首页 > 最新文献

Telecommunication Systems最新文献

英文 中文
Decorrelative successive interference cancellation for cyclic interleaved frequency division multiplexing 用于循环交错频分复用的装饰性连续干扰消除
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-20 DOI: 10.1007/s11235-024-01181-y
G. Anuthirsha, S. Lenty Stuwart

Cyclic interleaved frequency division multiplexing (CIFDM) stands out as a promising solution for enhancing diversity reception over frequency-selective channels. Within the CIFDM framework, cyclic interleaving at the transmitter, followed by multipath detection at the receiver, collaboratively contributes to performance improvement. A recent advancement in this domain is the introduction of CIFDM-successive interference cancellation (CIFDM-SIC) (Anuthirsha and Stuwart in ETRI J, 1--11, 2024), a multipath multistage detection method. However, CIFDM-SIC leaves room for improvement, as it only partially mitigates multipath interference resulting from the semi-orthogonality of codes in CIFDM. To address this limitation, our current approach introduces a CIFDM-decorrelative successive interference cancellation (CIFDM-dSIC) method. In the proposed CIFDM-dSIC, a decorrelation process is employed to effectively eliminate non-orthogonal interference components arising from the cross-correlation of codes in the SIC output stages. Specifically, after the completion of the entire SIC operation, interference at each output stage, except the last one, is eliminated through path-specific decorrelation of the effective spreading codes. We have conducted a comprehensive evaluation of the performance of CIFDM-dSIC under various scenarios, comparing it with both existing CIFDM and traditional interleaved frequency division multiplexing methods. Simulation results unequivocally establish the dominance of the proposed CIFDM-dSIC, affirming its reliability in terms of bit error rate and diversity reception.

循环交错频分复用技术(CIFDM)是在频率选择性信道上增强分集接收的一种有前途的解决方案。在 CIFDM 框架内,发射器的循环交错和接收器的多径检测共同促进了性能的提高。这一领域的最新进展是引入了 CIFDM-连续干扰消除(CIFDM-SIC)(Anuthirsha 和 Stuwart,载于 ETRI J,1--11,2024),这是一种多径多级检测方法。然而,CIFDM-SIC 仍有改进的余地,因为它只能部分缓解 CIFDM 中编码的半正交性所产生的多径干扰。为了解决这一局限性,我们目前的方法引入了 CIFDM-去相关连续干扰消除(CIFDM-dSIC)方法。在拟议的 CIFDM-dSIC 中,采用了去相关过程,以有效消除 SIC 输出级中编码交叉相关产生的非正交干扰成分。具体来说,在完成整个 SIC 操作后,除最后一级外,每个输出级的干扰都会通过对有效扩频码的特定路径去相关来消除。我们对 CIFDM-dSIC 在各种情况下的性能进行了全面评估,并将其与现有的 CIFDM 和传统的交错频分复用方法进行了比较。仿真结果明确证实了所提出的 CIFDM-dSIC 的优势,肯定了它在误码率和分集接收方面的可靠性。
{"title":"Decorrelative successive interference cancellation for cyclic interleaved frequency division multiplexing","authors":"G. Anuthirsha, S. Lenty Stuwart","doi":"10.1007/s11235-024-01181-y","DOIUrl":"https://doi.org/10.1007/s11235-024-01181-y","url":null,"abstract":"<p>Cyclic interleaved frequency division multiplexing (CIFDM) stands out as a promising solution for enhancing diversity reception over frequency-selective channels. Within the CIFDM framework, cyclic interleaving at the transmitter, followed by multipath detection at the receiver, collaboratively contributes to performance improvement. A recent advancement in this domain is the introduction of CIFDM-successive interference cancellation (CIFDM-SIC) (Anuthirsha and Stuwart in ETRI J, 1--11, 2024), a multipath multistage detection method. However, CIFDM-SIC leaves room for improvement, as it only partially mitigates multipath interference resulting from the semi-orthogonality of codes in CIFDM. To address this limitation, our current approach introduces a CIFDM-decorrelative successive interference cancellation (CIFDM-dSIC) method. In the proposed CIFDM-dSIC, a decorrelation process is employed to effectively eliminate non-orthogonal interference components arising from the cross-correlation of codes in the SIC output stages. Specifically, after the completion of the entire SIC operation, interference at each output stage, except the last one, is eliminated through path-specific decorrelation of the effective spreading codes. We have conducted a comprehensive evaluation of the performance of CIFDM-dSIC under various scenarios, comparing it with both existing CIFDM and traditional interleaved frequency division multiplexing methods. Simulation results unequivocally establish the dominance of the proposed CIFDM-dSIC, affirming its reliability in terms of bit error rate and diversity reception.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"14 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141525276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perspective of virtual machine consolidation in cloud computing: a systematic survey 云计算中虚拟机整合的视角:系统调查
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-18 DOI: 10.1007/s11235-024-01184-9
Junzhong Zou, Kai Wang, Keke Zhang, Murizah Kassim

