首页 > 最新文献

2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
A Matching Game Solution for Optimal RAT Selection in 5G Multi-RAT HetNets 5G多鼠网中最优鼠选择的匹配博弈解决方案
M. Anany, M. M. Elmesalawy, Eman Serag El Din
Multiple Radio Access Technologies (Multi-RAT) heterogeneous Networks (HetNets) have been proposed as one of the main solutions to comprise the enormous growth of data traffic in fifth generation (5G) mobile networks. In this paper we consider RAT selection problem in Multi-RAT HetNets where user equipment (UE) has to choose between Long term Evolution (LTE) and Wireless Local Area Network (WLAN) radio access technologies. In this context, the RAT selection is modeled as a UE association process and formulated as an optimization problem aiming to maximize a certain UEs' weighted objective function in terms of user equipment achievable data rates and the security levels provided by different base stations (BSs). The weighting parameter is decided to reflect the orientation of UEs in which higher weighting value for the security level, means that UEs tends to select the BSs that can provide best security levels rather than achieved data rates. A many-to-one matching game-based association approach is then proposed and applied to capture optimal solution for UE association problem. Our simulation results are compared to the well-known WLAN first association algorithm, the results show the outperformance of the proposed matching game based association approach in terms of the achieved system throughput and rate outage probability at different requirements of security levels.
多无线接入技术(Multi-RAT)异构网络(HetNets)已被提出作为包含第五代(5G)移动网络中巨大增长的数据流量的主要解决方案之一。本文研究了在多无线局域网(Multi-RAT HetNets)中,用户设备(UE)必须在长期演进(LTE)和无线局域网(WLAN)无线接入技术之间进行选择的RAT选择问题。在这种情况下,RAT选择被建模为一个UE关联过程,并被表述为一个优化问题,其目的是最大化用户设备可实现的数据速率和不同基站(BSs)提供的安全级别的某个UE的加权目标函数。权重参数的确定是为了反映终端的方向,安全级别的权重值越高,表示终端倾向于选择能够提供最佳安全级别的基站,而不是选择能够实现数据速率的基站。提出了一种基于多对一匹配博弈的关联方法,并将其应用于UE关联问题的最优解获取。我们的仿真结果与著名的WLAN优先关联算法进行了比较,结果表明,在不同安全级别要求下,基于匹配博弈的关联方法在实现系统吞吐量和速率中断概率方面都优于我们所提出的方法。
{"title":"A Matching Game Solution for Optimal RAT Selection in 5G Multi-RAT HetNets","authors":"M. Anany, M. M. Elmesalawy, Eman Serag El Din","doi":"10.1109/UEMCON47517.2019.8993013","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993013","url":null,"abstract":"Multiple Radio Access Technologies (Multi-RAT) heterogeneous Networks (HetNets) have been proposed as one of the main solutions to comprise the enormous growth of data traffic in fifth generation (5G) mobile networks. In this paper we consider RAT selection problem in Multi-RAT HetNets where user equipment (UE) has to choose between Long term Evolution (LTE) and Wireless Local Area Network (WLAN) radio access technologies. In this context, the RAT selection is modeled as a UE association process and formulated as an optimization problem aiming to maximize a certain UEs' weighted objective function in terms of user equipment achievable data rates and the security levels provided by different base stations (BSs). The weighting parameter is decided to reflect the orientation of UEs in which higher weighting value for the security level, means that UEs tends to select the BSs that can provide best security levels rather than achieved data rates. A many-to-one matching game-based association approach is then proposed and applied to capture optimal solution for UE association problem. Our simulation results are compared to the well-known WLAN first association algorithm, the results show the outperformance of the proposed matching game based association approach in terms of the achieved system throughput and rate outage probability at different requirements of security levels.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128857814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Distributed Weight-Based TDMA Scheduling Algorithm for Latency Improvement in IoT 一种基于权重的分布式TDMA时延优化算法
Mohamed Sofiane Batta, Z. Aliouat, S. Harous
The Internet of Things (IoT) and the Wireless Sensor Networks (WSNs) attract attention of the research communities due to their rapid and promising development. These paradigms have been predicted to play a leading role in our daily life in the near future. The limited resources and the restricted number of communication channels in these networks create new challenges especially in collision and access conflicts. To bring appropriate solutions for these problems, several works, in the literature, focus on centralized and distributed approaches. Traditional distributed protocols assume that the MAC and Routing layers act independently. Moreover, the dynamic topology and the central point of failure restrict the development of centralized techniques. In this paper, we present a distributed weight-based TDMA-MAC scheduling algorithm (WB-DTSA). The proposed solution takes advantage of routing information to improve the communication latency and the schedule length. Simulation results show better performance, in comparison to similar distributed channel assignment approaches. The latency is improved by 47% and the schedule length is reduced by 23%.
