Maximize the resource utilization efficiency and guarantee the quality of service(QoS)of users by selecting the network are the key issues for heterogeneous network operators,but the resources occupied by users in dif...
详细信息
Maximize the resource utilization efficiency and guarantee the quality of service(QoS)of users by selecting the network are the key issues for heterogeneous network operators,but the resources occupied by users in different networks cannot be compared *** paper proposes a network selection algorithm for heterogeneous ***,the concept of equivalent bandwidth is proposed,through which the actual resources occupied by users with certain QoS requirements in different networks can be compared *** the concept of network applicability is defined to express the abilities of networks to support different *** proposed network selection algorithm first evaluates whether the network has enough equivalent bandwidth required by the user and then prioritizes network with poor applicability to avoid the situation that there are still residual resources in entire network,but advanced services can not be *** simulation results show that the proposed algorithm obtained better performance than the baselines in terms of reducing call blocking probability and improving network resource utilization efficiency.
Quantum key distribution (QKD) allows the transmission of keys with unconditional security. Nevertheless, a discrepancy remains between the theoretical framework and the practical implementation, as device imperfectio...
详细信息
Various distributed learning approaches emerge for enabling ubiquitous intelligence in Internet of Things (IoT) without sacrificing data privacy. To improve communication efficiency in frequent knowledge exchange over...
详细信息
ISBN:
(数字)9798350368369
ISBN:
(纸本)9798350368376
Various distributed learning approaches emerge for enabling ubiquitous intelligence in Internet of Things (IoT) without sacrificing data privacy. To improve communication efficiency in frequent knowledge exchange over resource-constrained IoT, different techniques for client selection have been proposed. However, the intractable scalability issues remain to be addressed in massive IoT, since highly-coupled co-channel interference adds exponential complexity to combinatorial client selection. In this work, we develop a client selection framework highly-scalable to large-scale networks with thousands of devices, which exploits the inherent graph structure derived from knowledge exchange and co-channel interference. Specifically, we first model a client selection problem for jointly optimizing learning performance and system cost under volatile network conditions. The formulated problem is encoded into a node classification problem by a directed graph. Subsequently, a general yet simple solver is designed based on graph neural networks, which selects clients by classifying node status with recursive neighborhood aggregation of node representations. Finally, extensive experimental results demonstrate that the proposed approach can perform on par with state-of-the-art methods, while scaling to networks whose size is orders of magnitude larger than they can handle.
Robots equipped with multi-modal sensing capabilities play an important role in the Internet of Robotic Things (IoRT), especially in emergency rescue. However, existing rescue robots pose challenges for human operator...
详细信息
Quantum digital signatures (QDS), based on the principles of quantum mechanics, provide information-theoretic security, ensuring the integrity, authenticity, and non-repudiation of data transmission. With present QDS ...
详细信息
Quantum key distribution (QKD) serves as a cornerstone of secure quantum communication, providing unconditional security grounded in quantum mechanics. While trusted-node networks have facilitated early QKD deployment...
详细信息
The identity vector(i-vector) approach has been the state-of-the-art for text-independent speaker recognition, both identification and verification in recent years. An i-vector is a low-dimensional vector in the socal...
详细信息
The identity vector(i-vector) approach has been the state-of-the-art for text-independent speaker recognition, both identification and verification in recent years. An i-vector is a low-dimensional vector in the socalled total variability space represented with a thin and tall rectangular matrix. This paper introduces a novel algorithm to improve the computational and memory requirements for the application. In our method, the series of symmetric matrices can be represented by diagonal expression,sharing the same dictionary, which to some extent is analogous to eigen decomposition, and we name this algorithm Eigen decomposition like factorization(EDLF). Similar algorithms are listed for comparison, in the same condition,our method shows no disadvantages in identification accuracy.
The paper investigates the hidden relationships among speech samples by applying graph tools. Specifically, we first estimate an applicable graph topology for unstructured speech signals, which can map speech signals ...
详细信息
The paper investigates the hidden relationships among speech samples by applying graph tools. Specifically, we first estimate an applicable graph topology for unstructured speech signals, which can map speech signals into the vertex domain successfully and construct as Speech graph signals(SGSs). On the basis, we define a new graph Fourier transform for SGSs, which can investigate its related graph Fourier analysis. Moreover,we propose a new Graph structure spectral subtraction(GSSS) method for speech enhancement under different noisy environments. Simulation results show that the performance of the GSSS method can be significantly improved than the classical Basic spectral subtraction(BSS) method in terms of the average Segmental signal-tonoise ratio(SSNR), Perceptual evaluation of speech quality(PESQ) and the computational complexity.
A quality of service(QoS) guaranteed cross-layer resource allocation algorithm with physical layer, medium access control(MAC) layer and call admission control(CAC) considered simultaneously is proposed for the ...
详细信息
A quality of service(QoS) guaranteed cross-layer resource allocation algorithm with physical layer, medium access control(MAC) layer and call admission control(CAC) considered simultaneously is proposed for the full IP orthogonal frequency division multiple access(OFDMA) communication system, which can ensure the quality of multimedia services in full IP *** algorithm converts the physical layer resources such as subcarriers, transmission power, and the QoS metrics into equivalent bandwidth which can be distributed by the base station in all three layers. By this means, the QoS requirements in terms of bit error rate(BER), transmission delay and dropping probability can be guaranteed by the cross-layer optimal equivalent bandwidth allocation. The numerical results show that the proposed algorithm has higher spectrum efficiency compared to the existing systems.
The growth of network coding opportunities is considered the unique optimization goal by most current network coding based routing algorithms for wireless mesh networks. This usually results in flows aggregation probl...
详细信息
The growth of network coding opportunities is considered the unique optimization goal by most current network coding based routing algorithms for wireless mesh networks. This usually results in flows aggregation problem in areas with coding opportunities, and degrades the network performance. This paper proposes a Load balanced coding aware multipath routing(LCMR)for wireless mesh networks. To facilitate the evaluation of discovered multiple paths and the tradeoffs between coding opportunity and load balancing, a novel routing metric, Load balanced coding aware routing metric(LCRM) is presented, which considers the load degree of nodes when detects coding opportunities. LCMR could spread traffic over multipath to further balance load. Simulation results demonstrate that LCMR could evenly spread the traffic over the network with increasing network throughput in a heavy load at the expense of some coding opportunities.
暂无评论