Virtual Machine Consolidation (VMC) in cloud computing refers to the process of optimizing resource utilization by consolidating multiple Virtual Machines (VMs) onto fewer physical servers. This approach aims to maximize the efficiency of resource allocation, reduce operational costs, and enhance overall system performance. In general, effective VMC remains a cornerstone of efficient cloud infrastructure management, balancing resource efficiency with operational complexities to deliver reliable and cost-effective services. In this paper, we undertake a systematic survey of the essential steps in VMC within cloud computing environments. We focus on three critical phases: Physical Machines (PMs) detection, VMs selection, and VMs placement. The review comprehensively explores various aspects of VMC in cloud computing, including motivations, benefits, techniques, challenges, limitations, and applications. It also delves into the techniques and algorithms used for VMC, providing insights into state-of-the-art approaches. Meanwhile, the paper serves as a valuable resource for researchers interested in VMC, and provides a foundation for future research endeavors.

云计算中的虚拟机整合(VMC)是指将多个虚拟机(VM)整合到更少的物理服务器上,从而优化资源利用率的过程。这种方法旨在最大限度地提高资源分配效率、降低运营成本并提高系统整体性能。总体而言,有效的虚拟机管理仍是高效云基础设施管理的基石,它能在资源效率和操作复杂性之间取得平衡,从而提供可靠且经济高效的服务。在本文中,我们对云计算环境中虚拟机管理的基本步骤进行了系统调查。我们重点关注三个关键阶段:物理机(PM)检测、虚拟机选择和虚拟机放置。综述全面探讨了云计算中虚拟机管理的各个方面,包括动机、优势、技术、挑战、限制和应用。论文还深入探讨了用于虚拟机托管的技术和算法,对最先进的方法提出了见解。同时,本文还是对 VMC 感兴趣的研究人员的宝贵资源,为今后的研究工作奠定了基础。
{"title":"Perspective of virtual machine consolidation in cloud computing: a systematic survey","authors":"Junzhong Zou, Kai Wang, Keke Zhang, Murizah Kassim","doi":"10.1007/s11235-024-01184-9","DOIUrl":"https://doi.org/10.1007/s11235-024-01184-9","url":null,"abstract":"<p>Virtual Machine Consolidation (VMC) in cloud computing refers to the process of optimizing resource utilization by consolidating multiple Virtual Machines (VMs) onto fewer physical servers. This approach aims to maximize the efficiency of resource allocation, reduce operational costs, and enhance overall system performance. In general, effective VMC remains a cornerstone of efficient cloud infrastructure management, balancing resource efficiency with operational complexities to deliver reliable and cost-effective services. In this paper, we undertake a systematic survey of the essential steps in VMC within cloud computing environments. We focus on three critical phases: Physical Machines (PMs) detection, VMs selection, and VMs placement. The review comprehensively explores various aspects of VMC in cloud computing, including motivations, benefits, techniques, challenges, limitations, and applications. It also delves into the techniques and algorithms used for VMC, providing insights into state-of-the-art approaches. Meanwhile, the paper serves as a valuable resource for researchers interested in VMC, and provides a foundation for future research endeavors.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"36 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141525277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of NOMA networks powered by harvested energy with antenna selection under $$kappa -mu $$ shadowed fading 在$$kappa -mu $$阴影衰减条件下,利用天线选择进行能量收集的 NOMA 网络的性能评估
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-18 DOI: 10.1007/s11235-024-01179-6
Khuong Ho-Van

Non-orthogonal multiple access (NOMA) enables the concurrent transmission of numerous user signals, ameliorating spectral efficiency by superimposing these signals. NOMA users utilize energy harvesting to efficiently utilize available energy sources. The energy harvesting process is non-linear in general. Additionally, innumerable antennas are used at the NOMA transmitter and power source to facilitate efficient energy transfer and information transmission with antenna selection (AS). Also, wireless channels cause path loss, fading, and shadowing effects, which directly influence harvested energy and communication reliability. Accordingly, the work assesses the outage performance and throughput of NOMA, examining realistic aspects like non-linear energy harvesting (nlEH), AS, multiple antennas, and (kappa -mu ) shadowed fading. The findings indicate a considerable performance degradation due to nlEH. Moreover, appropriate parameter selection is crucial for preventing complete outages in NOMA networks and achieving optimal performance. In addition, the performance of NOMA networks meliorates with an accreting number of antennas. Furthermore, the AS criterion dramatically impacts performance difference between NOMA users.

