IET Communications最新文献

筛选
英文 中文
A deep learning-based approach for pseudo-satellite positioning 基于深度学习的伪卫星定位方法
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-09-22 DOI: 10.1049/cmu2.12821
Shuang Li, Jiacheng Wang, Baoguo Yu, Hantong Xing, Shuang Wang
{"title":"A deep learning-based approach for pseudo-satellite positioning","authors":"Shuang Li,&nbsp;Jiacheng Wang,&nbsp;Baoguo Yu,&nbsp;Hantong Xing,&nbsp;Shuang Wang","doi":"10.1049/cmu2.12821","DOIUrl":"https://doi.org/10.1049/cmu2.12821","url":null,"abstract":"<p>Traditional pseudo-satellite-based indoor positioning techniques are greatly affected by the presence of multipath effects, leading to a notable reduction in the positioning precision. In order to tackle this challenge, a pseudo-satellite indoor positioning method based on deep learning is proposed. The method grids the localization region, thus transforming positioning from a regression problem to a classification problem in the gridded areas. 1D-convolutional neural network is employed to extract the correlation between pseudo-satellite data and the positioning of indoor areas. Data are collected and the method is validated in three types of areas of the experimental field, namely unobstructed area, semi-unobstructed area and obstructed area. The experimental results demonstrate that the method exhibits superior positioning accuracy compared to traditional methods, enabling effective localization even in obstructed area.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12821","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of interference effect in VL-NOMA network considering signal power parameters performance 考虑信号功率参数性能的 VL-NOMA 网络干扰效应分析
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-09-20 DOI: 10.1049/cmu2.12812
Chidi Emmanuel Ngene, Prabhat Thakur, Ghanshyam Singh
{"title":"Analysis of interference effect in VL-NOMA network considering signal power parameters performance","authors":"Chidi Emmanuel Ngene,&nbsp;Prabhat Thakur,&nbsp;Ghanshyam Singh","doi":"10.1049/cmu2.12812","DOIUrl":"https://doi.org/10.1049/cmu2.12812","url":null,"abstract":"<p>This study analyses the interference effect in a visible light-non-orthogonal multiple access (VL-NOMA) network that considers the signal power parameters performance for near and far users. The light-emitting diode (LED) as a carrier transmits signals, and we investigate the interference effect. The interference effect challenge is a result of unaligned signal power parameters, thereby producing noise or echo during the signal transmission. The signal power parameters are successfully aligned, and NOMA techniques are deployed, which improves the signal performance in terms of bit-error rate (BER), achieved data rate, and signal-to-interference plus noise ratio (SINR). Furthermore, the deployed NOMA techniques, such as power allocations (PA) to assign the signals appropriately, then superposition coding (SC) encodes the entire signal, and successive interference cancellation (SIC) cancels the interference within the signals. The signal behavior of the aligned and the unaligned signal power parameters performance are used to investigate the interference effect. We observed that unaligned signal power parameters reduce the signal performance of achieved data rate, BER, and SINR. Further, the aligned signal power parameter with NOMA techniques improves the signal performance. Moreover, in the aligned signal power scenario of NOMA, the near user performed better than the far user.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12812","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A high-precision timing and frequency synchronization algorithm for multi-h CPM signals 多小时 CPM 信号的高精度定时和频率同步算法
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-09-10 DOI: 10.1049/cmu2.12809
Yukai Liu, Rongke Liu, Qizhi Chen, Ling Zhao
{"title":"A high-precision timing and frequency synchronization algorithm for multi-h CPM signals","authors":"Yukai Liu,&nbsp;Rongke Liu,&nbsp;Qizhi Chen,&nbsp;Ling Zhao","doi":"10.1049/cmu2.12809","DOIUrl":"https://doi.org/10.1049/cmu2.12809","url":null,"abstract":"<p>In the context of certain specific digital communication systems, where there are limitations such as spectral resources and energy availability, continuous phase modulation (CPM) emerges as an appealing choice among various modulation methods. Among CPM signals, multi-h CPM is particularly noteworthy for its ability to address these constraints within the realm of single-carrier and constant-envelope waveforms. At the physical layer, the design of a multi-h CPM receiver necessitates the efficient implementation of timing and frequency synchronization algorithm within a high dynamic environment. So this paper presents an innovative approach for achieving timing and frequency synchronization. To rectify timing offset and mitigate the adverse effects of noise in received signals, a re-configurable local filter generation method is integrated into the timing synchronization algorithm. Simultaneously, an enhanced least mean square adaptive filter algorithm is applied to address frequency synchronization. A comprehensive series of simulations rigorously evaluates the outcomes of proposed novel synchronization methodology. These analyses demonstrate a notable proximity between the synchronization errors of proposed algorithm in this paper and the performance benchmark set by the modified Cramer–Rao bound. The proposed synchronization technology also exhibits the capability to substantially reduce the bit error rate, thereby effectively enhancing demodulation performance in multi-h CPM receivers.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12809","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-user joint sensing and communications with time-divisioned bi-static radar 采用时分双静态雷达的双用户联合传感与通信技术
