首页 > 最新文献

2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)最新文献

英文 中文
Intelligent Assistance System for Visually Impaired/Blind People (ISVB) 视障人士/盲人智能辅助系统
Noha Ghatwary, Ahmed A. Alzughaibi, Ahmed Kantoush, A. Eltawil, Mohamed Ramadan, Mohamed Yasser
Visual impairments pose a parsing need to develop new automated systems to assist persons presenting visual impairments. The visual impairments have trouble interacting and sensing their surroundings. Their movement is limited and has to rely on a guided stick for them to move safely from one place to another. However, traditional canes have the disadvantage of failing to detect far-away obstacles and small objects. Therefore, this project is proposed to design and develop an Intelligent Assistance System for Visually Impaired People (ISVB). Our proposed system is composed of three interconnected parts, a smart cap, a 3D-printed intelligent cane and a mobile application that connects the system through an online server. The smart cap uses the Raspberry Pi and camera module, along with a deep learning object detection module for obstacle detection. The intelligent cane will provide the feasibility for the visually impaired person to walk without encountering problems by analyzing the surrounding environment through a microcontroller with multiple sensors and a bluetooth module. The mobile application interacts with the cap and the cane. Additionally, it will provide virtual navigation to help visually impaired people in their movement. To evaluate the performance of the system, different experiments for object detection, sensors and mobile applications have been conducted. The overall performance of the model showed an efficiency of 94.6 %.
视障人士需要开发新的自动化系统来帮助视障人士。视力受损的人在互动和感知周围环境方面有困难。它们的活动是有限的,必须依靠一根引导棒才能安全地从一个地方移动到另一个地方。然而,传统手杖的缺点是无法探测到远处的障碍物和小物体。因此,本项目提出设计和开发一个视障人士智能辅助系统(ISVB)。我们提出的系统由三个相互连接的部分组成,一个智能帽子,一个3d打印的智能手杖和一个通过在线服务器连接系统的移动应用程序。智能帽使用树莓派和摄像头模块,以及用于障碍物检测的深度学习对象检测模块。智能手杖将通过带有多个传感器和蓝牙模块的微控制器分析周围环境,为视障人士提供无障碍行走的可行性。移动应用程序与帽子和手杖交互。此外,它将提供虚拟导航,以帮助视障人士的行动。为了评估系统的性能,进行了不同的目标检测、传感器和移动应用实验。该模型的总体性能效率为94.6%。
{"title":"Intelligent Assistance System for Visually Impaired/Blind People (ISVB)","authors":"Noha Ghatwary, Ahmed A. Alzughaibi, Ahmed Kantoush, A. Eltawil, Mohamed Ramadan, Mohamed Yasser","doi":"10.1109/ICCSPA55860.2022.10019201","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019201","url":null,"abstract":"Visual impairments pose a parsing need to develop new automated systems to assist persons presenting visual impairments. The visual impairments have trouble interacting and sensing their surroundings. Their movement is limited and has to rely on a guided stick for them to move safely from one place to another. However, traditional canes have the disadvantage of failing to detect far-away obstacles and small objects. Therefore, this project is proposed to design and develop an Intelligent Assistance System for Visually Impaired People (ISVB). Our proposed system is composed of three interconnected parts, a smart cap, a 3D-printed intelligent cane and a mobile application that connects the system through an online server. The smart cap uses the Raspberry Pi and camera module, along with a deep learning object detection module for obstacle detection. The intelligent cane will provide the feasibility for the visually impaired person to walk without encountering problems by analyzing the surrounding environment through a microcontroller with multiple sensors and a bluetooth module. The mobile application interacts with the cap and the cane. Additionally, it will provide virtual navigation to help visually impaired people in their movement. To evaluate the performance of the system, different experiments for object detection, sensors and mobile applications have been conducted. The overall performance of the model showed an efficiency of 94.6 %.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124182796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Modulation Classification in Deep Learning 深度学习中的自动调制分类
Khawla A. Alnajjar, S. Ghunaim, Samreen Ansari
Due to the evolution and availability of vast amounts of data for transferring, receiving, and detection, the field of signal recognition and modulation classification has become vital in various fields and applications. Additionally, the classical approaches to machine learning (ML) no more can satisfy the current needs. Hence, this urged researchers to apply deep learning (DL) algorithms that have a very strong ability to train, learn, and automatically classify types of modulation categories. This paper focuses on three vital DL network algorithms, which are deep neural networks (DNN), convolutional neural networks (CNN), and deep belief networks (DBN). The mentioned algorithms are widely used in many applications for automatic modulation classification/recognition (AMC/AMR). Additionally, an empirical study is performed in this paper to compare a large number of different methods for the performance and recognition percentage of each considered technique.
