Your conditions: 江凌云
  • 多基站下基于DRL的RAN切片资源分配

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2022-05-10 Cooperative journals: 《计算机应用研究》

    Abstract: In the fifth generation mobile communication, network slicing is used to provide an optimal network for various services. For the RAN slice scenario under multi base stations, the previous resource allocation methods can not meet the demand of slices when the number of slices changes, and are only suitable for specific scenarios. To solve this problem, this paper proposes a method to achieve the best resource allocation independent of the number of slices. This method first uses Ape-X method (a DRL method) allocate resources to slices, and then meet the needs of users through the resource mapping from slices to base stations and user resource allocation. The simulation results show that the proposed method can allocate resources according to the state and demand of slices, allocate the necessary number of RBs to meet the demand of slices, and is not affected by the change of the number of slices. At the same time, this method also has high general performance and scalability.

  • 基于NOMA异构云无线接入网的联合子信道和功率分配算法

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2022-05-10 Cooperative journals: 《计算机应用研究》

    Abstract: In heterogeneous cloud radio access network based on NOMA, the increase of network utility comes at the cost of energy consumption, which leads to low energy efficiency. To solve this problem, this paper proposed a joint sub-channel and power allocation solution. The algorithm first defined the difference between network utility and grid energy cost as the system revenue, and then established an optimization problem with the goal of maximizing system revenue where constraints of maximum transmit power, battery capacity of energy harvesting (EH) , user’s minimum data rate requirements and cross-layer interference thresholds were considered. Next, it used the greedy algorithm to pair users and assign sub-channels, which obtained a low-complexity sub-optimal solution. Finally, it used the Lagrangian maximization method based on the alternating direction method of multipliers to optimize the power allocation. The simulation results show that, compared with the scheme in NOMA system without considering EH units, the system revenue has increased by about 18.8%; compared with that in OFDMA system equipped with EH units, the system revenue has increased by about 11.8%.

  • 基于意图的物联网服务描述与发现

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2022-05-10 Cooperative journals: 《计算机应用研究》

    Abstract: In the process of Internet of Things service discovery, users usually express their needs with their own intentions, while service description is the description of service functions, so the mismatch between the two will affect the accuracy of service discovery. At the same time, the accuracy of service discovery decreases with the increasing of service types. In order to solve the above problems, this paper proposed a method of introducing intentional service ontology into the description of iot services, and extended the service context and Qos (Quality of Service) in the intentional service ontology. The extended intentional service ontology was stored in OWL-S(Ontology Web Language for Services) files, which can express service functions in an intentional way, enrich the semantics of iot service description, and improve the accuracy of service discovery. Simulation results showed that the proposed service description method and the corresponding service discovery algorithm can improve the accuracy of 6.7% compared with the traditional service discovery method.

  • 基于负载预测的微服务混合自动扩展

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2022-04-07 Cooperative journals: 《计算机应用研究》

    Abstract: Since edge clouds are not more powerful than the central cloud, it is easy to lead to unexpected autoscaling or low resource processing capabilities in response to dynamic workload. Therefore, we used the microservice application in a real edge cloud environment to experimentally evaluate two synthesis and two actual workloads. And we proposed a hybrid autoscaling method based on workload prediction (Predictively Horizontal and Vertical Pod Auto-scaling, Pre-HVPA) , which first uses machine learning to carry out the workload data characteristics. After obtaining the final workload prediction result, we use the predictive workload for hybrid autoscaling module. The simulation shows that the microservice autoscaling policy based on this method can reduce more scaled jitter and more pod container use, and the method is scalable, so it is suitable for the microservice applications in edge cloud environment.

  • 在移动战术环境下的终端安全接入方案

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2020-09-28 Cooperative journals: 《计算机应用研究》

    Abstract: Poor communication conditions and frequent terminal movements in search, rescue, military and other environments make it difficult for traditional security authentication systems to achieve secure access to terminals. To solve this problem, this paper proposed a scheme about security connection with terminals in the mobile tactical environment. This scheme used a certificateless key management mechanism to analyze the security authentication process after the terminals were moved and the secure processing method after terminals and gateways were damaged or invaded. Simulation results show that the scheme improves the security of authorization and authentication between the gateway and the terminal, can well resist some known attacks, solves the problem of lack of mutual authentication and key escrow in the tactical environment, and the certificateess key algorithm used in this sheme has better security and less computational overhead than other algorithms, and can balance the security of accessing a gateway with energy consumption during a terminal movement.