首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 20 毫秒
1.
In this paper, we provide a methodology to evaluate the capacity of a Massive multiple-input multiple-output (MIMO) supported Internet of Things (IoT) system in which a large number of low cost low power IoT devices transmit and receive sporadic data. Numerous IoT devices are supported by a single cell Massive MIMO base station (BS) with maximum-ratio (MR) processing. Orthogonal reference signals (RSs) or pilots are assigned randomly to all the IoT devices for channel estimation purpose. The number of simultaneously active IoT devices follows Poisson distribution. Due to the tremendous number of IoT devices, orthogonal RSs are heavily reused, which severely degrades the receiver signal quality. One of the most important performance criteria for this kind of system is the blocking probability which shows the percentage of the outage IoT devices, and how we maintain the low blocking probability while supporting all the IoT devices simultaneously is particularly important. Due to RS reuse, we can divide IoT devices into two groups based on their interference levels. We provide detailed theoretical analyses, and show that the blocking primarily happens to the group with higher interference level. Increasing the number of service antennas and/or reducing the number of IoT devices can help to improve the performance of the blocking probability, however there is a regime in which the parameter adjustment helps little to improve the performance. Based on these factors, we provide a useful algorithm to improve the performance of blocking probability. A number of simulation results are also provided to validate the theoretical analysis.  相似文献   

2.
This study presents a novel frequency synchronization scheme for orthogonal frequency division multiple access uplink systems. The proposed approach first estimates the carrier frequency offset (CFO) from the zeros of a backward prediction system. Then, based on the CFO estimates, two types of filters, namely zero-forcing and the linearly constrained minimum variance filters, are developed to suppress multiple access interference (MAI). Computer simulation results show that in addition to having a reduced computational complexity, the proposed algorithm has reliable CFO estimates and possesses at least a 3-dB power gain in MAI suppression over conventional minimum mean square error algorithms for frequency synchronization.  相似文献   

3.
Conventional downlink non-orthogonal multiple access (NOMA) uses the power domain for multiple access and applies successive interference cancellation (SIC) to mitigate intra-cluster interference. It requires sophisticated user terminals (UTs) clustering, moreover, imperfect SIC results in error propagation that severely degrades system capacity. In this paper, a novel code-aided multiuser multiple-input multiple-output NOMA (MIMONOMA) framework for downlink transmission is proposed. Since the total number of UTs in a cell is in general more than the number of transmit antennas at the base station (BS), purely zero-forcing (ZF) downlink beamforming is unable to mitigate multiuser interference (MUI). We first propose a simple grouping algorithm that separate all UTs in a cell into several clusters, with cluster number less than or equal to BS antennas. ZF-based multiuser beamforming is then employed to remove the inter-cluster interference. To mitigate the intra-cluster interference, we propose to modulate the downlink data for each UT within the same cluster by orthogonal codes, thereby, instead of SIC, matched-filtering can be employed at each UT for interference suppression. Computer simulation results quantify the capacity gain of the proposed coded-aided MIMONOMA method over conventional MIMONOMA schemes.  相似文献   

4.
With the development of information technology and economic growth, the Internet of Things (IoT) industry has also entered the fast lane of development. The IoT industry system has also gradually improved, forming a complete industrial foundation, including chips, electronic components, equipment, software, integrated systems, IoT services, and telecom operators. In the event of selective forwarding attacks, virus damage, malicious virus intrusion, etc., the losses caused by such security problems are more serious than those of traditional networks, which are not only network information materials, but also physical objects. The limitations of sensor node resources in the Internet of Things, the complexity of networking, and the open wireless broadcast communication characteristics make it vulnerable to attacks. Intrusion Detection System (IDS) helps identify anomalies in the network and takes the necessary countermeasures to ensure the safe and reliable operation of IoT applications. This paper proposes an IoT feature extraction and intrusion detection algorithm for intelligent city based on deep migration learning model, which combines deep learning model with intrusion detection technology. According to the existing literature and algorithms, this paper introduces the modeling scheme of migration learning model and data feature extraction. In the experimental part, KDD CUP 99 was selected as the experimental data set, and 10% of the data was used as training data. At the same time, the proposed algorithm is compared with the existing algorithms. The experimental results show that the proposed algorithm has shorter detection time and higher detection efficiency.  相似文献   