由于传输、接收和检测的大量数据的发展和可用性,信号识别和调制分类领域在各个领域和应用中变得至关重要。此外,机器学习(ML)的经典方法已经不能满足当前的需求。因此,这促使研究人员应用深度学习(DL)算法,这种算法具有很强的训练、学习和自动分类调制类别类型的能力。本文重点介绍了三种重要的深度学习网络算法,即深度神经网络(DNN)、卷积神经网络(CNN)和深度信念网络(DBN)。上述算法被广泛应用于自动调制分类/识别(AMC/AMR)中。此外,本文还进行了一项实证研究,比较了大量不同方法的性能和每种考虑技术的识别率。
{"title":"Automatic Modulation Classification in Deep Learning","authors":"Khawla A. Alnajjar, S. Ghunaim, Samreen Ansari","doi":"10.1109/ICCSPA55860.2022.10019122","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019122","url":null,"abstract":"Due to the evolution and availability of vast amounts of data for transferring, receiving, and detection, the field of signal recognition and modulation classification has become vital in various fields and applications. Additionally, the classical approaches to machine learning (ML) no more can satisfy the current needs. Hence, this urged researchers to apply deep learning (DL) algorithms that have a very strong ability to train, learn, and automatically classify types of modulation categories. This paper focuses on three vital DL network algorithms, which are deep neural networks (DNN), convolutional neural networks (CNN), and deep belief networks (DBN). The mentioned algorithms are widely used in many applications for automatic modulation classification/recognition (AMC/AMR). Additionally, an empirical study is performed in this paper to compare a large number of different methods for the performance and recognition percentage of each considered technique.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127009408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of the Impact of DDoS Attack on Routing Protocols in Infrastructure-less Mobile Networks 无基础设施移动网络中DDoS攻击对路由协议影响的性能分析
M. Sultan, Hesham El-Sayed, M. A. Khan
A Mobil Ad hoc Network (MANET) is a dynamic multi-hop infrastructure-less wireless network that comprises of a collection of mobile, self-organized, self-configured wireless nodes. A routing protocol in MANET is used to find routes between mobile nodes to facilitate communication within the network. Numerous routing protocols have been proposed for MANET. Those routing protocols are designed to adaptively accommodate for dynamic unpredictable changes in network's topology. MANET characteristics such as openness, restricted resources and decentralization impact node's efficiency and made it easy to be affected by various security attacks, especially the Distributed Denial of Service (DDoS) attacks. These DDoS attacks consume all system resources like battery power, bandwidth, energy, CPU, and render those resources and nodes unavailable to the legitimate users. The aim of this research is to implement a simulation model called Distributed Denial of Service Simulation Model (DDoS-Sim) to examine the effect of DDoS attack on various routing protocols in MANETs namely: Ad hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Destination-Sequenced Distance-Vector (DSDV). These routing protocols follow the reactive and proactive routing algorithms. The introduced model uses the network simulator 2 (NS-2) to apply DDoS on the three selected routing protocols. The performance of routings protocols was analyzed under the consequences of the attack in terms of packet delivery fraction and end-to-end delay.
