Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365278
Brahim Bakkas, Hassan Silkhi, Idriss Chana, H. Ben-Azza
Orthogonal Frequency Division Multiplexing (OFDM) is a widely used modulation technique, but it has a high Peak-to-Average Power Ratio (PAPR), which can cause problems for power amplifiers. To address this challenge, a new algorithm is proposed that incorporates Polar codes and μ-law companding. The algorithm is shown to significantly reduce PAPR and Bit Error Rate (BER) with Quadrature Amplitude Modulation (QAM) and two coding rates, 1/2 and 5/6. The proposed method is also flexible and adaptive, allowing for changes in modulation schemes, coding rates, and μ-law values. Further research will explore the use of an Auto Encoder (AE) network system to optimize these parameters.
{"title":"Enhancing PAPR in OFDM System Using Polar Codes and μ-Law Companding with Adaptive Modulation and Coding Rates","authors":"Brahim Bakkas, Hassan Silkhi, Idriss Chana, H. Ben-Azza","doi":"10.1109/CommNet60167.2023.10365278","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365278","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is a widely used modulation technique, but it has a high Peak-to-Average Power Ratio (PAPR), which can cause problems for power amplifiers. To address this challenge, a new algorithm is proposed that incorporates Polar codes and μ-law companding. The algorithm is shown to significantly reduce PAPR and Bit Error Rate (BER) with Quadrature Amplitude Modulation (QAM) and two coding rates, 1/2 and 5/6. The proposed method is also flexible and adaptive, allowing for changes in modulation schemes, coding rates, and μ-law values. Further research will explore the use of an Auto Encoder (AE) network system to optimize these parameters.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"68 2","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365257
M. Sabiri, Bassou Aouijil
The goal of this work is the construction of quantum codes over $mathbb{F}_{q}$ by using $alpha+beta u+gamma v+delta u v+eta u^{2}+theta v^{2}+lambda u^{2} v+$ $mu u v^{2}+nu u^{2} v^{2}$-constacyclic codes over the ring $R=mathbb{F}_{q}+mathbb{F}_{q} u+$ $mathbb{F}_{q} v+mathbb{F}_{q} u v+mathbb{F}_{q} u^{2}+mathbb{F}_{q} v^{2}+mathbb{F}_{q} u^{2} v+mathbb{F}_{q} u v^{2}+mathbb{F}_{q} u^{2} v^{2}$. We give the structure of $alpha+beta u+gamma v+delta u v+eta u^{2}+theta v^{2}+lambda u^{2} v+mu u v^{2}+nu u^{2} v^{2}$. constacyclic and obtain self-orthogonal codes. We decompose a constacyclic code over $mathbb{F}_{q}+mathbb{F}_{q} u+mathbb{F}_{q} v+mathbb{F}_{q} u v+mathbb{F}_{q} u^{2}+mathbb{F}_{q} v^{2}+$ $mathbb{F}_{q} u^{2} v+mathbb{F}_{q} u v^{2}+mathbb{F}_{q} u^{2} v^{2}$ into constacyclic codes over $mathbb{F}_{q}$. This decomposition makes it possible to give the parameters of the corresponding quantum code.
