51 research outputs found

    A neural network propagation model for LoRaWAN and critical analysis with real-world measurements

    Get PDF
    Among the many technologies competing for the Internet of Things (IoT), one of the most promising and fast-growing technologies in this landscape is the Low-Power Wide-Area Network (LPWAN). Coverage of LoRa, one of the main IoT LPWAN technologies, has previously been studied for outdoor environments. However, this article focuses on end-to-end propagation in an outdoor–indoor scenario. This article will investigate how the reported and documented outdoor metrics are interpreted for an indoor environment. Furthermore, to facilitate network planning and coverage prediction, a novel hybrid propagation estimation method has been developed and examined. This hybrid model is comprised of an artificial neural network (ANN) and an optimized Multi-Wall Model (MWM). Subsequently, real-world measurements were collected and compared against different propagation models. For benchmarking, log-distance and COST231 models were used due to their simplicity. It was observed and concluded that: (a) the propagation of the LoRa Wide-Area Network (LoRaWAN) is limited to a much shorter range in this investigated environment compared with outdoor reports; (b) log-distance and COST231 models do not yield an accurate estimate of propagation characteristics for outdoor–indoor scenarios; (c) this lack of accuracy can be addressed by adjusting the COST231 model, to account for the outdoor propagation; (d) a feedforward neural network combined with a COST231 model improves the accuracy of the predictions. This work demonstrates practical results and provides an insight into the LoRaWAN’s propagation in similar scenarios. This could facilitate network planning for outdoor–indoor environments

    Optimal Computational Power Allocation in Multi-Access Mobile Edge Computing for Blockchain

    Get PDF
    Blockchain has emerged as a decentralized and trustable ledger for recording and storing digital transactions. The mining process of Blockchain, however, incurs a heavy computational workload for miners to solve the proof-of-work puzzle (i.e., a series of the hashing computation), which is prohibitive from the perspective of the mobile terminals (MTs). The advanced multi-access mobile edge computing (MEC), which enables the MTs to offload part of the computational workloads (for solving the proof-of-work) to the nearby edge-servers (ESs), provides a promising approach to address this issue. By offloading the computational workloads via multi-access MEC, the MTs can effectively increase their successful probabilities when participating in the mining game and gain the consequent reward (i.e., winning the bitcoin). However, as a compensation to the ESs which provide the computational resources to the MTs, the MTs need to pay the ESs for the corresponding resource-acquisition costs. Thus, to investigate the trade-off between obtaining the computational resources from the ESs (for solving the proof-of-work) and paying for the consequent cost, we formulate an optimization problem in which the MTs determine their acquired computational resources from different ESs, with the objective of maximizing the MTs’ social net-reward in the mining process while keeping the fairness among the MTs. In spite of the non-convexity of the formulated problem, we exploit its layered structure and propose efficient distributed algorithms for the MTs to individually determine their optimal computational resources acquired from different ESs. Numerical results are provided to validate the effectiveness of our proposed algorithms and the performance of our proposed multi-access MEC for Blockchain

    Optimal Computational Power Allocation in Multi-Access Mobile Edge Computing for Blockchain

    Get PDF
    Blockchain has emerged as a decentralized and trustable ledger for recording and storing digital transactions. The mining process of Blockchain, however, incurs a heavy computational workload for miners to solve the proof-of-work puzzle (i.e., a series of the hashing computation), which is prohibitive from the perspective of the mobile terminals (MTs). The advanced multi-access mobile edge computing (MEC), which enables the MTs to offload part of the computational workloads (for solving the proof-of-work) to the nearby edge-servers (ESs), provides a promising approach to address this issue. By offloading the computational workloads via multi-access MEC, the MTs can effectively increase their successful probabilities when participating in the mining game and gain the consequent reward (i.e., winning the bitcoin). However, as a compensation to the ESs which provide the computational resources to the MTs, the MTs need to pay the ESs for the corresponding resource-acquisition costs. Thus, to investigate the trade-off between obtaining the computational resources from the ESs (for solving the proof-of-work) and paying for the consequent cost, we formulate an optimization problem in which the MTs determine their acquired computational resources from different ESs, with the objective of maximizing the MTs’ social net-reward in the mining process while keeping the fairness among the MTs. In spite of the non-convexity of the formulated problem, we exploit its layered structure and propose efficient distributed algorithms for the MTs to individually determine their optimal computational resources acquired from different ESs. Numerical results are provided to validate the effectiveness of our proposed algorithms and the performance of our proposed multi-access MEC for Blockchain

