Ling Tan, Lei Sun, Boyuan Cao, Jingming Xia, Hai Xu
This article investigates a mobile edge computing (MEC) network assisted by multiple unmanned aerial vehicles (UAVs) to address the computational and offloading requirements for mobile intelligent terminals (MITs) within crowded venues. The objective is to tackle intricate task processing and diminish MITs' waiting times. Considering the randomness of task arrival at the MITs and the imbalance between the amount of data and computation for complex tasks, a dual-queue model with data cache queue and computation queue is proposed, with minimizing the weighted system total energy consumption and average delay as the optimization objectives. Lyapunov optimization theory is employed to convert the stochastic optimization problem into a deterministic one, and the initial deployment quantity and hovering position of the UAVs are determined by the density-based spatial clustering of applications with noise (DBSCAN) method with noise. Then PPO algorithm for MIT task, resource allocation, and UAV trajectory optimization. Numerical results display the proposed scheme can efficaciously diminish energy consumption and delay by 10% and 33% respectively, compared with the baseline scheme. This paper proposes a practical and feasible solution for stochastic computing offloading in UAV-assisted MEC, which fills the gap in existing research on regarding the consideration of complex task imbalances.
本文研究了由多架无人飞行器(UAV)辅助的移动边缘计算(MEC)网络,以满足拥挤场所内移动智能终端(MIT)的计算和卸载需求。其目标是处理复杂的任务并缩短移动智能终端的等待时间。考虑到任务到达 MIT 的随机性以及复杂任务的数据量和计算量之间的不平衡,提出了一个包含数据缓存队列和计算队列的双队列模型,并以最小化加权系统总能耗和平均延迟为优化目标。利用李亚普诺夫优化理论将随机优化问题转化为确定优化问题,并通过带噪声的基于密度的应用空间聚类(DBSCAN)方法确定无人机的初始部署数量和悬停位置。然后采用 PPO 算法进行 MIT 任务、资源分配和无人机轨迹优化。数值结果表明,与基线方案相比,所提出的方案能有效减少 10%的能耗和 33%的延迟。本文为无人机辅助飞行任务控制(MEC)中的随机计算卸载提出了一种切实可行的解决方案,填补了现有研究在考虑复杂任务不平衡方面的空白。
{"title":"Research on weighted energy consumption and delay optimization algorithm based on dual-queue model","authors":"Ling Tan, Lei Sun, Boyuan Cao, Jingming Xia, Hai Xu","doi":"10.1049/cmu2.12710","DOIUrl":"10.1049/cmu2.12710","url":null,"abstract":"<p>This article investigates a mobile edge computing (MEC) network assisted by multiple unmanned aerial vehicles (UAVs) to address the computational and offloading requirements for mobile intelligent terminals (MITs) within crowded venues. The objective is to tackle intricate task processing and diminish MITs' waiting times. Considering the randomness of task arrival at the MITs and the imbalance between the amount of data and computation for complex tasks, a dual-queue model with data cache queue and computation queue is proposed, with minimizing the weighted system total energy consumption and average delay as the optimization objectives. Lyapunov optimization theory is employed to convert the stochastic optimization problem into a deterministic one, and the initial deployment quantity and hovering position of the UAVs are determined by the density-based spatial clustering of applications with noise (DBSCAN) method with noise. Then PPO algorithm for MIT task, resource allocation, and UAV trajectory optimization. Numerical results display the proposed scheme can efficaciously diminish energy consumption and delay by 10% and 33% respectively, compared with the baseline scheme. This paper proposes a practical and feasible solution for stochastic computing offloading in UAV-assisted MEC, which fills the gap in existing research on regarding the consideration of complex task imbalances.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 1","pages":"81-95"},"PeriodicalIF":1.6,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12710","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139159701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xin Ma, Kai Yang, Chuanzhen Zhang, Hualing Li, Xin Zheng
With the continuous development of wireless communication and artificial intelligence technology, Internet of Things (IoT) technology has made great progress. Deep learning methods are currently used in IoT technology, but deep neural networks (DNNs) are notoriously susceptible to adversarial examples, and subtle pixel changes to images can result in incorrect recognition results from DNNs. In the real-world application, the patches generated by the recent physical attack methods are larger or less realistic and easily detectable. To address this problem, a Generative Adversarial Network based on Visual attention model and Style transfer network (GAN-VS) is proposed, which reduces the patch area and makes the patch more natural and less noticeable. A visual attention model combined with generative adversarial network is introduced to detect the critical regions of image recognition, and only generate patches within the critical regions to reduce patch area and improve attack efficiency. For any type of seed patch, an adversarial patch can be generated with a high degree of stylistic and content similarity to the attacked image by generative adversarial network and style transfer network. Experimental evaluation shows that the proposed GAN-VS has good camouflage and outperforms state-of-the-art adversarial patch attack methods.
