首页 > 最新文献

IET Communications最新文献

英文 中文
Design of Crowdsourcing Supply Chain Platform Based on Ontology and Blockchain 基于本体和区块链的众包供应链平台设计
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-27 DOI: 10.1049/cmu2.70102
Yaohui Wu, Qian Zhang, Pengfei Shao, Shaozhong Zhang

As a new type of supply chain (SC) based on “Internet plus Innovation”, crowdsourcing supply chain (CSC) emphasizes mass participation and personalized demands more than traditional SC. Most of the current CSC systems are based on a centralized structure. With the development of crowdsourcing business, problems such as single point of failure, malicious data leakage or fairness are prone to occur. Deploying the CSC system onto the decentralized blockchain can solve the above problems to a certain extent. However, deploying CSC applications on the blockchain is facing issues like service matching efficiency and new security concerns. In this paper, a novel CSC platform is proposed based on ontology and blockchain. The matching of tasks and candidate workers is automatically achieved by designing some ontologies and semantic web rule language (SWRL) rules. The quality of the submitted solutions can be effectively evaluated by the proposed improved confidence-weighted voting algorithm and semi-monopoly dividend algorithm. To better ensure data confidentiality and identity anonymity, a task-matching privacy protection algorithm combining ontology with proxy re-encryption bilinear pairing technology is proposed. Finally, a software prototype is implemented on the Ethereum public test network by using the CSC dataset. The experimental results show that the time cost of the proposed scheme is within an acceptable range, while the gas consumption is saved by approximately 15%–25%.

众包供应链作为一种基于“互联网+创新”的新型供应链,比传统供应链更强调大众参与和个性化需求。目前的众包供应链系统大多是基于集中式结构。随着众包业务的发展,容易出现单点故障、恶意数据泄露、公平性等问题。将CSC系统部署到分散的区块链上,可以在一定程度上解决上述问题。然而,在区块链上部署CSC应用程序面临着服务匹配效率和新的安全问题等问题。本文提出了一种基于本体和区块链的CSC平台。通过设计一些本体和语义web规则语言(SWRL)规则,自动实现任务和候选工作者的匹配。本文提出的改进置信度加权投票算法和半垄断红利算法可以有效地评价所提交解的质量。为了更好地保证数据的机密性和身份匿名性,提出了一种将本体与代理重加密双线性配对技术相结合的任务匹配隐私保护算法。最后,利用CSC数据集在以太坊公共测试网络上实现了软件原型。实验结果表明,该方案的时间成本在可接受的范围内,同时可节省约15%-25%的燃气消耗。
{"title":"Design of Crowdsourcing Supply Chain Platform Based on Ontology and Blockchain","authors":"Yaohui Wu,&nbsp;Qian Zhang,&nbsp;Pengfei Shao,&nbsp;Shaozhong Zhang","doi":"10.1049/cmu2.70102","DOIUrl":"https://doi.org/10.1049/cmu2.70102","url":null,"abstract":"<p>As a new type of supply chain (SC) based on “Internet plus Innovation”, crowdsourcing supply chain (CSC) emphasizes mass participation and personalized demands more than traditional SC. Most of the current CSC systems are based on a centralized structure. With the development of crowdsourcing business, problems such as single point of failure, malicious data leakage or fairness are prone to occur. Deploying the CSC system onto the decentralized blockchain can solve the above problems to a certain extent. However, deploying CSC applications on the blockchain is facing issues like service matching efficiency and new security concerns. In this paper, a novel CSC platform is proposed based on ontology and blockchain. The matching of tasks and candidate workers is automatically achieved by designing some ontologies and semantic web rule language (SWRL) rules. The quality of the submitted solutions can be effectively evaluated by the proposed improved confidence-weighted voting algorithm and semi-monopoly dividend algorithm. To better ensure data confidentiality and identity anonymity, a task-matching privacy protection algorithm combining ontology with proxy re-encryption bilinear pairing technology is proposed. Finally, a software prototype is implemented on the Ethereum public test network by using the CSC dataset. The experimental results show that the time cost of the proposed scheme is within an acceptable range, while the gas consumption is saved by approximately 15%–25%.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145406683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Mode Data Prediction-Based Dynamic Bandwidth Allocation for IoT-Empowered Electric Equipment Monitoring 基于多模式数据预测的物联网电力设备监测动态带宽分配
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-24 DOI: 10.1049/cmu2.70098
An Chen, Junle Liu, Jianyi Li

With the gradual increase in the demand for efficient monitoring of electrical equipment, the volume of multi-mode data, such as images and voiceprints, is also growing. This situation imposes new challenges on the allocation of limited bandwidth resources. Traditional allocation methods suffer from issues such as low bandwidth utilisation and mismatch between bandwidth resources and multi-mode data transmission demands. To address these problems, a dynamic bandwidth allocation method based on multi-mode data prediction for application in internet of things (IoT)-enabled electrical equipment monitoring is proposed in this paper. Firstly, a multi-mode data transmission architecture for IoT-enabled electrical equipment monitoring is designed, which includes models for multi-mode data collection, compression, transmission, decoding, and fault identification. Secondly, a multi-mode data transmission demand prediction method based on knowledge collaborative long short-term memory (KC-LSTM) is proposed, considering the intrinsic relationships and complementarity among multi-mode data streams to achieve accurate prediction of multi-mode data stream transmission demands. On this basis, a dynamic bandwidth allocation method based on multi-mode data transmission demand-aware deep actor critic (DAC) is proposed, which dynamically allocates transmission bandwidth according to the prediction results of multi-mode data transmission demands. Meanwhile, by constructing a multi-precision experience replay pool, the convergence performance of the algorithm in dynamic and challenging environments is improved. Simulation results demonstrate that the proposed algorithm achieves optimal multi-mode data stream transmission efficiency and the highest fault identification accuracy. Compared to the three benchmark algorithms, the proposed algorithm achieves 12.35%, 17.91%, and 31.84% improvements in successfully decoded data volume and 49.04%, 56.38% and 26.53% enhancements in load balancing performance, respectively.