    Survey of millimeter-wave propagation measurements and models in indoor environments

    Get PDF
    The millimeter-wave (mmWave) is expected to deliver a huge bandwidth to address the future demands for higher data rate transmissions. However, one of the major challenges in the mmWave band is the increase in signal loss as the operating frequency increases. This has attracted several research interests both from academia and the industry for indoor and outdoor mmWave operations. This paper focuses on the works that have been carried out in the study of the mmWave channel measurement in indoor environments. A survey of the measurement techniques, prominent path loss models, analysis of path loss and delay spread for mmWave in different indoor environments is presented. This covers the mmWave frequencies from 28 GHz to 100 GHz that have been considered in the last two decades. In addition, the possible future trends for the mmWave indoor propagation studies and measurements have been discussed. These include the critical indoor environment, the roles of artificial intelligence, channel characterization for indoor devices, reconfigurable intelligent surfaces, and mmWave for 6G systems. This survey can help engineers and researchers to plan, design, and optimize reliable 5G wireless indoor networks. It will also motivate the researchers and engineering communities towards finding a better outcome in the future trends of the mmWave indoor wireless network for 6G systems and beyond

    A custom sensor network for autonomous water quality assessment in fish farms

    Get PDF
    Producción CientíficaThe control of water quality is crucial to ensure the survival of fish in aquaculture production facilities. Today, the combination of sensors with communication technologies permits to monitor these crucial parameters in real-time, allowing to take fast management decisions. However, out-of-the-box solutions are expensive, due to the small market and the industrial nature of sensors, besides being little customizable. To solve this, the present work describes a low-cost hardware and software architecture developed to achieve the autonomous water quality assessment and management on a remote facility for fish conservation aquaculture within the framework of the Smart Comunidad Rural Digital (smartCRD) project. The developed sensor network has been working uninterruptedly since its installation (20 April 2021). It is based on open source technology and includes a central gateway for on-site data monitoring of water quality nodes as well as an online management platform for data visualization and sensor network configuration. Likewise, the system can detect autonomously water quality parameters outside configurable thresholds and deliver management alarms. The described architecture, besides low-cost, is highly customizable, compatible with other sensor network projects, machine-learning applications, and is capable of edge computing. Thus, it contributes to making open sensorization more accessible to real-world applications.Torres Quevedo (grant PTQ2018-010162

    Improved information flow topology for vehicle convoy control

    Get PDF
    A vehicle convoy is a string of inter-connected vehicles moving together for mutual support, minimizing traffic congestion, facilitating people safety, ensuring string stability and maximizing ride comfort. There exists a trade-off among the convoy's performance indices, which is inherent in any existing vehicle convoy. The use of unrealistic information flow topology (IFT) in vehicle convoy control, generally affects the overall performance of the convoy, due to the undesired changes in dynamic parameters (relative position, speed, acceleration and jerk) experienced by the following vehicle. This thesis proposes an improved information flow topology for vehicle convoy control. The improved topology is of the two-vehicle look-ahead and rear-vehicle control that aimed to cut-off the trade-off with a more robust control structure, which can handle constraints, wider range of control regions and provide acceptable performance simultaneously. The proposed improved topology has been designed in three sections. The first section explores the single vehicle's dynamic equations describing the derived internal and external disturbances modeled together as a unit. In the second section, the vehicle model is then integrated into the control strategy of the improved topology in order to improve the performance of the convoy to two look-ahead and rear. The changes in parameters of the improved convoy topology are compared through simulation with the most widely used conventional convoy topologies of one-vehicle look-ahead and that of the most human-driver like (the two-vehicle look-ahead) convoy topology. The results showed that the proposed convoy control topology has an improved performance with an increase in the intervehicular spacing by 19.45% and 18.20% reduction in acceleration by 20.28% and 15.17% reduction in jerk by 25.09% and 6.25% as against the one-look-ahead and twolook- ahead respectively. Finally, a model predictive control (MPC) system was designed and combined with the improved convoy topology to strictly control the following vehicle. The MPC serves the purpose of handling constraints, providing smoother and satisfactory responses and providing ride comfort with no trade-off in terms of performance or stability. The performance of the proposed MPC based improved convoy topology was then investigated via simulation and the results were compared with the previously improved convoy topology without MPC. The improved convoy topology with MPC provides safer inter-vehicular spacing by 13.86% refined the steady speed to maneuvering speed, provided reduction in acceleration by 32.11% and a huge achievement was recorded in reduction in jerk by 55.12% as against that without MPC. This shows that the MPC based improved convoy control topology gave enough spacing for any uncertain application of brake by the two look-ahead or further acceleration from the rear-vehicle. Similarly, manoeuvering speed was seen to ensure safety ahead and rear, ride comfort was achieved due to the low acceleration and jerk of the following vehicle. The controlling vehicle responded to changes, hence good handling was achieved

