224 results on '"Wuxiong Zhang"'
Search Results
102. Simulation and Performance Analysis of the IEEE1588 PTP with Kalman Filtering in Multi-hop Wireless Sensor Networks.
- Author
-
Baoqiang Lv, Yiwen Huang, Taihua Li, Xuewu Dai, Muxi He, Wuxiong Zhang, and Yang Yang 0001
- Published
- 2014
- Full Text
- View/download PDF
103. A Trust-Based Security System for Data Collection in Smart City
- Author
-
Yunliang Chen, Wuxiong Zhang, Wei Chen, Weidong Fang, and Ningning Cui
- Subjects
Routing protocol ,Scheme (programming language) ,Data collection ,Computer science ,Node (networking) ,020208 electrical & electronic engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Computer Science Applications ,Control and Systems Engineering ,Smart city ,0202 electrical engineering, electronic engineering, information engineering ,Trust management (information system) ,Electrical and Electronic Engineering ,computer ,Wireless sensor network ,Information Systems ,computer.programming_language ,Efficient energy use - Abstract
The authenticity and integrity of sensed data in the data collection stage is a very critical aspect for the smart city industrial environment. They impact the accuracy of data analysis and the objectivity of making decisions. However, how to identify attack behaviors from environmental interference and establish a secure route to transmit data for resource-constrained terminals are challenging problems. To address these problems, in this article, we propose a trust-based security system (TSS). In TSS, we first design a trust model using binomial distribution for calculating the node's trust value and a third-party recommendation scheme for improving the objectivity of trust value. Then, we propose a trust management scheme for preventing the on–off attack. After that, we design a secure routing protocol, which is used to balance the security, transmission performance, and energy efficiency. Finally, the analytical results of the TSS are evaluated with extensive simulation experiment.
- Published
- 2021
- Full Text
- View/download PDF
104. Multi-Hop Connectivity Probability in Infrastructure-Based Vehicular Networks.
- Author
-
Wuxiong Zhang, Yu Chen 0006, Yang Yang 0001, Xiangyang Wang, Yu Zhang, Xuemin Hong, and Guoqiang Mao
- Published
- 2012
- Full Text
- View/download PDF
105. Analysis of Access and Connectivity Probabilities in Vehicular Relay Networks.
- Author
-
Seh Chun Ng, Wuxiong Zhang, Yu Zhang, Yang Yang 0001, and Guoqiang Mao
- Published
- 2011
- Full Text
- View/download PDF
106. A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution.
- Author
-
Weidong Fang, Wuxiong Zhang, Yang Yang 0001, Yang Liu 0047, and Wei Chen 0036
- Published
- 2017
- Full Text
- View/download PDF
107. C-EEUC: a Cluster Routing Protocol for Coal Mine Wireless Sensor Network Based on Fog Computing and 5G
- Author
-
Bobin Zhang, Wuxiong Zhang, Xiao Yang, Wei Chen, Xiaorong Jiang, and Weidong Fang
- Subjects
Routing protocol ,Computer Networks and Communications ,business.industry ,Computer science ,Node (networking) ,020206 networking & telecommunications ,02 engineering and technology ,Energy consumption ,Transmission (telecommunications) ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Cluster analysis ,Wireless sensor network ,Software ,5G ,Information Systems ,Computer network ,Efficient energy use - Abstract
In underground coal mine, the routing protocol in Wireless Sensor Network (WSN) based on fog computing can effectively achieve combination the monitoring task with the computing task, and provide the correct data forwarding path to meet the requirements of the aggregation and transmission of sensed information. However, the energy efficiency is still taken into account, especially, the unbalance of energy consumption. 5G is a technical system of high frequency and low frequency mixing, with characteristics of large capacity, low energy consumption and low cost. With the formal freeze on 5G NSA standards, 5G networks are one step closer to our lives. In this paper, a centralized non-uniform clustering routing protocol C-EEUC based on the residual energy and communication cost. The C-EEUC protocol considers all nodes as candidate cluster heads in the clustering stage and defines a weight matrix P. The value of the matrix elements takes into account the residual energy of nodes and the cost of communication between nodes and cluster heads, selected as the basis for the cluster head. When selecting a cluster head, each time a node with the largest weight is selected from a set of candidate cluster heads, other candidate cluster heads within the competition range abandon competition, and then updates the candidate cluster head set. Experimental results show that the protocol optimized in this paper can effectively extend the network life cycle.
- Published
- 2019
- Full Text
- View/download PDF
108. RAMTEL: Robust Acoustic Motion Tracking Using Extreme Learning Machine for Smart Cities
- Author
-
Weidong Fang, Fei Qin, Yang Yang, Yang Liu, Xuewu Dai, and Wuxiong Zhang
- Subjects
Computer Networks and Communications ,Computer science ,Real-time computing ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Computer Science Applications ,0203 mechanical engineering ,Match moving ,Hardware and Architecture ,Smart city ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Android (operating system) ,Mobile device ,Multipath propagation ,Information Systems ,Extreme learning machine - Abstract
Motion tracking is attractive in what concerns a smart city environment, where citizens have to interact with Internet of Things (IoT) infrastructures spread all around one particular city. Motion tracking is important for smart services and location-based services in smart cities, since it provides natural ways for users to interact with the IoT infrastructures, such as the ability to recognize of a wide range of hand motion in real-time. Compared with dedicated hardware devices, ubiquitous devices with reliable speakers and microphones can be developed to achieve cheap acoustic-based motion tracking, which is appropriate for low-power and low-cost IoT applications. However, for complex urban environments, it is very difficult for acoustic-based methods to achieve accurate motion tracking due to multipath fading and limited sampling rate at mobile devices. In this paper, a new parameter called multipath dispersion vector (MDV) is proposed to estimate and mitigate the impact of multipath fading on received signals using extreme learning machine. Based on MDV, a robust acoustic motion tracking (RAMTEL) method is proposed to calculate the moving distance based on the phase change of acoustic signals, and track the corresponding motion in 2-D plane by using multiple speakers. The method is then proposed and implemented on standard Android smartphones. Experiment results show, without any specialized hardware, RAMTEL can achieve an impressive millimeter-level accuracy for localization and motion tracking applications in multipath fading environments. Specifically, the measurement errors are less than 2 and 4 mm in 1-D and 2-D scenarios, respectively.
- Published
- 2019
- Full Text
- View/download PDF
109. TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing
- Author
-
Wei Chen, Weidong Fang, Yang Liu, Wuxiong Zhang, and Chaogang Tang
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Survivability ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Energy consumption ,law.invention ,0203 mechanical engineering ,Fog computing ,Relay ,law ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,Information Systems ,Computer network - Abstract
Based on fog computer, an industrial wireless sensor network (F-IWSN) is a novel wireless sensor network in the industry. It not only can more efficiently reduce information transmission latency, but also can more beneficially achieve the real-time control and the rapid resource scheduling. However, similar to other distributed networks, it also faces enormous security challenges, especially those internal attacks. The differences from those traditional security schemes are that, one is the trade-off between security, transmission performance and energy consumption to meet the requirements of information convergence and control, the other constructs a multi-dimensional selective forwarding scheme to achieve the real time transmission. In this paper, we propose a Gaussian distribution-based comprehensive trust management system (GDTMS) for F-IWSN. Furthermore, in its trust decision, the grey decision making is introduced to achieve the trade-off between security, transmission performance and energy consumption. The proposed trade-off can effectively select the secure and robust relay node, namely, a trust management-based secure routing scheme. In addition, the proposed schemes are also applicable to defending against bad mouthing attacks. Simulation results show that, the comprehensive performance of GDTMS is better than other similar algorithms. It can effectively prevent the appearance of network holes, and balance the network load, promote the survivability of the network.
