首页 > 最新文献

2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)最新文献

英文 中文
A framework for cloud computing adoption by Saudi government overseas agencies 沙特政府海外机构采用云计算的框架
Ahmed Albugmi, R. Walters, G. Wills
This study aims to identify key factors that organizations should consider when deciding whether to adopt cloud computing, and sets out a framework for how these factors can be weighed in order to make a decision. The study uses the Saudi Government agencies as a case study and makes several specific recommendations that pertain to the Saudi authorities' implementation of cloud computing. Although there are many benefits associated with deployment of cloud computing applications, there are also several challenges, such as compliance, legal issues, hosting issues, security, trust and privacy. There are also inadequate resources and guidelines for the policy makers and managers to inform their decision of whether or not to adopt cloud computing. This study identifies a number of factors; technological, environmental, organizational and societal, which need to be considered when an organization decides whether or not to adopt cloud computing. After identifying these factors, the study develops a comprehensive framework for organizations to assess their readiness for cloud computing. In addition, the feasibility of cloud computing applications is assessed so that different delivery and deployment models can be taken into account, and cloud computing evaluated from both business and customer perspectives.
本研究旨在确定组织在决定是否采用云计算时应该考虑的关键因素,并为如何权衡这些因素以做出决策制定了一个框架。该研究将沙特政府机构作为案例研究,并就沙特当局实施云计算提出了一些具体建议。尽管部署云计算应用程序有很多好处,但也存在一些挑战,例如遵从性、法律问题、托管问题、安全性、信任和隐私。政策制定者和管理人员也没有足够的资源和指导方针来决定是否采用云计算。这项研究确定了一些因素;技术、环境、组织和社会,当组织决定是否采用云计算时,需要考虑这些因素。在确定了这些因素之后,该研究为组织开发了一个全面的框架来评估他们对云计算的准备情况。此外,还将评估云计算应用程序的可行性,以便考虑不同的交付和部署模型,并从业务和客户的角度评估云计算。
{"title":"A framework for cloud computing adoption by Saudi government overseas agencies","authors":"Ahmed Albugmi, R. Walters, G. Wills","doi":"10.1109/FGCT.2016.7605063","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605063","url":null,"abstract":"This study aims to identify key factors that organizations should consider when deciding whether to adopt cloud computing, and sets out a framework for how these factors can be weighed in order to make a decision. The study uses the Saudi Government agencies as a case study and makes several specific recommendations that pertain to the Saudi authorities' implementation of cloud computing. Although there are many benefits associated with deployment of cloud computing applications, there are also several challenges, such as compliance, legal issues, hosting issues, security, trust and privacy. There are also inadequate resources and guidelines for the policy makers and managers to inform their decision of whether or not to adopt cloud computing. This study identifies a number of factors; technological, environmental, organizational and societal, which need to be considered when an organization decides whether or not to adopt cloud computing. After identifying these factors, the study develops a comprehensive framework for organizations to assess their readiness for cloud computing. In addition, the feasibility of cloud computing applications is assessed so that different delivery and deployment models can be taken into account, and cloud computing evaluated from both business and customer perspectives.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129056421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Empirical analysis of real time pricing mechanisms for demand side management: contemporary review 需求侧管理实时定价机制的实证分析:当代回顾
A. A. Mahmud, P. Sant, Faisal Tariq, D. Jazani
The smart grid promises a myriad of benefits for both the consumer and energy service providers. However, realising its potential is subject to solving a number of complex issues. One of the major directions of smart grid research is demand response modelling that aimed at reducing the peak demand and billing by introducing appropriate real time pricing. The main difficulty is in managing the optimum pricing on a real time basis. In this paper, we will provide a state of the art review of an existing approach that models demand response in real time and also the underlying model that is tested with real data by using a stochastic iterative process with simultaneous perturbation stochastic approximation algorithm. Our model shows that real time price is better than a flat rate price. We will provide a brief outlook to the future where we propose a model that takes complex customers' behaviour into consideration. The proposed model includes a real time Price Suggestion Unit (PSU) that assists users to further reduce their electricity price while reducing the aggregate load for the energy providers.
智能电网承诺为消费者和能源服务提供商带来无数的好处。然而,实现其潜力需要解决一些复杂的问题。智能电网研究的主要方向之一是需求响应模型,该模型旨在通过引入适当的实时定价来减少峰值需求和计费。主要的困难是在实时的基础上管理最优定价。在本文中,我们将提供对现有方法的最新回顾,该方法实时建模需求响应,并通过使用具有同步摄动随机近似算法的随机迭代过程用实际数据测试底层模型。我们的模型显示,实时价格优于统一费率价格。我们将简要展望未来,提出一个考虑到复杂客户行为的模型。提出的模型包括一个实时价格建议单元(PSU),帮助用户进一步降低电价,同时减少能源供应商的总负荷。
{"title":"Empirical analysis of real time pricing mechanisms for demand side management: contemporary review","authors":"A. A. Mahmud, P. Sant, Faisal Tariq, D. Jazani","doi":"10.1109/FGCT.2016.7605071","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605071","url":null,"abstract":"The smart grid promises a myriad of benefits for both the consumer and energy service providers. However, realising its potential is subject to solving a number of complex issues. One of the major directions of smart grid research is demand response modelling that aimed at reducing the peak demand and billing by introducing appropriate real time pricing. The main difficulty is in managing the optimum pricing on a real time basis. In this paper, we will provide a state of the art review of an existing approach that models demand response in real time and also the underlying model that is tested with real data by using a stochastic iterative process with simultaneous perturbation stochastic approximation algorithm. Our model shows that real time price is better than a flat rate price. We will provide a brief outlook to the future where we propose a model that takes complex customers' behaviour into consideration. The proposed model includes a real time Price Suggestion Unit (PSU) that assists users to further reduce their electricity price while reducing the aggregate load for the energy providers.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127192021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Wi-fi boost protocol in a heterogeneous network with Wi-Fi and RFID 具有Wi-fi和RFID的异构网络中的Wi-fi增强协议
Hyeong-Kyu Lee, Yunmin Kim, Tae-Jin Lee
IEEE 802.11 Wireless Local Area Network (WLAN) supports multiple transmission rates according to the channel condition. In multi-rate IEEE 802.11 WLAN, the performance of stations with high rates may decline due to the relatively long channel occupation time of the stations with low rates. In order to mitigate this performance anomaly problem, we propose a new Medium Access Control (MAC) protocol. In the protocol, after the Access Point (AP) identifies the IDs of the near stations around the AP, it allocates time slots to the stations in the vicinity of the AP. Then they transmit data packets at the allocated time slots in a non-contention manner using the physical scheme of Wi-Fi. Through the simulation results, we show that the throughput of the proposed MAC protocol is superior to that of the traditional IEEE 802.11g by guaranteeing transmission opportunities of the stations near the AP.
IEEE 802.11无线局域网(WLAN)根据信道条件支持多种传输速率。在多速率IEEE 802.11无线局域网中,由于低速率站的信道占用时间相对较长,高速率站的性能可能会下降。为了缓解这种性能异常问题,我们提出了一种新的介质访问控制(MAC)协议。在该协议中,AP (Access Point)识别出AP周围的近站id后,为AP附近的站分配时隙,然后使用Wi-Fi的物理方案,在分配的时隙内以非竞争的方式传输数据包。仿真结果表明,通过保证AP附近站点的传输机会,所提出的MAC协议的吞吐量优于传统的IEEE 802.11g协议。
{"title":"Wi-fi boost protocol in a heterogeneous network with Wi-Fi and RFID","authors":"Hyeong-Kyu Lee, Yunmin Kim, Tae-Jin Lee","doi":"10.1109/FGCT.2016.7605064","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605064","url":null,"abstract":"IEEE 802.11 Wireless Local Area Network (WLAN) supports multiple transmission rates according to the channel condition. In multi-rate IEEE 802.11 WLAN, the performance of stations with high rates may decline due to the relatively long channel occupation time of the stations with low rates. In order to mitigate this performance anomaly problem, we propose a new Medium Access Control (MAC) protocol. In the protocol, after the Access Point (AP) identifies the IDs of the near stations around the AP, it allocates time slots to the stations in the vicinity of the AP. Then they transmit data packets at the allocated time slots in a non-contention manner using the physical scheme of Wi-Fi. Through the simulation results, we show that the throughput of the proposed MAC protocol is superior to that of the traditional IEEE 802.11g by guaranteeing transmission opportunities of the stations near the AP.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120956095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data security in cloud computing 云计算中的数据安全
Ahmed Albugmi, M. Alassafi, R. Walters, G. Wills
This paper discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The paper will go in to details of data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats. Availability of data in the cloud is beneficial for many applications but it poses risks by exposing data to applications which might already have security loopholes in them. Similarly, use of virtualization for cloud computing might risk data when a guest OS is run over a hypervisor without knowing the reliability of the guest OS which might have a security loophole in it. The paper will also provide an insight on data security aspects for Data-in-Transit and Data-at-Rest. The study is based on all the levels of SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service).
本文讨论了云计算中数据的安全问题。它是对云中的数据以及与之相关的安全方面的研究。本文将详细介绍世界各地使用的数据保护方法和方法,以确保通过减少风险和威胁来最大限度地保护数据。云中数据的可用性对许多应用程序都是有益的,但它会将数据暴露给可能已经存在安全漏洞的应用程序,从而带来风险。类似地,当客户操作系统运行在虚拟机管理程序上,而不知道客户操作系统的可靠性时,在云计算中使用虚拟化可能会给数据带来风险,因为客户操作系统可能存在安全漏洞。本文还将提供对传输数据和静止数据的数据安全方面的见解。该研究基于SaaS(软件即服务)、PaaS(平台即服务)和IaaS(基础设施即服务)的所有级别。
{"title":"Data security in cloud computing","authors":"Ahmed Albugmi, M. Alassafi, R. Walters, G. Wills","doi":"10.1109/FGCT.2016.7605062","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605062","url":null,"abstract":"This paper discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The paper will go in to details of data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats. Availability of data in the cloud is beneficial for many applications but it poses risks by exposing data to applications which might already have security loopholes in them. Similarly, use of virtualization for cloud computing might risk data when a guest OS is run over a hypervisor without knowing the reliability of the guest OS which might have a security loophole in it. The paper will also provide an insight on data security aspects for Data-in-Transit and Data-at-Rest. The study is based on all the levels of SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service).","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132534920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Encryption as a service for data healthcare cloud security 用于数据医疗保健云安全的加密服务
A. E. Bouchti, Samir Bahsani, Tarik Nahhal
Data security continues to be one of the top concerns for cloud computing, an issue that's been intensified by recent high-profile attacks in healthcare. The encryption solution have to be quick and easy to provision and provides high levels of protec- tion without sacrificing network performance. It's another way to provide a critical layer of security to protect the customers. In this work, we are interested in data encryption in healthcare cloud. We propose a hybrid architecture based on Cryptography as a Service (CaaS) included the private cloud OpenStack platform. This architecture authorizes the cloud clients to be in control of their cryptographic operations and keys that they deploy in the cloud independently of the cloud provider. Firstly, we explore healthcare cloud environment and then we analyze some encryption algorithms. Secondly, we design and implement two cryptography algorithms (homomorphic encryption and RSA) in our proposed architecture for providing security to information based on OpenStack platform.
数据安全仍然是云计算最关心的问题之一,最近医疗保健领域备受瞩目的攻击加剧了这一问题。加密解决方案必须快速且易于配置,并在不牺牲网络性能的情况下提供高水平的保护。这是提供关键安全层来保护客户的另一种方式。在这项工作中,我们对医疗保健云中的数据加密感兴趣。我们提出了一种基于加密即服务(CaaS)的混合架构,包括私有云OpenStack平台。此体系结构授权云客户端控制其在云中独立于云提供商部署的加密操作和密钥。首先对医疗云环境进行了探讨,然后对一些加密算法进行了分析。其次,在我们提出的架构中,我们设计并实现了两种加密算法(同态加密和RSA),以提供基于OpenStack平台的信息安全。
{"title":"Encryption as a service for data healthcare cloud security","authors":"A. E. Bouchti, Samir Bahsani, Tarik Nahhal","doi":"10.1109/FGCT.2016.7605072","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605072","url":null,"abstract":"Data security continues to be one of the top concerns for cloud computing, an issue that's been intensified by recent high-profile attacks in healthcare. The encryption solution have to be quick and easy to provision and provides high levels of protec- tion without sacrificing network performance. It's another way to provide a critical layer of security to protect the customers. In this work, we are interested in data encryption in healthcare cloud. We propose a hybrid architecture based on Cryptography as a Service (CaaS) included the private cloud OpenStack platform. This architecture authorizes the cloud clients to be in control of their cryptographic operations and keys that they deploy in the cloud independently of the cloud provider. Firstly, we explore healthcare cloud environment and then we analyze some encryption algorithms. Secondly, we design and implement two cryptography algorithms (homomorphic encryption and RSA) in our proposed architecture for providing security to information based on OpenStack platform.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130981202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A simple power-saving transmission scheme for use in macrocell-small cell networks 一种用于宏蜂窝-小蜂窝网络的简单节能传输方案
Yao-Liang Chung
Among researchers seeking to enhance the network coverage of macrocells, the utilization of small cell base stations (SBSs) is regarded as an approach with considerable promise. In the present study, we present a straightforward yet robust power-saving transmission scheme for use in macrocellsmall cell networks. The scheme presented herein both allows an SBS to be activated or deactivated in an efficient manner in response to the traffic load and closes any coverage holes (i.e., areas where users are unable to get a signal from the wireless network) by smartly enlarging neighboring small cells as needed when users attempt to use the network. At the same time, the scheme also allows pre-determined data rate requirements to be maintained. Data from simulations utilizing the proposed scheme indicate that it provides far greater energy savings than the conventional scheme.
在寻求增强宏蜂窝网络覆盖的研究人员中,利用小蜂窝基站(SBSs)被认为是一种很有前途的方法。在目前的研究中,我们提出了一种简单而强大的节能传输方案,用于大蜂窝小蜂窝网络。本文提出的方案既允许根据流量负载以有效的方式激活或停用SBS,又允许在用户尝试使用网络时,根据需要巧妙地扩大邻近的小小区,从而关闭任何覆盖漏洞(即用户无法从无线网络获得信号的区域)。同时,该方案还允许保持预先确定的数据速率要求。利用该方案的仿真数据表明,它比传统方案提供了更大的节能效果。
{"title":"A simple power-saving transmission scheme for use in macrocell-small cell networks","authors":"Yao-Liang Chung","doi":"10.1109/FGCT.2016.7605067","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605067","url":null,"abstract":"Among researchers seeking to enhance the network coverage of macrocells, the utilization of small cell base stations (SBSs) is regarded as an approach with considerable promise. In the present study, we present a straightforward yet robust power-saving transmission scheme for use in macrocellsmall cell networks. The scheme presented herein both allows an SBS to be activated or deactivated in an efficient manner in response to the traffic load and closes any coverage holes (i.e., areas where users are unable to get a signal from the wireless network) by smartly enlarging neighboring small cells as needed when users attempt to use the network. At the same time, the scheme also allows pre-determined data rate requirements to be maintained. Data from simulations utilizing the proposed scheme indicate that it provides far greater energy savings than the conventional scheme.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125291180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber security modeling for SCADA systems using stochastic game nets approach 基于随机博弈网的SCADA系统网络安全建模
A. E. Bouchti, Tarik Nahhal
The security of SCADA (Supervisory Control and Data Acquisition) and realtime systems represents a significant challenge in today's world. The research in cyber-attack activities have gained immense emphasis. One of such research efforts is modeling of cyber-attacks. In this context, several modeling approaches have been developed, such as approaches based on attack trees (AT). In this paper, we propose Colored Petri Net (SGN) modeling approach by extending the attack trees with new modeling constructs and analysis approaches. SGN based attack model is flexible enough to model Internet intrusion, including the static and dynamic features of the intrusion. The process and rules of building SGN based attack model from AT are also presented. In order to evaluate the risk of intrusion, some cost elements are added to SGN based attack modeling. We show how attack trees can be converted and analyzed in SGN. Finally, we provide a case study that illustrates the SGN approach.
SCADA(监控和数据采集)和实时系统的安全性是当今世界面临的一个重大挑战。网络攻击活动的研究得到了极大的重视。其中一项研究就是对网络攻击进行建模。在这种情况下,已经开发了几种建模方法,例如基于攻击树(AT)的方法。在本文中,我们提出了彩色Petri网(SGN)建模方法,通过使用新的建模构造和分析方法扩展攻击树。基于SGN的攻击模型具有足够的灵活性,可以对Internet入侵进行建模,包括入侵的静态和动态特征。给出了从AT中构建基于SGN的攻击模型的过程和规则。为了评估入侵风险,在基于SGN的攻击建模中加入了成本元素。我们展示了如何在SGN中转换和分析攻击树。最后,我们提供了一个案例研究来说明SGN方法。
{"title":"Cyber security modeling for SCADA systems using stochastic game nets approach","authors":"A. E. Bouchti, Tarik Nahhal","doi":"10.1109/FGCT.2016.7605070","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605070","url":null,"abstract":"The security of SCADA (Supervisory Control and Data Acquisition) and realtime systems represents a significant challenge in today's world. The research in cyber-attack activities have gained immense emphasis. One of such research efforts is modeling of cyber-attacks. In this context, several modeling approaches have been developed, such as approaches based on attack trees (AT). In this paper, we propose Colored Petri Net (SGN) modeling approach by extending the attack trees with new modeling constructs and analysis approaches. SGN based attack model is flexible enough to model Internet intrusion, including the static and dynamic features of the intrusion. The process and rules of building SGN based attack model from AT are also presented. In order to evaluate the risk of intrusion, some cost elements are added to SGN based attack modeling. We show how attack trees can be converted and analyzed in SGN. Finally, we provide a case study that illustrates the SGN approach.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122051701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using ABC and RRT algorithms to improve mobile robot path planning with danger degree 利用ABC和RRT算法改进移动机器人危险度路径规划
Y. Tusi, Hung-Yuan Chung
For mobile robots, being able to find a suitable route through an environment filled with varied obstacles, and to ensure that they can successfully reach their target point from the starting point in the most efficient manner is very important, and a necessary research topic. This article proposes a combination of Artificial Bee Colony Algorithm (ABC) and Rapidly-Exploring Random Tree (RRT) to produce a novel algorithm to meet these navigation requirements. This algorithm is then compared with the traditional ABC for path planning. Unlike previous algorithms, this study uses the RRT algorithm to find several extend points, choose the best extend point to move the bees. Because the Artificial Bee Colony algorithm is simply structured, easy to operate and quickly converges, it is able to address the problems of slow convergence and easy entrapment in local optimal solutions encountered in previous path planning algorithms. Although RRT has excellent characteristics in terms of the search area which is unknown, it is unstable for each planning. Thus, this thesis combines the characteristics of the artificial bee colony algorithm with the RRT algorithms, and considers the problem of robot path simulation with obstacles.
对于移动机器人来说,能够在充满各种障碍物的环境中找到合适的路径,并确保它们能够以最有效的方式从起点成功到达目标点是非常重要的,也是必要的研究课题。本文提出将人工蜂群算法(Artificial Bee Colony Algorithm, ABC)与快速探索随机树算法(rapid - explore Random Tree, RRT)相结合,产生一种新的算法来满足这些导航需求。将该算法与传统的ABC算法进行了路径规划比较。与以往的算法不同,本研究使用RRT算法寻找多个延伸点,选择最佳延伸点来移动蜜蜂。由于人工蜂群算法结构简单、易于操作、收敛速度快,能够解决以往路径规划算法收敛速度慢、容易陷入局部最优解的问题。虽然RRT在搜索区域未知方面有很好的特点,但是对于每一个规划来说都是不稳定的。因此,本文将人工蜂群算法的特点与RRT算法相结合,考虑有障碍物的机器人路径仿真问题。
{"title":"Using ABC and RRT algorithms to improve mobile robot path planning with danger degree","authors":"Y. Tusi, Hung-Yuan Chung","doi":"10.1109/FGCT.2016.7605068","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605068","url":null,"abstract":"For mobile robots, being able to find a suitable route through an environment filled with varied obstacles, and to ensure that they can successfully reach their target point from the starting point in the most efficient manner is very important, and a necessary research topic. This article proposes a combination of Artificial Bee Colony Algorithm (ABC) and Rapidly-Exploring Random Tree (RRT) to produce a novel algorithm to meet these navigation requirements. This algorithm is then compared with the traditional ABC for path planning. Unlike previous algorithms, this study uses the RRT algorithm to find several extend points, choose the best extend point to move the bees. Because the Artificial Bee Colony algorithm is simply structured, easy to operate and quickly converges, it is able to address the problems of slow convergence and easy entrapment in local optimal solutions encountered in previous path planning algorithms. Although RRT has excellent characteristics in terms of the search area which is unknown, it is unstable for each planning. Thus, this thesis combines the characteristics of the artificial bee colony algorithm with the RRT algorithms, and considers the problem of robot path simulation with obstacles.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133605601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Direct optical communication on an optically reconfigurable gate array 光可重构门阵列上的直接光通信
Shinya Furukawa, I. S. A. Halim, Minoru Watanabe, F. Kobayashi
As one type of field programmable gate array (FPGA), optically reconfigurable gate arrays (ORGAs) have been undergoing continual development. ORGAs are optoelectronic devices consisting of a holographic memory, a laser array, a programmable gate array. Since the storage capacity of such holographic memory is greater than that of two-dimensional semiconductor memory, an ORGA can accommodate more huge gates and provide higher performance than FPGAs. A programmable gate array of an ORGA has numerous photodiodes that can be reconfigured optically using configuration contexts on a holographic memory. Although the photodiodes are normally used only for a configuration procedure, the photodiodes are useful for direct input of optical communication signals. This paper therefore presents a demonstration of optical communication on ORGA's programmable gate array.
作为现场可编程门阵列(FPGA)的一种,光可重构门阵列(ORGAs)得到了不断的发展。orga是由全息存储器、激光阵列、可编程门阵列组成的光电器件。由于这种全息存储器的存储容量大于二维半导体存储器,因此ORGA可以容纳更多的巨型门,并提供比fpga更高的性能。ORGA的可编程门阵列具有许多光电二极管,可以使用全息存储器上的配置上下文进行光学重新配置。虽然光电二极管通常仅用于配置程序,但光电二极管可用于光通信信号的直接输入。因此,本文给出了一个在ORGA可编程门阵列上实现光通信的演示。
{"title":"Direct optical communication on an optically reconfigurable gate array","authors":"Shinya Furukawa, I. S. A. Halim, Minoru Watanabe, F. Kobayashi","doi":"10.1109/FGCT.2016.7605065","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605065","url":null,"abstract":"As one type of field programmable gate array (FPGA), optically reconfigurable gate arrays (ORGAs) have been undergoing continual development. ORGAs are optoelectronic devices consisting of a holographic memory, a laser array, a programmable gate array. Since the storage capacity of such holographic memory is greater than that of two-dimensional semiconductor memory, an ORGA can accommodate more huge gates and provide higher performance than FPGAs. A programmable gate array of an ORGA has numerous photodiodes that can be reconfigured optically using configuration contexts on a holographic memory. Although the photodiodes are normally used only for a configuration procedure, the photodiodes are useful for direct input of optical communication signals. This paper therefore presents a demonstration of optical communication on ORGA's programmable gate array.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperation and underlay mode selection in cognitive radio network 认知无线网络中的协作与底层模式选择
Ramy Amer, A. El-Sherif, Hanaa Ebrahim, A. Mokhtar
In this paper, we propose a technique for cooperation and underlay mode selection in cognitive radio networks. Hybrid spectrum sharing is assumed where the secondary user (SU) can access the primary user (PU) channel in two modes, underlay mode or cooperative mode with admission control. Overlay spectrum sharing allows the SU to occupy the spectrum only when the PU is idle. Cooperation (collaboration) occurs when the SU admits the PU's packet into a relay buffer to transmit in the subsequent timeslots, i.e. timeslots when no successful transmission from the PU source to the destination. In addition to accessing the channel in the overlay mode, secondary user is allowed to access the channel in the underlay mode by occupying the channel currently occupied by the primary user with small transmission power. It is proposed that the secondary user can exploit the underlay access only when the primary channel is at good transmission conditions or predicted to be in non-outage state. The destination sends a feedback message with the received SNR (channel quality status) to the PU source, which is overheard by the SU. The SU exploits the SNR feedback messages to build and update a belief function about the primary channel quality. The belief function leads the SU to select the best access mode each timeslot, underlay or cooperation. We characterize the maximum achievable throughput of our proposed hybrid spectrum sharing. By observing the simulation results, the proposed model attains noticeable improvement in the system performance in terms of maximum secondary user throughput than the conventional cooperation and noncooperation schemes.
在本文中,我们提出了一种认知无线网络中的协作和底层模式选择技术。混合频谱共享假设从用户(SU)可以通过两种模式访问主用户(PU)信道,即底层模式或带准入控制的合作模式。叠加频谱共享是指只有在PU空闲时,SU才可以占用频谱。当SU允许PU的数据包进入中继缓冲区,在后续的时隙(即PU源到目的没有成功传输的时隙)中传输时,就发生了协作(collaboration)。除了允许从用户以覆盖方式访问信道外,还允许从用户以传输功率小的方式占用主用户当前占用的信道,以底层方式访问信道。提出只有当主信道处于良好的传输条件或预计处于非中断状态时,辅助用户才能利用底层接入。目的地向PU源发送带有接收到的信噪比(信道质量状态)的反馈消息,该消息被SU听到。SU利用信噪比反馈消息来构建和更新关于主信道质量的信念函数。信念函数引导SU在每个时隙、底层或合作中选择最佳的访问方式。我们描述了我们提出的混合频谱共享的最大可实现吞吐量。仿真结果表明,与传统的合作和非合作方案相比,该模型在最大二次用户吞吐量方面取得了显著的改进。
{"title":"Cooperation and underlay mode selection in cognitive radio network","authors":"Ramy Amer, A. El-Sherif, Hanaa Ebrahim, A. Mokhtar","doi":"10.1109/FGCT.2016.7605066","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605066","url":null,"abstract":"In this paper, we propose a technique for cooperation and underlay mode selection in cognitive radio networks. Hybrid spectrum sharing is assumed where the secondary user (SU) can access the primary user (PU) channel in two modes, underlay mode or cooperative mode with admission control. Overlay spectrum sharing allows the SU to occupy the spectrum only when the PU is idle. Cooperation (collaboration) occurs when the SU admits the PU's packet into a relay buffer to transmit in the subsequent timeslots, i.e. timeslots when no successful transmission from the PU source to the destination. In addition to accessing the channel in the overlay mode, secondary user is allowed to access the channel in the underlay mode by occupying the channel currently occupied by the primary user with small transmission power. It is proposed that the secondary user can exploit the underlay access only when the primary channel is at good transmission conditions or predicted to be in non-outage state. The destination sends a feedback message with the received SNR (channel quality status) to the PU source, which is overheard by the SU. The SU exploits the SNR feedback messages to build and update a belief function about the primary channel quality. The belief function leads the SU to select the best access mode each timeslot, underlay or cooperation. We characterize the maximum achievable throughput of our proposed hybrid spectrum sharing. By observing the simulation results, the proposed model attains noticeable improvement in the system performance in terms of maximum secondary user throughput than the conventional cooperation and noncooperation schemes.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131079912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1