Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding des...Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding deserves more concerning.At present research,the incentive schemes in pure Ad Hoc and multi-hop cellular networks are analyzed and compared to classify the strengths and drawbacks of each scheme.We explain in particular what the key issues are to implement incentive schemes for cooperation. Finally,an incentive scheme based on integration of reputation and charging systems is proposed not only to block the existence of selfish nodes,but to satisfy the rational requirement of nodes.展开更多
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this paper.Here,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its performance.Then,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation platforms.Subsequently,it is used toward secure communication application scenarios.Taking it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)model.Eventually,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.展开更多
To meet the communication services with diverse requirements,dynamic resource allocation has shown increasing importance.In this paper,we consider the multi-slot and multi-user resource allocation(MSMU-RA)in a downlin...To meet the communication services with diverse requirements,dynamic resource allocation has shown increasing importance.In this paper,we consider the multi-slot and multi-user resource allocation(MSMU-RA)in a downlink cellular scenario with the aim of maximizing system spectral efficiency while guaranteeing user fairness.We first model the MSMURA problem as a dual-sequence decision-making process,and then solve it by a novel Transformerbased deep reinforcement learning(TDRL)approach.Specifically,the proposed TDRL approach can be achieved based on two aspects:1)To adapt to the dynamic wireless environment,the proximal policy optimization(PPO)algorithm is used to optimize the multi-slot RA strategy.2)To avoid co-channel interference,the Transformer-based PPO algorithm is presented to obtain the optimal multi-user RA scheme by exploring the mapping between user sequence and resource sequence.Experimental results show that:i)the proposed approach outperforms both the traditional and DRL methods in spectral efficiency and user fairness,ii)the proposed algorithm is superior to DRL approaches in terms of convergence speed and generalization performance.展开更多
UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G communications.By leveraging the power...UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G communications.By leveraging the power of stochastic geometry,this paper aims at providing an effective framework for modeling and analyzing a UAV-aided heterogeneous cellular network,where the terrestrial base stations(TBSs) and the UAV base stations(UBSs) coexist,and the UBSs are provided with mm-wave and multi-antenna techniques.By modeling the TBSs as a PPP and the UBSs as a Matern hard-core point process of type Ⅱ(MPH-Ⅱ),approximated but accurate analytical results for the average rate of the typical user of both tiers are derived through an approximation method based on the mean interference-to-signal ratio(MISR) gain.The influence of some relevant parameters is discussed in detail,and some insights into the network deployment and optimization are revealed.Numerical results show that some trade-offs are worthy of being considered,such as the antenna array size,the altitude of the UAVs and the power control factor of the UBSs.展开更多
Interference management is one of the most important issues in the device-to-device(D2D)-enabled heterogeneous cellular networks(HetCNets)due to the coexistence of massive cellular and D2D devices in which D2D devices...Interference management is one of the most important issues in the device-to-device(D2D)-enabled heterogeneous cellular networks(HetCNets)due to the coexistence of massive cellular and D2D devices in which D2D devices reuse the cellular spectrum.To alleviate the interference,an efficient interference management way is to set exclusion zones around the cellular receivers.In this paper,we adopt a stochastic geometry approach to analyze the outage probabilities of cellular and D2D users in the D2D-enabled HetCNets.The main difficulties contain three aspects:1)how to model the location randomness of base stations,cellular and D2D users in practical networks;2)how to capture the randomness and interrelation of cellular and D2D transmissions due to the existence of random exclusion zones;3)how to characterize the different types of interference and their impacts on the outage probabilities of cellular and D2D users.We then run extensive Monte-Carlo simulations which manifest that our theoretical model is very accurate.展开更多
Energy harvesting has been recognized as a promising technique with which to effectively reduce carbon emis-sions and electricity expenses of base stations.However,renewable energy is inherently stochastic and inter-m...Energy harvesting has been recognized as a promising technique with which to effectively reduce carbon emis-sions and electricity expenses of base stations.However,renewable energy is inherently stochastic and inter-mittent,imposing formidable challenges on reliably satisfying users'time-varying wireless traffic demands.In addition,the probability distribution of the renewable energy or users’wireless traffic demand is not always fully known in practice.In this paper,we minimize the total energy cost of a hybrid-energy-powered cellular network by jointly optimizing the energy sharing among base stations,the battery charging and discharging rates,and the energy purchased from the grid under the constraint of a limited battery size at each base station.In solving the formulated non-convex chance-constrained stochastic optimization problem,a new ambiguity set is built to characterize the uncertainties in the renewable energy and wireless traffic demands according to interval sets of the mean and covariance.Using this ambiguity set,the original optimization problem is transformed into a more tractable second-order cone programming problem by exploiting the distributionally robust optimization approach.Furthermore,a low-complexity distributionally robust chance-constrained energy management algo-rithm,which requires only interval sets of the mean and covariance of stochastic parameters,is proposed.The results of extensive simulation are presented to demonstrate that the proposed algorithm outperforms existing methods in terms of the computational complexity,energy cost,and reliability.展开更多
Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application t...Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application to edge detection.An MCM-CNN is designed by adopting a memristor crossbar composed of a pair of memristors.MCM-CNN based on the memristor crossbar with changeable weight is suitable for edge detection of a binary image and a color image considering its characteristics of programmablization and compactation.Figure of merit(FOM)is introduced to evaluate the proposed structure and several traditional edge detection operators for edge detection results.Experiment results show that the FOM of MCM-CNN is three times more than that of the traditional edge detection operators.展开更多
Next-Generation(NextG)wireless communication networks with their widespread applications require high data rates,seamless connectivity and high quality of service(QoS).To cope up with an unprecedented rise of data hun...Next-Generation(NextG)wireless communication networks with their widespread applications require high data rates,seamless connectivity and high quality of service(QoS).To cope up with an unprecedented rise of data hungry applications,users demand more spectral resources imposing a limitation on available wireless spectrum.One of the potential solutions to address the spectrum scarce issue is to incorporate in band full duplex(IBFD)or full duplex(FD)paradigm in next generation networks including 5G new radio(NR).Recently,FD has gained the research interest in cellular networks for its potential to double the wireless link capacity and enhancing spectral efficiency(SE).In half duplex(HD)cellular networks,base stations(BSs)can either perform uplink(UL)or downlink(DL)transmission at a particular time instant leading to reduced throughput levels.Due to the advancement in the self interference reduction(SIR)techniques,full duplex base stations(FD-BSs)can be employed to allow simultaneous UL and DL transmissions at the same time–frequency resources as compared to its HD counterpart.It ideally achieves twice the throughput without any additional complexity at user-equipment(UE).This paper covers a detailed survey on FD cellular networks.A series of SIR approaches,UE-UE mitigation techniques are summarized.Various existing MAC protocols and antenna architectures for FD cellular networks are outlined.An overview of security aspects for FD in cellular networks is also presented.Lastly,various open issues and possible research directions are brought up for FD cellular networks.展开更多
This study investigates physical layer security in downlink multipleinput multiple-output(MIMO) multi-hop heterogeneous cellular networks(MHCNs),in which communication between mobile users and base stations(BSs) is es...This study investigates physical layer security in downlink multipleinput multiple-output(MIMO) multi-hop heterogeneous cellular networks(MHCNs),in which communication between mobile users and base stations(BSs) is established by a single or multiple hops,to address the problem of insufficient security performance of MIMO heterogeneous cellular networks.First,two-dimensional homogeneous Poisson point processes(HPPPs) are utilized to model the locations of K-tier BSs in MIMO MHCNs and receivers,including those of legitimate users and eavesdroppers.Second,based on the channel gain distribution and the statistics property of HPPP,the achievable ergodic rates of the main and eavesdropper channels in direct and ad hoc links are derived,respectively.Third,the secrecy coverage probability and the achievable ergodic secrecy throughput of downlink MIMO MHCNs are explored,and their expressions are derived.Lastly,the correctness of the theoretical derivation is verified through Monte Carlo simulations.展开更多
In today’s information technology(IT)world,the multi-hop wireless sensor networks(MHWSNs)are considered the building block for the Internet of Things(IoT)enabled communication systems for controlling everyday tasks o...In today’s information technology(IT)world,the multi-hop wireless sensor networks(MHWSNs)are considered the building block for the Internet of Things(IoT)enabled communication systems for controlling everyday tasks of organizations and industry to provide quality of service(QoS)in a stipulated time slot to end-user over the Internet.Smart city(SC)is an example of one such application which can automate a group of civil services like automatic control of traffic lights,weather prediction,surveillance,etc.,in our daily life.These IoT-based networks with multi-hop communication and multiple sink nodes provide efficient communication in terms of performance parameters such as throughput,energy efficiency,and end-to-end delay,wherein low latency is considered a challenging issue in next-generation networks(NGN).This paper introduces a single and parallels stable server queuing model with amulti-class of packets and native and coded packet flowto illustrate the simple chain topology and complexmultiway relay(MWR)node with specific neighbor topology.Further,for improving data transmission capacity inMHWSNs,an analytical framework for packet transmission using network coding at the MWR node in the network layer with opportunistic listening is performed by considering bi-directional network flow at the MWR node.Finally,the accuracy of the proposed multi-server multi-class queuing model is evaluated with and without network coding at the network layer by transmitting data packets.The results of the proposed analytical framework are validated and proved effective by comparing these analytical results to simulation results.展开更多
Knowledge graph(KG) link prediction aims to address the problem of missing multiple valid triples in KGs. Existing approaches either struggle to efficiently model the message passing process of multi-hop paths or lack...Knowledge graph(KG) link prediction aims to address the problem of missing multiple valid triples in KGs. Existing approaches either struggle to efficiently model the message passing process of multi-hop paths or lack transparency of model prediction principles. In this paper,a new graph convolutional network path semantic-aware graph convolution network(PSGCN) is proposed to achieve modeling the semantic information of multi-hop paths. PSGCN first uses a random walk strategy to obtain all-hop paths in KGs,then captures the semantics of the paths by Word2Sec and long shortterm memory(LSTM) models,and finally converts them into a potential representation for the graph convolution network(GCN) messaging process. PSGCN combines path-based inference methods and graph neural networks to achieve better interpretability and scalability. In addition,to ensure the robustness of the model,the value of the path thresholdKis experimented on the FB15K-237 and WN18RR datasets,and the final results prove the effectiveness of the model.展开更多
