Ad Hoc Networks最新文献

筛选
英文 中文
Towards sustainable industry 4.0: A survey on greening IoE in 6G networks 迈向可持续的工业 4.0:6G 网络中的绿色物联网调查
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-08-30 DOI: 10.1016/j.adhoc.2024.103610
{"title":"Towards sustainable industry 4.0: A survey on greening IoE in 6G networks","authors":"","doi":"10.1016/j.adhoc.2024.103610","DOIUrl":"10.1016/j.adhoc.2024.103610","url":null,"abstract":"<div><p>The dramatic recent increase of the smart Internet of Everything (IoE) in Industry 4.0 has significantly increased energy consumption, carbon emissions, and global warming. IoE applications in Industry 4.0 face many challenges, including energy efficiency, heterogeneity, security, interoperability, and centralization. Therefore, Industry 4.0 in Beyond the Sixth-Generation (6G) networks demands moving to sustainable, green IoE and identifying efficient and emerging technologies to overcome sustainability challenges. Many advanced technologies and strategies efficiently solve issues by enhancing connectivity, interoperability, security, decentralization, and reliability. Greening IoE is a promising approach that focuses on improving energy efficiency, providing a high Quality of Service (QoS), and reducing carbon emissions to enhance the quality of life at a low cost. This survey provides a comprehensive overview of how advanced technologies can contribute to green IoE in the 6G network of Industry 4.0 applications. This survey provides a comprehensive overview of advanced technologies, including Blockchain, Digital Twins (DTs), Unmanned Aerial Vehicles (UAVs, a.k.a. drones), and Machine Learning (ML), to improve connectivity, QoS, and energy efficiency for green IoE in 6G networks. We evaluate the capability of each technology in greening IoE in Industry 4.0 applications and analyse the challenges and opportunities to make IoE greener using the discussed technologies.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S157087052400221X/pdfft?md5=4458c1f0b4d6c5d5d72267474fa6aea4&pid=1-s2.0-S157087052400221X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint differential evolution algorithm in RIS-assisted multi-UAV IoT data collection system RIS 辅助多无人机物联网数据采集系统中的联合差分进化算法
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-08-30 DOI: 10.1016/j.adhoc.2024.103640
{"title":"Joint differential evolution algorithm in RIS-assisted multi-UAV IoT data collection system","authors":"","doi":"10.1016/j.adhoc.2024.103640","DOIUrl":"10.1016/j.adhoc.2024.103640","url":null,"abstract":"<div><p>This paper investigates a Reconfigurable Intelligent Surface (RIS)-assisted multi-UAV data collection system, in which unmanned aerial vehicles (UAVs) collect data from Internet of Things (IoT) devices. The RIS, mounted on building surfaces, plays a vital role in preventing obstruction and improving the communication quality of the IoT-UAV transmission link. Our aim is to minimize the energy consumption of this system, including the transmission energy consumption of IoT devices and the hovering energy consumption of UAVs, by optimizing the deployment of UAVs and the phase shifts of RIS. To achieve this goal, a multi-UAV deployment and phase shift of RIS optimization algorithm (MUDPRA) is proposed that consists of two phases. In the first phase, a joint differential evolution (DE) algorithm with a two-layer structure featuring a variable population size, namely DEC-ADDE, is proposed to optimize the UAV deployment. Specifically, each UAV’s location is encoded as an individual, with the whole UAV deployment is considered as the population in DEC-ADDE. Thus, a differential evolution clustering (DEC) algorithm is employed initially to initialize the population, which allows for obtaining better initial UAV deployment without the need for a predefined number of UAVs. Subsequently, an adaptive and dynamic DE algorithm (ADDE) is employed to produce offspring population to further optimize UAV deployment. Finally, an adaptive updating strategy is adopted to adjust the population size to optimize the number of UAVs. In the second phase, a low-complexity method is proposed to optimize the phase shift of RIS with the aim of enhancing the IoT-UAV data transmission rate. Experimental results conducted on eight instances involving IoT devices ranging from 60 to 200 demonstrate the effectiveness of MUDPRA in minimizing energy consumption of this system compared to six alternative algorithms and three benchmark systems.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on security of UAV and deep reinforcement learning 无人机安全与深度强化学习调查
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-08-30 DOI: 10.1016/j.adhoc.2024.103642
