The emergence of novel AI technologies and increasingly portable wearable devices have introduced a wider range of more liberated avenues for communication and interaction between human and virtual environments. In this context, the expression of distinct emotions and movements by users may convey a variety of meanings. Consequently, an emerging challenge is how to automatically enhance the visual representation of such interactions. Here, a novel Generative Adversarial Network (GAN) based model, AACOGAN, is introduced to tackle this challenge effectively. AACOGAN model establishes a relationship between player interactions, object locations, and camera movements, subsequently generating camera shots that augment player immersion. Experimental results demonstrate that AACOGAN enhances the correlation between player interactions and camera trajectories by an average of 73%, and improves multi-focus scene quality up to 32.9%. Consequently, AACOGAN is established as an efficient and economical solution for generating camera shots appropriate for a wide range of interactive motions. Exemplary video footage can be found at https://youtu.be/Syrwbnpzgx8.
{"title":"Automatic cinematography for body movement involved virtual communication","authors":"Zixiao Yu, Honghong Wang, Kim Un","doi":"10.1049/cmu2.12748","DOIUrl":"10.1049/cmu2.12748","url":null,"abstract":"<p>The emergence of novel AI technologies and increasingly portable wearable devices have introduced a wider range of more liberated avenues for communication and interaction between human and virtual environments. In this context, the expression of distinct emotions and movements by users may convey a variety of meanings. Consequently, an emerging challenge is how to automatically enhance the visual representation of such interactions. Here, a novel Generative Adversarial Network (GAN) based model, AACOGAN, is introduced to tackle this challenge effectively. AACOGAN model establishes a relationship between player interactions, object locations, and camera movements, subsequently generating camera shots that augment player immersion. Experimental results demonstrate that AACOGAN enhances the correlation between player interactions and camera trajectories by an average of 73%, and improves multi-focus scene quality up to 32.9%. Consequently, AACOGAN is established as an efficient and economical solution for generating camera shots appropriate for a wide range of interactive motions. Exemplary video footage can be found at https://youtu.be/Syrwbnpzgx8.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 5","pages":"344-352"},"PeriodicalIF":1.6,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12748","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140224080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qingqing Tu, Zheng Dong, Xianbing Zou, Ning Wei, Ya Li, Fei Xu
In next-generation wireless communications, reconfigurable intelligent surface (RIS) has emerged as a cost-effective technique for enhancing physical layer security (PLS) in millimeter-wave (mmWave) communications, especially under challenging scenarios with adversarial entities and obstructions. However, the primary studies for RIS incorporation in mmWave communication systems utilized static deployments, lacking adaptability and efficiency in complex environments. To address this problem, a dynamic RIS deployment design framework is introduced for PLS enhancement in mmWave systems against jamming and eavesdropping attacks. For the design, it is aimed to maximize the secrecy rate by jointly optimizing the RIS selection with the beamforming design. The resulting optimization problem is challenging to solve due to the coupling of the RIS control factor, joint beamforming design, and non-convex constraints. To tackle these issues, an efficient multi-RIS-aided PLS enhancement algorithm is proposed. It transforms the objective into a series of subproblems and employs the fractional programming technique and prox-linear block coordinate descent updating method to solve them alternatively and obtain the optimal solution. The simulations demonstrate the advantage of the dynamic deployment, which exhibits enhanced security performance with reduced complexity compared with benchmarks. Further examinations also provide insight into optimal RIS activation configurations, achieving optimal balance for securing mmWave communications against emerging threats while maintaining system efficiency.
