EURASIP Journal on Wireless Communications and Networking最新文献

筛选
英文 中文
Retraction Note: Research on intelligent medical big data system based on Hadoop and blockchain 基于Hadoop和区块链的智能医疗大数据系统研究
4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2023-01-11 DOI: 10.1186/s13638-023-02217-8
Xiangfeng Zhang, Yanmei Wang
{"title":"Retraction Note: Research on intelligent medical big data system based on Hadoop and blockchain","authors":"Xiangfeng Zhang, Yanmei Wang","doi":"10.1186/s13638-023-02217-8","DOIUrl":"https://doi.org/10.1186/s13638-023-02217-8","url":null,"abstract":"","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136118561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early-detection scheme based on sequential tests for low-latency communications. 基于顺序测试的低延迟通信早期检测方案。
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2023-01-01 DOI: 10.1186/s13638-023-02240-9
Diego Barragán-Guerrero, Minh Au, Ghyslain Gagnon, François Gagnon, Pascal Giard
{"title":"Early-detection scheme based on sequential tests for low-latency communications.","authors":"Diego Barragán-Guerrero,&nbsp;Minh Au,&nbsp;Ghyslain Gagnon,&nbsp;François Gagnon,&nbsp;Pascal Giard","doi":"10.1186/s13638-023-02240-9","DOIUrl":"https://doi.org/10.1186/s13638-023-02240-9","url":null,"abstract":"<p><p>We propose an early-detection scheme to reduce communications latency based on sequential tests under finite blocklength regime for a fixed-rate transmission without any feedback channel. The proposed scheme processes observations sequentially to decide in favor of one of the candidate symbols. Such a process stops as soon as a decision rule is satisfied or waits for more samples under a given accuracy. We first provide the optimal achievable latency in additive white Gaussian noise channels for every channel code given a probability of block error. For example, for a rate <math><mrow><mi>R</mi> <mo>=</mo> <mn>0.5</mn></mrow> </math> and a blocklength of 500 symbols, we show that only <math><mrow><mn>63</mn> <mo>%</mo></mrow> </math> of the symbol time is needed to reach an error rate equal to <math><msup><mn>10</mn> <mrow><mo>-</mo> <mn>5</mn></mrow> </msup> </math> . Then, we prove that if short messages can be transmitted in parallel Gaussian channels via a multi-carrier modulation, there exists an optimal low-latency strategy for every code. Next, we show how early detection can be effective with band-limited orthogonal frequency-division multiplexing signals while maintaining a given spectral efficiency by random coding or pre-coding random matrices. Finally, we show how the proposed early-detection scheme is effective in multi-hop systems.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"2023 1","pages":"31"},"PeriodicalIF":2.6,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10030544/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9184005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some power allocation algorithms for cognitive uplink satellite systems. 认知上行卫星系统的一些功率分配算法。
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2023-01-01 DOI: 10.1186/s13638-023-02234-7
Arthur Louchart, Ehsan Tohidi, Philippe Ciblat, David Gesbert, Eva Lagunas, Charly Poulliat
{"title":"Some power allocation algorithms for cognitive uplink satellite systems.","authors":"Arthur Louchart,&nbsp;Ehsan Tohidi,&nbsp;Philippe Ciblat,&nbsp;David Gesbert,&nbsp;Eva Lagunas,&nbsp;Charly Poulliat","doi":"10.1186/s13638-023-02234-7","DOIUrl":"https://doi.org/10.1186/s13638-023-02234-7","url":null,"abstract":"<p><p>Cognitive satellite communication (SatCom) is rapidly emerging as a promising technology to overcome the scarcity of the exclusive licensed band model in order to fulfill the increasing demand for high data rate services. The paper addresses power allocation methods for multi-operator multi-beam uplink satellite communication systems co-existing with a Ka-band terrestrial network, using cognitive radio paradigm. Such a scenario is especially challenging because of (i) the coexisting multiple SatCom operators over the cognitive band need to coordinate the use of their resources under limited inter-operator information exchange, and (ii) nonlinear onboard high power amplifier (HPA) which leads to nonlinear interference between users and beams. In order to tackle the first challenge, we propose distributed power allocation algorithms including the standard Alternate Direction Multiplier Method (ADMM); Regarding the HPA nonlinear impairment, we propose nonlinear-aware power allocation based on Signomial Programming. The proposed solutions outperform state-of-the-art in both cases.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"2023 1","pages":"32"},"PeriodicalIF":2.6,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10078052/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9290229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchained supply chain management based on IoT tracking and machine learning. 基于物联网跟踪和机器学习的区块链供应链管理。
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2022-01-01 DOI: 10.1186/s13638-022-02209-0
Zhongping Dong, Wei Liang, Yan Liang, Weibo Gao, Yi Lu
