期刊文献+
共找到325篇文章
< 1 2 17 >
每页显示 20 50 100
Performance Evaluation of Scheduling Algorithms for 4G (LTE) 被引量:2
1
作者 Bamidele Moses Kuboye 《Communications and Network》 2018年第4期152-163,共12页
Long Term Evolution (LTE) is designed to revolutionize mobile broadband technology with key considerations of higher data rate, improved power efficiency, low latency and better quality of service. This work analyzes ... Long Term Evolution (LTE) is designed to revolutionize mobile broadband technology with key considerations of higher data rate, improved power efficiency, low latency and better quality of service. This work analyzes the impact of resource scheduling algorithms on the performance of LTE (4G) and WCDMA (3G) networks. In this paper, a full illustration of LTE system is given together with different scheduling algorithms. Thereafter, 3G WCDMA and 4G LTE networks were simulated using Simulink simulator embedded in MATLAB and performance evaluations were carried out. The performance metrics used for the evaluations are average system throughput, packet delay, latency and allocation of fairness using Round Robin, Best CQI and Proportional fair Packet Scheduling Algorithms. The results of the evaluations on both networks were analysed. The results showed that 4G LTE network performs better than 3G WCDMA network in all the three scheduling algorithms used. 展开更多
关键词 LONg TERM Evolution THIRD gENERATION (3g) FOURTH gENERATION (4g) Network algorithms Scheduling
下载PDF
Optimization and Realization of G.729 Speech Coding Algorithm 被引量:1
2
作者 ZHOU Xin MIAO Chang-yun LI Yan-feng WU Zhi-gang 《Semiconductor Photonics and Technology》 CAS 2009年第2期111-116,共6页
The principles of G.729 algorithm are analyzed. It proposes an optimal approach of adaptive codebook search. Realized on fixed point DSP TMS320VC5410,the searching time of the optimal algorithm is thus significantly d... The principles of G.729 algorithm are analyzed. It proposes an optimal approach of adaptive codebook search. Realized on fixed point DSP TMS320VC5410,the searching time of the optimal algorithm is thus significantly decreased,and the result shows that the speech quality is not decreased. 展开更多
关键词 g. 729 CS-ACELP algorithm optimization TMS320VC5410
下载PDF
A Genetic Algorithm for Overall Designing and Planning of a Long Term Evolution Advanced Network
3
作者 Brou Aguié Pacôme Bertrand Diaby Moustapha +2 位作者 Soro Etienne Oumtanaga Souleymane Aka Boko 《American Journal of Operations Research》 2016年第4期355-370,共17页
In the mobile radio industry, planning is a fundamental step for the deployment and commissioning of a Telecom network. The proposed models are based on the technology and the focussed architecture. In this context, w... In the mobile radio industry, planning is a fundamental step for the deployment and commissioning of a Telecom network. The proposed models are based on the technology and the focussed architecture. In this context, we introduce a comprehensive single-lens model for a fourth generation mobile network, Long Term Evolution Advanced Network (4G/LTE-A) technology which includes three sub assignments: cells in the core network. In the resolution, we propose an adaptation of the Genetic Evolutionary Algorithm for a global resolution. This is a combinatorial optimization problem that is considered as difficult. The use of this adaptive method does not necessarily lead to optimal solutions with the aim of reducing the convergence time towards a feasible solution. 展开更多
关键词 Overall Planning 4g/LTE-A Network genetic algorithm
下载PDF
G.726语音编解码器在SoPC中的实现 被引量:2
4
作者 石博雅 苗长云 +1 位作者 李鸿强 曹晓东 《电子技术应用》 北大核心 2005年第8期5-8,共4页
在对G.726语音编解码标准分析的基础上给出了基于FPGA的DSP设计流程,利用MATLAB/Simulink、DSPBuilder和SOPCBuilder工具设计了G.726语音编解码器,通过仿真实验验证了所设计的编解码器模型的正确性,实现了编解码器在SoPC系统中的综合。
关键词 g.726 语音编解码器 SOPC 语音压缩算法 语音信号处理
下载PDF
基于TMS320VC5509A的G.726语音编解码算法的实现
5
作者 时永鹏 裘雪红 《电子科技》 2008年第1期53-55,共3页
文中介绍了G.726语音编解码算法的原理,详细论述了ADPCM编解码算法在DSP TMS320VC5509A上实现的硬件结构及软件算法,并给出了在实现过程中的程序优化方法。
关键词 g.726编解码算法 DSP 语音编解码
下载PDF
基于G.726的语音无线采集芯片发射机基带电路设计 被引量:3
6
作者 张昕源 高绍全 +1 位作者 姜汉钧 王志华 《微电子学与计算机》 CSCD 北大核心 2018年第1期31-35,40,共6页
