首页 > 最新文献

Digital Communications and Networks最新文献

英文 中文
A structured distributed learning framework for irregular cellular spatial-temporal traffic prediction 不规则细胞时空交通预测的结构化分布式学习框架
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-10-01 DOI: 10.1016/j.dcan.2025.04.003
Xiangyu Chen , Kaisa Zhang , Gang Chuai , Weidong Gao , Xuewen Liu , Yibo Zhang , Yijian Hou
Spatial-temporal traffic prediction technology is crucial for network planning, resource allocation optimizing, and user experience improving. With the development of virtual network operators, multi-operator collaborations, and edge computing, spatial-temporal traffic data has taken on a distributed nature. Consequently, non-centralized spatial-temporal traffic prediction solutions have emerged as a recent research focus. Currently, the majority of research typically adopts federated learning methods to train traffic prediction models distributed on each base station. This method reduces additional burden on communication systems. However, this method has a drawback: it cannot handle irregular traffic data. Due to unstable wireless network environments, device failures, insufficient storage resources, etc., data missing inevitably occurs during the process of collecting traffic data. This results in the irregular nature of distributed traffic data. Yet, commonly used traffic prediction models such as Recurrent Neural Networks (RNN) and Long Short-Term Memory (LSTM) typically assume that the data is complete and regular. To address the challenge of handling irregular traffic data, this paper transforms irregular traffic prediction into problems of estimating latent variables and generating future traffic. To solve the aforementioned problems, this paper introduces split learning to design a structured distributed learning framework. The framework comprises a Global-level Spatial structure mining Model (GSM) and several Node-level Generative Models (NGMs). NGM and GSM represent Seq2Seq models deployed on the base station and graph neural network models deployed on the cloud or central controller. Firstly, the time embedding layer in NGM establishes the mapping relationship between irregular traffic data and regular latent temporal feature variables. Secondly, GSM collects statistical feature parameters of latent temporal feature variables from various nodes and executes graph embedding for spatial-temporal traffic data. Finally, NGM generates future traffic based on latent temporal and spatial feature variables. The introduction of the time attention mechanism enhances the framework's capability to handle irregular traffic data. Graph attention network introduces spatially correlated base station traffic feature information into local traffic prediction, which compensates for missing information in local irregular traffic data. The proposed framework effectively addresses the distributed prediction issues of irregular traffic data. By testing on real world datasets, the proposed framework improves traffic prediction accuracy by 35% compared to other commonly used distributed traffic prediction methods.
时空流量预测技术对网络规划、优化资源配置和提高用户体验具有重要意义。随着虚拟网络运营商、多运营商协同和边缘计算的发展,时空交通数据呈现分布式特征。因此,非集中式时空交通预测方法已成为近年来的研究热点。目前,大多数研究典型地采用联邦学习方法来训练分布在各个基站上的流量预测模型。这种方法减少了通信系统的额外负担。但是,这种方法有一个缺点:不能处理不规则的流量数据。在采集流量数据的过程中,由于无线网络环境不稳定、设备故障、存储资源不足等原因,不可避免地会出现数据丢失的情况。这导致了分布式流量数据的不规则性。然而,常用的流量预测模型如循环神经网络(RNN)和长短期记忆(LSTM)通常假设数据是完整和规则的。为了解决处理不规则交通数据的挑战,本文将不规则交通预测转化为估计潜在变量和生成未来交通的问题。为了解决上述问题,本文引入了分裂学习,设计了一个结构化的分布式学习框架。该框架包括一个全局级空间结构挖掘模型(GSM)和几个节点级生成模型(ngm)。NGM和GSM代表部署在基站上的Seq2Seq模型和部署在云或中央控制器上的图神经网络模型。首先,NGM中的时间嵌入层建立了不规则交通数据与规则潜在时间特征变量之间的映射关系。其次,GSM从各个节点收集潜在时间特征变量的统计特征参数,对时空交通数据进行图嵌入;最后,NGM基于潜在的时空特征变量生成未来交通。时间注意机制的引入增强了框架处理不规则流量数据的能力。图关注网络将空间相关的基站交通特征信息引入到局部交通预测中,弥补了局部不规则交通数据中的缺失信息。该框架有效地解决了不规则交通数据的分布式预测问题。通过对真实数据集的测试,与其他常用的分布式流量预测方法相比,该框架的预测精度提高了35%。
{"title":"A structured distributed learning framework for irregular cellular spatial-temporal traffic prediction","authors":"Xiangyu Chen ,&nbsp;Kaisa Zhang ,&nbsp;Gang Chuai ,&nbsp;Weidong Gao ,&nbsp;Xuewen Liu ,&nbsp;Yibo Zhang ,&nbsp;Yijian Hou","doi":"10.1016/j.dcan.2025.04.003","DOIUrl":"10.1016/j.dcan.2025.04.003","url":null,"abstract":"<div><div>Spatial-temporal traffic prediction technology is crucial for network planning, resource allocation optimizing, and user experience improving. With the development of virtual network operators, multi-operator collaborations, and edge computing, spatial-temporal traffic data has taken on a distributed nature. Consequently, non-centralized spatial-temporal traffic prediction solutions have emerged as a recent research focus. Currently, the majority of research typically adopts federated learning methods to train traffic prediction models distributed on each base station. This method reduces additional burden on communication systems. However, this method has a drawback: it cannot handle irregular traffic data. Due to unstable wireless network environments, device failures, insufficient storage resources, etc., data missing inevitably occurs during the process of collecting traffic data. This results in the irregular nature of distributed traffic data. Yet, commonly used traffic prediction models such as Recurrent Neural Networks (RNN) and Long Short-Term Memory (LSTM) typically assume that the data is complete and regular. To address the challenge of handling irregular traffic data, this paper transforms irregular traffic prediction into problems of estimating latent variables and generating future traffic. To solve the aforementioned problems, this paper introduces split learning to design a structured distributed learning framework. The framework comprises a Global-level Spatial structure mining