首页 > 最新文献

2021 IEEE International Conference on Communications Workshops (ICC Workshops)最新文献

英文 中文
Fractionally Spaced Equalizer for Next Generation Terahertz Wireless Communication Systems 新一代太赫兹无线通信系统的分数间隔均衡器
Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473698
Qiaoyang Ye, Joonyoung Cho, Jeongho Jeon, S. Abu-Surra, Kitaek Bae, Jianzhong Zhang
Higher data rates are required to support exponential growth in wireless traffic, motivating an expansion of the transmission bandwidth for sixth generation (6G) communications. The available bandwidth in the terahertz (THz) band significantly exceeds the available bandwidth in the mmWave band that has been adopted in fifth generation (5G) systems; thus, the THz band is envisioned as a pillar for 6G systems that can support data rates on the order of terabits per second (Tb/s). However, wireless communications in the THz band poses several new challenges. One of these challenges involves the practical constraint of employing a limited oversampling factor to process wideband THz signals, even while leveraging state-of-the-art analog/digital converter techniques. This limited oversampling factor – which can lead to an increased sampling timing offset – degrades the demodulation performance when it is employed in conjunction with a conventional symbol-spaced equalizer. Thus, we employ a fractionally spaced equalizer (FSE) in a THz communication system to overcome the impact of the increased sampling timing offset for a practical system that utilizes a limited sampling rate. Analysis and simulations demonstrate that the FSE can perfectly compensate the timing offset by optimally combining the available samples. Also, an approximation to the noise covariance matrix is proposed to reduce the computational complexity of the frequency-domain FSE.
为了支持无线通信的指数级增长,需要更高的数据速率,从而推动第六代(6G)通信传输带宽的扩展。太赫兹(THz)频段的可用带宽大大超过第五代(5G)系统中采用的毫米波频段的可用带宽;因此,太赫兹频段被设想为6G系统的支柱,可以支持每秒太比特(Tb/s)数量级的数据速率。然而,太赫兹波段的无线通信提出了几个新的挑战。其中一个挑战涉及使用有限过采样因子来处理宽带太赫兹信号的实际限制,即使在利用最先进的模拟/数字转换器技术时也是如此。当与传统的符号间隔均衡器结合使用时,这种有限的过采样因子会导致采样时间偏移增加,从而降低解调性能。因此,我们在太赫兹通信系统中采用分数间隔均衡器(FSE)来克服采样时间偏移增加对利用有限采样率的实际系统的影响。分析和仿真结果表明,FSE可以通过对现有采样的优化组合,很好地补偿时序偏移。同时,提出了噪声协方差矩阵的近似方法来降低频域FSE的计算复杂度。
{"title":"Fractionally Spaced Equalizer for Next Generation Terahertz Wireless Communication Systems","authors":"Qiaoyang Ye, Joonyoung Cho, Jeongho Jeon, S. Abu-Surra, Kitaek Bae, Jianzhong Zhang","doi":"10.1109/ICCWorkshops50388.2021.9473698","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473698","url":null,"abstract":"Higher data rates are required to support exponential growth in wireless traffic, motivating an expansion of the transmission bandwidth for sixth generation (6G) communications. The available bandwidth in the terahertz (THz) band significantly exceeds the available bandwidth in the mmWave band that has been adopted in fifth generation (5G) systems; thus, the THz band is envisioned as a pillar for 6G systems that can support data rates on the order of terabits per second (Tb/s). However, wireless communications in the THz band poses several new challenges. One of these challenges involves the practical constraint of employing a limited oversampling factor to process wideband THz signals, even while leveraging state-of-the-art analog/digital converter techniques. This limited oversampling factor – which can lead to an increased sampling timing offset – degrades the demodulation performance when it is employed in conjunction with a conventional symbol-spaced equalizer. Thus, we employ a fractionally spaced equalizer (FSE) in a THz communication system to overcome the impact of the increased sampling timing offset for a practical system that utilizes a limited sampling rate. Analysis and simulations demonstrate that the FSE can perfectly compensate the timing offset by optimally combining the available samples. Also, an approximation to the noise covariance matrix is proposed to reduce the computational complexity of the frequency-domain FSE.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Passive WiFi CSI Sensing Based Machine Learning Framework for COVID-Safe Occupancy Monitoring 基于被动WiFi CSI传感的新冠病毒安全占用监测机器学习框架
Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473673
Aryan Sharma, Junye Li, Deepak Mishra, G. Batista, Aruna Seneviratne
The COVID-19 pandemic requires social distancing to prevent transmission of the virus. Monitoring social distancing is difficult and expensive, especially in "travel corridors" such as elevators and commercial spaces. This paper describes a low-cost and non-intrusive method to monitor social distancing within a given space, using Channel State Information (CSI) from passive WiFi sensing. By exploiting the frequency selective behaviour of CSI with a cubic SVM classifier, we count the number of people in an elevator with an accuracy of 92%, and count the occupancy of an office to 97%. As opposed to using a multi-class counting approach, this paper aggregates CSI for the occupancies below and above a COVID-Safe limit. We show that this binary classification approach to the COVID safe decision problem has similar or better accuracy outcomes with much lower computational complexity, allowing for real-world implementation on IoT embedded devices. Robustness and scalability is demonstrated through experimental validation in practical scenarios with varying occupants, different environment settings and interference from other WiFi devices.