非正交多址接入(NOMA)可同时传输多个用户信号,通过叠加这些信号提高频谱效率。非正交多址用户利用能量收集来有效利用可用能源。能量收集过程一般是非线性的。此外,NOMA 发射器和电源使用了无数的天线,以便通过天线选择(AS)实现高效的能量传输和信息传输。此外,无线信道会导致路径损耗、衰减和阴影效应,这些都会直接影响收获的能量和通信可靠性。因此,这项工作评估了NOMA的中断性能和吞吐量,研究了非线性能量采集(nlEH)、AS、多天线和阴影衰落等现实问题。研究结果表明,nlEH 会导致性能大幅下降。此外,适当的参数选择对于防止 NOMA 网络完全中断和实现最佳性能至关重要。此外,NOMA 网络的性能会随着天线数量的增加而改善。此外,AS 准则对 NOMA 用户之间的性能差异有显著影响。
{"title":"Performance evaluation of NOMA networks powered by harvested energy with antenna selection under $$kappa -mu $$ shadowed fading","authors":"Khuong Ho-Van","doi":"10.1007/s11235-024-01179-6","DOIUrl":"https://doi.org/10.1007/s11235-024-01179-6","url":null,"abstract":"<p>Non-orthogonal multiple access (NOMA) enables the concurrent transmission of numerous user signals, ameliorating spectral efficiency by superimposing these signals. NOMA users utilize energy harvesting to efficiently utilize available energy sources. The energy harvesting process is non-linear in general. Additionally, innumerable antennas are used at the NOMA transmitter and power source to facilitate efficient energy transfer and information transmission with antenna selection (AS). Also, wireless channels cause path loss, fading, and shadowing effects, which directly influence harvested energy and communication reliability. Accordingly, the work assesses the outage performance and throughput of NOMA, examining realistic aspects like non-linear energy harvesting (nlEH), AS, multiple antennas, and <span>(kappa -mu )</span> shadowed fading. The findings indicate a considerable performance degradation due to nlEH. Moreover, appropriate parameter selection is crucial for preventing complete outages in NOMA networks and achieving optimal performance. In addition, the performance of NOMA networks meliorates with an accreting number of antennas. Furthermore, the AS criterion dramatically impacts performance difference between NOMA users.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"14 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141525280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Highly secure authentication and key agreement protocol for the internet of vehicles 用于车联网的高度安全认证和密钥协议
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-18 DOI: 10.1007/s11235-024-01172-z
Li Li, XingJuan Fan, BoYuan Zhi, ShaoJun Li, Seyyed Amirreza Dabollahi

In the contemporary era, the Internet of Vehicles (IoV) plays a pivotal role in traffic management, especially in the context of highly scalable and dynamic 5 G networks. Safeguarding these networks presents numerous challenges, particularly in controlling access for unauthenticated users and establishing secure key agreements with fine-grained access control. Balancing these security measures is vital to prevent unauthorized information flow while aligning with the promising goals of future generation technologies. Despite numerous related studies being conducted, existing schemes face risks such as privacy breaches, identity tracing, and substantial computation overheads. Consequently, there is an urgent need to introduce a more secure and efficient scheme to counter various attacks. This paper introduces an authenticated key agreement scheme, tailored for fog-based IoV. The scheme’s security is established under the Random Oracle Model and verified using the ProVerif tool. Additionally, a performance assessment is conducted, demonstrating that the proposed protocol simultaneously meets both security and efficiency requirements when compared to several related schemes.

当今时代,车联网(IoV)在交通管理中发挥着举足轻重的作用,尤其是在高度可扩展和动态的 5 G 网络背景下。保障这些网络的安全面临诸多挑战,特别是在控制未经认证用户的访问和建立具有细粒度访问控制的安全密钥协议方面。平衡这些安全措施对于防止未经授权的信息流动,同时实现未来新一代技术的远大目标至关重要。尽管开展了大量相关研究,但现有方案仍面临隐私泄露、身份追踪和大量计算开销等风险。因此,迫切需要引入一种更安全、更高效的方案来应对各种攻击。本文介绍了一种为基于雾的物联网量身定制的认证密钥协议方案。该方案在随机甲骨文模型下建立了安全性,并使用 ProVerif 工具进行了验证。此外,还进行了性能评估,表明与几种相关方案相比,所提出的协议同时满足了安全性和效率要求。
{"title":"Highly secure authentication and key agreement protocol for the internet of vehicles","authors":"Li Li, XingJuan Fan, BoYuan Zhi, ShaoJun Li, Seyyed Amirreza Dabollahi","doi":"10.1007/s11235-024-01172-z","DOIUrl":"https://doi.org/10.1007/s11235-024-01172-z","url":null,"abstract":"<p>In the contemporary era, the Internet of Vehicles (IoV) plays a pivotal role in traffic management, especially in the context of highly scalable and dynamic 5 G networks. Safeguarding these networks presents numerous challenges, particularly in controlling access for unauthenticated users and establishing secure key agreements with fine-grained access control. Balancing these security measures is vital to prevent unauthorized information flow while aligning with the promising goals of future generation technologies. Despite numerous related studies being conducted, existing schemes face risks such as privacy breaches, identity tracing, and substantial computation overheads. Consequently, there is an urgent need to introduce a more secure and efficient scheme to counter various attacks. This paper introduces an authenticated key agreement scheme, tailored for fog-based IoV. The scheme’s security is established under the Random Oracle Model and verified using the ProVerif tool. Additionally, a performance assessment is conducted, demonstrating that the proposed protocol simultaneously meets both security and efficiency requirements when compared to several related schemes.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"7 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141525278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficient acoustic sensor data integration in hybrid mode operated pervasive wireless sensor network 混合模式运行的普适性无线传感器网络中的节能声学传感器数据集成
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-18 DOI: 10.1007/s11235-024-01165-y
Sushovan Das, Uttam Kr. Mondal

