2024
DOI: 10.1109/jiot.2023.3321673
|View full text |Cite
|
Sign up to set email alerts
|

Source Selection and Resource Allocation in Wireless-Powered Relay Networks: An Adaptive Dynamic Programming-Based Approach

Ting Lyu,
Haitao Xu,
Long Zhang
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(8 citation statements)
references
References 52 publications
0
6
0
Order By: Relevance
“…The expansive path (decoding)includes upsampling blocks that consist of a transposed convolution that halves the number of feature channels, followed by concatenation with the cropped feature map from the contracting path ( Wang C. et al, 2023 ; Wang Q. et al, 2023 ; Zhang J. et al, 2024 ; Zhang X. et al, 2024 ; Zhao X. et al, 2024 ; Zhao L. et al, 2024 ). This convolution is followed by two convolutions, each followed by the ReLU activation and normal initialization, which refines the feature map and recover spatial information lost during downsampling ( Lyu et al, 2024 ). The final layer of the model is a convolution that maps the feature vector at each pixel to the desired number of classes ( Xu et al, 2023 ).…”
Section: Methodsmentioning
confidence: 99%
“…The expansive path (decoding)includes upsampling blocks that consist of a transposed convolution that halves the number of feature channels, followed by concatenation with the cropped feature map from the contracting path ( Wang C. et al, 2023 ; Wang Q. et al, 2023 ; Zhang J. et al, 2024 ; Zhang X. et al, 2024 ; Zhao X. et al, 2024 ; Zhao L. et al, 2024 ). This convolution is followed by two convolutions, each followed by the ReLU activation and normal initialization, which refines the feature map and recover spatial information lost during downsampling ( Lyu et al, 2024 ). The final layer of the model is a convolution that maps the feature vector at each pixel to the desired number of classes ( Xu et al, 2023 ).…”
Section: Methodsmentioning
confidence: 99%
“…Recent works have focused on throughput analysis of wireless-powered IoT networks in various scenarios [11][12][13][14] in different scenarios. Liu et al proposed an optimal transmission policy that maximizes the throughput of a mobile WPCN by optimally pairing the energy consumption of one transmission with the energy harvesting probability, considering the mobility of the energy access point and data access point and the resultant variable distances.…”
Section: Wireless Powered Communication Networkmentioning
confidence: 99%
“…files, URL content, code snippets for analysis or incident information from other security tools [109]. All the prompts to and the responses generated by the Copilot are saved in a database so there is a full inspection trail for investigators.…”
Section: Microsoft Security Copilotmentioning
confidence: 99%