36 research outputs found

    Deep learning (DL) based joint resource allocation and RRH association in 5G-multi-tier networks

    Get PDF
    ABSTRACT: Fifth-Generation (5G) networks have adopted a multi-tier structural model which includes femtocells, picocells, and macrocells to ensure the user quality-of-service (QoS). To meet these QoS demands, the system requires optimization of different resources in different network dynamics carefully. However, if ignored, this will lead to long processing delays and high computational burdens. To avoid this, we proposed Deep Learning (DL) based resource allocation (RA) as a promising solution to meet the network requirements. DL is an effective mechanism where neural networks can learn to develop RA techniques. Thus, an optimized RA decision can be achieved using DL without exhaustive computations. Further, DL uses DL to achieve solutions for joint RA and remote-radio-head (RRH) association problems in multi-tier Cloud-Radio Access Networks (C-RAN). Initially, a summary of existing literature on DL-based RA techniques is provided, followed by a deep neural network (DNN) description, its architectures, and the data training method. Then, a supervised DL technique is presented to solve the joint RA and RRH-association problem. An efficient subchannel assignment, power allocation, and RRH-association (SAPARA) technique are used to generate the training data for the DNN model using the iterative approach where the seed data for the SAPARA technique is taken using a uniform power allocation and path-loss based association (UPA-PLBA) model. After training the DNN model, the accurateness of the presented model is tested. Simulation outcomes demonstrate that our proposed scheme is capable of providing an efficient solution in the considered scenario

    Heuristic Approach to Select Opportunistic Routing Forwarders (HASORF) to Enhance Throughput for Wireless Sensor Networks

    Get PDF
    Biological schemes provide useful resources for designing adaptive routing protocols for wireless sensor networks (WSNs). The key idea behind using bioinspired routing is to find the optimal path to the destination. Similarly, the idea of opportunistic routing (OR) is to find the least number of hops to deliver the data to the destination. Numerous routing schemes have been proposed in WSNs while targeting various performance goals, such as throughput, delay, and link quality. Recently, OR schemes have come onto the scene in comparison with the traditional routing algorithms. The performance of OR schemes, however, highly depends on the selection of forwarder nodes. In this paper, we consider a chain network topology, where nodes are separated by an equal distance. The throughput of the chain network is analyzed mathematically, and based on the analysis results, a heuristic algorithm is proposed to choose the forwarder nodes. We evaluate the performance of the proposed Heuristic Approach to Select Opportunistic Routing Forwarders (HASORF) by using the ns-2 simulator and compare it with previous schemes, such as random routing, Extremely Opportunistic Routing (ExOR), and Simple Opportunistic Adaptive Routing (SOAR). The empirical results show that our proposed scheme achieves the best performance among them

    A Survey on Resource Management in IoT Operating Systems

    Get PDF
    Recently, the Internet of Things (IoT) concept has attracted a lot of attention due to its capability to translate our physical world into a digital cyber world with meaningful information. The IoT devices are smaller in size, sheer in number, contain less memory, use less energy, and have more computational capabilities. These scarce resources for IoT devices are powered by small operating systems (OSs) that are specially designed to support the IoT devices' diverse applications and operational requirements. These IoT OSs are responsible for managing the constrained resources of IoT devices efficiently and in a timely manner. In this paper, discussions on IoT devices and OS resource management are provided. In detail, the resource management mechanisms of the state-of-the-art IoT OSs, such as Contiki, TinyOS, and FreeRTOS, are investigated. The different dimensions of their resource management approaches (including process management, memory management, energy management, communication management, and file management) are studied, and their advantages and limitations are highlighted

    5G Mobile Services and Scenarios: Challenges and Solutions

    No full text
    The Fifth generation (5G) network is projected to support large amount of data traffic and massive number of wireless connections. Different data traffic has different Quality of Service (QoS) requirements. 5G mobile network aims to address the limitations of previous cellular standards (i.e., 2G/3G/4G) and be a prospective key enabler for future Internet of Things (IoT). 5G networks support a wide range of applications such as smart home, autonomous driving, drone operations, health and mission critical applications, Industrial IoT (IIoT), and entertainment and multimedia. Based on end users’ experience, several 5G services are categorized into immersive 5G services, intelligent 5G services, omnipresent 5G services, autonomous 5G services, and public 5G services. In this paper, we present a brief overview of 5G technical scenarios. We then provide a brief overview of accepted papers in our Special Issue on 5G mobile services and scenarios. Finally, we conclude this paper

    Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues

    No full text
    Routing is one of the most important operations in wireless sensor networks (WSNs) as it deals with data delivery to base stations. Routing attacks can cripple it easily and degrade the operation of WSNs significantly. Traditional security mechanisms such as cryptography and authentication alone cannot cope with some of the routing attacks as they come from compromised nodes mostly. Recently, trust mechanism is introduced to enhance security and improve cooperation among nodes. In routing, trust mechanism avoids/includes nodes in routing operation based on the estimated trust value. Many trust-based routing protocols are proposed to secure routing, in which they consider different routing attacks. In this research work, our goal is to explore the current research state and identify open research issues by surveying proposed schemes. To achieve our goal we extensively analyze and discuss proposed schemes based on the proposed framework. Moreover, we evaluate proposed schemes based on two important factors, which are energy consumption and attack resiliency. We discuss and present open research issues in the proposed schemes and research field

    Smartphone Sensors for Indoor Positioning

    No full text
    The explosive growth and wide proliferation of mobile devices, the majority of which are smartphones, led to the inception of several novel and intuitive services, including on-the-go services, online customer services, and location-based services (LBS) [...

    Internet of Things (IoT)-Based Wireless Health: Enabling Technologies and Applications

    Get PDF
    Wireless health is transforming health care by integrating wireless technologies into conventional medicine, including the diagnosis, monitoring, and treatment of illness [...

    Internet of Multimedia Things (IoMT): Opportunities, Challenges and Solutions

    No full text
    With the immersive growth of the Internet of Things (IoT) and real-time adaptability, quality of life for people is improving. IoT applications are diverse in nature and one crucial aspect of it is multimedia sensors and devices. These IoT multimedia devices form the Internet of Multimedia Things (IoMT). It generates a massive volume of data with different characteristics and requirements than the IoT. The real-time deployment scenarios vary from smart traffic monitoring to smart hospitals. Hence, Timely delivery of IoMT data and decision making is critical as it directly involves the safety of human beings. In this paper, we present a brief overview of IoMT and future research directions. Afterward, we provide an overview of the accepted articles in our special issue on the IoMT: Opportunities, Challenges, and Solutions

    Evading virus detection using code obfuscation

    No full text
    The conflict between malware authors and analysts is heating up as both are coming up with new armaments in their armory. Malware authors are employing novel sophisticated techniques like metamorphosis to thwart detection mechanisms while security professionals are budding new ways to confront them. In this paper we formally treat diverse mechanisms of making malware undetectable in general and code mutation techniques in particular. We also supported our argument where possible, through different tools and have revealed their outcome. In the end we give our methodology to make any virus undetectable using amalgamation of hex editing and metamorphic techniques
    corecore