• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:林瑞全

Refining:

Source

Submit Unfold

Co-

Submit Unfold

Language

Submit

Clean All

Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 12 >
Physical-Layer Security Enhancement in Energy-Harvesting-Based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach SCIE
期刊论文 | 2024 , 11 (3) , 4899-4913 | IEEE INTERNET OF THINGS JOURNAL
WoS CC Cited Count: 1
Abstract&Keyword Cite Version(2)

Abstract :

Cognitive radio (CR) is regarded as the key technology of the 6th-Generation (6G) wireless network. Because 6G CR networks are anticipated to offer worldwide coverage, increase cost efficiency, enhance spectrum utilization, and improve device intelligence and network safety. This article studies the secrecy communication in an energy-harvesting (EH)-enabled Cognitive Internet of Things (EH-CIoT) network with a cooperative jammer. The secondary transmitters (STs) and the jammer first harvest the energy from the received radio frequency (RF) signals in the EH phase. Then, in the subsequent wireless information transfer (WIT) phase, the STs transmit secrecy information to their intended receivers in the presence of eavesdroppers while the jammer sends the jamming signal to confuse the eavesdroppers. To evaluate the system secrecy performance, we derive the instantaneous secrecy rate and the closed-form expression of secrecy outage probability (SOP). Furthermore, we propose a deep reinforcement learning (DRL)-based framework for the joint EH time and transmission power allocation problems. Specifically, a pair of ST and jammer over each time block is modeled as an agent which is dynamically interacting with the environment by the state, action, and reward mechanisms. To better find the optimal solutions to the proposed problems, the long short-term memory (LSTM) network and the generative adversarial networks (GANs) are combined with the classical DRL algorithm. The simulation results show that our proposed method is highly effective in maximizing the secrecy rate while minimizing the SOP compared with other existing schemes.

Keyword :

6G mobile communication 6G mobile communication Cognitive radio (CR) network Cognitive radio (CR) network Communication system security Communication system security deep reinforcement learning (DRL) deep reinforcement learning (DRL) energy harvesting (EH) energy harvesting (EH) Internet of Things Internet of Things Jamming Jamming Mobile handsets Mobile handsets physical-layer security (PLS) enhancement physical-layer security (PLS) enhancement Resource management Resource management Wireless communication Wireless communication

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Lin, Ruiquan , Qiu, Hangding , Wang, Jun et al. Physical-Layer Security Enhancement in Energy-Harvesting-Based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach [J]. | IEEE INTERNET OF THINGS JOURNAL , 2024 , 11 (3) : 4899-4913 .
MLA Lin, Ruiquan et al. "Physical-Layer Security Enhancement in Energy-Harvesting-Based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach" . | IEEE INTERNET OF THINGS JOURNAL 11 . 3 (2024) : 4899-4913 .
APA Lin, Ruiquan , Qiu, Hangding , Wang, Jun , Zhang, Zaichen , Wu, Liang , Shu, Feng . Physical-Layer Security Enhancement in Energy-Harvesting-Based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach . | IEEE INTERNET OF THINGS JOURNAL , 2024 , 11 (3) , 4899-4913 .
Export to NoteExpress RIS BibTex

Version :

Physical-Layer Security Enhancement in Energy-Harvesting-Based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach EI
期刊论文 | 2024 , 11 (3) , 4899-4913 | IEEE Internet of Things Journal
Physical Layer Security Enhancement in Energy Harvesting-based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach Scopus
期刊论文 | 2023 , 11 (3) , 1-1 | IEEE Internet of Things Journal
基于FPGA的CNN分类器设计
期刊论文 | 2024 , 62 (01) , 64-68 | 电气开关
Abstract&Keyword Cite Version(1)

Abstract :

传统CNN存在参数多,计算量大,部署在CPU与GPU上推理速度慢、功耗大的问题,为满足将卷积神经网络(Convolutional Neural Network, CNN)部署于嵌入式设备,实现实时图像采集与分类的需求,提出了一种基于FPGA平台的Mobilenet V2轻量级卷积神经网络分类器的设计方案。采用Cameralink相机采集图像,设计了裁剪、乒乓缓存和量化的图像预处理方式,实现连续的图像采集,CNN每层分别占用资源与计算结构,实现连续图片处理。设计了一种PW与DW的流水线结构,全连接层的稀疏化计算优化策略,减少了计算量和处理延迟。单张图片分类耗时1.25ms,能耗比为14.50GOP/s/W。