随着对电气设备高效监控需求的逐渐增加,图像、声纹等多模式数据量也在不断增长。这种情况对有限的带宽资源的分配提出了新的挑战。传统的分配方法存在带宽利用率低、带宽资源与多模式数据传输需求不匹配等问题。针对这些问题,本文提出了一种基于多模式数据预测的动态带宽分配方法,用于物联网电气设备监控。首先,设计了面向物联网电气设备监控的多模式数据传输架构,包括多模式数据采集、压缩、传输、解码和故障识别模型。其次,提出了一种基于知识协同长短期记忆(KC-LSTM)的多模式数据传输需求预测方法,考虑了多模式数据流之间的内在联系和互补性,实现了多模式数据流传输需求的准确预测。在此基础上,提出了一种基于多模式数据传输需求感知的深度actor critic (DAC)动态带宽分配方法,根据多模式数据传输需求预测结果动态分配传输带宽。同时,通过构建多精度的经验重放池,提高了算法在动态和挑战性环境下的收敛性能。仿真结果表明,该算法实现了最佳的多模式数据流传输效率和最高的故障识别精度。与三种基准算法相比,本文算法在成功解码数据量上分别提高了12.35%、17.91%和31.84%,在负载均衡性能上分别提高了49.04%、56.38%和26.53%。
{"title":"Multi-Mode Data Prediction-Based Dynamic Bandwidth Allocation for IoT-Empowered Electric Equipment Monitoring","authors":"An Chen,&nbsp;Junle Liu,&nbsp;Jianyi Li","doi":"10.1049/cmu2.70098","DOIUrl":"https://doi.org/10.1049/cmu2.70098","url":null,"abstract":"<p>With the gradual increase in the demand for efficient monitoring of electrical equipment, the volume of multi-mode data, such as images and voiceprints, is also growing. This situation imposes new challenges on the allocation of limited bandwidth resources. Traditional allocation methods suffer from issues such as low bandwidth utilisation and mismatch between bandwidth resources and multi-mode data transmission demands. To address these problems, a dynamic bandwidth allocation method based on multi-mode data prediction for application in internet of things (IoT)-enabled electrical equipment monitoring is proposed in this paper. Firstly, a multi-mode data transmission architecture for IoT-enabled electrical equipment monitoring is designed, which includes models for multi-mode data collection, compression, transmission, decoding, and fault identification. Secondly, a multi-mode data transmission demand prediction method based on knowledge collaborative long short-term memory (KC-LSTM) is proposed, considering the intrinsic relationships and complementarity among multi-mode data streams to achieve accurate prediction of multi-mode data stream transmission demands. On this basis, a dynamic bandwidth allocation method based on multi-mode data transmission demand-aware deep actor critic (DAC) is proposed, which dynamically allocates transmission bandwidth according to the prediction results of multi-mode data transmission demands. Meanwhile, by constructing a multi-precision experience replay pool, the convergence performance of the algorithm in dynamic and challenging environments is improved. Simulation results demonstrate that the proposed algorithm achieves optimal multi-mode data stream transmission efficiency and the highest fault identification accuracy. Compared to the three benchmark algorithms, the proposed algorithm achieves 12.35%, 17.91%, and 31.84% improvements in successfully decoded data volume and 49.04%, 56.38% and 26.53% enhancements in load balancing performance, respectively.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70098","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145366901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SR-SAAD: A Social Rank-Based Routing Protocol for Enhanced Efficiency in Delay Tolerant Networks SR-SAAD:一种提高延迟容忍网络效率的基于社会等级的路由协议
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-21 DOI: 10.1049/cmu2.70099
Saif Ullah, Asif Muhammad, Zulfiqar Ali, Muhammad Waqar, Ajung Kim

Traditional networks face challenges in delivering messages when no direct path exists between the nodes. Delay tolerant networks (DTNs) address this issue through specialised algorithms, many of which leverage social metrics to select optimal relay nodes. While these approaches improve message delivery, they often incur high overhead costs. This paper introduces the SR-SAAD routing protocol for DTNs, which aims to balance efficiency and performance by using three social metrics: degree centrality, social activeness, and random walk encounter (RWE). The philosophy behind SR-SAAD is to prioritise nodes that exhibit higher social connectivity and activity, ensuring that messages are forwarded through nodes with the best potential to enhance delivery performance while minimising the overhead associated with more traditional methods. According to the proposed routing strategy, each node in the network first calculates its degree centrality, social activeness, and RWE. These values are then aggregated to compute a social rank (SR) for each node, which is shared with neighbouring nodes. Nodes that meet specific criteria—having a higher SR and exceeding a threshold—are shortlisted as potential relay nodes. The message is forwarded to the node with the highest SR value, and this process continues until the message reaches its destination. The design philosophy behind this approach is to use social metrics that correlate with real-world human behaviours, optimising the selection of relay nodes for efficient data forwarding. We run simulations for 12 h using different buffer sizes. Simulation results show that SR-SAAD outperforms traditional approaches such as Epidemic, PRoPHET, PRoPHETv2, and first contact, improving the packet delivery ratio (PDR) by delivering 936 messages out of 1440 messages about 533 (936–403) more messages than epidemic with the same set of parameter values, with fewer hops and reduced overhead, albeit at the expense of increased average latency.

