top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Channel Estimation for Physical Layer Network Coding Systems / / by Feifei Gao, Chengwen Xing, Gongpu Wang
Channel Estimation for Physical Layer Network Coding Systems / / by Feifei Gao, Chengwen Xing, Gongpu Wang
Autore Gao Feifei
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (85 p.)
Disciplina 004.6
Collana SpringerBriefs in Computer Science
Soggetto topico Coding theory
Information theory
Electrical engineering
Signal processing
Image processing
Speech processing systems
Computers
Computer organization
Coding and Information Theory
Communications Engineering, Networks
Signal, Image and Speech Processing
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
ISBN 3-319-11668-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fundamentals of Physical Layer Network Coding -- Background on Channel Estimation -- Channel Estimation for PLNC under Frequency Flat Fading Scenarios -- Channel Estimation for PLNC under Frequency Selective Fading Scenarios -- Channel Estimation for PLNC under Time-Selective Fading Scenarios -- Conclusions and Future Directions.
Record Nr. UNINA-9910298990403321
Gao Feifei  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communications and Networking : 18th EAI International Conference, ChinaCom 2023, Sanya, China, November 18-19, 2023, Proceedings
Communications and Networking : 18th EAI International Conference, ChinaCom 2023, Sanya, China, November 18-19, 2023, Proceedings
Autore Gao Feifei
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2024
Descrizione fisica 1 online resource (570 pages)
Altri autori (Persone) WuJun
LiYun
GaoHonghao
WangShangguang
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series
ISBN 3-031-67162-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Advanced Networking and Optimization Strategies -- Research on Random Access Control Strategy and Optimization Algorithm of Multi-type Terminals Based on Deep Reinforcement Learning -- 1 Introduction -- 2 System Model -- 2.1 Scenario Description -- 2.2 Priority-Based Distributed Queue Random Access Control Strategy -- 3 Problem Description -- 3.1 Delay Model -- 3.2 Energy Consumption Model -- 3.3 Optimization Problem -- 4 Multi-type Terminals Random Access Optimization Algorithm Based on DQN -- 4.1 DQN Algorithm Framework and Neural Network -- 4.2 Basic Flow of Multi-type Terminals Random Access Optimization Algorithm Based on DQN -- 5 Simulation Results -- 6 Conclusion -- References -- A Novel Approach on Semantic Performance Oriented Radio Resource Allocation -- 1 Introduction -- 2 System Model -- 2.1 DeepSC Transmitter -- 2.2 Transmission Model -- 2.3 DeepSC Receiver -- 3 Problem Formulation -- 3.1 Semantic Spectral Efficiency -- 3.2 Problem Formulation -- 3.3 The Optimal Solution -- 4 Simulation Results and Analysis -- 4.1 Compare Method Between Semantic Systems -- 4.2 Compare Method Between Allocation Patterns -- 4.3 Simulation Parameters -- 4.4 Simulation Results -- 5 Conclusion -- References -- A Two-Stage Heuristic SFC Deployment Approach in Software Defined Satellite Networks -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 Network Model -- 2.2 SFC Request Model -- 2.3 Problem Formulation -- 3 Two-Stage Heuristic Algorithm -- 3.1 IPSO Algorithm -- 3.2 TEG-Based SFC Routing -- 4 Simulation Results -- 5 Conclusion -- References -- Blockchain-Based Federated Learning with Malicious Attacks in Fog Computing Networks -- 1 Introduction -- 2 System Structure -- 2.1 Network Model -- 2.2 Federated Learning Model -- 3 DAG Blockchain-Based Federated Learning.
