Pub Date : 2023-09-05DOI: 10.1007/s12243-023-00986-3
Kai Takahashi, Shigeo Shioda
In the present paper, we propose a method for controlling the interval of safety message transmissions in a fully distributed manner that maximizes the number of successful transmissions to vehicles located a set target distance away. In the proposed method, each vehicle estimates the density of vehicles in its vicinity, and, based on the estimated vehicle density, each vehicle calculates an optimal message transmission interval in order to maximize the number of successful message transmissions to vehicles located a set target distance away. The optimal message transmission interval can be analytically obtained as a simple expression when it is assumed that the vehicles are positioned according to a two-dimensional Poisson point process, which is appropriate for downtown scenarios. In addition, we propose two different methods for a vehicle by which to estimate the density of other vehicles in its vicinity. The first method is based on the measured channel busy ratio, and the second method relies on counting the number of distinct IDs of vehicles in the vicinity. We validate the effectiveness of the proposed methods using several simulations.
在本文中,我们提出了一种以完全分布式方式控制安全信息传输间隔的方法,该方法可最大限度地提高向位于设定目标距离之外的车辆成功传输信息的次数。在所提出的方法中,每辆车估算其附近的车辆密度,并根据估算的车辆密度计算最佳信息传输间隔,以最大限度地提高向位于设定目标距离之外的车辆成功传输信息的次数。如果假定车辆是按照二维泊松点过程定位的,那么最佳信息传输间隔可以通过简单的表达式分析得出,这种方法适用于闹市区场景。此外,我们还提出了两种不同的方法来估算车辆附近其他车辆的密度。第一种方法基于测得的信道繁忙率,第二种方法依赖于计算附近车辆的不同 ID 数量。我们通过多次模拟验证了所提方法的有效性。
{"title":"Distributed congestion control method for sending safety messages to vehicles at a set target distance","authors":"Kai Takahashi, Shigeo Shioda","doi":"10.1007/s12243-023-00986-3","DOIUrl":"10.1007/s12243-023-00986-3","url":null,"abstract":"<div><p>In the present paper, we propose a method for controlling the interval of safety message transmissions in a fully distributed manner that maximizes the number of successful transmissions to vehicles located a set target distance away. In the proposed method, each vehicle estimates the density of vehicles in its vicinity, and, based on the estimated vehicle density, each vehicle calculates an optimal message transmission interval in order to maximize the number of successful message transmissions to vehicles located a set target distance away. The optimal message transmission interval can be analytically obtained as a simple expression when it is assumed that the vehicles are positioned according to a two-dimensional Poisson point process, which is appropriate for downtown scenarios. In addition, we propose two different methods for a vehicle by which to estimate the density of other vehicles in its vicinity. The first method is based on the measured channel busy ratio, and the second method relies on counting the number of distinct IDs of vehicles in the vicinity. We validate the effectiveness of the proposed methods using several simulations.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"211 - 225"},"PeriodicalIF":1.8,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135255072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-02DOI: 10.1007/s12243-023-00973-8
Roman-Valentyn Tkachuk, Dragos Ilie, Remi Robert, Victor Kebande, Kurt Tutschku
Renewable energy sources were introduced as an alternative to fossil fuel sources to make electricity generation cleaner. However, today’s renewable energy markets face a number of limitations, such as inflexible pricing models and inaccurate consumption information. These limitations can be addressed with a decentralized marketplace architecture. Such architecture requires a mechanism to guarantee that all marketplace operations are executed according to predefined rules and regulations. One of the ways to establish such a mechanism is blockchain technology. This work defines a decentralized blockchain-based peer-to-peer (P2P) energy marketplace which addresses actors’ privacy and the performance of consensus mechanisms. The defined marketplace utilizes private permissioned Ethereum-based blockchain client Hyperledger Besu (HB) and its smart contracts to automate the P2P trade settlement process. Also, to make the marketplace compliant with energy trade regulations, it includes the regulator actor, which manages the issue and consumption of guarantees of origin and certifies the renewable energy sources used to generate traded electricity. Finally, the proposed marketplace incorporates privacy-preserving features, allowing it to generate private transactions and store them within a designated group of actors. Performance evaluation results of HB-based marketplace with three main consensus mechanisms for private networks, i.e., Clique, IBFT 2.0, and QBFT, demonstrate a lower throughput than another popular private permissioned blockchain platform Hyperledger Fabric (HF). However, the lower throughput is a side effect of the Byzantine Fault Tolerant characteristics of HB’s consensus mechanisms, i.e., IBFT 2.0 and QBFT, which provide increased security compared to HF’s Crash Fault Tolerant consensus RAFT.