移动自组织网络(MANET)是一种动态的多跳无基础设施无线网络,由一组移动的、自组织的、自配置的无线节点组成。MANET中的路由协议用于查找移动节点之间的路由,以方便网络内的通信。针对MANET已经提出了许多路由协议。这些路由协议的设计是为了适应网络拓扑结构中不可预测的动态变化。MANET的开放性、有限性、去中心化等特点影响了节点的效率,容易受到各种安全攻击尤其是分布式拒绝服务攻击的影响。这些DDoS攻击消耗所有系统资源,如电池电量、带宽、能源、CPU等,并使这些资源和节点对合法用户不可用。本研究的目的是实现一个名为分布式拒绝服务仿真模型(DDoS- sim)的仿真模型,以检查DDoS攻击对manet中各种路由协议的影响,即:自组织按需距离矢量(AODV),动态源路由(DSR)和目的地顺序距离矢量(DSDV)。这些路由协议遵循被动路由算法和主动路由算法。介绍的模型使用网络模拟器2 (NS-2)对所选的三种路由协议进行DDoS应用。从分组分发率和端到端延迟两个方面分析了在攻击后果下路由协议的性能。
{"title":"Performance Analysis of the Impact of DDoS Attack on Routing Protocols in Infrastructure-less Mobile Networks","authors":"M. Sultan, Hesham El-Sayed, M. A. Khan","doi":"10.1109/ICCSPA55860.2022.10018968","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10018968","url":null,"abstract":"A Mobil Ad hoc Network (MANET) is a dynamic multi-hop infrastructure-less wireless network that comprises of a collection of mobile, self-organized, self-configured wireless nodes. A routing protocol in MANET is used to find routes between mobile nodes to facilitate communication within the network. Numerous routing protocols have been proposed for MANET. Those routing protocols are designed to adaptively accommodate for dynamic unpredictable changes in network's topology. MANET characteristics such as openness, restricted resources and decentralization impact node's efficiency and made it easy to be affected by various security attacks, especially the Distributed Denial of Service (DDoS) attacks. These DDoS attacks consume all system resources like battery power, bandwidth, energy, CPU, and render those resources and nodes unavailable to the legitimate users. The aim of this research is to implement a simulation model called Distributed Denial of Service Simulation Model (DDoS-Sim) to examine the effect of DDoS attack on various routing protocols in MANETs namely: Ad hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Destination-Sequenced Distance-Vector (DSDV). These routing protocols follow the reactive and proactive routing algorithms. The introduced model uses the network simulator 2 (NS-2) to apply DDoS on the three selected routing protocols. The performance of routings protocols was analyzed under the consequences of the attack in terms of packet delivery fraction and end-to-end delay.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127856989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of Real-Time Galileo Precise Point Positioning Using Different Dual-Frequency Ionosphere-Free Combinations 基于不同双频无电离层组合的实时伽利略精确点定位性能分析
M. Abdelazeem
Presently, Galileo satellites are transmitting multi-frequency signals which provides opportunity to enhance Galileo precise point positioning (PPP) accuracy. The objective of this research is to investigate the performance of real-time Galileo-only PPP solution using the Galileo open service (OS) E1, E5a, E5b and E5 signals. Different dual-frequency ionosphere-free Galileo-only PPP processing models are used including, the E1/E5a PPP, E1/E5b PPP and E1/E5 PPP. The real-time precise orbit and clock products available from the Centre National d'Etudes Spatiales (CNES) are used in order to simulate the real-time mode. GPS/Galileo observations, spanning three successive days, from a number of globally distributed reference stations are acquired. Then, the datasets are processed using real-time PPP solution in static and semi-kinematic modes. The traditional real-time GPS L1/L2 PPP solution is used as a reference. The estimated convergence time and positioning accuracy is assessed and then compared with the GPS L1/L2 PPP solution counterparts. It is found that the overall 3D positioning accuracy is enhanced by about 11%, 6% and 8% for the Galileo E1/E5a PPP, E1/E5b PPP and E1/E5 PPP solutions, respectively, with respect to the GPS PPP solution counterparts in static mode. Additionally, improvements in the 3D position by about 25%, 11% and 17% are acquired from the Galileo E1/E5a PPP, E1/E5b PPP and E1/E5 PPP solutions, respectively, compared with the GPS L1/L2 PPP solution in semi-kinematic mode.