The ergodic capacity of device-to-device (D2D) communication underlaying cellular networks is analyzed. First,the D2D communication model is introduced and the interference during uplink period and downlink period i...The ergodic capacity of device-to-device (D2D) communication underlaying cellular networks is analyzed. First,the D2D communication model is introduced and the interference during uplink period and downlink period is analyzed.In a D2D communication system,since it is very difficult to obtain the instantaneous channel state information (CSI),assume that only the transmitters know the statistical CSI and the channel coefficient follows an independent complex Gaussian distribution.Based on the assumptions,for the uplink period,the signal to interference plus noise ratio (SINR)of the D2D user equipments(DUEs)is expressed. Then the cumulative distribution function (CDF ) and probability distribution function (PDF)formulae of the SINR of the DUEs are presented.Based on the SINR formulae during the uplink period,the ergodic capacity formula of the uplink period is derived. Subsequently, using the same methods,the ergodic capacity formula of the downlink period is derived.The simulation results show that the DUEs can still obtain a high ergodic capacity even in the case of a large number of DUEs.This result can be applied to the design and optimization of D2D communications.展开更多
For the integration network of a cellular network and a wireless local area network (WLAN), a priority-based dynamic load transfer (PDLT) algorithm is proposed. The dynamic vertical handoffs by call admission cont...For the integration network of a cellular network and a wireless local area network (WLAN), a priority-based dynamic load transfer (PDLT) algorithm is proposed. The dynamic vertical handoffs by call admission control are jointly determined by the network conditions and the traffic characteristics in combination with the location-condition of mobile terminals. When there is no bandwidth resource available in the cellular network or WLAN, the proposed PDLT algorithm allows an incoming voice call or data call within the overlapping area of the cellular network and the WLAN to be directed to the spare network; meanwhile, by dynamically computing the occupancy of the bandwidth resource, the proposed PDLT algorithm also allows an ongoing voice call or data communication to be transferred to the network with a sufficient bandwidth resource according to the given threshold to balance the number of voice/data calls in the two networks. The analysis results of a two-dimensional Markov model and the simulation results show that the PDLT algorithm can effectively enhance the whole integrated network' s traffic, reduce the blocking probability of new calls and increase the data throughput, and thus decrease the response time for various services.展开更多
Following the principle of reuse partitioning, two new frequency planning schemes are proposed, the coverage-oriented scheme and the efficiency-oriented scheme, for the cellular system with two-hop fixed relay nodes ...Following the principle of reuse partitioning, two new frequency planning schemes are proposed, the coverage-oriented scheme and the efficiency-oriented scheme, for the cellular system with two-hop fixed relay nodes (FRNs). Compared with the effficiency-oriented scheme, the coverage-oriented scheme has higher reuse distances and is developed with emphasis on the coverage, while compared with the coverage-oriented scheme, the efficiency-oriented scheme has smaller reuse distances and is developed with emphasis on the spectral efficiency. Taking uplink as an example, both simplified analysis and intensive computer simulations are presented to offer comparisons among FRN enhanced systems with the proposed schemes, with a known channel-borrowing based frequency planning scheme and the conventional cellular system without relaying. Studies show that the FRN enhanced system with the coverage-oriented scheme provides the best coverage, while that with the efficiency-oriented scheme offers the highest area spectral efficiency.展开更多
This study proposes a tractable approach to analyze the physical-layer security in the downlink of a multi-tier heterogeneous cellular network. This method is based on stochastic geometry, has low computational comple...This study proposes a tractable approach to analyze the physical-layer security in the downlink of a multi-tier heterogeneous cellular network. This method is based on stochastic geometry, has low computational complexity, and uses the two-dimensional Poisson point process to model the locations of K-tier base stations and receivers, including those of legitimate users and eavesdroppers. Then, the achievable secrecy rates for an arbitrary user are determined and the upper and lower bounds of secrecy coverage probability derived on the condition that cross-tier interference is the main contributor to aggregate interference. Finally, our analysis results reveal the innate connections between information-theoretic security and the spatial densities of legitimate and malicious nodes.展开更多
Tissue homeostasis requires a carefully-orchestrated balance between cell proliferation, cellular senescence and cell death. Cells proliferate through a cell cycle that is tightly regulated by cyclin-dependent kinase ...Tissue homeostasis requires a carefully-orchestrated balance between cell proliferation, cellular senescence and cell death. Cells proliferate through a cell cycle that is tightly regulated by cyclin-dependent kinase activities. Cellular senescence is a safeguard program limiting the proliferative competence of cells in living organisms. Apoptosis eliminates unwanted cells by the coordinated activity of gene products that regulate and effect cell death. The intimate link between the cell cycle, cellular senes- cence, apoptosis regulation, cancer development and tumor responses to cancer treatment has become eminently apparent. Extensive research on tumor suppressor genes, oncogenes, the cell cycle and apoptosis regulatory genes has revealed how the DNA damage-sensing and -signaling pathways, referred to as the DNA-damage response network, are tied to cell proliferation, cell-cycle arrest, cellular senescence and apoptosis. DNA-damage responses are complex, involving “sensor” proteins that sense the damage, and transmit signals to “transducer” proteins, which, in turn, convey the signals to numerous “effector” proteins implicated in specific cellular pathways, including DNA repair mechanisms, cell-cycle checkpoints, cellular senescence and apoptosis. The Bcl-2 family of proteins stands among the most crucial regulators of apoptosis and performs vital functions in deciding whether a cell will live or die after cancer chemotherapy and irradiation. In addition, several studies have now revealed that members of the Bcl-2 family also interface with the cell cycle, DNA repair/recombination and cellular senescence, effects that are generally distinct from their function in apoptosis. In this review, we report progress in understanding the molecular networks that regulate cell-cycle checkpoints, cellular senescence and apoptosis after DNA damage, and discuss the influence of some Bcl-2 family members on cell-cycle checkpoint regulation.展开更多