{"title":"On the performance and scalability of consensus mechanisms in privacy-enabled decentralized renewable energy marketplace","authors":"Roman-Valentyn Tkachuk, Dragos Ilie, Remi Robert, Victor Kebande, Kurt Tutschku","doi":"10.1007/s12243-023-00973-8","DOIUrl":"10.1007/s12243-023-00973-8","url":null,"abstract":"<div><p>Renewable energy sources were introduced as an alternative to fossil fuel sources to make electricity generation cleaner. However, today’s renewable energy markets face a number of limitations, such as inflexible pricing models and inaccurate consumption information. These limitations can be addressed with a decentralized marketplace architecture. Such architecture requires a mechanism to guarantee that all marketplace operations are executed according to predefined rules and regulations. One of the ways to establish such a mechanism is blockchain technology. This work defines a decentralized blockchain-based peer-to-peer (P2P) energy marketplace which addresses actors’ privacy and the performance of consensus mechanisms. The defined marketplace utilizes private permissioned Ethereum-based blockchain client Hyperledger Besu (HB) and its smart contracts to automate the P2P trade settlement process. Also, to make the marketplace compliant with energy trade regulations, it includes the regulator actor, which manages the issue and consumption of guarantees of origin and certifies the renewable energy sources used to generate traded electricity. Finally, the proposed marketplace incorporates privacy-preserving features, allowing it to generate private transactions and store them within a designated group of actors. Performance evaluation results of HB-based marketplace with three main consensus mechanisms for private networks, i.e., Clique, IBFT 2.0, and QBFT, demonstrate a lower throughput than another popular private permissioned blockchain platform Hyperledger Fabric (HF). However, the lower throughput is a side effect of the Byzantine Fault Tolerant characteristics of HB’s consensus mechanisms, i.e., IBFT 2.0 and QBFT, which provide increased security compared to HF’s Crash Fault Tolerant consensus RAFT.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"271 - 288"},"PeriodicalIF":1.8,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-00973-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81507377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-31DOI: 10.1007/s12243-023-00977-4
Mays AL-Naday, Vlad Dobre, Martin Reed, Salman Toor, Bruno Volckaert, Filip De Turck
The diversity of services and infrastructure in metropolitan edge-to-cloud network(s) is rising to unprecedented levels. This is causing a rising threat of a wider range of cyber attacks coupled with a growing integration of a constrained range of infrastructure, particularly seen at the network edge. Deep reinforcement-based learning is an attractive approach to detecting attacks, as it allows less dependency on labeled data with better ability to classify different attacks. However, current approaches to learning are known to be computationally expensive (cost), and the learning experience can be negatively impacted by the presence of outliers and noise (quality). This work tackles both the cost and quality challenges with a novel service-based federated deep reinforcement learning solution, enabling anomaly detection and attack classification at a reduced data cost and with better quality. The federated settings in the proposed approach enable multiple edge units to create clusters that follow a bottom-up learning approach. The proposed solution adapts a deep Q-learning network (DQN) for service-tunable flow classification and introduces a novel federated DQN (FDQN) for federated learning. Through such targeted training and validation, variation in data patterns and noise is reduced. This leads to improved performance per service with lower training cost. Performance and cost of the solution, along with sensitivity to exploration parameters, are evaluated using examples of publicly available datasets (UNSW-NB15 and CIC-IDS2018). Evaluation results show the proposed solution to maintain detection accuracy in the range of ≈75–85% with lower data supply while improving the classification rate by a factor of ≈2.
