Pub Date : 2023-03-16DOI: 10.2174/2210327913666230316150418
Uma Rathore Bhatt, Nitin Chouhan, Vijaylaxmi S. Bhat
The aim of this study is the deployment of components in an efficient manner to make a cost-effective FiWi network. Fiber Wireless access network is the boost to broadband access technology for providing network services to Internet users at a lower cost. Deployment of components in FiWi access network is very crucial since it affects the deployment cost and network performance. We investigate the planning process for efficient placement of components in FiWi access networks. For optimizing the position of components (wireless routers and ONUs) in the network, a novel nature inspired Reptile Search Algorithm (RSA) is proposed in the paper. Extensive simulation is carried out to implement proposed work. A simulation model and code is developed in MATLAB to get the optimized position of components for existing and proposed algorithms. We compare the performance of proposed algorithm with existing algorithm. The obtained results show that the proposed algorithm has superior performance than the existing algorithm. The present work optimizes the position of components using RSA algorithm. RSA returns the lower number of required wireless routers/ONUs, lesser TCD, increased AONUC, fast convergence rate, lesser execution run time than WSSA algorithm. The outcome of the paper highlights the importance of the proposed work in network planning and component deployment in FiWi access network. NA
{"title":"Fiber Wireless (FiWi) Access Network Planning & Deployment using Reptile Search Algorithm","authors":"Uma Rathore Bhatt, Nitin Chouhan, Vijaylaxmi S. Bhat","doi":"10.2174/2210327913666230316150418","DOIUrl":"https://doi.org/10.2174/2210327913666230316150418","url":null,"abstract":"\u0000\u0000The aim of this study is the deployment of components in an efficient manner to\u0000make a cost-effective FiWi network.\u0000\u0000\u0000\u0000Fiber Wireless access network is the boost to broadband access technology for providing network services to Internet users at a lower cost. Deployment of components in FiWi access network is very crucial since it affects the deployment cost and network performance.\u0000\u0000\u0000\u0000We investigate the planning process for efficient placement of components in FiWi access\u0000networks. For optimizing the position of components (wireless routers and ONUs) in the network, a\u0000novel nature inspired Reptile Search Algorithm (RSA) is proposed in the paper.\u0000\u0000\u0000\u0000Extensive simulation is carried out to implement proposed work. A simulation model and\u0000code is developed in MATLAB to get the optimized position of components for existing and proposed\u0000algorithms.\u0000\u0000\u0000\u0000We compare the performance of proposed algorithm with existing algorithm. The obtained results show that the proposed algorithm has superior performance than the existing algorithm.\u0000\u0000\u0000\u0000The present work optimizes the position of components using RSA algorithm. RSA returns the lower number of required wireless routers/ONUs, lesser TCD, increased AONUC, fast convergence rate, lesser execution run time than WSSA algorithm. The outcome of the paper highlights\u0000the importance of the proposed work in network planning and component deployment in FiWi access\u0000network.\u0000\u0000\u0000\u0000NA\u0000","PeriodicalId":37686,"journal":{"name":"International Journal of Sensors, Wireless Communications and Control","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82553809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-14DOI: 10.2174/2210327913666230314122645
T. Sheikh, Y. Rasagnya., V. Rajesh, D. Raju, S. Rajasekaran
The cell-free massive multiple input multiple outputs (CF M-MIMO) is the key and emerging technology for 5G and beyond, which gains more attention from many researchers and academicians. The cell-free M-MIMO enhances the system throughput, latency, spectral efficiency (SE), and energy efficiency (EE) of the communication network. Cell-free massive multiple input multiple output (CF M-MIMO) is the key and emerging technology for 5G and beyond which attracting more attention of many researchers and academicians. Cell-free M-MIMO can improve the system throughput, latency, spectral and energy efficiency (S & EE) of communication network In this paper, we formulate a framework for joint access point selection (APS) and power control algorithm for improving the EE and at the same time maintaining the system capacity. The max-min power control algorithm is used for efficient power allocation among the access points (APs) by using the minimum mean square error (MMSE), zero-forcing (ZF), and conjugate beam-forming (CB). In this thesis, we formulate a framework for joint access point selection (APS) and power control algorithm for improving the EE at the same time maintain the system capacity. The max-min power control algorithm is used to efficient power allocation among the access points. Moreover, by using the minimum mean square error (MMSE), zero-forcing (ZF) and conjugate beam-forming (CB), we successfully able to enhance and maintain the optimal system capacity We were successfully able to enhance and maintain the optimal system capacity of the cell-free M-MIMO systems. The simulation result shows the system capacity improvement when efficiently allocates the power among the access points. The simulation result shows that the system capacity is improved when efficiently allocating the power with max-min power control algorithm. NA