Model (GSM) and several Node-level Generative Models (NGMs). NGM and GSM represent Seq2Seq models deployed on the base station and graph neural network models deployed on the cloud or central controller. Firstly, the time embedding layer in NGM establishes the mapping relationship between irregular traffic data and regular latent temporal feature variables. Secondly, GSM collects statistical feature parameters of latent temporal feature variables from various nodes and executes graph embedding for spatial-temporal traffic data. Finally, NGM generates future traffic based on latent temporal and spatial feature variables. The introduction of the time attention mechanism enhances the framework's capability to handle irregular traffic data. Graph attention network introduces spatially correlated base station traffic feature information into local traffic prediction, which compensates for missing information in local irregular traffic data. The proposed framework effectively addresses the distributed prediction issues of irregular traffic data. By testing on real world datasets, the proposed framework improves traffic prediction accuracy by 35% compared to other commonly used distributed traffic prediction methods.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 5","pages":"Pages 1457-1468"},"PeriodicalIF":7.5,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145529380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DWT-3DRec: DeepJSCC-based wireless transmission for efficient 3D scene reconstruction using CityNeRF DWT-3DRec:基于深度jsc的无线传输,使用CityNeRF进行高效3D场景重建
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-10-01 DOI: 10.1016/j.dcan.2025.06.010
Shuang Cao , Jie Li , Ruiyun Yu , Xingwei Wang , Jianing Duan
The Unmanned Aerial Vehicle (UAV)-assisted sensing–transmission–computing integrated system plays a vital role in emergency rescue scenarios involving damaged infrastructure. To tackle the challenges of data transmission and enable timely rescue decision-making, we propose DWT-3DRec—an efficient wireless transmission model for 3D scene reconstruction. This model leverages MobileNetV2 to extract image and pose features, which are transmitted through a Dual-path Adaptive Noise Modulation network (DANM). Moreover, we introduce the Gumbel Channel Masking Module (GCMM), which enhances feature extraction and improves reconstruction reliability by mitigating the effects of dynamic noise. At the ground receiver, the Multi-scale Deep Source–Channel Coding for 3D Reconstruction (MDS-3DRecon) framework integrates Deep Joint Source-Channel Coding (DeepJSCC) with Cityscale Neural Radiance Fields (CityNeRF). It adopts a progressive close-view training strategy and incorporates an Adaptive Fusion Module (AFM) to achieve high-precision scene reconstruction. Experimental results demonstrate that DWT-3DRec significantly outperforms the Joint Photographic Experts Group (JPEG) standard in transmitting image and pose data, achieving an average loss as low as 0.0323 and exhibiting strong robustness across a Signal-to-Noise Ratio (SNR) range of 5–20 dB. In large-scale 3D scene reconstruction tasks, MDS-3DRecon surpasses Multum in Parvo Neural Radiance Fields (Mip-NeRF) and Bungee Neural Radiance Field (BungeeNeRF), achieving a Peak Signal-to-Noise Ratio (PSNR) of 24.921 dB and a reconstruction loss of 0.188. Ablation studies further confirm the essential roles of GCMM, DANM, and AFM in enabling high-fidelity 3D reconstruction.
无人机辅助传感-传输-计算综合系统在基础设施受损的紧急救援场景中发挥着至关重要的作用。为了应对数据传输的挑战,及时做出救援决策,我们提出了dwt - 3drec -一种用于三维场景重建的高效无线传输模型。该模型利用MobileNetV2提取图像和姿态特征,这些特征通过双路径自适应噪声调制网络(DANM)传输。此外,我们还引入了Gumbel信道掩蔽模块(GCMM),该模块通过减轻动态噪声的影响来增强特征提取并提高重建可靠性。在地面接收机,用于三维重建的多尺度深源信道编码(MDS-3DRecon)框架将深度联合源信道编码(DeepJSCC)与城市尺度神经辐射场(CityNeRF)相结合。它采用渐进式近景训练策略,并结合自适应融合模块(AFM)实现高精度的场景重建。实验结果表明,DWT-3DRec在传输图像和姿态数据方面明显优于联合摄影专家组(JPEG)标准,平均损失低至0.0323,在5-20 dB的信噪比(SNR)范围内具有很强的鲁棒性。在大规模3D场景重建任务中,MDS-3DRecon在Parvo Neural Radiance Fields (Mip-NeRF)和BungeeNeRF (BungeeNeRF)上优于Multum,峰值信噪比(PSNR)达到24.921 dB,重建损失为0.188。消融研究进一步证实了GCMM、DANM和AFM在实现高保真三维重建中的重要作用。
{"title":"DWT-3DRec: DeepJSCC-based wireless transmission for efficient 3D scene reconstruction using CityNeRF","authors":"Shuang Cao ,&nbsp;Jie Li ,&nbsp;Ruiyun Yu ,&nbsp;Xingwei Wang ,&nbsp;Jianing Duan","doi":"10.1016/j.dcan.2025.06.010","DOIUrl":"10.1016/j.dcan.2025.06.010","url":null,"abstract":"<div><div>The Unmanned Aerial Vehicle (UAV)-assisted sensing–transmission–computing integrated system plays a vital role in emergency rescue scenarios involving damaged infrastructure. To tackle the challenges of data transmission and enable timely rescue decision-making, we propose DWT-3DRec—an efficient wireless transmission model for 3D scene reconstruction. This model leverages MobileNetV2 to extract image and pose features, which are transmitted through a Dual-path Adaptive Noise Modulation network (DANM). Moreover, we introduce the Gumbel Channel Masking Module (GCMM), which enhances feature extraction and improves reconstruction reliability by mitigating the effects of dynamic noise. At the ground receiver, the Multi-scale Deep Source–Channel Coding for 3D Reconstruction (MDS-3DRecon) framework integrates Deep Joint Source-Channel Coding (DeepJSCC) with Cityscale Neural Radiance Fields (CityNeRF). It adopts a progressive close-view training strategy and incorporates an Adaptive Fusion Module (AFM) to achieve high-precision scene reconstruction. Experimental results demonstrate that DWT-3DRec significantly outperforms the Joint Photographic Experts Group (JPEG) standard in transmitting image and pose data, achieving an average loss as low as 0.0323 and exhibiting strong robustness across a Signal-to-Noise Ratio (SNR) range of 5–20 dB. In large-scale 3D scene reconstruction tasks, MDS-3DRecon surpasses Multum in Parvo Neural Radiance Fields (Mip-NeRF) and Bungee Neural Radiance Field (BungeeNeRF), achieving a Peak Signal-to-Noise Ratio (PSNR) of 24.921 dB and a reconstruction loss of 0.188. Ablation studies further confirm the essential roles of GCMM, DANM, and AFM in enabling high-fidelity 3D reconstruction.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 5","pages":"Pages 1370-1384"},"PeriodicalIF":7.5,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145529493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRL-based federated self-supervised learning for task offloading and resource allocation in ISAC-enabled vehicle edge computing 基于drl的联邦自监督学习在isac支持的车辆边缘计算中的任务卸载和资源分配
