{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T04:29:35Z","timestamp":1772166575921,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T00:00:00Z","timestamp":1615248000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T00:00:00Z","timestamp":1615248000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971053"],"award-info":[{"award-number":["61971053"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Combining unmanned aerial vehicles (UAVs) with 6G, Internet of Things (IoT) and other emerging communication technologies could better satisfy various IoT applications and create more innovative services. This paper develops a novel hierarchical 6G IoT network with UAVs in the sky and intelligent reflective surface (IRS) equipped. The system employs backscattering communication (BackCom) to transmit data in a free-ride manner. Through beamforming, IRS enhances the energy of the reflectable signal, thereby improving the distance and performance of the BackCom. Simulation results reveal that our approach makes a significant improvement to the performance of the whole system and takes obvious advantage over traditional solutions.<\/jats:p>","DOI":"10.1186\/s13638-021-01932-4","type":"journal-article","created":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T04:03:37Z","timestamp":1615262617000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Deep learning-based BackCom multiple beamforming for 6G UAV IoT networks"],"prefix":"10.1186","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2633-5023","authenticated-orcid":false,"given":"Fei","family":"Qi","sequence":"first","affiliation":[]},{"given":"Wenjing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Fanqin","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,9]]},"reference":[{"issue":"3","key":"1932_CR1","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MNET.2015.7113226","volume":"29","author":"S Sun","year":"2015","unstructured":"S. Sun, M. Kadoch, L. Gong, B. Rong, Integrating network function virtualization with SDR and SDN for 4G\/5G networks. IEEE Netw. 29(3), 54\u201359 (2015)","journal-title":"IEEE Netw"},{"issue":"6","key":"1932_CR2","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MCOM.2015.7120046","volume":"53","author":"N Zhang","year":"2015","unstructured":"N. Zhang, N. Cheng, A.T. Gamage, K. Zhang, J.W. Mark, X. Shen, Cloud assisted HetNets toward 5G wireless networks. IEEE Commun. Mag. 53(6), 59\u201365 (2015)","journal-title":"IEEE Commun Mag"},{"issue":"3","key":"1932_CR3","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1109\/TBC.2012.2199598","volume":"58","author":"Y Wu","year":"2012","unstructured":"Y. Wu, B. Rong, K. Salehian, G. Gagnon, Cloud transmission: a new spectrum-reuse friendly digital terrestrial broadcasting transmission system. IEEE Trans. Broadcast. 58(3), 329\u2013337 (2012)","journal-title":"IEEE Trans Broadcast"},{"issue":"4","key":"1932_CR4","doi-asserted-by":"publisher","first-page":"2509","DOI":"10.1109\/TVT.2007.912595","volume":"57","author":"B Rong","year":"2008","unstructured":"B. Rong, Y. Qian, K. Lu, H. Chen, M. Guizani, Call admission control optimization in WiMAX networks. IEEE Trans. Veh. Technol. 57(4), 2509\u20132522 (2008)","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"1932_CR5","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MWC.2017.1600139WC","volume":"24","author":"N Chen","year":"2017","unstructured":"N. Chen, B. Rong, X. Zhang, M. Kadoch, Scalable and flexible massive MIMO precoding for 5G H-CRAN. IEEE Wirel. Commun. 24(1), 46\u201352 (2017)","journal-title":"IEEE Wirel Commun"},{"issue":"6","key":"1932_CR6","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TMC.2007.1028","volume":"6","author":"B Rong","year":"2007","unstructured":"B. Rong, Y. Qian, K. Lu, Integrated downlink resource management for multiservice WiMAX networks. IEEE Trans. Mob. Comput. 6(6), 621\u2013632 (2007)","journal-title":"IEEE Trans Mob Comput"},{"issue":"11","key":"1932_CR7","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/MCOM.2015.7321983","volume":"53","author":"S Sun","year":"2015","unstructured":"S. Sun, L. Gong, B. Rong, K. Lu, An intelligent SDN framework for 5G heterogeneous networks. IEEE Commun. Mag. 53(11), 142\u2013147 (2015)","journal-title":"IEEE Commun Mag"},{"key":"1932_CR8","unstructured":"Networking Index, C.V.,\u00a0Cisco visual networking index: forecast and methodology, 2016\u20132021; white paper; Cisco Systems, Inc.: San Jose, CA, USA, 2017"},{"issue":"1","key":"1932_CR9","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/TAP.2013.2287296","volume":"62","author":"SV Hum","year":"2014","unstructured":"S.V. Hum, J. Perruisseau-Carrier, Reconfigurable reflectarrays and array lenses for dynamic antenna beam control: a review. IEEE Trans. Antennas Propag. 62(1), 183\u2013198 (2014)","journal-title":"IEEE Trans Antennas Propag"},{"issue":"8","key":"1932_CR10","doi-asserted-by":"publisher","first-page":"1004","DOI":"10.1049\/iet-com.2010.0544","volume":"6","author":"L Subrt","year":"2012","unstructured":"L. Subrt, P. Pechac, Intelligent walls as autonomous parts of smart indoor environments. IET Commun. 