首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
在异构网络中,部署多种小功率基站,会出现大量的“小区边缘区域”,边缘用户的性能会受到影响。为此,提出了一种边缘用户小区选择算法,通过发送端进行预编码抑制干扰,提高用户接收到的信干噪比。根据小区当前用户数,动态地调整给微小区边缘用户参考接收信号添加的偏置值,避免边缘用户接入用户数过多的拥堵小区。仿真结果表明,该算法与参考算法相比,能够有效降低宏小区负载,平衡不同微小区间负载,提高轻载微小区的网络吞吐量和资源利用率。  相似文献   

2.
刘婷婷  杨晨阳  索士强  黄远芳 《信号处理》2020,36(11):1789-1803
本文综述了机器学习(Machine learning, ML)在无线边缘网络的主要应用、典型学习方法、以及性能潜力。首先分析了无线边缘智能与传统人工智能的区别。而后讨论了两种降低训练ML复杂度的思路,一种是从学习方法角度研究知识与数据联合驱动的ML,另一种是从无线系统角度设计合适的训练和决策方法,分析了集中式决策和分布式决策、集中式训练和分布式训练的优缺点。进一步介绍了联邦学习在无线边缘网络中的应用现状和适用场景,总结了在降低通信开销和个性化学习方面的研究进展与存在的问题。最后对全文进行了总结。   相似文献   

3.
姚昌华  巫刚  李家强  祁博宇  苏婷  刘鑫  付澍 《电讯技术》2024,64(7):1015-1024
干扰条件下的多无人机通信中,用户根据业务有不同的通信需求,而各个信道质量也不同,对抗干扰通信决策提出了业务需求与资源匹配的新要求。针对外部对抗性干扰场景下,多个用户如何选择适合的信道和功率,在干扰躲避、内部冲突控制以及功率优化的同时实现有限资源的高效利用这一问题进行研究,提出了一种面向传输需求匹配的抗干扰决策方法。首先,利用部分重叠信道的特性进行信道资源复用;然后,运用多用户协同强化学习训练用户信道选择策略,并使用斯坦伯格博弈对功率进行优化,实现对用户异构传输需求进行资源匹配。所提方法能实现干扰条件下的多用户异构传输需求的信道和功率联合优化,提升资源利用合理性,实现传输效果的提升。  相似文献   

4.
谈振辉 《世界电信》1996,9(1):20-23
本文简要介绍了无线个人通信网,主要讨论了无线个人通信网的频谱分配、移动管理、呼叫和流量控制、智能网结构、网络规划和设计等技术问题。  相似文献   

5.
分布式无线Ad Hoc传感器网络中的合作式波束形成的性能分析是建立在随机阵理论和移动通信波束形成的基础上的。在分布式Ad Hoc传感器网络中,每个传感器节点有一个全向天线,且在簇中的节点传输同一信号,使信号在远区场的目标方向上叠加。波束的方向的随机性是由无线Ad Hoc网络结构决定的。介绍了随机阵理论和移动通信波束形成,接着介绍了系统模型,分析了波束的方向特性,着重讨论了平均方向性增益,推导出平均方向性增益的近似公式。  相似文献   

6.
Device-to-Device (D2D) communication and wireless small cell networks (SCNs) are two of the most promising paradigms in next generation cellular technologies. However, interference management is a major issue in regard to the use of either or both technologies. In this paper, we propose a D2D pair underlying SCNs using Wireless Power Transfer (WPT) technology. In particular, we have a D2D transmitter and D2D receiver underlying SCNs and operate in close proximity to a SCN primary user (PU). Two scenarios are proposed. The first scenario is when the best base station (BS) link is chosen to harvest energy from, and a second scenario where energy is harvested from all available SCN BSs. The transmission between the D2D pair is kept under a certain threshold so it could not have any harmful effects on the transmission link of PU. The results reveal that the number of interference users shows negative effect on the performance of the considered system. Besides, the primary network’s peak interference constraint has significant influence on the optimal value of energy harvesting time at the D2D transmitter.  相似文献   