{"title":"Physical adversarial attack in artificial intelligence of things","authors":"Xin Ma, Kai Yang, Chuanzhen Zhang, Hualing Li, Xin Zheng","doi":"10.1049/cmu2.12714","DOIUrl":"10.1049/cmu2.12714","url":null,"abstract":"<p>With the continuous development of wireless communication and artificial intelligence technology, Internet of Things (IoT) technology has made great progress. Deep learning methods are currently used in IoT technology, but deep neural networks (DNNs) are notoriously susceptible to adversarial examples, and subtle pixel changes to images can result in incorrect recognition results from DNNs. In the real-world application, the patches generated by the recent physical attack methods are larger or less realistic and easily detectable. To address this problem, a Generative Adversarial Network based on Visual attention model and Style transfer network (GAN-VS) is proposed, which reduces the patch area and makes the patch more natural and less noticeable. A visual attention model combined with generative adversarial network is introduced to detect the critical regions of image recognition, and only generate patches within the critical regions to reduce patch area and improve attack efficiency. For any type of seed patch, an adversarial patch can be generated with a high degree of stylistic and content similarity to the attacked image by generative adversarial network and style transfer network. Experimental evaluation shows that the proposed GAN-VS has good camouflage and outperforms state-of-the-art adversarial patch attack methods.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 6","pages":"375-385"},"PeriodicalIF":1.6,"publicationDate":"2023-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12714","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139166048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Time-sensitive networking (TSN) is considered one of the most promising solutions to address real-time scheduling in in-vehicle network due to its capabilities for providing deterministic service. The TSN working group proposed various traffic shaping mechanisms, while deterministic scheduling of hybrid traffic is still not effectively solved since the traffic requirements are difficult to satisfy by standalone or combined mechanisms with fixed time slot divisions. This article presents a time-aware multi-cyclicqueuing and forwarding scheduling model, that integrates the no-wait enabled time-aware shaper and multi-cyclic queuing and forwarding shaping models. Then, a scheduling solution, dubbed “TSN scheduling optimizer” (TSO) is proposed that combines optimization methods and incremental techniques. TSO aims to balance the load to maximize flow schedulability while guaranteeing the service requirements of hybrid traffic. Simulation evaluations through OMNeT++ provide a performance assessment of this proposed scheduling model, which can satisfy multiple types of traffic transmission requirements. Furthermore, TSO is compared with other baseline scheduling solutions, and TSO shows efficacy regarding execution time and schedulability.
{"title":"Hybrid traffic scheduling in time-sensitive networking for the support of automotive applications","authors":"Hongrui Nie, Yue Su, Weibo Zhao, Junsheng Mu","doi":"10.1049/cmu2.12713","DOIUrl":"10.1049/cmu2.12713","url":null,"abstract":"<p>Time-sensitive networking (TSN) is considered one of the most promising solutions to address real-time scheduling in in-vehicle network due to its capabilities for providing deterministic service. The TSN working group proposed various traffic shaping mechanisms, while deterministic scheduling of hybrid traffic is still not effectively solved since the traffic requirements are difficult to satisfy by standalone or combined mechanisms with fixed time slot divisions. This article presents a time-aware multi-cyclicqueuing and forwarding scheduling model, that integrates the no-wait enabled time-aware shaper and multi-cyclic queuing and forwarding shaping models. Then, a scheduling solution, dubbed “TSN scheduling optimizer” (TSO) is proposed that combines optimization methods and incremental techniques. TSO aims to balance the load to maximize flow schedulability while guaranteeing the service requirements of hybrid traffic. Simulation evaluations through OMNeT++ provide a performance assessment of this proposed scheduling model, which can satisfy multiple types of traffic transmission requirements. Furthermore, TSO is compared with other baseline scheduling solutions, and TSO shows efficacy regarding execution time and schedulability.