- Published
- 2019
- Full Text
- View/download PDF
110. Link Quality Estimation in Industrial Temporal Fading Channel With Augmented Kalman Filter
- Author
-
Yang Yang, Xuewu Dai, Jinliang Ding, Qilong Zhang, Fei Qin, and Wuxiong Zhang
- Subjects
Wireless network ,business.industry ,Computer science ,020208 electrical & electronic engineering ,Real-time computing ,Estimator ,Context (language use) ,02 engineering and technology ,Kalman filter ,Covariance ,Computer Science Applications ,Control and Systems Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Fading ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,Impulse response ,Multipath propagation ,Information Systems - Abstract
Wireless networks attract increasing interests from a variety of industry communities. However, the wide applications of wireless industrial networks are still challenged by unreliable services due to severe multipath fading effects. Such effects are not only caused by massive metal surfaces but also moving operators and logistical vehicles, which will lead to temporal fading effects. A three-layer impulse response framework is proposed to characterize such effects, in which both the specular and scattered components vary with the spacial movement of nearby objects. In this context, a received signal strength indicator will be a noisy estimation only on the specular power and fail to describe the link quality accurately without the aid of scattered power. Consequently, an augmented Kalman-filter-based link quality estimator has been designed to track both the specular and scattered power in the distribution parameter space with constant noise covariance matrices. Experiments from industrial sites show significantly increased accuracy.
- Published
- 2019
- Full Text
- View/download PDF
111. FETMS: Fast and Efficient Trust Management Scheme for Information-Centric Networking in Internet of Things
- Author
-
Weili Han, Joel J. P. C. Rodrigues, Ming Xu, Chunsheng Zhu, Wuxiong Zhang, and Weidong Fang
- Subjects
Scheme (programming language) ,General Computer Science ,Computer science ,Internet of Things ,Latency (audio) ,02 engineering and technology ,Computer security ,computer.software_genre ,01 natural sciences ,on-off attacks ,Information-centric networking ,0202 electrical engineering, electronic engineering, information engineering ,Trust management (information system) ,General Materials Science ,computer.programming_language ,Information-centric networking (ICN) ,business.industry ,Node (networking) ,cyber security ,010401 analytical chemistry ,General Engineering ,020206 networking & telecommunications ,0104 chemical sciences ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,trust management ,computer ,lcsh:TK1-9971 - Abstract
As an innovative networking paradigm in the Internet of Things, information-centric networking (ICN) has improved security than the traditional IP networks. However, it still faces a large number of security threats, especially those threats from internal attacks. The trust management technology is an effective approach for defending against internal attacks. In this paper, our contributions lie in our investigating the requirements of cybersecurity in ICN and analyzing the typical attack behaviors and defense schemes. Then, we propose a fast and efficient trust management scheme (FETMS) for defending against the on-off attack, which is an intelligent internal attack. The simulation results show that FETMS can efficiently detect and remove the malicious node in a short period of time; meanwhile, it can achieve lower latency and add its mobility.
- Published
- 2019
112. Non-Data Aided Rician Parameters Estimation in Temporal Fading Channel With 3 DoFs Gaussian Mixture Model
- Author
-
Fei Qin, Wuxiong Zhang, Xuewu Dai, Guobao Lu, Qilong Zhang, Fei Shen, and Jianbin Jiao
- Subjects
General Computer Science ,H600 ,Computer science ,Maximum likelihood ,maximum likelihood estimation ,02 engineering and technology ,non-data aided ,Rician fading ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,General Materials Science ,Fading ,Computer Science::Information Theory ,business.industry ,Estimation theory ,General Engineering ,020206 networking & telecommunications ,Mixture model ,Computer Science::Performance ,Gaussian mixture model ,Modulation ,Rician distribution ,020201 artificial intelligence & image processing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,Algorithm ,Communication channel - Abstract
Rician distribution has been widely utilized to describe wireless fading channel. In the non-stationary temporal fading channel like industrial scenarios, both the specular and scattered components of the multi-path fading channel will be time varying. As a result, the online estimation of Rician parameters is necessary to provide stable wireless service. The traditional estimation approaches of Rician parameters are designed for channel measurement usage and therefore have to work in the data-aided mode for online estimation with modulated I/Q samples. To solve this problem, some non-data-aided algorithms have been proposed in recent years, but only valid in specific scenarios. In this paper, we formulate the estimation of Rician parameters from modulated I/Q samples as a two-dimensional Gaussian mixture model to provide a general non-data-aided Rician parameter estimation method. By involving a priori information of modulation scheme and the motivation of optimized gradient searching, the independent parameters in the maximum likelihood estimation can be significantly decreased to three, which leads to fast convergence of the modified expectation-maximization algorithm with high accuracy. The combination of these modifications has been finally formulated as a Rician mixture model. The numerical results and field measurements illustrate the feasibility of this methodology.
- Published
- 2019
- Full Text
- View/download PDF
113. Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network
- Author
-
Wei Chen, Weidong Fang, Wuxiong Zhang, Xiaohong Ji, Qianqian Zhao, and Biruk Assefa
- Subjects
Scheme (programming language) ,business.industry ,Computer science ,Computer Science Applications ,Biomaterials ,Data aggregator ,Mechanics of Materials ,Modeling and Simulation ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,computer ,Computer network ,computer.programming_language - Published
- 2019
- Full Text
- View/download PDF
114. The ARMv8 simulator.
- Author
-
Tao Jiang 0010, Lele Zhang, Rui Hou 0001, Yi Zhang 0037, Qianlong Zhang, Lin Chai, Jing Han 0011, Wuxiong Zhang, Cong Wang, and Lixin Zhang 0002
- Published
- 2013
- Full Text
- View/download PDF
115. PDTM: Poisson Distribution-based Trust Model for Web of Things
- Author
-
Wuxiong Zhang, Li Yi, Weiwei Gao, Wei Chen, and Weidong Fang
- Subjects
Network security ,business.industry ,Computer science ,media_common.quotation_subject ,Poisson distribution ,Computer security ,computer.software_genre ,symbols.namesake ,Web of Things ,Terminal (electronics) ,Reputation system ,Sensor node ,symbols ,Trust management (information system) ,business ,computer ,Reputation ,media_common - Abstract
Web of things (WoT) are inclined to suffer from internal attacks, which are from compromised nodes. Due to resource-constraint of WoT, the traditional security methods cannot be deployed. One of the most appropriate protection mechanisms to resist internal attacks is the trust management system. For the sake of evaluate the performance of WoT reasonably and appropriately, we improve the Beta-based reputation system, and propose a Poisson Distribution-based trust model (PDTM) in this paper. In view of evaluating a sensor node (or terminal) behaviors, its reputation and trust are represented by the Poisson distribution. PDTM is used to look for reliable nodes to transmit data and weaken malicious attacks within WoTs. The simulation results indicate that the PDTM can resist internal attack effectively, in order to strengthen the network security.
