期刊文献+
共找到625篇文章
< 1 2 32 >
每页显示 20 50 100
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home
1
作者 Bello Musa Yakubu Majid Iqbal Khan +2 位作者 Abid Khan Farhana Jabeen Gwanggil Jeon 《Digital Communications and Networks》 SCIE CSCD 2023年第2期383-392,共10页
Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,S... Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)interactions.Tapping into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart home.The Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger system.The work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the system.The simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a time.This is done to measure the system's consistency across a variety of device capabilities.The experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times. 展开更多
关键词 DDoS attack device-to-device Smart homes Blockchain AUTHENTICATION Ethereum smartcontract
下载PDF
Optimization of Cooperative RelayingMolecular Communications for Nanomedical Applications
2
作者 Eman S.Attia Ashraf A.M.Khalaf +4 位作者 Fathi E.Abd El-Samie Saied M.Abd El-atty Konstantinos A.Lizos Osama Alfarraj Heba M.El-Hoseny 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1259-1275,共17页
Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,becaus... Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,because the MCvD is unreliable and there exists molecular noise and inter symbol interference(ISI),cooperative nano-relays can acquire the reliability for drug delivery to targeted diseased cells,especially if the separation distance between the nano transmitter and nano receiver is increased.In this work,we propose an approach for optimizing the performance of the nano system using cooperative molecular communications with a nano relay scheme,while accounting for blood flow effects in terms of drift velocity.The fractions of the molecular drug that should be allocated to the nano transmitter and nano relay positioning are computed using a collaborative optimization problem solved by theModified Central Force Optimization(MCFO)algorithm.Unlike the previous work,the probability of bit error is expressed in a closed-form expression.It is used as an objective function to determine the optimal velocity of the drug molecules and the detection threshold at the nano receiver.The simulation results show that the probability of bit error can be dramatically reduced by optimizing the drift velocity,detection threshold,location of the nano-relay in the proposed nano system,and molecular drug budget. 展开更多
关键词 Nanomedical system molecular communication cooperative relay OPTIMIZATION
下载PDF
Coordinated responses of leaf and nodule traits contribute to the accumulation of N in relay intercropped soybean
3
作者 Ping Chen Qing Du +8 位作者 Benchuan Zheng Huan Yang Zhidan Fu Kai Luo Ping Lin Yilin Li Tian Pu Taiwen Yong Wenyu Yang 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第6期1910-1928,共19页
Maize(Zea mays L.)-soybean(Glycine max L.Merr.)relay intercropping provides a way to enhance land productivity.However,the late-planted soybean suffers from shading by the maize.After maize harvest,how the recovery gr... Maize(Zea mays L.)-soybean(Glycine max L.Merr.)relay intercropping provides a way to enhance land productivity.However,the late-planted soybean suffers from shading by the maize.After maize harvest,how the recovery growth influences the leaf and nodule traits remains unclear.A three-year field experiment was conducted to evaluate the effects of genotypes,i.e.,supernodulating(nts1007),Nandou 12(ND12),and Guixia 3(GX3),and crop configurations,i.e.,the interspecific row spacing of 45(I45),60(I60),75 cm(I75),and sole soybean(SS),on soybean recovery growth and N fixation.The results showed that intercropping reduced the soybean total leaf area(LA)by reducing both the leaf number(LN)and unit leaflet area(LUA),and it reduced the nodule dry weight(NW)by reducing both the nodule number(NN)and nodule diameter(ND)compared with the SS.The correlation and principal component analysis(PCA)indicated a co-variability of the leaf and nodule traits in response to the genotype and crop configuration