首页 > 最新文献

Digital Communications and Networks最新文献

英文 中文
UAV-assisted full-duplex ISAC: Joint communication scheduling, beamforming, and trajectory optimization 无人机辅助全双工ISAC:联合通信调度、波束形成和轨迹优化
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-10-01 DOI: 10.1016/j.dcan.2025.03.001
Yuanshuo Gang, Yuexia Zhang, Xinyi Wang
This paper proposes the Unmanned Aerial Vehicle (UAV)-assisted Full-Duplex (FD) Integrated Sensing And Communication (ISAC) system. In this system, the UAV integrates sensing and communication functions, capable of receiving transmission signals from Uplink (UL) users and echo signal from target, while communicating with Downlink (DL) users and simultaneously detecting target. With the objective of maximizing the Average Sum Rate (ASR) for both UL and DL users, a composite non-convex optimization problem is established, which is decomposed into sub-problems of communication scheduling optimization, transceiver beamforming design, and UAV trajectory optimization. An alternating iterative algorithm is proposed, employing relaxation optimization, extremum traversal search, augmented weighted minimum mean square error, and successive convex approximation methods to solve the aforementioned sub-problems. Simulation results demonstrate that, compared to the traditional UAV-assisted Half-Duplex (HD) ISAC scheme, the proposed FD ISAC scheme effectively improves the ASR.
提出了一种无人机辅助全双工(FD)集成传感与通信(ISAC)系统。在该系统中,UAV集成了传感和通信功能,能够接收来自上行链路(UL)用户的传输信号和来自目标的回波信号,同时与下行链路(DL)用户通信并同时探测目标。以UL和DL用户的平均和速率(ASR)最大化为目标,建立了一个复合非凸优化问题,将其分解为通信调度优化、收发机波束成形设计和无人机轨迹优化等子问题。提出了一种交替迭代算法,利用松弛优化、极值遍历搜索、增广加权最小均方误差和逐次凸逼近等方法求解上述子问题。仿真结果表明,与传统的无人机辅助半双工(HD) ISAC方案相比,FD ISAC方案有效提高了ASR。
{"title":"UAV-assisted full-duplex ISAC: Joint communication scheduling, beamforming, and trajectory optimization","authors":"Yuanshuo Gang,&nbsp;Yuexia Zhang,&nbsp;Xinyi Wang","doi":"10.1016/j.dcan.2025.03.001","DOIUrl":"10.1016/j.dcan.2025.03.001","url":null,"abstract":"<div><div>This paper proposes the Unmanned Aerial Vehicle (UAV)-assisted Full-Duplex (FD) Integrated Sensing And Communication (ISAC) system. In this system, the UAV integrates sensing and communication functions, capable of receiving transmission signals from Uplink (UL) users and echo signal from target, while communicating with Downlink (DL) users and simultaneously detecting target. With the objective of maximizing the Average Sum Rate (ASR) for both UL and DL users, a composite non-convex optimization problem is established, which is decomposed into sub-problems of communication scheduling optimization, transceiver beamforming design, and UAV trajectory optimization. An alternating iterative algorithm is proposed, employing relaxation optimization, extremum traversal search, augmented weighted minimum mean square error, and successive convex approximation methods to solve the aforementioned sub-problems. Simulation results demonstrate that, compared to the traditional UAV-assisted Half-Duplex (HD) ISAC scheme, the proposed FD ISAC scheme effectively improves the ASR.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 5","pages":"Pages 1628-1638"},"PeriodicalIF":7.5,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145529446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covert wireless communication over uplink satellite-terrestrial network 通过上行卫星-地面网络进行隐蔽无线通信
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-10-01 DOI: 10.1016/j.dcan.2025.03.009
Shulei Zeng , Bin Cao , Mugen Peng , Shuo Wang , Chen Sun
The emerging deployment of large-scale Low Earth Orbit (LEO) satellite constellations provides seamless global coverage. However, the increasing number of satellites also introduces significant security challenges, such as eavesdropping and illegal communication behavior detection. This paper investigates covert wireless communication over uplink satellite-terrestrial network, focusing on scenarios with warden satellites. By accounting for shot noise generated by ambient signals from terrestrial interferers, the terrestrial transmitter Alice can effectively hide its signal from warden satellites. Leveraging stochastic geometry, the distributions of distances between transmitter and satellites are analyzed, enabling the assessment of uplink performance and interference within a satellite's coverage area. Approximate expressions for detection error probability and transmission outage probability are derived. Based on the theoretical analysis, an optimal scheme is proposed to maximize covert throughput under the constraint of the average detection error probability of the most detrimental warden satellite. Extensive Monte Carlo simulations experiments are conducted to validate the accuracy of analytical methods for evaluating covert performance.
