A predictive SD‐WAN traffic management method for IoT networks in multi‐datacenters using deep RNN
Deploying the Internet of Things (IoT) in integrated edge‐cloud environments exposes the IoT traffic data to performance issues such as delay, bandwidth limitation etc. Recently, Software‐Defined Wide Area Network (SD‐WAN) has emerged as an ...
An SDWAN‐based predictive traffic management policy using deep learning for IoT is proposed that minimizes the end‐to‐end delay and distribute the available bandwidths fairly among network links. image image
Two stage beamforming and combining scheme for FDD massive MIMO systems with multi‐antenna users
This paper proposes a two‐stage beamforming and combining scheme in frequency division duplex (FDD) massive multiple‐input multiple‐output (MIMO) systems with multi‐antenna users. Specifically, the proposed scheme is a two‐stage scheme, where ...
This paper proposes a two‐stage beamforming and combining scheme in frequency division duplex massive multiple‐input multiple‐output systems with multi‐antenna users. The problem of the pre‐beamforming matrix and pre‐combining matrix design are ...
Optimization strategy of UAV‐ARIS assisted vehicular communication system
In recent years, the Integrated Satellite Aerial Terrestrial (I‐SAT) network has garnered significant attention as an innovative and integrated communication system. However, it still encounters interference in the face of the complex external ...
This paper considers the combination of unmanned aerial vehicle (UAV) and reconfigurable intelligent surface (RIS) and proposes a novel architecture for sub‐connected active RIS under the energy consumption constraints of UAV and active RIS. We provide ...
Support vector machine‐based handover scheme for heterogeneous ultra dense network of high‐speed railway
In order to meet the growing demands and extend network coverage for high‐speed railway (HSR) system, the dense deployment of a large number of small cells (SCs) is considered for 5G networks. However, the deployment of dense SCs and the high ...
This work proposes an enhanced handover decision strategy for 5G networks deployed in high‐speed railway (HSR) systems, leveraging Support Vector Machine (SVM) classification. Addressing challenges such as high handover failure probability and frequent ...
Performance of massive MIMO‐NOMA systems with low complexity group SIC receivers and low‐resolution ADCs
Massive multiple‐input multiple‐output and non‐orthogonal multiple access (MIMO‐NOMA) with low‐resolution analog‐to‐digital converters (ADCs) have been widely considered for the next‐generation wireless communication systems. However, the ...
This paper studies the performance of massive multiple‐input multiple‐output and non‐orthogonal multiple access systems with group successive interference cancellation receivers using low‐resolution analog‐to‐digital converters. For the implementation ...
A lightweight deep learning architecture for automatic modulation classification of wireless internet of things
The wireless Internet of Things (IoT) is widely used for data transmission in power systems. Wireless communication is an important part of the IoT. The existing modulation classification algorithms have low classification accuracy when facing ...
This model can better learn the robustness characteristics in a long sequence. Through testing, the classification accuracy of the modulation signal is not much lower than that of the current good classification method when the SNR is 10 dB, and this ...
A hierarchical reinforcement learning approach for energy‐aware service function chain dynamic deployment in IoT
Traffic volume is increasing dramatically due to the quick development of technologies like online gaming, on‐demand video streaming, and the Internet of Things (IoT). The telecommunications industry's large‐scale expansion is increasing its ...
We provide a convolutional neural network‐based hierarchical reinforcement learning approach to lower total energy consumption and carbon emissions in the dynamic service function chaining situations. This method can more effectively lower energy ...
Resource allocation scheduling scheme for task migration and offloading in 6G Cybertwin internet of vehicles based on DRL
As vehicular technology advances, intelligent vehicles generate numerous computation‐intensive tasks, challenging the computational resources of both the vehicles and the Internet of Vehicles (IoV). Traditional IoV struggles with fixed network ...
To address the problem of irrational allocation of computational resources in IoV in the context of 6G, an innovative framework is constructed and a fusion algorithm based on D3QN‐DDPG and Mini Batch K‐Means is proposed to bring about an efficient task ...
A D2D user pairing algorithm based on motion prediction and power control
User pairing plays an important role in device‐to‐device (D2D) relay communication, contributing significantly to maintaining low energy consumption, high throughput, and overall energy efficiency in the communication system. To achieve these ...
The existing power control algorithms is improved and a joint power control algorithm is proposed. By introducing a motion prediction model, attention‐based long short‐term memory motion prediction model (AT‐LSTM), an optimized user pairing algorithm, ...
Polarized APSK modulation system with polymorphic SC signals
This paper discusses a new symbol modulation scheme known as polarized amplitude and phase shift keying, (Pol$Pol$‐APSK) modulation with four rings in its basic form. The new scheme maps power‐polarized symbol pairs on its constellation in order ...
This paper presents polarized amplitude and phase shift keying modulation that is capable of lowering peak‐to‐average power ratio and achieving bit error rates that are lower than those of M$M$‐ary quadrature amplitude modulation, beyond 10 dB of SNR. It ...
A path splitting and pruning strategy on list decoder for PAC codes
Recently, Arıkan proposed a polarization‐adjusted convolutional (PAC) codes, demonstrating their superior error correction performance over polar codes at short block lengths. It was confirmed that PAC codes approached the optimal performance ...
The paper introduces a novel low‐complexity list decoding algorithm for polarization‐adjusted convolutional codes. By incorporating path splitting and pruning strategies based on highly reliable information bits, our algorithm significantly reduces ...
An innovative model for an enhanced dual intrusion detection system using LZ‐JC‐DBSCAN, EPRC‐RPOA and EG‐GELU‐GRU
The rise of suspicious activities in network communication, driven by increased internet accessibility, necessitates the development of advanced intrusion detection systems (IDS). Existing IDS solutions often exhibit poor performance in ...
Intrusion detection systems (IDS) monitor network activity to detect unusual patterns indicative of security breaches. However, many existing IDS solutions struggle with accurately identifying attacks within packet capture (PCAP) files. To address this ...