Recent Articles

Open access

ISSN: 2352-8648
CN: 50-1212/TN
p-ISSN: 2468-5925

Design of modified model of intelligent assembly digital twins based on optical fiber sensor network

Intelligent assembly of large-scale, complex structures using an intelligent manufacturing platform represents the future development direction for industrial manufacturing. During large-scale structural...

Share article

Dynamic adversarial jamming-based reinforcement learning for designing constellations

To resist various types of jamming in wireless channels, appropriate constellation modulation is used in wireless communication to ensure a low bit error rate. Due to the complexity and variability...

Share article

Evaluating impact of remote-access cyber-attack on lane changes for connected automated vehicles

Connected automated vehicles (CAVs) rely heavily on intelligent algorithms and remote sensors. If the control center or on-board sensors are under cyber-attack due to the security vulnerability of wireless...

Share article

LOS and NLOS identification in real indoor environment using deep learning approach

Visibility conditions between antennas, i.e. Line-of-Sight (LOS) and Non-Line-of-Sight (NLOS) can be crucial in the context of indoor localization, for which detecting the NLOS condition and further...

Share article

Performance comparison of single-carrier and multi-carrier waveforms over terahertz wireless channels

Terahertz (THz) wireless communication has been recognized as a powerful technology to meet the ever-increasing demand of ultra-high rate services. In order to achieve efficient and reliable wireless...

Share article

Performance analysis of UAV-based mixed underwater PLC-RF systems

In this study, we analyzed the performance of an Unmanned Aerial Vehicle (UAV)-based mixed Underwater Power Line Communication-Radio Frequency (UPLC-RF) network. In this network, a buoy located at the...

Share article

Privacy-preserving authentication scheme based on zero trust architecture

Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication, access control, dynamic evaluation, and so on. This work focuses on authentication...

Share article

Efficiency-optimized 6G: A virtual network resource orchestration strategy by enhanced particle swarm optimization

The future Sixth-Generation (6G) wireless systems are expected to encounter emerging services with diverse requirements. In this paper, 6G network resource orchestration is optimized to support customized...

Share article

Performance analysis for MU-MIMO enabled LTE-U networks coexisting with D2D and WiFi network

LTE-Unlicensed (LTE-U) network is a type of cellular communication network operating the unlicensed spectrum. Offloading cellular traffic to WiFi or Device-to-Device (D2D) network can lead to interference...

Share article

Analytical modeling of cache-enabled heterogeneous networks using Poisson cluster processes

The dual frequency Heterogeneous Network (HetNet), including sub-6 GHz networks together with Millimeter Wave (mmWave), achieves the high data rates of user in the networks with hotspots. The cache-enabled...

Share article

Game-theoretic physical layer authentication for spoofing detection in internet of things

The Internet of Things (IoT) has permeated various fields relevant to our lives. In these applications, countless IoT devices transmit vast amounts of data, which often carry important and private information....

Share article

Deep radio signal clustering with interpretability analysis based on saliency map

With the development of information technology, radio communication technology has made rapid progress. Many radio signals that have appeared in space are difficult to classify without manually labeling....

Share article

Energy leakage in OFDM sparse channel estimation: The drawback of OMP and the application of image deblurring

In this paper, in order to reduce the energy leakage caused by the discretized representation in sparse channel estimation for Orthogonal Frequency Division Multiplexing (OFDM) systems, we systematically...

Share article

Reliability-aware swarm based multi-objective optimization for controller placement in distributed SDN architecture

The deployment of distributed multi-controllers for Software-Defined Networking (SDN) architecture is an emerging solution to improve network scalability and management. However, the network control...

Share article

An analytical framework for the incorporation of non-orthogonal pilots in massive MIMO systems

Training-based cellular communication systems use orthogonal pilot sequences to limit pilot contamination. However, the orthogonality constraint imposes a certain pilot length, and therefore, in communication...

Share article

A novel handover scheme for millimeter wave network: An approach of integrating reinforcement learning and optimization

The millimeter-Wave (mmWave) communication with the advantages of abundant bandwidth and immunity to interference has been deemed a promising technology to greatly improve network capacity. However,...

Share article

Interest-aware joint caching, computing, and communication optimization for mobile VR delivery in MEC networks

In the upcoming B5G/6G era, Virtual Reality (VR) over wireless has become a typical application, which is an inevitable trend in the development of video. However, in immersive and interactive VR experiences,...

Share article

Energy-Saving Control Strategy for Ultra-Dense Network Base Stations Based on Multi-Agent Reinforcement Learning

Aiming at the problem of mobile data traffic surge in 5G networks, this paper proposes an effective solution combining massive multiple-input multiple-output techniques with Ultra-Dense Network (UDN)...

Share article

Accurate and efficient elephant-flow classification based on co-trained models in evolved software-defined networks

Accurate early classification of elephant flows (elephants) is important for network management and resource optimization. Elephant models, mainly based on the byte count of flows, can always achieve...

Share article

Path planning of autonomous underwater vehicle for data collection of the internet of everything

Autonomous Underwater Vehicle (AUV) has become an important tool to accomplish various path planning tasks due to its high intelligence and good maneuverability. Aiming at the problem of data collection...

Share article

Service chain caching and task offloading in two-tier UAV-assisted vehicular edge computing networks: an Attention-DRL method

Unmanned Aerial Vehicle (UAV)-assisted Vehicular Edge Computing Networks (VECNs) have emerged as a promising solution to enhance service quality for ground vehicle users. However, the growing demands...

Share article

Proof-of-Trusted-Work: A lightweight blockchain consensus for decentralized IoT networks

Traditional Internet of Things (IoT) architectures that rely on centralized servers for data management and decision-making are vulnerable to security threats and privacy leakage. To address this issue,...

Share article

Deep reinforcement learning-based spectrum resource allocation for the web of healthcare things with massive integrating wearable gadgets

With the development of the future Web of Healthcare Things (WoHT), there will be a trend of densely deploying medical sensors with massive simultaneous online communication requirements. The dense...

Share article

Capacity and delay performance analysis for large-scale UAV-enabled wireless networks

In this paper, we analyze the capacity and delay performance of a large-scale Unmanned Aerial Vehicle (UAV)-enabled wireless network, in which untethered and tethered UAVs deployed with content files...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.