期刊文献+
共找到9,398篇文章
< 1 2 250 >
每页显示 20 50 100
Decentralized content sharing in mobile ad-hoc networks:A survey
1
作者 Shahriar Kaisar Joarder Kamruzzaman +1 位作者 Gour Karmakar Md Mamunur Rashid 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1363-1398,共36页
The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range comm... The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range communication capabilities of smart mobile devices,the decentralized content sharing approach has emerged as a suitable and promising alternative.Decentralized content sharing uses a peer-to-peer network among colocated smart mobile device users to fulfil content requests.Several articles have been published to date to address its different aspects including group management,interest extraction,message forwarding,participation incentive,and content replication.This survey paper summarizes and critically analyzes recent advancements in decentralized content sharing and highlights potential research issues that need further consideration. 展开更多
关键词 Decentralized content sharing mobile ad-hoc networks Delay-tolerant networks Flying ad hoc networks Message forwarding Content caching INCENTIVE Group formation Misbehavior detection
下载PDF
Multi-Agent Deep Reinforcement Learning for Cross-Layer Scheduling in Mobile Ad-Hoc Networks
2
作者 Xinxing Zheng Yu Zhao +1 位作者 Joohyun Lee Wei Chen 《China Communications》 SCIE CSCD 2023年第8期78-88,共11页
Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus o... Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus on enabling congestion control to minimize network transmission delays through flexible power control.To effectively solve the congestion problem,we propose a distributed cross-layer scheduling algorithm,which is empowered by graph-based multi-agent deep reinforcement learning.The transmit power is adaptively adjusted in real-time by our algorithm based only on local information(i.e.,channel state information and queue length)and local communication(i.e.,information exchanged with neighbors).Moreover,the training complexity of the algorithm is low due to the regional cooperation based on the graph attention network.In the evaluation,we show that our algorithm can reduce the transmission delay of data flow under severe signal interference and drastically changing channel states,and demonstrate the adaptability and stability in different topologies.The method is general and can be extended to various types of topologies. 展开更多
关键词 ad-hoc network cross-layer scheduling multi agent deep reinforcement learning interference elimination power control queue scheduling actorcritic methods markov decision process
下载PDF
Survivability modeling and analysis on 3D mobile ad-hoc networks 被引量:2
3
作者 彭三城 王国军 +1 位作者 胡忠望 陈建平 《Journal of Central South University》 SCIE EI CAS 2011年第4期1144-1152,共9页
Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and ... Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and air defense systems.The impact on network survivability due to node behaviors was presented,and a quantitative analysis method on survivability was developed in 3D MANETs by modeling node behaviors and analyzing 3D network connectivity.Node behaviors were modeled by using a semi-Markov process.The node minimum degree of 3D MANETs was discussed.An effective approach to derive the survivability of k-connected networks was proposed through analyzing the connectivity of 3D MANETs caused by node misbehaviors,based on the model of node isolation.The quantitative analysis of node misbehaviors on the survivability in 3D MANETs is obtained through mathematical description,and the effectiveness and rationality of the proposed approach are verified through numerical analysis.The analytical results show that the effect from black and gray attack on network survivability is much severer than other misbehaviors. 展开更多
关键词 网络生存性 3D 移动AD 建模 MANET 定量分析方法 半马尔可夫过程 不良行为
下载PDF
Performance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks
4
作者 Mohammed-Alamine El Houssaini Abdessadek Aaroud +1 位作者 Ali El Hore Jalel Ben-Othman 《Computer Technology and Application》 2015年第1期37-44,共8页
关键词 性能分析 MAC层 行为 移动AD 网络 攻击 IEEE 媒体访问控制
下载PDF
Mechanism analysis of regulating Turing instability and Hopf bifurcation of malware propagation in mobile wireless sensor networks
5
作者 黄习习 肖敏 +3 位作者 Leszek Rutkowski 包海波 黄霞 曹进德 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期125-140,共16页