新兴的大规模低地球轨道(LEO)卫星星座部署提供了无缝的全球覆盖。然而,卫星数量的增加也带来了重大的安全挑战,如窃听和非法通信行为的检测。本文研究了卫星-地面上行网络的隐蔽无线通信,重点研究了有监狱长卫星的场景。考虑到地面干扰产生的环境信号产生的散点噪声,地面发射机爱丽丝可以有效地隐藏其信号对监狱长卫星。利用随机几何,分析发射机和卫星之间的距离分布,从而能够评估上行链路性能和卫星覆盖区域内的干扰。导出了检测误差概率和传输中断概率的近似表达式。在理论分析的基础上,提出了一种以最不利监视卫星的平均探测误差概率为约束条件下最大隐蔽吞吐量的优化方案。进行了大量的蒙特卡罗模拟实验,以验证评估隐蔽性能的分析方法的准确性。
{"title":"Covert wireless communication over uplink satellite-terrestrial network","authors":"Shulei Zeng ,&nbsp;Bin Cao ,&nbsp;Mugen Peng ,&nbsp;Shuo Wang ,&nbsp;Chen Sun","doi":"10.1016/j.dcan.2025.03.009","DOIUrl":"10.1016/j.dcan.2025.03.009","url":null,"abstract":"<div><div>The emerging deployment of large-scale Low Earth Orbit (LEO) satellite constellations provides seamless global coverage. However, the increasing number of satellites also introduces significant security challenges, such as eavesdropping and illegal communication behavior detection. This paper investigates covert wireless communication over uplink satellite-terrestrial network, focusing on scenarios with warden satellites. By accounting for shot noise generated by ambient signals from terrestrial interferers, the terrestrial transmitter Alice can effectively hide its signal from warden satellites. Leveraging stochastic geometry, the distributions of distances between transmitter and satellites are analyzed, enabling the assessment of uplink performance and interference within a satellite's coverage area. Approximate expressions for detection error probability and transmission outage probability are derived. Based on the theoretical analysis, an optimal scheme is proposed to maximize covert throughput under the constraint of the average detection error probability of the most detrimental warden satellite. Extensive Monte Carlo simulations experiments are conducted to validate the accuracy of analytical methods for evaluating covert performance.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 5","pages":"Pages 1318-1329"},"PeriodicalIF":7.5,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145529499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient conjunctive keyword searchable encryption for cloud-based IoT systems 基于云的物联网系统的高效连接关键字可搜索加密
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2025.03.002
Tianqi Peng , Bei Gong , Chong Guo , Akhtar Badshah , Muhammad Waqas , Hisham Alasmary , Sheng Chen
Data privacy leakage has always been a critical concern in cloud-based Internet of Things (IoT) systems. Dynamic Symmetric Searchable Encryption (DSSE) with forward and backward privacy aims to address this issue by enabling updates and retrievals of ciphertext on untrusted cloud server while ensuring data privacy. However, previous research on DSSE mostly focused on single keyword search, which limits its practical application in cloud-based IoT systems. Recently, Patranabis (NDSS 2021) [1] proposed a groundbreaking DSSE scheme for conjunctive keyword search. However, this scheme fails to effectively handle deletion operations in certain circumstances, resulting in inaccurate query results. Additionally, the scheme introduces unnecessary search overhead. To overcome these problems, we present CKSE, an efficient conjunctive keyword DSSE scheme. Our scheme improves the oblivious shared computation protocol used in the scheme of Patranabis, thus enabling a more comprehensive deletion functionality. Furthermore, we introduce a state chain structure to reduce the search overhead. Through security analysis and experimental evaluation, we demonstrate that our CKSE achieves more comprehensive deletion functionality while maintaining comparable search performance and security, compared to the oblivious dynamic cross-tags protocol of Patranabis. The combination of comprehensive functionality, high efficiency, and security makes our CKSE an ideal choice for deployment in cloud-based IoT systems.
在基于云的物联网(IoT)系统中,数据隐私泄露一直是一个关键问题。具有前向和后向隐私的动态对称可搜索加密(DSSE)旨在通过支持在不受信任的云服务器上更新和检索密文,同时确保数据隐私来解决此问题。然而,以往对DSSE的研究多集中在单一关键字搜索上,限制了其在基于云的物联网系统中的实际应用。最近,Patranabis (NDSS 2021)[1]提出了一个开创性的连接关键字搜索DSSE方案。但该方案在某些情况下不能有效处理删除操作,导致查询结果不准确。此外,该方案还引入了不必要的搜索开销。为了克服这些问题,我们提出了一种高效的连接关键字DSSE方案——CKSE。我们的方案改进了Patranabis方案中使用的遗忘共享计算协议,从而实现了更全面的删除功能。此外,我们引入了状态链结构来减少搜索开销。通过安全性分析和实验评估,我们证明与Patranabis的无意识动态交叉标签协议相比,我们的CKSE在保持相当的搜索性能和安全性的同时实现了更全面的删除功能。全面的功能,高效率和安全性的结合使我们的CKSE成为部署在基于云的物联网系统中的理想选择。
{"title":"An efficient conjunctive keyword searchable encryption for cloud-based IoT systems","authors":"Tianqi Peng ,&nbsp;Bei Gong ,&nbsp;Chong Guo ,&nbsp;Akhtar Badshah ,&nbsp;Muhammad Waqas ,&nbsp;Hisham Alasmary ,&nbsp;Sheng Chen","doi":"10.1016/j.dcan.2025.03.002","DOIUrl":"10.1016/j.dcan.2025.03.002","url":null,"abstract":"<div><div>Data privacy leakage has always been a critical concern in cloud-based Internet of Things (IoT) systems. Dynamic Symmetric Searchable Encryption (DSSE) with forward and backward privacy aims to address this issue by enabling updates and retrievals of ciphertext on untrusted cloud server while ensuring data privacy. However, previous research on DSSE mostly focused on single keyword search, which limits its practical application in cloud-based IoT systems. Recently, Patranabis (NDSS 2021) <span><span>[1]</span></span> proposed a groundbreaking DSSE scheme for conjunctive keyword search. However, this scheme fails to effectively handle deletion operations in certain circumstances, resulting in inaccurate query results. Additionally, the scheme introduces unnecessary search overhead. To overcome these problems, we present CKSE, an efficient conjunctive keyword DSSE scheme. Our scheme improves the oblivious shared computation protocol used in the scheme of Patranabis, thus enabling a more comprehensive deletion functionality. Furthermore, we introduce a state chain structure to reduce the search overhead. Through security analysis and experimental evaluation, we demonstrate that our CKSE achieves more comprehensive deletion functionality while maintaining comparable search performance and security, compared to the oblivious dynamic cross-tags protocol of Patranabis. The combination of comprehensive functionality, high efficiency, and security makes our CKSE an ideal choice for deployment in cloud-based IoT systems.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1293-1304"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capacity and delay performance analysis for large-scale UAV-enabled wireless networks 大规模无人机无线网络的容量和延迟性能分析
