Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.08.008
Qi Chen, Ming Huang , JingJing Yang
The Radio Map (RM) stands as a powerful tool in wireless communication and radio regulation. Currently, several RM construction models based on Convolutional Neural Networks (CNNs) have been proposed. However, due to the inherent limitations of vanilla convolutions, capturing distant-range information of the radio propagation environment becomes challenge. Therefore, this letter introduces a novel RM construction model called Distant-range Content interaction Network (DC-Net) and validates its effectiveness using the RadioMapSeer dataset. Experiment results reveal that DC-Net achieves state-of-the-art performance in mapping accuracy for both known and unknown transmitter locations in RM construction.
{"title":"DC-Net: A Distant-range Content Interaction Network for Radio Map construction","authors":"Qi Chen, Ming Huang , JingJing Yang","doi":"10.1016/j.icte.2024.08.008","DOIUrl":"10.1016/j.icte.2024.08.008","url":null,"abstract":"<div><div>The Radio Map (RM) stands as a powerful tool in wireless communication and radio regulation. Currently, several RM construction models based on Convolutional Neural Networks (CNNs) have been proposed. However, due to the inherent limitations of vanilla convolutions, capturing distant-range information of the radio propagation environment becomes challenge. Therefore, this letter introduces a novel RM construction model called Distant-range Content interaction Network (DC-Net) and validates its effectiveness using the RadioMapSeer dataset. Experiment results reveal that DC-Net achieves state-of-the-art performance in mapping accuracy for both known and unknown transmitter locations in RM construction.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1145-1150"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.07.005
Jihoon Moon , Maryam Bukhari , Chomyong Kim , Yunyoung Nam , Muazzam Maqsood , Seungmin Rho
This paper presents critical surveillance system functions and considers advances and challenges for privacy and ethical implications. We examine privacy protection strategies and responsible data management practices reflecting the critical problems of cybersecurity and data management to address concerns, ensuring that surveillance technology evolves ethically and sustainably. We highlight state-of-the-art deep learning-based techniques in object detection, addressing the complex difficulties of surveillance systems. Finally, we provide a research framework, including ethical and long-term implications and broad applications in privacy preservation and ethical responsibility. This study advances knowledge to ensure the long-term sustainability, security, and viability of information and communication technology applications.
{"title":"Object detection under the lens of privacy: A critical survey of methods, challenges, and future directions","authors":"Jihoon Moon , Maryam Bukhari , Chomyong Kim , Yunyoung Nam , Muazzam Maqsood , Seungmin Rho","doi":"10.1016/j.icte.2024.07.005","DOIUrl":"10.1016/j.icte.2024.07.005","url":null,"abstract":"<div><div>This paper presents critical surveillance system functions and considers advances and challenges for privacy and ethical implications. We examine privacy protection strategies and responsible data management practices reflecting the critical problems of cybersecurity and data management to address concerns, ensuring that surveillance technology evolves ethically and sustainably. We highlight state-of-the-art deep learning-based techniques in object detection, addressing the complex difficulties of surveillance systems. Finally, we provide a research framework, including ethical and long-term implications and broad applications in privacy preservation and ethical responsibility. This study advances knowledge to ensure the long-term sustainability, security, and viability of information and communication technology applications.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1124-1144"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.07.009
Ahmad Akmal Aminuddin Mohd Kamal, Masaya Fujisawa
Herein, we present a secure multiplication method that uses secret sharing to solve the security problems presented by Watanabe et al. We implemented the characteristics of the exponent operation in which the product of two numbers with the same base (in this case, the primitive element) involves only the addition of their exponents. In contrast to typical secret sharing schemes, our proposed model requires two shares to be sent to each server simultaneously to achieve multiplication without increasing the number of servers required, thereby resulting in a lower cost of establishing a physical server. In addition, Shannon’s entropy function was used to describe the security of the proposed method. Finally, we evaluated our proposed method in terms of computational and communication costs.
