162 research outputs found

    Unmanned Aerial Vehicle (UAV)-Enabled Wireless Communications and Networking

    Get PDF
    The emerging massive density of human-held and machine-type nodes implies larger traffic deviatiolns in the future than we are facing today. In the future, the network will be characterized by a high degree of flexibility, allowing it to adapt smoothly, autonomously, and efficiently to the quickly changing traffic demands both in time and space. This flexibility cannot be achieved when the network’s infrastructure remains static. To this end, the topic of UAVs (unmanned aerial vehicles) have enabled wireless communications, and networking has received increased attention. As mentioned above, the network must serve a massive density of nodes that can be either human-held (user devices) or machine-type nodes (sensors). If we wish to properly serve these nodes and optimize their data, a proper wireless connection is fundamental. This can be achieved by using UAV-enabled communication and networks. This Special Issue addresses the many existing issues that still exist to allow UAV-enabled wireless communications and networking to be properly rolled out

    True-data Testbed for 5G/B5G Intelligent Network

    Full text link
    Future beyond fifth-generation (B5G) and sixth-generation (6G) mobile communications will shift from facilitating interpersonal communications to supporting Internet of Everything (IoE), where intelligent communications with full integration of big data and artificial intelligence (AI) will play an important role in improving network efficiency and providing high-quality service. As a rapid evolving paradigm, the AI-empowered mobile communications demand large amounts of data acquired from real network environment for systematic test and verification. Hence, we build the world's first true-data testbed for 5G/B5G intelligent network (TTIN), which comprises 5G/B5G on-site experimental networks, data acquisition & data warehouse, and AI engine & network optimization. In the TTIN, true network data acquisition, storage, standardization, and analysis are available, which enable system-level online verification of B5G/6G-orientated key technologies and support data-driven network optimization through the closed-loop control mechanism. This paper elaborates on the system architecture and module design of TTIN. Detailed technical specifications and some of the established use cases are also showcased.Comment: 12 pages, 10 figure

    Predictive smart relaying schemes for decentralized wireless systems

    Get PDF
    Recent developments in decentralized wireless networks make the technology potentially deployable in an extremely broad scenarios and applications. These include mobile Internet of Things (IoT) networks, smart cities, future innovative communication systems with multiple aerial layer flying network platforms and other advanced mobile communication networks. The approach also could be the solution for traditional operated mobile network backup plans, balancing traffic flow, emergency communication systems and so on. This thesis reveals and addresses several issues and challenges in conventional wireless communication systems, particular for the cases where there is a lack of resources and the disconnection of radio links. There are two message routing plans in the data packet store, carry and forwarding form are proposed, known as KaFiR and PaFiR. These employ the Bayesian filtering approach to track and predict the motion of surrounding portable devices and determine the next layer among candidate nodes. The relaying strategies endow smart devices with the intelligent capability to optimize the message routing path and improve the overall network performance with respect to resilience, tolerance and scalability. The simulation and test results present that the KaFiR routing protocol performs well when network subscribers are less mobile and the relaying protocol can be deployed on a wide range of portable terminals as the algorithm is rather simple to operate. The PaFiR routing strategy takes advantages of the Particle Filter algorithm, which can cope with complex network scenarios and applications, particularly when unmanned aerial vehicles are involved as the assisted intermediate layers. When compared with other existing DTN routing protocols and some of the latest relaying plans, both relaying protocols deliver an excellent overall performance for the key wireless communication network evolution metrics, which shows the promising future for this brand new research direction. Further extension work directions based on the tracking and prediction methods are suggested and reviewed. Future work on some new applications and services are also addressed

    AlerTiger: Deep Learning for AI Model Health Monitoring at LinkedIn

    Full text link
    Data-driven companies use AI models extensively to develop products and intelligent business solutions, making the health of these models crucial for business success. Model monitoring and alerting in industries pose unique challenges, including a lack of clear model health metrics definition, label sparsity, and fast model iterations that result in short-lived models and features. As a product, there are also requirements for scalability, generalizability, and explainability. To tackle these challenges, we propose AlerTiger, a deep-learning-based MLOps model monitoring system that helps AI teams across the company monitor their AI models' health by detecting anomalies in models' input features and output score over time. The system consists of four major steps: model statistics generation, deep-learning-based anomaly detection, anomaly post-processing, and user alerting. Our solution generates three categories of statistics to indicate AI model health, offers a two-stage deep anomaly detection solution to address label sparsity and attain the generalizability of monitoring new models, and provides holistic reports for actionable alerts. This approach has been deployed to most of LinkedIn's production AI models for over a year and has identified several model issues that later led to significant business metric gains after fixing

    Data Mining in Internet of Things Systems: A Literature Review

    Get PDF
    The Internet of Things (IoT) and cloud technologies have been the main focus of recent research, allowing for the accumulation of a vast amount of data generated from this diverse environment. These data include without any doubt priceless knowledge if could correctly discovered and correlated in an efficient manner. Data mining algorithms can be applied to the Internet of Things (IoT) to extract hidden information from the massive amounts of data that are generated by IoT and are thought to have high business value. In this paper, the most important data mining approaches covering classification, clustering, association analysis, time series analysis, and outlier analysis from the knowledge will be covered. Additionally, a survey of recent work in in this direction is included. Another significant challenges in the field are collecting, storing, and managing the large number of devices along with their associated features. In this paper, a deep look on the data mining for the IoT platforms will be given concentrating on real applications found in the literatur

    Machine Learning Meets Communication Networks: Current Trends and Future Challenges

    Get PDF
    The growing network density and unprecedented increase in network traffic, caused by the massively expanding number of connected devices and online services, require intelligent network operations. Machine Learning (ML) has been applied in this regard in different types of networks and networking technologies to meet the requirements of future communicating devices and services. In this article, we provide a detailed account of current research on the application of ML in communication networks and shed light on future research challenges. Research on the application of ML in communication networks is described in: i) the three layers, i.e., physical, access, and network layers; and ii) novel computing and networking concepts such as Multi-access Edge Computing (MEC), Software Defined Networking (SDN), Network Functions Virtualization (NFV), and a brief overview of ML-based network security. Important future research challenges are identified and presented to help stir further research in key areas in this direction
    • …
    corecore