物联网(Internet of Things, IoT)和无线传感器网络(Wireless Sensor network, WSNs)以其迅速而有前景的发展受到了学术界的关注。据预测,在不久的将来,这些范式将在我们的日常生活中发挥主导作用。在这些网络中,有限的资源和有限的通信通道数量带来了新的挑战,特别是在碰撞和接入冲突中。为了给这些问题带来适当的解决方案,在文献中,一些作品集中在集中和分布式方法上。传统的分布式协议假设MAC层和路由层独立工作。此外,动态拓扑结构和故障中心点限制了集中式技术的发展。本文提出了一种基于权重的分布式TDMA-MAC调度算法(WB-DTSA)。该方案利用路由信息来改善通信延迟和调度长度。仿真结果表明,与同类分布式信道分配方法相比,该方法具有更好的性能。延迟提高了47%,计划长度减少了23%。
{"title":"A Distributed Weight-Based TDMA Scheduling Algorithm for Latency Improvement in IoT","authors":"Mohamed Sofiane Batta, Z. Aliouat, S. Harous","doi":"10.1109/UEMCON47517.2019.8993097","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993097","url":null,"abstract":"The Internet of Things (IoT) and the Wireless Sensor Networks (WSNs) attract attention of the research communities due to their rapid and promising development. These paradigms have been predicted to play a leading role in our daily life in the near future. The limited resources and the restricted number of communication channels in these networks create new challenges especially in collision and access conflicts. To bring appropriate solutions for these problems, several works, in the literature, focus on centralized and distributed approaches. Traditional distributed protocols assume that the MAC and Routing layers act independently. Moreover, the dynamic topology and the central point of failure restrict the development of centralized techniques. In this paper, we present a distributed weight-based TDMA-MAC scheduling algorithm (WB-DTSA). The proposed solution takes advantage of routing information to improve the communication latency and the schedule length. Simulation results show better performance, in comparison to similar distributed channel assignment approaches. The latency is improved by 47% and the schedule length is reduced by 23%.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Channel Redundancy Analysis and Bandwidth Utilization in GSM Mobile Communication Network of Uganda 乌干达GSM移动通信网信道冗余分析与带宽利用
Hemant Purohit, P. Kaur, D. Mwebesa, Shilpa Choudhary, Kanika Joshi
Uganda's Mobile Communication sector is one of the fastest growing in Africa and exhibits second highest internet growth in East Africa. The quantity of versatile mobile users had arrived at 23.24 million (23,249,967) with tele-density of 60 in September 2018 [2], which is about fifty percent portion of the nation's populace (in 2018). This has alarmed the research on the optimum utilization of bandwidth and voice channels used in GSM networks being prevailed in Uganda which are indeed two prominent constraints in mobile communication. The spectrum re-farming seems to be the only possible solution in near future however it additionally has some key difficulties like intricacy of operation and user disturbances. This research paper proposes and exhibits the investigation of Data Interleaving Technique in Mobile Communication in GSM networks of Kampala, Uganda. The simulation results show that significant enhancement of 54.22% in channel utilization and bandwidth optimization is possible with negligible overhead of 0.03%. Consequently it's easily feasible to accommodate more mobile internet users in limited allotted bandwidth and use the limited allotted spectrum efficiently.