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 2","pages":"111-128"},"PeriodicalIF":1.6,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12713","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138950620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a novel machine learning (ML) assisted low-latency low density parity check (LDPC) coded adaptive modulation (AM) system, where short block-length LDPC codes are used. Conventional adaptive modulation and coding (AMC) system includes fixed look-up table method, which is also called inner loop link adaptation (ILLA) and outer loop link adaptation (OLLA). For ILLA, the adaptive capability is achieved by switching the modulation and coding modes based on a look-up table using signal-to-noise ratio (SNR) thresholds at the target bit error rate (BER), while OLLA builds upon the ILLA method by dynamically adjusting the SNR thresholds to further optimize the system performance. Although both improve the system overall throughput by switching between different transmission modes, there is still a gap to optimal performance as the BER is comparatively far away from the target BER. Machine learning (ML) is a promising solution in solving various classification problems. In this work, the supervised learning based k-nearest neighbours (KNN) algorithm is invoked for choosing the optimum transmission mode based on the training data and the instantaneous SNR. This work focuses on the low-latency communications scenarios, where short block-length LDPC codes are utilized. On the other hand, given the short block-length constraint, we propose to artificially generate the training data to train our ML assisted AMC scheme. The simulation results show that the proposed ML-LDPC-AMC scheme can achieve a higher throughput than the ILLA system while maintaining the target BER. Compared with OLLA, the proposed scheme can maintain the target BER while the OLLA fails to maintain the target BER when the block length is short. In addition, when considering the channel estimation errors, the performance of the proposed ML-LDPC-AMC maintains the target BER, while the ILLA system's BER performance can be higher than the target BER.
本文提出了一种新型机器学习(ML)辅助低延迟低密度奇偶校验(LDPC)编码自适应调制(AMC)系统,其中使用了短块长 LDPC 编码。传统的自适应调制和编码(AMC)系统包括固定查找表方法,也称为内环链路自适应(ILLA)和外环链路自适应(OLLA)。对于 ILLA,自适应能力是通过在目标误码率(BER)下使用信噪比(SNR)阈值,根据查找表切换调制和编码模式来实现的;而 OLLA 则是在 ILLA 方法的基础上,通过动态调整信噪比阈值来进一步优化系统性能。虽然这两种方法都能通过在不同传输模式之间切换来提高系统的总体吞吐量,但由于误码率与目标误码率相差较远,因此离最佳性能仍有差距。在解决各种分类问题时,机器学习(ML)是一种很有前途的解决方案。本研究采用基于监督学习的 k-nearest neighbours (KNN) 算法,根据训练数据和瞬时信噪比选择最佳传输模式。这项工作的重点是低延迟通信场景,即使用短块长 LDPC 代码。另一方面,鉴于短块长度的限制,我们建议人为生成训练数据来训练我们的 ML 辅助 AMC 方案。仿真结果表明,所提出的 ML-LDPC-AMC 方案能在保持目标误码率的情况下实现比 ILLA 系统更高的吞吐量。与 OLLA 相比,所提出的方案可以保持目标误码率,而当块长度较短时,OLLA 则无法保持目标误码率。此外,当考虑到信道估计误差时,所提出的 ML-LDPC-AMC 性能能保持目标误码率,而 ILLA 系统的误码率性能会高于目标误码率。
{"title":"Machine learning assisted adaptive LDPC coded system design and analysis","authors":"Cong Xie, Mohammed El-Hajjar, Soon Xin Ng","doi":"10.1049/cmu2.12707","DOIUrl":"10.1049/cmu2.12707","url":null,"abstract":"<p>This paper proposes a novel machine learning (ML) assisted low-latency low density parity check (LDPC) coded adaptive modulation (AM) system, where short block-length LDPC codes are used. Conventional adaptive modulation and coding (AMC) system includes fixed look-up table method, which is also called inner loop link adaptation (ILLA) and outer loop link adaptation (OLLA). For ILLA, the adaptive capability is achieved by switching the modulation and coding modes based on a look-up table using signal-to-noise ratio (SNR) thresholds at the target bit error rate (BER), while OLLA builds upon the ILLA method by dynamically adjusting the SNR thresholds to further optimize the system performance. Although both improve the system overall throughput by switching between different transmission modes, there is still a gap to optimal performance as the BER is comparatively far away from the target BER. Machine learning (ML) is a promising solution in solving various classification problems. In this work, the supervised learning based k-nearest neighbours (KNN) algorithm is invoked for choosing the optimum transmission mode based on the training data and the instantaneous SNR. This work focuses on the low-latency communications scenarios, where short block-length LDPC codes are utilized. On the other hand, given the short block-length constraint, we propose to artificially generate the training data to train our ML assisted AMC scheme. The simulation results show that the proposed ML-LDPC-AMC scheme can achieve a higher throughput than the ILLA system while maintaining the target BER. Compared with OLLA, the proposed scheme can maintain the target BER while the OLLA fails to maintain the target BER when the block length is short. In addition, when considering the channel estimation errors, the performance of the proposed ML-LDPC-AMC maintains the target BER, while the ILLA system's BER performance can be higher than the target BER.