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-10-01 DOI: 10.1016/j.dcan.2024.12.009
Xueying Gu , Qiong Wu , Pingyi Fan , Nan Cheng , Wen Chen , Khaled B. Letaief
Intelligent Transportation Systems (ITS) leverage Integrated Sensing and Communications (ISAC) to enhance data exchange between vehicles and infrastructure in the Internet of Vehicles (IoV). This integration inevitably increases computing demands, risking real-time system stability. Vehicle Edge Computing (VEC) addresses this by offloading tasks to Road Side Units (RSUs), ensuring timely services. Our previous work, the FLSimCo algorithm, which uses local resources for federated Self-Supervised Learning (SSL), has a limitation: vehicles often can't complete all iteration tasks. Our improved algorithm offloads partial tasks to RSUs and optimizes energy consumption by adjusting transmission power, CPU frequency, and task assignment ratios, balancing local and RSU-based training. Meanwhile, setting an offloading threshold further prevents inefficiencies. Simulation results show that the enhanced algorithm reduces energy consumption and improves offloading efficiency and accuracy of federated SSL.
智能交通系统(ITS)利用集成传感和通信(ISAC)来增强车联网(IoV)中车辆和基础设施之间的数据交换。这种集成不可避免地增加了计算需求,危及实时系统的稳定性。车辆边缘计算(VEC)通过将任务卸载到路边单元(rsu)来解决这个问题,确保及时提供服务。我们之前的工作,FLSimCo算法,使用本地资源进行联邦自监督学习(SSL),有一个局限性:车辆通常不能完成所有的迭代任务。改进后的算法通过调整传输功率、CPU频率和任务分配比例,平衡本地和基于rsu的训练,将部分任务转移给rsu,并优化能耗。同时,设置卸载阈值可以进一步防止效率低下。仿真结果表明,改进算法降低了能耗,提高了联邦SSL的卸载效率和准确性。
{"title":"DRL-based federated self-supervised learning for task offloading and resource allocation in ISAC-enabled vehicle edge computing","authors":"Xueying Gu ,&nbsp;Qiong Wu ,&nbsp;Pingyi Fan ,&nbsp;Nan Cheng ,&nbsp;Wen Chen ,&nbsp;Khaled B. Letaief","doi":"10.1016/j.dcan.2024.12.009","DOIUrl":"10.1016/j.dcan.2024.12.009","url":null,"abstract":"<div><div>Intelligent Transportation Systems (ITS) leverage Integrated Sensing and Communications (ISAC) to enhance data exchange between vehicles and infrastructure in the Internet of Vehicles (IoV). This integration inevitably increases computing demands, risking real-time system stability. Vehicle Edge Computing (VEC) addresses this by offloading tasks to Road Side Units (RSUs), ensuring timely services. Our previous work, the FLSimCo algorithm, which uses local resources for federated Self-Supervised Learning (SSL), has a limitation: vehicles often can't complete all iteration tasks. Our improved algorithm offloads partial tasks to RSUs and optimizes energy consumption by adjusting transmission power, CPU frequency, and task assignment ratios, balancing local and RSU-based training. Meanwhile, setting an offloading threshold further prevents inefficiencies. Simulation results show that the enhanced algorithm reduces energy consumption and improves offloading efficiency and accuracy of federated SSL.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 5","pages":"Pages 1614-1627"},"PeriodicalIF":7.5,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145528981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pivotal role of digital twins in the metaverse: A review 数字双胞胎在虚拟世界中的关键作用:综述
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-10-01 DOI: 10.1016/j.dcan.2024.12.003
Siva Sai , Pulkit Sharma , Aanchal Gaur , Vinay Chamola
The ascent of the metaverse signifies a profound transformation in our digital landscape, ushering in a complex network of interlinked virtual domains and digital spaces. In this burgeoning metaverse, a paradigm shift is seen in how people engage, collaborate, and become immersed in digital environments. An especially intriguing concept taking root within this metaverse landscape is that of digital twins. Initially rooted in industrial and Internet of Things (IoT) contexts, digital twins are now making their mark in the metaverse, presenting opportunities to elevate user experiences, introduce novel dimensions of interaction, and seamlessly bridge the divide between the virtual and physical realms. Digital twins, conceived initially to replicate physical entities in real-time, have transcended their industrial origins in this new metaverse context. They no longer solely replicate physical objects but extend their domain to encompass digital entities, avatars, virtual environments, and users. Despite the vital contributions of digital twins in the metaverse, there has been no research that has explored the applications and scope of digital twins in the metaverse comprehensively. However, there are a few papers focusing on some particular applications. Addressing this research gap, we present an in-depth review of the pivotal role of application digital twins in the metaverse. We present 15 digital twin applications in the metaverse, ranging from simulation and training to emergency preparedness. This study outlines the critical limitations of integrating digital twins and metaverse and several future research directions.