{"title":"Federated deep Q-learning networks for service-based anomaly detection and classification in edge-to-cloud ecosystems","authors":"Mays AL-Naday, Vlad Dobre, Martin Reed, Salman Toor, Bruno Volckaert, Filip De Turck","doi":"10.1007/s12243-023-00977-4","DOIUrl":"10.1007/s12243-023-00977-4","url":null,"abstract":"<div><p>The diversity of services and infrastructure in metropolitan edge-to-cloud network(s) is rising to unprecedented levels. This is causing a rising threat of a wider range of cyber attacks coupled with a growing integration of a constrained range of infrastructure, particularly seen at the network edge. Deep reinforcement-based learning is an attractive approach to detecting attacks, as it allows less dependency on labeled data with better ability to classify different attacks. However, current approaches to learning are known to be computationally expensive (cost), and the learning experience can be negatively impacted by the presence of outliers and noise (quality). This work tackles both the cost and quality challenges with a novel service-based federated deep reinforcement learning solution, enabling anomaly detection and attack classification at a reduced data cost and with better quality. The federated settings in the proposed approach enable multiple edge units to create clusters that follow a bottom-up learning approach. The proposed solution adapts a deep Q-learning network (DQN) for service-tunable flow classification and introduces a novel federated DQN (FDQN) for federated learning. Through such targeted training and validation, variation in data patterns and noise is reduced. This leads to improved performance per service with lower training cost. Performance and cost of the solution, along with sensitivity to exploration parameters, are evaluated using examples of publicly available datasets (UNSW-NB15 and CIC-IDS2018). Evaluation results show the proposed solution to maintain detection accuracy in the range of ≈75–85% with lower data supply while improving the classification rate by a factor of ≈2.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"165 - 178"},"PeriodicalIF":1.8,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-00977-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80695695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-29DOI: 10.1007/s12243-023-00988-1
Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Frédéric Cuppens
{"title":"Foreword of the special issue on « FPS 2021» symposium","authors":"Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Frédéric Cuppens","doi":"10.1007/s12243-023-00988-1","DOIUrl":"10.1007/s12243-023-00988-1","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 7-8","pages":"383 - 383"},"PeriodicalIF":1.9,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50522641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-19DOI: 10.1007/s12243-023-00985-4
{"title":"Publisher Correction: Towards programmable IoT with ActiveNDN","authors":"","doi":"10.1007/s12243-023-00985-4","DOIUrl":"10.1007/s12243-023-00985-4","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 11-12","pages":"685 - 685"},"PeriodicalIF":1.9,"publicationDate":"2023-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135936678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network troubleshooting usually requires packet level traffic capturing and analyzing. Indeed, the observation of emission patterns sheds some light on the kind of degradation experienced by a connection. In the case of reliable transport traffic where congestion control is performed, such as TCP and QUIC traffic, these patterns are the fruit of decisions made by the congestion control algorithm (CCA), according to its own perception of network conditions. The CCA estimates the bottleneck’s capacity via an exponential probing, during the so-called “Slow-Start” (SS) state. The bottleneck is considered reached upon reception of congestion signs, typically lost packets or abnormal packet delays depending on the version of CCA used. The SS state duration is thus a key indicator for the diagnosis of faults; this indicator is estimated empirically by human experts today, which is time-consuming and a cumbersome task with large error margins. This paper proposes a method to automatically identify the slow-start state from actively and passively obtained bidirectional packet traces. It relies on an innovative timeless representation of the observed packets series. We implemented our method in our active and passive probes and tested it with CUBIC and BBR under different network conditions. We then picked a few real-life examples to illustrate the value of our representation for easy discrimination between typical faults and for identifying BBR among CCAs variants.
