首页 > 最新文献

Telecommunication Systems最新文献

英文 中文
Adaptive thresholds for improved load balancing in mobile edge computing using K-means clustering 利用 K-means 聚类改进移动边缘计算负载平衡的自适应阈值
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-12 DOI: 10.1007/s11235-024-01134-5
Tahir Maqsood, Sardar Khaliq uz Zaman, Arslan Qayyum, Faisal Rehman, Saad Mustafa, Junaid Shuja

Mobile edge computing (MEC) has emerged as a promising technology that can revolutionize the future of mobile networks. MEC brings compute and storage capabilities to the edge of the network closer to end-users. This enables faster data processing and improved user experience by reducing latency. MEC has the potential to decrease the burden on the core network by transferring computational and storage responsibilities to the edge, thereby reducing overall network congestion. Load balancing is critical for effectively utilizing the resources of the MEC. This ensures that the workload is distributed uniformly across all of the available resources. Load balancing is a complex task and there are various algorithms that can be used to achieve it, such as round-robin, least connection, and IP hash. To differentiate between heavily loaded and lightly loaded servers, current load balancing methods use an average response time to gauge the load on the edge server. Nevertheless, this approach has lower precision and may result in an unequal distribution of the workload. Our study introduces a dynamic threshold calculation technique that relies on a response-time threshold of the edge servers using K-means clustering. K-means based proposed algorithm classifies the servers in two sets (here K = 2), i.e., overloaded and lightly loaded edge servers. Consequently, workload is migrated from overloaded to lightly loaded servers to evenly distribute the workload. Experimental results show that the proposed technique reduces latency and improves resource utilization.

移动边缘计算(MEC)是一项前景广阔的技术,可彻底改变移动网络的未来。MEC 将计算和存储能力带到网络边缘,使其更接近终端用户。这样可以加快数据处理速度,并通过减少延迟改善用户体验。通过将计算和存储责任转移到边缘,MEC 有可能减轻核心网络的负担,从而减少整体网络拥塞。负载平衡对于有效利用 MEC 资源至关重要。这可确保工作负载在所有可用资源上均匀分布。负载平衡是一项复杂的任务,有多种算法可用于实现负载平衡,如轮循、最少连接和 IP 哈希算法。为了区分重负载和轻负载服务器,目前的负载平衡方法使用平均响应时间来衡量边缘服务器的负载。然而,这种方法的精确度较低,可能会导致工作量分配不均。我们的研究引入了一种动态阈值计算技术,它依赖于使用 K-means 聚类的边缘服务器响应时间阈值。基于 K-means 的拟议算法将服务器分为两组(此处 K = 2),即超负荷和轻负荷边缘服务器。因此,工作负载从超载服务器迁移到轻载服务器,以平均分配工作负载。实验结果表明,建议的技术减少了延迟,提高了资源利用率。
{"title":"Adaptive thresholds for improved load balancing in mobile edge computing using K-means clustering","authors":"Tahir Maqsood, Sardar Khaliq uz Zaman, Arslan Qayyum, Faisal Rehman, Saad Mustafa, Junaid Shuja","doi":"10.1007/s11235-024-01134-5","DOIUrl":"https://doi.org/10.1007/s11235-024-01134-5","url":null,"abstract":"<p>Mobile edge computing (MEC) has emerged as a promising technology that can revolutionize the future of mobile networks. MEC brings compute and storage capabilities to the edge of the network closer to end-users. This enables faster data processing and improved user experience by reducing latency. MEC has the potential to decrease the burden on the core network by transferring computational and storage responsibilities to the edge, thereby reducing overall network congestion. Load balancing is critical for effectively utilizing the resources of the MEC. This ensures that the workload is distributed uniformly across all of the available resources. Load balancing is a complex task and there are various algorithms that can be used to achieve it, such as round-robin, least connection, and IP hash. To differentiate between heavily loaded and lightly loaded servers, current load balancing methods use an average response time to gauge the load on the edge server. Nevertheless, this approach has lower precision and may result in an unequal distribution of the workload. Our study introduces a dynamic threshold calculation technique that relies on a response-time threshold of the edge servers using K-means clustering. K-means based proposed algorithm classifies the servers in two sets (here K = 2), i.e., overloaded and lightly loaded edge servers. Consequently, workload is migrated from overloaded to lightly loaded servers to evenly distribute the workload. Experimental results show that the proposed technique reduces latency and improves resource utilization.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"175 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140559895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subchannel selection methods for 3GPP C-V2X networks by considering vehicular mobility 考虑车辆移动性的 3GPP C-V2X 网络子信道选择方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-12 DOI: 10.1007/s11235-024-01138-1
Meng-Shiuan Pan, Shao-Wei Kao