A K-tier uplink heterogeneous cellular network is modelled and analysed by accounting for both truncated channel inversion power control and biased user association. Each user has a maximum transmit power constraint a...A K-tier uplink heterogeneous cellular network is modelled and analysed by accounting for both truncated channel inversion power control and biased user association. Each user has a maximum transmit power constraint and transmits data when it has sufficient transmit power to perform channel inversion. With biased user association, each user is associated with a base station(BS) that provides the maximum received power weighted by a bias factor, but not their nearest BS. Stochastic geometry is used to evaluate the performances of the proposed system model in terms of the outage probability and ergodic rate for each tier as functions of the biased and power control parameters. Simulations validate our analytical derivations. Numerical results show that there exists a trade-off introduced by the power cut-off threshold and the maximum user transmit power constraint. When the maximum user transmit power becomes a binding constraint, the overall performance is independent of BS densities. In addition, we have shown that it is beneficial for the outage and rate performances by optimizing different network parameters such as the power cut-off threshold as well as the biased factors.展开更多
In this paper the nonlinear dynamical behaviour of a quantum cellular neural network (QCNN) by coupling Josephson circuits was investigated and it was shown that the QCNN using only two of them can cause the onset o...In this paper the nonlinear dynamical behaviour of a quantum cellular neural network (QCNN) by coupling Josephson circuits was investigated and it was shown that the QCNN using only two of them can cause the onset of chaotic oscillation. The theoretical analysis and simulation for the two Josephson-circuits-coupled QCNN have been done by using the amplitude and phase as state variables. The complex chaotic behaviours can be observed and then proved by calculating Lyapunov exponents. The study provides valuable information about QCNNs for future application in high-parallel signal processing and novel chaotic generators.展开更多
In this paper, we first overview some traditional relaying technologies, and then present a Network Coding-Aware Cooperative Relaying (NC2R) scheme to improve the performance of downlink transmission for relayaided ...In this paper, we first overview some traditional relaying technologies, and then present a Network Coding-Aware Cooperative Relaying (NC2R) scheme to improve the performance of downlink transmission for relayaided cellular networks. Moreover, systematic performance analysis and extensive simulations are performed for the proposed NC2R and traditional relaying and non-relaying schemes. The results show that NCR outperforms conventional relaying and non-relaying schemes in terms of blocking probability and spectral efficiency, especially for cell-edge users. Additionally, the location selections for relays with NCR are also discussed. These results will provide some insights for incorporating network coding into next-generation broadband cellular relay mobile systems.展开更多
As device-to-device(D2D) communications usually reuses the resource of cellular networks, call admission control(CAC) and power control are crucial problems. However in most power control schemes, total data rates or ...As device-to-device(D2D) communications usually reuses the resource of cellular networks, call admission control(CAC) and power control are crucial problems. However in most power control schemes, total data rates or throughput are regarded as optimization criterion. In this paper, a combining call admission control(CAC) and power control scheme under guaranteeing QoS of every user equipment(UE) is proposed. First, a simple CAC scheme is introduced. Then based on the CAC scheme, a combining call admission control and power control scheme is proposed. Next, the performance of the proposed scheme is evaluated. Finally, maximum DUE pair number and average transmitting power is calculated. Simulation results show that D2 D communications with the proposed combining call admission control and power control scheme can effectively improve the maximum DUE pair number under the premise of meeting necessary QoS.展开更多
基金supported by National "863" High Technology Research and Development Program Foundation(No.2006AA01Z208)Six Talented Eminence Foundation of Jiangsu Province+1 种基金Natural Science Foundation of Jiangsu Province(No. BK2004149)Green-Blue Academic Talented Project Foundation of Jiangsu Province
文摘Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding deserves more concerning.At present research,the incentive schemes in pure Ad Hoc and multi-hop cellular networks are analyzed and compared to classify the strengths and drawbacks of each scheme.We explain in particular what the key issues are to implement incentive schemes for cooperation. Finally,an incentive scheme based on integration of reputation and charging systems is proposed not only to block the existence of selfish nodes,but to satisfy the rational requirement of nodes.
文摘Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this paper.Here,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its performance.Then,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation platforms.Subsequently,it is used toward secure communication application scenarios.Taking it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)model.Eventually,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.
