperative UAV Jamming
7
作者 Shi Jia Li Xiaomeng +2 位作者 Liao Xiaomin Tie Zhuangzhuang Hu Junfan 《China Communications》 SCIE CSCD 2024年第9期27-39,共13页
In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LE... In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LEO satellite transmission,a multi-objective problem is formulated to jointly optimize the UAV’s jamming power and trajectory.For practical consideration,we assume that the UAV can only have partial environmental information,and can’t know the detection threshold and exact location of the eavesdropper on the ground.To solve the multiobjective problem,we propose the data-driven generative adversarial network(DD-GAN)based method to optimize the power and trajectory of the UAV,in which the sample data is collected by using genetic algorithm(GA).Simulation results show that the jamming solution of UAV generated by DD-GAN can achieve an effective trade-off between covert rate and probability of detection errors when only limited prior information is obtained. 展开更多
关键词 covert communication generative adversarial network LEO satellite UAV jammer
下载PDF
Ultimately Bounded Output Feedback Control for Networked Nonlinear Systems With Unreliable Communication Channel: A Buffer-Aided Strategy
8
作者 Yuhan Zhang Zidong Wang +2 位作者 Lei Zou Yun Chen Guoping Lu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1566-1578,共13页
This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication... This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication constraints.These transmissions are carried out over an unreliable communication channel. In order to enhance the utilization rate of measurement data, a buffer-aided strategy is novelly employed to store historical measurements when communication networks are inaccessible. Using the neural network technique, a novel observer-based controller is introduced to address effects of signal transmission behaviors and unknown nonlinear dynamics.Through the application of stochastic analysis and Lyapunov stability, a joint framework is constructed for analyzing resultant system performance under the introduced controller. Subsequently, existence conditions for the desired output-feedback controller are delineated. The required parameters for the observerbased controller are then determined by resolving some specific matrix inequalities. Finally, a simulation example is showcased to confirm method efficacy. 展开更多
关键词 Buffer-aided strategy neural networks nonlinear control output-feedback control unreliable communication channel
下载PDF
Secrecy Outage Probability Minimization in Wireless-Powered Communications Using an Improved Biogeography-Based Optimization-Inspired Recurrent Neural Network
9
作者 Mohammad Mehdi Sharifi Nevisi Elnaz Bashir +3 位作者 Diego Martín Seyedkian Rezvanjou Farzaneh Shoushtari Ehsan Ghafourian 《Computers, Materials & Continua》 SCIE EI 2024年第3期3971-3991,共21页
This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The mai... This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The main contribution of the paper is a novel approach to minimize the secrecy outage probability(SOP)in these systems.Minimizing SOP is crucial for maintaining the confidentiality and integrity of data,especially in situations where the transmission of sensitive data is critical.Our proposed method harnesses the power of an improved biogeography-based optimization(IBBO)to effectively train a recurrent neural network(RNN).The proposed IBBO introduces an innovative migration model.The core advantage of IBBO lies in its adeptness at maintaining equilibrium between exploration and exploitation.This is accomplished by integrating tactics such as advancing towards a random habitat,adopting the crossover operator from genetic algorithms(GA),and utilizing the global best(Gbest)operator from particle swarm optimization(PSO)into the IBBO framework.The IBBO demonstrates its efficacy by enabling the RNN to optimize the system parameters,resulting in significant outage probability reduction.Through comprehensive simulations,we showcase the superiority of the IBBO-RNN over existing approaches,highlighting its capability to achieve remarkable gains in SOP minimization.This paper compares nine methods for predicting outage probability in wireless-powered communications.The IBBO-RNN achieved the highest accuracy rate of 98.92%,showing a significant performance improvement.In contrast,the standard RNN recorded lower accuracy rates of 91.27%.The IBBO-RNN maintains lower SOP values across the entire signal-to-noise ratio(SNR)spectrum tested,suggesting that the method is highly effective at optimizing system parameters for improved secrecy even at lower SNRs. 展开更多
关键词 Wireless-powered communications secrecy outage probability improved biogeography-based optimization recurrent neural network
下载PDF
Information Centric Networking Based Cooperative Caching Framework for 5G Communication Systems
10
作者 R.Mahaveerakannan Thanarajan Tamilvizhi +2 位作者 Sonia Jenifer Rayen Osamah Ibrahim Khalaf Habib Hamam 《Computers, Materials & Continua》 SCIE EI 2024年第9期3945-3966,共22页