6(8), 1004\u20131010 (2012)","journal-title":"IET Commun"},{"issue":"3","key":"1932_CR11","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1109\/TCOMM.2013.120713.130417","volume":"62","author":"C Boyer","year":"2014","unstructured":"C. Boyer, S. Roy, Backscatter communication and RFID: coding, energy, and MIMO analysis. IEEE Trans. Commun. 62(3), 770\u2013785 (2014)","journal-title":"IEEE Trans Commun"},{"issue":"3","key":"1932_CR12","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1109\/JSTSP.2016.2520912","volume":"10","author":"F Sohrabi","year":"2016","unstructured":"F. Sohrabi, W. Yu, Hybrid digital and analog beamforming design for large-scale antenna arrays. IEEE J. Sel. Top. Signal Process. 10(3), 501\u2013513 (2016)","journal-title":"IEEE J Sel Top Signal Process"},{"key":"1932_CR13","doi-asserted-by":"crossref","unstructured":"C. Huang, A. Zappone, M. Debbah, C. Yuen, Achievable rate maximization by passive intelligent mirrors, in Proceedings of IEEE ICASSP (2018)","DOI":"10.1109\/ICASSP.2018.8461496"},{"issue":"10","key":"1932_CR14","doi-asserted-by":"publisher","first-page":"e218","DOI":"10.1038\/lsa.2014.99","volume":"3","author":"TJ Cui","year":"2014","unstructured":"T.J. Cui, M.Q. Qi, X. Wan, J. Zhao, Q. Cheng, Coding metamaterials, digital metamaterials and programmable metamaterials. Light Sci. Appl. 3(10), e218 (2014)","journal-title":"Light Sci Appl"},{"key":"1932_CR15","doi-asserted-by":"publisher","unstructured":"Y. Heryadi, H.L.H.S. Warnars, Learning temporal representation of transaction amount for fraudulent transaction recognition using CNN, Stacked LSTM, and CNN-LSTM, in 2017 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom), Phuket (2017), pp. 84\u201389. https:\/\/doi.org\/10.1109\/CYBERNETICSCOM.2017.8311689","DOI":"10.1109\/CYBERNETICSCOM.2017.8311689"},{"key":"1932_CR16","doi-asserted-by":"publisher","first-page":"2161","DOI":"10.1109\/ACCESS.2018.2887138","volume":"7","author":"C Wang","year":"2019","unstructured":"C. Wang, D. Han, Q. Liu, S. Luo, A deep learning approach for credit scoring of peer-to-peer lending using attention mechanism LSTM. IEEE Access 7, 2161\u20132168 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2018.2887138","journal-title":"IEEE Access"},{"key":"1932_CR17","doi-asserted-by":"publisher","unstructured":"Z. Wang, Y. Lou, Hydrological time series forecast model based on wavelet de-noising and ARIMA-LSTM, in 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China (2019), pp. 1697\u20131701. https:\/\/doi.org\/10.1109\/ITNEC.2019.8729441","DOI":"10.1109\/ITNEC.2019.8729441"},{"key":"1932_CR18","doi-asserted-by":"publisher","unstructured":"C. Guo, R. Lin, Analysis of weather and exercise steps based on LSTM neural network, in 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China (2019), pp. 474\u2013478. https:\/\/doi.org\/10.1109\/ITNEC.2019.8729294","DOI":"10.1109\/ITNEC.2019.8729294"},{"key":"1932_CR19","doi-asserted-by":"publisher","unstructured":"J. Li, L. Lu, C. Liu, Y. Gong, Exploring layer trajectory LSTM with depth processing units and attention, in 2018 IEEE Spoken Language Technology Workshop (SLT), Athens, Greece (2018), pp. 456\u2013462. https:\/\/doi.org\/10.1109\/SLT.2018.8639637","DOI":"10.1109\/SLT.2018.8639637"},{"key":"1932_CR20","doi-asserted-by":"publisher","unstructured":"X. Hu, X. Wei, Y. Gao, W. Zhuang, M. Chen, H. Lv, An attention-mechanism-based traffic flow prediction scheme for smart city, in 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco (2019), pp. 1822\u20131827. https:\/\/doi.org\/10.1109\/IWCMC.2019.8766639","DOI":"10.1109\/IWCMC.2019.8766639"},{"key":"1932_CR21","doi-asserted-by":"publisher","unstructured":"Y. Yu, G. Liu, H. Yan, H. Li, H. Guan, Attention-based bi-LSTM model for anomalous HTTP traffic detection, in 2018 15th International Conference on Service Systems and Service Management (ICSSSM), Hangzhou (2018), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICSSSM.2018.8465034","DOI":"10.1109\/ICSSSM.2018.8465034"},{"key":"1932_CR22","unstructured":"H. Zhao, M. Cai, H.  Liu, Two-dimensional DOA estimation with reduced-dimension MUSIC algorithm, in 2017 International Applied Computational Electromagnetics Society Symposium (ACES), Suzhou (2017), pp. 1\u20132"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-021-01932-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-021-01932-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-021-01932-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T04:13:57Z","timestamp":1615263237000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-021-01932-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,9]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["1932"],"URL":"https:\/\/doi.org\/10.1186\/s13638-021-01932-4","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-108737\/v1","asserted-by":"object"},{"id-type":"doi","id":"10.21203\/rs.3.rs-108737\/v2","asserted-by":"object"}]},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,9]]},"assertion":[{"value":"11 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"50"}}