Pervasive Wireless Sensor Networks (PWSNs) are essential for collecting and transmitting real-time data from the physical world to various applications. Integrating blockchain technology with PWSNs enables decentralized data integration securely and immutably, although it requires energy-intensive computing processes. In this paper, the proposed model is designed to investigate the potential of blockchain technology to utilize acoustic signals in a pervasive acoustic wireless sensor network (PAWSN) to achieve energy efficiency. Considering the energy limitations of battery-operated sensor nodes, particularly acoustic sensors, and the energy consumption associated with blockchain technology, this study addresses these challenges by dividing the network into centralized and decentralized structures. In the proposed approach, acoustic sensor nodes operate within a centralized network structure, each assigned to a sensor zone with a central sink node. The sink nodes then participate in a decentralized network structure. To enhance energy efficiency, acoustic sensors in sensor zones are equipped with contextual information to minimize event listening. The primary objective of the proposed technique is to collect context-sensitive acoustic sensor data and integrate it into a decentralized blockchain while minimizing energy consumption at leaf nodes. The evaluation of the system architecture will employ blockchain technology, with a specific focus on leaf node energy efficiency (LNEN) as a primary performance metric. Analysis of experimental results reveals a substantial enhancement in energy efficiency, with LNEN approaching approximately 50% ((LNEN approx 50%)), attributed to the proposed model’s effectiveness.

普适无线传感器网络(PWSN)对于收集物理世界的实时数据并将其传输给各种应用至关重要。将区块链技术与 PWSNs 相结合,可以实现分散式数据整合,而且安全、不变,尽管这需要能源密集型计算过程。本文提出的模型旨在研究区块链技术在普适声学无线传感器网络(PAWSN)中利用声学信号实现能效的潜力。考虑到电池供电的传感器节点(尤其是声学传感器)的能量限制以及与区块链技术相关的能耗,本研究通过将网络划分为集中式和分散式结构来应对这些挑战。在所提出的方法中,声学传感器节点在集中式网络结构中运行,每个节点被分配到一个传感器区域,该区域有一个中心汇节点。然后,汇节点参与分散式网络结构。为了提高能效,传感器区域内的声学传感器配备了上下文信息,以尽量减少事件监听。所提技术的主要目标是收集对上下文敏感的声学传感器数据,并将其整合到分散式区块链中,同时最大限度地降低叶节点的能耗。对系统架构的评估将采用区块链技术,并将叶节点能效(LNEN)作为主要性能指标。对实验结果的分析表明,LNEN 的能效大幅提升,接近 50%((LNEN approx 50%)),这归功于拟议模型的有效性。
{"title":"Energy efficient acoustic sensor data integration in hybrid mode operated pervasive wireless sensor network","authors":"Sushovan Das, Uttam Kr. Mondal","doi":"10.1007/s11235-024-01165-y","DOIUrl":"https://doi.org/10.1007/s11235-024-01165-y","url":null,"abstract":"<p>Pervasive Wireless Sensor Networks (PWSNs) are essential for collecting and transmitting real-time data from the physical world to various applications. Integrating blockchain technology with PWSNs enables decentralized data integration securely and immutably, although it requires energy-intensive computing processes. In this paper, the proposed model is designed to investigate the potential of blockchain technology to utilize acoustic signals in a pervasive acoustic wireless sensor network (PAWSN) to achieve energy efficiency. Considering the energy limitations of battery-operated sensor nodes, particularly acoustic sensors, and the energy consumption associated with blockchain technology, this study addresses these challenges by dividing the network into centralized and decentralized structures. In the proposed approach, acoustic sensor nodes operate within a centralized network structure, each assigned to a sensor zone with a central sink node. The sink nodes then participate in a decentralized network structure. To enhance energy efficiency, acoustic sensors in sensor zones are equipped with contextual information to minimize event listening. The primary objective of the proposed technique is to collect context-sensitive acoustic sensor data and integrate it into a decentralized blockchain while minimizing energy consumption at leaf nodes. The evaluation of the system architecture will employ blockchain technology, with a specific focus on leaf node energy efficiency (LNEN) as a primary performance metric. Analysis of experimental results reveals a substantial enhancement in energy efficiency, with LNEN approaching approximately 50% (<span>(LNEN approx 50%)</span>), attributed to the proposed model’s effectiveness.\u0000</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"24 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141530013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficiency under mobility control for device-to-divice in downlink multi-cell OFDMA systems with fractional frequency reuse and cooperative relaying 具有分数频率重用和合作中继功能的下行多小区 OFDMA 系统中设备到设备的移动性控制下的能源效率
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-18 DOI: 10.1007/s11235-024-01180-z
Abdelhalim Najjar

