首页 > 最新文献

2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)最新文献

英文 中文
Workload Allocation in Fog Environment Using Multi-Objective Evolutionary Algorithms for Internet of Things 利用多目标进化算法在雾环境中为物联网分配工作负载
Hafsa Raissouli, Ahmad Alauddin Bin Ariffin, S. Belhaouari
The continuous rise in the number of IoT devices has led to an increasing importance of the fog computing paradigm. Part of the workload that should be processed is executed locally on the IoT device and the rest is offloaded and allocated to the fog nodes. This workload allocation decision should be done in a way that provides the lowest delay but while taking into account the energy consumption as well. This study presents an optimization of the workload allocation that minimizes delay and power consumption using the multi-objective evolutionary algorithms, namely, NSGA II, R-NSGA II, NSGA III, R-NSGA III and CTAEA. The experiments involve two scenarios, full transmission power of the IoT device, and half of its transmission power with varying workload sizes. The results manifested the superior performance of NSGA III and CTAEA in optimizing the allocation of tasks in fog computing environments. By demonstrating NSGA III and CTAEA’s effectiveness, this findings not only advance the understanding of evolutionary algorithms but also provide practical insights for optimizing fog computing systems. This research has broader implications for improving the efficiency and performance of fog computing applications, with potential applications across various scenarios in the field.
随着物联网设备数量的不断增加,雾计算模式的重要性日益凸显。需要处理的部分工作负载在物联网设备上本地执行,其余部分被卸载并分配给雾节点。这种工作负载分配决策应在提供最低延迟的同时兼顾能耗。本研究采用多目标进化算法(即 NSGA II、R-NSGA II、NSGA III、R-NSGA III 和 CTAEA)对工作负载分配进行了优化,使延迟和能耗最小化。实验涉及两种情况,一种是物联网设备的全部传输功率,另一种是其传输功率的一半,且工作负载大小各不相同。结果表明,NSGA III 和 CTAEA 在优化雾计算环境中的任务分配方面表现出色。通过证明 NSGA III 和 CTAEA 的有效性,该研究成果不仅加深了人们对进化算法的理解,还为优化雾计算系统提供了实用见解。这项研究对提高雾计算应用的效率和性能具有更广泛的意义,在该领域的各种场景中都有潜在应用。
{"title":"Workload Allocation in Fog Environment Using Multi-Objective Evolutionary Algorithms for Internet of Things","authors":"Hafsa Raissouli, Ahmad Alauddin Bin Ariffin, S. Belhaouari","doi":"10.1109/CommNet60167.2023.10365185","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365185","url":null,"abstract":"The continuous rise in the number of IoT devices has led to an increasing importance of the fog computing paradigm. Part of the workload that should be processed is executed locally on the IoT device and the rest is offloaded and allocated to the fog nodes. This workload allocation decision should be done in a way that provides the lowest delay but while taking into account the energy consumption as well. This study presents an optimization of the workload allocation that minimizes delay and power consumption using the multi-objective evolutionary algorithms, namely, NSGA II, R-NSGA II, NSGA III, R-NSGA III and CTAEA. The experiments involve two scenarios, full transmission power of the IoT device, and half of its transmission power with varying workload sizes. The results manifested the superior performance of NSGA III and CTAEA in optimizing the allocation of tasks in fog computing environments. By demonstrating NSGA III and CTAEA’s effectiveness, this findings not only advance the understanding of evolutionary algorithms but also provide practical insights for optimizing fog computing systems. This research has broader implications for improving the efficiency and performance of fog computing applications, with potential applications across various scenarios in the field.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"75 3","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigating the Complexities of the Cloud-Native World: A Study of Developer Perspectives 驾驭云原生世界的复杂性:开发人员视角研究
Ayush Bhardwaj
The cloud-native ecosystem has witnessed remarkable growth in recent years, resulting in a multitude of new frameworks tailored to address the changing needs of developers and operators. This expansion has brought forth a myriad of challenges, including complexity, security, adoption barriers, and developer experience. Gaining insight into developer perspectives is crucial for unlocking the full potential of cloud-native technologies and optimizing the various components of a cloud-native deployment. In this paper, we present the first comprehensive analysis of the challenges and opportunities within the cloud-native deployments, drawing from multiple surveys involving over 1000 participants. We have devised vital research questions to guide our analysis, addressing developers’ concerns regarding containerization, preferred workloads for autoscaling scenarios, workload isolation methods, challenges faced when integrating observability tools, and preferences, use cases, and obstacles encountered when adopting WebAssembly (WASM) in the cloud-native ecosystem. Our findings strive to bridge the knowledge gap between the research community and the industry, fostering future research directions in the dynamic and constantly evolving cloud-native domain.