7.
文章介绍了无线局域网的传输技术、网络拓扑、基本网络组成,以及与其他网络集成的技术,并在此基础上简单介绍了其应用与发展前景。  相似文献   

8.
《中兴通讯技术》2020,(4):23-30
面向边缘学习网络,探讨了一种新型的基于空中计算的模型聚合方案,并对其中的关键使能技术展开论述。该方案利用无线多址信道的波形叠加特性将通信与计算在空中无缝融合,能够突破现有的通信-计算分离设计框架的局限性,从而大大提高频谱利用率,缓解了制约联邦式边缘学习大规模扩展的通信时延问题。  相似文献   

9.
10.
This paper investigates secure transmission in a wireless powered communication network(WPCN)with an energy harvesting(EH)source configured with multiple antennas.In the WPCN,the EH source harvests energy from the radio frequency(RF)signals broadcasted by a power beacon(PB),and purely relies on the harvested energy to communicate with the destination in the presence of passive eavesdroppers.It is noteworthy that the RF-EH source is equipped with a finite energy storage to accumulate the harvested energy for the future usage.Moreover,due to energy-constraint and complexitylimitation,the multi-antenna source is only configured with a single RF-chain.To enhance the security for the WPCN,we propose two adaptive transmission schemes,i.e.,energy-aware transmit antenna selection(EATAS)and energy-aware differential spatial modulation(EADSM).According to the energy status and the channel quality,the source adaptively decides whether to transmit confidential information or harvest RF energy.To evaluate the secrecy performance of the proposed schemes,we first study the evolution of the energy storage,and then derive the analytical expressions of connection outage probability(COP),secrecy outage probability(SOP)and efficient secrecy throughput(EST).Numerical results demonstrate that our proposed schemes outperform the existing schemes,i.e.,time-switching based TAS(TS-TAS)Received:May 19,2020 Revised:Sep.13,2020 Editor:Deli Qiao and accumulate-then-transmit(ATT).And,increasing the transmit power of the PB or the capacity of the source’s energy storage is helpful to improve the secrecy performance.Moreover,there exists an optimal transmission rate for each proposed scheme to achieve best secrecy performance.  相似文献   

11.
12.
We propose an energy-balanced allocation of a real-time application onto a single-hop cluster of homogeneous sensor nodes connected with multiple wireless channels. An epoch-based application consisting of a set of communicating tasks is considered. Each sensor node is equipped with discrete dynamic voltage scaling (DVS). The time and energy costs of both computation and communication activities are considered. We propose both an Integer Linear Programming (ILP) formulation and a polynomial time 3-phase heuristic. Our simulation results show that for small scale problems (with ≤10 tasks), up to 5x lifetime improvement is achieved by the ILP-based approach, compared with the baseline where no DVS is used. Also, the 3-phase heuristic achieves up to 63% of the system lifetime obtained by the ILP-based approach. For large scale problems (with 60–100 tasks), up to 3.5x lifetime improvement can be achieved by the 3-phase heuristic. We also incorporate techniques for exploring the energy-latency tradeoffs of communication activities (such as modulation scaling), which leads to 10x lifetime improvement in our simulations. Simulations were further conducted for two real world problems – LU factorization and Fast Fourier Transformation (FFT). Compared with the baseline where neither DVS nor modulation scaling is used, we observed up to 8x lifetime improvement for the LU factorization algorithm and up to 9x improvement for FFT.  相似文献   

13.
An energy-efficient adaptive-transmission protocol for mobile frequency-hop spread-spectrum wireless communication networks is described and evaluated. The purpose of the protocol is to permit each of the mobile terminals to adjust its transmitter power and code rate to match the characteristics of the time-varying communication links in the network. The proposed adaptive-transmission protocol bases its choice of transmission parameters on a very simple form of side information that is easy to obtain in a FH communication receiver. The performance of the adaptive-transmission protocol is evaluated for networks in which each communication link may have a time-varying propagation loss and intermittent partial-band interference. Our results demonstrate that the adaptive-transmission protocol can improve the utility of a link and reduce energy consumption by adjusting the transmission parameters in response to changes in the side information.  相似文献   