The 3GPP vehicle-to-everything (C-V2X) technology is a key solution to provide communication services for applications of intelligent transportation systems (ITS). According to the C-V2X specification, vehicles are allowed to communicate with each other without the help of cellular networks and can select subchannels (i.e. radio resources) by themselves. However, this design will induce subchannel collisions because of the mobility of vehicles. This work aims to relieve the aforementioned problem. We propose a cooperative subchannel selection (CoSS) scheme and a localized subchannel selection (LoSS) scheme, which consider vehicular mobility to prevent subchannel collisions. Based on the collected information, CoSS predicts possible subchannel collisions due to vehicles’ location changes. On the other hand, LoSS avoids subchannel collisions by organizing the usage of subchannels based on vehicles’ relative moving speeds. The simulation results indicate that the proposed schemes can effectively reduce subchannel collision ratio and increase packet delivery ratio for the network.

3GPP 车对万物(C-V2X)技术是为智能交通系统(ITS)应用提供通信服务的关键解决方案。根据 C-V2X 规范,车辆可以在没有蜂窝网络帮助的情况下相互通信,并可自行选择子信道(即无线电资源)。然而,由于车辆的流动性,这种设计会引起子信道碰撞。这项工作旨在缓解上述问题。我们提出了一种合作子信道选择(CoSS)方案和一种本地化子信道选择(LoSS)方案,这两种方案都考虑了车辆的移动性,以防止子信道碰撞。基于收集到的信息,CoSS 可预测因车辆位置变化而可能发生的子信道碰撞。另一方面,LoSS 根据车辆的相对移动速度组织子信道的使用,从而避免子信道碰撞。仿真结果表明,所提出的方案能有效降低子信道碰撞率,提高网络的数据包传送率。
{"title":"Subchannel selection methods for 3GPP C-V2X networks by considering vehicular mobility","authors":"Meng-Shiuan Pan, Shao-Wei Kao","doi":"10.1007/s11235-024-01138-1","DOIUrl":"https://doi.org/10.1007/s11235-024-01138-1","url":null,"abstract":"<p>The 3GPP vehicle-to-everything (C-V2X) technology is a key solution to provide communication services for applications of intelligent transportation systems (ITS). According to the C-V2X specification, vehicles are allowed to communicate with each other without the help of cellular networks and can select subchannels (i.e. radio resources) by themselves. However, this design will induce subchannel collisions because of the mobility of vehicles. This work aims to relieve the aforementioned problem. We propose a cooperative subchannel selection (CoSS) scheme and a localized subchannel selection (LoSS) scheme, which consider vehicular mobility to prevent subchannel collisions. Based on the collected information, CoSS predicts possible subchannel collisions due to vehicles’ location changes. On the other hand, LoSS avoids subchannel collisions by organizing the usage of subchannels based on vehicles’ relative moving speeds. The simulation results indicate that the proposed schemes can effectively reduce subchannel collision ratio and increase packet delivery ratio for the network.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"94 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient design for green indoor OWC-IoT systems using passive reflective filters and machine learning-assisted quality prediction 利用无源反射滤波器和机器学习辅助质量预测,为绿色室内 OWC-IoT 系统提供节能设计
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-12 DOI: 10.1007/s11235-024-01139-0
C. Jenila, R. K. Jeyachitra

This paper presents an energy-efficient design of optical wireless communication (OWC) system for the indoor Internet of Things (IoT) with the assistance of machine learning (ML). A central coordinator (CC) has been proposed to interrogate the IoT devices and control the uplink formations with the prediction of transmission quality using ML classifiers. The passive reflective reflectors (PRF) are utilized in the IoT devices, which replaced the power-consuming active transmitters, formulate the zero-power consuming transmission links. The communication performance of the passive link establishments from the IoT devices have been investigated in terms of quality factor (Q-factor), bit error rate (BER), and signal-to-noise ratio (SNR) under different optical wireless channel conditions and link lengths. The ML classifiers have been evaluated on the prediction of transmission quality, and the results suggested the Euclidean K-nearest neighbor (KNN) with ten number of neighbors for the implementation. The IoT devices located within 1.2 m from the CC require a transmission power of 0.5 mW for links carrying 10 Gbps data, which increases the energy efficiency to 20 Gbps/mW with transmission energy consumption of 0.05 pJ/bit. This significant improvement in energy efficiency and passive communication ensures reliable, and green IoT links suitable for data-intensive indoor applications.

