Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993013
M. Anany, M. M. Elmesalawy, Eman Serag El Din
Multiple Radio Access Technologies (Multi-RAT) heterogeneous Networks (HetNets) have been proposed as one of the main solutions to comprise the enormous growth of data traffic in fifth generation (5G) mobile networks. In this paper we consider RAT selection problem in Multi-RAT HetNets where user equipment (UE) has to choose between Long term Evolution (LTE) and Wireless Local Area Network (WLAN) radio access technologies. In this context, the RAT selection is modeled as a UE association process and formulated as an optimization problem aiming to maximize a certain UEs' weighted objective function in terms of user equipment achievable data rates and the security levels provided by different base stations (BSs). The weighting parameter is decided to reflect the orientation of UEs in which higher weighting value for the security level, means that UEs tends to select the BSs that can provide best security levels rather than achieved data rates. A many-to-one matching game-based association approach is then proposed and applied to capture optimal solution for UE association problem. Our simulation results are compared to the well-known WLAN first association algorithm, the results show the outperformance of the proposed matching game based association approach in terms of the achieved system throughput and rate outage probability at different requirements of security levels.
{"title":"A Matching Game Solution for Optimal RAT Selection in 5G Multi-RAT HetNets","authors":"M. Anany, M. M. Elmesalawy, Eman Serag El Din","doi":"10.1109/UEMCON47517.2019.8993013","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993013","url":null,"abstract":"Multiple Radio Access Technologies (Multi-RAT) heterogeneous Networks (HetNets) have been proposed as one of the main solutions to comprise the enormous growth of data traffic in fifth generation (5G) mobile networks. In this paper we consider RAT selection problem in Multi-RAT HetNets where user equipment (UE) has to choose between Long term Evolution (LTE) and Wireless Local Area Network (WLAN) radio access technologies. In this context, the RAT selection is modeled as a UE association process and formulated as an optimization problem aiming to maximize a certain UEs' weighted objective function in terms of user equipment achievable data rates and the security levels provided by different base stations (BSs). The weighting parameter is decided to reflect the orientation of UEs in which higher weighting value for the security level, means that UEs tends to select the BSs that can provide best security levels rather than achieved data rates. A many-to-one matching game-based association approach is then proposed and applied to capture optimal solution for UE association problem. Our simulation results are compared to the well-known WLAN first association algorithm, the results show the outperformance of the proposed matching game based association approach in terms of the achieved system throughput and rate outage probability at different requirements of security levels.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128857814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993097
Mohamed Sofiane Batta, Z. Aliouat, S. Harous
The Internet of Things (IoT) and the Wireless Sensor Networks (WSNs) attract attention of the research communities due to their rapid and promising development. These paradigms have been predicted to play a leading role in our daily life in the near future. The limited resources and the restricted number of communication channels in these networks create new challenges especially in collision and access conflicts. To bring appropriate solutions for these problems, several works, in the literature, focus on centralized and distributed approaches. Traditional distributed protocols assume that the MAC and Routing layers act independently. Moreover, the dynamic topology and the central point of failure restrict the development of centralized techniques. In this paper, we present a distributed weight-based TDMA-MAC scheduling algorithm (WB-DTSA). The proposed solution takes advantage of routing information to improve the communication latency and the schedule length. Simulation results show better performance, in comparison to similar distributed channel assignment approaches. The latency is improved by 47% and the schedule length is reduced by 23%.
