Loading...

Table of contents Previous Issue  

    Volume 2 No. 2
    05 June 2021
    Multitarget tracking control algorithm under local information selection interaction mechanism
    Jiehong Wu,Jinghui Yang,Weijun Zhang,Jiankai Zuo
    2021, 2(2):  91-100.  doi:10.23919/ICN.2021.0011
    Abstract ( 74 )   HTML ( 1)   PDF (5026KB) ( 61 )  
    This study focuses on the problem of multitarget tracking. To address the existing problems of current tracking algorithms, as manifested by the time consumption of subgroup separation and the uneven group size of unmanned aerial vehicles (UAVs) for target tracking, a multitarget tracking control algorithm under local information selection interaction is proposed. First, on the basis of location, number, and perceived target information of neighboring UAVs, a temporary leader selection strategy ...
    A flexible scheduling algorithm for the 5th-generation networks
    Lanlan Li,Wentao Shao,Xin Zhou
    2021, 2(2):  101-107.  doi:10.23919/ICN.2020.0017
    Abstract ( 117 )   HTML ( 2)   PDF (808KB) ( 65 )  
    At present, the 5th-Generation (5G) wireless mobile communication standard has been released. 5G networks efficiently support enhanced mobile broadband traffic, ultra-reliable low-latency communication traffic, and massive machine-type communication. However, a major challenge for 5G networks is to achieve effective Radio Resource Management (RRM) strategies and scheduling algorithms to meet quality of service requirements. The Proportional Fair (PF) algorithm is widely used in the existing 5G s...
    Blockchain-enabled fog resource access and granting
    Gang Liu,Jinsong Wu,Ting Wang
    2021, 2(2):  108-114.  doi:10.23919/ICN.2021.0009
    Abstract ( 174 )   HTML ( 4)   PDF (965KB) ( 86 )  
    Fog computing is a new computing paradigm for meeting ubiquitous massive access and latency-critical applications by moving the processing capability closer to end users. The geographical distribution/floating features with potential autonomy requirements introduce new challenges to the traditional methodology of network access control. In this paper, a blockchain-enabled fog resource access and granting solution is proposed to tackle the unique requirements brought by fog computing. The smart c...
    True-data testbed for 5G/B5G intelligent network
    Yongming Huang,Shengheng Liu,Cheng Zhang,Xiaohu You,Hequan Wu
    2021, 2(2):  133-149.  doi:10.23919/ICN.2021.0002
    Abstract ( 241 )   HTML ( 5)   PDF (1146KB) ( 66 )  
    Future beyond fifth-generation (B5G) and sixth-generation (6G) mobile communications will shift from facilitating interpersonal communications to supporting internet of everything (IoE), where intelligent communications with full integration of big data and artificial intelligence (AI) will play an important role in improving network efficiency and providing high-quality service. As a rapid evolving paradigm, the AI-empowered mobile communications demand large amounts of data acquired from real ...
    Distributed reinforcement learning based framework for energy-effcient UAV relay against jamming
    Weihang Wang,Zefang Lv,Xiaozhen Lu,Yi Zhang,Liang Xiao
    2021, 2(2):  150-162.  doi:10.23919/ICN.2021.0010
    Abstract ( 90 )   HTML ( 1)   PDF (885KB) ( 54 )  
    Unmanned aerial vehicle (UAV) network is vulnerable to jamming attacks, which may cause severe damage like communication outages. Due to the energy constraint, the source UAV cannot blindly enlarge the transmit power, along with the complex network topology with high mobility, which makes the destination UAV unable to evade the jammer by flying at will. To maintain communication with a limited battery capacity in the UAV networks in the presence of a greedy jammer, in this paper, we propose a di...