- Published
- 2021
- Full Text
- View/download PDF
116. Priority-based Distributed Queuing Random Access Mechanism for mMTC/uRLLC Terminals Coexistence
- Author
-
Chen Yifan, Huiyue Yi, Wuxiong Zhang, and Guohui Wang
- Subjects
Optimization problem ,Computer simulation ,Computer science ,business.industry ,Particle swarm optimization ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Division (mathematics) ,Preamble ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Resource management ,business ,Selection (genetic algorithm) ,Random access ,Computer network - Abstract
For mMTC and uRLLC coexistence system, traditional random access techniques cannot meet the different requirements of the mixed traffic. To tackle this issue, in this paper, a novel priority based distributed queuing random access (PDQRA) mechanism is proposed for mMTC and uRLLC coexistence system. To meet the access delay requirement of uRLLC devices (UTDs), the preambles are divided into two groups. The first group is completely selected by partial UTDs, while the second group is shared by the mMTC devices (MTDs) and the rest of the UTDs. To evaluate the performance of the proposed mechanism, the access delay of devices is mathematically analyzed. Moreover, an optimization problem is formulated via jointly optimizing the preamble division ratio and selection probability of the preamble groups to minimize the access delay of MTDs while guaranteeing the delay requirement of the UTDs. Then, a low-complexity algorithm developed based on particle swarm optimization (PSO) is proposed to obtain the suboptimal solutions. Finally, numerical simulations are presented to verify the effectiveness of the proposed mechanism.
- Published
- 2021
- Full Text
- View/download PDF
117. MSCR: multidimensional secure clustered routing scheme in hierarchical wireless sensor networks
- Author
-
Wei Chen, Yepeng Ni, Yinxuan Yang, Jin Liu, Wuxiong Zhang, and Weidong Fang
- Subjects
Routing protocol ,Computer Networks and Communications ,Computer science ,Distributed computing ,Internet of Things ,lcsh:TK7800-8360 ,02 engineering and technology ,lcsh:Telecommunication ,Domain (software engineering) ,lcsh:TK5101-6720 ,0202 electrical engineering, electronic engineering, information engineering ,Trust management (information system) ,Node (networking) ,lcsh:Electronics ,020208 electrical & electronic engineering ,Security domain ,020206 networking & telecommunications ,Computer Science Applications ,Signal Processing ,Security ,Routing (electronic design automation) ,Wireless sensor network ,Trust management scheme ,Efficient energy use - Abstract
For hierarchical wireless sensor network (WSN), the clustered routing protocol can effectively deal with large-scale application requirements, thereby, how to efficiently elect the secure cluster heads becomes very critical. Unfortunately, many current studies only focus on improving security while neglecting energy efficiency and transmission performance. In this paper, a lightweight trust management scheme (LTMS) is proposed based on binomial distribution for defending against the internal attacks. Simultaneously, distance domain, energy domain, security domain and environment domain are considered and introduced to propose a multidimensional secure clustered routing (MSCR) scheme by using dynamic dimension weight in hierarchical WSNs. The simulation results show that LTMS can effectively prevent a malicious node from being elected as a cluster head, and MSCR can achieve a balance between security, transmission performance and energy efficiency under the requirements of environmental applications.
- Published
- 2021
- Full Text
- View/download PDF
118. Game-Based Trust in Complex Networks: Past, Present, and Future
- Author
-
Baoqing Li, Weidong Fang, Wuxiong Zhang, Weiwei Gao, and Li Yi
- Subjects
Multidisciplinary ,General Computer Science ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,QA75.5-76.95 ,Complex network ,Insider ,Microeconomics ,Bounded function ,Electronic computers. Computer science ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Game based ,Value (mathematics) ,Game theory - Abstract
As an efficient approach, the trust policy is implemented to defend against insider attacks in complex networks. However, the imperfection of trust relationships directly hinders the effort to quantitatively calculate trust value, especially in choosing a cooperative partner. Fortunately, the game theory is gradually concerned with addressing the above issue to further enhance security. In this paper, the game theory and the trust policy are reviewed briefly. Then, the research roadmap on game-based trust in complex networks is discussed and analysed deeply. Furthermore, some research directions in the near future are given. It is worth mentioning that our contributions not only describe the evolution of the game-based trust clearly but also suggest the trust mechanism based on the bounded rational game more suitable to uncertain information.
- Published
- 2021
119. BTDS: Bayesian‐based trust decision scheme for intelligent connected vehicles in VANETs
- Author
-
Zhiwei Gao, Weidong Fang, Wuxiong Zhang, Liu Yang, and Weiming Yang
- Subjects
Vehicular ad hoc network ,business.industry ,Computer science ,Bayesian probability ,Electrical and Electronic Engineering ,business ,Computer network ,Decision scheme - Published
- 2020
- Full Text
- View/download PDF
120. Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey
- Author
-
Wuxiong Zhang, Yinxuan Yang, Tao Pan, Yepeng Ni, Weidong Fang, and Wei Chen
- Subjects
Authentication ,Technology ,Computer Networks and Communications ,business.industry ,Computer science ,Big data ,Data_MISCELLANEOUS ,Cloud computing ,Information security ,TK5101-6720 ,Encryption ,Computer security ,computer.software_genre ,Sensor node ,Telecommunication ,Trust management (information system) ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,computer ,Information Systems - Abstract
As a key component of the information sensing and aggregating for big data, cloud computing, and Internet of Things (IoT), the information security in wireless sensor network (WSN) is critical. Due to constrained resources of sensor node, WSN is becoming a vulnerable target to many security attacks. Compared to external attacks, it is more difficult to defend against internal attacks. The former can be defended by using encryption and authentication schemes. However, this is invalid for the latter, which can obtain all keys of the network. The studies have proved that the trust management technology is one of effective approaches for detecting and defending against internal attacks. Hence, it is necessary to investigate and review the attack and defense with trust management. In this paper, the state-of-the-art trust management schemes are deeply investigated for WSN. Moreover, their advantages and disadvantages are symmetrically compared and analyzed in defending against internal attacks. The future directions of trust management are further provided. Finally, the conclusions and prospects are given.
- Published
- 2020
121. Parallel Channel Sounder for MIMO Channel Measurements
- Author
-
Gui Yunsong, Haowen Wang, Xuefeng Yin, Cheng-Xiang Wang, Yang Yang, Yang Li, and Wuxiong Zhang
- Subjects
Dynamic range ,Computer science ,MIMO ,Bandwidth (signal processing) ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Computer Science Applications ,symbols.namesake ,Non-line-of-sight propagation ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,symbols ,Radio frequency ,Electrical and Electronic Engineering ,Doppler effect ,Multipath propagation ,Communication channel - Abstract
In order to address the challenges in MIMO channel measurement and modeling for 5G communication scenarios, a CDM-based parallel channel sounder is developed and evaluated in this article. Compared to traditional TDM-based channel sounders, our parallel channel sounder supports eight-by-eight (8 x 8) MIMO communications, 200 MHz RF bandwidth, 5 ns multipath time resolution, 36 dB dynamic range, and 2 kHz maximum Doppler shift at a speed of 350 km/h. To achieve these performance targets, a series of sophisticated technical solutions are proposed and analyzed to realize 32 ps synchronization accuracy, 51.36 Gb/s parallel data streaming, and high-precision calibration across multiple channels. Key functions and performance metrics are evaluated and verified in a microwave chamber. Real measurement results in a complex campus environment show that our CDM-based parallel channel sounder can capture more detailed channel characteristics, and therefore offer accurate PDPs and RMS delay spreads at both LoS and NLoS positions under MIMO communication scenarios.