当节点之间没有直接路径时,传统网络在传递消息方面面临挑战。延迟容忍网络(dtn)通过专门的算法解决了这个问题,其中许多算法利用社会指标来选择最佳中继节点。虽然这些方法改进了消息传递,但它们通常会产生高昂的开销。本文介绍了用于ddn的SR-SAAD路由协议,该协议旨在通过使用三个社会指标:度中心性、社会活跃度和随机漫步遭遇(RWE)来平衡效率和性能。SR-SAAD背后的理念是优先考虑表现出更高社会连接性和活动的节点,确保消息通过具有最佳潜力的节点转发,以提高交付性能,同时最大限度地减少与更传统方法相关的开销。根据所提出的路由策略,网络中的每个节点首先计算其度中心性、社会活跃度和RWE。然后将这些值聚合起来计算每个节点的社会等级(SR),并与邻近节点共享。满足特定条件的节点——具有更高的SR并超过阈值——被列入潜在的中继节点。消息被转发到SR值最高的节点,这个过程一直持续到消息到达目的地。这种方法背后的设计理念是使用与现实世界人类行为相关的社会指标,优化中继节点的选择,以实现有效的数据转发。我们使用不同的缓冲大小运行了12小时的模拟。仿真结果表明,SR-SAAD优于Epidemic、PRoPHET、PRoPHETv2和首次接触等传统方法,在相同参数值的情况下,SR-SAAD在1440条消息中发送936条消息,比Epidemic多发送533(936 ~ 403)条消息,以更少的跳数和更低的开销提高了包投递率(PDR),但代价是平均延迟增加。
{"title":"SR-SAAD: A Social Rank-Based Routing Protocol for Enhanced Efficiency in Delay Tolerant Networks","authors":"Saif Ullah,&nbsp;Asif Muhammad,&nbsp;Zulfiqar Ali,&nbsp;Muhammad Waqar,&nbsp;Ajung Kim","doi":"10.1049/cmu2.70099","DOIUrl":"https://doi.org/10.1049/cmu2.70099","url":null,"abstract":"<p>Traditional networks face challenges in delivering messages when no direct path exists between the nodes. Delay tolerant networks (DTNs) address this issue through specialised algorithms, many of which leverage social metrics to select optimal relay nodes. While these approaches improve message delivery, they often incur high overhead costs. This paper introduces the SR-SAAD routing protocol for DTNs, which aims to balance efficiency and performance by using three social metrics: degree centrality, social activeness, and random walk encounter (RWE). The philosophy behind SR-SAAD is to prioritise nodes that exhibit higher social connectivity and activity, ensuring that messages are forwarded through nodes with the best potential to enhance delivery performance while minimising the overhead associated with more traditional methods. According to the proposed routing strategy, each node in the network first calculates its degree centrality, social activeness, and RWE. These values are then aggregated to compute a social rank (SR) for each node, which is shared with neighbouring nodes. Nodes that meet specific criteria—having a higher SR and exceeding a threshold—are shortlisted as potential relay nodes. The message is forwarded to the node with the highest SR value, and this process continues until the message reaches its destination. The design philosophy behind this approach is to use social metrics that correlate with real-world human behaviours, optimising the selection of relay nodes for efficient data forwarding. We run simulations for 12 h using different buffer sizes. Simulation results show that SR-SAAD outperforms traditional approaches such as Epidemic, PRoPHET, PRoPHETv2, and first contact, improving the packet delivery ratio (PDR) by delivering 936 messages out of 1440 messages about 533 (936–403) more messages than epidemic with the same set of parameter values, with fewer hops and reduced overhead, albeit at the expense of increased average latency.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70099","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145366295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Weak Signal Detection and Carrier Frequency Offset Estimation for Communication in Multistatic Collaborative Passive Radar 多基地协同无源雷达通信中的联合微弱信号检测与载波频偏估计
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-17 DOI: 10.1049/cmu2.70100
Xiaomao Cao, Hong Ma, Hua Zhang, Jiang Jin

Communication among stations of a multitstatic collaborative passive radar (MCPR) is the prerequisite for networking detection. To tackle the problems of high missed detection probability and poor carrier frequency synchronization in inter-station communication of an MCPR under a low signal-to-noise ratio (SNR), we propose a virtual array-based method to jointly detect communication signals and estimate their starting position and carrier frequency offset (CFO) at the receiving end. It takes advantage of the a priori information of the training sequence to construct SNR-improved virtual sampled signals. On this basis, a large quantity of virtual array snapshots is constructed from the short training sequence by using the method of combinatorics, which benefits us to use the array signal processing theory in communications and reduces the signal processing cost by sharing the same hardware module with the radar signal processing unit. Moreover, to reduce the computational burden, we introduce the root multiple signal classification (root-MUSIC) algorithm to handle the virtual array snapshots. Numerical analyses conducted on the minimum shift keying (MSK) signals validate the feasibility and effectiveness of the proposed method under low SNR.