{"title":"Improved protocols for secure multiplication using secret sharing scheme","authors":"Ahmad Akmal Aminuddin Mohd Kamal, Masaya Fujisawa","doi":"10.1016/j.icte.2024.07.009","DOIUrl":"10.1016/j.icte.2024.07.009","url":null,"abstract":"<div><div>Herein, we present a secure multiplication method that uses secret sharing to solve the security problems presented by Watanabe et al. We implemented the characteristics of the exponent operation in which the product of two numbers with the same base (in this case, the primitive element) involves only the addition of their exponents. In contrast to typical secret sharing schemes, our proposed model requires two shares to be sent to each server simultaneously to achieve multiplication without increasing the number of servers required, thereby resulting in a lower cost of establishing a physical server. In addition, Shannon’s entropy function was used to describe the security of the proposed method. Finally, we evaluated our proposed method in terms of computational and communication costs.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1019-1025"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.07.006
Yeongho Park, Hyojin Lim, Yujae Song
We implement a prototype of the underwater optical wireless communication (UOWC) system, incorporating an adaptive optical beam alignment mechanism to ensure the seamless alignment of the optical beam between the transmitter and receiver. In this system, the transmitter, utilizing a laser diode as an optical source, leverages the camera’s object recognition capability to ascertain the position of the receiver, which may experience movement and shaking due to various external factors. However, the underwater condition poses challenges to camera visibility. To address this issue, a green light-emitting diode (LED) is installed on the receiver to make it easier for the transmitter to locate the position of the receiver within the camera image. The detected LED position is converted into angular data, enabling the operation of a servo motor to adjust the transmitter’s beam pointing, via a 2-axis servo motor pan–tilt system. Moreover, in the proposed UOWC prototype system, we employ the timer interrupt algorithm integrated with a real-time operating system and the direct register access method for general-purpose input/output on the NVIDIA Jetson Nano. This strategic combination facilitates the reduction of errors within the timer interval cycle between the transmitter and receiver, optimizing communication reliability through precise control of timer interrupts. To assess the system’s performance, extensive experimental tests are conducted in a large water tank.
{"title":"Design and implementation of underwater optical wireless communication prototype system supporting automatic beam alignment","authors":"Yeongho Park, Hyojin Lim, Yujae Song","doi":"10.1016/j.icte.2024.07.006","DOIUrl":"10.1016/j.icte.2024.07.006","url":null,"abstract":"<div><div>We implement a prototype of the underwater optical wireless communication (UOWC) system, incorporating an adaptive optical beam alignment mechanism to ensure the seamless alignment of the optical beam between the transmitter and receiver. In this system, the transmitter, utilizing a laser diode as an optical source, leverages the camera’s object recognition capability to ascertain the position of the receiver, which may experience movement and shaking due to various external factors. However, the underwater condition poses challenges to camera visibility. To address this issue, a green light-emitting diode (LED) is installed on the receiver to make it easier for the transmitter to locate the position of the receiver within the camera image. The detected LED position is converted into angular data, enabling the operation of a servo motor to adjust the transmitter’s beam pointing, via a 2-axis servo motor pan–tilt system. Moreover, in the proposed UOWC prototype system, we employ the timer interrupt algorithm integrated with a real-time operating system and the direct register access method for general-purpose input/output on the NVIDIA Jetson Nano. This strategic combination facilitates the reduction of errors within the timer interval cycle between the transmitter and receiver, optimizing communication reliability through precise control of timer interrupts. To assess the system’s performance, extensive experimental tests are conducted in a large water tank.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1034-1042"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.06.005
Chathuranga M. Wijerathna Basnayaka, Dushantha Nalin K. Jayakody, Marko Beko
The Age-of-Information (AoI) metric has emerged as a performance measurement metric for evaluating time-sensitive wireless communications systems. Maintaining the freshness and reliability of data is critical in time-critical wireless networks, where outdated information can have significant consequences. Moreover, short packet transmissions are used in wireless sensor networks (WSNs) to maintain energy efficiency and low latency. This paper proposes a theoretical model that utilizes the AoI metric and finite block length information theory to estimate information freshness in an unmanned aerial vehicle (UAV)-assisted WSN. This network includes multiple sensing nodes and relies on short-packet communication for transmission. In this paper, closed-form expressions for average AoI (AAoI) and the block error rate are derived. Furthermore, the optimal altitude and block length that ensures the freshness of received information at the destination is determined. The results of the analysis provide valuable insights into the performance characteristics of UAV-assisted WSNs and have important implications for the design and optimization of such systems.