Device-to-Device (D2D) communication is proposed in cellular network as a vital technology to enhance spectral efficiency and system capacity, while reducing the energy consumption and the latency. Enabling D2D communications in multi-cell OFDMA systems poses two majors challenges: First, D2D equipements are characterizd by limited capacity of battery. Second, D2D devices inevitably suffer from co-channel interference (CCI) at cell edge. This paper addresses the mobility control (MC) for D2D in downlink multi-cell OFDMA system with cooperative relaying and Fractional Frequency Reuse (FFR) scheme. FFR and cooperative relaying schemes are proposed to improve energy efficiency (EE) and avoid CCI. In the edge region, according to a difference set and using the sectorization technique, the Frequency Reuse Factor (FRF) of 7/3 and 7/4 have been applied. The deployment of FFR with Amplify and Forward fixed relays improve significantly the system performance of FRF of 1 and 3. As shown in simulations results, the proposed cooperative MC scheme with FRF of 7/3 and 7/4 provides an improvement in term of EE nears ( 1,2.10^{6}) bits/s/J and (1,3.10^{6}) bits/s/J respectively in comparison with non-cooperative scheme with FRF=3.

设备到设备(D2D)通信是蜂窝网络中的一项重要技术,可提高频谱效率和系统容量,同时降低能耗和延迟。在多小区 OFDMA 系统中实现 D2D 通信面临两大挑战:首先,D2D 设备的电池容量有限。其次,D2D 设备在小区边缘不可避免地会受到同信道干扰 (CCI)。本文探讨了下行多小区 OFDMA 系统中 D2D 的移动性控制(MC)问题,该系统采用了合作中继和分数频率重用(FFR)方案。FFR 和合作中继方案旨在提高能效(EE)和避免 CCI。在边缘区域,根据差分集和扇区化技术,采用了 7/3 和 7/4 的频率复用因子(FRF)。部署带有放大和前向固定中继器的 FFR 后,FRF 为 1 和 3 的系统性能得到显著改善。如仿真结果所示,与 FRF=3 的非合作方案相比,FRF 为 7/3 和 7/4 的合作 MC 方案在 EE 方面的改进分别接近于 ( 1,2.10^{6}) bits/s/J 和 (1,3.10^{6}) bits/s/J。
{"title":"Energy efficiency under mobility control for device-to-divice in downlink multi-cell OFDMA systems with fractional frequency reuse and cooperative relaying","authors":"Abdelhalim Najjar","doi":"10.1007/s11235-024-01180-z","DOIUrl":"https://doi.org/10.1007/s11235-024-01180-z","url":null,"abstract":"<p>Device-to-Device (D2D) communication is proposed in cellular network as a vital technology to enhance spectral efficiency and system capacity, while reducing the energy consumption and the latency. Enabling D2D communications in multi-cell OFDMA systems poses two majors challenges: First, D2D equipements are characterizd by limited capacity of battery. Second, D2D devices inevitably suffer from co-channel interference (CCI) at cell edge. This paper addresses the mobility control (MC) for D2D in downlink multi-cell OFDMA system with cooperative relaying and Fractional Frequency Reuse (FFR) scheme. FFR and cooperative relaying schemes are proposed to improve energy efficiency (EE) and avoid CCI. In the edge region, according to a difference set and using the sectorization technique, the Frequency Reuse Factor (FRF) of 7/3 and 7/4 have been applied. The deployment of FFR with Amplify and Forward fixed relays improve significantly the system performance of FRF of 1 and 3. As shown in simulations results, the proposed cooperative MC scheme with FRF of 7/3 and 7/4 provides an improvement in term of EE nears <span>( 1,2.10^{6})</span> bits/s/J and <span>(1,3.10^{6})</span> bits/s/J respectively in comparison with non-cooperative scheme with FRF=3.\u0000</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"2013 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141525279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative adversarial networks-based security and applications in cloud computing: a survey 基于生成对抗网络的云计算安全与应用:调查
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-04 DOI: 10.1007/s11235-024-01166-x
Shiyu Wang, Ming Yin, Yiwen Liu, Guofeng He