本文介绍了一种在机器学习(ML)辅助下为室内物联网(IoT)设计的高能效光无线通信(OWC)系统。本文提出了一个中央协调器(CC),通过使用 ML 分类器预测传输质量来询问物联网设备并控制上行链路编队。物联网设备采用无源反射器(PRF),取代了耗电的有源发射器,形成了零功耗的传输链路。在不同的光无线信道条件和链路长度下,研究了物联网设备建立的无源链路的通信性能,包括质量因子(Q-factor)、误码率(BER)和信噪比(SNR)。在对传输质量进行预测时,对 ML 分类器进行了评估,结果表明可以采用欧几里得 K 近邻(KNN)分类器(有 10 个邻居)。距离 CC 1.2 米以内的物联网设备在传输 10 Gbps 数据时,链路所需的传输功率为 0.5 mW,从而将能效提高到 20 Gbps/mW,传输能耗为 0.05 pJ/bit。能效和无源通信的大幅提高确保了可靠的绿色物联网链路,适合数据密集型室内应用。
{"title":"Energy-efficient design for green indoor OWC-IoT systems using passive reflective filters and machine learning-assisted quality prediction","authors":"C. Jenila, R. K. Jeyachitra","doi":"10.1007/s11235-024-01139-0","DOIUrl":"https://doi.org/10.1007/s11235-024-01139-0","url":null,"abstract":"<p>This paper presents an energy-efficient design of optical wireless communication (OWC) system for the indoor Internet of Things (IoT) with the assistance of machine learning (ML). A central coordinator (CC) has been proposed to interrogate the IoT devices and control the uplink formations with the prediction of transmission quality using ML classifiers. The passive reflective reflectors (PRF) are utilized in the IoT devices, which replaced the power-consuming active transmitters, formulate the zero-power consuming transmission links. The communication performance of the passive link establishments from the IoT devices have been investigated in terms of quality factor (Q-factor), bit error rate (BER), and signal-to-noise ratio (SNR) under different optical wireless channel conditions and link lengths. The ML classifiers have been evaluated on the prediction of transmission quality, and the results suggested the Euclidean K-nearest neighbor (KNN) with ten number of neighbors for the implementation. The IoT devices located within 1.2 m from the CC require a transmission power of 0.5 mW for links carrying 10 Gbps data, which increases the energy efficiency to 20 Gbps/mW with transmission energy consumption of 0.05 pJ/bit. This significant improvement in energy efficiency and passive communication ensures reliable, and green IoT links suitable for data-intensive indoor applications.\u0000</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"53 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VMRF: revolutionizing military border surveillance with extensive coverage and connectivity VMRF:以广泛的覆盖范围和连接性彻底改变军事边境监控
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-11 DOI: 10.1007/s11235-024-01125-6
S. P. Subotha, L. Femila

Nowadays, wireless sensor networks (WSNs) are utilised in military-based applications like border surveillance. However, existing border surveillance methods have difficulties with energy efficiency, latency, security, connectivity, optimal path selection and coverage. In this paper, a Voronoi Modified Red Fox (VMRF) algorithm is proposed as a solution to these problems. Initially, secure cluster head (CH) selection and clustering is performed using Secure Spatial Intelligence-Enhanced Voronoi Clustering (SIEVC) to boost energy efficiency, security, and extend network coverage and connectivity. The SIEVC algorithm dynamically selects CHs based on past and present trust, identity trust, and energy trust to identify malicious nodes and form optimal clusters for improved network coverage and connectivity. It also employs dynamic cluster size adjustment to maintain proximity between CHs and cluster members and utilizes node alternation to ensure equitable cluster sizes. This approach minimizes energy depletion, enhances network longevity, and improves load balancing. The algorithm introduces a node alternation mechanism to balance cluster sizes and prevent energy holes. This approach ensures secure and efficient CH selection and promotes even energy distribution. Then the proposed modified red fox (MRF) optimization method, based on the fitness metric, computes the energy-efficient and safe path for data transmission. Trust, energy, distance, link quality and traffic intensity are the factors that the fitness function takes into account. Finally, the data is transmitted to the base station (BS) through CH along the path with the highest fitness value. Then the proposed VMRF algorithm is evaluated using the NS-2 platform, and the outcomes are compared with existing protocols. Based on the evaluations, the VMRF algorithm performs better than existing ones in terms of delay, energy consumption, throughput, packet delivery ratio (PDR), malicious node detection ratio, and residual energy.