乌干达的移动通信部门是非洲增长最快的部门之一,在东非的互联网增长速度第二高。2018年9月,多功能移动用户数量达到2324万(23,249,967),电话密度为60[2],约占全国人口(2018年)的50%。这使乌干达正在进行的关于最佳利用GSM网络中使用的带宽和语音信道的研究感到震惊,这确实是移动通信的两个突出限制。频谱重新分配似乎是近期唯一可行的解决方案,但它也存在一些关键困难,如操作复杂性和用户干扰。本文提出并展示了乌干达坎帕拉GSM网络移动通信中数据交错技术的研究。仿真结果表明,在可以忽略不计的0.03%开销的情况下,信道利用率和带宽优化可以显著提高54.22%。因此,在有限的分配带宽中容纳更多的移动互联网用户并有效地利用有限的分配频谱是很容易实现的。
{"title":"Channel Redundancy Analysis and Bandwidth Utilization in GSM Mobile Communication Network of Uganda","authors":"Hemant Purohit, P. Kaur, D. Mwebesa, Shilpa Choudhary, Kanika Joshi","doi":"10.1109/UEMCON47517.2019.8992999","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992999","url":null,"abstract":"Uganda's Mobile Communication sector is one of the fastest growing in Africa and exhibits second highest internet growth in East Africa. The quantity of versatile mobile users had arrived at 23.24 million (23,249,967) with tele-density of 60 in September 2018 [2], which is about fifty percent portion of the nation's populace (in 2018). This has alarmed the research on the optimum utilization of bandwidth and voice channels used in GSM networks being prevailed in Uganda which are indeed two prominent constraints in mobile communication. The spectrum re-farming seems to be the only possible solution in near future however it additionally has some key difficulties like intricacy of operation and user disturbances. This research paper proposes and exhibits the investigation of Data Interleaving Technique in Mobile Communication in GSM networks of Kampala, Uganda. The simulation results show that significant enhancement of 54.22% in channel utilization and bandwidth optimization is possible with negligible overhead of 0.03%. Consequently it's easily feasible to accommodate more mobile internet users in limited allotted bandwidth and use the limited allotted spectrum efficiently.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"2005 62","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121010565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine Learning Models for Activity Recognition and Authentication of Smartphone Users 智能手机用户活动识别与认证的机器学习模型
S. Ahmadi, S. Rashad, H. Elgazzar
Technological advancements have made smartphones to provide wide range of applications that enable users to perform many of their tasks easily and conveniently, anytime and anywhere. For this reason, many users are tend to store their private data in their smart phones. Since conventional methods for security of smartphones, such as passwords, personal identification numbers, and pattern locks are prone to many attacks, this research paper proposes a novel method for authenticating smartphone users based on performing seven different daily physical activity as behavioral biometrics, using smartphone embedded sensor data. This authentication scheme builds a machine learning model which recognizes users by performing those daily activities. Experimental results demonstrate the effectiveness of the proposed framework.