近年来,云原生生态系统取得了长足的发展,涌现出了大量为满足开发人员和运营商不断变化的需求而量身定制的新框架。这种扩张带来了无数挑战,包括复杂性、安全性、采用障碍和开发人员体验。深入了解开发人员的观点对于释放云原生技术的全部潜力和优化云原生部署的各个组成部分至关重要。在本文中,我们首次对云原生部署所面临的挑战和机遇进行了全面分析,调查涉及 1000 多名参与者。我们设计了重要的研究问题来指导我们的分析,这些问题涉及开发人员对容器化的关注、自动扩展场景中的首选工作负载、工作负载隔离方法、集成可观察性工具时面临的挑战,以及在云原生生态系统中采用 WebAssembly (WASM) 时的偏好、用例和遇到的障碍。我们的研究成果致力于弥合研究界与业界之间的知识鸿沟,在动态和不断发展的云原生领域促进未来的研究方向。
{"title":"Navigating the Complexities of the Cloud-Native World: A Study of Developer Perspectives","authors":"Ayush Bhardwaj","doi":"10.1109/CommNet60167.2023.10365297","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365297","url":null,"abstract":"The cloud-native ecosystem has witnessed remarkable growth in recent years, resulting in a multitude of new frameworks tailored to address the changing needs of developers and operators. This expansion has brought forth a myriad of challenges, including complexity, security, adoption barriers, and developer experience. Gaining insight into developer perspectives is crucial for unlocking the full potential of cloud-native technologies and optimizing the various components of a cloud-native deployment. In this paper, we present the first comprehensive analysis of the challenges and opportunities within the cloud-native deployments, drawing from multiple surveys involving over 1000 participants. We have devised vital research questions to guide our analysis, addressing developers’ concerns regarding containerization, preferred workloads for autoscaling scenarios, workload isolation methods, challenges faced when integrating observability tools, and preferences, use cases, and obstacles encountered when adopting WebAssembly (WASM) in the cloud-native ecosystem. Our findings strive to bridge the knowledge gap between the research community and the industry, fostering future research directions in the dynamic and constantly evolving cloud-native domain.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"28 3","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Forensic Analysis Using a Machine Learning-based Approach 使用基于机器学习的方法加强法证分析
Samira Benkerroum, Khalid Chougdali
In recent years, computers or digital devices contribute to the global spread of cyber threats and cyber crimes. These cyberattacks leave some artefacts on the storage of the target device, for this reason they require special treatment, and which will have to be the subject of various investigations in order to study its behavior and analyze and prevent it so that this never happen again.Despite the continued development of digital forensic investigations for the recovery of evidence whether volatile or non-volatile, manual investigations are both time-intensive and laborious. The proposed solution is to use a method to automate manual forensic investigation tasks (forensic analysis) to reduce human effort and improve time efficiency.This paper presents a summary of the digital forensic investigation process, we discuss existing ML solutions to automate the analysis process.Finally, the paper proposes an approach based on machine learning where the binary classification was performed using the algorithms K-Nearest Neighbors, Naive Bayes, Random Forest, Support Vector Machine, Decision Tree, Logistic Regression, Gradient Boosted Tree, Multi-Layer Perceptron, using CIC-MalMem-2022 dataset to identify malware.The algorithms’ respective performances were contrasted. The performance metrics Precision, F1-score, Accuracy, Recall, and Area Under the Curve were used to assess the outcomes. Consequently, the Random Forest and Gradient Boosted Tree algorithms demonstrated superior performance, achieving a remarkable accuracy level of 99.98% in the detection of malware through memory scans. The Logistic Regression algorithm exhibited the least favorable performance in analyzing malware using memory data, achieving an accuracy rate of 95.75%. According to the results obtained, many algorithms used have obtained very satisfactory results.