{"title":"Freshness-in-air: An AoI-inspired UAV-assisted wireless sensor networks","authors":"Chathuranga M. Wijerathna Basnayaka, Dushantha Nalin K. Jayakody, Marko Beko","doi":"10.1016/j.icte.2024.06.005","DOIUrl":"10.1016/j.icte.2024.06.005","url":null,"abstract":"<div><div>The Age-of-Information (AoI) metric has emerged as a performance measurement metric for evaluating time-sensitive wireless communications systems. Maintaining the freshness and reliability of data is critical in time-critical wireless networks, where outdated information can have significant consequences. Moreover, short packet transmissions are used in wireless sensor networks (WSNs) to maintain energy efficiency and low latency. This paper proposes a theoretical model that utilizes the AoI metric and finite block length information theory to estimate information freshness in an unmanned aerial vehicle (UAV)-assisted WSN. This network includes multiple sensing nodes and relies on short-packet communication for transmission. In this paper, closed-form expressions for average AoI (AAoI) and the block error rate are derived. Furthermore, the optimal altitude and block length that ensures the freshness of received information at the destination is determined. The results of the analysis provide valuable insights into the performance characteristics of UAV-assisted WSNs and have important implications for the design and optimization of such systems.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1103-1109"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141691213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.08.004
Fabian Graf , Thomas Watteyne , Michael Villnow
Application Performance Monitoring (APM) is key for ensuring computer systems perform well. While most APM tools target servers and networking infrastructure, here we focus on APM for devices with strict resource constraints: extremely limited in terms of power, memory and bandwidth. We tailor this article to be both a survey and a tutorial. In the survey part, we investigate APM approaches for low-power wireless networks, with a particular focus on Time Synchronized Channel Hopping solutions, as they are well-suited for critical industrial applications. We survey performance metrics characterizing the network health condition and show how, to capture the health of a network universally, it is important to constantly monitor hardware-related, network-related and network-wide metrics. We present a collection of metrics that serves as a checklist for the design of an APM system, describe related work on APM concepts suitable for low-power wireless system, and provide core concepts for collecting, exporting and processing performance metrics. The tutorial part consists of a hands-on example of running commercial APM and networking solutions. We use the active APM framework from Memfault, which periodically creates heartbeats including the performance metrics. We run this framework on top of the SmartMesh IP protocol stack, a commercial product by Analog Devices that offers wired-like high reliability and a decade of battery lifetime, and integrate it with the Zephyr operating systems. This tutorial allows the readership to experiment with a complete ready-to-deploy mote-to-cloud APM chain.
{"title":"Monitoring performance metrics in low-power wireless systems","authors":"Fabian Graf , Thomas Watteyne , Michael Villnow","doi":"10.1016/j.icte.2024.08.004","DOIUrl":"10.1016/j.icte.2024.08.004","url":null,"abstract":"<div><div>Application Performance Monitoring (APM) is key for ensuring computer systems perform well. While most APM tools target servers and networking infrastructure, here we focus on APM for devices with strict resource constraints: extremely limited in terms of power, memory and bandwidth. We tailor this article to be both a survey and a tutorial. In the survey part, we investigate APM approaches for low-power wireless networks, with a particular focus on Time Synchronized Channel Hopping solutions, as they are well-suited for critical industrial applications. We survey performance metrics characterizing the network health condition and show how, to capture the health of a network universally, it is important to constantly monitor hardware-related, network-related and network-wide metrics. We present a collection of metrics that serves as a checklist for the design of an APM system, describe related work on APM concepts suitable for low-power wireless system, and provide core concepts for collecting, exporting and processing performance metrics. The tutorial part consists of a hands-on example of running commercial APM and networking solutions. We use the active APM framework from <em>Memfault</em>, which periodically creates heartbeats including the performance metrics. We run this framework on top of the SmartMesh IP protocol stack, a commercial product by Analog Devices that offers wired-like high reliability and a decade of battery lifetime, and integrate it with the <em>Zephyr</em> operating systems. This tutorial allows the readership to experiment with a complete ready-to-deploy mote-to-cloud APM chain.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 989-1018"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.04.013
Reconfigurable intelligent Surface (RIS) can effectively improve the communication quality and extend the signal coverage range by reconfiguring the wireless communication transmission environment, which is very suitable for millimeter wave (mmWave) multiple-input multiple-output (MIMO) systems. In this paper, a product manifold optimization-based beamforming design (PMO-BD) algorithm for a RIS-assisted multi-user MIMO system is proposed to enhance fairness among users. We establish a lower bound for the minimum signal-to-interference-plus-noise ratio (SINR) among users as the optimization objective, which is subjected to multiple constraints. By maximizing the lower bound to ensure the quality of service (QoS) for each user, fairness among users get improved. The PMO-BD algorithm exploits the internal structure of the product manifold to deal with the high dimension and nonlinear characteristics of the problem effectively, thereby reducing algorithm complexity and enhancing convergence rates. Simulation results verify the advantages of the proposed PMO-BD algorithm in comparison to other algorithms.