{"title":"Dynamic reconfigurable intelligent surface deployment for physical layer security enhancement in mmWave systems","authors":"Qingqing Tu, Zheng Dong, Xianbing Zou, Ning Wei, Ya Li, Fei Xu","doi":"10.1049/cmu2.12751","DOIUrl":"10.1049/cmu2.12751","url":null,"abstract":"<p>In next-generation wireless communications, reconfigurable intelligent surface (RIS) has emerged as a cost-effective technique for enhancing physical layer security (PLS) in millimeter-wave (mmWave) communications, especially under challenging scenarios with adversarial entities and obstructions. However, the primary studies for RIS incorporation in mmWave communication systems utilized static deployments, lacking adaptability and efficiency in complex environments. To address this problem, a dynamic RIS deployment design framework is introduced for PLS enhancement in mmWave systems against jamming and eavesdropping attacks. For the design, it is aimed to maximize the secrecy rate by jointly optimizing the RIS selection with the beamforming design. The resulting optimization problem is challenging to solve due to the coupling of the RIS control factor, joint beamforming design, and non-convex constraints. To tackle these issues, an efficient multi-RIS-aided PLS enhancement algorithm is proposed. It transforms the objective into a series of subproblems and employs the fractional programming technique and prox-linear block coordinate descent updating method to solve them alternatively and obtain the optimal solution. The simulations demonstrate the advantage of the dynamic deployment, which exhibits enhanced security performance with reduced complexity compared with benchmarks. Further examinations also provide insight into optimal RIS activation configurations, achieving optimal balance for securing mmWave communications against emerging threats while maintaining system efficiency.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 5","pages":"365-374"},"PeriodicalIF":1.6,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12751","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140239640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Clustering algorithm is the primary technology used in target clustering and group status analysis which are key features of the Unmanned Aerial Vehicles (UAVs) control system. Due to variable application environment, the stability of the algorithm in the UAVs control system needs to be considered. K-means clustering is a widely used method in intelligent systems. However, K-means algorithm is susceptible to the local optimum due to the influence of the initial centroid. For this problem, the predecessors have proposed various effective solutions. These algorithms perform better on real and large-scale datasets, but they are unable to achieve optimum results with unbalanced datasets. Herein, a simpler and more effective algorithm for seed initialization is proposed, it has a better accuracy rate than the alternative algorithms.Moreover, after running tests multiple times with each algorithm independently, it has the highest stability and the lowest overall volatility. With unbalanced datasets, the proposed algorithm performs significantly better than several other algorithms and therefore can solve the problems that other algorithms have with unbalanced datasets.
{"title":"An improved seeds scheme in K-means clustering algorithm for the UAVs control system application","authors":"Qian Bi, Huadong Sun, Cheng Qian, Ke Zhang","doi":"10.1049/cmu2.12746","DOIUrl":"10.1049/cmu2.12746","url":null,"abstract":"<p>Clustering algorithm is the primary technology used in target clustering and group status analysis which are key features of the Unmanned Aerial Vehicles (UAVs) control system. Due to variable application environment, the stability of the algorithm in the UAVs control system needs to be considered. K-means clustering is a widely used method in intelligent systems. However, K-means algorithm is susceptible to the local optimum due to the influence of the initial centroid. For this problem, the predecessors have proposed various effective solutions. These algorithms perform better on real and large-scale datasets, but they are unable to achieve optimum results with unbalanced datasets. Herein, a simpler and more effective algorithm for seed initialization is proposed, it has a better accuracy rate than the alternative algorithms.Moreover, after running tests multiple times with each algorithm independently, it has the highest stability and the lowest overall volatility. With unbalanced datasets, the proposed algorithm performs significantly better than several other algorithms and therefore can solve the problems that other algorithms have with unbalanced datasets.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 7","pages":"437-449"},"PeriodicalIF":1.6,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12746","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140251480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Worker selection is critical to the success of federated learning, but issues such as inadequate incentives and poor-quality data can negatively impact the process. The existing studies have used the multi-weight subjective logic model, but it is vulnerable to malicious evaluation and unfair to newly added nodes. In this paper, the authors propose an improved reputation evaluation algorithm that allows evaluations from different sources to influence each other and reduce the impact of malicious comments. The authors’ approach effectively distinguishes between malicious and honest users and improves worker selection and collaboration in federated learning.