近年来,计算机或数字设备助长了网络威胁和网络犯罪在全球的蔓延。这些网络攻击会在目标设备的存储设备上留下一些人工痕迹,因此需要对其进行特殊处理,并对其进行各种调查,以研究其行为,分析并预防其发生,从而避免此类事件再次发生。尽管数字取证调查在恢复易失性或非易失性证据方面不断发展,但人工调查既费时又费力。本文概述了数字取证调查过程,讨论了现有的 ML 解决方案,以实现分析过程的自动化。最后,本文提出了一种基于机器学习的方法,即使用 K-Nearest Neighbors、Naive Bayes、Random Forest、Support Vector Machine、Decision Tree、Logistic Regression、Gradient Boosted Tree、Multi-Layer Perceptron 等算法进行二元分类,使用 CIC-MalMem-2022 数据集来识别恶意软件。使用精度、F1 分数、准确率、召回率和曲线下面积等性能指标来评估结果。结果显示,随机森林算法和梯度提升树算法表现优异,在通过内存扫描检测恶意软件方面达到了 99.98% 的出色准确率水平。逻辑回归算法在利用内存数据分析恶意软件方面表现最差,准确率仅为 95.75%。从获得的结果来看,所使用的许多算法都取得了非常令人满意的结果。
{"title":"Enhancing Forensic Analysis Using a Machine Learning-based Approach","authors":"Samira Benkerroum, Khalid Chougdali","doi":"10.1109/CommNet60167.2023.10365260","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365260","url":null,"abstract":"In recent years, computers or digital devices contribute to the global spread of cyber threats and cyber crimes. These cyberattacks leave some artefacts on the storage of the target device, for this reason they require special treatment, and which will have to be the subject of various investigations in order to study its behavior and analyze and prevent it so that this never happen again.Despite the continued development of digital forensic investigations for the recovery of evidence whether volatile or non-volatile, manual investigations are both time-intensive and laborious. The proposed solution is to use a method to automate manual forensic investigation tasks (forensic analysis) to reduce human effort and improve time efficiency.This paper presents a summary of the digital forensic investigation process, we discuss existing ML solutions to automate the analysis process.Finally, the paper proposes an approach based on machine learning where the binary classification was performed using the algorithms K-Nearest Neighbors, Naive Bayes, Random Forest, Support Vector Machine, Decision Tree, Logistic Regression, Gradient Boosted Tree, Multi-Layer Perceptron, using CIC-MalMem-2022 dataset to identify malware.The algorithms’ respective performances were contrasted. The performance metrics Precision, F1-score, Accuracy, Recall, and Area Under the Curve were used to assess the outcomes. Consequently, the Random Forest and Gradient Boosted Tree algorithms demonstrated superior performance, achieving a remarkable accuracy level of 99.98% in the detection of malware through memory scans. The Logistic Regression algorithm exhibited the least favorable performance in analyzing malware using memory data, achieving an accuracy rate of 95.75%. According to the results obtained, many algorithms used have obtained very satisfactory results.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"19 4","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139184003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pre-Trained Models for Intent Classification in Chatbot: Comparative Study and Critical Analysis 用于聊天机器人意图分类的预训练模型:比较研究与批判性分析
Adnane Souha, Charaf Ouaddi, Lamya Benaddi, Abdeslam Jakimi
The emergence of pre-trained models based on deep learning has considerably enhanced the development of many applications, such as chatbots. These models can be refined for specific tasks to improve chatbot accuracy. The core of the chatbot is its ability to understand the user’s intent through its Natural Language Understanding (NLU) component. Within NLU, intent classification is a central task. Recently, transformer models have revolutionized the resolution of this task by capturing the semantic relations between words in a sentence. This article presents a comparative study and critical analysis of four transformer models, which are Bert, Albert, Roberta, and Gpt2, to identify which offers the best accuracy for an existing dataset for the intent classification task.