网络故障排除通常需要捕获和分析数据包级流量。事实上,通过观察发射模式可以了解连接所经历的降级类型。在执行拥塞控制的可靠传输流量(如 TCP 和 QUIC 流量)中,这些模式是拥塞控制算法(CCA)根据自身对网络条件的感知做出的决定。在所谓的 "慢启动"(SS)状态下,CCA 通过指数探测来估计瓶颈的容量。一旦接收到拥塞信号,通常是数据包丢失或异常数据包延迟,就认为达到了瓶颈,具体取决于所使用的 CCA 版本。因此,SS 状态持续时间是故障诊断的一个关键指标;目前,该指标是由人工专家根据经验估算出来的,这既耗时又繁琐,而且误差范围大。本文提出了一种从主动和被动获取的双向数据包轨迹中自动识别慢启动状态的方法。该方法依赖于对观察到的数据包序列进行创新性的定时表示。我们在主动和被动探测器中实施了我们的方法,并在不同的网络条件下用 CUBIC 和 BBR 进行了测试。然后,我们选取了几个真实案例来说明我们的表示法在轻松区分典型故障和识别 CCA 变体中的 BBR 方面的价值。
{"title":"Automated slow-start detection for anomaly root cause analysis and BBR identification","authors":"Ziad Tlaiss, Alexandre Ferrieux, Isabel Amigo, Isabelle Hamchaoui, Sandrine Vaton","doi":"10.1007/s12243-023-00982-7","DOIUrl":"10.1007/s12243-023-00982-7","url":null,"abstract":"<div><p>Network troubleshooting usually requires packet level traffic capturing and analyzing. Indeed, the observation of emission patterns sheds some light on the kind of degradation experienced by a connection. In the case of reliable transport traffic where congestion control is performed, such as TCP and QUIC traffic, these patterns are the fruit of decisions made by the congestion control algorithm (CCA), according to its own perception of network conditions. The CCA estimates the bottleneck’s capacity via an exponential probing, during the so-called “Slow-Start” (SS) state. The bottleneck is considered reached upon reception of congestion signs, typically lost packets or abnormal packet delays depending on the version of CCA used. The SS state duration is thus a key indicator for the diagnosis of faults; this indicator is estimated empirically by human experts today, which is time-consuming and a cumbersome task with large error margins. This paper proposes a method to automatically identify the slow-start state from actively and passively obtained bidirectional packet traces. It relies on an innovative timeless representation of the observed packets series. We implemented our method in our active and passive probes and tested it with CUBIC and BBR under different network conditions. We then picked a few real-life examples to illustrate the value of our representation for easy discrimination between typical faults and for identifying BBR among CCAs variants.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"149 - 163"},"PeriodicalIF":1.8,"publicationDate":"2023-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78189579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper provides a comprehensive review of recent challenges and results in the field of generative AI with application to mobile telecommunications networks. The objective is to classify the literature using an approach that encompasses the type of generative AI technology employed, the functional purpose, and the specific component of the mobile network that each solution targets. Moreover, performance requirements for generative AI applications are considered. Thereafter, state-of-the-art generative AI algorithms and an examination of their use cases across various industry verticals are presented. The discussion extends to the current level of AI integration in telecom standardization bodies, such as the 3rd Generation Partnership Project (3GPP). Finally, the open research challenges that the generative AI technology aims to address are thoroughly investigated.