针对语音信号无线采集应用,设计了语音无线采集专用系统芯片(SoC)的发射机基带电路,包括基于G.726算法的语音压缩编码电路和高能效的自定义协议通信成帧、调制与控制电路.语音压缩编码电路采用硬件复用、正则有符号数(CSD)编码等技术有... 针对语音信号无线采集应用,设计了语音无线采集专用系统芯片(SoC)的发射机基带电路,包括基于G.726算法的语音压缩编码电路和高能效的自定义协议通信成帧、调制与控制电路.语音压缩编码电路采用硬件复用、正则有符号数(CSD)编码等技术有效减小了芯片面积,通信控制电路采用休眠控制技术降低整体发射能耗.经客观音质评价算法(PESQ)验证,语音编码电路的客观平均意见值(MOS)评分在4.0分以上,满足应用需求.所设计的语音无线采集发射机基带电路采用UMC 0.18μm CMOS工艺实现,该部分电路面积为0.83mm^2.目前该电路已经在整个SoC芯片中流片. 展开更多
关键词 g.726算法 语音编码 自定义协议 硬件复用 PESQ 休眠控制
下载PDF
G.726语音压缩算法在低码率下的改进与实现 被引量:4
7
作者 潘桐 《微计算机应用》 2009年第4期76-80,共5页
G.726协议制定的ADPCM音频压缩算法在语音数字通信领域应用广泛。通过对G.726算法流程的分析,提出了一种改进算法编码器的方案,并通过编程与测试,证明了此改进方法的可行性,该方案可提高G.726算法在低码率下的语音还原质量。
关键词 g.726算法 自适应 预测信号
下载PDF
Multi-objective capacity allocation optimization method of photovoltaic EV charging station considering V2G 被引量:7
8
作者 ZHENG Xue-qin YAO Yi-ping 《Journal of Central South University》 SCIE EI CAS CSCD 2021年第2期481-493,共13页
Large-scale electric vehicles(EVs) connected to the micro grid would cause many problems. In this paper, with the consideration of vehicle to grid(V2 G), two charging and discharging load modes of EVs were constructed... Large-scale electric vehicles(EVs) connected to the micro grid would cause many problems. In this paper, with the consideration of vehicle to grid(V2 G), two charging and discharging load modes of EVs were constructed. One was the disorderly charging and discharging mode based on travel habits, and the other was the orderly charging and discharging mode based on time-of-use(TOU) price;Monte Carlo method was used to verify the case. The scheme of the capacity optimization of photovoltaic charging station under two different charging and discharging modes with V2 G was proposed. The mathematical models of the objective function with the maximization of energy efficiency, the minimization of the investment and the operation cost of the charging system were established. The range of decision variables, constraints of the requirements of the power balance and the strategy of energy exchange were given. NSGA-Ⅱ and NSGA-SA algorithm were used to verify the cases, respectively. In both algorithms, by comparing with the simulation results of the two different modes, it shows that the orderly charging and discharging mode with V2 G is obviously better than the disorderly charging and discharging mode in the aspects of alleviating the pressure of power grid, reducing system investment and improving energy efficiency. 展开更多
关键词 vehicle to grid (V2g) capacity configuration optimization time-to-use (TOU) price multi-objective optimization NSgA-Ⅱ algorithm NSgA-SA algorithm
下载PDF
Design and Implementation of Initial Cell Search in 5G NR Systems 被引量:8
9
作者 Fatang Chen Xiu Li +1 位作者 Yun Zhang Yanan Jiang 《China Communications》 SCIE CSCD 2020年第5期38-49,共12页
The initial cell search plays an important role during the process of downlink synchronization establishment between the User Equipment(UE) and the base station. In particular, the uncertainty of the synchronization s... The initial cell search plays an important role during the process of downlink synchronization establishment between the User Equipment(UE) and the base station. In particular, the uncertainty of the synchronization signals on the frequency domain and the flexibility of frame structure configuration have brought great challenges to the initial cell search for the fifth-generation(5G) new radio(NR). To solve this problem, firstly, we analyze the physical layer frame structure of 5G NR systems. Then, by focusing on the knowledge of synchronization signals, the 5G NR cell search process is designed, and the primary synchronization signal(PSS) timing synchronization algorithm is proposed, including a 5G-based coarse synchronization algorithm and conjugate symmetry-based fine synchronization algorithm. Finally, the performance of the proposed cell search algorithm in 5G NR systems is verified through the combination of Digital Signal Processing(DSP) and personal computer(PC). And the MATLAB simulation proves that the proposed algorithm has better performance than the conventional cross-correlation algorithm when a certain frequency offset exists. 展开更多
关键词 5g NR systems physical layer cell search PSS timing synchronization algorithm Conjugate symmetry
下载PDF
A Dynamic Leader Election Algorithm for Decentralized Networks 被引量:1
10