- Published
- 2018
- Full Text
- View/download PDF
122. DEBTS: Delay Energy Balanced Task Scheduling in Homogeneous Fog Networks
- Author
-
Yu Chen, Jun Wang, Wuxiong Zhang, Shuang Zhao, Yang Yang, and Xiliang Luo
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Wireless ad hoc network ,020206 networking & telecommunications ,Lyapunov optimization ,02 engineering and technology ,Energy consumption ,Computer Science Applications ,Scheduling (computing) ,Hardware and Architecture ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,020201 artificial intelligence & image processing ,business ,Mobile device ,Wireless sensor network ,Information Systems ,Computer network ,Jitter - Abstract
Vehicular ad hoc networks, wireless sensor networks, Internet of Things, and mobile device-to-device communications can be modeled as different homogeneous fog networks, wherein similar terminals/things/devices/nodes are sharing their computation, communication, and storage resources in the neighborhood for achieving better system performance through effective collaborations. It is very desirable, but quite challenging, to simultaneously reduce service delay and energy consumption in such networks for delay-sensitive and energy-constraint applications, e.g., virtual reality and online 3-D gaming on mobile devices. In this paper, a cross-layer analytical framework is developed to formulate and study the balance between service delay and energy consumption. An effective control parameter ${V}$ is derived to characterize their tradeoff relationship during dynamic task scheduling processes in fog networks. Combining this analysis with Lyapunov optimization techniques, a novel delay energy balanced tasking scheduling (DEBTS) algorithm is proposed to minimize the overall energy consumption while reducing average service delay and delay jitter. It is proved that DEBTS can achieve the theoretical [ ${O(1/V), O(V)}$ ] tradeoff between these two performance metrics. Further, extensive simulation results show that DEBTS can offer much better delay-energy performance in task scheduling challenges. Specifically, for a typical ${V}$ value of ${4 \times 10^{4}}$ , DEBTS can save 26% and 29% more energy, and at the same time, reduce average service delay by 29% and 32%, than traditional random scheduling and least busy scheduling algorithms, respectively.
- Published
- 2018
- Full Text
- View/download PDF
123. A Mobile Cloud Based Scheduling Strategy for Industrial Internet of Things
- Author
-
Mingyang Hao, Xianglin Wei, Wei Chen, Shuo Xiao, Chaogang Tang, Wuxiong Zhang, and Weidong Fang
- Subjects
task scheduling ,General Computer Science ,Job shop scheduling ,business.industry ,Computer science ,mobile cloud computing ,Distributed computing ,energy-efficient ,General Engineering ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Industrial Internet of Things (IIoT) ,Scheduling (computing) ,Mobile cloud computing ,0202 electrical engineering, electronic engineering, information engineering ,Task analysis ,020201 artificial intelligence & image processing ,General Materials Science ,Mobile telephony ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,Edge computing ,Data transmission - Abstract
The Industrial Internet of Things is cited as the latest means for making manufacturing more flexible, cost effective, and responsive to changes in customer demands. In this paper, we present a mobile cloud based scheduling strategy for the industrial Internet of Things. Several computing paradigms, such as mobile cloud computing, fog computing, and edge computing can be integrated to the industrial Internet of Things, which allow to offload tasks to the cloud for execution. We model the task scheduling problem as an energy consumption optimization problem, while taking into account task dependency, data transmission, and some constraint conditions, such as response time deadline and cost, and further solve it by genetic algorithms. A series of simulation experiments are conducted to evaluate the performance of the algorithm and the results have shown that our proposal is more efficient than the baseline approach.
- Published
- 2018
124. A software defined open Wi-Fi platform
- Author
-
Wuxiong Zhang, Kai Kang, Dehua Liu, Hua Qian, and Zhenghang Zhu
- Subjects
Wi-Fi array ,Computer Networks and Communications ,business.industry ,Universal Software Radio Peripheral ,Wireless network ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020207 software engineering ,Wireless WAN ,02 engineering and technology ,020202 computer hardware & architecture ,law.invention ,Key distribution in wireless sensor networks ,Cognitive radio ,law ,0202 electrical engineering, electronic engineering, information engineering ,Wi-Fi ,Electrical and Electronic Engineering ,Radio resource management ,business ,Computer hardware ,Computer network - Abstract
Wireless local area network (WLAN) is an indivisible part of the next generation wireless system. In this paper, an open Wi-Fi platform is designed and developed with special consideration of real-time signal processing. Such system can help accelerate research and development of future wireless network, especially in the case of cellular/ Wi-Fi co-existing networks. This platform is based on the Intel general-purpose processor and the universal software radio peripheral (USRP) radio front end. The design including the physical layer implementations is purely software and is optimized for real-time signal processing on the general purpose processor. In the lab experiment, this platform supports baseband rate up to 700 Mbps with 2 transmitters in 80 MHz bandwidth. A cellular-Wi-Fi signaling interface between the Wi-Fi access point (AP) and the 5G core network is also developed and validated as an example for wireless resource allocation.
- Published
- 2017
- Full Text
- View/download PDF
125. Formation of core–shell network structural titanium–nitrogen alloys with different nitrogen contents
- Author
-
Yunyao Zhang, Wuxiong Zhang, Wenlong Huo, and Xueyu Wang
- Subjects
Materials science ,020502 materials ,Mechanical Engineering ,Metallurgy ,Titanium alloy ,Spark plasma sintering ,chemistry.chemical_element ,02 engineering and technology ,021001 nanoscience & nanotechnology ,Microstructure ,0205 materials engineering ,chemistry ,Mechanics of Materials ,General Materials Science ,Grain boundary ,Composite material ,0210 nano-technology ,Ductility ,Nitriding ,Solid solution ,Titanium - Abstract
High-dense titanium alloys with a 3D network core–shell structure of different N contents were synthesized successfully by means of spark plasma sintering of the nitrided titanium particles. The microstructure investigation shows that the core–shell structure with an obvious boundary within a grain is constructed in light of different solid solution levels of nitrogen in grain boundary and grain inner. The mechanical behaviors have been experimentally assessed through compressive testing. The compacts exhibit a much enhanced strength while retaining a reasonable ductility, which can be attributed to their novel core–shell structure. With an increasing N content as well as shell thickness, the strength increases and the ductility decreases, in accordance with the morphology observations.
- Published
- 2017
- Full Text
- View/download PDF
126. IONSS: Indirect Observation Node Selection Scheme in Trust Management for UAV Network
- Author
-
Wei Chen, Guoqing Jia, Wuxiong Zhang, Weiwei Gao, and Weidong Fang
- Subjects
Scheme (programming language) ,0209 industrial biotechnology ,Authentication ,business.industry ,Computer science ,02 engineering and technology ,Communications security ,Encryption ,020901 industrial engineering & automation ,Node (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Trust management (information system) ,020201 artificial intelligence & image processing ,business ,computer ,Energy (signal processing) ,Computer network ,computer.programming_language ,Efficient energy use - Abstract
As a three-dimensional distributed network, the UAV network is very critical for communication security. The current security approaches for UAV are mainly traditional secure schemes, such as encryption, authentication, and etc. Unfortunately, these secure schemes could not defend against the internal attacks. Simultaneously, as an effective technology to defend against the internal attacks, this is, a trust management technology, has security vulnerabilities in the third party recommendation. Nevertheless, there is also the risk of cyber holes in UAV network. In this paper, we propose an indirect observation node selection scheme (IONSS) to solve these issues. For all current indirect observation nodes, their energy levels are sorted to select the appropriate nodes. The Grey-decision calculation is performed and sorted with the attribute of these nodes, and the previous nodes are preferentially selected as the indirect observation nodes. The simulation results show that the balance between security and energy efficiency.
