首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
Development of novel intrusion detection in Internet of Things using improved dart game optimizer-derived optimal cascaded ensemble learning 利用改进的飞镖游戏优化器衍生的优化级联集合学习,开发物联网中的新型入侵检测系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-10 DOI: 10.1002/ett.5018
A. Shali, Dr. A. Chinnasamy, P. Selvakumari

Background of the Study

Internet of things (IoT) industry has accelerated its development with the support of advanced information technology and economic expansion. A complete industrial foundation includes software, chips, electronic components, IoT services, integrated systems, machinery, and telecom operators, which the gradual improvement in the IoT industry system has formulated. As the exponential growth of IoT devices increases, the attack surface available to cybercriminals enables them to carry out potentially more damaging operations. As a result, the security sector has witnessed a rise in cyberattacks. Hackers use several methods to copy and modify the information in the IoT environment. Machine learning techniques are used by the intrusion detection (ID) model to determine and categorize attacks in IoT networks.

Objectives

Thus, this study explores the ID system with the heuristic-assisted deep learning approaches for effectively detect the attacks in the IoT. At first, the IoT data are garnered in benchmark resources. Then, the gathered data is preprocessed to perform data cleaning. Next, the data is transformed and fed to the feature extraction stage. The feature extraction is performed with the help of one-dimensional convolutional neural network (1D-CNN), where the features are extracted from the target-based pooling layer. Then, these attained deep features are fed to the ID phase, where the cascaded ensemble learning (CEL) approach is adopted for detecting the intrusions. Here, the hyperparameter tuning is done with a new suggested improved darts game optimizer (IDGO) algorithm. Here, the main objective of the developed algorithm helps to maximize accuracy in ID.

Findings

Throughout the experimental findings, the developed model provides 86% of accuracy. Thus, the finding of the developed model shows less detecting time and higher detection efficiency.

研究背景 物联网(IoT)产业在先进信息技术和经济扩张的支撑下加速发展。一个完整的产业基础包括软件、芯片、电子元器件、物联网服务、集成系统、机械、电信运营商等,物联网产业体系的逐步完善使之形成。随着物联网设备的指数级增长,网络犯罪分子可利用的攻击面也随之增加,使他们有可能实施更具破坏性的行动。因此,安全领域的网络攻击也随之增加。黑客使用多种方法复制和修改物联网环境中的信息。入侵检测(ID)模型使用机器学习技术对物联网网络中的攻击进行判断和分类。 因此,本研究利用启发式辅助深度学习方法探索 ID 系统,以有效检测物联网中的攻击。首先,在基准资源中收集物联网数据。然后,对收集到的数据进行预处理,以执行数据清理。然后,对数据进行转换并送入特征提取阶段。特征提取是在一维卷积神经网络(1D-CNN)的帮助下进行的,其中的特征是从基于目标的池化层中提取的。然后,这些获得的深度特征被送入 ID 阶段,在该阶段采用级联集合学习(CEL)方法来检测入侵。在这里,超参数调整是通过一种新建议的改进飞镖游戏优化器(IDGO)算法完成的。在这里,所开发算法的主要目标是帮助最大限度地提高 ID 的准确性。 实验结果 纵观实验结果,所开发的模型提供了 86% 的准确率。因此,所开发模型的检测时间更短,检测效率更高。
{"title":"Development of novel intrusion detection in Internet of Things using improved dart game optimizer-derived optimal cascaded ensemble learning","authors":"A. Shali,&nbsp;Dr. A. Chinnasamy,&nbsp;P. Selvakumari","doi":"10.1002/ett.5018","DOIUrl":"https://doi.org/10.1002/ett.5018","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Background of the Study</h3>\u0000 \u0000 <p>Internet of things (IoT) industry has accelerated its development with the support of advanced information technology and economic expansion. A complete industrial foundation includes software, chips, electronic components, IoT services, integrated systems, machinery, and telecom operators, which the gradual improvement in the IoT industry system has formulated. As the exponential growth of IoT devices increases, the attack surface available to cybercriminals enables them to carry out potentially more damaging operations. As a result, the security sector has witnessed a rise in cyberattacks. Hackers use several methods to copy and modify the information in the IoT environment. Machine learning techniques are used by the intrusion detection (ID) model to determine and categorize attacks in IoT networks.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Objectives</h3>\u0000 \u0000 <p>Thus, this study explores the ID system with the heuristic-assisted deep learning approaches for effectively detect the attacks in the IoT. At first, the IoT data are garnered in benchmark resources. Then, the gathered data is preprocessed to perform data cleaning. Next, the data is transformed and fed to the feature extraction stage. The feature extraction is performed with the help of one-dimensional convolutional neural network (1D-CNN), where the features are extracted from the target-based pooling layer. Then, these attained deep features are fed to the ID phase, where the cascaded ensemble learning (CEL) approach is adopted for detecting the intrusions. Here, the hyperparameter tuning is done with a new suggested improved darts game optimizer (IDGO) algorithm. Here, the main objective of the developed algorithm helps to maximize accuracy in ID.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Findings</h3>\u0000 \u0000 <p>Throughout the experimental findings, the developed model provides 86% of accuracy. Thus, the finding of the developed model shows less detecting time and higher detection efficiency.</p>\u0000 </section>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 7","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141584085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HRF-ExGB: Hybrid random forest-extreme gradient boosting for mobile edge computing HRF-ExGB:用于移动边缘计算的混合随机森林-极梯度提升技术
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-06 DOI: 10.1002/ett.5010
Muthukrishnan Anuradha, John Jean Justus, Kaliyaperumal Vijayalakshmi, JK Periasamy