A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation... A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation and state feedback to effectively manipulate the spatiotemporal dynamics of malware propagation. The hybrid control can not only suppress the Turing instability caused by diffusion factor but can also adjust the occurrence of Hopf bifurcation induced by time delay. Numerical simulation results show that the hybrid control strategy can efficiently manipulate the transmission dynamics to achieve our expected desired properties, thus reducing the harm of malware propagation to MWSNs. 展开更多
关键词 mobile wireless sensor networks REACTION-DIFFUSION Hopf bifurcation hybrid control
下载PDF
Online Learning-Based Offloading Decision and Resource Allocation in Mobile Edge Computing-Enabled Satellite-Terrestrial Networks
6
作者 Tong Minglei Li Song +1 位作者 Han Wanjiang Wang Xiaoxiang 《China Communications》 SCIE CSCD 2024年第3期230-246,共17页
Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing services.Sometimes,the network state information is uncertain or unknown.To deal ... Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing services.Sometimes,the network state information is uncertain or unknown.To deal with this situation,we investigate online learning-based offloading decision and resource allocation in MEC-enabled STNs in this paper.The problem of minimizing the average sum task completion delay of all IoT devices over all time periods is formulated.We decompose this optimization problem into a task offloading decision problem and a computing resource allocation problem.A joint optimization scheme of offloading decision and resource allocation is then proposed,which consists of a task offloading decision algorithm based on the devices cooperation aided upper confidence bound(UCB)algorithm and a computing resource allocation algorithm based on the Lagrange multiplier method.Simulation results validate that the proposed scheme performs better than other baseline schemes. 展开更多
关键词 computing resource allocation mobile edge computing satellite-terrestrial networks task offloading decision
下载PDF
Survivability Evaluation in Large-Scale Mobile Ad-Hoc Networks 被引量:1
7
作者 彭三城 贾维嘉 王国军 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第4期761-774,共14页
Survivability refers to the ability of a network system to fulfill critical services in a timely manner to end users in the presence of failures and/or attacks. In order to establish a highly survivable system, it is ... Survivability refers to the ability of a network system to fulfill critical services in a timely manner to end users in the presence of failures and/or attacks. In order to establish a highly survivable system, it is necessary to measure its survivability to evaluate the performance of the system's services under adverse conditions. According to survivability requirements of large-scale mobile ad-hoc networks (MANETs), we propose a novel model for quantitative evaluation on survivability. The proposed model considers various types of faults and connection states of mobile hosts, and uses the continuous time Markov chain (CTMC) to describe the survivability of MANETs in a precise manner. We introduce the reliability theory to perform quantitative analysis and survivability evaluation of segment-by-segment routing (SSR), multipath-based segment-by-segment routing (MP-SSR), and segment-by-segment-based multipath routing (SS-MPR) in large-scale MANETs. The proposed model can be used to analyze the network performance much more easily than a simulation-based approach. Numerical validation shows that the proposed model can be used to obtain a better evaluation result on the survivability of large-scale MANETs. 展开更多
关键词 mobile ad-hoc networks SURVIVABILITY AVAILABILITY RELIABILITY quantitative evaluation continuous time Markov chain (CTMC) ROUTING
原文传递
A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network
8
作者 W.Gracy Theresa A.Gayathri P.Rama 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1337-1351,共15页
Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles th... Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision.For most applications,a frame-work must ensure that the retrieved data reflects the transmitted data.Before driv-ing to other nodes,if the frame between the two nodes is deformed in the data-link layer,it must be repaired.Most link-layer protocols immediately disregard the frame and enable the high-layer protocols to transmit it down.In other words,because of asset information must be secured from threats,information is a valu-able resource.In MANETs,some applications necessitate the use of a network method for detecting and blocking these assaults.Building a secure intrusion detection system in the network,which provides security