interactions.During the recovery growth stages,the compensatory growth promoted soybean growth to reduce the gaps of leaf and nodule traits between intercropping and SS.The relative growth rates of ureide(RGR_U)and nitrogen(RGR_N)accumulation were higher in intercropping than in SS.Intercropping achieved more significant sucrose and starch contents compared with SS.ND12 and GX3 showed more robust compensatory growth than nts1007 in intercropping.Although the recovery growth of relay intercropping soybean improved biomass and nitrogen accumulation,ND12 gained a more significant partial land equivalent ratio(pLER)than GX3.The I60 treatment achieved more robust compensation effects on biomass and N accumulation than the other configurations.Meanwhile,I60 showed a higher nodule sucrose content and greater shoot ureide and N accumulation than SS.Finally,intercropping ND12 with maize using an interspecific row spacing of 60 cm was optimal for both yield advantage and N accumulation. 展开更多
关键词 relay intercropping GENOTYPE crop configuration symbiotic nitrogen fixation SOYBEAN NODULE
下载PDF
Security-Reliability Tradeoff Analysis for Jamming Aided Decode-and-Forward Relay Networks
4
作者 Zou Ronggui Zou Yulong +1 位作者 Zhu Jia Li Bin 《China Communications》 SCIE CSCD 2024年第5期218-228,共11页
In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we p... In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user. 展开更多
关键词 decode-and-forward relay friendly jammer physical layer security power allocation security-reliability tradeoff
下载PDF
Outage Probability Based on Relay Selection Method for Multi-Hop Device-to-Device Communication
5
作者 海涵 钱鸿志 +1 位作者 冯泓崭 郁进明 《Journal of Donghua University(English Edition)》 CAS 2021年第3期214-220,共7页
To improve the connectivity of device-to-device(D2D)communication between delay-assisted vehicles,a multi-hop D2D relay selection strategy based on outage probability is proposed.The algorithm firstly clusters the rel... To improve the connectivity of device-to-device(D2D)communication between delay-assisted vehicles,a multi-hop D2D relay selection strategy based on outage probability is proposed.The algorithm firstly clusters the relay users based on the distance of D2D users,and determines the number of one-hop relay nodes through the outage probability threshold.Two-hop relay nodes directly select the same number of relays as one-hop relay nodes according to the descending order of signal noise ratio(SNR)to establish a square matrix.The Hungarian algorithm is used to assign the relay nodes of two clusters to complete the inter relay communication.Finally,the information is sent to the D2D receiver by combining technology.The simulation results show that this algorithm can reduce the cost of relay probing process and the outage probability of system in multi-hop D2D relay communication. 展开更多
关键词 multi-hop device-to-device(D2D) vehicle communication relay selection Hungarian algorithm
下载PDF
Average Secrecy Capacity of the Reconfigurable Intelligent Surface-Assisted Integrated Satellite Unmanned Aerial Vehicle Relay Networks
6
作者 Ping Li Kefeng Guo +2 位作者 Feng Zhou XuelingWang Yuzhen Huang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1849-1864,共16页
Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-e... Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings. 展开更多
关键词 Integrated satellite unmanned aerial vehicle relay networks reconfigurable intelligent surface average secrecy capacity(ASC) asymptotic ASC
下载PDF
Device-to-Device Based Cooperative Relaying for 5G Network:A Comparative Review
7
作者 JIANG Wei 《ZTE Communications》 2017年第B06期60-66,共7页