技术进步使智能手机提供了广泛的应用程序,使用户能够随时随地轻松方便地执行许多任务。出于这个原因,许多用户倾向于将他们的私人数据存储在他们的智能手机中。由于智能手机的传统安全方法,如密码、个人识别号码和模式锁容易受到许多攻击,本研究论文提出了一种基于执行七种不同的日常身体活动作为行为生物识别的智能手机用户身份验证的新方法,使用智能手机嵌入式传感器数据。该认证方案构建了一个机器学习模型,该模型通过执行这些日常活动来识别用户。实验结果证明了该框架的有效性。
{"title":"Machine Learning Models for Activity Recognition and Authentication of Smartphone Users","authors":"S. Ahmadi, S. Rashad, H. Elgazzar","doi":"10.1109/UEMCON47517.2019.8993055","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993055","url":null,"abstract":"Technological advancements have made smartphones to provide wide range of applications that enable users to perform many of their tasks easily and conveniently, anytime and anywhere. For this reason, many users are tend to store their private data in their smart phones. Since conventional methods for security of smartphones, such as passwords, personal identification numbers, and pattern locks are prone to many attacks, this research paper proposes a novel method for authenticating smartphone users based on performing seven different daily physical activity as behavioral biometrics, using smartphone embedded sensor data. This authentication scheme builds a machine learning model which recognizes users by performing those daily activities. Experimental results demonstrate the effectiveness of the proposed framework.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124325089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Vulnerability Analysis and Modeling 漏洞分析与建模
Mike Brown, S. Pollock, Wafa Elmannai, Michael Joseph, K. Elleithy
One of the significant risks of computer systems is the lack of security whether that is attributed to the system vulnerabilities or too sophisticated intrusion techniques. The software security vulnerability is detrimental to the user as well as the system because of its inability to protect confidentiality within the system. Analysis from a national database displays how software vulnerabilities are categorized and how much of an impact they play amongst computer systems. To help preventing attacks, we propose that the focus be more on producing vulnerability free software, rather than focusing on issuing patches. The contribution of this paper is to show the need to include all three methods: prevention, detection and accommodation, to mitigate vulnerabilities. This requires the adoption of formal methods in software development, end user education and vulnerability modeling using the Kill Chain Technique.
计算机系统的一个重大风险是缺乏安全性,无论是由于系统漏洞还是由于过于复杂的入侵技术。软件安全漏洞由于无法保护系统内部的机密性,对用户和系统都是有害的。来自国家数据库的分析显示了软件漏洞是如何分类的,以及它们对计算机系统的影响有多大。为了帮助防止攻击,我们建议将重点更多地放在生产无漏洞软件上,而不是集中在发布补丁上。本文的贡献在于表明需要包括所有三种方法:预防、检测和适应,以减轻脆弱性。这需要在软件开发中采用正式的方法,对最终用户进行教育,并使用杀伤链技术对漏洞进行建模。
{"title":"Vulnerability Analysis and Modeling","authors":"Mike Brown, S. Pollock, Wafa Elmannai, Michael Joseph, K. Elleithy","doi":"10.1109/UEMCON47517.2019.8993028","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993028","url":null,"abstract":"One of the significant risks of computer systems is the lack of security whether that is attributed to the system vulnerabilities or too sophisticated intrusion techniques. The software security vulnerability is detrimental to the user as well as the system because of its inability to protect confidentiality within the system. Analysis from a national database displays how software vulnerabilities are categorized and how much of an impact they play amongst computer systems. To help preventing attacks, we propose that the focus be more on producing vulnerability free software, rather than focusing on issuing patches. The contribution of this paper is to show the need to include all three methods: prevention, detection and accommodation, to mitigate vulnerabilities. This requires the adoption of formal methods in software development, end user education and vulnerability modeling using the Kill Chain Technique.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122961254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of a Realistic Example of Information-Centric Network Metadata Management 一个以信息为中心的网络元数据管理实例的评估
Tomoki Ito, Hirofumi Noguchi, M. Kataoka, Takuma Isoda, Y. Yamato, T. Murase
This paper presents the performance evaluation of a metadata database (DB) management method that uses realistic numeric examples for IoT Live Data. The method is proposed to reduce the handling costs of Live Data. Live Data are here defined as data that are typically continuously generated by IoT devices and have short lifetimes (e.g., 10 fps surveillance camera images). We have already proposed an evaluation model in which the high locality is significantly featured in Live Data usage. The previous evaluation results are obtained only from general parameter values in statistical distributions. To evaluate realistic situations, this paper assumes that the metadata of Live Data with high usefulness for sharing by many users/services would dominate all metadata. In particular, for such data, we use both surveillance camera images and social networking service contents. The median values and the expected values are set considering the surveillance camera's locality (defined as the average distance between a surveillance camera and the users of its camera images). As a result, the proposed method can reduce the DB update costs by 99.0% while the additional search costs are reduced by up to 27.8% compared with the conventional metadata management method. The additional search costs are negligible compared with the reduction in DB update costs, since the number of searches is much smaller than the number of DB updates with respect to the number of update/search epochs.