{"title":"Improved reputation evaluation for reliable federated learning on blockchain","authors":"Jiacheng Sui, Yi Li, Hai Huang","doi":"10.1049/cmu2.12743","DOIUrl":"https://doi.org/10.1049/cmu2.12743","url":null,"abstract":"<p>Worker selection is critical to the success of federated learning, but issues such as inadequate incentives and poor-quality data can negatively impact the process. The existing studies have used the multi-weight subjective logic model, but it is vulnerable to malicious evaluation and unfair to newly added nodes. In this paper, the authors propose an improved reputation evaluation algorithm that allows evaluations from different sources to influence each other and reduce the impact of malicious comments. The authors’ approach effectively distinguishes between malicious and honest users and improves worker selection and collaboration in federated learning.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 6","pages":"421-428"},"PeriodicalIF":1.6,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12743","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140546757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Song Han, Hui Ma, Amir Taherkordi, Dapeng Lan, Yange Chen
To solve the security problems of the moving robot system in the fog network of the Industrial Internet of Things (IIoT), this paper presents a privacy-preserving data integration scheme in the moving robot system. First, a novel data collection enhancement algorithm is proposed to enhance the image effects, and a k-anonymous location and data privacy protection protocol based on Ad hoc network (Ad hoc-based KLDPP protocol) is designed in secure data collection phase to protect the privacy of location and network data. Second, the secure multiparty computation with verifiable key sharing is introduced to realize the valid computation against share cheating in the robot system. Third, the ciphertext classification method in a neural network is considered in the secure data storage process to realize the special application. Finally, experiments and simulations are conducted on the robot system of fog computing in the IIoT. The results demonstrate that the proposed scheme can improve the security and efficiency of the said robot system.
{"title":"Privacy-preserving data integration scheme in industrial robot system based on fog computing and edge computing","authors":"Song Han, Hui Ma, Amir Taherkordi, Dapeng Lan, Yange Chen","doi":"10.1049/cmu2.12749","DOIUrl":"10.1049/cmu2.12749","url":null,"abstract":"<p>To solve the security problems of the moving robot system in the fog network of the Industrial Internet of Things (IIoT), this paper presents a privacy-preserving data integration scheme in the moving robot system. First, a novel data collection enhancement algorithm is proposed to enhance the image effects, and a <i>k</i>-anonymous location and data privacy protection protocol based on Ad hoc network (Ad hoc-based KLDPP protocol) is designed in secure data collection phase to protect the privacy of location and network data. Second, the secure multiparty computation with verifiable key sharing is introduced to realize the valid computation against share cheating in the robot system. Third, the ciphertext classification method in a neural network is considered in the secure data storage process to realize the special application. Finally, experiments and simulations are conducted on the robot system of fog computing in the IIoT. The results demonstrate that the proposed scheme can improve the security and efficiency of the said robot system.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 7","pages":"461-476"},"PeriodicalIF":1.6,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12749","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140077533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoxuan Wang, Hengyuan Jiao, Qinghe Gao, Yue Wu, Tao Jing, Jin Qian
Nowadays, the digital development of marine ranching requires a communication system with wide coverage, high transmission rate and stable communication links. It is known that fixed-wing unmanned aerial vehicles (UAVs) have great advantages in long-range applications. They have the potential to serve as low-altitude communication platforms for maritime communication. In this study, with a developmental perspective, considering the intense growth of marine terminals in the future, a new clustering algorithm applied to cluster nonorthogonal multiple access (C-NOMA) is proposed and its advantages are investigated. In addition, considering the limited energy of marine terminals, combining the wireless power communication (WPC) technology for the UAV to charge terminals, the charging and communication time are optimized with the Lagrange multiplier method and the bisection search method. After completing the above optimization content of charging and communication, combined with the optimization results, it is found the trajectory that maximizes the energy efficiency of the UAV with the convex optimization technique. Experimental results show that the proposed clustering algorithm has good throughput performance, better fairness and lower algorithm complexity, and the proposed trajectory optimization scheme has better energy efficiency.