- Published
- 2019
- Full Text
- View/download PDF
127. Towards Security Joint Trust and Game Theory for Maximizing Utility: Challenges and Countermeasures
- Author
-
Wei Chen, Guoqing Jia, Libingyi Huang, Weidong Fang, and Wuxiong Zhang
- Subjects
game theory ,Computer science ,media_common.quotation_subject ,Energy (esotericism) ,0211 other engineering and technologies ,02 engineering and technology ,Review ,security ,lcsh:Chemical technology ,Biochemistry ,equilibrium ,Profit (economics) ,Analytical Chemistry ,0202 electrical engineering, electronic engineering, information engineering ,lcsh:TP1-1185 ,Electrical and Electronic Engineering ,Instrumentation ,media_common ,021110 strategic, defence & security studies ,Scope (project management) ,020206 networking & telecommunications ,trust ,Maximization ,Atomic and Molecular Physics, and Optics ,Risk analysis (engineering) ,utility ,Key (cryptography) ,Welfare ,Game theory - Abstract
The widespread application of networks is providing a better platform for the development of society and technology. With the expansion of the scope of network applications, many issues need to be solved. Among them, the maximization of utility and the improvement of security have attracted much attention. Many existing attacks mean the network faces security challenges. The concept of trust should be considered to address these security issues. Meanwhile, the utility of the network, including efficiency, profit, welfare, etc., are concerns that should be maximized. Over the past decade, the concepts of game and trust have been introduced to various types of networks. However, there is a lack of research effort on several key points in distributed networks, which are critical to the information transmission of distributed networks, such as expelling malicious nodes quickly and accurately and finding equilibrium between energy assumption and high transmission rate. The purpose of this paper is to give a holistic overview of existing research on trust and game theory in networks. We analyzed that network utility can be maximized in terms of effectiveness, profits, and security. Moreover, a possible research agenda is proposed to promote the application and development of game theory and trust for improving security and maximizing utility.
- Published
- 2019
128. 5G Green Mobile Communication Networks
- Author
-
Wuxiong Zhang and Xiaohu Ge
- Subjects
Telecommunications engineering ,business.industry ,Computer science ,Electrical engineering ,Mobile telephony ,business ,5G ,Efficient energy use - Published
- 2019
- Full Text
- View/download PDF
129. Energy Efficiency of 5G Wireless Communications
- Author
-
Xiaohu Ge and Wuxiong Zhang
- Subjects
Beamforming ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,MIMO ,Data_CODINGANDINFORMATIONTHEORY ,Spectral efficiency ,Hardware_GENERAL ,Electronic engineering ,Path loss ,Wireless ,Fading ,business ,5G ,Computer Science::Information Theory ,Efficient energy use - Abstract
The massive multi-input multi-output (MIMO) antennas and the millimeter wave communication technologies have been widely known as two key technologies for the fifth generation (5G) wireless communication systems [1, 2, 3, 4, 5, 6]. Compared with conventional MIMO antenna technology, massive MIMO can improve more than 10 times spectrum efficiency in wireless communication systems [7]. Moreover, the beamforming gain based on the massive MIMO antenna technology helps to overcome the path loss fading in millimeter wave channels.
- Published
- 2019
- Full Text
- View/download PDF
130. Cluster Routing Protocol for Coal Mine Wireless Sensor Network Based on 5G
- Author
-
Xiaorong Jiang, Weidong Fang, Xiao Yang, Wei Chen, and Wuxiong Zhang
- Subjects
Routing protocol ,Transmission (telecommunications) ,Computer science ,business.industry ,Node (networking) ,Energy consumption ,Cluster analysis ,business ,Wireless sensor network ,5G ,Efficient energy use ,Computer network - Abstract
In coal mine, the routing protocol in Wireless Sensor Network (WSN) based on fog computing can effectively achieve combination the monitoring task with the computing task, and provide the correct data forwarding path to meet the requirements of the aggregation and transmission of sensed information. However, the energy efficiency is still taken into account, especially, the unbalance of energy consumption. 5G is a technical system of high frequency and low frequency mixing, with characteristics of large capacity, low energy consumption and low cost. With the formal freeze on 5G NSA standards, 5G networks are one step closer to our lives. In this paper, a centralized non-uniform clustering routing protocol based on the residual energy and communication cost. The protocol considers all nodes as candidate cluster heads in the clustering stage and defines a weight matrix P. The value of the matrix elements takes into account the residual energy of nodes and the cost of communication between nodes and cluster heads, selected as the basis for the cluster head. When selecting a cluster head, each time a node with the largest weight is selected from a set of candidate cluster heads, other candidate cluster heads within the competition range abandon competition, and then updates the candidate cluster head set. Experimental results show that the protocol optimized in this paper can effectively extend the network life cycle.
- Published
- 2019
- Full Text
- View/download PDF
131. Energy Efficiency of 5G Multimedia Communications
- Author
-
Wuxiong Zhang and Xiaohu Ge
- Subjects
Information and Communications Technology ,business.industry ,Computer science ,Energy consumption ,Telecommunications ,business ,5G ,Efficient energy use - Abstract
As the rapid development of the information and communication technology (ICT), the energy consumption problem of ICT industry, which causes about 2% of worldwide CO2 emissions yearly and burdens the electrical bill of network operators [1], has drawn universal attention.
- Published
- 2019
- Full Text
- View/download PDF
132. Wireless Resource Management for Green Communications
- Author
-
Xiaohu Ge and Wuxiong Zhang
- Subjects
business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Electrical engineering ,Radiant energy ,Topology (electrical circuits) ,Transmitter power output ,Wireless resource management ,Base station ,Computer Science::Networking and Internet Architecture ,Wireless ,Antenna (radio) ,business ,Computer Science::Information Theory - Abstract
The time-frequency spatial distribution of multi-network radiant energy \( {\mathbf{e}}(t,f,{\mathbf{s}}) \) depends on the topology of the network, the location of the base station, the transmit power of the antenna, and the physical environment of the wireless communication.
- Published
- 2019
- Full Text
- View/download PDF
133. Challenges of 5G Green Communication Networks
- Author
-
Xiaohu Ge and Wuxiong Zhang
- Subjects
Computer science ,Computation ,Distributed computing ,MIMO ,Cellular network ,Landauer's principle ,Small cell ,5G ,Power optimization ,Efficient energy use - Abstract
The deployment of a large number of small cells poses new challenges to energy efficiency, which has often been ignored in fifth generation (5G) cellular networks. While massive multiple-input multiple outputs (MIMO) will reduce the transmission power at the expense of higher computational cost, the question remains as to which computation or transmission power is more important in the energy efficiency of 5G small cell networks. Thus, the main objective in this chapter is to investigate the computation power based on the Landauer principle. Simulation results reveal that more than 50% of the energy is consumed by the computation power at 5G small cell base stations (BSs). Moreover, the computation power of 5G small cell BS can approach 800 W when the massive MIMO (e.g., 128 antennas) is deployed to transmit high volume traffic. This clearly indicates that computation power optimization can play a major role in the energy efficiency of small cell networks.