To meet growing business needs and exponentially increasing development and maintenance costs, the concept of cloud computing has been proposed and developed rapidly. Cloud computing is a brand-new computing mode that can meet the needs of on-demand distribution and the rapid deployment of computing resources. It can provide strong scalability and applicability through virtualisation technology and elastic technology, and it can adapt to the needs of users in different environments and resources. Through the use of hardware such as cloud sensors, the data collected by various types of sensors can be directly uploaded to the cloud for processing and analysis, so that applications such as management, medical treatment and human–machine cooperation can be provided. However, applications in the cloud have upended traditional security boundaries and will face some unique security challenges. Due to the advantages of generating real data, generative adversarial networks (GANs) have attracted extensive attention in the field of cloud computing, such as data augmentation and encryption. Therefore, this paper reviews GAN-based security and applications in cloud computing. We compare the role of GANs in security and applications in the cloud from multiple dimensions. In addition, we analyse the research trends and future work prospects from the perspective of the algorithm itself, algorithm performance evaluation and cloud computing hardware.

为了满足日益增长的业务需求,以及成倍增加的开发和维护成本,云计算的概念被提出并得到迅速发展。云计算是一种全新的计算模式,可以满足按需分配和快速部署计算资源的需求。它可以通过虚拟化技术和弹性技术提供强大的可扩展性和适用性,能够适应用户在不同环境和资源下的需求。通过云传感器等硬件的使用,各类传感器采集的数据可以直接上传到云端进行处理和分析,从而提供管理、医疗、人机协作等应用。然而,云中的应用颠覆了传统的安全边界,将面临一些独特的安全挑战。由于生成真实数据的优势,生成式对抗网络(GAN)在数据增强和加密等云计算领域引起了广泛关注。因此,本文回顾了基于生成式对抗网络的安全性以及在云计算中的应用。我们从多个维度比较了 GAN 在云计算安全和应用中的作用。此外,我们还从算法本身、算法性能评估和云计算硬件等角度分析了研究趋势和未来工作展望。
{"title":"Generative adversarial networks-based security and applications in cloud computing: a survey","authors":"Shiyu Wang, Ming Yin, Yiwen Liu, Guofeng He","doi":"10.1007/s11235-024-01166-x","DOIUrl":"https://doi.org/10.1007/s11235-024-01166-x","url":null,"abstract":"<p>To meet growing business needs and exponentially increasing development and maintenance costs, the concept of cloud computing has been proposed and developed rapidly. Cloud computing is a brand-new computing mode that can meet the needs of on-demand distribution and the rapid deployment of computing resources. It can provide strong scalability and applicability through virtualisation technology and elastic technology, and it can adapt to the needs of users in different environments and resources. Through the use of hardware such as cloud sensors, the data collected by various types of sensors can be directly uploaded to the cloud for processing and analysis, so that applications such as management, medical treatment and human–machine cooperation can be provided. However, applications in the cloud have upended traditional security boundaries and will face some unique security challenges. Due to the advantages of generating real data, generative adversarial networks (GANs) have attracted extensive attention in the field of cloud computing, such as data augmentation and encryption. Therefore, this paper reviews GAN-based security and applications in cloud computing. We compare the role of GANs in security and applications in the cloud from multiple dimensions. In addition, we analyse the research trends and future work prospects from the perspective of the algorithm itself, algorithm performance evaluation and cloud computing hardware.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"36 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141259372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ABGF-AODV protocol to prevent black-hole, gray-hole and flooding attacks in MANET 防止城域网中黑洞、灰洞和洪水攻击的 ABGF-AODV 协议
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-04 DOI: 10.1007/s11235-024-01154-1
Shashi Gurung, Vivek Mankotia

Wireless ad hoc networks play a pivotal role in wireless communication systems. MANETs find extensive applications across various domains, encompassing real-time information exchange, network partitioning, rescue operations, interpersonal communication, and data sharing. MANET works as dynamic wireless networks without a fixed infrastructure in which nodes freely join or leave the network at any time. The absence of fixed infrastructure coupled with openness characteristics of MANET poses significant security issues. This paper proposes a technique called as Anti-blackhole, Gray-hole, and Flooding attack-Ad-hoc On-Demand Distance Vector (ABGF-AODV) to identify and thwart the impact of attacks in MANETs. Through extensive evaluation utilizing the NS-2 simulator, the performance of the proposed protocol is thoroughly examined. The results showcase the robustness of the ABGF-AODV protocol against various attacks, yielding better performance as compared with existing state of art technique.