The development of increasingly cutting-edge mobile apps like augmented reality, facial recognition, and natural language processing has been facilitated by the sharp rise in smartphone demand. The increased use of mobile devices like wireless sensors and wearable technology has led to a rapid increase in mobile applications. Due to the explosive growth of the Internet and distributed computing resources of edge devices in mobile edge computing (MEC), it is necessary to have a suitable controller to ensure effective utilization of distributed computing resources. However, the existing approaches can lead to more computation time, more consumption of energy, and a lack of security issues. To overcome these issues, this paper proposed a novel approach called Hybrid Random Forest-Extreme Gradient Boosting (HRF-XGBoost) to enhance the computation offloading and joint resource allocation predictions. In a wireless-powered multiuser MEC system, the starling murmuration optimization model is utilized to figure out the ideal task offloading options. XGBoost is combined with a random forest classifier to form an HRF-XGBoost architecture which is used to speed up the process while preserving the user's device's battery. An offloading method is created employing certain processes once the best computation offloading decision for Mobile Users (MUs) has been established. The experiment result shows that the method reduced system overhead and time complexity using the strategy of selecting fewer tasks alone by optimally eliminating other tasks. It optimizes the execution time even when the mobile user increases. The performance of the overall system can be greatly improved by our model compared to other existing techniques.

智能手机需求的急剧增长促进了增强现实、面部识别和自然语言处理等日益尖端的移动应用程序的开发。无线传感器和可穿戴技术等移动设备的使用增多,导致移动应用迅速增加。由于互联网和移动边缘计算(MEC)中边缘设备的分布式计算资源呈爆炸式增长,因此需要一个合适的控制器来确保分布式计算资源的有效利用。然而,现有的方法会导致更多的计算时间、更多的能源消耗以及缺乏安全性等问题。为了克服这些问题,本文提出了一种名为混合随机森林-极梯度提升(HRF-XGBoost)的新方法,以增强计算卸载和联合资源分配预测。在无线供电的多用户 MEC 系统中,利用椋鸟杂音优化模型找出理想的任务卸载选项。XGBoost 与随机森林分类器相结合,形成了 HRF-XGBoost 架构,该架构用于加快卸载过程,同时保护用户设备的电池。一旦确定了移动用户(MU)的最佳计算卸载决策,就会创建一种采用特定流程的卸载方法。实验结果表明,该方法采用了通过优化消除其他任务来单独选择较少任务的策略,从而降低了系统开销和时间复杂性。即使移动用户增加,它也能优化执行时间。与其他现有技术相比,我们的模型可以大大提高整个系统的性能。
{"title":"HRF-ExGB: Hybrid random forest-extreme gradient boosting for mobile edge computing","authors":"Muthukrishnan Anuradha,&nbsp;John Jean Justus,&nbsp;Kaliyaperumal Vijayalakshmi,&nbsp;JK Periasamy","doi":"10.1002/ett.5010","DOIUrl":"https://doi.org/10.1002/ett.5010","url":null,"abstract":"<p>The development of increasingly cutting-edge mobile apps like augmented reality, facial recognition, and natural language processing has been facilitated by the sharp rise in smartphone demand. The increased use of mobile devices like wireless sensors and wearable technology has led to a rapid increase in mobile applications. Due to the explosive growth of the Internet and distributed computing resources of edge devices in mobile edge computing (MEC), it is necessary to have a suitable controller to ensure effective utilization of distributed computing resources. However, the existing approaches can lead to more computation time, more consumption of energy, and a lack of security issues. To overcome these issues, this paper proposed a novel approach called Hybrid Random Forest-Extreme Gradient Boosting (HRF-XGBoost) to enhance the computation offloading and joint resource allocation predictions. In a wireless-powered multiuser MEC system, the starling murmuration optimization model is utilized to figure out the ideal task offloading options. XGBoost is combined with a random forest classifier to form an HRF-XGBoost architecture which is used to speed up the process while preserving the user's device's battery. An offloading method is created employing certain processes once the best computation offloading decision for Mobile Users (MUs) has been established. The experiment result shows that the method reduced system overhead and time complexity using the strategy of selecting fewer tasks alone by optimally eliminating other tasks. It optimizes the execution time even when the mobile user increases. The performance of the overall system can be greatly improved by our model compared to other existing techniques.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 7","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141556641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum-safe Lattice-based mutual authentication and key-exchange scheme for the smart grid 用于智能电网的基于网格的量子安全相互验证和密钥交换方案
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-02 DOI: 10.1002/ett.5017
Hema Shekhawat, Daya Sagar Gupta

The smart grid network (SGN) is expected to leverage advances in the Internet of Things (IoT) to enable effective delivery and monitoring of energy. By integrating communication, computing, and information tools like smart sensors and meters to facilitate the process of monitoring, predictions, and management of power usage, the SGN can improve competence of power-grid architecture. However, the effective deployment of IoT-powered SGNs hinges on the deployment of strong security protocols. With the advent of quantum computers, classic cryptographic algorithms based on integer factorization and the Diffie-Hellman assumptions may not be suitable to secure the sensitive data of SGNs. Therefore, in this paper, a secure quantum-safe mutual authentication and key-exchange (MAKe) mechanism is proposed for SGNs, that make use of the hard assumptions of small integer solution and inhomogeneous small integer solution problems of lattice. The proposed protocol is intended to offer confidentiality, anonymity, and hashed-based mutual authentication with a key-exchange agreement. Similarly, this scheme allows creation and validation of the mutual trust among the smart-meters (SMs) and neighbourhood-area network gateway over an insecure wireless channel. A random oracle model is then used to perform the formal security analysis of the proposed approach. A thorough formal analysis demonstrates proposed algorithm's ability to withstand various known attacks. The performance analysis shows that the proposed approach outperforms other comparative schemes with respect to at least 22.07% of minimal energy utilization, 51.48% effective storage and communications costs, as well as 76.28% computational costs, and thus suitable for resource-constrained SGNs.

