期刊文献+
共找到1,162篇文章
< 1 2 59 >
每页显示 20 50 100
Al-modified yolk-shell silica particle-supported NiMo catalysts for ultradeep hydrodesulfurization of dibenzothiophene and 4,6-dimethyldibenzothiophene:Efficient accessibility of active sites and suitable acidity
1
作者 Ke Yu Wei-Min Kong +3 位作者 Zhen Zhao Ai-Jun Duan Lian Kong Xi-Long Wang 《Petroleum Science》 SCIE EI CAS CSCD 2024年第1期654-666,共13页
Yolk-shell SiO2 particles(YP)with center-radial meso-channels were fabricated through a simple and effective method.Al-containing YP-supported NiMo catalysts with different Al amounts(NiMo/AYP-x,x=Si/Al molar proporti... Yolk-shell SiO2 particles(YP)with center-radial meso-channels were fabricated through a simple and effective method.Al-containing YP-supported NiMo catalysts with different Al amounts(NiMo/AYP-x,x=Si/Al molar proportion)were prepared and dibenzothiophene(DBT)and 4,6-dimethyl-dibenzothiophene(4,6-DMDBT)were employed as the probes to evaluate the hydrodesulfurization(HDS)catalytic performance.The as-prepared AYP-x carriers and corresponding catalysts were characterized by some advanced characterizations to obtain deeper correlations between physicochemical properties and the HDS performance.The average pore sizes of series AYP-x supports are above 6.0 nm,which favors the mass transfer of organic sulfides.The cavity between the yolk and the shell is beneficial for the enrichment of S-containing compounds and the accessibility between reactants and active metals.Aluminum embedded into the silica framework could facilitate the formation of Lewis(L)and Brønsted(B)acid sites and adjust the metal-support interaction(MSI).Among all the as-synthesized catalysts,NiMo/AYP-20 catalyst shows the highest HDS activities.The improved HDS activity of NiMo/AYP-20 catalyst is attributed to the perfect combination of excellent structural properties of the yolk-shell mesoporous silica,enhanced acidity,moderate MSI,and good accessibility/dispersion of active components. 展开更多
关键词 Al-containing yolk-shell silica particles accessibility ACIDITY Metal-support interaction Hydrodesulfurization
在线阅读 下载PDF
Effect of Wave Accessibility on Lower Hybrid Wave Current Drive in Experimental Advanced Superconductor Tokamak with H-Mode Operation 被引量:1
2
作者 李新霞 项农 甘春芸 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第3期74-77,共4页
The effect of the wave accessibility condition on the lower hybrid cm'rent drive in the experimental advanced superconductor Tokamak (EAST) plasma with H-mode operation is studied. Based on a simplified model, a mo... The effect of the wave accessibility condition on the lower hybrid cm'rent drive in the experimental advanced superconductor Tokamak (EAST) plasma with H-mode operation is studied. Based on a simplified model, a mode conversion layer of the lower hybrid wave between the fast wave branch and the slow wave branch is proved to exist in the plasma periphery for typical EAST H-mode parameters. Under the framework of the lower hybrid wave simulation code (LSC), the wave ray trajectory and the associated current drive are calculated numerically. The results show that the wave accessibility condition plays an important role on the lower hybrid current drive in EAST plasma. For wave rays with parallel refractive index n||= 2.1 or n|| = 2.5 launched from the outside midplane, the wave rays may penetrate the core plasma due to the toroida] geometry effect, while numerous reflections of the wave ray trajectories in the plasma periphery occur. However, low current drive efficiency is obtained. Meanwhile, the wave accessibility condition is improved if a higher confined magnetic field is applied. The simulation results show that for plasma parameters under present EAST H-mode operation, a significant lower hybrid wave current drive could be obtained for the wave spectrum with peak value n|| = 2.1 if a toroidal magnetic field BT =2.5 T is applied. 展开更多
关键词 Effect of Wave accessibility on Lower Hybrid Wave Current Drive in Experimental Advanced Superconductor Tokamak with H-Mode Operation
在线阅读 下载PDF
Electrolyte accessibility of non-precious-metal catalysts with different spherical particle sizes under alkaline conditions for oxygen reduction reaction
3
作者 Jiyeon Lee Jong Gyeong Kim Chanho Pak 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2021年第1期326-331,I0011,共7页
