12 research outputs found

    Speech Quality Classifier Model based on DBN that Considers Atmospheric Phenomena

    Get PDF
    Current implementations of 5G networks consider higher frequency range of operation than previous telecommunication networks, and it is possible to offer higher data rates for different applications. On the other hand, atmospheric phenomena could have a more negative impact on the transmission quality. Thus, the study of the transmitted signal quality at high frequencies is relevant to guaranty the user ́s quality of experience. In this research, the recommendations ITU-R P.838-3 and ITU-R P.676-11 are implemented in a network scenario, which are methodologies to estimate the signal degradations originated by rainfall and atmospheric gases, respectively. Thus, speech signals are encoded by the AMR-WB codec, transmitted and the perceptual speech quality is evaluated using the algorithm described in ITU-T Rec. P.863, mostly known as POLQA. The novelty of this work is to propose a non-intrusive speech quality classifier that considers atmospheric phenomena. This classifier is based on Deep Belief Networks (DBN) that uses Support Vector Machine (SVM) with radial basis function kernel (RBF-SVM) as classifier, to identify five predefined speech quality classes. Experimental Results show that the proposed speech quality classifier reached an accuracy between 92% and 95% for each quality class overcoming the results obtained by the sole non-intrusive standard described in ITU-T Recommendation P.563. Furthermore, subjective tests are carried out to validate the proposed classifier performance, and it reached an accuracy of 94.8%

    Neurosciences and Wireless Networks: The Potential of Brain-Type Communications and Their Applications

    Get PDF
    This paper presents the first comprehensive tutorial on a promising research field located at the frontier of two well-established domains, neurosciences and wireless communications, motivated by the ongoing efforts to define the Sixth Generation of Mobile Networks (6G). In particular, this tutorial first provides a novel integrative approach that bridges the gap between these two seemingly disparate fields. Then, we present the state-of-the-art and key challenges of these two topics. In particular, we propose a novel systematization that divides the contributions into two groups, one focused on what neurosciences will offer to future wireless technologies in terms of new applications and systems architecture (Neurosciences for Wireless Networks), and the other on how wireless communication theory and next-generation wireless systems can provide new ways to study the brain (Wireless Networks for Neurosciences). For the first group, we explain concretely how current scientific understanding of the brain would enable new applications within the context of a new type of service that we dub brain-type communications and that has more stringent requirements than human- and machine-type communication. In this regard, we expose the key requirements of brain-type communication services and discuss how future wireless networks can be equipped to deal with such services. Meanwhile, for the second group, we thoroughly explore modern communication systems paradigms, including Internet of Bio-Nano Things and wireless-integrated brain-machine interfaces, in addition to highlighting how complex systems tools can help bridging the upcoming advances of wireless technologies and applications of neurosciences. Brain-controlled vehicles are then presented as our case study to demonstrate for both groups the potential created by the convergence of neurosciences and wireless communications, probably in 6G. In summary, this tutorial is expected to provide a largely missing articulation between neurosciences and wireless communications while delineating concrete ways to move forward in such an interdisciplinary endeavor

    [pt] REDUÇÃO DOS EFEITOS DE CANAIS NÃO-LINEARES SOBRE SINAIS OFDM: UM ESQUEMA DE PRÉ-DISTORÇÃO NÃO-LINEAR BASEADO EM SÉRIE DE POTÊNCIAS

    No full text
    Os principais problemas causados pela passagem de múltiplas portadoras por dispositivos não lineares são, conhecidamente, a conversão AM/AM, a conversão AM/PM, e a intermodulação. Estes problemas estão presentes tanto na transmissão via satélite, onde amplificadores de alta potência (HPAs) e transponders não lineares estão presentes, quando na radiodifusão terrestre onde, com o objetivo de ampliar ao máximo o tamanho da área geográfica na qual o serviço é oferecido, são utilizados amplificadores de alta potência operando em sua região não-linear. Neste contexto encontram-se os sinais multiportadora do tipo OFDM, amplamente utilizados na radiodifusão de sinais digitais de TV. Com o objetivo de minorar efeitos de canais não lineares sobre sinais OFDM, o presente trabalho propõe a utilização de um esquema de pré-distorção não linear modelado matematicamente através de uma série complexa de potências. Duas estratégias são consideradas no dimensionamento do esquema de pré-distorção: a redução da soma das potência dos produtos de intermodulação de ordens especificadas e a equalização das potências dos diversos produtos de intermodulação. Analises de configurações baseadas nestas duas estratégias são apresentadas juntamente com resultados numéricos envolvendo situações específicas de interesse.The main problems of multiple carriers through non-linear devices are, AM / PM conversion, conversion AM / PM conversion, and intermodulation. These problems are usually present in satellite transmissions, where high-power amplifiers (HPAs) and nonlinear transponders are used, as well as in terrestrial broadcasting systems where, in order to enlarge the service area(geographical area in which the service is offered). High-power amplifiers operating in their non-linear region are used. The multicarrier transmission called OFDM, which is widely used in TV broadcasting digital signals falls in this context. In order to alleviate the effects of nonlinear channels on OFDM signals, the present study suggests the use of a pre-distortion system mathematically described through a complex power series. Two Strategies are considered in order to determine the pre-distortion system parameters: the reduction of the intermodulation power sum associated to intermodulation products of any specified order, and the equalization of the intermodulation power associated to intermodulation product of various orders. Analysis of configurations based on these two strategies are presented together with numerical results involving situations of specific interest

    BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning

    No full text
    Following the recent advances in wireless communication leading to increased Internet of Things (IoT) systems, many security threats are currently ravaging IoT systems, causing harm to information. Considering the vast application areas of IoT systems, ensuring that cyberattacks are holistically detected to avoid harm is paramount. Machine learning (ML) algorithms have demonstrated high capacity in helping to mitigate attacks on IoT devices and other edge systems with reasonable accuracy. However, the dynamics of operation of intruders in IoT networks require more improved IDS models capable of detecting multiple attacks with a higher detection rate and lower computational resource requirement, which is one of the challenges of IoT systems. Many ensemble methods have been used with different ML classifiers, including decision trees and random forests, to propose IDS models for IoT environments. The boosting method is one of the approaches used to design an ensemble classifier. This paper proposes an efficient method for detecting cyberattacks and network intrusions based on boosted ML classifiers. Our proposed model is named BoostedEnML. First, we train six different ML classifiers (DT, RF, ET, LGBM, AD, and XGB) and obtain an ensemble using the stacking method and another with a majority voting approach. Two different datasets containing high-profile attacks, including distributed denial of service (DDoS), denial of service (DoS), botnets, infiltration, web attacks, heartbleed, portscan, and botnets, were used to train, evaluate, and test the IDS model. To ensure that we obtained a holistic and efficient model, we performed data balancing with synthetic minority oversampling technique (SMOTE) and adaptive synthetic (ADASYN) techniques; after that, we used stratified K-fold to split the data into training, validation, and testing sets. Based on the best two models, we construct our proposed BoostedEnsML model using LightGBM and XGBoost, as the combination of the two classifiers gives a lightweight yet efficient model, which is part of the target of this research. Experimental results show that BoostedEnsML outperformed existing ensemble models in terms of accuracy, precision, recall, F-score, and area under the curve (AUC), reaching 100% in each case on the selected datasets for multiclass classification

    Key Advances in Pervasive Edge Computing for Industrial Internet of Things in 5G and Beyond

    Get PDF
    This article surveys emerging technologies related to pervasive edge computing (PEC) for industrial internet-of-things (IIoT) enabled by fifth-generation (5G) and beyond communication networks. PEC encompasses all devices that are capable of performing computational tasks locally, including those at the edge of the core network (edge servers co-located with 5G base stations) and in the radio access network (sensors, actuators, etc.). The main advantages of this paradigm are core network offloading (and benefits therefrom) and low latency for delay-sensitive applications (e.g., automatic control). We have reviewed the state-of-the-art in the PEC paradigm and its applications to the IIoT domain, which have been enabled by the recent developments in 5G technology. We have classified and described three important research areas related to PEC—distributed artificial intelligence methods, energy efficiency, and cyber security. We have also identified the main open challenges that must be solved to have a scalable PEC-based IIoT network that operates efficiently under different conditions. By explaining the applications, challenges, and opportunities, our paper reinforces the perspective that the PEC paradigm is an extremely suitable and important deployment model for industrial communication networks, considering the modern trend toward private industrial 5G networks with local operations and flexible management

    Quantum Key Distribution Protocol Selector Based on Machine Learning for Next-Generation Networks

    No full text
    In next-generation networks, including the sixth generation (6G), a large number of computing devices can communicate with ultra-low latency. By implication, 6G capabilities present a massive benefit for the Internet of Things (IoT), considering a wide range of application domains. However, some security concerns in the IoT involving authentication and encryption protocols are currently under investigation. Thus, mechanisms implementing quantum communications in IoT devices have been explored to offer improved security. Algorithmic solutions that enable better quantum key distribution (QKD) selection for authentication and encryption have been developed, but having limited performance considering time requirements. Therefore, a new approach for selecting the best QKD protocol based on a Deep Convolutional Neural Network model, called Tree-CNN, is proposed using the Tanh Exponential Activation Function (TanhExp) that enables IoT devices to handle more secure quantum communications using the 6G network infrastructure. The proposed model is developed, and its performance is compared with classical Convolutional Neural Networks (CNN) and other machine learning methods. The results obtained are superior to the related works, with an Area Under the Curve (AUC) of 99.89% during testing and a time-cost performance of 0.65 s for predicting the best QKD protocol. In addition, we tested our proposal using different transmission distances and three QKD protocols to demonstrate that the prediction and actual results reached similar values. Hence, our proposed model obtained a fast, reliable, and precise solution to solve the challenges of performance and time consumption in selecting the best QKD protocol

    Quantum Key Distribution Protocol Selector Based on Machine Learning for Next-Generation Networks

    No full text
    In next-generation networks, including the sixth generation (6G), a large number of computing devices can communicate with ultra-low latency. By implication, 6G capabilities present a massive benefit for the Internet of Things (IoT), considering a wide range of application domains. However, some security concerns in the IoT involving authentication and encryption protocols are currently under investigation. Thus, mechanisms implementing quantum communications in IoT devices have been explored to offer improved security. Algorithmic solutions that enable better quantum key distribution (QKD) selection for authentication and encryption have been developed, but having limited performance considering time requirements. Therefore, a new approach for selecting the best QKD protocol based on a Deep Convolutional Neural Network model, called Tree-CNN, is proposed using the Tanh Exponential Activation Function (TanhExp) that enables IoT devices to handle more secure quantum communications using the 6G network infrastructure. The proposed model is developed, and its performance is compared with classical Convolutional Neural Networks (CNN) and other machine learning methods. The results obtained are superior to the related works, with an Area Under the Curve (AUC) of 99.89% during testing and a time-cost performance of 0.65 s for predicting the best QKD protocol. In addition, we tested our proposal using different transmission distances and three QKD protocols to demonstrate that the prediction and actual results reached similar values. Hence, our proposed model obtained a fast, reliable, and precise solution to solve the challenges of performance and time consumption in selecting the best QKD protocol
    corecore