智能电网网络(SGN)有望利用物联网(IoT)的进步实现能源的有效输送和监控。通过集成通信、计算和信息工具(如智能传感器和电表)来促进电力使用的监控、预测和管理过程,SGN 可以提高电网架构的能力。然而,有效部署由物联网驱动的 SGN 有赖于部署强大的安全协议。随着量子计算机的出现,基于整数因式分解和 Diffie-Hellman 假设的经典加密算法可能不适合保护 SGN 的敏感数据。因此,本文提出了一种针对 SGN 的量子安全相互认证和密钥交换(MAKe)机制,它利用了小整数解的硬假设和网格的非均质小整数解问题。所提出的协议旨在通过密钥交换协议提供保密性、匿名性和基于哈希的相互验证。同样,该方案允许通过不安全的无线信道在智能电表(SM)和邻区网络网关之间建立和验证相互信任。然后使用随机甲骨文模型对所提出的方法进行形式安全分析。全面的形式分析表明,所提出的算法有能力抵御各种已知攻击。性能分析表明,所提出的方法在最小能量利用率、有效存储和通信成本以及计算成本方面均优于其他比较方案,至少优于其他方案 22.07%、51.48% 和 76.28%,因此适用于资源受限的 SGN。
{"title":"Quantum-safe Lattice-based mutual authentication and key-exchange scheme for the smart grid","authors":"Hema Shekhawat,&nbsp;Daya Sagar Gupta","doi":"10.1002/ett.5017","DOIUrl":"10.1002/ett.5017","url":null,"abstract":"<p>The smart grid network (SGN) is expected to leverage advances in the Internet of Things (IoT) to enable effective delivery and monitoring of energy. By integrating communication, computing, and information tools like smart sensors and meters to facilitate the process of monitoring, predictions, and management of power usage, the SGN can improve competence of power-grid architecture. However, the effective deployment of IoT-powered SGNs hinges on the deployment of strong security protocols. With the advent of quantum computers, classic cryptographic algorithms based on integer factorization and the Diffie-Hellman assumptions may not be suitable to secure the sensitive data of SGNs. Therefore, in this paper, a secure quantum-safe mutual authentication and key-exchange (MAKe) mechanism is proposed for SGNs, that make use of the hard assumptions of small integer solution and inhomogeneous small integer solution problems of lattice. The proposed protocol is intended to offer confidentiality, anonymity, and hashed-based mutual authentication with a key-exchange agreement. Similarly, this scheme allows creation and validation of the mutual trust among the smart-meters (SMs) and neighbourhood-area network gateway over an insecure wireless channel. A random oracle model is then used to perform the formal security analysis of the proposed approach. A thorough formal analysis demonstrates proposed algorithm's ability to withstand various known attacks. The performance analysis shows that the proposed approach outperforms other comparative schemes with respect to at least 22.07% of minimal energy utilization, 51.48% effective storage and communications costs, as well as 76.28% computational costs, and thus suitable for resource-constrained SGNs.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 7","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141532590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-graph representation spatio-temporal attention networks for traffic forecasting in the cinematic metaverse 用于电影元宇宙流量预测的多图表示时空注意力网络
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-02 DOI: 10.1002/ett.5020
Ke Li, Xiaoming He, Yinqiu Liu, Meng Chen

The cinematic metaverse aims to create a virtual space with the context of a film. Users can enter this space in the form of avatars, experiencing the cinematic plot firsthand in an immersive manner. This requires us to design a rational computation resource allocation and synchronization algorithm to meet the demands of multi-objective joint optimization, such as low latency and high throughput, which ensures that users can seamlessly switch between virtual and real worlds and acquire immersive experiences. Unfortunately, the explosive growth in the number of users makes it difficult to jointly optimize multiple objectives. Predicting traffic generated by the users' avatars in the cinematic metaverse is significant for the optimization process. Although graph neural networks-based traffic prediction models achieve superior prediction accuracy, these methods rely only on physical distances-based topological graph information, while failing to comprehensively reflect the real relationships between avatars in the cinematic metaverse. To address this issue, we present a novel Multi-Graph Representation Spatio-Temporal Attention Networks (MGRSTANet) for traffic prediction in the cinematic metaverse. Specifically, based on multiple topological graph information (e.g., physical distances, centerity, and similarity), we first design Multi-Graph Embedding (MGE) module to generate multiple graph representations, thus reflecting on the real relationships between avatars more comprehensively. The Spatio-Temporal Attention (STAtt) module is then proposed to extract spatio-temporal correlations in each graph representations, thus improving prediction accuracy. We conduct simulation experiments to evaluate the effectiveness of MGRSTANet. The experimental results demonstrate that our proposed model outperforms the state-of-the-art baselines in terms of prediction accuracy, making it appropriate for traffic forecasting in the cinematic metaverse.