无线特设网络在无线通信系统中发挥着举足轻重的作用。城域网广泛应用于各个领域,包括实时信息交换、网络分区、救援行动、人际通信和数据共享。城域网是一种动态无线网络,没有固定的基础设施,节点可随时自由加入或离开网络。由于没有固定的基础设施,再加上城域网的开放性特点,因此存在严重的安全问题。本文提出了一种名为 "反黑洞、灰洞和洪水攻击--按需分布式距离矢量(ABGF-AODV)"的技术,用于识别和挫败城域网中的攻击影响。通过利用 NS-2 模拟器进行广泛评估,对所提协议的性能进行了全面检查。结果表明,ABGF-AODV 协议对各种攻击具有鲁棒性,与现有技术相比性能更佳。
{"title":"ABGF-AODV protocol to prevent black-hole, gray-hole and flooding attacks in MANET","authors":"Shashi Gurung, Vivek Mankotia","doi":"10.1007/s11235-024-01154-1","DOIUrl":"https://doi.org/10.1007/s11235-024-01154-1","url":null,"abstract":"<p>Wireless ad hoc networks play a pivotal role in wireless communication systems. MANETs find extensive applications across various domains, encompassing real-time information exchange, network partitioning, rescue operations, interpersonal communication, and data sharing. MANET works as dynamic wireless networks without a fixed infrastructure in which nodes freely join or leave the network at any time. The absence of fixed infrastructure coupled with openness characteristics of MANET poses significant security issues. This paper proposes a technique called as Anti-blackhole, Gray-hole, and Flooding attack-Ad-hoc On-Demand Distance Vector (ABGF-AODV) to identify and thwart the impact of attacks in MANETs. Through extensive evaluation utilizing the NS-2 simulator, the performance of the proposed protocol is thoroughly examined. The results showcase the robustness of the ABGF-AODV protocol against various attacks, yielding better performance as compared with existing state of art technique.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"12 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141259374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved tuna swarm optimization algorithm based on behavior evaluation for wireless sensor network coverage optimization 基于行为评估的改进型金枪鱼群优化算法,用于无线传感器网络覆盖优化
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-04 DOI: 10.1007/s11235-024-01168-9
Yu Chang, Dengxu He, Liangdong Qu

Tuna swarm optimization algorithm (TSO) is an innovative swarm intelligence algorithm that possesses the advantages of having a small number of adjustable parameters and being straightforward to implement, but the TSO exhibits drawbacks including low computational accuracy and susceptibility to local optima. To solve the shortcomings of TSO, a TSO variant based on behavioral evaluation and simplex strategy is proposed by this study, named SITSO. Firstly, the behavior evaluation mechanism is used to change the updating mechanism of TSO, thereby improving the convergence speed and calculation accuracy of TSO. Secondly, the simplex method enhances the exploitation capability of TSO. Then, simulations of different dimensions of the CEC2017 standard functional test set are performed and compared with a variety of existing mature algorithms to verify the performance of all aspects of the SITSO. Finally, numerous simulation experiments are conducted to address the optimization of wireless sensor network coverage. Based on the experimental results, SITSO outperforms the remaining six comparison algorithms in terms of performance.

金枪鱼群优化算法(TSO)是一种创新的群智能算法,具有可调参数少、实现简单等优点,但 TSO 存在计算精度低、易出现局部最优等缺点。为了解决 TSO 的缺点,本研究提出了一种基于行为评估和单纯形策略的 TSO 变体,命名为 SITSO。首先,利用行为评价机制改变 TSO 的更新机制,从而提高 TSO 的收敛速度和计算精度。其次,单纯形法增强了 TSO 的利用能力。然后,对 CEC2017 标准功能测试集的不同维度进行仿真,并与现有的多种成熟算法进行比较,以验证 SITSO 各方面的性能。最后,针对无线传感器网络覆盖的优化问题进行了大量仿真实验。根据实验结果,SITSO 的性能优于其余六种比较算法。
{"title":"An improved tuna swarm optimization algorithm based on behavior evaluation for wireless sensor network coverage optimization","authors":"Yu Chang, Dengxu He, Liangdong Qu","doi":"10.1007/s11235-024-01168-9","DOIUrl":"https://doi.org/10.1007/s11235-024-01168-9","url":null,"abstract":"<p>Tuna swarm optimization algorithm (TSO) is an innovative swarm intelligence algorithm that possesses the advantages of having a small number of adjustable parameters and being straightforward to implement, but the TSO exhibits drawbacks including low computational accuracy and susceptibility to local optima. To solve the shortcomings of TSO, a TSO variant based on behavioral evaluation and simplex strategy is proposed by this study, named SITSO. Firstly, the behavior evaluation mechanism is used to change the updating mechanism of TSO, thereby improving the convergence speed and calculation accuracy of TSO. Secondly, the simplex method enhances the exploitation capability of TSO. Then, simulations of different dimensions of the CEC2017 standard functional test set are performed and compared with a variety of existing mature algorithms to verify the performance of all aspects of the SITSO. Finally, numerous simulation experiments are conducted to address the optimization of wireless sensor network coverage. Based on the experimental results, SITSO outperforms the remaining six comparison algorithms in terms of performance.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"75 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141259334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revenue maximization based joint optimization in mmWave cell-free network: an equivalent decomposition and alternative iteration combined approach 基于收入最大化的毫米波无蜂窝网络联合优化:等效分解与替代迭代相结合的方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-03 DOI: 10.1007/s11235-024-01171-0
Zhongyu Ma, Liang Ran, Jianbing Pu, Qun Guo, Xianghong Lin