Fuel cells are one of the most competitive alternative energy sources because their theoretical efficiency is~15%higher than that of internal combustion engines (ICEs) and they are considered cleaner and safer.When fu... Fuel cells are one of the most competitive alternative energy sources because their theoretical efficiency is~15%higher than that of internal combustion engines (ICEs) and they are considered cleaner and safer.When fuel cells are used to replace ICEs in cars and energy conversion systems,the system efficiency increases;furthermore,the process becomes more environmentally-friendly because fuel cells produce electricity by using only hydrogen and oxygen,obtained by purifying atmospheric air by filtering out dust and pollutants.Hence,their final product is only water,instead of pollutants like carboFuel cells are one of the most competitive alternative energy sources because their theoretical efficiency is~15%higher than that of internal combustion engines (ICEs) and they are considered cleaner and safer.When fuel cells are used to replace ICEs in cars and energy conversion systems,the system efficiency increases;furthermore,the process becomes more environmentally-friendly because fuel cells produce electricity by using only hydrogen and oxygen,obtained by purifying atmospheric air by filtering out dust and pollutants.Hence,their final product is only water,instead of pollutants like carbon dioxide.n dioxide. 展开更多
关键词 Non-precious-metal catalyst Oxygen reduction reaction Size effect Electrolyte accessibility Alkaline fuel cell
在线阅读 下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data 被引量:1
4
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
在线阅读 下载PDF
The Extended Hybrid Carrier-Based Multiple Access Technology for High Mobility Scenarios 被引量:1
5
作者 Ge Song Xiaojie Fang Xuejun Sha 《China Communications》 SCIE CSCD 2024年第1期53-68,共16页
The hybrid carrier(HC)system rooted in the carrier fusion concept is gradually garnering attention.In this paper,we study the extended hybrid carrier(EHC)multiple access scheme to ensure reliable wireless communicatio... The hybrid carrier(HC)system rooted in the carrier fusion concept is gradually garnering attention.In this paper,we study the extended hybrid carrier(EHC)multiple access scheme to ensure reliable wireless communication.By employing the EHC modulation,a power layered multiplexing framework is realized,which exhibits enhanced interference suppression capability owing to the more uniform energy distribution design.The implementation method and advantage mechanism are explicated respectively for the uplink and downlink,and the performance analysis under varying channel conditions is provided.In addition,considering the connectivity demand,we explore the non-orthogonal multiple access(NOMA)method of the EHC system and develop the EHC sparse code multiple access scheme.The proposed scheme melds the energy spread superiority of EHC with the access capacity of NOMA,facilitating superior support for massive connectivity in high mobility environments.Simulation results have verified the feasibility and advantages of the proposed scheme.Compared with existing HC multiple access schemes,the proposed scheme exhibits robust bit error rate performance and can better guarantee multiple access performance in complex scenarios of nextgeneration communications. 展开更多
关键词 extended hybrid carrier system high mo-Received:Jun.09 2023 Revised:Nov.20 2023 Editor:Yuanwei Liu bility communications multiple access
在线阅读 下载PDF
Power-Domain Collision-Tolerant Random Access Method with Auxiliary Beam for Satellite Internet of Things:A New Solution
6
作者 Xu Yuanyuan Liu Ziwei +1 位作者 Bian Dongming Zhang Gengxin 《China Communications》 SCIE CSCD 2024年第8期236-248,共13页
