35 research outputs found

    Lifted MDS Codes over Finite Fields

    Full text link
    MDS codes are elegant constructions in coding theory and have mode important applications in cryptography, network coding, distributed data storage, communication systems et. In this study, a method is given which MDS codes are lifted to a higher finite field. The presented method satisfies the protection of the distance and creating the MDS code over the FqF_q by using MDS code over $F_p.

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    Machine Learning-Aided Operations and Communications of Unmanned Aerial Vehicles: A Contemporary Survey

    Full text link
    The ongoing amalgamation of UAV and ML techniques is creating a significant synergy and empowering UAVs with unprecedented intelligence and autonomy. This survey aims to provide a timely and comprehensive overview of ML techniques used in UAV operations and communications and identify the potential growth areas and research gaps. We emphasise the four key components of UAV operations and communications to which ML can significantly contribute, namely, perception and feature extraction, feature interpretation and regeneration, trajectory and mission planning, and aerodynamic control and operation. We classify the latest popular ML tools based on their applications to the four components and conduct gap analyses. This survey also takes a step forward by pointing out significant challenges in the upcoming realm of ML-aided automated UAV operations and communications. It is revealed that different ML techniques dominate the applications to the four key modules of UAV operations and communications. While there is an increasing trend of cross-module designs, little effort has been devoted to an end-to-end ML framework, from perception and feature extraction to aerodynamic control and operation. It is also unveiled that the reliability and trust of ML in UAV operations and applications require significant attention before full automation of UAVs and potential cooperation between UAVs and humans come to fruition.Comment: 36 pages, 304 references, 19 Figure

    Unveiling Patterns and Colors in Architectural Paintings: An Analysis by K-Means++ Clustering and Color Ratio Analysis

    Get PDF
    This study delves into the intricate world of patterns and colors found in architectural paintings within the illustrious Forbidden City. Through an in-depth analysis, we identified seven distinctive patterns, creating a pattern factor library that showcases five examples for each pattern category. To extract the color schemes of each architectural painting type, we employed the K-Means++ algorithm for secondary clustering. Utilizing both RGB and HSV color space models, we examined scatter diagrams and histograms for three specific architectural color paintings. The results revealed a balanced distribution of warm and cool colors across all three architectural painting types. The prevalent colors observed in the Forbidden City architectural paintings were red, yellow, cyan, and blue, exhibiting low levels of saturation and moderate to high levels of brightness, evoking a serene and luminous ambiance. Through color ratio analysis, we established traditional color names that corresponded to the extracted color values from each painting. Our findings suggest that the colors and patterns within the Forbidden City architectural paintings communicate a profound sense of tranquility and grandeur, aligning with the cultural and artistic values held during the Ming and Qing dynasties