5.
The massive number of Internet of Things (IoT) devices connected to the Internet is continuously increasing. The operations of these devices rely on consuming huge amounts of energy. Power limitation is a major issue hindering the operation of IoT applications and services. To improve operational visibility, Low-power devices which constitute IoT networks, drive the need for sustainable sources of energy to carry out their tasks for a prolonged period of time. Moreover, the means to ensure energy sustainability and QoS must consider the stochastic nature of the energy supplies and dynamic IoT environments. Artificial Intelligence (AI) enhanced protocols and algorithms are capable of predicting and forecasting demand as well as providing leverage at different stages of energy use to supply. AI will improve the efficiency of energy infrastructure and decrease waste in distributed energy systems, ensuring their long-term viability. In this paper, we conduct a survey to explore enhanced AI-based solutions to achieve energy sustainability in IoT applications. AI is relevant through the integration of various Machine Learning (ML) and Swarm Intelligence (SI) techniques in the design of existing protocols. ML mechanisms used in the literature include variously supervised and unsupervised learning methods as well as reinforcement learning (RL) solutions. The survey constitutes a complete guideline for readers who wish to get acquainted with recent development and research advances in AI-based energy sustainability in IoT Networks. The survey also explores the different open issues and challenges.  相似文献   

6.
A novel space shift keying (SSK) multiple–input multiple–output (MIMO) technique based on Steiner triple system is proposed and analyzed in this article. SSK attracted considerable research interest in the past few years driven by the several promised inherent advantages including low error probability, low computational complexity and a very simple hardware implementation with very low cost and power consumption. Yet, the spectral efficiency of SSK increases with a base two logarithm of the number of transmit antennas and high data rates are only viable with a massive and impractical number of transmit antennas. Alternatively, generalized SSK (GSSK) scheme is considered, where a combination of antennas is activated at each time instant. GSSK promises the use of arbitrary number of transmit antennas not necessarily a power of two integer. Also, GSSK can attain high data rate with low number of transmit antennas at the cost of substantial degradation in the error performance. In this study, a Steiner triple system is utilized to propose a tailored SSK scheme with substantial reduction in the required number of transmit antennas, without compromising the error probability. It is shown that the proposed Steiner–SSK (S–SSK) MIMO system achieves almost identical error performance to a conventional SSK system but with nearly 90% reduction in the number of transmit antennas. As well, the average bit error rate (ABER) of S–SSK is shown to outperform GSSK by at least 3dB. It is also reported that a S–SSK system accomplishes significant reduction in hardware cost, power consumption, and computational complexity as compared to conventional SSK scheme. Yet, GSSK is shown to marginally outperforms S–SSK in these metrics as it requires smaller number of transmit antennas per a target spectral efficiency.  相似文献   

7.
User-created automation applets to connect IoT devices and applications have become popular and widely available. Exploring those applets enables us to grasp the patterns of how users are utilizing and maximizing the power of connection by themselves, which can deliver practical implications for IoT service design. This study builds an IoT application network with the data of the IFTTT(if this then that) platform which is the most popular platform for self-automation of IoT services. The trigger-action relationships of the IFTTT applets currently activated are collected and used to construct an IoT application network whose nodes are IoT service channels, and links represent their connections. The constructed IoT network is then embedded by the node2vec technique, an algorithmic framework for representational learning of nodes in networks. Clustering the embedded nodes produces the four clusters of IoT usage patterns: Smart Home, Activity Tracking, Information Digest, and Lifelogging & Sharing. We also predict the IoT application network using node2vec-based link prediction with several machine learning classifiers to identify promising connections between IoT applications. Feasible service scenarios are then generated from predicted links between IoT applications. The findings and the proposed approach can offer IoT service providers practical implications for enhancing user experiences and developing new services.  相似文献   

8.
针对LTE无线通信系统上行链路,提出一种联合HII和OI的干扰协调方法.与以往提高整个网络吞吐量或小区边缘用户速率为目标的传统干扰协调方法不同,该方法从满足用户的实际通信质量要求出发,以提高用户满意度为目标,并首次联合使用了LTE R8标准定义的2个信息(高干扰指示HII和过载指示OI)进行频域协调和功率调整.仿真结果表明,该方法相比传统的干扰协调方法能明显提升用户满意度,具有较高的实用价值.  相似文献   

9.
This paper proposes four resource (subcarriers-and-bits) allocation methods for OFDMA-based multiuser MIMO system. We employ adaptive modulation according to the channel state information (CSI) of each user to meet the symbol error rate (SER) requirement. The first scheme is based on transmit spatial diversity (TSD), in which the vector channel with the highest gain between the base station and specific antenna at remote terminal is chosen for transmission. The second scheme assigns subcarrier to the best user and employs spatial multiplexing on the MIMO system to further enhance the throughput. The space-division multiple-access (SDMA) scheme assigns single subcarrier simultaneously to the remote terminals with pairwise “nearly orthogonal” spatial signatures. In the fourth scheme, we propose to design the transmit beamformers based on the zero-forcing (ZF) criterion such that the multi-user interference (MUI) is completely removed. Moreover, spatial multiplexing technique is jointly exploited to achieve throughput multiplication. Numerical results demonstrate that all the proposed algorithms are simple and reliable and the fourth scheme is the best since all users are allowed to share single subcarrier.  相似文献   

10.
茹小波 《大众科技》2012,14(4):69-72
在室内无线光局域网中,可见光通信越来越引起了人们的关注。可见光通信具有发射功率高、无需申请频谱、无电磁干扰、节约能源等优点,因此注定会成为未来室内无线光通信的主角。提出了一种可见光局域网通信的模型,重点研究了基于无线光码分多址(WOCDMA)的信道共享方案。在以往的光正交码(OOC)基础上,采用了随机光码(random optical code)作为系统的扩频码,并对其相应的性能做了对比。  相似文献   

11.
Recent research in the human computer interaction and information retrieval areas has revealed that search response latency exhibits a clear impact on the user behavior in web search. Such impact is reflected both in users’ subjective perception of the usability of a search engine and in their interaction with the search engine in terms of the number of search results they engage with. However, a similar impact analysis has been missing so far in the context of sponsored search. Since the predominant business model for commercial search engines is advertising via sponsored search results (i.e., search advertisements), understanding how response latency influences the user interaction with the advertisements displayed on the search engine result pages is crucial to increase the revenue of a commercial search engine. To this end, we conduct a large-scale analysis using query logs obtained from a commercial web search. We analyze the short-term and long-term impact of search response latency on the querying and clicking behaviors of users using desktop and mobile devices to access the search engine, as well as the corresponding impact on the revenue of the search engine. This analysis demonstrates the importance of serving sponsored search results with low latency and provides insight into the ad serving policy of commercial search engines to ensure long-term user engagement and search revenue.  相似文献   

12.
Recently, some copy-move forgeries have made use of homogeneous region(s) in an image with the large-scaling attack(s) to highlight or cover the target objects, which is easy to implement but difficult to detect. Unfortunately, existing Copy-Move Forgery Detection (CMFD) methods fail to detect such kinds of forgeries because they are incapable of extracting a sufficient number of effective keypoints in the homogeneous region(s), leading to inaccuracy and inefficiency in detection. In this work, a new CMFD scheme is proposed: 1) An improved SIFT structure with inherent scaling invariance is designed to enhance the capability of extracting effective keypoints in the homogeneous region. 2). The enhancement of massive keypoints extraction in the homogeneous region incurs a heavy computational burden in feature matching (Note that this is a common issue in all CMFD methods). For this reason, a new Feature Label Matching (FLM) method is proposed to break down the massive keypoints into different small label groups, each of which contains only a small number of keypoints, for significantly improved matching effectiveness and efficiency. 3) Identifying true keypoints for matching is a critical issue for performance. In our work, the Hierarchical Segmentation Filtering (HSF) algorithm is newly proposed to filter out suspicious outliers, based on the statistics on the coarse-to-fine hierarchical segmentations. 4) Finally, the fusion of the coarse-to-fine hierarchical segmentation maps fills the forgery regions precisely. In our experiments, the proposed scheme achieves excellent detection performance under various attacks, especially for the homogeneous region(s) detection under large-scaling attack(s). Extensive experimental results demonstrate that the proposed scheme achieves the best F1 scores and least computational cost in addressing the geometrical attacks on the IMD dataset (a comprehensive dataset), and CMH datasets (most forgery samples under geometric attacks). Compared to existing state-of-the-art methods, the proposed scheme raises at least 20% and 25% in terms of F1 scores under scaling factors of 50%, and 200% in large-scaling sub-datasets of IMD, respectively.  相似文献   

13.
Microblog has become a widely used social media tool, which can help users publish or obtain Public Welfare Activity (PWA) information. Due to the characteristics of large-scale and arbitrary in microblog use, a large amount of messy information is produced, which makes it difficult to discover interesting PWA information. Thus, developing a push system, which can seek a certain number of local potential users for a PWA to be Pushed (PWAP), would be a great help. However, it is challenging to discover users explicitly interested in PWAs and obtain a certain number of local potential users. In this paper, a Content-Location-Aware PWA information Push system based on microblog (CLAP) is proposed, which can seek a certain number of local potential users for a PWAP from massive microblog users, and push the corresponding information to them. Specifically, a topic model and keyword search based method is firstly utilized to discover users who are explicitly interested in the PWAP (i.e., seed users). Secondly, a distance metric learning based method is utilized to obtain a certain number of local potential users by measuring the similarities between seed users and local users. Experimental results demonstrate that the proposed system has a potential to generate superior results.  相似文献   

14.
《Journal of The Franklin Institute》2021,358(18):10232-10249
In this paper, we investigate the physical-layer security for an Internet of Things (IoT) relaying network employing non-orthogonal multiple access (NOMA) in the context of non-linear energy harvesting. In particular, a power-constrained source transmits its confidential information to a destination via an IoT device, which first decodes the received signal and then forwards the decoded data together with its own information using the NOMA technique to their respective destinations, while an eavesdropper is overhearing this transmission. Considering the scenario that both the power-constrained source and the IoT device are assumed to work under non-linear energy harvesting modes, and are capable of harvesting energy from a power beacon with a time switching protocol, both analytical and asymptotic expressions for secrecy outage probability as well as the analytical expression for the probability of strictly positive secrecy capacity are derived. In addition, those expressions are also verified with Monte-Carlo simulations.  相似文献   

15.
Blockchain plays a vital task in cybersecurity. With the exerted efforts for realising large-scale quantum computers, most current cryptographic mechanisms may be hacked. Accordingly, we need a quantum tool utilised for designing blockchain frameworks to have the ability to be executed in the level of digital computers and resist the probable attacks from both digital and quantum computers. Quantum walks may be utilised as a quantum-inspired model for designing new cryptographic algorithms. In this paper, we present a new authentication and encryption protocol based on quantum-inspired quantum walks (QIQW). The proposed protocol is utilized to build a blockchain framework for secure data transmission among IoT devices. Instead of using classical cryptographic hash functions, quantum hash functions based on QIQW are employed for linking blocks of the chain. The main advantages of the presented framework are helping IoT nodes to effectively share their data with other nodes and full control of their records. Security analysis demonstrates that our proposed protocol can defend against message attack and impersonation attacks, thus ensuring secure transmission of data among IoT devices.  相似文献   

16.
开放获取资源知识整合平台构建研究   总被引:2,自引:0,他引:2  
随着布达佩斯开放获取运动的开展,开放获取资源的数量日益增多,并呈海量增长的态势。这些资源具有极高的知识性、学术性、科研性,是教学、科研极具重要的潜在资源。因此,发现、获取、整合、利用开放获取资源,为用户提供便捷的获取方法与途径,促进开放获取资源的开发和利用,拓展用户的服务空间,都具有十分重要的意义。随着语义互联网和本体技术的快速发展,开放获取资源的整合向知识整合迈进。本文着重分析了开放获取资源知识整合的流程以及如何构建开放获取资源知识整合的平台框架模型,为开放获取资源的知识获取和利用提供良好的理论基础和实践指导。  相似文献   

17.
The beamforming-based spatial precoding (BBSP) method has been proposed to reduce the overheads of the downlink training and the channel state information feedback in the frequency-division duplex (FDD) massive multiple-input-multiple-output (MIMO) wireless communication systems. However, the original BBSP method suffers from the interference problem at user equipments (UEs) because of using a set of pre-defined fixed beamforming coefficients. Moreover, the BBSP method can not deal with the performance degradation due to mutual coupling (MC) effect because of massive antennas deployed at transmitter and receiver. This paper presents a precoding method that incorporates a beamforming-selection spatial precoding (BSSP) scheme with a population-based stochastic optimization algorithm such that the designed beamforming coefficients can greatly reduce the severe interference between UEs and alleviate the MC effect on the performance of massive MIMO systems. The proposed method can not only achieve better bit error rate (BER) performance than the conventional BBSP method, but also preserves the advantages of the BBSP method having lower overheads of the downlink training and the CSI feedback. In particular, we propose an appropriate fitness function based on an averaged BER formula for the population-based stochastic optimization algorithm to find the optimal beamforming coefficients. Numerical simulations are also presented for both the urban-macro and the urban-micro wireless MIMO scenarios to validate the superior BER performance of the proposed precoding method as compared to the existing BBSP method.  相似文献   

18.
一种二用户协作HARQ通信方案   总被引:1,自引:0,他引:1  
针对协作通信(cooperative communication)的重传问题,提出了在2个用户和基站之间的通信过程中,用户之间如何协作进行混合ARQ(hybrid ARQ)的方案. 通过分时发送机制,每个用户都保存对方上一次发送的数据,在收到基站的ACK/NACK后,根据基站的指示,从存储的上一次发送数据包中,寻找需要重传的数据包,并插入自己需要传送的新数据包,在下一个发送时隙中进行传输. 通过协作通信系统所实现的空间分集增益,提高了HARQ的性能. 比较2个用户分别独立与基站通信和相互协作与基站通信的HARQ方案,并通过理论分析和仿真,比较不同信噪比(SNR)下的吞吐量(throughput)和误包率(PER)以及平均时延,证实了本系统在可提高系统传输时延的前提下,具有更高的吞吐量和更低的PER.  相似文献   

19.
Wideband code division multiple access (WCDMA) is selected as the air interface scheme for 3G wireless networks. This scheme offers a high data rate that makes the wireless networks a suitable environment for real-time packet data services. 3G networks can be used to deliver multimedia traffic with guaranteed quality of service, but faces the scalability challenge in terms of the number of connections that can be setup in the cellular network. The more connections take place in WCDMA based network, the more interference is created, which yields more QoS degradation. To handle this issue, several algorithms that are collectively alleviate the QoS degradation have been developed and implemented. In this paper, we provide a system link simulator that models the WCDMA cellular network with the necessary radio resource management algorithms. The downlink direction has been simulated as it is usually the limiting link in setting up multimedia sessions, and interactive web sessions. The simulation environment provides, through the implementation of new wrap-around technique, a fair source of intra-cell and inter-cell interference, and avoids session disconnections due to the limited simulation area. Then, we suggest an admission control algorithm for admitting immediate and advance radio resource reservation requests. The admission control algorithm decision is based on the amount of interference that the new request will add to the network. The algorithm relies on the radio resource reservation states that stores all admitted immediate and advance sessions.  相似文献   

20.
As time went on, technological progress inevitably altered our daily routines. Many new technologies, such as the Internet of Things (IoT) and cryptocurrency, offer revolutionary possibilities. To put it simply, the blockchain is a distributed, public, and auditable database that can be used to record financial transactions. The IoT, or “Internet of Things,” is a system of interconnected electronic devices that can communicate with one another and be remotely monitored and handled. This paper reviews the most recent findings in the field of blockchain and Internet of Things with the goal of examining blockchain as a possible answer to secure IoT data management within supply networks. There is a dearth of literature in the early stages of both blockchain and IoT study because they are such novel topics. The study's findings suggest that in order to improve their leadership quality to intentionally impact employee performance, industry managers should pay attention to human resource management indicators like collaboration, involvement, actualization, perception, and teamwork. This is primarily because of the inherent limitations of IoT devices and the distributed ledger architecture of the blockchain technology. There is potential for IoT to provide many advantages if blockchain capabilities can be optimized for it.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号