Due to the proliferation of mobile internet access, the cellu-lar traffic is envisaged to experience a 1000-fold growth inthe second decade of the 21 st century. To meet such a hugetraffic demand, the Fifth Generation... Due to the proliferation of mobile internet access, the cellu-lar traffic is envisaged to experience a 1000-fold growth inthe second decade of the 21 st century. To meet such a hugetraffic demand, the Fifth Generation(5G) network have toadopt new techniques to substantially increase spectral effi-ciency and reliability. At the base station side, available re-sources(power supply, equipment size, processing capability,etc.) are far more sufficient than that of the terminal side,which imposes a high challenge on the uplink transmission.The concept of cooperative communications opens a possibili-ty of using multiple terminals to cooperatively achieve spa-tial diversity that is typically obtained by means of multipleantennas in the base station. The application of Device-to-Device(D2D) communications in the 3GPP LTE system fur-ther pushes the collaboration of terminals from the theory tothe practice. The utilization of D2D-based cooperative relay-ing is promising in the era of 5G. In this paper, we compara-tively study several cooperative multi-relay schemes, includ-ing the proposed opportunistic space-time coding, in thepresence of imperfect channel state information. The numeri-cal results reveal that the proposed scheme is the best coop-erative solution until now from the perspective of multiplex-ing-diversity tradeoff. 展开更多
关键词 cooperative communications device-to-device(D2D) Distributed Space-Time Coding(DSTC) outdated chanel stateinformation opportunistic relaying
下载PDF
在LTE-Advanced网络下的Device-to-Device通信 被引量:25
8
作者 王彬 陈力 +1 位作者 张欣 杨大成 《现代电信科技》 2010年第7期24-27,共4页
Device-to-Device(D2D)通信是一种在系统的控制下,允许终端之间通过复用小区资源直接进行通信的新型技术,它能够增加蜂窝通信系统频谱效率,降低终端发射功率,在一定程度上解决无线通信系统频谱资源匮乏的问题。与其他应用于非许可频段... Device-to-Device(D2D)通信是一种在系统的控制下,允许终端之间通过复用小区资源直接进行通信的新型技术,它能够增加蜂窝通信系统频谱效率,降低终端发射功率,在一定程度上解决无线通信系统频谱资源匮乏的问题。与其他应用于非许可频段的同类技术相比,D2D具有干扰可控等优点。文章对D2D技术原理进行了介绍,阐述了它应用的必要性和应用场景、它对比同类技术的优点,以及在应用中的关键问题。 展开更多
关键词 device-to-device(D2D) 频谱效率 LTE-ADVANCED
下载PDF
一种Device-to-Device移动社交网络中的热点文件预测方法 被引量:1
9
作者 张霄宏 侯海杰 任建吉 《小型微型计算机系统》 CSCD 北大核心 2018年第5期973-977,共5页
随着信息技术的蓬勃发展,移动社交网络越来越受到人们的关注,尤其是对移动社交网络中的热点分析.以基于Device-to-Device技术构建的移动社交网络为研究对象,从网络规模、文件分享特征以及用户影响力等方面入手,提出一种预测该类社交网... 随着信息技术的蓬勃发展,移动社交网络越来越受到人们的关注,尤其是对移动社交网络中的热点分析.以基于Device-to-Device技术构建的移动社交网络为研究对象,从网络规模、文件分享特征以及用户影响力等方面入手,提出一种预测该类社交网络中热点文件的方法.该方法从信息和用户的角度出发,通过量化文件重要性、文件敏感性、用户参与力和用户影响力四个指标,利用多元线性回归方法建立预测模型,并在真实数据上验证了方法的有效性. 展开更多
关键词 移动社交网络 device-to-device 热点文件预测
下载PDF
基于SIR的Device-to-Device移动社交网络信息传播模型 被引量:1
10
作者 张霄宏 钱凯 鲍亚雷 《河南理工大学学报(自然科学版)》 CAS 北大核心 2019年第3期131-136,共6页
智能移动设备的迅速普及在加快移动社交网络发展的同时,也给底层通信网络带来了沉重的负担。为了缓解底层通信网络的负担,越来越多的社交网络应用开始采用Device-to-Device技术传播信息。本文以Device-to-Device移动社交网络为研究对象... 智能移动设备的迅速普及在加快移动社交网络发展的同时,也给底层通信网络带来了沉重的负担。为了缓解底层通信网络的负担,越来越多的社交网络应用开始采用Device-to-Device技术传播信息。本文以Device-to-Device移动社交网络为研究对象,首先分析该网络中用户参与信息传播的特点,然后在传染病模型的基础上构建适合此网络特点的信息传播模型,并利用该模型分析真实Device-to-Device环境中的信息传播过程。结果表明,Device-to-Device移动社交网络中的信息传播与基于Internet的社交网络中的信息传播有相似之处;但是,由于Device-to-Device移动社交网络存在较大的传播时延,信息在该网络中需要较长的时间才能达到传播高峰。 展开更多
关键词 信息传播 社交网络 device-to-device通讯 传染病模型
下载PDF
Device-to-Device通信的无线资源管理研究 被引量:1
11
作者 荣涛 《现代电信科技》 2012年第5期6-10,共5页
在IMT-Advanced蜂窝网络中部署设备至设备(D2D:Device-to-Device)通信是当前无线领域内的一个研究热点,其主要的困难在于控制D2D与蜂窝系统间的干扰。D2D的无线资源管理机制和算法是实现系统间干扰协调的关键因素之一。文章从功率控制... 在IMT-Advanced蜂窝网络中部署设备至设备(D2D:Device-to-Device)通信是当前无线领域内的一个研究热点,其主要的困难在于控制D2D与蜂窝系统间的干扰。D2D的无线资源管理机制和算法是实现系统间干扰协调的关键因素之一。文章从功率控制、资源调度和模式选择3个方面,介绍了D2D无线资源管理研究领域的最新成果和进展,并对未来发展方向进行了分析展望。 展开更多
关键词 device-to-device 无线资源管理 干扰协调
下载PDF
Device-to-Device Communication Underlaying Cellular Communications Systems 被引量:14
12
作者 Pekka JANIS Chia-Hao YU +5 位作者 Klaus DOPPLER Cassio RIBEIRO Carl WIJTING Klaus HUGL Olav TIRKKONEN Visa KOIVUNEN 《International Journal of Communications, Network and System Sciences》 2009年第3期169-178,共10页
In this article we propose to facilitate local peer-to-peer communication by a Device-to-Device (D2D) radio that operates as an underlay network to an IMT-Advanced cellular network. It is expected that local services ... In this article we propose to facilitate local peer-to-peer communication by a Device-to-Device (D2D) radio that operates as an underlay network to an IMT-Advanced cellular network. It is expected that local services may utilize mobile peer-to-peer communication instead of central server based communication for rich mul-timedia services. The main challenge of the underlay radio in a multi-cell environment is to limit the inter-ference to the