首页 > 最新文献

2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)最新文献

英文 中文
Generating Datasets Based on the HuMIdb Dataset for Risk-based User Authentication on Smartphones 基于HuMIdb数据集生成基于风险的智能手机用户认证数据集
M. Papaioannou, G. Zachos, G. Mantas, Aliyah Essop, A. Karasuwa, Jonathan Rodriguez
User authentication acts as the first line of defense verifying the identity of a mobile user, often as a prerequisite to allow access to resources in a mobile device. Risk-based user authentication based on behavioral biometrics appears to have the potential to increase mobile authentication security without sacrificing usability. Nevertheless, in order to precisely evaluate classification and/or novelty detection algorithms for risk-based user authentication, it is of utmost importance to make use of quality datasets to train and test these algorithms. To the best of our knowledge, there is a lack of up-to-date, representative and comprehensive datasets that are publicly available to the research community for effective training and evaluation of classification and/or novelty detection algorithms suitable for risk-based user authentication. Toward this direction, in this paper, the aim is to provide details on how we generate datasets based on HuMIdb dataset for training and testing classification and novelty detection algorithms for risk-based adaptive user authentication. The HuMIdb dataset is the most recent and publicly available dataset for behavioral user authentication.
用户身份验证是验证移动用户身份的第一道防线,通常是允许访问移动设备中的资源的先决条件。基于行为生物识别技术的基于风险的用户身份验证似乎有可能在不牺牲可用性的情况下提高移动身份验证的安全性。然而,为了准确评估基于风险的用户认证的分类和/或新颖性检测算法,利用高质量的数据集来训练和测试这些算法是至关重要的。据我们所知,缺乏最新的、有代表性的和全面的数据集,这些数据集可供研究界公开使用,以有效地训练和评估适合基于风险的用户认证的分类和/或新颖性检测算法。朝着这个方向,在本文中,目的是提供我们如何基于HuMIdb数据集生成数据集的细节,用于训练和测试基于风险的自适应用户认证的分类和新颖性检测算法。HuMIdb数据集是行为用户认证的最新和公开可用的数据集。
{"title":"Generating Datasets Based on the HuMIdb Dataset for Risk-based User Authentication on Smartphones","authors":"M. Papaioannou, G. Zachos, G. Mantas, Aliyah Essop, A. Karasuwa, Jonathan Rodriguez","doi":"10.1109/CAMAD55695.2022.9966901","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966901","url":null,"abstract":"User authentication acts as the first line of defense verifying the identity of a mobile user, often as a prerequisite to allow access to resources in a mobile device. Risk-based user authentication based on behavioral biometrics appears to have the potential to increase mobile authentication security without sacrificing usability. Nevertheless, in order to precisely evaluate classification and/or novelty detection algorithms for risk-based user authentication, it is of utmost importance to make use of quality datasets to train and test these algorithms. To the best of our knowledge, there is a lack of up-to-date, representative and comprehensive datasets that are publicly available to the research community for effective training and evaluation of classification and/or novelty detection algorithms suitable for risk-based user authentication. Toward this direction, in this paper, the aim is to provide details on how we generate datasets based on HuMIdb dataset for training and testing classification and novelty detection algorithms for risk-based adaptive user authentication. The HuMIdb dataset is the most recent and publicly available dataset for behavioral user authentication.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117352506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Behavioral Modeling-based Driver Authentication Approach for Smart Cars Self-Surveillance 基于行为建模的智能汽车自动监控驾驶员身份认证方法
Djamila Zamouche, Sofiane Aissani, K. Zizi, Lina Bourkeb, Khaled Hamouid, Mawloud Omar
Driver authentication is a vital aspect that enhances passengers' safety and security. Indeed, driver authentication enables detection of maintaining normal driving behavior, car theft, fraudulent switching of designated drivers prevention, etc., which allows a vehicle system to distinguish between legitimate users from not legitimate ones and make transportation safer. This paper introduces an efficient in-car driver authentication approach for vehicle security and safety based on driver behavior. The proposed approach continuously monitors the driver's behavior and compares it with normal behaviors already recorded during a learning phase. Our solution is based on an algebraic method, namely the Conditional Basic Process Algebra (CBPA), to model the driver's driving style in two stages, before and after starting the car, taking into account the positions of the seat, mirrors, the seat belt, etc. We demonstrate through simulation results the efficiency of our approach in terms of response time and detection success rate.