物联网(Internet of Things, IoT)和无线传感器网络(Wireless Sensor network, WSNs)以其迅速而有前景的发展受到了学术界的关注。据预测,在不久的将来,这些范式将在我们的日常生活中发挥主导作用。在这些网络中,有限的资源和有限的通信通道数量带来了新的挑战,特别是在碰撞和接入冲突中。为了给这些问题带来适当的解决方案,在文献中,一些作品集中在集中和分布式方法上。传统的分布式协议假设MAC层和路由层独立工作。此外,动态拓扑结构和故障中心点限制了集中式技术的发展。本文提出了一种基于权重的分布式TDMA-MAC调度算法(WB-DTSA)。该方案利用路由信息来改善通信延迟和调度长度。仿真结果表明,与同类分布式信道分配方法相比,该方法具有更好的性能。延迟提高了47%,计划长度减少了23%。
{"title":"A Distributed Weight-Based TDMA Scheduling Algorithm for Latency Improvement in IoT","authors":"Mohamed Sofiane Batta, Z. Aliouat, S. Harous","doi":"10.1109/UEMCON47517.2019.8993097","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993097","url":null,"abstract":"The Internet of Things (IoT) and the Wireless Sensor Networks (WSNs) attract attention of the research communities due to their rapid and promising development. These paradigms have been predicted to play a leading role in our daily life in the near future. The limited resources and the restricted number of communication channels in these networks create new challenges especially in collision and access conflicts. To bring appropriate solutions for these problems, several works, in the literature, focus on centralized and distributed approaches. Traditional distributed protocols assume that the MAC and Routing layers act independently. Moreover, the dynamic topology and the central point of failure restrict the development of centralized techniques. In this paper, we present a distributed weight-based TDMA-MAC scheduling algorithm (WB-DTSA). The proposed solution takes advantage of routing information to improve the communication latency and the schedule length. Simulation results show better performance, in comparison to similar distributed channel assignment approaches. The latency is improved by 47% and the schedule length is reduced by 23%.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992999
Hemant Purohit, P. Kaur, D. Mwebesa, Shilpa Choudhary, Kanika Joshi
Uganda's Mobile Communication sector is one of the fastest growing in Africa and exhibits second highest internet growth in East Africa. The quantity of versatile mobile users had arrived at 23.24 million (23,249,967) with tele-density of 60 in September 2018 [2], which is about fifty percent portion of the nation's populace (in 2018). This has alarmed the research on the optimum utilization of bandwidth and voice channels used in GSM networks being prevailed in Uganda which are indeed two prominent constraints in mobile communication. The spectrum re-farming seems to be the only possible solution in near future however it additionally has some key difficulties like intricacy of operation and user disturbances. This research paper proposes and exhibits the investigation of Data Interleaving Technique in Mobile Communication in GSM networks of Kampala, Uganda. The simulation results show that significant enhancement of 54.22% in channel utilization and bandwidth optimization is possible with negligible overhead of 0.03%. Consequently it's easily feasible to accommodate more mobile internet users in limited allotted bandwidth and use the limited allotted spectrum efficiently.
{"title":"Channel Redundancy Analysis and Bandwidth Utilization in GSM Mobile Communication Network of Uganda","authors":"Hemant Purohit, P. Kaur, D. Mwebesa, Shilpa Choudhary, Kanika Joshi","doi":"10.1109/UEMCON47517.2019.8992999","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992999","url":null,"abstract":"Uganda's Mobile Communication sector is one of the fastest growing in Africa and exhibits second highest internet growth in East Africa. The quantity of versatile mobile users had arrived at 23.24 million (23,249,967) with tele-density of 60 in September 2018 [2], which is about fifty percent portion of the nation's populace (in 2018). This has alarmed the research on the optimum utilization of bandwidth and voice channels used in GSM networks being prevailed in Uganda which are indeed two prominent constraints in mobile communication. The spectrum re-farming seems to be the only possible solution in near future however it additionally has some key difficulties like intricacy of operation and user disturbances. This research paper proposes and exhibits the investigation of Data Interleaving Technique in Mobile Communication in GSM networks of Kampala, Uganda. The simulation results show that significant enhancement of 54.22% in channel utilization and bandwidth optimization is possible with negligible overhead of 0.03%. Consequently it's easily feasible to accommodate more mobile internet users in limited allotted bandwidth and use the limited allotted spectrum efficiently.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"2005 62","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121010565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993055
S. Ahmadi, S. Rashad, H. Elgazzar
Technological advancements have made smartphones to provide wide range of applications that enable users to perform many of their tasks easily and conveniently, anytime and anywhere. For this reason, many users are tend to store their private data in their smart phones. Since conventional methods for security of smartphones, such as passwords, personal identification numbers, and pattern locks are prone to many attacks, this research paper proposes a novel method for authenticating smartphone users based on performing seven different daily physical activity as behavioral biometrics, using smartphone embedded sensor data. This authentication scheme builds a machine learning model which recognizes users by performing those daily activities. Experimental results demonstrate the effectiveness of the proposed framework.
