Pub Date : 2021-01-01DOI: 10.4108/eai.23-6-2021.170242
T. Tran
This article resolves an extreme case in physical layer security: an eavesdropper, located near to a source, can spy on the jamming-seed if it is just cryptographically shared. The direct link between the source and destination is even unavailable. The system is proposed to operate in triple transmission phases (timeslots). In the first phase, jamming signal is proposed to carry a random binary network-coding-based jamming (NCJ) message, transmitted by an active jammer. As NCJ cannot be just cryptographically protected, we propose a solution of using physical layer security to secure this message. As a result, a network-coding method can be employed in which NCJ acts as a key to protect the source message from this extreme case of wiretapping. The spatial diversities in both jamming and legitimate transmission is fully exploited to overcome this challenge with high performance. Analysis and simulation of the outage performance and comparison with current methods are provided to validate the performance of the proposed method. Received on 04 June 2021; accepted on 21 June 2021; published on 23 June 2021
{"title":"Network-Coding-based Jamming With Triple Transmission Time Slots: A Method To Secure Transmission In An Extreme Case of Source-Wiretapping and Unshared Jamming Signal","authors":"T. Tran","doi":"10.4108/eai.23-6-2021.170242","DOIUrl":"https://doi.org/10.4108/eai.23-6-2021.170242","url":null,"abstract":"This article resolves an extreme case in physical layer security: an eavesdropper, located near to a source, can spy on the jamming-seed if it is just cryptographically shared. The direct link between the source and destination is even unavailable. The system is proposed to operate in triple transmission phases (timeslots). In the first phase, jamming signal is proposed to carry a random binary network-coding-based jamming (NCJ) message, transmitted by an active jammer. As NCJ cannot be just cryptographically protected, we propose a solution of using physical layer security to secure this message. As a result, a network-coding method can be employed in which NCJ acts as a key to protect the source message from this extreme case of wiretapping. The spatial diversities in both jamming and legitimate transmission is fully exploited to overcome this challenge with high performance. Analysis and simulation of the outage performance and comparison with current methods are provided to validate the performance of the proposed method. Received on 04 June 2021; accepted on 21 June 2021; published on 23 June 2021","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"1998 1","pages":"e5"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88223827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.4108/eai.8-4-2021.169178
Cheng Yin, Zeming Su, A. Kortun
This paper presents a comprehensive model including a wireless backhaul as a cost-effective backhaul alternative to wired backhaul for vehicular networks, a heterogeneous underlay cognitive vehicular network with multiple mobile secondary transmitters acting as mobile small cells, a mobile secondary receiver and a mobile primary user. To increase the spectrum utilization in this proposed vehicular network, multiple mobile secondary transmitters forward the signal to a mobile secondary receiver while using the same spectrum with a mobile primary user on the condition that the interference caused by secondary transmitters is tolerable at the primary user. A Bernoulli process is applied to model wireless backhaul reliability. The analytical closedform expressions for outage probability as well as the asymptotic expression are derived to reveal the effects of backhaul reliability on the network performance over double-Rayleigh fading channels. Received on 09 February 2021; accepted on 12 March 2021; published on 08 April 2021
{"title":"Performance analysis of Cognitive Vehicular Networks under Unreliable Backhaul","authors":"Cheng Yin, Zeming Su, A. Kortun","doi":"10.4108/eai.8-4-2021.169178","DOIUrl":"https://doi.org/10.4108/eai.8-4-2021.169178","url":null,"abstract":"This paper presents a comprehensive model including a wireless backhaul as a cost-effective backhaul alternative to wired backhaul for vehicular networks, a heterogeneous underlay cognitive vehicular network with multiple mobile secondary transmitters acting as mobile small cells, a mobile secondary receiver and a mobile primary user. To increase the spectrum utilization in this proposed vehicular network, multiple mobile secondary transmitters forward the signal to a mobile secondary receiver while using the same spectrum with a mobile primary user on the condition that the interference caused by secondary transmitters is tolerable at the primary user. A Bernoulli process is applied to model wireless backhaul reliability. The analytical closedform expressions for outage probability as well as the asymptotic expression are derived to reveal the effects of backhaul reliability on the network performance over double-Rayleigh fading channels. Received on 09 February 2021; accepted on 12 March 2021; published on 08 April 2021","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"110 1","pages":"e4"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87717430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-16DOI: 10.4108/eai.16-12-2020.167653
V. Cicirello
Simulated annealing is a metaheuristic commonly used for combinatorial optimization in many industrial applications. Its runtime behavior is controlled by an algorithmic component known as the annealing schedule. The classic annealing schedules have control parameters that must be set or tuned ahead of time. Adaptive annealing schedules, such as the Modified Lam, are parameter-free and self-adapt during runtime. However, they are also more complex than the classic alternatives, leading to more time per iteration. In this paper, we present an optimized variant of Modified Lam annealing, and experimentally demonstrate the potential significant impact on runtime performance of carefully optimizing the annealing schedule. Received on 07 October 2020; accepted on 03 December 2020; published on 16 December 2020
{"title":"Optimizing the Modified Lam Annealing Schedule","authors":"V. Cicirello","doi":"10.4108/eai.16-12-2020.167653","DOIUrl":"https://doi.org/10.4108/eai.16-12-2020.167653","url":null,"abstract":"Simulated annealing is a metaheuristic commonly used for combinatorial optimization in many industrial applications. Its runtime behavior is controlled by an algorithmic component known as the annealing schedule. The classic annealing schedules have control parameters that must be set or tuned ahead of time. Adaptive annealing schedules, such as the Modified Lam, are parameter-free and self-adapt during runtime. However, they are also more complex than the classic alternatives, leading to more time per iteration. In this paper, we present an optimized variant of Modified Lam annealing, and experimentally demonstrate the potential significant impact on runtime performance of carefully optimizing the annealing schedule. Received on 07 October 2020; accepted on 03 December 2020; published on 16 December 2020","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"36 1","pages":"e1"},"PeriodicalIF":0.0,"publicationDate":"2020-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85056744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-16DOI: 10.4108/eai.16-12-2020.167654
L. Nguyen, A. Kortun
Industrial Internet-of-Things (IIoT) with massive data transfers and huge numbers of connected devices, in combination with the high demand for greater quality-of-services, signal processing is no longer producing small data sets but rather, very large ones (measured in gigabytes or terabytes), or even higher. This has posed critical challenges in the context of optimisation. Communication scenarios such as online applications come with the need for real-time optimisation. In such scenarios, often under a dynamic environment, a strict real-time deadline is the most important requirement to be met. To this end, embedded convex optimisation, which can be redesigned and updated within a fast time-scale given sufficient computing power, is a candidate to deal with the challenges in real-time optimisation applications. Real-time optimisation is now becoming a reality in signal processing and wireless networks of IIoT. Research into new technologies to meet future demands is receiving urgent attention on a global scale, especially when 5G networks are expected to be in place in 2020. This work addresses the fundamentals, technologies and practically relevant questions related to the many challenges arising from real-time optimisation communications for industrial IoT. Received on 23 September 2020; accepted on 14 December 2020; published on 16 December 2020
{"title":"Real-time Optimisation for Industrial Internet of Things (IIoT): Overview, Challenges and Opportunities","authors":"L. Nguyen, A. Kortun","doi":"10.4108/eai.16-12-2020.167654","DOIUrl":"https://doi.org/10.4108/eai.16-12-2020.167654","url":null,"abstract":"Industrial Internet-of-Things (IIoT) with massive data transfers and huge numbers of connected devices, in combination with the high demand for greater quality-of-services, signal processing is no longer producing small data sets but rather, very large ones (measured in gigabytes or terabytes), or even higher. This has posed critical challenges in the context of optimisation. Communication scenarios such as online applications come with the need for real-time optimisation. In such scenarios, often under a dynamic environment, a strict real-time deadline is the most important requirement to be met. To this end, embedded convex optimisation, which can be redesigned and updated within a fast time-scale given sufficient computing power, is a candidate to deal with the challenges in real-time optimisation applications. Real-time optimisation is now becoming a reality in signal processing and wireless networks of IIoT. Research into new technologies to meet future demands is receiving urgent attention on a global scale, especially when 5G networks are expected to be in place in 2020. This work addresses the fundamentals, technologies and practically relevant questions related to the many challenges arising from real-time optimisation communications for industrial IoT. Received on 23 September 2020; accepted on 14 December 2020; published on 16 December 2020","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"66 1","pages":"e2"},"PeriodicalIF":0.0,"publicationDate":"2020-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80128794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-21DOI: 10.4108/eai.21-10-2020.166669
Antonino Masaracchia, Van-Long Nguyen, M. Nguyen
Non-orthogonal multiple access techniques (NOMA) have been recognized as a paradigm shift for the design of multiple access techniques for the next generation of wireless networks. Many existing works on NOMA have focused on scenarios with low-mobility users (static), where users with different channel conditions or quality of service (QoS) requirements are grouped together for the implementation of NOMA. However, when increased, user mobility can strongly impacts on the performance of a NOMA systems, especially in the context of downlink perceived throughput, networ fairness and QoS fuilfilment of each users. This paper presents some of the main drawback which can be obtained if the user mobility is not taken into account in the design of NOMA communication systems. Future direction and challenges to address these issues are also discussed. Received on 02 October 2020; accepted on 16 October 2020; published on 21 October 2020
{"title":"The impact of user mobility into non-orthogonal multiple access (NOMA) transmission systems","authors":"Antonino Masaracchia, Van-Long Nguyen, M. Nguyen","doi":"10.4108/eai.21-10-2020.166669","DOIUrl":"https://doi.org/10.4108/eai.21-10-2020.166669","url":null,"abstract":"Non-orthogonal multiple access techniques (NOMA) have been recognized as a paradigm shift for the design of multiple access techniques for the next generation of wireless networks. Many existing works on NOMA have focused on scenarios with low-mobility users (static), where users with different channel conditions or quality of service (QoS) requirements are grouped together for the implementation of NOMA. However, when increased, user mobility can strongly impacts on the performance of a NOMA systems, especially in the context of downlink perceived throughput, networ fairness and QoS fuilfilment of each users. This paper presents some of the main drawback which can be obtained if the user mobility is not taken into account in the design of NOMA communication systems. Future direction and challenges to address these issues are also discussed. Received on 02 October 2020; accepted on 16 October 2020; published on 21 October 2020","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"31 1","pages":"e5"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73476660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-21DOI: 10.4108/eai.21-10-2020.166667
M. R. Martinez-Blanco, A. Serrano-Muñoz, H. Vega-Carrillo, Marco Aurelio de Sousa-Lacerda, R. Mendez-Villafañe, E. Gallego, Antonio del Rio de Santiago, L. O. Solís-Sánchez, J. Ortiz-Rodríguez
In its broadest sense, the term artificial intelligence indicates the ability of an artifact to perform the same types of functions that characterize human thought. The goal of AI is to use algorithms, heuristics and methodologies based on the ways in which the human brain solves problems. Artificial neural networks recreate the structure of the human brain imitating the learning process. The Artificial neural networks theory has provided an alternative to classical computing for those problems in which traditional methods have delivered results that are not very convincing or not very convenient such as in the case of the neutron spectrometry and dosimetry problem for radiation protection purposes, using the Bonner spheres spectrometer as measurement system, mainly because many problems are encountered when trying to determine the neutron energy spectrum of a measured data. The most delicate part of the spectrometry based on this system is the unfolding process, for which several neutron spectrum unfolding codes have being developed. However, these codes require an initial guess spectrum in order to initiate the unfolding process. Their poor availability and their not easy management for the end user are other associated problems. Artificial Intelligence technology, is an alternative technique that is gaining popularity among researchers in neutron spectrometry research area, since it offers better results compared with the traditional solution methods. In this work, "Synapse", a neutron spectrum unfolding code based on Generalized Regression Artificial Neural Networks technology is presented. The Synapse code is capable to unfold the neutron spectrum and to calculate 15 dosimetric quantities using the count rates, coming from a BSS as the only entrance information. The results obtained show that the Synapse code, based on GRANN technology, is a promising and innovative technological alternative for solving the neutron spectrometry and dosimetry problems. Received on 28 August 2020; accepted on 23 September 2020; published on 21 October 2020
{"title":"Synapse. A Neutron Spectrum Unfolding Code Based on Generalized Regression Artificial Neural Networks","authors":"M. R. Martinez-Blanco, A. Serrano-Muñoz, H. Vega-Carrillo, Marco Aurelio de Sousa-Lacerda, R. Mendez-Villafañe, E. Gallego, Antonio del Rio de Santiago, L. O. Solís-Sánchez, J. Ortiz-Rodríguez","doi":"10.4108/eai.21-10-2020.166667","DOIUrl":"https://doi.org/10.4108/eai.21-10-2020.166667","url":null,"abstract":"In its broadest sense, the term artificial intelligence indicates the ability of an artifact to perform the same types of functions that characterize human thought. The goal of AI is to use algorithms, heuristics and methodologies based on the ways in which the human brain solves problems. Artificial neural networks recreate the structure of the human brain imitating the learning process. The Artificial neural networks theory has provided an alternative to classical computing for those problems in which traditional methods have delivered results that are not very convincing or not very convenient such as in the case of the neutron spectrometry and dosimetry problem for radiation protection purposes, using the Bonner spheres spectrometer as measurement system, mainly because many problems are encountered when trying to determine the neutron energy spectrum of a measured data. The most delicate part of the spectrometry based on this system is the unfolding process, for which several neutron spectrum unfolding codes have being developed. However, these codes require an initial guess spectrum in order to initiate the unfolding process. Their poor availability and their not easy management for the end user are other associated problems. Artificial Intelligence technology, is an alternative technique that is gaining popularity among researchers in neutron spectrometry research area, since it offers better results compared with the traditional solution methods. In this work, \"Synapse\", a neutron spectrum unfolding code based on Generalized Regression Artificial Neural Networks technology is presented. The Synapse code is capable to unfold the neutron spectrum and to calculate 15 dosimetric quantities using the count rates, coming from a BSS as the only entrance information. The results obtained show that the Synapse code, based on GRANN technology, is a promising and innovative technological alternative for solving the neutron spectrometry and dosimetry problems. Received on 28 August 2020; accepted on 23 September 2020; published on 21 October 2020","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"78 1","pages":"e3"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88396429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-21DOI: 10.4108/eai.21-10-2020.166668
Zainab Alalawi, Yifeng Zeng, H. Anh
Few modelling studies have been carried out to investigate patients’ involvement in the decision-making process in a healthcare system. Here we perform theoretical and simulation analysis of a healthcare business model involving three populations: Public Healthcare Providers, Private Healthcare Providers and Patients. The analysis contributes to healthcare economic modelling by analyzing the dynamics and emergence of cooperative behavior of agents within the three populations. Resorting to agent-based simulations, we examine the effect of increasing behavioural mutation and providers’ capacity on patients’ cooperative behaviour. We show that the former introduces more randomness in agents’ behaviors enabling cooperation to emerge in more difficult conditions. Moreover, when the providers’ capacity to meet patients’ demand is limited, patients exhibit low levels of cooperation, implying a more difficult cooperation dilemma in a healthcare system that needs addressing. Received on 17 September 2020; accepted on 03 October 2020; published on 21 October 2020
{"title":"Toward Understanding the Interplay between Public and Private Healthcare Providers and Patients: An Agent-based Simulation Approach","authors":"Zainab Alalawi, Yifeng Zeng, H. Anh","doi":"10.4108/eai.21-10-2020.166668","DOIUrl":"https://doi.org/10.4108/eai.21-10-2020.166668","url":null,"abstract":"Few modelling studies have been carried out to investigate patients’ involvement in the decision-making process in a healthcare system. Here we perform theoretical and simulation analysis of a healthcare business model involving three populations: Public Healthcare Providers, Private Healthcare Providers and Patients. The analysis contributes to healthcare economic modelling by analyzing the dynamics and emergence of cooperative behavior of agents within the three populations. Resorting to agent-based simulations, we examine the effect of increasing behavioural mutation and providers’ capacity on patients’ cooperative behaviour. We show that the former introduces more randomness in agents’ behaviors enabling cooperation to emerge in more difficult conditions. Moreover, when the providers’ capacity to meet patients’ demand is limited, patients exhibit low levels of cooperation, implying a more difficult cooperation dilemma in a healthcare system that needs addressing. Received on 17 September 2020; accepted on 03 October 2020; published on 21 October 2020","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"85 1","pages":"e4"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83914929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-28DOI: 10.4108/EAI.28-9-2020.166365
F. Tchakounté, P. Kamdem, J. Kamgang, H. Tchapgnouo, M. Atemkeng
{"title":"An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images","authors":"F. Tchakounté, P. Kamdem, J. Kamgang, H. Tchapgnouo, M. Atemkeng","doi":"10.4108/EAI.28-9-2020.166365","DOIUrl":"https://doi.org/10.4108/EAI.28-9-2020.166365","url":null,"abstract":"","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"5 1","pages":"e2"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80183174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-27DOI: 10.4108/eai.18-5-2020.165676
H. Murtaza, M. Iqbal, Q. Abbasi, S. Hussain, Huanlai Xing, M. Imran
Healthcare systems for chronic diseases demand continuous monitoring of physiological parameters or vital signs of the patients’ body. Through these vital signs’ information, healthcare experts attempt to diagnose the behavior of a disease. Identifying the relationship between these vital signs is still a big question for the research community. We have proposed a sophisticated way to identify the affiliations between vital signs of three specific diseases i.e., Sepsis, Sleep Apnea, and Intradialytic Hypotension (IDH) through Pearson statistical correlation analysis. Vital signs data of about 32 patients were taken for analysis. Experimental results show significant affiliations of vital signs of Sepsis and IDH with average correlation coefficient of 0.9 and 0.58, respectively. The stability of the mentioned correlation is about 75% and 90%, respectively. Received on 03 July 2020; accepted on 23 July 2020; published on 27 July 2020
{"title":"Correlation Analysis of Vital Signs to Monitor Disease Risks in Ubiquitous Healthcare System","authors":"H. Murtaza, M. Iqbal, Q. Abbasi, S. Hussain, Huanlai Xing, M. Imran","doi":"10.4108/eai.18-5-2020.165676","DOIUrl":"https://doi.org/10.4108/eai.18-5-2020.165676","url":null,"abstract":"Healthcare systems for chronic diseases demand continuous monitoring of physiological parameters or vital signs of the patients’ body. Through these vital signs’ information, healthcare experts attempt to diagnose the behavior of a disease. Identifying the relationship between these vital signs is still a big question for the research community. We have proposed a sophisticated way to identify the affiliations between vital signs of three specific diseases i.e., Sepsis, Sleep Apnea, and Intradialytic Hypotension (IDH) through Pearson statistical correlation analysis. Vital signs data of about 32 patients were taken for analysis. Experimental results show significant affiliations of vital signs of Sepsis and IDH with average correlation coefficient of 0.9 and 0.58, respectively. The stability of the mentioned correlation is about 75% and 90%, respectively. Received on 03 July 2020; accepted on 23 July 2020; published on 27 July 2020","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"11 1","pages":"e1"},"PeriodicalIF":0.0,"publicationDate":"2020-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75288631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-18DOI: 10.4108/eai.18-5-2020.164586
Hoa T. Nguyen, Toan V. Quyen, Cuong V. Nguyen, Anh M. Le, Hoa T. Tran, M. Nguyen
The development of unmanned aerial vehicles (UAVs) has become a revolution in the fields of data collection, surveying, monitoring, and tracking objects in the field. Many control and navigation algorithms are experimented and deployed for UAVs, especially quadrotors. Recent numerous approaches are geared towards reducing the influence of external disturbances to enhance the performance of UAVs. Nevertheless, designing cutting-edge controllers following the requirements of the applications is still a huge challenge. Based on the operating characteristics and movement principle of a quadrotor, this work reviews potential control algorithms of the current researches in the field of the quadrotor flight controller. Besides, a comparison has been made to provide an overview of the advantages and disadvantages of the mentioned methods. At last, the challenges and future directions of the quadrotor flight controller are suggested. Received on 09 April 2020; accepted on 15 May 2020; published on 18 May 2020
{"title":"Control Algorithms for UAVs: A Comprehensive Survey","authors":"Hoa T. Nguyen, Toan V. Quyen, Cuong V. Nguyen, Anh M. Le, Hoa T. Tran, M. Nguyen","doi":"10.4108/eai.18-5-2020.164586","DOIUrl":"https://doi.org/10.4108/eai.18-5-2020.164586","url":null,"abstract":"The development of unmanned aerial vehicles (UAVs) has become a revolution in the fields of data collection, surveying, monitoring, and tracking objects in the field. Many control and navigation algorithms are experimented and deployed for UAVs, especially quadrotors. Recent numerous approaches are geared towards reducing the influence of external disturbances to enhance the performance of UAVs. Nevertheless, designing cutting-edge controllers following the requirements of the applications is still a huge challenge. Based on the operating characteristics and movement principle of a quadrotor, this work reviews potential control algorithms of the current researches in the field of the quadrotor flight controller. Besides, a comparison has been made to provide an overview of the advantages and disadvantages of the mentioned methods. At last, the challenges and future directions of the quadrotor flight controller are suggested. Received on 09 April 2020; accepted on 15 May 2020; published on 18 May 2020","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"14 1","pages":"e5"},"PeriodicalIF":0.0,"publicationDate":"2020-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87174256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}