驾驶员身份认证是提高乘客安全保障的重要环节。实际上,驾驶员身份验证可以检测维持正常驾驶行为,防止车辆被盗,防止欺诈切换指定驾驶员等,使车辆系统能够区分合法用户和不合法用户,使交通更加安全。介绍了一种基于驾驶员行为的高效车载驾驶员安全认证方法。该方法持续监控驾驶员的行为,并将其与学习阶段已经记录的正常行为进行比较。我们的解决方案是基于一种代数方法,即条件基本过程代数(CBPA),在考虑座椅、后视镜、安全带等位置的情况下,对驾驶员在启动汽车前和启动汽车后两个阶段的驾驶风格进行建模。我们通过仿真结果证明了我们的方法在响应时间和检测成功率方面的有效性。
{"title":"A Behavioral Modeling-based Driver Authentication Approach for Smart Cars Self-Surveillance","authors":"Djamila Zamouche, Sofiane Aissani, K. Zizi, Lina Bourkeb, Khaled Hamouid, Mawloud Omar","doi":"10.1109/CAMAD55695.2022.9966884","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966884","url":null,"abstract":"Driver authentication is a vital aspect that enhances passengers' safety and security. Indeed, driver authentication enables detection of maintaining normal driving behavior, car theft, fraudulent switching of designated drivers prevention, etc., which allows a vehicle system to distinguish between legitimate users from not legitimate ones and make transportation safer. This paper introduces an efficient in-car driver authentication approach for vehicle security and safety based on driver behavior. The proposed approach continuously monitors the driver's behavior and compares it with normal behaviors already recorded during a learning phase. Our solution is based on an algebraic method, namely the Conditional Basic Process Algebra (CBPA), to model the driver's driving style in two stages, before and after starting the car, taking into account the positions of the seat, mirrors, the seat belt, etc. We demonstrate through simulation results the efficiency of our approach in terms of response time and detection success rate.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127387939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A compact simple circular disk printed monopole Antenna for multiple applications 一种紧凑简单的圆形圆盘印刷单极天线,适用于多种应用
M. L. Bouknia, R. Zegadi, D. Sayad, C. Zebiri, I. Elfergani, Jonathan Rodriguez, I. Otung, R. Abd‐Alhameed
This work presents simple circular patch printed monopole Antenna presented for ultra-wideband (UWB) applications, the proposed antenna has a dimension of 23mm*34mm*1.5mm fabricated on FR4 dielectric substrate material with dielectric constant 4.3. The magnitude of S11 < - 10 dB of the structure, which explains the fractional bandwidth of 2.76-17.15 GHz. The gain and antenna efficiency of the structure are 5.4dBi and 88%, respectively. The simulated results with commercial microwave studio simulator CST and compared with the commercial HFSS simulator are in relatively good agreement. All these properties suggest that the proposed structure has applications in WiMAX, WLAN, C-band, X-band and Ku-band, as well as various other applications in wireless communications.