cellular network while achieving a reasonable link budget for the D2D radio. We propose a novel power control mechanism for D2D connections that share cellular uplink resources. The mechanism limits the maximum D2D transmit power utilizing cellular power control information of the devices in D2D communication. Thereby it enables underlaying D2D communication even in interference-limited networks with full load and without degrading the performance of the cellular network. Secondly, we study a single cell scenario consisting of a device communicating with the base station and two devices that communicate with each other. The results demonstrate that the D2D radio, sharing the same resources as the cellular net-work, can provide higher capacity (sum rate) compared to pure cellular communication where all the data is transmitted through the base station. 展开更多
关键词 PEER-TO-PEER device-to-device POWER Control CELLULAR SYSTEMS IMT-ADVANCED
下载PDF
Placement of unmanned aerial vehicles as communication relays in two-tiered multi-agent system:clustering based methods 被引量:3
13
作者 WU Gaofeng WAN Kaifang +1 位作者 GAO Xiaoguang FU Xiaowei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第2期231-242,共12页
The network performance and the unmanned aerial vehicle(UAV)number are important objectives when UAVs are placed as communication relays to enhance the multi-agent information exchange.The problem is a non-determinist... The network performance and the unmanned aerial vehicle(UAV)number are important objectives when UAVs are placed as communication relays to enhance the multi-agent information exchange.The problem is a non-deterministic polynomial hard(NP-hard)multi-objective optimization problem,instead of generating a Pareto solution,this work focuses on considering both objectives at the same level so as to achieve a balanced solution between them.Based on the property that agents connected to the same UAV are a cluster,two clustering-based algorithms,M-K-means(MKM)and modified fast search and find density of peaks(MFSFDP)methods,are first proposed.Since the former algorithm requires too much computational time and the latter one requires too many relays,an algorithm for the balanced network performance and relay number(BPN)is proposed by discretizing the area to avoid missing the optimal relay positions and defining a new local density function to reflect the network performance metric.Simulation results demonstrate that the proposed algorithms are feasible and effective.Comparisons between these algorithms show that the BPN algorithm uses fewer relay UAVs than the MFSFDP and classic set-covering based algorithm,and its computational time is far less than the MKM algorithm. 展开更多
关键词 unmanned AERIAL vehicle(UAV) relay communication CLUSTERING relay NODE PLACEMENT wireless network
下载PDF
Research on Feature Extraction of Remnant Particles of Aerospace Relays 被引量:7
14
作者 WANG Shu-juan GAO Hong-liang ZHAI Guo-fu 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2007年第3期253-259,共7页
The existence of remnant particles, which significantly reduce the reliability of relays, is a serious problem for aerospace relays. The traditional method for detecting remnant particles-particle impact noise detecti... The existence of remnant particles, which significantly reduce the reliability of relays, is a serious problem for aerospace relays. The traditional method for detecting remnant particles-particle impact noise detection (PIND)-can be used merely to detect the existence of the particle; it is not able to provide any information about the particles' material. However, information on the material of the particles is very helpful for analyzing the causes of remnants. By analyzing the output acoustic signals from a PIND tester, this paper proposes three feature extraction methods: unit energy average pulse durative time, shape parameter of signal power spectral density (PSD), and pulse linear predictive coding coefficient sequence. These methods allow identified remnants to be classified into four categories based on their material. Furthermore, we prove the validity of this new method by processing P1ND signals from actual tests. 展开更多