    Multi-Dimensional Resource Orchestration in Vehicular Edge Networks

    Get PDF
    In the era of autonomous vehicles, the advanced technologies of connected vehicle lead to the development of driving-related applications to meet the stringent safety requirements and the infotainment applications to improve passenger experience. Newly developed vehicular applications require high-volume data transmission, accurate sensing data collection, and reliable interaction, imposing substantial constrains on vehicular networks that solely rely on cellular networks to fetch data from the Internet and on-board processors to make driving decisions. To enhance multifarious vehicular applications, Heterogeneous Vehicular Networks (HVNets) have been proposed, in which edge nodes, including base stations and roadside units, can provide network connections, resulting in significantly reduced vehicular communication cost. In addition, caching servers are equipped at the edge nodes, to further alleviate the communication load for backhaul links and reduce data downloading delay. Hence, we aim to orchestrate the multi-dimensional resources, including communication, caching, and sensing resources, in the complex and dynamic vehicular environment to enhance vehicular edge network performance. The main technical issues are: 1) to accommodate the delivery services for both location-based and popular contents, the scheme of caching contents at edge servers should be devised, considering the cooperation of caching servers at different edge nodes, the mobility of vehicles, and the differential requirements of content downloading services; 2) to support the safety message exchange and collective perception services for vehicles, communication and sensing resources are jointly allocated, the decisions of which are coupled due to the resource sharing among different services and neighboring vehicles; and 3) for interaction-intensive service provisioning, e.g., trajectory design, the forwarding resources in core networks are allocated to achieve delay-sensitive packet transmissions between vehicles and management controllers, ensuring the high-quality interactivity. In this thesis, we design the multi-dimensional resource orchestration schemes in the edge assisted HVNets to address the three technical issues. Firstly, we design a cooperative edge caching scheme to support various vehicular content downloading services, which allows vehicles to fetch one content from multiple caching servers cooperatively. In particular, we consider two types of vehicular content requests, i.e., location-based and popular contents, with different delay requirements. Both types of contents are encoded according to fountain code and cooperatively cached at multiple servers. The proposed scheme can be optimized by finding an optimal cooperative content placement that determines the placing locations and proportions for all contents. To this end, we analyze the upper bound proportion of content caching at a single server and provide the respective theoretical analysis of transmission delay and service cost (including content caching and transmission cost) for both types of contents. We then formulate an optimization problem of cooperative content placement to minimize the overall transmission delay and service cost. As the problem is a multi-objective multi-dimensional multi-choice knapsack one, which is proved to be NP-hard, we devise an ant colony optimization-based scheme to solve the problem and achieve a near-optimal solution. Simulation results are provided to validate the performance of the proposed scheme, including its convergence and optimality of caching, while guaranteeing low transmission delay and service cost. Secondly, to support the vehicular safety message transmissions, we propose a two-level adaptive resource allocation (TARA) framework. In particular, three types of safety message are considered in urban vehicular networks, i.e., the event-triggered message for urgent condition warning, the periodic message for vehicular status notification, and the message for environmental perception. Roadside units are deployed for network management, and thus messages can be transmitted through either vehicle-to-infrastructure or vehicle-to-vehicle connections. To satisfy the requirements of different message transmissions, the proposed TARA framework consists of a group-level resource reservation module and a vehicle-level resource allocation module. Particularly, the resource reservation module is designed to allocate resources to support different types of message transmission for each vehicle group at the first level, and the group is formed by a set of neighboring vehicles. To learn the implicit relation between the resource demand and message transmission requests, a supervised learning model is devised in the resource reservation module, where to obtain the training data we further propose a sequential resource allocation (SRA) scheme. Based on historical network information, the SRA scheme offline optimizes the allocation of sensing resources (i.e., choosing vehicles to provide perception data) and communication resources. With the resource reservation result for each group, the vehicle-level resource allocation module is then devised to distribute specific resources for each vehicle to satisfy the differential requirements in real time. Extensive simulation results are provided to demonstrate the effectiveness of the proposed TARA framework in terms of the high successful reception ratio and low latency for message transmissions, and the high quality of collective environmental perception. Thirdly, we investigate forwarding resource sharing scheme to support interaction intensive services in HVNets, especially for the delay-sensitive packet transmission between vehicles and management controllers. A learning-based proactive resource sharing scheme is proposed for core communication networks, where the available forwarding resources at a switch are proactively allocated to the traffic flows in order to maximize the efficiency of resource utilization with delay satisfaction. The resource sharing scheme consists of two joint modules: estimation of resource demands and allocation of available resources. For service provisioning, resource demand of each traffic flow is estimated based on the predicted packet arrival rate. Considering the distinct features of each traffic flow, a linear regression scheme is developed for resource demand estimation, utilizing the mapping relation between traffic flow status and required resources, upon which a network switch makes decision on allocating available resources for delay satisfaction and efficient resource utilization. To learn the implicit relation between the allocated resources and delay, a multi-armed bandit learning-based resource sharing scheme is proposed, which enables fast resource sharing adjustment to traffic arrival dynamics. The proposed scheme is proved to be asymptotically approaching the optimal strategy, with polynomial time complexity. Extensive simulation results are presented to demonstrate the effectiveness of the proposed resource sharing scheme in terms of delay satisfaction, traffic adaptiveness, and resource sharing gain. In summary, we have investigated the cooperative caching placement for content downloading services, joint communication and sensing resource allocation for safety message transmissions, and forwarding resource sharing scheme in core networks for interaction intensive services. The schemes developed in the thesis should provide practical and efficient solutions to manage the multi-dimensional resources in vehicular networks

    Remote Sensing

    Get PDF
    This dual conception of remote sensing brought us to the idea of preparing two different books; in addition to the first book which displays recent advances in remote sensing applications, this book is devoted to new techniques for data processing, sensors and platforms. We do not intend this book to cover all aspects of remote sensing techniques and platforms, since it would be an impossible task for a single volume. Instead, we have collected a number of high-quality, original and representative contributions in those areas

    Solutions for large scale, efficient, and secure Internet of Things

    Get PDF
    The design of a general architecture for the Internet of Things (IoT) is a complex task, due to the heterogeneity of devices, communication technologies, and applications that are part of such systems. Therefore, there are significant opportunities to improve the state of the art, whether to better the performance of the system, or to solve actual issues in current systems. This thesis focuses, in particular, on three aspects of the IoT. First, issues of cyber-physical systems are analysed. In these systems, IoT technologies are widely used to monitor, control, and act on physical entities. One of the most important issue in these scenarios are related to the communication layer, which must be characterized by high reliability, low latency, and high energy efficiency. Some solutions for the channel access scheme of such systems are proposed, each tailored to different specific scenarios. These solutions, which exploit the capabilities of state of the art radio transceivers, prove effective in improving the performance of the considered systems. Positioning services for cyber-physical systems are also investigated, in order to improve the accuracy of such services. Next, the focus moves to network and service optimization for traffic intensive applications, such as video streaming. This type of traffic is common amongst non-constrained devices, like smartphones and augmented/virtual reality headsets, which form an integral part of the IoT ecosystem. The proposed solutions are able to increase the video Quality of Experience while wasting less bandwidth than state of the art strategies. Finally, the security of IoT systems is investigated. While often overlooked, this aspect is fundamental to enable the ubiquitous deployment of IoT. Therefore, security issues of commonly used IoT protocols are presented, together with a proposal for an authentication mechanism based on physical channel features. This authentication strategy proved to be effective as a standalone mechanism or as an additional security layer to improve the security level of legacy systems
    corecore