DeepLab and Bias Field Correction Based Automatic Cone Photoreceptor Cell Identification with Adaptive Optics Scanning Laser Ophthalmoscope ImagesRead the full article
Wireless Communications and Mobile Computing provides the R&D communities working in academia and the telecommunications and networking industries with a forum for sharing research and ideas in this fast moving field.
Wireless Communications and Mobile Computing maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.
Latest ArticlesMore articles
Evaluation and Prediction of COVID-19 Prevention and Control Strategy Based on the SEIR-AQ Infectious Disease Model
Based on the SEIR model, which takes into account prevention and control measures, prevention and control awareness, and economic level and medical level indicators, this paper proposes an infectious disease model of “susceptible-exposed-infected-removed-asymptomatic-isolated” (short for SEIR-AQ) to assess and predict the development of the COVID-19 pandemic with different prevention and control strategies. The kinetic parameters of the SEIR-AQ model were obtained by fitting, and the parameters of the SEIR-AQ model were solved through the Euler method. Furthermore, the effects of different countries’ prevention and control strategies on the number of infections, the proportion of isolation, the number of deaths, and the number of recoveries were also simulated. The theoretical analysis showed that measures such as isolation for prevention and control and medical tracking isolation had a significant inhibitory effect on the development of the COVID-19 pandemic, among which stratified treatment and enhanced awareness played a key role in the rapid regression of the peak of COVID-19-infected patients. Conclusion of the Simulation. The SEIR-AQ model can be used to evaluate the development status of the COVID-19 epidemic and has some theoretical value for the prediction of COVID-19.
Network Traffic Statistics Method for Resource-Constrained Industrial Project Group Scheduling under Big Data
With the advent of the Internet era, the demand for network in various fields is growing, and network applications are increasingly rich, which brings new challenges to network traffic statistics. How to carry out network traffic statistics efficiently and accurately has become the focus of research. Although the current research results are many, they are not very ideal. Based on the era background of big data and machine learning algorithm, this paper uses the ant colony algorithm to solve the typical resource-constrained project scheduling problem and finds the optimal solution of network traffic resource allocation problem. Firstly, the objective function and mathematical model of the resource-constrained project scheduling problem are established, and the ant colony algorithm is used for optimization. Then, the project scheduling problem in PSPLIB is introduced, which contains 10 tasks and 1 renewable resource. The mathematical model and ant colony algorithm are used to solve the resource-constrained project scheduling problem. Finally, the data quantity and frequency of a PCU with a busy hour IP of 220.127.116.11 are analyzed and counted. The experimental results show that the algorithm can get the unique optimal solution after the 94th generation, which shows that the parameters set in the solution method are appropriate and the optimal solution can be obtained. The schedule of each task in the optimal scheduling scheme is very compact and reasonable. The peak time of network traffic is usually between 9 : 00 and 19 : 00-21 : 00. We can reasonably schedule the network resources according to these time periods. Therefore, the network traffic statistics method based on the solution of resource constrained industrial project group scheduling problem under big data can effectively carry out network traffic statistics and trend analysis.
Privacy-Aware Online Task Offloading for Mobile-Edge Computing
Mobile edge computing (MEC) has been envisaged as one of the most promising technologies in the fifth generation (5G) mobile networks. It allows mobile devices to offload their computation-demanding and latency-critical tasks to the resource-rich MEC servers. Accordingly, MEC can significantly improve the latency performance and reduce energy consumption for mobile devices. Nonetheless, privacy leakage may occur during the task offloading process. Most existing works ignored these issues or just investigated the system-level solution for MEC. Privacy-aware and user-level task offloading optimization problems receive much less attention. In order to tackle these challenges, a privacy-preserving and device-managed task offloading scheme is proposed in this paper for MEC. This scheme can achieve near-optimal latency and energy performance while protecting the location privacy and usage pattern privacy of users. Firstly, we formulate the joint optimization problem of task offloading and privacy preservation as a semiparametric contextual multi-armed bandit (MAB) problem, which has a relaxed reward model. Then, we propose a privacy-aware online task offloading (PAOTO) algorithm based on the transformed Thompson sampling (TS) architecture, through which we can (1) receive the best possible delay and energy consumption performance, (2) achieve the goal of preserving privacy, and (3) obtain an online device-managed task offloading policy without requiring any system-level information. Simulation results demonstrate that the proposed scheme outperforms the existing methods in terms of minimizing the system cost and preserving the privacy of users.
