118 research outputs found
Integrated Sensing and Communication Signals Toward 5G-A and 6G: A Survey
Integrated sensing and communication (ISAC) has the advantages of efficient
spectrum utilization and low hardware cost. It is promising to be implemented
in the fifth-generation-advanced (5G-A) and sixth-generation (6G) mobile
communication systems, having the potential to be applied in intelligent
applications requiring both communication and high-accurate sensing
capabilities. As the fundamental technology of ISAC, ISAC signal directly
impacts the performance of sensing and communication. This article
systematically reviews the literature on ISAC signals from the perspective of
mobile communication systems, including ISAC signal design, ISAC signal
processing algorithms and ISAC signal optimization. We first review the ISAC
signal design based on 5G, 5G-A and 6G mobile communication systems. Then,
radar signal processing methods are reviewed for ISAC signals, mainly including
the channel information matrix method, spectrum lines estimator method and
super resolution method. In terms of signal optimization, we summarize
peak-to-average power ratio (PAPR) optimization, interference management, and
adaptive signal optimization for ISAC signals. This article may provide the
guidelines for the research of ISAC signals in 5G-A and 6G mobile communication
systems.Comment: 25 pages, 13 figures, 8 tables. IEEE Internet of Things Journal, 202
A Novel SAGE Algorithm for Estimating Parameters of Wideband Spatial Nonstationary Wireless Channels with Antenna Polarization
In this article, a novel space-alternating generalized expectation-maximization (SAGE) algorithm is proposed for parameter estimations of wideband spatial nonstationary wireless channels with antenna polarization (SAGE-WSNSAP). Compared with the traditional SAGE algorithm, the proposed SAGE-WSNSAP algorithm adds spatial nonstationarity by introducing birth-death coefficients at both transmitter (Tx) and receiver (Rx) sides into the parametric model. To reduce the complexity of the SAGE-WSNSAP algorithm, a coarse-to-fine search method is adopted in the initialization step. In addition, multiple-input multiple-output (MIMO) channel measurements are conducted to validate the proposed algorithm. The measurement results of the angle-delay power spectral density (PSD) and average delay PSD are compared with those estimated by the far-field SAGE algorithm, the near-field SAGE algorithm, and the proposed algorithm. It is found that the estimation results using the proposed SAGE-WSNSAP algorithm show higher similarity to measurement results than using the other two SAGE algorithms. In comparison to the far-field and near-field SAGE algorithms, the SAGE-WSNSAP algorithm can extract more effective multipath components (MPCs) and improve the power extraction ratios.</p
The Four-C Framework for High Capacity Ultra-Low Latency in 5G Networks: A Review
Network latency will be a critical performance metric for the Fifth Generation (5G) networks
expected to be fully rolled out in 2020 through the IMT-2020 project. The multi-user multiple-input
multiple-output (MU-MIMO) technology is a key enabler for the 5G massive connectivity criterion,
especially from the massive densification perspective. Naturally, it appears that 5G MU-MIMO will
face a daunting task to achieve an end-to-end 1 ms ultra-low latency budget if traditional network
set-ups criteria are strictly adhered to. Moreover, 5G latency will have added dimensions of scalability
and flexibility compared to prior existing deployed technologies. The scalability dimension caters
for meeting rapid demand as new applications evolve. While flexibility complements the scalability
dimension by investigating novel non-stacked protocol architecture. The goal of this review paper
is to deploy ultra-low latency reduction framework for 5G communications considering flexibility
and scalability. The Four (4) C framework consisting of cost, complexity, cross-layer and computing
is hereby analyzed and discussed. The Four (4) C framework discusses several emerging new
technologies of software defined network (SDN), network function virtualization (NFV) and fog
networking. This review paper will contribute significantly towards the future implementation of
flexible and high capacity ultra-low latency 5G communications
NDN content store and caching policies: performance evaluation
Among various factors contributing to performance of named data networking (NDN), the organization of caching is a key factor and has benefited from intense studies by the networking research community. The performed studies aimed at (1) finding the best strategy to adopt for content caching; (2) specifying the best location, and number of content stores (CS) in the network; and (3) defining the best cache replacement policy. Accessing and comparing the performance of the proposed solutions is as essential as the development of the proposals themselves. The present work aims at evaluating and comparing the behavior of four caching policies (i.e., random, least recently used (LRU), least frequently used (LFU), and first in first out (FIFO)) applied to NDN. Several network scenarios are used for simulation (2 topologies, varying the percentage of nodes of the content stores (5–100), 1 and 10 producers, 32 and 41 consumers). Five metrics are considered for the performance evaluation: cache hit ratio (CHR), network traffic, retrieval delay, interest re-transmissions, and the number of upstream hops. The content request follows the Zipf–Mandelbrot distribution (with skewness factor α=1.1 and α=0.75). LFU presents better performance in all considered metrics, except on the NDN testbed, with 41 consumers, 1 producer and a content request rate of 100 packets/s. For the level of content store from 50% to 100%, LRU presents a notably higher performance. Although the network behavior is similar for both skewness factors, when α=0.75, the CHR is significantly reduced, as expected.This work has been supported by FCT – Fundação para a Ciência e Tecnologia within the R&D Units Project Scope: UIDB/00319/2020
Towards Next Generation Teaching, Learning, and Context-Aware Applications for Higher Education: A Review on Blockchain, IoT, Fog and Edge Computing Enabled Smart Campuses and Universities