The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content.In light of the data-centric aspect of contemporary communication,the info... The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content.In light of the data-centric aspect of contemporary communication,the information-centric network(ICN)paradigm offers hope for a solution by emphasizing content retrieval by name instead of location.If 5G networks are to meet the expected data demand surge from expanded connectivity and Internet of Things(IoT)devices,then effective caching solutions will be required tomaximize network throughput andminimize the use of resources.Hence,an ICN-based Cooperative Caching(ICN-CoC)technique has been used to select a cache by considering cache position,content attractiveness,and rate prediction.The findings show that utilizing our suggested approach improves caching regarding the Cache Hit Ratio(CHR)of 84.3%,Average Hop Minimization Ratio(AHMR)of 89.5%,and Mean Access Latency(MAL)of 0.4 s.Within a framework,it suggests improved caching strategies to handle the difficulty of effectively controlling data consumption in 5G networks.These improvements aim to make the network run more smoothly by enhancing content delivery,decreasing latency,and relieving congestion.By improving 5G communication systems’capacity tomanage the demands faced by modern data-centric applications,the research ultimately aids in advancement. 展开更多
关键词 Information-centric networking caching schemes 5G communication non-negative matrix factorization(NMF) weighted clustering algorithm
下载PDF
Cutting-Edge Challenges in Communication Technology and Computer Network Security
11
作者 Haikang Gu 《Journal of Electronic Research and Application》 2024年第5期26-31,共6页
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev... The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks. 展开更多
关键词 communication technology Computer network SECURITY
下载PDF
Load Balancing-Based Routing Optimization Mechanism for Power Communication Networks 被引量:13
12
作者 Ningzhe Xing Siya Xu +1 位作者 Sidong Zhang Shaoyong Guo 《China Communications》 SCIE CSCD 2016年第8期169-176,共8页
In power communication networks, it is a challenge to decrease the risk of different services efficiently to improve operation reliability. One of the important factor in reflecting communication risk is service route... In power communication networks, it is a challenge to decrease the risk of different services efficiently to improve operation reliability. One of the important factor in reflecting communication risk is service route distribution. However, existing routing algorithms do not take into account the degree of importance of services, thereby leading to load unbalancing and increasing the risks of services and networks. A routing optimization mechanism based on load balancing for power communication networks is proposed to address the abovementioned problems. First, the mechanism constructs an evaluation model to evaluate the service and network risk degree using combination of devices, service load, and service characteristics. Second, service weights are determined with modified relative entropy TOPSIS method, and a balanced service routing determination algorithm is proposed. Results of simulations on practical network topology show that the mechanism can optimize the network risk degree and load balancing degree efficiently. 展开更多
关键词 power communication networks load balancing routing optimization
下载PDF
Joint Computing and Communication Resource Allocation for Satellite Communication Networks with Edge Computing 被引量:11
13
作者 Shanghong Zhang Gaofeng Cui +1 位作者 Yating Long Weidong Wang 《China Communications》 SCIE CSCD 2021年第7期236-252,共17页
Benefit from the enhanced onboard processing capacities and high-speed satellite-terrestrial links,satellite edge computing has been regarded as a promising technique to facilitate the execution of the computation-int... Benefit from the enhanced onboard processing capacities and high-speed satellite-terrestrial links,satellite edge computing has been regarded as a promising technique to facilitate the execution of the computation-intensive applications for satellite communication networks(SCNs).By deploying edge computing servers in satellite and gateway stations,SCNs can achieve significant performance gains of the computing capacities at the expense of extending the dimensions and complexity of resource management.Therefore,in this paper,we investigate the joint computing and communication resource management problem for SCNs to minimize the execution latency of the computation-intensive applications,while two different satellite edge computing scenarios and local execution are considered.Furthermore,the joint computing and communication resource allocation problem for the computation-intensive services is formulated as a mixed-integer programming problem.A game-theoretic and many-to-one matching theorybased scheme(JCCRA-GM)is proposed to achieve an approximate optimal solution.Numerical results show that the proposed method with low complexity can achieve almost the same weight-sum latency as the Brute-force method. 展开更多
关键词 satellite communication networks edge computing resource allocation matching theory
下载PDF
Distributed wireless quantum communication networks with partially entangled pairs 被引量:9
14
作者 余旭涛 张在琛 徐进 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第1期66-73,共8页
Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks ... Wireless quantum communication networks transfer quantum state by teleportation. Existing research focuses on maximal entangled pairs. In this paper, we analyse the distributed wireless quantum communication networks with partially entangled pairs. A quantum routing scheme with multi-hop teleportation is proposed. With the proposed scheme, is not necessary for the quantum path to be consistent with the classical path. The quantum path and its associated classical path are established in a distributed way. Direct multi-hop teleportation is conducted on the selected path to transfer a quantum state from the source to the destination. Based on the feature of multi-hop teleportation using partially entangled pairs, if the node number of the quantum path is even, the destination node will add another teleportation at itself. We simulated the performance of distributed wireless quantum communication networks with a partially entangled state. The probability of transferring the quantum state successfully is statistically analyzed. Our work shows that multi-hop teleportation on distributed wireless quantum networks with partially entangled pairs is feasible. 展开更多
关键词 distributed wireless quantum communication networks partially entangled pairs routing multi-hop teleportation
下载PDF
A Game-Theoretic Perspective on Resource Management for Large-Scale UAV Communication Networks 被引量:9
15
作者 Jiaxin Chen Ping Chen +3 位作者 Qihui Wu Yuhua Xu Nan Qi Tao Fang 《China Communications》 SCIE CSCD 2021年第1期70-87,共18页
As a result of rapid development in electronics and communication technology,large-scale unmanned aerial vehicles(UAVs)are harnessed for various promising applications in a coordinated manner.Although it poses numerou... As a result of rapid development in electronics and communication technology,large-scale unmanned aerial vehicles(UAVs)are harnessed for various promising applications in a coordinated manner.Although it poses numerous advantages,resource management among various domains in large-scale UAV communication networks is the key challenge to be solved urgently.Specifically,due to the inherent requirements and future development trend,distributed resource management is suitable.In this article,we investigate the resource management problem for large-scale UAV communication networks from game-theoretic perspective which are exactly coincident with the distributed and autonomous manner.By exploring the inherent features,the distinctive challenges are discussed.Then,we explore several gametheoretic models that not only combat the challenges but also have broad application prospects.We provide the basics of each game-theoretic model and discuss the potential applications for resource management in large-scale UAV communication networks.Specifically,mean-field game,graphical game,Stackelberg game,coalition game and potential game are included.After that,we propose two innovative case studies to highlight the feasibility of such novel game-theoretic models.Finally,we give some future research directions to shed light on future opportunities and applications. 展开更多
关键词 large-scale UAV communication networks resource management game-theoretic model
下载PDF
Quantum Communication Networks and Trust Management: A Survey 被引量:5
16
作者 Shibin Zhang Yan Chang +5 位作者 Lili Yan Zhiwei Sheng Fan Yang Guihua Han Yuanyuan Huang Jinyue Xia 《Computers, Materials & Continua》 SCIE EI 2019年第9期1145-1174,共30页
This paper summarizes the state of art in quantum communication networks and trust management in recent years.As in the classical networks,trust management is the premise and foundation of quantum secure communication... This paper summarizes the state of art in quantum communication networks and trust management in recent years.As in the classical networks,trust management is the premise and foundation of quantum secure communication and cannot simply be attributed to security issues,therefore the basic and importance of trust management in quantum communication networks should be taken more seriously.Compared with other theories and techniques in quantum communication,the trust of quantum communication and trust management model in quantum communication network environment is still in its initial stage.In this paper,the core technologies of establishing secure and reliable quantum communication networks are categorized and summarized,and the trends of each direction in trust management of quantum communication network are discussed in depth. 展开更多
关键词 Quantum communication quantum communication network TRUST trust management trust management model
下载PDF
Generative Adversarial Networks Based Digital Twin Channel Modeling for Intelligent Communication Networks 被引量:4
17
作者 Yuxin Zhang Ruisi He +5 位作者 Bo Ai Mi Yang Ruifeng Chen Chenlong Wang Zhengyu Zhang Zhangdui Zhong 《China Communications》 SCIE CSCD 2023年第8期32-43,共12页
Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With D... Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With DT channel modeling,the generated channel data can be closer to realistic channel measurements without requiring a prior channel model,and amount of channel data can be significantly increased.Artificial intelligence(AI)based modeling approach shows outstanding performance to solve such problems.In this work,a channel modeling method based on generative adversarial networks is proposed for DT channel,which can generate identical statistical distribution with measured channel.Model validation is conducted by comparing DT channel characteristics with measurements,and results show that DT channel leads to fairly good agreement with measured channel.Finally,a link-layer simulation is implemented based on DT channel.It is found that the proposed DT channel model can be well used to conduct link-layer simulation and its performance is comparable to using measurement data.The observations and results can facilitate the development of DT channel modeling and provide new thoughts for DT channel applications,as well as improving the performance and reliability of intelligent communication networking. 展开更多
关键词 digital twin channel modeling generative adversarial networks intelligent communication networking
下载PDF
Predictive Decision and Reliable Accessing for UAV Communication in Space-Air-Ground Integrated Networks 被引量:3
18
作者 Bowen Zeng Zhongshan Zhang +2 位作者 Xuhui Ding Xiangyuan Bu Jianping An 《China Communications》 SCIE CSCD 2022年第1期166-185,共20页
The cooperation of multiple Unmanned Aerial Vehicles(UAVs) has become a promising scenario in Space-Air-Ground Integrated Networks(SAGINs) recently due to their widespread applications,where wireless communication is ... The cooperation of multiple Unmanned Aerial Vehicles(UAVs) has become a promising scenario in Space-Air-Ground Integrated Networks(SAGINs) recently due to their widespread applications,where wireless communication is a basic necessity and is normally categorized into control and nonpayload communication(CNPC) as well as payload communication. In this paper, we attempt to tackle two challenges of UAV communication respectively on establishing reliable CNPC links against the high mobility of UAVs as well as changeable communication conditions, and on offering dynamic resource optimization for Quality-of-Service(QoS) guaranteed payload communication with variable link connectivity. Firstly, we propose the concept of air controlling center(ACC), a virtual application equipped on the infrastructure in SAGINs, which can collect global information for estimating UAV trajectory and communication channels. We then introduce the knapsack problem for modelling resource optimization of UAV communication in order to provide optimal access points for both CNPC and payload communication. Meanwhile, using the air controlling information, predictive decision algorithm and handover strategy are introduced for the reliable connection with multiple access points. Simulation results demonstrate that our proposal ensures an approximate always-on reliable accessing of communication links and outperforms the existing methods against high mobility,sparse distribution, and physical obstacles. 展开更多
关键词 space-air-ground integrated networks UAV communication air communication controlling predictive decision reliable accessing
下载PDF
Information-Defined Networks:A Communication Network Approach for Network Studies 被引量:2
19
作者 Wenjie Jia Tao Jiang 《China Communications》 SCIE CSCD 2021年第7期197-210,共14页
The research of complex networks facilitates the progress of various disciplines,including biology,chemistry,social science,computer,and communication engineering.Recently,it is popular to utilize complex networks to ... The research of complex networks facilitates the progress of various disciplines,including biology,chemistry,social science,computer,and communication engineering.Recently,it is popular to utilize complex networks to study the communication networks,such as designing efficient routing strategies and robust communication networks.However,exploiting the advantages of communication networks to investigate networks in various disciplines beyond telecommunications is still in infancy.Because of this situation,this paper proposes an information-defined network(IDN)framework by which a complex network can be abstracted as a communication network associated with multiple intelligent agents.Specifically,each component and dynamic process in this framework can be defined by information.We show that the IDN framework promotes the research of unsolved problems in the current complex network field,especially for detecting new interaction types in realworld networks. 展开更多
关键词 network data analysis label detection complex network communication network network evolution
下载PDF
Successive lag synchronization on dynamical networks with communication delay 被引量:3
20
作者 张新建 韦爱举 李科赞 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第3期466-472,共7页
In this paper, successive lag synchronization (SLS) on a dynamical network with communication delay is investigated. In order to achieve SLS on the dynamical network with communication delay, we design linear feedba... In this paper, successive lag synchronization (SLS) on a dynamical network with communication delay is investigated. In order to achieve SLS on the dynamical network with communication delay, we design linear feedback control and adaptive control, respectively. By using the Lyapunov function method, we obtain some sufficient conditions for global stability of SLS. To verify these results, some numerical examples are further presented. This work may find potential applications in consensus of multi-agent systems. 展开更多
关键词 successive lag synchronization dynamical network communication delay feedback control
下载PDF
上一页 1 2 36 下一页 到第
使用帮助 返回顶部