电影元宇宙旨在创建一个具有电影背景的虚拟空间。用户可以化身进入这个空间,身临其境地亲身体验电影情节。这就要求我们设计一种合理的计算资源分配和同步算法,以满足低延迟和高吞吐量等多目标联合优化的需求,确保用户能在虚拟世界和现实世界之间无缝切换,获得身临其境的体验。遗憾的是,用户数量的爆炸式增长给多目标联合优化带来了困难。预测用户化身在电影元宇宙中产生的流量对优化过程意义重大。虽然基于图神经网络的流量预测模型可以获得较高的预测精度,但这些方法仅依赖于基于物理距离的拓扑图信息,无法全面反映电影元宇宙中头像之间的真实关系。针对这一问题,我们提出了一种新颖的多图表示时空注意力网络(MGRSTANet),用于电影元宇宙中的流量预测。具体来说,我们首先根据多种拓扑图信息(如物理距离、中心性和相似性)设计了多图嵌入(MGE)模块,以生成多种图表示,从而更全面地反映头像之间的真实关系。然后,我们提出了时空关注(STAtt)模块,以提取每个图表示中的时空相关性,从而提高预测的准确性。我们进行了模拟实验来评估 MGRSTANet 的有效性。实验结果表明,我们提出的模型在预测准确性方面优于最先进的基线模型,因此适用于电影元宇宙中的流量预测。
{"title":"Multi-graph representation spatio-temporal attention networks for traffic forecasting in the cinematic metaverse","authors":"Ke Li,&nbsp;Xiaoming He,&nbsp;Yinqiu Liu,&nbsp;Meng Chen","doi":"10.1002/ett.5020","DOIUrl":"10.1002/ett.5020","url":null,"abstract":"<p>The cinematic metaverse aims to create a virtual space with the context of a film. Users can enter this space in the form of avatars, experiencing the cinematic plot firsthand in an immersive manner. This requires us to design a rational computation resource allocation and synchronization algorithm to meet the demands of multi-objective joint optimization, such as low latency and high throughput, which ensures that users can seamlessly switch between virtual and real worlds and acquire immersive experiences. Unfortunately, the explosive growth in the number of users makes it difficult to jointly optimize multiple objectives. Predicting traffic generated by the users' avatars in the cinematic metaverse is significant for the optimization process. Although graph neural networks-based traffic prediction models achieve superior prediction accuracy, these methods rely only on physical distances-based topological graph information, while failing to comprehensively reflect the real relationships between avatars in the cinematic metaverse. To address this issue, we present a novel Multi-Graph Representation Spatio-Temporal Attention Networks (MGRSTANet) for traffic prediction in the cinematic metaverse. Specifically, based on multiple topological graph information (e.g., physical distances, centerity, and similarity), we first design Multi-Graph Embedding (MGE) module to generate multiple graph representations, thus reflecting on the real relationships between avatars more comprehensively. The Spatio-Temporal Attention (STAtt) module is then proposed to extract spatio-temporal correlations in each graph representations, thus improving prediction accuracy. We conduct simulation experiments to evaluate the effectiveness of MGRSTANet. The experimental results demonstrate that our proposed model outperforms the state-of-the-art baselines in terms of prediction accuracy, making it appropriate for traffic forecasting in the cinematic metaverse.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 7","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141517078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware software SoC co-design analysis and implementation of MIMO-OFDM for 4G/5G/6G eNodeB applications 面向 4G/5G/6G eNodeB 应用的 MIMO-OFDM 硬件软件 SoC 协同设计分析与实施
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-26 DOI: 10.1002/ett.5012
Sanket N. Dessai, Hemant Patidar

With the emerging challenges for the data rate requirements of 5G/6G applications and reusing the 4G infrastructure for 5G, it is necessary to understand the System-on-Chip (SoC) platform-based embedded co-design and implementation of the programmable and reconfigurable MIMO-OFDM system. For both uplink and downlink data transmissions, these applications require a larger data throughput as well as reduced bit error rates, latency, and increased spectral efficiency. This work describes the co-design and development of hardware and software for the MIMO-OFDM algorithms for 5G and 6G eNodeBs. An efficient design through computer architecture based on pipeline and parallelization using systolic and CORDIC has been applied for the IP development of the sub-components of the MIMO-OFDM systems. A Zynq platform with computing resources including PS, Mali GPU-400, and PL is utilized to increase the data rate for MIMO-OFDM system architecture co-design and implementation. The architecture approach used in this work enabled a data rate of 10–50 Gbps and beyond reaching Tbps based on the system's programmability and reconfigurability with an efficient SoC platform design. The design platform provides a programming feature such as MIMO-OFDM, OFDM, and MIMO without OFDM through software programming for the range of applications of the desired data rates. With 64-QAM modulation, the three channels' observed performance in the predicted multipath channel velocity of 15 km/h for pedestrians, vehicles, and AWGN is seen in simulation. To reach the application clock frequencies, the device's PLL (ZUI7EG) upscales and downscales clock frequencies from 750 to 1600 MHz using a configurable register. When the system is configured to operate as MIMO-OFDM or OFDM in order to get an execution throughput of 300 msec and a data throughput ranging from 71 Gbps to 1749 Gbps using 2 × 2/4 × 4 configurations. The device scalability depends on at present devices of advanced embedded reconfigurable architecture platform. Massive MIMO and multi-user MIMO will be used in the future to increase throughput and data rates. Additionally, future work will focus on creating a MIMO-OFDM hardware-software embedded architecture and testbed to enhance implementation and verification of the vehicle and pedestrian.