- Published
- 2019
- Full Text
- View/download PDF
134. Energy Efficiency of Cellular Networks
- Author
-
Wuxiong Zhang and Xiaohu Ge
- Subjects
Network architecture ,Base station ,Computer science ,business.industry ,Femtocell ,Cellular network ,Throughput ,Small cell ,business ,Heterogeneous network ,Efficient energy use ,Computer network - Abstract
Ultra-dense deployment of small cell base stations (BSs), relay nodes, and distributed antennas is considered as a de facto solution for realizing the significant performance improvements needed to accommodate the overwhelming future mobile traffic demand (Ge et al. in IEEE Wirel Commun 23(1):72–79 (2016), [1]). Traditional network expansion techniques like cell splitting are often utilized by telecom operators to achieve the expected throughput, which is less efficient and proven not to keep up with the pace of traffic proliferation in the near future. Heterogeneous networks (HetNets) then become a promising and attractive network architecture to alleviate the problem. “HetNets” is a broad term that refers to the coexistence of different networks (e.g., traditional macrocells and small cell networks like femtocells and picocells), each of them constituting a network tier.
- Published
- 2019
- Full Text
- View/download PDF
135. Energy Efficiency and Collaborative Optimization Theory of 5G Heterogeneous Wireless Multi Networks
- Author
-
Xiaohu Ge and Wuxiong Zhang
- Subjects
business.industry ,Access technology ,Computer science ,Frequency band ,Wireless ,Collaborative optimization ,Diversification (marketing strategy) ,Telecommunications ,business ,5G ,Efficient energy use ,Variety (cybernetics) - Abstract
In recent years, with the rapid development of the wireless communication industry, wireless communication networks are becoming more effective in the direction of network diversification, high bandwidth, high frequency band, ubiquity, synergy, overlap and application integration and more flexible to meet the needs of people’s different communication services, a variety of mature wireless access technologies are being rapidly deployed in various scenarios.
- Published
- 2019
- Full Text
- View/download PDF
136. A Converged Network Architecture Oriented Towards NB-IoT
- Author
-
Lianhai Shan, Qianqian Zhao, Weidong Fang, Wuxiong Zhang, and Wei Chen
- Subjects
Network planning and design ,Network architecture ,Computer science ,business.industry ,Quality of service ,Cellular network ,Wireless ,business ,Wireless sensor network ,5G ,Heterogeneous network ,Computer network - Abstract
Although NB-IoT’s standardization gives us a future direction, we have to face some issues of existing networks converged, especially, the wireless sensor net-work (WSN) and cellular networks (CN) converged. On the other hand, the increase in number of sensor nodes and in the mobile devices is forcing the backhaul network architecture to undergo radical transformation. To meet the requirements of low latency and high quality of service (QoS), we put forward a novel converged network architecture. Meanwhile, we give three application scenarios. The analysis results show this architecture could facility the network design.
- Published
- 2019
- Full Text
- View/download PDF
137. Kalman interpolation filter for channel estimation of LTE downlink in high-mobility environments.
- Author
-
Xuewu Dai, Wuxiong Zhang, Jing Xu 0001, John E. Mitchell 0002, and Yang Yang 0001
- Published
- 2012
- Full Text
- View/download PDF
138. 5G Green Mobile Communication Networks
- Author
-
Xiaohu Ge, Wuxiong Zhang, Xiaohu Ge, and Wuxiong Zhang
- Subjects
- Green electronics, Sustainable engineering, Mobile communication systems--Energy conservation, Mobile communication systems--Environmental aspects
- Abstract
This book focuses on the modeling, optimization, and applications of 5G green mobile communication networks, aimed at improving energy efficiency and spectrum utilization in 5G systems. It offers a balance between theoretical analysis and engineering practice, providing in-depth studies of a number of major topics, such as energy consumption models, optimization, system design, implementation, and performance evaluation. It also discusses four aspects of green communication in detail: cellular networks, resource management, wireless transmissions and multi-media communications. Further, this unique book comprehensively and systematically discusses green optimization in wireless mobile communications. As such it is a valuable resource for researchers, engineers, and graduate students in various fields, including telecommunications engineering, electrical and electronic engineering, and computer engineering, particularly those interested in green communications.
- Published
- 2019
139. Wireless fractal cellular networks
- Author
-
Jing Xu, Xiaohu Ge, Wuxiong Zhang, Yehong Qiu, Hui Xu, John Thompson, Meidong Huang, Jiaqi Chen, Yang Yang, and Cheng-Xiang Wang
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Cellular data ,Hurst exponent ,business.industry ,Computer science ,Boundary (topology) ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,Nonlinear Sciences::Cellular Automata and Lattice Gases ,Topology ,Computer Science Applications ,Computer Science - Networking and Internet Architecture ,Fractal ,Handover ,Polygon ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Wireless ,Electrical and Electronic Engineering ,business ,ComputingMethodologies_COMPUTERGRAPHICS ,Computer network - Abstract
With the seamless coverage of wireless cellular networks in modern society, it is interesting to consider the shape of wireless cellular coverage. Is the shape a regular hexagon, an irregular polygon, or another complex geometrical shape? Based on fractal theory, the statistical characteristic of the wireless cellular coverage boundary is determined by the measured wireless cellular data collected from Shanghai, China. The measured results indicate that the wireless cellular coverage boundary presents an extremely irregular geometrical shape, which is also called a statistical fractal shape. Moreover, the statistical fractal characteristics of the wireless cellular coverage boundary have been validated by values of the Hurst parameter estimated in angular scales. The statistical fractal characteristics of the wireless cellular coverage boundary can be used to evaluate and design the handoff scheme of mobile user terminals in wireless cellular networks., 16 pages, 4 figures
- Published
- 2016
- Full Text
- View/download PDF
140. Delay Performance of Network-Coding-Based Epidemic Routing
- Author
-
Xiaohu Ge, Cheng Zhao, Sha Yao, Yang Yang, Guoqiang Mao, and Wuxiong Zhang
- Subjects
Routing protocol ,Dynamic Source Routing ,Zone Routing Protocol ,Static routing ,Computer Networks and Communications ,Computer science ,Distributed computing ,End-to-end delay ,Aerospace Engineering ,Wireless Routing Protocol ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Routing Information Protocol ,0203 mechanical engineering ,Link-state routing protocol ,Linear network coding ,Automotive Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Processing delay ,Hierarchical routing - Abstract
In this paper, we first challenge the accuracy of the so-called innovative assumption that is widely adopted in delay performance analysis of network-coding-based epidemic routing (NCER) in delay-tolerant networks (DTNs). We demonstrate that this optimistic assumption severely underestimates data delivery delay and solves this problem successfully by introducing an extra encounter factor $\delta$ . Based on this, we propose a coloring process (CP)-based analytical model to evaluate the delay performance of NCER. Numerical results show that our CP-based method outperforms traditional ordinary differential equation (ODE)-based methods on estimating the delay performance under different network sizes. Furthermore, to mitigate potential competition among multiple data streams from different nodes, we propose a feedback-based recovery protocol (FRP) that takes advantage of finite buffer space and significantly reduces the number of ineffective transmissions between nodes. As a result, FRP can achieve much better delay performance compared with existing protocols in prior work.