基金supported by the National Natural Science Foundation of China(No.62071354)the Key Research and Development Program of Shaanxi(No.2022ZDLGY05-08)supported by the ISN State Key Laboratory。
文摘To meet the communication services with diverse requirements,dynamic resource allocation has shown increasing importance.In this paper,we consider the multi-slot and multi-user resource allocation(MSMU-RA)in a downlink cellular scenario with the aim of maximizing system spectral efficiency while guaranteeing user fairness.We first model the MSMURA problem as a dual-sequence decision-making process,and then solve it by a novel Transformerbased deep reinforcement learning(TDRL)approach.Specifically,the proposed TDRL approach can be achieved based on two aspects:1)To adapt to the dynamic wireless environment,the proximal policy optimization(PPO)algorithm is used to optimize the multi-slot RA strategy.2)To avoid co-channel interference,the Transformer-based PPO algorithm is presented to obtain the optimal multi-user RA scheme by exploring the mapping between user sequence and resource sequence.Experimental results show that:i)the proposed approach outperforms both the traditional and DRL methods in spectral efficiency and user fairness,ii)the proposed algorithm is superior to DRL approaches in terms of convergence speed and generalization performance.
基金supported by National Natural Science Foundation of China (No.62001135)the Joint funds for Regional Innovation and Development of the National Natural Science Foundation of China(No.U21A20449)the Beijing Natural Science Foundation Haidian Original Innovation Joint Fund (No.L232002)
文摘UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G communications.By leveraging the power of stochastic geometry,this paper aims at providing an effective framework for modeling and analyzing a UAV-aided heterogeneous cellular network,where the terrestrial base stations(TBSs) and the UAV base stations(UBSs) coexist,and the UBSs are provided with mm-wave and multi-antenna techniques.By modeling the TBSs as a PPP and the UBSs as a Matern hard-core point process of type Ⅱ(MPH-Ⅱ),approximated but accurate analytical results for the average rate of the typical user of both tiers are derived through an approximation method based on the mean interference-to-signal ratio(MISR) gain.The influence of some relevant parameters is discussed in detail,and some insights into the network deployment and optimization are revealed.Numerical results show that some trade-offs are worthy of being considered,such as the antenna array size,the altitude of the UAVs and the power control factor of the UBSs.
基金This work is funded in part by the Science and Technology Development Fund,Macao SAR(Grant Nos.0093/2022/A2,0076/2022/A2 and 0008/2022/AGJ)in part by the National Nature Science Foundation of China(Grant No.61872452)+3 种基金in part by Special fund for Dongguan’s Rural Revitalization Strategy in 2021(Grant No.20211800400102)in part by Dongguan Special Commissioner Project(Grant No.20211800500182)in part by Guangdong-Dongguan Joint Fund for Basic and Applied Research of Guangdong Province(Grant No.2020A1515110162)in part by University Special Fund of Guangdong Provincial Department of Education(Grant No.2022ZDZX1073).
文摘Interference management is one of the most important issues in the device-to-device(D2D)-enabled heterogeneous cellular networks(HetCNets)due to the coexistence of massive cellular and D2D devices in which D2D devices reuse the cellular spectrum.To alleviate the interference,an efficient interference management way is to set exclusion zones around the cellular receivers.In this paper,we adopt a stochastic geometry approach to analyze the outage probabilities of cellular and D2D users in the D2D-enabled HetCNets.The main difficulties contain three aspects:1)how to model the location randomness of base stations,cellular and D2D users in practical networks;2)how to capture the randomness and interrelation of cellular and D2D transmissions due to the existence of random exclusion zones;3)how to characterize the different types of interference and their impacts on the outage probabilities of cellular and D2D users.We then run extensive Monte-Carlo simulations which manifest that our theoretical model is very accurate.
基金supported in part by the National Natural Science Foundation of China under grants 61971080,61901367in part by the Natural Science Foundation of Shaanxi Province under grant 2020JQ-844in part by the open-end fund of the Engineering Research Center of Intelligent Air-ground Integrated Vehicle and Traffic Control(ZNKD2021-001)。
文摘Energy harvesting has been recognized as a promising technique with which to effectively reduce carbon emis-sions and electricity expenses of base stations.However,renewable energy is inherently stochastic and inter-mittent,imposing formidable challenges on reliably satisfying users'time-varying wireless traffic demands.In addition,the probability distribution of the renewable energy or users’wireless traffic demand is not always fully known in practice.In this paper,we minimize the total energy cost of a hybrid-energy-powered cellular network by jointly optimizing the energy sharing among base stations,the battery charging and discharging rates,and the energy purchased from the grid under the constraint of a limited battery size at each base station.In solving the formulated non-convex chance-constrained stochastic optimization problem,a new ambiguity set is built to characterize the uncertainties in the renewable energy and wireless traffic demands according to interval sets of the mean and covariance.Using this ambiguity set,the original optimization problem is transformed into a more tractable second-order cone programming problem by exploiting the distributionally robust optimization approach.Furthermore,a low-complexity distributionally robust chance-constrained energy management algo-rithm,which requires only interval sets of the mean and covariance of stochastic parameters,is proposed.The results of extensive simulation are presented to demonstrate that the proposed algorithm outperforms existing methods in terms of the computational complexity,energy cost,and reliability.