作者 Vijay K. Madisetti Siddhanta Panda 《Journal of Transportation Technologies》 2021年第3期404-411,共8页
Leader election algorithms play an important role in orchestrating different processes on distributed systems, including next-generation transportation systems. This leader election phase is usually triggered after th... Leader election algorithms play an important role in orchestrating different processes on distributed systems, including next-generation transportation systems. This leader election phase is usually triggered after the leader has failed and has a high overhead in performance and state recovery. Further, these algorithms are not generally applicable to cloud-based native microservices-based applications where the resources available to the group and resources participating in a group continuously change and the current leader <span style="font-family:Verdana;">may exit the system with prior knowledge of the exit. Our proposed algo</span><span style="font-family:Verdana;">rithm, t</span><span style="font-family:Verdana;">he dynamic leader selection algorithm, provides several benefits through</span><span style="font-family:Verdana;"> selection (not, election) of a set of future leaders which are then alerted prior to </span><span style="font-family:Verdana;">the failure of the current leadership and handed over the leadership. A </span><span style="font-family:Verdana;">specific </span><span style="font-family:Verdana;">illustration of this algorithm is provided with reference to a peer-to-peer</span><span style="font-family:Verdana;"> distribution of autonomous cars in a 5G architecture for transportation networks. The proposed algorithm increases the efficiencies of applications that use the leader election algorithm and finds broad applicability in microservices-based applications.</span> 展开更多
关键词 Bully algorithm Peer-to-Peer Services Dynamic Leader algorithm 5g Cloud-Native Functions and Microservices
下载PDF
A Highly Efficient Algorithm for Phased-Array mmWave Massive MIMO Beamforming
11
作者 Ayman Abdulhadi Althuwayb Fazirulhisyam Hashim +5 位作者 Jiun Terng Liew Imran Khan Jeong Woo Lee Emmanuel Ampoma Affum Abdeldjalil Ouahabi Sébastien Jacques 《Computers, Materials & Continua》 SCIE EI 2021年第10期679-694,共16页
With the rapid development of the mobile internet and the internet of things(IoT),the fifth generation(5G)mobile communication system is seeing explosive growth in data traffic.In addition,low-frequency spectrum resou... With the rapid development of the mobile internet and the internet of things(IoT),the fifth generation(5G)mobile communication system is seeing explosive growth in data traffic.In addition,low-frequency spectrum resources are becoming increasingly scarce and there is now an urgent need to switch to higher frequency bands.Millimeter wave(mmWave)technology has several outstanding features—it is one of the most well-known 5G technologies and has the capacity to fulfil many of the requirements of future wireless networks.Importantly,it has an abundant resource spectrum,which can significantly increase the communication rate of a mobile communication system.As such,it is now considered a key technology for future mobile communications.MmWave communication technology also has a more open network architecture;it can deliver varied services and be applied in many scenarios.By contrast,traditional,all-digital precoding systems have the drawbacks of high computational complexity and higher power consumption.This paper examines the implementation of a new hybrid precoding system that significantly reduces both calculational complexity and energy consumption.The primary idea is to generate several sub-channels with equal gain by dividing the channel by the geometric mean decomposition(GMD).In this process,the objective function of the spectral efficiency is derived,then the basic tracking principle and least square(LS)techniques are deployed to design the proposed hybrid precoding.Simulation results show that the proposed algorithm significantly improves system performance and reduces computational complexity by more than 45%compared to traditional algorithms. 展开更多
关键词 5g mmWave phased array algorithm antenna beamforming
下载PDF
Hybrid In-Vehicle Background Noise Reduction for Robust Speech Recognition:The Possibilities of Next Generation 5G Data Networks