目前,伽利略卫星正在传输多频信号,这为提高伽利略精确点定位(PPP)精度提供了机会。本研究的目的是研究使用伽利略开放服务(OS) E1、E5a、E5b和E5信号的实时Galileo-only PPP解决方案的性能。采用了E1/E5a PPP、E1/E5b PPP和E1/E5 PPP等不同的双频无电离层纯伽利略PPP处理模式。利用法国国家空间研究中心(CNES)提供的实时精确轨道和时钟产品来模拟实时模式。从若干全球分布的参考站获得连续三天的GPS/伽利略观测数据。然后,使用实时PPP解决方案在静态和半运动模式下对数据集进行处理。参考传统的实时GPS L1/L2 PPP解决方案。评估估计的收敛时间和定位精度,然后与GPS L1/L2 PPP解决方案进行比较。研究发现,与静态模式下的GPS PPP方案相比,Galileo E1/E5a PPP方案、E1/E5b PPP方案和E1/E5 PPP方案的整体三维定位精度分别提高了约11%、6%和8%。此外,在半运动学模式下,与GPS L1/L2 PPP方案相比,Galileo E1/E5a PPP方案、E1/E5b PPP方案和E1/E5 PPP方案的三维定位分别提高了约25%、11%和17%。
{"title":"Performance Analysis of Real-Time Galileo Precise Point Positioning Using Different Dual-Frequency Ionosphere-Free Combinations","authors":"M. Abdelazeem","doi":"10.1109/ICCSPA55860.2022.10019062","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019062","url":null,"abstract":"Presently, Galileo satellites are transmitting multi-frequency signals which provides opportunity to enhance Galileo precise point positioning (PPP) accuracy. The objective of this research is to investigate the performance of real-time Galileo-only PPP solution using the Galileo open service (OS) E1, E5a, E5b and E5 signals. Different dual-frequency ionosphere-free Galileo-only PPP processing models are used including, the E1/E5a PPP, E1/E5b PPP and E1/E5 PPP. The real-time precise orbit and clock products available from the Centre National d'Etudes Spatiales (CNES) are used in order to simulate the real-time mode. GPS/Galileo observations, spanning three successive days, from a number of globally distributed reference stations are acquired. Then, the datasets are processed using real-time PPP solution in static and semi-kinematic modes. The traditional real-time GPS L1/L2 PPP solution is used as a reference. The estimated convergence time and positioning accuracy is assessed and then compared with the GPS L1/L2 PPP solution counterparts. It is found that the overall 3D positioning accuracy is enhanced by about 11%, 6% and 8% for the Galileo E1/E5a PPP, E1/E5b PPP and E1/E5 PPP solutions, respectively, with respect to the GPS PPP solution counterparts in static mode. Additionally, improvements in the 3D position by about 25%, 11% and 17% are acquired from the Galileo E1/E5a PPP, E1/E5b PPP and E1/E5 PPP solutions, respectively, compared with the GPS L1/L2 PPP solution in semi-kinematic mode.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132658008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safe Reinforcement Learning using Data-Driven Predictive Control 使用数据驱动的预测控制的安全强化学习
Mahmoud Selim, Amr Alanwar, M. El-Kharashi, Hazem Abbas, K. Johansson
Reinforcement learning (RL) algorithms can achieve state-of-the-art performance in decision-making and continuous control tasks. However, applying RL algorithms on safety-critical systems still needs to be well justified due to the exploration nature of many RL algorithms, especially when the model of the robot and the environment are unknown. To address this challenge, we propose a data-driven safety layer that acts as a filter for unsafe actions. The safety layer uses a data-driven predictive controller to enforce safety guarantees for RL policies during training and after deployment. The RL agent proposes an action that is verified by computing the data-driven reachability analysis. If there is an intersection between the reachable set of the robot using the proposed action, we call the data-driven predictive controller to find the closest safe action to the proposed unsafe action. The safety layer penalizes the RL agent if the proposed action is unsafe and replaces it with the closest safe one. In the simulation, we show that our method outperforms state-of-the-art safe RL methods on the robotics navigation problem for a Turtlebot 3 in Gazebo and a quadrotor in Unreal Engine 4 (UE4).
强化学习(RL)算法可以在决策和连续控制任务中达到最先进的性能。然而,由于许多强化学习算法的探索性质,特别是在机器人模型和环境未知的情况下,在安全关键系统上应用强化学习算法仍然需要充分的理由。为了应对这一挑战,我们提出了一个数据驱动的安全层,作为不安全操作的过滤器。安全层使用数据驱动的预测控制器在训练期间和部署后对RL策略实施安全保证。RL代理提出一个操作,该操作通过计算数据驱动的可达性分析来验证。如果使用建议动作的机器人的可达集合之间存在交集,我们调用数据驱动的预测控制器来找到与建议的不安全动作最近的安全动作。如果提议的操作不安全,安全层会惩罚RL代理,并用最接近的安全操作替换它。在模拟中,我们表明我们的方法优于最先进的安全RL方法在Gazebo中的Turtlebot 3和虚幻引擎4 (UE4)中的四旋翼机器人导航问题上。
{"title":"Safe Reinforcement Learning using Data-Driven Predictive Control","authors":"Mahmoud Selim, Amr Alanwar, M. El-Kharashi, Hazem Abbas, K. Johansson","doi":"10.1109/ICCSPA55860.2022.10018994","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10018994","url":null,"abstract":"Reinforcement learning (RL) algorithms can achieve state-of-the-art performance in decision-making and continuous control tasks. However, applying RL algorithms on safety-critical systems still needs to be well justified due to the exploration nature of many RL algorithms, especially when the model of the robot and the environment are unknown. To address this challenge, we propose a data-driven safety layer that acts as a filter for unsafe actions. The safety layer uses a data-driven predictive controller to enforce safety guarantees for RL policies during training and after deployment. The RL agent proposes an action that is verified by computing the data-driven reachability analysis. If there is an intersection between the reachable set of the robot using the proposed action, we call the data-driven predictive controller to find the closest safe action to the proposed unsafe action. The safety layer penalizes the RL agent if the proposed action is unsafe and replaces it with the closest safe one. In the simulation, we show that our method outperforms state-of-the-art safe RL methods on the robotics navigation problem for a Turtlebot 3 in Gazebo and a quadrotor in Unreal Engine 4 (UE4).","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125427696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SigT: An Efficient End-to-End MIMO-OFDM Receiver Framework Based on Transformer 基于变压器的高效端到端MIMO-OFDM接收机框架
Ziyou Ren, Nan Cheng, Ruijin Sun, Xiucheng Wang, N. Lu, Wenchao Xu
Multiple-input multiple-output and orthogonal frequency-division multiplexing (MIMO-OFDM) are the key technologies in 4G and subsequent wireless communication systems. Conventionally, the MIMO-OFDM receiver is performed by multiple cascaded blocks with different functions and the algorithm in each block is designed based on ideal assumptions of wireless channel distributions. However, these assumptions may fail in practical complex wireless environments. The deep learning (DL) method has the ability to capture key features from complex and huge data. In this paper, a novel end-to-end MIMO-OFDM receiver framework based on transformer, named SigT, is proposed. By regarding the signal received from each antenna as a token of the transformer, the spatial correlation of different antennas can be learned and the critical zero-shot problem can be mitigated. Furthermore, the proposed SigT framework can work well without the inserted pilots, which improves the useful data transmission efficiency. Experiment results show that SigT achieves much higher performance in terms of signal recovery accuracy than benchmark methods, even in a low SNR environment or with a small number of training samples. Code is available at https://github.com/SigTransformer/SigT.
多输入多输出和正交频分复用(MIMO-OFDM)是4G及后续无线通信系统的关键技术。传统的MIMO-OFDM接收机是由多个功能不同的级联模块来实现的,每个模块中的算法都是基于理想的无线信道分布假设来设计的。然而,这些假设在实际复杂的无线环境中可能会失败。深度学习(DL)方法具有从复杂和庞大的数据中捕获关键特征的能力。本文提出了一种基于变压器的端到端MIMO-OFDM接收机框架——SigT。将每个天线接收到的信号作为变压器的表征,可以了解不同天线之间的空间相关性,从而缓解临界零弹问题。此外,所提出的SigT框架可以在不插入导频的情况下很好地工作,提高了有用数据的传输效率。实验结果表明,即使在低信噪比环境或训练样本数量较少的情况下,SigT在信号恢复精度方面也比基准方法具有更高的性能。代码可从https://github.com/SigTransformer/SigT获得。
{"title":"SigT: An Efficient End-to-End MIMO-OFDM Receiver Framework Based on Transformer","authors":"Ziyou Ren, Nan Cheng, Ruijin Sun, Xiucheng Wang, N. Lu, Wenchao Xu","doi":"10.1109/ICCSPA55860.2022.10019001","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019001","url":null,"abstract":"Multiple-input multiple-output and orthogonal frequency-division multiplexing (MIMO-OFDM) are the key technologies in 4G and subsequent wireless communication systems. Conventionally, the MIMO-OFDM receiver is performed by multiple cascaded blocks with different functions and the algorithm in each block is designed based on ideal assumptions of wireless channel distributions. However, these assumptions may fail in practical complex wireless environments. The