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.009
Bonan Yin, Chenxi Liu, Mugen Peng
In this paper, we analyze the capacity and delay performance of a large-scale Unmanned Aerial Vehicle (UAV)-enabled wireless network, in which untethered and tethered UAVs deployed with content files move along with mobile Ground Users (GUs) to satisfy their coverage and content delivery requests. We consider the case where the untethered UAVs are of limited storage, while the tethered UAVs serve as the cloud when the GUs cannot obtain the required files from the untethered UAVs. We adopt the Ornstein-Uhlenbeck (OU) process to capture the mobility pattern of the UAVs moving along the GUs and derive the compact expressions of the coverage probability and capacity of our considered network. Using tools from martingale theory, we model the traffic at UAVs as a two-tier queueing system. Based on this modeling, we further derive the analytical expressions of the network backlog and delay bounds. Through numerical results, we verify the correctness of our analysis and demonstrate how the capacity and delay performance can be significantly improved by optimizing the percentage of the untethered UAVs with cached contents.
在本文中,我们分析了大型无人机(UAV)无线网络的容量和延迟性能,其中部署有内容文件的非系留和系留无人机与移动地面用户(GUs)一起移动,以满足其覆盖和内容交付要求。我们考虑了非系留无人机存储空间有限的情况,当GUs无法从非系留无人机获取所需文件时,系留无人机充当云。我们采用Ornstein-Uhlenbeck (OU)过程来捕捉无人机沿着GUs移动的移动模式,并推导出我们所考虑的网络的覆盖概率和容量的紧凑表达式。利用鞅理论的工具,我们将无人机的流量建模为一个两层排队系统。在此模型的基础上,进一步推导了网络积压和延迟边界的解析表达式。通过数值结果,我们验证了分析的正确性,并演示了如何通过优化具有缓存内容的无系留无人机的百分比来显着提高容量和延迟性能。
{"title":"Capacity and delay performance analysis for large-scale UAV-enabled wireless networks","authors":"Bonan Yin,&nbsp;Chenxi Liu,&nbsp;Mugen Peng","doi":"10.1016/j.dcan.2024.10.009","DOIUrl":"10.1016/j.dcan.2024.10.009","url":null,"abstract":"<div><div>In this paper, we analyze the capacity and delay performance of a large-scale Unmanned Aerial Vehicle (UAV)-enabled wireless network, in which untethered and tethered UAVs deployed with content files move along with mobile Ground Users (GUs) to satisfy their coverage and content delivery requests. We consider the case where the untethered UAVs are of limited storage, while the tethered UAVs serve as the cloud when the GUs cannot obtain the required files from the untethered UAVs. We adopt the Ornstein-Uhlenbeck (OU) process to capture the mobility pattern of the UAVs moving along the GUs and derive the compact expressions of the coverage probability and capacity of our considered network. Using tools from martingale theory, we model the traffic at UAVs as a two-tier queueing system. Based on this modeling, we further derive the analytical expressions of the network backlog and delay bounds. Through numerical results, we verify the correctness of our analysis and demonstrate how the capacity and delay performance can be significantly improved by optimizing the percentage of the untethered UAVs with cached contents.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1029-1041"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical flow learning for low-light image enhancement 弱光图像增强的分层流学习
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.11.010
Xinlin Yuan, Yong Wang, Yan Li, Hongbo Kang, Yu Chen, Boran Yang
Low-light images often have defects such as low visibility, low contrast, high noise, and high color distortion compared with well-exposed images. If the low-light region of an image is enhanced directly, the noise will inevitably blur the whole image. Besides, according to the retina-and-cortex (retinex) theory of color vision, the reflectivity of different image regions may differ, limiting the enhancement performance of applying uniform operations to the entire image. Therefore, we design a Hierarchical Flow Learning (HFL) framework, which consists of a Hierarchical Image Network (HIN) and a normalized invertible Flow Learning Network (FLN). HIN can extract hierarchical structural features from low-light images, while FLN maps the distribution of normally exposed images to a Gaussian distribution using the learned hierarchical features of low-light images. In subsequent testing, the reversibility of FLN allows inferring and obtaining enhanced low-light images. Specifically, the HIN extracts as much image information as possible from three scales, local, regional, and global, using a Triple-branch Hierarchical Fusion Module (THFM) and a Dual-Dconv Cross Fusion Module (DCFM). The THFM aggregates regional and global features to enhance the overall brightness and quality of low-light images by perceiving and extracting more structure information, whereas the DCFM uses the properties of the activation function and local features to enhance images at the pixel-level to reduce noise and improve contrast. In addition, in this paper, the model was trained using a negative log-likelihood loss function. Qualitative and quantitative experimental results demonstrate that our HFL can better handle many quality degradation types in low-light images compared with state-of-the-art solutions. The HFL model enhances low-light images with better visibility, less noise, and improved contrast, suitable for practical scenarios such as autonomous driving, medical imaging, and nighttime surveillance. Outperforming them by PSNR = 27.26 dB, SSIM = 0.93, and LPIPS = 0.10 on benchmark dataset LOL-v1. The source code of HFL is available at https://github.com/Smile-QT/HFL-for-LIE.