基金supported by the Research Fund for International Young Scientists of the National Natural Science Foundation of China(61550110248)the Research on Fundamental Theory of Shared Intelligent Street Lamp for New Scene Service(H04W200495)+1 种基金Sichuan Science and Technology Program(2019YFG0190)the Research on Sino-Tibetan Multi-source Information Acquisition,Fusion,Data Mining and its Application(H04W170186).
文摘Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application to edge detection.An MCM-CNN is designed by adopting a memristor crossbar composed of a pair of memristors.MCM-CNN based on the memristor crossbar with changeable weight is suitable for edge detection of a binary image and a color image considering its characteristics of programmablization and compactation.Figure of merit(FOM)is introduced to evaluate the proposed structure and several traditional edge detection operators for edge detection results.Experiment results show that the FOM of MCM-CNN is three times more than that of the traditional edge detection operators.
文摘Next-Generation(NextG)wireless communication networks with their widespread applications require high data rates,seamless connectivity and high quality of service(QoS).To cope up with an unprecedented rise of data hungry applications,users demand more spectral resources imposing a limitation on available wireless spectrum.One of the potential solutions to address the spectrum scarce issue is to incorporate in band full duplex(IBFD)or full duplex(FD)paradigm in next generation networks including 5G new radio(NR).Recently,FD has gained the research interest in cellular networks for its potential to double the wireless link capacity and enhancing spectral efficiency(SE).In half duplex(HD)cellular networks,base stations(BSs)can either perform uplink(UL)or downlink(DL)transmission at a particular time instant leading to reduced throughput levels.Due to the advancement in the self interference reduction(SIR)techniques,full duplex base stations(FD-BSs)can be employed to allow simultaneous UL and DL transmissions at the same time–frequency resources as compared to its HD counterpart.It ideally achieves twice the throughput without any additional complexity at user-equipment(UE).This paper covers a detailed survey on FD cellular networks.A series of SIR approaches,UE-UE mitigation techniques are summarized.Various existing MAC protocols and antenna architectures for FD cellular networks are outlined.An overview of security aspects for FD in cellular networks is also presented.Lastly,various open issues and possible research directions are brought up for FD cellular networks.
基金supported in part by National High-tech R&D Program(863 Program) under Grant No.2014AA01A701National Natural Science Foundation of China under Grant No.61379006,61401510,61521003Project funded by China Postdoctoral Science Foundation under Grant No.2016M592990
文摘This study investigates physical layer security in downlink multipleinput multiple-output(MIMO) multi-hop heterogeneous cellular networks(MHCNs),in which communication between mobile users and base stations(BSs) is established by a single or multiple hops,to address the problem of insufficient security performance of MIMO heterogeneous cellular networks.First,two-dimensional homogeneous Poisson point processes(HPPPs) are utilized to model the locations of K-tier BSs in MIMO MHCNs and receivers,including those of legitimate users and eavesdroppers.Second,based on the channel gain distribution and the statistics property of HPPP,the achievable ergodic rates of the main and eavesdropper channels in direct and ad hoc links are derived,respectively.Third,the secrecy coverage probability and the achievable ergodic secrecy throughput of downlink MIMO MHCNs are explored,and their expressions are derived.Lastly,the correctness of the theoretical derivation is verified through Monte Carlo simulations.
文摘In today’s information technology(IT)world,the multi-hop wireless sensor networks(MHWSNs)are considered the building block for the Internet of Things(IoT)enabled communication systems for controlling everyday tasks of organizations and industry to provide quality of service(QoS)in a stipulated time slot to end-user over the Internet.Smart city(SC)is an example of one such application which can automate a group of civil services like automatic control of traffic lights,weather prediction,surveillance,etc.,in our daily life.These IoT-based networks with multi-hop communication and multiple sink nodes provide efficient communication in terms of performance parameters such as throughput,energy efficiency,and end-to-end delay,wherein low latency is considered a challenging issue in next-generation networks(NGN).This paper introduces a single and parallels stable server queuing model with amulti-class of packets and native and coded packet flowto illustrate the simple chain topology and complexmultiway relay(MWR)node with specific neighbor topology.Further,for improving data transmission capacity inMHWSNs,an analytical framework for packet transmission using network coding at the MWR node in the network layer with opportunistic listening is performed by considering bi-directional network flow at the MWR node.Finally,the accuracy of the proposed multi-server multi-class queuing model is evaluated with and without network coding at the network layer by transmitting data packets.The results of the proposed analytical framework are validated and proved effective by comparing these analytical results to simulation results.
基金Supported by the National Natural Science Foundation of China(No.61876144).
文摘Knowledge graph(KG) link prediction aims to address the problem of missing multiple valid triples in KGs. Existing approaches either struggle to efficiently model the message passing process of multi-hop paths or lack transparency of model prediction principles. In this paper,a new graph convolutional network path semantic-aware graph convolution network(PSGCN) is proposed to achieve modeling the semantic information of multi-hop paths. PSGCN first uses a random walk strategy to obtain all-hop paths in KGs,then captures the semantics of the paths by Word2Sec and long shortterm memory(LSTM) models,and finally converts them into a potential representation for the graph convolution network(GCN) messaging process. PSGCN combines path-based inference methods and graph neural networks to achieve better interpretability and scalability. In addition,to ensure the robustness of the model,the value of the path thresholdKis experimented on the FB15K-237 and WN18RR datasets,and the final results prove the effectiveness of the model.