如今,无线传感器网络(WSN)被广泛应用于边境监控等军事领域。然而,现有的边境监控方法在能效、延迟、安全性、连接性、最佳路径选择和覆盖范围等方面存在困难。本文提出了一种 Voronoi Modified Red Fox(VMRF)算法,作为这些问题的解决方案。首先,使用安全空间智能增强型沃罗诺伊聚类(SIEVC)进行安全簇头(CH)选择和聚类,以提高能效和安全性,并扩大网络覆盖和连通性。SIEVC 算法根据过去和现在的信任度、身份信任度和能量信任度动态选择 CH,以识别恶意节点并形成最佳簇,从而提高网络覆盖率和连通性。该算法还采用动态簇大小调整来保持 CH 和簇成员之间的接近性,并利用节点交替来确保公平的簇大小。这种方法最大限度地减少了能量消耗,提高了网络寿命,改善了负载平衡。该算法引入了节点交替机制,以平衡簇大小并防止出现能量漏洞。这种方法确保了安全高效的 CH 选择,并促进了能量的均衡分配。然后,基于适配度量,提出了改进的红狐(MRF)优化方法,计算出节能、安全的数据传输路径。信任、能量、距离、链路质量和流量强度是适合度函数考虑的因素。最后,数据通过 CH 沿着适配值最高的路径传输到基站(BS)。然后,利用 NS-2 平台对提出的 VMRF 算法进行评估,并将评估结果与现有协议进行比较。根据评估结果,VMRF 算法在延迟、能耗、吞吐量、数据包传送率 (PDR)、恶意节点检测率和剩余能量方面都优于现有算法。
{"title":"VMRF: revolutionizing military border surveillance with extensive coverage and connectivity","authors":"S. P. Subotha, L. Femila","doi":"10.1007/s11235-024-01125-6","DOIUrl":"https://doi.org/10.1007/s11235-024-01125-6","url":null,"abstract":"<p>Nowadays, wireless sensor networks (WSNs) are utilised in military-based applications like border surveillance. However, existing border surveillance methods have difficulties with energy efficiency, latency, security, connectivity, optimal path selection and coverage. In this paper, a Voronoi Modified Red Fox (VMRF) algorithm is proposed as a solution to these problems. Initially, secure cluster head (CH) selection and clustering is performed using Secure Spatial Intelligence-Enhanced Voronoi Clustering (SIEVC) to boost energy efficiency, security, and extend network coverage and connectivity. The SIEVC algorithm dynamically selects CHs based on past and present trust, identity trust, and energy trust to identify malicious nodes and form optimal clusters for improved network coverage and connectivity. It also employs dynamic cluster size adjustment to maintain proximity between CHs and cluster members and utilizes node alternation to ensure equitable cluster sizes. This approach minimizes energy depletion, enhances network longevity, and improves load balancing. The algorithm introduces a node alternation mechanism to balance cluster sizes and prevent energy holes. This approach ensures secure and efficient CH selection and promotes even energy distribution. Then the proposed modified red fox (MRF) optimization method, based on the fitness metric, computes the energy-efficient and safe path for data transmission. Trust, energy, distance, link quality and traffic intensity are the factors that the fitness function takes into account. Finally, the data is transmitted to the base station (BS) through CH along the path with the highest fitness value. Then the proposed VMRF algorithm is evaluated using the NS-2 platform, and the outcomes are compared with existing protocols. Based on the evaluations, the VMRF algorithm performs better than existing ones in terms of delay, energy consumption, throughput, packet delivery ratio (PDR), malicious node detection ratio, and residual energy.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"9 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GTIACO: energy efficient clustering algorithm based on game theory and improved ant colony optimization GTIACO:基于博弈论和改进蚁群优化的节能聚类算法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-04 DOI: 10.1007/s11235-024-01132-7
Hang Wan, Zhizhuo Qiu, Rui Quan, Michael David, William Derigent

Recently, wireless sensor networks have been widely used for environmental and structural safety monitoring. However, node batteries cannot be replaced or easily recharged in harsh environments. Maximizing network lifetime remains a challenging issue in designing WSN routing. This paper introduces GTIACO, a novel metaheuristic clustering protocol. It employs an optimal cluster head function to determine cluster number and utilizes game theory for selecting optimal cluster heads. To optimize inter-cluster routing, improved ant colony optimization (ACO) is introduced to construct gathering paths from clusters to the base station. Both blind pathways, pheromone concentration, and angle factors are considered to improve path exploration and transmission efficiency in ant colonies. To assess network performance, various scenarios involving different base station placements and network densities are examined. Experimental results demonstrate GTIACO's superiority over LEACH, ACO, SEP, and PRESPE protocols in network lifetime, stability, energy, and throughput. The proposed GTIACO shows an improvement of at least 4.3% in network lifetime and 32.8% in network throughout. It exhibits superior stability and transmission efficiency across diverse network densities.

