Digital Communications and Networks最新文献

筛选
英文 中文
Irregular IRS-aided SWIPT secure communication system with imperfect CSI 不规范的irs辅助SWIPT安全通信系统,CSI不完善
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-06-01 DOI: 10.1016/j.dcan.2024.09.003
Chunlong He , Guanhai Lin , Chiya Zhang , Xingquan Li
{"title":"Irregular IRS-aided SWIPT secure communication system with imperfect CSI","authors":"Chunlong He ,&nbsp;Guanhai Lin ,&nbsp;Chiya Zhang ,&nbsp;Xingquan Li","doi":"10.1016/j.dcan.2024.09.003","DOIUrl":"10.1016/j.dcan.2024.09.003","url":null,"abstract":"<div><div>The performance of traditional regular Intelligent Reflecting Surface (IRS) improves as the number of IRS elements increases, but more reflecting elements lead to higher IRS power consumption and greater overhead of channel estimation. The Irregular Intelligent Reflecting Surface (IIRS) can enhance the performance of the IRS as well as boost the system performance when the number of reflecting elements is limited. However, due to the lack of radio frequency chain in IRS, it is challenging for the Base Station (BS) to gather perfect Channel State Information (CSI), especially in the presence of Eavesdroppers (Eves). Therefore, in this paper we investigate the minimum transmit power problem of IIRS-aided Simultaneous Wireless Information and Power Transfer (SWIPT) secure communication system with imperfect CSI of BS-IIRS-Eves links, which is subject to the rate outage probability constraints of the Eves, the minimum rate constraints of the Information Receivers (IRs), the energy harvesting constraints of the Energy Receivers (ERs), and the topology matrix constraints. Afterward, the formulated non-convex problem can be efficiently tackled by employing joint optimization algorithm combined with successive refinement method and adaptive topology design method. Simulation results demonstrate the effectiveness of the proposed scheme and the superiority of IIRS.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 3","pages":"Pages 878-885"},"PeriodicalIF":7.5,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144330040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning aided underwater acoustic OFDM receivers: Model-driven or data-driven? 深度学习辅助水声OFDM接收机:模型驱动还是数据驱动?
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-06-01 DOI: 10.1016/j.dcan.2024.10.006
Hao Zhao , Miaowen Wen , Fei Ji , Yaokun Liang , Hua Yu , Cui Yang
{"title":"Deep learning aided underwater acoustic OFDM receivers: Model-driven or data-driven?","authors":"Hao Zhao ,&nbsp;Miaowen Wen ,&nbsp;Fei Ji ,&nbsp;Yaokun Liang ,&nbsp;Hua Yu ,&nbsp;Cui Yang","doi":"10.1016/j.dcan.2024.10.006","DOIUrl":"10.1016/j.dcan.2024.10.006","url":null,"abstract":"<div><div>The Underwater Acoustic (UWA) channel is bandwidth-constrained and experiences doubly selective fading. It is challenging to acquire perfect channel knowledge for Orthogonal Frequency Division Multiplexing (OFDM) communications using a finite number of pilots. On the other hand, Deep Learning (DL) approaches have been very successful in wireless OFDM communications. However, whether they will work underwater is still a mystery. For the first time, this paper compares two categories of DL-based UWA OFDM receivers: the Data-Driven (DD) method, which performs as an end-to-end black box, and the Model-Driven (MD) method, also known as the model-based data-driven method, which combines DL and expert OFDM receiver knowledge. The encoder-decoder framework and Convolutional Neural Network (CNN) structure are employed to establish the DD receiver. On the other hand, an unfolding-based Minimum Mean Square Error (MMSE) structure is adopted for the MD receiver. We analyze the characteristics of different receivers by Monte Carlo simulations under diverse communications conditions and propose a strategy for selecting a proper receiver under different communication scenarios. Field trials in the pool and sea are also conducted to verify the feasibility and advantages of the DL receivers. It is observed that DL receivers perform better than conventional receivers in terms of bit error rate.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 3","pages":"Pages 866-877"},"PeriodicalIF":7.5,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144330043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptor signature based on randomized EdDSA in blockchain 区块链中基于随机 EdDSA 的适配器签名