Keyword :

Cameralink Cameralink CNN CNN FPGA FPGA 流水线结构 流水线结构 稀疏化 稀疏化

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 方子卿 , 林瑞全 , 孙小坚 . 基于FPGA的CNN分类器设计 [J]. | 电气开关 , 2024 , 62 (01) : 64-68 .
MLA 方子卿 et al. "基于FPGA的CNN分类器设计" . | 电气开关 62 . 01 (2024) : 64-68 .
APA 方子卿 , 林瑞全 , 孙小坚 . 基于FPGA的CNN分类器设计 . | 电气开关 , 2024 , 62 (01) , 64-68 .
Export to NoteExpress RIS BibTex

Version :

基于FPGA的CNN分类器设计
期刊论文 | 2024 , 62 (1) , 64-68 | 电气开关
Optimal resource allocation method for energy harvesting based underlay Cognitive Radio networks SCIE
期刊论文 | 2023 , 18 (1) | PLOS ONE
WoS CC Cited Count: 2
Abstract&Keyword Cite Version(1)

Abstract :

This paper proposes an optimal resource allocation method. The method is to maximize the Energy Efficiency (EE) for an Energy Harvesting (EH) enabled underlay Cognitive Radio (CR) network. First, we assumed the Secondary Users (SUs) can harvest energy from the surrounding Radio Frequency (RF) signals. Then, we modelled the EE maximisation problem as a joint time and power optimization model. Next, the optimal EH time allocation factor can be calculated. After that the optimal power allocation strategy can be obtain by the fractional programming and Lagrange multiplier method. Finally simulation results show that the proposed iterative method can be better performance advantages compared with the exhaustive method and genetic algorithm. And the EE of this system model is significantly improved compared to the EE model without considering EH.

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Liao, Jianbin , Yu, Hongliang , Jiang, Weibin et al. Optimal resource allocation method for energy harvesting based underlay Cognitive Radio networks [J]. | PLOS ONE , 2023 , 18 (1) .
MLA Liao, Jianbin et al. "Optimal resource allocation method for energy harvesting based underlay Cognitive Radio networks" . | PLOS ONE 18 . 1 (2023) .
APA Liao, Jianbin , Yu, Hongliang , Jiang, Weibin , Lin, Ruiquan , Wang, Jun . Optimal resource allocation method for energy harvesting based underlay Cognitive Radio networks . | PLOS ONE , 2023 , 18 (1) .
Export to NoteExpress RIS BibTex

Version :

Optimal resource allocation method for energy harvesting based underlay Cognitive Radio networks Scopus
期刊论文 | 2023 , 18 (1 January) | PLoS ONE
Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks SCIE
期刊论文 | 2023 , 23 (2) | SENSORS
WoS CC Cited Count: 1
Abstract&Keyword Cite Version(2)

Abstract :

The paper studies the secrecy communication threatened by a single eavesdropper in Energy Harvesting (EH)-based cognitive radio networks, where both the Secure User (SU) and the jammer harvest, store, and utilize RF energy from the Primary Transmitter (PT). Our main goal is to optimize the time slots for energy harvesting and wireless communication for both the secure user as well as the jammer to maximize the long-term performance of secrecy communication. A multi-agent Deep Reinforcement Learning (DRL) method is proposed for solving the optimization of resource allocation and performance. Specifically, each sub-channel from the Secure Transmitter (ST) to the Secure Receiver (SR) link, along with the jammer to the eavesdropper link, is regarded as an agent, which is responsible for exploring optimal power allocation strategy while a time allocation network is established to obtain optimal EH time allocation strategy. Every agent dynamically interacts with the wireless communication environment. Simulation results demonstrate that the proposed DRL-based resource allocation method outperforms the existing schemes in terms of secrecy rate, convergence speed, and the average number of transition steps.