最近,无线传感器网络被广泛用于环境和结构安全监控。然而,在恶劣的环境中,节点电池无法更换或轻松充电。在设计 WSN 路由时,最大限度地延长网络寿命仍然是一个具有挑战性的问题。本文介绍了一种新型元启发式聚类协议--GTIACO。它采用最优簇头函数来确定簇数,并利用博弈论来选择最优簇头。为优化簇间路由,引入了改进的蚁群优化(ACO)来构建从簇到基站的聚集路径。盲路径、信息素浓度和角度因素都被考虑在内,以提高蚁群的路径探索和传输效率。为了评估网络性能,研究了涉及不同基站位置和网络密度的各种情况。实验结果表明,GTIACO 在网络寿命、稳定性、能量和吞吐量方面优于 LEACH、ACO、SEP 和 PRESPE 协议。提议的 GTIACO 在网络寿命方面至少提高了 4.3%,在整个网络中提高了 32.8%。它在不同的网络密度下都表现出卓越的稳定性和传输效率。
{"title":"GTIACO: energy efficient clustering algorithm based on game theory and improved ant colony optimization","authors":"Hang Wan, Zhizhuo Qiu, Rui Quan, Michael David, William Derigent","doi":"10.1007/s11235-024-01132-7","DOIUrl":"https://doi.org/10.1007/s11235-024-01132-7","url":null,"abstract":"<p>Recently, wireless sensor networks have been widely used for environmental and structural safety monitoring. However, node batteries cannot be replaced or easily recharged in harsh environments. Maximizing network lifetime remains a challenging issue in designing WSN routing. This paper introduces GTIACO, a novel metaheuristic clustering protocol. It employs an optimal cluster head function to determine cluster number and utilizes game theory for selecting optimal cluster heads. To optimize inter-cluster routing, improved ant colony optimization (ACO) is introduced to construct gathering paths from clusters to the base station. Both blind pathways, pheromone concentration, and angle factors are considered to improve path exploration and transmission efficiency in ant colonies. To assess network performance, various scenarios involving different base station placements and network densities are examined. Experimental results demonstrate GTIACO's superiority over LEACH, ACO, SEP, and PRESPE protocols in network lifetime, stability, energy, and throughput. The proposed GTIACO shows an improvement of at least 4.3% in network lifetime and 32.8% in network throughout. It exhibits superior stability and transmission efficiency across diverse network densities.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"300 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reduction of the received signal strength variation with distance using averaging over multiple heights and frequencies 通过对多个高度和频率进行平均,减少接收信号强度随距离的变化
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-03 DOI: 10.1007/s11235-024-01120-x
Huthaifa Obeidat, Mohammed Al-Sadoon, Chemseddine Zebiri, Omar Obeidat, Issa Elfergani, Raed Abd-Alhameed

As a simple and inexpensive channel characteristic, received signal strength (RSS) finds extensive usage in localization applications. However, the quick changes in signal strength impact the localization precision. By averaging over access points (APs) with multiple frequencies and/or heights, this article suggests a novel approach to lowering RSS fluctuation. Initially focused on the plane-earth loss model, the study was later extended to include a multipath indoor propagation scenario that was simulated. We used ray-tracing software to model the indoor propagation situation. This research takes into account the results of three distinct methods for averaging RSS: height averaging, frequency averaging, and hybrid frequency and height (FH) averaging, which combines the two. We discovered that the Height-only strategy considerably decreased the RSS variation with distance for both settings we looked at. Using the frequency-only method even further reduced the variation. Using the Hybrid FH technique greatly enhances the results. Root mean square error values of 4.427 dB, 3.70 dB, and 3.5 dB, respectively, are provided for the averaging approaches and the ideal scenario in which no variance occurs. Another finding is that averaging with APs that have double the height or frequency will not improve the RSS distance variation.

接收信号强度(RSS)作为一种简单而廉价的信道特征,在定位应用中得到广泛应用。然而,信号强度的快速变化会影响定位精度。通过对具有多个频率和/或高度的接入点(AP)进行平均,本文提出了一种降低 RSS 波动的新方法。研究最初侧重于平面-地面损耗模型,后来扩展到模拟多径室内传播场景。我们使用光线跟踪软件来模拟室内传播情况。这项研究考虑了三种不同的 RSS 平均方法的结果:高度平均法、频率平均法和频率与高度(FH)混合平均法,后者将两者结合在一起。我们发现,在我们研究的两种设置中,纯高度策略大大减少了 RSS 随距离的变化。使用纯频率方法甚至进一步减少了变化。使用混合 FH 技术则大大提高了效果。平均方法和无差异的理想情况下的均方根误差值分别为 4.427 dB、3.70 dB 和 3.5 dB。另一个发现是,使用双倍高度或频率的无线接入点进行平均不会改善 RSS 距离变化。
{"title":"Reduction of the received signal strength variation with distance using averaging over multiple heights and frequencies","authors":"Huthaifa Obeidat, Mohammed Al-Sadoon, Chemseddine Zebiri, Omar Obeidat, Issa Elfergani, Raed Abd-Alhameed","doi":"10.1007/s11235-024-01120-x","DOIUrl":"https://doi.org/10.1007/s11235-024-01120-x","url":null,"abstract":"<p>As a simple and inexpensive channel characteristic, received signal strength (RSS) finds extensive usage in localization applications. However, the quick changes in signal strength impact the localization precision. By averaging over access points (APs) with multiple frequencies and/or heights, this article suggests a novel approach to lowering RSS fluctuation. Initially focused on the plane-earth loss model, the study was later extended to include a multipath indoor propagation scenario that was simulated. We used ray-tracing software to model the indoor propagation situation. This research takes into account the results of three distinct methods for averaging RSS: height averaging, frequency averaging, and hybrid frequency and height (FH) averaging, which combines the two. We discovered that the Height-only strategy considerably decreased the RSS variation with distance for both settings we looked at. Using the frequency-only method even further reduced the variation. Using the Hybrid FH technique greatly enhances the results. Root mean square error values of 4.427 dB, 3.70 dB, and 3.5 dB, respectively, are provided for the averaging approaches and the ideal scenario in which no variance occurs. Another finding is that averaging with APs that have double the height or frequency will not improve the RSS distance variation.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"72 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sparsity-aware distributed adaptive filtering with robustness against impulsive noise and low SNR 稀疏感知分布式自适应滤波,对脉冲噪声和低信噪比具有鲁棒性
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-01 DOI: 10.1007/s11235-024-01124-7