这项工作的目标是通过使用 $alpha+beta u+gamma v+delta u v+eta u^{2}+theta v^{2}+lambda u^{2} v+$ $mu u v^{2}+nu u^{2} v^{2}$- 来构建 $mathbb{F}_{q}$ 上的量子编码。环上的常环码 $R=mathbb{F}_{q}+mathbb{F}_{q} u+$ $mathbb{F}_{q} v+mathbb{F}_{q} uv+mathbb{F}_{q} u^{2}+mathbb{F}_{q} v^{2}+mathbb{F}_{q} u^{2} v+mathbb{F}_{q} u v^{2}+mathbb{F}_{q} u^{2} v^{2}$。我们给出了$alpha+beta u+gamma v+delta u v+eta u^{2}+theta v^{2}+lambda u^{2} v+mu u v^{2}+nu u^{2} v^{2}$的结构,并得到了自正交码。我们对 $mathbb{F}_{q}+mathbb{F}_{q} u+mathbb{F}_{q} v+mathbb{F}_{q} u v+mathbb{F}_{q} u^{2}+mathbb{F}_{q} 的constacyclic 编码进行分解。v^{2}+$ $mathbb{F}_{q} u^{2} v+mathbb{F}_{q} u v^{2}+mathbb{F}_{q} u^{2} v^{2}$ 转化为超过 $mathbb{F}_{q}$ 的 Constacyclic 编码。这种分解使得给出相应量子密码的参数成为可能。
{"title":"Quantum codes over Fq from α+βu+γv+δuv+ηu2+θv2+λu2v+μuv2+νu2v2- constacyclic codes","authors":"M. Sabiri, Bassou Aouijil","doi":"10.1109/CommNet60167.2023.10365257","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365257","url":null,"abstract":"The goal of this work is the construction of quantum codes over $mathbb{F}_{q}$ by using $alpha+beta u+gamma v+delta u v+eta u^{2}+theta v^{2}+lambda u^{2} v+$ $mu u v^{2}+nu u^{2} v^{2}$-constacyclic codes over the ring $R=mathbb{F}_{q}+mathbb{F}_{q} u+$ $mathbb{F}_{q} v+mathbb{F}_{q} u v+mathbb{F}_{q} u^{2}+mathbb{F}_{q} v^{2}+mathbb{F}_{q} u^{2} v+mathbb{F}_{q} u v^{2}+mathbb{F}_{q} u^{2} v^{2}$. We give the structure of $alpha+beta u+gamma v+delta u v+eta u^{2}+theta v^{2}+lambda u^{2} v+mu u v^{2}+nu u^{2} v^{2}$. constacyclic and obtain self-orthogonal codes. We decompose a constacyclic code over $mathbb{F}_{q}+mathbb{F}_{q} u+mathbb{F}_{q} v+mathbb{F}_{q} u v+mathbb{F}_{q} u^{2}+mathbb{F}_{q} v^{2}+$ $mathbb{F}_{q} u^{2} v+mathbb{F}_{q} u v^{2}+mathbb{F}_{q} u^{2} v^{2}$ into constacyclic codes over $mathbb{F}_{q}$. This decomposition makes it possible to give the parameters of the corresponding quantum code.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"38 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365309
Khalid A. Darabkh, Muna Al-Akhras
In the realm of the Internet of Things (IoT), there is a growing urgency to enhance network longevity and minimize energy consumption. This urgency is driven by the fact that energy-limited Sensor Nodes (SNs) present an impressive challenge in IoT, which not only shortens the lifetime of SNs but also consumes more energy. In view of that, this research paper presents a novel protocol titled Innovative Clustering Energy Efficient Equilibrium Optimizer-based Protocol (ICEE-EO-P). In this approach, the rectangular network area is subdivided into equally-sized hexagonal clusters, each of which selects its own Cluster Head (CH) using the EO algorithm, which takes into account three decisive metrics, including the distance of SNs from the sink, their remaining energy, and the average intra-cluster distance, to calculate the fitness function. ICEE-EO-P is a batch-based clustering protocol that ends when the energy of any of the CH dips below a certain threshold. The simulation results of ICEE-EO-P are highly encouraging, demonstrating that our proposed protocol surpasses comparable protocols with regard to enhancing network longevity and remaining energy.
在物联网(IoT)领域,提高网络寿命和减少能耗的紧迫性与日俱增。这种迫切性是由于能量有限的传感器节点(SN)给物联网带来了巨大的挑战,不仅缩短了传感器节点的寿命,而且消耗了更多的能量。有鉴于此,本研究论文提出了一种名为 "基于创新聚类能效均衡优化协议(ICEE-EO-P)"的新型协议。在这种方法中,矩形网络区域被细分为大小相等的六边形簇,每个簇使用 EO 算法选择自己的簇头(CH),该算法考虑了三个决定性指标,包括 SN 与 sink 的距离、剩余能量和簇内平均距离,以计算适配函数。ICEE-EO-P 是一种基于批处理的聚类协议,当任何一个 CH 的能量低于某个阈值时就会结束。ICEE-EO-P 的仿真结果非常令人鼓舞,表明我们提出的协议在提高网络寿命和剩余能量方面超越了同类协议。
{"title":"An Improved Routing Protocol for IoT Sensors Utilizing Clustering Techniques and Optimization Methods","authors":"Khalid A. Darabkh, Muna Al-Akhras","doi":"10.1109/CommNet60167.2023.10365309","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365309","url":null,"abstract":"In the realm of the Internet of Things (IoT), there is a growing urgency to enhance network longevity and minimize energy consumption. This urgency is driven by the fact that energy-limited Sensor Nodes (SNs) present an impressive challenge in IoT, which not only shortens the lifetime of SNs but also consumes more energy. In view of that, this research paper presents a novel protocol titled Innovative Clustering Energy