3.1 Reputation and Activity Degree-Based Device Selection Algorithm -- 3.2 Outlier-Based Malicious Model Identification Algorithm -- 3.3 Weighted Federated Learning Aggregation Algorithm -- 3.4 DAG Blockchain-Based Federated Learning Algorithm -- 4 Simulation Results -- 4.1 Simulation Parameters -- 4.2 Baseline Algorithms -- 4.3 Simulation Results and Analysis -- 5 Conclusion -- References -- Target Detection in ISAC System Equipped with IRS: A Joint Active and Passive Beamforming Approach -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 2.2 Problem Formulation -- 3 Optimization Algorithm -- 3.1 Optimize wc and wr -- 3.2 Optimize wB -- 3.3 Optimize -- 4 Simulation Results -- 5 Conclusion -- References -- Architecture-Aware Optimization Strategies for Instruction Selection in DSP Compilers -- 1 Introduction -- 2 Related Work -- 3 Optimization Strategies -- 3.1 Instruction Selection Algorithm -- 3.2 Optimized Instruction Selection Algorithm -- 3.3 Optimization in the Examples -- 4 Evaluation -- 4.1 Vector Comparisons and VMOVCV2V -- 4.2 VMAX/VMIN -- 5 Conclusion -- References -- Signal Processing and Communication Optimization -- A Knowledge Graph for UAV Mission Planning Systems -- 1 Introduction -- 2 The Procedures of Building Knowledge Graphs -- 3 The Knowledge Modeling of UAV Mission Planing System -- 4 The Knowledge Exaction of Mission Planing System -- 5 Knowledge Fusion, Representation and Storage -- 6 Proposed GNN-Based Knowledge Reasoning Method -- 6.1 Problem Statement -- 6.2 An Overview of GNN -- 6.3 GNN-Based Entity Classification -- 6.4 GNN-Based Relation Prediction -- 7 Simulations -- 7.1 Pre-process of Data Set -- 7.2 Knowledge Reasoning Results of the Considered UMPS -- 8 Conclusions -- References -- Dynamic Resource Allocation for Network Slicing in LEO Satellite Networks -- 1 Introduction.
2 Related Work -- 3 System Model and Problem Formulation -- 3.1 Network Model -- 3.2 Terrestrial Traffic Model -- 3.3 Problem Formulation -- 4 Heuristic Algorithm Design -- 4.1 Structure of MMAS-RA -- 4.2 PheromoneUpdating Function -- 5 Simulation -- 5.1 Simulation Settings -- 5.2 Simulation Results -- 6 Conclusion -- References -- Scalable Blockchain-Based Access Control Algorithm for Large-Scale IoT Networks with Byzantine Nodes -- 1 Introduction -- 2 System Model -- 2.1 Proposed Model -- 2.2 XACML -- 2.3 Access Control -- 2.4 Cost Function Optimization-Based Sub-cluster Association Algorithm -- 3 Proposed MRaft Algorithm Based Main Cluster Consensus Scheme -- 3.1 Basic Idea of the Proposed MRaft Algorithm -- 3.2 MRaft Algorithm Procedures -- 4 PBFT-Based Sub-cluster Consensus Algorithm and Main Cluster View Switching -- 4.1 The PBFT-Based Sub-cluster Consensus Phase -- 4.2 The Procedure of View Switching -- 5 Simulations -- 6 Conclusions -- References -- Anti-attack Trust Evaluation Algorithm Based on Bayesian Inference in VANET -- 1 Introduction -- 2 System Model -- 2.1 VANET Message Format -- 2.2 Base Station Side -- 2.3 Vehicle Side -- 2.4 On-Off Attack and Sybil Attack Model -- 3 Anti-attack Trust Evaluation Algorithm -- 4 Simulation Platform -- 4.1 Overall Architecture of the Simulation Platform -- 4.2 SUMO Modular -- 4.3 NS3 Modular -- 4.4 Python Modular -- 5 Simulations and Analysis -- 5.1 Simulation Parameters -- 5.2 Performance Comparison Without Attacks -- 5.3 Performance Under On-Off Attack and Sybil Attack -- 5.4 The Impact of Trust Management System on VANET -- 6 Conclusion -- References -- A Dummy Query-Based User Privacy Protection Scheme in Named Data Networking -- 1 Introduction -- 2 Scenario and Problem Analysis -- 2.1 Attack Model -- 2.2 Problem Description -- 3 Principles of Constructing Dummy Query Set -- 3.1 Privacy Metric.
3.2 Privacy Constraints -- 3.3 Bandwidth Constraint -- 3.4 Distributional Constraint -- 3.5 Problem Modeling -- 4 Dummy Query Set Selection Algorithms -- 4.1 Dummy Query Distribution Assurance Algorithm -- 4.2 Dummy Query Filtering Algorithm -- 4.3 Algorithm Time Complexity Analysis -- 4.4 Security Analysis -- 5 Experiments and Simulations -- 5.1 Experimental Scenario -- 5.2 Experimental Result -- 6 Conclusion -- References -- Analytic Hierarchy Process Based Cell Reselection for Inactive Users in LEO Satellite Networks -- 1 Introduction -- 2 System Model -- 2.1 LEO Satellite Communication System -- 2.2 Received Signal Strength -- 2.3 Remaining Service Time -- 3 AHP Based Cell Reselection Strategy -- 3.1 Multiple-target Cell Reselection Process -- 3.2 AHP-Based Weights Decision Process -- 4 Simulation and Analysis -- 4.1 Simulation Scenarios and Parameter Settings -- 4.2 Simulation Results Analysis -- 5 Conclusion -- References -- Resource Allocation and MEAR Maximization for RIS-Aided eMBB/URLLC Traffic Multiplexing -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 3 Solution Approach -- 3.1 eMBB Resource Allocation -- 3.2 URLLC Resource Allocation -- 4 Computational Complexity Analysis -- 5 Simulation Results and Discussions -- 5.1 Simulation Setup -- 5.2 Simulation Results -- 6 Conclusion -- References -- Deep Learning Applications and Optimization -- Enhancing Network Intrusion Detection with Deep Oversampling and Convolutional Autoencoder for Imbalanced Dataset -- 1 Introduction -- 2 Related Work -- 2.1 Sampling Methods for Imbalanced Data -- 2.2 Deep Learning Techniques for Imbalanced Data -- 3 Proposed Method -- 3.1 DCAES Based Minority Class Generating -- 3.2 DBSCAN Based Undersampling -- 3.3 Tomek Links Based Undersampling -- 3.4 Classification and Detection -- 4 Experiments and Evaluations.