to the nodes and route paths in the network,is a major difficulty in MANET.Attacks on the network can jeopardize security issues discovered by the intrusion detection system engine,which are then blocked by the network’s intrusion prevention engine.By bringing the Secure Intrusion Detection System(S-IDS)into the network,a new technique for implementing security goals and preventing attacks will be developed.The Secure Energy Routing(SER)protocol for MANETs is introduced in this study.The protocol addresses the issue of network security by detecting and preventing attacks in the network.The data transmission in the MANET is forwarded using Elliptical Curve Cryptography(ECC)with an objective to improve the level of security.Network Simulator–2 is used to simulate the network and experiments are compared with existing methods. 展开更多
关键词 mobile ad-hoc network(MANET) intrusion detection system secure energy routing(SER) elliptical curve cryptography(ECC) security
下载PDF
Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite 被引量:1
9
作者 Sadan Cambazoglu Arif Sari 《International Journal of Communications, Network and System Sciences》 2015年第13期533-542,共10页
Jamming attack is quite serious threat for Mobile networks that collapses all necessary communication infrastructure. Since mobile nodes in Mobile Ad Hoc Networks (MANET) communicate in a multi-hop mode, there is alwa... Jamming attack is quite serious threat for Mobile networks that collapses all necessary communication infrastructure. Since mobile nodes in Mobile Ad Hoc Networks (MANET) communicate in a multi-hop mode, there is always a possibility for an intruder to launch a jamming attack in order to intercept communication among communication nodes. In this study, a network simulation has been carried out in order to explore and evaluate the possible impacts of jamming attack on MACAW protocol. Ad-hoc network modelling is used to provide communication infrastructure among mobile nodes in order to modelling the simulation scenarios. In simulation model, these nodes have used AODV routing protocol which is designed for MANET while second scenario contains simulated MACAW node models for comparison. On the other hand, this paper is the first study that addresses performance evaluation of MACAW protocol under a constant Jamming Attack. The performance of MACAW protocol is simulated through OPNET Modeler 14.5 software. 展开更多
关键词 OPNET Simulation MACAW mobile ad-hoc networks COLLISION Jamming AODV
下载PDF
Power Adjusting Algorithm: A New Cross-Layer Power Saving Mechanism for Mobile Ad-Hoc Networks
10
作者 Jin-Tao Meng Jian-Rui Yuan +1 位作者 Sheng-Zhong Feng Lian-Sheng Tan 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第1期42-53,共12页
Power saving is one of the key issues in Mobile Ad-Hoc Networks (MANETs). It can be realized in Medium Access Control (MAC) layer and network layer. However, previous attentions were mainly paid to MAC layer or ne... Power saving is one of the key issues in Mobile Ad-Hoc Networks (MANETs). It can be realized in Medium Access Control (MAC) layer and network layer. However, previous attentions were mainly paid to MAC layer or network layer with the aim of improving the channel utilization by adopting variable-range transmission power control. In this paper we focus on the power saving in both MAC layer and network layer, and propose a Power Adjusting Algorithm (PAA). In the presence of host's mobility, PAA is designed to conserve energy by adjusting the transmission power to maintain the route's connectivity and restarting the route discovery periodically to find a new route with better energy efficiency dynamically. After analyzing the operations of PAA, we find that the length of route discovery restarting period is a critical argument which will affect power saving, and an energy consumption model is abstracted to find the optimal value of the restarting period by analyzing the energy consumption of this algorithm. PAA can handle the mobility of MANET by adjusting the transmission power and in the meantime save energy by restarting route discovery periodically to balance the energy consumption on route discovery and packet delivering. Simulation results show that, PAA saves nearly 40% energy compared with Dynamic Source Routing protocol when the maximum speed of mobile hosts is larger than 8 m/s. 展开更多
关键词 mobile ad-hoc networks mobility control power control power efficiency
原文传递
Mobile Coded Caching in Small Cell Networks:Algorithm Design and Performance Analysis
11
作者 Guangyu Zhu Caili Guo Tiankui Zhang 《China Communications》 SCIE CSCD 2023年第6期82-99,共18页