12
作者 Radek Martinek Jan Baros +2 位作者 Rene Jaros Lukas Danys Jan Nedoma 《Computers, Materials & Continua》 SCIE EI 2022年第6期4659-4676,共18页
This pilot study focuses on employment of hybrid LMS-ICA system for in-vehicle background noise reduction.Modern vehicles are nowadays increasingly supporting voice commands,which are one of the pillars of autonomous ... This pilot study focuses on employment of hybrid LMS-ICA system for in-vehicle background noise reduction.Modern vehicles are nowadays increasingly supporting voice commands,which are one of the pillars of autonomous and SMART vehicles.Robust speaker recognition for context-aware in-vehicle applications is limited to a certain extent by in-vehicle back-ground noise.This article presents the new concept of a hybrid system which is implemented as a virtual instrument.The highly modular concept of the virtual car used in combination with real recordings of various driving scenarios enables effective testing of the investigated methods of in-vehicle background noise reduction.The study also presents a unique concept of an adaptive system using intelligent clusters of distributed next generation 5G data networks,which allows the exchange of interference information and/or optimal hybrid algorithm settings between individual vehicles.On average,the unfiltered voice commands were successfully recognized in 29.34%of all scenarios,while the LMS reached up to 71.81%,and LMS-ICA hybrid improved the performance further to 73.03%. 展开更多
关键词 5g noise reduction hybrid algorithms speech recognition 5g data networks in-vehicle background noise
下载PDF
Comparison and Design of Decoder in B3G Mobile Communication System
13
作者 Mingxiang GUAN Mingchuan YANG 《Communications and Network》 2009年第1期20-24,共5页
Turbo code has been shown to have ability to achieve performance that is close to Shannon limit. It has been adopted by various commercial communication systems. Both universal mobile telecommunications system (UMTS) ... Turbo code has been shown to have ability to achieve performance that is close to Shannon limit. It has been adopted by various commercial communication systems. Both universal mobile telecommunications system (UMTS) TDD and FDD have also employed turbo code as the error correction coding scheme. It outperforms convolutional code in large block size, but because of its time delay, it is often only used in the non-real-time service. In this paper, we discuss the encoder and decoder structure of turbo code in B3G mobile communication System. In addition, various decoding techniques, such as the Log-MAP, Max-log-MAP and SOVA algorithm for non-real-time service are deduced and compared. The performance results of decoder and algorithms in different configurations are also shown. 展开更多
关键词 DECODER BEYOND 3g MOBILE COMMUNICATION system DECODINg algorithm
下载PDF
Analysis of Evacuation of Tourists Based on the Louvre’s Emergency
14
作者 Rui Tang Xiaozhen Luan +2 位作者 Shiwei Xu Fuliang Lu Wei Zhang 《Open Journal of Applied Sciences》 2019年第6期515-534,共20页
Due to France has suffered from many terrorist attacks and the number of visitors to the Louvre has gradually increased in recent years, a good evacuation plan for the Louvre is of vital significance. We use the minim... Due to France has suffered from many terrorist attacks and the number of visitors to the Louvre has gradually increased in recent years, a good evacuation plan for the Louvre is of vital significance. We use the minimization of the total evacuation time of all tourists as the optimization goal to find an optimal path. For conventional emergencies, a static model is built to evacuate visitors. And then we establish a nonlinear programming model. Using Lingo software, we get the distribution information of the visitors in different exhibition halls. For unconventional emergencies, we establish an adaptive dynamic model of tourist evacuation based on genetic algorithm. The sensitivity analysis of the model is considered by adding new paths. By solving the nonlinear programming problem with the double objective function of maximizing evacuation time and balancing the number of people in every path, we get the evacuation time last 1582.74 s. Finally, according to our result, we built mathematical models for the evacuation after an emergency and analyzed how to adapt and implement our models for other large and crowded structures. 展开更多