Hybrid Precoding Algorithm for Millimeter-Wave Massive MIMO Systems with Subconnection Structures
In mmWave massive MIMO systems, traditional digital precoding is difficult to be implemented because of the high cost and energy consumption of RF chains. Fortunately, the hybrid precoding which combines digital precoding and analog precoding not only solves this problem successfully, but also improves the performance of the system effectively. However, due to the constant mode constraint introduced by the phase shifter in the analog domain, it is difficult to solve the hybrid precoding directly. There is a solution which divides the total optimization problem into two stages to solve, that is, first fix the digital precoding matrix, solve the analog precoding matrix, and then optimize the digital precoding matrix according to the obtained analog precoding matrix. In this paper, a high energy-efficient hybrid precoding scheme is proposed for the subconnection structure. In the first stage, the optimization problem can be decomposed into a series of subproblems by means of the independent submatrix structure of the analog precoding matrix. When the optimized analog precoding matrix is obtained, the digital precoding matrix can be solved by the minimum mean error (MMSE). Finally, the digital precoding matrix is normalized to satisfy the constraint conditions. The simulation results demonstrate that the performance of the proposed algorithm is close to that of fully digital precoding based on subconnection structure and better than that of the existing algorithms. In addition, this paper presents the simulation analysis of the algorithm performance under imperfect channel state information. Simulation results show that when the estimation accuracy of channel state information is 0.8, the spectral efficiency of the proposed algorithm can already be maintained at a good level.
FPETD: Fault-Tolerant and Privacy-Preserving Electricity Theft Detection
Electricity theft occurs from time to time in the smart grid, which can cause great losses to the power supplier, so it is necessary to prevent the occurrence of electricity theft. Using machine learning as an electricity theft detection tool can quickly lock participants suspected of electricity theft; however, directly publishing user data to the detector for machine learning-based detection may expose user privacy. In this paper, we propose a real-time fault-tolerant and privacy-preserving electricity theft detection (FPETD) scheme that combines -source anonymity and a convolutional neural network (CNN). In our scheme, we designed a fault-tolerant raw data collection protocol to collect electricity data and cut off the correspondence between users and their data, thereby ensuring the fault tolerance and data privacy during the electricity theft detection process. Experiments have proven that our dimensionality reduction method makes our model have an accuracy rate of 92.86% for detecting electricity theft, which is much better than others.
Physical Layer Secrecy Analysis of Multihop Hybrid Satellite-Terrestrial Relay Networks with Jamming
This paper explores the secrecy analysis of a multihop hybrid satellite-terrestrial relay network (HSTRN) with jamming, where one satellite source is aimed at communicating with destination users via multihop decode-and-forward (DF) terrestrial relays, in the existence of an eavesdropper. All the destination users are deployed randomly following a homogeneous Poisson point process (PPP) based on stochastic geometry. Each relay operates not only as a conventional DF relay to forward the received signal but also as a jammer to generate intentional interference to degrade the eavesdropper link, considering shadowed-Rician fading for legitimate link and wiretap link while Rayleigh fading for jamming link. To characterize the secrecy performance of the considered network, the accurate analytical expression for the secrecy outage probability (SOP) is derived. In order to reveal further insights on the achievable diversity order of the network, the asymptotic behavior of SOP expression at high signal-to-noise ratio (SNR) region is deduced. Moreover, the throughput of the system is discussed to characterize the secrecy performance. Finally, the theoretical results are validated through comparison with simulation results and show that (1) the secrecy performance of the considered network gets better with the decreasing of the hops and with the decreasing severity of the channel fading scenario, (2) the relay of the network operating as a jammer can provide better secrecy performance without extra network resources, and (3) small hops and high SNR can yield to high throughput of the system.