{"title":"Blockchained supply chain management based on IoT tracking and machine learning.","authors":"Zhongping Dong,&nbsp;Wei Liang,&nbsp;Yan Liang,&nbsp;Weibo Gao,&nbsp;Yi Lu","doi":"10.1186/s13638-022-02209-0","DOIUrl":"https://doi.org/10.1186/s13638-022-02209-0","url":null,"abstract":"<p><p>When it comes to running and managing modern supply chains, 6G Internet of things (IoT) is of utmost importance. To provide IoT with security and automation, blockchain and machine learning are two upper-layer technology that can help. First, we propose to utilize blockchain in modern supply chains to ensure efficient collaboration between all parties. Second, we adopt multi-head attention (MHA)-based gated recurrent unit (GRU) to do inbound logistics task prediction. Finally, numerical results justify that multi-head attention-based GRU model has better fitting efficiency and prediction accuracy than its counterparts.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"2022 1","pages":"127"},"PeriodicalIF":2.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9798956/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10480509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Joint scatterer localization and material identification using radio access technology. 利用无线接入技术联合散射体定位和物质识别。
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2022-01-01 Epub Date: 2022-09-17 DOI: 10.1186/s13638-022-02167-7
Yi Geng, Deep Shrestha, Vijaya Yajnanarayana, Erik Dahlman, Ali Behravan
{"title":"Joint scatterer localization and material identification using radio access technology.","authors":"Yi Geng,&nbsp;Deep Shrestha,&nbsp;Vijaya Yajnanarayana,&nbsp;Erik Dahlman,&nbsp;Ali Behravan","doi":"10.1186/s13638-022-02167-7","DOIUrl":"https://doi.org/10.1186/s13638-022-02167-7","url":null,"abstract":"<p><p>Cellular network technologies and radar sensing technologies have been developing in parallel for decades. Instead of developing two individual technologies, the 6G cellular network is expected to naturally support both communication and radar functionalities with shared hardware and carrier frequencies. In this regard, radio access technology (RAT)-based scatterer localization system is one of the important aspects of joint communication and sensing system that uses communication signals between transceivers to determine the location of scatterers in and around the propagation paths. In this article, we first identify the challenges of the RAT-based scatterer localization system and then present single- and multiple-bounce reflection loss simulation results for three common building materials in indoor environments. We also propose two novel methods to jointly localize and identify the type of the scatterers in a rich scattering environment.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":" ","pages":"87"},"PeriodicalIF":2.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9483538/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"33484243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enabling efficient traceable and revocable time-based data sharing in smart city. 实现智慧城市中高效、可追溯、可撤销的基于时间的数据共享。
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2022-01-01 Epub Date: 2022-01-04 DOI: 10.1186/s13638-021-02072-5
Jiawei Zhang, Teng Li, Qi Jiang, Jianfeng Ma
{"title":"Enabling efficient traceable and revocable time-based data sharing in smart city.","authors":"Jiawei Zhang,&nbsp;Teng Li,&nbsp;Qi Jiang,&nbsp;Jianfeng Ma","doi":"10.1186/s13638-021-02072-5","DOIUrl":"https://doi.org/10.1186/s13638-021-02072-5","url":null,"abstract":"<p><p>With the assistance of emerging techniques, such as cloud computing, fog computing and Internet of Things (IoT), smart city is developing rapidly into a novel and well-accepted service pattern these days. The trend also facilitates numerous relevant applications, e.g., smart health care, smart office, smart campus, etc., and drives the urgent demand for data sharing. However, this brings many concerns on data security as there is more private and sensitive information contained in the data of smart city applications. It may incur disastrous consequences if the shared data are illegally accessed, which necessitates an efficient data access control scheme for data sharing in smart city applications with resource-poor user terminals. To this end, we proposes an efficient traceable and revocable time-based CP-ABE (TR-TABE) scheme which can achieve time-based and fine-grained data access control over large attribute universe for data sharing in large-scale smart city applications. To trace and punish the malicious users that intentionally leak their keys to pursue illicit profits, we design an efficient user tracing and revocation mechanism with forward and backward security. For efficiency improvement, we integrate outsourced decryption and verify the correctness of its result. The proposed scheme is proved secure with formal security proof and is demonstrated to be practical for data sharing in smart city applications with extensive performance evaluation.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":" ","pages":"3"},"PeriodicalIF":2.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8727427/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39957473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient models for enhancing the link adaptation performance of LTE/LTE-A networks. 提高LTE/LTE- a网络链路自适应性能的有效模型。