In coded caching,users cache pieces of files under a specific arrangement so that the server can satisfy their requests simultaneously in the broadcast scenario via e Xclusive OR(XOR)operation and therefore reduce the... In coded caching,users cache pieces of files under a specific arrangement so that the server can satisfy their requests simultaneously in the broadcast scenario via e Xclusive OR(XOR)operation and therefore reduce the amount of transmission data.However,when users’locations are changing,the uploading of caching information is frequent and extensive that the traffic increase outweighed the traffic reduction that the traditional coded caching achieved.In this paper,we propose mobile coded caching schemes to reduce network traffic in mobility scenarios,which achieve a lower cost on caching information uploading.In the cache placement phase,the proposed scheme first constructs caching patterns,and then assigns the caching patterns to users according to the graph coloring method and four color theorem in our centralized cache placement algorithm or randomly in our decentralized cache placement algorithm.Then users are divided into groups based on their caching patterns.As a benefit,when user movements occur,the types of caching pattern,rather than the whole caching information of which file pieces are cached,are uploaded.In the content delivery phase,XOR coded caching messages are reconstructed.Transmission data volume is derived to measure the performance of the proposed schemes.Numerical results show that the proposed schemes achieve great improvement in traffic offloading. 展开更多
关键词 coded caching mobilITY small-cell networks
下载PDF
Towards machine-learning-driven effective mashup recommendations from big data in mobile networks and the Internet-of-Things
12
作者 Yueshen Xu Zhiying Wang +3 位作者 Honghao Gao Zhiping Jiang Yuyu Yin Rui Li 《Digital Communications and Networks》 SCIE CSCD 2023年第1期138-145,共8页
A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually limited.To enrich the services in mobile communications,developers have combin... A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually limited.To enrich the services in mobile communications,developers have combined Web APIs and developed a new service,which is known as a mashup.The emergence of mashups greatly increases the number of services in mobile communications,especially in mobile networks and the Internet-of-Things(IoT),and has encouraged companies and individuals to develop even more mashups,which has led to the dramatic increase in the number of mashups.Such a trend brings with it big data,such as the massive text data from the mashups themselves and continually-generated usage data.Thus,the question of how to determine the most suitable mashups from big data has become a challenging problem.In this paper,we propose a mashup recommendation framework from big data in mobile networks and the IoT.The proposed framework is driven by machine learning techniques,including neural embedding,clustering,and matrix factorization.We employ neural embedding to learn the distributed representation of mashups and propose to use cluster analysis to learn the relationship among the mashups.We also develop a novel Joint Matrix Factorization(JMF)model to complete the mashup recommendation task,where we design a new objective function and an optimization algorithm.We then crawl through a real-world large mashup dataset and perform experiments.The experimental results demonstrate that our framework achieves high accuracy in mashup recommendation and performs better than all compared baselines. 展开更多
关键词 Mashup recommendation Big data Machine learning mobile networks Internet-of-Things
下载PDF
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications
13
作者 Qusay M.Salih Md Arafatur Rahman +4 位作者 A.Taufiq Asyhari Muhammad Kamran Naeem Mohammad Patwary Ryan Alturki Mohammed Abdulaziz Ikram 《Digital Communications and Networks》 SCIE CSCD 2023年第2期367-382,共16页
Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient co... Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient connection among IIoT devices,CRNs enhance spectrum utilization by using licensed spectrum.However,the routing protocol in these networks is considered one of the main problems due to node mobility and time-variant channel selection.Specifically,the channel selection for routing protocol is indispensable in CRNs to provide an adequate adaptation to the Primary User(PU)activity and create a robust routing path.This study aims to construct a robust routing path by minimizing PU interference and routing delay to maximize throughput within the IIoT domain.Thus,a generic routing framework from a cross-layer perspective is investigated that intends to share the information resources by exploiting a recently proposed method,namely,Channel Availability Probability.Moreover,a novel cross-layer-oriented routing protocol is proposed by using a time-variant channel estimation technique.This protocol combines lower layer(Physical layer and Data Link layer)sensing that is derived from the channel estimation model.Also,it periodically updates and stores the routing table for optimal route decision-making.Moreover,in order to achieve higher throughput and lower delay,a new routing metric is presented.To evaluate the performance of the proposed protocol,network simulations have been conducted and also compared to the widely used routing protocols,as a benchmark.The simulation results of different routing scenarios demonstrate that our proposed solution outperforms the existing protocols in terms of the standard network performance metrics involving packet delivery ratio(with an improved margin of around 5–20%approximately)under varying numbers of PUs and cognitive users in Mobile Cognitive Radio Networks(MCRNs).Moreover,the cross-layer routing protocol successfully achieves high routing performance in finding a robust route,selecting the high channel stability,and reducing the probability of PU interference for continued communication. 展开更多
关键词 Channel selection Cross-layer design mobile cognitive radio networks Routing protocol IIoT applications
下载PDF
Adaptive Graph Convolutional Recurrent Neural Networks for System-Level Mobile Traffic Forecasting
14
作者 Yi Zhang Min Zhang +4 位作者 Yihan Gui Yu Wang Hong Zhu Wenbin Chen Danshi Wang 《China Communications》 SCIE CSCD 2023年第10期200-211,共12页
Accurate traffic pattern prediction in largescale networks is of great importance for intelligent system management and automatic resource allocation.System-level mobile traffic forecasting has significant challenges ... Accurate traffic pattern prediction in largescale networks is of great importance for intelligent system management and automatic resource allocation.System-level mobile traffic forecasting has significant challenges due to the tremendous temporal and spatial dynamics introduced by diverse Internet user behaviors and frequent traffic migration.Spatialtemporal graph modeling is an efficient approach for analyzing the spatial relations and temporal trends of mobile traffic in a large system.Previous research may not reflect the optimal dependency by ignoring inter-base station dependency or pre-determining the explicit geological distance as the interrelationship of base stations.To overcome the limitations of graph structure,this study proposes an adaptive graph convolutional network(AGCN)that captures the latent spatial dependency by developing self-adaptive dependency matrices and acquires temporal dependency using recurrent neural networks.Evaluated on two mobile network datasets,the experimental results demonstrate that this method outperforms other baselines and reduces the mean absolute error by 3.7%and 5.6%compared to time-series based approaches. 展开更多
关键词 adaptive graph convolutional network mobile traffic prediction spatial-temporal dependence
下载PDF
Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks
15
作者 Lingwei Xu Hao Yin +4 位作者 Hong Jia Wenzhong Lin Xinpeng Zhou Yong Fu Xu Yu 《Digital Communications and Networks》 SCIE CSCD 2023年第2期400-410,共11页
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interc... Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all things.The variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication environments.Ensuring data secure transmission is critical for mobile IIoT networks.This paper investigates the data secure transmission performance prediction of mobile IIoT networks.To cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first derived.Then,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction algorithm.For mobile signals,the important features may be removed by the pooling layers.This will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is designed.Out of the input and output layers,it removes the pooling layer and contains six convolution layers.Elman,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed algorithm.Through simulation analysis,good prediction accuracy is achieved by the CNN algorithm.The prediction accuracy obtains a 59%increase. 展开更多
关键词 mobile IIoT networks Data secure transmission Performance analysis Intelligent prediction Improved CNN
下载PDF