Keyword :

cognitive radio network cognitive radio network deep reinforcement learning deep reinforcement learning energy harvesting energy harvesting physical layer security physical layer security

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Lin, Ruiquan , Qiu, Hangding , Jiang, Weibin et al. Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks [J]. | SENSORS , 2023 , 23 (2) .
MLA Lin, Ruiquan et al. "Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks" . | SENSORS 23 . 2 (2023) .
APA Lin, Ruiquan , Qiu, Hangding , Jiang, Weibin , Jiang, Zhenglong , Li, Zhili , Wang, Jun . Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks . | SENSORS , 2023 , 23 (2) .
Export to NoteExpress RIS BibTex

Version :

Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks Scopus
期刊论文 | 2023 , 23 (2) | Sensors
Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks EI
期刊论文 | 2023 , 23 (2) | Sensors
A novel resource allocation method based on supermodular game in EH-CR-IoT networks SCIE
期刊论文 | 2023 , 152 | AD HOC NETWORKS
Abstract&Keyword Cite Version(2)

Abstract :

Internet of Things (IoT) allows the connectivity of smart devices embedded with sensors, but with the growing problem of overcrowding in unlicensed bands, the data exchange in the network is severely disrupted. Besides, because Cognitive Radio IoT (CR-IoT) networks are composed of many small sensor devices, there is a great need for energy utilization efficiency. Building a new kind of Energy Harvesting enabled Cognitive Radio IoT (EH-CR-IoT) networks by applying EH technology and CR functions to IoT becomes an existing technical solution that can better solve problems such as scarce spectrum resources and valuable energy resources. In order to efficiently and reasonably manage resources such as energy and spectrum for EH-CR-IoT networks, Supermodular Game (SG) theory based resource allocation methods are proposed for both perfect spectrum sensing and imperfect spectrum sensing. The proposed methods first model the resource allocation problems in EH-CR-IoT networks as Bertrand game competition models, then design the utility functions of the consumers and the entire networks in terms of network pricing, next prove that the proposed Bertrand game competition models strictly comply with the theory of SG and the function solutions are Nonlinear Optimization Problems (NOP), after that the Nash Equilibrium (NE) solutions and the optimal network utility are obtained, finally simulation results are presented and prove the validity and the superiority of the proposed methods. Compared with conventional game methods, the proposed methods can better improve the network resource utilization and network benefits.

Keyword :

EH-CR-IoT EH-CR-IoT Resource allocation Resource allocation Spectrum sensing Spectrum sensing Supermodular game Supermodular game

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Jun , Jiang, Weibin , Chen, Changchun et al. A novel resource allocation method based on supermodular game in EH-CR-IoT networks [J]. | AD HOC NETWORKS , 2023 , 152 .
MLA Wang, Jun et al. "A novel resource allocation method based on supermodular game in EH-CR-IoT networks" . | AD HOC NETWORKS 152 (2023) .
APA Wang, Jun , Jiang, Weibin , Chen, Changchun , Lin, Ruiquan , Chen, Riqing , Wang, Hongjun . A novel resource allocation method based on supermodular game in EH-CR-IoT networks . | AD HOC NETWORKS , 2023 , 152 .
Export to NoteExpress RIS BibTex

Version :

A novel resource allocation method based on supermodular game in EH-CR-IoT networks Scopus
期刊论文 | 2024 , 152 | Ad Hoc Networks
A novel resource allocation method based on supermodular game in EH-CR-IoT networks EI
期刊论文 | 2024 , 152 | Ad Hoc Networks
A Fast Method to Defend Against SSDF Attacks in the CIoV Network: Based on DAG Blockchain and Evolutionary Game SCIE
期刊论文 | 2023 , 27 (12) , 3171-3175 | IEEE COMMUNICATIONS LETTERS
Abstract&Keyword Cite Version(2)

Abstract :