随着 5G/6G 应用对数据传输速率的要求以及为 5G 重复使用 4G 基础设施所带来的新挑战,有必要了解基于片上系统(SoC)平台的嵌入式协同设计以及可编程和可重构 MIMO-OFDM 系统的实现。对于上行和下行数据传输,这些应用需要更大的数据吞吐量、更低的误码率、更短的延迟和更高的频谱效率。本研究介绍了针对 5G 和 6G eNodeB 的 MIMO-OFDM 算法的硬件和软件的共同设计和开发。在 MIMO-OFDM 系统子组件的 IP 开发中,采用了基于流水线和并行化的高效计算机架构设计,并使用了系统和 CORDIC。利用 Zynq 平台的计算资源(包括 PS、Mali GPU-400 和 PL)提高了 MIMO-OFDM 系统架构协同设计和实施的数据速率。基于系统的可编程性和可重构性以及高效的 SoC 平台设计,这项工作中使用的架构方法使数据传输率达到 10-50 Gbps,甚至超过 Tbps。设计平台通过软件编程提供了 MIMO-OFDM、OFDM 和 MIMO(无 OFDM)等编程功能,以满足所需数据传输速率的应用范围。在 64-QAM 调制下,通过仿真可以观察到三个信道在行人、车辆和 AWGN 的多径信道速度为 15 km/h 时的表现。为了达到应用时钟频率,该器件的 PLL (ZUI7EG) 通过一个可配置寄存器将时钟频率从 750 MHz 升频或降频至 1600 MHz。系统配置为 MIMO-OFDM 或 OFDM 时,执行吞吐量为 300 毫秒,数据吞吐量为 71 Gbps 至 1749 Gbps(采用 2 × 2/4 × 4 配置)。设备的可扩展性取决于目前先进的嵌入式可重构架构平台的设备。未来将使用大规模多输入多输出(MIMO)和多用户多输入多输出(MIMO)来提高吞吐量和数据传输速率。此外,未来的工作将侧重于创建 MIMO-OFDM 硬件-软件嵌入式架构和测试平台,以加强车辆和行人的实施和验证。
{"title":"Hardware software SoC co-design analysis and implementation of MIMO-OFDM for 4G/5G/6G eNodeB applications","authors":"Sanket N. Dessai,&nbsp;Hemant Patidar","doi":"10.1002/ett.5012","DOIUrl":"https://doi.org/10.1002/ett.5012","url":null,"abstract":"<p>With the emerging challenges for the data rate requirements of 5G/6G applications and reusing the 4G infrastructure for 5G, it is necessary to understand the System-on-Chip (SoC) platform-based embedded co-design and implementation of the programmable and reconfigurable MIMO-OFDM system. For both uplink and downlink data transmissions, these applications require a larger data throughput as well as reduced bit error rates, latency, and increased spectral efficiency. This work describes the co-design and development of hardware and software for the MIMO-OFDM algorithms for 5G and 6G eNodeBs. An efficient design through computer architecture based on pipeline and parallelization using systolic and CORDIC has been applied for the IP development of the sub-components of the MIMO-OFDM systems. A Zynq platform with computing resources including PS, Mali GPU-400, and PL is utilized to increase the data rate for MIMO-OFDM system architecture co-design and implementation. The architecture approach used in this work enabled a data rate of 10–50 Gbps and beyond reaching Tbps based on the system's programmability and reconfigurability with an efficient SoC platform design. The design platform provides a programming feature such as MIMO-OFDM, OFDM, and MIMO without OFDM through software programming for the range of applications of the desired data rates. With 64-QAM modulation, the three channels' observed performance in the predicted multipath channel velocity of 15 km/h for pedestrians, vehicles, and AWGN is seen in simulation. To reach the application clock frequencies, the device's PLL (ZUI7EG) upscales and downscales clock frequencies from 750 to 1600 MHz using a configurable register. When the system is configured to operate as MIMO-OFDM or OFDM in order to get an execution throughput of 300 msec and a data throughput ranging from 71 Gbps to 1749 Gbps using 2 × 2/4 × 4 configurations. The device scalability depends on at present devices of advanced embedded reconfigurable architecture platform. Massive MIMO and multi-user MIMO will be used in the future to increase throughput and data rates. Additionally, future work will focus on creating a MIMO-OFDM hardware-software embedded architecture and testbed to enhance implementation and verification of the vehicle and pedestrian.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 7","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141488194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A spatial-temporal graph gated transformer for traffic forecasting 用于交通预测的时空图门控转换器
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-26 DOI: 10.1002/ett.5021
Haroun Bouchemoukha, Mohamed Nadjib Zennir, Ahmed Alioua

Accurate traffic forecasting is more necessary than ever for transportation departments, especially given its significant role in traffic planning, management, and control. However, most existing methods struggle to address complex spatial correlations on road networks, nonlinear temporal dynamics, and difficult long-term prediction. This article proposes a novel spatial temporal graph gated transformer (STGGT) to overcome these challenges. The suggested model differs from Google's transformer because it uses a hybrid architecture that integrates graph convolutional networks (GCNs), attention, and gated recurrent units (GRUs) instead of solely relying on attention. Specifically, STGGT uses GCNs to extract spatial dependencies, utilizes attention and GRUs to extract temporal dependencies, and handle long-term prediction. Experiments indicate that STGGT outperforms the state-of-the-art baseline models on two real-world traffic datasets of 9%–40%. The proposed model offers a promising solution for accurate traffic forecasting, simultaneously addressing the challenges of complex spatial correlations, nonlinear temporal dynamics, and long-term prediction.

对于交通部门来说,准确的交通预测比以往任何时候都更加必要,尤其是考虑到交通预测在交通规划、管理和控制中的重要作用。然而,现有的大多数方法都难以解决道路网络上复杂的空间相关性、非线性时间动态以及难以进行长期预测等问题。本文提出了一种新颖的空间时间图门控变换器(STGGT)来克服这些挑战。所建议的模型不同于谷歌的转换器,因为它使用了一种混合架构,整合了图卷积网络(GCN)、注意力和门控递归单元(GRU),而不是仅仅依赖注意力。具体来说,STGGT 使用 GCNs 提取空间依赖关系,利用注意力和 GRUs 提取时间依赖关系,并处理长期预测。实验表明,STGGT 在两个真实交通数据集上的表现比最先进的基线模型高出 9%-40%。所提出的模型同时解决了复杂的空间相关性、非线性时间动态和长期预测等难题,为准确的交通预测提供了一个前景广阔的解决方案。
{"title":"A spatial-temporal graph gated transformer for traffic forecasting","authors":"Haroun Bouchemoukha,&nbsp;Mohamed Nadjib Zennir,&nbsp;Ahmed Alioua","doi":"10.1002/ett.5021","DOIUrl":"https://doi.org/10.1002/ett.5021","url":null,"abstract":"<p>Accurate traffic forecasting is more necessary than ever for transportation departments, especially given its significant role in traffic planning, management, and control. However, most existing methods struggle to address complex spatial correlations on road networks, nonlinear temporal dynamics, and difficult long-term prediction. This article proposes a novel spatial temporal graph gated transformer (STGGT) to overcome these challenges. The suggested model differs from Google's transformer because it uses a hybrid architecture that integrates graph convolutional networks (GCNs), attention, and gated recurrent units (GRUs) instead of solely relying on attention. Specifically, STGGT uses GCNs to extract spatial dependencies, utilizes attention and GRUs to extract temporal dependencies, and handle long-term prediction. Experiments indicate that STGGT outperforms the state-of-the-art baseline models on two real-world traffic datasets of 9%–40%. The proposed model offers a promising solution for accurate traffic forecasting, simultaneously addressing the challenges of complex spatial correlations, nonlinear temporal dynamics, and long-term prediction.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 7","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141488193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRL-based customised resource allocation for sub-slices in 6G network slicing 6G 网络切片中基于 DRL 的子切片定制资源分配
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-26 DOI: 10.1002/ett.5016
Meignanamoorthi D, Vetriselvi V

