Wireless Communications and Mobile Computing最新文献

筛选
英文 中文
Low Latency 5G IP Transmission Backhaul Network Architecture: A Techno-Economic Analysis 低延迟 5G IP 传输回程网络架构:技术经济分析
Wireless Communications and Mobile Computing Pub Date : 2024-01-24 DOI: 10.1155/2024/6388723
Ibrahim Alhassan Gedel, Nnamdi I. Nwulu
{"title":"Low Latency 5G IP Transmission Backhaul Network Architecture: A Techno-Economic Analysis","authors":"Ibrahim Alhassan Gedel, Nnamdi I. Nwulu","doi":"10.1155/2024/6388723","DOIUrl":"https://doi.org/10.1155/2024/6388723","url":null,"abstract":"The steeply rising demand for mobile data drives the investigation of the transmission backhaul network architecture and cost for the fifth generation (5G) of mobile technologies. The proposed backhaul architecture will facilitate high throughput, low latency, scalability, low cost of ownership, and high capacity backhaul for 5G mobile technologies. This paper presents a transmission backhaul network architecture for 5G technology; the proposed internet protocol (IP) transmission backhauling architecture includes the data center, core network, distribution network, and access or IP random access network. A mathematical model for the data center IP core network, IP distributed network, and the IP access network for capital expenditure (Capex), operational expenditure (Opex), and the total cost of ownership (TCO) are presented, as well as a mathematical model for the entire backhauling architecture. The result shows that the increase in IP sites is positively proportional to the Capex and negatively proportional to the Opex. The selectivity analysis shows that the increase in bandwidth is directly proportional to the Capex, Opex, and TCO in the IP core network. The increase in data centers is directly proportional to the Capex, Opex, and TCO of the entire backhauling architecture.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139560503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Medical Learning Framework Based on Blockchain and Homomorphic Encryption 基于区块链和同态加密的联盟医疗学习框架
Wireless Communications and Mobile Computing Pub Date : 2024-01-05 DOI: 10.1155/2024/8138644
Xiaohui Yang, Chongbo Xing
{"title":"Federated Medical Learning Framework Based on Blockchain and Homomorphic Encryption","authors":"Xiaohui Yang, Chongbo Xing","doi":"10.1155/2024/8138644","DOIUrl":"https://doi.org/10.1155/2024/8138644","url":null,"abstract":"Federated learning-based medical data privacy sharing can promote the development of medical industry intelligence, but limited by its own security and privacy deficiencies, federated learning still suffers from a single point of failure and privacy leakage of intermediate parameters. To address these problems, this paper proposes a privacy protection framework for medical data based on blockchain and cross-silo federated learning, using cross-silo federated learning to establish a collaborative training platform for multiple medical institutions to enhance the privacy of medical data, introducing blockchain and smart contracts to realize decentralized federated learning to enhance trust between distrustful medical institutions and solve the problem of a single point of failure. In addition, a secure aggregation scheme is designed using threshold homomorphic encryption to prevent the privacy leakage problem during parameter transmission. The experimental and analytical results show that the accuracy of this paper’s scheme is consistent with the original federated learning scheme, effectively deals with the problems of single-point failure and inference attacks of federated learning, improves system robustness, and is suitable for medical scenarios with more stringent requirements on security and accuracy.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139103760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Modeling of Hyperledger Fabric 2.0: A Queuing Theory-Based Approach 超级账本 Fabric 2.0 的性能建模:基于排队论的方法
Wireless Communications and Mobile Computing Pub Date : 2023-12-30 DOI: 10.1155/2023/9957995
Ou Wu, Zhongxing Wang, Zhongjin Li