This letter investigates the problem for Spectrum Sensing Data Falsification (SSDF) attacks in the Cognitive Internet of Vehicles (CIoV) network. The high-speed movement of Vehicle Users (VUs) leads to rapid changes in Channel State Information (CSI) and location. This leads to unstable detection probabilities and unstable probabilities of reporting errors. These unstable probabilities increase the error rate of traditional methods to identify VUs as Malicious Vehicle Users (MVUs). And high-speed movement makes it difficult to detect MVUs, which may result in massive MVUs' attacks. To address the above problems, this letter establishes the Cooperative Spectrum Sensing (CSS) and spectrum access process under a Directed Acyclic Graph (DAG) blockchain framework, models MVUs' attack strategy selection which is determined by revenue as an evolutionary game, and proposes a smart contract that changes the mining difficulty of VUs based on the correctness of local spectrum sensing decisions to influence VUs' revenue. Finally, the simulation results verify the theoretical analysis and prove that the proposed method is superior to the traditional method.

Keyword :

blockchain blockchain Blockchains Blockchains Cognitive internet of vehicles (CIoV) Cognitive internet of vehicles (CIoV) Data mining Data mining evolutionary game evolutionary game Fading channels Fading channels Games Games Sensors Sensors Signal to noise ratio Signal to noise ratio Smart contracts Smart contracts spectrum sensing data falsification (SSDF) spectrum sensing data falsification (SSDF)

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Li, Fushuai , Lin, Ruiquan , Wang, Jun et al. A Fast Method to Defend Against SSDF Attacks in the CIoV Network: Based on DAG Blockchain and Evolutionary Game [J]. | IEEE COMMUNICATIONS LETTERS , 2023 , 27 (12) : 3171-3175 .
MLA Li, Fushuai et al. "A Fast Method to Defend Against SSDF Attacks in the CIoV Network: Based on DAG Blockchain and Evolutionary Game" . | IEEE COMMUNICATIONS LETTERS 27 . 12 (2023) : 3171-3175 .
APA Li, Fushuai , Lin, Ruiquan , Wang, Jun , Hu, Jinsong , Shu, Feng , Wu, Liang . A Fast Method to Defend Against SSDF Attacks in the CIoV Network: Based on DAG Blockchain and Evolutionary Game . | IEEE COMMUNICATIONS LETTERS , 2023 , 27 (12) , 3171-3175 .
Export to NoteExpress RIS BibTex

Version :

A Fast Method to Defend Against SSDF Attacks in the CIoV Network: Based on DAG Blockchain and Evolutionary Game EI
期刊论文 | 2023 , 27 (12) , 3171-3175 | IEEE Communications Letters
A Fast Method to Defend Against SSDF Attacks in the CIoV Network: Based on DAG Blockchain and Evolutionary Game Scopus
期刊论文 | 2023 , 27 (12) , 3171-3175 | IEEE Communications Letters
Free-Rider Games for Cooperative Spectrum Sensing and Access in CIoT Networks SCIE
期刊论文 | 2023 , 23 (13) | SENSORS
Abstract&Keyword Cite Version(2)

Abstract :

With the rapid development of technologies such as wireless communications and the Internet of Things (IoT), the proliferation of IoT devices will intensify the competition for spectrum resources. The introduction of cognitive radio technology in IoT can minimize the shortage of spectrum resources. However, the open environment of cognitive IoT may involve free-riding problems. Due to the selfishness of the participants, there are usually a large number of free-riders in the system who opportunistically gain more rewards by stealing the spectrum sensing results from other participants and accessing the spectrum without spectrum sensing. However, this behavior seriously affects the fault tolerance of the system and the motivation of the participants, resulting in degrading the system's performance. Based on the energy-harvesting cognitive IoT model, this paper considers the free-riding problem of Secondary Users (SUs). Since free-riders can harvest more energy in spectrum sensing time slots, the application of energy harvesting technology will exacerbate the free-riding behavior of selfish SUs in Cooperative Spectrum Sensing (CSS). In order to prevent the low detection performance of the system due to the free-riding behavior of too many SUs, a penalty mechanism is established to stimulate SUs to sense the spectrum normally during the sensing process. In the system model with multiple primary users (PUs) and multiple SUs, each SU considers whether to free-ride and which PU's spectrum to sense and access in order to maximize its own interests. To address this issue, a two-layer game-based cooperative spectrum sensing and access method is proposed to improve spectrum utilization. Simulation results show that compared with traditional methods, the average throughput of the proposed TL-CSAG algorithm increased by 26.3% and the proposed method makes the SUs allocation more fair.