本文介绍了一种元数据数据库(DB)管理方法的性能评估,该方法使用了物联网实时数据的实际数值示例。提出该方法是为了降低实时数据的处理成本。实时数据在这里被定义为通常由物联网设备连续生成且寿命较短的数据(例如,10fps监控摄像头图像)。我们已经提出了一个评估模型,其中高局部性在实时数据使用中具有重要特征。以往的评价结果只是从统计分布中的一般参数值得出的。为了评估现实情况,本文假设对许多用户/服务共享具有高有用性的实时数据元数据将主导所有元数据。特别是,对于这些数据,我们同时使用监控摄像头图像和社交网络服务内容。考虑监控摄像机的局域性(定义为监控摄像机与其摄像机图像使用者之间的平均距离)来设置中值和期望值。结果表明,与传统元数据管理方法相比,该方法可将数据库更新成本降低99.0%,而额外的搜索成本最高可降低27.8%。与数据库更新成本的减少相比,额外的搜索成本可以忽略不计,因为相对于更新/搜索周期的数量,搜索次数要比数据库更新次数少得多。
{"title":"Evaluation of a Realistic Example of Information-Centric Network Metadata Management","authors":"Tomoki Ito, Hirofumi Noguchi, M. Kataoka, Takuma Isoda, Y. Yamato, T. Murase","doi":"10.1109/UEMCON47517.2019.8992942","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992942","url":null,"abstract":"This paper presents the performance evaluation of a metadata database (DB) management method that uses realistic numeric examples for IoT Live Data. The method is proposed to reduce the handling costs of Live Data. Live Data are here defined as data that are typically continuously generated by IoT devices and have short lifetimes (e.g., 10 fps surveillance camera images). We have already proposed an evaluation model in which the high locality is significantly featured in Live Data usage. The previous evaluation results are obtained only from general parameter values in statistical distributions. To evaluate realistic situations, this paper assumes that the metadata of Live Data with high usefulness for sharing by many users/services would dominate all metadata. In particular, for such data, we use both surveillance camera images and social networking service contents. The median values and the expected values are set considering the surveillance camera's locality (defined as the average distance between a surveillance camera and the users of its camera images). As a result, the proposed method can reduce the DB update costs by 99.0% while the additional search costs are reduced by up to 27.8% compared with the conventional metadata management method. The additional search costs are negligible compared with the reduction in DB update costs, since the number of searches is much smaller than the number of DB updates with respect to the number of update/search epochs.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122565684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Design of Digital IIR Filters Using a Differential Evolution Optimization Algorithm with Taguchi Crossover 基于田口交叉的差分进化优化算法设计数字IIR滤波器
P. Stubberud
This paper presents a differential evolution algorithm that uses an elitist, ranking, random selection method and both two and three level Taguchi crossover. The algorithm is applied to 13 commonly used global numerical optimization test functions, including a spherical, three hyper-ellipsoid, the sum of different powers, Rastrigin's, Schwefel's, Griewank's, Rosen-brock's valley, Styblinski-Tang, Ackley's Path, Price-Rosenbrock, and Eggholder's functions. The algorithm is also used to design a number of optimal digital infinite impulse response (IIR) filters.
