45 research outputs found

    Capacity Enhancement in 60 GHz Based D2D Networks by Relay Selection and Scheduling

    Get PDF
    Millimeter-wave or 60 GHz communication is a promising technology that enables data rates in multigigabits. However, its tremendous propagation loss and signal blockage may severely affect the network throughput. In current data-centric device-to-device (D2D) communication networks, the devices with intended data communications usually lay in close proximity, unlike the case in voice-centric networks. So the network can be visualized as a naturally formed groups of devices. In this paper, we jointly consider resource scheduling and relay selection to improve network capacity in 60 GHz based D2D networks. Two types of transmission scenarios are considered in wireless personal area networks (WPANs), intra and intergroup. A distributed receiver based relay selection scheme is proposed for intragroup transmission, while a distance based relay selection scheme is proposed for intergroup transmission. The outage analysis of our proposed relay selection scheme is provided along with the numerical results. We then propose a concurrent transmission scheduling algorithm based on vertex coloring technique. The proposed scheduling algorithm employs time and space division in mmWave WPANs. Using vertex multicoloring, we allow transmitter-receiver (Tx-Rx) communication pairs to span over more colors, enabling better time slot utilization. We evaluate our scheduling algorithm in single-hop and multihop scenarios and discover that it outperforms other schemes by significantly improving network throughput

    Visible light communication system based on software defined radio: Performance study of intelligent transportation and indoor applications

    Get PDF
    In this paper, our first attempt at visible light communication system, based on software defined radio (SDR) and implemented in LabVIEW is introduced. This paper mainly focuses on two most commonly used types of LED lights, ceiling lights and LED car lamps/tail-lights. The primary focus of this study is to determine the basic parameters of real implementation of visible light communication (VLC) system, such as transmit speed, communication errors (bit-error ratio, error vector magnitude, energy per bit to noise power spectral density ratio) and highest reachable distance. This work focuses on testing various multistate quadrature amplitude modulation (M-QAM). We have used Skoda Octavia III tail-light and Phillips indoor ceiling light as transmitters and SI PIN Thorlabs photodetector as receiver. Testing method for each light was different. When testing ceiling light, we have focused on reachable distance for each M-QAM variant. On the other side, Octavia tail-light was tested in variable nature conditions (such as thermal turbulence, rain, fog) simulated in special testing box. This work will present our solution, measured parameters and possible weak spots, which will be adjusted in the future.Web of Science84art. no. 43

    既刊報告

    Get PDF

    230501

    Get PDF
    Cooperative Vehicular Platooning (Co-VP) is a paradigmatic example of a Cooperative Cyber-Physical System (Co-CPS), which holds the potential to vastly improve road safety by partially removing humans from the driving task. However, the challenges are substantial, as the domain involves several topics, such as control theory, communications, vehicle dynamics, security, and traffic engineering, that must be coupled to describe, develop and validate these systems of systems accurately. This work presents a comprehensive survey of significant and recent advances in Co-VP relevant fields. We start by overviewing the work on control strategies and underlying communication infrastructures, focusing on their interplay. We also address a fundamental concern by presenting a cyber-security overview regarding these systems. Furthermore, we present and compare the primary initiatives to test and validate those systems, including simulation tools, hardware-in-the-loop setups, and vehicular testbeds. Finally, we highlight a few open challenges in the Co-VP domain. This work aims to provide a fundamental overview of highly relevant works on Co-VP topics, particularly by exposing their inter-dependencies, facilitating a guide that will support further developments in this challenging field.info:eu-repo/semantics/publishedVersio

    Privacy in the Smart City - Applications, Technologies, Challenges and Solutions

    Get PDF
    Many modern cities strive to integrate information technology into every aspect of city life to create so-called smart cities. Smart cities rely on a large number of application areas and technologies to realize complex interactions between citizens, third parties, and city departments. This overwhelming complexity is one reason why holistic privacy protection only rarely enters the picture. A lack of privacy can result in discrimination and social sorting, creating a fundamentally unequal society. To prevent this, we believe that a better understanding of smart cities and their privacy implications is needed. We therefore systematize the application areas, enabling technologies, privacy types, attackers and data sources for the attacks, giving structure to the fuzzy term “smart city”. Based on our taxonomies, we describe existing privacy-enhancing technologies, review the state of the art in real cities around the world, and discuss promising future research directions. Our survey can serve as a reference guide, contributing to the development of privacy-friendly smart cities

    Human face detection techniques: A comprehensive review and future research directions