Efficient Equilibrium Optimizer-based Protocol (ICEE-EO-P). In this approach, the rectangular network area is subdivided into equally-sized hexagonal clusters, each of which selects its own Cluster Head (CH) using the EO algorithm, which takes into account three decisive metrics, including the distance of SNs from the sink, their remaining energy, and the average intra-cluster distance, to calculate the fitness function. ICEE-EO-P is a batch-based clustering protocol that ends when the energy of any of the CH dips below a certain threshold. The simulation results of ICEE-EO-P are highly encouraging, demonstrating that our proposed protocol surpasses comparable protocols with regard to enhancing network longevity and remaining energy.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"289 2","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365307
Fahad Rahman, C. Titouna, Farid Naït-Abdesselam, Ahmed Serhrouchni
Blockchain Technology (BCT) relies on trust assumptions within distributed computing, involving independent nodes. Addressing scalability issues in Blockchain remains a continuous endeavor for researchers. In this research paper, authors introduced Prioritised Sharding (P-Sharding), a novel approach that enhances the scalability of Blockchain systems by prioritizing nodes based on their performance. We accomplish this through the use of advanced algorithms and real-time analytics. Our empirical findings demonstrate marked enhancements in aspects such as response times to queries, the accessibility of data, and the total throughput of the system. Moreover, our approach successfully diminishes the common bottlenecks imputed to the conventional sharding methods. This research significantly adds to the discussion regarding tactics for scalable data management, offering practical solutions for extensive, data-centric enterprises.
{"title":"Scalable Blockchain Through Prioritised Sharding","authors":"Fahad Rahman, C. Titouna, Farid Naït-Abdesselam, Ahmed Serhrouchni","doi":"10.1109/CommNet60167.2023.10365307","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365307","url":null,"abstract":"Blockchain Technology (BCT) relies on trust assumptions within distributed computing, involving independent nodes. Addressing scalability issues in Blockchain remains a continuous endeavor for researchers. In this research paper, authors introduced Prioritised Sharding (P-Sharding), a novel approach that enhances the scalability of Blockchain systems by prioritizing nodes based on their performance. We accomplish this through the use of advanced algorithms and real-time analytics. Our empirical findings demonstrate marked enhancements in aspects such as response times to queries, the accessibility of data, and the total throughput of the system. Moreover, our approach successfully diminishes the common bottlenecks imputed to the conventional sharding methods. This research significantly adds to the discussion regarding tactics for scalable data management, offering practical solutions for extensive, data-centric enterprises.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"9 4","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365295
Rayyan Al-Khatab, S. Althunibat, A. Alhasanat, Khalid A. Qaraqe
Unmanned Aerial Vehicles (UAVs) have been widely proposed as an efficient solution to maintain wireless connectivity in emergency scenarios in which ground infrastructure is partially or fully damaged. To this end, a dual-hop UAV-assisted system is addressed in this work where the source, relay and destination can be either a ground-based or a UAV, which leads to eight different system setups. A mathematical framework is followed to obtain the cumulative distribution functions (CDF) of the overall signal-to-noise ratio (SNR) in the different setups, which are utilized to characterize the outage probability in closed form expressions of the eight different system setups. Monte Carlo simulations are obtained to validate the analytical formulas, which show exact matching over the whole SNR range in all system setups considered. Moreover, the impact of other operational parameters including antenna elements, fluctuation parameters and path loss parameters on the outage rate are in detail investigated.