Keyword :

cognitive IoT cognitive IoT cooperative spectrum sensing cooperative spectrum sensing dynamic spectrum access dynamic spectrum access energy harvesting energy harvesting game theory game theory

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Jiang, Kejian , Ma, Chi , Lin, Ruiquan et al. Free-Rider Games for Cooperative Spectrum Sensing and Access in CIoT Networks [J]. | SENSORS , 2023 , 23 (13) .
MLA Jiang, Kejian et al. "Free-Rider Games for Cooperative Spectrum Sensing and Access in CIoT Networks" . | SENSORS 23 . 13 (2023) .
APA Jiang, Kejian , Ma, Chi , Lin, Ruiquan , Wang, Jun , Jiang, Weibing , Hou, Haifeng . Free-Rider Games for Cooperative Spectrum Sensing and Access in CIoT Networks . | SENSORS , 2023 , 23 (13) .
Export to NoteExpress RIS BibTex

Version :

Free-Rider Games for Cooperative Spectrum Sensing and Access in CIoT Networks Scopus
期刊论文 | 2023 , 23 (13) | Sensors (Basel, Switzerland)
Free-Rider Games for Cooperative Spectrum Sensing and Access in CIoT Networks EI
期刊论文 | 2023 , 23 (13) | Sensors
基于深度强化学习的认知物联网资源分配的策略研究
期刊论文 | 2023 , 11 (03) , 82-92 | 信息安全与通信保密
Abstract&Keyword Cite Version(2)

Abstract :

能量采集(Energy Harvesting,EH)和认知无线电(Cognitive Radio,CR)技术的组合可为物联网设备提供持续的能量,并有效地提高物联网系统的频谱效率。然而,在衬底模式下的认知物联网(Cognitive Radio IoT,CIoT)系统中,物联网设备之间的无线通信常常遭受窃听攻击。针对存在多窃听者条件下的CIoT系统无线通信场景,以保密速率作为系统保密性能指标。为解决所提的资源分配问题,将长短期记忆网络(Long-Term Memory Network,LSTM)、生成对抗网络(Generative Adversarial Networks,GAN)和深度强化学习(Deep Reinforcement Learning,DRL)算法相结合,设计一种联合能量采集时间和传输功率分配方案。数值仿真表明,与其他基准算法相比,所提方法能够有效地提高系统保密性能。

Keyword :

深度强化学习 深度强化学习 物理层安全 物理层安全 能量采集 能量采集 认知物联网 认知物联网

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 丘航丁 , 林瑞全 , 刘佳鑫 et al. 基于深度强化学习的认知物联网资源分配的策略研究 [J]. | 信息安全与通信保密 , 2023 , 11 (03) : 82-92 .
MLA 丘航丁 et al. "基于深度强化学习的认知物联网资源分配的策略研究" . | 信息安全与通信保密 11 . 03 (2023) : 82-92 .
APA 丘航丁 , 林瑞全 , 刘佳鑫 , 鲍家旺 , 徐浩东 . 基于深度强化学习的认知物联网资源分配的策略研究 . | 信息安全与通信保密 , 2023 , 11 (03) , 82-92 .
Export to NoteExpress RIS BibTex

Version :

基于深度强化学习的认知物联网资源分配的策略研究
期刊论文 | 2023 , (3) , 82-92 | 信息安全与通信保密
基于深度强化学习的认知物联网资源分配的策略研究
期刊论文 | 2023 , 11 (03) , 82-92 | 信息安全与通信保密
基于FPGA加速的低功耗的MobileNetV2网络识别系统
期刊论文 | 2023 , 31 (05) , 221-227,234 | 计算机测量与控制
Abstract&Keyword Cite Version(2)

Abstract :