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 1","pages":"1-10"},"PeriodicalIF":1.6,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12707","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138959001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Scene risk identification is essential for the traffic safety of Internet of Vehicles. However, the performance of existing risk identification approaches is heavily limited by the imbalanced historical data and the poor model interpretability. Meanwhile, the large processing delay and the potential privacy leakage threat also restrict their application. In this paper, a novel risk identification model is proposed that leverages the synthetic minority over‐sampling technique nearest neighbor (SMOTEENN) method to balance between high‐risk and low‐risk data. The risk identification model has fine interpretability by using recursive feature elimination cross validation (RFECV) with the Shapley additive explanation (SHAP) to analyze the importance of different features, and further elaborately design the Focal Loss function to tackle the disparity between the difficult and easy sample learning. The proposed interpretability scene risk identification framework, named iScene, is built on the infrastructure of 6G space‐air‐ground integrated networks (SAGINs) with blockchain assistance. The model updata efficiency and privacy preservation are effectively enhanced. An elastic computing offloading algorithm is applied to minimize the system overhead under the hierarchical edge service architecture. The experimental evaluation is carried out to verify the effectiveness of the proposed risk identification framework. The results indicate that the G‐Mean value is increased by 23.4%, while the task average response delay is reduced by 21.2%, compared to that in the traditional risk identification approaches with local computing services.
{"title":"iScene: An interpretable framework with hierarchical edge services for scene risk identification in 6G internet of vehicles","authors":"Wuchang Zhong, Siming Wang, Rong Yu","doi":"10.1049/cmu2.12704","DOIUrl":"https://doi.org/10.1049/cmu2.12704","url":null,"abstract":"Scene risk identification is essential for the traffic safety of Internet of Vehicles. However, the performance of existing risk identification approaches is heavily limited by the imbalanced historical data and the poor model interpretability. Meanwhile, the large processing delay and the potential privacy leakage threat also restrict their application. In this paper, a novel risk identification model is proposed that leverages the synthetic minority over‐sampling technique nearest neighbor (SMOTEENN) method to balance between high‐risk and low‐risk data. The risk identification model has fine interpretability by using recursive feature elimination cross validation (RFECV) with the Shapley additive explanation (SHAP) to analyze the importance of different features, and further elaborately design the Focal Loss function to tackle the disparity between the difficult and easy sample learning. The proposed interpretability scene risk identification framework, named iScene, is built on the infrastructure of 6G space‐air‐ground integrated networks (SAGINs) with blockchain assistance. The model updata efficiency and privacy preservation are effectively enhanced. An elastic computing offloading algorithm is applied to minimize the system overhead under the hierarchical edge service architecture. The experimental evaluation is carried out to verify the effectiveness of the proposed risk identification framework. The results indicate that the G‐Mean value is increased by 23.4%, while the task average response delay is reduced by 21.2%, compared to that in the traditional risk identification approaches with local computing services.","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":" 48","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138961719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile edge computing (MEC) has risen as an effective approach to support ubiquitous and prosperous mobile applications. Due to the strict delay requirements and the increasingly complex application environments, the computation efficiency and security have become the bottleneck that restricts the MEC system. Here, a blockchain‐enabled task offloading scheme is proposed, where the sensitive computation tasks of user terminals (UTs) can be offloaded to a blockchain‐assisted base station (BS). The MEC‐assisted BS helps UTs compute tasks while the blockchain consensus protocol ensures the security of the task offloading and computing process. To manage the allocation of computing resources between task offloading and blockchain consensus, the task offloading and resource allocation are formulated as a joint optimization problem. The aim of the problem is to minimize the energy consumption of UTs while guaranteeing the delay requirement. By transforming the original problem into a Markov decision process, a collective reinforcement learning algorithm is proposed to solve the problem in an online fashion. In the simulations, the convergence and the performance of the proposed scheme are evaluated. The simulation results show the effectiveness of the scheme.