{"title":"Power Minimization in Cell-Free Massive MIMO with AP Selection Algorithm","authors":"T. Sheikh, Y. Rasagnya., V. Rajesh, D. Raju, S. Rajasekaran","doi":"10.2174/2210327913666230314122645","DOIUrl":"https://doi.org/10.2174/2210327913666230314122645","url":null,"abstract":"\u0000\u0000The cell-free massive multiple input multiple outputs (CF M-MIMO) is the key and emerging technology for 5G and beyond, which gains more attention from many researchers and academicians. The cell-free M-MIMO enhances the system throughput, latency, spectral efficiency (SE), and energy efficiency (EE) of the communication network.\u0000\u0000\u0000\u0000Cell-free massive multiple input multiple output (CF M-MIMO) is the key and emerging technology for 5G and beyond which attracting more attention of many researchers and academicians. Cell-free M-MIMO can improve the system throughput, latency, spectral and energy efficiency (S & EE) of communication network\u0000\u0000\u0000\u0000In this paper, we formulate a framework for joint access point selection (APS) and power control algorithm for improving the EE and at the same time maintaining the system capacity.\u0000\u0000\u0000\u0000The max-min power control algorithm is used for efficient power allocation among the access points (APs) by using the minimum mean square error (MMSE), zero-forcing (ZF), and conjugate beam-forming (CB).\u0000\u0000\u0000\u0000In this thesis, we formulate a framework for joint access point selection (APS) and power control algorithm for improving the EE at the same time maintain the system capacity. The max-min power control algorithm is used to efficient power allocation among the access points. Moreover, by using the minimum mean square error (MMSE), zero-forcing (ZF) and conjugate beam-forming (CB), we successfully able to enhance and maintain the optimal system capacity\u0000\u0000\u0000\u0000We were successfully able to enhance and maintain the optimal system capacity of the cell-free M-MIMO systems.\u0000\u0000\u0000\u0000The simulation result shows the system capacity improvement when efficiently allocates the power among the access points.\u0000\u0000\u0000\u0000The simulation result shows that the system capacity is improved when efficiently allocating the power with max-min power control algorithm.\u0000\u0000\u0000\u0000NA\u0000","PeriodicalId":37686,"journal":{"name":"International Journal of Sensors, Wireless Communications and Control","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81095317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-17DOI: 10.2174/2210327913666230217150456
Albert Sagala, Ramot Lubis, Gomgom Silalahi, Estika V Ginting, A. J. Simorangkir
The Internet of Things (IoT) is an embryonic model that converts real-world things (objects) into smarter devices. IoT is applicable to a variety of application domains, including healthcare, smart grid, and agriculture. Low Power Wide Area Network (LPWAN) technology can transmit data over long distances with a low data rate without using the internet. Therefore, this technology is suitable for sending sensor measurement data in Internet of Things (IoT) applications. LPWANs, such as LoRa, use a peer-to-peer topology to reach their coverage to the maximum power that can be transmitted, considering the environmental conditions in the test area and the LoRa parameters used. Whereas for application development in rural areas, there is no internet connection, and often longer coverage is required from the sensor node to the gateway. The vessel tracking in Lake Toba has obstacles when there is no internet connectivity This study aims to increase the transmission range from the end node to the gateway by adding an intermediate node. It is used as a relay from the end node to the gateway. To extend the radio connectivity coverage area Static routing was applied so that any broadcast data from the end node would be forwarded first to the intermediate node and then to the gateway. Using multihop to increase the range of radio coverage. We implement the static routing from end node to intermediate-gateway. The LoRa transmission range expanded by changing the topology from peer-to-peer to multi-hop. An intermediate node between the transmitter (end node) and the gateway is available. In the experiment performed, a multi-hop with static routes successfully expanded the distance from 150 meters (single hop) to 250 meters (multi-hop), with a packet delivery ratio of 97%. In this experiment, GPS Ublox Neo was used for the sensor position and was successfully tested on the end node with an accuracy rate of 2.4% for latitude and 0.2% for longitude. The transmission range from the sensor node to the gateway can be extended using static routing by installing an intermediate node between the gateway and the sensor node. The data from the end node is successfully received by the gateway. Already accpmodated all
{"title":"Experiment on Multi-Hop Lora for Tracking Application","authors":"Albert Sagala, Ramot Lubis, Gomgom Silalahi, Estika V Ginting, A. J. Simorangkir","doi":"10.2174/2210327913666230217150456","DOIUrl":"https://doi.org/10.2174/2210327913666230217150456","url":null,"abstract":"\u0000\u0000The Internet of Things (IoT) is an embryonic model that converts real-world things (objects) into smarter devices. IoT is applicable to a variety of application domains, including healthcare, smart grid, and agriculture. Low Power Wide Area Network (LPWAN) technology can transmit data over long distances with a low data rate without using the internet. Therefore, this technology is suitable for sending sensor measurement data in Internet of Things (IoT) applications. LPWANs, such as LoRa, use a peer-to-peer topology to reach their coverage to the maximum power that can be transmitted, considering the environmental conditions in the test area and the LoRa parameters used. Whereas for application development in rural areas, there is no internet connection, and often longer coverage is required from the sensor node to the gateway.\u0000\u0000\u0000\u0000The vessel tracking in Lake Toba has obstacles when there is no internet connectivity\u0000\u0000\u0000\u0000This study aims to increase the transmission range from the end node to the gateway by adding an intermediate node. It is used as a relay from the end node to the gateway.\u0000\u0000\u0000\u0000To extend the radio connectivity coverage area\u0000\u0000\u0000\u0000Static routing was applied so that any broadcast data from the end node would be forwarded first to the intermediate node and then to the gateway.\u0000\u0000\u0000\u0000Using multihop to increase the range of radio coverage. We implement the static routing from end node to intermediate-gateway.\u0000\u0000\u0000\u0000The LoRa transmission range expanded by changing the topology from peer-to-peer to multi-hop. An intermediate node between the transmitter (end node) and the gateway is available. In the experiment performed, a multi-hop with static routes successfully expanded the distance from 150 meters (single hop) to 250 meters (multi-hop), with a packet delivery ratio of 97%. In this experiment, GPS Ublox Neo was used for the sensor position and was successfully tested on the end node with an accuracy rate of 2.4% for latitude and 0.2% for longitude.\u0000\u0000\u0000\u0000The transmission range from the sensor node to the gateway can be extended using static routing by installing an intermediate node between the gateway and the sensor node. The data from the end node is successfully received by the gateway.\u0000\u0000\u0000\u0000Already accpmodated all\u0000","PeriodicalId":37686,"journal":{"name":"International Journal of Sensors, Wireless Communications and Control","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90248074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-16DOI: 10.2174/2210327913666230216151810
K. Veer, Soumya Ranjan Mohanta
A number of disciplines, including security, healthcare, and human-machine interactions, have presented and used techniques for emotion recognition based on facial expressions. Identification of emotion based on facial expression is a fascinating study subject that has been presented and implemented in a variety of fields, including security, healthcare, and human-machine interactions. To increase computer prediction, researchers are advancing the methods for deciphering code and extracting facial emotions. The contamination of the image with noise, which alters the features of the images and ultimately impacts the accuracy of the system, is one of the major issues in this sector. Thus, noise should be eliminated or diminished. The wavelet transform approach is used in this study to denoise the images before categorization. The classification accuracies for original images are also obtained to analyze the effect of denoising on the classification accuracy of the facial expression images. Researchers are developing and improving the techniques to interpret code, and extract facial expressions in order to improve computer prediction. One of the main problems in this field is the contamination of the image with noises which affects the features of the images and eventually affects the accuracy of the system. Three machine learning approaches, support vector machine, k-nearest neighbor, and naive bayes, are utilized to classify the emotions in this instance. The feature employed is the histogram of directional gradients of images. The classification results are obtained and the effect of denoising on the classification accuracy of the facial expression images is analyzed. Also, our best-obtained result for the wavelet transform method is compared with other wavelet transform-based facial emotion recognition techniques. And our result is found to be promising. The feature taken here is the histogram of oriented gradients of images and three machine learning techniques, namely, support vector machine, k-nearest neighbor, and Naïve Bayes are used for the classification of the emotions.
{"title":"Facial Emotion Recognition Using Wavelet Analysis And Histogram Of Oriented Gradients Of Image","authors":"K. Veer, Soumya Ranjan Mohanta","doi":"10.2174/2210327913666230216151810","DOIUrl":"https://doi.org/10.2174/2210327913666230216151810","url":null,"abstract":"\u0000\u0000A number of disciplines, including security, healthcare, and human-machine interactions, have presented and used techniques for emotion recognition based on facial expressions.\u0000\u0000\u0000\u0000Identification of emotion based on facial expression is a fascinating study subject that has been presented and implemented in a variety of fields, including security, healthcare, and human-machine interactions.\u0000\u0000\u0000\u0000To increase computer prediction, researchers are advancing the methods for deciphering code and extracting facial emotions.\u0000\u0000\u0000\u0000The contamination of the image with noise, which alters the features of the images and ultimately impacts the accuracy of the system, is one of the major issues in this sector. Thus, noise should be eliminated or diminished. The wavelet transform approach is used in this study to denoise the images before categorization. The classification accuracies for original images are also obtained to analyze the effect of denoising on the classification accuracy of the facial expression images.\u0000\u0000\u0000\u0000Researchers are developing and improving the techniques to interpret code, and extract facial expressions in order to improve computer prediction. One of the main problems in this field is the contamination of the image with noises which affects the features of the images and eventually affects the accuracy of the system.\u0000\u0000\u0000\u0000Three machine learning approaches, support vector machine, k-nearest neighbor, and naive bayes, are utilized to classify the emotions in this instance. The feature employed is the histogram of directional gradients of images. The classification results are obtained and the effect of denoising on the classification accuracy of the facial expression images is analyzed. Also, our best-obtained result for the wavelet transform method is compared with other wavelet transform-based facial emotion recognition techniques. And our result is found to be promising.\u0000\u0000\u0000\u0000The feature taken here is the histogram of oriented gradients of images and three machine learning techniques, namely, support vector machine, k-nearest neighbor, and Naïve Bayes are used for the classification of the emotions.\u0000","PeriodicalId":37686,"journal":{"name":"International Journal of Sensors, Wireless Communications and Control","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87232697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-14DOI: 10.2174/2210327913666230214101119
O. Saadaoui, O. Khlaief, M. Abassi, A. Chaari
Sensorless control of permanent magnet synchronous motor (PMSM) at low speed remains a challenging task. In this paper, a sensorless vector control of PMSM using a new structure of a back EMF sliding mode observer (SMO) is proposed. To remove the mechanical sensors, a back EMF-SMO is built to estimate the rotor position and speed of PMSM drives. The SMO, which replaces a sign function with a sigmoid function, can reduce the chattering phenomenon. This sensorless speed control shows great sensitivity to stator resistance and system noise. To improve the robustness of sensorless vector control, the back EMF- SMO technique has been used for stator resistance estimation. A novel stator resistance estimator is incorporated into the sensorless drive to compensate for the effects of stator resistance variation. The validity of the proposed SMO with a 1.1 kw low-speed PMSM sensorless vector control has been demonstrated by real experiments.
{"title":"Estimation of rotor velocity and stator resistance for PMSM drive using Back-EMF SMO","authors":"O. Saadaoui, O. Khlaief, M. Abassi, A. Chaari","doi":"10.2174/2210327913666230214101119","DOIUrl":"https://doi.org/10.2174/2210327913666230214101119","url":null,"abstract":"\u0000\u0000Sensorless control of permanent magnet synchronous motor (PMSM) at low speed remains a challenging task.\u0000\u0000\u0000\u0000In this paper, a sensorless vector control of PMSM using a new structure of a back EMF sliding mode observer (SMO) is proposed.\u0000\u0000\u0000\u0000To remove the mechanical sensors, a back EMF-SMO is built to estimate the rotor position and speed of PMSM drives. The SMO, which replaces a sign function with a sigmoid function, can reduce the chattering phenomenon. This sensorless speed control shows great sensitivity to stator resistance and system noise.\u0000\u0000\u0000\u0000To improve the robustness of sensorless vector control, the back EMF- SMO technique has been used for stator resistance estimation. A novel stator resistance estimator is incorporated into the sensorless drive to compensate for the effects of stator resistance variation.\u0000\u0000\u0000\u0000The validity of the proposed SMO with a 1.1 kw low-speed PMSM sensorless vector control has been demonstrated by real experiments.\u0000","PeriodicalId":37686,"journal":{"name":"International Journal of Sensors, Wireless Communications and Control","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84696701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-02DOI: 10.2174/2210327913666230102120254
S. Hashemi
B IPv6-based low-power and lossy networks (LLNs) are one of the major enablers for the Internet of Things (IoT). IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is proposed and standardized as a routing protocol for LLNs. RPL is vulnerable to various security attacks because of the lack of specific security models and its resource-constrained nature. One of the most destructive attacks is the Sybil attack. In a Sybil attack, a malicious thing claims multiple illegitimate identities. The target of this attack is to deplete the limited energy resource of legitimate things. Modeling the Sybil attack in the IoT environment as well as detecting and mitigating malicious things. In step one, we propose a fuzzy artificial bee colony (FABC) based on Sybil attack modeling. In step two, we propose a lightweight countermeasure to effectively detect and mitigate the Sybil malicious thing. The proposed method is simulated in Contiki Cooja. The average accuracy, sensitivity, and specificity of the proposed method are more than 94%, 93%, and 85%, respectively. In addition to accuracy, sensitivity, specificity, and F-score, the proposed method was also evaluated with packet delivery ratio and energy consumption criteria and presents desirable results. The results show that the proposed approach can improve security in the RPL protocol for the IoT based on the detection of Sybil attacks. The results show that the proposed method, in addition to having high accuracy in detecting attacks, prevents the wastage of energy resources by efficient detection of attacks.
基于ipv6的低功耗有损网络(lln)是物联网(IoT)的主要推动者之一。IPv6 RPL (Routing Protocol for Low-Power and Lossy Networks)是一种面向lln的路由协议。RPL由于缺乏特定的安全模型和资源的有限性,容易受到各种安全攻击。最具破坏性的袭击之一是西比尔袭击。在西比尔的攻击中,一个恶意的东西声称了多个非法身份。这种攻击的目标是耗尽合法事物的有限能量资源。模拟物联网环境中的Sybil攻击,以及检测和减轻恶意事物。在第一步中,我们提出了一种基于Sybil攻击建模的模糊人工蜂群(FABC)。在第二步中,我们提出了一个轻量级的对策来有效地检测和减轻Sybil恶意的东西。该方法在Contiki Cooja中进行了仿真。该方法的平均准确度、灵敏度和特异性分别超过94%、93%和85%。除了准确性、灵敏度、特异性和F-score外,该方法还通过分组投递率和能量消耗标准进行了评估,结果令人满意。结果表明,该方法可以提高基于Sybil攻击检测的物联网RPL协议的安全性。结果表明,该方法除了具有较高的攻击检测精度外,还可以通过高效的攻击检测来避免能源的浪费。
{"title":"Modeling and Detecting of Sybil Attacks in RPL for IoT Based on Fuzzy Artificial Bee Colony","authors":"S. Hashemi","doi":"10.2174/2210327913666230102120254","DOIUrl":"https://doi.org/10.2174/2210327913666230102120254","url":null,"abstract":"\u0000\u0000B IPv6-based low-power and lossy networks (LLNs) are one of the major enablers for the Internet of Things (IoT). IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is proposed and standardized as a routing protocol for LLNs. RPL is vulnerable to various security attacks because of the lack of specific security models and its resource-constrained nature. One of the most destructive attacks is the Sybil attack. In a Sybil attack, a malicious thing claims multiple illegitimate identities. The target of this attack is to deplete the limited energy resource of legitimate things.\u0000\u0000\u0000\u0000Modeling the Sybil attack in the IoT environment as well as detecting and mitigating malicious things.\u0000\u0000\u0000\u0000In step one, we propose a fuzzy artificial bee colony (FABC) based on Sybil attack modeling. In step two, we propose a lightweight countermeasure to effectively detect and mitigate the Sybil malicious thing.\u0000\u0000\u0000\u0000The proposed method is simulated in Contiki Cooja. The average accuracy, sensitivity, and specificity of the proposed method are more than 94%, 93%, and 85%, respectively. In addition to accuracy, sensitivity, specificity, and F-score, the proposed method was also evaluated with packet delivery ratio and energy consumption criteria and presents desirable results. The results show that the proposed approach can improve security in the RPL protocol for the IoT based on the detection of Sybil attacks.\u0000\u0000\u0000\u0000The results show that the proposed method, in addition to having high accuracy in detecting attacks, prevents the wastage of energy resources by efficient detection of attacks.\u0000","PeriodicalId":37686,"journal":{"name":"International Journal of Sensors, Wireless Communications and Control","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81769101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-22DOI: 10.2174/2210327913666221222145957
T. Sheikh, S. Deekshitha, N. Shalini, P. Indira, S. Rajasekaran, J. Borah
Cell Free massive MIMO, containing a very large number of distributed access points (APs), which is a promising technology to provide high data rate, spectral efficiency (SE), and energy efficiency (EE). The system performance of cell-free M-MIMO is maximum when selecting optimal access points (AP) from the large number of APs. The linear precoding methods of zero-forcing (ZF) and minimum mean square error (MMSE) are utilized in this study because they are devoid of self-interference and so improve the system capacity. The objective of this study is to maximize the system data rate in a cell-free M-MIMO network. To maximize the system data rate, the maximum channel gain-based Access Point Selection (MCGAPS), Distance based Access Point Selection (DAPS), and Random-Access Point Selection (RAPS) algorithms are used to pick access points (APs) in a cell-free M-MIMO network. Because the MCGAPS algorithm selects those APs with the highest channel gain, the system’s rate is improved. The DAPS algorithm is used to choose the closest APs to the user. The APs were randomly chosen using RAPS. Random user selection (RUS) algorithm schedules the same number of users. It is observed that the DAPS and RUS algorithms jointly improve the system rate significantly in cell-free massive MIMO system compared to the other proposed algorithms.
包含大量分布式接入点(ap)的无小区大规模MIMO是一种具有高数据速率、频谱效率(SE)和能量效率(EE)的有前途的技术。当从大量接入点中选择最优接入点(AP)时,无小区M-MIMO的系统性能达到最大。本文采用零强迫(zero-forcing, ZF)和最小均方误差(minimum mean square error, MMSE)的线性预编码方法,避免了自干扰,提高了系统容量。本研究的目标是在无小区的M-MIMO网络中最大化系统数据速率。为了使系统数据速率最大化,使用基于最大信道增益的接入点选择(MCGAPS)、基于距离的接入点选择(DAPS)和随机接入点选择(RAPS)算法在无小区的M-MIMO网络中选择接入点(ap)。由于MCGAPS算法选择了信道增益最高的ap,提高了系统的速率。DAPS算法用于选择离用户最近的ap。应用RAPS随机选择ap。RUS (Random user selection)算法调度相同数量的用户。在无小区大规模MIMO系统中,与其他算法相比,DAPS和RUS算法共同显著提高了系统速率。
{"title":"Capacity Maximization in Cell Free Massive \u0000MIMO Network with Access Point Selection Method","authors":"T. Sheikh, S. Deekshitha, N. Shalini, P. Indira, S. Rajasekaran, J. Borah","doi":"10.2174/2210327913666221222145957","DOIUrl":"https://doi.org/10.2174/2210327913666221222145957","url":null,"abstract":"\u0000\u0000Cell Free massive MIMO, containing a very large number of distributed access points (APs), which is a promising technology to provide high data rate, spectral efficiency (SE), and energy efficiency (EE). The system performance of cell-free M-MIMO is maximum when selecting optimal access points (AP) from the large number of APs. The linear precoding methods of zero-forcing (ZF) and minimum mean square error (MMSE) are utilized in this study because they are devoid of self-interference and so improve the system capacity.\u0000\u0000\u0000\u0000The objective of this study is to maximize the system data rate in a cell-free M-MIMO network.\u0000\u0000\u0000\u0000To maximize the system data rate, the maximum channel gain-based Access Point Selection (MCGAPS), Distance based Access Point Selection (DAPS), and Random-Access Point Selection (RAPS) algorithms are used to pick access points (APs) in a cell-free M-MIMO network. Because the MCGAPS algorithm selects those APs with the highest channel gain, the system’s rate is improved.\u0000\u0000\u0000\u0000The DAPS algorithm is used to choose the closest APs to the user. The APs were randomly chosen using RAPS. Random user selection (RUS) algorithm schedules the same number of users.\u0000\u0000\u0000\u0000It is observed that the DAPS and RUS algorithms jointly improve the system rate significantly in cell-free massive MIMO system compared to the other proposed algorithms.\u0000","PeriodicalId":37686,"journal":{"name":"International Journal of Sensors, Wireless Communications and Control","volume":"109 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81250880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}