In this paper,we analyze a hybrid Heterogeneous Cellular Network(HCNet)framework by deploying millimeter Wave(mmWave)small cells with coexisting traditional sub-6GHz macro cells to achieve improved coverage and high d...
详细信息
In this paper,we analyze a hybrid Heterogeneous Cellular Network(HCNet)framework by deploying millimeter Wave(mmWave)small cells with coexisting traditional sub-6GHz macro cells to achieve improved coverage and high data *** consider randomly-deployed macro base stations throughout the network whereas mmWave Small Base Stations(SBSs)are deployed in the areas with high User Equipment(UE)*** user centric deployment of mmWave SBSs inevitably incurs correlation between UE and *** a realistic scenario where the UEs are distributed according to Poisson cluster process and directional beamforming with line-of-sight and non-line-of-sight transmissions is adopted for mmWave *** using tools from stochastic geometry,we develop an analytical framework to analyze various performance metrics in the downlink hybrid HCNets under biased received power *** UE clustering we considered Thomas cluster process and derive expressions for the association probability,coverage probability,area spectral efficiency,and energy *** also provide Monte Carlo simulation results to validate the accuracy of the derived ***,we analyze the impact of mmWave operating frequency,antenna gain,small cell biasing,and BSs density to get useful engineering insights into the performance of hybrid mmWave *** results show that network performance is significantly improved by deploying millimeter wave SBS instead of microwave BS in hot spots.
We explore the reasons for the poorer feature extraction ability of vanilla convolution and discover that there mainly exist three key factors that restrict its representation capability, i.e., regular sampling, stati...
详细信息
Real-world images often encompass embedded texts that adhere to disparate disciplines like business, education, and amusement, to name a few. Such images are graphically rich in terms of font attributes, color distrib...
详细信息
We propose a new method called the Metropolis-adjusted Mirror Langevin algorithm for approximate sampling from distributions whose support is a compact and convex set. This algorithm adds an accept-reject filter to th...
详细信息
Nowadays, the rapid diffusion of fake news poses a significant problem, as it can spread misinformation and confusion. This paper aims to develop an advanced machine-learning solution for detecting fake news articles....
详细信息
VGIS (Virtual Geographic Information System) Platform is a unified oilfield operations management platform based on MaaS (Management as a Service) that integrates advanced technologies such as AIoT (Artificial Intelli...
详细信息
A three-phase three-wire LCL grid-connected inverter is usually used as an interface between renewable-energy sources and grid. However, grid voltage is always distorted and results in grid-current distortion when the...
详细信息
Pulsed current cathodic protection(PCCP) could be more effective than direct current cathodic protection(DCCP)for mitigating corrosion in buried structures in the oil and gas industries if appropriate pulsed parameter...
详细信息
Pulsed current cathodic protection(PCCP) could be more effective than direct current cathodic protection(DCCP)for mitigating corrosion in buried structures in the oil and gas industries if appropriate pulsed parameters are chosen. The purpose of this research is to present the corrosion prevention mechanism of the PCCP technique by taking into account the effects of duty cycle as well as frequency, modeling the relationships between pulse parameters(frequency and duty cycle) and system outputs(corrosion rate, protective current and pipe-to-soil potential) and finally identifying the most effective protection conditions over a wide range of frequency(2–10 kHz) and duty cycle(25%-75%). For this, pipe-to-soil potential, pH, current and power consumption, corrosion rate, surface deposits and investigation of pitting corrosion were taken into account. To model the input-output relationship in the PCCP method, a data-driven machine learning approach was used by training an artificial neural network(ANN). The results revealed that the PCCP system could yield the best protection conditions at 10 kHz frequency and 50% duty cycle, resulting in the longest protection length with the lowest corrosion rate at a consumption current 0.3 time that of the DCCP method. In the frequency range of 6–10 kHz and duty cycles of 50%-75%, SEM images indicated a uniform distribution of calcite deposits and no pits on cathode surface.
Several significant research studies have been done in distributed applications, database management systems, and information collecting in computerscience concerning data mining and processing for wireless sensor ne...
详细信息
Cyber-attacks pose a significant challenge to the security of Internet of Things(IoT)sensor networks,necessitating the development of robust countermeasures tailored to their unique characteristics and *** prevention ...
详细信息
Cyber-attacks pose a significant challenge to the security of Internet of Things(IoT)sensor networks,necessitating the development of robust countermeasures tailored to their unique characteristics and *** prevention and detection techniques have been proposed to mitigate these *** this paper,we propose an integrated security framework using blockchain and Machine Learning(ML)to protect IoT sensor *** framework consists of two modules:a blockchain prevention module and an ML detection *** blockchain prevention module has two lightweight mechanisms:identity management and trust *** management employs a lightweight Smart Contract(SC)to manage node registration and authentication,ensuring that unauthorized entities are prohibited from engaging in any tasks,while trust management uses a lightweight SC that is responsible for maintaining trust and credibility between sensor nodes throughout the network’s lifetime and tracking historical node *** and transaction validation are achieved through a Verifiable Byzantine Fault Tolerance(VBFT)mechanism to ensure network reliability and *** ML detection module utilizes the Light Gradient Boosting Machine(LightGBM)algorithm to classify malicious nodes and notify the blockchain network if it must make decisions to mitigate their *** investigate the performance of several off-the-shelf ML algorithms,including Logistic Regression,Complement Naive Bayes,Nearest Centroid,and Stacking,using the WSN-DS *** is selected following a detailed comparative analysis conducted using accuracy,precision,recall,F1-score,processing time,training time,prediction time,computational complexity,and Matthews Correlation Coefficient(MCC)evaluation metrics.
暂无评论