{"title":"Outage Analysis of Dual-hop UAV-Assisted Links Considering Orientation Fluctuations","authors":"Rayyan Al-Khatab, S. Althunibat, A. Alhasanat, Khalid A. Qaraqe","doi":"10.1109/CommNet60167.2023.10365295","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365295","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) have been widely proposed as an efficient solution to maintain wireless connectivity in emergency scenarios in which ground infrastructure is partially or fully damaged. To this end, a dual-hop UAV-assisted system is addressed in this work where the source, relay and destination can be either a ground-based or a UAV, which leads to eight different system setups. A mathematical framework is followed to obtain the cumulative distribution functions (CDF) of the overall signal-to-noise ratio (SNR) in the different setups, which are utilized to characterize the outage probability in closed form expressions of the eight different system setups. Monte Carlo simulations are obtained to validate the analytical formulas, which show exact matching over the whole SNR range in all system setups considered. Moreover, the impact of other operational parameters including antenna elements, fluctuation parameters and path loss parameters on the outage rate are in detail investigated.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"435 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365262
Gerhard Wunder, Axel Flinth, Daniel Becker, Benedikt Groß
Secret key generation between authenticated devices is a pivotal task for secure communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In this paper, we shall invent and analyze a new security primitive that is specifically designed for WPAN. For WPAN, wireless channel-based secret key generation has been proposed but was not widely deployed due to its critical dependence on the channel’s entropy which is uncontrollable. We formulate a different approach: We still exploit channel properties but mainly hinge on the reciprocity of the wireless channel and not on the channel’s entropy. The radio advantage comes from the use of full duplex communication. We show that in this situation both legitimate parties can agree on a common secret key even without ever probing the channel. At the core is a new bisparse blind deconvolution scheme for which we prove correctness and information-theoretic, i.e. perfect, security. We show that, ultimately, a secret key can be extracted and give a lower bound for the number of secret key bits which is then verified by experiments. We also notice a remote correspondence of the scheme to DH key exchange.
{"title":"Mimicking DH Key Exchange Over a Full Duplex Wireless Channel via Bisparse Blind Deconvolution","authors":"Gerhard Wunder, Axel Flinth, Daniel Becker, Benedikt Groß","doi":"10.1109/CommNet60167.2023.10365262","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365262","url":null,"abstract":"Secret key generation between authenticated devices is a pivotal task for secure communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In this paper, we shall invent and analyze a new security primitive that is specifically designed for WPAN. For WPAN, wireless channel-based secret key generation has been proposed but was not widely deployed due to its critical dependence on the channel’s entropy which is uncontrollable. We formulate a different approach: We still exploit channel properties but mainly hinge on the reciprocity of the wireless channel and not on the channel’s entropy. The radio advantage comes from the use of full duplex communication. We show that in this situation both legitimate parties can agree on a common secret key even without ever probing the channel. At the core is a new bisparse blind deconvolution scheme for which we prove correctness and information-theoretic, i.e. perfect, security. We show that, ultimately, a secret key can be extracted and give a lower bound for the number of secret key bits which is then verified by experiments. We also notice a remote correspondence of the scheme to DH key exchange.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"34 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365283
Brian McCarthy, Aisling O'Driscoll
A key topic of interest in all vehicular networking technologies is their ability to deal with dense radio environments as widespread deployment becomes a reality. This requires congestion control mechanisms to maintain adequate communication performance. The current Cellular Vehicle-to-Everything (C-V2X) and its successor New Radio V2X (NR-V2X) standardised congestion control approach is table-based, utilising packet dropping. As shown in past works by the authors of this paper, these approaches exhibit congestion instability and require extensive configuration. To overcome this, algorithmic approaches were standardised, namely ETSI’s DCC Adaptive. Although this can be effective for wireless vehicular communications, it cannot be applied directly to NR-V2X/C-V2X due to incompatibility with the underlying radio scheduling approach, Sensing-Based Semi-Persistent Scheduling (SB-SPS). In previous work, the authors of this paper investigated in detail why this is the case and proposed an algorithmic approach that was compatible with the SB-SPS scheduler, namely RRIAdaptive. This paper provides an in-depth evaluation of RRIAdaptive. Importantly, its efficacy is evaluated not simply from the perspective of maintaining a desired channel load, but also from the perspective of maintaining effective application quality of service. This paper also describes the first study of fairness and stability in the context of C-V2X/NR-V2X congestion control. These are of increased importance, given dynamic channel conditions in vehicular scenarios, and reduced awareness due to degraded quality of service or vehicles starved of radio resources, may increase the likelihood of collisions.