关键词 NT MODEL Linear Programming genetic algorithm Cellular AUTOMATA M/g/C/C QUEUINg Network MODEL EMERgENCY EVACUATION
下载PDF
基于优化G-P算法求解关联维数
15
作者 方若望 何越磊 +2 位作者 李再帏 路宏遥 赵彦旭 《计算机与数字工程》 2024年第5期1270-1274,共5页
为了解决研究混沌关联维数主流算法G-P算法存在的问题,包括相空间和距离矩阵的循环构造,相关参量选取不当影响结论,Heaviside阶跃函数判断冗余等,提出改进的G-P算法。该算法在原理和重复计算上作出优化,在原矩阵的基础上操作形成后续矩... 为了解决研究混沌关联维数主流算法G-P算法存在的问题,包括相空间和距离矩阵的循环构造,相关参量选取不当影响结论,Heaviside阶跃函数判断冗余等,提出改进的G-P算法。该算法在原理和重复计算上作出优化,在原矩阵的基础上操作形成后续矩阵及对距离矩阵进行排序,避免了循环判断,大大缩减了计算周期;对相关参量取值做出决策,使结论更严谨;对双对数图像的无标度区间采用Taylor级数法确定,使其更加直观。后续以Lorenz系统数据进行实例分析,仿真的结果也证明了改进算法的准确性。 展开更多
关键词 混沌 相空间重构 关联维数 算法优化 g-P算法
下载PDF
G^1 Continuity Conditions of B-spline Surfaces
16
作者 车翔玖 梁学章 《Northeastern Mathematical Journal》 CSCD 2002年第4期343-352,共10页
According to the B-spline theory and Boehm algorithm, this paper presents several necessary and sufficient G1 continuity conditions between two adjacent B-spline surfaces. In order to meet the need of application, a k... According to the B-spline theory and Boehm algorithm, this paper presents several necessary and sufficient G1 continuity conditions between two adjacent B-spline surfaces. In order to meet the need of application, a kind of sufficient conditions of G1 continuity are developed, and a kind of sufficient conditions of G1 continuity among N(N>2) patch B-spline surfaces meeting at a common corner are given at the end. 展开更多
关键词 B-spline surface composite Bezier surface g1 continuity Boehm algorithm
下载PDF
Design of Raptor Design of Raptor-Like Rate Compatible SC Like Rate Compatible SC-LDPC Codes
17
作者 SHI Xiangyi HAN Tongzhou +1 位作者 TIAN Hai ZHAO Danfeng 《ZTE Communications》 2022年第S01期16-21,共6页
This paper proposes a family of raptor-like rate-compatible spatially coupled low-density parity-check(RL-RC-SC-LDPC)codes from RL-RC-LDPC block codes.There are two important keys.One is the performance of the base ma... This paper proposes a family of raptor-like rate-compatible spatially coupled low-density parity-check(RL-RC-SC-LDPC)codes from RL-RC-LDPC block codes.There are two important keys.One is the performance of the base matrix.RL-LDPC codes have been adopted in the technical specification of 5G new radio(5G-NR).We use the 5G NR LDPC code as the base matrix.The other is the edge coupling design.In this regard,we have designed a rate-compatible coupling algorithm,which can improve performance under multiple code rates.The constructed RL-RC-SC-LDPC code property requires a large coupling length L and thus we improved the reciprocal channel approximation(RCA)algorithm and proposed a sliding window RCA algorithm.It can provide lower com-plexity and latency than RCA algorithm.The code family shows improved thresholds close to the Shannon limit and finite-length performance compared with 5G NR LDPC codes for the additive white Gaussian noise(AWGN)channel. 展开更多
关键词 SC-LDPC code 5g NR LDPC code rate-compatibility threshold sliding win-dow RCA algorithm
下载PDF
Collusion detector based on G-N algorithm for trust model
18
作者 Lin Zhang Na Yin +1 位作者 Jingwen Liu Ruchuan Wang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第4期926-935,共10页
In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a co... In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a collusion detector based on the GN algorithm for the trust evaluation model is proposed in the open Internet environment. By analyzing the behavioral characteristics of collusion groups, the concept of flatting is defined and the G-N community mining algorithm is used to divide suspicious communities. On this basis, a collusion community detector method is proposed based on the breaking strength of suspicious communities. Simulation results show that the model has high recognition accuracy in identifying collusion nodes, so as to effectively defend against malicious attacks of collusion nodes. 展开更多
关键词 trust model collusion detector g-N algorithm
下载PDF
A Novel 6G Scalable Blockchain Clustering-Based Computer Vision Character Detection for Mobile Images
19
