Vai al contenuto principale della pagina

Communications and Networking : 18th EAI International Conference, ChinaCom 2023, Sanya, China, November 18-19, 2023, Proceedings



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Gao Feifei Visualizza persona
Titolo: Communications and Networking : 18th EAI International Conference, ChinaCom 2023, Sanya, China, November 18-19, 2023, Proceedings Visualizza cluster
Pubblicazione: Cham : , : Springer, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (570 pages)
Altri autori: WuJun  
LiYun  
GaoHonghao  
WangShangguang  
Nota di contenuto: Intro -- Preface -- Organization -- Contents -- Advanced Networking and Optimization Strategies -- Research on Random Access Control Strategy and Optimization Algorithm of Multi-type Terminals Based on Deep Reinforcement Learning -- 1 Introduction -- 2 System Model -- 2.1 Scenario Description -- 2.2 Priority-Based Distributed Queue Random Access Control Strategy -- 3 Problem Description -- 3.1 Delay Model -- 3.2 Energy Consumption Model -- 3.3 Optimization Problem -- 4 Multi-type Terminals Random Access Optimization Algorithm Based on DQN -- 4.1 DQN Algorithm Framework and Neural Network -- 4.2 Basic Flow of Multi-type Terminals Random Access Optimization Algorithm Based on DQN -- 5 Simulation Results -- 6 Conclusion -- References -- A Novel Approach on Semantic Performance Oriented Radio Resource Allocation -- 1 Introduction -- 2 System Model -- 2.1 DeepSC Transmitter -- 2.2 Transmission Model -- 2.3 DeepSC Receiver -- 3 Problem Formulation -- 3.1 Semantic Spectral Efficiency -- 3.2 Problem Formulation -- 3.3 The Optimal Solution -- 4 Simulation Results and Analysis -- 4.1 Compare Method Between Semantic Systems -- 4.2 Compare Method Between Allocation Patterns -- 4.3 Simulation Parameters -- 4.4 Simulation Results -- 5 Conclusion -- References -- A Two-Stage Heuristic SFC Deployment Approach in Software Defined Satellite Networks -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 Network Model -- 2.2 SFC Request Model -- 2.3 Problem Formulation -- 3 Two-Stage Heuristic Algorithm -- 3.1 IPSO Algorithm -- 3.2 TEG-Based SFC Routing -- 4 Simulation Results -- 5 Conclusion -- References -- Blockchain-Based Federated Learning with Malicious Attacks in Fog Computing Networks -- 1 Introduction -- 2 System Structure -- 2.1 Network Model -- 2.2 Federated Learning Model -- 3 DAG Blockchain-Based Federated Learning.
3.1 Reputation and Activity Degree-Based Device Selection Algorithm -- 3.2 Outlier-Based Malicious Model Identification Algorithm -- 3.3 Weighted Federated Learning Aggregation Algorithm -- 3.4 DAG Blockchain-Based Federated Learning Algorithm -- 4 Simulation Results -- 4.1 Simulation Parameters -- 4.2 Baseline Algorithms -- 4.3 Simulation Results and Analysis -- 5 Conclusion -- References -- Target Detection in ISAC System Equipped with IRS: A Joint Active and Passive Beamforming Approach -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 2.2 Problem Formulation -- 3 Optimization Algorithm -- 3.1 Optimize wc and wr -- 3.2 Optimize wB -- 3.3 Optimize -- 4 Simulation Results -- 5 Conclusion -- References -- Architecture-Aware Optimization Strategies for Instruction Selection in DSP Compilers -- 1 Introduction -- 2 Related Work -- 3 Optimization Strategies -- 3.1 Instruction Selection Algorithm -- 3.2 Optimized Instruction Selection Algorithm -- 3.3 Optimization in the Examples -- 4 Evaluation -- 4.1 Vector Comparisons and VMOVCV2V -- 4.2 VMAX/VMIN -- 5 Conclusion -- References -- Signal Processing and Communication Optimization -- A Knowledge Graph for UAV Mission Planning Systems -- 1 Introduction -- 2 The Procedures of Building Knowledge Graphs -- 3 The Knowledge Modeling of UAV Mission Planing System -- 4 The Knowledge Exaction of Mission Planing System -- 5 Knowledge Fusion, Representation and Storage -- 6 Proposed GNN-Based Knowledge Reasoning Method -- 6.1 Problem Statement -- 6.2 An Overview of GNN -- 6.3 GNN-Based Entity Classification -- 6.4 GNN-Based Relation Prediction -- 7 Simulations -- 7.1 Pre-process of Data Set -- 7.2 Knowledge Reasoning Results of the Considered UMPS -- 8 Conclusions -- References -- Dynamic Resource Allocation for Network Slicing in LEO Satellite Networks -- 1 Introduction.