多基地协同无源雷达(MCPR)的台站间通信是实现组网探测的前提。针对低信噪比(SNR)条件下MCPR站间通信中存在的高漏检概率和载波频率同步差的问题,提出了一种基于虚拟阵列的通信信号联合检测方法,并估计接收端通信信号的起始位置和载波频偏(CFO)。它利用训练序列的先验信息构造提高信噪比的虚拟采样信号。在此基础上,利用组合学的方法从短训练序列中构造出大量的虚拟阵列快照,有利于将阵列信号处理理论应用于通信中,并通过与雷达信号处理单元共享相同的硬件模块来降低信号处理成本。此外,为了减少计算量,我们引入根多信号分类(root- music)算法来处理虚拟阵列快照。通过对最小移位键控信号的数值分析,验证了该方法在低信噪比条件下的可行性和有效性。
{"title":"Joint Weak Signal Detection and Carrier Frequency Offset Estimation for Communication in Multistatic Collaborative Passive Radar","authors":"Xiaomao Cao,&nbsp;Hong Ma,&nbsp;Hua Zhang,&nbsp;Jiang Jin","doi":"10.1049/cmu2.70100","DOIUrl":"https://doi.org/10.1049/cmu2.70100","url":null,"abstract":"<p>Communication among stations of a multitstatic collaborative passive radar (MCPR) is the prerequisite for networking detection. To tackle the problems of high missed detection probability and poor carrier frequency synchronization in inter-station communication of an MCPR under a low signal-to-noise ratio (SNR), we propose a virtual array-based method to jointly detect communication signals and estimate their starting position and carrier frequency offset (CFO) at the receiving end. It takes advantage of the a priori information of the training sequence to construct SNR-improved virtual sampled signals. On this basis, a large quantity of virtual array snapshots is constructed from the short training sequence by using the method of combinatorics, which benefits us to use the array signal processing theory in communications and reduces the signal processing cost by sharing the same hardware module with the radar signal processing unit. Moreover, to reduce the computational burden, we introduce the root multiple signal classification (root-MUSIC) algorithm to handle the virtual array snapshots. Numerical analyses conducted on the minimum shift keying (MSK) signals validate the feasibility and effectiveness of the proposed method under low SNR.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Enhancement of Indoor VLC Systems Using DPSS-Based DCO-GFDM Modulation 基于dps的DCO-GFDM调制增强室内VLC系统的性能
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-17 DOI: 10.1049/cmu2.70101
Amin Emami, Gholamreza Baghersalimi, Hossein Goorani

Visible light communication (VLC) is a promising solution for future wireless communication systems due to its high data rate, wide bandwidth, and enhanced security features. However, challenges such as high peak-to-average power ratio (PAPR) and out-of-band (OOB) spectral leakage limit its performance. In this study, we propose the integration of discrete prolate spheroidal sequences (DPSS) with direct current optical generalised frequency division multiplexing (DCO-GFDM) to enhance the performance of indoor VLC systems. A comparative analysis between traditional DCO-OFDM and the proposed DCO-GFDM scheme is conducted under both line-of-sight (LOS) and non-line-of-sight (NLOS) channel conditions. Simulation results show that the proposed method achieves approximately 2.5 dB reduction in PAPR and 45% reduction in OOB leakage compared to conventional DCO-OFDM, while maintaining a similar bit error rate (BER) performance. Moreover, the DCO-GFDM scheme demonstrates higher spectral efficiency without significant degradation in BER, achieving a BER below 10−3 at a signal-to-noise ratio (SNR) of 20 dB in both LOS and NLOS scenarios. These improvements underline the effectiveness of the DPSS-based approach in enhancing the reliability and spectral efficiency of indoor VLC systems.

可见光通信(VLC)由于其高数据速率、宽带宽和增强的安全特性,是未来无线通信系统的一个很有前途的解决方案。然而,高峰值平均功率比(PAPR)和带外(OOB)频谱泄漏等挑战限制了其性能。在这项研究中,我们提出了离散长球序列(DPSS)与直流光学广义频分复用(DCO-GFDM)的集成,以提高室内VLC系统的性能。在视距信道(LOS)和非视距信道(NLOS)条件下,对传统DCO-OFDM和DCO-GFDM方案进行了比较分析。仿真结果表明,与传统的DCO-OFDM相比,该方法在保持相似的误码率(BER)性能的同时,PAPR降低约2.5 dB, OOB泄漏降低45%。此外,DCO-GFDM方案具有更高的频谱效率,且没有显著的误码率下降,在LOS和NLOS场景中,信噪比(SNR)均为20 dB时,误码率均低于10−3。这些改进强调了基于dps的方法在提高室内VLC系统的可靠性和频谱效率方面的有效性。
{"title":"Performance Enhancement of Indoor VLC Systems Using DPSS-Based DCO-GFDM Modulation","authors":"Amin Emami,&nbsp;Gholamreza Baghersalimi,&nbsp;Hossein Goorani","doi":"10.1049/cmu2.70101","DOIUrl":"https://doi.org/10.1049/cmu2.70101","url":null,"abstract":"<p>Visible light communication (VLC) is a promising solution for future wireless communication systems due to its high data rate, wide bandwidth, and enhanced security features. However, challenges such as high peak-to-average power ratio (PAPR) and out-of-band (OOB) spectral leakage limit its performance. In this study, we propose the integration of discrete prolate spheroidal sequences (DPSS) with direct current optical generalised frequency division multiplexing (DCO-GFDM) to enhance the performance of indoor VLC systems. A comparative analysis between traditional DCO-OFDM and the proposed DCO-GFDM scheme is conducted under both line-of-sight (LOS) and non-line-of-sight (NLOS) channel conditions. Simulation results show that the proposed method achieves approximately 2.5 dB reduction in PAPR and 45% reduction in OOB leakage compared to conventional DCO-OFDM, while maintaining a similar bit error rate (BER) performance. Moreover, the DCO-GFDM scheme demonstrates higher spectral efficiency without significant degradation in BER, achieving a BER below 10<sup>−3</sup> at a signal-to-noise ratio (SNR) of 20 dB in both LOS and NLOS scenarios. These improvements underline the effectiveness of the DPSS-based approach in enhancing the reliability and spectral efficiency of indoor VLC systems.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WH-XGBoosting: A Multi-Stage Intrusion Detection Framework for Securing Communication in Electric Vehicle Smart Grid Networks WH-XGBoosting:电动汽车智能电网通信安全的多阶段入侵检测框架
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-16 DOI: 10.1049/cmu2.70097
Venkatasamy Thiruppathy Kesavan, Gopi Ramasamy, Md. Jakir Hossen, Emerson Raja Joseph