{"title":"A survey on security of UAV and deep reinforcement learning","authors":"","doi":"10.1016/j.adhoc.2024.103642","DOIUrl":"10.1016/j.adhoc.2024.103642","url":null,"abstract":"<div><p>Recently, the use of unmanned aerial vehicles (UAV)s for accomplishing various tasks has gained a significant interest from both civilian and military organizations due to their adaptive, autonomous, and flexibility nature in different environments. The characteristics of UAV systems introduce new threats from which cyber attacks may benefit. Adaptive security solutions for UAVs are required to counter the growing threat surface. The security of UAV systems has therefore become one of the fastest growing research topics. Machine learning based security mechanisms have a potential to provide effective countermeasures that complement traditional security mechanisms. The main motivation of this survey is to the lack of a comprehensive literature review about reinforcement learning based security solutions for UAV systems. In this paper, we present a comprehensive review on the security of UAV systems focusing on deep-reinforcement learning-based security solutions. We present a general architecture of an UAV system that includes communication systems to show potential sources of vulnerabilities. Then, the threat surface of UAV systems is explored. We explain attacks on UAV systems according to the threats in a systematic way. In addition, we present countermeasures in the literature for each attack on UAVs. Furthermore, traditional defense mechanisms are explained to highlight requirements for reinforcement based security solutions on UAVs. Next, we present the main reinforcement algorithms. We examine security solutions with reinforcement learning algorithms and their limitations in a holistic approach. We also identify research challenges about reinforcement based security solutions on UAVs. Briefly, this survey provides key guidelines on UAV systems, threats, attacks, reinforcement learning algorithms, the security of UAV systems, and research challenges.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FIDWATCH: Federated incremental distillation for continuous monitoring of IoT security threats FIDWATCH:用于持续监控物联网安全威胁的联合增量提炼技术
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-08-27 DOI: 10.1016/j.adhoc.2024.103637
{"title":"FIDWATCH: Federated incremental distillation for continuous monitoring of IoT security threats","authors":"","doi":"10.1016/j.adhoc.2024.103637","DOIUrl":"10.1016/j.adhoc.2024.103637","url":null,"abstract":"<div><p>The fast evolutions of Internet of Things (IoT) technologies have been accelerating their applicability in different sectors of life and becoming a pillar for sustainable development. However, this revolutionary expansion led to a substantial increase in attack surface, raising many concerns about security threats and their possible consequences. Machine learning has significantly contributed to designing intrusion detection systems (IDS) but suffers from critical limitations such as data privacy and sovereignty, data imbalance, concept drift, and catastrophic forgetting. This collectively makes existing IDSs an improper choice for securing IoT environments. This paper presents a federated learning approach called FIDWATCH to continuously monitor and detect a broad range of IoT security threats. The local side of FIDWATCH introduces contrastive focal loss to enhance the ability of the local model (teacher) to discriminate between diverse types of IoT security threats while putting an increased emphasis on hard-to-classify samples. A fine-grained Knowledge Distillation (KD) is introduced to allow the client to distill the required teacher's knowledge into a lighter, more compact model termed the pupil model. This greatly assists the competence and flexibility of the model in resource-constrained scenarios. Furthermore, an adaptive incremental updating method is introduced in FIDWATCH to allow the global model to exploit the distilled knowledge and refine the shared dataset. This helps generate global anchors for improving the robustness of the mode against the distributional shift, thereby improving model alignment and compliance with the dynamics of IoT security threats. Proof-of-concept simulations are performed on data from two public datasets (BoT-IoT and ToN-IoT), demonstrating the superiority of FIDWATCH over cutting-edge performance with an average f1-score of 97.07% and 95.63%, respectively.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shared secret key extraction from atmospheric optical wireless channels with multi-scale information reconciliation 利用多尺度信息调和从大气光学无线信道中提取共享密钥
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-08-26 DOI: 10.1016/j.adhoc.2024.103638
{"title":"Shared secret key extraction from atmospheric optical wireless channels with multi-scale information reconciliation","authors":"","doi":"10.1016/j.adhoc.2024.103638","DOIUrl":"10.1016/j.adhoc.2024.103638","url":null,"abstract":"<div><p>Due to the impact of turbulence, atmospheric optical wireless channel exhibits characteristics such as time-varying, space-varying and natural randomness, which can be used as a common natural random source for shared secret key extraction. Wireless laser communication technology boasts advantages like high bandwidth and fast transmission, which is conducive to improving key generation rate. Additionally, the strong anti-interference of laser signal helps to reduce key disagreement rate. Moreover, the laser beam’s good directionality effectively decreases the risk of eavesdropping on key information. Given its advantages and a scarcity of research in this regard, this paper proposes a scheme of shared secret key extraction from atmospheric optical wireless channels with multi-scale information reconciliation. In the scheme, to increase the cross-correlation coefficient of signal samples at the two legitimate parties, a preprocessing algorithm is designed based on a denoising algorithm and a threshold-based outliers elimination algorithm, and the denoising algorithm is inspired by the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDan); moreover, a multi-level quantization algorithm based on Equilibrium-Optimizer(EO) is developed to balance and optimize distribution of sample points in the sample space; furthermore, to simplify the process of and decrease the computational complexity of information reconciliation, a concept of a multi-scale information reconciliation is formed, on the basis of which three algorithms, B-MSIR, I-MSIR and C-MSIR, are formulated. Finally, its performance is verified by numerical simulations and experiments, and the results show it has better performance in terms of the key disagreement rate, the key generation rate and the key randomness compared with several state-of-the-art algorithms.