可重构智能表面(RIS)通过重新配置无线通信传输环境,能有效提高通信质量,扩大信号覆盖范围,非常适合毫米波多输入多输出(MIMO)系统。本文提出了一种基于乘积流形优化的波束成形设计(PMO-BD)算法,用于 RIS 辅助的多用户 MIMO 系统,以增强用户间的公平性。我们建立了用户间最小信号干扰加噪声比(SINR)的下限作为优化目标,该目标受到多重约束。通过最大化下限来确保每个用户的服务质量(QoS),从而改善用户间的公平性。PMO-BD 算法利用了产品流形的内部结构,有效地处理了问题的高维度和非线性特征,从而降低了算法复杂度,提高了收敛速度。仿真结果验证了所提出的 PMO-BD 算法与其他算法相比的优势。
{"title":"Product manifold optimization-based joint beamforming for RIS-aided MIMO systems: A fairness based approach","authors":"","doi":"10.1016/j.icte.2024.04.013","DOIUrl":"10.1016/j.icte.2024.04.013","url":null,"abstract":"<div><div>Reconfigurable intelligent Surface (RIS) can effectively improve the communication quality and extend the signal coverage range by reconfiguring the wireless communication transmission environment, which is very suitable for millimeter wave (mmWave) multiple-input multiple-output (MIMO) systems. In this paper, a product manifold optimization-based beamforming design (PMO-BD) algorithm for a RIS-assisted multi-user MIMO system is proposed to enhance fairness among users. We establish a lower bound for the minimum signal-to-interference-plus-noise ratio (SINR) among users as the optimization objective, which is subjected to multiple constraints. By maximizing the lower bound to ensure the quality of service (QoS) for each user, fairness among users get improved. The PMO-BD algorithm exploits the internal structure of the product manifold to deal with the high dimension and nonlinear characteristics of the problem effectively, thereby reducing algorithm complexity and enhancing convergence rates. Simulation results verify the advantages of the proposed PMO-BD algorithm in comparison to other algorithms.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1110-1116"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141052738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.08.003
Seung-Chan Lim , Girim Kwon , Jingon Joung
The communication performance can be restricted by inevitable training overhead for acquiring channel state information (CSI). A space–time code (STC)-based cooperative communication scheme is proposed to reduce the training overhead by employing a two-antenna relay node (RN) that broadcasts merely two orthogonal pilot sequences from the two antennas to a source node (SN) and a destination node (DN). The received signal-to-noise ratio, the achievable rate, and the bit error rate are mathematically analyzed, and numerical results confirm that the proposed STC-based relay system increases the achievable rate irrespective of the number of antennas at SN and DN.
获取信道状态信息(CSI)的训练开销不可避免,从而限制了通信性能。本文提出了一种基于空时码(STC)的合作通信方案,该方案采用双天线中继节点(RN),仅从两个天线向源节点(SN)和目的节点(DN)广播两个正交先导序列,从而减少了训练开销。对接收信噪比、可实现速率和误码率进行了数学分析,数值结果证实,无论 SN 和 DN 的天线数量如何,拟议的基于 STC 的中继系统都能提高可实现速率。
{"title":"Efficient training and data transmission for cooperative MIMO communications: Space–time coding approach","authors":"Seung-Chan Lim , Girim Kwon , Jingon Joung","doi":"10.1016/j.icte.2024.08.003","DOIUrl":"10.1016/j.icte.2024.08.003","url":null,"abstract":"<div><div>The communication performance can be restricted by inevitable training overhead for acquiring channel state information (CSI). A space–time code (STC)-based cooperative communication scheme is proposed to reduce the training overhead by employing a two-antenna relay node (RN) that broadcasts merely two orthogonal pilot sequences from the two antennas to a source node (SN) and a destination node (DN). The received signal-to-noise ratio, the achievable rate, and the bit error rate are mathematically analyzed, and numerical results confirm that the proposed STC-based relay system increases the achievable rate irrespective of the number of antennas at SN and DN.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1043-1050"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.09.002
Sangmi Moon , Chang-Gun Lee , Huaping Liu , Intae Hwang
Recent advances in communications technologies have paved the way for integrating communication and sensing functionalities into unmanned aerial vehicle (UAV) networks by using reconfigurable intelligent surfaces (RIS). In this paper, we propose a novel approach to maximize the sum rate of RIS-assisted UAV networks by using an integrated sensing and communications (ISAC) network in conjunction with deep reinforcement learning (DRL). The integration of UAVs with ISAC networks results in dynamic and unpredictable channel conditions, which reduces the effectiveness of traditional optimization techniques. To address this challenge, we develop a DRL-based sum-rate maximization algorithm that adaptively configures the beamforming matrix and RIS phase shifts to optimize the communication performance while achieving the signal-to-noise ratio required for sensing. Our simulation results indicate that the proposed algorithm significantly outperforms the existing methods in terms of sum rate while accommodating the dynamic nature of the ISAC-UAV network.