Electric vehicles (EVs) are mostly linked with the smart grids that cause diverse cyberattacks such as denial of services (DoS), data manipulations and network intrusions, which affect the grid ecosystem's reliability, efficiency and security. The multi-stage intrusion detection framework is created to explore the various resources, power consumption metrics, and network traffic to identify and mitigate cyberattacks. The adoption of EVs in grid systems creates dynamic security issues and complexity while exchanging information. The research difficulties are addressed by developing the whale-optimised XGBoosting machine learning (WH-XGBoosting), which can identify and mitigate the threats by attaining scalability and low latency. The framework uses diverse features and segmentation procedures to reduce redundancy and overfitting issues. In addition, the whale optimisation process selects optimised values and hyperparameters that improve the detection rate. Then, a boosting algorithm is applied to classify the incoming data, with a minimum false positive rate and maximum detection rate. The framework uses the whale optimisation process to select the optimized features and classifier hyperparameter updating process that enhance the overall intrusion detection accuracy. The discussed system collects the input from CICEVSE2024 and processes it using high-level feature analysis, which helps predict the intruder with a maximum recognition rate (99.12%) compared to existing methods. The system ensures robust, reliable, and scalable solutions for various cyber threats in grid ecosystems.

电动汽车大多与智能电网相连,智能电网会引发各种网络攻击,如拒绝服务(DoS)、数据操纵和网络入侵,影响电网生态系统的可靠性、效率和安全性。创建了多阶段入侵检测框架,以探索各种资源,功耗指标和网络流量,以识别和减轻网络攻击。在电网系统中采用电动汽车会在交换信息时产生动态安全问题和复杂性。通过开发鲸鱼优化的XGBoosting机器学习(WH-XGBoosting)来解决研究困难,该机器学习可以通过实现可扩展性和低延迟来识别和减轻威胁。该框架使用不同的特征和分割过程来减少冗余和过拟合问题。此外,鲸鱼优化过程选择优化值和超参数,以提高检测率。然后,采用增强算法对输入数据进行分类,使误报率最小,检测率最大。该框架使用鲸鱼优化过程选择优化特征和分类器超参数更新过程来提高整体入侵检测的准确性。所讨论的系统从CICEVSE2024中收集输入,并使用高级特征分析对其进行处理,与现有方法相比,该方法有助于以最高的识别率(99.12%)预测入侵者。该系统确保了电网生态系统中各种网络威胁的鲁棒性、可靠性和可扩展性解决方案。
{"title":"WH-XGBoosting: A Multi-Stage Intrusion Detection Framework for Securing Communication in Electric Vehicle Smart Grid Networks","authors":"Venkatasamy Thiruppathy Kesavan,&nbsp;Gopi Ramasamy,&nbsp;Md. Jakir Hossen,&nbsp;Emerson Raja Joseph","doi":"10.1049/cmu2.70097","DOIUrl":"https://doi.org/10.1049/cmu2.70097","url":null,"abstract":"<p>Electric vehicles (EVs) are mostly linked with the smart grids that cause diverse cyberattacks such as denial of services (DoS), data manipulations and network intrusions, which affect the grid ecosystem's reliability, efficiency and security. The multi-stage intrusion detection framework is created to explore the various resources, power consumption metrics, and network traffic to identify and mitigate cyberattacks. The adoption of EVs in grid systems creates dynamic security issues and complexity while exchanging information. The research difficulties are addressed by developing the whale-optimised XGBoosting machine learning (WH-XGBoosting), which can identify and mitigate the threats by attaining scalability and low latency. The framework uses diverse features and segmentation procedures to reduce redundancy and overfitting issues. In addition, the whale optimisation process selects optimised values and hyperparameters that improve the detection rate. Then, a boosting algorithm is applied to classify the incoming data, with a minimum false positive rate and maximum detection rate. The framework uses the whale optimisation process to select the optimized features and classifier hyperparameter updating process that enhance the overall intrusion detection accuracy. The discussed system collects the input from CICEVSE2024 and processes it using high-level feature analysis, which helps predict the intruder with a maximum recognition rate (99.12%) compared to existing methods. The system ensures robust, reliable, and scalable solutions for various cyber threats in grid ecosystems.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CDBi-LSTM: A Hybrid Deep Learning Model With Attention-Based Fusion for Efficient DDoS Detection in IoT Environments cbi - lstm:一种基于注意力融合的混合深度学习模型,用于物联网环境下的高效DDoS检测
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-15 DOI: 10.1049/cmu2.70094
Anthony Jacklingo Kwame Quansah Junior, Eric Tutu Tchao, Eliel Keelson, Andrew Selasi Agbemenu, Henry Nunoo-Mensah, Bright Yeboah-Akowuah

We present composite deep bidirectional long short-term memory (CDBi-LSTM), a compact flow-level detector for Internet of Things (IoT) distributed denial of service (DDoS) attacks that couples a CNN stream and a BiLSTM stream, equips each stream with self–attention and residual connections, and combines them via attention-based fusion. To reflect heterogeneous deployments while avoiding dataset bias, we train and evaluate separately on three public benchmarks: CICDDoS2019, NF-BoT-IoT-v3, and NF-ToN-IoT-v3, under a consistent methodology. The model attains excellent performance: 99.95% accuracy on CICDDoS2019 (binary) and 99.85% (7-class), 99.99% on NF-BoT-IoT-v3, and 99.85% on NF-ToN-IoT-v3, with very low false positives/negatives confirmed by confusion matrices. Loss curves show fast and stable convergence. A complexity analysis demonstrates edge viability: MB–scale footprint ($approx$1.38–1.52 MB; 361k–398k parameters), tiny RAM deltas at load (1.70–1.98 MB), and CPU latency in the tens of milliseconds (61.9–69.0 ms). An ablation study isolates the contributions of per-stream self-attention, per-stream residuals, and gated fusion, revealing favourable accuracy-efficiency trade-offs relative to simpler variants. On CICDDoS2019, the method is competitive with or surpasses the state of the art while providing concrete runtime and memory guarantees. Together, these results indicate that CDBi-LSTM is both accurate and deployment-ready for real-time IoT defence, with a clear path to further optimisation and cross-hardware validation.

