Channel Estimation for Physical Layer Network Coding Systems / / by Feifei Gao, Chengwen Xing, Gongpu Wang |
Autore | Gao Feifei |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (85 p.) |
Disciplina | 004.6 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Coding theory
Information theory Electrical engineering Signal processing Image processing Speech processing systems Computers Computer organization Coding and Information Theory Communications Engineering, Networks Signal, Image and Speech Processing Information Systems and Communication Service Computer Systems Organization and Communication Networks |
ISBN | 3-319-11668-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Fundamentals of Physical Layer Network Coding -- Background on Channel Estimation -- Channel Estimation for PLNC under Frequency Flat Fading Scenarios -- Channel Estimation for PLNC under Frequency Selective Fading Scenarios -- Channel Estimation for PLNC under Time-Selective Fading Scenarios -- Conclusions and Future Directions. |
Record Nr. | UNINA-9910298990403321 |
Gao Feifei | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Communications and Networking : 18th EAI International Conference, ChinaCom 2023, Sanya, China, November 18-19, 2023, Proceedings |
Autore | Gao Feifei |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (570 pages) |
Altri autori (Persone) |
WuJun
LiYun GaoHonghao WangShangguang |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series |
ISBN | 3-031-67162-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Advanced Networking and Optimization Strategies -- Research on Random Access Control Strategy and Optimization Algorithm of Multi-type Terminals Based on Deep Reinforcement Learning -- 1 Introduction -- 2 System Model -- 2.1 Scenario Description -- 2.2 Priority-Based Distributed Queue Random Access Control Strategy -- 3 Problem Description -- 3.1 Delay Model -- 3.2 Energy Consumption Model -- 3.3 Optimization Problem -- 4 Multi-type Terminals Random Access Optimization Algorithm Based on DQN -- 4.1 DQN Algorithm Framework and Neural Network -- 4.2 Basic Flow of Multi-type Terminals Random Access Optimization Algorithm Based on DQN -- 5 Simulation Results -- 6 Conclusion -- References -- A Novel Approach on Semantic Performance Oriented Radio Resource Allocation -- 1 Introduction -- 2 System Model -- 2.1 DeepSC Transmitter -- 2.2 Transmission Model -- 2.3 DeepSC Receiver -- 3 Problem Formulation -- 3.1 Semantic Spectral Efficiency -- 3.2 Problem Formulation -- 3.3 The Optimal Solution -- 4 Simulation Results and Analysis -- 4.1 Compare Method Between Semantic Systems -- 4.2 Compare Method Between Allocation Patterns -- 4.3 Simulation Parameters -- 4.4 Simulation Results -- 5 Conclusion -- References -- A Two-Stage Heuristic SFC Deployment Approach in Software Defined Satellite Networks -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 Network Model -- 2.2 SFC Request Model -- 2.3 Problem Formulation -- 3 Two-Stage Heuristic Algorithm -- 3.1 IPSO Algorithm -- 3.2 TEG-Based SFC Routing -- 4 Simulation Results -- 5 Conclusion -- References -- Blockchain-Based Federated Learning with Malicious Attacks in Fog Computing Networks -- 1 Introduction -- 2 System Structure -- 2.1 Network Model -- 2.2 Federated Learning Model -- 3 DAG Blockchain-Based Federated Learning.