{"title":"Generative AI in mobile networks: a survey","authors":"Athanasios Karapantelakis, Pegah Alizadeh, Abdulrahman Alabassi, Kaushik Dey, Alexandros Nikou","doi":"10.1007/s12243-023-00980-9","DOIUrl":"10.1007/s12243-023-00980-9","url":null,"abstract":"<div><p>This paper provides a comprehensive review of recent challenges and results in the field of generative AI with application to mobile telecommunications networks. The objective is to classify the literature using an approach that encompasses the type of generative AI technology employed, the functional purpose, and the specific component of the mobile network that each solution targets. Moreover, performance requirements for generative AI applications are considered. Thereafter, state-of-the-art generative AI algorithms and an examination of their use cases across various industry verticals are presented. The discussion extends to the current level of AI integration in telecom standardization bodies, such as the 3rd Generation Partnership Project (3GPP). Finally, the open research challenges that the generative AI technology aims to address are thoroughly investigated.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 1-2","pages":"15 - 33"},"PeriodicalIF":1.8,"publicationDate":"2023-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76830597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-14DOI: 10.1007/s12243-023-00976-5
Duc-Tuyen Ta, Nhan Nguyen-Thanh, Duy H. N. Nguyen, Van-Tam Nguyen
The wireless revolution requires future wireless networks the capability of intelligently optimizing the spectrum by collaborating and using autonomy to determine not just the best use of the spectrum for its own system, but the best use of spectrum for other systems that share the same spectrum bands. How to develop the wireless paradigm of collaboration, therefore, is a crucial question. In this paper, we discuss how to model collaborative power control in a wireless interference network, where users share the same frequency band. By collaborating with other users, each user exchanges information to maximize not only its own performance but also others’ performances. A game theory framework is developed to determine the optimal power allocation. The proposed framework possesses several advantages over conventional methods, such as low complexity and fast converging algorithmic solutions, distributed implementation, and better user fairness. Simulation results state the proposed approach provides better fairness between users’ data rates, higher performance in the aggregate rate, and lower convergence time.
{"title":"A game-theoretical paradigm for collaborative and distributed power control in wireless networks","authors":"Duc-Tuyen Ta, Nhan Nguyen-Thanh, Duy H. N. Nguyen, Van-Tam Nguyen","doi":"10.1007/s12243-023-00976-5","DOIUrl":"10.1007/s12243-023-00976-5","url":null,"abstract":"<div><p>The wireless revolution requires future wireless networks the capability of intelligently optimizing the spectrum by collaborating and using autonomy to determine not just the best use of the spectrum for its own system, but the best use of spectrum for other systems that share the same spectrum bands. How to develop the wireless paradigm of collaboration, therefore, is a crucial question. In this paper, we discuss how to model collaborative power control in a wireless interference network, where users share the same frequency band. By collaborating with other users, each user exchanges information to maximize not only its own performance but also others’ performances. A game theory framework is developed to determine the optimal power allocation. The proposed framework possesses several advantages over conventional methods, such as low complexity and fast converging algorithmic solutions, distributed implementation, and better user fairness. Simulation results state the proposed approach provides better fairness between users’ data rates, higher performance in the aggregate rate, and lower convergence time.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 1-2","pages":"1 - 14"},"PeriodicalIF":1.8,"publicationDate":"2023-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84874472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-11DOI: 10.1007/s12243-023-00974-7
Changhong Yu, Zhong Ye, Yinghui He, Ming Gao, Haiyan Luo, Guanding Yu
The integration of sensing and communication has become essential to next-generation vehicular networks. In this paper, we investigate a vehicle-to-infrastructure (V2I) network with multiple roadside units (RSUs) based on the dual-functional radar-communication (DFRC) technique. Since there are multiple RSUs in the system, we first propose a signal-switching model between vehicles and different RSUs. These RSUs estimate and predict vehicles’ motion parameters based on the DFRC signal echoes and the state evolution model. Accordingly, we utilise a neural network to extract angle information from signal echoes instead of traditional methods, thus improving the angle estimation accuracy. To further improve the estimation performance, we formulate an optimisation problem to minimise the Cramer-Rao bound (CRB) on angle estimation by properly allocating power to each RSU. Finally, we propose a novel weighting method to further improve the cooperative localisation accuracy of the multi-RSU system. Simulation results show that the performance of angle estimation can be improved by utilising the proposed neural network method and the novel power allocation scheme. In addition, the novel weighting method can considerably improve the localisation accuracy.