虚拟世界的崛起标志着我们的数字景观的深刻变革,迎来了一个相互关联的虚拟领域和数字空间的复杂网络。在这个蓬勃发展的虚拟世界中,人们如何参与、协作和沉浸在数字环境中可以看到范式的转变。在这个虚拟世界中,一个特别有趣的概念是数字双胞胎。最初植根于工业和物联网(IoT)环境,数字孪生现在在虚拟世界中留下了印记,提供了提升用户体验的机会,引入了新的交互维度,并无缝地弥合了虚拟和物理领域之间的鸿沟。数字孪生,最初是为了实时复制物理实体而构思的,在这个新的虚拟环境中已经超越了它们的工业起源。它们不再仅仅复制物理对象,而是将其领域扩展到包括数字实体、虚拟形象、虚拟环境和用户。尽管数字双胞胎在元宇宙中做出了重要贡献,但目前还没有研究全面探讨数字双胞胎在元宇宙中的应用和范围。然而,有一些论文专注于一些特定的应用。为了解决这一研究空白,我们对应用数字双胞胎在元宇宙中的关键作用进行了深入的回顾。我们介绍了15个数字孪生在元宇宙中的应用,从模拟和培训到应急准备。本研究概述了整合数字孪生和元宇宙的关键限制以及未来的几个研究方向。
{"title":"Pivotal role of digital twins in the metaverse: A review","authors":"Siva Sai ,&nbsp;Pulkit Sharma ,&nbsp;Aanchal Gaur ,&nbsp;Vinay Chamola","doi":"10.1016/j.dcan.2024.12.003","DOIUrl":"10.1016/j.dcan.2024.12.003","url":null,"abstract":"<div><div>The ascent of the metaverse signifies a profound transformation in our digital landscape, ushering in a complex network of interlinked virtual domains and digital spaces. In this burgeoning metaverse, a paradigm shift is seen in how people engage, collaborate, and become immersed in digital environments. An especially intriguing concept taking root within this metaverse landscape is that of digital twins. Initially rooted in industrial and Internet of Things (IoT) contexts, digital twins are now making their mark in the metaverse, presenting opportunities to elevate user experiences, introduce novel dimensions of interaction, and seamlessly bridge the divide between the virtual and physical realms. Digital twins, conceived initially to replicate physical entities in real-time, have transcended their industrial origins in this new metaverse context. They no longer solely replicate physical objects but extend their domain to encompass digital entities, avatars, virtual environments, and users. Despite the vital contributions of digital twins in the metaverse, there has been no research that has explored the applications and scope of digital twins in the metaverse comprehensively. However, there are a few papers focusing on some particular applications. Addressing this research gap, we present an in-depth review of the pivotal role of application digital twins in the metaverse. We present 15 digital twin applications in the metaverse, ranging from simulation and training to emergency preparedness. This study outlines the critical limitations of integrating digital twins and metaverse and several future research directions.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 5","pages":"Pages 1343-1355"},"PeriodicalIF":7.5,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145529494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-assisted full-duplex ISAC: Joint communication scheduling, beamforming, and trajectory optimization 无人机辅助全双工ISAC:联合通信调度、波束形成和轨迹优化
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-10-01 DOI: 10.1016/j.dcan.2025.03.001
Yuanshuo Gang, Yuexia Zhang, Xinyi Wang
This paper proposes the Unmanned Aerial Vehicle (UAV)-assisted Full-Duplex (FD) Integrated Sensing And Communication (ISAC) system. In this system, the UAV integrates sensing and communication functions, capable of receiving transmission signals from Uplink (UL) users and echo signal from target, while communicating with Downlink (DL) users and simultaneously detecting target. With the objective of maximizing the Average Sum Rate (ASR) for both UL and DL users, a composite non-convex optimization problem is established, which is decomposed into sub-problems of communication scheduling optimization, transceiver beamforming design, and UAV trajectory optimization. An alternating iterative algorithm is proposed, employing relaxation optimization, extremum traversal search, augmented weighted minimum mean square error, and successive convex approximation methods to solve the aforementioned sub-problems. Simulation results demonstrate that, compared to the traditional UAV-assisted Half-Duplex (HD) ISAC scheme, the proposed FD ISAC scheme effectively improves the ASR.
