Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A Study Of Innovative Technologies for Energy-Efficient Enterprise Management of Wireless Heterogeneous Networks in Collaborative Communications
Author(s):
1. Wei Lin: Graduate School, Lyceum of the Philippines University,Manila,Philippines
Abstract:
Collaborative communication technology has become a popular research area in wireless communications due to its ability to resist varying degrees of channel fading through the collaborative transmission of network nodes. This thesis focuses on energy-efficient collaborative communication systems in increasingly complex environments in heterogeneous wireless networks, with the aim of optimizing energy efficiency and improving user data rates in small areas (e.g., within an enterprise). A brief introduction to the basic technologies of wireless energy-carrying collaborative communication systems is given, summarising relay forwarding strategies, three basic communication models, and energy and information co-transmission reception mechanisms before proposing an ED-OEH relaying protocol at the end of the section that integrates energy classification and opportunity energy harvesting. Immediately afterwards, the heterogeneity of network nodes in terms of computation and storage is pointed out, and a sensor network security protocol based on a hybrid encryption regime is designed. Finally, the problem of intra-enterprise resource allocation and energy efficiency optimization in heterogeneous wireless network scenarios based on deep augmented learning algorithms is investigated. Nature DQN is used as the core algorithm, and the input dimension and loss function in traditional neural networks are improved to reduce the complexity of the algorithm. Experimental results show that the Nature DQN algorithm converges faster than traditional algorithms such as Q-learning, and the energy efficiency ratio can reach up to 300%.
Page(s): 1-18
DOI: DOI not available
Published: Journal: International Journal of Communication Networks and Information Security, Volume: 16, Issue: 1, Year: 2024
Keywords:
Heterogeneous networks , DQN , Resource Optimisation , Collaborative Communication , Enterprise Management
References:
[1] Xu Y. J.,Xie H.,Chen Q. B. .2020 .Energy Efficiency Optimization Algorithm for heterogeneous NOMA Networks based on Imperfect CSI. ”Journal on Communications, 41(7) : .
[2] QIU C.,S. LENG C.,Y. YE C. .2015 .Joint switch scheduling and resource allocation algorithm based on energy efficiency in heterogeneous wireless networks. ” Journal of Computer Applications, 35(6) : 1505.
[3] LI G.,Y. XU G.,Q. CHEN G. .2020 .Interference efficiency-based base station selection and power allocation algorithm for multi-cell heterogeneous wireless networks. ” Journal of Electronics & Information Technology, 42(4) : 957-964.
[4] Ji X.,Yang J.,Huang K.,Yi M. .2016 .Physical layer authentication scheme based on hash method. ” Journal of Electronics & Information Technology, 38(11) : 2900-2907.
[5] Al-Azzawi F. F.,Ibrahim M.S. .2023 .HaLow Wi-Fi performance in multi-users and channels environment with MATLAB Simulink,”. International Journal of Communication Networks and Information Security, 15(1) : 9-15.
[6] Taleb A. A. .2023 .Using Minimum Connected Dominating Set for Mobile sink path planning in Wireless Sensor Networks. International Journal of Communication Networks and Information Security, 15(1) : 1-8.
[7] Aljarrah I. A. .2021 .Effect of image degradation on performance of Convolutional Neural Networks. International Journal of Communication Networks and Information Security, 13(2) : 215-219.
[8] Jama A. M.,Khalifa O. O.,Subramaniam N. K. .2021 .Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm. International Journal of Communication Networks and Information Security, 13(2) : 249-257.
[9] Ding Z. G.,Zhang Z.,Li J. .2008 .Improvement of inverse Maximum Matching Word Segmentation Algorithm Based on Hash Structure,” Computer Engineering. , 29(12) : 3208-3211.
[10] Zhenhua D.,Jintao L.,Bo F. .2009 .. Research on RFID Security Authentication Protocol Based on Hash Function,” Journal of Computer Research and Development (in Chinese)., 4 : 583-592.