基于深度学习的预训练模型的出现大大促进了聊天机器人等许多应用的开发。这些模型可以针对特定任务进行改进,以提高聊天机器人的准确性。聊天机器人的核心是通过自然语言理解(NLU)组件理解用户意图的能力。在 NLU 中,意图分类是一项核心任务。最近,转换器模型通过捕捉句子中单词之间的语义关系,彻底改变了这一任务的解决方法。本文对 Bert、Albert、Roberta 和 Gpt2 四种转换器模型进行了比较研究和批判性分析,以确定哪种模型在现有数据集的意图分类任务中精度最高。
{"title":"Pre-Trained Models for Intent Classification in Chatbot: Comparative Study and Critical Analysis","authors":"Adnane Souha, Charaf Ouaddi, Lamya Benaddi, Abdeslam Jakimi","doi":"10.1109/CommNet60167.2023.10365312","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365312","url":null,"abstract":"The emergence of pre-trained models based on deep learning has considerably enhanced the development of many applications, such as chatbots. These models can be refined for specific tasks to improve chatbot accuracy. The core of the chatbot is its ability to understand the user’s intent through its Natural Language Understanding (NLU) component. Within NLU, intent classification is a central task. Recently, transformer models have revolutionized the resolution of this task by capturing the semantic relations between words in a sentence. This article presents a comparative study and critical analysis of four transformer models, which are Bert, Albert, Roberta, and Gpt2, to identify which offers the best accuracy for an existing dataset for the intent classification task.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"156 2","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139184128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Evaluation of High-Definition Voice Calls over IMS throughout handover procedures 在整个移交程序中对 IMS 上的高清语音呼叫进行评估
Renata K. Gomes Dos Reis, J. A. Arnez, Caio B. Bezerra De Souza, M. Damasceno, Wederson Medeiros Silva
In mobile networks, handover refers to the process of transferring communications, data and radio resources of the mobile user while maintaining the Quality of Service (QoS) of High-Definition (HD) voice calls. Often, this process occurs from a serving cell to a neighbor cell based on the received signal power reported by the User Equipment (UE) to the Base Station (BS). The main contribution of this work is a guideline to evaluate an intra-LTE handover procedure and QoS metrics during a Voice Call over LTE (VoLTE) considering the X2 communication interface and handover decision algorithm based on Reference Signal Received Power (RSRP) values provided by a real-time experimental setup. Furthermore, packet analyzer software was used to collect the packets in real-time execution. In addition, the UE was set to record events that help us to track all the system activity with the mobile core network and monitor the performance. Therefore, received power levels were collected along the voice call, allowing a deep analysis of the QoS and signal level metrics. The results show how the handover procedure impact into QoS, generating an interruption gap during the signal measurements by the UE. In contrast, the results about QoS and signal level metrics satisfy the requirements during the VoLTE call.
在移动网络中,切换是指在保持高清语音通话的服务质量(QoS)的同时,转移移动用户的通信、数据和无线电资源的过程。通常情况下,这一过程是根据用户设备(UE)向基站(BS)报告的接收信号功率,从服务小区向邻近小区转移。这项工作的主要贡献是基于实时实验装置提供的参考信号接收功率(RSRP)值,在考虑到 X2 通信接口和切换决策算法的 LTE 语音呼叫(VoLTE)期间,为评估 LTE 内部切换程序和 QoS 指标提供了指导。此外,还使用数据包分析仪软件实时收集数据包。此外,UE 被设置为记录事件,以帮助我们跟踪与移动核心网络的所有系统活动并监控性能。因此,我们收集了语音呼叫过程中的接收功率电平,以便对 QoS 和信号电平指标进行深入分析。结果显示了切换过程对 QoS 的影响,在 UE 信号测量期间产生了中断间隙。相比之下,有关 QoS 和信号电平指标的结果满足 VoLTE 呼叫期间的要求。
{"title":"An Evaluation of High-Definition Voice Calls over IMS throughout handover procedures","authors":"Renata K. Gomes Dos Reis, J. A. Arnez, Caio B. Bezerra De Souza, M. Damasceno, Wederson Medeiros Silva","doi":"10.1109/CommNet60167.2023.10365261","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365261","url":null,"abstract":"In mobile networks, handover refers to the process of transferring communications, data and radio resources of the mobile user while maintaining the Quality of Service (QoS) of High-Definition (HD) voice calls. Often, this process occurs from a serving cell to a neighbor cell based on the received signal power reported by the User Equipment (UE) to the Base Station (BS). The main contribution of this work is a guideline to evaluate an intra-LTE handover procedure and QoS metrics during a Voice Call over LTE (VoLTE) considering the X2 communication interface and handover decision algorithm based on Reference Signal Received Power (RSRP) values provided by a real-time experimental setup. Furthermore, packet analyzer software was used to collect the packets in real-time execution. In addition, the UE was set to record events that help us to track all the system activity with the mobile core network and monitor the performance. Therefore, received power levels were collected along the voice call, allowing a deep analysis of the QoS and signal level metrics. The results show how the handover procedure impact into QoS, generating an interruption gap during the signal measurements by the UE. In contrast, the results about QoS and signal level metrics satisfy the requirements during the VoLTE call.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"8 3","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139184255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Vehicle to Infrastructure Network 车辆到基础设施网络的性能分析