与曝光良好的图像相比,弱光图像通常具有低可见度、低对比度、高噪声和高色彩失真等缺陷。如果直接对图像的弱光区域进行增强,则噪声不可避免地会使整个图像模糊。此外,根据彩色视觉的视网膜和皮层理论,不同图像区域的反射率可能不同,限制了对整个图像进行统一操作的增强效果。因此,我们设计了一个层次图像网络(HIN)和归一化可逆流学习网络(FLN)组成的层次化流学习(HFL)框架。HIN可以从弱光图像中提取层次结构特征,FLN利用学习到的弱光图像层次特征将正常曝光图像的分布映射到高斯分布。在随后的测试中,FLN的可逆性允许推断和获得增强的低光图像。具体来说,HIN使用三分支分层融合模块(THFM)和双dconv交叉融合模块(DCFM)从局部、区域和全局三个尺度提取尽可能多的图像信息。THFM利用区域特征和全局特征的聚合,通过感知和提取更多的结构信息来增强低光图像的整体亮度和质量;DCFM利用激活函数和局部特征的特性,在像素级增强图像,降低噪声,提高对比度。此外,本文还使用负对数似然损失函数对模型进行了训练。定性和定量实验结果表明,与最先进的解决方案相比,我们的HFL可以更好地处理低光图像中的许多质量退化类型。HFL模型增强了低光图像,具有更好的可见度、更少的噪声和更高的对比度,适用于自动驾驶、医疗成像和夜间监视等实际场景。在基准数据集LOL-v1上,PSNR = 27.26 dB, SSIM = 0.93, LPIPS = 0.10优于它们。HFL的源代码可从https://github.com/Smile-QT/HFL-for-LIE获得。
{"title":"Hierarchical flow learning for low-light image enhancement","authors":"Xinlin Yuan,&nbsp;Yong Wang,&nbsp;Yan Li,&nbsp;Hongbo Kang,&nbsp;Yu Chen,&nbsp;Boran Yang","doi":"10.1016/j.dcan.2024.11.010","DOIUrl":"10.1016/j.dcan.2024.11.010","url":null,"abstract":"<div><div>Low-light images often have defects such as low visibility, low contrast, high noise, and high color distortion compared with well-exposed images. If the low-light region of an image is enhanced directly, the noise will inevitably blur the whole image. Besides, according to the retina-and-cortex (retinex) theory of color vision, the reflectivity of different image regions may differ, limiting the enhancement performance of applying uniform operations to the entire image. Therefore, we design a Hierarchical Flow Learning (HFL) framework, which consists of a Hierarchical Image Network (HIN) and a normalized invertible Flow Learning Network (FLN). HIN can extract hierarchical structural features from low-light images, while FLN maps the distribution of normally exposed images to a Gaussian distribution using the learned hierarchical features of low-light images. In subsequent testing, the reversibility of FLN allows inferring and obtaining enhanced low-light images. Specifically, the HIN extracts as much image information as possible from three scales, local, regional, and global, using a Triple-branch Hierarchical Fusion Module (THFM) and a Dual-Dconv Cross Fusion Module (DCFM). The THFM aggregates regional and global features to enhance the overall brightness and quality of low-light images by perceiving and extracting more structure information, whereas the DCFM uses the properties of the activation function and local features to enhance images at the pixel-level to reduce noise and improve contrast. In addition, in this paper, the model was trained using a negative log-likelihood loss function. Qualitative and quantitative experimental results demonstrate that our HFL can better handle many quality degradation types in low-light images compared with state-of-the-art solutions. The HFL model enhances low-light images with better visibility, less noise, and improved contrast, suitable for practical scenarios such as autonomous driving, medical imaging, and nighttime surveillance. Outperforming them by PSNR = 27.26 dB, SSIM = 0.93, and LPIPS = 0.10 on benchmark dataset LOL-v1. The source code of HFL is available at <span><span>https://github.com/Smile-QT/HFL-for-LIE</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1158-1172"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From sensing to energy savings: A comprehensive survey on integrating emerging technologies for energy efficiency in WBANs 从传感到节能:综合调查整合新兴技术提高wban的能源效率
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.11.012
Shumaila Javaid , Hamza Fahim , Sherali Zeadally , Bin He
Energy is essential for human existence, and its high consumption is a growing concern in today's technology-driven society. Global initiatives aim to reduce energy consumption and pollution by developing and deploying energy-efficient sensing technologies for long-term monitoring, control, automation, security, and interactions. Wireless Body Area Networks (WBANs) benefit a lot from the continuous monitoring capabilities of these sensing devices, which include medical sensors worn on or implanted in the human body for healthcare monitoring. Despite significant advancements, achieving energy efficiency in WBANs remains a significant challenge. A deep understanding of the WBAN architecture is essential to identify the causes of its energy inefficiency and develop novel energy-efficient solutions. We investigate energy efficiency issues specific to WBANs. We discuss the transformative impact that artificial intelligence and Machine Learning (ML) can have on achieving the energy efficiency of WBANs. Additionally, we explore the potential of emerging technologies such as quantum computing, nano-technology, biocompatible energy harvesting, and Simultaneous Wireless Information and Power Transfer (SWIPT) in enabling energy efficiency in WBANs. We focus on WBANs' architecture, hardware, and software components to identify key factors responsible for energy consumption in the WBAN environment. Based on our comprehensive review, we introduce an innovative, energy-efficient three-tier architecture for WBANs that employs ML and edge computing to overcome the limitations inherent in existing energy-efficient solutions. Finally, we summarize the lessons learned and highlight future research directions that will enable the development of energy-efficient solutions for WBANs.
