查看更多>>摘要:Abstract Vehicular Ad-hoc Networks (VANETs) can improve the road safety by transmitting safety-critical messages such as beacons and emergency messages. IEEE 802.11p VANETs have adopted the carrier sense multiple access with collision avoidance (CSMA/CA) mechanism for the multiple access control. The 802.11p media access control (MAC) protocol, however, can not guarantee the reliability of broadcasting data, since the reception of transmitted messages are not acknowledged. Moreover, the backoff scheme of the 802.11p MAC utilizes a fixed-size contention window for safety message broadcasting, which causes high collision probabilities especially in dense environments. In order to improve such drawbacks, we propose a hybrid access method as follows: Nodes are equipped to reserve time slots for the next round of broadcasting, while unoccupied time slots are preserved for those which have emergency needs. In addition, implicit feedbacks are enabled for detecting collisions incurred during random channel accesses in preserved time slots. We devise a mathematical model which optimally controls the parameters of our scheme while minimizes the cost caused by idle channels and collisions. Extensive simulations show that our mechanism can remarkably improve the performance of VANETs in broadcasting of the safety messages.
查看更多>>摘要:Abstract With the dramatic development of the internet of things (IoT), security issues such as identity authentication have received serious attention. The radio frequency (RF) fingerprint of IoT device is an inherent feature, which can hardly be imitated. In this paper, we propose a rogue device identification technique via RF fingerprinting using deep learning-based generative adversarial network (GAN). Being different from traditional classification problems in RF fingerprint identifications, this work focuses on unknown accessing device recognition without prior information. A differential constellation trace figure generation process is initially employed to transform RF fingerprint features from time-domain waveforms to two-dimensional figures. Then, by using GAN, which is a kind of unsupervised learning algorithm, we can discriminate rogue devices without any prior information. An experimental verification system is built with 54 ZigBee devices regarded as recognized devices and accessing devices. A universal software radio peripheral receiver is used to capture the signal and identify the accessing devices. Experimental results show that the proposed rogue device identification method can achieve 95% identification accuracy in a real environment.
查看更多>>摘要:Abstract With the acceleration of informatization and the coverage of wireless networks, homes, conferences, schools and other places have a higher pursuit of the wireless transmission capabilities of electronic devices. Wireless screen transmission technology is used more frequently in life, work and study. This article mainly discusses the practical application of network multimedia courseware in college basketball teaching. This article first elaborates the teaching plan of multimedia courseware, including teaching content, teacher guidance, student learning and multimedia courseware. Secondly, the multimedia courseware of basketball tactics basic teaching is completed by using Flash mx2004 plug-in. After that, it specifically introduces the process of how to transmit basketball teaching content through multimedia equipment to the video network for students to learn under the wireless network environment. It emphasizes that the “wireless multimedia communication” course is an important course in the electronic information subject. Finally, through the teaching experiment, the accuracy of the multimedia teaching method was tested, and the validity of the courseware content was tested by the empirical validity evaluation method. At the same time, after the teaching experiment, in order to test the two groups of students’ mastery of the basic coordination theory of basketball tactics, the basic coordination theory of basketball tactics was tested. The experimental group had 22 students with a score of 90 or more, accounting for 27.5%, and the control group had 13 students with a score of 90 or more, accounting for 16.5%. The results show that wireless network multimedia computer-assisted teaching has a positive effect on improving students’ interest in learning.
查看更多>>摘要:Abstract In wireless rechargeable sensor network, the deployment of charger node directly affects the overall charging utility of sensor network. Aiming at this problem, this paper abstracts the charger deployment problem as a multi-objective optimization problem that maximizes the received power of sensor nodes and minimizes the number of charger nodes. First, a network model that maximizes the sensor node received power and minimizes the number of charger nodes is constructed. Second, an improved cuckoo search (ICS) algorithm is proposed. This algorithm is based on the traditional cuckoo search algorithm (CS) to redefine its step factor, and then use the mutation factor to change the nesting position of the host bird to update the bird’s nest position, and then use ICS to find the ones that maximize the received power of the sensor node and minimize the number of charger nodes optimal solution. Compared with the traditional cuckoo search algorithm and multi-objective particle swarm optimization algorithm, the simulation results show that the algorithm can effectively increase the receiving power of sensor nodes, reduce the number of charger nodes and find the optimal solution to meet the conditions, so as to maximize the network charging utility.
查看更多>>摘要:Abstract The emergence of 5G communication systems will not replace existing radio access networks but will gradually merge to form ultra-dense heterogeneous networks. In heterogeneous networks, the design of efficient vertical handoff (VHO) algorithms for 5G infrastructures is necessary to improve quality of service (QoS) and system resource utilization. In this paper, an optimized algorithm based on a multi-objective optimization model is proposed to solve the lack of a comprehensive consideration of user and network impacts during the handoff process in existing VHO algorithms. The Markov chain model of each base station (BS) is built to calculate a more accurate value of the network state that reflects the network performance. Then, a multi-objective optimization model is derived to maximize the value of the network state and the user data receiving rate. The multi-objective genetic algorithm NSGA-II is finally employed to turn the model into a final VHO strategy. The results of the simulation for the throughput and blocking rate of networks demonstrate that our algorithm significantly increases the system throughput and reduces the blocking rate compared to the existing VHO strategies.
