1,329 research outputs found
Recommended from our members
Preference-based spectrum pricing in dynamic spectrum access networks
With market-driven secondary spectrum trading, licensed users can receive benefits in terms of monetary rewards or various transmission services, thus setting a fair pricing structure by suitably defining spectrum quality characteristics and accurately addressing participant’s requirement is a key issue. In this paper, we investigate the pricing-based spectrum access by casting the problem of spectrum pricing into a Hotelling game model according to spectrum quality diversity. Particularly, we first build a pricing system model where unused spectrum from primary systems with different qualities forms a spectrum pool and can be divided into a number of uniform channels. A secondary user purchases a channel for usage according to its selection preference which is closely related to the channel quality and spectrum evaluation. The secondary user not only needs to consider the channel’s quality and price, but also the interference cost on primary system. Detailed analysis on the policy preference of both primary system and secondary buyer are provided. By forming a game problem of spectrum pricing between primary and secondary users, we apply the Hotelling game model to handle the interaction between the participants. Specifically, by fixing Nash equilibrium of the game, an iterative algorithm for spectrum pricing is proposed based on the distribution characteristics of secondary user’s preference. Essential analysis for the existence and uniqueness of the Nash equilibrium along with algorithm’s convergence conditions are provided. Numerical results are also supplemented to show the effectiveness of the proposed algorithm in ensuring spectrum owner’s profit
Reaching the last mile: best practices in leveraging the power of ICTs to communicate climate services to farmers at scale
This report reviews key ICTs for Development (ICT4D) Programs, Innovations and
Information Exchange Platforms which are experimented within South Asia to
explore the use and scale-ability of these innovative approaches to other parts of
Africa and the developing world. Learning from the pioneering experiences of pilot
projects across India and Africa in ICT development, we assess the potential ICTs
offer to not only communicate climate information and related advisory services but
also to build capacity and increase the resilience of rural smallholders. It is our hope
that such South-South learning can pave the way for improved cross-regional
experience sharing to tackle common challenges in reaching ‘the last mile’ with
salient rural extension services, including climate information services
AdapINT: A Flexible and Adaptive In-Band Network Telemetry System Based on Deep Reinforcement Learning
In-band Network Telemetry (INT) has emerged as a promising network
measurement technology. However, existing network telemetry systems lack the
flexibility to meet diverse telemetry requirements and are also difficult to
adapt to dynamic network environments. In this paper, we propose AdapINT, a
versatile and adaptive in-band network telemetry framework assisted by
dual-timescale probes, including long-period auxiliary probes (APs) and
short-period dynamic probes (DPs). Technically, the APs collect basic network
status information, which is used for the path planning of DPs. To achieve full
network coverage, we propose an auxiliary probes path deployment (APPD)
algorithm based on the Depth-First-Search (DFS). The DPs collect specific
network information for telemetry tasks. To ensure that the DPs can meet
diverse telemetry requirements and adapt to dynamic network environments, we
apply the deep reinforcement learning (DRL) technique and transfer learning
method to design the dynamic probes path deployment (DPPD) algorithm. The
evaluation results show that AdapINT can redesign the telemetry system
according to telemetry requirements and network environments. AdapINT can
reduce telemetry latency by 75\% in online games and video conferencing
scenarios. For overhead-aware networks, AdapINT can reduce control overheads by
34\% in cloud computing services.Comment: 14 pages, 19 figure
Recommended from our members
Advances and emerging challenges in cognitive internet-of-things
The evolution of IoT devices and their adoption in new generation intelligent systems has generated a huge demand for wireless bandwidth. This bandwidth problem is further exacerbated by another characteristics of IoT applications, i.e. IoT devices are usually deployed in massive number, thus leading to an awkward scenario that many bandwidth-hungry devices are chasing after the very limited wireless bandwidth within a small geographic area. As such, cognitive radio has received much attention of there search community as an important means for addressing the bandwidth needs of IoT applications. When enabling IoT devices with cognitive functionalities including spectrum sensing, dynamic spectrum accessing, circumstantial perceiving and self-learning, one will also need to fully study other critical issues such as standardization, privacy protection and heterogeneous coexistence. In this paper, we investigate the structural frameworks and potential applications of cognitive IoT. We further discuss the spectrum-based functionalities and heterogeneity for cognitive IoT. Security and privacy issues involved in cognitive IoT are also investigated. Finally, we present the key challenges and future direction of research on cognitiveradio-based IoT networks
SOOD: Towards Semi-Supervised Oriented Object Detection
Semi-Supervised Object Detection (SSOD), aiming to explore unlabeled data for
boosting object detectors, has become an active task in recent years. However,
existing SSOD approaches mainly focus on horizontal objects, leaving
multi-oriented objects that are common in aerial images unexplored. This paper
proposes a novel Semi-supervised Oriented Object Detection model, termed SOOD,
built upon the mainstream pseudo-labeling framework. Towards oriented objects
in aerial scenes, we design two loss functions to provide better supervision.
Focusing on the orientations of objects, the first loss regularizes the
consistency between each pseudo-label-prediction pair (includes a prediction
and its corresponding pseudo label) with adaptive weights based on their
orientation gap. Focusing on the layout of an image, the second loss
regularizes the similarity and explicitly builds the many-to-many relation
between the sets of pseudo-labels and predictions. Such a global consistency
constraint can further boost semi-supervised learning. Our experiments show
that when trained with the two proposed losses, SOOD surpasses the
state-of-the-art SSOD methods under various settings on the DOTA-v1.5
benchmark. The code will be available at https://github.com/HamPerdredes/SOOD.Comment: Accepted to CVPR 2023. Code will be available at
https://github.com/HamPerdredes/SOO
Practical m
In collaborative data publishing (CDP), an m-adversary attack refers to a scenario where up to m malicious data providers collude to infer data records contributed by other providers. Existing solutions either rely on a trusted third party (TTP) or introduce expensive computation and communication overheads. In this paper, we present a practical distributed k-anonymization scheme, m-k-anonymization, designed to defend against m-adversary attacks without relying on any TTPs. We then prove its security in the semihonest adversary model and demonstrate how an extension of the scheme can also be proven secure in a stronger adversary model. We also evaluate its efficiency using a commonly used dataset
Optimization Algorithm of Control Channel Selection for Wireless Networks
Control channel is used to transmit protocol or signal information between wireless network nodes and is a key component of wireless network. Compared with data information, protocol or signal information is usually much less, so the spectrum bandwidth requirement of control channel is also much less than that of data channel. In order to optimize the usage of the limited spectrum resources, this paper focuses on the issue of control channel selection. We propose a greedy algorithm which minimizes the total spectrum bandwidth of the set of control channels. Theoretical analysis proves that the proposed algorithm can achieve the optimal set of control whose sum of the spectrum bandwidth is the minimum. Simulation results also show that the proposed algorithm consumes less spectrum resources than other algorithms in the same wireless network environment
- …