本文提出了一种采用精英、排序、随机选择方法和二、三级田口交叉的差分进化算法。该算法应用于13种常用的全局数值优化测试函数,包括一个球面、三个超椭球、不同幂和、Rastrigin、Schwefel、Griewank、rosenbrock 's valley、Styblinski-Tang、Ackley's Path、Price-Rosenbrock和Eggholder's函数。该算法还用于设计一些最优的数字无限脉冲响应(IIR)滤波器。
{"title":"The Design of Digital IIR Filters Using a Differential Evolution Optimization Algorithm with Taguchi Crossover","authors":"P. Stubberud","doi":"10.1109/UEMCON47517.2019.8993041","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993041","url":null,"abstract":"This paper presents a differential evolution algorithm that uses an elitist, ranking, random selection method and both two and three level Taguchi crossover. The algorithm is applied to 13 commonly used global numerical optimization test functions, including a spherical, three hyper-ellipsoid, the sum of different powers, Rastrigin's, Schwefel's, Griewank's, Rosen-brock's valley, Styblinski-Tang, Ackley's Path, Price-Rosenbrock, and Eggholder's functions. The algorithm is also used to design a number of optimal digital infinite impulse response (IIR) filters.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122454888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Airborne-Relay-based Algorithm for Locating Crashed UAVs in GPS-Denied Environments gps拒绝环境下基于机载中继的坠毁无人机定位算法
Donghan Oh, Jaesung Lim, Jong-Kwan Lee, Hoki Baek
We propose a location algorithm to promptly search for crashed unmanned aerial vehicles (UAVs), using an airborne communication relay UAV (ACRU) in global positioning system (GPS)-denied environments. Conventional UAV based location methods require at least four UAVs to search for the crashed one. However, such methods are subject to significant errors according to the distance between the crashed UAV and the others. In the proposed algorithm, only one ACRU is required to locate the crashed UAV. The ACRU relays its own position and the signals from the crashed UAV in real-time to a ground control station (GCS), which then estimates the position of the crashed UAV based on time difference of arrival (TDOA) processing using the signals relayed from the ACRU. According to the estimated position of the crashed UAV, the ACRU then flies in the direction of the crashed UAV by applying a weighting algorithm to effectively estimate the distance to it. The performance of the proposed algorithm is verified by computer simulations by considering the conditions of an army battalion battlefield. We improve the accuracy of the proposed location algorithm by applying a weighting algorithm to the TDOA data, and we demonstrate that the location algorithm can be used to efficiently locate crashed UAVs in GPS denied environments.
提出了一种基于机载通信中继无人机(ACRU)在全球定位系统(GPS)拒绝环境下快速搜索坠毁无人机的定位算法。传统的基于无人机的定位方法需要至少四架无人机来搜索坠毁的一架。然而,根据坠毁无人机和其他无人机之间的距离,这种方法受到显著误差的影响。在该算法中,只需要一个ACRU就可以定位坠毁的无人机。ACRU将自己的位置和来自坠毁无人机的信号实时中继到地面控制站(GCS),然后地面控制站使用来自ACRU中继的信号基于到达时间差(TDOA)处理估计坠毁无人机的位置。根据估计的坠毁无人机位置,ACRU通过加权算法有效估计到坠毁无人机的距离,沿坠毁无人机的方向飞行。结合某军营的战场情况,通过计算机仿真验证了该算法的有效性。我们通过对TDOA数据应用加权算法来提高所提出的定位算法的精度,并证明了该定位算法可用于在GPS拒绝环境中有效定位坠毁无人机。
{"title":"Airborne-Relay-based Algorithm for Locating Crashed UAVs in GPS-Denied Environments","authors":"Donghan Oh, Jaesung Lim, Jong-Kwan Lee, Hoki Baek","doi":"10.1109/UEMCON47517.2019.8993065","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993065","url":null,"abstract":"We propose a location algorithm to promptly search for crashed unmanned aerial vehicles (UAVs), using an airborne communication relay UAV (ACRU) in global positioning system (GPS)-denied environments. Conventional UAV based location methods require at least four UAVs to search for the crashed one. However, such methods are subject to significant errors according to the distance between the crashed UAV and the others. In the proposed algorithm, only one ACRU is required to locate the crashed UAV. The ACRU relays its own position and the signals from the crashed UAV in real-time to a ground control station (GCS), which then estimates the position of the crashed UAV based on time difference of arrival (TDOA) processing using the signals relayed from the ACRU. According to the estimated position of the crashed UAV, the ACRU then flies in the direction of the crashed UAV by applying a weighting algorithm to effectively estimate the distance to it. The performance of the proposed algorithm is verified by computer simulations by considering the conditions of an army battalion battlefield. We improve the accuracy of the proposed location algorithm by applying a weighting algorithm to the TDOA data, and we demonstrate that the location algorithm can be used to efficiently locate crashed UAVs in GPS denied environments.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115257625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interference Mitigation by Intelligent Channel Selection for Device-to-Device Communications 基于智能信道选择的设备间通信干扰缓解