{"title":"Deep reinforcement learning-based sum rate maximization for RIS-assisted ISAC-UAV network","authors":"Sangmi Moon , Chang-Gun Lee , Huaping Liu , Intae Hwang","doi":"10.1016/j.icte.2024.09.002","DOIUrl":"10.1016/j.icte.2024.09.002","url":null,"abstract":"<div><div>Recent advances in communications technologies have paved the way for integrating communication and sensing functionalities into unmanned aerial vehicle (UAV) networks by using reconfigurable intelligent surfaces (RIS). In this paper, we propose a novel approach to maximize the sum rate of RIS-assisted UAV networks by using an integrated sensing and communications (ISAC) network in conjunction with deep reinforcement learning (DRL). The integration of UAVs with ISAC networks results in dynamic and unpredictable channel conditions, which reduces the effectiveness of traditional optimization techniques. To address this challenge, we develop a DRL-based sum-rate maximization algorithm that adaptively configures the beamforming matrix and RIS phase shifts to optimize the communication performance while achieving the signal-to-noise ratio required for sensing. Our simulation results indicate that the proposed algorithm significantly outperforms the existing methods in terms of sum rate while accommodating the dynamic nature of the ISAC-UAV network.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1174-1178"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-01DOI: 10.1016/j.icte.2024.06.007
Syed Amir Ali Shah , Ata Ullah , Fazli Subhan , NZ Jhanjhi , Mehedi Masud , Abdulmajeed Alqhatani
The proliferation of mobile phones has led to the rise of mobile crowdsensing systems. However, many of these systems rely on the deep cloud, which can be complex and challenging to scale. To improve the performance of crowdsensing at the edge cloud, truth-discovery methods are commonly employed. These methods typically involve updating either the truth or the weight associated with a user’s task. While some edge cloud-based crowdsensing systems exist, they do not provide incentives to users based on their experience. In this report, we present a new approach to truth discovery and incentive-giving that considers both the user’s experience and the accuracy of their submitted data. Our modified truth-discovery algorithm updates both the weight and truth concurrently, with greater incentives offered to users who have completed more tasks and whose submitted data is close to the estimated truth. We have run simulations to show how well our suggested strategy works to enhance the incentive system for experienced users.
{"title":"Truth discovery for mobile workers in edge-assisted mobile crowdsensing","authors":"Syed Amir Ali Shah , Ata Ullah , Fazli Subhan , NZ Jhanjhi , Mehedi Masud , Abdulmajeed Alqhatani","doi":"10.1016/j.icte.2024.06.007","DOIUrl":"10.1016/j.icte.2024.06.007","url":null,"abstract":"<div><div>The proliferation of mobile phones has led to the rise of mobile crowdsensing systems. However, many of these systems rely on the deep cloud, which can be complex and challenging to scale. To improve the performance of crowdsensing at the edge cloud, truth-discovery methods are commonly employed. These methods typically involve updating either the truth or the weight associated with a user’s task. While some edge cloud-based crowdsensing systems exist, they do not provide incentives to users based on their experience. In this report, we present a new approach to truth discovery and incentive-giving that considers both the user’s experience and the accuracy of their submitted data. Our modified truth-discovery algorithm updates both the weight and truth concurrently, with greater incentives offered to users who have completed more tasks and whose submitted data is close to the estimated truth. We have run simulations to show how well our suggested strategy works to enhance the incentive system for experienced users.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1087-1093"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}