253 research outputs found

    Beam scanning by liquid-crystal biasing in a modified SIW structure

    Get PDF
    A fixed-frequency beam-scanning 1D antenna based on Liquid Crystals (LCs) is designed for application in 2D scanning with lateral alignment. The 2D array environment imposes full decoupling of adjacent 1D antennas, which often conflicts with the LC requirement of DC biasing: the proposed design accommodates both. The LC medium is placed inside a Substrate Integrated Waveguide (SIW) modified to work as a Groove Gap Waveguide, with radiating slots etched on the upper broad wall, that radiates as a Leaky-Wave Antenna (LWA). This allows effective application of the DC bias voltage needed for tuning the LCs. At the same time, the RF field remains laterally confined, enabling the possibility to lay several antennas in parallel and achieve 2D beam scanning. The design is validated by simulation employing the actual properties of a commercial LC medium

    Road Traffic Management using Vehicle-to- Everything (V2X) Communication

    Get PDF
    Traffic congestion is the primary concern in dense cities; while the increased number of automobiles is becoming uncontrollable in some cities, it is more challenging to manage or change how people use cars. To contribute to solving traffic congestion in cities, this project examines the study of transferring vehicles to be competent in a way that can help the government entities analyze the received vehicles’ data and for better decisions on reducing traffic congestion as well as the real-time monitoring of traffic wherever it is located using the Vehicle-to-Everything (V2X) communication methodology. This study proposes a hardware “system” that can be attached to any vehicle to collect real-time data from vehicles and communicate with the Road and Transportation Authority. The hardware system, however, is connected to the cars through a wireless On-Board Diagnostics (OBD) connection in favor of collecting all the necessary information from the vehicle, such as the car speed and Revolutions Per Minute (RPM) data. On the other hand, a GPS sensor is used to inquire about the vehicle’s location, a GSM module to make sure the device is always connected to the internet for data transmission, a LiDAR sensor for distance and safety measurement, and a camera module accessed only by the driver for object detection such as cars, pedestrians, traffic signs, damaged roads, and road hazards. Moreover, system updates and maintenance can be done remotely to reduce the number of visits to the traffic department since all devices are to be connected to a single platform. As a result, it was possible to create a prototype for a single vehicle, including the sensors mentioned above, returning valuable data that include vehicle speed and exact location, which will help future researchers develop an application platform to monitor and track traffic congestion in real time

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    5G Business models:Considerations for organizations

    Get PDF

    Service Provisioning in Edge-Cloud Continuum Emerging Applications for Mobile Devices

    Get PDF
    Disruptive applications for mobile devices can be enhanced by Edge computing facilities. In this context, Edge Computing (EC) is a proposed architecture to meet the mobility requirements imposed by these applications in a wide range of domains, such as the Internet of Things, Immersive Media, and Connected and Autonomous Vehicles. EC architecture aims to introduce computing capabilities in the path between the user and the Cloud to execute tasks closer to where they are consumed, thus mitigating issues related to latency, context awareness, and mobility support. In this survey, we describe which are the leading technologies to support the deployment of EC infrastructure. Thereafter, we discuss the applications that can take advantage of EC and how they were proposed in the literature. Finally, after examining enabling technologies and related applications, we identify some open challenges to fully achieve the potential of EC, and also research opportunities on upcoming paradigms for service provisioning. This survey is a guide to comprehend the recent advances on the provisioning of mobile applications, as well as foresee the expected next stages of evolution for these applications

    1-D broadside-radiating leaky-wave antenna based on a numerically synthesized impedance surface

    Get PDF
    A newly-developed deterministic numerical technique for the automated design of metasurface antennas is applied here for the first time to the design of a 1-D printed Leaky-Wave Antenna (LWA) for broadside radiation. The surface impedance synthesis process does not require any a priori knowledge on the impedance pattern, and starts from a mask constraint on the desired far-field and practical bounds on the unit cell impedance values. The designed reactance surface for broadside radiation exhibits a non conventional patterning; this highlights the merit of using an automated design process for a design well known to be challenging for analytical methods. The antenna is physically implemented with an array of metal strips with varying gap widths and simulation results show very good agreement with the predicted performance

    Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles

    Get PDF
    The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, increased environmental pollution due e.g., to traffic jams or malicious modifications in sensors’ firmware, and ultimately, the great danger for human lives, either they are drivers, passengers or pedestrians. Connected vehicles will soon become a reality on our roads, bringing along new services and capabilities, but also technical challenges and security threats. To overcome these risks, the CARAMEL project has developed several anti-hacking solutions for the new generation of vehicles. CARAMEL (Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles), a research project co-funded by the European Union under the Horizon 2020 framework programme, is a project consortium with 15 organizations from 8 European countries together with 3 Korean partners. The project applies a proactive approach based on Artificial Intelligence and Machine Learning techniques to detect and prevent potential cybersecurity threats to autonomous and connected vehicles. This approach has been addressed based on four fundamental pillars, namely: Autonomous Mobility, Connected Mobility, Electromobility, and Remote Control Vehicle. This book presents theory and results from each of these technical directions

    Assessing the Performance of a Particle Swarm Optimization Mobility Algorithm in a Hybrid Wi-Fi/LoRa Flying Ad Hoc Network

    Get PDF
    Research on Flying Ad-Hoc Networks (FANETs) has increased due to the availability of Unmanned Aerial Vehicles (UAVs) and the electronic components that control and connect them. Many applications, such as 3D mapping, construction inspection, or emergency response operations could benefit from an application and adaptation of swarm intelligence-based deployments of multiple UAVs. Such groups of cooperating UAVs, through the use of local rules, could be seen as network nodes establishing an ad-hoc network for communication purposes. One FANET application is to provide communication coverage over an area where communication infrastructure is unavailable. A crucial part of a FANET implementation is computing the optimal position of UAVs to provide connectivity with ground nodes while maximizing geographic span. To achieve optimal positioning of FANET nodes, an adaptation of the Particle Swarm Optimization (PSO) algorithm is proposed. A 3D mobility model is defined by adapting the original PSO algorithm and combining it with a fixed-trajectory initial flight. A Long Range (LoRa) mesh network is used for air-to-air communication, while a Wi-Fi network provides air-to-ground communication to several ground nodes with unknown positions. The optimization problem has two objectives: maximizing coverage to ground nodes and maintaining an end-to-end communication path to a control station, through the UAV mesh. The results show that the hybrid mobility approach performs similarly to the fixed trajectory flight regarding coverage, and outperforms fixed trajectory and PSO-only algorithms in both path maintenance and overall network efficiency, while using fewer UAVs
    • …
    corecore