能源是人类生存的必需品,在当今技术驱动的社会中,能源的高消费日益引起人们的关注。全球倡议旨在通过开发和部署用于长期监测、控制、自动化、安全和互动的节能传感技术,减少能源消耗和污染。无线体域网络(wban)从这些传感设备的连续监测功能中受益匪浅,这些传感设备包括穿戴在人体上或植入人体以进行医疗监测的医疗传感器。尽管取得了重大进展,但实现wban的能源效率仍然是一项重大挑战。深入了解WBAN架构对于确定其能源效率低下的原因和开发新的节能解决方案至关重要。我们调查了wban特有的能源效率问题。我们讨论了人工智能和机器学习(ML)对实现wban能源效率的变革性影响。此外,我们还探索了新兴技术的潜力,如量子计算、纳米技术、生物相容性能量收集和同步无线信息和电力传输(SWIPT)在实现wban能源效率方面的潜力。我们关注WBAN的架构、硬件和软件组件,以确定在WBAN环境中负责能源消耗的关键因素。基于我们的全面审查,我们为wban引入了一种创新的、节能的三层架构,该架构采用ML和边缘计算来克服现有节能解决方案固有的局限性。最后,我们总结了经验教训,并强调了未来的研究方向,这将使wban节能解决方案的发展成为可能。
{"title":"From sensing to energy savings: A comprehensive survey on integrating emerging technologies for energy efficiency in WBANs","authors":"Shumaila Javaid ,&nbsp;Hamza Fahim ,&nbsp;Sherali Zeadally ,&nbsp;Bin He","doi":"10.1016/j.dcan.2024.11.012","DOIUrl":"10.1016/j.dcan.2024.11.012","url":null,"abstract":"<div><div>Energy is essential for human existence, and its high consumption is a growing concern in today's technology-driven society. Global initiatives aim to reduce energy consumption and pollution by developing and deploying energy-efficient sensing technologies for long-term monitoring, control, automation, security, and interactions. Wireless Body Area Networks (WBANs) benefit a lot from the continuous monitoring capabilities of these sensing devices, which include medical sensors worn on or implanted in the human body for healthcare monitoring. Despite significant advancements, achieving energy efficiency in WBANs remains a significant challenge. A deep understanding of the WBAN architecture is essential to identify the causes of its energy inefficiency and develop novel energy-efficient solutions. We investigate energy efficiency issues specific to WBANs. We discuss the transformative impact that artificial intelligence and Machine Learning (ML) can have on achieving the energy efficiency of WBANs. Additionally, we explore the potential of emerging technologies such as quantum computing, nano-technology, biocompatible energy harvesting, and Simultaneous Wireless Information and Power Transfer (SWIPT) in enabling energy efficiency in WBANs. We focus on WBANs' architecture, hardware, and software components to identify key factors responsible for energy consumption in the WBAN environment. Based on our comprehensive review, we introduce an innovative, energy-efficient three-tier architecture for WBANs that employs ML and edge computing to overcome the limitations inherent in existing energy-efficient solutions. Finally, we summarize the lessons learned and highlight future research directions that will enable the development of energy-efficient solutions for WBANs.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 937-960"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144925897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Content-aware robust semantic transmission of images over wireless channels with GANs 基于gan的无线信道图像内容感知鲁棒语义传输
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.12.001
Xuyang Chen , Daquan Feng , Qi He , Yao Sun , Gaojie Chen , Xiang-Gen Xia
Semantic Communication (SemCom) can significantly reduce the transmitted data volume and keep robustness. Task-oriented SemCom of images aims to convey the implicit meaning of source messages correctly, rather than achieving precise bit-by-bit reconstruction. Existing image SemCom systems directly perform semantic encoding and decoding on the entire image, which has not considered the correlation between image content and downstream tasks or the adaptability to channel noise. To this end, we propose a content-aware robust SemCom framework for image transmission based on Generative Adversarial Networks (GANs). Specifically, the accurate semantics of the image are extracted by the semantic encoder, and divided into two parts for different downstream tasks: Regions of Interest (ROI) and Regions of Non-Interest (RONI). By reducing the quantization accuracy of RONI, the amount of transmitted data volume is reduced significantly. During the transmission process of semantics, a Signal-to-Noise Ratio (SNR) is randomly initialized, enabling the model to learn the average noise distribution. The experimental results demonstrate that by reducing the quantization level of RONI, transmitted data volume is reduced up to 60.53% compared to using globally consistent quantization while maintaining comparable performance to existing methods in downstream semantic segmentation tasks. Moreover, our model exhibits increased robustness with variable SNRs.