Recently, the ever-increasing demands including higher rate and connection stability have bottlenecked the user experience of the traditional cellular networks. To this end, the Cell-Free (CF) network, which is characterized as a user-centric architecture, is viewed as a promising paradigm to enhance the user experience. Aimed at this point, this paper investigates the joint optimization problem including user matching, sub-channel allocation and power controlling for the mmWave CF network to maximize the revenue of the operators. Firstly, the revenue maximization oriented joint optimization problem of the mmWave CF network is formulated as mixed integer non-convex and non-linear programming, which is NP-hard problem and is intractable to search an optimal solution in within polynomial time. Secondly, the original problem is decomposed into three sub-problems, i.e., user association sub-problem, the sub-channel allocation sub-problem and the power controlling sub-problem under the consideration of the matching quotas, rate demand and transmission power, etc. Thirdly, a many-to-many matching based user association algorithm and an alternating iterative joint resource management algorithm, which is composed of the harmony search based sub-channel allocation sub-algorithm and the interior-point method based power controlling sub-algorithm, are proposed to obtain a sub-optimal solution, and the computational complexity of the proposed algorithms are also analyzed. Finally, the performance superiorities of the proposed algorithms are demonstrated through extensive simulations, and it is demonstrated that the proposed algorithms can outperform the proposed algorithm outperforms the PUAA algorithm by 5.73% and the SRAA algorithm by 11.25% in terms of operator revenue.

近来,包括更高速率和连接稳定性在内的不断增长的需求已使传统蜂窝网络的用户体验遭遇瓶颈。为此,以用户为中心的无蜂窝(CF)网络被认为是提升用户体验的一种有前途的模式。针对这一点,本文研究了毫米波 CF 网络的联合优化问题,包括用户匹配、子信道分配和功率控制,以实现运营商收入的最大化。首先,以收入最大化为导向的毫米波 CF 网络联合优化问题被表述为混合整数非凸非线性编程,这是一个 NP 难问题,难以在多项式时间内搜索到最优解。其次,考虑到匹配配额、速率需求和传输功率等因素,将原问题分解为三个子问题,即用户关联子问题、子信道分配子问题和功率控制子问题。第三,提出了一种基于多对多匹配的用户关联算法,以及一种由基于和谐搜索的子信道分配子算法和基于内点法的功率控制子算法组成的交替迭代联合资源管理算法,以获得次优解,并分析了所提算法的计算复杂度。最后,通过大量仿真证明了所提算法的性能优越性,证明所提算法在运营商收益方面比 PUAA 算法高出 5.73%,比 SRAA 算法高出 11.25%。
{"title":"Revenue maximization based joint optimization in mmWave cell-free network: an equivalent decomposition and alternative iteration combined approach","authors":"Zhongyu Ma, Liang Ran, Jianbing Pu, Qun Guo, Xianghong Lin","doi":"10.1007/s11235-024-01171-0","DOIUrl":"https://doi.org/10.1007/s11235-024-01171-0","url":null,"abstract":"<p>Recently, the ever-increasing demands including higher rate and connection stability have bottlenecked the user experience of the traditional cellular networks. To this end, the Cell-Free (CF) network, which is characterized as a user-centric architecture, is viewed as a promising paradigm to enhance the user experience. Aimed at this point, this paper investigates the joint optimization problem including user matching, sub-channel allocation and power controlling for the mmWave CF network to maximize the revenue of the operators. Firstly, the revenue maximization oriented joint optimization problem of the mmWave CF network is formulated as mixed integer non-convex and non-linear programming, which is NP-hard problem and is intractable to search an optimal solution in within polynomial time. Secondly, the original problem is decomposed into three sub-problems, i.e., user association sub-problem, the sub-channel allocation sub-problem and the power controlling sub-problem under the consideration of the matching quotas, rate demand and transmission power, etc. Thirdly, a many-to-many matching based user association algorithm and an alternating iterative joint resource management algorithm, which is composed of the harmony search based sub-channel allocation sub-algorithm and the interior-point method based power controlling sub-algorithm, are proposed to obtain a sub-optimal solution, and the computational complexity of the proposed algorithms are also analyzed. Finally, the performance superiorities of the proposed algorithms are demonstrated through extensive simulations, and it is demonstrated that the proposed algorithms can outperform the proposed algorithm outperforms the PUAA algorithm by 5.73% and the SRAA algorithm by 11.25% in terms of operator revenue.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"113 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141259453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Telecommunication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1