Anas M. Abdelhafez, H. Elattar, M. Aboul-Dahab
Device-to-Device (D2D) communication is an efficient and interesting feature of wireless networks of the next generation. It provides extremely low latency by allowing immediate communication between nearby wireless devices without transmitting data through the network facilities. This will add advanced features to cellular networks in the 5th generation (5 G) and beyond. Empowering D2D in the mobile network creates many technical problems such as device discovery, mode selection, data security, and interference mitigation. Cognitive radio D2D users (DUs) transmission radiates through diverse ways that cause undesirable interference to primary users (PUs) or cellular users (CUs) that share the same spectrum bands, which eventually lead to serious degradation of service quality and efficiency. This article proposes an intelligent channel selection scheme depending on learning algorithms that drive the selection scheme to be intelligent for D2D Cognitive Radio Network (DCRN) aiming at mitigating interference between DUs and PUs. An extensive analysis and comparisons with other algorithms are carried out to investigate its performance. The simulation results demonstrate that the proposed algorithm improves the accuracy of channel selection, maximizes the average throughput, spectrum utilization, packet delivery, and minimizes both the average delay and interference in D2D network under various network densities and a diverse number of channels.
设备到设备(D2D)通信是下一代无线网络的一个高效和有趣的特征。它允许附近无线设备之间的即时通信,而无需通过网络设施传输数据,从而提供极低的延迟。这将为第五代(5g)及以后的蜂窝网络添加高级功能。在移动网络中启用D2D会产生许多技术问题,例如设备发现、模式选择、数据安全性和干扰缓解。认知无线电D2D (Cognitive radio D2D)用户的传输方式多种多样,会对共享同一频段的主用户(pu)或蜂窝用户(cu)造成干扰,最终导致业务质量和效率严重下降。本文提出了一种基于学习算法的D2D认知无线网络(DCRN)智能信道选择方案,该方案旨在减轻du和pu之间的干扰。并与其他算法进行了广泛的分析和比较,以考察其性能。仿真结果表明,在不同网络密度和不同信道数的情况下,该算法提高了D2D网络中信道选择的准确性,最大限度地提高了平均吞吐量、频谱利用率、分组吞吐量,最大限度地降低了平均时延和干扰。
{"title":"Interference Mitigation by Intelligent Channel Selection for Device-to-Device Communications","authors":"Anas M. Abdelhafez, H. Elattar, M. Aboul-Dahab","doi":"10.1109/UEMCON47517.2019.8993057","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993057","url":null,"abstract":"Device-to-Device (D2D) communication is an efficient and interesting feature of wireless networks of the next generation. It provides extremely low latency by allowing immediate communication between nearby wireless devices without transmitting data through the network facilities. This will add advanced features to cellular networks in the 5th generation (5 G) and beyond. Empowering D2D in the mobile network creates many technical problems such as device discovery, mode selection, data security, and interference mitigation. Cognitive radio D2D users (DUs) transmission radiates through diverse ways that cause undesirable interference to primary users (PUs) or cellular users (CUs) that share the same spectrum bands, which eventually lead to serious degradation of service quality and efficiency. This article proposes an intelligent channel selection scheme depending on learning algorithms that drive the selection scheme to be intelligent for D2D Cognitive Radio Network (DCRN) aiming at mitigating interference between DUs and PUs. An extensive analysis and comparisons with other algorithms are carried out to investigate its performance. The simulation results demonstrate that the proposed algorithm improves the accuracy of channel selection, maximizes the average throughput, spectrum utilization, packet delivery, and minimizes both the average delay and interference in D2D network under various network densities and a diverse number of channels.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115665935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Control System Response Improvement via Denoising Using Deep Neural Networks 基于深度神经网络去噪的控制系统响应改进