A Self-Attention Based Dynamic Resource Management for Satellite-Terrestrial Networks
16
作者 Lin Tianhao Luo Zhiyong 《China Communications》 SCIE CSCD 2024年第4期136-150,共15页
The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power suppor... The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power support,which is an important development direction of future communications.In this paper,we take into account a multi-scenario network model under the coverage of low earth orbit(LEO)satellite,which can provide computing resources to users in faraway areas to improve task processing efficiency.However,LEO satellites experience limitations in computing and communication resources and the channels are time-varying and complex,which makes the extraction of state information a daunting task.Therefore,we explore the dynamic resource management issue pertaining to joint computing,communication resource allocation and power control for multi-access edge computing(MEC).In order to tackle this formidable issue,we undertake the task of transforming the issue into a Markov decision process(MDP)problem and propose the self-attention based dynamic resource management(SABDRM)algorithm,which effectively extracts state information features to enhance the training process.Simulation results show that the proposed algorithm is capable of effectively reducing the long-term average delay and energy consumption of the tasks. 展开更多
关键词 mobile edge computing resource management satellite-terrestrial networks self-attention
下载PDF
Multiscale Characteristics and Connection Mechanisms of Attraction Networks:A Trajectory Data Mining Approach Leveraging Geotagged Data
17
作者 JIANG Hongqiang WEI Ye +1 位作者 MEI Lin WANG Zhaobo 《Chinese Geographical Science》 SCIE CSCD 2024年第3期533-547,共15页
Urban tourism is considered a complex system,and multiscale exploration of the organizational patterns of attraction networks has become a topical issue in urban tourism,so exploring the multiscale characteristics and... Urban tourism is considered a complex system,and multiscale exploration of the organizational patterns of attraction networks has become a topical issue in urban tourism,so exploring the multiscale characteristics and connection mechanisms of attraction networks is important for understanding the linkages between attractions and even the future destination planning.This paper uses geotagging data to compare the links between attractions in Beijing,China during four different periods:the pre-Olympic period(2004–2007),the Olympic Games and subsequent‘heat period’(2008–2013),the post-Olympic period(2014–2019),and the COVID-19(Corona Virus Disease 2019)pandemic period(2020–2021).The aim is to better understand the evolution and patterns of attraction networks at different scales in Beijing and to provide insights for tourism planning in the destination.The results show that the macro,meso-,and microscales network characteristics of attraction networks have inherent logical relationships that can explain the commonalities and differences in the development process of tourism networks.The macroscale attraction network degree Matthew effect is significant in the four different periods and exhibits a morphological monocentric structure,suggesting that new entrants are more likely to be associated with attractions that already have high value.The mesoscale links attractions according to the common purpose of tourists,and the results of the community segmentation of the attraction networks in the four different periods suggest that the functional polycentric structure describes their clustering effect,and the weak links between clusters result from attractions bound by incomplete information and distance,and the functional polycentric structure with a generally more efficient network of clusters.The pattern structure at the microscale reveals the topological transformation relationship of the regional collaboration pattern,and the attraction network structure in the four different periods has a very similar importance profile structure suggesting that the attraction network has the same construction rules and evolution mechanism,which aids in understanding the attraction network pattern at both macro and micro scales.Important approaches and practical implications for planners and managers are presented. 展开更多
关键词 attraction network travel mobility polycentric structure network motif connectivity mechanism destination management organization(DMO) destination planning Beijing China
下载PDF
Robot-Oriented 6G Satellite-UAV Networks: Requirements, Paradigm Shifts, and Case Studies
18