本研究提出了一种用于超宽带(UWB)应用的简单圆形贴片印刷单极天线,该天线的尺寸为23mm*34mm*1.5mm,采用介电常数4.3的FR4介电衬底材料制成。S11的幅度< - 10 dB的结构,这解释了分数带宽为2.76-17.15 GHz。该结构的增益和天线效率分别为5.4dBi和88%。商用微波工作室模拟器CST的仿真结果与商用HFSS模拟器的仿真结果比较符合较好。所有这些特性表明,所提出的结构在WiMAX、WLAN、c波段、x波段和ku波段以及无线通信中的各种其他应用中具有应用价值。
{"title":"A compact simple circular disk printed monopole Antenna for multiple applications","authors":"M. L. Bouknia, R. Zegadi, D. Sayad, C. Zebiri, I. Elfergani, Jonathan Rodriguez, I. Otung, R. Abd‐Alhameed","doi":"10.1109/CAMAD55695.2022.9966896","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966896","url":null,"abstract":"This work presents simple circular patch printed monopole Antenna presented for ultra-wideband (UWB) applications, the proposed antenna has a dimension of 23mm*34mm*1.5mm fabricated on FR4 dielectric substrate material with dielectric constant 4.3. The magnitude of S11 < - 10 dB of the structure, which explains the fractional bandwidth of 2.76-17.15 GHz. The gain and antenna efficiency of the structure are 5.4dBi and 88%, respectively. The simulated results with commercial microwave studio simulator CST and compared with the commercial HFSS simulator are in relatively good agreement. All these properties suggest that the proposed structure has applications in WiMAX, WLAN, C-band, X-band and Ku-band, as well as various other applications in wireless communications.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124432023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Elastic Load Balancing in Software Defined Satellite Networks 软件定义卫星网络中的弹性负载均衡
D. Adami, S. Giordano, M. Pagano
Software Defined Networking (SDN) is a key technology for enabling satellite networks and, more specifically, their Ground Segment Network (GSN), with innovative services. The most important entity of the SDN architecture is the controller that enables network programmability. In this paper, we present the design and development of a new SDN controller for the GSN. The core of the controller is a new application for handling the traffic load over the GSN links and, in case of failures, for automatically rerouting traffic flows. We also propose an elastic load balancing policy that leverages on a parametric approach for assigning the cost to the GSN links thus allowing network administrators to adjust the links load by establishing a threshold between consolidation and balancing. To assess the effectiveness of our load control policy, we carried out experimental tests using the Mininet emulation environment.
软件定义网络(SDN)是使卫星网络,更具体地说,是其地面网(GSN)具有创新服务的关键技术。SDN体系结构中最重要的实体是实现网络可编程性的控制器。在本文中,我们设计和开发了一种新的用于GSN的SDN控制器。控制器的核心是一个新的应用程序,用于处理GSN链路上的流量负载,并在发生故障时自动重路由流量流。我们还提出了一种弹性负载平衡策略,该策略利用参数化方法为GSN链路分配成本,从而允许网络管理员通过在整合和平衡之间建立阈值来调整链路负载。为了评估负载控制策略的有效性,我们使用Mininet仿真环境进行了实验测试。
{"title":"Elastic Load Balancing in Software Defined Satellite Networks","authors":"D. Adami, S. Giordano, M. Pagano","doi":"10.1109/CAMAD55695.2022.9966886","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966886","url":null,"abstract":"Software Defined Networking (SDN) is a key technology for enabling satellite networks and, more specifically, their Ground Segment Network (GSN), with innovative services. The most important entity of the SDN architecture is the controller that enables network programmability. In this paper, we present the design and development of a new SDN controller for the GSN. The core of the controller is a new application for handling the traffic load over the GSN links and, in case of failures, for automatically rerouting traffic flows. We also propose an elastic load balancing policy that leverages on a parametric approach for assigning the cost to the GSN links thus allowing network administrators to adjust the links load by establishing a threshold between consolidation and balancing. To assess the effectiveness of our load control policy, we carried out experimental tests using the Mininet emulation environment.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128260437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart home's energy management applying the deep deterministic policy gradient and clustering 基于深度确定性策略梯度和聚类的智能家居能源管理
Ioannis Zenginis, J. Vardakas, K. Ramantas, C. Verikoukis
Smart buildings, equipped with controllable devices and energy management systems are expected to be substantial parts of the future energy grids. In this paper, a Reinforcement Learning (RL)-based method is developed for the energy scheduling of a smart home's energy storage system, which is also equipped with a photovoltaic system. The proposed scheme aims to minimize the electricity cost of the smart home; the overall problem is formulated as a Markov decision process, and it is solved by applying the Deep Deterministic Policy Gradient (DDPG). The main advantage of the proposed method is that increases the degree of similarity between the train set and the test set, through data clustering, achieving superior energy schedules than the existing RL-based approaches.
