Loading...
TSINGHUA JOURNALS
|
ITU JOURNAL
Toggle navigation
Home
About ICN
Editorial Board
Policies and Ethics
Contact
Table of contents
Previous Issue
Volume 2 No. 2
05 June 2021
Multitarget tracking control algorithm under local information selection interaction mechanism
Jiehong Wu,Jinghui Yang,Weijun Zhang,Jiankai Zuo
2021, 2(2): 91-100. doi:
10.23919/ICN.2021.0011
Abstract
(
74
)
HTML
(
1
)
PDF
(5026KB) (
61
)
This study focuses on the problem of multitarget tracking. To address the existing problems of current tracking algorithms, as manifested by the time consumption of subgroup separation and the uneven group size of unmanned aerial vehicles (UAVs) for target tracking, a multitarget tracking control algorithm under local information selection interaction is proposed. First, on the basis of location, number, and perceived target information of neighboring UAVs, a temporary leader selection strategy ...
A flexible scheduling algorithm for the 5th-generation networks
Lanlan Li,Wentao Shao,Xin Zhou
2021, 2(2): 101-107. doi:
10.23919/ICN.2020.0017
Abstract
(
117
)
HTML
(
2
)
PDF
(808KB) (
65
)
At present, the 5th-Generation (5G) wireless mobile communication standard has been released. 5G networks efficiently support enhanced mobile broadband traffic, ultra-reliable low-latency communication traffic, and massive machine-type communication. However, a major challenge for 5G networks is to achieve effective Radio Resource Management (RRM) strategies and scheduling algorithms to meet quality of service requirements. The Proportional Fair (PF) algorithm is widely used in the existing 5G s...
Blockchain-enabled fog resource access and granting
Gang Liu,Jinsong Wu,Ting Wang
2021, 2(2): 108-114. doi:
10.23919/ICN.2021.0009
Abstract
(
174
)
HTML
(
4
)
PDF
(965KB) (
86
)
Fog computing is a new computing paradigm for meeting ubiquitous massive access and latency-critical applications by moving the processing capability closer to end users. The geographical distribution/floating features with potential autonomy requirements introduce new challenges to the traditional methodology of network access control. In this paper, a blockchain-enabled fog resource access and granting solution is proposed to tackle the unique requirements brought by fog computing. The smart c...
True-data testbed for 5G/B5G intelligent network
Yongming Huang,Shengheng Liu,Cheng Zhang,Xiaohu You,Hequan Wu
2021, 2(2): 133-149. doi:
10.23919/ICN.2021.0002
Abstract
(
241
)
HTML
(
5
)
PDF
(1146KB) (
66
)
Future beyond fifth-generation (B5G) and sixth-generation (6G) mobile communications will shift from facilitating interpersonal communications to supporting internet of everything (IoE), where intelligent communications with full integration of big data and artificial intelligence (AI) will play an important role in improving network efficiency and providing high-quality service. As a rapid evolving paradigm, the AI-empowered mobile communications demand large amounts of data acquired from real ...
Distributed reinforcement learning based framework for energy-effcient UAV relay against jamming
Weihang Wang,Zefang Lv,Xiaozhen Lu,Yi Zhang,Liang Xiao
2021, 2(2): 150-162. doi:
10.23919/ICN.2021.0010
Abstract
(
90
)
HTML
(
1
)
PDF
(885KB) (
54
)
Unmanned aerial vehicle (UAV) network is vulnerable to jamming attacks, which may cause severe damage like communication outages. Due to the energy constraint, the source UAV cannot blindly enlarge the transmit power, along with the complex network topology with high mobility, which makes the destination UAV unable to evade the jammer by flying at will. To maintain communication with a limited battery capacity in the UAV networks in the presence of a greedy jammer, in this paper, we propose a di...