Kiavash Fathi, M. Mahdavi
Noise is an inseparable part of control systems. Every sensor reading used for determining the state of a control system is corrupted with noise., therefor increasing the signal to noise ratio of sensor readings can significantly improve the performance of systems. The proposed filter in this paper captures the underlying probability distribution of the noise-free input signal in the training stage and therefor is capable of refining the corrupted input signal regardless of the distribution of the added noise. In order to acquire better data-driven based results in the suggested approach, it has been decided to use different neural network structures and stack these layers to form a hybrid multilayer filter. The properties of the stacked neural network sublayers guarantee a robust and general solution for the intended purpose. The key elements of the proposed filter are two auto-encoders., a dense neural network and a convolutional layer. Effects of every sublayer on the corrupted input signal., along with fine-tuning of these sublayers are discussed in detail. Afterwards in order to assess the generality and the robustness of the method., the proposed filter is exposed to a non-Gaussian noise. Finally., the proposed filter is tested on a linear and a nonlinear system. The comparison between systems” output to the reconstructed signal with that of the original noise-free signal., suggests the substantial improvement in the performance of the given systems. This improvement is in terms of systems” output resemblance to the reference noise-free output signal when the reconstructed signal is applied to the systems.
噪声是控制系统不可分割的一部分。用于确定控制系统状态的每个传感器读数都受到噪声的破坏。,因此,提高传感器读数的信噪比可以显著提高系统的性能。本文提出的滤波器在训练阶段捕获了无噪声输入信号的潜在概率分布,因此无论附加噪声的分布如何,都能够精炼损坏的输入信号。为了在建议的方法中获得更好的基于数据驱动的结果,决定使用不同的神经网络结构并将这些层堆叠形成混合多层滤波器。堆叠神经网络子层的特性保证了鲁棒性和通用性。该滤波器的关键元件是两个自编码器。一个密集的神经网络和一个卷积层。每个子层对损坏输入信号的影响。,并详细讨论了这些子层的微调。为了评价该方法的通用性和鲁棒性。,所提出的滤波器暴露在非高斯噪声中。最后。在线性和非线性系统上进行了测试。系统对重构信号的输出与原始无噪声信号的输出的比较。,表明给定系统的性能有了实质性的改进。当将重构信号应用于系统时,系统输出与参考无噪声输出信号的相似度得到了提高。
{"title":"Control System Response Improvement via Denoising Using Deep Neural Networks","authors":"Kiavash Fathi, M. Mahdavi","doi":"10.1109/UEMCON47517.2019.8993083","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993083","url":null,"abstract":"Noise is an inseparable part of control systems. Every sensor reading used for determining the state of a control system is corrupted with noise., therefor increasing the signal to noise ratio of sensor readings can significantly improve the performance of systems. The proposed filter in this paper captures the underlying probability distribution of the noise-free input signal in the training stage and therefor is capable of refining the corrupted input signal regardless of the distribution of the added noise. In order to acquire better data-driven based results in the suggested approach, it has been decided to use different neural network structures and stack these layers to form a hybrid multilayer filter. The properties of the stacked neural network sublayers guarantee a robust and general solution for the intended purpose. The key elements of the proposed filter are two auto-encoders., a dense neural network and a convolutional layer. Effects of every sublayer on the corrupted input signal., along with fine-tuning of these sublayers are discussed in detail. Afterwards in order to assess the generality and the robustness of the method., the proposed filter is exposed to a non-Gaussian noise. Finally., the proposed filter is tested on a linear and a nonlinear system. The comparison between systems” output to the reconstructed signal with that of the original noise-free signal., suggests the substantial improvement in the performance of the given systems. This improvement is in terms of systems” output resemblance to the reference noise-free output signal when the reconstructed signal is applied to the systems.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128459928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1