Design of modified model of intelligent assembly digital twins based on optical fiber sensor network
October 2024
Intelligent assembly of large-scale, complex structures using an intelligent manufacturing platform represents the future development direction for industrial manufacturing. During large-scale structural...
Share article
Dynamic adversarial jamming-based reinforcement learning for designing constellations
October 2024
To resist various types of jamming in wireless channels, appropriate constellation modulation is used in wireless communication to ensure a low bit error rate. Due to the complexity and variability...
Share article
Evaluating impact of remote-access cyber-attack on lane changes for connected automated vehicles
October 2024
Connected automated vehicles (CAVs) rely heavily on intelligent algorithms and remote sensors. If the control center or on-board sensors are under cyber-attack due to the security vulnerability of wireless...
Share article
LOS and NLOS identification in real indoor environment using deep learning approach
October 2024
Visibility conditions between antennas, i.e. Line-of-Sight (LOS) and Non-Line-of-Sight (NLOS) can be crucial in the context of indoor localization, for which detecting the NLOS condition and further...
Share article
Performance comparison of single-carrier and multi-carrier waveforms over terahertz wireless channels
October 2024
Terahertz (THz) wireless communication has been recognized as a powerful technology to meet the ever-increasing demand of ultra-high rate services. In order to achieve efficient and reliable wireless...
Share article
Performance analysis of UAV-based mixed underwater PLC-RF systems
October 2024
In this study, we analyzed the performance of an Unmanned Aerial Vehicle (UAV)-based mixed Underwater Power Line Communication-Radio Frequency (UPLC-RF) network. In this network, a buoy located at the...
Share article
Privacy-preserving authentication scheme based on zero trust architecture
October 2024
Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication, access control, dynamic evaluation, and so on. This work focuses on authentication...
Share article
Efficiency-optimized 6G: A virtual network resource orchestration strategy by enhanced particle swarm optimization
October 2024
The future Sixth-Generation (6G) wireless systems are expected to encounter emerging services with diverse requirements. In this paper, 6G network resource orchestration is optimized to support customized...
Share article
Performance analysis for MU-MIMO enabled LTE-U networks coexisting with D2D and WiFi network
October 2024
LTE-Unlicensed (LTE-U) network is a type of cellular communication network operating the unlicensed spectrum. Offloading cellular traffic to WiFi or Device-to-Device (D2D) network can lead to interference...
Share article
Analytical modeling of cache-enabled heterogeneous networks using Poisson cluster processes
October 2024
The dual frequency Heterogeneous Network (HetNet), including sub-6 GHz networks together with Millimeter Wave (mmWave), achieves the high data rates of user in the networks with hotspots. The cache-enabled...
Share article
Game-theoretic physical layer authentication for spoofing detection in internet of things
October 2024
The Internet of Things (IoT) has permeated various fields relevant to our lives. In these applications, countless IoT devices transmit vast amounts of data, which often carry important and private information....
Share article
Deep radio signal clustering with interpretability analysis based on saliency map
October 2024
With the development of information technology, radio communication technology has made rapid progress. Many radio signals that have appeared in space are difficult to classify without manually labeling....
Share article
Energy leakage in OFDM sparse channel estimation: The drawback of OMP and the application of image deblurring
October 2024
In this paper, in order to reduce the energy leakage caused by the discretized representation in sparse channel estimation for Orthogonal Frequency Division Multiplexing (OFDM) systems, we systematically...
Share article
Reliability-aware swarm based multi-objective optimization for controller placement in distributed SDN architecture
October 2024
The deployment of distributed multi-controllers for Software-Defined Networking (SDN) architecture is an emerging solution to improve network scalability and management. However, the network control...
Share article
An analytical framework for the incorporation of non-orthogonal pilots in massive MIMO systems
October 2024
Training-based cellular communication systems use orthogonal pilot sequences to limit pilot contamination. However, the orthogonality constraint imposes a certain pilot length, and therefore, in communication...
Share article
A novel handover scheme for millimeter wave network: An approach of integrating reinforcement learning and optimization
October 2024
The millimeter-Wave (mmWave) communication with the advantages of abundant bandwidth and immunity to interference has been deemed a promising technology to greatly improve network capacity. However,...
Share article
Interest-aware joint caching, computing, and communication optimization for mobile VR delivery in MEC networks
Available online 31 October 2024
In the upcoming B5G/6G era, Virtual Reality (VR) over wireless has become a typical application, which is an inevitable trend in the development of video. However, in immersive and interactive VR experiences,...
Share article
Energy-Saving Control Strategy for Ultra-Dense Network Base Stations Based on Multi-Agent Reinforcement Learning
Available online 29 October 2024
Aiming at the problem of mobile data traffic surge in 5G networks, this paper proposes an effective solution combining massive multiple-input multiple-output techniques with Ultra-Dense Network (UDN)...
Share article
Accurate and efficient elephant-flow classification based on co-trained models in evolved software-defined networks
Available online 29 October 2024
Accurate early classification of elephant flows (elephants) is important for network management and resource optimization. Elephant models, mainly based on the byte count of flows, can always achieve...
Share article
Path planning of autonomous underwater vehicle for data collection of the internet of everything
Available online 28 October 2024
Autonomous Underwater Vehicle (AUV) has become an important tool to accomplish various path planning tasks due to its high intelligence and good maneuverability. Aiming at the problem of data collection...
Share article
Service chain caching and task offloading in two-tier UAV-assisted vehicular edge computing networks: an Attention-DRL method
Available online 28 October 2024
Unmanned Aerial Vehicle (UAV)-assisted Vehicular Edge Computing Networks (VECNs) have emerged as a promising solution to enhance service quality for ground vehicle users. However, the growing demands...
Share article
Proof-of-Trusted-Work: A lightweight blockchain consensus for decentralized IoT networks
Available online 24 October 2024
Traditional Internet of Things (IoT) architectures that rely on centralized servers for data management and decision-making are vulnerable to security threats and privacy leakage. To address this issue,...
Share article
Deep reinforcement learning-based spectrum resource allocation for the web of healthcare things with massive integrating wearable gadgets
Available online 21 October 2024
With the development of the future Web of Healthcare Things (WoHT), there will be a trend of densely deploying medical sensors with massive simultaneous online communication requirements. The dense...
Share article
Capacity and delay performance analysis for large-scale UAV-enabled wireless networks
Available online 18 October 2024
In this paper, we analyze the capacity and delay performance of a large-scale Unmanned Aerial Vehicle (UAV)-enabled wireless network, in which untethered and tethered UAVs deployed with content files...
Share article