语义通信(SemCom)可以显著减少传输数据量并保持鲁棒性。面向任务的图像SemCom的目的是正确传达源消息的隐含意义,而不是实现精确的逐位重构。现有的图像SemCom系统直接对整个图像进行语义编码和解码,没有考虑图像内容与下游任务之间的相关性以及对信道噪声的适应性。为此,我们提出了一种基于生成对抗网络(GANs)的内容感知鲁棒SemCom图像传输框架。具体而言,通过语义编码器提取图像的准确语义,并将其分为两部分,分别用于不同的下游任务:感兴趣区域(ROI)和非感兴趣区域(RONI)。通过降低RONI的量化精度,可以显著减少传输的数据量。在语义传递过程中,随机初始化信噪比(SNR),使模型能够学习平均噪声分布。实验结果表明,与使用全局一致量化相比,通过降低RONI的量化水平,传输数据量减少了60.53%,同时在下游语义分割任务中保持了与现有方法相当的性能。此外,我们的模型在可变信噪比下表现出更高的鲁棒性。
{"title":"Content-aware robust semantic transmission of images over wireless channels with GANs","authors":"Xuyang Chen ,&nbsp;Daquan Feng ,&nbsp;Qi He ,&nbsp;Yao Sun ,&nbsp;Gaojie Chen ,&nbsp;Xiang-Gen Xia","doi":"10.1016/j.dcan.2024.12.001","DOIUrl":"10.1016/j.dcan.2024.12.001","url":null,"abstract":"<div><div>Semantic Communication (SemCom) can significantly reduce the transmitted data volume and keep robustness. Task-oriented SemCom of images aims to convey the implicit meaning of source messages correctly, rather than achieving precise bit-by-bit reconstruction. Existing image SemCom systems directly perform semantic encoding and decoding on the entire image, which has not considered the correlation between image content and downstream tasks or the adaptability to channel noise. To this end, we propose a content-aware robust SemCom framework for image transmission based on Generative Adversarial Networks (GANs). Specifically, the accurate semantics of the image are extracted by the semantic encoder, and divided into two parts for different downstream tasks: Regions of Interest (ROI) and Regions of Non-Interest (RONI). By reducing the quantization accuracy of RONI, the amount of transmitted data volume is reduced significantly. During the transmission process of semantics, a Signal-to-Noise Ratio (SNR) is randomly initialized, enabling the model to learn the average noise distribution. The experimental results demonstrate that by reducing the quantization level of RONI, transmitted data volume is reduced up to 60.53% compared to using globally consistent quantization while maintaining comparable performance to existing methods in downstream semantic segmentation tasks. Moreover, our model exhibits increased robustness with variable SNRs.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1205-1213"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedStrag: Straggler-aware federated learning for low resource devices FedStrag:用于低资源设备的离散感知联邦学习
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.12.004
Aditya Kumar, Satish Narayana Srirama
Federated Learning (FL) has become a popular training paradigm in recent years. However, stragglers are critical bottlenecks in an Internet of Things (IoT) network while training. These nodes produce stale updates to the server, which slow down the convergence. In this paper, we studied the impact of the stale updates on the global model, which is observed to be significant. To address this, we propose a weighted averaging scheme, FedStrag, that optimizes the training with stale updates. The work is focused on training a model in an IoT network that has multiple challenges, such as resource constraints, stragglers, network issues, device heterogeneity, etc. To this end, we developed a time-bounded asynchronous FL paradigm that can train a model on the continuous inflow of data in the edge-fog-cloud continuum. To test the FedStrag approach, a model is trained with multiple stragglers scenarios on both Independent and Identically Distributed (IID) and non-IID datasets on Raspberry Pis. The experiment results suggest that the FedStrag outperforms the baseline FedAvg in all possible cases.
