China Communications | Early Access | IEEE Xplore

Issue 11 • Nov.-2021

Front cover

Publication Year: 2021,Page(s):c1 - c1

Front cover

Year: 2021 | Volume: 18 | Issue: 11

Table of contents

Publication Year: 2021,Page(s):i - ii

Table of contents

Year: 2021 | Volume: 18 | Issue: 11
Feature Topic: Machine Learing for Mobile Edge Computing
In recent years, mobile edge computing has attracted a considerable amount of attention from both academia and industry through its many advantages (such as low latency, computation efficiency and privacy) caused by its local model of providing storage and computation resources. In addition, machine learning has become the dominant approach in applications such as industry, healthcare, smart home,...Show More
Mobile edge computing is trending nowadays for its computation efficiency and privacy. The rapid development of e-commerce show great interest in mobile edge computing due to numerous rise of small and middle-sized enterprises(SMEs) in the internet. This paper predicts the overall sales volume of the enterprise through the classic ARIMA model, and notes that the behavior and arrival differences be...Show More
With the development of the Internet of Things (IoT), spatio-temporal crowdsourcing (mobile crowdsourcing) has become an emerging paradigm for addressing location-based sensing tasks. However, the delay caused by network transmission has led to low data processing efficiency. Fortunately, edge computing can solve this problem, effectively reduce the delay of data transmission, and improve data pro...Show More
Multi-access Edge Computing (MEC) is one of the key technologies of the future 5G network. By deploying edge computing centers at the edge of wireless access network, the computation tasks can be offloaded to edge servers rather than the remote cloud server to meet the requirements of 5G low-latency and high-reliability application scenarios. Meanwhile, with the development of IOV (Internet of Veh...Show More
Mobile edge computing (MEC) is an emerging technolohgy that extends cloud computing to the edge of a network. MEC has been applied to a variety of services. Specially, MEC can help to reduce network delay and improve the service quality of recommendation systems. In a MEC-based recommendation system, users' rating data are collected and analyzed by the edge servers. If the servers behave dishonest...Show More
Although content caching and recommendation are two complementary approaches to improve the user experience, it is still challenging to provide an integrated paradigm to fully explore their potential, due to the high complexity and complicated tradeoff relationship. To provide an efficient management framework, the joint design of content delivery and recommendation in wireless content caching net...Show More
Remaining time prediction of business processes plays an important role in resource scheduling and plan making. The structural features of single process instance and the concurrent running of multiple process instances are the main factors that affect the accuracy of the remaining time prediction. Existing prediction methods does not take full advantage of these two aspects into consideration. To...Show More
Efficient response speed and information processing speed are among the characteristics of mobile edge computing (MEC). However, MEC easily causes information leakage and loss problems because it requires frequent data exchange. This work proposes an anonymous privacy data protection and access control scheme based on elliptic curve cryptography (ECC) and bilinear pairing to protect the communicat...Show More
Cover Paper
In this paper, we give a systematic description of the 1st Wireless Communication Artificial Intelligence (AI) Competition (WAIC) which is hosted by IMT-2020(5G) Promotion Group 5G+AI Work Group. Firstly, the framework of full channel state information (F-CSI) feedback problem and its corresponding channel dataset are provided. Then the enhancing schemes for DL-based F-CSI feedback including i) ch...Show More
Review Paper
Smart cities improve the quality of life of people by utilizing the benefits of Information and communication technology (ICT) and the Internet of things (IoT). The applications of the smart city often rely on the cloud for services. No doubt cloud provides an ample amount of resources as a service but still it has limitations in terms of unreliable latency, mobility, and location awareness due to...Show More
Communications Theories & Systems
Pilot pattern has a significant effect on the performance of channel estimation based on compressed sensing. However, because of the influence of the number of subcarriers and pilots, the complexity of the enumeration method is computationally impractical. The meta-heuristic algorithm of the salp swarm algorithm (SSA) is employed to address this issue. Like most meta-heuristic algorithms, the SSA ...Show More
Nowadays, with the advancement of new technologies such as the Internet of Things, new applications and intelligent networks, the use of wireless sensor network increased considerably. They are prone to a variety of attacks. Thus, network security is of utmost importance to researchers. In the past, methods such as cryptography, authentication and hash function were used to create security in this...Show More
This paper mainly investigates the coordinated anti-jamming channel access problems in multiuser scenarios where there exists a tracking jammer who senses the spectrum and traces the channel with maximal receiving power. To cope with the challenges brought by the tracking jammer, a multi-leader one-follower anti-jamming Stackelberg (MOAS) game is formulated, which is able to model the complex inte...Show More
Communication behavior recognition is an issue with increasingly importance in the anti-terrorism and national defense area. However, the sensing data obtained in actual environment is often not sufficient to accurately analyze the communication behavior. Traditional means can hardly utilize the scarce and crude spectrum sensing data captured in a real scene. Thus, communication behavior recogniti...Show More
Emerging Technologies & Applications
Clinical practice guidelines (CPGs) contain evidence-based and economically reasonable medical treatment processes. Executable medical treatment processes in healthcare information systems can assist the treatment processes. To this end, business process modeling technologies have been exploited to model medical treatment processes. However, medical treatment processes are usually flexible and kno...Show More
Business Process & Management
Wireless Sensor Network (WSN) has witnessed an unpredictable growth for the last few decades. It has many applications in various critical sectors such as real-time monitoring of nuclear power plant, disaster management, environment, military area etc. However, due to the distributed and remote deployment of sensor nodes in such networks, they are highly vulnerable to different security threats. T...Show More
Nowadays, enterprises need to continually adjust their business processes to adapt to the changes of business environments, especially when one business needs to be deployed in different application scenarios, which is called spatial variability in this paper. In the field of BPM (Business Process Management), configurable business process models have demonstrated their effectiveness in aspects of...Show More
In recent years, online reservation systems of country hotel have become increasingly popular in rural areas. How to accurately recommend the houses of country hotel to the users is an urgent problem to be solved. Aiming at the problem of cold start and data sparseness in recommendation, a Hybrid Recommendation method based on Graph Embedding (HRGE) is proposed. First, three types of network are b...Show More

Call for Paper

Publication Year: 2021,Page(s):i - i
With the rapid development of smart terminals and infrastructures, as well as diversified applications (e.g., autonomous driving, virtual and augmented reality, space-air-ground integrated networks) with colorful demands, current networks (e.g., 4G and 5G networks) may not be well suited to the requirements of novel applications and services. Recently, efforts from both the industry and academia h...Show More

Call for Paper

Year: 2021 | Volume: 18 | Issue: 11

Back cover

Publication Year: 2021,Page(s):c4 - c4

Back cover

Year: 2021 | Volume: 18 | Issue: 11

Contact Information

Editor-in-Chief
Jianhua Lu
Tsinghua University
Beijing
China

Contact Information

Editor-in-Chief
Jianhua Lu
Tsinghua University
Beijing
China