{"title":"Machine Learning Models for Activity Recognition and Authentication of Smartphone Users","authors":"S. Ahmadi, S. Rashad, H. Elgazzar","doi":"10.1109/UEMCON47517.2019.8993055","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993055","url":null,"abstract":"Technological advancements have made smartphones to provide wide range of applications that enable users to perform many of their tasks easily and conveniently, anytime and anywhere. For this reason, many users are tend to store their private data in their smart phones. Since conventional methods for security of smartphones, such as passwords, personal identification numbers, and pattern locks are prone to many attacks, this research paper proposes a novel method for authenticating smartphone users based on performing seven different daily physical activity as behavioral biometrics, using smartphone embedded sensor data. This authentication scheme builds a machine learning model which recognizes users by performing those daily activities. Experimental results demonstrate the effectiveness of the proposed framework.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124325089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993028
Mike Brown, S. Pollock, Wafa Elmannai, Michael Joseph, K. Elleithy
One of the significant risks of computer systems is the lack of security whether that is attributed to the system vulnerabilities or too sophisticated intrusion techniques. The software security vulnerability is detrimental to the user as well as the system because of its inability to protect confidentiality within the system. Analysis from a national database displays how software vulnerabilities are categorized and how much of an impact they play amongst computer systems. To help preventing attacks, we propose that the focus be more on producing vulnerability free software, rather than focusing on issuing patches. The contribution of this paper is to show the need to include all three methods: prevention, detection and accommodation, to mitigate vulnerabilities. This requires the adoption of formal methods in software development, end user education and vulnerability modeling using the Kill Chain Technique.
{"title":"Vulnerability Analysis and Modeling","authors":"Mike Brown, S. Pollock, Wafa Elmannai, Michael Joseph, K. Elleithy","doi":"10.1109/UEMCON47517.2019.8993028","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993028","url":null,"abstract":"One of the significant risks of computer systems is the lack of security whether that is attributed to the system vulnerabilities or too sophisticated intrusion techniques. The software security vulnerability is detrimental to the user as well as the system because of its inability to protect confidentiality within the system. Analysis from a national database displays how software vulnerabilities are categorized and how much of an impact they play amongst computer systems. To help preventing attacks, we propose that the focus be more on producing vulnerability free software, rather than focusing on issuing patches. The contribution of this paper is to show the need to include all three methods: prevention, detection and accommodation, to mitigate vulnerabilities. This requires the adoption of formal methods in software development, end user education and vulnerability modeling using the Kill Chain Technique.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122961254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992942
Tomoki Ito, Hirofumi Noguchi, M. Kataoka, Takuma Isoda, Y. Yamato, T. Murase
This paper presents the performance evaluation of a metadata database (DB) management method that uses realistic numeric examples for IoT Live Data. The method is proposed to reduce the handling costs of Live Data. Live Data are here defined as data that are typically continuously generated by IoT devices and have short lifetimes (e.g., 10 fps surveillance camera images). We have already proposed an evaluation model in which the high locality is significantly featured in Live Data usage. The previous evaluation results are obtained only from general parameter values in statistical distributions. To evaluate realistic situations, this paper assumes that the metadata of Live Data with high usefulness for sharing by many users/services would dominate all metadata. In particular, for such data, we use both surveillance camera images and social networking service contents. The median values and the expected values are set considering the surveillance camera's locality (defined as the average distance between a surveillance camera and the users of its camera images). As a result, the proposed method can reduce the DB update costs by 99.0% while the additional search costs are reduced by up to 27.8% compared with the conventional metadata management method. The additional search costs are negligible compared with the reduction in DB update costs, since the number of searches is much smaller than the number of DB updates with respect to the number of update/search epochs.