[11] Maskery M.,Krishnamurthy V.,Zhao Q. .2009 .Decentralized dynamic spectrum access for cognitive radios: Cooperative design of a non-cooperative game. ” IEEE Transactions on Communications, 57(2) : 459-469.
[12] Zhou L.,Wang X.,Tu W.,Muntean G.M.,Geller B. .2010 .Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks,”. IEEE Journal on Selected Areas in Communications, 28(3) : 409-419.
[13] D.M. Rodríguez ,Rosado A.A.,Publishing IOP,Nov IOP .2019 .Summary of the Internet of Things and its Application in Agroindustrial Production,”. In Journal of Physics: Conference Series, 1409(1) : 012018.
[14] Sharma U.,Gupta D.,Publishing IOP,Jul IOP .2021 .Analyzing the applications of internet of things in hotel industry,”. In Journal of Physics: Conference Series, (1) : 012041.
[15] Molaei F.,Siavoshi H.,Afrouz S.G.,Tenorio V. .2020 .A comprehensive review on internet of things (IoT) and its implications in the mining industry. American Journal of Engineering and Applied Sciences, 13(3) : 499-515.
[16] Hassan Q.F. .2018 .Internet of things A to Z: technologies and applications. , : .
[17] Wang K.,Li H.,Yu F.R. .2016 .Virtual resource allocation in software-defined information-centric cellular networks with device-to-device communications and imperfect CSI,”. IEEE Transactions on Vehicular Technology, 65(12) : 10011-10021.
[18] Meshgi H.,Zhao D.,Zheng R. .2017 .Optimal resource allocation in multicast device-to-device communications underlaying LTE networks. ” IEEE Transactions on Vehicular Technology, 66(9) : 8357-8371.
[19] T.D. Hoang L.B.,Le L.B.,T. L.B. .2015 .Dual decomposition method for energy-efficient resource allocation in D2D communications underlying cellular networks,”. In 2015 IEEE global communications conference (GLOBECOM), : 1-6.
[20] Wu Q.,Li G.Y.,Chen W.,Ng D.W.K. .2017 .Energy-efficient D2D overlaying communications with spectrumpower trading. ” IEEE Transactions on Wireless Communications, 16(7) : 4404-4419.
[21] V. N. I. .2017 .Cisco Cisco visual networking index: forecast and methodology 2016-2021. , : .
[22] Zhou Y.,Chen J.,Kuo Y. .2016 .Cooperative cross-layer resource allocation for self-healing in interworking of WLAN and femtocell systems. ” IEEE Communications Letters, 21(1) : 136-139.
[23] Yu H.W.,Zhang B. .2019 .A hybrid MADM algorithm based on attribute weight and utility value for heterogeneous network selection,” Journal of network and systems management. , 27 : 756-783.
[24] Fakhfakh E.,Hamouda S. .2017 .Optimised Q‐learning for WiFi offloading in dense cellular networks. ” Iet Communications, 11(15) : 2380-2385.
[25] Soleymani B.,Zamani A.,Rastegar S.H.,Shah-Mansouri V. . .“RAT selection based on association. , : .
[26] Srivastava N.,Hinton G.,Krizhevsky A.,I. Sutskever A.,Salakhutdinov R. .2014 .Dropout: a simple way to prevent neural networks from overfitting,”. The journal of machine learning research, 15(1) : 1929-1958.
[27] El Khanboubi Y.,Hanoune M.,El Ghazouani M. .2021 .A new data deletion scheme for a blockchain-based deduplication system in the cloud. International Journal of Communication Networks and Information Security(IJCNIS), 13 : 331-339.
[28] Alqahtani M.A. .2021 .Machine learning techniques for malware detection with challenges and future directions. International Journal of Communication Networks and Information Security(IJCNIS), 13(2) : 258-270.
[29] Goswami H.,Choudhury H. .2021 .Security of IoT in 5G cellular networks: A review of current status, challenges and future directions. International Journal of Communication Networks and Information Security(IJCNIS), 13(2) : 278-289.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

9

Views