我们提出了复合深度双向长短期记忆(cbi - lstm),这是一种用于物联网(IoT)分布式拒绝服务(DDoS)攻击的紧凑流量检测器,它将CNN流和BiLSTM流耦合在一起,为每个流配备自我注意和剩余连接,并通过基于注意的融合将它们组合在一起。为了反映异构部署,同时避免数据集偏差,我们在三个公共基准上分别进行训练和评估:CICDDoS2019、NF-BoT-IoT-v3和NF-ToN-IoT-v3,采用一致的方法。该模型取得了优异的性能:在CICDDoS2019(二进制)和99.85%(7类)上的准确率为99.95%,在NF-BoT-IoT-v3上的准确率为99.99%,在NF-ToN-IoT-v3上的准确率为99.85%,混淆矩阵确认的假阳性/阴性非常低。损耗曲线收敛速度快、稳定。复杂度分析证明了边缘的可行性:MB规模的内存占用(≈$ $ 1.38-1.52 MB; 36k - 398k参数),负载时的微小RAM增量(1.70-1.98 MB),以及几十毫秒的CPU延迟(61.9-69.0 ms)。消融研究分离了每流自关注、每流残差和门控融合的贡献,揭示了相对于更简单的变体有利的精度-效率权衡。在CICDDoS2019上,该方法在提供具体的运行时和内存保证的同时,与最先进的方法相竞争或超越。总之,这些结果表明,cbi - lstm既准确又可用于实时物联网防御,具有进一步优化和跨硬件验证的明确路径。
{"title":"CDBi-LSTM: A Hybrid Deep Learning Model With Attention-Based Fusion for Efficient DDoS Detection in IoT Environments","authors":"Anthony Jacklingo Kwame Quansah Junior,&nbsp;Eric Tutu Tchao,&nbsp;Eliel Keelson,&nbsp;Andrew Selasi Agbemenu,&nbsp;Henry Nunoo-Mensah,&nbsp;Bright Yeboah-Akowuah","doi":"10.1049/cmu2.70094","DOIUrl":"https://doi.org/10.1049/cmu2.70094","url":null,"abstract":"<p>We present composite deep bidirectional long short-term memory (CDBi-LSTM), a compact flow-level detector for Internet of Things (IoT) distributed denial of service (DDoS) attacks that couples a <i>CNN</i> stream and a <i>BiLSTM</i> stream, equips <i>each stream</i> with <i>self–attention</i> and <i>residual connections</i>, and combines them via <i>attention-based fusion</i>. To reflect heterogeneous deployments while avoiding dataset bias, we train and evaluate <i>separately</i> on three public benchmarks: CICDDoS2019, NF-BoT-IoT-v3, and NF-ToN-IoT-v3, under a consistent methodology. The model attains excellent performance: 99.95% accuracy on CICDDoS2019 (binary) and 99.85% (7-class), 99.99% on NF-BoT-IoT-v3, and 99.85% on NF-ToN-IoT-v3, with very low false positives/negatives confirmed by confusion matrices. Loss curves show fast and stable convergence. A complexity analysis demonstrates edge viability: MB–scale footprint (<span></span><math>\u0000 <semantics>\u0000 <mo>≈</mo>\u0000 <annotation>$approx$</annotation>\u0000 </semantics></math>1.38–1.52 MB; 361k–398k parameters), tiny RAM deltas at load (1.70–1.98 MB), and CPU latency in the tens of milliseconds (61.9–69.0 ms). An ablation study isolates the contributions of per-stream self-attention, per-stream residuals, and gated fusion, revealing favourable accuracy-efficiency trade-offs relative to simpler variants. On CICDDoS2019, the method is competitive with or surpasses the state of the art while providing concrete runtime and memory guarantees. Together, these results indicate that CDBi-LSTM is both accurate and deployment-ready for real-time IoT defence, with a clear path to further optimisation and cross-hardware validation.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Reinforcement Learning for Interference Alignment and Power Allocation in Wireless Avionics Intra-Communications 无线航电内部通信干扰对准与功率分配的深度强化学习
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-15 DOI: 10.1049/cmu2.70087
Yuedong Zhuo, Qiao Li, Guangshan Lu, Feng He

Wireless avionics intra-communications (WAIC) technologies play an important role in the real-time transmission between airborne equipment. As the number of deployed WAIC nodes increases, severe inter-user and inter-cabin interference occurs, degrading system performance and fairness. In this paper, a deep reinforcement learning-based interference alignment and power allocation (DRL-IAPA) scheme is proposed for multi-user WAIC system. By integrating interference alignment with a deep deterministic policy gradient (DDPG) algorithm, the DRL-IAPA scheme can mitigate interference, optimize power allocation, and ensure fairness among users under stringent latency and power constraints. Simulation results show that DRL-IAPA improves spectral efficiency and fairness over traditional and heuristic-based methods, and demonstrates scalability and consistent performance across various network configurations. Compared with other representative DRL algorithms, such as proximal policy optimization and soft actor–critic, our proposed DDPG-based approach exhibits faster convergence, higher achievable reward, and better applicability in dynamic WAIC environments.