提出了一种无人机辅助全双工(FD)集成传感与通信(ISAC)系统。在该系统中,UAV集成了传感和通信功能,能够接收来自上行链路(UL)用户的传输信号和来自目标的回波信号,同时与下行链路(DL)用户通信并同时探测目标。以UL和DL用户的平均和速率(ASR)最大化为目标,建立了一个复合非凸优化问题,将其分解为通信调度优化、收发机波束成形设计和无人机轨迹优化等子问题。提出了一种交替迭代算法,利用松弛优化、极值遍历搜索、增广加权最小均方误差和逐次凸逼近等方法求解上述子问题。仿真结果表明,与传统的无人机辅助半双工(HD) ISAC方案相比,FD ISAC方案有效提高了ASR。
{"title":"UAV-assisted full-duplex ISAC: Joint communication scheduling, beamforming, and trajectory optimization","authors":"Yuanshuo Gang,&nbsp;Yuexia Zhang,&nbsp;Xinyi Wang","doi":"10.1016/j.dcan.2025.03.001","DOIUrl":"10.1016/j.dcan.2025.03.001","url":null,"abstract":"<div><div>This paper proposes the Unmanned Aerial Vehicle (UAV)-assisted Full-Duplex (FD) Integrated Sensing And Communication (ISAC) system. In this system, the UAV integrates sensing and communication functions, capable of receiving transmission signals from Uplink (UL) users and echo signal from target, while communicating with Downlink (DL) users and simultaneously detecting target. With the objective of maximizing the Average Sum Rate (ASR) for both UL and DL users, a composite non-convex optimization problem is established, which is decomposed into sub-problems of communication scheduling optimization, transceiver beamforming design, and UAV trajectory optimization. An alternating iterative algorithm is proposed, employing relaxation optimization, extremum traversal search, augmented weighted minimum mean square error, and successive convex approximation methods to solve the aforementioned sub-problems. Simulation results demonstrate that, compared to the traditional UAV-assisted Half-Duplex (HD) ISAC scheme, the proposed FD ISAC scheme effectively improves the ASR.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 5","pages":"Pages 1628-1638"},"PeriodicalIF":7.5,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145529446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covert wireless communication over uplink satellite-terrestrial network 通过上行卫星-地面网络进行隐蔽无线通信
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-10-01 DOI: 10.1016/j.dcan.2025.03.009
Shulei Zeng , Bin Cao , Mugen Peng , Shuo Wang , Chen Sun
The emerging deployment of large-scale Low Earth Orbit (LEO) satellite constellations provides seamless global coverage. However, the increasing number of satellites also introduces significant security challenges, such as eavesdropping and illegal communication behavior detection. This paper investigates covert wireless communication over uplink satellite-terrestrial network, focusing on scenarios with warden satellites. By accounting for shot noise generated by ambient signals from terrestrial interferers, the terrestrial transmitter Alice can effectively hide its signal from warden satellites. Leveraging stochastic geometry, the distributions of distances between transmitter and satellites are analyzed, enabling the assessment of uplink performance and interference within a satellite's coverage area. Approximate expressions for detection error probability and transmission outage probability are derived. Based on the theoretical analysis, an optimal scheme is proposed to maximize covert throughput under the constraint of the average detection error probability of the most detrimental warden satellite. Extensive Monte Carlo simulations experiments are conducted to validate the accuracy of analytical methods for evaluating covert performance.
新兴的大规模低地球轨道(LEO)卫星星座部署提供了无缝的全球覆盖。然而,卫星数量的增加也带来了重大的安全挑战,如窃听和非法通信行为的检测。本文研究了卫星-地面上行网络的隐蔽无线通信,重点研究了有监狱长卫星的场景。考虑到地面干扰产生的环境信号产生的散点噪声,地面发射机爱丽丝可以有效地隐藏其信号对监狱长卫星。利用随机几何,分析发射机和卫星之间的距离分布,从而能够评估上行链路性能和卫星覆盖区域内的干扰。导出了检测误差概率和传输中断概率的近似表达式。在理论分析的基础上,提出了一种以最不利监视卫星的平均探测误差概率为约束条件下最大隐蔽吞吐量的优化方案。进行了大量的蒙特卡罗模拟实验,以验证评估隐蔽性能的分析方法的准确性。
{"title":"Covert wireless communication over uplink satellite-terrestrial network","authors":"Shulei Zeng ,&nbsp;Bin Cao ,&nbsp;Mugen Peng ,&nbsp;Shuo Wang ,&nbsp;Chen Sun","doi":"10.1016/j.dcan.2025.03.009","DOIUrl":"10.1016/j.dcan.2025.03.009","url":null,"abstract":"<div><div>The emerging deployment of large-scale Low Earth Orbit (LEO) satellite constellations provides seamless global coverage. However, the increasing number of satellites also introduces significant security challenges, such as eavesdropping and illegal communication behavior detection. This paper investigates covert wireless communication over uplink satellite-terrestrial network, focusing on scenarios with warden satellites. By accounting for shot noise generated by ambient signals from terrestrial interferers, the terrestrial transmitter Alice can effectively hide its signal from warden satellites. Leveraging stochastic geometry, the distributions of distances between transmitter and satellites are analyzed, enabling the assessment of uplink performance and interference within a satellite's coverage area. Approximate expressions for detection error probability and transmission outage probability are derived. Based on the theoretical analysis, an optimal scheme is proposed to maximize covert throughput under the constraint of the average detection error probability of the most detrimental warden satellite. Extensive Monte Carlo simulations experiments are conducted to validate the accuracy of analytical methods for evaluating covert performance.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 5","pages":"Pages 1318-1329"},"PeriodicalIF":7.5,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145529499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient conjunctive keyword searchable encryption for cloud-based IoT systems 基于云的物联网系统的高效连接关键字可搜索加密
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2025.03.002
Tianqi Peng , Bei Gong , Chong Guo , Akhtar Badshah , Muhammad Waqas , Hisham Alasmary , Sheng Chen
Data privacy leakage has always been a critical concern in cloud-based Internet of Things (IoT) systems. Dynamic Symmetric Searchable Encryption (DSSE) with forward and backward privacy aims to address this issue by enabling updates and retrievals of ciphertext on untrusted cloud server while ensuring data privacy. However, previous research on DSSE mostly focused on single keyword search, which limits its practical application in cloud-based IoT systems. Recently, Patranabis (NDSS 2021) [1] proposed a groundbreaking DSSE scheme for conjunctive keyword search. However, this scheme fails to effectively handle deletion operations in certain circumstances, resulting in inaccurate query results. Additionally, the scheme introduces unnecessary search overhead. To overcome these problems, we present CKSE, an efficient conjunctive keyword DSSE scheme. Our scheme improves the oblivious shared computation protocol used in the scheme of Patranabis, thus enabling a more comprehensive deletion functionality. Furthermore, we introduce a state chain structure to reduce the search overhead. Through security analysis and experimental evaluation, we demonstrate that our CKSE achieves more comprehensive deletion functionality while maintaining comparable search performance and security, compared to the oblivious dynamic cross-tags protocol of Patranabis. The combination of comprehensive functionality, high efficiency, and security makes our CKSE an ideal choice for deployment in cloud-based IoT systems.