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-06-01 DOI: 10.1016/j.dcan.2024.06.004
Yixing Zhu , Huilin Li , Mengze Li , Yong Yu
{"title":"Adaptor signature based on randomized EdDSA in blockchain","authors":"Yixing Zhu ,&nbsp;Huilin Li ,&nbsp;Mengze Li ,&nbsp;Yong Yu","doi":"10.1016/j.dcan.2024.06.004","DOIUrl":"10.1016/j.dcan.2024.06.004","url":null,"abstract":"<div><div>Adaptor signature, a new primitive that alleviates the scalability issue of blockchain to some extent, has been widely adopted in the off-chain payment channel and atomic swap. As an extension of standard digital signature, adaptor signature can bind the release of a complete digital signature with the exchange of a secret value. Existing constructions of adaptor signatures are mainly based on Schnorr or ECDSA signature algorithms, which suffer low signing efficiency and long signature length. In this paper, to address these issues, we propose a new construction of adaptor signature using randomized EdDSA, which has Schnorr-like structure with higher signing efficiency and shorter signature length. We prove the required security properties, including unforgeability, witness extractability and pre-signature adaptability, of the new adaptor signature scheme in the random oracle model. We conduct a comparative analysis with an ECDSA-based adaptor signature scheme to demonstrate the effectiveness and feasibility of our new proposal.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 3","pages":"Pages 689-699"},"PeriodicalIF":7.5,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141401214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
6G smart fog radio access network: Architecture, key technologies, and research challenges 6G智能雾无线接入网:体系结构、关键技术与研究挑战
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-06-01 DOI: 10.1016/j.dcan.2024.10.002
Lincong Zhang , Mingyang Zhang , Xiangyu Liu , Lei Guo
{"title":"6G smart fog radio access network: Architecture, key technologies, and research challenges","authors":"Lincong Zhang ,&nbsp;Mingyang Zhang ,&nbsp;Xiangyu Liu ,&nbsp;Lei Guo","doi":"10.1016/j.dcan.2024.10.002","DOIUrl":"10.1016/j.dcan.2024.10.002","url":null,"abstract":"<div><div>The 6G smart Fog Radio Access Network (F-RAN) is an integration of 6G network intelligence technologies and the F-RAN architecture. Its aim is to provide low-latency and high-performance services for massive access devices. However, the performance of current 6G network intelligence technologies and its level of integration with the architecture, along with the system-level requirements for the number of access devices and limitations on energy consumption, have impeded further improvements in the 6G smart F-RAN. To better analyze the root causes of the network problems and promote the practical development of the network, this study used structured methods such as segmentation to conduct a review of the topic. The research results reveal that there are still many problems in the current 6G smart F-RAN. Future research directions and difficulties are also discussed.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 3","pages":"Pages 898-911"},"PeriodicalIF":7.5,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144330045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chinese satellite frequency and orbit entity relation extraction method based on dynamic integrated learning 基于动态综合学习的中国卫星频率和轨道实体关系提取方法
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-06-01 DOI: 10.1016/j.dcan.2024.05.002
Yuanzhi He , Zhiqiang Li , Zheng Dou
{"title":"Chinese satellite frequency and orbit entity relation extraction method based on dynamic integrated learning","authors":"Yuanzhi He ,&nbsp;Zhiqiang Li ,&nbsp;Zheng Dou","doi":"10.1016/j.dcan.2024.05.002","DOIUrl":"10.1016/j.dcan.2024.05.002","url":null,"abstract":"<div><div>Given the scarcity of Satellite Frequency and Orbit (SFO) resources, it holds paramount importance to establish a comprehensive knowledge graph of SFO field (SFO-KG) and employ knowledge reasoning technology to automatically mine available SFO resources. An essential aspect of constructing SFO-KG is the extraction of Chinese entity relations. Unfortunately, there is currently no publicly available Chinese SFO