无线航电内通信(WAIC)技术在机载设备之间的实时传输中起着重要作用。随着部署的WAIC节点数量的增加,会出现严重的用户间和座舱间干扰,降低系统的性能和公平性。提出了一种基于深度强化学习的多用户WAIC干扰对准与功率分配(DRL-IAPA)方案。通过将干扰对齐与深度确定性策略梯度(deep deterministic policy gradient, DDPG)算法相结合,DRL-IAPA方案可以在严格的时延和功耗约束下减轻干扰,优化功率分配,保证用户间的公平性。仿真结果表明,与传统的启发式方法相比,DRL-IAPA提高了频谱效率和公平性,并在各种网络配置下表现出可扩展性和一致性。与其他具有代表性的DRL算法(如近端策略优化和软行为者批评)相比,我们提出的基于ddpg的方法具有更快的收敛速度,更高的可实现奖励,并且在动态WAIC环境中具有更好的适用性。
{"title":"Deep Reinforcement Learning for Interference Alignment and Power Allocation in Wireless Avionics Intra-Communications","authors":"Yuedong Zhuo,&nbsp;Qiao Li,&nbsp;Guangshan Lu,&nbsp;Feng He","doi":"10.1049/cmu2.70087","DOIUrl":"https://doi.org/10.1049/cmu2.70087","url":null,"abstract":"<p>Wireless avionics intra-communications (WAIC) technologies play an important role in the real-time transmission between airborne equipment. As the number of deployed WAIC nodes increases, severe inter-user and inter-cabin interference occurs, degrading system performance and fairness. In this paper, a deep reinforcement learning-based interference alignment and power allocation (DRL-IAPA) scheme is proposed for multi-user WAIC system. By integrating interference alignment with a deep deterministic policy gradient (DDPG) algorithm, the DRL-IAPA scheme can mitigate interference, optimize power allocation, and ensure fairness among users under stringent latency and power constraints. Simulation results show that DRL-IAPA improves spectral efficiency and fairness over traditional and heuristic-based methods, and demonstrates scalability and consistent performance across various network configurations. Compared with other representative DRL algorithms, such as proximal policy optimization and soft actor–critic, our proposed DDPG-based approach exhibits faster convergence, higher achievable reward, and better applicability in dynamic WAIC environments.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70087","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Access Point Selection and Localization for Cluster-Based Realization of a Device-to-Device Cell-Free 6G Communications Network 基于集群实现设备对设备无蜂窝6G通信网络的接入点选择和定位
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-14 DOI: 10.1049/cmu2.70096
Iakovos Ioannou, Marios Raspopoulos, Prabagarane Nagaradjane, Christophoros Christophorou, Andreas Gregoriades, Vasos Vassiliou

The increasing demand for ultra-reliable, low-latency, and high-throughput connectivity in dense urban environments presents significant challenges for next-generation 6G networks. Traditional cellular networks, with their fixed cell boundaries and centralized base station control, are inadequate to meet the dynamic needs of such environments. A promising solution is the cell-free network architecture, where a distributed set of access points (APs) jointly serve users without fixed cell boundaries. However, efficient access point selection and accurate user localization are crucial to achieving high performance in such networks. This paper presents a decentralized approach using Belief-Desire-Intention eXtended (BDIx) agents for dynamic AP selection and localization within a cluster-based cell-free 6G communications network. Various clustering algorithms (K-means, DBSCAN, self-organizing maps, MeanShift, ClusterGAN, and Autoencoders) are evaluated for their ability to optimize network throughput, energy efficiency, and spectral utilization. A hybrid localization framework, such as centroid-based, differential circles, and multilateration methods, is employed to achieve accurate user positioning. The results demonstrate that machine learning-based clustering methods, notably Gaussian mixture model (GMM), self-organizing map (SOM), and ClusterGAN, offer significant improvements in throughput (up to 46.3%) and power reduction (up to 32.8%) over traditional methods. Regarding localization, deep learning models such as MLP, CNN, and TCN outperform deterministic methods, achieving sub-meter accuracy with minimal errors (MeanDist < 1 m, R2$R^2$ > 0.999). Overall, the proposed solution enhances system scalability, energy efficiency, and positioning accuracy, establishing a promising foundation for future 6G networks. In our reference implementation, we instantiate the pipeline with a GMM for AP/UE clustering and a multilayer perceptron (MLP) regressor for localization.