COVID-19大流行需要保持社会距离,以防止病毒传播。监测社交距离既困难又昂贵,特别是在电梯和商业空间等“旅行走廊”。本文描述了一种低成本、非侵入性的方法,利用被动WiFi感知的信道状态信息(CSI)来监测给定空间内的社交距离。通过利用三次支持向量机分类器的频率选择行为,我们以92%的准确率计算电梯中的人数,并以97%的准确率计算办公室的占用率。与使用多类计数方法不同,本文对低于和高于COVID-Safe限制的入住率汇总CSI。我们表明,这种针对COVID安全决策问题的二元分类方法具有相似或更好的准确性结果,且计算复杂性低得多,允许在物联网嵌入式设备上实现现实世界。鲁棒性和可扩展性通过实验验证,在不同的居住者、不同的环境设置和其他WiFi设备的干扰的实际场景中得到验证。
{"title":"Passive WiFi CSI Sensing Based Machine Learning Framework for COVID-Safe Occupancy Monitoring","authors":"Aryan Sharma, Junye Li, Deepak Mishra, G. Batista, Aruna Seneviratne","doi":"10.1109/ICCWorkshops50388.2021.9473673","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473673","url":null,"abstract":"The COVID-19 pandemic requires social distancing to prevent transmission of the virus. Monitoring social distancing is difficult and expensive, especially in \"travel corridors\" such as elevators and commercial spaces. This paper describes a low-cost and non-intrusive method to monitor social distancing within a given space, using Channel State Information (CSI) from passive WiFi sensing. By exploiting the frequency selective behaviour of CSI with a cubic SVM classifier, we count the number of people in an elevator with an accuracy of 92%, and count the occupancy of an office to 97%. As opposed to using a multi-class counting approach, this paper aggregates CSI for the occupancies below and above a COVID-Safe limit. We show that this binary classification approach to the COVID safe decision problem has similar or better accuracy outcomes with much lower computational complexity, allowing for real-world implementation on IoT embedded devices. Robustness and scalability is demonstrated through experimental validation in practical scenarios with varying occupants, different environment settings and interference from other WiFi devices.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Block-D2D: Blockchain-enabled Cooperative D2D-assisted Fog Computing Scheme under Imperfect CSI Block-D2D:不完全CSI下的区块链协同d2d辅助雾计算方案
Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473524
Rajesh Gupta, Tejal Rathod, S. Tanwar
Fog computing (FC) supports cloud computing services at the edge of the device for more secure and reliable access and processing of the stored data. However, it is beneficial for time-sensitive applications, where the required delay is minimum, but not well suited for mission-critical applications, where the required delay is negligible. To fulfill this requirement, the authors worldwide started integrating FC with device-to-device (D2D) communication. But it was potentially affected by massive interference, which does not improve the total sum rate and secrecy capacity of the wireless channel. Motivated from these gaps, in this paper, we propose a blockchain-enabled cooperative D2D-assisted FC scheme under imperfect CSI in the presence of an eavesdropper called Block-D2D to enhance the total sum rate and secrecy capacity. We used non-orthogonal multiple access (NOMA) scheme for D2D pairs to improve the aforementioned characteristics. Still, the data on the device is not fully secure, which can be modified by any malicious user. This can be protected using blockchain technology, which is immutable, secure, and trusted. To improve the secrecy capacity of the network and spectral efficiency, we used a cooperative game theory. Simulation results show that the elevated performance of the NOMA-based Block-D2D scheme compared to the conventional OFDMA scheme in terms of sum rate, secrecy capacity, and system throughput.