配备可控设备和能源管理系统的智能建筑有望成为未来能源网络的重要组成部分。本文提出了一种基于强化学习(RL)的智能家居储能系统的能量调度方法,该智能家居储能系统也配备了光伏系统。该方案旨在将智能家居的电力成本降至最低;将整个问题表述为马尔可夫决策过程,并采用深度确定性策略梯度(Deep Deterministic Policy Gradient, DDPG)进行求解。该方法的主要优点是通过数据聚类提高了训练集和测试集之间的相似度,实现了比现有基于强化学习的方法更好的能量调度。
{"title":"Smart home's energy management applying the deep deterministic policy gradient and clustering","authors":"Ioannis Zenginis, J. Vardakas, K. Ramantas, C. Verikoukis","doi":"10.1109/CAMAD55695.2022.9966887","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966887","url":null,"abstract":"Smart buildings, equipped with controllable devices and energy management systems are expected to be substantial parts of the future energy grids. In this paper, a Reinforcement Learning (RL)-based method is developed for the energy scheduling of a smart home's energy storage system, which is also equipped with a photovoltaic system. The proposed scheme aims to minimize the electricity cost of the smart home; the overall problem is formulated as a Markov decision process, and it is solved by applying the Deep Deterministic Policy Gradient (DDPG). The main advantage of the proposed method is that increases the degree of similarity between the train set and the test set, through data clustering, achieving superior energy schedules than the existing RL-based approaches.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133000866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-grained Augmentation for RF Fingerprinting under Impaired Channels 受损信道下射频指纹识别的细粒度增强
O. Gul, Michel Kulhandjian, B. Kantarci, A. Touazi, C. Ellement, C. D’amours
Critical infrastructures such as connected and au-tonomous vehicles, are susceptible to cyber attacks due to their mission-critical deployment. To ensure security by design, radio frequency (RF)-based security is considered as an effective technique for a wirelessly monitored or actuated critical infrastructure. For this purpose, this paper proposes a novel augmentation-driven deep learning approach to analyze unique transmitter fingerprints to determine the legitimacy of a user device or transmitter. An RF fingerprinting model is susceptible to various channel and environmental conditions that impact the learning performance of a machine/deep learning model. As data gathering cannot be considered as a feasible alternative, efficient solutions that can tackle the impact of varying channels on learning performance are emergent. This work aims to shed light on the RF fingerprinting problem from a different angle when 4G, 5G and WiFi data samples are collected from different transmitters by proposing a fine-grained augmentation approach to improve the learning performance of a deep learning model. Numerical results point out the promising RF fingerprinting performance when training data are augmented in a waveform-specific fine-grained manner as fingerprinting accuracy (87.94%) under the previously presented TDL/CDL augmentation can be boosted to 95.61% under previously unseen RF data instances.
互联汽车和自动驾驶汽车等关键基础设施因其关键任务部署而容易受到网络攻击。为了从设计上确保安全,射频(RF)安全被认为是无线监控或驱动关键基础设施的有效技术。为此,本文提出了一种新的增强驱动的深度学习方法来分析唯一的发射器指纹,以确定用户设备或发射器的合法性。射频指纹模型容易受到各种通道和环境条件的影响,这些条件会影响机器/深度学习模型的学习性能。由于数据收集不能被视为一种可行的替代方案,因此需要有效的解决方案来解决不同渠道对学习绩效的影响。这项工作旨在通过提出一种细粒度增强方法来提高深度学习模型的学习性能,从不同的角度揭示从不同发射器收集4G, 5G和WiFi数据样本时的射频指纹问题。数值结果表明,当训练数据以特定于波形的细粒度方式增强时,射频指纹识别的性能是很有希望的,因为在之前提出的TDL/CDL增强下,指纹识别准确率(87.94%)可以提高到95.61%,而在以前未见过的射频数据实例下。
{"title":"Fine-grained Augmentation for RF Fingerprinting under Impaired Channels","authors":"O. Gul, Michel Kulhandjian, B. Kantarci, A. Touazi, C. Ellement, C. D’amours","doi":"10.1109/CAMAD55695.2022.9966888","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966888","url":null,"abstract":"Critical infrastructures such as connected and au-tonomous vehicles, are susceptible to cyber attacks due to their mission-critical deployment. To ensure security by design, radio frequency (RF)-based security is considered as an effective technique for a wirelessly monitored or actuated critical infrastructure. For this purpose, this paper proposes a novel augmentation-driven deep learning approach to analyze unique transmitter fingerprints to determine the legitimacy of a user device or transmitter. An RF fingerprinting model is susceptible to various channel and environmental conditions that impact the learning performance of a machine/deep learning model. As data gathering cannot be considered as a feasible alternative, efficient solutions that can tackle the impact of varying channels on learning performance are emergent. This work aims to shed light on the RF fingerprinting problem from a different angle when 4G, 5G and WiFi data samples are collected from different transmitters by proposing a fine-grained augmentation approach to improve the learning performance of a deep learning model. Numerical results point out the promising RF fingerprinting performance when training data are augmented in a waveform-specific fine-grained manner as fingerprinting accuracy (87.94%) under the previously presented TDL/CDL augmentation can be boosted to 95.61% under previously unseen RF data instances.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125501149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Beacon Rate Adjustment Scheme based on Autonomic Computing for 5G-V2X 基于自主计算的5G-V2X信标速率调整方案