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142088660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobility-aware parallel offloading and resource allocation scheme for vehicular edge computing 面向车载边缘计算的移动感知并行卸载和资源分配方案
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-08-26 DOI: 10.1016/j.adhoc.2024.103639
{"title":"Mobility-aware parallel offloading and resource allocation scheme for vehicular edge computing","authors":"","doi":"10.1016/j.adhoc.2024.103639","DOIUrl":"10.1016/j.adhoc.2024.103639","url":null,"abstract":"<div><p>Vehicle edge computing (VEC) enhances the distributed task processing capability within intelligent vehicle-infrastructure cooperative systems (i-VICS) by deploying servers at the network edge. However, the proliferation of onboard sensors and the continual emergence of new applications have exacerbated the inadequacy of wireless spectrum resources and edge server resources, while the high mobility of vehicles reduces reliability in task processing, resulting in increased communication and task processing delays. To address these challenges, we propose a mobile-aware Many-to-Many Parallel (MTMP) offloading scheme that integrates: a) millimeter-wave (mmWave) and cellular vehicle-to-everything (C-V2X) to mitigate excessive communication delays; and b) leveraging the underutilized resources of surrounding vehicles and parallel offloading to mitigate excessive task processing delays. To minimize the average completion delay of all tasks, this paper formulates the objective as a min-max optimization problem and solves it using the maximum entropy method (MEM), the Lagrange multiplier method, and an iterative algorithm. Extensive experimental results demonstrate the superior performance of the proposed scheme in comparison with other baseline algorithms. Specifically, our proposal achieves a 47 % reduction in task completion delay under optimal conditions, a 31.3 % increase in task completion rate, and a 30 % decrease in program runtime compared to the worst-performing algorithm.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142096630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mixed fragmentation technique for securing structured data using multi-cloud environment (MFT-SSD) 利用多云环境确保结构化数据安全的混合分片技术(MFT-SSD)
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-08-22 DOI: 10.1016/j.adhoc.2024.103625
{"title":"Mixed fragmentation technique for securing structured data using multi-cloud environment (MFT-SSD)","authors":"","doi":"10.1016/j.adhoc.2024.103625","DOIUrl":"10.1016/j.adhoc.2024.103625","url":null,"abstract":"<div><p>Large data storage security is a topic of great interest to researchers, particularly in the age of big data where preserving data from theft, unauthorized access, and storage failure has become a crucial concern. To safeguard such data, encryption/decryption approaches have been employed, which are time-consuming and inefficient. The aim of this study is to develop a method, namely Mixed Fragmentation Technique for Securing Structured Data using Multi-Cloud Environment (MFT-SSD), for protecting large-scale data stored in a multi-cloud environment. This prevents insider attacks by adopting a mixed fragmentation approach to split the data into three files. For example, healthcare data is will be distributed among many clouds, each of which stores a partially unrecognized fraction of data without the need for an encryption or decryption layer. Comparing MFT-SSD to various encryption/decryption algorithms, our results show significant improvement; hence, the total performance of big data security is also improved.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142049558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An edge computing and distributed ledger technology architecture for secure and efficient transportation 用于安全高效运输的边缘计算和分布式账本技术架构
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-08-22 DOI: 10.1016/j.adhoc.2024.103633
{"title":"An edge computing and distributed ledger technology architecture for secure and efficient transportation","authors":"","doi":"10.1016/j.adhoc.2024.103633","DOIUrl":"10.1016/j.adhoc.2024.103633","url":null,"abstract":"<div><p>Intelligent Transportation Systems (ITS) faces significant challenges in achieving its goal of sustainable and efficient transportation. These challenges include real-time data processing bottlenecks caused by high communication latency and security vulnerabilities related to centralized data storage. We propose a novel architecture that leverages Edge Computing and Distributed Ledger Technology (DLT) to address these concerns. Edge computing pushes cloud services, such as vehicles and roadside units, closer to the data source. This strategy reduces latency and network congestion. DLT provides a