雾计算(FC)支持设备边缘的云计算服务,使存储数据的访问和处理更加安全可靠。然而,它对时间敏感的应用程序是有益的,因为所需的延迟是最小的,但不适用于任务关键型应用程序,因为所需的延迟可以忽略不计。为了满足这一需求,世界各地的作者开始将FC与设备到设备(D2D)通信集成在一起。但由于存在潜在的大量干扰,无法提高无线信道的总速率和保密能力。基于这些不足,本文提出了一种基于区块链的协作d2d辅助FC方案,该方案在不完全CSI下存在一个名为Block-D2D的窃听者,以提高总求和率和保密能力。我们对D2D对采用非正交多址(NOMA)方案来改善上述特性。不过,设备上的数据并不是完全安全的,任何恶意用户都可以修改这些数据。这可以使用区块链技术进行保护,区块链技术是不可变的、安全的和可信的。为了提高网络的保密能力和频谱效率,我们采用了合作博弈理论。仿真结果表明,与传统的OFDMA方案相比,基于noma的Block-D2D方案在求和速率、保密容量和系统吞吐量方面都具有更高的性能。
{"title":"Block-D2D: Blockchain-enabled Cooperative D2D-assisted Fog Computing Scheme under Imperfect CSI","authors":"Rajesh Gupta, Tejal Rathod, S. Tanwar","doi":"10.1109/ICCWorkshops50388.2021.9473524","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473524","url":null,"abstract":"Fog computing (FC) supports cloud computing services at the edge of the device for more secure and reliable access and processing of the stored data. However, it is beneficial for time-sensitive applications, where the required delay is minimum, but not well suited for mission-critical applications, where the required delay is negligible. To fulfill this requirement, the authors worldwide started integrating FC with device-to-device (D2D) communication. But it was potentially affected by massive interference, which does not improve the total sum rate and secrecy capacity of the wireless channel. Motivated from these gaps, in this paper, we propose a blockchain-enabled cooperative D2D-assisted FC scheme under imperfect CSI in the presence of an eavesdropper called Block-D2D to enhance the total sum rate and secrecy capacity. We used non-orthogonal multiple access (NOMA) scheme for D2D pairs to improve the aforementioned characteristics. Still, the data on the device is not fully secure, which can be modified by any malicious user. This can be protected using blockchain technology, which is immutable, secure, and trusted. To improve the secrecy capacity of the network and spectral efficiency, we used a cooperative game theory. Simulation results show that the elevated performance of the NOMA-based Block-D2D scheme compared to the conventional OFDMA scheme in terms of sum rate, secrecy capacity, and system throughput.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"46 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125900771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Time-Sensitive Overlay Routing via Segment Routing with Failure Correction 通过带故障校正的分段路由实现时间敏感的叠加路由
Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473766
Zengwei Zheng, Chenwei Zhao, Jianwei Zhang
Due to the overlay technologies, service providers have a logical view of the underlay network and can optimize quality of experience without modifying the physical network. However, the cross-layer interaction inevitably causes network fluctuation due to their inconsistent optimization objectives. Besides, network failures that occur in the underlay not only cause network performance degradation, but also significantly increase the frequency of cross-layer interaction. These problems make the network fluctuate for a long time, reduce the network performance and influence the user experience, especially for time-sensitive applications. In this paper, we propose a failure correction method based on segment routing to deal with the control plane failures and the data plane failures that occur in the underlay. We propose a cross-layer structure with failure correction mechanism, investigate the cross-layer interaction and design two strategies to eliminate fluctuations and make the network converge quickly.