{"title":"Trajectory optimization for maximization of energy efficiency with dynamic cluster and wireless power for UAV-assisted maritime communication","authors":"Xiaoxuan Wang, Hengyuan Jiao, Qinghe Gao, Yue Wu, Tao Jing, Jin Qian","doi":"10.1049/cmu2.12742","DOIUrl":"10.1049/cmu2.12742","url":null,"abstract":"<p>Nowadays, the digital development of marine ranching requires a communication system with wide coverage, high transmission rate and stable communication links. It is known that fixed-wing unmanned aerial vehicles (UAVs) have great advantages in long-range applications. They have the potential to serve as low-altitude communication platforms for maritime communication. In this study, with a developmental perspective, considering the intense growth of marine terminals in the future, a new clustering algorithm applied to cluster nonorthogonal multiple access (C-NOMA) is proposed and its advantages are investigated. In addition, considering the limited energy of marine terminals, combining the wireless power communication (WPC) technology for the UAV to charge terminals, the charging and communication time are optimized with the Lagrange multiplier method and the bisection search method. After completing the above optimization content of charging and communication, combined with the optimization results, it is found the trajectory that maximizes the energy efficiency of the UAV with the convex optimization technique. Experimental results show that the proposed clustering algorithm has good throughput performance, better fairness and lower algorithm complexity, and the proposed trajectory optimization scheme has better energy efficiency.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 6","pages":"409-420"},"PeriodicalIF":1.6,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12742","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140258493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Malicious domains provide malware with covert communication channels which poses a severe threat to cybersecurity. Despite the continuous progress in detecting malicious domains with various machine learning algorithms, maintaining up-to-date various samples with fine-labeled data for training is difficult. To handle these issues and improve the detection accuracy, a novel malicious domain detection method named MDND-SS-PO is proposed that combines semi-supervised learning and parameter optimization. The contributions of the study are as follows. First, the method extracts the statistical features of the IP address, TTL value, the NXDomain record, and the domain name query characteristics to discriminate Domain-Flux and Fast-Flux domain names simultaneously. Second, an improved DBSCAN based on the neighborhood division is designed to cluster labeled data and unlabeled data with low time consumption. Then, based on the clustering hypothesis, unlabeled data is tagged with pseudo-label according to the cluster results, which aims to train a supervised classifier effectively. Finally, Gaussian process regression is used to optimize parameter settings of the algorithm. And the Silhouette index and F1 score are introduced to evaluate the optimization results. Experimental results show that the proposed method achieved a precise detection performance of 0.885 when the ratio of labeled data is 5%.
恶意域为恶意软件提供了隐蔽的通信渠道,对网络安全构成了严重威胁。尽管各种机器学习算法在检测恶意域方面不断取得进展,但保持最新的各种样本和用于训练的精细标记数据却十分困难。为了解决这些问题并提高检测精度,我们提出了一种名为 MDND-SS-PO 的新型恶意域检测方法,该方法结合了半监督学习和参数优化。该研究的贡献如下。首先,该方法提取了 IP 地址、TTL 值、NXDomain 记录和域名查询特征的统计特征,从而同时区分出 Domain-Flux 和 Fast-Flux 域名。其次,设计了一种基于邻域划分的改进型 DBSCAN,以较低的时间消耗对已标记数据和未标记数据进行聚类。然后,基于聚类假设,根据聚类结果对未标记数据进行伪标记,从而有效地训练监督分类器。最后,利用高斯过程回归优化算法参数设置。并引入剪影指数和 F1 分数来评价优化结果。实验结果表明,当标记数据比例为 5%时,所提出的方法达到了 0.885 的精确检测性能。
{"title":"Malicious domain detection based on semi-supervised learning and parameter optimization","authors":"Renjie Liao, Shuo Wang","doi":"10.1049/cmu2.12739","DOIUrl":"10.1049/cmu2.12739","url":null,"abstract":"<p>Malicious domains provide malware with covert communication channels which poses a severe threat to cybersecurity. Despite the continuous progress in detecting malicious domains with various machine learning algorithms, maintaining up-to-date various samples with fine-labeled data for training is difficult. To handle these issues and improve the detection accuracy, a novel malicious domain detection method named MDND-SS-PO is proposed that combines semi-supervised learning and parameter optimization. The contributions of the study are as follows. First, the method extracts the statistical features of the IP address, TTL value, the NXDomain record, and the domain name query characteristics to discriminate Domain-Flux and Fast-Flux domain names simultaneously. Second, an improved DBSCAN based on the neighborhood division is designed to cluster labeled data and unlabeled data with low time consumption. Then, based on the clustering hypothesis, unlabeled data is tagged with pseudo-label according to the cluster results, which aims to train a supervised classifier effectively. Finally, Gaussian process regression is used to optimize parameter settings of the algorithm. And the Silhouette index and F1 score are introduced to evaluate the optimization results. Experimental results show that the proposed method achieved a precise detection performance of 0.885 when the ratio of labeled data is 5%.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 6","pages":"386-397"},"PeriodicalIF":1.6,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12739","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140265465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chao Ren, Gaoxin Lyu, Xianmei Wang, Yao Huang, Wei Li, Lei Sun