Abstract

Distributed inference tasks could be performed by adaptive filtering techniques. Several enhancement strategies for such techniques were proposed, such as sparsity-aware algorithms, coefficients reuse and correntropy-based cost functions in the case of impulsive noise. In this paper, a general framework based on Lagrange multipliers for the derivation of sophisticated algorithms that incorporate most of these improvements is described. A new general identification algorithm is derived as an example of the proposed approach and its performance is assessed in a distributed setting.

摘要 分布式推理任务可以通过自适应滤波技术来完成。针对此类技术提出了若干改进策略,如稀疏感知算法、系数重用以及在脉冲噪声情况下基于熵的成本函数。本文介绍了一个基于拉格朗日乘法器的通用框架,用于推导出包含大多数改进措施的复杂算法。本文以一种新的通用识别算法为例,对其在分布式环境中的性能进行了评估。
{"title":"Sparsity-aware distributed adaptive filtering with robustness against impulsive noise and low SNR","authors":"","doi":"10.1007/s11235-024-01124-7","DOIUrl":"https://doi.org/10.1007/s11235-024-01124-7","url":null,"abstract":"<h3>Abstract</h3> <p>Distributed inference tasks could be performed by adaptive filtering techniques. Several enhancement strategies for such techniques were proposed, such as sparsity-aware algorithms, coefficients reuse and correntropy-based cost functions in the case of impulsive noise. In this paper, a general framework based on Lagrange multipliers for the derivation of sophisticated algorithms that incorporate most of these improvements is described. A new general identification algorithm is derived as an example of the proposed approach and its performance is assessed in a distributed setting. </p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"36 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
6G for intelligent transportation systems: standards, technologies, and challenges 用于智能交通系统的 6G:标准、技术和挑战
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-03-25 DOI: 10.1007/s11235-024-01126-5
Amitkumar V. Jha, Bhargav Appasani, Mohammad S. Khan, Sherali Zeadally, Iyad Katib

The advent of the sixth-generation (6G) wireless communication technology brings forth immense opportunities for enhancing Intelligent Transportation Systems (ITS). We investigate the potential of 6G in revolutionizing transportation systems by analyzing the standards, technologies, and challenges associated with its implementation. Building upon the advancements of 5G, 6G introduces unprecedented capabilities, including ultra-high data rates, ultra-low latency, massive connectivity, and intelligent network orchestration. Leveraging these capabilities, 6G can facilitate seamless connectivity among vehicles, infrastructure, and pedestrians, enabling novel applications such as autonomous driving, smart traffic management, and cooperative collision avoidance. However, realizing the full potential of 6G for ITS entails addressing several challenges, including spectrum allocation, network security, resource management, and interoperability with existing infrastructures. We present a comprehensive overview of the latest developments in 6G standards and technologies, including mmWave communications, terahertz spectrum, visible light communication, Artificial Intelligence, and edge computing, emphasizing their relevance to ITS. We also describe these technologies in the context of ITS. Furthermore, we explore the potential benefits and impacts of 6G on transportation systems, highlighting the opportunities for improved safety, efficiency, and sustainability. Finally, we conclude by discussing the key challenges and research directions that must be addressed to effectively deploy 6G for ITS, thereby paving the way for the next generation of intelligent and connected transportation systems.