- Published
- 2016
- Full Text
- View/download PDF
141. Wireless Single Cellular Coverage Boundary Models
- Author
-
Yang Yang, Hui Xu, Jiaqi Chen, Xiaohu Ge, Jing Xu, Wuxiong Zhang, and Meidong Huang
- Subjects
Wi-Fi array ,General Computer Science ,Computer science ,050801 communication & media studies ,02 engineering and technology ,shape measurement ,0508 media and communications ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science::Networking and Internet Architecture ,Wireless ,General Materials Science ,Fading ,Radio resource management ,Fixed wireless ,Stochastic geometry models of wireless networks ,Wireless network ,business.industry ,05 social sciences ,General Engineering ,channel estimation ,Cellular networks ,020206 networking & telecommunications ,Wireless WAN ,Nonlinear Sciences::Cellular Automata and Lattice Gases ,wireless communication ,Multi-user MIMO ,Key distribution in wireless sensor networks ,Cellular network ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,Computer network - Abstract
To satisfy the requirement of high wireless transmission rate from user terminals, the multi-cell cooperative communication is an important solution for cellular networks. The selection of cooperative cells is usually depended on every wireless single cellular coverage boundary in cellular networks. In this paper, we analyze the characteristics of wireless single cellular coverage boundary based on real measured data. Moreover, the alpha-stable processes are first proposed to model the wireless single cellular coverage boundary. Simulation results indicate that probability density functions of wireless single cellular coverage boundary can be fitted by alpha-stable processes with 95% confidence interval based on the real measured data. This result provides a basis for cooperative communications considering the anisotropic fading characteristic of wireless signal propagation in wireless single cellular coverage region.
- Published
- 2016
142. Neighbor-aware multiple access protocol for 5G mMTC applications
- Author
-
Cheng-Xiang Wang, Xiaohu Ge, Wuxiong Zhang, Guannan Song, and Yang Yang
- Subjects
Computer Networks and Communications ,Orthogonal frequency-division multiplexing ,Computer science ,Speech recognition ,Distributed computing ,020208 electrical & electronic engineering ,05 social sciences ,020206 networking & telecommunications ,050801 communication & media studies ,020207 software engineering ,02 engineering and technology ,Spectral efficiency ,Independent component analysis ,Blind signal separation ,0508 media and communications ,Robustness (computer science) ,Carrier frequency offset ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Algorithm ,Multipath propagation ,Blind equalization - Abstract
To overcome the inter-carrier interference (ICI) of orthogonal frequency division multiplexing (OFDM) systems subject to unknown carrier frequency offset (CFO) and multipath, this paper develops a blind adaptive interference suppression scheme based on independent component analysis (ICA). Taking into account statistical independence of subcarriers' signals of OFDM, the signal recovery mechanism is investigated to achieve the goal of blind equalization. The received OFDM signals can be considered as the mixed observation signals. The effect of CFO and multipath corresponds to the mixing matrix in the problem of blind source separation (BSS) framework. In this paper, the ICA-based OFDM system model is built, and the proposed ICA-based detector is exploited to extract source signals from the observation of a received mixture based on the assumption of statistical independence between the sources. The blind separation technique can increase spectral efficiency and provide robustness performance against erroneous parameter estimation problem. Theoretical analysis and simulation results show that compared with the conventional pilot-based scheme, the improved performance of OFDM systems is obtained by the proposed ICA-based detection technique.
- Published
- 2016
- Full Text
- View/download PDF
143. Strengthen EEG-based emotion recognition using firefly integrated optimization algorithm
- Author
-
Wuxiong Zhang, Jun Ying, Yonghong Tan, and Hong He
- Subjects
0209 industrial biotechnology ,medicine.diagnostic_test ,business.industry ,Computer science ,Feature selection ,Pattern recognition ,02 engineering and technology ,Electroencephalography ,ComputingMethodologies_PATTERNRECOGNITION ,020901 industrial engineering & automation ,Local optimum ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,020201 artificial intelligence & image processing ,Segmentation ,Artificial intelligence ,business ,Classifier (UML) ,Software - Abstract
Emotion recognition is helpful for human to enhance self-awareness and respond appropriately toward the happenings around them. Due to the complexity and diversity of emotions, EEG-based emotion recognition is still a challenging task in pattern recognition. In order to recognize diverse emotions, we propose a novel firefly integrated optimization algorithm (FIOA) in this paper. It can simultaneously accomplish multiple tasks, i.e. the optimal feature selection, parameter setting and classifier selection according to different EEG-based emotion datasets. The FIOA utilizes a ranking probability objection function to guarantee the high accuracy recognition with less features. Moreover, the hybrid encoding expression and the dual updating strategy are developed in the FIOA so as to realize the optimal selection of feature subset and classifier without stagnating in the local optimum. In addition to the public DEAP datasets, we also conducted an EEG-based music emotion experiment involving 20 subjects for the validation of the proposed FIOA. After filtering and segmentation, three categories of features were extracted from every EEG signal. Then FIOA was applied to every subject dataset for two pattern recognition of emotions. The results show that the FIOA can automatically find the optimal features, parameter and classifier for different emotion datasets, which greatly reduces the artificial selection workload. Furthermore, comparing with the binary particle swarm optimization (PSObinary) and the binary firefly (FAbinary), the FIOA can achieve the higher accuracy with less features in the emotion recognition.
- Published
- 2020
- Full Text
- View/download PDF
144. Hierarchical routing protocol in wireless sensor network: a state-of-the-art review
- Author
-
Lianhai Shan, Wei Chen, Wuxiong Zhang, Weidong Fang, and Biruk Assefa
- Subjects
Structure (mathematical logic) ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Stability (learning theory) ,Process (computing) ,Energy consumption ,Computational Mathematics ,Computational Theory and Mathematics ,Hardware and Architecture ,Modeling and Simulation ,Routing (electronic design automation) ,business ,Cluster analysis ,Wireless sensor network ,Software ,Computer network ,Data transmission - Abstract
The hierarchical routing protocol in the wireless sensor network (WSN) is widely applied because of its good network stability and effective communication capability. Its cluster structure and the integration process of the data have a satisfactory performance in energy consumption and data transmission. To guide the design of hierarchical routing protocol, in this paper, we review the current research on these protocols, some typical technical characteristics such as the cluster head selection, clustering, and data routing are analysed, and a suggestion on the direction of the hierarchical routing protocol research is given. The work of this paper will be beneficial to the research, design, and optimisation of the hierarchical routing protocol.