移动边缘计算(MEC)已成为支持无处不在、日益繁荣的移动应用的有效方法。由于严格的延迟要求和日益复杂的应用环境,计算效率和安全性成为制约移动边缘计算系统的瓶颈。本文提出了一种区块链任务卸载方案,即把用户终端(UT)的敏感计算任务卸载到区块链辅助基站(BS)。MEC 辅助基站帮助 UT 计算任务,而区块链共识协议则确保任务卸载和计算过程的安全性。为了管理任务卸载和区块链共识之间的计算资源分配,任务卸载和资源分配被表述为一个联合优化问题。该问题的目的是在保证延迟要求的前提下最大限度地降低 UT 的能耗。通过将原始问题转化为马尔可夫决策过程,提出了一种集体强化学习算法来在线解决该问题。在仿真中,对所提方案的收敛性和性能进行了评估。仿真结果表明了该方案的有效性。
{"title":"Task offloading and resource allocation for blockchain‐enabled mobile edge computing","authors":"Renbin Fang, Peng Lin, Yize Liu, Yan Liu","doi":"10.1049/cmu2.12703","DOIUrl":"https://doi.org/10.1049/cmu2.12703","url":null,"abstract":"Mobile edge computing (MEC) has risen as an effective approach to support ubiquitous and prosperous mobile applications. Due to the strict delay requirements and the increasingly complex application environments, the computation efficiency and security have become the bottleneck that restricts the MEC system. Here, a blockchain‐enabled task offloading scheme is proposed, where the sensitive computation tasks of user terminals (UTs) can be offloaded to a blockchain‐assisted base station (BS). The MEC‐assisted BS helps UTs compute tasks while the blockchain consensus protocol ensures the security of the task offloading and computing process. To manage the allocation of computing resources between task offloading and blockchain consensus, the task offloading and resource allocation are formulated as a joint optimization problem. The aim of the problem is to minimize the energy consumption of UTs while guaranteeing the delay requirement. By transforming the original problem into a Markov decision process, a collective reinforcement learning algorithm is proposed to solve the problem in an online fashion. In the simulations, the convergence and the performance of the proposed scheme are evaluated. The simulation results show the effectiveness of the scheme.","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":" 22","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138962603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed S. Elbasheir, Rashid A. Saeed, Salaheldin Edam
Mobile networks are expanding quickly as a result of significant advancements in wireless technologies and solutions, especially with the recent introduction of the Fifth Generation New Radio. The growth in mobile networks requires the installation of massive numbers of base stations that bring concerns about increasing overall electromagnetic field (EMF) radiation exposure levels. The International Commission on Non-Ionizing Radiation Protection (ICNIRP) has published guidelines that have been adopted by many regulators in many countries to control the overall radiation emitted from EMF transmitters. This paper studies the compliance boundary for a single site operating with multiple technologies including from the second generation (2G) to 5G colocated in the same site. The analysis is performed using a typical site configuration setup for the boundary calculations in the form of the Compliance Distance (CD). The calculation uses the power reduction factor and system load for more realistic results, and in situ measurements are conducted to validate the calculation's formula. The study also investigated the CD for four types of sites, macro, micro, small cell, and indoor sites. Additionally, the study analyzed the power densities (PDs) and total exposure ratio (TER) for the general public and occupational workers at each site. The results show that CD has shorter distances when the power factor is considered, and 5G makes the highest contribution to the TER at the CD in the main directions of the antenna.