2 Related Work -- 3 System Model and Problem Formulation -- 3.1 Network Model -- 3.2 Terrestrial Traffic Model -- 3.3 Problem Formulation -- 4 Heuristic Algorithm Design -- 4.1 Structure of MMAS-RA -- 4.2 PheromoneUpdating Function -- 5 Simulation -- 5.1 Simulation Settings -- 5.2 Simulation Results -- 6 Conclusion -- References -- Scalable Blockchain-Based Access Control Algorithm for Large-Scale IoT Networks with Byzantine Nodes -- 1 Introduction -- 2 System Model -- 2.1 Proposed Model -- 2.2 XACML -- 2.3 Access Control -- 2.4 Cost Function Optimization-Based Sub-cluster Association Algorithm -- 3 Proposed MRaft Algorithm Based Main Cluster Consensus Scheme -- 3.1 Basic Idea of the Proposed MRaft Algorithm -- 3.2 MRaft Algorithm Procedures -- 4 PBFT-Based Sub-cluster Consensus Algorithm and Main Cluster View Switching -- 4.1 The PBFT-Based Sub-cluster Consensus Phase -- 4.2 The Procedure of View Switching -- 5 Simulations -- 6 Conclusions -- References -- Anti-attack Trust Evaluation Algorithm Based on Bayesian Inference in VANET -- 1 Introduction -- 2 System Model -- 2.1 VANET Message Format -- 2.2 Base Station Side -- 2.3 Vehicle Side -- 2.4 On-Off Attack and Sybil Attack Model -- 3 Anti-attack Trust Evaluation Algorithm -- 4 Simulation Platform -- 4.1 Overall Architecture of the Simulation Platform -- 4.2 SUMO Modular -- 4.3 NS3 Modular -- 4.4 Python Modular -- 5 Simulations and Analysis -- 5.1 Simulation Parameters -- 5.2 Performance Comparison Without Attacks -- 5.3 Performance Under On-Off Attack and Sybil Attack -- 5.4 The Impact of Trust Management System on VANET -- 6 Conclusion -- References -- A Dummy Query-Based User Privacy Protection Scheme in Named Data Networking -- 1 Introduction -- 2 Scenario and Problem Analysis -- 2.1 Attack Model -- 2.2 Problem Description -- 3 Principles of Constructing Dummy Query Set -- 3.1 Privacy Metric.