entity Relation Extraction (RE) dataset. Moreover, publicly available SFO text data contain numerous NA (representing for “No Answer”) relation category sentences that resemble other relation sentences and pose challenges in accurate classification, resulting in low recall and precision for the NA relation category in entity RE. Consequently, this issue adversely affects both the accuracy of constructing the knowledge graph and the efficiency of RE processes. To address these challenges, this paper proposes a method for extracting Chinese SFO text entity relations based on dynamic integrated learning. This method includes the construction of a manually annotated Chinese SFO entity RE dataset and a classifier combining features of SFO resource data. The proposed approach combines integrated learning and pre-training models, specifically utilizing Bidirectional Encoder Representation from Transformers (BERT). In addition, it incorporates one-class classification, attention mechanisms, and dynamic feedback mechanisms to improve the performance of the RE model. Experimental results show that the proposed method outperforms the traditional methods in terms of F1 value when extracting entity relations from both balanced and long-tailed datasets.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 3","pages":"Pages 787-794"},"PeriodicalIF":7.5,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141042577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SecureVFL: Privacy-preserving multi-party vertical federated learning based on blockchain and RSS SecureVFL:基于区块链和RSS的保护隐私的多方垂直联邦学习
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-06-01 DOI: 10.1016/j.dcan.2024.07.008
Mochan Fan , Zhipeng Zhang , Zonghang Li , Gang Sun , Hongfang Yu , Jiawen Kang , Mohsen Guizani
{"title":"SecureVFL: Privacy-preserving multi-party vertical federated learning based on blockchain and RSS","authors":"Mochan Fan ,&nbsp;Zhipeng Zhang ,&nbsp;Zonghang Li ,&nbsp;Gang Sun ,&nbsp;Hongfang Yu ,&nbsp;Jiawen Kang ,&nbsp;Mohsen Guizani","doi":"10.1016/j.dcan.2024.07.008","DOIUrl":"10.1016/j.dcan.2024.07.008","url":null,"abstract":"<div><div>Vertical Federated Learning (VFL), which draws attention because of its ability to evaluate individuals based on features spread across multiple institutions, encounters numerous privacy and security threats. Existing solutions often suffer from centralized architectures, and exorbitant costs. To mitigate these issues, in this paper, we propose SecureVFL, a decentralized multi-party VFL scheme designed to enhance efficiency and trustworthiness while guaranteeing privacy. SecureVFL uses a permissioned blockchain and introduces a novel consensus algorithm, Proof of Feature Sharing (PoFS), to facilitate decentralized, trustworthy, and high-throughput federated training. SecureVFL introduces a verifiable and lightweight three-party Replicated Secret Sharing (RSS) protocol for feature intersection summation among overlapping users. Furthermore, we propose a <span><math><mo>(</mo><mtable><mtr><mtd><mn>4</mn></mtd></mtr><mtr><mtd><mn>2</mn></mtd></mtr></mtable><mo>)</mo></math></span>-sharing protocol to achieve federated training in a four-party VFL setting. This protocol involves only addition operations and exhibits robustness. SecureVFL not only enables anonymous interactions among participants but also safeguards their real identities, and provides mechanisms to unmask these identities when malicious activities are performed. We illustrate the proposed mechanism through a case study on VFL across four banks. Finally, our theoretical analysis proves the security of SecureVFL. Experiments demonstrated that SecureVFL outperformed existing multi-party VFL privacy-preserving schemes, such as MP-FedXGB, in terms of both overhead and model performance.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 3","pages":"Pages 837-849"},"PeriodicalIF":7.5,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144330041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks 一种无人机辅助多点协调网络的上行下行混合安全传输方案
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-06-01 DOI: 10.1016/j.dcan.2024.11.004
Xin Fan , Guangkai Li , Jianqiang Li , Yue Wang , Chuanwen Luo , Yi Hong , Ting Chen , Yan Huo