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-09-08 DOI: 10.1049/cmu2.12820
Enhao Wang, Yunfei Chen, Aissa Ikhlef, Hongjian Sun
{"title":"Dual-user joint sensing and communications with time-divisioned bi-static radar","authors":"Enhao Wang,&nbsp;Yunfei Chen,&nbsp;Aissa Ikhlef,&nbsp;Hongjian Sun","doi":"10.1049/cmu2.12820","DOIUrl":"https://doi.org/10.1049/cmu2.12820","url":null,"abstract":"<p>Joint sensing and communications systems have gained significant research interest by merging sensing capabilities with communication functionalities. However, few works have examined the case of multiple users. This work investigates a dual-user joint sensing and communications system, focusing on the interference between the users that explores the optimal performance trade-offs through a time-division approach. Bi-static radar setting is considered. Two typical strategies under this approach are studied: one in which both users follow the same order of communications and then sensing, and the other in which the tasks are performed in opposite order at two users. In each strategy, the sum rate and the detection probability are evaluated and optimized. The results show that the opposite order strategy offers superior performance to the same order strategy, and they also quantify their performance difference. This research highlights the potential benefits of time-division strategies and multiple users in joint sensing and communications systems.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12820","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A heuristic approach to energy efficient user association in ultra-dense HetNets using intermittent scheduling strategies 利用间歇调度策略在超密集 HetNets 中实现高能效用户关联的启发式方法
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-08-30 DOI: 10.1049/cmu2.12816
Jeta Dobruna, Zana L. Fazliu, Hena Maloku, Mojca Volk
{"title":"A heuristic approach to energy efficient user association in ultra-dense HetNets using intermittent scheduling strategies","authors":"Jeta Dobruna,&nbsp;Zana L. Fazliu,&nbsp;Hena Maloku,&nbsp;Mojca Volk","doi":"10.1049/cmu2.12816","DOIUrl":"https://doi.org/10.1049/cmu2.12816","url":null,"abstract":"<p>The ultra-dense deployment of pico cells in 5G heterogeneous networks (HetNets) has raised serious concerns regarding interference and energy consumption. Both industry and academia are focusing on enhancing network energy efficiency (EE) while maintaining satisfactory quality of service (QoS) levels. However, finding an optimal solution to NEE is very challenging, especially in ultra-dense HetNets. Here, a user association and power management algorithm is presented that follows a heuristic approach and aims to maximize EE while satisfying other network requirements. The proposed algorithm associates users based on criteria that consider the users’ EE and minimizes energy consumption by intermittently switching into sleep mode base stations with the highest impact on overall network EE. The performance of this solution is evaluated in a realistic multi-cell two-tier scenario considering both co-tier and cross-tier interference by comparing it with two other solutions: a heuristic approach based on standardized eICIC, and an optimization approach based on Lagrangian dual decomposition. The simulation results show that our solution outperforms benchmarking solutions in terms of EE, average user rate, and network throughput while minimizing energy consumption.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12816","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mimic turbo compiled code structure for wireless communication systems 无线通信系统的模拟涡轮增压编译代码结构
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-08-23 DOI: 10.1049/cmu2.12818
Yuchen Shi, Shangdong Liu, Sisi Shao, Yimu Ji, Fei Wu, Tiansheng Gu, Yulu Zheng, Yijun Nie, Zongkai Ji, Cailing Sun, Zeng Chen, Yawei Sun