在基于云的物联网(IoT)系统中,数据隐私泄露一直是一个关键问题。具有前向和后向隐私的动态对称可搜索加密(DSSE)旨在通过支持在不受信任的云服务器上更新和检索密文,同时确保数据隐私来解决此问题。然而,以往对DSSE的研究多集中在单一关键字搜索上,限制了其在基于云的物联网系统中的实际应用。最近,Patranabis (NDSS 2021)[1]提出了一个开创性的连接关键字搜索DSSE方案。但该方案在某些情况下不能有效处理删除操作,导致查询结果不准确。此外,该方案还引入了不必要的搜索开销。为了克服这些问题,我们提出了一种高效的连接关键字DSSE方案——CKSE。我们的方案改进了Patranabis方案中使用的遗忘共享计算协议,从而实现了更全面的删除功能。此外,我们引入了状态链结构来减少搜索开销。通过安全性分析和实验评估,我们证明与Patranabis的无意识动态交叉标签协议相比,我们的CKSE在保持相当的搜索性能和安全性的同时实现了更全面的删除功能。全面的功能,高效率和安全性的结合使我们的CKSE成为部署在基于云的物联网系统中的理想选择。
{"title":"An efficient conjunctive keyword searchable encryption for cloud-based IoT systems","authors":"Tianqi Peng ,&nbsp;Bei Gong ,&nbsp;Chong Guo ,&nbsp;Akhtar Badshah ,&nbsp;Muhammad Waqas ,&nbsp;Hisham Alasmary ,&nbsp;Sheng Chen","doi":"10.1016/j.dcan.2025.03.002","DOIUrl":"10.1016/j.dcan.2025.03.002","url":null,"abstract":"<div><div>Data privacy leakage has always been a critical concern in cloud-based Internet of Things (IoT) systems. Dynamic Symmetric Searchable Encryption (DSSE) with forward and backward privacy aims to address this issue by enabling updates and retrievals of ciphertext on untrusted cloud server while ensuring data privacy. However, previous research on DSSE mostly focused on single keyword search, which limits its practical application in cloud-based IoT systems. Recently, Patranabis (NDSS 2021) <span><span>[1]</span></span> proposed a groundbreaking DSSE scheme for conjunctive keyword search. However, this scheme fails to effectively handle deletion operations in certain circumstances, resulting in inaccurate query results. Additionally, the scheme introduces unnecessary search overhead. To overcome these problems, we present CKSE, an efficient conjunctive keyword DSSE scheme. Our scheme improves the oblivious shared computation protocol used in the scheme of Patranabis, thus enabling a more comprehensive deletion functionality. Furthermore, we introduce a state chain structure to reduce the search overhead. Through security analysis and experimental evaluation, we demonstrate that our CKSE achieves more comprehensive deletion functionality while maintaining comparable search performance and security, compared to the oblivious dynamic cross-tags protocol of Patranabis. The combination of comprehensive functionality, high efficiency, and security makes our CKSE an ideal choice for deployment in cloud-based IoT systems.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1293-1304"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capacity and delay performance analysis for large-scale UAV-enabled wireless networks 大规模无人机无线网络的容量和延迟性能分析
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.009
Bonan Yin, Chenxi Liu, Mugen Peng
In this paper, we analyze the capacity and delay performance of a large-scale Unmanned Aerial Vehicle (UAV)-enabled wireless network, in which untethered and tethered UAVs deployed with content files move along with mobile Ground Users (GUs) to satisfy their coverage and content delivery requests. We consider the case where the untethered UAVs are of limited storage, while the tethered UAVs serve as the cloud when the GUs cannot obtain the required files from the untethered UAVs. We adopt the Ornstein-Uhlenbeck (OU) process to capture the mobility pattern of the UAVs moving along the GUs and derive the compact expressions of the coverage probability and capacity of our considered network. Using tools from martingale theory, we model the traffic at UAVs as a two-tier queueing system. Based on this modeling, we further derive the analytical expressions of the network backlog and delay bounds. Through numerical results, we verify the correctness of our analysis and demonstrate how the capacity and delay performance can be significantly improved by optimizing the percentage of the untethered UAVs with cached contents.
