Pub Date : 2026-01-01Epub Date: 2025-12-02DOI: 10.1186/s13638-025-02535-z
Pravallika Katragunta, Konstantin Mikhaylov, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis, Tuomo Hanninen
The increasing frequency and intensity of forest fires demand innovative technologies to support firefighting and mitigate their impact on ecosystems and communities. This paper explores the application of untethered and tethered uncrewed aerial vehicles (UAVs) as aerial base station (ABS) in the context of forest fire management. We propose an ABS placement algorithm to serve UAV-user equipment (UE) in forest environments. The novelty of the proposed approach is to optimize the strategic ABS placement based on throughput requirements while serving multiple drone forest monitoring areas. We analyze and compare the performances of two aerial base stations (ABSs) such as an untethered ABS (UTABS) and a tethered ABS (TABS) for forest surveillance. We evaluate UTABS and TABS performances across single and multiple UAV-UE monitoring zones in forest environments under different network throughputs, wind effects, payload configurations, monitoring zone areas, communication frequencies, operating costs, etc. Our results indicate that while a UTABS offers superior flexibility, a TABS provides a cost-effective (78.2% reduction) and reliable solution to ensure long-term continuous forest fire surveillance operations.
{"title":"Aerial BS location optimization for monitoring multiple forest areas with uplink UAV throughput requirements.","authors":"Pravallika Katragunta, Konstantin Mikhaylov, Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis, Tuomo Hanninen","doi":"10.1186/s13638-025-02535-z","DOIUrl":"https://doi.org/10.1186/s13638-025-02535-z","url":null,"abstract":"<p><p>The increasing frequency and intensity of forest fires demand innovative technologies to support firefighting and mitigate their impact on ecosystems and communities. This paper explores the application of untethered and tethered uncrewed aerial vehicles (UAVs) as aerial base station (ABS) in the context of forest fire management. We propose an ABS placement algorithm to serve UAV-user equipment (UE) in forest environments. The novelty of the proposed approach is to optimize the strategic ABS placement based on throughput requirements while serving multiple drone forest monitoring areas. We analyze and compare the performances of two aerial base stations (ABSs) such as an untethered ABS (UTABS) and a tethered ABS (TABS) for forest surveillance. We evaluate UTABS and TABS performances across single and multiple UAV-UE monitoring zones in forest environments under different network throughputs, wind effects, payload configurations, monitoring zone areas, communication frequencies, operating costs, etc. Our results indicate that while a UTABS offers superior flexibility, a TABS provides a cost-effective (78.2% reduction) and reliable solution to ensure long-term continuous forest fire surveillance operations.</p>","PeriodicalId":48641,"journal":{"name":"Eurasip Journal on Wireless Communications and Networking","volume":"2026 1","pages":"3"},"PeriodicalIF":1.9,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12775089/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145935795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-01Epub Date: 2025-02-27DOI: 10.1186/s13638-025-02428-1
Nanchi Su, Fan Liu, Christos Masouros, George C Alexandropoulos, Yifeng Xiong, Qinyu Zhang
In this paper, we present a signaling design for secure integrated sensing and communication (ISAC) systems comprising a dual-functional multi-input multi-output base station that simultaneously communicates with multiple users while detecting targets present in their vicinity, which are regarded as potential eavesdroppers. In particular, assuming that the distribution of each parameter to be estimated is known a priori, we focus on optimizing the targets' sensing performance. To this end, we derive and minimize the Bayesian Cramér-Rao bound, while ensuring certain communication quality of service by exploiting constructive interference. The latter scheme enforces that the received signals at the eavesdropping targets fall into the destructive region of the signal constellation, to deteriorate their decoding probability, thus enhancing the ISAC's system physical layer security capability. To tackle the nonconvexity of the formulated problem, a tailored successive convex approximation method is proposed for its efficient solution. Our extensive numerical results verify the effectiveness of the proposed secure ISAC design showing that the proposed algorithm outperforms block-level precoding techniques.