There are numerous terminals in the satellite Internet of Things(IoT).To save cost and reduce power consumption,the system needs terminals to catch the characteristics of low power consumption and light control.The re... There are numerous terminals in the satellite Internet of Things(IoT).To save cost and reduce power consumption,the system needs terminals to catch the characteristics of low power consumption and light control.The regular random access(RA)protocols may generate large amounts of collisions,which degrade the system throughout severally.The near-far effect and power control technologies are not applicable in capture effect to obtain power difference,resulting in the collisions that cannot be separated.In fact,the optimal design at the receiving end can also realize the condition of packet power domain separation,but there are few relevant researches.In this paper,an auxiliary beamforming scheme is proposed for power domain signal separation.It adds an auxiliary reception beam based on the conventional beam,utilizing the correlation of packets in time-frequency domain between the main and auxiliary beam to complete signal separation.The roll-off belt of auxiliary beam is used to create the carrier-to-noise ratio(CNR)difference.This paper uses the genetic algorithm to optimize the auxiliary beam direction.Simulation results show that the proposed scheme outperforms slotted ALOHA(SA)in terms of system throughput per-formance and without bringing terminals additional control burden. 展开更多
关键词 beamforming non-orthogonal multiple access random access satellite Internet of Things
在线阅读 下载PDF
OFDMA-Based Unsourced Random Access in LEO Satellite Internet of Things
7
作者 Jiaqi Fang Gangle Sun +2 位作者 Wenjin Wang Li You Rui Ding 《China Communications》 SCIE CSCD 2024年第1期13-23,共11页
This paper investigates the low earth orbit(LEO)satellite-enabled coded compressed sensing(CCS)unsourced random access(URA)in orthogonal frequency division multiple access(OFDMA)framework,where a massive uniform plana... This paper investigates the low earth orbit(LEO)satellite-enabled coded compressed sensing(CCS)unsourced random access(URA)in orthogonal frequency division multiple access(OFDMA)framework,where a massive uniform planar array(UPA)is equipped on the satellite.In LEO satellite communications,unavoidable timing and frequency offsets cause phase shifts in the transmitted signals,substantially diminishing the decoding performance of current terrestrial CCS URA receiver.To cope with this issue,we expand the inner codebook with predefined timing and frequency offsets and formulate the inner decoding as a tractable compressed sensing(CS)problem.Additionally,we leverage the inherent sparsity of the UPA-equipped LEO satellite angular domain channels,thereby enabling the outer decoder to support more active devices.Furthermore,the outputs of the outer decoder are used to reduce the search space of the inner decoder,which cuts down the computational complexity and accelerates the convergence of the inner decoding.Simulation results verify the effectiveness of the proposed scheme. 展开更多
关键词 LEO OFDMA SATELLITE unsourced random access UPA
在线阅读 下载PDF
Load Statistics Priority Random Access Technology Based on Air-Space-Ground Integrated Network
8
作者 Enze Li Hao Huan +1 位作者 Jingyu Wang Kunshan Yang 《Journal of Beijing Institute of Technology》 EI CAS 2024年第6期493-506,共14页
In today's world where everything is interconnected, air-space-ground integrated networks have become a current research hotspot due to their characteristics of high, long and wide area coverage. Given the constan... In today's world where everything is interconnected, air-space-ground integrated networks have become a current research hotspot due to their characteristics of high, long and wide area coverage. Given the constantly changing and dynamic characteristics of air and space networks, along with the sheer number and complexity of access nodes involved, the process of rapid networking presents substantial challenges. In order to achieve rapid and dynamic networking of air-space-ground integrated networks, this paper focuses on the study of methods for large-scale nodes to randomly access satellites. This paper utilizes a cross-layer design methodology to enhance the access success probability by jointly optimizing the physical layer and medium access control(MAC) layer aspects. Load statistics priority random access(LSPRA) technology is proposed.Experiments show that when the number of nodes is greater than 1 000, this method can also ensure stable access performance, providing ideas for the design of air-space-ground integrated network access systems. 展开更多