由于无线技术和解决方案的显著进步,特别是最近第五代新无线电的推出,移动网络正在迅速扩展。移动网络的发展需要安装大量的基站,而这些基站会增加整体电磁场(EMF)辐射水平。国际非电离辐射防护委员会(ICNIRP)发布了指导方针,被许多国家的监管机构采用,以控制电磁场发射器的总体辐射量。本文研究了在同一地点运行多种技术(包括从第二代(2G)到 5G 的多种技术)的单一站点的合规边界。分析采用典型的站点配置设置,以合规距离(CD)的形式进行边界计算。计算中使用了功率降低系数和系统负载,以获得更真实的结果,并进行了现场测量以验证计算公式。研究还调查了宏基站、微基站、小基站和室内基站四种类型基站的 CD。此外,研究还分析了每个地点的普通公众和职业工人的功率密度 (PD) 和总暴露比 (TER)。结果表明,考虑到功率因数,CD 的距离更短,而 5G 对天线主要方向上 CD 的 TER 贡献最大。
{"title":"Electromagnetic field exposure boundary analysis at the near field for multi-technology cellular base station site","authors":"Mohammed S. Elbasheir, Rashid A. Saeed, Salaheldin Edam","doi":"10.1049/cmu2.12711","DOIUrl":"10.1049/cmu2.12711","url":null,"abstract":"<p>Mobile networks are expanding quickly as a result of significant advancements in wireless technologies and solutions, especially with the recent introduction of the Fifth Generation New Radio. The growth in mobile networks requires the installation of massive numbers of base stations that bring concerns about increasing overall electromagnetic field (EMF) radiation exposure levels. The International Commission on Non-Ionizing Radiation Protection (ICNIRP) has published guidelines that have been adopted by many regulators in many countries to control the overall radiation emitted from EMF transmitters. This paper studies the compliance boundary for a single site operating with multiple technologies including from the second generation (2G) to 5G colocated in the same site. The analysis is performed using a typical site configuration setup for the boundary calculations in the form of the Compliance Distance (CD). The calculation uses the power reduction factor and system load for more realistic results, and in situ measurements are conducted to validate the calculation's formula. The study also investigated the CD for four types of sites, macro, micro, small cell, and indoor sites. Additionally, the study analyzed the power densities (PDs) and total exposure ratio (TER) for the general public and occupational workers at each site. The results show that CD has shorter distances when the power factor is considered, and 5G makes the highest contribution to the TER at the CD in the main directions of the antenna.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 1","pages":"11-27"},"PeriodicalIF":1.6,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12711","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138965015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As a key component of high-performance switches and routers, the packet forwarding engine (PFE) is mainly responsible for selecting the appropriate output port for tens of thousands of packets within an extremely short time frame. However, the performance of PFE is determined by the selected group membership algorithm. This paper puts forth a hybrid strategy–caching scalar-pair and vectors routing and forwarding (CSVRF), consisting of virtual output port bitmap caching (VOPBC) and fractional-N SVRF to address major multicast forwarding issues such as scalability by using content addressable memory. In CSVRF, a virtual output port bitmap cache is introduced, which includes the most popular combinations of output port bitmap and divides the big scalar-pair into N sub-groups to achieve parallel compute and the reusability of less bit-length prime. The results demonstrate that the memory space and the forwarding latency are effectively reduced compared with previous work. In space efficiency, it only required 10% memory space compared with the original SVRF/fractional-N SVRF, decreased 10% memory usage compared with pure VOPBC and nearly improved 1 to 4 orders of magnitude of packet processing time compared with the original SVRF and the fractional-N SVRF respectively.