{"title":"Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér-Rao bound optimization.","authors":"Nanchi Su, Fan Liu, Christos Masouros, George C Alexandropoulos, Yifeng Xiong, Qinyu Zhang","doi":"10.1186/s13638-025-02428-1","DOIUrl":"https://doi.org/10.1186/s13638-025-02428-1","url":null,"abstract":"<p><p>In this paper, we present a signaling design for secure integrated sensing and communication (ISAC) systems comprising a dual-functional multi-input multi-output base station that simultaneously communicates with multiple users while detecting targets present in their vicinity, which are regarded as potential eavesdroppers. In particular, assuming that the distribution of each parameter to be estimated is known <i>a priori</i>, we focus on optimizing the targets' sensing performance. To this end, we derive and minimize the Bayesian Cramér-Rao bound, while ensuring certain communication quality of service by exploiting constructive interference. The latter scheme enforces that the received signals at the eavesdropping targets fall into the destructive region of the signal constellation, to deteriorate their decoding probability, thus enhancing the ISAC's system physical layer security capability. To tackle the nonconvexity of the formulated problem, a tailored successive convex approximation method is proposed for its efficient solution. Our extensive numerical results verify the effectiveness of the proposed secure ISAC design showing that the proposed algorithm outperforms block-level precoding techniques.</p>","PeriodicalId":48641,"journal":{"name":"Eurasip Journal on Wireless Communications and Networking","volume":"2025 1","pages":"10"},"PeriodicalIF":2.6,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11868335/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143543487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-01Epub Date: 2025-05-30DOI: 10.1186/s13638-025-02469-6
Panagiotis Giannakopoulos, Bart van Knippenberg, Kishor Chandra Joshi, Nicola Calabretta, George Exarchakos
Edge computing is an emerging approach that enables applications to run closer to users, accommodating their specific execution time requirements. Edge computing systems typically consist of heterogeneous processing and networking components, resulting in inconsistent task performance. To improve the consistency of edge computing applications, this study presents a method to identify the factors that affect variability in task execution time. We deploy a set of single-particle analysis algorithms, designed for an electron microscopy use case, running on a Kubernetes cluster monitored by Prometheus. This specific usecase was chosen because it encompasses a diverse set of time-sensitive and privacy-sensitive applications, with a wide range of resource requirements. Our experiments revealed a significant increase in the variability of round-trip time when tasks share resources. The proposed approach identifies the most relevant monitoring metrics from a larger set of collected ones (provided by Prometheus), with correlations up to 87%. This process reduces the number of metrics to 90, achieving a reduction of 80%. As a result, the overhead of the monitoring system is decreased, and the use of these metrics for further processing, such as predictive modeling and scheduling, is simplified. These selected metrics not only help to understand the causes of performance variability, but also possess predictive value, enabling more efficient scheduling. The prediction power of these metrics is shown using SHapley Additive exPlanations analysis.
{"title":"Key metrics for monitoring performance variability in edge computing applications.","authors":"Panagiotis Giannakopoulos, Bart van Knippenberg, Kishor Chandra Joshi, Nicola Calabretta, George Exarchakos","doi":"10.1186/s13638-025-02469-6","DOIUrl":"10.1186/s13638-025-02469-6","url":null,"abstract":"<p><p>Edge computing is an emerging approach that enables applications to run closer to users, accommodating their specific execution time requirements. Edge computing systems typically consist of heterogeneous processing and networking components, resulting in inconsistent task performance. To improve the consistency of edge computing applications, this study presents a method to identify the factors that affect variability in task execution time. We deploy a set of single-particle analysis algorithms, designed for an electron microscopy use case, running on a Kubernetes cluster monitored by Prometheus. This specific usecase was chosen because it encompasses a diverse set of time-sensitive and privacy-sensitive applications, with a wide range of resource requirements. Our experiments revealed a significant increase in the variability of round-trip time when tasks share resources. The proposed approach identifies the most relevant monitoring metrics from a larger set of collected ones (provided by Prometheus), with correlations up to 87%. This process reduces the number of metrics to 90, achieving a reduction of 80%. As a result, the overhead of the monitoring system is decreased, and the use of these metrics for further processing, such as predictive modeling and scheduling, is simplified. These selected metrics not only help to understand the causes of performance variability, but also possess predictive value, enabling more efficient scheduling. The prediction power of these metrics is shown using SHapley Additive exPlanations analysis.</p>","PeriodicalId":48641,"journal":{"name":"Eurasip Journal on Wireless Communications and Networking","volume":"2025 1","pages":"38"},"PeriodicalIF":2.6,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12125128/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144200574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-16DOI: 10.1186/s13638-024-02373-5
David Clerigues, J. Wubben, C. Calafate, Juan-Carlos Cano, P. Manzoni
{"title":"Enabling resilient UAV swarms through multi-hop wireless communications","authors":"David Clerigues, J. Wubben, C. Calafate, Juan-Carlos Cano, P. Manzoni","doi":"10.1186/s13638-024-02373-5","DOIUrl":"https://doi.org/10.1186/s13638-024-02373-5","url":null,"abstract":"","PeriodicalId":48641,"journal":{"name":"Eurasip Journal on Wireless Communications and Networking","volume":"16 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140967839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-24DOI: 10.1186/s13638-024-02346-8
Mohamed Rihan, Alessio Zappone, Stefano Buzzi, Dirk Wübben, A. Dekorsy
{"title":"Energy efficiency maximization for active RIS-aided integrated sensing and communication","authors":"Mohamed Rihan, Alessio Zappone, Stefano Buzzi, Dirk Wübben, A. Dekorsy","doi":"10.1186/s13638-024-02346-8","DOIUrl":"https://doi.org/10.1186/s13638-024-02346-8","url":null,"abstract":"","PeriodicalId":48641,"journal":{"name":"Eurasip Journal on Wireless Communications and Networking","volume":"25 3","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140663369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-29DOI: 10.1186/s13638-024-02340-0
Abdelmajid Bessate, Y. Miftah, H. Ben-Azza, Faissal El Bouanani
{"title":"A precise mathematical approach for analyzing the performance of MIMO space–time block code systems over Weibull fading channels","authors":"Abdelmajid Bessate, Y. Miftah, H. Ben-Azza, Faissal El Bouanani","doi":"10.1186/s13638-024-02340-0","DOIUrl":"https://doi.org/10.1186/s13638-024-02340-0","url":null,"abstract":"","PeriodicalId":48641,"journal":{"name":"Eurasip Journal on Wireless Communications and Networking","volume":"51 23","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140365688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-01Epub Date: 2022-05-26DOI: 10.1017/ipm.2022.20
Ita Condron, Suzi Lyons, Anne Marie Carew
Objectives: Globally, problem gambling prevalence is estimated at between 0.1% and 5.8%. Problem gambling can have many negative consequences; including on physical, and psychological health, and social functioning. There is a need to better understand treatment uptake as only a small proportion seek treatment. This is the first Irish national study using routinely gathered health surveillance data to describe treated problem gambling. Results will inform service policy and planning.