6G network services demand significant computer resources. Network slicing offers a potential solution by enabling customized services on shared infrastructure. However, dynamic service needs in heterogeneous environments pose challenges to resource provisioning. 6G applications like extended reality and connected vehicles require service differentiation for optimal quality of experience (QoE). Granular resource allocation within slices is a complex issue. To address the complexity of QoE services in dynamic slicing, a deep reinforcement learning (DRL) approach called customized sub-slicing is proposed. This approach involves splitting access, transport, and core slices into sub-slices to handle service differentiation among 6G applications. The focus is on creating sub-slices and dynamically scaling slices for intelligent resource allocation and reallocation based on QoS requirements for each sub-slice. The problem is formulated as an integer linear programming (ILP) optimization problem with real-world constraints. To effectively allocate sub-slices and dynamically scale resources, the Advantage Actor-Critic (A2C)-based Network Sub-slice Allocation and Optimization (NS-AO) algorithm is proposed. Experimental results demonstrate that the proposed algorithm outperforms the state of the art in terms of training stability, learning time, sub-slice acceptance rate, and resilience to topology changes.

6G 网络服务需要大量计算机资源。网络切片通过在共享基础设施上提供定制服务,提供了一种潜在的解决方案。然而,异构环境中的动态服务需求给资源调配带来了挑战。扩展现实和联网汽车等 6G 应用需要服务差异化,以获得最佳体验质量(QoE)。片内的细粒度资源分配是一个复杂的问题。为解决动态切片中 QoE 服务的复杂性,提出了一种称为定制子切片的深度强化学习(DRL)方法。这种方法涉及将接入、传输和核心切片分割成子切片,以处理 6G 应用之间的服务差异。重点是创建子切片,并根据每个子切片的 QoS 要求动态缩放切片,以实现智能资源分配和再分配。该问题被表述为一个具有现实世界约束条件的整数线性规划(ILP)优化问题。为了有效分配子片并动态扩展资源,提出了基于优势行动者批判(A2C)的网络子片分配和优化(NS-AO)算法。实验结果表明,所提出的算法在训练稳定性、学习时间、子片接受率和对拓扑变化的适应性方面都优于现有算法。
{"title":"DRL-based customised resource allocation for sub-slices in 6G network slicing","authors":"Meignanamoorthi D,&nbsp;Vetriselvi V","doi":"10.1002/ett.5016","DOIUrl":"https://doi.org/10.1002/ett.5016","url":null,"abstract":"<p>6G network services demand significant computer resources. Network slicing offers a potential solution by enabling customized services on shared infrastructure. However, dynamic service needs in heterogeneous environments pose challenges to resource provisioning. 6G applications like extended reality and connected vehicles require service differentiation for optimal quality of experience (QoE). Granular resource allocation within slices is a complex issue. To address the complexity of QoE services in dynamic slicing, a deep reinforcement learning (DRL) approach called customized sub-slicing is proposed. This approach involves splitting access, transport, and core slices into sub-slices to handle service differentiation among 6G applications. The focus is on creating sub-slices and dynamically scaling slices for intelligent resource allocation and reallocation based on QoS requirements for each sub-slice. The problem is formulated as an integer linear programming (ILP) optimization problem with real-world constraints. To effectively allocate sub-slices and dynamically scale resources, the Advantage Actor-Critic (A2C)-based Network Sub-slice Allocation and Optimization (NS-AO) algorithm is proposed. Experimental results demonstrate that the proposed algorithm outperforms the state of the art in terms of training stability, learning time, sub-slice acceptance rate, and resilience to topology changes.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 7","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141488195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PAM: Predictive analytics and modules-based computation offloading framework using greedy heuristics and 5G NR-V2X PAM:利用贪婪启发法和 5G NR-V2X 的预测分析和基于模块的计算卸载框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-25 DOI: 10.1002/ett.5003
Muhammad Ilyas Khattak, Hui Yuan, Ayaz Ahmad, Manzoor Ahmed, Ajmal Khan,  Inamullah

Recent advancements in distributed computing systems have shown promising prospects in enabling the effective usage of many next-generation applications. These applications include a wide range of fields, such as healthcare, interactive gaming, video streaming, and other related technologies. Among such solutions are the evolving vehicular fog computing (VFC) frameworks that make use of IEEE and 3GPP protocols and use advanced optimization algorithms. However, these approaches often rely on outdated protocols or computationally intensive mathematical techniques for solving or representing their optimization models. Additionally, some of these frameworks have not thoroughly considered the type of application during their evaluation and validation phases. In response to these challenges, we have developed the “predictive analytics and modules” (PAM) framework, which operates on a time and event-driven basis. It utilizes up-to-date 3GPP protocols to address the inherent unpredictability of VFC-enabled distributed computing systems required in smart healthcare systems. Through a combination of a greedy heuristic approach and a distributed offloading architecture, PAM efficiently optimizes decisions related to task offloading and computation allocation. This is achieved through specialized algorithms that provide support to computationally weaker devices, all within a time frame of under 100 ms. To assess the performance of PAM in comparison to three benchmark methodologies, the evaluation pathways that we employed are average response time, probability density function, pareto-analysis, algorithmic run time, and algorithmic complexity.

