首页 > 最新文献

China Communications最新文献

英文 中文
Privacy-preserving deep learning on big data in cloud 基于云大数据的隐私保护深度学习
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2023-11-01 DOI: 10.23919/jcc.ea.2020-0684.202302
Yongkai Fan, Wanyu Zhang, Jianrong Bai, Xia Lei, Kuan-Ching Li
In the analysis of big data, deep learning is a crucial technique. Big data analysis tasks are typically carried out on the cloud since it offers strong computer capabilities and storage areas. Nevertheless, there is a contradiction between the open nature of the cloud and the demand that data owners maintain their privacy. To use cloud resources for privacy-preserving data training, a viable method must be found. A privacy-preserving deep learning model (PPDLM) is suggested in this research to address this preserving issue. To preserve data privacy, we first encrypted the data using homomorphic encryption (HE) approach. Moreover, the deep learning algorithm's activation function—the sigmoid function—uses the least-squares method to process nonaddition and non-multiplication operations that are not allowed by homomorphic. Finally, experimental results show that PPDLM has a significant effect on the protection of data privacy information. Compared with Non-Privacy Preserving Deep Learning Model (NPPDLM), PPDLM has higher computational efficiency.
{"title":"Privacy-preserving deep learning on big data in cloud","authors":"Yongkai Fan, Wanyu Zhang, Jianrong Bai, Xia Lei, Kuan-Ching Li","doi":"10.23919/jcc.ea.2020-0684.202302","DOIUrl":"https://doi.org/10.23919/jcc.ea.2020-0684.202302","url":null,"abstract":"In the analysis of big data, deep learning is a crucial technique. Big data analysis tasks are typically carried out on the cloud since it offers strong computer capabilities and storage areas. Nevertheless, there is a contradiction between the open nature of the cloud and the demand that data owners maintain their privacy. To use cloud resources for privacy-preserving data training, a viable method must be found. A privacy-preserving deep learning model (PPDLM) is suggested in this research to address this preserving issue. To preserve data privacy, we first encrypted the data using homomorphic encryption (HE) approach. Moreover, the deep learning algorithm's activation function—the sigmoid function—uses the least-squares method to process nonaddition and non-multiplication operations that are not allowed by homomorphic. Finally, experimental results show that PPDLM has a significant effect on the protection of data privacy information. Compared with Non-Privacy Preserving Deep Learning Model (NPPDLM), PPDLM has higher computational efficiency.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68734715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PowerDetector: Malicious PowerShell script family classification based on multi-modal semantic fusion and deep learning PowerDetector:基于多模态语义融合和深度学习的恶意PowerShell脚本族分类
3区 计算机科学 Q1 Engineering Pub Date : 2023-11-01 DOI: 10.23919/jcc.fa.2022-0509.202311
Xiuzhang Yang, Guojun Peng, Dongni Zhang, Yuhang Gao, Chenguang Li
PowerShell has been widely deployed in fileless malware and advanced persistent threat (APT) attacks due to its high stealthiness and live-off-the-land technique. However, existing works mainly focus on deobfuscation and malicious detection, lacking the malicious PowerShell families classification and behavior analysis. Moreover, the state-of-the-art methods fail to capture fine-grained features and semantic relationships, resulting in low robustness and accuracy. To this end, we propose PowerDetector, a novel malicious PowerShell script detector based on multimodal semantic fusion and deep learning. Specifically, we design four feature extraction methods to extract key features from character, token, abstract syntax tree (AST), and semantic knowledge graph. Then, we intelligently design four embeddings (i.e., Char2Vec, Token2Vec, AST2Vec, and Rela2Vec) and construct a multi-modal fusion algorithm to concatenate feature vectors from different views. Finally, we propose a combined model based on transformer and CNN-BiLSTM to implement PowerShell family detection. Our experiments with five types of PowerShell attacks show that PowerDetector can accurately detect various obfuscated and stealth PowerShell scripts, with a 0.9402 precision, a 0.9358 recall, and a 0.9374 F-score. Furthermore, through single-modal and multi-modal comparison experiments, we demonstrate that PowerDetector's multi-modal embedding and deep learning model can achieve better accuracy and even identify more unknown attacks.