    Get PDF
    Face detection which is an effortless task for humans are complex to perform on machines. Recent veer proliferation of computational resources are paving the way for a frantic advancement of face detection technology. Many astutely developed algorithms have been proposed to detect faces. However, there is a little heed paid in making a comprehensive survey of the available algorithms. This paper aims at providing fourfold discussions on face detection algorithms. At first, we explore a wide variety of available face detection algorithms in five steps including history, working procedure, advantages, limitations, and use in other fields alongside face detection. Secondly, we include a comparative evaluation among different algorithms in each single method. Thirdly, we provide detailed comparisons among the algorithms epitomized to have an all inclusive outlook. Lastly, we conclude this study with several promising research directions to pursue. Earlier survey papers on face detection algorithms are limited to just technical details and popularly used algorithms. In our study, however, we cover detailed technical explanations of face detection algorithms and various recent sub-branches of neural network. We present detailed comparisons among the algorithms in all-inclusive and also under sub-branches. We provide strengths and limitations of these algorithms and a novel literature survey including their use besides face detection

    State-of-the-art assessment of 5G mmWave communications

    Get PDF
    Deliverable D2.1 del proyecto 5GWirelessMain objective of the European 5Gwireless project, which is part of the H2020 Marie Slodowska- Curie ITN (Innovative Training Networks) program resides in the training and involvement of young researchers in the elaboration of future mobile communication networks, focusing on innovative wireless technologies, heterogeneous network architectures, new topologies (including ultra-dense deployments), and appropriate tools. The present Document D2.1 is the first deliverable of Work- Package 2 (WP2) that is specifically devoted to the modeling of the millimeter-wave (mmWave) propagation channels, and development of appropriate mmWave beamforming and signal processing techniques. Deliver D2.1 gives a state-of-the-art on the mmWave channel measurement, characterization and modeling; existing antenna array technologies, channel estimation and precoding algorithms; proposed deployment and networking techniques; some performance studies; as well as a review on the evaluation and analysis toolsPostprint (published version

    A Trust-Based Intrusion Detection System for RPL Networks: Detecting a Combination of Rank and Blackhole Attacks

    Get PDF
    Routing attacks are a major security issue for Internet of Things (IoT) networks utilising routing protocols, as malicious actors can overwhelm resource-constrained devices with denial-of-service (DoS) attacks, notably rank and blackhole attacks. In this work, we study the impact of the combination of rank and blackhole attacks in the IPv6 routing protocol for low-power and lossy (RPL) networks, and we propose a new security framework for RPL-based IoT networks (SRF-IoT). The framework includes a trust-based mechanism that detects and isolates malicious attackers with the help of an external intrusion detection system (IDS). Both SRF-IoT and IDS are implemented in the Contiki-NG operating system. Evaluation of the proposed framework is based on simulations using the Whitefield framework that combines both the Contiki-NG and the NS-3 simulator. Analysis of the simulations of the scenarios under active attacks showed the effectiveness of deploying SRF-IoT with 92.8% packet delivery ratio (PDR), a five-fold reduction in the number of packets dropped, and a three-fold decrease in the number of parent switches in comparison with the scenario without SRF-IoT. Moreover, the packet overhead introduced by SRF-IoT in attack scenarios is minimal at less than 2%. Obtained results suggest that the SRF-IoT framework is an efficient and promising solution that combines trust-based and IDS-based approaches to protect IoT networks against routing attacks. In addition, our solution works by deploying a watchdog mechanism on detector nodes only, leaving unaffected the operation of existing smart devices

    The Hindu Kush Himalaya Assessment

    Get PDF
    This open access volume is the first comprehensive assessment of the Hindu Kush Himalaya (HKH) region. It comprises important scientific research on the social, economic, and environmental pillars of sustainable mountain development and will serve as a basis for evidence-based decision-making to safeguard the environment and advance people’s well-being. The compiled content is based on the collective knowledge of over 300 leading researchers, experts and policymakers, brought together by the Hindu Kush Himalayan Monitoring and Assessment Programme (HIMAP) under the coordination of the International Centre for Integrated Mountain Development (ICIMOD). This assessment was conducted between 2013 and 2017 as the first of a series of monitoring and assessment reports, under the guidance of the HIMAP Steering Committee: Eklabya Sharma (ICIMOD), Atiq Raman (Bangladesh), Yuba Raj Khatiwada (Nepal), Linxiu Zhang (China), Surendra Pratap Singh (India), Tandong Yao (China) and David Molden (ICIMOD and Chair of the HIMAP SC). This First HKH Assessment Report consists of 16 chapters, which comprehensively assess the current state of knowledge of the HKH region, increase the understanding of various drivers of change and their impacts, address critical data gaps and develop a set of evidence-based and actionable policy solutions and recommendations. These are linked to nine mountain priorities for the mountains and people of the HKH consistent with the Sustainable Development Goals. This book is a must-read for policy makers, academics and students interested in this important region and an essentially important resource for contributors to global assessments such as the IPCC reports. ; Constitutes the first comprehensive assessment of the Hindu Kush Himalaya region, providing an authoritative overview of the region Assembles the collective knowledge of over 300 leading researchers, practitioners, experts, and policymakers Combines the current state of knowledge of the Hindu Kush Himalaya region in one volume Offers Open Access to a set of practically oriented policy recommendation
    corecore