The evolution of Artificial Intelligence of Things (AIoT) pushes connectivity from human-to-things and things-to-things, to AI-to-things, has resulted in more complex physical networks and logical associations. This has driven the demand for Internet of Things (IoT) devices with powerful edge data processing capabilities, leading to exponential growth in device quantity and data generation. However, conventional data preprocessing methods, such as data compression and encoding, often require edge devices to allocate computational resources for decoding. Additionally, some lossy compression methods, like JPEG, may result in the loss of important information, which has negative impact on the AI training. To address these challenges, this paper proposes a two-step attribute reduction approach, targeting devices and dimensions, to reduce the massive amount of data in the AIoT network while avoiding unnecessary utilization of edge device resources for decoding. The device-oriented and dimension-oriented attribute reductions identify important devices and dimensions, respectively, to mitigate the multimodal interference caused by the large-scale devices in the AIoT network and the curse of dimensionality associated with high-dimensional AIoT data. Numerical results and analysis show that this approach effectively eliminates redundant devices and numerous dimensions in the AIoT network while maintaining the basic data correlation.
{"title":"Two-step attribute reduction for AIoT networks","authors":"Chao Ren, Gaoxin Lyu, Xianmei Wang, Yao Huang, Wei Li, Lei Sun","doi":"10.1049/cmu2.12747","DOIUrl":"10.1049/cmu2.12747","url":null,"abstract":"<p>The evolution of Artificial Intelligence of Things (AIoT) pushes connectivity from human-to-things and things-to-things, to AI-to-things, has resulted in more complex physical networks and logical associations. This has driven the demand for Internet of Things (IoT) devices with powerful edge data processing capabilities, leading to exponential growth in device quantity and data generation. However, conventional data preprocessing methods, such as data compression and encoding, often require edge devices to allocate computational resources for decoding. Additionally, some lossy compression methods, like JPEG, may result in the loss of important information, which has negative impact on the AI training. To address these challenges, this paper proposes a two-step attribute reduction approach, targeting devices and dimensions, to reduce the massive amount of data in the AIoT network while avoiding unnecessary utilization of edge device resources for decoding. The device-oriented and dimension-oriented attribute reductions identify important devices and dimensions, respectively, to mitigate the multimodal interference caused by the large-scale devices in the AIoT network and the curse of dimensionality associated with high-dimensional AIoT data. Numerical results and analysis show that this approach effectively eliminates redundant devices and numerous dimensions in the AIoT network while maintaining the basic data correlation.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 7","pages":"450-460"},"PeriodicalIF":1.6,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12747","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140079545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multi-user (MU) massive multiple input multiple output (mMIMO) is considered a potential technology for fifth generation (5G) and sixth-generation (6G) wireless systems. The presence of the antenna arrays at the base station level to communicate with the users or to serve tens of single antenna users leads to excessively high system costs and power consumption. The deployment 1-bit digital-to-analogue converters (DACs) in the base station can solve these problems. This paper starts by presenting an analytical study centered on the effects of 1-bit DACs on the system envisaged for a Rayleigh-type fading channel. Compact-form expressions are derived for the symbol error rate. Afterwards, an efficient end-to-end deep learning technique to compensate for the joint effect of 1-bit DAC and imperfect channel state information in downlink mMIMO systems. Moreover, to improve the performance of the considered system, a DAC mixed architecture is proposed, where a number of antennas use 1 bit DACs while the others do not. The simulations results showed the improvement in transmission quality of the downlink of the MU-mMIMO system in the presence of hardware imperfections using the considered end-to-end compensation technique.
