共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
本文综述了机器学习(Machine learning, ML)在无线边缘网络的主要应用、典型学习方法、以及性能潜力。首先分析了无线边缘智能与传统人工智能的区别。而后讨论了两种降低训练ML复杂度的思路,一种是从学习方法角度研究知识与数据联合驱动的ML,另一种是从无线系统角度设计合适的训练和决策方法,分析了集中式决策和分布式决策、集中式训练和分布式训练的优缺点。进一步介绍了联邦学习在无线边缘网络中的应用现状和适用场景,总结了在降低通信开销和个性化学习方面的研究进展与存在的问题。最后对全文进行了总结。 相似文献
3.
干扰条件下的多无人机通信中,用户根据业务有不同的通信需求,而各个信道质量也不同,对抗干扰通信决策提出了业务需求与资源匹配的新要求。针对外部对抗性干扰场景下,多个用户如何选择适合的信道和功率,在干扰躲避、内部冲突控制以及功率优化的同时实现有限资源的高效利用这一问题进行研究,提出了一种面向传输需求匹配的抗干扰决策方法。首先,利用部分重叠信道的特性进行信道资源复用;然后,运用多用户协同强化学习训练用户信道选择策略,并使用斯坦伯格博弈对功率进行优化,实现对用户异构传输需求进行资源匹配。所提方法能实现干扰条件下的多用户异构传输需求的信道和功率联合优化,提升资源利用合理性,实现传输效果的提升。 相似文献
4.
5.
分布式无线Ad Hoc传感器网络中的合作式波束形成的性能分析是建立在随机阵理论和移动通信波束形成的基础上的。在分布式Ad Hoc传感器网络中,每个传感器节点有一个全向天线,且在簇中的节点传输同一信号,使信号在远区场的目标方向上叠加。波束的方向的随机性是由无线Ad Hoc网络结构决定的。介绍了随机阵理论和移动通信波束形成,接着介绍了系统模型,分析了波束的方向特性,着重讨论了平均方向性增益,推导出平均方向性增益的近似公式。 相似文献
6.
Mohammed Nasser Altawaim Nam-Phong Nguyen William G. Scanlon Sang Quang Nguyen 《Mobile Networks and Applications》2018,23(6):1597-1606
Device-to-Device (D2D) communication and wireless small cell networks (SCNs) are two of the most promising paradigms in next generation cellular technologies. However, interference management is a major issue in regard to the use of either or both technologies. In this paper, we propose a D2D pair underlying SCNs using Wireless Power Transfer (WPT) technology. In particular, we have a D2D transmitter and D2D receiver underlying SCNs and operate in close proximity to a SCN primary user (PU). Two scenarios are proposed. The first scenario is when the best base station (BS) link is chosen to harvest energy from, and a second scenario where energy is harvested from all available SCN BSs. The transmission between the D2D pair is kept under a certain threshold so it could not have any harmful effects on the transmission link of PU. The results reveal that the number of interference users shows negative effect on the performance of the considered system. Besides, the primary network’s peak interference constraint has significant influence on the optimal value of energy harvesting time at the D2D transmitter. 相似文献
7.
8.
9.
10.
This paper investigates secure transmission in a wireless powered communication network(WPCN)with an energy harvesting(EH)source configured with multiple antennas.In the WPCN,the EH source harvests energy from the radio frequency(RF)signals broadcasted by a power beacon(PB),and purely relies on the harvested energy to communicate with the destination in the presence of passive eavesdroppers.It is noteworthy that the RF-EH source is equipped with a finite energy storage to accumulate the harvested energy for the future usage.Moreover,due to energy-constraint and complexitylimitation,the multi-antenna source is only configured with a single RF-chain.To enhance the security for the WPCN,we propose two adaptive transmission schemes,i.e.,energy-aware transmit antenna selection(EATAS)and energy-aware differential spatial modulation(EADSM).According to the energy status and the channel quality,the source adaptively decides whether to transmit confidential information or harvest RF energy.To evaluate the secrecy performance of the proposed schemes,we first study the evolution of the energy storage,and then derive the analytical expressions of connection outage probability(COP),secrecy outage probability(SOP)and efficient secrecy throughput(EST).Numerical results demonstrate that our proposed schemes outperform the existing schemes,i.e.,time-switching based TAS(TS-TAS)Received:May 19,2020 Revised:Sep.13,2020 Editor:Deli Qiao and accumulate-then-transmit(ATT).And,increasing the transmit power of the PB or the capacity of the source’s energy storage is helpful to improve the secrecy performance.Moreover,there exists an optimal transmission rate for each proposed scheme to achieve best secrecy performance. 相似文献
11.
Duong Trung Q. Kundu Chinmoy Masaracchia Antonino Nguyen Van-Dinh 《Mobile Networks and Applications》2020,25(1):271-273
Mobile Networks and Applications - 相似文献
12.
We propose an energy-balanced allocation of a real-time application onto a single-hop cluster of homogeneous sensor nodes connected with multiple wireless channels. An epoch-based application consisting of a set of communicating tasks is considered. Each sensor node is equipped with discrete dynamic voltage scaling (DVS). The time and energy costs of both computation and communication activities are considered. We propose both an Integer Linear Programming (ILP) formulation and a polynomial time 3-phase heuristic. Our simulation results show that for small scale problems (with ≤10 tasks), up to 5x lifetime improvement is achieved by the ILP-based approach, compared with the baseline where no DVS is used. Also, the 3-phase heuristic achieves up to 63% of the system lifetime obtained by the ILP-based approach. For large scale problems (with 60–100 tasks), up to 3.5x lifetime improvement can be achieved by the 3-phase heuristic. We also incorporate techniques for exploring the energy-latency tradeoffs of communication activities (such as modulation scaling), which leads to 10x lifetime improvement in our simulations. Simulations were further conducted for two real world problems – LU factorization and Fast Fourier Transformation (FFT). Compared with the baseline where neither DVS nor modulation scaling is used, we observed up to 8x lifetime improvement for the LU factorization algorithm and up to 9x improvement for FFT. 相似文献
13.