14.
International Journal of Wireless Information Networks -  相似文献   

15.
无线网状网(Wireless Mesh Network,WMN)是一种新型的分布式宽带无线网络结构.典型的移动Ad Hoc网络具有节点移动性小、受电池动力限制和用户带宽需求大等特点,从而导致传统单信道的Ad Hoc结构不再满足WMN用户的需求.为了提供更大的带宽,多信道技术得到越来越多应用.探讨了WMN的网络结构与特点,对现有几种典型的多信道技术进行了比较,提出了一种基于单射频的无线Mesh网多信道的设计方案,不同网关节点所代理的节点使用不同的信道进行通信,从而避免了不同子网节点之间的信道干扰.通过NS2的仿真与分析表明,该方法在特定环境下的网络性能是传统单射频单信道方法的2倍.  相似文献   

16.
文章介绍了车辆通信网的基本概念、网络架构、国际标准及关键技术,分析了其在物理层、媒体接入层、路由层、安全技术的研究热点问题,并讨论了其在智能交通、安全行车、导航和智能驾驶等方面的应用前景。  相似文献   

17.
Benefit from the enhanced onboard pro-cessing capacities and high-speed satellite-terrestrial links,satellite edge computing has been regarded as a promising te...  相似文献   

18.
Recent years have witnessed the deployments of wireless sensor networks in a class of mission-critical applications such as object detection and tracking. These applications often impose stringent Quality-of-Service requirements including high detection probability, low false alarm rate, and bounded detection delay. Although a dense all-static network may initially meet these Quality-of-Service requirements, it does not adapt to unpredictable dynamics in network conditions (e.g., coverage holes caused by death of nodes) or physical environments (e.g., changed spatial distribution of events). This paper exploits reactive mobility to improve the target detection performance of wireless sensor networks. In our approach, mobile sensors collaborate with static sensors and move reactively to achieve the required detection performance. Specifically, mobile sensors initially remain stationary and are directed to move toward a possible target only when a detection consensus is reached by a group of sensors. The accuracy of final detection result is then improved as the measurements of mobile sensors have higher Signal-to-Noise Ratios after the movement. We develop a sensor movement scheduling algorithm that achieves near-optimal system detection performance under a given detection delay bound. The effectiveness of our approach is validated by extensive simulations using the real data traces collected by 23 sensor nodes.  相似文献   

19.
Time synchronization is crucial for the implementation of cooperative communication in wireless sensor networks. In this paper, we explore the effect of synchronization error on cooperative communication utilizing distributed Alamouti code. The analysis and simulation results show that small synchronization error has negligible effect on bit error rate (BER) performance. In order to synchronize the distributed sensor nodes within an acceptable error, we propose a physical layer synchronization scheme. This scheme consists of an initial synchronization of the cooperative transmitters, synchronization error estimation at the cooperative receiver and finally a feedback phase. A maximum likelihood method is proposed to make the synchronization error estimation. It achieves better performance than the matched filter method at the price of moderate increase in computational complexity and memory space. Two strategies after synchronization error estimation have been analyzed. They provide better BER performance in the existence of initial synchronization error. They are practical to be implemented in the sensor nodes before the Alamouti decoding.  相似文献   

20.
Wireless Mesh Network (WMN) is an emerging heterogeneous network architecture that is growing in importance among traditional wireless communication systems as a cost-effective way of providing Internet services. However, WMNs are particularly vulnerable to malicious nodes given their inherent attributes such as decentralized infrastructure and high dependence of node cooperation. We then propose a distributed and Collaborative Intrusion Detection System (CIDS) architecture for detecting insider attacks at real-time, which comprises: i) a Routing Protocol Analyzer (RPA) to analyze the collected routing traffic and generate respective Routing Events; ii) a Distributed Intrusion Detection Engine (DIDE) that treats the Routing Events by applying Routing Constraints and calculate related Misbehaving Metrics; iii) a Cooperative Consensus Mechanism (CCM) to check the Misbehaving Metrics using a proposed threshold scheme and to track down the source of intrusion. The entire CIDS solution is implemented in a virtualized mesh network platform. The experimental results show the proposed CIDS architecture efficiently detects message fabrication attacks with good precision and low resource consumption.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号