4.1 Dataset Description -- 4.2 Data Preprocessing -- 4.3 Data Balancing Process -- 4.4 Evaluation Metric -- 4.5 Analysis of Results -- 5 Conclusion -- References -- Analyzing Average Age of Information in CRDSA Protocol with Access-Banned Policy -- 1 Introduction -- 2 System Model -- 3 Age-Critical Access-Banned Policy -- 3.1 CRDSA Protocol -- 3.2 Access-Banned Policy -- 3.3 ASP and AAoI Performance -- 4 Simulation Results and Analysis -- 5 Conclusion -- References -- VEC System for Vehicle-to-Vehicle Communication Task Offloading Strategy Research -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Signal Strength Model -- 3.2 Delay Model -- 3.3 Offloading Model -- 4 Solution -- 4.1 Vehicle Screening Algorithm -- 4.2 Value Iteration Algorithm -- 5 Simulation and Analysis -- 6 Conclusions -- References -- Research on Synchronization Technology of Dynamic Environment Signals in the Laser Measurement and Control System -- 1 Introduction -- 1.1 Research Background -- 1.2 Main Contributions -- 1.3 Organization -- 2 System Model and Basic Principle -- 3 Performance Analysis -- 3.1 PPM Modulation -- 3.2 Sliding Correlation Acquisition Algorithm -- 3.3 Variable-Parameter Digital Delay Lock Loop -- 4 Simulation Results and Analysis -- 4.1 Capture Algorithm -- 4.2 Tracking Algorithm -- 4.3 Distance Measurement Simulation -- 5 Conclusion -- References -- A Generic Solution for IoT Ontology Model Based on OCF Standard -- 1 Introduction -- 2 Related Work -- 2.1 Ontology of the IoT -- 2.2 OCF Framework -- 3 Thing Specification Model -- 3.1 Thing Model -- 3.2 Static Model -- 3.3 Dynamic Model -- 3.4 Collection Model -- 4 System Implementation -- 4.1 Ontology Mapping -- 4.2 Action Interaction -- 4.3 Event Interaction -- 4.4 Service Linkage -- 5 Ontology-Based Model Evaluation -- 5.1 Ontology Reuse -- 5.2 Language Completeness -- 5.3 Ontology Extensibility.