作者 Yuejie Li Shijun Li 《Computers, Materials & Continua》 SCIE EI 2024年第3期3041-3070,共30页
6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is... 6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is leveraged to enhance computer vision applications’security,trustworthiness,and transparency.With the widespread use of mobile devices equipped with cameras,the ability to capture and recognize Chinese characters in natural scenes has become increasingly important.Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount,such as facial recognition or personal healthcare monitoring.Users can control their visual data and grant or revoke access as needed.Recognizing Chinese characters from images can provide convenience in various aspects of people’s lives.However,traditional Chinese character text recognition methods often need higher accuracy,leading to recognition failures or incorrect character identification.In contrast,computer vision technologies have significantly improved image recognition accuracy.This paper proposed a Secure end-to-end recognition system(SE2ERS)for Chinese characters in natural scenes based on convolutional neural networks(CNN)using 6G technology.The proposed SE2ERS model uses the Weighted Hyperbolic Curve Cryptograph(WHCC)of the secure data transmission in the 6G network with the blockchain model.The data transmission within the computer vision system,with a 6G gradient directional histogram(GDH),is employed for character estimation.With the deployment of WHCC and GDH in the constructed SE2ERS model,secure communication is achieved for the data transmission with the 6G network.The proposed SE2ERS compares the performance of traditional Chinese text recognition methods and data transmission environment with 6G communication.Experimental results demonstrate that SE2ERS achieves an average recognition accuracy of 88%for simple Chinese characters,compared to 81.2%with traditional methods.For complex Chinese characters,the average recognition accuracy improves to 84.4%with our system,compared to 72.8%with traditional methods.Additionally,deploying the WHCC model improves data security with the increased data encryption rate complexity of∼12&higher than the traditional techniques. 展开更多
关键词 6g technology blockchain end-to-end recognition Chinese characters natural scene computer vision algorithms convolutional neural network
下载PDF
Information Centric Networking Based Cooperative Caching Framework for 5G Communication Systems
20
作者 R.Mahaveerakannan Thanarajan Tamilvizhi +2 位作者 Sonia Jenifer Rayen Osamah Ibrahim Khalaf Habib Hamam 《Computers, Materials & Continua》 SCIE EI 2024年第9期3945-3966,共22页
The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content.In light of the data-centric aspect of contemporary communication,the info... The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content.In light of the data-centric aspect of contemporary communication,the information-centric network(ICN)paradigm offers hope for a solution by emphasizing content retrieval by name instead of location.If 5G networks are to meet the expected data demand surge from expanded connectivity and Internet of Things(IoT)devices,then effective caching solutions will be required tomaximize network throughput andminimize the use of resources.Hence,an ICN-based Cooperative Caching(ICN-CoC)technique has been used to select a cache by considering cache position,content attractiveness,and rate prediction.The findings show that utilizing our suggested approach improves caching regarding the Cache Hit Ratio(CHR)of 84.3%,Average Hop Minimization Ratio(AHMR)of 89.5%,and Mean Access Latency(MAL)of 0.4 s.Within a framework,it suggests improved caching strategies to handle the difficulty of effectively controlling data consumption in 5G networks.These improvements aim to make the network run more smoothly by enhancing content delivery,decreasing latency,and relieving congestion.By improving 5G communication systems’capacity tomanage the demands faced by modern data-centric applications,the research ultimately aids in advancement. 展开更多
关键词 Information-centric networking caching schemes 5g communication non-negative matrix factorization(NMF) weighted clustering algorithm
下载PDF
上一页 1 2 17 下一页 到第
使用帮助 返回顶部