Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Decision Model of Wireless Communication Scheme Evaluation via Interval Number

Published: 01 January 2022 Publication History

Abstract

This study aims to evaluate the communication schemes of wireless communication systems to make reasonable decisions. Firstly, the wireless communication scheme is assessed based on the interval number technology, and the primary evaluation process and evaluation index system are described. Secondly, the analytic hierarchy process of interval numbers is studied. Besides, a decision model has been established for wireless communication scheme evaluation. Thirdly, the evaluation index of the wireless communication scheme is determined through the simulation analysis of the model. Finally, experiments verify the decision model for evaluating wireless communication schemes based on interval numbers. Channel encoding can be adjusted automatically and can effectively track electrical signals. The results demonstrate that under the same high signal-to-noise ratio (SNR), the error rate in the 16 quadrature amplitude modulation (QAM) mode decreases faster than that in the 2 frequency shift keying (FSK) mode, so the 16QAM mode is better than the 2FSK mode. Under a low SNR, the binary phase shift keying mode is superior to the 2FSK mode, and the 2FSK mode is superior to the 16QAM mode. The bit error rate of the communication signal in the additive white Gaussian noise channel is the lowest. These findings provide a solid foundation for a universal and scalable wireless communication system. This research has practical application value for scheme evaluation and model decision-making in the wireless communication field. Models need to be tested and evaluated based on large amounts of statistical data in future studies.

References

[1]
L. Zhang, M. Z. Chen, W. Tang, J. Y. Dai, L. Miao, X. Y. Zhou, S. Jin, Q. Cheng, and T. J. Cui, “A wireless communication scheme based on space- and frequency-division multiplexing using digital metasurfaces,” Nature electronics, vol. 4, no. 3, pp. 218–227, 2021.
[2]
M. Wang, X. Wang, L. T. Yang, X. Deng, and L. Yi, “Multi-sensor fusion based intelligent sensor relocation for health and safety monitoring in BSNs,” Information Fusion, vol. 54, pp. 61–71, 2020.
[3]
D. Zhang, X. Han, X. Han, and C. Deng, “Review on the research and practice of deep learning and reinforcement learning in smart grids,” CSEE Journal of Power and Energy Systems, vol. 4, no. 3, pp. 362–370, 2018.
[4]
R. Umar, F. Yang, H. Xu, and S. Mughal, “Multi‐level construction of polar--,” IET Communications, vol. 12, no. 10, pp. 1253–1262, 2018.
[5]
K. Takabayashi, H. Tanaka, C. Sugimoto, K. Sakakibara, and R. Kohno, “Performance evaluation of a quality of service control scheme in multi-hop WBAN based on IEEE 802.15.6,” Sensors, vol. 18, no. 11, p. 3969, 2018.
[6]
Y. Xu and X. Wang, “Three-way decision based on improved aggregation method of interval loss function,” Information Sciences, vol. 508, pp. 214–233, 2020.
[7]
B. I. Bakare and J. D. Enoch, “A review of simulation techniques for some wireless communication system [J],” International Journal of Electronics, Communications and Computer Engineering, vol. 10, no. 2, pp. 60–70, 2019.
[8]
A. Sarkar, J. Dey, and A. Bhowmik, “Multilayer neural network synchronized secured session key based encryption in wireless communication,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 14, no. 1, p. 169, 2019.
[9]
M. Jain, N. Sharma, A. Gupta, D. Rawal, and P. Garg, “Performance analysis of NOMA assisted underwater visible light communication system,” IEEE Wireless Communications Letters, vol. 9, no. 8, pp. 1291–1294, 2020.
[10]
S. Al-Rubaye, A. Al-Dulaimi, J. Cosmas, and A. Anpalagan, “Call admission control for non-standalone 5G ultra-dense networks,” IEEE Communications Letters, vol. 22, no. 5, pp. 1058–1061, 2018.
[11]
V. Suma, “Power efficient time-division random-access model based in wireless communication networks,” IRO Journal on Sustainable Wireless Systems, vol. 2, no. 4, pp. 155–159, 2021.
[12]
J.-Y. Choi, C. Mun, and J.-G. Yook, “Symbol-level selective channel estimation in packet-based OFDM systems,” Sensors, vol. 20, no. 5, p. 1274, 2020.
[13]
Q. Luo, C. Li, T. H. Luan, W. Shi, and W. Wu, “Self-Learning based computation offloading for internet of vehicles: model and algorithm,” IEEE Transactions on Wireless Communications, vol. 20, no. 9, pp. 5913–5925, 2021.
[14]
H. Sun, E. Viterbo, and R. Liu, “Efficient blind detection scheme based on simplified decoding of polar codes,” IEEE Wireless Communications Letters, vol. 10, no. 4, pp. 864–868, 2021.
[15]
D. Lee, Y. G. Sun, S. H. Kim, I. Sim, Y. M. Hwang, Y. Shin, D. I. Kim, and J. Y. Kim, “DQN-based adaptive modulation scheme over wireless communication channels,” IEEE Communications Letters, vol. 24, no. 6, pp. 1289–1293, 2020.
[16]
M. Dibaei and A. Ghaffari, “Full-duplex medium access control protocols in wireless networks: a survey,” Wireless Networks, vol. 26, no. 4, pp. 2825–2843, 2020.
[17]
M. S. Rusli, N. D. Kamarudin, A. A.-H. A. Rahman, and M. N. Marsono, “Evaluation of scheme selection and parameter effects in the reconfigurable transmitting power in wireless network-on-chip,” Science & Technology Research institute for Defence (Stride), vol. 181, p. 170, 2018.
[18]
W. Li, R. Li, K. Wu, R. Cheng, L. Su, and W. Cui, “Design and implementation of an SM2-based security authentication scheme with the key agreement for smart grid communications,” IEEE Access, vol. 6, pp. 71194–71207, 2018.
[19]
H. Lee, I. Jung, J. Heo, and D. Hong, “Exploiting intentional time-domain offset in downlink multicarrier NOMA systems,” IEEE Wireless Communications Letters, vol. 10, no. 7, pp. 1577–1580, 2021.
[20]
L. Zhu, D. J. Hill, and C. Lu, “Hierarchical deep learning machine for power system online transient stability prediction,” IEEE Transactions on Power Systems, vol. 35, no. 3, pp. 2399–2411, 2020.
[21]
G. Soni and K. Selvaradjou, “The finest superframe interval and GTS provision scheme (FSGPS) for time-sensitive IEEE 802.15. 4 applications [J],” SN Computer Science, vol. 2, no. 5, pp. 1–17, 2021.
[22]
S. Sreethar, N. Nandhagopal, S. Anbu Karuppusamy, and M. Dharmalingam, “SARC: s,” Wireless Networks, vol. 27, no. 6, pp. 3915–3926, 2021.
[23]
X. Liu, J. Yu, F. Li, W. Lv, Y. Wang, and X. Cheng, “Data aggregation in wireless sensor networks: from the ps,” IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6495–6513, 2020.
[24]
A. Chaisang and S. Promwong, “Experimental evaluation scheme of ultra-wideband human body transmission model for wireless body area network,” Sensors and Materials, vol. 30, no. 10, p. 2211, 2018.
[25]
S. Fu, X.-L. Qu, Y.-Z. Xiao, H.-J. Zhou, and G.-B. Fan, “Risky multi-attribute decision-making method based on the interval number of normal distribution,” Symmetry, vol. 12, no. 2, p. 264, 2020.
[26]
S. A. Busari, S. Mumtaz, S. Al-Rubaye, and J. Rodriguez, “5G m-wave mobile broadband: performance and challenges,” IEEE Communications Magazine, vol. 56, no. 6, pp. 137–143, 2018.
[27]
S. Verma, M. Ghazel, and M. Berbineau, “Model-based dependability evaluation of a wireless communication system in a virtually coupled train set,” IFAC-PapersOnLine, vol. 54, no. 2, pp. 179–186, 2021.
[28]
J. Zhang, H. Du, P. Zhang, J. Cheng, and L. Yang, “Performance analysis of 5G mobile relay systems for high-speed trains,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 12, pp. 2760–2772, 2020.
[29]
Q. Tian, J. Li, and H. Liu, “A method for guaranteeing wireless communication based on a combination of deep and shallow learning,” IEEE Access, vol. 7, pp. 38688–38695, 2019.
[30]
S. Lou, Y. Feng, Z. Li, H. Zheng, Y. Gao, and J. Tan, “An edge-based distributed decision-making method for product design scheme evaluation,” IEEE Transactions on Industrial Informatics, vol. 17, no. 2, pp. 1375–1385, 2021.
[31]
A. Arooj, M. S. Farooq, T. Umer, G. Rasool, and B. Wang, “Cyber physical and social networks in IoV (CPSN-IoV): a multimodal architecture in edge-based networks for optimal route selection using 5G t,” IEEE Access, vol. 8, pp. 33609–33630, 2020.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Security and Communication Networks
Security and Communication Networks  Volume 2022, Issue
2022
13851 pages
ISSN:1939-0114
EISSN:1939-0122
Issue’s Table of Contents
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 01 January 2022

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media