{"title":"Analysis one-bit DAC for MU massive MIMO downlink via efficient autoencoder based deep learning","authors":"Ahlem Arfaoui, Maha Cherif, Ridha Bouallegue","doi":"10.1049/cmu2.12750","DOIUrl":"10.1049/cmu2.12750","url":null,"abstract":"<p>Multi-user (MU) massive multiple input multiple output (mMIMO) is considered a potential technology for fifth generation (5G) and sixth-generation (6G) wireless systems. The presence of the antenna arrays at the base station level to communicate with the users or to serve tens of single antenna users leads to excessively high system costs and power consumption. The deployment 1-bit digital-to-analogue converters (DACs) in the base station can solve these problems. This paper starts by presenting an analytical study centered on the effects of 1-bit DACs on the system envisaged for a Rayleigh-type fading channel. Compact-form expressions are derived for the symbol error rate. Afterwards, an efficient end-to-end deep learning technique to compensate for the joint effect of 1-bit DAC and imperfect channel state information in downlink mMIMO systems. Moreover, to improve the performance of the considered system, a DAC mixed architecture is proposed, where a number of antennas use 1 bit DACs while the others do not. The simulations results showed the improvement in transmission quality of the downlink of the MU-mMIMO system in the presence of hardware imperfections using the considered end-to-end compensation technique.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 5","pages":"353-364"},"PeriodicalIF":1.6,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12750","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140265561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wanwei Huang, Haobin Tian, Xiaohui Zhang, Min Huang, Song Li, Yuhua Li
Network function virtualization (NFV) technology deploys network functions as software functions on a generalised hardware platform and provides customised network services in the form of service function chain (SFC), which improves the flexibility and scalability of network services and reduces network service costs. However, irrational resource allocation during service function chain mapping will cause problems such as low resource utilisation, long service request processing time and low mapping rate. To address the unreasonable problem of service mapping resource allocation, an improved service function chain mapping resource allocation method (SA3C) based on the Asynchronous advantageous action evaluation algorithm (A3C) is proposed. This study proposes an SFC mapping model and a mathematical model for joint allocation, which modeled the minimization of processing time as a Markov process. The main network was trained and multiple sub-networks were generated in parallel using the ternary and deep reinforcement learning algorithm A3C, with the goal of identifying the optimal resource allocation strategy. The experimental simulation results show that compared with the Actor-Critic (AC) and Policy Gradient (PG) methods, SA3C algorithm can improve the resource utilisation by 9.85%, reduce the total processing time by 10.72%, and improve the mapping rate by 6.72%, by reasonably allocating node computational resources and link bandwidth communication resources.
{"title":"An improved resource allocation method for mapping service function chains based on A3C","authors":"Wanwei Huang, Haobin Tian, Xiaohui Zhang, Min Huang, Song Li, Yuhua Li","doi":"10.1049/cmu2.12740","DOIUrl":"10.1049/cmu2.12740","url":null,"abstract":"<p>Network function virtualization (NFV) technology deploys network functions as software functions on a generalised hardware platform and provides customised network services in the form of service function chain (SFC), which improves the flexibility and scalability of network services and reduces network service costs. However, irrational resource allocation during service function chain mapping will cause problems such as low resource utilisation, long service request processing time and low mapping rate. To address the unreasonable problem of service mapping resource allocation, an improved service function chain mapping resource allocation method (SA3C) based on the Asynchronous advantageous action evaluation algorithm (A3C) is proposed. This study proposes an SFC mapping model and a mathematical model for joint allocation, which modeled the minimization of processing time as a Markov process. The main network was trained and multiple sub-networks were generated in parallel using the ternary and deep reinforcement learning algorithm A3C, with the goal of identifying the optimal resource allocation strategy. The experimental simulation results show that compared with the Actor-Critic (AC) and Policy Gradient (PG) methods, SA3C algorithm can improve the resource utilisation by 9.85%, reduce the total processing time by 10.72%, and improve the mapping rate by 6.72%, by reasonably allocating node computational resources and link bandwidth communication resources.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 5","pages":"333-343"},"PeriodicalIF":1.6,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12740","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140265861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}