Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 08 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
Open Access
A predictive SD‐WAN traffic management method for IoT networks in multi‐datacenters using deep RNN
Abstract

Deploying the Internet of Things (IoT) in integrated edge‐cloud environments exposes the IoT traffic data to performance issues such as delay, bandwidth limitation etc. Recently, Software‐Defined Wide Area Network (SD‐WAN) has emerged as an ...

An SDWAN‐based predictive traffic management policy using deep learning for IoT is proposed that minimizes the end‐to‐end delay and distribute the available bandwidths fairly among network links. image image

research-article
Open Access
Two stage beamforming and combining scheme for FDD massive MIMO systems with multi‐antenna users
Abstract

This paper proposes a two‐stage beamforming and combining scheme in frequency division duplex (FDD) massive multiple‐input multiple‐output (MIMO) systems with multi‐antenna users. Specifically, the proposed scheme is a two‐stage scheme, where ...

This paper proposes a two‐stage beamforming and combining scheme in frequency division duplex massive multiple‐input multiple‐output systems with multi‐antenna users. The problem of the pre‐beamforming matrix and pre‐combining matrix design are ...

research-article
Open Access
Optimization strategy of UAV‐ARIS assisted vehicular communication system
Abstract

In recent years, the Integrated Satellite Aerial Terrestrial (I‐SAT) network has garnered significant attention as an innovative and integrated communication system. However, it still encounters interference in the face of the complex external ...

This paper considers the combination of unmanned aerial vehicle (UAV) and reconfigurable intelligent surface (RIS) and proposes a novel architecture for sub‐connected active RIS under the energy consumption constraints of UAV and active RIS. We provide ...

research-article
Open Access
Support vector machine‐based handover scheme for heterogeneous ultra dense network of high‐speed railway
Abstract

In order to meet the growing demands and extend network coverage for high‐speed railway (HSR) system, the dense deployment of a large number of small cells (SCs) is considered for 5G networks. However, the deployment of dense SCs and the high ...

This work proposes an enhanced handover decision strategy for 5G networks deployed in high‐speed railway (HSR) systems, leveraging Support Vector Machine (SVM) classification. Addressing challenges such as high handover failure probability and frequent ...

research-article
Open Access
Performance of massive MIMO‐NOMA systems with low complexity group SIC receivers and low‐resolution ADCs
Abstract

Massive multiple‐input multiple‐output and non‐orthogonal multiple access (MIMO‐NOMA) with low‐resolution analog‐to‐digital converters (ADCs) have been widely considered for the next‐generation wireless communication systems. However, the ...

This paper studies the performance of massive multiple‐input multiple‐output and non‐orthogonal multiple access systems with group successive interference cancellation receivers using low‐resolution analog‐to‐digital converters. For the implementation ...

research-article
Open Access
A lightweight deep learning architecture for automatic modulation classification of wireless internet of things
Abstract

The wireless Internet of Things (IoT) is widely used for data transmission in power systems. Wireless communication is an important part of the IoT. The existing modulation classification algorithms have low classification accuracy when facing ...

This model can better learn the robustness characteristics in a long sequence. Through testing, the classification accuracy of the modulation signal is not much lower than that of the current good classification method when the SNR is 10 dB, and this ...

research-article
Open Access
A hierarchical reinforcement learning approach for energy‐aware service function chain dynamic deployment in IoT
Abstract

Traffic volume is increasing dramatically due to the quick development of technologies like online gaming, on‐demand video streaming, and the Internet of Things (IoT). The telecommunications industry's large‐scale expansion is increasing its ...

We provide a convolutional neural network‐based hierarchical reinforcement learning approach to lower total energy consumption and carbon emissions in the dynamic service function chaining situations. This method can more effectively lower energy ...

research-article
Open Access
Resource allocation scheduling scheme for task migration and offloading in 6G Cybertwin internet of vehicles based on DRL
Abstract

As vehicular technology advances, intelligent vehicles generate numerous computation‐intensive tasks, challenging the computational resources of both the vehicles and the Internet of Vehicles (IoV). Traditional IoV struggles with fixed network ...

To address the problem of irrational allocation of computational resources in IoV in the context of 6G, an innovative framework is constructed and a fusion algorithm based on D3QN‐DDPG and Mini Batch K‐Means is proposed to bring about an efficient task ...

research-article
Open Access
A D2D user pairing algorithm based on motion prediction and power control
Abstract

User pairing plays an important role in device‐to‐device (D2D) relay communication, contributing significantly to maintaining low energy consumption, high throughput, and overall energy efficiency in the communication system. To achieve these ...

The existing power control algorithms is improved and a joint power control algorithm is proposed. By introducing a motion prediction model, attention‐based long short‐term memory motion prediction model (AT‐LSTM), an optimized user pairing algorithm, ...

research-article
Open Access
Polarized APSK modulation system with polymorphic SC signals
Abstract

This paper discusses a new symbol modulation scheme known as polarized amplitude and phase shift keying, (Pol$Pol$‐APSK) modulation with four rings in its basic form. The new scheme maps power‐polarized symbol pairs on its constellation in order ...

This paper presents polarized amplitude and phase shift keying modulation that is capable of lowering peak‐to‐average power ratio and achieving bit error rates that are lower than those of M$M$‐ary quadrature amplitude modulation, beyond 10 dB of SNR. It ...

research-article
Open Access
A path splitting and pruning strategy on list decoder for PAC codes
Abstract

Recently, Arıkan proposed a polarization‐adjusted convolutional (PAC) codes, demonstrating their superior error correction performance over polar codes at short block lengths. It was confirmed that PAC codes approached the optimal performance ...

The paper introduces a novel low‐complexity list decoding algorithm for polarization‐adjusted convolutional codes. By incorporating path splitting and pruning strategies based on highly reliable information bits, our algorithm significantly reduces ...

research-article
Open Access
An innovative model for an enhanced dual intrusion detection system using LZ‐JC‐DBSCAN, EPRC‐RPOA and EG‐GELU‐GRU
Abstract

The rise of suspicious activities in network communication, driven by increased internet accessibility, necessitates the development of advanced intrusion detection systems (IDS). Existing IDS solutions often exhibit poor performance in ...

Intrusion detection systems (IDS) monitor network activity to detect unusual patterns indicative of security breaches. However, many existing IDS solutions struggle with accurately identifying attacks within packet capture (PCAP) files. To address this ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.