Opel N. Mbanzabugabo, Charles Kabiri, Kayalvizhi Jayavel, L. Sibomana
For improving traffic safety and the driving experience, vehicle-to-infrastructure (V2I) networks require ultra-reliable and low-latency connectivity. However, because of the increased mobility of vehicles, the channel is continuously varying, making it difficult to maintain low latency and high connectivity in V2I networks. Additionally, as the number of vehicles increases, sufficient resources is needed to maintain continuous internet access via a Base Station (BS). By introducing a three-tiered prioritization mechanism, this study aims at improving resource constraints in V2I networks. The highest priority (priority 1) is assigned to emergency communications, which include critical communications such as ambulance notifications, accident reports, and alerts regarding very important people. Priority 2 is assigned to data, such as road conditions and traffic information. Data concerning entertainment, such as media and ordinary communications, come into the category of low priority (priority 3). By employing this prioritization strategy, efficient resource allocation is ensured, taking into consideration different levels of urgency within services. An Analytical Priority Resources Allocation Framework (APRAF) based on M/G/1 queuing method, is developed with an objective of enhancing connectivity in the uplink of vehicles to infrastructure networks. The proposed method is evaluated using an M/G/1 queuing method where delays on queue and system are considered as main performance metrics. Using numerical analysis, the lowest latency is obtained gradually from the highest to the lowest class. As a result, the latency (waiting delay on queue and on system) for vehicles on priority 1 is very low, and in this way the connectivity is improved comparatively to existing system without priority. The waiting delay in the system for vehicles in high priority is around 66 ms while in First Come First Served model without priority, the waiting delay is infinite. The reliability is also improved for vehicles with high priority.
为改善交通安全和驾驶体验,车辆到基础设施(V2I)网络需要超可靠和低延迟的连接。然而,由于车辆的流动性增加,信道不断变化,使得 V2I 网络难以保持低延迟和高连接性。此外,随着车辆数量的增加,需要足够的资源才能通过基站(BS)维持连续的互联网访问。通过引入三级优先机制,本研究旨在改善 V2I 网络中的资源限制。最高优先级(优先级 1)分配给紧急通信,其中包括救护车通知、事故报告和重要人物警报等关键通信。第 2 优先级分配给数据,如路况和交通信息。媒体和普通通信等娱乐数据属于低优先级(优先级 3)。通过采用这种优先级策略,可以确保有效的资源分配,同时考虑到服务的不同紧急程度。基于 M/G/1 队列方法,开发了一个分析性优先资源分配框架(APRAF),目的是加强车辆与基础设施网络的上行链路连接。使用 M/G/1 队列方法对所提出的方法进行了评估,队列和系统的延迟被视为主要的性能指标。通过数值分析,从最高级到最低级逐步获得最低延迟。因此,优先级为 1 的车辆的延迟(队列和系统上的等待延迟)非常低,与现有的无优先级系统相比,连接性得到了改善。高优先级车辆在系统中的等待时延约为 66 毫秒,而在没有优先级的先到先服务模式中,等待时延是无限的。高优先级车辆的可靠性也得到了提高。
{"title":"Performance Analysis of Vehicle to Infrastructure Network","authors":"Opel N. Mbanzabugabo, Charles Kabiri, Kayalvizhi Jayavel, L. Sibomana","doi":"10.1109/CommNet60167.2023.10365288","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365288","url":null,"abstract":"For improving traffic safety and the driving experience, vehicle-to-infrastructure (V2I) networks require ultra-reliable and low-latency connectivity. However, because of the increased mobility of vehicles, the channel is continuously varying, making it difficult to maintain low latency and high connectivity in V2I networks. Additionally, as the number of vehicles increases, sufficient resources is needed to maintain continuous internet access via a Base Station (BS). By introducing a three-tiered prioritization mechanism, this study aims at improving resource constraints in V2I networks. The highest priority (priority 1) is assigned to emergency communications, which include critical communications such as ambulance notifications, accident reports, and alerts regarding very important people. Priority 2 is assigned to data, such as road conditions and traffic information. Data concerning entertainment, such as media and ordinary communications, come into the category of low priority (priority 3). By employing this prioritization strategy, efficient resource allocation is ensured, taking into consideration different levels of urgency within services. An Analytical Priority Resources Allocation Framework (APRAF) based on M/G/1 queuing method, is developed with an objective of enhancing connectivity in the uplink of vehicles to infrastructure networks. The proposed method is evaluated using an M/G/1 queuing method where delays on queue and system are considered as main performance metrics. Using numerical analysis, the lowest latency is obtained gradually from the highest to the lowest class. As a result, the latency (waiting delay on queue and on system) for vehicles on priority 1 is very low, and in this way the connectivity is improved comparatively to existing system without priority. The waiting delay in the system for vehicles in high priority is around 66 ms while in First Come First Served model without priority, the waiting delay is infinite. The reliability is also improved for vehicles with high priority.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"159 5","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Signal Transmission Performance based on Multitap Equalization in Optical FBMC Burst 基于光 FBMC Burst 中多瓣均衡的增强型信号传输性能
Mohammed S. Bahaaelden, Beatriz Ortega, Rafael Perez-Jimenez, V. Almenar
Due to the impact of predominant inherent imaginary interference (IMI), for the first time in visible light communication (VLC) systems, 3-taps equalizer with flip-filter bank multicarrier (Flip-FBMC) burst is proposed to overcome the degradation performance along with 1-tap equalizer estimation. Over high delays channel profile, the proposed system offers 0.7 dB signal to noise ratio (SNR) gain at $10^{-3}$ of the symbol error rate (SER), while an identical error is obtained at high SNR region corresponding to SER $=10^{-4}$, compared to Flip-OFDM system. Moreover, the possibility to optimize its performance is developed through a tail-shortening mechanism, where $approx$ 11% increment in its spectral efficiency is obtained when compared to the throughput obtained by Flip-CP-OFDM system. Besides, the theoretical analysis reveals that the induced IMI outside the first order neighbor zone, which cannot be controlled using IAM, has a negligible impact on the estimation accuracy, compared to DCO-FBMC format, where a significant reduction in estimating level is captured.
由于主要的固有假想干扰(IMI)的影响,在可见光通信(VLC)系统中首次提出了带有翻转滤波器组多载波(Flip-FBMC)猝发的三抽头均衡器,以克服单抽头均衡器估计性能下降的问题。在高延迟信道情况下,与翻转-OFDM 系统相比,在符号错误率(SER)为 10^{-3}$ 时,拟议系统的信噪比(SNR)增益为 0.7 dB,而在符号错误率(SER)为 $=10^{-4}$ 的高信噪比区域,则会出现相同的错误。此外,还可以通过尾部缩短机制优化其性能,与 Flip-CP-OFDM 系统的吞吐量相比,其频谱效率大约提高了 11%。此外,理论分析表明,与 DCO-FBMC 格式相比,一阶邻域外的诱导 IMI(无法用 IAM 控制)对估计精度的影响微乎其微,而 DCO-FBMC 格式的估计水平则显著降低。
{"title":"Enhanced Signal Transmission Performance based on Multitap Equalization in Optical FBMC Burst","authors":"Mohammed S. Bahaaelden, Beatriz Ortega, Rafael Perez-Jimenez, V. Almenar","doi":"10.1109/CommNet60167.2023.10365290","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365290","url":null,"abstract":"Due to the impact of predominant inherent imaginary interference (IMI), for the first time in visible light communication (VLC) systems, 3-taps equalizer with flip-filter bank multicarrier (Flip-FBMC) burst is proposed to overcome the degradation performance along with 1-tap equalizer estimation. Over high delays channel profile, the proposed system offers 0.7 dB signal to noise ratio (SNR) gain at $10^{-3}$ of the symbol error rate (SER), while an identical error is obtained at high SNR region corresponding to SER $=10^{-4}$, compared to Flip-OFDM system. Moreover, the possibility to optimize its performance is developed through a tail-shortening mechanism, where $approx$ 11% increment in its spectral efficiency is obtained when compared to the throughput obtained by Flip-CP-OFDM system. Besides, the theoretical analysis reveals that the induced IMI outside the first order neighbor zone, which cannot be controlled using IAM, has a negligible impact on the estimation accuracy, compared to DCO-FBMC format, where a significant reduction in estimating level is captured.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"5 4","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Energy Management with Fuzzy Clustering for Heterogeneous Fog-Mist-IoT Networks 利用模糊聚类优化异构雾-雾-物联网网络的能源管理
Salah Eddine Essalhi, Mohamed Janati Idrissi, Mohammed Raiss El Fenni, H. Chafnaji
The rapid expansion of the Internet of Things (IoT) has led to an era dominated by diverse networks, with Mist and Fog computing becoming crucial for closer-to-device data processing. Despite the advantages, the surge of data from numerous devices raises challenges in optimizing system longevity, throughput, and latency. Most past research in Mist-IoT did not fully account for factors like residual energy, device location, workload capacity, butter size, and communication frequency, leading to high energy consumption during data exchanges between IoT and Fog systems. This study aims to address these factors for improved energy efficiency, especially with increasing data volume. It introduces a new approach using a Takagi-Sugeno-Kang (TSK) Type 2 Fuzzy Inference within a Fog-Mist-IoT architecture for smarter resource management during communication and task offloading in IoT ecosystem. Simulation results confirm its effectiveness.