第六代(6G)无线通信技术的出现为增强智能交通系统(ITS)带来了巨大的机遇。我们通过分析与 6G 实施相关的标准、技术和挑战,研究 6G 在彻底改变交通系统方面的潜力。在 5G 技术进步的基础上,6G 引入了前所未有的功能,包括超高数据传输速率、超低延迟、海量连接和智能网络协调。利用这些功能,6G 可以促进车辆、基础设施和行人之间的无缝连接,实现自动驾驶、智能交通管理和协同避免碰撞等新型应用。然而,要充分发挥 6G 在智能交通系统中的潜力,必须解决几个难题,包括频谱分配、网络安全、资源管理以及与现有基础设施的互操作性。我们全面概述了 6G 标准和技术的最新发展,包括毫米波通信、太赫兹频谱、可见光通信、人工智能和边缘计算,并强调了它们与智能交通系统的相关性。我们还介绍了这些技术在智能交通系统中的应用。此外,我们还探讨了 6G 对交通系统的潜在好处和影响,强调了提高安全性、效率和可持续性的机会。最后,我们讨论了为智能交通系统有效部署 6G 必须应对的关键挑战和研究方向,从而为下一代智能互联交通系统铺平道路。
{"title":"6G for intelligent transportation systems: standards, technologies, and challenges","authors":"Amitkumar V. Jha, Bhargav Appasani, Mohammad S. Khan, Sherali Zeadally, Iyad Katib","doi":"10.1007/s11235-024-01126-5","DOIUrl":"https://doi.org/10.1007/s11235-024-01126-5","url":null,"abstract":"<p>The advent of the sixth-generation (6G) wireless communication technology brings forth immense opportunities for enhancing Intelligent Transportation Systems (ITS). We investigate the potential of 6G in revolutionizing transportation systems by analyzing the standards, technologies, and challenges associated with its implementation. Building upon the advancements of 5G, 6G introduces unprecedented capabilities, including ultra-high data rates, ultra-low latency, massive connectivity, and intelligent network orchestration. Leveraging these capabilities, 6G can facilitate seamless connectivity among vehicles, infrastructure, and pedestrians, enabling novel applications such as autonomous driving, smart traffic management, and cooperative collision avoidance. However, realizing the full potential of 6G for ITS entails addressing several challenges, including spectrum allocation, network security, resource management, and interoperability with existing infrastructures. We present a comprehensive overview of the latest developments in 6G standards and technologies, including mmWave communications, terahertz spectrum, visible light communication, Artificial Intelligence, and edge computing, emphasizing their relevance to ITS. We also describe these technologies in the context of ITS. Furthermore, we explore the potential benefits and impacts of 6G on transportation systems, highlighting the opportunities for improved safety, efficiency, and sustainability. Finally, we conclude by discussing the key challenges and research directions that must be addressed to effectively deploy 6G for ITS, thereby paving the way for the next generation of intelligent and connected transportation systems.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"26 4 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140298088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability 具有多陷阱门不可区分性的可持续无证书认证可搜索加密技术
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-03-20 DOI: 10.1007/s11235-024-01121-w

Abstract

Nowadays, users often opt to encrypt their sensitive data before outsourcing it to the cloud. While this encryption ensures data privacy, it compromises the search functionality. Public key encryption with keyword search (PEKS) has been posited as a potential solution to this challenge. However, many PEKS schemes are either inefficient or vulnerable to various types of attacks, such as inside keyword guessing attacks, outside keyword guessing attacks, etc. In response, we introduce a sustainable certificateless authenticated encryption system with a keyword search scheme. To the best of our knowledge, this proposed scheme is the first to consider multi-trapdoor indistinguishability within the certificateless primitive. Furthermore, our in-depth security analysis indicates that our scheme effectively protects against both online and offline keyword guessing attacksAdditionally, it ensures semantic security by offering both ciphertext indistinguishability and multi-trapdoor indistinguishability. Performance analysis results also suggest that our scheme is efficient and superior to existing alternatives.