{"title":"A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks","authors":"Xin Fan ,&nbsp;Guangkai Li ,&nbsp;Jianqiang Li ,&nbsp;Yue Wang ,&nbsp;Chuanwen Luo ,&nbsp;Yi Hong ,&nbsp;Ting Chen ,&nbsp;Yan Huo","doi":"10.1016/j.dcan.2024.11.004","DOIUrl":"10.1016/j.dcan.2024.11.004","url":null,"abstract":"<div><div>Recognized as a pivotal facet in Beyond Fifth-Generation (B5G) and the upcoming Sixth-Generation (6G) wireless networks, Unmanned Aerial Vehicle (UAV) communications pose challenges due to limited capabilities when serving as mobile base stations, leading to suboptimal service for edge users. To address this, the collaborative formation of Coordinated Multi-Point (CoMP) networks proves instrumental in alleviating the issue of the poor Quality of Service (QoS) at edge users in the network periphery. This paper introduces a groundbreaking solution, the Hybrid Uplink-Downlink Non-Orthogonal Multiple Access (HUD-NOMA) scheme for UAV-aided CoMP networks. Leveraging network coding and NOMA technology, our proposed HUD-NOMA effectively enhances transmission rates for edge users, notwithstanding a minor reduction in signal reception reliability for strong signals. Importantly, the system's overall sum rate is elevated. The proposed HUD-NOMA demonstrates resilience against eavesdroppers by effectively managing intended interferences without the need for additional artificial noise injection. The study employs a stochastic geometry approach to derive the Secrecy Outage Probability (SOP) for the transmissions in the CoMP network, revealing superior performance in transmission rates and lower SOP compared to existing methods through numerical verification. Furthermore, guided by the theoretical SOP derivation, this paper proposes a power allocation strategy to further reduce the system's SOP.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 3","pages":"Pages 925-936"},"PeriodicalIF":7.5,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144330048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A relationship-aware mutual learning method for lightweight skin lesion classification 用于轻量级皮损分类的关系感知相互学习方法
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-06-01 DOI: 10.1016/j.dcan.2024.04.004
Peng Liu , Wenhua Qian , Huaguang Li , Jinde Cao
{"title":"A relationship-aware mutual learning method for lightweight skin lesion classification","authors":"Peng Liu ,&nbsp;Wenhua Qian ,&nbsp;Huaguang Li ,&nbsp;Jinde Cao","doi":"10.1016/j.dcan.2024.04.004","DOIUrl":"10.1016/j.dcan.2024.04.004","url":null,"abstract":"<div><div>In recent years, deep learning has made significant advancements in skin cancer diagnosis. However, most methods prioritize high prediction accuracy without considering the limitations of computational resources, making them impractical for wearable devices. In this case, knowledge distillation has emerged as an effective method, capable of significantly reducing a model's reliance on computational and storage resources. Nonetheless, previous research suffers from two limitations: 1) the student model can only passively receive knowledge from the teacher model, and 2) the teacher model does not effectively model sample relationships during training, potentially hindering the effective transfer of sample relationship-related knowledge during knowledge distillation. To address these issues, we employ two identical student models, each equipped with a sample relationship module. This design ensures that the student models can mutually learn while modeling sample relationships. We conducted extensive experiments on the ISIC 2019 dataset to validate the effectiveness of our method. The results demonstrate that our approach significantly improves the recognition of various types of skin diseases. Compared to state-of-the-art methods, our approach exhibits higher accuracy and better generalization capabilities.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 3","pages":"Pages 603-612"},"PeriodicalIF":7.5,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141043490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent sitting postural anomaly detection system for wheelchair users with unsupervised techniques 采用无监督技术的轮椅使用者智能坐姿异常检测系统
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-06-01 DOI: 10.1016/j.dcan.2024.05.006
Patrick Vermander , Aitziber Mancisidor , Raffaele Gravina , Itziar Cabanes , Giancarlo Fortino