近年来,联邦学习(FL)已成为一种流行的训练模式。然而,在训练时,掉队者是物联网(IoT)网络的关键瓶颈。这些节点对服务器产生过时的更新,从而减慢了收敛速度。在本文中,我们研究了陈旧更新对全球模式的影响,观察到这种影响是显著的。为了解决这个问题,我们提出了一个加权平均方案,FedStrag,它通过陈旧的更新来优化训练。这项工作的重点是在具有多种挑战的物联网网络中训练模型,例如资源约束、掉队者、网络问题、设备异构等。为此,我们开发了一个有时间限制的异步FL范例,可以在边缘-雾-云连续体中连续流入的数据上训练模型。为了测试fedstrg方法,在Raspberry Pis上使用独立和同分布(IID)和非IID数据集上的多个离散场景训练模型。实验结果表明,在所有可能的情况下,FedStrag都优于基线fedag。
{"title":"FedStrag: Straggler-aware federated learning for low resource devices","authors":"Aditya Kumar,&nbsp;Satish Narayana Srirama","doi":"10.1016/j.dcan.2024.12.004","DOIUrl":"10.1016/j.dcan.2024.12.004","url":null,"abstract":"<div><div>Federated Learning (FL) has become a popular training paradigm in recent years. However, stragglers are critical bottlenecks in an Internet of Things (IoT) network while training. These nodes produce stale updates to the server, which slow down the convergence. In this paper, we studied the impact of the stale updates on the global model, which is observed to be significant. To address this, we propose a weighted averaging scheme, FedStrag, that optimizes the training with stale updates. The work is focused on training a model in an IoT network that has multiple challenges, such as resource constraints, stragglers, network issues, device heterogeneity, etc. To this end, we developed a time-bounded asynchronous FL paradigm that can train a model on the continuous inflow of data in the edge-fog-cloud continuum. To test the FedStrag approach, a model is trained with multiple stragglers scenarios on both Independent and Identically Distributed (IID) and non-IID datasets on Raspberry Pis. The experiment results suggest that the FedStrag outperforms the baseline FedAvg in all possible cases.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1214-1224"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heterogeneous radio frequency/underwater optical wireless communication relaying systems with MIMO scheme MIMO方案的异构射频/水下光无线通信中继系统
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.008
Sai Li , Liang Yang , Yusheng Sun , Qianfen Jiao
This paper studies a cooperative relay transmission system within the framework of Multiple-Input Multiple-Output Radio Frequency/Underwater Optical Wireless Communication (MIMO-RF/UOWC), aiming to establish sea-based heterogeneous networks. In this setup, the RF links obey κ-μ fading, while the UOWC links undergo the generalized Gamma fading with the pointing error impairments. The relay operates under an Amplify-and-Forward (AF) protocol. Additionally, the attenuation caused by the Absorption and Scattering (AaS) is considered in UOWC links. The work yields precise results for the Average Channel Capacity (ACC), Outage Probability (OP), and average Bit Error Rate (BER). Furthermore, to reveal deeper insights, bounds on the ACC and asymptotic results for the OP and average BER are derived. The findings highlight the superior performance of MIMO-RF/UOWC AF systems compared to Single-Input-Single-Output (SISO)-RF/UOWC AF systems. Various factors affecting the Diversity Gain (DG) of the MIMO-RF/UOWC AF system include the number of antennas/apertures, fading parameters of both links, and pointing error parameters. Moreover, while an increase in the AaS effect can result in significant attenuation, it does not determine the achievable DG of the proposed MIMO-RF/UOWC AF relaying system.
本文研究了多输入多输出射频/水下光无线通信(MIMO-RF/UOWC)框架下的协同中继传输系统,旨在建立海基异构网络。在这种情况下,射频链路服从κ-μ衰落,而UOWC链路则服从广义伽玛衰落,并伴有指向误差损害。继电器在放大和转发(AF)协议下工作。此外,在UOWC链路中考虑了由吸收和散射(AaS)引起的衰减。这项工作得到了平均信道容量(ACC)、中断概率(OP)和平均误码率(BER)的精确结果。此外,为了揭示更深入的见解,推导了ACC的界以及OP和平均BER的渐近结果。研究结果强调了MIMO-RF/UOWC AF系统与单输入-单输出(SISO)-RF/UOWC AF系统相比的优越性能。影响MIMO-RF/UOWC自动对焦系统分集增益(DG)的因素包括天线数量/孔径、链路衰落参数和指向误差参数。此外,虽然AaS效应的增加会导致显著的衰减,但它并不能决定所提出的MIMO-RF/UOWC AF中继系统的可实现DG。
{"title":"Heterogeneous radio frequency/underwater optical wireless communication relaying systems with MIMO scheme","authors":"Sai Li ,&nbsp;Liang Yang ,&nbsp;Yusheng Sun ,&nbsp;Qianfen Jiao","doi":"10.1016/j.dcan.2024.10.008","DOIUrl":"10.1016/j.dcan.2024.10.008","url":null,"abstract":"<div><div>This paper studies a cooperative relay transmission system within the framework of Multiple-Input Multiple-Output Radio Frequency/Underwater Optical Wireless Communication (MIMO-RF/UOWC), aiming to establish sea-based heterogeneous networks. In this setup, the RF links obey <em>κ</em>-<em>μ</em> fading, while the UOWC links undergo the generalized Gamma fading with the pointing error impairments. The relay operates under an Amplify-and-Forward (AF) protocol. Additionally, the attenuation caused by the Absorption and Scattering (AaS) is considered in UOWC links. The work yields precise results for the Average Channel Capacity (ACC), Outage Probability (OP), and average Bit Error Rate (BER). Furthermore, to reveal deeper insights, bounds on the ACC and asymptotic results for the OP and average BER are derived. The findings highlight the superior performance of MIMO-RF/UOWC AF systems compared to Single-Input-Single-Output (SISO)-RF/UOWC AF systems. Various factors affecting the Diversity Gain (DG) of the MIMO-RF/UOWC AF system include the number of antennas/apertures, fading parameters of both links, and pointing error parameters. Moreover, while an increase in the AaS effect can result in significant attenuation, it does not determine the achievable DG of the proposed MIMO-RF/UOWC AF relaying system.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1018-1028"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint jammer selection and power optimization in covert communications against a warden with uncertain locations 联合干扰机选择和能量优化在秘密通信中对抗一个不确定位置的典狱长