{"title":"CSVRF: A CAM-based popularity-aware egress group-caching scheme for SVRF-based packet forward engines","authors":"Ruisi Wu, Wen-Kang Jia","doi":"10.1049/cmu2.12701","DOIUrl":"10.1049/cmu2.12701","url":null,"abstract":"<p>As a key component of high-performance switches and routers, the packet forwarding engine (PFE) is mainly responsible for selecting the appropriate output port for tens of thousands of packets within an extremely short time frame. However, the performance of PFE is determined by the selected group membership algorithm. This paper puts forth a hybrid strategy–caching scalar-pair and vectors routing and forwarding (CSVRF), consisting of virtual output port bitmap caching (VOPBC) and fractional-<i>N</i> SVRF to address major multicast forwarding issues such as scalability by using content addressable memory. In CSVRF, a virtual output port bitmap cache is introduced, which includes the most popular combinations of output port bitmap and divides the big scalar-pair into <i>N</i> sub-groups to achieve parallel compute and the reusability of less bit-length prime. The results demonstrate that the memory space and the forwarding latency are effectively reduced compared with previous work. In space efficiency, it only required 10% memory space compared with the original SVRF/fractional-<i>N</i> SVRF, decreased 10% memory usage compared with pure VOPBC and nearly improved 1 to 4 orders of magnitude of packet processing time compared with the original SVRF and the fractional-<i>N</i> SVRF respectively.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 1","pages":"40-54"},"PeriodicalIF":1.6,"publicationDate":"2023-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12701","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138966292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile edge computing as an emerging technique can provide services for mobile terminals, and meanwhile the mobility of users brings new challenges. When a user moves across different areas, the system needs to determine whether to migrate service so as to guarantee quality of experience for the user. However, it is difficult to obtain the optimal migration policy in real time due to the huge state space. Considering delay-sensitive data-intensive applications run by mobile terminals with limited battery power, an efficient service migration policy should be able to make a good tradeoff among service cost, service delay and terminal energy consumption. Here, an online Monte Carlo-based service migration (MCSM) policy is proposed to minimize service cost under constraints of deadline and terminal energy consumption. A penalty mechanism is designed to update reward when partial or all constraints are not meet. State-action value estimation and policy improvement are triggered only on the completion of each episode. Each episode is traversed reversely to calculate the average cumulative reward so as to improve policy. Experimental results show that the proposed approach can improve service success ratio and reduce average service cost compared to the existing service migration policies.
{"title":"Monte Carlo-based service migration under multiple constraints in mobile edge computing","authors":"Qiang Zhang, Hao Yu","doi":"10.1049/cmu2.12705","DOIUrl":"10.1049/cmu2.12705","url":null,"abstract":"<p>Mobile edge computing as an emerging technique can provide services for mobile terminals, and meanwhile the mobility of users brings new challenges. When a user moves across different areas, the system needs to determine whether to migrate service so as to guarantee quality of experience for the user. However, it is difficult to obtain the optimal migration policy in real time due to the huge state space. Considering delay-sensitive data-intensive applications run by mobile terminals with limited battery power, an efficient service migration policy should be able to make a good tradeoff among service cost, service delay and terminal energy consumption. Here, an online Monte Carlo-based service migration (MCSM) policy is proposed to minimize service cost under constraints of deadline and terminal energy consumption. A penalty mechanism is designed to update reward when partial or all constraints are not meet. State-action value estimation and policy improvement are triggered only on the completion of each episode. Each episode is traversed reversely to calculate the average cumulative reward so as to improve policy. Experimental results show that the proposed approach can improve service success ratio and reduce average service cost compared to the existing service migration policies.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 1","pages":"28-39"},"PeriodicalIF":1.6,"publicationDate":"2023-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12705","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138966577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to solve the security problems caused by malicious nodes in wireless sensor networks, a TS-BRS reputation model based on time series analysis is proposed in this paper. By using the time series analysis method, the matching analysis of two time series is carried out to reduce the interference of channel conflicts on the reputation evaluation model and improve the accuracy of model recognition. In order to improve the adaptability of the evaluation model, the adaptive maintenance function μ is introduced into the update of credit value, which aggravates the influence of node behaviour on credit value at the present stage. The simulation results show that the new reputation evaluation model can effectively improve the detection rate and detection speed of malicious nodes in the network. After the introduction of maintenance function, the reputation value of the captured malicious nodes in the network has a faster convergence speed.
{"title":"Wireless sensor network security defense strategy based on Bayesian reputation evaluation model","authors":"Zhijun Teng, Sian Zhu, Mingzhe Li, Libo Yu, Jinliang Gu, Liwen Guo","doi":"10.1049/cmu2.12700","DOIUrl":"10.1049/cmu2.12700","url":null,"abstract":"<p>In order to solve the security problems caused by malicious nodes in wireless sensor networks, a TS-BRS reputation model based on time series analysis is proposed in this paper. By using the time series analysis method, the matching analysis of two time series is carried out to reduce the interference of channel conflicts on the reputation evaluation model and improve the accuracy of model recognition. In order to improve the adaptability of the evaluation model, the adaptive maintenance function μ is introduced into the update of credit value, which aggravates the influence of node behaviour on credit value at the present stage. The simulation results show that the new reputation evaluation model can effectively improve the detection rate and detection speed of malicious nodes in the network. After the introduction of maintenance function, the reputation value of the captured malicious nodes in the network has a faster convergence speed.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 1","pages":"55-62"},"PeriodicalIF":1.6,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12700","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138972836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}