在密集的城市环境中,对超可靠、低延迟和高吞吐量连接的需求日益增长,这对下一代6G网络提出了重大挑战。传统的蜂窝网络具有固定的蜂窝边界和集中的基站控制,无法满足这种环境的动态需求。一种很有前途的解决方案是无小区网络体系结构,其中一组分布式接入点(ap)在没有固定小区边界的情况下共同为用户服务。然而,高效的接入点选择和准确的用户定位是在这种网络中实现高性能的关键。本文提出了一种在基于集群的无蜂窝6G通信网络中使用信念-愿望-意图扩展(BDIx)代理进行动态AP选择和定位的分散方法。评估了各种聚类算法(K-means、DBSCAN、自组织映射、MeanShift、ClusterGAN和Autoencoders)优化网络吞吐量、能源效率和频谱利用率的能力。采用基于质心、差分圆和多倍体的混合定位框架实现准确的用户定位。结果表明,基于机器学习的聚类方法,特别是高斯混合模型(GMM)、自组织映射(SOM)和ClusterGAN,与传统方法相比,在吞吐量(高达46.3%)和功耗(高达32.8%)方面有显著提高。在定位方面,MLP、CNN和TCN等深度学习模型优于确定性方法,以最小的误差(MeanDist < 1 m, r2 $R^2$ > 0.999)实现了亚米级精度。总体而言,该方案增强了系统的可扩展性、能效和定位精度,为未来的6G网络奠定了良好的基础。在我们的参考实现中,我们使用用于AP/UE聚类的GMM和用于定位的多层感知器(MLP)回归器实例化管道。
{"title":"Access Point Selection and Localization for Cluster-Based Realization of a Device-to-Device Cell-Free 6G Communications Network","authors":"Iakovos Ioannou,&nbsp;Marios Raspopoulos,&nbsp;Prabagarane Nagaradjane,&nbsp;Christophoros Christophorou,&nbsp;Andreas Gregoriades,&nbsp;Vasos Vassiliou","doi":"10.1049/cmu2.70096","DOIUrl":"https://doi.org/10.1049/cmu2.70096","url":null,"abstract":"<p>The increasing demand for ultra-reliable, low-latency, and high-throughput connectivity in dense urban environments presents significant challenges for next-generation 6G networks. Traditional cellular networks, with their fixed cell boundaries and centralized base station control, are inadequate to meet the dynamic needs of such environments. A promising solution is the cell-free network architecture, where a distributed set of access points (APs) jointly serve users without fixed cell boundaries. However, efficient access point selection and accurate user localization are crucial to achieving high performance in such networks. This paper presents a decentralized approach using Belief-Desire-Intention eXtended (BDIx) agents for dynamic AP selection and localization within a cluster-based cell-free 6G communications network. Various clustering algorithms (K-means, DBSCAN, self-organizing maps, MeanShift, ClusterGAN, and Autoencoders) are evaluated for their ability to optimize network throughput, energy efficiency, and spectral utilization. A hybrid localization framework, such as centroid-based, differential circles, and multilateration methods, is employed to achieve accurate user positioning. The results demonstrate that machine learning-based clustering methods, notably Gaussian mixture model (GMM), self-organizing map (SOM), and ClusterGAN, offer significant improvements in throughput (up to 46.3%) and power reduction (up to 32.8%) over traditional methods. Regarding localization, deep learning models such as MLP, CNN, and TCN outperform deterministic methods, achieving sub-meter accuracy with minimal errors (MeanDist &lt; 1 m, <span></span><math>\u0000 <semantics>\u0000 <msup>\u0000 <mi>R</mi>\u0000 <mn>2</mn>\u0000 </msup>\u0000 <annotation>$R^2$</annotation>\u0000 </semantics></math> &gt; 0.999). Overall, the proposed solution enhances system scalability, energy efficiency, and positioning accuracy, establishing a promising foundation for future 6G networks. In our reference implementation, we instantiate the pipeline with a GMM for AP/UE clustering and a multilayer perceptron (MLP) regressor for localization.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145316877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Multipath Adaptive Wideband Interference Cancellation for QPSK Modulated Signals Based on Multitap LMS Loop 基于多抽头LMS环路的QPSK调制信号多径自适应宽带干扰消除性能分析
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-13 DOI: 10.1049/cmu2.70081
Zhipeng Liu, Yunhao Jiang

With the advancement of wireless communication technologies, co-site broadband interference has become a critical issue for independent communication platforms such as satellites and space stations, while the strong self-interference cancellation in Fifth Generation (5G) full-duplex systems remains an urgent challenge. For the cancellation structure addressing multipath self-interference, the dual least mean squares (LMS) loop hardware architecture exhibits high complexity and cost when the number of channels increases. Moreover, limited research has been conducted on interference cancellation for Quadrature Phase-Shift Keying (QPSK) signals, particularly regarding the complete analytical expression of its interference cancellation. This study focuses on QPSK signals and establishes weight differential equations based on dual-LMS-loop and single-LMS-loop radio frequency (RF) interference cancellation architectures, deriving a comprehensive analytical expression for interference cancellation. For indoor multipath interference cancellation scenarios, the relationship between interference cancellation ratio and the number of taps, delay interval, system gain, and interference signal bandwidth is analysed. The results demonstrate that the single-LMS-loop system exhibits superior interference suppression performance and system compactness compared to the dual-LMS-loop system for QPSK signal cancellation, with simulations verifying its feasibility and effectiveness.

随着无线通信技术的进步,同站宽带干扰已成为卫星、空间站等独立通信平台面临的关键问题,而第五代(5G)全双工系统的强自干扰消除仍然是一个紧迫的挑战。对于处理多径自干扰的对消结构,当信道数增加时,对偶最小均方环路硬件架构的复杂度和成本都较高。此外,对正交相移键控(QPSK)信号的干扰消除研究有限,特别是其干扰消除的完整解析表达式。本研究以QPSK信号为研究对象,建立了基于双lms环和单lms环射频干扰抵消架构的权重微分方程,推导了干扰抵消的综合解析表达式。针对室内多径干扰消除场景,分析了干扰消除比与抽头数、延迟间隔、系统增益和干扰信号带宽的关系。结果表明,与双lms环系统相比,单lms环系统在QPSK信号对消方面具有更好的干扰抑制性能和系统紧凑性,仿真验证了其可行性和有效性。
{"title":"Performance Analysis of Multipath Adaptive Wideband Interference Cancellation for QPSK Modulated Signals Based on Multitap LMS Loop","authors":"Zhipeng Liu,&nbsp;Yunhao Jiang","doi":"10.1049/cmu2.70081","DOIUrl":"https://doi.org/10.1049/cmu2.70081","url":null,"abstract":"<p>With the advancement of wireless communication technologies, co-site broadband interference has become a critical issue for independent communication platforms such as satellites and space stations, while the strong self-interference cancellation in Fifth Generation (5G) full-duplex systems remains an urgent challenge. For the cancellation structure addressing multipath self-interference, the dual least mean squares (LMS) loop hardware architecture exhibits high complexity and cost when the number of channels increases. Moreover, limited research has been conducted on interference cancellation for Quadrature Phase-Shift Keying (QPSK) signals, particularly regarding the complete analytical expression of its interference cancellation. This study focuses on QPSK signals and establishes weight differential equations based on dual-LMS-loop and single-LMS-loop radio frequency (RF) interference cancellation architectures, deriving a comprehensive analytical expression for interference cancellation. For indoor multipath interference cancellation scenarios, the relationship between interference cancellation ratio and the number of taps, delay interval, system gain, and interference signal bandwidth is analysed. The results demonstrate that the single-LMS-loop system exhibits superior interference suppression performance and system compactness compared to the dual-LMS-loop system for QPSK signal cancellation, with simulations verifying its feasibility and effectiveness.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70081","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145316747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1