关键词 air-space-ground integrated network random access satellite-to-ground statistics priority access success probability
在线阅读 下载PDF
基于BOPPPS模型和思维导图的Access数据库课程教学设计
9
作者 于惠雯 赵艺洁 《集成电路应用》 2024年第1期82-83,共2页
阐述BOPPPS模式和思维导图开展Access数据库课程教学设计,分析BOPPPS模型和思维导图的特点,探讨Access数据库课程教学设计中的应用,包括课堂引入、课程目标、参与式学习、考试评估。
关键词 思维导图 ACCESS数据库 课程设计 BOPPPS模型
在线阅读 下载PDF
Blockchain-Enabled Privacy Protection and Access Control Scheme Towards Sensitive Digital Assets Management
10
作者 Duan Pengfei Ma Zhaofeng +2 位作者 Zhang Yuqing Wang Jingyu Luo Shoushan 《China Communications》 SCIE CSCD 2024年第7期224-236,共13页
With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,howeve... With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,however,the privacy of stakeholder's identity and the confidentiality of data content are threatened.Therefore,we proposed a blockchainenabled privacy-preserving and access control scheme to address the above problems.First,the multi-channel mechanism is introduced to provide the privacy protection of distributed ledger inside the channel and achieve coarse-grained access control to digital assets.Then,we use multi-authority attribute-based encryption(MAABE)algorithm to build a fine-grained access control model for data trading in a single channel and describe its instantiation in detail.Security analysis shows that the scheme has IND-CPA secure and can provide privacy protection and collusion resistance.Compared with other schemes,our solution has better performance in privacy protection and access control.The evaluation results demonstrate its effectiveness and practicability. 展开更多
关键词 access control data trading MAABE multi-channel privacy preserving
在线阅读 下载PDF
6G New Multiple Access Technology
11
作者 Yifei Yuan Yongpeng Wu +3 位作者 Lei Wang Zhifeng Yuan Wei Bai Yuanwei Liu 《China Communications》 SCIE CSCD 2024年第1期I0002-I0005,共4页
As a basic technology at physical layer of mobile communications,non-orthogonal multiple access has been attracting wide attention across the academia and the industry.During the standardization of the fifth-generatio... As a basic technology at physical layer of mobile communications,non-orthogonal multiple access has been attracting wide attention across the academia and the industry.During the standardization of the fifth-generation(5G)of mobile communications,3GPP conducted preliminary study on non-orthogonal multiple access without reaching the consensus to standardize the technology. 展开更多
关键词 TECHNOLOGY ACCESS attracting
在线阅读 下载PDF
Design Framework of Unsourced Multiple Access for 6G Massive IoT
12
作者 Chunlin Yan Siying Lyu +2 位作者 Sen Wang Yuhong Huang Xiaodong Xu 《China Communications》 SCIE CSCD 2024年第1期1-12,共12页
In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical s... In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical solutions.A rather complete design of unsourced multiple access is proposed in which two key parts:a compressed sensing module for active user detection,and a sparse interleaver-division multiple access(SIDMA)module are simulated side by side on a same platform at balanced signal to noise ratio(SNR)operating points.With a proper combination of compressed sensing matrix,a convolutional encoder,receiver algorithms,the simulated performance results appear superior to the state-of-the-art benchmark,yet with relatively less complicated processing. 展开更多
关键词 channel coding compressed sensing massive Internet-of-Things(IoT) sparse interleaverdivision multiple access(SIDMA) the sixth generation(6G)mobile communications unsourced multiple access
在线阅读 下载PDF
Scenario Modeling-Aided AP Placement Optimization Method for Indoor Localization and Network Access
13
作者 Pan Hao Chen Yu +1 位作者 Qi Xiaogang Liu Meili 《China Communications》 SCIE CSCD 2024年第3期37-50,共14页