Houda Hafi, Wahabou Abdou
Transport services issues are one of the motivating reasons that push research and engineering communities to design and build smart cities. The fifth generation of mobile communications (5G) and Intelligent Transportation Systems (ITS) play a major role to improve transportation efficiency. Two kinds of messages are basically transmitted in 5G-enabled ITS - event-driven and periodic messages. The former are sent whenever a road hazard event like traffic accidents is detected, whereas the latter are generated by each vehicle to advise neighbors about its status information like position, speed, and direction. A high transmission rate of periodic messages consumes a large amount of bandwidth and causes a channel congestion, as well as, a low transmission rate could alter the neighbors discovery process. In this work, a simple and efficient self-adaptive beacons transmission scheme based on autonomic computing is proposed. The purpose is to reduce the overhead in the network and give more chance to higher priority traffic (like immediate emergency message) to access to the radio channel without distorting the view of node's local topology. The solution is validated with a safety message broadcasting protocol. The simulation results show that the proposed mechanism improves the protocol's performance.
交通服务问题是推动研究和工程界设计和建设智慧城市的动机之一。第五代移动通信(5G)和智能交通系统(ITS)在提高交通效率方面发挥着重要作用。在支持5g的ITS中,主要传输两种消息——事件驱动消息和周期性消息。前者在检测到交通事故等道路危险事件时发送,而后者由每辆车生成,用于通知相邻车辆的位置、速度和方向等状态信息。周期消息的高传输速率会消耗大量的带宽,导致信道拥塞,低传输速率也会改变邻居的发现过程。本文提出了一种基于自主计算的简单高效的自适应信标传输方案。其目的是减少网络开销,并在不扭曲节点本地拓扑视图的情况下,为高优先级流量(如即时紧急消息)提供更多访问无线电信道的机会。该解决方案通过安全消息广播协议进行了验证。仿真结果表明,该机制提高了协议的性能。
{"title":"A Beacon Rate Adjustment Scheme based on Autonomic Computing for 5G-V2X","authors":"Houda Hafi, Wahabou Abdou","doi":"10.1109/CAMAD55695.2022.9966920","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966920","url":null,"abstract":"Transport services issues are one of the motivating reasons that push research and engineering communities to design and build smart cities. The fifth generation of mobile communications (5G) and Intelligent Transportation Systems (ITS) play a major role to improve transportation efficiency. Two kinds of messages are basically transmitted in 5G-enabled ITS - event-driven and periodic messages. The former are sent whenever a road hazard event like traffic accidents is detected, whereas the latter are generated by each vehicle to advise neighbors about its status information like position, speed, and direction. A high transmission rate of periodic messages consumes a large amount of bandwidth and causes a channel congestion, as well as, a low transmission rate could alter the neighbors discovery process. In this work, a simple and efficient self-adaptive beacons transmission scheme based on autonomic computing is proposed. The purpose is to reduce the overhead in the network and give more chance to higher priority traffic (like immediate emergency message) to access to the radio channel without distorting the view of node's local topology. The solution is validated with a safety message broadcasting protocol. The simulation results show that the proposed mechanism improves the protocol's performance.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122847444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid SIC with Residual Error Factor in Wireless Powered Communications 无线供电通信中残余误差因子的混合SIC
Jhenifer de O. Melo, F. Lima
A wireless powered communication network (WPCN) has a periodic time frame divided into two stages; the first one is devoted to power transfer to mobile users while uplink data transmission takes place in the second stage. This paper studies impact of a new method for pairing users in non-orthogonal multiple access (NOMA), called Hybrid SIC (HSIC), on the performance of a NOMA-based WPCN system when imperfect successive interference cancellation (SIC) is assumed. Two well-known variants of SIC, channel state information (CSI)-based and quality of service (QoS)-based SIC schemes, are often considered separately during user pairing. With HSIC, the best of those two variants can be achieved by a proper switching between them. In this paper, we firstly adapt the HSIC scheme to the WPCN scenario where there is a delay sensitive user requesting a low data rate, called primary user, and other users that are delay tolerant and request a higher data rate, called secondary users. Using NOMA, one of the secondary users is admitted to share the same resources block with the primary user. Then, we formulate an optimization problem for solving the admitted user's data rate maximization subject to QoS guarantee for the primary user assuming imperfect SIC. Moreover, we propose a method to solve this problem that can be seen as a generalization of the original HSIC method. Simulation results show that the proposed solution is capable of protecting primary user QoS while maximizing admitted user's data rate in different scenarios with perfect and imperfect SIC.