5.4 Comprehensive Assessment of Model.
Record Nr. UNINA-9910878994403321
Gao Feifei  
Cham : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communications and Networking [[electronic resource] ] : 17th EAI International Conference, Chinacom 2022, Virtual Event, November 19-20, 2022, Proceedings / / edited by Feifei Gao, Jun Wu, Yun Li, Honghao Gao
Communications and Networking [[electronic resource] ] : 17th EAI International Conference, Chinacom 2022, Virtual Event, November 19-20, 2022, Proceedings / / edited by Feifei Gao, Jun Wu, Yun Li, Honghao Gao
Autore Gao Feifei
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (426 pages)
Disciplina 004.6
Altri autori (Persone) WuJun
LiYun
GaoHonghao
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Computer Communication Networks
ISBN 3-031-34790-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software Engineering and Blockchain Technologies -- Using Requirements Clustering to Discover Dependent Requirements for Hidden Impact Analysis -- A Proposed Keyword-Based Feature Extraction Approach for Labeling and Classifying Egyptian Mobile Apps Arabic Slang User Requirements Reviews -- A Comparative study for anonymizing datasets with multiple sensitive attribute and multiple records -- Proposed Framework for Cloud Immunization In-formation System: Challenges and Opportunities -- The Role of Block Chain Technology in Reducing Corruption within the Local Governance in Egyp -- A data brokering architecture to guarantee nonfunctional requirements in IoT applications -- Machine Learning and Big Data applications -- A Proposed Virtual Learning Model based on Statistical Analysis of Educational Data of Egypt -- Diagnosis Hepatitis B Using Machine and Deep Learning: Survey -- Using Grasshopper Optimization in Big Data -- A Semi-supervised Learning Application for Hand Posture Classification -- Explore the relationship between procedural score feedback and subsequent time allocation and learning outcomes of learners in a MOOC -- DoS attacks detection in the network of drones: An efficient Decision Tree-based method -- Deep Learning applications and Bio-inspired Optimization -- Detecting Fake News Spreaders on Twitter Through Follower Networks -- NODDLE: Node2vec based deep learning model for link prediction -- Hybrid Coral Reef Optimization Algorithm Employed Local Search Technique for Job Shop Scheduling Problems.-,Efficient Human Activity Recognition based on Grouped Representations of Multimodal Wearable Data -- Artificial Intelligence and Data Mining in Education -- Pose+Context: a model for recognizing non-verbal teaching behavior of normal college student -- Dropout prediction in MOOCs combining behavioral sequence characteristics -- CVO: Curriculum vitae optimization by recommending keywords to undergraduate students -- Hardware and Software solutions for Big Data Storing and Management -- Big Data in Healthcare Institutions: An Architecture Proposal -- New Domains and Novel Applications Related to Big Data Technologies -- Analysis of Knowledge Map on Rural Culture Tourism in China -- A visual analysis of e-government research in China based on co-word clustering -- Research on Virtual Simulation Teaching Platform Based on Convergent Media.
Record Nr. UNISA-996546824103316
Gao Feifei  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Communications and Networking : 17th EAI International Conference, Chinacom 2022, Virtual Event, November 19-20, 2022, Proceedings / / edited by Feifei Gao, Jun Wu, Yun Li, Honghao Gao
Communications and Networking : 17th EAI International Conference, Chinacom 2022, Virtual Event, November 19-20, 2022, Proceedings / / edited by Feifei Gao, Jun Wu, Yun Li, Honghao Gao
Autore Gao Feifei
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (426 pages)
Disciplina 004.6
Altri autori (Persone) WuJun
LiYun
GaoHonghao
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Computer Communication Networks
ISBN 3-031-34790-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software Engineering and Blockchain Technologies -- Using Requirements Clustering to Discover Dependent Requirements for Hidden Impact Analysis -- A Proposed Keyword-Based Feature Extraction Approach for Labeling and Classifying Egyptian Mobile Apps Arabic Slang User Requirements Reviews -- A Comparative study for anonymizing datasets with multiple sensitive attribute and multiple records -- Proposed Framework for Cloud Immunization In-formation System: Challenges and Opportunities -- The Role of Block Chain Technology in Reducing Corruption within the Local Governance in Egyp -- A data brokering architecture to guarantee nonfunctional requirements in IoT applications -- Machine Learning and Big Data applications -- A Proposed Virtual Learning Model based on Statistical Analysis of Educational Data of Egypt -- Diagnosis Hepatitis B Using Machine and Deep Learning: Survey -- Using Grasshopper Optimization in Big Data -- A Semi-supervised Learning Application for Hand Posture Classification -- Explore the relationship between procedural score feedback and subsequent time allocation and learning outcomes of learners in a MOOC -- DoS attacks detection in the network of drones: An efficient Decision Tree-based method -- Deep Learning applications and Bio-inspired Optimization -- Detecting Fake News Spreaders on Twitter Through Follower Networks -- NODDLE: Node2vec based deep learning model for link prediction -- Hybrid Coral Reef Optimization Algorithm Employed Local Search Technique for Job Shop Scheduling Problems.-,Efficient Human Activity Recognition based on Grouped Representations of Multimodal Wearable Data -- Artificial Intelligence and Data Mining in Education -- Pose+Context: a model for recognizing non-verbal teaching behavior of normal college student -- Dropout prediction in MOOCs combining behavioral sequence characteristics -- CVO: Curriculum vitae optimization by recommending keywords to undergraduate students -- Hardware and Software solutions for Big Data Storing and Management -- Big Data in Healthcare Institutions: An Architecture Proposal -- New Domains and Novel Applications Related to Big Data Technologies -- Analysis of Knowledge Map on Rural Culture Tourism in China -- A visual analysis of e-government research in China based on co-word clustering -- Research on Virtual Simulation Teaching Platform Based on Convergent Media.
Record Nr. UNINA-9910731456803321
Gao Feifei  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui