首页 > 最新文献

Journal of Computer Networks and Communications最新文献

英文 中文
Survey: An Overview on Privacy Preserving Federated Learning in Health Data 调查:健康数据中隐私保护联邦学习的概述
IF 2 Q3 TELECOMMUNICATIONS Pub Date : 2023-03-27 DOI: 10.37256/cnc.1120231992
Manzur Elahi, Hui Cui, Mohammed Kaosar
Machine learning now confronts two significant obstacles: the first is data isolation in most organizations' silos, and the second is data privacy and security enforcement. The widespread application of Machine Learning techniques in patient care is currently hampered by limited dataset availability for algorithm training and validation due to the lack of standardised electronic medical records and strict legal and ethical requirements to protect patient privacy. To avoid compromising patient privacy while supporting scientific analysis on massive datasets to improve patient care, it is necessary to analyse and implement Machine Learning solutions that fulfil data security and consumption demands. In this survey paper, we meticulously explain the existing works of federated learning from many perspectives to give a thorough overview and promote future research in this area. Then, we determine the current challenges, attack vectors and potential prospects for federated learning research. We analysed the similarities, differences and advantages between federated learning and other machine learning techniques. We also discussed about system and statistical heterogeneity and related efficient algorithms.
机器学习现在面临着两个重大障碍:第一个是大多数组织的孤岛中的数据隔离,第二个是数据隐私和安全执行。由于缺乏标准化的电子病历和严格的法律和道德要求来保护患者隐私,机器学习技术在患者护理中的广泛应用目前受到用于算法训练和验证的数据集可用性有限的阻碍。为了在支持对海量数据集进行科学分析以改善患者护理的同时避免损害患者隐私,有必要分析和实施满足数据安全和消费需求的机器学习解决方案。在这篇调查论文中,我们从多个角度对联邦学习的现有工作进行了细致的解释,以给出一个全面的概述,并促进该领域的未来研究。然后,我们确定了当前联邦学习研究的挑战、攻击向量和潜在前景。我们分析了联邦学习与其他机器学习技术的异同和优势。我们还讨论了系统和统计异质性以及相关的高效算法。
{"title":"Survey: An Overview on Privacy Preserving Federated Learning in Health Data","authors":"Manzur Elahi, Hui Cui, Mohammed Kaosar","doi":"10.37256/cnc.1120231992","DOIUrl":"https://doi.org/10.37256/cnc.1120231992","url":null,"abstract":"Machine learning now confronts two significant obstacles: the first is data isolation in most organizations' silos, and the second is data privacy and security enforcement. The widespread application of Machine Learning techniques in patient care is currently hampered by limited dataset availability for algorithm training and validation due to the lack of standardised electronic medical records and strict legal and ethical requirements to protect patient privacy. To avoid compromising patient privacy while supporting scientific analysis on massive datasets to improve patient care, it is necessary to analyse and implement Machine Learning solutions that fulfil data security and consumption demands. In this survey paper, we meticulously explain the existing works of federated learning from many perspectives to give a thorough overview and promote future research in this area. Then, we determine the current challenges, attack vectors and potential prospects for federated learning research. We analysed the similarities, differences and advantages between federated learning and other machine learning techniques. We also discussed about system and statistical heterogeneity and related efficient algorithms.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"20 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77199392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impacts of Vehicle-to-Everything Enabled Applications: Literature Review of Existing Studies 车辆对一切应用的影响:现有研究的文献综述
IF 2 Q3 TELECOMMUNICATIONS Pub Date : 2023-03-10 DOI: 10.37256/cnc.1120232115
Jianhe Du, K. Ahn, Mohamed M. G. Farag, Hesham A Rakha
As communication technology is developing at a rapid pace, connected vehicles (CVs) can potentially enhance vehicle safety while reducing vehicle energy consumption and emissions via data sharing. Many researchers have attempted to quantify the impacts of such CV applications and vehicle-to-everything (V2X) communication, or the instant and accurate communication among vehicles, devices, pedestrians, infrastructure, network, cloud, and grid. Cellular V2X (C-V2X) has gained interest as an efficient method for this data sharing. In releases 14 and 15, C-V2X uses 4G LTE technology, and in release 16, it uses the latest 5G new radio (NR) technology. Among its benefits, C-V2X can function even with no network infrastructure coverage; in addition, C-V2X surpasses older technologies in terms of communication range, latency, and data rates. Highly efficient information interchange in a CV environment can provide timely data to enhance the transportation system's capacity, and it can support applications that improve vehicle safety and minimize negative impacts on the environment. Achieving the full benefits of CVs requires rigorous investigation into the effectiveness, strengths, and weaknesses of different CV applications. It also calls for deeper understanding of the communication protocols, results with different CV market penetration rates (MPRs), CV- and human-driven vehicle interactions, integration of multiple applications, and errors and latencies associated with data communication. This paper includes a review of existing literature on the safety, mobility, and environmental impacts of CV applications; gaps in current CV research; and recommended directions for future research. The results of this paper will help shape future research for CV applications to realize their full potential.
随着通信技术的快速发展,联网汽车(cv)可以通过数据共享来提高车辆安全性,同时降低车辆能耗和排放。许多研究人员试图量化此类自动驾驶汽车应用和车辆到一切(V2X)通信的影响,或车辆、设备、行人、基础设施、网络、云和网格之间的即时和准确通信。蜂窝V2X (C-V2X)作为一种有效的数据共享方法已引起人们的兴趣。在版本14和15中,C-V2X使用4G LTE技术,而在版本16中,它使用最新的5G新无线电(NR)技术。C-V2X的优势之一是,它可以在没有网络基础设施覆盖的情况下运行;此外,C-V2X在通信范围、延迟和数据速率方面都超越了旧技术。在自动驾驶环境中,高效的信息交换可以提供及时的数据,以增强交通系统的能力,并可以支持提高车辆安全性和最大限度地减少对环境的负面影响的应用。要充分发挥简历的优势,需要对不同简历应用程序的有效性、优缺点进行严格的调查。它还要求更深入地了解通信协议、不同自动驾驶汽车市场渗透率(MPRs)的结果、自动驾驶汽车和人类驱动的车辆交互、多种应用的集成以及与数据通信相关的错误和延迟。本文综述了现有的关于自动驾驶汽车应用的安全性、移动性和环境影响的文献;当前CV研究的空白;并对今后的研究方向提出了建议。本文的研究结果将有助于塑造未来CV应用的研究,以充分发挥其潜力。
{"title":"Impacts of Vehicle-to-Everything Enabled Applications: Literature Review of Existing Studies","authors":"Jianhe Du, K. Ahn, Mohamed M. G. Farag, Hesham A Rakha","doi":"10.37256/cnc.1120232115","DOIUrl":"https://doi.org/10.37256/cnc.1120232115","url":null,"abstract":"As communication technology is developing at a rapid pace, connected vehicles (CVs) can potentially enhance vehicle safety while reducing vehicle energy consumption and emissions via data sharing. Many researchers have attempted to quantify the impacts of such CV applications and vehicle-to-everything (V2X) communication, or the instant and accurate communication among vehicles, devices, pedestrians, infrastructure, network, cloud, and grid. Cellular V2X (C-V2X) has gained interest as an efficient method for this data sharing. In releases 14 and 15, C-V2X uses 4G LTE technology, and in release 16, it uses the latest 5G new radio (NR) technology. Among its benefits, C-V2X can function even with no network infrastructure coverage; in addition, C-V2X surpasses older technologies in terms of communication range, latency, and data rates. Highly efficient information interchange in a CV environment can provide timely data to enhance the transportation system's capacity, and it can support applications that improve vehicle safety and minimize negative impacts on the environment. Achieving the full benefits of CVs requires rigorous investigation into the effectiveness, strengths, and weaknesses of different CV applications. It also calls for deeper understanding of the communication protocols, results with different CV market penetration rates (MPRs), CV- and human-driven vehicle interactions, integration of multiple applications, and errors and latencies associated with data communication. This paper includes a review of existing literature on the safety, mobility, and environmental impacts of CV applications; gaps in current CV research; and recommended directions for future research. The results of this paper will help shape future research for CV applications to realize their full potential.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"265 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80098116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Optimal and Suboptimal Joint Access Point Association and Radio Resource Allocation in WLANs 无线局域网中有效的最优和次优联合接入点关联与无线资源分配
IF 2 Q3 TELECOMMUNICATIONS Pub Date : 2023-01-18 DOI: 10.37256/cnc.1120231689
Zhiwei Mao
The centralized joint access point (AP) association and radio resource allocation problem in time-sharing based dense WLANs with heterogeneous station (STA) throughput demands and identical AP transmission power is considered in this paper. The problem is formulated as an NP-hard single non-zero programming (SNZP) optimization problem with three different throughput-based objective functions, including the maximal aggregate (MA) throughput, the max-min fair (MMF) throughput and the proportionally fair (PF) throughput. To solve the NP-hard SNZP problem, based on the optimal branch-and-bound (BnB) searching approach, two novel efficient algorithms, the optimal BnB and the suboptimal depth-first BnB (DF-BnB) algorithms, are proposed, which can be used as convenient performance benchmarks in the study of the problem considered. The complexity of the proposed algorithms is analyzed theoretically. Numerical results are presented to investigate and compare the performance and complexity of the proposed algorithms under the three different design criteria, which can help in choosing an appropriate cost function objective in practical system design.
研究了具有异构站吞吐量需求和相同AP发射功率的分时密集无线局域网中集中式联合接入点(AP)关联和无线资源分配问题。该问题是一个NP-hard单非零规划(SNZP)优化问题,具有三个不同的基于吞吐量的目标函数,包括最大聚合吞吐量(MA)、最大最小公平吞吐量(MMF)和比例公平吞吐量(PF)。为了解决NP-hard SNZP问题,在最优分支定界(BnB)搜索方法的基础上,提出了最优BnB和次最优深度优先BnB (DF-BnB)算法两种新的高效算法,这两种算法可以作为研究所考虑问题的方便性能基准。从理论上分析了所提算法的复杂性。通过数值结果比较了三种不同设计准则下所提出算法的性能和复杂度,有助于在实际系统设计中选择合适的成本函数目标。
{"title":"Efficient Optimal and Suboptimal Joint Access Point Association and Radio Resource Allocation in WLANs","authors":"Zhiwei Mao","doi":"10.37256/cnc.1120231689","DOIUrl":"https://doi.org/10.37256/cnc.1120231689","url":null,"abstract":"The centralized joint access point (AP) association and radio resource allocation problem in time-sharing based dense WLANs with heterogeneous station (STA) throughput demands and identical AP transmission power is considered in this paper. The problem is formulated as an NP-hard single non-zero programming (SNZP) optimization problem with three different throughput-based objective functions, including the maximal aggregate (MA) throughput, the max-min fair (MMF) throughput and the proportionally fair (PF) throughput. To solve the NP-hard SNZP problem, based on the optimal branch-and-bound (BnB) searching approach, two novel efficient algorithms, the optimal BnB and the suboptimal depth-first BnB (DF-BnB) algorithms, are proposed, which can be used as convenient performance benchmarks in the study of the problem considered. The complexity of the proposed algorithms is analyzed theoretically. Numerical results are presented to investigate and compare the performance and complexity of the proposed algorithms under the three different design criteria, which can help in choosing an appropriate cost function objective in practical system design.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"12 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74827696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Altitude Platform Stations Aided Cloud-Computing Solution for Rural-Environment IoT Applications 面向农村环境物联网应用的高空台站辅助云计算解决方案
IF 2 Q3 TELECOMMUNICATIONS Pub Date : 2023-01-11 DOI: 10.37256/cnc.1120232107
Victor Monzon Baeza, Manuel Alvarez Marban
This work proposes a flexible and scalable Smart Rural (SR) system for gathering and processing IoT data from remote rural areas with no traditional communication coverage as a handicap. We offer an architecture structured in distinct segments using emerging technologies such as IoT, 5G, Cloud and High Altitude Platform Station (HAPS). This proposal is applied to the rural environment to cover thus all the needs of the system in the collection of IoT data from these remote rural areas, its coverage by space vehicles and its processing and storage through 5G terrestrial networks and cloud services. The proposal includes the deployment of IoT sensors and the development of Amazon Web Services (AWS). On the other hand, the part of the space segment considered by HAPS has been simulated for different space channels. This way offers a complete and automated SR system that allows access to these IoT data from remote rural areas through the Internet.
这项工作提出了一个灵活和可扩展的智能农村(SR)系统,用于收集和处理来自偏远农村地区的物联网数据,这些地区没有传统的通信覆盖作为障碍。我们使用物联网、5G、云和高空平台站(HAPS)等新兴技术,为不同的细分市场提供架构。该提案适用于农村环境,从而涵盖系统在从这些偏远农村地区收集物联网数据,通过太空飞行器覆盖以及通过5G地面网络和云服务处理和存储数据方面的所有需求。该提案包括部署物联网传感器和开发亚马逊网络服务(AWS)。另一方面,对HAPS考虑的部分空间段进行了不同空间通道的模拟。这种方式提供了一个完整和自动化的SR系统,允许通过互联网访问偏远农村地区的这些物联网数据。
{"title":"High Altitude Platform Stations Aided Cloud-Computing Solution for Rural-Environment IoT Applications","authors":"Victor Monzon Baeza, Manuel Alvarez Marban","doi":"10.37256/cnc.1120232107","DOIUrl":"https://doi.org/10.37256/cnc.1120232107","url":null,"abstract":"This work proposes a flexible and scalable Smart Rural (SR) system for gathering and processing IoT data from remote rural areas with no traditional communication coverage as a handicap. We offer an architecture structured in distinct segments using emerging technologies such as IoT, 5G, Cloud and High Altitude Platform Station (HAPS). This proposal is applied to the rural environment to cover thus all the needs of the system in the collection of IoT data from these remote rural areas, its coverage by space vehicles and its processing and storage through 5G terrestrial networks and cloud services. The proposal includes the deployment of IoT sensors and the development of Amazon Web Services (AWS). On the other hand, the part of the space segment considered by HAPS has been simulated for different space channels. This way offers a complete and automated SR system that allows access to these IoT data from remote rural areas through the Internet.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"203 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86999581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Whittle Index Based Age-of-Information Aware Scheduling for Markovian Channels 基于Whittle索引的马尔可夫信道信息年龄感知调度
IF 2 Q3 TELECOMMUNICATIONS Pub Date : 2022-12-30 DOI: 10.37256/cnc.1120231701
Bejjipuram Sombabu, Bhishma Dedhia, Sharayu Moharir
The focus of this work is on minimizing the time average of the weighted sum of the Age-of-Information in a multi-sensor system in the setting where all sensors report their measurements to a central monitoring station using a shared communication channel. We consider multiple information settings including complete CSI/delayed CSI/no CSI and two stochastic channel evolution models, i.e., i.i.d. channels and Markovian channels. In all settings considered, we prove the indexability of the scheduling problem. In addition, we compute the Whittle Index in closed form for some of the settings. Indexability for Markovian channels for the objective of minimizing AoI is a key contribution of this work. Further, under i.i.d. channels, we propose a novel efficient implementation for the Whittle Index-based policy. We use simulations to show that Whittle Index-based scheduling policies either outperform or match the performance of the state-of-the-art policies for all the settings considered.
这项工作的重点是在多传感器系统中,在所有传感器使用共享通信信道向中央监测站报告其测量结果的情况下,最小化加权信息年龄和的时间平均值。我们考虑了多种信息设置,包括完全CSI/延迟CSI/无CSI和两种随机通道演化模型,即i.i.d.通道和马尔可夫通道。在所有考虑的情况下,我们证明了调度问题的可索引性。此外,我们以封闭形式计算了一些设置的惠特尔指数。为了最小化AoI的目标,马尔可夫通道的可索引性是这项工作的关键贡献。此外,在i.i.d渠道下,我们提出了一种新的基于Whittle指数的有效实施策略。我们使用模拟来显示,对于所有考虑的设置,基于Whittle索引的调度策略的性能优于或匹配最先进策略的性能。
{"title":"Whittle Index Based Age-of-Information Aware Scheduling for Markovian Channels","authors":"Bejjipuram Sombabu, Bhishma Dedhia, Sharayu Moharir","doi":"10.37256/cnc.1120231701","DOIUrl":"https://doi.org/10.37256/cnc.1120231701","url":null,"abstract":"The focus of this work is on minimizing the time average of the weighted sum of the Age-of-Information in a multi-sensor system in the setting where all sensors report their measurements to a central monitoring station using a shared communication channel. We consider multiple information settings including complete CSI/delayed CSI/no CSI and two stochastic channel evolution models, i.e., i.i.d. channels and Markovian channels. In all settings considered, we prove the indexability of the scheduling problem. In addition, we compute the Whittle Index in closed form for some of the settings. Indexability for Markovian channels for the objective of minimizing AoI is a key contribution of this work. Further, under i.i.d. channels, we propose a novel efficient implementation for the Whittle Index-based policy. We use simulations to show that Whittle Index-based scheduling policies either outperform or match the performance of the state-of-the-art policies for all the settings considered.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"31 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80406561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Large Scale LEO Satellite Networks for the Future Internet: Challenges and Solutions to Addressing and Routing 面向未来互联网的大规模低轨道卫星网络:寻址和路由的挑战和解决方案
IF 2 Q3 TELECOMMUNICATIONS Pub Date : 2022-12-30 DOI: 10.37256/cnc.1120232105
Lin Han, Alvaro Retana, Cedric Westphal, Richard Li
This document analyses the problems and challenges of addressing and routing to Low Earth Orbit (LEO) satellites used for the future Internet. It focuses on the scenario where Inter-Satellite-Links (ISL) are used for massive LEO satellite constellation. Such LEO satellite network is the key to the Non-terrestrial Network (NTN) integration with 5G and beyond. The paper describes two categories of solutions. One is based on IPv6 and another is based on a new protocol, New IP. The two categories of solutions are a) using new types of addresses for LEO satellites and b) new concepts for routing with these addresses. The semantic addressing scheme leverages the characteristics of satellites with known orbit elements; and simplifies the satellite identification by using limited indexes. The routing method combines semantic addressing with source routing and generates a new semantic routing scheme. Compared with traditional methods, the new proposals dramatically reduce the workload in satellite, such as table size, Ternary Content-addressable memory (TCAM) lookups, and packet header size. Thus it is more suitable to networks in space where the harsh environment limits the hardware performance, power consumption, link bandwidth and system complexity.
本文分析了未来互联网使用的低地球轨道(LEO)卫星寻址和路由的问题和挑战。重点研究了大规模LEO卫星星座使用星间链路(ISL)的场景。这种低轨道卫星网络是与5G及以后的非地面网络(NTN)融合的关键。本文描述了两类解决方案。一种基于IPv6,另一种基于新协议new IP。这两类解决方案是:a)为低轨道卫星使用新型地址;b)使用这些地址进行路由的新概念。语义寻址方案利用轨道元素已知的卫星特性;利用有限指标简化了卫星识别。该路由方法将语义寻址与源路由相结合,生成了一种新的语义路由方案。与传统方法相比,新方案显著降低了卫星通信系统的工作负荷,如表大小、三元内容可寻址存储器(TCAM)查找和包头大小。因此,它更适合于恶劣环境限制硬件性能、功耗、链路带宽和系统复杂性的空间网络。
{"title":"Large Scale LEO Satellite Networks for the Future Internet: Challenges and Solutions to Addressing and Routing","authors":"Lin Han, Alvaro Retana, Cedric Westphal, Richard Li","doi":"10.37256/cnc.1120232105","DOIUrl":"https://doi.org/10.37256/cnc.1120232105","url":null,"abstract":"This document analyses the problems and challenges of addressing and routing to Low Earth Orbit (LEO) satellites used for the future Internet. It focuses on the scenario where Inter-Satellite-Links (ISL) are used for massive LEO satellite constellation. Such LEO satellite network is the key to the Non-terrestrial Network (NTN) integration with 5G and beyond. The paper describes two categories of solutions. One is based on IPv6 and another is based on a new protocol, New IP. The two categories of solutions are a) using new types of addresses for LEO satellites and b) new concepts for routing with these addresses. The semantic addressing scheme leverages the characteristics of satellites with known orbit elements; and simplifies the satellite identification by using limited indexes. The routing method combines semantic addressing with source routing and generates a new semantic routing scheme. Compared with traditional methods, the new proposals dramatically reduce the workload in satellite, such as table size, Ternary Content-addressable memory (TCAM) lookups, and packet header size. Thus it is more suitable to networks in space where the harsh environment limits the hardware performance, power consumption, link bandwidth and system complexity.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"30 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78685871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling Service Updates: A Multi-arm Bandit Approach 调度服务更新:多臂强盗方法
IF 2 Q3 TELECOMMUNICATIONS Pub Date : 2022-11-30 DOI: 10.37256/cnc.1120231686
V. S. C. L. Narayana, Sucheta Ravikanti, Harsh Deshpande, Sharayu Moharir
Software as a Service (SaaS) instances often use edge resources to serve their customers. The version of the service hosted at the edge needs to be periodically updated to maximize the utility derived by the customers. We focus on scheduling updates in the setting where the utility derived from a version is an unknown decreasing function of the time elapsed since the version was created. We map the scheduling problem to a multi-arm bandit and propose an update policy. We characterize its performance and compare it with the fundamental limit on the performance of any online policy.
软件即服务(SaaS)实例经常使用边缘资源为其客户提供服务。需要定期更新托管在边缘的服务版本,以最大限度地提高客户获得的效用。我们将重点放在以下设置中的更新调度上:从版本派生的实用程序是自版本创建以来所经过时间的未知递减函数。我们将调度问题映射到一个多臂强盗,并提出了一个更新策略。我们对其性能进行了表征,并将其与任何在线策略性能的基本限制进行了比较。
{"title":"Scheduling Service Updates: A Multi-arm Bandit Approach","authors":"V. S. C. L. Narayana, Sucheta Ravikanti, Harsh Deshpande, Sharayu Moharir","doi":"10.37256/cnc.1120231686","DOIUrl":"https://doi.org/10.37256/cnc.1120231686","url":null,"abstract":"Software as a Service (SaaS) instances often use edge resources to serve their customers. The version of the service hosted at the edge needs to be periodically updated to maximize the utility derived by the customers. We focus on scheduling updates in the setting where the utility derived from a version is an unknown decreasing function of the time elapsed since the version was created. We map the scheduling problem to a multi-arm bandit and propose an update policy. We characterize its performance and compare it with the fundamental limit on the performance of any online policy.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"108 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75868877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Long Range Based IoT Search and Rescue System, a Human-Computer Interaction Preliminary Study and Implementation 远程物联网搜救系统——人机交互的初步研究与实现
IF 2 Q3 TELECOMMUNICATIONS Pub Date : 2022-11-11 DOI: 10.37256/cnc.1120231753
Christos Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado
Nowadays, IoT has been introduced in different aspects of our lives giving solutions to several problems, one of which is the Search and Rescue (SAR) operations. People that suffer from dementia or people with disease in the autism spectrum tend to elope from their caretaker’s attention, a fact that can lead to serious problems. Thus, a system that takes into consideration of the multiple requirements is of paramount importance. In this paper, a LoRa based SAR system is proposed in order to help in the localization of people with high risk of going missing. In contrast to most of the related systems, in this research article a different approach has been followed. Instead of focusing on the technology, in our approach a human-centered design has been used, leveraging the knowledge of Human-Computer Interaction (HCI) domain. Thus, the technologies used, are an outcome of the initial study. Finally, the system is evaluated using heuristic evaluation and questionnaires.
如今,物联网已经被引入到我们生活的各个方面,解决了许多问题,其中之一就是搜救(SAR)操作。患有痴呆症或自闭症的人往往会从照顾者的注意力中溜走,这可能会导致严重的问题。因此,考虑到多种需求的系统是至关重要的。本文提出了一种基于LoRa的SAR系统,以帮助定位高风险失踪人员。与大多数相关系统不同,本文采用了一种不同的方法。而不是专注于技术,在我们的方法中,以人为中心的设计已经被使用,利用人机交互(HCI)领域的知识。因此,所使用的技术是最初研究的结果。最后,采用启发式评价法和问卷调查法对系统进行评价。
{"title":"Long Range Based IoT Search and Rescue System, a Human-Computer Interaction Preliminary Study and Implementation","authors":"Christos Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado","doi":"10.37256/cnc.1120231753","DOIUrl":"https://doi.org/10.37256/cnc.1120231753","url":null,"abstract":"Nowadays, IoT has been introduced in different aspects of our lives giving solutions to several problems, one of which is the Search and Rescue (SAR) operations. People that suffer from dementia or people with disease in the autism spectrum tend to elope from their caretaker’s attention, a fact that can lead to serious problems. Thus, a system that takes into consideration of the multiple requirements is of paramount importance. In this paper, a LoRa based SAR system is proposed in order to help in the localization of people with high risk of going missing. In contrast to most of the related systems, in this research article a different approach has been followed. Instead of focusing on the technology, in our approach a human-centered design has been used, leveraging the knowledge of Human-Computer Interaction (HCI) domain. Thus, the technologies used, are an outcome of the initial study. Finally, the system is evaluated using heuristic evaluation and questionnaires.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"139 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86570100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Linear and Non-Linear Precoders for Massive MIMO Systems 大规模MIMO系统的节能线性和非线性预编码器
IF 2 Q3 TELECOMMUNICATIONS Pub Date : 2020-08-30 DOI: 10.47277/ijcncs/8(8)1
S. H. Sackey, Michael Ansong, S. N. Kofie, Abdul Karim Armahy
The term Massive MIMO means, Massive multiple input multiple output also known as (large-scale antenna system, very large MIMO). Massive Multiple-Input-MultipleOutput (MIMO) is the major key technique for the future Fifth Generation (5G) of mobile wireless communication network due to its characteristics, elements and advantages. Massive MIMO will be comprised of five major elements; antennas, electronic components, network architectures, protocols and signal processing. We realize that precoding technique is a processing technique that utilizes Channel State Information Technique (CSIT) by operating on the signals before transmitting them. This technique varies base on the type of CSIT and performance criterion. Precoding technique is the last digital processing block at the transmitting side. In this paper, linear and non-linear Precoding technique was reviewed and we proposed two techniques under each that is Minimum Mean Square Error (MMSE), Block Diagonalization (BD), Tomlinson-Harashima (TH) and Dirty paper coding (DPC). Four Precoding techniques: MMSE, BD, DPC and TH were used in the studies to power consumption, energy efficiency and area throughput for single-cell and multi-cell scenarios. In comparing the proposed techniques, in terms of energy efficiency and area throughput, reuse factor (Reuse 4) performs better than other techniques when there is an imperfect CSI is used
大规模MIMO这个术语的意思是,大规模多输入多输出也被称为(大规模天线系统,超大型MIMO)。海量多输入多输出(Massive multi - input - multioutput, MIMO)由于其特点、构成要素和优势,是未来第五代(5G)移动无线通信网络的主要关键技术。大规模MIMO将由五大要素组成;天线,电子元件,网络架构,协议和信号处理。我们认识到预编码技术是利用信道状态信息技术(CSIT)在信号发送前对其进行操作的一种处理技术。这种技术根据CSIT的类型和性能标准而有所不同。预编码技术是发送端的最后一个数字处理模块。本文对线性和非线性预编码技术进行了综述,提出了最小均方误差(MMSE)、块对角化(BD)、Tomlinson-Harashima (TH)和脏纸编码(DPC)两种预编码技术。四种预编码技术:MMSE、BD、DPC和TH在研究中被用于单蜂窝和多蜂窝场景的功耗、能源效率和面积吞吐量。在比较所提出的技术时,就能源效率和面积吞吐量而言,当使用不完美的CSI时,重用因子(重用4)比其他技术表现更好
{"title":"Energy Efficient Linear and Non-Linear Precoders for Massive MIMO Systems","authors":"S. H. Sackey, Michael Ansong, S. N. Kofie, Abdul Karim Armahy","doi":"10.47277/ijcncs/8(8)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(8)1","url":null,"abstract":"The term Massive MIMO means, Massive multiple input multiple output also known as (large-scale antenna system, very large MIMO). Massive Multiple-Input-MultipleOutput (MIMO) is the major key technique for the future Fifth Generation (5G) of mobile wireless communication network due to its characteristics, elements and advantages. Massive MIMO will be comprised of five major elements; antennas, electronic components, network architectures, protocols and signal processing. We realize that precoding technique is a processing technique that utilizes Channel State Information Technique (CSIT) by operating on the signals before transmitting them. This technique varies base on the type of CSIT and performance criterion. Precoding technique is the last digital processing block at the transmitting side. In this paper, linear and non-linear Precoding technique was reviewed and we proposed two techniques under each that is Minimum Mean Square Error (MMSE), Block Diagonalization (BD), Tomlinson-Harashima (TH) and Dirty paper coding (DPC). Four Precoding techniques: MMSE, BD, DPC and TH were used in the studies to power consumption, energy efficiency and area throughput for single-cell and multi-cell scenarios. In comparing the proposed techniques, in terms of energy efficiency and area throughput, reuse factor (Reuse 4) performs better than other techniques when there is an imperfect CSI is used","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"8 1","pages":"59-66"},"PeriodicalIF":2.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48503049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Man in the Middle Attacks: Analysis, Motivation and Prevention 中路进攻:分析、动机与预防
IF 2 Q3 TELECOMMUNICATIONS Pub Date : 2020-07-31 DOI: 10.47277/ijcncs/8(7)1
D. Javeed, U. MohammedBadamasi, C. Ndubuisi, F. Soomro, M. Asif
Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. The malware in such scenario mainly monitors and have the ability to change the information which is classified onsly to these two users. Mainly it is knows as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. This issue is critical. This paper aims to the understanding of the MITM and to understand its different categories. Finally this paper aims to present some of mechanism for the prevention of such attacks and to identify some of the future research directions in such area
计算机系统和应用程序日益进步,随着这一领域的进步,催生了新的网络攻击。中间人攻击(MITM)就是其中之一。外部人员或第三方进入两个在线用户之间的攻击,而两个用户都不知道。这种情况下的恶意软件主要监控并有能力更改与这两个用户相同的信息。它主要是作为系统内未经授权的用户的协议,该用户可以访问和更改系统的信息,而不会给现有用户留下任何痕迹。这个问题至关重要。本文旨在了解MITM及其不同类别。最后,本文旨在介绍一些预防此类攻击的机制,并确定该领域未来的一些研究方向
{"title":"Man in the Middle Attacks: Analysis, Motivation and Prevention","authors":"D. Javeed, U. MohammedBadamasi, C. Ndubuisi, F. Soomro, M. Asif","doi":"10.47277/ijcncs/8(7)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(7)1","url":null,"abstract":"Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. The malware in such scenario mainly monitors and have the ability to change the information which is classified onsly to these two users. Mainly it is knows as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. This issue is critical. This paper aims to the understanding of the MITM and to understand its different categories. Finally this paper aims to present some of mechanism for the prevention of such attacks and to identify some of the future research directions in such area","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"8 1","pages":"52-58"},"PeriodicalIF":2.0,"publicationDate":"2020-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44006369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Journal of Computer Networks and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1