在本文中,我们分析了大型无人机(UAV)无线网络的容量和延迟性能,其中部署有内容文件的非系留和系留无人机与移动地面用户(GUs)一起移动,以满足其覆盖和内容交付要求。我们考虑了非系留无人机存储空间有限的情况,当GUs无法从非系留无人机获取所需文件时,系留无人机充当云。我们采用Ornstein-Uhlenbeck (OU)过程来捕捉无人机沿着GUs移动的移动模式,并推导出我们所考虑的网络的覆盖概率和容量的紧凑表达式。利用鞅理论的工具,我们将无人机的流量建模为一个两层排队系统。在此模型的基础上,进一步推导了网络积压和延迟边界的解析表达式。通过数值结果,我们验证了分析的正确性,并演示了如何通过优化具有缓存内容的无系留无人机的百分比来显着提高容量和延迟性能。
{"title":"Capacity and delay performance analysis for large-scale UAV-enabled wireless networks","authors":"Bonan Yin,&nbsp;Chenxi Liu,&nbsp;Mugen Peng","doi":"10.1016/j.dcan.2024.10.009","DOIUrl":"10.1016/j.dcan.2024.10.009","url":null,"abstract":"<div><div>In this paper, we analyze the capacity and delay performance of a large-scale Unmanned Aerial Vehicle (UAV)-enabled wireless network, in which untethered and tethered UAVs deployed with content files move along with mobile Ground Users (GUs) to satisfy their coverage and content delivery requests. We consider the case where the untethered UAVs are of limited storage, while the tethered UAVs serve as the cloud when the GUs cannot obtain the required files from the untethered UAVs. We adopt the Ornstein-Uhlenbeck (OU) process to capture the mobility pattern of the UAVs moving along the GUs and derive the compact expressions of the coverage probability and capacity of our considered network. Using tools from martingale theory, we model the traffic at UAVs as a two-tier queueing system. Based on this modeling, we further derive the analytical expressions of the network backlog and delay bounds. Through numerical results, we verify the correctness of our analysis and demonstrate how the capacity and delay performance can be significantly improved by optimizing the percentage of the untethered UAVs with cached contents.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1029-1041"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical flow learning for low-light image enhancement 弱光图像增强的分层流学习
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.11.010
Xinlin Yuan, Yong Wang, Yan Li, Hongbo Kang, Yu Chen, Boran Yang
Low-light images often have defects such as low visibility, low contrast, high noise, and high color distortion compared with well-exposed images. If the low-light region of an image is enhanced directly, the noise will inevitably blur the whole image. Besides, according to the retina-and-cortex (retinex) theory of color vision, the reflectivity of different image regions may differ, limiting the enhancement performance of applying uniform operations to the entire image. Therefore, we design a Hierarchical Flow Learning (HFL) framework, which consists of a Hierarchical Image Network (HIN) and a normalized invertible Flow Learning Network (FLN). HIN can extract hierarchical structural features from low-light images, while FLN maps the distribution of normally exposed images to a Gaussian distribution using the learned hierarchical features of low-light images. In subsequent testing, the reversibility of FLN allows inferring and obtaining enhanced low-light images. Specifically, the HIN extracts as much image information as possible from three scales, local, regional, and global, using a Triple-branch Hierarchical Fusion Module (THFM) and a Dual-Dconv Cross Fusion Module (DCFM). The THFM aggregates regional and global features to enhance the overall brightness and quality of low-light images by perceiving and extracting more structure information, whereas the DCFM uses the properties of the activation function and local features to enhance images at the pixel-level to reduce noise and improve contrast. In addition, in this paper, the model was trained using a negative log-likelihood loss function. Qualitative and quantitative experimental results demonstrate that our HFL can better handle many quality degradation types in low-light images compared with state-of-the-art solutions. The HFL model enhances low-light images with better visibility, less noise, and improved contrast, suitable for practical scenarios such as autonomous driving, medical imaging, and nighttime surveillance. Outperforming them by PSNR = 27.26 dB, SSIM = 0.93, and LPIPS = 0.10 on benchmark dataset LOL-v1. The source code of HFL is available at https://github.com/Smile-QT/HFL-for-LIE.
与曝光良好的图像相比,弱光图像通常具有低可见度、低对比度、高噪声和高色彩失真等缺陷。如果直接对图像的弱光区域进行增强,则噪声不可避免地会使整个图像模糊。此外,根据彩色视觉的视网膜和皮层理论,不同图像区域的反射率可能不同,限制了对整个图像进行统一操作的增强效果。因此,我们设计了一个层次图像网络(HIN)和归一化可逆流学习网络(FLN)组成的层次化流学习(HFL)框架。HIN可以从弱光图像中提取层次结构特征,FLN利用学习到的弱光图像层次特征将正常曝光图像的分布映射到高斯分布。在随后的测试中,FLN的可逆性允许推断和获得增强的低光图像。具体来说,HIN使用三分支分层融合模块(THFM)和双dconv交叉融合模块(DCFM)从局部、区域和全局三个尺度提取尽可能多的图像信息。THFM利用区域特征和全局特征的聚合,通过感知和提取更多的结构信息来增强低光图像的整体亮度和质量;DCFM利用激活函数和局部特征的特性,在像素级增强图像,降低噪声,提高对比度。此外,本文还使用负对数似然损失函数对模型进行了训练。定性和定量实验结果表明,与最先进的解决方案相比,我们的HFL可以更好地处理低光图像中的许多质量退化类型。HFL模型增强了低光图像,具有更好的可见度、更少的噪声和更高的对比度,适用于自动驾驶、医疗成像和夜间监视等实际场景。在基准数据集LOL-v1上,PSNR = 27.26 dB, SSIM = 0.93, LPIPS = 0.10优于它们。HFL的源代码可从https://github.com/Smile-QT/HFL-for-LIE获得。
{"title":"Hierarchical flow learning for low-light image enhancement","authors":"Xinlin Yuan,&nbsp;Yong Wang,&nbsp;Yan Li,&nbsp;Hongbo Kang,&nbsp;Yu Chen,&nbsp;Boran Yang","doi":"10.1016/j.dcan.2024.11.010","DOIUrl":"10.1016/j.dcan.2024.11.010","url":null,"abstract":"<div><div>Low-light images often have defects such as low visibility, low contrast, high noise, and high color distortion compared with well-exposed images. If the low-light region of an image is enhanced directly, the noise will inevitably blur the whole image. Besides, according to the retina-and-cortex (retinex) theory of color vision, the reflectivity of different image regions may differ, limiting the enhancement performance of applying uniform operations to the entire image. Therefore, we design a Hierarchical Flow Learning (HFL) framework, which consists of a Hierarchical Image Network (HIN) and a normalized invertible Flow Learning Network (FLN). HIN can extract hierarchical structural features from low-light images, while FLN maps the distribution of normally exposed images to a Gaussian distribution using the learned hierarchical features of low-light images. In subsequent testing, the reversibility of FLN allows inferring and obtaining enhanced low-light images. Specifically, the HIN extracts as much image information as