基金The National Natural Science Foundation of China(No.61301110)Foundation of Shanghai Key Laboratory of Intelligent Information Processing of China(No.IIPL-2014-005)
文摘The ergodic capacity of device-to-device (D2D) communication underlaying cellular networks is analyzed. First,the D2D communication model is introduced and the interference during uplink period and downlink period is analyzed.In a D2D communication system,since it is very difficult to obtain the instantaneous channel state information (CSI),assume that only the transmitters know the statistical CSI and the channel coefficient follows an independent complex Gaussian distribution.Based on the assumptions,for the uplink period,the signal to interference plus noise ratio (SINR)of the D2D user equipments(DUEs)is expressed. Then the cumulative distribution function (CDF ) and probability distribution function (PDF)formulae of the SINR of the DUEs are presented.Based on the SINR formulae during the uplink period,the ergodic capacity formula of the uplink period is derived. Subsequently, using the same methods,the ergodic capacity formula of the downlink period is derived.The simulation results show that the DUEs can still obtain a high ergodic capacity even in the case of a large number of DUEs.This result can be applied to the design and optimization of D2D communications.
基金The National Science and Technology Major Project(No. 2011ZX03005-004-03 )the National Natural Science Foundation of China (No. 61171081 )the Research Fund of the National Mobile Communications Research Laboratory of Southeast University (No.2011A08)
文摘For the integration network of a cellular network and a wireless local area network (WLAN), a priority-based dynamic load transfer (PDLT) algorithm is proposed. The dynamic vertical handoffs by call admission control are jointly determined by the network conditions and the traffic characteristics in combination with the location-condition of mobile terminals. When there is no bandwidth resource available in the cellular network or WLAN, the proposed PDLT algorithm allows an incoming voice call or data call within the overlapping area of the cellular network and the WLAN to be directed to the spare network; meanwhile, by dynamically computing the occupancy of the bandwidth resource, the proposed PDLT algorithm also allows an ongoing voice call or data communication to be transferred to the network with a sufficient bandwidth resource according to the given threshold to balance the number of voice/data calls in the two networks. The analysis results of a two-dimensional Markov model and the simulation results show that the PDLT algorithm can effectively enhance the whole integrated network' s traffic, reduce the blocking probability of new calls and increase the data throughput, and thus decrease the response time for various services.
文摘Following the principle of reuse partitioning, two new frequency planning schemes are proposed, the coverage-oriented scheme and the efficiency-oriented scheme, for the cellular system with two-hop fixed relay nodes (FRNs). Compared with the effficiency-oriented scheme, the coverage-oriented scheme has higher reuse distances and is developed with emphasis on the coverage, while compared with the coverage-oriented scheme, the efficiency-oriented scheme has smaller reuse distances and is developed with emphasis on the spectral efficiency. Taking uplink as an example, both simplified analysis and intensive computer simulations are presented to offer comparisons among FRN enhanced systems with the proposed schemes, with a known channel-borrowing based frequency planning scheme and the conventional cellular system without relaying. Studies show that the FRN enhanced system with the coverage-oriented scheme provides the best coverage, while that with the efficiency-oriented scheme offers the highest area spectral efficiency.
基金supported in part by National Natural Science Foundation of China under Grant No.61401510,61521003National High-tech R&D Program(863 Program)under Grant No.2015AA01A708
文摘This study proposes a tractable approach to analyze the physical-layer security in the downlink of a multi-tier heterogeneous cellular network. This method is based on stochastic geometry, has low computational complexity, and uses the two-dimensional Poisson point process to model the locations of K-tier base stations and receivers, including those of legitimate users and eavesdroppers. Then, the achievable secrecy rates for an arbitrary user are determined and the upper and lower bounds of secrecy coverage probability derived on the condition that cross-tier interference is the main contributor to aggregate interference. Finally, our analysis results reveal the innate connections between information-theoretic security and the spatial densities of legitimate and malicious nodes.
基金the Canadian Institutes of Health Research and the Cancer Research Society, and fellowships by the Health Research Funds of Quebec, Canada
文摘Tissue homeostasis requires a carefully-orchestrated balance between cell proliferation, cellular senescence and cell death. Cells proliferate through a cell cycle that is tightly regulated by cyclin-dependent kinase activities. Cellular senescence is a safeguard program limiting the proliferative competence of cells in living organisms. Apoptosis eliminates unwanted cells by the coordinated activity of gene products that regulate and effect cell death. The intimate link between the cell cycle, cellular senes- cence, apoptosis regulation, cancer development and tumor responses to cancer treatment has become eminently apparent. Extensive research on tumor suppressor genes, oncogenes, the cell cycle and apoptosis regulatory genes has revealed how the DNA damage-sensing and -signaling pathways, referred to as the DNA-damage response network, are tied to cell proliferation, cell-cycle arrest, cellular senescence and apoptosis. DNA-damage responses are complex, involving “sensor” proteins that sense the damage, and transmit signals to “transducer” proteins, which, in turn, convey the signals to numerous “effector” proteins implicated in specific cellular pathways, including DNA repair mechanisms, cell-cycle checkpoints, cellular senescence and apoptosis. The Bcl-2 family of proteins stands among the most crucial regulators of apoptosis and performs vital functions in deciding whether a cell will live or die after cancer chemotherapy and irradiation. In addition, several studies have now revealed that members of the Bcl-2 family also interface with the cell cycle, DNA repair/recombination and cellular senescence, effects that are generally distinct from their function in apoptosis. In this review, we report progress in understanding the molecular networks that regulate cell-cycle checkpoints, cellular senescence and apoptosis after DNA damage, and discuss the influence of some Bcl-2 family members on cell-cycle checkpoint regulation.