3.1 Reputation and Activity Degree-Based Device Selection Algorithm -- 3.2 Outlier-Based Malicious Model Identification Algorithm -- 3.3 Weighted Federated Learning Aggregation Algorithm -- 3.4 DAG Blockchain-Based Federated Learning Algorithm -- 4 Simulation Results -- 4.1 Simulation Parameters -- 4.2 Baseline Algorithms -- 4.3 Simulation Results and Analysis -- 5 Conclusion -- References -- Target Detection in ISAC System Equipped with IRS: A Joint Active and Passive Beamforming Approach -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 2.2 Problem Formulation -- 3 Optimization Algorithm -- 3.1 Optimize wc and wr -- 3.2 Optimize wB -- 3.3 Optimize -- 4 Simulation Results -- 5 Conclusion -- References -- Architecture-Aware Optimization Strategies for Instruction Selection in DSP Compilers -- 1 Introduction -- 2 Related Work -- 3 Optimization Strategies -- 3.1 Instruction Selection Algorithm -- 3.2 Optimized Instruction Selection Algorithm -- 3.3 Optimization in the Examples -- 4 Evaluation -- 4.1 Vector Comparisons and VMOVCV2V -- 4.2 VMAX/VMIN -- 5 Conclusion -- References -- Signal Processing and Communication Optimization -- A Knowledge Graph for UAV Mission Planning Systems -- 1 Introduction -- 2 The Procedures of Building Knowledge Graphs -- 3 The Knowledge Modeling of UAV Mission Planing System -- 4 The Knowledge Exaction of Mission Planing System -- 5 Knowledge Fusion, Representation and Storage -- 6 Proposed GNN-Based Knowledge Reasoning Method -- 6.1 Problem Statement -- 6.2 An Overview of GNN -- 6.3 GNN-Based Entity Classification -- 6.4 GNN-Based Relation Prediction -- 7 Simulations -- 7.1 Pre-process of Data Set -- 7.2 Knowledge Reasoning Results of the Considered UMPS -- 8 Conclusions -- References -- Dynamic Resource Allocation for Network Slicing in LEO Satellite Networks -- 1 Introduction. 2 Related Work -- 3 System Model and Problem Formulation -- 3.1 Network Model -- 3.2 Terrestrial Traffic Model -- 3.3 Problem Formulation -- 4 Heuristic Algorithm Design -- 4.1 Structure of MMAS-RA -- 4.2 PheromoneUpdating Function -- 5 Simulation -- 5.1 Simulation Settings -- 5.2 Simulation Results -- 6 Conclusion -- References -- Scalable Blockchain-Based Access Control Algorithm for Large-Scale IoT Networks with Byzantine Nodes -- 1 Introduction -- 2 System Model -- 2.1 Proposed Model -- 2.2 XACML -- 2.3 Access Control -- 2.4 Cost Function Optimization-Based Sub-cluster Association Algorithm -- 3 Proposed MRaft Algorithm Based Main Cluster Consensus Scheme -- 3.1 Basic Idea of the Proposed MRaft Algorithm -- 3.2 MRaft Algorithm Procedures -- 4 PBFT-Based Sub-cluster Consensus Algorithm and Main Cluster View Switching -- 4.1 The PBFT-Based Sub-cluster Consensus Phase -- 4.2 The Procedure of View Switching -- 5 Simulations -- 6 Conclusions -- References -- Anti-attack Trust Evaluation Algorithm Based on Bayesian Inference in VANET -- 1 Introduction -- 2 System Model -- 2.1 VANET Message Format -- 2.2 Base Station Side -- 2.3 Vehicle Side -- 2.4 On-Off Attack and Sybil Attack Model -- 3 Anti-attack Trust Evaluation Algorithm -- 4 Simulation Platform -- 4.1 Overall Architecture of the Simulation Platform -- 4.2 SUMO Modular -- 4.3 NS3 Modular -- 4.4 Python Modular -- 5 Simulations and Analysis -- 5.1 Simulation Parameters -- 5.2 Performance Comparison Without Attacks -- 5.3 Performance Under On-Off Attack and Sybil Attack -- 5.4 The Impact of Trust Management System on VANET -- 6 Conclusion -- References -- A Dummy Query-Based User Privacy Protection Scheme in Named Data Networking -- 1 Introduction -- 2 Scenario and Problem Analysis -- 2.1 Attack Model -- 2.2 Problem Description -- 3 Principles of Constructing Dummy Query Set -- 3.1 Privacy Metric. 3.2 Privacy Constraints -- 3.3 Bandwidth Constraint -- 3.4 Distributional Constraint -- 3.5 Problem Modeling -- 4 Dummy Query Set Selection Algorithms -- 4.1 Dummy Query Distribution Assurance Algorithm -- 4.2 Dummy Query Filtering Algorithm -- 4.3 Algorithm Time Complexity Analysis -- 4.4 Security Analysis -- 5 Experiments and Simulations -- 5.1 Experimental Scenario -- 5.2 Experimental Result -- 6 Conclusion -- References -- Analytic Hierarchy Process Based Cell Reselection for Inactive Users in LEO Satellite Networks -- 1 Introduction -- 2 System Model -- 2.1 LEO Satellite Communication System -- 2.2 Received Signal Strength -- 2.3 Remaining Service Time -- 3 AHP Based Cell Reselection Strategy -- 3.1 Multiple-target Cell Reselection Process -- 3.2 AHP-Based Weights Decision Process -- 4 Simulation and