PowerShell由于其高隐身性和实时技术,已被广泛应用于无文件恶意软件和高级持续威胁(APT)攻击中。然而,现有的工作主要集中在去混淆和恶意检测上,缺乏对PowerShell恶意家族的分类和行为分析。此外,最先进的方法无法捕获细粒度的特征和语义关系,导致鲁棒性和准确性较低。为此,我们提出了一种基于多模态语义融合和深度学习的新型恶意PowerShell脚本检测器PowerDetector。具体来说,我们设计了四种特征提取方法,分别从字符、标记、抽象语法树(AST)和语义知识图中提取关键特征。然后,我们智能地设计了Char2Vec、Token2Vec、AST2Vec和Rela2Vec四个嵌入,并构建了一个多模态融合算法来连接来自不同视图的特征向量。最后,我们提出了一种基于变压器和CNN-BiLSTM的组合模型来实现PowerShell族检测。我们对五种PowerShell攻击的实验表明,PowerDetector可以准确检测各种混淆和隐身的PowerShell脚本,精度为0.9402,召回率为0.9358,f分数为0.9374。此外,通过单模态和多模态对比实验,我们证明了PowerDetector的多模态嵌入和深度学习模型可以达到更好的准确率,甚至可以识别出更多的未知攻击。
{"title":"PowerDetector: Malicious PowerShell script family classification based on multi-modal semantic fusion and deep learning","authors":"Xiuzhang Yang, Guojun Peng, Dongni Zhang, Yuhang Gao, Chenguang Li","doi":"10.23919/jcc.fa.2022-0509.202311","DOIUrl":"https://doi.org/10.23919/jcc.fa.2022-0509.202311","url":null,"abstract":"PowerShell has been widely deployed in fileless malware and advanced persistent threat (APT) attacks due to its high stealthiness and live-off-the-land technique. However, existing works mainly focus on deobfuscation and malicious detection, lacking the malicious PowerShell families classification and behavior analysis. Moreover, the state-of-the-art methods fail to capture fine-grained features and semantic relationships, resulting in low robustness and accuracy. To this end, we propose PowerDetector, a novel malicious PowerShell script detector based on multimodal semantic fusion and deep learning. Specifically, we design four feature extraction methods to extract key features from character, token, abstract syntax tree (AST), and semantic knowledge graph. Then, we intelligently design four embeddings (i.e., Char2Vec, Token2Vec, AST2Vec, and Rela2Vec) and construct a multi-modal fusion algorithm to concatenate feature vectors from different views. Finally, we propose a combined model based on transformer and CNN-BiLSTM to implement PowerShell family detection. Our experiments with five types of PowerShell attacks show that PowerDetector can accurately detect various obfuscated and stealth PowerShell scripts, with a 0.9402 precision, a 0.9358 recall, and a 0.9374 F-score. Furthermore, through single-modal and multi-modal comparison experiments, we demonstrate that PowerDetector's multi-modal embedding and deep learning model can achieve better accuracy and even identify more unknown attacks.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135609007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An ISGW filtering antenna with spurious modes and surface wave suppression for millimeter wave communications 一种具有杂散模式和表面波抑制的毫米波通信ISGW滤波天线
3区 计算机科学 Q1 Engineering Pub Date : 2023-11-01 DOI: 10.23919/jcc.fa.2023-0255.202311
Lihui Wang, Dongya Shen, Qiuhua Lin, Zhiyong Luo, Wenjian Wang, Jianpei Chen, Zhao Gao, Wei Zhang
In this paper, an integrated substrate gap waveguide (ISGW) filtering antenna is proposed at millimeter wave band, whose surface wave and spurious modes are simultaneously suppressed. A second-order filtering response is obtained through a coupling feeding scheme using one uniform impedance resonator (UIR) and two stepped-impedance resonators (SIRs). To increase the stopband width of the antenna, the spurious modes are suppressed by selecting the appropriate sizes of the ISGW unit cell. Furthermore, the ISGW is implemented to improve the radiation performance of the antenna by alleviating the propagation of surface wave. And an equivalent circuit is investigated to reveal the working principle of ISGW. To demonstrate this methodology, an ISGW filtering antenna operating at a center frequency of 25 GHz is designed, fabricated, and measured. The results show that the antenna achieves a stopband width of 1.6 f 0 (center frequency), an out-of-band suppression level of 21 dB, and a peak realized gain of 8.5 dBi.