无线供电通信网络(WPCN)具有分为两个阶段的周期时间框架;第一阶段用于向移动用户传输电力,第二阶段用于上行数据传输。本文研究了在假定不完全连续干扰消除(SIC)的情况下,一种新的非正交多址(NOMA)用户配对方法——混合SIC (HSIC)对基于非正交多址(NOMA)的WPCN系统性能的影响。基于信道状态信息(CSI)的SIC方案和基于服务质量(QoS)的SIC方案是两种著名的SIC方案,在用户配对过程中经常被分开考虑。使用HSIC,这两种变体的最佳性能可以通过在它们之间进行适当的切换来实现。在本文中,我们首先将HSIC方案适应于WPCN场景,其中存在延迟敏感用户请求低数据速率(称为主用户)和其他延迟容忍用户请求更高数据速率(称为辅助用户)。使用NOMA,允许一个辅助用户与主用户共享相同的资源块。然后,我们提出了一个优化问题,在不完全SIC条件下,在保证主用户QoS的前提下,解决被接纳用户数据速率最大化的问题。此外,我们提出了一种方法来解决这个问题,可以看作是原始HSIC方法的推广。仿真结果表明,该方案能够在完全和不完全SIC的不同场景下,在保护主用户QoS的同时,最大限度地提高接收用户的数据速率。
{"title":"Hybrid SIC with Residual Error Factor in Wireless Powered Communications","authors":"Jhenifer de O. Melo, F. Lima","doi":"10.1109/CAMAD55695.2022.9966895","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966895","url":null,"abstract":"A wireless powered communication network (WPCN) has a periodic time frame divided into two stages; the first one is devoted to power transfer to mobile users while uplink data transmission takes place in the second stage. This paper studies impact of a new method for pairing users in non-orthogonal multiple access (NOMA), called Hybrid SIC (HSIC), on the performance of a NOMA-based WPCN system when imperfect successive interference cancellation (SIC) is assumed. Two well-known variants of SIC, channel state information (CSI)-based and quality of service (QoS)-based SIC schemes, are often considered separately during user pairing. With HSIC, the best of those two variants can be achieved by a proper switching between them. In this paper, we firstly adapt the HSIC scheme to the WPCN scenario where there is a delay sensitive user requesting a low data rate, called primary user, and other users that are delay tolerant and request a higher data rate, called secondary users. Using NOMA, one of the secondary users is admitted to share the same resources block with the primary user. Then, we formulate an optimization problem for solving the admitted user's data rate maximization subject to QoS guarantee for the primary user assuming imperfect SIC. Moreover, we propose a method to solve this problem that can be seen as a generalization of the original HSIC method. Simulation results show that the proposed solution is capable of protecting primary user QoS while maximizing admitted user's data rate in different scenarios with perfect and imperfect SIC.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"661 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116098099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Mid-Infrared Gas Absorption Spectroscopic Detection Using Multilayer Optical Structures 多层光学结构增强中红外气体吸收光谱检测
R. Zegadi, M. L. Bouknia, D. Sayad, C. Zebiri, I. Elfergani, Jonathan Rodriguez, Z. Vujicic, R. Abd‐Alhameed
Porous Germanium (PGe) is a very promising material for spectroscopy and detection applications in the mid-IR wavelength range, due to its particular physicochemical properties, in particular, its large spectral transparency window ranging from 2 to 15 μm. Multilayers, such as Bragg reflectors and microcavities, based on porous germanium material are designed and their optical spectra are simulated to detect CO2 and CH4.
