With the development of 5G, the distribution of base stations tends to be dense. Compared with the traditional network architecture, Cloud Radio Access Networks(C-RAN) architecture can satisfy the current requirements...
详细信息
ISBN:
(纸本)9783903176362
With the development of 5G, the distribution of base stations tends to be dense. Compared with the traditional network architecture, Cloud Radio Access Networks(C-RAN) architecture can satisfy the current requirements of high bandwidth, low latency and low energy consumption. Currently most energy-saving scheme for C-RAN is complex with time cost computing, which may not be suitable for large-scale region. For the problem of energy-efficient resource allocation for dense distribution of Remote Radio Heads(RRHs) in C-RAN, we use K-means clustering algorithm to simplify the network topology and reduce the complexity under a distributed manner. Aiming at the problem of network resource allocation in C-RAN, we use A3C algorithm to allocate network transmission power, and compare the total energy consumption, system energy efficiency and Signal to Interference plus Noise Ratio(SINR) value of terminal devices through simulation experiments. The experimental results show that in the same network environment, A3C algorithm has the highest energy efficiency, and can keep the SINR value of terminal devices in a reasonable range, which proves the effectiveness of A3C algorithm.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Underwater sensor network is a promising networking technique. Several challenges such as dynamic structure, high rates of energy consumption, long propagation delay, and narrow bandwidth are being faced by underwater...
详细信息
ISBN:
(纸本)9781450377515
Underwater sensor network is a promising networking technique. Several challenges such as dynamic structure, high rates of energy consumption, long propagation delay, and narrow bandwidth are being faced by underwater sensor networks. The traditional routing approaches never give reliable and expected performance. This paper presents a novel routing algorithm to tackle acoustic transmission problems in underwater. The proposed algorithm is based on cuckoo search and ant colony optimization.
In the distributed big data real-time computing platform, the task scheduling has significant impact on the real-time performance. In this paper, we first reveal the inefficiency of the conventional real-time streamin...
详细信息
Blockchain technology is becoming more and more popular, but performance problems have always troubled it, especially the scale of distributed networks is limited. Like Practical Byzantine consensus algorithm (PBFT), ...
详细信息
Blockchain technology is becoming more and more popular, but performance problems have always troubled it, especially the scale of distributed networks is limited. Like Practical Byzantine consensus algorithm (PBFT), the main bottlenecks are concentrated in the scope of consensus too small, and the communication is too high. In order to implement PBFT in large-scale systems such as large-scale IoT ecosystems and blockchains, this paper proposes a reputation-based two-layer improved PBFT consensus computing model DT-PBFT. In order to better combine with the large -scale Internet of Things ecosystem, we give each node regional location, communication capacity, computing power and other related attributes to each involvement, so that Client nodes can input node attributes as parameters into the reputation calculation algorithm, to select the master node of each layer in the double-layer consensus model. Determining the master node through reputation improves the credibility of the consensus algorithm. At the same time, the DTPBFT cancels the Pre-Prepare stage, reducing communication complexity. Finally, this paper transforms the existing PBFT algorithm on the Fabric platform to implement the DT-PBFT consensus algorithm and compares its performance with traditional PBFT, proving that DT-PBFT has the best balance and excellent comprehensive performance in large-scale IoT application scenarios.
Recently, along with the development of information technology, blockchain technology has been developing all over the world. On the basis of blockchain technology, it will be possible to develop the digital economy, ...
详细信息
Recently, along with the development of information technology, blockchain technology has been developing all over the world. On the basis of blockchain technology, it will be possible to develop the digital economy, ensure information security, and increase reliability in data exchange. Due to the high potential of blockchain technology, it has led to the study of its wide application in various fields. These processes have led to the creation of blockchain-based systems for various purposes. Some blockchain mechanisms can also be used to increase data reliability in information systems that provide services in computer networks. However, at the same time, most of the blockchain-based systems have several disadvantages related to their performance and security. To solve these shortcomings, it is necessary to improve the security of blockchain-based systems. The main component of any blockchain-based system is its important consensus algorithm, which in many ways makes it possible to ensure the authenticity and security of information. Consensus algorithms serve to prove the authenticity of executed transactions. The application of consensus algorithms to the blockchain technology, depending on the functional task, allows to increase the reliability of the data. In this article, the effectiveness of using consensus algorithms based on blockchain mechanisms is studied.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Data mining based on Twitter data can be used to analyses and draw meaningful information from the tweets. In order to convey your innermost thoughts and feelings about life, you might use the sentiment keyword. Senti...
详细信息
ISBN:
(纸本)9781665454025
Data mining based on Twitter data can be used to analyses and draw meaningful information from the tweets. In order to convey your innermost thoughts and feelings about life, you might use the sentiment keyword. Sentiment analysis is carried out to provide insights from online conversations about a company’s products, brands, and services. Identifying and classifying emotions in written texts is possible using advanced machine learning algorithms. Sentiment analysis has its impact in the field of the medical industry. Based on the tweets, the disease can be categorized and predicted. People can be made aware of the risk, and it provides an opportunity for early diagnosis. This article discusses several machine learning and natural language processing algorithms in the field of sentiment analysis based on Twitter tweets. The various existing systems are discussed in detail and their impact on detection and prediction of diabetes is highlighted.
In recent years, with the rapid development of cloud computing industry, big data processing technology is also maturing. At the same time, the scale of domestic mobile Internet market is constantly expanding, the num...
详细信息
In recent years, with the rapid development of cloud computing industry, big data processing technology is also maturing. At the same time, the scale of domestic mobile Internet market is constantly expanding, the number of users has exceeded 500 million, and it has brought a huge amount of mobile Internet traffic data. Private cloud storage has become the best choice to solve the current enterprise security storage needs because of the unsafe factors such as data leakage, loss and storage instability in public cloud storage. It is an implementation of private cloud computing. Compared with public cloud, it has higher security and lower investment cost. From the current situation of mobile Internet, on the one hand, the surge of mobile data traffic has brought huge operating pressure to operators, which requires them to invest more funds in network construction and upgrading. On the other hand, due to the growth of mobile data services, traditional voice messaging and other services have declined. The cloud storage system can provide massive storage capacity to solve the problem of big data storage in the smart grid. With the development of cloud computing technology, cloud security becomes more and more critical. In the cloud computing environment, users lose control over the data and computing placed in the cloud server, and are uncertain whether the data is protected and whether the computing task is executed correctly. Therefore, in the smart grid cloud storage system, the problem of data security is an urgent problem to be solved.
暂无评论