425 research outputs found
Beam scanning by liquid-crystal biasing in a modified SIW structure
A fixed-frequency beam-scanning 1D antenna based on Liquid Crystals (LCs) is designed for application in 2D scanning with lateral alignment. The 2D array environment imposes full decoupling of adjacent 1D antennas, which often conflicts with the LC requirement of DC biasing: the proposed design accommodates both. The LC medium is placed inside a Substrate Integrated Waveguide (SIW) modified to work as a Groove Gap Waveguide, with radiating slots etched on the upper broad wall, that radiates as a Leaky-Wave Antenna (LWA). This allows effective application of the DC bias voltage needed for tuning the LCs. At the same time, the RF field remains laterally confined, enabling the possibility to lay several antennas in parallel and achieve 2D beam scanning. The design is validated by simulation employing the actual properties of a commercial LC medium
Understanding building and urban environment interactions: An integrated framework for building occupancy modelling
Improving building energy efficiency requires accurate modelling and a comprehensive understanding of how occupants use building space. This thesis focuses on modelling building occupancy to enhance the predictive accuracy of occupancy patterns and gain a better understanding of the causal reasons for occupancy behaviour. A conceptual framework is proposed to relax the restriction of isolated building analysis, which accounts for interactions between buildings, its occupants, and other urban systems, such as the effects of transport incidents on occupancy and circulation in buildings. This thesis also presents a counterpart mapping of the framework that elaborates the links between modelling of transport and building systems. To operationalise the proposed framework, a novel modelling approach which has not been used in the current context, called the hazard-based model, is applied to model occupancy from a single building up to a district area. The proposed framework is further adapted to integrate more readily with transport models, to ensure that arrivals and departures to and from the building are consistent with the situation of the surrounding transport systems. The proposed framework and occupancy models are calibrated and validated using Wi-Fi data and other variables, such as transport and weather parameters, harvested from the South Kensington campus of Imperial College London. In addition to calibrating the occupancy model, integrating a travel simulator produces synthetic arrivals into or around the campus, which are further distributed over campus buildings via an adapted technique and feed the occupancy simulations. The model estimation results reveal the causal reasons for or exogenous effects on individual occupancy states. The validation results confirm the ability of the proposed models to predict building occupancy accurately both on average and day by day across the future dataset. Finally, evaluating occupancy simulations for various hypothetical scenarios provides valuable suggestions for efficient building design and facility operation.Open Acces
Modelling, Dimensioning and Optimization of 5G Communication Networks, Resources and Services
This reprint aims to collect state-of-the-art research contributions that address challenges in the emerging 5G networks design, dimensioning and optimization. Designing, dimensioning and optimization of communication networks resources and services have been an inseparable part of telecom network development. The latter must convey a large volume of traffic, providing service to traffic streams with highly differentiated requirements in terms of bit-rate and service time, required quality of service and quality of experience parameters. Such a communication infrastructure presents many important challenges, such as the study of necessary multi-layer cooperation, new protocols, performance evaluation of different network parts, low layer network design, network management and security issues, and new technologies in general, which will be discussed in this book
1-D broadside-radiating leaky-wave antenna based on a numerically synthesized impedance surface
A newly-developed deterministic numerical technique for the automated design of metasurface antennas is applied here for the first time to the design of a 1-D printed Leaky-Wave Antenna (LWA) for broadside radiation. The surface impedance synthesis process does not require any a priori knowledge on the impedance pattern, and starts from a mask constraint on the desired far-field and practical bounds on the unit cell impedance values. The designed reactance surface for broadside radiation exhibits a non conventional patterning; this highlights the merit of using an automated design process for a design well known to be challenging for analytical methods. The antenna is physically implemented with an array of metal strips with varying gap widths and simulation results show very good agreement with the predicted performance
Applications
Volume 3 describes how resource-aware machine learning methods and techniques are used to successfully solve real-world problems. The book provides numerous specific application examples: in health and medicine for risk modelling, diagnosis, and treatment selection for diseases in electronics, steel production and milling for quality control during manufacturing processes in traffic, logistics for smart cities and for mobile communications
Security Threats to 5G Networks for Social Robots in Public Spaces: A Survey
This paper surveys security threats to 5G-enabled wireless access networks for social robots in public spaces (SRPS). The use of social robots (SR) in public areas requires specific Quality of Service (QoS) planning to meet its unique requirements. Its 5G threat landscape entails more than cybersecurity threats that most previous studies focus on. This study examines the 5G wireless RAN for SRPS from three perspectives: SR and wireless access points, the ad hoc network link between SR and user devices, and threats to SR and users’ communication equipment. The paper analyses the security threats to confidentiality, integrity, availability, authentication, authorisation, and privacy from the SRPS security objectives perspective. We begin with an overview of SRPS use cases and access network requirements, followed by 5G security standards, requirements, and the need for a more representative threat landscape for SRPS. The findings confirm that the RAN of SRPS is most vulnerable to physical, side-channel, intrusion, injection, manipulation, and natural and malicious threats. The paper presents existing mitigation to the identified attacks and recommends including physical level security (PLS) and post-quantum cryptography in the early design of SRPS. The insights from this survey will provide valuable risk assessment and management input to researchers, industrial practitioners, policymakers, and other stakeholders of SRPS.publishedVersio
Systematic Approaches for Telemedicine and Data Coordination for COVID-19 in Baja California, Mexico
Conference proceedings info:
ICICT 2023: 2023 The 6th International Conference on Information and Computer Technologies
Raleigh, HI, United States, March 24-26, 2023
Pages 529-542We provide a model for systematic implementation of telemedicine within a large evaluation center for COVID-19 in the area of Baja California, Mexico. Our model is based on human-centric design factors and cross disciplinary collaborations for scalable data-driven enablement of smartphone, cellular, and video Teleconsul-tation technologies to link hospitals, clinics, and emergency medical services for point-of-care assessments of COVID testing, and for subsequent treatment and quar-antine decisions. A multidisciplinary team was rapidly created, in cooperation with different institutions, including: the Autonomous University of Baja California, the Ministry of Health, the Command, Communication and Computer Control Center
of the Ministry of the State of Baja California (C4), Colleges of Medicine, and the College of Psychologists. Our objective is to provide information to the public and to evaluate COVID-19 in real time and to track, regional, municipal, and state-wide data in real time that informs supply chains and resource allocation with the anticipation of a surge in COVID-19 cases. RESUMEN Proporcionamos un modelo para la implementación sistemática de la telemedicina dentro de un gran centro de evaluación de COVID-19 en el área de Baja California, México. Nuestro modelo se basa en factores de diseño centrados en el ser humano y colaboraciones interdisciplinarias para la habilitación escalable basada en datos de tecnologÃas de teleconsulta de teléfonos inteligentes, celulares y video para vincular hospitales, clÃnicas y servicios médicos de emergencia para evaluaciones de COVID en el punto de atención. pruebas, y para el tratamiento posterior y decisiones de cuarentena. Rápidamente se creó un equipo multidisciplinario, en cooperación con diferentes instituciones, entre ellas: la Universidad Autónoma de Baja California, la SecretarÃa de Salud, el Centro de Comando, Comunicaciones y Control Informático.