本文提出了一种毫米波波段集成基板缝隙波导(ISGW)滤波天线,该天线能同时抑制表面波和杂散模式。通过一个均匀阻抗谐振器(UIR)和两个阶跃阻抗谐振器(SIRs)的耦合馈电方案获得二阶滤波响应。为了增加天线的阻带宽度,通过选择合适尺寸的ISGW单元来抑制杂散模式。此外,ISGW通过减轻表面波的传播来改善天线的辐射性能。研究了等效电路,揭示了ISGW的工作原理。为了演示该方法,设计、制作并测量了工作在25 GHz中心频率的ISGW滤波天线。结果表明,该天线的阻带宽度为1.6 f0(中心频率),带外抑制电平为21 dB,峰值实现增益为8.5 dBi。
{"title":"An ISGW filtering antenna with spurious modes and surface wave suppression for millimeter wave communications","authors":"Lihui Wang, Dongya Shen, Qiuhua Lin, Zhiyong Luo, Wenjian Wang, Jianpei Chen, Zhao Gao, Wei Zhang","doi":"10.23919/jcc.fa.2023-0255.202311","DOIUrl":"https://doi.org/10.23919/jcc.fa.2023-0255.202311","url":null,"abstract":"In this paper, an integrated substrate gap waveguide (ISGW) filtering antenna is proposed at millimeter wave band, whose surface wave and spurious modes are simultaneously suppressed. A second-order filtering response is obtained through a coupling feeding scheme using one uniform impedance resonator (UIR) and two stepped-impedance resonators (SIRs). To increase the stopband width of the antenna, the spurious modes are suppressed by selecting the appropriate sizes of the ISGW unit cell. Furthermore, the ISGW is implemented to improve the radiation performance of the antenna by alleviating the propagation of surface wave. And an equivalent circuit is investigated to reveal the working principle of ISGW. To demonstrate this methodology, an ISGW filtering antenna operating at a center frequency of 25 GHz is designed, fabricated, and measured. The results show that the antenna achieves a stopband width of 1.6 f <inf xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\">0</inf> (center frequency), an out-of-band suppression level of 21 dB, and a peak realized gain of 8.5 dBi.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135610543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource trading and miner competition in wireless blockchain networks with edge computing 基于边缘计算的无线区块链网络资源交易与矿工竞争
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2023-11-01 DOI: 10.23919/jcc.ea.2020-0701.202302
Yuchen Zhou, Jian Chen, Lu Lyu, Bingtao He
To promote the application of edge computing in wireless blockchain networks, this paper presents a business ecosystem, where edge computing is introduced to assist blockchain users in implementing the mining process. This paper exploits resource trading and miner competition to enable secure and efficient transactions in the presented business ecosystem. The resource trading problem is formulated as a Stackelberg game between miner candidates and edge computing servers, where computing, caching, and communication resources are jointly optimized to maximize the potential profit. Partial offloading is introduced to further enhance the system performance when compared with the existing work. We analyze the existence and uniqueness of the Nash equilibrium and Stackelberg equilibrium. Based on the optimization result, winners are selected from the set of miner candidates by bidding and constitute the mining network. Simulation results demonstrate that the proposal is able to improve the social welfare of blockchain miners, thus stimulating more blockchain users to join the mining network.
{"title":"Resource trading and miner competition in wireless blockchain networks with edge computing","authors":"Yuchen Zhou, Jian Chen, Lu Lyu, Bingtao He","doi":"10.23919/jcc.ea.2020-0701.202302","DOIUrl":"https://doi.org/10.23919/jcc.ea.2020-0701.202302","url":null,"abstract":"To promote the application of edge computing in wireless blockchain networks, this paper presents a business ecosystem, where edge computing is introduced to assist blockchain users in implementing the mining process. This paper exploits resource trading and miner competition to enable secure and efficient transactions in the presented business ecosystem. The resource trading problem is formulated as a Stackelberg game between miner candidates and edge computing servers, where computing, caching, and communication resources are jointly optimized to maximize the potential profit. Partial offloading is introduced to further enhance the system performance when compared with the existing work. We analyze the existence and uniqueness of the Nash equilibrium and Stackelberg equilibrium. Based on the optimization result, winners are selected from the set of miner candidates by bidding and constitute the mining network. Simulation results demonstrate that the proposal is able to improve the social welfare of blockchain miners, thus stimulating more blockchain users to join the mining network.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68734779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-assisted FSO communication system with amplify-and-forward protocol under AOA fluctuations: A performance analysis 基于放大转发协议的无人机辅助无线通信系统在AOA波动下的性能分析
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2023-11-01 DOI: 10.23919/jcc.ea.2022-0528.202302
Mao Xu, Guanjun Xu, Youran Dong, Weizhi Wang, Qinyu Zhang, Zhaohui Song
Free space optical (FSO) communication has recently aroused great interest in academia due to its unique features, such as large transmission band, high data rates, and strong anti-electromagnetic interference. With the aim of evaluating the performance of an FSO communication system and extending the line-of-sight transmission distance, we propose an unmanned aerial vehicle (UAV)-assisted dual-hop FSO communication system equipped with amplify-and-forward protocol at the relay node. Specifically, we consider impairments of atmospheric absorption, pointing errors, atmospheric turbulence, and link interruptions due to angle-of-arrival fluctuations in the relay system. The Gamma-Gamma and Malaga distributions are used to model the influence of atmospheric turbulence on the source-to-UAV and UAV-to-destination links, respectively. We derive closed-form expressions of the probability density function (PDF) and cumulative distribution function (CDF) for the proposed communication system, in terms of the Meijer-G function. Based on the precise PDF and CDF, analytical expressions for the outage probability, average bit error rate, and ergodic capacity are proposed with the aid of the extended generalized bivariate Fox's H function. Finally, we show that there is a match between the analytical results and numerical results, and we analyze the influence of the system and channel parameters on the performance.
{"title":"UAV-assisted FSO communication system with amplify-and-forward protocol under AOA fluctuations: A performance analysis","authors":"Mao Xu, Guanjun Xu, Youran Dong, Weizhi Wang, Qinyu Zhang, Zhaohui Song","doi":"10.23919/jcc.ea.2022-0528.202302","DOIUrl":"https://doi.org/10.23919/jcc.ea.2022-0528.202302","url":null,"abstract":"Free space optical (FSO) communication has recently aroused great interest in academia due to its unique features, such as large transmission band, high data rates, and strong anti-electromagnetic interference. With the aim of evaluating the performance of an FSO communication system and extending the line-of-sight transmission distance, we propose an unmanned aerial vehicle (UAV)-assisted dual-hop FSO communication system equipped with amplify-and-forward protocol at the relay node. Specifically, we consider impairments of atmospheric absorption, pointing errors, atmospheric turbulence, and link interruptions due to angle-of-arrival fluctuations in the relay system. The Gamma-Gamma and Malaga distributions are used to model the influence of atmospheric turbulence on the source-to-UAV and UAV-to-destination links, respectively. We derive closed-form expressions of the probability density function (PDF) and cumulative distribution function (CDF) for the proposed communication system, in terms of the Meijer-G function. Based on the precise PDF and CDF, analytical expressions for the outage probability, average bit error rate, and ergodic capacity are proposed with the aid of the extended generalized bivariate Fox's H function. Finally, we show that there is a match between the analytical results and numerical results, and we analyze the influence of the system and channel parameters on the performance.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68734868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A rigorous analysis of vehicle-to-vehicle range performance in a rural channel propagation scenario as a function of antenna type and location via simulation and field trails 通过模拟和现场跟踪,对农村信道传播场景中车辆对车辆距离性能作为天线类型和位置的函数进行了严格分析
