2,531 research outputs found

    Real-Time Network Slicing with Uncertain Demand: A Deep Learning Approach

    Full text link
    © 2019 IEEE. Practical and efficient network slicing often faces real-time dynamics of network resources and uncertain customer demands. This work provides an optimal and fast resource slicing solution under such dynamics by leveraging the latest advances in deep learning. Specifically, we first introduce a novel system model which allows the network provider to effectively allocate its combinatorial resources, i.e., spectrum, computing, and storage, to various classes of users. To allocate resources to users while taking into account the dynamic demands of users and resources constraints of the network provider, we employ a semi-Markov decision process framework. To obtain the optimal resource allocation policy for the network provider without requiring environment parameters, e.g., uncertain service time and resource demands, a Q-learning algorithm is adopted. Although this algorithm can maximize the revenue of the network provider, its convergence to the optimal policy is particularly slow, especially for problems with large state/action spaces. To overcome this challenge, we propose a novel approach using an advanced deep Q-learning technique, called deep dueling that can achieve the optimal policy at few thousand times faster than that of the conventional Q-learning algorithm. Simulation results show that our proposed framework can improve the long-term average return of the network provider up to 40% compared with other current approaches

    Analysis and Implementation of Recovery-Based Discontinuous Galerkin for Diffusion

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/76575/1/AIAA-2009-3786-303.pd

    Energy Management and Time Scheduling for Heterogeneous IoT Wireless-Powered Backscatter Networks

    Full text link
    © 2019 IEEE. In this paper, we propose a novel approach to jointly address energy management and network throughput maximization problems for heterogeneous IoT low-power wireless communication networks. In particular, we consider a low-power communication network in which the IoT devices can harvest energy from a dedicated RF energy source to support their transmissions or backscatter the signals of the RF energy source to transmit information to the gateway. Different IoT devices may have dissimilar hardware configurations, and thus they may have various communications types and energy requirements. In addition, the RF energy source may have a limited energy supply source which needs to be minimized. Thus, to maximize the network throughput, we need to jointly optimize energy usage and operation time for the IoT devices under different energy demands and communication constraints. However, this optimization problem is non-convex due to the strong relation between energy supplied by the RF energy source and the IoT communication time, and thus obtaining the optimal solution is intractable. To address this problem, we study the relation between energy supply and communication time, and then transform the non-convex optimization problem to an equivalent convex-optimization problem which can achieve the optimal solution. Through simulation results, we show that our solution can achieve greater network throughputs (up to five times) than those of other conventional methods, e.g., TDMA. In addition, the simulation results also reveal some important information in controlling energy supply and managing low-power IoT devices in heterogeneous wireless communication networks

    Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI

    Full text link
    Wireless communications are particularly vulnerable to eavesdropping attacks due to their broadcast nature. To effectively deal with eavesdroppers, existing security techniques usually require accurate channel state information (CSI), e.g., for friendly jamming (FJ), and/or additional computing resources at transceivers, e.g., cryptography-based solutions, which unfortunately may not be feasible in practice. This challenge is even more acute in low-end IoT devices. We thus introduce a novel deep learning-based FJ framework that can effectively defeat eavesdropping attacks with imperfect CSI and even without CSI of legitimate channels. In particular, we first develop an autoencoder-based communication architecture with FJ, namely AEFJ, to jointly maximize the secrecy rate and minimize the block error rate at the receiver without requiring perfect CSI of the legitimate channels. In addition, to deal with the case without CSI, we leverage the mutual information neural estimation (MINE) concept and design a MINE-based FJ scheme that can achieve comparable security performance to the conventional FJ methods that require perfect CSI. Extensive simulations in a multiple-input multiple-output (MIMO) system demonstrate that our proposed solution can effectively deal with eavesdropping attacks in various settings. Moreover, the proposed framework can seamlessly integrate MIMO security and detection tasks into a unified end-to-end learning process. This integrated approach can significantly maximize the throughput and minimize the block error rate, offering a good solution for enhancing communication security in wireless communication systems.Comment: 12 pages, 15 figure

    Countering Eavesdroppers with Meta-learning-based Cooperative Ambient Backscatter Communications

    Full text link
    This article introduces a novel lightweight framework using ambient backscattering communications to counter eavesdroppers. In particular, our framework divides an original message into two parts: (i) the active-transmit message transmitted by the transmitter using conventional RF signals and (ii) the backscatter message transmitted by an ambient backscatter tag that backscatters upon the active signals emitted by the transmitter. Notably, the backscatter tag does not generate its own signal, making it difficult for an eavesdropper to detect the backscattered signals unless they have prior knowledge of the system. Here, we assume that without decoding/knowing the backscatter message, the eavesdropper is unable to decode the original message. Even in scenarios where the eavesdropper can capture both messages, reconstructing the original message is a complex task without understanding the intricacies of the message-splitting mechanism. A challenge in our proposed framework is to effectively decode the backscattered signals at the receiver, often accomplished using the maximum likelihood (MLK) approach. However, such a method may require a complex mathematical model together with perfect channel state information (CSI). To address this issue, we develop a novel deep meta-learning-based signal detector that can not only effectively decode the weak backscattered signals without requiring perfect CSI but also quickly adapt to a new wireless environment with very little knowledge. Simulation results show that our proposed learning approach, without requiring perfect CSI and complex mathematical model, can achieve a bit error ratio close to that of the MLK-based approach. They also clearly show the efficiency of the proposed approach in dealing with eavesdropping attacks and the lack of training data for deep learning models in practical scenarios
    corecore