关键词 feature extraction aerospace relays remnant particles particle impact noise detection
下载PDF
A New TDD Scheme and Interference-Aware Precoding for Device-to-Device Underlay Massive MIMO 被引量:1
15
作者 Xinxin Liu Xueru Li +2 位作者 Yunzhou Li Ming Zhao Jing Wang 《China Communications》 SCIE CSCD 2016年第S2期100-108,共9页
In device-to-device(D2D)underlay cellular networks with downlink spectrum sharing,massive MIMO seems promising as the large number of antennas at the base station(BS) can be utilized to suppress interference.However,t... In device-to-device(D2D)underlay cellular networks with downlink spectrum sharing,massive MIMO seems promising as the large number of antennas at the base station(BS) can be utilized to suppress interference.However,the channel state information(CSI) from the BS to D2D receivers is required to obtain this advantage.In this paper,we first propose a novel time division duplex(TDD) scheme for D2D users to acquire this CSI,without additional pilot overhead.Moreover,we propose an interference-aware MMSE precoder utilizing the acquired CSI from the BS to not only cellular users but also D2D users to suppress the cellular-to-D2D interference.Simulation results show that our proposed TDD scheme and precoder can significantly improve the achievable sum spectral efficiency(SE) and D2D SE,compared to the classical MMSE precoder.Compared with the interferenceaware ZF precoder,whose performance severely degrades for large user numbers,our proposed interference-aware MMSE precoder can always guarantees a high and stable performance in terms of achievable SE. 展开更多
关键词 device-to-device massive MIMO TDD scheme PRECODING
下载PDF
Resource Allocation and Beamforming Algorithm Based on Interference Avoidance Approach for Device-to-Device Communication Underlaying LTE Cellular Network 被引量:2
16
作者 Huy-Dung Han Chenxi Zhu +1 位作者 Dorin Viorel Akira Ito 《Communications and Network》 2013年第3期367-373,共7页
In this work, we consider device-to-device (D2D) direct communication underlaying a 3GPP LTE-A network. D2D communication enables new service opportunities, provides high throughput and reliable communication while re... In this work, we consider device-to-device (D2D) direct communication underlaying a 3GPP LTE-A network. D2D communication enables new service opportunities, provides high throughput and reliable communication while reducing the base station load. For better total performance, D2D links and cellular links share the same radio resource and the management of interference becomes a crucial task. We propose a radio resource allocation for D2D links based on interference avoidance approach. For system with multiple transmit antennas, we apply beamforming technique based on signal to leakage criterion to reduce the co-channel interference. The results show that, D2D transmission with the resource allocation and beamforming technique provides significant gain compared to that of the regular cellular network. 展开更多
关键词 device-to-device LTE RESOURCE ALLOCATION BEAMFORMING
下载PDF
Adaptive Delay Optimization of Multicast-Enabled Coded Caching in Device-to-Device Networks 被引量:1
17
作者 Liang Zhong Xueqian Zheng +2 位作者 Jie Lin Yang Cao Shenggen Ju 《China Communications》 SCIE CSCD 2020年第1期42-48,共7页
This letter investigates a delay optimization problem in device-to-device(D2D)networks where users have pre-downloaded subfiles following a coded caching rule.Due to acquiring rest subfiles,users may suffer both recei... This letter investigates a delay optimization problem in device-to-device(D2D)networks where users have pre-downloaded subfiles following a coded caching rule.Due to acquiring rest subfiles,users may suffer both receiving and transmitting delays.To achieve the delay minimization,we first propose a delay-aware mode-selection strategy to adaptively choose multicast or D2D communications mode to reduce the receiving-caused delay.By matching these transmit modes with distinct subfile sizes,we further formulate a min-max optimization problem to minimize the delivery delay.Finally,numerical results prove that the proposed scheme outperforms existing ones in terms of both receiving and transmitting delays. 展开更多