分布式计算系统的最新进展显示,在有效利用许多下一代应用方面前景广阔。这些应用包括广泛的领域,如医疗保健、互动游戏、视频流和其他相关技术。在这些解决方案中,不断发展的车载雾计算(VFC)框架利用了 IEEE 和 3GPP 协议,并采用了先进的优化算法。然而,这些方法往往依赖于过时的协议或计算密集型数学技术来解决或表示其优化模型。此外,其中一些框架在评估和验证阶段并未全面考虑应用类型。为了应对这些挑战,我们开发了 "预测分析和模块"(PAM)框架,该框架以时间和事件驱动为基础。它利用最新的 3GPP 协议来解决智能医疗系统所需的 VFC 分布式计算系统固有的不可预测性问题。通过结合贪婪启发式方法和分布式卸载架构,PAM 可有效优化与任务卸载和计算分配相关的决策。这是通过为计算能力较弱的设备提供支持的专门算法实现的,所有这些都能在 100 毫秒内完成。为了评估 PAM 与三种基准方法相比的性能,我们采用了平均响应时间、概率密度函数、帕累托分析、算法运行时间和算法复杂度等评估途径。
{"title":"PAM: Predictive analytics and modules-based computation offloading framework using greedy heuristics and 5G NR-V2X","authors":"Muhammad Ilyas Khattak,&nbsp;Hui Yuan,&nbsp;Ayaz Ahmad,&nbsp;Manzoor Ahmed,&nbsp;Ajmal Khan,&nbsp; Inamullah","doi":"10.1002/ett.5003","DOIUrl":"https://doi.org/10.1002/ett.5003","url":null,"abstract":"<p>Recent advancements in distributed computing systems have shown promising prospects in enabling the effective usage of many next-generation applications. These applications include a wide range of fields, such as healthcare, interactive gaming, video streaming, and other related technologies. Among such solutions are the evolving vehicular fog computing (VFC) frameworks that make use of IEEE and 3GPP protocols and use advanced optimization algorithms. However, these approaches often rely on outdated protocols or computationally intensive mathematical techniques for solving or representing their optimization models. Additionally, some of these frameworks have not thoroughly considered the type of application during their evaluation and validation phases. In response to these challenges, we have developed the “predictive analytics and modules” (PAM) framework, which operates on a time and event-driven basis. It utilizes up-to-date 3GPP protocols to address the inherent unpredictability of VFC-enabled distributed computing systems required in smart healthcare systems. Through a combination of a greedy heuristic approach and a distributed offloading architecture, PAM efficiently optimizes decisions related to task offloading and computation allocation. This is achieved through specialized algorithms that provide support to computationally weaker devices, all within a time frame of under 100 ms. To assess the performance of PAM in comparison to three benchmark methodologies, the evaluation pathways that we employed are average response time, probability density function, pareto-analysis, algorithmic run time, and algorithmic complexity.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 7","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141488392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Less sample-cooperative spectrum sensing against large-scale Byzantine attack in cognitive wireless sensor networks 认知型无线传感器网络中对抗大规模拜占庭攻击的少样本合作频谱感知
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-24 DOI: 10.1002/ett.5015
Jun Wu, Mingyuan Dai, Xuyang Teng, Chao Wu, Meilin He, Haoyu Liang, Hao Chen, Ye Jin, Weiwei Cao

Cooperative spectrum sensing (CSS) has emerged as a promising strategy for identifying available spectrum resources by leveraging spatially distributed sensors in cognitive wireless sensor networks (CWSNs). Nevertheless, this open collaborative approach is susceptible to security threats posed by malicious sensors, specifically Byzantine attack, which can significantly undermine CSS accuracy. Moreover, in extensive CWSNs, the CSS process imposes substantial communication overhead on the reporting channel, thereby considerably diminishing cooperative efficiency. To tackle these challenges, this article introduces a refined CSS approach, termed weighted sequential detection (WSD). This method incorporates channel state information to validate the global decision made by the fusion center and assess the trust value of sensors. The trust value based weight is assigned to sensing samples, which are then integrated into a sequential detection framework within a defined time window. This sequential approach prioritizes samples based on descending trust values. Numerical simulation results reveal that the proposed WSD outperforms conventional fusion rules in terms of the error probability, sample size, achievable throughput, and latency, even under varying degrees of Byzantine attack. This innovation signifies a substantial advancement in enhancing the reliability and efficiency of CSS.