基金supported by the National Natural Science Foundation of China (61401225, 61571234)the National Science Foundation of Jiangsu Province (BK20140894, BK20140883, BK20160899)+4 种基金the Six Talented Eminence Foundation of Jiangsu Province (XYDXXJS-044)the National Science Foundation of the Higher Education Institutions of Jiangsu Province (14KJD510007, 16KJB510035)the Jiangsu Planned Projects for Postdoctoral Research Funds (1501125B)China Postdoctoral Science Foundation funded project (2015M581844)the Introduction of Talent Scientific Research Fund of Nanjing University of Posts Telecommunications project (NY213104, NY214190)
文摘A K-tier uplink heterogeneous cellular network is modelled and analysed by accounting for both truncated channel inversion power control and biased user association. Each user has a maximum transmit power constraint and transmits data when it has sufficient transmit power to perform channel inversion. With biased user association, each user is associated with a base station(BS) that provides the maximum received power weighted by a bias factor, but not their nearest BS. Stochastic geometry is used to evaluate the performances of the proposed system model in terms of the outage probability and ergodic rate for each tier as functions of the biased and power control parameters. Simulations validate our analytical derivations. Numerical results show that there exists a trade-off introduced by the power cut-off threshold and the maximum user transmit power constraint. When the maximum user transmit power becomes a binding constraint, the overall performance is independent of BS densities. In addition, we have shown that it is beneficial for the outage and rate performances by optimizing different network parameters such as the power cut-off threshold as well as the biased factors.
基金Project supported by the Natural Science Foundation of Shaanxi Province, China (Grant No 2005F20) and the Innovation Funds of the College of Science, Air Force University of Engineering, China (Grant No 2007B003).
文摘In this paper the nonlinear dynamical behaviour of a quantum cellular neural network (QCNN) by coupling Josephson circuits was investigated and it was shown that the QCNN using only two of them can cause the onset of chaotic oscillation. The theoretical analysis and simulation for the two Josephson-circuits-coupled QCNN have been done by using the amplitude and phase as state variables. The complex chaotic behaviours can be observed and then proved by calculating Lyapunov exponents. The study provides valuable information about QCNNs for future application in high-parallel signal processing and novel chaotic generators.
基金supported by the State Key Laboratory of Rail Traffic Control and Safety,Beijing Jiaotong University under Grant No.RCS2012ZT008the National Key Basic Research Program of China(973Program)under Grant No.2012CB316100(2)+1 种基金the National Natural Science Foundation of China under Grants No.61201203,No.61171064the Fundamental Research Funds for the Central Universities under Grant No.2012JBM030
文摘In this paper, we first overview some traditional relaying technologies, and then present a Network Coding-Aware Cooperative Relaying (NC2R) scheme to improve the performance of downlink transmission for relayaided cellular networks. Moreover, systematic performance analysis and extensive simulations are performed for the proposed NC2R and traditional relaying and non-relaying schemes. The results show that NCR outperforms conventional relaying and non-relaying schemes in terms of blocking probability and spectral efficiency, especially for cell-edge users. Additionally, the location selections for relays with NCR are also discussed. These results will provide some insights for incorporating network coding into next-generation broadband cellular relay mobile systems.
基金supported in part by the Project of National Natural Science Foundation of China (61301110)Project of Shanghai Key Laboratory of Intelligent Information Processing, China [grant number IIPL-2014-005]+1 种基金the Project funded by the Priority Academic Program Development of Jiangsu Higher Education Institutionsthe Project of Jiangsu Overseas Research & Training Program for University Prominent Young & Middle-Aged Teachers and Presidents
文摘As device-to-device(D2D) communications usually reuses the resource of cellular networks, call admission control(CAC) and power control are crucial problems. However in most power control schemes, total data rates or throughput are regarded as optimization criterion. In this paper, a combining call admission control(CAC) and power control scheme under guaranteeing QoS of every user equipment(UE) is proposed. First, a simple CAC scheme is introduced. Then based on the CAC scheme, a combining call admission control and power control scheme is proposed. Next, the performance of the proposed scheme is evaluated. Finally, maximum DUE pair number and average transmitting power is calculated. Simulation results show that D2 D communications with the proposed combining call admission control and power control scheme can effectively improve the maximum DUE pair number under the premise of meeting necessary QoS.