{"title":"Intelligent sitting postural anomaly detection system for wheelchair users with unsupervised techniques","authors":"Patrick Vermander ,&nbsp;Aitziber Mancisidor ,&nbsp;Raffaele Gravina ,&nbsp;Itziar Cabanes ,&nbsp;Giancarlo Fortino","doi":"10.1016/j.dcan.2024.05.006","DOIUrl":"10.1016/j.dcan.2024.05.006","url":null,"abstract":"<div><div>Detecting sitting posture abnormalities in wheelchair users enables early identification of changes in their functional status. To date, this detection has relied on in-person observation by medical specialists. However, given the challenges faced by health specialists to carry out continuous monitoring, the development of an intelligent anomaly detection system is proposed. Unlike other authors, where they use supervised techniques, this work proposes using unsupervised techniques due to the advantages they offer. These advantages include the lack of prior labeling of data, and the detection of anomalies previously not contemplated, among others. In the present work, an individualized methodology consisting of two phases is developed: characterizing the normal sitting pattern and determining abnormal samples. An analysis has been carried out between different unsupervised techniques to study which ones are more suitable for postural diagnosis. It can be concluded, among other aspects, that the utilization of dimensionality reduction techniques leads to improved results. Moreover, the normality characterization phase is deemed necessary for enhancing the system's learning capabilities. Additionally, employing an individualized approach to the model aids in capturing the particularities of the various pathologies present among subjects.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 3","pages":"Pages 622-633"},"PeriodicalIF":7.5,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141142903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep reinforcement learning-based spectrum resource allocation for the web of healthcare things with massive integrating wearable gadgets 基于深度强化学习的可穿戴设备医疗网络频谱资源分配
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-06-01 DOI: 10.1016/j.dcan.2024.10.003
Jie Huang , Cheng Yang , Fan Yang , Shilong Zhang , Amr Tolba , Alireza Jolfaei , Keping Yu
{"title":"Deep reinforcement learning-based spectrum resource allocation for the web of healthcare things with massive integrating wearable gadgets","authors":"Jie Huang ,&nbsp;Cheng Yang ,&nbsp;Fan Yang ,&nbsp;Shilong Zhang ,&nbsp;Amr Tolba ,&nbsp;Alireza Jolfaei ,&nbsp;Keping Yu","doi":"10.1016/j.dcan.2024.10.003","DOIUrl":"10.1016/j.dcan.2024.10.003","url":null,"abstract":"<div><div>With the development of the future Web of Healthcare Things (WoHT), there will be a trend of densely deploying medical sensors with massive simultaneous online communication requirements. The dense deployment and simultaneous online communication of massive medical sensors will inevitably generate overlapping interference. This will be extremely challenging to support data transmission at the medical-grade quality of service level. To handle the challenge, this paper proposes a hypergraph interference coordination-aided resource allocation based on the Deep Reinforcement Learning (DRL) method. Specifically, we build a novel hypergraph interference model for the considered WoHT by analyzing the impact of the overlapping interference. Due to the high complexity of directly solving the hypergraph interference model, the original resource allocation problem is converted into a sequential decision-making problem through the Markov Decision Process (MDP) modeling method. Then, a policy and value-based resource allocation algorithm is proposed to solve this problem under simultaneous online communication and dense deployment. In addition, to enhance the exploration ability of the optimal allocation strategy for the agent, we propose a resource allocation algorithm with an asynchronous parallel architecture. Simulation results verify that the proposed algorithms can achieve higher network throughput than the existing algorithms in the considered WoHT scenario.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 3","pages":"Pages 671-680"},"PeriodicalIF":7.5,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144330046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信