Search Results - "Yanyi Rao"

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Characterization of Linearly Separable Boolean Functions: A Graph-Theoretic Perspective by Rao, Yanyi, Zhang, Xianda

    “…In this paper, we present a novel approach for studying Boolean function in a graph-theoretic perspective. In particular, we first transform a Boolean function…”
    Get full text
    Journal Article
  2. 2

    Deep Learning-Based Channel Prediction for Edge Computing Networks Toward Intelligent Connected Vehicles by Liu, Guangqun, Xu, Yan, He, Zongjiang, Rao, Yanyi, Xia, Junjuan, Fan, Liseng

    Published in IEEE access (2019)
    “…With the development of intelligent connected vehicles (ICVs), there emerge many new services and applications which involve intensive computation. To support…”
    Get full text
    Journal Article
  3. 3

    The Characterizations of Hyper‐Star Graphs Induced by Linearly Separable Boolean Functions by Rao, Yanyi, Zhang, Xianda

    Published in Chinese Journal of Electronics (01-01-2018)
    “…A hyper‐star is a graph consisting of the union of some hypercubes with at least one common vertex. The graph induced by a linearly separable Boolean function…”
    Get full text
    Journal Article
  4. 4

    Predictive precoding based on the Grassmannian manifold for UAV-enabled cache-assisted B5G communication systems by Zhou, Wen, Li, Xutao, Wu, Haiqing, Xu, Yihan, Zhou, Qingfeng, Rao, Yanyi

    “…The unmanned aerial vehicle (UAV) can extend the network coverage and improve the system throughput for 5th generation (5G) communication systems; hence, it…”
    Get full text
    Journal Article
  5. 5

    Joint User Pairing, Channel Assignment and Power Allocation in NOMA based CR Systems by Ali, Zain, Rao, Yanyi, Khan, Wali Ullah, Sidhu, Guftaar Ahmad Sardar

    Published in Applied sciences (01-10-2019)
    “…The fifth generation (5G) wireless communication systems promise to provide massive connectivity over the limited available spectrum. Various new transmission…”
    Get full text
    Journal Article
  6. 6

    Time- and Power-Splitting Strategies for Ambient Backscatter System by Ma, Zhe, He, Chen, Rao, Yanyi, Jiang, Jing, Ma, Shaodan, Gao, Feifei, Xing, Ling

    Published in IEEE access (2019)
    “…An ambient backscatter system could utilize the exiting ambient RF signals as both energy source and information carrier to enable the communications among…”
    Get full text
    Journal Article
  7. 7
  8. 8

    Relay selection for cooperative NOMA system over correlated fading channel by Zou, Deyue, Deng, Dan, Rao, Yanyi, Li, Xingwang, Yu, Kai

    Published in Physical communication (01-08-2019)
    “…The effect of correlated fading channel on outage probability for decode-and-forward (DF) relaying non-orthogonal multiple access (NOMA) system is studied in…”
    Get full text
    Journal Article
  9. 9

    When distributed switch-and-stay combining meets buffer in IoT relaying networks by Xia, Junjuan, Deng, Dan, Rao, Yanyi, Li, Dong, Zhu, Fusheng, Fan, Liseng

    Published in Physical communication (01-02-2020)
    “…This paper studies the IoT relaying networks, where one decode-and-forward (DF) relay equipped with a buffer helps determine whether to receive the data from…”
    Get full text
    Journal Article
  10. 10

    Joint offloading design and bandwidth allocation for RIS-aided multiuser MEC networks by Ge, Changyun, Rao, Yanyi, Ou, Jiangtao, Fan, Chengyuan, Ou, Jianghong, Fan, Dahua

    Published in Physical communication (01-08-2022)
    “…This article examines a multiuser intelligent reflecting surface (RIS) aided mobile edge computing (MEC) system, where multiple edge nodes (ENs) with powerful…”
    Get full text
    Journal Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    A Novel Blockchain-Based Federal Learning Framework with Multiple Appendable Sidechains by Gaolst, Haidong, Lin, Ning, Tan, Guolin, Hu, Faming, Liu, Shuxia, Zhan, Zhuo, Yi, Huan, Yang, Hui, Zhang, Mingyi, Rao, Yanyi

    “…Federated learning is a decentralized and cooperative machine learning method that combines privacy computing strategy. However, due to the network…”
    Get full text
    Conference Proceeding