de la SecretarÃa del Estado de Baja California (C4), Facultades de Medicina y Colegio de Psicólogos. Nuestro objetivo es proporcionar información al público y evaluar COVID-19 en tiempo real y rastrear datos regionales, municipales y estatales en tiempo real que informan las cadenas de suministro y la asignación de recursos con la anticipación de un aumento de COVID-19. 19 casos.ICICT 2023: 2023 The 6th International Conference on Information and Computer Technologieshttps://doi.org/10.1007/978-981-99-3236-
Situation-aware Edge Computing
Future wireless networks must cope with an increasing amount of data that needs to be transmitted to or from mobile devices. Furthermore, novel applications, e.g., augmented reality games or autonomous driving, require low latency and high bandwidth at the same time. To address these challenges, the paradigm of edge computing has been proposed. It brings computing closer to the users and takes advantage of the capabilities of telecommunication infrastructures, e.g., cellular base stations or wireless access points, but also of end user devices such as smartphones, wearables, and embedded systems. However, edge computing introduces its own challenges, e.g., economic and business-related questions or device mobility. Being aware of the current situation, i.e., the domain-specific interpretation of environmental information, makes it possible to develop approaches targeting these challenges.
In this thesis, the novel concept of situation-aware edge computing is presented. It is divided into three areas: situation-aware infrastructure edge computing, situation-aware device edge computing, and situation-aware embedded edge computing. Therefore, the concepts of situation and situation-awareness are introduced. Furthermore, challenges are identified for each area, and corresponding solutions are presented. In the area of situation-aware infrastructure edge computing, economic and business-related challenges are addressed, since companies offering services and infrastructure edge computing facilities have to find agreements regarding the prices for allowing others to use them. In the area of situation-aware device edge computing, the main challenge is to find suitable nodes that can execute a service and to predict a node’s connection in the near future. Finally, to enable situation-aware embedded edge computing, two novel programming and data analysis approaches are presented that allow programmers to develop situation-aware applications.
To show the feasibility, applicability, and importance of situation-aware edge computing, two case studies are presented. The first case study shows how situation-aware edge computing can provide services for emergency response applications, while the second case study presents an approach where network transitions can be implemented in a situation-aware manner
Integration and characterisation of the performance of fifth-generation mobile technology (5g) connectivity over the University of Oulu 5g test network (5gtn) for cognitive edge node based on fractal edge platform
Abstract. In recent years, there has been a growing interest in cognitive edge nodes, which are intelligent devices that can collect and process data at the edge of the network. These nodes are becoming increasingly important for various applications such as smart cities, industrial automation, and healthcare. However, implementing cognitive edge nodes requires a reliable and efficient communication network. Therefore, this thesis assesses the performance of direct cellular (5G) and IEEE 802.11-based Wireless Local Area Network (WLAN) technology for three network architectures, which has the potential to offer low-latency, high-throughput and energy-efficient communication, for cognitive edge nodes.
The study focused on evaluating the network performance metrics of throughput, latency, and power consumption for three different FRACTAL-based network architectures. These architectures include IEEE 802.11-based last mile, direct cellular (5G) backbone, and IEEE 802.11-based last mile over cellular (5G) backbone topologies. This research aims to provide insights into the performance of 5G technology for cognitive edge nodes.
The findings suggest that the power consumption of IEEE 802.11-enabled nodes was only slightly higher than the reference case, indicating that it is more energy-efficient than 5G-enabled nodes. Additionally, in terms of latency, IEEE 802.11 technology may be more favourable. The throughput tests revealed that the cellular (5G) connection exhibited high throughput for communication between a test node and an upper-tier node situated either on the internet or at the network edge. In addition, it was found that the FRACTAL edge platform is flexible and scalable, and it supports different wireless technologies, making it a suitable platform for implementing cognitive edge nodes.
Overall, this study provides insights into the potential of 5G technology and the FRACTAL edge platform for implementing cognitive edge nodes. The results of this research can be valuable for researchers and practitioners working in the field of wireless communication and edge computing, as it sheds light on the feasibility and performance of these technologies for implementing cognitive edge nodes in various applications
- …