{"title":"Mimic turbo compiled code structure for wireless communication systems","authors":"Yuchen Shi,&nbsp;Shangdong Liu,&nbsp;Sisi Shao,&nbsp;Yimu Ji,&nbsp;Fei Wu,&nbsp;Tiansheng Gu,&nbsp;Yulu Zheng,&nbsp;Yijun Nie,&nbsp;Zongkai Ji,&nbsp;Cailing Sun,&nbsp;Zeng Chen,&nbsp;Yawei Sun","doi":"10.1049/cmu2.12818","DOIUrl":"https://doi.org/10.1049/cmu2.12818","url":null,"abstract":"<p>Turbo codes play a crucial role in wireless communication systems, and their compiled code structures are key factors affecting the performance of the entire communication system. As a result, the study of turbo compiled code structures has been a focal point for researchers. The iterative decoding of turbo code structures has multiple limitations and large storage resource consumption, leading to poor system anti-interference ability and a rapid increase in BER. To address these issues, this paper proposes the mimic turbo compiled code structure (MTCCS) for wireless communication systems. MTCCS is based on the DHR idea, incorporating dynamic, heterogeneous, and redundancy characteristics. Dynamicity is achieved through a dynamic scheduling algorithm based on abnormal feedback information. Heterogeneity is achieved through a codec component collection design method based on intrinsic and extrinsic heterogeneity. Redundancy is achieved through a majority voting algorithm. At the beginning of information transmission, MTCCS randomly selects heterogeneous codecs from the heterogeneous codec collection to enter the runtime pool. After the information transmission is complete, the majority voting algorithm is used to adjudicate the multi-mode output of the codecs, resulting in a relatively accurate decoding outcome. Meanwhile, the dynamic scheduling module calculates the abnormal feedback information of each codec and accordingly dynamically schedules the mimic turbo codecs to replace the abnormal ones. Through the above process, MTCCS realizes the adaptive compilation code and improves the anti-interference ability of turbo code. Simulation experiments are conducted on MTCCS in both non-interference and interference scenarios. Simulation experiments show that MTCCS introducing the DHR idea achieves a balance between anti-interference and decoding performance. It effectively addresses the issue of poor anti-interference ability in turbo codes, and the decoding performance of MTCCS is superior to that of the previous single conventional turbo codes.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12818","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing network attack detection across infrastructures: An automatic labeling method and deep learning model with an attention mechanism 加强跨基础设施的网络攻击检测:带有注意力机制的自动标记方法和深度学习模型
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-08-22 DOI: 10.1049/cmu2.12819
Dinh-Minh Vu, Thi Ha La, Gia Bach Nguyen, Eui-Nam Huh, Hoang Hai Tran
{"title":"Enhancing network attack detection across infrastructures: An automatic labeling method and deep learning model with an attention mechanism","authors":"Dinh-Minh Vu,&nbsp;Thi Ha La,&nbsp;Gia Bach Nguyen,&nbsp;Eui-Nam Huh,&nbsp;Hoang Hai Tran","doi":"10.1049/cmu2.12819","DOIUrl":"https://doi.org/10.1049/cmu2.12819","url":null,"abstract":"<p>In the era of industry 4.0 and the widespread use of digital devices, the number of cyber attacks poses an escalating and diverse threat, jeopardizing users' online activities. Intrusion detection systems (IDS) emerge as pivotal solutions, playing a crucial role in detecting anomalous signals within network systems. To counter novel attack patterns, IDS systems require periodic rule updates for effective identification of unusual signals. Typically, these policies are updated based on rule-based or deep learning algorithms to enhance detection performance. However, the insufficient number of labeled samples remains a challenge for real-world deployment. In this article, an automated labeling method is presented that has shown high effectiveness, requiring minimal hardware resources, and applicable to IDS systems. Additionally, the approach utilizes transfer learning combined with attention mechanisms to boost the efficiency of abnormal signal detection. The results from the approach are compared with those of a reference model, illustrating an overall improvement of nearly 10% in our model's performance compared to the reference model. This underscores the effectiveness of automating rule adjustments for IDS, contributing significantly to reducing associated financial costs. The research addresses the challenges in deploying IDS in real-world scenarios and provides a valuable contribution to enhancing cyber threat detection capabilities.</p><p>A preprint has previously been published [11].</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12819","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dimmable constant weight polar-coded non-orthogonal multiple access with orthogonal space-time block coding visible light communication systems 采用正交时空块编码的可调光恒定权重极化编码非正交多路存取可见光通信系统
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-08-16 DOI: 10.1049/cmu2.12815
Oluwaseyi Paul Babalola, Vipin Balyan