[Abstract] Smart campuses and smart universities make use of IT infrastructure that is similar to the one required by smart cities, which take advantage of Internet of Things (IoT) and cloud computing solutions to monitor and actuate on the multiple systems of a university. As a consequence, smart campuses and universities need to provide connectivity to IoT nodes and gateways, and deploy architectures that allow for offering not only a good communications range through the latest wireless and wired technologies, but also reduced energy consumption to maximize IoT node battery life. In addition, such architectures have to consider the use of technologies like blockchain, which are able to deliver accountability, transparency, cyber-security and redundancy to the processes and data managed by a university. This article reviews the state of the start on the application of the latest key technologies for the development of smart campuses and universities. After defining the essential characteristics of a smart campus/university, the latest communications architectures and technologies are detailed and the most relevant smart campus deployments are analyzed. Moreover, the use of blockchain in higher education applications is studied. Therefore, this article provides useful guidelines to the university planners, IoT vendors and developers that will be responsible for creating the next generation of smart campuses and universities.Xunta de Galicia; ED431C 2016-045Xunta de Galicia; ED431G/01Agencia Estatal de Investigación de España; TEC2016-75067-C4-1-
Asynchronous device detection for cognitive device-to-device communications
Dynamic spectrum sharing will facilitate the interference coordination in device-to-device (D2D) communications. In the absence of network level coordination, the timing synchronization among D2D users will be unavailable, leading to inaccurate channel state estimation and device detection, especially in time-varying fading environments. In this study, we design an asynchronous device detection/discovery framework for cognitive-D2D applications, which acquires timing drifts and dynamical fading channels when directly detecting the existence of a proximity D2D device (e.g. or primary user). To model and analyze this, a new dynamical system model is established, where the unknown timing deviation follows a random process, while the fading channel is governed by a discrete state Markov chain. To cope with the mixed estimation and detection (MED) problem, a novel sequential estimation scheme is proposed, using the conceptions of statistic Bayesian inference and random finite set. By tracking the unknown states (i.e. varying time deviations and fading gains) and suppressing the link uncertainty, the proposed scheme can effectively enhance the detection performance. The general framework, as a complimentary to a network-aided case with the coordinated signaling, provides the foundation for development of flexible D2D communications along with proximity-based spectrum sharing
Empirical Performance Models of MAC Protocols for Cooperative Platooning Applications
Vehicular ad-hoc networks (VANET) enable vehicles to exchange information on traffic
conditions, dynamic status and localization, to enhance road safety and transportation efficiency.
A typical VANET application is platooning, which can take advantage of exchanging information on
speed, heading and position to allow shorter inter-vehicle distances without compromising safety.
However, the platooning performance depends drastically on the quality of the communication
channel, which in turn is highly influenced by the medium access control protocol (MAC). Currently,
VANETs use the IEEE 802.11p MAC, which follows a carrier sense multiple access with collision
avoidance (CSMA/CA) policy that is prone to collisions and degrades significantly with network
load. This has led to recent proposals for a time-division multiple access (TDMA)-based MAC that
synchronize vehicles’ beacons to prevent or reduce collisions. In this paper, we take CSMA/CA
and two TDMA-based overlay protocols, i.e., deployed over CSMA/CA, namely PLEXE-slotted and
RA-TDMAp, and carry out extensive simulations with varying platoon sizes, number of occupied
lanes and transmit power to deduce empirical models that provide estimates of average number of
collisions per second and average busy time ratio. In particular, we show that these estimates can
be obtained from observing the number of radio-frequency (RF) neighbours, i.e., number of distinct
sources of the packets received by each vehicle per time unit. These estimates can enhance the online
adaptation of distributed applications, particularly platooning control, to varying conditions of the
communication channel.info:eu-repo/semantics/publishedVersio
A Meta-Review of Indoor Positioning Systems
An accurate and reliable Indoor Positioning System (IPS) applicable to most indoor scenarios has been sought for many years. The number of technologies, techniques, and approaches in general used in IPS proposals is remarkable. Such diversity, coupled with the lack of strict and verifiable evaluations, leads to difficulties for appreciating the true value of most proposals. This paper provides a meta-review that performed a comprehensive compilation of 62 survey papers in the area of indoor positioning. The paper provides the reader with an introduction to IPS and the different technologies, techniques, and some methods commonly employed. The introduction is supported by consensus found in the selected surveys and referenced using them. Thus, the meta-review allows the reader to inspect the IPS current state at a glance and serve as a guide for the reader to easily find further details on each technology used in IPS. The analyses of the meta-review contributed with insights on the abundance and academic significance of published IPS proposals using the criterion of the number of citations. Moreover, 75 works are identified as relevant works in the research topic from a selection of about 4000 works cited in the analyzed surveys
Android Application Security Scanning Process
This chapter presents the security scanning process for Android applications. The aim is to guide researchers and developers to the core phases/steps required to analyze Android applications, check their trustworthiness, and protect Android users and their devices from being victims to different malware attacks. The scanning process is comprehensive, explaining the main phases and how they are conducted including (a) the download of the apps themselves; (b) Android application package (APK) reverse engineering; (c) app feature extraction, considering both static and dynamic analysis; (d) dataset creation and/or utilization; and (e) data analysis and data mining that result in producing detection systems, classification systems, and ranking systems. Furthermore, this chapter highlights the app features, evaluation metrics, mechanisms and tools, and datasets that are frequently used during the app’s security scanning process
- …