作者 Peng Wei Wei Feng +2 位作者 Yunfei Chen Ning Ge Wei Xiang 《China Communications》 SCIE CSCD 2024年第2期74-84,共11页
Networked robots can perceive their surroundings, interact with each other or humans,and make decisions to accomplish specified tasks in remote/hazardous/complex environments. Satelliteunmanned aerial vehicle(UAV) net... Networked robots can perceive their surroundings, interact with each other or humans,and make decisions to accomplish specified tasks in remote/hazardous/complex environments. Satelliteunmanned aerial vehicle(UAV) networks can support such robots by providing on-demand communication services. However, under traditional open-loop communication paradigm, the network resources are usually divided into user-wise mostly-independent links,via ignoring the task-level dependency of robot collaboration. Thus, it is imperative to develop a new communication paradigm, taking into account the highlevel content and values behind, to facilitate multirobot operation. Inspired by Wiener’s Cybernetics theory, this article explores a closed-loop communication paradigm for the robot-oriented satellite-UAV network. This paradigm turns to handle group-wise structured links, so as to allocate resources in a taskoriented manner. It could also exploit the mobility of robots to liberate the network from full coverage,enabling new orchestration between network serving and positive mobility control of robots. Moreover,the integration of sensing, communications, computing and control would enlarge the benefit of this new paradigm. We present a case study for joint mobile edge computing(MEC) offloading and mobility control of robots, and finally outline potential challenges and open issues. 展开更多
关键词 closed-loop communication mobility control satellite-UAV network structured resource allocation
下载PDF
MobileNetV3识别甲状腺良恶性结节的超声图像
19
作者 张佳维 王艳 孟名柱 《中国医学计算机成像杂志》 CSCD 北大核心 2024年第2期243-249,共7页
目的:研究MobileNetV3在甲状腺良恶性结节超声图像分类问题中的可行性并评估效果。方法:回顾性分析1996例甲状腺结节患者的临床与超声资料。共获得良性结节1353个,恶性结节1197个。将良性结节和恶性结节超声图像按照8∶1∶1比例划分为... 目的:研究MobileNetV3在甲状腺良恶性结节超声图像分类问题中的可行性并评估效果。方法:回顾性分析1996例甲状腺结节患者的临床与超声资料。共获得良性结节1353个,恶性结节1197个。将良性结节和恶性结节超声图像按照8∶1∶1比例划分为训练集、测试集和验证集。构建基于Pytorch框架的MobileNetV3深度学习网络。采用不同优化器和学习率组合在数据集中对MobileNetV3的2个亚模型(small和large)进行训练、测试和验证。结果:large模型中以LAdamax_0.001在训练集和测试集的准确率最高,分别为0.98和0.92;其次为LAdam_0.0001,分别为0.96和0.87。small模型中以SAdam_0.001在训练集和测试集的准确率最高,分别为0.97和0.85;其次为SAdam_0.0001,分别为0.88和0.85。在验证集中的精确度、召回率、F1评分和受试者工作特征曲线下面积分别为LAdamax_0.001(0.95,0.95,0.95,0.94)、LAdam_0.0001(0.88,0.88,0.88,0.88)、SAdam_0.001(0.90,0.89,0.89,0.88)和SAdam_0.0001(0.89,0.89,0.89,0.89)。结论:MobileNetV3是甲状腺良恶性结节超声图像分类的有效方法,以LAdamax_0.001性能最佳,具有潜在的临床应用价值。 展开更多
关键词 深度学习 移动神经网络 甲状腺结节 超声
下载PDF
Effects of sampling frequency on node mobility prediction in dynamic networks: A spectral view
20
作者 Peppino Fazio Miralem Mehic Miroslav Voznak 《Digital Communications and Networks》 SCIE CSCD 2023年第4期1009-1022,共14页
The field of mobility prediction has been widely investigated in the recent past,especially the reduction of the coverage radius of cellular networks,which led to an increase in hand-over events.Changing the cell cove... The field of mobility prediction has been widely investigated in the recent past,especially the reduction of the coverage radius of cellular networks,which led to an increase in hand-over events.Changing the cell coverage very frequently,for example,may lead to service disruptions if a predictive approach is not deployed in the system.Although several works examined mobility prediction in the new-generation mobile networks,all of these studies focused on studying the time features of mobility traces,and the spectral content of historical mobility patterns was not considered for prediction purposes as yet.In the present study,we propose a new approach to mobility prediction by analyzing the effects of a proper mobility sampling frequency.The proposed approach lies in the mobility analysis in the frequency domain,to extract hidden features of the mobility process.Thus,we proposed a new methodology to determine the spectral content of mobility traces(considered as signals)and,thus,the appropriate sampling frequency,which can provide numerous advantages.We considered several types of mobility models(e.g.pedestrian,urban,and vehicular),containing important details in the time and frequency domains.Several simulation campaigns were performed to observe and analyze the characteristics of mobility from real traces and to evaluate the effects of sampling frequency on the spectral content. 展开更多
关键词 mobile networking Frequency domain mobility spectrum
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部