    Tumblr Facts: Antecedents of Self-Disclosure across Different Social Networking Sites

    Get PDF
    : Previous research investigating antecedents of online self-disclosure pointed out two perspectives: social compensation and enhancement hypotheses, showing controversial findings. Furthermore, most contributions have focused on social networking sites (SNSs) considered mainstream, like Facebook and Instagram, and such results are often considered universally valid for all SNSs. Tumblr is a less-studied SNS with peculiar features-such as anonymity, higher control over the presentation of personal aspects, supportive communities-that could particularly lead individuals to self-disclose. As prior contributions highlighted that the features and affordances could define how a medium will be used, this paper aims to investigate the antecedents of online self-disclosure on Tumblr and other mainstream SNSs. We run a survey on 559 Tumblr users (aged 13-70; M = 28.86; SD = 12.34). T-test showed that Tumblr users have a higher willingness to self-disclose on Tumblr compared to another SNSs (t = 22.44, p < 0.001). A path analysis model confirmed the predictive role of some psychological variables on self-disclosure on Tumblr but not on mainstream SNSs. In particular, self-disclosure on Tumblr was predicted by self-esteem, negative emotionality, and preference for online social interactions, which was in turn predicted by social anxiety. These findings partially supported both social compensation and enhancement hypotheses, indicating that the phenomenon is more complex than expected

    A self-healing framework for WSNs : detection and recovery of faulty sensor nodes and unreliable wireless links

    Get PDF
    Proponemos un marco conceptual para acoplar técnicas de auto-organización y técnicas de autocuración. A este marco se le llama de auto-curación y es capaz de hacer frente a enlaces inalámbricos inestables y nodos defectuosos. Dividimos el marco en dos componentes principales: la auto-organización y auto-curación. En el componente de auto-organización, nosotros construimos una topología de árbol que determine las rutas hacia el sumidero. En el componente de auto-curación, la topología del árbol se adapta a ambos tipos de fallas siguiendo tres pasos: recopilación de información, detección de fallas, y la recuperación de fallos. En el paso de recopilación de información, los nodos determinan el estado actual de la red mediante la recopilación de información de la capa MAC. En el paso de detección de fallas, los nodos analizan la información recopilada y detectan nodos/enlaces defectuosos. En el paso de recuperación de fallos, los nodos recuperan la topología del árbol mediante la sustitución de componentes defectuosos con redundantes (es decir, componentes de respaldo). Este marco permite una red con resiliencia que se recupera sin agotar los recursos de la red.We propose a conceptual framework for putting together self-organizing and self-healing techniques. This framework is called the self-healing framework and it is capable of coping with unstable wireless links and faulty nodes. We divide the framework into two major components: selforganization and self-healing. In the self-organization component, we build a tree topology that determines routing paths towards the sink. In the self-healing component, the tree topology copes with both types of failures by following three steps: information collection, fault detection, and fault recovery. In the information collection step, the nodes determine the current status of the network by gathering information from the MAC layer. In the fault detection step, the nodes analyze the collected information and detect faulty nodes/links. In the fault recovery step, the nodes recover the tree topology by replacing the faulty components with redundant ones (i.e., backup components). This framework allows a resilient network that recovers itself without depleting the network resources.Doctor en IngenieríaDoctorad

    State of the Art, Trends and Future of Bluetooth Low Energy, Near Field Communication and Visible Light Communication in the Development of Smart Cities

    Get PDF
    The current social impact of new technologies has produced major changes in all areas of society, creating the concept of a smart city supported by an electronic infrastructure, telecommunications and information technology. This paper presents a review of Bluetooth Low Energy (BLE), Near Field Communication (NFC) and Visible Light Communication (VLC) and their use and influence within different areas of the development of the smart city. The document also presents a review of Big Data Solutions for the management of information and the extraction of knowledge in an environment where things are connected by an “Internet of Things” (IoT) network. Lastly, we present how these technologies can be combined together to benefit the development of the smart city
    corecore