{"title":"Dimmable constant weight polar-coded non-orthogonal multiple access with orthogonal space-time block coding visible light communication systems","authors":"Oluwaseyi Paul Babalola,&nbsp;Vipin Balyan","doi":"10.1049/cmu2.12815","DOIUrl":"https://doi.org/10.1049/cmu2.12815","url":null,"abstract":"<p>This study investigates the integration of dimmable constant weight polar-coded non-orthogonal multiple access (NOMA) with orthogonal space-time block coding (OSTBC) in visible light communication (VLC) systems over Nakagami-<span></span><math>\u0000 <semantics>\u0000 <mi>m</mi>\u0000 <annotation>$m$</annotation>\u0000 </semantics></math> fading environments. The proposed scheme aims to enhance the reliability of VLC systems by reducing the outage probability while accommodating dimming requirements. By allowing multiple users to utilize the same time-frequency resources and adjust power levels based on individual channel conditions, the system optimizes resource utilization. Additionally, the OSTBC method provides effective communication among multiple users by leveraging transmit diversity to improve system performance. The efficacy of the proposed approach is demonstrated through analytical analysis and Monte Carlo simulations, showcasing superior outage probability performance compared to conventional Alamouti-STBC schemes.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12815","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-mode codeword position index based SCMA with transmit diversity 基于双模编解码位置索引的 SCMA 发射分集
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-08-16 DOI: 10.1049/cmu2.12805
Yanbing Yang, Jing Lei, Ke Lai
{"title":"Dual-mode codeword position index based SCMA with transmit diversity","authors":"Yanbing Yang,&nbsp;Jing Lei,&nbsp;Ke Lai","doi":"10.1049/cmu2.12805","DOIUrl":"https://doi.org/10.1049/cmu2.12805","url":null,"abstract":"<p>Codeword position index based sparse code multiple access (CPI-SCMA) is an effective scheme that expands codeword positions in the time domain and carries extra information by their index. This paper proposes a dual-mode CPI-SCMA (DCPI-SCMA) scheme to improve the error propagation caused by the mismatch between SCMA codewords and information bits. Furthermore, a DCPI-SCMA with transmit diversity scheme is proposed where index bits are repeatedly transmitted to obtain a transmit diversity gain; hence, a higher reliability can be achieved with a slight loss of spectral efficiency. An optimal approach for the codebook index pattern is derived where the decision of index bits is involved in the demodulation of SCMA. It can be seen from simulation results and system analysis that the proposed schemes achieve better bit error rate performance with a decrease in complexity and obtain better robustness and flexibility compared with the existing CPI-based SCMA schemes under the same spectral efficiency.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12805","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A predictive SD‐WAN traffic management method for IoT networks in multi‐datacenters using deep RNN 利用深度 RNN 为多数据中心物联网网络提供预测性 SD-WAN 流量管理方法
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-08-09 DOI: 10.1049/cmu2.12810
Zeinab Nazemi Absardi, Reza Javidan
{"title":"A predictive SD‐WAN traffic management method for IoT networks in multi‐datacenters using deep RNN","authors":"Zeinab Nazemi Absardi, Reza Javidan","doi":"10.1049/cmu2.12810","DOIUrl":"https://doi.org/10.1049/cmu2.12810","url":null,"abstract":"Deploying the Internet of Things (IoT) in integrated edge‐cloud environments exposes the IoT traffic data to performance issues such as delay, bandwidth limitation etc. Recently, Software‐Defined Wide Area Network (SD‐WAN) has emerged as an architecture that originates from the Software‐Defined Network (SDN) paradigm and provides solutions for networking multiple data centers by allowing network administrators to manage and control network layers. In this article, an SDWAN‐based policy for traffic management in IoT is introduced in which the Quality of Service (QoS) metrics such as end‐to‐end delay and bandwidth utilization are optimized. The proposed method implements the traffic management policy in the SDWAN controller. When the IoT traffic flows reach the SDWAN infrastructure network, graph search algorithms are performed to find the near‐optimal paths that affect the end‐to‐end delay of traffic flows. Because of the ability of deep learning to process complex data, a deep RNN model is used to predict the network state information, such as link latency and available bandwidth, before the traffic flows reach the infrastructure network. The proposed method consists of four key modules to predict the routes for future time intervals: (a) an SD‐WAN topology updater unit that checks the link changes and availability, (b) the network state information collector, which collects the network state information to create a dataset, (c) the learning unit, which trains a deep RNN model using the created dataset, and (d) the route predictor unit, which uses the trained model to predict the network state information using a heuristic algorithm to determine the routes. The simulation results showed that the deep RNN model can achieve high accuracy and low Mean Absolute Error (MAE), and the proposed method outperforms shortest‐path algorithms in terms of latency. At the same time, the available bandwidth is almost fairly distributed among all network links.","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141922066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信