{"title":"Evaluation of a Realistic Example of Information-Centric Network Metadata Management","authors":"Tomoki Ito, Hirofumi Noguchi, M. Kataoka, Takuma Isoda, Y. Yamato, T. Murase","doi":"10.1109/UEMCON47517.2019.8992942","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992942","url":null,"abstract":"This paper presents the performance evaluation of a metadata database (DB) management method that uses realistic numeric examples for IoT Live Data. The method is proposed to reduce the handling costs of Live Data. Live Data are here defined as data that are typically continuously generated by IoT devices and have short lifetimes (e.g., 10 fps surveillance camera images). We have already proposed an evaluation model in which the high locality is significantly featured in Live Data usage. The previous evaluation results are obtained only from general parameter values in statistical distributions. To evaluate realistic situations, this paper assumes that the metadata of Live Data with high usefulness for sharing by many users/services would dominate all metadata. In particular, for such data, we use both surveillance camera images and social networking service contents. The median values and the expected values are set considering the surveillance camera's locality (defined as the average distance between a surveillance camera and the users of its camera images). As a result, the proposed method can reduce the DB update costs by 99.0% while the additional search costs are reduced by up to 27.8% compared with the conventional metadata management method. The additional search costs are negligible compared with the reduction in DB update costs, since the number of searches is much smaller than the number of DB updates with respect to the number of update/search epochs.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122565684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993041
P. Stubberud
This paper presents a differential evolution algorithm that uses an elitist, ranking, random selection method and both two and three level Taguchi crossover. The algorithm is applied to 13 commonly used global numerical optimization test functions, including a spherical, three hyper-ellipsoid, the sum of different powers, Rastrigin's, Schwefel's, Griewank's, Rosen-brock's valley, Styblinski-Tang, Ackley's Path, Price-Rosenbrock, and Eggholder's functions. The algorithm is also used to design a number of optimal digital infinite impulse response (IIR) filters.
{"title":"The Design of Digital IIR Filters Using a Differential Evolution Optimization Algorithm with Taguchi Crossover","authors":"P. Stubberud","doi":"10.1109/UEMCON47517.2019.8993041","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993041","url":null,"abstract":"This paper presents a differential evolution algorithm that uses an elitist, ranking, random selection method and both two and three level Taguchi crossover. The algorithm is applied to 13 commonly used global numerical optimization test functions, including a spherical, three hyper-ellipsoid, the sum of different powers, Rastrigin's, Schwefel's, Griewank's, Rosen-brock's valley, Styblinski-Tang, Ackley's Path, Price-Rosenbrock, and Eggholder's functions. The algorithm is also used to design a number of optimal digital infinite impulse response (IIR) filters.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122454888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993065
Donghan Oh, Jaesung Lim, Jong-Kwan Lee, Hoki Baek
We propose a location algorithm to promptly search for crashed unmanned aerial vehicles (UAVs), using an airborne communication relay UAV (ACRU) in global positioning system (GPS)-denied environments. Conventional UAV based location methods require at least four UAVs to search for the crashed one. However, such methods are subject to significant errors according to the distance between the crashed UAV and the others. In the proposed algorithm, only one ACRU is required to locate the crashed UAV. The ACRU relays its own position and the signals from the crashed UAV in real-time to a ground control station (GCS), which then estimates the position of the crashed UAV based on time difference of arrival (TDOA) processing using the signals relayed from the ACRU. According to the estimated position of the crashed UAV, the ACRU then flies in the direction of the crashed UAV by applying a weighting algorithm to effectively estimate the distance to it. The performance of the proposed algorithm is verified by computer simulations by considering the conditions of an army battalion battlefield. We improve the accuracy of the proposed location algorithm by applying a weighting algorithm to the TDOA data, and we demonstrate that the location algorithm can be used to efficiently locate crashed UAVs in GPS denied environments.