Analysis -- 4.1 Simulation Scenarios and Parameter Settings -- 4.2 Simulation Results Analysis -- 5 Conclusion -- References -- Resource Allocation and MEAR Maximization for RIS-Aided eMBB/URLLC Traffic Multiplexing -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 3 Solution Approach -- 3.1 eMBB Resource Allocation -- 3.2 URLLC Resource Allocation -- 4 Computational Complexity Analysis -- 5 Simulation Results and Discussions -- 5.1 Simulation Setup -- 5.2 Simulation Results -- 6 Conclusion -- References -- Deep Learning Applications and Optimization -- Enhancing Network Intrusion Detection with Deep Oversampling and Convolutional Autoencoder for Imbalanced Dataset -- 1 Introduction -- 2 Related Work -- 2.1 Sampling Methods for Imbalanced Data -- 2.2 Deep Learning Techniques for Imbalanced Data -- 3 Proposed Method -- 3.1 DCAES Based Minority Class Generating -- 3.2 DBSCAN Based Undersampling -- 3.3 Tomek Links Based Undersampling -- 3.4 Classification and Detection -- 4 Experiments and Evaluations. 4.1 Dataset Description -- 4.2 Data Preprocessing -- 4.3 Data Balancing Process -- 4.4 Evaluation Metric -- 4.5 Analysis of Results -- 5 Conclusion -- References -- Analyzing Average Age of Information in CRDSA Protocol with Access-Banned Policy -- 1 Introduction -- 2 System Model -- 3 Age-Critical Access-Banned Policy -- 3.1 CRDSA Protocol -- 3.2 Access-Banned Policy -- 3.3 ASP and AAoI Performance -- 4 Simulation Results and Analysis -- 5 Conclusion -- References -- VEC System for Vehicle-to-Vehicle Communication Task Offloading Strategy Research -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Signal Strength Model -- 3.2 Delay Model -- 3.3 Offloading Model -- 4 Solution -- 4.1 Vehicle Screening Algorithm -- 4.2 Value Iteration Algorithm -- 5 Simulation and Analysis -- 6 Conclusions -- References -- Research on Synchronization Technology of Dynamic Environment Signals in the Laser Measurement and Control System -- 1 Introduction -- 1.1 Research Background -- 1.2 Main Contributions -- 1.3 Organization -- 2 System Model and Basic Principle -- 3 Performance Analysis -- 3.1 PPM Modulation -- 3.2 Sliding Correlation Acquisition Algorithm -- 3.3 Variable-Parameter Digital Delay Lock Loop -- 4 Simulation Results and Analysis -- 4.1 Capture Algorithm -- 4.2 Tracking Algorithm -- 4.3 Distance Measurement Simulation -- 5 Conclusion -- References -- A Generic Solution for IoT Ontology Model Based on OCF Standard -- 1 Introduction -- 2 Related Work -- 2.1 Ontology of the IoT -- 2.2 OCF Framework -- 3 Thing Specification Model -- 3.1 Thing Model -- 3.2 Static Model -- 3.3 Dynamic Model -- 3.4 Collection Model -- 4 System Implementation -- 4.1 Ontology Mapping -- 4.2 Action Interaction -- 4.3 Event Interaction -- 4.4 Service Linkage -- 5 Ontology-Based Model Evaluation -- 5.1 Ontology Reuse -- 5.2 Language Completeness -- 5.3 Ontology Extensibility. 5.4 Comprehensive Assessment of Model. |
Record Nr. | UNINA-9910878994403321 |
Gao Feifei | ||
Cham : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Communications and Networking [[electronic resource] ] : 17th EAI International Conference, Chinacom 2022, Virtual Event, November 19-20, 2022, Proceedings / / edited by Feifei Gao, Jun Wu, Yun Li, Honghao Gao |
Autore | Gao Feifei |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (426 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
WuJun
LiYun GaoHonghao |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer networks
Computer Communication Networks |
ISBN | 3-031-34790-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Software Engineering and Blockchain Technologies -- Using Requirements Clustering to Discover Dependent Requirements for Hidden Impact Analysis -- A Proposed Keyword-Based Feature Extraction Approach for Labeling and Classifying Egyptian Mobile Apps Arabic Slang User Requirements Reviews -- A Comparative study for anonymizing datasets with multiple sensitive attribute and multiple records -- Proposed Framework for Cloud Immunization In-formation System: Challenges and Opportunities -- The Role of Block Chain Technology in Reducing Corruption within the Local Governance in Egyp -- A data brokering architecture to guarantee nonfunctional requirements in IoT applications -- Machine Learning and Big Data applications -- A Proposed Virtual Learning Model based on Statistical Analysis of Educational Data of Egypt -- Diagnosis Hepatitis B Using Machine and Deep Learning: Survey -- Using Grasshopper Optimization in Big Data -- A Semi-supervised Learning Application for Hand Posture Classification -- Explore the relationship between procedural score feedback and subsequent time allocation and learning outcomes of learners in a MOOC -- DoS attacks detection in the network of drones: An efficient Decision Tree-based method -- Deep Learning applications and Bio-inspired Optimization -- Detecting Fake News Spreaders on Twitter Through Follower Networks -- NODDLE: Node2vec based deep learning model for link prediction -- Hybrid Coral Reef Optimization Algorithm Employed Local Search Technique for Job Shop Scheduling Problems.