Owing to the ubiquity of wireless networks and the popularity of WiFi infrastructures,received signal strength(RSS)-based indoor localization systems have received much attention.The placement of access points(APs)sig... Owing to the ubiquity of wireless networks and the popularity of WiFi infrastructures,received signal strength(RSS)-based indoor localization systems have received much attention.The placement of access points(APs)significantly influences localization accuracy and network access.However,the indoor scenario and network access are not fully considered in previous AP placement optimization methods.This study proposes a practical scenario modelingaided AP placement optimization method for improving localization accuracy and network access.In order to reduce the gap between simulation-based and field measurement-based AP placement optimization methods,we introduce an indoor scenario modeling and Gaussian process-based RSS prediction method.After that,the localization and network access metrics are implemented in the multiple objective particle swarm optimization(MOPSO)solution,Pareto front criterion and virtual repulsion force are applied to determine the optimal AP placement.Finally,field experiments demonstrate the effectiveness of the proposed indoor scenario modeling method and RSS prediction model.A thorough comparison confirms the localization and network access improvement attributed to the proposed anchor placement method. 展开更多
关键词 indoor localization MOPSO network access RSS prediction
在线阅读 下载PDF
Cluster-Based Massive Access for Massive MIMO Systems
14
作者 Shiyu Liang Wei Chen +2 位作者 Zhongwen Sun Ao Chen Bo Ai 《China Communications》 SCIE CSCD 2024年第1期24-33,共10页
Massive machine type communication aims to support the connection of massive devices,which is still an important scenario in 6G.In this paper,a novel cluster-based massive access method is proposed for massive multipl... Massive machine type communication aims to support the connection of massive devices,which is still an important scenario in 6G.In this paper,a novel cluster-based massive access method is proposed for massive multiple input multiple output systems.By exploiting the angular domain characteristics,devices are separated into multiple clusters with a learned cluster-specific dictionary,which enhances the identification of active devices.For detected active devices whose data recovery fails,power domain nonorthogonal multiple access with successive interference cancellation is employed to recover their data via re-transmission.Simulation results show that the proposed scheme and algorithm achieve improved performance on active user detection and data recovery. 展开更多
关键词 compressive sensing dictionary learning multiuser detection random access
在线阅读 下载PDF
Access原发性肝癌数据库的建立及其应用价值分析
15
作者 王海永 孔春丽 +2 位作者 周利芬 洪怀江 王祖飞 《数字通信世界》 2024年第12期108-110,共3页
目的:探讨Access原发性肝癌数据库的建立方法及其应用价值。方法:选择本院2020年1月至2024年4月期间确诊的原发性肝癌患者,数据来源为医院内局域网系统中的患者信息数据,通过Access数据库保存和管理患者的临床资料,建立原发性肝癌患者... 目的:探讨Access原发性肝癌数据库的建立方法及其应用价值。方法:选择本院2020年1月至2024年4月期间确诊的原发性肝癌患者,数据来源为医院内局域网系统中的患者信息数据,通过Access数据库保存和管理患者的临床资料,建立原发性肝癌患者的临床资料专科数据库。结果本院成功创建了原发性肝癌数据库并应用于临床诊疗、教学和科研等工作中。结论:建立原发性肝癌数据库并形成肝癌临床数据库管理系统,从而为临床诊疗工作和科研工作提供有效数据支撑,应用价值较高。 展开更多
关键词 原发性肝癌 ACCESS数据库 k均值聚类算法机器 SMITH-WATERMAN算法 应用价值
在线阅读 下载PDF
A Game Theoretic Link Scheduler for Wireless Networks with Heterogeneous Energy Sources
16
作者 He Tengjiao Kwanwu Chin +1 位作者 Wang Yishun Sieteng Soh 《China Communications》 SCIE CSCD 2024年第12期108-125,共18页
This paper considers link scheduling in a wireless network comprising of two types of nodes:(i)hybrid access points(HAPs)that harvest solar en-ergy,and(ii)devices that harvest radio frequency(RF)energy whenever HAPs t... This paper considers link scheduling in a wireless network comprising of two types of nodes:(i)hybrid access points(HAPs)that harvest solar en-ergy,and(ii)devices that harvest radio frequency(RF)energy whenever HAPs transmit.Our aim is to de-rive the shortest possible link schedule that determines the transmission time of inter-HAPs links,and uplinks from devices to HAPs.We first outline a mixed in-teger linear program(MILP),which can be run by a central node to determine the optimal schedule and transmit power of HAPs and devices.We then out-line a game theory based protocol called Distributed Schedule Minimization Protocol(DSMP)that is run by HAPs and devices.Advantageously,it does not require causal energy arrivals and channel gains in-formation.Our results show that DSMP produces schedule lengths that are at most 1.99x longer than the schedule computed by MILP. 展开更多
关键词 channel access finite battery mathemati-cal program renewable energy wireless power trans-fer
在线阅读 下载PDF
Cost-Efficient Edge Caching for NOMA-Enabled IoT Services
17
作者 Chen Ying Xing Hua +2 位作者 Ma Zhuo Chen Xin Huang Jiwei 《China Communications》 SCIE CSCD 2024年第8期182-191,共10页
Mobile edge computing(MEC)is a promising paradigm by deploying edge servers(nodes)with computation and storage capacity close to IoT devices.Content Providers can cache data in edge servers and provide services for Io... Mobile edge computing(MEC)is a promising paradigm by deploying edge servers(nodes)with computation and storage capacity close to IoT devices.Content Providers can cache data in edge servers and provide services for IoT devices,which effectively reduces the delay for acquiring data.With the increasing number of IoT devices requesting for services,the spectrum resources are generally limited.In order to effectively meet the challenge of limited spectrum resources,the Non-Orthogonal Multiple Access(NOMA)is proposed to improve the transmission efficiency.In this paper,we consider the caching scenario in a NOMA-enabled MEC system.All the devices compete for the limited resources and tend to minimize their own cost.We formulate the caching problem,and the goal is to minimize the delay cost for each individual device subject to resource constraints.We reformulate the optimization as a non-cooperative game model.We prove the existence of Nash equilibrium(NE)solution in the game model.Then,we design the Game-based Cost-Efficient Edge Caching Algorithm(GCECA)to solve the problem.The effectiveness of our GCECA algorithm is validated by both parameter analysis and comparison experiments. 展开更多
关键词 CACHING cost Internet of Things mobile edge computing non-orthogonal multiple access
在线阅读 下载PDF
A comparative study on characteristics of retracted publications across different open access levels
18
作者 Er-Te Zheng Hui-Zhen Fu 《Journal of Data and Information Science》 CSCD 2024年第2期22-40,共19页
Purpose:Recently,global science has shown an increasing open trend,however,the characteristics of research integrity of open access(OA)publications have rarely been studied.The aim of this study is to compare the char... Purpose:Recently,global science has shown an increasing open trend,however,the characteristics of research integrity of open access(OA)publications have rarely been studied.The aim of this study is to compare the characteristics of retracted articles across different OA levels and discover whether OA level influences the characteristics of retracted articles.Design/methodology/approach:The research conducted an analysis of 6,005 retracted publications between 2001 and 2020 from the Web of Science and Retraction Watch databases.These publications were categorized based on their OA levels,including Gold OA,Green OA,and non-OA.The study explored retraction rates,time lags and reasons within these categories.Findings:The findings of this research revealed distinct patterns in retraction rates among different OA levels.Publications with Gold OA demonstrated the highest retraction rate,followed by Green OA and non-OA.A comparison of retraction reasons between Gold OA and non-OA categories indicated similar proportions,while Green OA exhibited a higher proportion due to falsification and manipulation issues,along with a lower occurrence of plagiarism and authorship issues.The retraction time lag was shortest for Gold OA,followed by non-OA,and longest for Green OA.The prolonged retraction time for Green OA could be attributed to an atypical distribution of retraction reasons.A comparative study on characteristics of retracted publications across different open access levels Research limitations:There is no exploration of a wider range of OA levels,such as Hybrid OA and Bronze OA.Practical implications:The outcomes of this study suggest the need for increased attention to research integrity within the OA publications.The occurrences offalsification,manipulation,and ethical concerns within Green OA publications warrant attention from the scientific community.Originality/value:This study contributes to the understanding of research integrity in the realm of OA publications,shedding light on retraction patterns and reasons across different OA levels. 展开更多
关键词 Open access Retracted publications Reasons for retraction Retraction time lag BIBLIOMETRICS
在线阅读 下载PDF
Resource Allocation for Cognitive Network Slicing in PD-SCMA System Based on Two-Way Deep Reinforcement Learning
19
作者 Zhang Zhenyu Zhang Yong +1 位作者 Yuan Siyu Cheng Zhenjie 《China Communications》 SCIE CSCD 2024年第6期53-68,共16页
In this paper,we propose the Two-way Deep Reinforcement Learning(DRL)-Based resource allocation algorithm,which solves the problem of resource allocation in the cognitive downlink network based on the underlay mode.Se... In this paper,we propose the Two-way Deep Reinforcement Learning(DRL)-Based resource allocation algorithm,which solves the problem of resource allocation in the cognitive downlink network based on the underlay mode.Secondary users(SUs)in the cognitive network are multiplexed by a new Power Domain Sparse Code Multiple Access(PD-SCMA)scheme,and the physical resources of the cognitive base station are virtualized into two types of slices:enhanced mobile broadband(eMBB)slice and ultrareliable low latency communication(URLLC)slice.We design the Double Deep Q Network(DDQN)network output the optimal codebook assignment scheme and simultaneously use the Deep Deterministic Policy Gradient(DDPG)network output the optimal power allocation scheme.The objective is to jointly optimize the spectral efficiency of the system and the Quality of Service(QoS)of SUs.Simulation results show that the proposed algorithm outperforms the CNDDQN algorithm and modified JEERA algorithm in terms of spectral efficiency and QoS satisfaction.Additionally,compared with the Power Domain Non-orthogonal Multiple Access(PD-NOMA)slices and the Sparse Code Multiple Access(SCMA)slices,the PD-SCMA slices can dramatically enhance spectral efficiency and increase the number of accessible users. 展开更多
关键词 cognitive radio deep reinforcement learning network slicing power-domain non-orthogonal multiple access resource allocation
在线阅读 下载PDF
Ultra reliability and massive connectivity provision in integrated internet of military things(IoMT)based on tactical datalink
20
作者 Li Bing Yating Gu +4 位作者 Lanke Hu Li Bowen Yang Lihua Jue Wang Yue Yin 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期386-398,共13页
One of the major challenges arising in internet of military things(IoMT)is accommodating massive connectivity while providing guaranteed quality of service(QoS)in terms of ultra-high reliability.In this regard,this pa... One of the major challenges arising in internet of military things(IoMT)is accommodating massive connectivity while providing guaranteed quality of service(QoS)in terms of ultra-high reliability.In this regard,this paper presents a class of code-domain nonorthogonal multiple accesses(NOMAs)for uplink ultra reliable networking of massive IoMT based on tactical datalink such as Link-16 and joint tactical information distribution system(JTIDS).In the considered scenario,a satellite equipped with Nr antennas servers K devices including vehicles,drones,ships,sensors,handset radios,etc.Nonorthogonal coded modulation,a special form of multiple input multiple output(MIMO)-NOMA is proposed.The discussion starts with evaluating the output signal to interference-plus-noise(SINR)of receiver filter,leading to the unveiling of a closed-form expression for overloading systems as the number of users is significantly larger than the number of devices admitted such that massive connectivity is rendered.The expression allows for the development of simple yet successful interference suppression based on power allocation and phase shaping techniques that maximizes the sum rate since it is equivalent to fixed-point programming as can be proved.The proposed design is exemplified by nonlinear modulation schemes such as minimum shift keying(MSK)and Gaussian MSK(GMSK),two pivotal modulation formats in IoMT standards such as Link-16 and JITDS.Numerical results show that near capacity performance is offered.Fortunately,the performance is obtained using simple forward error corrections(FECs)of higher coding rate than existing schemes do,while the transmit power is reduced by 6 dB.The proposed design finds wide applications not only in IoMT but also in deep space communications,where ultra reliability and massive connectivity is a keen concern. 展开更多
关键词 Satellite network Deep space communications Internet of military things Non-orthogonal multiple access MIMO LINK-16 JITDS
在线阅读 下载PDF
上一页 1 2 59 下一页 到第
使用帮助 返回顶部