3区 计算机科学 Q1 Engineering Pub Date : 2023-11-01 DOI: 10.23919/jcc.fa.2023-0321.202311
Ran Liu, Daniel N. Aloi
Vehicle-to-Everything (V2X) communications will be an essential part of the technology in future autonomous drive decision systems. A fundamental procedure is to establish a robust communication channel between end-to-end devices. Due to the antenna placed at different positions on vehicles, the existing cellular electro-magnetic (EM) wave propagation modelling does not fit properly for V2X direct communication application. In order to figure out a feasible understanding of this problem, this paper focuses on the propagation channel analysis in a rural Vehicle-to-Vehicle (V2V) scenario for vehicular communication with antenna position experiments at different heights. By adopting the ray-tracing algorithm, a rural scenario simulation model is built up via the use of a commercial-off-the-shelf (COTS) EM modelling software package, that computes the path loss received power and delay spread for a given propagation channel. Next, a real-world vehicle measurement campaign was performed to verify the simulation results. The simulated and measured receiver power was in good agreement with each other, and the results of this study considered two antenna types located at three different relative heights between the two vehicles. This research provides constructive guidance for the V2V antenna characteristics, antenna placement and vehicle communication channel analysis.
车联网(V2X)通信将成为未来自动驾驶决策系统技术的重要组成部分。一个基本的过程是在端到端设备之间建立一个健壮的通信通道。由于天线放置在车辆上的位置不同,现有的蜂窝电磁波传播模型不适合V2X直接通信应用。为了对这一问题有一个可行的理解,本文重点对农村车对车(V2V)场景下车载通信的传播信道进行了分析,并进行了不同高度的天线位置实验。采用射线追踪算法,利用商用现货(COTS)电磁建模软件包建立农村场景仿真模型,计算给定传播信道的路径损耗、接收功率和延迟扩展。接下来,进行了实际车辆测量活动来验证仿真结果。仿真和实测的接收机功率吻合良好,本研究的结果考虑了位于两辆车之间三个不同相对高度的两种天线类型。本研究对V2V天线特性、天线布置和车载通信信道分析具有建设性的指导意义。
{"title":"A rigorous analysis of vehicle-to-vehicle range performance in a rural channel propagation scenario as a function of antenna type and location via simulation and field trails","authors":"Ran Liu, Daniel N. Aloi","doi":"10.23919/jcc.fa.2023-0321.202311","DOIUrl":"https://doi.org/10.23919/jcc.fa.2023-0321.202311","url":null,"abstract":"Vehicle-to-Everything (V2X) communications will be an essential part of the technology in future autonomous drive decision systems. A fundamental procedure is to establish a robust communication channel between end-to-end devices. Due to the antenna placed at different positions on vehicles, the existing cellular electro-magnetic (EM) wave propagation modelling does not fit properly for V2X direct communication application. In order to figure out a feasible understanding of this problem, this paper focuses on the propagation channel analysis in a rural Vehicle-to-Vehicle (V2V) scenario for vehicular communication with antenna position experiments at different heights. By adopting the ray-tracing algorithm, a rural scenario simulation model is built up via the use of a commercial-off-the-shelf (COTS) EM modelling software package, that computes the path loss received power and delay spread for a given propagation channel. Next, a real-world vehicle measurement campaign was performed to verify the simulation results. The simulated and measured receiver power was in good agreement with each other, and the results of this study considered two antenna types located at three different relative heights between the two vehicles. This research provides constructive guidance for the V2V antenna characteristics, antenna placement and vehicle communication channel analysis.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135609362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent edge network routing architecture with blockchain for the IoT 面向物联网的区块链智能边缘网络路由架构
3区 计算机科学 Q1 Engineering Pub Date : 2023-11-01 DOI: 10.23919/jcc.ea.2022-0006.202302
Yongan Guo, Yuao Wang, Qijie Qian
The demand for the Internet of Everything has slowed down network routing efficiency. Traditional routing policies rely on manual configuration, which has limitations and adversely affects network performance. In this paper, we propose an Internet of Things (IoT) Intelligent Edge Network Routing (ENIR) architecture. ENIR uses deep reinforcement learning (DRL) to simulate human learning of empirical knowledge and an intelligent routing closed-loop control mechanism for real-time interaction with the network environment. According to the network demand and environmental conditions, the method can dynamically adjust network resources and perform intelligent routing optimization. It uses blockchain technology to share network knowledge and global optimization of network routing. The intelligent routing method uses the deep deterministic policy gradient (DDPG) algorithm. Our simulation results show that ENIR provides significantly better link utilization and transmission delay performance than various routing methods (e.g., open shortest path first, routing based on Q-learning and DRL-based control framework for traffic engineering).
万物互联的需求降低了网络路由的效率。传统的路由策略依赖于手工配置,存在一定的局限性,且对网络性能影响较大。本文提出了一种物联网(IoT)智能边缘网络路由(ENIR)架构。ENIR采用深度强化学习(deep reinforcement learning, DRL)模拟人类对经验知识的学习,并采用智能路由闭环控制机制与网络环境进行实时交互。该方法可以根据网络需求和环境条件,动态调整网络资源,进行智能路由优化。利用区块链技术实现网络知识共享和网络路由全局优化。智能路由方法采用深度确定性策略梯度(DDPG)算法。仿真结果表明,ENIR的链路利用率和传输延迟性能明显优于各种路由方法(如开放最短路径优先、基于q -学习的路由和基于drl的流量工程控制框架)。
{"title":"Intelligent edge network routing architecture with blockchain for the IoT","authors":"Yongan Guo, Yuao Wang, Qijie Qian","doi":"10.23919/jcc.ea.2022-0006.202302","DOIUrl":"https://doi.org/10.23919/jcc.ea.2022-0006.202302","url":null,"abstract":"The demand for the Internet of Everything has slowed down network routing efficiency. Traditional routing policies rely on manual configuration, which has limitations and adversely affects network performance. In this paper, we propose an Internet of Things (IoT) Intelligent Edge Network Routing (ENIR) architecture. ENIR uses deep reinforcement learning (DRL) to simulate human learning of empirical knowledge and an intelligent routing closed-loop control mechanism for real-time interaction with the network environment. According to the network demand and environmental conditions, the method can dynamically adjust network resources and perform intelligent routing optimization. It uses blockchain technology to share network knowledge and global optimization of network routing. The intelligent routing method uses the deep deterministic policy gradient (DDPG) algorithm. Our simulation results show that ENIR provides significantly better link utilization and transmission delay performance than various routing methods (e.g., open shortest path first, routing based on Q-learning and DRL-based control framework for traffic engineering).","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136018467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Low complexity detection algorithms based on ADMIN for massive MIMO 基于ADMIN的大规模MIMO低复杂度检测算法
3区 计算机科学 Q1 Engineering Pub Date : 2023-11-01 DOI: 10.23919/jcc.ea.2022-0183.202302
Shuchao Mi, Jianyong Zhang, Fengju Fan, Baorui Yan, Muguang Wang
This paper proposes the alternating direction method of multipliers-based infinity-norm (ADMIN) with threshold (ADMIN-T) and with percentage (ADMIN-P) detection algorithms, which make full use of the distribution of the signal to interference plus noise ratio (SINR) for an uplink massive MIMO system. The ADMIN-T and ADMIN-P detection algorithms are improved visions of the ADMIN detection algorithm, in which an appropriate SINR threshold in the ADMIN-T detection algorithm and a certain percentage in the ADMIN-P detection algorithm are designed to reduce the overall computational complexity. The detected symbols are divided into two parts by the SINR threshold which is based on the cumulative probability density function (CDF) of SINR and a percentage, respectively. The symbols in higher SINR part are detected by MMSE. The interference of these symbols is then cancelled by successive interference cancellation (SIC). Afterwards the remaining symbols with low SINR are iteratively detected by ADMIN. The simulation results show that the ADMIIN-T and the ADMIN-P detection algorithms provide a significant performance gain compared with some recently proposed detection algorithms. In addition, the computational complexity of ADMIN-T and ADMIN-P are significantly reduced. Furthermore, in the case of same number of transceiver antennas, the proposed algorithms have a higher performance compared with the case of asymmetric transceiver antennas.
本文提出了基于乘法器的无限范数(ADMIN)带阈值(ADMIN- t)和带百分比(ADMIN- p)交替方向检测算法,充分利用了上行海量MIMO系统信噪比(SINR)的分布规律。ADMIN- t和ADMIN- p检测算法是对ADMIN检测算法的改进,在ADMIN- t检测算法中设计了适当的SINR阈值,在ADMIN- p检测算法中设计了一定的百分比,以降低总体计算复杂度。检测到的符号被SINR阈值分为两部分,SINR阈值分别基于SINR的累积概率密度函数(CDF)和百分比。采用MMSE检测高信噪比部分的信号。然后通过逐次干扰消除(SIC)消除这些符号的干扰。然后由ADMIN迭代检测剩余的低信噪比符号。仿真结果表明,与最近提出的一些检测算法相比,admin - t和ADMIN-P检测算法具有显著的性能提升。此外,大大降低了ADMIN-T和ADMIN-P的计算复杂度。此外,在收发天线数量相同的情况下,与非对称收发天线情况相比,所提出的算法具有更高的性能。
{"title":"Low complexity detection algorithms based on ADMIN for massive MIMO","authors":"Shuchao Mi, Jianyong Zhang, Fengju Fan, Baorui Yan, Muguang Wang","doi":"10.23919/jcc.ea.2022-0183.202302","DOIUrl":"https://doi.org/10.23919/jcc.ea.2022-0183.202302","url":null,"abstract":"This paper proposes the alternating direction method of multipliers-based infinity-norm (ADMIN) with threshold (ADMIN-T) and with percentage (ADMIN-P) detection algorithms, which make full use of the distribution of the signal to interference plus noise ratio (SINR) for an uplink massive MIMO system. The ADMIN-T and ADMIN-P detection algorithms are improved visions of the ADMIN detection algorithm, in which an appropriate SINR threshold in the ADMIN-T detection algorithm and a certain percentage in the ADMIN-P detection algorithm are designed to reduce the overall computational complexity. The detected symbols are divided into two parts by the SINR threshold which is based on the cumulative probability density function (CDF) of SINR and a percentage, respectively. The symbols in higher SINR part are detected by MMSE. The interference of these symbols is then cancelled by successive interference cancellation (SIC). Afterwards the remaining symbols with low SINR are iteratively detected by ADMIN. The simulation results show that the ADMIIN-T and the ADMIN-P detection algorithms provide a significant performance gain compared with some recently proposed detection algorithms. In addition, the computational complexity of ADMIN-T and ADMIN-P are significantly reduced. Furthermore, in the case of same number of transceiver antennas, the proposed algorithms have a higher performance compared with the case of asymmetric transceiver antennas.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136102771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
5G wideband bandpass filtering power amplifiers based on a bandwidth-extended bandpass matching network 基于带宽扩展带通匹配网络的5G宽带带通滤波功率放大器
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2023-11-01 DOI: 10.23919/jcc.ea.2022-0349.202302
Weimin Wang, Hongmin Zhao, Yongle Wu, Xiaopan Chen
In this paper, a 5G wideband power amplifier (PA) with bandpass filtering response is synthesized using a bandwidth-extended bandpass filter as the matching network (MN). In this structure, the bandwidth (θC) is defined as a variable in the closed-form equations provided by the microstrip bandpass filter. It can be extended over a wide range only by changing the characteristic impedances of the structure. Different from the other wideband MNs, the extension of bandwidth does not increase the complexity of the structure (order n is fixed). In addition, based on the bandwidth-extended structure, the wideband design of bandpass filtering PA is not limited to the fixed bandwidth of the specific filter structure. The theoretical analysis of the MN and the design flow of the PA are provided in this design. The fabricated bandpass filtering PA can support almost one-octave bandwidth (2–3.8 GHz), covering the two 5G bands (n41 and n78). The drain efficiency of 47%–60% and output power higher than 40 dBm are measured. Good frequency selectivity in S-parameter measurements can be observed.
{"title":"5G wideband bandpass filtering power amplifiers based on a bandwidth-extended bandpass matching network","authors":"Weimin Wang, Hongmin Zhao, Yongle Wu, Xiaopan Chen","doi":"10.23919/jcc.ea.2022-0349.202302","DOIUrl":"https://doi.org/10.23919/jcc.ea.2022-0349.202302","url":null,"abstract":"In this paper, a 5G wideband power amplifier (PA) with bandpass filtering response is synthesized using a bandwidth-extended bandpass filter as the matching network (MN). In this structure, the bandwidth (θC) is defined as a variable in the closed-form equations provided by the microstrip bandpass filter. It can be extended over a wide range only by changing the characteristic impedances of the structure. Different from the other wideband MNs, the extension of bandwidth does not increase the complexity of the structure (order n is fixed). In addition, based on the bandwidth-extended structure, the wideband design of bandpass filtering PA is not limited to the fixed bandwidth of the specific filter structure. The theoretical analysis of the MN and the design flow of the PA are provided in this design. The fabricated bandpass filtering PA can support almost one-octave bandwidth (2–3.8 GHz), covering the two 5G bands (n41 and n78). The drain efficiency of 47%–60% and output power higher than 40 dBm are measured. Good frequency selectivity in S-parameter measurements can be observed.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68735189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic task offloading for digital twin-empowered mobile edge computing via deep reinforcement learning 通过深度强化学习实现数字孪生移动边缘计算的动态任务卸载
IF 4.1 3区 计算机科学 Q1 Engineering Pub Date : 2023-11-01 DOI: 10.23919/jcc.ea.2022-0372.202302
Ying Chen, Wei Gu, Jiajie Xu, Yongchao Zhang, Geyong Min
Limited by battery and computing resources, the computing-intensive tasks generated by Internet of Things (IoT) devices cannot be processed all by themselves. Mobile edge computing (MEC) is a suitable solution for this problem, and the generated tasks can be offloaded from IoT devices to MEC. In this paper, we study the problem of dynamic task offloading for digital twin-empowered MEC. Digital twin techniques are applied to provide information of environment and share the training data of agent deployed on IoT devices. We formulate the task offloading problem with the goal of maximizing the energy efficiency and the workload balance among the ESs. Then, we reformulate the problem as an MDP problem and design DRL-based energy efficient task offloading (DEETO) algorithm to solve it. Comparative experiments are carried out which show the superiority of our DEETO algorithm in improving energy efficiency and balancing the workload.
{"title":"Dynamic task offloading for digital twin-empowered mobile edge computing via deep reinforcement learning","authors":"Ying Chen, Wei Gu, Jiajie Xu, Yongchao Zhang, Geyong Min","doi":"10.23919/jcc.ea.2022-0372.202302","DOIUrl":"https://doi.org/10.23919/jcc.ea.2022-0372.202302","url":null,"abstract":"Limited by battery and computing resources, the computing-intensive tasks generated by Internet of Things (IoT) devices cannot be processed all by themselves. Mobile edge computing (MEC) is a suitable solution for this problem, and the generated tasks can be offloaded from IoT devices to MEC. In this paper, we study the problem of dynamic task offloading for digital twin-empowered MEC. Digital twin techniques are applied to provide information of environment and share the training data of agent deployed on IoT devices. We formulate the task offloading problem with the goal of maximizing the energy efficiency and the workload balance among the ESs. Then, we reformulate the problem as an MDP problem and design DRL-based energy efficient task offloading (DEETO) algorithm to solve it. Comparative experiments are carried out which show the superiority of our DEETO algorithm in improving energy efficiency and balancing the workload.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":4.1,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68735263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
China Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1