possible from three scales, local, regional, and global, using a Triple-branch Hierarchical Fusion Module (THFM) and a Dual-Dconv Cross Fusion Module (DCFM). The THFM aggregates regional and global features to enhance the overall brightness and quality of low-light images by perceiving and extracting more structure information, whereas the DCFM uses the properties of the activation function and local features to enhance images at the pixel-level to reduce noise and improve contrast. In addition, in this paper, the model was trained using a negative log-likelihood loss function. Qualitative and quantitative experimental results demonstrate that our HFL can better handle many quality degradation types in low-light images compared with state-of-the-art solutions. The HFL model enhances low-light images with better visibility, less noise, and improved contrast, suitable for practical scenarios such as autonomous driving, medical imaging, and nighttime surveillance. Outperforming them by PSNR = 27.26 dB, SSIM = 0.93, and LPIPS = 0.10 on benchmark dataset LOL-v1. The source code of HFL is available at <span><span>https://github.com/Smile-QT/HFL-for-LIE</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1158-1172"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From sensing to energy savings: A comprehensive survey on integrating emerging technologies for energy efficiency in WBANs 从传感到节能:综合调查整合新兴技术提高wban的能源效率
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.11.012
Shumaila Javaid , Hamza Fahim , Sherali Zeadally , Bin He
Energy is essential for human existence, and its high consumption is a growing concern in today's technology-driven society. Global initiatives aim to reduce energy consumption and pollution by developing and deploying energy-efficient sensing technologies for long-term monitoring, control, automation, security, and interactions. Wireless Body Area Networks (WBANs) benefit a lot from the continuous monitoring capabilities of these sensing devices, which include medical sensors worn on or implanted in the human body for healthcare monitoring. Despite significant advancements, achieving energy efficiency in WBANs remains a significant challenge. A deep understanding of the WBAN architecture is essential to identify the causes of its energy inefficiency and develop novel energy-efficient solutions. We investigate energy efficiency issues specific to WBANs. We discuss the transformative impact that artificial intelligence and Machine Learning (ML) can have on achieving the energy efficiency of WBANs. Additionally, we explore the potential of emerging technologies such as quantum computing, nano-technology, biocompatible energy harvesting, and Simultaneous Wireless Information and Power Transfer (SWIPT) in enabling energy efficiency in WBANs. We focus on WBANs' architecture, hardware, and software components to identify key factors responsible for energy consumption in the WBAN environment. Based on our comprehensive review, we introduce an innovative, energy-efficient three-tier architecture for WBANs that employs ML and edge computing to overcome the limitations inherent in existing energy-efficient solutions. Finally, we summarize the lessons learned and highlight future research directions that will enable the development of energy-efficient solutions for WBANs.
能源是人类生存的必需品,在当今技术驱动的社会中,能源的高消费日益引起人们的关注。全球倡议旨在通过开发和部署用于长期监测、控制、自动化、安全和互动的节能传感技术,减少能源消耗和污染。无线体域网络(wban)从这些传感设备的连续监测功能中受益匪浅,这些传感设备包括穿戴在人体上或植入人体以进行医疗监测的医疗传感器。尽管取得了重大进展,但实现wban的能源效率仍然是一项重大挑战。深入了解WBAN架构对于确定其能源效率低下的原因和开发新的节能解决方案至关重要。我们调查了wban特有的能源效率问题。我们讨论了人工智能和机器学习(ML)对实现wban能源效率的变革性影响。此外,我们还探索了新兴技术的潜力,如量子计算、纳米技术、生物相容性能量收集和同步无线信息和电力传输(SWIPT)在实现wban能源效率方面的潜力。我们关注WBAN的架构、硬件和软件组件,以确定在WBAN环境中负责能源消耗的关键因素。基于我们的全面审查,我们为wban引入了一种创新的、节能的三层架构,该架构采用ML和边缘计算来克服现有节能解决方案固有的局限性。最后,我们总结了经验教训,并强调了未来的研究方向,这将使wban节能解决方案的发展成为可能。
{"title":"From sensing to energy savings: A comprehensive survey on integrating emerging technologies for energy efficiency in WBANs","authors":"Shumaila Javaid ,&nbsp;Hamza Fahim ,&nbsp;Sherali Zeadally ,&nbsp;Bin He","doi":"10.1016/j.dcan.2024.11.012","DOIUrl":"10.1016/j.dcan.2024.11.012","url":null,"abstract":"<div><div>Energy is essential for human existence, and its high consumption is a growing concern in today's technology-driven society. Global initiatives aim to reduce energy consumption and pollution by developing and deploying energy-efficient sensing technologies for long-term monitoring, control, automation, security, and interactions. Wireless Body Area Networks (WBANs) benefit a lot from the continuous monitoring capabilities of these sensing devices, which include medical sensors worn on or implanted in the human body for healthcare monitoring. Despite significant advancements, achieving energy efficiency in WBANs remains a significant challenge. A deep understanding of the WBAN architecture is essential to identify the causes of its energy inefficiency and develop novel energy-efficient solutions. We investigate energy efficiency issues specific to WBANs. We discuss the transformative impact that artificial intelligence and Machine Learning (ML) can have on achieving the energy efficiency of WBANs. Additionally, we explore the potential of emerging technologies such as quantum computing, nano-technology, biocompatible energy harvesting, and Simultaneous Wireless Information and Power Transfer (SWIPT) in enabling energy efficiency in WBANs. We focus on WBANs' architecture, hardware, and software components to identify key factors responsible for energy consumption in the WBAN environment. Based on our comprehensive review, we introduce an innovative, energy-efficient three-tier architecture for WBANs that employs ML and edge computing to overcome the limitations inherent in existing energy-efficient solutions. Finally, we summarize the lessons learned and highlight future research directions that will enable the development of energy-efficient solutions for WBANs.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 937-960"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144925897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Digital Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1