由于覆盖技术,服务提供商对底层网络有一个逻辑视图,可以在不修改物理网络的情况下优化体验质量。然而,由于优化目标不一致,跨层交互不可避免地会造成网络波动。此外,发生在底层的网络故障不仅会导致网络性能下降,还会显著增加跨层交互的频率。这些问题使网络长时间波动,降低网络性能,影响用户体验,特别是对时间敏感的应用。在本文中,我们提出了一种基于分段路由的故障校正方法来处理底层发生的控制平面故障和数据平面故障。提出了一种具有故障校正机制的跨层结构,研究了跨层交互作用,设计了两种消除波动的策略,使网络快速收敛。
{"title":"Time-Sensitive Overlay Routing via Segment Routing with Failure Correction","authors":"Zengwei Zheng, Chenwei Zhao, Jianwei Zhang","doi":"10.1109/ICCWorkshops50388.2021.9473766","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473766","url":null,"abstract":"Due to the overlay technologies, service providers have a logical view of the underlay network and can optimize quality of experience without modifying the physical network. However, the cross-layer interaction inevitably causes network fluctuation due to their inconsistent optimization objectives. Besides, network failures that occur in the underlay not only cause network performance degradation, but also significantly increase the frequency of cross-layer interaction. These problems make the network fluctuate for a long time, reduce the network performance and influence the user experience, especially for time-sensitive applications. In this paper, we propose a failure correction method based on segment routing to deal with the control plane failures and the data plane failures that occur in the underlay. We propose a cross-layer structure with failure correction mechanism, investigate the cross-layer interaction and design two strategies to eliminate fluctuations and make the network converge quickly.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126778609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Scalable Authentication Protocol for Access Network Communications using ECC 基于ECC的接入网通信安全可扩展认证协议
Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473557
S. Patel, Amit Dua, Neeraj Kumar
The secure message exchange is instrumental in the success of device-to-device communication. Any malicious activity has the potential to compromise the confidentiality or integrity of the messages exchanged between different user equipment. To address the aforementioned issue, this study proposes a novel elliptic curve cryptography based key-exchange protocol for authentication of two user equipment in network-assisted D2D communication. The proposed protocol is based on standard elliptic curve Diffie-Hellman key exchange and hash-based message authentication code. Subsequently, elaborate threat analysis of the proposed protocol against several adversarial attacks is presented to prove its resilience. The observed low computational time and communication overhead associated with this protocol and its resilience against known attacks advance its strong candidature for implementation of D2D communication in 5G cellular networks.
安全消息交换对于设备到设备通信的成功至关重要。任何恶意活动都有可能危及不同用户设备之间交换的消息的机密性或完整性。为了解决上述问题,本研究提出了一种新的基于椭圆曲线密码的密钥交换协议,用于网络辅助D2D通信中两个用户设备的身份验证。该协议基于标准椭圆曲线Diffie-Hellman密钥交换和基于哈希的消息认证码。随后,对所提出的协议针对几种对抗性攻击进行了详细的威胁分析,以证明其弹性。与该协议相关的低计算时间和通信开销及其对已知攻击的弹性提高了其在5G蜂窝网络中实现D2D通信的强大候选性。
{"title":"A Secure Scalable Authentication Protocol for Access Network Communications using ECC","authors":"S. Patel, Amit Dua, Neeraj Kumar","doi":"10.1109/ICCWorkshops50388.2021.9473557","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473557","url":null,"abstract":"The secure message exchange is instrumental in the success of device-to-device communication. Any malicious activity has the potential to compromise the confidentiality or integrity of the messages exchanged between different user equipment. To address the aforementioned issue, this study proposes a novel elliptic curve cryptography based key-exchange protocol for authentication of two user equipment in network-assisted D2D communication. The proposed protocol is based on standard elliptic curve Diffie-Hellman key exchange and hash-based message authentication code. Subsequently, elaborate threat analysis of the proposed protocol against several adversarial attacks is presented to prove its resilience. The observed low computational time and communication overhead associated with this protocol and its resilience against known attacks advance its strong candidature for implementation of D2D communication in 5G cellular networks.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126515653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Investigative Study Into An Autonomous UAS Traffic Management System For Congested Airspace Safety 面向拥挤空域安全的自主无人机交通管理系统研究
Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473838
Lanier A Watkins, Nick Sarfaraz, S. Zanlongo, Joshua Silbermann, T. Young, Randall Sleight