{"title":"RRI Adaptive: A Standards Compliant Approach for Equitable and Stable Congestion Control in C-V2X Networks","authors":"Brian McCarthy, Aisling O'Driscoll","doi":"10.1109/CommNet60167.2023.10365283","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365283","url":null,"abstract":"A key topic of interest in all vehicular networking technologies is their ability to deal with dense radio environments as widespread deployment becomes a reality. This requires congestion control mechanisms to maintain adequate communication performance. The current Cellular Vehicle-to-Everything (C-V2X) and its successor New Radio V2X (NR-V2X) standardised congestion control approach is table-based, utilising packet dropping. As shown in past works by the authors of this paper, these approaches exhibit congestion instability and require extensive configuration. To overcome this, algorithmic approaches were standardised, namely ETSI’s DCC Adaptive. Although this can be effective for wireless vehicular communications, it cannot be applied directly to NR-V2X/C-V2X due to incompatibility with the underlying radio scheduling approach, Sensing-Based Semi-Persistent Scheduling (SB-SPS). In previous work, the authors of this paper investigated in detail why this is the case and proposed an algorithmic approach that was compatible with the SB-SPS scheduler, namely RRIAdaptive. This paper provides an in-depth evaluation of RRIAdaptive. Importantly, its efficacy is evaluated not simply from the perspective of maintaining a desired channel load, but also from the perspective of maintaining effective application quality of service. This paper also describes the first study of fairness and stability in the context of C-V2X/NR-V2X congestion control. These are of increased importance, given dynamic channel conditions in vehicular scenarios, and reduced awareness due to degraded quality of service or vehicles starved of radio resources, may increase the likelihood of collisions.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"238 3","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139184004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365269
Konstantinos Tsachrelias, Chrysostomos-Athanasios Katsigiannis, V. Kokkinos, A. Gkamas, Christos Bouras, P. Pouyioutas
The deployment of 5G networks has led to a significant increase in demand for high-speed data rates and improved overall network performance. HetNets are a promising solution for providing coverage and capacity enhancements for 5G networks. However, one of the key challenges in HetNets is the optimization of bandwidth allocation. Traditional resource allocation techniques are limited in their ability to provide efficient and effective solutions for 5G networks. To address this challenge, a novel technology called DUDe (Downlink/Uplink Decoupling) has been proposed. DUDe optimizes bandwidth allocation in HetNets by dynamically adjusting the allocation of network resources to user demand and network conditions. The motivation of this paper is to highlight the importance of DUDe technology in macro cell offloading in 5G HetNets. The paper evaluates the performance of DUDe in comparison to traditional resource allocation techniques and provides insights into the key factors that influence its effectiveness. Moreover, this paper presents a detailed analysis of simulations results and provides recommendations for future research. The findings of this study will be useful for network operators and researchers in developing more efficient and effective resource allocation strategies for 5G networks.
{"title":"Bandwidth Optimization Techniques in Heterogeneous 5G Networks Using DUDe","authors":"Konstantinos Tsachrelias, Chrysostomos-Athanasios Katsigiannis, V. Kokkinos, A. Gkamas, Christos Bouras, P. Pouyioutas","doi":"10.1109/CommNet60167.2023.10365269","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365269","url":null,"abstract":"The deployment of 5G networks has led to a significant increase in demand for high-speed data rates and improved overall network performance. HetNets are a promising solution for providing coverage and capacity enhancements for 5G networks. However, one of the key challenges in HetNets is the optimization of bandwidth allocation. Traditional resource allocation techniques are limited in their ability to provide efficient and effective solutions for 5G networks. To address this challenge, a novel technology called DUDe (Downlink/Uplink Decoupling) has been proposed. DUDe optimizes bandwidth allocation in HetNets by dynamically adjusting the allocation of network resources to user demand and network conditions. The motivation of this paper is to highlight the importance of DUDe technology in macro cell offloading in 5G HetNets. The paper evaluates the performance of DUDe in comparison to traditional resource allocation techniques and provides insights into the key factors that influence its effectiveness. Moreover, this paper presents a detailed analysis of simulations results and provides recommendations for future research. The findings of this study will be useful for network operators and researchers in developing more efficient and effective resource allocation strategies for 5G networks.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"192 3","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139184100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365271
Nihal Remzan, Karim Tahiry, A. Farchi
The classification of brain Tumors relies to a large extent on the knowledge and skills of experts. The introduction of a Tumor Classification System is essential to help radiologists and physicians identify tumors. It is essential to improve the accuracy of the systems in order to guarantee possible therapeutic approaches. In this study, we provide a portable system for classifying Magnetic Resonance (MR) brain images into normal and tumor categories using a Raspberry Pi 4 Model B. We employ a stacking ensemble to construct an ensemble classifier, with logistic regression acting as the meta-learner. Our approach utilizes a pre-trained Convolutional Neural Network (CNN) model on RadImageNet, specifically Inception-V3, as the feature extractor, while SVM, k-NN, and RF serve as base learners. The dataset used in this study comprises 3000 Tl-weighted MR brain images. Our method improves accuracy while addressing resource constraints. The practical implementation of the Raspberry Pi 4 Model B emphasizes real-world applicability. With a 98.5% accuracy, this approach contributes to brain tumor detection, assisting in correct diagnosis and viable therapy solutions.