Gass John H. Pursley Michael B. Russell Harlan B. Wysocarski Jeffrey S. 《Wireless Networks》2001,7(5):487-495
An energy-efficient adaptive-transmission protocol for mobile frequency-hop spread-spectrum wireless communication networks is described and evaluated. The purpose of the protocol is to permit each of the mobile terminals to adjust its transmitter power and code rate to match the characteristics of the time-varying communication links in the network. The proposed adaptive-transmission protocol bases its choice of transmission parameters on a very simple form of side information that is easy to obtain in a FH communication receiver. The performance of the adaptive-transmission protocol is evaluated for networks in which each communication link may have a time-varying propagation loss and intermittent partial-band interference. Our results demonstrate that the adaptive-transmission protocol can improve the utility of a link and reduce energy consumption by adjusting the transmission parameters in response to changes in the side information. 相似文献
14.
《International Journal of Wireless Information Networks》1997,4(4):257-258
International Journal of Wireless Information Networks - 相似文献
15.
无线网状网(Wireless Mesh Network,WMN)是一种新型的分布式宽带无线网络结构.典型的移动Ad Hoc网络具有节点移动性小、受电池动力限制和用户带宽需求大等特点,从而导致传统单信道的Ad Hoc结构不再满足WMN用户的需求.为了提供更大的带宽,多信道技术得到越来越多应用.探讨了WMN的网络结构与特点,对现有几种典型的多信道技术进行了比较,提出了一种基于单射频的无线Mesh网多信道的设计方案,不同网关节点所代理的节点使用不同的信道进行通信,从而避免了不同子网节点之间的信道干扰.通过NS2的仿真与分析表明,该方法在特定环境下的网络性能是传统单射频单信道方法的2倍. 相似文献
16.
文章介绍了车辆通信网的基本概念、网络架构、国际标准及关键技术,分析了其在物理层、媒体接入层、路由层、安全技术的研究热点问题,并讨论了其在智能交通、安全行车、导航和智能驾驶等方面的应用前景。 相似文献
17.
Benefit from the enhanced onboard pro-cessing capacities and high-speed satellite-terrestrial links,satellite edge computing has been regarded as a promising te... 相似文献
18.
Tan Rui Xing Guoliang Wang Jianping So Hing Cheung 《Mobile Computing, IEEE Transactions on》2010,9(3):317-332
Recent years have witnessed the deployments of wireless sensor networks in a class of mission-critical applications such as object detection and tracking. These applications often impose stringent Quality-of-Service requirements including high detection probability, low false alarm rate, and bounded detection delay. Although a dense all-static network may initially meet these Quality-of-Service requirements, it does not adapt to unpredictable dynamics in network conditions (e.g., coverage holes caused by death of nodes) or physical environments (e.g., changed spatial distribution of events). This paper exploits reactive mobility to improve the target detection performance of wireless sensor networks. In our approach, mobile sensors collaborate with static sensors and move reactively to achieve the required detection performance. Specifically, mobile sensors initially remain stationary and are directed to move toward a possible target only when a detection consensus is reached by a group of sensors. The accuracy of final detection result is then improved as the measurements of mobile sensors have higher Signal-to-Noise Ratios after the movement. We develop a sensor movement scheduling algorithm that achieves near-optimal system detection performance under a given detection delay bound. The effectiveness of our approach is validated by extensive simulations using the real data traces collected by 23 sensor nodes. 相似文献
19.
Haitao Wan Jean-François Diouris Guillaume Andrieux 《Wireless Personal Communications》2012,63(4):977-993
Time synchronization is crucial for the implementation of cooperative communication in wireless sensor networks. In this paper,
we explore the effect of synchronization error on cooperative communication utilizing distributed Alamouti code. The analysis
and simulation results show that small synchronization error has negligible effect on bit error rate (BER) performance. In
order to synchronize the distributed sensor nodes within an acceptable error, we propose a physical layer synchronization
scheme. This scheme consists of an initial synchronization of the cooperative transmitters, synchronization error estimation
at the cooperative receiver and finally a feedback phase. A maximum likelihood method is proposed to make the synchronization
error estimation. It achieves better performance than the matched filter method at the price of moderate increase in computational
complexity and memory space. Two strategies after synchronization error estimation have been analyzed. They provide better
BER performance in the existence of initial synchronization error. They are practical to be implemented in the sensor nodes
before the Alamouti decoding. 相似文献
20.
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks 总被引:1,自引:0,他引:1
Wireless Mesh Network (WMN) is an emerging heterogeneous network architecture that is growing in importance among traditional wireless communication systems as a cost-effective way of providing Internet services. However, WMNs are particularly vulnerable to malicious nodes given their inherent attributes such as decentralized infrastructure and high dependence of node cooperation. We then propose a distributed and Collaborative Intrusion Detection System (CIDS) architecture for detecting insider attacks at real-time, which comprises: i) a Routing Protocol Analyzer (RPA) to analyze the collected routing traffic and generate respective Routing Events; ii) a Distributed Intrusion Detection Engine (DIDE) that treats the Routing Events by applying Routing Constraints and calculate related Misbehaving Metrics; iii) a Cooperative Consensus Mechanism (CCM) to check the Misbehaving Metrics using a proposed threshold scheme and to track down the source of intrusion. The entire CIDS solution is implemented in a virtualized mesh network platform. The experimental results show the proposed CIDS architecture efficiently detects message fabrication attacks with good precision and low resource consumption. 相似文献