物联网(IoT)的快速发展导致了一个由多样化网络主导的时代,而迷雾和雾计算对于近距离处理设备数据至关重要。尽管有这些优势,但来自众多设备的数据激增给优化系统寿命、吞吐量和延迟带来了挑战。过去对 Mist-IoT 的研究大多没有充分考虑剩余能量、设备位置、工作负载能力、黄油大小和通信频率等因素,导致物联网和雾系统之间的数据交换能耗过高。本研究旨在解决这些因素,以提高能源效率,尤其是在数据量不断增加的情况下。它介绍了一种在 Fog-Mist-IoT 架构中使用 Takagi-Sugeno-Kang (TSK) 2 型模糊推理的新方法,用于在物联网生态系统中的通信和任务卸载期间进行更智能的资源管理。仿真结果证实了其有效性。
{"title":"Optimized Energy Management with Fuzzy Clustering for Heterogeneous Fog-Mist-IoT Networks","authors":"Salah Eddine Essalhi, Mohamed Janati Idrissi, Mohammed Raiss El Fenni, H. Chafnaji","doi":"10.1109/CommNet60167.2023.10365284","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365284","url":null,"abstract":"The rapid expansion of the Internet of Things (IoT) has led to an era dominated by diverse networks, with Mist and Fog computing becoming crucial for closer-to-device data processing. Despite the advantages, the surge of data from numerous devices raises challenges in optimizing system longevity, throughput, and latency. Most past research in Mist-IoT did not fully account for factors like residual energy, device location, workload capacity, butter size, and communication frequency, leading to high energy consumption during data exchanges between IoT and Fog systems. This study aims to address these factors for improved energy efficiency, especially with increasing data volume. It introduces a new approach using a Takagi-Sugeno-Kang (TSK) Type 2 Fuzzy Inference within a Fog-Mist-IoT architecture for smarter resource management during communication and task offloading in IoT ecosystem. Simulation results confirm its effectiveness.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"192 6","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scaling A Blockchain System With Layered Architecture 利用分层架构扩展区块链系统
Fahad Rahman, C. Titouna, Farid Naït-Abdesselam, Ahmed Serhrouchni
Blockchain Technology (BCT), characterized by its decentralized and distributed ledger structure, records transactions securely using cryptographic methods. As BCT continues to evolve rapidly, it’s becoming increasingly integral to distributed system architectures. However, scalability remains a critical challenge for researchers, especially as transaction volume, block size, or node count grows, potentially hindering the development of distributed ecosystems. This paper introduces a federated layered model aimed at creating a scalable Blockchain system. This model ensures immediate, atomic updates across all nodes, including cross-zone transactions. The proposed system’s architecture is not only scalable but also flexible and manageable, effectively addressing issues like network congestion and asymmetric node distribution. When compared to traditional blockchain models, this new architecture significantly enhances scalability.