脑肿瘤的分类在很大程度上依赖于专家的知识和技能。引入肿瘤分类系统对于帮助放射科医生和内科医生识别肿瘤至关重要。必须提高系统的准确性,以保证可能的治疗方法。在本研究中,我们使用 Raspberry Pi 4 Model B 提供了一个便携式系统,用于将磁共振(MR)脑图像分为正常和肿瘤两类。我们的方法利用 RadImageNet(特别是 Inception-V3)上预先训练好的卷积神经网络(CNN)模型作为特征提取器,而 SVM、k-NN 和 RF 则作为基础学习器。本研究使用的数据集包括 3000 张 Tl 加权 MR 脑图像。我们的方法提高了准确性,同时解决了资源限制问题。Raspberry Pi 4 Model B 的实际应用强调了现实世界的适用性。这种方法的准确率高达 98.5%,有助于脑肿瘤的检测、正确诊断和可行的治疗方案。
{"title":"Efficient Brain Tumor Classification on Resource-Constrained Devices Using Stacking Ensemble and RadImageNet Pretrained Models","authors":"Nihal Remzan, Karim Tahiry, A. Farchi","doi":"10.1109/CommNet60167.2023.10365271","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365271","url":null,"abstract":"The classification of brain Tumors relies to a large extent on the knowledge and skills of experts. The introduction of a Tumor Classification System is essential to help radiologists and physicians identify tumors. It is essential to improve the accuracy of the systems in order to guarantee possible therapeutic approaches. In this study, we provide a portable system for classifying Magnetic Resonance (MR) brain images into normal and tumor categories using a Raspberry Pi 4 Model B. We employ a stacking ensemble to construct an ensemble classifier, with logistic regression acting as the meta-learner. Our approach utilizes a pre-trained Convolutional Neural Network (CNN) model on RadImageNet, specifically Inception-V3, as the feature extractor, while SVM, k-NN, and RF serve as base learners. The dataset used in this study comprises 3000 Tl-weighted MR brain images. Our method improves accuracy while addressing resource constraints. The practical implementation of the Raspberry Pi 4 Model B emphasizes real-world applicability. With a 98.5% accuracy, this approach contributes to brain tumor detection, assisting in correct diagnosis and viable therapy solutions.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"20 4","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365264
Elmehdi Illi, Marwa Qaraqe
In this paper, we analyze the outage probability (OP)performance of a wireless communication network assisted by an intelligent, reflective surface (IRS) in the presence of residual hardware impairments (RHI). The setup consists of a transmitter aiming to communicate with a receiver, whereas an IRS array aims at maximizing the system’s reliability by boosting the received signal-to-noise ratio (SNR) at the legitimate receiver’s side to decrease the system’s OP. The receiver’s hardware has imperfections that make a portion of the received signal, impaired by the wireless channel, contribute to the receiver noise. In addition to this, we consider that the IRS induces phase quantization errors due to the finite bit resolution. A closed-form formula for the system’s OP is provided in terms of the main system parameters. Numerical results indicate the sensitivity of RIS-aided schemes to the level of RHI at the receiver, while the OP is not enhanced significantly when we exceed 3 bits of phase shift resolution.
{"title":"Performance Assessment of Intelligent Reflective Surfaces-aided Network with Residual Hardware Impairments","authors":"Elmehdi Illi, Marwa Qaraqe","doi":"10.1109/CommNet60167.2023.10365264","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365264","url":null,"abstract":"In this paper, we analyze the outage probability (OP)performance of a wireless communication network assisted by an intelligent, reflective surface (IRS) in the presence of residual hardware impairments (RHI). The setup consists of a transmitter aiming to communicate with a receiver, whereas an IRS array aims at maximizing the system’s reliability by boosting the received signal-to-noise ratio (SNR) at the legitimate receiver’s side to decrease the system’s OP. The receiver’s hardware has imperfections that make a portion of the received signal, impaired by the wireless channel, contribute to the receiver noise. In addition to this, we consider that the IRS induces phase quantization errors due to the finite bit resolution. A closed-form formula for the system’s OP is provided in terms of the main system parameters. Numerical results indicate the sensitivity of RIS-aided schemes to the level of RHI at the receiver, while the OP is not enhanced significantly when we exceed 3 bits of phase shift resolution.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"197 3","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}