关键词 coded caching delay optimization MULTICAST device-to-device
下载PDF
A Review in the Core Technologies of 5G: Device-to-Device Communication, Multi-Access Edge Computing and Network Function Virtualization 被引量:2
18
作者 Ruixuan Tu Ruxun Xiang +1 位作者 Yang Xu Yihan Mei 《International Journal of Communications, Network and System Sciences》 2019年第9期125-150,共26页
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ... 5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances. 展开更多
关键词 5th Generation Network VIRTUALIZATION device-to-device COMMUNICATION Base STATION Direct COMMUNICATION INTERFERENCE Multi-Access EDGE COMPUTING Mobile EDGE COMPUTING
下载PDF
Resource Allocation Method of Device-to-Device Communication 被引量:1
19
作者 Wenji Feng Yafeng Wang Lei Yang 《Communications and Network》 2013年第3期338-343,共6页
In this paper, we study D2D (Device-to-Device) communication underlying LTE-Advanced uplink system. Since D2D communication reuses uplink resources with cellular communication in this scenario, it’s hard to avoid the... In this paper, we study D2D (Device-to-Device) communication underlying LTE-Advanced uplink system. Since D2D communication reuses uplink resources with cellular communication in this scenario, it’s hard to avoid the inference between D2D users and cellular users. If there is no restriction for D2D communication on using the whole uplink frequency band, it will have a strong negative impact on cellular communication. In order to overcome this shortage, we propose a resource allocation method that D2D users and cellular users use orthogonal frequency resources. This method will effectively reduce the inference between both kinds of communication. However, an obvious disadvantage of this method is no effective use of uplink resources. Based on this, we propose an optimized resource allocation method that a specific cellular user will be chosen to reuse the RBs (Resource Block) of D2D users. These ideas will be taken into system-level simulation, and from the results of simulation we can see that the optimized method has the ability to improve overall system performance and limit inference for cell-edge users. 展开更多
关键词 device-to-device COMMUNICATION LTE-ADVANCED System RESOURCE ALLOCATION Method up LINK Cell-edge USERS
下载PDF
Covert Communication with a Spectrum Sharing Relay in the Finite Blocklength Regime 被引量:3
20
作者 Ruiqian Ma Weiwei Yang +2 位作者 Hui Shi Xingbo Lu Jue Liu 《China Communications》 SCIE CSCD 2023年第4期195-211,共17页
In this paper,we investigate the feasibility and performance of the covert communication with a spectrum sharing relay in the finite blocklength regime.Specifically,the relay opportunistically forwards the source'... In this paper,we investigate the feasibility and performance of the covert communication with a spectrum sharing relay in the finite blocklength regime.Specifically,the relay opportunistically forwards the source's messages to the primary receiver or conveys the covert messages to its own receiver via the sharing spectrum,while the warden attempts to detect the transmission.First,we derive a lower bound on the covertness constraint,and the analytical expressions of both the primary average effective covert throughput(AECT)and sum AECT are presented by considering the overall decoding error performance.Then,we formulate two optimization problems to maximize the primary and sum AECT respectively by optimizing the blocklength and the transmit power at the source and the relay.Our examinations show that there exists an optimal blocklength to maximize the primary and sum AECT.Besides,it is revealed that,to maximize the primary AECT,the optimal transmit power of each hop increases as its channel quality deteriorates.Furthermore,in the optimization for maximizing the sum AECT,the optimal transmit power at the source equals to zero when the channel quality from relay to the secondary receiver is not weaker than that from relay to the primary receiver. 展开更多
关键词 covert communication finite blocklength relay spectrum sharing
下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部