- Published
- 2020
- Full Text
- View/download PDF
145. Automatic Hysteresis Feature Recognition of Vehicle Dampers Using Duhem Model and Clustering
- Author
-
Wei Yang, Feihu Peng, Yonghong Tan, Hong He, and Wuxiong Zhang
- Subjects
Hierarchical agglomerative clustering ,0209 industrial biotechnology ,Feature data ,Series (mathematics) ,Computer science ,Feature extraction ,Feature recognition ,02 engineering and technology ,Damper ,Hysteresis ,020901 industrial engineering & automation ,Control theory ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Cluster analysis - Abstract
Dampers of vehicle suspension systems usually show unsymmetrical nonlinear hysteresis characteristics, which affects the control accuracy of suspension system. Automatic recognition hysteresis features of unknown vehicle dampers can reduce the burden for developing efficient control strategies for suspension systems. According to the Duhem hysteresis model, a model-based unsupervised classification approach is proposed in this paper for recognizing hysteresis features of vehicle dampers. Through constructing Duhem models for different force-displacement hysteresis loops of the same sample, significant hysteresis features are extracted for multivariate time series of vehicle dampers. In terms of model parameters of samples, the clustering method is used to group dampers into different classes. Clustering results of 700 samples show that model-based features can efficiently describe the hysteresis features of vehicle dampers. K-means and Fuzzy-C Mean (FCM) are more appropriate for clustering the damper model feature data than hierarchical agglomerative clustering (HAC).
- Published
- 2018
- Full Text
- View/download PDF
146. Understanding the Temporal Fading in Wireless Industrial Networks: Measurements and Analyses
- Author
-
Tian Hong Loh, Fei Shen, Qiwei Zhang, Wuxiong Zhang, Qilong Zhang, and Fei Qin
- Subjects
Signal Processing (eess.SP) ,Wireless network ,Computer science ,business.industry ,Reliability (computer networking) ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020208 electrical & electronic engineering ,020206 networking & telecommunications ,02 engineering and technology ,FOS: Electrical engineering, electronic engineering, information engineering ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Fading ,Electrical Engineering and Systems Science - Signal Processing ,Fixed wireless ,business ,Wireless sensor network ,Multipath propagation ,Computer Science::Information Theory - Abstract
The wide deployment of wireless industrial networks still faces the challenge of unreliable service due to severe multipath fading in industrial environments. Such fading effects are not only caused by the massive metal surfaces existing within the industrial environment but also, more significantly, the moving objects including operators and logistical vehicles. As a result, the mature analytical framework of mobile fading channel may not be appropriate for the wireless industrial networks, especially the majority fixed wireless links. In this paper, we propose a qualitative analysis framework to characterize the temporal fading effects of the fixed wireless links in industrial environments, which reveals the essential reason of correlated temporal variation of both the specular and scattered power. Extensive measurements with both the envelop distribution and impulse response from field experiments validate the proposed qualitative framework, which will be applicable to simulate the industrial multipath fading characteristics and to derive accurate link quality metrics to support reliable wireless network service in various industrial applications.
- Published
- 2018
- Full Text
- View/download PDF
147. A Novel Trust Management Scheme for Defending Against On-Off Attack Based on Gaussian Distribution
- Author
-
Xiaoxiao Lv, Nan Zhou, Jifeng Huang, Weidong Fang, and Wuxiong Zhang
- Subjects
Scheme (programming language) ,020203 distributed computing ,Adaptive control ,Computer science ,media_common.quotation_subject ,Gaussian ,Distributed computing ,020206 networking & telecommunications ,02 engineering and technology ,symbols.namesake ,restrict ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Probability distribution ,Trust management (information system) ,computer ,Wireless sensor network ,Reputation ,media_common ,computer.programming_language - Abstract
A Gaussian trusted scheme with adaptive factors defending against On-off attack for sensor networks (GTS) was proposed, with the tests between Gaussian probability distribution and Beta reputation distribution. Meanwhile, the adaptive control factor and the time slot are introduced to verify and restrict the compromised modes, which refer to those nodes' reputation value changes are caused by On-off attacks. Through some preliminary simulation results, this model is more stable to describe reputation against other distributions and easier to display the trust directly and sensitively, and it also has the powerful ability to prevent from On-off attacks.
- Published
- 2018
- Full Text
- View/download PDF
148. An Overview on the Applications and Security Issues of Fog Computing
- Author
-
Wei Chen, Wuxiong Zhang, Xuzhi Miao, Fangming Bi, Weidong Fang, and Deyu Wang
- Subjects
Structure (mathematical logic) ,Distributed database ,business.industry ,Computer science ,020209 energy ,Distributed computing ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,GeneralLiterature_MISCELLANEOUS ,Smart grid ,Fog computing ,0202 electrical engineering, electronic engineering, information engineering ,Enhanced Data Rates for GSM Evolution ,Internet of Things ,business ,Edge computing ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
Fog computing extends cloud computing paradigms to the edge of the network, enabling a new generation of applications and services. This paper mainly elaborates the related background and characteristics of fog computing, discusses the concept and hierarchical structure of fog computing services, compares the advantages of cloud computing and fog computing, analyzes the existing techniques and applications of fog computing, and analyzes possible security issues in fog computing and solutions to some of the security issues.
- Published
- 2018
- Full Text
- View/download PDF
149. Research on Wireless Sensor Networks Routing Algorithms for Coal Mine Mobile Sensing
- Author
-
Wuxiong Zhang, Wang Yuequn, Weidong Fang, Ke Wang, Wei Chen, and Tao Pan
- Subjects
Routing protocol ,business.industry ,Computer science ,media_common.quotation_subject ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020208 electrical & electronic engineering ,Coal mining ,020206 networking & telecommunications ,02 engineering and technology ,Energy consumption ,Adaptability ,0202 electrical engineering, electronic engineering, information engineering ,business ,Cluster analysis ,Wireless sensor network ,Hierarchical routing ,media_common ,Computer network ,Data transmission - Abstract
Wireless sensor network (WSN) is more and more widely used in the mine because of its flexible configuration and strong adaptability. However, due to the special environment of the mine, WSN faces with a series of challenges. Through the investigation, it is found that the routing protocols used in the mine are mainly hierarchical routing. This paper firstly discusses the main idea of hierarchical routing protocol, and summarizes the main current issues; Then, regarding present problems, such as long data transmission latency, unbalanced energy consumption and short network life cycle, I discuss the advantages and disadvantages of different optimization algorithms for the hierarchical routing protocol in clustering mechanisms from the view of optimizing cluster head election method and controlling cluster range; Finally, I summarize the problems of wireless sensor network routing protocol used in mine and point out the future directions.
- Published
- 2018
- Full Text
- View/download PDF
150. Energy-Efficient Improvements in Mod-LEACH Protocol on Optimal Cluster Heads Selection
- Author
-
Shenghu Wang, Zhenpeng Pang, Wuxiong Zhang, Haiguang Chen, and Jufeng Luo
- Subjects
Green computing ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Cluster (physics) ,Energy consumption ,State (computer science) ,Cluster analysis ,business ,Wireless sensor network ,Protocol (object-oriented programming) ,Efficient energy use ,Computer network - Abstract
The hierarchical routing protocol in the wireless sensor network (WSN) is widely applied because of its good network stability and effective communication capability. As the earliest hierarchical routing protocol, Low-Energy Adaptive Clustering Hierarchy(LEACH) had low energy efficiency without considering the state of nodes. In this paper, we propose an energy efficient LEACH-based protocol to improve LEACH. The state of the cluster heads in the previous rounds, as well as residual energy and alive nodes density, are used as indicators to measure the current round cluster head selection. The modified protocol fixes the issue that the number of cluster heads dropped rapidly with dead nodes increase. The simulation results show that the proposed protocol can prolong the network lifetime of WSN effectively, and reduce the energy consumption with the balancing energy distribution.
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.