摘要 如今,用户通常会选择在将敏感数据外包给云之前对其进行加密。这种加密方法虽然能确保数据隐私,但却损害了搜索功能。带关键字搜索的公钥加密(PEKS)被认为是应对这一挑战的潜在解决方案。然而,许多 PEKS 方案要么效率低下,要么容易受到各种类型的攻击,如内部关键词猜测攻击、外部关键词猜测攻击等。为此,我们引入了一种具有关键字搜索方案的可持续无证书认证加密系统。据我们所知,所提出的这一方案是第一个在无证书基元中考虑多陷阱门不可区分性的方案。此外,通过提供密文不可区分性和多陷阱门不可区分性,它还确保了语义安全。性能分析结果还表明,我们的方案是高效的,优于现有的替代方案。
{"title":"A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability","authors":"","doi":"10.1007/s11235-024-01121-w","DOIUrl":"https://doi.org/10.1007/s11235-024-01121-w","url":null,"abstract":"<h3>Abstract</h3> <p>Nowadays, users often opt to encrypt their sensitive data before outsourcing it to the cloud. While this encryption ensures data privacy, it compromises the search functionality. Public key encryption with keyword search (PEKS) has been posited as a potential solution to this challenge. However, many PEKS schemes are either inefficient or vulnerable to various types of attacks, such as inside keyword guessing attacks, outside keyword guessing attacks, etc. In response, we introduce a sustainable certificateless authenticated encryption system with a keyword search scheme. To the best of our knowledge, this proposed scheme is the first to consider multi-trapdoor indistinguishability within the certificateless primitive. Furthermore, our in-depth security analysis indicates that our scheme effectively protects against both online and offline keyword guessing attacksAdditionally, it ensures semantic security by offering both ciphertext indistinguishability and multi-trapdoor indistinguishability. Performance analysis results also suggest that our scheme is efficient and superior to existing alternatives.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"25 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140200793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A composite channel hopping algorithm for blind rendezvous in heterogeneous cognitive radio networks 异构认知无线电网络中用于盲会合的复合信道跳频算法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-03-20 DOI: 10.1007/s11235-024-01123-8
Sangeeta Sa, Arunanshu Mahapatro

In cognitive radio networks (CRNs), rendezvous is the vital step prior to the communication between two unlicensed secondary users (SUs), where the SUs hop on the same channel at the same time to establish a link. With the dramatic fall in the cost and size of wireless transceivers, it becomes more reasonable to apply multiple radios to achieve significant improvement in the rendezvous performance. However, most of the existing multiradio rendezvous algorithms are proposed for homogeneous CRNs where all the SUs are equipped with an equal number of radios and do not possess backward compatibility to SU with a single radio. In reality, the CRNs are heterogeneous in nature as SUs may have different numbers of radios. In this paper, a composite CH algorithm is proposed for an asynchronous and heterogeneous network to achieve blind rendezvous with full rendezvous diversity. An SU with m number radios are categorized into three groups those follow different channel hopping (CH) algorithms. The upper bound of the rendezvous latency is being evaluated with a brief theoretical and mathematical analysis. Extensive simulations have conducted for different performance metrics, and the results are compared with the state-of-art algorithms. Overall, the proposed algorithm shows better performance in heterogeneous CRNs.

在认知无线电网络(CRNs)中,会合是两个未授权的次级用户(SUs)之间通信前的重要步骤,SUs 在同一时间跳转到同一信道以建立链接。随着无线收发器成本和尺寸的大幅下降,应用多无线电来显著提高会合性能变得更加合理。然而,现有的多无线电交会算法大多是针对同构 CRN 提出的,在同构 CRN 中,所有 SU 都配备了相同数量的无线电,并且不具备向后兼容单无线电 SU 的能力。在现实中,CRN 是异构的,因为 SU 可能有不同数量的无线电。本文针对异步异构网络提出了一种复合 CH 算法,以实现盲交会和完全交会分集。一个有 m 个无线电设备的 SU 被分为三组,分别采用不同的信道跳频(CH)算法。通过简要的理论和数学分析,对交会延迟的上限进行了评估。针对不同的性能指标进行了大量模拟,并将结果与最先进的算法进行了比较。总体而言,所提出的算法在异构 CRN 中表现出更好的性能。
{"title":"A composite channel hopping algorithm for blind rendezvous in heterogeneous cognitive radio networks","authors":"Sangeeta Sa, Arunanshu Mahapatro","doi":"10.1007/s11235-024-01123-8","DOIUrl":"https://doi.org/10.1007/s11235-024-01123-8","url":null,"abstract":"<p>In cognitive radio networks (CRNs), rendezvous is the vital step prior to the communication between two unlicensed secondary users (SUs), where the SUs hop on the same channel at the same time to establish a link. With the dramatic fall in the cost and size of wireless transceivers, it becomes more reasonable to apply multiple radios to achieve significant improvement in the rendezvous performance. However, most of the existing multiradio rendezvous algorithms are proposed for homogeneous CRNs where all the SUs are equipped with an equal number of radios and do not possess backward compatibility to SU with a single radio. In reality, the CRNs are heterogeneous in nature as SUs may have different numbers of radios. In this paper, a composite CH algorithm is proposed for an asynchronous and heterogeneous network to achieve blind rendezvous with full rendezvous diversity. An SU with <i>m</i> number radios are categorized into three groups those follow different channel hopping (CH) algorithms. The upper bound of the rendezvous latency is being evaluated with a brief theoretical and mathematical analysis. Extensive simulations have conducted for different performance metrics, and the results are compared with the state-of-art algorithms. Overall, the proposed algorithm shows better performance in heterogeneous CRNs.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"30 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140201088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Telecommunication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1