3.2 Privacy Constraints -- 3.3 Bandwidth Constraint -- 3.4 Distributional Constraint -- 3.5 Problem Modeling -- 4 Dummy Query Set Selection Algorithms -- 4.1 Dummy Query Distribution Assurance Algorithm -- 4.2 Dummy Query Filtering Algorithm -- 4.3 Algorithm Time Complexity Analysis -- 4.4 Security Analysis -- 5 Experiments and Simulations -- 5.1 Experimental Scenario -- 5.2 Experimental Result -- 6 Conclusion -- References -- Analytic Hierarchy Process Based Cell Reselection for Inactive Users in LEO Satellite Networks -- 1 Introduction -- 2 System Model -- 2.1 LEO Satellite Communication System -- 2.2 Received Signal Strength -- 2.3 Remaining Service Time -- 3 AHP Based Cell Reselection Strategy -- 3.1 Multiple-target Cell Reselection Process -- 3.2 AHP-Based Weights Decision Process -- 4 Simulation and Analysis -- 4.1 Simulation Scenarios and Parameter Settings -- 4.2 Simulation Results Analysis -- 5 Conclusion -- References -- Resource Allocation and MEAR Maximization for RIS-Aided eMBB/URLLC Traffic Multiplexing -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 3 Solution Approach -- 3.1 eMBB Resource Allocation -- 3.2 URLLC Resource Allocation -- 4 Computational Complexity Analysis -- 5 Simulation Results and Discussions -- 5.1 Simulation Setup -- 5.2 Simulation Results -- 6 Conclusion -- References -- Deep Learning Applications and Optimization -- Enhancing Network Intrusion Detection with Deep Oversampling and Convolutional Autoencoder for Imbalanced Dataset -- 1 Introduction -- 2 Related Work -- 2.1 Sampling Methods for Imbalanced Data -- 2.2 Deep Learning Techniques for Imbalanced Data -- 3 Proposed Method -- 3.1 DCAES Based Minority Class Generating -- 3.2 DBSCAN Based Undersampling -- 3.3 Tomek Links Based Undersampling -- 3.4 Classification and Detection -- 4 Experiments and Evaluations.
4.1 Dataset Description -- 4.2 Data Preprocessing -- 4.3 Data Balancing Process -- 4.4 Evaluation Metric -- 4.5 Analysis of Results -- 5 Conclusion -- References -- Analyzing Average Age of Information in CRDSA Protocol with Access-Banned Policy -- 1 Introduction -- 2 System Model -- 3 Age-Critical Access-Banned Policy -- 3.1 CRDSA Protocol -- 3.2 Access-Banned Policy -- 3.3 ASP and AAoI Performance -- 4 Simulation Results and Analysis -- 5 Conclusion -- References -- VEC System for Vehicle-to-Vehicle Communication Task Offloading Strategy Research -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Signal Strength Model -- 3.2 Delay Model -- 3.3 Offloading Model -- 4 Solution -- 4.1 Vehicle Screening Algorithm -- 4.2 Value Iteration Algorithm -- 5 Simulation and Analysis -- 6 Conclusions -- References -- Research on Synchronization Technology of Dynamic Environment Signals in the Laser Measurement and Control System -- 1 Introduction -- 1.1 Research Background -- 1.2 Main Contributions -- 1.3 Organization -- 2 System Model and Basic Principle -- 3 Performance Analysis -- 3.1 PPM Modulation -- 3.2 Sliding Correlation Acquisition Algorithm -- 3.3 Variable-Parameter Digital Delay Lock Loop -- 4 Simulation Results and Analysis -- 4.1 Capture Algorithm -- 4.2 Tracking Algorithm -- 4.3 Distance Measurement Simulation -- 5 Conclusion -- References -- A Generic Solution for IoT Ontology Model Based on OCF Standard -- 1 Introduction -- 2 Related Work -- 2.1 Ontology of the IoT -- 2.2 OCF Framework -- 3 Thing Specification Model -- 3.1 Thing Model -- 3.2 Static Model -- 3.3 Dynamic Model -- 3.4 Collection Model -- 4 System Implementation -- 4.1 Ontology Mapping -- 4.2 Action Interaction -- 4.3 Event Interaction -- 4.4 Service Linkage -- 5 Ontology-Based Model Evaluation -- 5.1 Ontology Reuse -- 5.2 Language Completeness -- 5.3 Ontology Extensibility.
5.4 Comprehensive Assessment of Model.
Titolo autorizzato: Communications and Networking  Visualizza cluster
ISBN: 3-031-67162-7
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910878994403321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series