{"title":"Cooperative localisation for multi-RSU vehicular networks based on predictive beamforming","authors":"Changhong Yu, Zhong Ye, Yinghui He, Ming Gao, Haiyan Luo, Guanding Yu","doi":"10.1007/s12243-023-00974-7","DOIUrl":"10.1007/s12243-023-00974-7","url":null,"abstract":"<div><p>The integration of sensing and communication has become essential to next-generation vehicular networks. In this paper, we investigate a vehicle-to-infrastructure (V2I) network with multiple roadside units (RSUs) based on the dual-functional radar-communication (DFRC) technique. Since there are multiple RSUs in the system, we first propose a signal-switching model between vehicles and different RSUs. These RSUs estimate and predict vehicles’ motion parameters based on the DFRC signal echoes and the state evolution model. Accordingly, we utilise a neural network to extract angle information from signal echoes instead of traditional methods, thus improving the angle estimation accuracy. To further improve the estimation performance, we formulate an optimisation problem to minimise the Cramer-Rao bound (CRB) on angle estimation by properly allocating power to each RSU. Finally, we propose a novel weighting method to further improve the cooperative localisation accuracy of the multi-RSU system. Simulation results show that the performance of angle estimation can be improved by utilising the proposed neural network method and the novel power allocation scheme. In addition, the novel weighting method can considerably improve the localisation accuracy.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 1-2","pages":"85 - 100"},"PeriodicalIF":1.8,"publicationDate":"2023-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87646195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-02DOI: 10.1007/s12243-023-00979-2
Mustafa Mulla, Ali Hakan Ulusoy, Ahmet Rizaner, Hasan Amca
In this paper, we design a low-complexity multiuser millimeter-wave massive-multiple-input-multiple-output system with the help of a hybrid analog/digital precoding architecture. Hybrid precoding is used to reduce the hardware cost and power consumption of millimeter-wave large-scale antenna systems. In this manner, we proposed a novel approach to solve the well-known zero-forcing algorithm by using an iterative optimization method called the conjugate gradient method. The problem is transformed into an optimization problem, and the complex matrix inverse operation required in the zero-forcing algorithm is eliminated. Hence, the complexity of the zero-forcing algorithm is reduced while the spectral efficiency is maintained at the same level as that of the reference zero-forcing detector. The simulation results demonstrate that the proposed conjugate gradient-based algorithm achieves better performance than competing methods in terms of complexity and spectral efficiency.
{"title":"A low-complexity iterative algorithm for multiuser millimeter-wave systems","authors":"Mustafa Mulla, Ali Hakan Ulusoy, Ahmet Rizaner, Hasan Amca","doi":"10.1007/s12243-023-00979-2","DOIUrl":"10.1007/s12243-023-00979-2","url":null,"abstract":"<div><p>In this paper, we design a low-complexity multiuser millimeter-wave massive-multiple-input-multiple-output system with the help of a hybrid analog/digital precoding architecture. Hybrid precoding is used to reduce the hardware cost and power consumption of millimeter-wave large-scale antenna systems. In this manner, we proposed a novel approach to solve the well-known zero-forcing algorithm by using an iterative optimization method called the conjugate gradient method. The problem is transformed into an optimization problem, and the complex matrix inverse operation required in the zero-forcing algorithm is eliminated. Hence, the complexity of the zero-forcing algorithm is reduced while the spectral efficiency is maintained at the same level as that of the reference zero-forcing detector. The simulation results demonstrate that the proposed conjugate gradient-based algorithm achieves better performance than competing methods in terms of complexity and spectral efficiency.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 1-2","pages":"101 - 110"},"PeriodicalIF":1.8,"publicationDate":"2023-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72994905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}