Currently, Unmanned Aircraft System (UAS) Traffic Management (UTM) is the Federal Aviation Administration’s (FAA) vision for air traffic management below 400 feet. Production UTM systems tend to reside only at specialized test sites and operational centers. UTM has been articulated as a concept of operation (ConOps) by the FAA. The UTM ConOps describes a complex interaction between UAS, UAS Operators, and the UTM system itself. These interactions may involve human operators, or be fully automated. Currently, most UTM studies and experimental prototypes do not look at the UTM concept from end-to-end; instead, they focus on specific aspects of UTM and thus cannot explore and test the holistic performance of a UTM ecosystem. Equally important is ensuring that production UTM can scale to meet the demands of future airspace, which is estimated to be 65,000 UAS operations (takeoffs and landings) per hour by 2035. The busiest US airports currently handle 300 operations per hour.In this paper, we evaluate a portion of the UTM system using a set of autonomous algorithms for flight plan de-confliction. Preliminary results suggest that the autonomy algorithms used for path planning, strategic de-confliction, and detect and avoid (DAA) are capable of scaling to high-congestion scenarios while drastically reducing collisions between UAS, even with almost all UAS deviating from de-conflicted plans (i.e., rogue UAS). We also observed that de-confliction algorithms represent a dominating safety layer in the separation hierarchy, since the strategic de-confliction algorithms manage airspace density, albeit at the cost of longer mission completion times. Our testing was done using a MATLAB simulator, which used the RRT* algorithm for flight planning, two different schedulers (Genetic Algorithm and the NASA Stratway Strategic Conflict Resolution algorithm) for strategic de-confliction, and the Airborne Collision Avoidance System for small unmanned aircraft systems (ACAS sXu) for DAA.
目前,无人机系统(UAS)交通管理(UTM)是美国联邦航空管理局(FAA)对400英尺以下空中交通管理的愿景。生产UTM系统倾向于只驻留在专门的测试站点和操作中心。UTM已经被FAA作为一个操作概念(ConOps)加以阐述。UTM ConOps描述了UAS、UAS操作员和UTM系统本身之间的复杂交互。这些交互可能涉及人工操作,也可能是完全自动化的。目前,大多数UTM研究和实验原型都没有从端到端看待UTM概念;相反,他们专注于UTM的特定方面,因此无法探索和测试UTM生态系统的整体性能。同样重要的是确保生产UTM能够满足未来空域的需求,预计到2035年,每小时将有65,000架UAS操作(起飞和降落)。美国最繁忙的机场目前每小时处理300次航班。在本文中,我们使用一组用于飞行计划去冲突的自主算法来评估UTM系统的一部分。初步结果表明,用于路径规划、战略去冲突以及检测和避免(DAA)的自主算法能够扩展到高拥塞场景,同时大大减少无人机之间的碰撞,即使几乎所有无人机都偏离了去冲突计划(即流氓无人机)。我们还观察到,去冲突算法代表了分离层次结构中占主导地位的安全层,因为战略去冲突算法管理空域密度,尽管以更长的任务完成时间为代价。我们的测试是在MATLAB模拟器上完成的,该模拟器使用RRT*算法进行飞行规划,使用两种不同的调度程序(遗传算法和NASA Stratway战略冲突解决算法)进行战略冲突消除,以及用于DAA的小型无人机系统机载避撞系统(ACAS sXu)。
{"title":"An Investigative Study Into An Autonomous UAS Traffic Management System For Congested Airspace Safety","authors":"Lanier A Watkins, Nick Sarfaraz, S. Zanlongo, Joshua Silbermann, T. Young, Randall Sleight","doi":"10.1109/ICCWorkshops50388.2021.9473838","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473838","url":null,"abstract":"Currently, Unmanned Aircraft System (UAS) Traffic Management (UTM) is the Federal Aviation Administration’s (FAA) vision for air traffic management below 400 feet. Production UTM systems tend to reside only at specialized test sites and operational centers. UTM has been articulated as a concept of operation (ConOps) by the FAA. The UTM ConOps describes a complex interaction between UAS, UAS Operators, and the UTM system itself. These interactions may involve human operators, or be fully automated. Currently, most UTM studies and experimental prototypes do not look at the UTM concept from end-to-end; instead, they focus on specific aspects of UTM and thus cannot explore and test the holistic performance of a UTM ecosystem. Equally important is ensuring that production UTM can scale to meet the demands of future airspace, which is estimated to be 65,000 UAS operations (takeoffs and landings) per hour by 2035. The busiest US airports currently handle 300 operations per hour.In this paper, we evaluate a portion of the UTM system using a set of autonomous algorithms for flight plan de-confliction. Preliminary results suggest that the autonomy algorithms used for path planning, strategic de-confliction, and detect and avoid (DAA) are capable of scaling to high-congestion scenarios while drastically reducing collisions between UAS, even with almost all UAS deviating from de-conflicted plans (i.e., rogue UAS). We also observed that de-confliction algorithms represent a dominating safety layer in the separation hierarchy, since the strategic de-confliction algorithms manage airspace density, albeit at the cost of longer mission completion times. Our testing was done using a MATLAB simulator, which used the RRT* algorithm for flight planning, two different schedulers (Genetic Algorithm and the NASA Stratway Strategic Conflict Resolution algorithm) for strategic de-confliction, and the Airborne Collision Avoidance System for small unmanned aircraft systems (ACAS sXu) for DAA.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123627293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Edge Federated MARL Approach for Timeliness Maintenance in MEC Collaboration MEC协作中时效性维护的边缘联合MARL方法
Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473729
Zheqi Zhu, Shuo Wan, Pingyi Fan, K. Letaief
Mobile edge computing (MEC) has been widely studied to provide new schemes for communication-computing systems such as industrial Internet of Things (IoTs), vehicular networks, smart city applications, etc. In this work, we mainly investigate on the timeliness maintenance of the MEC systems where the freshness of the data and computation tasks plays a significant role. We firstly formulate the average age of information (AoI) minimization problem of the UAV-assisted MEC systems. To maintain the system timeliness, we propose a novel multi-agent reinforcement learning (MARL) approach, called edge federated multi-agent actor-critic (MAAC), for joint trajectory planning, data scheduling and resource management in the investigated MEC systems. Through the proposed online learning method, edge devices and center controller learn the interactive policies through local observations and carry out the model-wise communication. We build up a simulation platform for time sensitive MEC systems as a gym environment module and implement the proposed algorithm. Furthermore, the comparisons with a popular MARL solution, MADDPG, show that the proposed approach achieves better performance in terms of data freshness and system stability.
移动边缘计算(MEC)已被广泛研究,为工业物联网(iot)、车联网、智慧城市应用等通信计算系统提供了新的方案。在本文中,我们主要研究了MEC系统的时效性维护,其中数据的新鲜度和计算任务起着重要的作用。首先提出了无人机辅助MEC系统的平均信息年龄最小化问题。为了保持系统的时效性,我们提出了一种新的多智能体强化学习(MARL)方法,称为边缘联合多智能体actor-critic (MAAC),用于所研究的MEC系统的联合轨迹规划、数据调度和资源管理。通过提出的在线学习方法,边缘设备和中心控制器通过局部观察学习交互策略,并进行模型通信。我们建立了一个时间敏感MEC系统的仿真平台作为健身房环境模块,并实现了所提出的算法。此外,与流行的MARL解决方案MADDPG的比较表明,该方法在数据新鲜度和系统稳定性方面取得了更好的性能。
{"title":"An Edge Federated MARL Approach for Timeliness Maintenance in MEC Collaboration","authors":"Zheqi Zhu, Shuo Wan, Pingyi Fan, K. Letaief","doi":"10.1109/ICCWorkshops50388.2021.9473729","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473729","url":null,"abstract":"Mobile edge computing (MEC) has been widely studied to provide new schemes for communication-computing systems such as industrial Internet of Things (IoTs), vehicular networks, smart city applications, etc. In this work, we mainly investigate on the timeliness maintenance of the MEC systems where the freshness of the data and computation tasks plays a significant role. We firstly formulate the average age of information (AoI) minimization problem of the UAV-assisted MEC systems. To maintain the system timeliness, we propose a novel multi-agent reinforcement learning (MARL) approach, called edge federated multi-agent actor-critic (MAAC), for joint trajectory planning, data scheduling and resource management in the investigated MEC systems. Through the proposed online learning method, edge devices and center controller learn the interactive policies through local observations and carry out the model-wise communication. We build up a simulation platform for time sensitive MEC systems as a gym environment module and implement the proposed algorithm. Furthermore, the comparisons with a popular MARL solution, MADDPG, show that the proposed approach achieves better performance in terms of data freshness and system stability.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123559313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reduced-Feedback Scheduling Policies for Energy-efficient MAC 节能MAC的减反馈调度策略
Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473845
Priyadarshi Mukherjee, S. De
Energy efficiency is a critical requirement in low-power wireless sensor networks. In this work, energy-efficient scheduling policies that exploit the temporal variation of wireless channel are presented. The proposed policies avoid regular feedback from the sensor nodes in order to decide on the channel access opportunity and the access duration. The policies cater to delay-tolerant as well as delay-constrained scenarios. The numerical results demonstrate that the proposed policies simultaneously offer a gain of about 20% in data throughput and about 58% in energy efficiency over the nearest competitive approaches. It is also shown that the performance of the scheduling policy corresponding to the delay-constrained scenario is bounded by the policy corresponding to the delay-unconstrained scenario.