近年来,卷积神经网络由于其出色的性能被广泛应用在各个领域,如图像识别、语音识别与翻译和自动驾驶等;但是传统卷积神经网络(CNN,convolutional neural network)存在参数多,计算量大,部署在CPU与GPU上推理速度慢、功耗大的问题;针对上述问题,采用量化感知训练(QAT,quantization aware training)的方式在保证图像分类准确率的前提下,将网络参数总量压缩为原网络的1/4;将网络权重全部部署在FPGA的片内资源上,克服了片外存储带宽的限制,减少了访问片外存储资源带来的功耗;在MobileNetV2网络的层内以及相邻的点卷积层之间提出一种协同配合的流水线结构,极大地提高了网络的实时性;提出一种存储器与数据读取的优化策略,根据并行度调整数据的存储排列方式及读取顺序,进一步节约了片内BRAM资源。最终在Xilinx的Virtex-7 VC707开发板上实现了一套性能优、功耗小的轻量级卷积神经网络MobileNetV2识别系统,200 MHz时钟下达到了170.06 GOP/s的吞吐量,功耗仅为6.13 W,能耗比达到了27.74 GOP/s/W,是CPU的92倍,GPU的25倍,性能较其他实现有明显的优势。

Keyword :

MobileNet MobileNet 并行计算 并行计算 流水线结构 流水线结构 硬件加速 硬件加速 量化感知训练 量化感知训练

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 孙小坚 , 林瑞全 , 方子卿 et al. 基于FPGA加速的低功耗的MobileNetV2网络识别系统 [J]. | 计算机测量与控制 , 2023 , 31 (05) : 221-227,234 .
MLA 孙小坚 et al. "基于FPGA加速的低功耗的MobileNetV2网络识别系统" . | 计算机测量与控制 31 . 05 (2023) : 221-227,234 .
APA 孙小坚 , 林瑞全 , 方子卿 , 马驰 . 基于FPGA加速的低功耗的MobileNetV2网络识别系统 . | 计算机测量与控制 , 2023 , 31 (05) , 221-227,234 .
Export to NoteExpress RIS BibTex

Version :

基于FPGA加速的低功耗的MobileNetV2网络识别系统
期刊论文 | 2023 , 31 (05) , 221-227,234 | 计算机测量与控制
基于FPGA加速的低功耗的MobileNetV2网络识别系统
期刊论文 | 2023 , 31 (5) , 221-227,234 | 计算机测量与控制
D2D网络中基于联盟博弈的中继选择方法
期刊论文 | 2023 , 56 (01) , 42-48 | 通信技术
Abstract&Keyword Cite Version(2)

Abstract :

随着无线终端的大规模普及,用户设备(User Equipment,UE)对无线网络的内容分发服务提出了更高的要求。提出了利用设备对设备(Device to Device,D2D)通信技术进行协作中继传输,使得任何UE都可作为潜在中继节点,并且令中继节点为其他UE中继数据,可以提升整体网络的内容分发质量。为弥补UE作为中继节点产生的能耗,采用能量采集(Energy Harvesting,EH)的激励机制,将携能信号作为奖励发送至UE,以提高UE为其他用户中继数据的意愿。同时,为解决中继选择问题,提出了基于联盟博弈方法,对UE和中继节点的合作行为进行分析,为UE选取最优的中继节点,以获取最优的内容分发服务。仿真结果表明,所提方法与贪婪搜索算法相比,可以更大程度地提高系统的吞吐量。

Keyword :

D2D通信 D2D通信 中继 中继 联盟博弈 联盟博弈 能量采集 能量采集

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 刘佳鑫 , 林瑞全 , 丘航丁 et al. D2D网络中基于联盟博弈的中继选择方法 [J]. | 通信技术 , 2023 , 56 (01) : 42-48 .
MLA 刘佳鑫 et al. "D2D网络中基于联盟博弈的中继选择方法" . | 通信技术 56 . 01 (2023) : 42-48 .
APA 刘佳鑫 , 林瑞全 , 丘航丁 , 王锐亮 , 鲍家旺 , 徐浩东 . D2D网络中基于联盟博弈的中继选择方法 . | 通信技术 , 2023 , 56 (01) , 42-48 .
Export to NoteExpress RIS BibTex

Version :

D2D网络中基于联盟博弈的中继选择方法
期刊论文 | 2023 , 56 (01) , 42-48 | 通信技术
10| 20| 50 per page
< Page ,Total 12 >

Export

Results:

Selected

to

Format:
Online/Total:718/6813865
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1