supported by the National Natural Science Foundation of China(62231020);the Youth Innovation Team of Shaanxi Universities。
The foundation of ad hoc networks lies in the guarantee of continuous connectivity.However,critical nodes,whose failure can easily destroy network connectivity,will influence the ad hoc network connectivity significan...
The continuous change of communica-tion frequency brings difficulties to the reconnaissance and prediction of non-cooperative communication net-works.Since the frequency-hopping(FH)sequence is usually generated by a c...
supported by National Key R&D Program of China, No.2018YFB1003905;the Fundamental Research Funds for the Central Universities, No.FRF-TP-18-008A3
In this paper, we conduct research on the dynamic demand response problem in smart grid to control the energy consumption. The objective of the energy consumption control is constructed based on differential game, as ...
supported in part by the National Natural Science Foundation of China with grants 61525101,91746301,61631003,61601055;the Shenzhen Fundamental Research Fund with grant KQTD2015033114415450
Automatic Modulation Classification(AMC) is an important technology used to recognize the modulation type.A dictionary set was trained via signals with known modulation schemes in cooperative scenarios.Then we classif...
supported by National Science Foundation Project of P. R. China (No.61501026,U1603116);the Fundamental Research Funds for the Central Universities (No.FRF-TP-15-032A1)
In this paper, we investigate the link resource management problem for optical networks, to achieve the resource cost during the information transmission. We use the differential game to formulate the cost control pro...
supported by the National Science Foundation Project of P. R. China (No. 61501026,61572072);Fundamental Research Funds for the Central Universities (No. FRF-TP-15-032A1)
Fog computing is a new paradigm providing network services such as computing, storage between the end users and cloud. The distributed and open structure are the characteristics of fog computing, which make it vulnera...
supported by the China Postdoctoral Science Foundation(No.2015M570936);National Science Foundation Project of P.R.China(No.61501026,61272506);Fundamental Research Funds for the Central Universities(No.FRF-TP-15032A1)
In this paper, we propose a non-cooperative differential game theory based resource allocation approach for the network security risk assessment. For the risk assessment, the resource will be used for risk assess, inc...
This research was supported by the Fundamental Research Funds for the Central Universities,also supported by the National Natural Science Foundation of P.R.China
Load balancing plays a critical role in a cellular network. As one kind of cellular network, Radio-over-Fibre (RoF) system can provide ubiquitous high data-rate transmissions, which has attracted many attentions, bu...
partially supported by the National Natural Science Foundation of China under Grant No.61172073;the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University under Grant No.2012D19;the Fundamental Research Funds for the Central Universities,Beijing Jiaotong University under Grant No.2013JBZ01;the Program for New Century Excellent Talents in University of Ministry of Education of China under Grant No.NCET-12-0766
This paper addresses the power con- trol problems of Cognitive Radio (CR) trader transmission power and interference tempera- ture constraints. First, we propose the interfer- ence constraint which ensures that the ...