能源效率是低功耗无线传感器网络的关键要求。本文提出了一种利用无线信道时间变化的节能调度策略。该策略避免了来自传感器节点的定期反馈,以确定通道访问机会和访问持续时间。这些策略既适用于延迟容忍场景,也适用于延迟约束场景。数值结果表明,与最接近的竞争方法相比,所提出的策略同时提供了约20%的数据吞吐量和约58%的能源效率。研究还表明,延迟约束场景对应的调度策略的性能受到延迟无约束场景对应的调度策略的约束。
{"title":"Reduced-Feedback Scheduling Policies for Energy-efficient MAC","authors":"Priyadarshi Mukherjee, S. De","doi":"10.1109/ICCWorkshops50388.2021.9473845","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473845","url":null,"abstract":"Energy efficiency is a critical requirement in low-power wireless sensor networks. In this work, energy-efficient scheduling policies that exploit the temporal variation of wireless channel are presented. The proposed policies avoid regular feedback from the sensor nodes in order to decide on the channel access opportunity and the access duration. The policies cater to delay-tolerant as well as delay-constrained scenarios. The numerical results demonstrate that the proposed policies simultaneously offer a gain of about 20% in data throughput and about 58% in energy efficiency over the nearest competitive approaches. It is also shown that the performance of the scheduling policy corresponding to the delay-constrained scenario is bounded by the policy corresponding to the delay-unconstrained scenario.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131487858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-contact Blood Pressure Estimation with Pulse Wave employing Microwave Reflection 利用微波反射脉搏波的非接触式血压测量
Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473654
Hinako Ochi, S. Shimamoto, Jiang Liu, Yukino Yamaoka
Nowadays it is recommended to do blood pressure measurements on a daily basis at home to prevent diseases caused by high blood pressure. Blood pressure measurements methods using a cuff is most commonly used. However, it is a burden for hypertensive patients and the elderly to put on a blood pressure cuff repeatedly for the multi-metering of blood pressure. Non-contact measurement will provide a comfortable and easy method to monitor blood pressure and pulse rates continuously. This paper proposes a non-contact method to measure both pulse rates and blood pressure simultaneously. In the experiment, microwave signals were transmitted to the body and the reception intensity was measured. The microwave frequencies used in this experiment were 2.4GHz and 5.6GHz. The pulse rates and the blood pressure can be estimated by processing the data obtained from microwave reflection. The experiment results show that the 2.4GHz microwave signals have better estimation accuracy. It indicates that our proposed system is practical and has great potential for the future smart health monitoring system.