查看更多>>摘要:Abstract Multi-kernel polar codes have recently received considerable attention since they can provide more flexible code lengths than do the original ones. The construction process of them can be simplified by obtaining the Bhattacharyya parameter bounds of the kernels employed. However, there has been currently no generic method for seeking such bounds. In this paper, therefore, we focus on the upper Bhattacharyya parameter bounds of the standard binary polar code kernels with an arbitrary dimension of l≥2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l\ge 2$$\end{document}. A calculation process composing of four steps, the common column binary tree construction for the channel inputs, the common factor extraction, the calculation feasibility testing, and the upper bound calculation based on pattern matching, is formulated with a computational complexity of O(2l)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O(2^l)$$\end{document}. It is theoretically proved that the upper bounds obtained by the proposed method are tight, which can lay the foundation to compare the reliability of the synthesized channels in polar codes.
查看更多>>摘要:Abstract Blockchain technology has completely changed the area of cryptocurrency with a Peer-to-Peer system named Bitcoin. It can provide a distributed, transparent and highly confidential database by recording immutable transactions. Currently, the technique has obtained great research interest on other areas, including the Internet of vehicles (IoVs). In order to solve some centralized problems and improve the architecture of the IoVs, the blockchain technology is utilized to build a decentralized and secure vehicular environment. In this survey, we aim to construct a comprehensive analysis on the applications of blockchain in the IoV. This paper starts with the introduction of the IoVs and the blockchain. Additionally, some existing surveys on the blockchain enabled IoVs are reviewed. Besides, the combination of the blockchain technology and the IoVs is analyzed from seven aspects to describe how the blockchain is implemented in the IoVs. Finally, the future research directions related to the integration are highlighted.
查看更多>>摘要:Abstract In unmanned aerial vehicle (UAV)-assisted networks, UAV acts as an aerial base station which acquires the requested data via backhaul link and then serves ground users (GUs) through an access network. In this paper, we investigate an energy minimization problem with a limited power supply for both backhaul and access links. The difficulties for solving such a non-convex and combinatorial problem lie at the high computational complexity/time. In solution development, we consider the approaches from both actor-critic deep reinforcement learning (AC-DRL) and optimization perspectives. First, two offline non-learning algorithms, i.e., an optimal and a heuristic algorithms, based on piecewise linear approximation and relaxation are developed as benchmarks. Second, toward real-time decision-making, we improve the conventional AC-DRL and propose two learning schemes: AC-based user group scheduling and backhaul power allocation (ACGP), and joint AC-based user group scheduling and optimization-based backhaul power allocation (ACGOP). Numerical results show that the computation time of both ACGP and ACGOP is reduced tenfold to hundredfold compared to the offline approaches, and ACGOP is better than ACGP in energy savings. The results also verify the superiority of proposed learning solutions in terms of guaranteeing the feasibility and minimizing the system energy compared to the conventional AC-DRL.
查看更多>>摘要:Abstract In the next generation of mobile communication networks, unprecedented challenges are required to be met, such as much higher data rates and spectrum efficiency, lower latency, and massive connectivity. Non-orthogonal multiple access (NOMA) has recently been proposed as a promising technology to achieve much superior spectral efficiency compared to conventional orthogonal multiple access techniques employed in present communication systems. A salient feature of NOMA is its use of successive interference cancellation (SIC) to decode users’ information when multiple users are allowed to transmit in same time/frequency/code domain. In this paper, we aim to exploit an aspect of SIC, namely the availability of other users’ data to realize a cooperative NOMA system. EXtrinsic information transfer (EXIT) charts are utilized to examine the performance of proposed system in terms of user fairness while employing IRregular convolutional codes (IRCC)s. The EXIT chart using IRCC evaluates the convergence analysis for the proposed system. Further, to evaluate the system performances in cooperative NOMA system, we have derived the expressions for the achievable rates which are obtained independently and utilized them in evaluating the experimental data for the proposed NOMA model.
查看更多>>摘要:Abstract The fifth generation (5G) of mobile networks is designed to accommodate different types of use cases, each of them with different and stringent requirements and key performance indicators (KPIs). To support the optimization of the network performance and validation of the KPIs, there exist the necessity of a flexible and efficient monitoring system and capable of realizing multi-site and multi-stakeholder scenarios. Nevertheless, for the evolution from 5G to 6G, the network is envisioned as a user-driven, distributed Cloud computing system where the resource pool is foreseen to integrate the participating users. In this paper, we present a distributed monitoring architecture for Beyond 5G multi-site platforms, where different stakeholders share the resource pool in a distributed environment. Taking advantage of the usage of publish-subscribe mechanisms adapted to the Edge, the developed lightweight monitoring solution can manage large amounts of real-time traffic generated by the applications located in the resource pool. We assess the performance of the implemented paradigm, revealing some interesting insights about the platform, such as the effect caused by the throughput of monitoring data in performance parameters such as the latency and packet loss, or the presence of a saturation effect due to software limitations that impacts in the performance of the system under specific conditions. In the end, the performance evaluation process has confirmed that the monitoring platform suits the requirements of the proposed scenarios, being capable of handling similar workloads in real 5G and Beyond 5G scenarios, then discussing how the architecture could be mapped to these real scenarios.