secure, decentralized platform for storing and sharing ITS data. Its tamper-proof nature ensures data integrity and prevents unauthorized access. Our architecture utilizes these technologies to create a decentralized platform for ITS data management. This platform facilitates secure processing, storage, and data exchange from various sources in the transportation network. This paper delves deeper into the architecture, explaining its essential components and functionalities. Additionally, we explore its potential applications and benefits for ITS. We describe a case study focusing on a data marketplace system for connected vehicles to assess the architecture’s effectiveness. The simulation results show an average latency reduction of 83.35% for publishing and 87.57% for purchasing datasets compared to the cloud architecture. Additionally, transaction processing speed improved by 18.73% and network usage decreased by 96.67%. The proposed architecture also achieves up to 99.61% reduction in mining centralization.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142088657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel differentiated coverage-based lifetime metric for wireless sensor networks 基于覆盖范围的新型无线传感器网络寿命指标
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-08-22 DOI: 10.1016/j.adhoc.2024.103636
{"title":"A novel differentiated coverage-based lifetime metric for wireless sensor networks","authors":"","doi":"10.1016/j.adhoc.2024.103636","DOIUrl":"10.1016/j.adhoc.2024.103636","url":null,"abstract":"<div><p>This paper delves into optimizing network lifetime (NL) subject to connected-coverage requirement, a pivotal issue for realistic wireless sensor network (WSN) design. A key challenge in designing WSNs consisting of energy-limited sensors is maximizing NL, the time a network remains functional by providing the desired service quality. To this end, we introduce a novel NL metric addressing target-specific coverage requirements that remedies the shortcomings imposed by conventional definitions like <em>first node die</em> (FND) and <em>last node die</em> (LND). In this context, while we want targets to be sensed by multiple sensors for a portion of the network lifetime, we let the periods, during which cells are monitored by at least one sensor, vary. We also allow the ratios of multiple and single tracking times to differ depending on the target and incorporate target-based prioritization in coverage. Moreover, we address role assignment to sensors and propose a selective target-sensor assignment strategy. As such, we aim to reduce redundant data transmissions and hence overall energy consumption in WSNs. We first propose a unique 0-1 mixed integer programming (MIP) model, to analyze the impact of our proposal on optimal WSN performance, precisely. Next, we present comprehensive comparative studies of WSN performance for alternative NL metrics regarding different coverage requirements and priorities across a wide range of parameters. Our test results reveal that by utilizing our novel NL metric total coverage time can be improved significantly, while facilitating more reliable sensing of the target region.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142084098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy minimization for IRS-and-UAV-assisted mobile edge computing 最小化 IRS 和无人机辅助移动边缘计算的能耗
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2024-08-20 DOI: 10.1016/j.adhoc.2024.103635
{"title":"Energy minimization for IRS-and-UAV-assisted mobile edge computing","authors":"","doi":"10.1016/j.adhoc.2024.103635","DOIUrl":"10.1016/j.adhoc.2024.103635","url":null,"abstract":"<div><p>Intelligent reconfigurable surface (IRS) is an emerging technology for the enhancement of spectrum and energy efficiency. We propose a novel IRS-and-unmanned aerial vehicle (UAV)-Assisted mobile edge computing (MEC) framework, where a MEC server installing on an UAV to facilitate task calculations by mobile users (MUs), and an IRS modulates channels between MUs and the UAV. Non-orthogonal multiple access (NOMA) is employed for further improving system-wide spectral efficiency. There are needs for joint optimization of multiple parameters, e.g., the task partition parameters and the transmit power of all MUs, the reflection coefficient matrix of the IRS and the movement trajectory of the UAV, and such needs raises the challenge of minimizing the long-term total energy consumption of all MUs while satisfying required transmission rate and task completion delay. We divide optimization tasks into two sub-problems and propose specific solutions respectively, i.e., relevant decisions about the UAV and MUs to be solved by deep reinforcement learning (DRL); and the reflection coefficient matrix of the IRS to be solved by block coordinate descent (BCD). A series of experiments have verified the effectiveness of the proposed communication techniques and optimization algorithms. Simulation results demonstrate that (1) NOMA-IRS technique achieves better energy efficacy compared to the cases where random IRS or no IRS is deployed and the conventional orthogonal multiple access (OMA) technique with IRS. (2) our proposed deep deterministic policy gradient (DDPG)-BCD algorithm outperforms other four benchmark algorithms in solving the complex and dynamic optimization problem.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142041065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信