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2022-01-01 Epub Date: 2022-02-02 DOI: 10.1186/s13638-022-02091-w
Ali Abdulqader Bin-Salem, Tat-Chee Wan, Hamad Naeem, Mohammed Anbar, Sabri M Hanshi, Abdellah Redjaimia
{"title":"Efficient models for enhancing the link adaptation performance of LTE/LTE-A networks.","authors":"Ali Abdulqader Bin-Salem,&nbsp;Tat-Chee Wan,&nbsp;Hamad Naeem,&nbsp;Mohammed Anbar,&nbsp;Sabri M Hanshi,&nbsp;Abdellah Redjaimia","doi":"10.1186/s13638-022-02091-w","DOIUrl":"https://doi.org/10.1186/s13638-022-02091-w","url":null,"abstract":"<p><p>Link adaptation (LA) is the ability to adapt the modulation scheme (MS) and the coding rate of the error correction in accordance with the quality of the radio link. The MS plays an important role in enhancing the performance of LTE/LTE-A, which is typically dependent on the received signal to noise ratio (SNR). However, using the SNR to select the proper MSs is not enough given that adaptive MSs are sensitive to error. Meanwhile, non-optimal MS selection may seriously impair the system performance and hence degrades LA. In LTE/ LTE-A, the LA system must be designed and optimized in accordance with the characteristics of the physical (e.g., MSs) and MAC layers (e.g., Packet loss) to enhance the channel efficiency and throughput. Accordingly, this study proposes using two LA models to overcome the problem. The first model, named the cross-layer link adaptation (CLLA) model, is based on the downward cross-layer approach. This model is designed to overcome the accuracy issue of adaptive modulation in existing systems and improve the channel efficiency and throughput. The second model, named the Markov decision process over the CLLA (MDP-CLLA) model, is designed to improve on the selection of modulation levels. Besides that, our previous contribution, namely the modified alpha-Shannon capacity formula, is adopted as part of the MDP-CLLA model to enhance the link adaptation of LTE/LTE-A. The effectiveness of the proposed models is evaluated in terms of throughput and packet loss for different packet sizes using the MATLAB and Simulink environments for the single input single output (SISO) mode for transmissions over Rayleigh fading channels. In addition, phase productivity, which is defined as the multiplication of the total throughput for a specific modulation with the difference between adjacent modulation SNR threshold values, is used to determine the best model for specific packet sizes in addition to determine the optimal packet size for specific packet sizes among models. Results generally showed that the throughput improved from 87.5 to 89.6% for (QPSK <math><mo>→</mo></math> 16-QAM) and from 0 to 43.3% for (16-QAM <math><mo>→</mo></math> 64-QAM) modulation transitions, respectively, using the CLLA model when compared with the existing system. Moreover, the throughput using the MDP-CLLA model was improved by 87.5-88.6% and by 0-43.2% for the (QPSK <math><mo>→</mo></math> 16-QAM)and (16-QAM <math><mo>→</mo></math> 64-QAM) modulation transitions, respectively, when compared with the CLLA model and the existing system. Results were also validated for each model via the summation of the phase productivity for every modulation at specific packet sizes, followed by the application one-way analysis of variance (ANOVA) statistical analysis with a post hoc test, to prove that the MDP-CLLA model improves with best high efficiency than the CLLA model and the existing system.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":" ","pages":"10"},"PeriodicalIF":2.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8809635/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39898632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial bandit approach for RIS-aided OFDM communication. ris辅助OFDM通信的对抗强盗方法。
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2022-01-01 Epub Date: 2022-11-17 DOI: 10.1186/s13638-022-02184-6
Messaoud Ahmed Ouameur, Lê Dương Tuấn Anh, Daniel Massicotte, Gwanggil Jeon, Felipe Augusto Pereira de Figueiredo
{"title":"Adversarial bandit approach for RIS-aided OFDM communication.","authors":"Messaoud Ahmed Ouameur,&nbsp;Lê Dương Tuấn Anh,&nbsp;Daniel Massicotte,&nbsp;Gwanggil Jeon,&nbsp;Felipe Augusto Pereira de Figueiredo","doi":"10.1186/s13638-022-02184-6","DOIUrl":"https://doi.org/10.1186/s13638-022-02184-6","url":null,"abstract":"<p><p>To assist sixth-generation wireless systems in the management of a wide variety of services, ranging from mission-critical services to safety-critical tasks, key physical layer technologies such as reconfigurable intelligent surfaces (RISs) are proposed. Even though RISs are already used in various scenarios to enable the implementation of smart radio environments, they still face challenges with regard to real-time operation. Specifically, high dimensional fully passive RISs typically need costly system overhead for channel estimation. This paper, however, investigates a semi-passive RIS that requires a very low number of active elements, wherein only two pilots are required per channel coherence time. While in its infant stage, the application of deep learning (DL) tools shows promise in enabling feasible solutions. We propose two low-training overhead and energy-efficient adversarial bandit-based schemes with outstanding performance gains when compared to DL-based reflection beamforming reference methods. The resulting deep learning models are discussed using state-of-the-art model quality prediction trends.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":" ","pages":"111"},"PeriodicalIF":2.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9672029/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"40718992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels. 窃听器衰落信道信息保密性能分析通用工具综述。