{"title":"Performance Modeling of Hyperledger Fabric 2.0: A Queuing Theory-Based Approach","authors":"Ou Wu, Zhongxing Wang, Zhongjin Li","doi":"10.1155/2023/9957995","DOIUrl":"https://doi.org/10.1155/2023/9957995","url":null,"abstract":"Hyperledger Fabric (shortened to Fabric) is an open-source, enterprise-level, permissioned distributed ledger technology platform with a highly modular, configurable architecture. It supports writing smart contracts in general-purpose programing languages and has become the preferred choice for enterprise-level blockchain applications. However, the transaction throughput of the Fabric system remains a critical factor that restricts the further application of this technology in various fields. Therefore, it is necessary to evaluate and optimize the performance of the Fabric blockchain platform. Existing performance modeling methods need to be improved in terms of compatibility and effectiveness. To address this, we propose a performance-compatible modeling method for Fabric using queuing theory, which considers the limited transaction pool and the situation where node groups are attacked. Using the Fabric 2.0 version as an example, we have established a model of the transaction process in the Fabric network. By analyzing the model’s continuous 3D time Markov process, we solved the system stationary equation and obtained analytical expressions for performance indicators such as system throughput, system steady-state queue length, and system average response time. We conducted extensive analyses and simulations to verify the models’ and formulations’ accuracy and validity. We believe this approach can be extended to various scenarios in other blockchain systems.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139063239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semi-supervised Learning for Automatic Modulation Recognition Using Haar Time–Frequency Mask and Positional–Spatial Attention 使用哈尔时频掩码和位置空间注意力进行自动调制识别的半监督学习
Wireless Communications and Mobile Computing Pub Date : 2023-12-21 DOI: 10.1155/2023/2683780
Hui Liu, Dan Zhong, Yuanpu Guo, Zehong Xu, Zhenlin Wu, Chunxian Gao
{"title":"Semi-supervised Learning for Automatic Modulation Recognition Using Haar Time–Frequency Mask and Positional–Spatial Attention","authors":"Hui Liu, Dan Zhong, Yuanpu Guo, Zehong Xu, Zhenlin Wu, Chunxian Gao","doi":"10.1155/2023/2683780","DOIUrl":"https://doi.org/10.1155/2023/2683780","url":null,"abstract":"Automatic modulation recognition plays an important role in many military and civilian applications, including cognitive radio, spectrum sensing, signal surveillance, and interference identification. Due to the powerful ability of deep learning to extract hidden features and perform classification, it can extract highly separative features from massive signal samples. Considering the condition of limited training samples, we propose a semi-supervised learning framework based on Haar time–frequency (HTF) mask data augmentation and the positional–spatial attention (PSA) mechanism. Specifically, the HTF mask is designed to increase data diversity, and the PSA is designed to address the limited receptive field of the convolutional layer and enhance the feature extraction capability of the constructed network. Extensive experimental results obtained on the public RML2016.10a dataset show that the proposed semi-supervised framework utilizes 1% of the given labeled data and reaches a recognition accuracy of 92.09% under 6 dB signals.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138826440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling the Causes of Power-Related Network Outages Using Discrete-Time Markov Chains 利用离散时间马尔可夫链模拟与电力相关的网络中断原因
Wireless Communications and Mobile Computing Pub Date : 2023-12-20 DOI: 10.1155/2023/8717626
Ibrahim A. Gedel, Wahab A. Iddrisu
{"title":"Modeling the Causes of Power-Related Network Outages Using Discrete-Time Markov Chains","authors":"Ibrahim A. Gedel, Wahab A. Iddrisu","doi":"10.1155/2023/8717626","DOIUrl":"https://doi.org/10.1155/2023/8717626","url":null,"abstract":"In this paper, we model the causes of power-related network outages in Ghana using discrete-time Markov chains. We used data consisting of 2,756 small-scale carrier telecommunications outages occurring in Ghana, with accompanying root causes over a period of 5 years and 8 months, from August 2015 to April 2021. The results indicate that the majority (<i>n</i> = 1,404) of the network outages were caused by the generators while the least number (18) of outages were caused by a communication equipment. However, longer network outages were caused by fuel issues with an average outage time of 1,027.82 min over the study period. The transition probability matrix obtained from the data revealed that regardless of the present cause of the network outage, the probability that the next network outage will be caused by the generators is higher than the probability that the outage will be attributable to any other cause. The steady-state distribution indicates that in the long run (<i>n</i> ≥ 16), 51% of the network outages will be caused by the “Generators” while 10.8% of the network outages will be caused by the “Batteries.” We also checked and simulated the probabilities of a network outage caused by any of the 12 possible root causes for 12 steps. It seemed apparent from the simulations that generators are the most likely cause of network outages from Step 1 up to Step 7, irrespective of what the initial cause of the network outage is. With these findings, players in the telecommunications industry can clearly plan better to reduce future network outages.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138821225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Multiple-RIS-Based NOMA Systems 基于多 RIS 的 NOMA 系统的性能分析