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.019
Zhijun Han , Yiqing Zhou , Yu Zhang , Tong-Xing Zheng , Ling Liu , Jinglin Shi
In covert communications, joint jammer selection and power optimization are important to improve performance. However, existing schemes usually assume a warden with a known location and perfect Channel State Information (CSI), which is difficult to achieve in practice. To be more practical, it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI, which makes it difficult for legitimate transceivers to estimate the detection probability of the warden. First, the uncertainty caused by the unknown warden location must be removed, and the Optimal Detection Position (OPTDP) of the warden is derived which can provide the best detection performance (i.e., the worst case for a covert communication). Then, to further avoid the impractical assumption of perfect CSI, the covert throughput is maximized using only the channel distribution information. Given this OPTDP based worst case for covert communications, the jammer selection, the jamming power, the transmission power, and the transmission rate are jointly optimized to maximize the covert throughput (OPTDP-JP). To solve this coupling problem, a Heuristic algorithm based on Maximum Distance Ratio (H-MAXDR) is proposed to provide a sub-optimal solution. First, according to the analysis of the covert throughput, the node with the maximum distance ratio (i.e., the ratio of the distances from the jammer to the receiver and that to the warden) is selected as the friendly jammer (MAXDR). Then, the optimal transmission and jamming power can be derived, followed by the optimal transmission rate obtained via the bisection method. In numerical and simulation results, it is shown that although the location of the warden is unknown, by assuming the OPTDP of the warden, the proposed OPTDP-JP can always satisfy the covertness constraint. In addition, with an uncertain warden and imperfect CSI, the covert throughput provided by OPTDP-JP is 80% higher than the existing schemes when the covertness constraint is 0.9, showing the effectiveness of OPTDP-JP.
在隐蔽通信中,联合干扰机的选择和功率优化对提高通信性能至关重要。然而,现有的方案通常假设一个具有已知位置和完善的信道状态信息(CSI)的监狱长,这在实践中很难实现。更实际的是,调查针对不确定位置和不完善CSI的监狱长的秘密通信非常重要,这使得合法收发器难以估计监狱长的检测概率。首先,必须消除未知监狱长位置所带来的不确定性,并推导出监狱长的最佳检测位置(OPTDP),该位置可以提供最佳的检测性能(即隐蔽通信的最坏情况)。然后,为了进一步避免不切实际的完美CSI假设,仅使用信道分布信息最大化隐蔽吞吐量。考虑到这种基于OPTDP的隐蔽通信的最坏情况,干扰器选择,干扰功率,传输功率和传输速率共同优化,以最大化隐蔽吞吐量(OPTDP- jp)。为了解决这一耦合问题,提出了一种基于最大距离比(H-MAXDR)的启发式算法来提供次优解。首先,根据隐蔽吞吐量的分析,选择距离比(即干扰机到接收端的距离与监督端的距离之比)最大的节点作为友好干扰机(MAXDR)。然后推导出最优传输功率和干扰功率,再通过对分法得到最优传输速率。数值和仿真结果表明,尽管看守者的位置未知,但通过假设看守者的OPTDP,所提出的OPTDP- jp总能满足隐蔽性约束。此外,在不确定的监狱长和不完善的CSI条件下,当隐蔽性约束为0.9时,OPTDP-JP提供的隐蔽吞吐量比现有方案高80%,显示了OPTDP-JP的有效性。
{"title":"Joint jammer selection and power optimization in covert communications against a warden with uncertain locations","authors":"Zhijun Han ,&nbsp;Yiqing Zhou ,&nbsp;Yu Zhang ,&nbsp;Tong-Xing Zheng ,&nbsp;Ling Liu ,&nbsp;Jinglin Shi","doi":"10.1016/j.dcan.2024.10.019","DOIUrl":"10.1016/j.dcan.2024.10.019","url":null,"abstract":"<div><div>In covert communications, joint jammer selection and power optimization are important to improve performance. However, existing schemes usually assume a warden with a known location and perfect Channel State Information (CSI), which is difficult to achieve in practice. To be more practical, it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI, which makes it difficult for legitimate transceivers to estimate the detection probability of the warden. First, the uncertainty caused by the unknown warden location must be removed, and the Optimal Detection Position (OPTDP) of the warden is derived which can provide the best detection performance (i.e., the worst case for a covert communication). Then, to further avoid the impractical assumption of perfect CSI, the covert throughput is maximized using only the channel distribution information. Given this OPTDP based worst case for covert communications, the jammer selection, the jamming power, the transmission power, and the transmission rate are jointly optimized to maximize the covert throughput (OPTDP-JP). To solve this coupling problem, a Heuristic algorithm based on Maximum Distance Ratio (H-MAXDR) is proposed to provide a sub-optimal solution. First, according to the analysis of the covert throughput, the node with the maximum distance ratio (i.e., the ratio of the distances from the jammer to the receiver and that to the warden) is selected as the friendly jammer (MAXDR). Then, the optimal transmission and jamming power can be derived, followed by the optimal transmission rate obtained via the bisection method. In numerical and simulation results, it is shown that although the location of the warden is unknown, by assuming the OPTDP of the warden, the proposed OPTDP-JP can always satisfy the covertness constraint. In addition, with an uncertain warden and imperfect CSI, the covert throughput provided by OPTDP-JP is 80% higher than the existing schemes when the covertness constraint is 0.9, showing the effectiveness of OPTDP-JP.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1114-1124"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144925844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Digital Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1