Methods: An analysis of episodes treated for problem gambling collected by the National Drug Treatment Reporting System was undertaken. Included were episodes entering treatment between 2008 and 2019 (n = 2999). Variables of interest included service types accessed, demographics, socioeconomic information, referral and assessment details, current problems (up to five) and treatment history.
Results: The majority (93.8%) were male. One fifth (20.9%) lived with dependent children, 7.4% were homeless. There were high levels of employment (35.4%) and formal education qualifications; half (53.8%) had completed second or third level education. Problem gambling frequently co-occurred with problem use of other substances (47.3%), which was most commonly alcohol (85.6%), followed by cannabis (32.3%), cocaine (28.0%) and benzodiazepines (10.9%). The majority were treated at inpatient settings (56.1%) with many self-referrals (46.3%).
Conclusions: This study provides insights into treated problem gambling nationally. Monitoring and surveillance can play a crucial role in measuring the successful efforts and help inform planning and treatment. The findings may have implications for treatment pathways.
{"title":"Gambling in Ireland: profile of treatment episodes from a national treatment reporting system.","authors":"Ita Condron, Suzi Lyons, Anne Marie Carew","doi":"10.1017/ipm.2022.20","DOIUrl":"10.1017/ipm.2022.20","url":null,"abstract":"<p><strong>Objectives: </strong>Globally, problem gambling prevalence is estimated at between 0.1% and 5.8%. Problem gambling can have many negative consequences; including on physical, and psychological health, and social functioning. There is a need to better understand treatment uptake as only a small proportion seek treatment. This is the first Irish national study using routinely gathered health surveillance data to describe treated problem gambling. Results will inform service policy and planning.</p><p><strong>Methods: </strong>An analysis of episodes treated for problem gambling collected by the National Drug Treatment Reporting System was undertaken. Included were episodes entering treatment between 2008 and 2019 (<i>n</i> = 2999). Variables of interest included service types accessed, demographics, socioeconomic information, referral and assessment details, current problems (up to five) and treatment history.</p><p><strong>Results: </strong>The majority (93.8%) were male. One fifth (20.9%) lived with dependent children, 7.4% were homeless. There were high levels of employment (35.4%) and formal education qualifications; half (53.8%) had completed second or third level education. Problem gambling frequently co-occurred with problem use of other substances (47.3%), which was most commonly alcohol (85.6%), followed by cannabis (32.3%), cocaine (28.0%) and benzodiazepines (10.9%). The majority were treated at inpatient settings (56.1%) with many self-referrals (46.3%).</p><p><strong>Conclusions: </strong>This study provides insights into treated problem gambling nationally. Monitoring and surveillance can play a crucial role in measuring the successful efforts and help inform planning and treatment. The findings may have implications for treatment pathways.</p>","PeriodicalId":48641,"journal":{"name":"Eurasip Journal on Wireless Communications and Networking","volume":"2008 1","pages":"94-101"},"PeriodicalIF":5.1,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86242424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of deep learning in Mandarin Chinese lip-reading recognition","authors":"Guangxin Xing, Lingkun Han, Yelong Zheng, Meirong Zhao","doi":"10.1186/s13638-023-02283-y","DOIUrl":"https://doi.org/10.1186/s13638-023-02283-y","url":null,"abstract":"","PeriodicalId":48641,"journal":{"name":"Eurasip Journal on Wireless Communications and Networking","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42422455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1186/s13638-023-02300-0
Haolin Zhang, Tao Yang, Xiaofeng Wu, Ziyu Guo, Bo Hu
{"title":"Robust beamforming design for UAV communications based on integrated sensing and communication","authors":"Haolin Zhang, Tao Yang, Xiaofeng Wu, Ziyu Guo, Bo Hu","doi":"10.1186/s13638-023-02300-0","DOIUrl":"https://doi.org/10.1186/s13638-023-02300-0","url":null,"abstract":"","PeriodicalId":48641,"journal":{"name":"Eurasip Journal on Wireless Communications and Networking","volume":" ","pages":""},"PeriodicalIF":2.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44603983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}