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2021-01-01 Epub Date: 2021-12-04 DOI: 10.1186/s13638-021-02065-4
Long Kong, Yun Ai, Lei Lei, Georges Kaddoum, Symeon Chatzinotas, Björn Ottersten
{"title":"An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels.","authors":"Long Kong,&nbsp;Yun Ai,&nbsp;Lei Lei,&nbsp;Georges Kaddoum,&nbsp;Symeon Chatzinotas,&nbsp;Björn Ottersten","doi":"10.1186/s13638-021-02065-4","DOIUrl":"https://doi.org/10.1186/s13638-021-02065-4","url":null,"abstract":"<p><p>Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security exploits the characteristics of wireless channels, e.g., fading, noise, interference, etc., to enhance wireless security. It is proved that secure transmission can benefit from fading channels. Accordingly, numerous researchers have explored what fading can offer for physical layer security, especially the investigation of physical layer security over wiretap fading channels. Therefore, this paper aims at reviewing the existing and ongoing research works on this topic. More specifically, we present a classification of research works in terms of the four categories of fading models: (i) small-scale, (ii) large-scale, (iii) composite, and (iv) cascaded. To elaborate these fading models with a generic and flexible tool, three promising candidates, including the mixture gamma (MG), mixture of Gaussian (MoG), and Fox's <i>H</i>-function distributions, are comprehensively examined and compared. Their advantages and limitations are further demonstrated via security performance metrics, which are designed as vivid indicators to measure how perfect secrecy is ensured. Two clusters of secrecy metrics, namely (i) secrecy outage probability (SOP), and the lower bound of SOP; and (ii) the probability of nonzero secrecy capacity (PNZ), the intercept probability, average secrecy capacity (ASC), and ergodic secrecy capacity, are displayed and, respectively, deployed in passive and active eavesdropping scenarios. Apart from those, revisiting the secrecy enhancement techniques based on Wyner's wiretap model, the on-off transmission scheme, jamming approach, antenna selection, and security region are discussed.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"2021 1","pages":"194"},"PeriodicalIF":2.6,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8642773/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39719537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Actor-critic learning-based energy optimization for UAV access and backhaul networks. 基于actor - critical学习的无人机接入和回程网络能量优化。
IF 2.6 4区 计算机科学
EURASIP Journal on Wireless Communications and Networking Pub Date : 2021-01-01 Epub Date: 2021-04-07 DOI: 10.1186/s13638-021-01960-0
Yaxiong Yuan, Lei Lei, Thang X Vu, Symeon Chatzinotas, Sumei Sun, Björn Ottersten
{"title":"Actor-critic learning-based energy optimization for UAV access and backhaul networks.","authors":"Yaxiong Yuan,&nbsp;Lei Lei,&nbsp;Thang X Vu,&nbsp;Symeon Chatzinotas,&nbsp;Sumei Sun,&nbsp;Björn Ottersten","doi":"10.1186/s13638-021-01960-0","DOIUrl":"https://doi.org/10.1186/s13638-021-01960-0","url":null,"abstract":"<p><p>In unmanned aerial vehicle (UAV)-assisted networks, UAV acts as an aerial base station which acquires the requested data via backhaul link and then serves ground users (GUs) through an access network. In this paper, we investigate an energy minimization problem with a limited power supply for both backhaul and access links. The difficulties for solving such a non-convex and combinatorial problem lie at the high computational complexity/time. In solution development, we consider the approaches from both actor-critic deep reinforcement learning (AC-DRL) and optimization perspectives. First, two offline non-learning algorithms, i.e., an optimal and a heuristic algorithms, based on piecewise linear approximation and relaxation are developed as benchmarks. Second, toward real-time decision-making, we improve the conventional AC-DRL and propose two learning schemes: AC-based user group scheduling and backhaul power allocation (ACGP), and joint AC-based user group scheduling and optimization-based backhaul power allocation (ACGOP). Numerical results show that the computation time of both ACGP and ACGOP is reduced tenfold to hundredfold compared to the offline approaches, and ACGOP is better than ACGP in energy savings. The results also verify the superiority of proposed learning solutions in terms of guaranteeing the feasibility and minimizing the system energy compared to the conventional AC-DRL.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"2021 1","pages":"78"},"PeriodicalIF":2.6,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13638-021-01960-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39623972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信