在认知无线传感器网络(CWSN)中,通过利用空间分布式传感器识别可用频谱资源,合作频谱感知(CSS)已成为一种前景广阔的策略。然而,这种开放式协作方法容易受到恶意传感器带来的安全威胁,特别是拜占庭攻击,这种攻击会大大降低 CSS 的准确性。此外,在广泛的 CWSN 中,CSS 过程会给报告信道带来大量通信开销,从而大大降低合作效率。为了应对这些挑战,本文介绍了一种改进的 CSS 方法,即加权顺序检测(WSD)。该方法结合信道状态信息来验证融合中心做出的全局决策,并评估传感器的信任值。基于信任值的权重被分配给传感样本,然后在规定的时间窗口内将其整合到顺序检测框架中。这种顺序方法根据从高到低的信任值对样本进行优先排序。数值模拟结果表明,即使在不同程度的拜占庭攻击下,所提出的 WSD 在错误概率、样本大小、可实现的吞吐量和延迟方面都优于传统的融合规则。这一创新标志着在提高 CSS 的可靠性和效率方面取得了重大进展。
{"title":"Less sample-cooperative spectrum sensing against large-scale Byzantine attack in cognitive wireless sensor networks","authors":"Jun Wu,&nbsp;Mingyuan Dai,&nbsp;Xuyang Teng,&nbsp;Chao Wu,&nbsp;Meilin He,&nbsp;Haoyu Liang,&nbsp;Hao Chen,&nbsp;Ye Jin,&nbsp;Weiwei Cao","doi":"10.1002/ett.5015","DOIUrl":"https://doi.org/10.1002/ett.5015","url":null,"abstract":"<p>Cooperative spectrum sensing (CSS) has emerged as a promising strategy for identifying available spectrum resources by leveraging spatially distributed sensors in cognitive wireless sensor networks (CWSNs). Nevertheless, this open collaborative approach is susceptible to security threats posed by malicious sensors, specifically Byzantine attack, which can significantly undermine CSS accuracy. Moreover, in extensive CWSNs, the CSS process imposes substantial communication overhead on the reporting channel, thereby considerably diminishing cooperative efficiency. To tackle these challenges, this article introduces a refined CSS approach, termed weighted sequential detection (WSD). This method incorporates channel state information to validate the global decision made by the fusion center and assess the trust value of sensors. The trust value based weight is assigned to sensing samples, which are then integrated into a sequential detection framework within a defined time window. This sequential approach prioritizes samples based on descending trust values. Numerical simulation results reveal that the proposed WSD outperforms conventional fusion rules in terms of the error probability, sample size, achievable throughput, and latency, even under varying degrees of Byzantine attack. This innovation signifies a substantial advancement in enhancing the reliability and efficiency of CSS.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 7","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141488389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identical code-data cyclic shift transmission for time-dispersive channel 时差信道的同码数据循环移位传输
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-19 DOI: 10.1002/ett.5014
S. Vasudevan, S. Lenty Stuwart

Multiple access techniques working on time-dispersive channels must employ spreading codes with good correlation properties to minimize multipath interference and multiple access interference. Popular spreading codes, such as the Walsh-Hadamard code (orthogonal) and maximal length sequence (m-sequence) (semi-orthogonal), suffer from intersymbol interference (ISI). ISI increases owing to the poor autocorrelation properties of the spreading codes, resulting in a deteriorated bit-error-rate (BER) performance. Recently, a cyclic interleaving transmission has been proposed to enhance multipath diversity in the presence of ISI. In this study, an identical code-data cyclic shift (ICDCS) transmission scheme is introduced to achieve improved multipath diversity in time-dispersive channels. The proposed ICDCS transmission is designed based on cyclically shifting identical codes and data. The code and data involved in the first set of spreading are cyclically shifted for the next set of spreading, and the two sets are blended to perform cyclic interleaving. The data are despread from each multipath component at the receiver using different codes derived from a single m-sequence through identical code cyclic shifting (ICCS). Consequently, multipath diversity increases, resulting in a significant reduction in the BER. ICDCS transmission effectively utilizes all multipath components and the codes derived from the ICCS to mitigate ISI. The simulation results confirm that the proposed ICDCS transmission significantly enhances the multipath diversity compared to the conventional cyclic interleaving transmission scheme.

在时间分散信道上工作的多址接入技术必须采用具有良好相关特性的扩频码,以尽量减少多径干扰和多址接入干扰。常用的扩频码,如 Walsh-Hadamard 码(正交)和最大长度序列(m-sequence)(半正交),都存在符号间干扰(ISI)问题。由于扩频码的自相关性较差,ISI 会增加,从而导致误码率(BER)性能下降。最近,有人提出了一种循环交错传输方式,以增强存在 ISI 时的多径分集。在这项研究中,引入了一种相同代码-数据循环交错(ICDCS)传输方案,以在时间分散信道中实现更好的多径分集。所提出的 ICDCS 传输方案设计基于相同代码和数据的循环移位。第一组传播所涉及的编码和数据在下一组传播中循环移位,两组编码和数据混合后进行循环交错。在接收器上,使用从单个 m 序列中通过相同代码循环移位(ICCS)得到的不同代码,对每个多径分量进行数据解扩。因此,多径分集增加,误码率显著降低。ICDCS 传输能有效利用所有多径分量和 ICCS 衍生的编码来减轻 ISI。仿真结果证实,与传统的循环交错传输方案相比,拟议的 ICDCS 传输能显著增强多径分集。
{"title":"Identical code-data cyclic shift transmission for time-dispersive channel","authors":"S. Vasudevan,&nbsp;S. Lenty Stuwart","doi":"10.1002/ett.5014","DOIUrl":"https://doi.org/10.1002/ett.5014","url":null,"abstract":"<p>Multiple access techniques working on time-dispersive channels must employ spreading codes with good correlation properties to minimize multipath interference and multiple access interference. Popular spreading codes, such as the Walsh-Hadamard code (orthogonal) and maximal length sequence (<i>m</i>-sequence) (semi-orthogonal), suffer from intersymbol interference (ISI). ISI increases owing to the poor autocorrelation properties of the spreading codes, resulting in a deteriorated bit-error-rate (BER) performance. Recently, a cyclic interleaving transmission has been proposed to enhance multipath diversity in the presence of ISI. In this study, an identical code-data cyclic shift (ICDCS) transmission scheme is introduced to achieve improved multipath diversity in time-dispersive channels. The proposed ICDCS transmission is designed based on cyclically shifting identical codes and data. The code and data involved in the first set of spreading are cyclically shifted for the next set of spreading, and the two sets are blended to perform cyclic interleaving. The data are despread from each multipath component at the receiver using different codes derived from a single <i>m</i>-sequence through identical code cyclic shifting (ICCS). Consequently, multipath diversity increases, resulting in a significant reduction in the BER. ICDCS transmission effectively utilizes all multipath components and the codes derived from the ICCS to mitigate ISI. The simulation results confirm that the proposed ICDCS transmission significantly enhances the multipath diversity compared to the conventional cyclic interleaving transmission scheme.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 7","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1