deep learning (DL) method has the ability to capture key features from complex and huge data. In this paper, a novel end-to-end MIMO-OFDM receiver framework based on transformer, named SigT, is proposed. By regarding the signal received from each antenna as a token of the transformer, the spatial correlation of different antennas can be learned and the critical zero-shot problem can be mitigated. Furthermore, the proposed SigT framework can work well without the inserted pilots, which improves the useful data transmission efficiency. Experiment results show that SigT achieves much higher performance in terms of signal recovery accuracy than benchmark methods, even in a low SNR environment or with a small number of training samples. Code is available at https://github.com/SigTransformer/SigT.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124973790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Modeling of Reliability in Extreme Edge Computing Systems 极限边缘计算系统可靠性建模研究
Mhd Saria Allahham, Amr Mohamed, A. Erbad, H. Hassanein
Extreme edge computing (EEC) refers to the end-most part of edge computing wherein computational tasks and edge services are deployed only on extreme edge devices (EEDs). EEDs are consumer or user-owned devices that offer computational resources, which may consist of wearable devices, personal mobile devices, drones, etc. Such devices are opportunistically or naturally present within the proximity of other user devices. Hence, utilizing EEDs to deploy edge services or perform computational tasks fulfills the promise of edge computing of bringing the services and computation as close as possible to the end-users. However, the lack of knowledge and control over the EEDs computational resources raises a red flag, since executing the computational tasks successfully becomes doubtful. To this end, we aim to study the EEDs randomness from the computational perspective, and how reliable is an EED in terms of executing the tasks on time. Specifically, we provide a reliability model for the EEDs that takes into account the probabilistic nature of the availability of the EEDs' computational resources. Moreover, we study the reliability of executing different types of computational tasks in EEC systems that are distributed across the EEDs. Lastly, we carry out experimental results to analyze the EEDs and the EEC systems' reliability behavior in different scenarios.
极端边缘计算(EEC)是指边缘计算的最末端部分,其中计算任务和边缘服务仅部署在极端边缘设备(eed)上。电子产品是提供计算资源的消费者或用户拥有的设备,可能包括可穿戴设备、个人移动设备、无人机等。这样的设备偶然地或自然地出现在其他用户设备的附近。因此,利用eed部署边缘服务或执行计算任务实现了边缘计算的承诺,即使服务和计算尽可能接近最终用户。然而,缺乏对eed计算资源的了解和控制引发了一个危险信号,因为成功执行计算任务变得令人怀疑。为此,我们旨在从计算的角度研究EED的随机性,以及EED在按时执行任务方面的可靠性。具体来说,我们提供了一个考虑到eed计算资源可用性的概率性质的eed可靠性模型。此外,我们还研究了分布在各个EEC系统中的不同类型计算任务的执行可靠性。最后,通过实验结果分析了不同工况下的电磁驱动和电磁驱动系统的可靠性行为。
{"title":"On the Modeling of Reliability in Extreme Edge Computing Systems","authors":"Mhd Saria Allahham, Amr Mohamed, A. Erbad, H. Hassanein","doi":"10.1109/ICCSPA55860.2022.10019108","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019108","url":null,"abstract":"Extreme edge computing (EEC) refers to the end-most part of edge computing wherein computational tasks and edge services are deployed only on extreme edge devices (EEDs). EEDs are consumer or user-owned devices that offer computational resources, which may consist of wearable devices, personal mobile devices, drones, etc. Such devices are opportunistically or naturally present within the proximity of other user devices. Hence, utilizing EEDs to deploy edge services or perform computational tasks fulfills the promise of edge computing of bringing the services and computation as close as possible to the end-users. However, the lack of knowledge and control over the EEDs computational resources raises a red flag, since executing the computational tasks successfully becomes doubtful. To this end, we aim to study the EEDs randomness from the computational perspective, and how reliable is an EED in terms of executing the tasks on time. Specifically, we provide a reliability model for the EEDs that takes into account the probabilistic nature of the availability of the EEDs' computational resources. Moreover, we study the reliability of executing different types of computational tasks in EEC systems that are distributed across the EEDs. Lastly, we carry out experimental results to analyze the EEDs and the EEC systems' reliability behavior in different scenarios.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116392894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1