{"title":"Airborne-Relay-based Algorithm for Locating Crashed UAVs in GPS-Denied Environments","authors":"Donghan Oh, Jaesung Lim, Jong-Kwan Lee, Hoki Baek","doi":"10.1109/UEMCON47517.2019.8993065","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993065","url":null,"abstract":"We propose a location algorithm to promptly search for crashed unmanned aerial vehicles (UAVs), using an airborne communication relay UAV (ACRU) in global positioning system (GPS)-denied environments. Conventional UAV based location methods require at least four UAVs to search for the crashed one. However, such methods are subject to significant errors according to the distance between the crashed UAV and the others. In the proposed algorithm, only one ACRU is required to locate the crashed UAV. The ACRU relays its own position and the signals from the crashed UAV in real-time to a ground control station (GCS), which then estimates the position of the crashed UAV based on time difference of arrival (TDOA) processing using the signals relayed from the ACRU. According to the estimated position of the crashed UAV, the ACRU then flies in the direction of the crashed UAV by applying a weighting algorithm to effectively estimate the distance to it. The performance of the proposed algorithm is verified by computer simulations by considering the conditions of an army battalion battlefield. We improve the accuracy of the proposed location algorithm by applying a weighting algorithm to the TDOA data, and we demonstrate that the location algorithm can be used to efficiently locate crashed UAVs in GPS denied environments.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115257625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993057
Anas M. Abdelhafez, H. Elattar, M. Aboul-Dahab
Device-to-Device (D2D) communication is an efficient and interesting feature of wireless networks of the next generation. It provides extremely low latency by allowing immediate communication between nearby wireless devices without transmitting data through the network facilities. This will add advanced features to cellular networks in the 5th generation (5 G) and beyond. Empowering D2D in the mobile network creates many technical problems such as device discovery, mode selection, data security, and interference mitigation. Cognitive radio D2D users (DUs) transmission radiates through diverse ways that cause undesirable interference to primary users (PUs) or cellular users (CUs) that share the same spectrum bands, which eventually lead to serious degradation of service quality and efficiency. This article proposes an intelligent channel selection scheme depending on learning algorithms that drive the selection scheme to be intelligent for D2D Cognitive Radio Network (DCRN) aiming at mitigating interference between DUs and PUs. An extensive analysis and comparisons with other algorithms are carried out to investigate its performance. The simulation results demonstrate that the proposed algorithm improves the accuracy of channel selection, maximizes the average throughput, spectrum utilization, packet delivery, and minimizes both the average delay and interference in D2D network under various network densities and a diverse number of channels.