多孔锗(PGe)由于其特殊的物理化学性质,特别是其2 ~ 15 μm的大光谱透明窗口,在中红外波长范围内的光谱和检测应用中是一种非常有前途的材料。设计了基于多孔锗材料的Bragg反射器和微腔等多层材料,并对其光谱进行了模拟,用于探测CO2和CH4。
{"title":"Enhanced Mid-Infrared Gas Absorption Spectroscopic Detection Using Multilayer Optical Structures","authors":"R. Zegadi, M. L. Bouknia, D. Sayad, C. Zebiri, I. Elfergani, Jonathan Rodriguez, Z. Vujicic, R. Abd‐Alhameed","doi":"10.1109/CAMAD55695.2022.9966897","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966897","url":null,"abstract":"Porous Germanium (PGe) is a very promising material for spectroscopy and detection applications in the mid-IR wavelength range, due to its particular physicochemical properties, in particular, its large spectral transparency window ranging from 2 to 15 μm. Multilayers, such as Bragg reflectors and microcavities, based on porous germanium material are designed and their optical spectra are simulated to detect CO2 and CH4.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125648288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quality of Service Aware Scheduling in Mixed Traffic Wireless Networks 混合流量无线网络中服务质量感知调度
Areen Shiyahin, Stefan Schwarz, M. Rupp
When considering a traffic mix in a wireless net-work, the scheduler needs to be aware of the type of user packets and the state of each user buffer in order to satisfy the requirements of users. In such networks, the requirements vary in terms of latency, throughput, and reliability, thus a trade-off is required to enhance the overall network performance. Therefore, a Quality of Service Aware Scheduler (QAS) is proposed with tuning parameters to achieve a balanced Quality of Service (QoS) delivery. Moreover, moderate fairness is imposed among full buffer users that are assumed to have an infinite amount of data in the packets buffer. An open-source modeling tool is used to solve the Resource Blocks (RBs) optimization problem of QAS. System-level simulations are performed to investigate the performance of the proposed scheduler and compare it to the benchmark schedulers namely Round Robin (RR) and Best Channel Quality Indicator (CQI).
在考虑无线网络中的流量组合时,调度程序需要了解用户数据包的类型和每个用户缓冲区的状态,以满足用户的需求。在这样的网络中,需求在延迟、吞吐量和可靠性方面各不相同,因此需要权衡以增强整体网络性能。因此,提出了一种具有可调参数的服务质量感知调度器(QAS),以实现平衡的服务质量(QoS)交付。此外,在假定数据包缓冲区中有无限数量的数据的满缓冲区用户之间施加适度的公平性。利用开源建模工具解决了QAS的资源块优化问题。执行系统级模拟以研究所建议的调度器的性能,并将其与基准调度器即轮询(RR)和最佳信道质量指示器(CQI)进行比较。
{"title":"Quality of Service Aware Scheduling in Mixed Traffic Wireless Networks","authors":"Areen Shiyahin, Stefan Schwarz, M. Rupp","doi":"10.1109/CAMAD55695.2022.9966904","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966904","url":null,"abstract":"When considering a traffic mix in a wireless net-work, the scheduler needs to be aware of the type of user packets and the state of each user buffer in order to satisfy the requirements of users. In such networks, the requirements vary in terms of latency, throughput, and reliability, thus a trade-off is required to enhance the overall network performance. Therefore, a Quality of Service Aware Scheduler (QAS) is proposed with tuning parameters to achieve a balanced Quality of Service (QoS) delivery. Moreover, moderate fairness is imposed among full buffer users that are assumed to have an infinite amount of data in the packets buffer. An open-source modeling tool is used to solve the Resource Blocks (RBs) optimization problem of QAS. System-level simulations are performed to investigate the performance of the proposed scheduler and compare it to the benchmark schedulers namely Round Robin (RR) and Best Channel Quality Indicator (CQI).","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133917194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1