Wireless Communications and Mobile Computing Pub Date : 2023-12-18 DOI: 10.1155/2023/6785737
Huu Q. Tran, Quoc-Tuan Vien
{"title":"Performance Analysis of Multiple-RIS-Based NOMA Systems","authors":"Huu Q. Tran, Quoc-Tuan Vien","doi":"10.1155/2023/6785737","DOIUrl":"https://doi.org/10.1155/2023/6785737","url":null,"abstract":"In this paper, we present a study on a model of multirelay radio network system that utilizes reconfigurable intelligent surfaces (RISs). We investigate the use of nonorthogonal multiple access (NOMA) combined with cooperative RIS systems, using partial RIS selection (PRISs). Specifically, the RISs act as relays to forward data from the base station to the two users. The focus of this paper is to analyze the outage probabilities and throughput for the two users. Based on the results, we examine how PRISs affect the performance of the proposed NOMA scheme. The derived asymptotic expressions show that the proposed model can improve user fairness. Finally, we compare the analysis results with the simulation results and find good agreement.","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138715226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retracted: A Survey on Location Privacy Attacks and Prevention Deployed with IoT in Vehicular Networks 撤回:物联网在车载网络中部署的位置隐私攻击与防范调查
Wireless Communications and Mobile Computing Pub Date : 2023-12-13 DOI: 10.1155/2023/9878739
Wireless Communications and Mobile Computing
{"title":"Retracted: A Survey on Location Privacy Attacks and Prevention Deployed with IoT in Vehicular Networks","authors":"Wireless Communications and Mobile Computing","doi":"10.1155/2023/9878739","DOIUrl":"https://doi.org/10.1155/2023/9878739","url":null,"abstract":"<jats:p />","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"26 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138976503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retracted: Three-Dimensional DV-Hop Localization Algorithm Based on Hop Size Correction and Improved Sparrow Search 撤回:基于跳数校正和改进的麻雀搜索的三维 DV 跳数定位算法
Wireless Communications and Mobile Computing Pub Date : 2023-12-13 DOI: 10.1155/2023/9867609
Wireless Communications and Mobile Computing
{"title":"Retracted: Three-Dimensional DV-Hop Localization Algorithm Based on Hop Size Correction and Improved Sparrow Search","authors":"Wireless Communications and Mobile Computing","doi":"10.1155/2023/9867609","DOIUrl":"https://doi.org/10.1155/2023/9867609","url":null,"abstract":"<jats:p />","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"143 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139006152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retracted: The Index Data System of Agricultural Modernization Development Based on Internet Big Data 撤回:基于互联网大数据的农业现代化发展指数数据体系
Wireless Communications and Mobile Computing Pub Date : 2023-12-13 DOI: 10.1155/2023/9814819
Wireless Communications and Mobile Computing
{"title":"Retracted: The Index Data System of Agricultural Modernization Development Based on Internet Big Data","authors":"Wireless Communications and Mobile Computing","doi":"10.1155/2023/9814819","DOIUrl":"https://doi.org/10.1155/2023/9814819","url":null,"abstract":"<jats:p />","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"5 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138976431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retracted: Image Energy Saving Recognition Technology of Monitoring System Based on Ant Colony Algorithm 撤回:基于蚁群算法的监控系统图像节能识别技术
Wireless Communications and Mobile Computing Pub Date : 2023-12-13 DOI: 10.1155/2023/9835360
Wireless Communications and Mobile Computing
{"title":"Retracted: Image Energy Saving Recognition Technology of Monitoring System Based on Ant Colony Algorithm","authors":"Wireless Communications and Mobile Computing","doi":"10.1155/2023/9835360","DOIUrl":"https://doi.org/10.1155/2023/9835360","url":null,"abstract":"<jats:p />","PeriodicalId":501499,"journal":{"name":"Wireless Communications and Mobile Computing","volume":"101 4‐6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138976956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信