区块链技术(BCT)的特点是采用去中心化的分布式分类账结构,使用加密方法安全地记录交易。随着区块链技术的持续快速发展,它正日益成为分布式系统架构中不可或缺的一部分。然而,可扩展性仍然是研究人员面临的一个重要挑战,尤其是当交易量、区块大小或节点数量增长时,可能会阻碍分布式生态系统的发展。本文介绍了一种联合分层模型,旨在创建一个可扩展的区块链系统。该模型可确保所有节点的即时原子更新,包括跨区交易。所提出的系统架构不仅具有可扩展性,还具有灵活性和可管理性,能有效解决网络拥堵和节点分布不对称等问题。与传统的区块链模型相比,这种新架构大大提高了可扩展性。
{"title":"Scaling A Blockchain System With Layered Architecture","authors":"Fahad Rahman, C. Titouna, Farid Naït-Abdesselam, Ahmed Serhrouchni","doi":"10.1109/CommNet60167.2023.10365275","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365275","url":null,"abstract":"Blockchain Technology (BCT), characterized by its decentralized and distributed ledger structure, records transactions securely using cryptographic methods. As BCT continues to evolve rapidly, it’s becoming increasingly integral to distributed system architectures. However, scalability remains a critical challenge for researchers, especially as transaction volume, block size, or node count grows, potentially hindering the development of distributed ecosystems. This paper introduces a federated layered model aimed at creating a scalable Blockchain system. This model ensures immediate, atomic updates across all nodes, including cross-zone transactions. The proposed system’s architecture is not only scalable but also flexible and manageable, effectively addressing issues like network congestion and asymmetric node distribution. When compared to traditional blockchain models, this new architecture significantly enhances scalability.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"184 4","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Network Performance in 5G Systems with Downlink and Uplink Decoupling 利用下行链路和上行链路解耦优化 5G 系统的网络性能
Christos Bouras, Charalampos Chatzigeorgiou, V. Kokkinos, A. Gkamas, P. Pouyioutas
This research paper presents a comprehensive investigation into the optimization of resource allocation in 5G networks through the technique of Downlink and Uplink Decoupling (DUDe). With the growing need for accurate modeling and scenario planning in 5G systems, DUDe allows for the configuration of an additional, lower frequency signal on the uplink to complement the existing uplink signal, rebalancing the uplink/downlink difference at the cell edge and enhancing coverage and network capacity. Drawing on extensive literature and industry trends, this study explores the benefits and challenges of DUDe, considering its impact on network performance, user experience, and future developments. The paper also introduces a simulation-based methodology and experiments to evaluate the effectiveness of DUDe in improving coverage, capacity, latency, and energy efficiency. The findings contribute to the understanding of DUDe’s potential in optimizing 5G networks, providing valuable insights for researchers and network operators in designing and deploying efficient resource allocation strategies for enhanced network performance in various scenarios.
本研究论文通过下行链路和上行链路解耦技术(DUDe),对 5G 网络中的资源分配优化进行了全面研究。随着 5G 系统对精确建模和场景规划的需求日益增长,DUDe 允许在上行链路上配置额外的低频信号,以补充现有的上行链路信号,重新平衡小区边缘的上行链路/下行链路差异,增强覆盖范围和网络容量。本研究借鉴了大量文献和行业趋势,探讨了 DUDe 的优势和挑战,考虑了其对网络性能、用户体验和未来发展的影响。本文还介绍了一种基于仿真的方法和实验,以评估 DUDe 在改善覆盖、容量、延迟和能效方面的有效性。研究结果有助于理解 DUDe 在优化 5G 网络方面的潜力,为研究人员和网络运营商设计和部署高效的资源分配策略以提高各种场景下的网络性能提供了有价值的见解。
{"title":"Optimizing Network Performance in 5G Systems with Downlink and Uplink Decoupling","authors":"Christos Bouras, Charalampos Chatzigeorgiou, V. Kokkinos, A. Gkamas, P. Pouyioutas","doi":"10.1109/CommNet60167.2023.10365306","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365306","url":null,"abstract":"This research paper presents a comprehensive investigation into the optimization of resource allocation in 5G networks through the technique of Downlink and Uplink Decoupling (DUDe). With the growing need for accurate modeling and scenario planning in 5G systems, DUDe allows for the configuration of an additional, lower frequency signal on the uplink to complement the existing uplink signal, rebalancing the uplink/downlink difference at the cell edge and enhancing coverage and network capacity. Drawing on extensive literature and industry trends, this study explores the benefits and challenges of DUDe, considering its impact on network performance, user experience, and future developments. The paper also introduces a simulation-based methodology and experiments to evaluate the effectiveness of DUDe in improving coverage, capacity, latency, and energy efficiency. The findings contribute to the understanding of DUDe’s potential in optimizing 5G networks, providing valuable insights for researchers and network operators in designing and deploying efficient resource allocation strategies for enhanced network performance in various scenarios.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"85 4","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139184146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1