-,Efficient Human Activity Recognition based on Grouped Representations of Multimodal Wearable Data -- Artificial Intelligence and Data Mining in Education -- Pose+Context: a model for recognizing non-verbal teaching behavior of normal college student -- Dropout prediction in MOOCs combining behavioral sequence characteristics -- CVO: Curriculum vitae optimization by recommending keywords to undergraduate students -- Hardware and Software solutions for Big Data Storing and Management -- Big Data in Healthcare Institutions: An Architecture Proposal -- New Domains and Novel Applications Related to Big Data Technologies -- Analysis of Knowledge Map on Rural Culture Tourism in China -- A visual analysis of e-government research in China based on co-word clustering -- Research on Virtual Simulation Teaching Platform Based on Convergent Media. |
Record Nr. | UNISA-996546824103316 |
Gao Feifei | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Communications and Networking : 17th EAI International Conference, Chinacom 2022, Virtual Event, November 19-20, 2022, Proceedings / / edited by Feifei Gao, Jun Wu, Yun Li, Honghao Gao |
Autore | Gao Feifei |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (426 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
WuJun
LiYun GaoHonghao |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer networks
Computer Communication Networks |
ISBN | 3-031-34790-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Software Engineering and Blockchain Technologies -- Using Requirements Clustering to Discover Dependent Requirements for Hidden Impact Analysis -- A Proposed Keyword-Based Feature Extraction Approach for Labeling and Classifying Egyptian Mobile Apps Arabic Slang User Requirements Reviews -- A Comparative study for anonymizing datasets with multiple sensitive attribute and multiple records -- Proposed Framework for Cloud Immunization In-formation System: Challenges and Opportunities -- The Role of Block Chain Technology in Reducing Corruption within the Local Governance in Egyp -- A data brokering architecture to guarantee nonfunctional requirements in IoT applications -- Machine Learning and Big Data applications -- A Proposed Virtual Learning Model based on Statistical Analysis of Educational Data of Egypt -- Diagnosis Hepatitis B Using Machine and Deep Learning: Survey -- Using Grasshopper Optimization in Big Data -- A Semi-supervised Learning Application for Hand Posture Classification -- Explore the relationship between procedural score feedback and subsequent time allocation and learning outcomes of learners in a MOOC -- DoS attacks detection in the network of drones: An efficient Decision Tree-based method -- Deep Learning applications and Bio-inspired Optimization -- Detecting Fake News Spreaders on Twitter Through Follower Networks -- NODDLE: Node2vec based deep learning model for link prediction -- Hybrid Coral Reef Optimization Algorithm Employed Local Search Technique for Job Shop Scheduling Problems.-,Efficient Human Activity Recognition based on Grouped Representations of Multimodal Wearable Data -- Artificial Intelligence and Data Mining in Education -- Pose+Context: a model for recognizing non-verbal teaching behavior of normal college student -- Dropout prediction in MOOCs combining behavioral sequence characteristics -- CVO: Curriculum vitae optimization by recommending keywords to undergraduate students -- Hardware and Software solutions for Big Data Storing and Management -- Big Data in Healthcare Institutions: An Architecture Proposal -- New Domains and Novel Applications Related to Big Data Technologies -- Analysis of Knowledge Map on Rural Culture Tourism in China -- A visual analysis of e-government research in China based on co-word clustering -- Research on Virtual Simulation Teaching Platform Based on Convergent Media. |
Record Nr. | UNINA-9910731456803321 |
Gao Feifei | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|