设备到设备(D2D)通信是下一代无线网络的一个高效和有趣的特征。它允许附近无线设备之间的即时通信,而无需通过网络设施传输数据,从而提供极低的延迟。这将为第五代(5g)及以后的蜂窝网络添加高级功能。在移动网络中启用D2D会产生许多技术问题,例如设备发现、模式选择、数据安全性和干扰缓解。认知无线电D2D (Cognitive radio D2D)用户的传输方式多种多样,会对共享同一频段的主用户(pu)或蜂窝用户(cu)造成干扰,最终导致业务质量和效率严重下降。本文提出了一种基于学习算法的D2D认知无线网络(DCRN)智能信道选择方案,该方案旨在减轻du和pu之间的干扰。并与其他算法进行了广泛的分析和比较,以考察其性能。仿真结果表明,在不同网络密度和不同信道数的情况下,该算法提高了D2D网络中信道选择的准确性,最大限度地提高了平均吞吐量、频谱利用率、分组吞吐量,最大限度地降低了平均时延和干扰。
{"title":"Interference Mitigation by Intelligent Channel Selection for Device-to-Device Communications","authors":"Anas M. Abdelhafez, H. Elattar, M. Aboul-Dahab","doi":"10.1109/UEMCON47517.2019.8993057","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993057","url":null,"abstract":"Device-to-Device (D2D) communication is an efficient and interesting feature of wireless networks of the next generation. It provides extremely low latency by allowing immediate communication between nearby wireless devices without transmitting data through the network facilities. This will add advanced features to cellular networks in the 5th generation (5 G) and beyond. Empowering D2D in the mobile network creates many technical problems such as device discovery, mode selection, data security, and interference mitigation. Cognitive radio D2D users (DUs) transmission radiates through diverse ways that cause undesirable interference to primary users (PUs) or cellular users (CUs) that share the same spectrum bands, which eventually lead to serious degradation of service quality and efficiency. This article proposes an intelligent channel selection scheme depending on learning algorithms that drive the selection scheme to be intelligent for D2D Cognitive Radio Network (DCRN) aiming at mitigating interference between DUs and PUs. An extensive analysis and comparisons with other algorithms are carried out to investigate its performance. The simulation results demonstrate that the proposed algorithm improves the accuracy of channel selection, maximizes the average throughput, spectrum utilization, packet delivery, and minimizes both the average delay and interference in D2D network under various network densities and a diverse number of channels.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115665935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993083
Kiavash Fathi, M. Mahdavi
Noise is an inseparable part of control systems. Every sensor reading used for determining the state of a control system is corrupted with noise., therefor increasing the signal to noise ratio of sensor readings can significantly improve the performance of systems. The proposed filter in this paper captures the underlying probability distribution of the noise-free input signal in the training stage and therefor is capable of refining the corrupted input signal regardless of the distribution of the added noise. In order to acquire better data-driven based results in the suggested approach, it has been decided to use different neural network structures and stack these layers to form a hybrid multilayer filter. The properties of the stacked neural network sublayers guarantee a robust and general solution for the intended purpose. The key elements of the proposed filter are two auto-encoders., a dense neural network and a convolutional layer. Effects of every sublayer on the corrupted input signal., along with fine-tuning of these sublayers are discussed in detail. Afterwards in order to assess the generality and the robustness of the method., the proposed filter is exposed to a non-Gaussian noise. Finally., the proposed filter is tested on a linear and a nonlinear system. The comparison between systems” output to the reconstructed signal with that of the original noise-free signal., suggests the substantial improvement in the performance of the given systems. This improvement is in terms of systems” output resemblance to the reference noise-free output signal when the reconstructed signal is applied to the systems.
{"title":"Control System Response Improvement via Denoising Using Deep Neural Networks","authors":"Kiavash Fathi, M. Mahdavi","doi":"10.1109/UEMCON47517.2019.8993083","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993083","url":null,"abstract":"Noise is an inseparable part of control systems. Every sensor reading used for determining the state of a control system is corrupted with noise., therefor increasing the signal to noise ratio of sensor readings can significantly improve the performance of systems. The proposed filter in this paper captures the underlying probability distribution of the noise-free input signal in the training stage and therefor is capable of refining the corrupted input signal regardless of the distribution of the added noise. In order to acquire better data-driven based results in the suggested approach, it has been decided to use different neural network structures and stack these layers to form a hybrid multilayer filter. The properties of the stacked neural network sublayers guarantee a robust and general solution for the intended purpose. The key elements of the proposed filter are two auto-encoders., a dense neural network and a convolutional layer. Effects of every sublayer on the corrupted input signal., along with fine-tuning of these sublayers are discussed in detail. Afterwards in order to assess the generality and the robustness of the method., the proposed filter is exposed to a non-Gaussian noise. Finally., the proposed filter is tested on a linear and a nonlinear system. The comparison between systems” output to the reconstructed signal with that of the original noise-free signal., suggests the substantial improvement in the performance of the given systems. This improvement is in terms of systems” output resemblance to the reference noise-free output signal when the reconstructed signal is applied to the systems.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128459928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}