现在建议每天在家测量血压,以预防高血压引起的疾病。使用袖带的血压测量方法是最常用的。但是,对于高血压患者和老年人来说,反复佩戴血压袖带多次测量血压是一种负担。非接触式测量将提供一种舒适和简单的方法来连续监测血压和脉搏率。本文提出了一种同时测量脉搏率和血压的非接触式方法。在实验中,将微波信号传输到人体,并测量其接收强度。本实验使用的微波频率分别为2.4GHz和5.6GHz。通过对微波反射数据的处理,可以估计脉搏率和血压。实验结果表明,2.4GHz微波信号具有较好的估计精度。这表明我们提出的系统是实用的,在未来的智能健康监测系统中具有很大的潜力。
{"title":"Non-contact Blood Pressure Estimation with Pulse Wave employing Microwave Reflection","authors":"Hinako Ochi, S. Shimamoto, Jiang Liu, Yukino Yamaoka","doi":"10.1109/ICCWorkshops50388.2021.9473654","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473654","url":null,"abstract":"Nowadays it is recommended to do blood pressure measurements on a daily basis at home to prevent diseases caused by high blood pressure. Blood pressure measurements methods using a cuff is most commonly used. However, it is a burden for hypertensive patients and the elderly to put on a blood pressure cuff repeatedly for the multi-metering of blood pressure. Non-contact measurement will provide a comfortable and easy method to monitor blood pressure and pulse rates continuously. This paper proposes a non-contact method to measure both pulse rates and blood pressure simultaneously. In the experiment, microwave signals were transmitted to the body and the reception intensity was measured. The microwave frequencies used in this experiment were 2.4GHz and 5.6GHz. The pulse rates and the blood pressure can be estimated by processing the data obtained from microwave reflection. The experiment results show that the 2.4GHz microwave signals have better estimation accuracy. It indicates that our proposed system is practical and has great potential for the future smart health monitoring system.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Low Complexity Rate Splitting Using Hierarchical User Grouping 使用分层用户分组的低复杂度率分割
Pub Date : 2021-06-01 DOI: 10.1109/ICCWorkshops50388.2021.9473715
Elaheh Sadeghabadi, S. Blostein
Rate splitting multiple access (RSMA) is a powerful multiple access technique that exploits the advantages of both space-division multiple access (SDMA) and nonorthogonal multiple access (NOMA), making it suitable for heterogeneity of quality of service and high throughput requirements of future networks. RSMA is based on rate splitting at the transmitter and successive interference cancellation (SIC) at the receiver. The number of transmitted streams and the number of possible decoding orders grows exponentially with the number of users. In this paper, a low-complexity rate splitting approach is proposed that finds a subset of all possible common streams by hierarchical user grouping and assigning a common stream to each group. Since the hierarchical user grouping approach creates groups of users of the same size that do not have a user in common, this approach does not require user ordering. To implement this low-complexity RSMA, alternating max-min precoding design and power allocation is used. The beamforming vectors are designed to cancel the multiuser interference. As a result, the beamforming vectors can be designed in multiple levels. Simulation results show that the proposed scheme is able to achieve attractive performance vs. complexity tradeoffs compared to several others in the literature.
速率分割多址(RSMA)是一种功能强大的多址技术,它结合了空分多址(SDMA)和非正交多址(NOMA)的优点,适合未来网络的异构服务质量和高吞吐量要求。RSMA是基于发射机的速率分裂和接收机的连续干扰消除(SIC)。传输流的数量和可能的解码顺序的数量随着用户的数量呈指数增长。本文提出了一种低复杂度的速率分割方法,该方法通过分层用户分组并为每个组分配一个公共流来找到所有可能的公共流的子集。由于分层用户分组方法创建的用户组具有相同的大小,但没有相同的用户,因此该方法不需要用户排序。为了实现这种低复杂度的RSMA,采用了最大最小交替预编码设计和功率分配。为了消除多用户干扰,设计了波束形成矢量。因此,波束形成矢量可以在多个层次上设计。仿真结果表明,与文献中的其他方案相比,所提出的方案能够实现有吸引力的性能和复杂性权衡。
{"title":"Low Complexity Rate Splitting Using Hierarchical User Grouping","authors":"Elaheh Sadeghabadi, S. Blostein","doi":"10.1109/ICCWorkshops50388.2021.9473715","DOIUrl":"https://doi.org/10.1109/ICCWorkshops50388.2021.9473715","url":null,"abstract":"Rate splitting multiple access (RSMA) is a powerful multiple access technique that exploits the advantages of both space-division multiple access (SDMA) and nonorthogonal multiple access (NOMA), making it suitable for heterogeneity of quality of service and high throughput requirements of future networks. RSMA is based on rate splitting at the transmitter and successive interference cancellation (SIC) at the receiver. The number of transmitted streams and the number of possible decoding orders grows exponentially with the number of users. In this paper, a low-complexity rate splitting approach is proposed that finds a subset of all possible common streams by hierarchical user grouping and assigning a common stream to each group. Since the hierarchical user grouping approach creates groups of users of the same size that do not have a user in common, this approach does not require user ordering. To implement this low-complexity RSMA, alternating max-min precoding design and power allocation is used. The beamforming vectors are designed to cancel the multiuser interference. As a result, the beamforming vectors can be designed in multiple levels. Simulation results show that the proposed scheme is able to achieve attractive performance vs. complexity tradeoffs compared to several others in the literature.","PeriodicalId":127186,"journal":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114959638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 IEEE International Conference on Communications Workshops (ICC Workshops)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1