Post-Segmentation Approach for Lossless Region of Interest Codingsipij
This paper presents a lossless region of interest coding technique that is suitable for interactive telemedicine over networks. The new encoding scheme allows a server to transmit only a part of a compressed image data progressively as a client requests it. This technique is different from region scalable coding in JPEG2000 since it does not define region of interest (ROI) when encoding occurs. In the proposed method, the image is fully encoded and stored in the server. It also allows a user to select a ROI after the compression is done. This feature is the main contribution of research. The proposed coding method achieves the region scalable coding by using the integer wavelet lifting, successive quantization, and partitioning that rearranges the wavelet coefficients into subsets. Each subset that represents a local area in an image is then separately coded using run-length and entropy coding. In this paper, we will show the benefits of using the proposed technique with examples and simulation results.
Device to evaluate cleanliness of fiber optic connectors using image processi...IJECEIAES
This work proposes a portable, handheld electronic device, which measures the cleanliness in fiber optic connectors via digital image processing and artificial neural networks. Its purpose is to reduce the evaluation subjectivity in visual inspection done by human experts. Although devices with this purpose already exist, they tend to be cost-prohibitive and do not take advantage of neither image processing nor artificial intelligence to improve their results. The device consists of an optical microscope for fiber optic connector analysis, a digital camera adapter, a reduced-board computer, an image processing algorithm, a neural network algorithm and an LCD screen for equipment operation and results visualization. The image processing algorithm applies grayscale histogram equalization, Gaussian filtering, Canny filtering, Hough transform, region of interest segmentation and obtaining radiometric descriptors as inputs to the neural network. Validation consisted of comparing the results by the proposed device with those obtained by agreeing human experts via visual inspection. Results yield an average Cohen's Kappa of 0.926, which implies a very satisfactory performance by the proposed device.
Optimized image processing and clustering to mitigate security threats in mob...TELKOMNIKA JOURNAL
Since there are provisions of many attributes that are not possible or difficult to follow by networks conventionally, mobile ad-hoc networks are extensively deployed. This application starts through the defense sectors, the sensory node presents in the hostile territories down to the gadgets for congestion communication in traffic by general transportation when travelling for adequate provision of infrastructure during disaster recovery. As a lot of importance related to (mobile ad hoc network) MANET application, one important factor in ad-hoc networks is security. Using image processing for securing MANET is the area of focus of this research. Therefore, in this article, the security threats are assessed and representative proposals are summarized in ad-hoc network’s context. The study reviewed the current situation of the art for original to security provision called mobile ad hoc network for wireless networking. The threats to security are recognized while the present solution is observed. The study additionally summarized education erudite, talks on general issues and future instructions are recognized. Also, in this study, the forecast weighted clustering algorithm (FWCA) is employed as a cluster head over weighted clustering algorithm (WCA) is examined as quality in cluster-based routing, service is highly significant with MANET.
Comparative Isolation Techniques of 1x2 MIMO Antenna for 5Gjournal ijrtem
ABSTRACT : In this paper a simple mender line EBG with slotted ground planer 1x2 rectangle patch multi-band antenna is designed and simulated. Presently the communication system provides the ultra wideband internet services. This is possible due to higher data rates and improved spectral efficiency of the communication system. The higher data rates and improved spectral efficiency are achieved by the use of MIMO antenna. MIMO antenna provide a significant increase in data rate and range of link without more bandwidth and power. The main design challenge in MIMO antenna is to attain high isolation between the antenna elements. This paper reviews various decoupling techniques to improve the mutual coupling between the antenna elements.
Towards 802.11g Signal Strength Estimation in an Industrial Environment: a Pr...Dalton Valadares
Paper published in the AINA-2019 (The 33-rd International Conference on Advanced Information Networking and Applications).
March 27-th to March 29-th, 2019 at Kunibiki Messe, Matsue, Japan.
Post-Segmentation Approach for Lossless Region of Interest Codingsipij
This paper presents a lossless region of interest coding technique that is suitable for interactive telemedicine over networks. The new encoding scheme allows a server to transmit only a part of a compressed image data progressively as a client requests it. This technique is different from region scalable coding in JPEG2000 since it does not define region of interest (ROI) when encoding occurs. In the proposed method, the image is fully encoded and stored in the server. It also allows a user to select a ROI after the compression is done. This feature is the main contribution of research. The proposed coding method achieves the region scalable coding by using the integer wavelet lifting, successive quantization, and partitioning that rearranges the wavelet coefficients into subsets. Each subset that represents a local area in an image is then separately coded using run-length and entropy coding. In this paper, we will show the benefits of using the proposed technique with examples and simulation results.
Device to evaluate cleanliness of fiber optic connectors using image processi...IJECEIAES
This work proposes a portable, handheld electronic device, which measures the cleanliness in fiber optic connectors via digital image processing and artificial neural networks. Its purpose is to reduce the evaluation subjectivity in visual inspection done by human experts. Although devices with this purpose already exist, they tend to be cost-prohibitive and do not take advantage of neither image processing nor artificial intelligence to improve their results. The device consists of an optical microscope for fiber optic connector analysis, a digital camera adapter, a reduced-board computer, an image processing algorithm, a neural network algorithm and an LCD screen for equipment operation and results visualization. The image processing algorithm applies grayscale histogram equalization, Gaussian filtering, Canny filtering, Hough transform, region of interest segmentation and obtaining radiometric descriptors as inputs to the neural network. Validation consisted of comparing the results by the proposed device with those obtained by agreeing human experts via visual inspection. Results yield an average Cohen's Kappa of 0.926, which implies a very satisfactory performance by the proposed device.
Optimized image processing and clustering to mitigate security threats in mob...TELKOMNIKA JOURNAL
Since there are provisions of many attributes that are not possible or difficult to follow by networks conventionally, mobile ad-hoc networks are extensively deployed. This application starts through the defense sectors, the sensory node presents in the hostile territories down to the gadgets for congestion communication in traffic by general transportation when travelling for adequate provision of infrastructure during disaster recovery. As a lot of importance related to (mobile ad hoc network) MANET application, one important factor in ad-hoc networks is security. Using image processing for securing MANET is the area of focus of this research. Therefore, in this article, the security threats are assessed and representative proposals are summarized in ad-hoc network’s context. The study reviewed the current situation of the art for original to security provision called mobile ad hoc network for wireless networking. The threats to security are recognized while the present solution is observed. The study additionally summarized education erudite, talks on general issues and future instructions are recognized. Also, in this study, the forecast weighted clustering algorithm (FWCA) is employed as a cluster head over weighted clustering algorithm (WCA) is examined as quality in cluster-based routing, service is highly significant with MANET.
Comparative Isolation Techniques of 1x2 MIMO Antenna for 5Gjournal ijrtem
ABSTRACT : In this paper a simple mender line EBG with slotted ground planer 1x2 rectangle patch multi-band antenna is designed and simulated. Presently the communication system provides the ultra wideband internet services. This is possible due to higher data rates and improved spectral efficiency of the communication system. The higher data rates and improved spectral efficiency are achieved by the use of MIMO antenna. MIMO antenna provide a significant increase in data rate and range of link without more bandwidth and power. The main design challenge in MIMO antenna is to attain high isolation between the antenna elements. This paper reviews various decoupling techniques to improve the mutual coupling between the antenna elements.
Towards 802.11g Signal Strength Estimation in an Industrial Environment: a Pr...Dalton Valadares
Paper published in the AINA-2019 (The 33-rd International Conference on Advanced Information Networking and Applications).
March 27-th to March 29-th, 2019 at Kunibiki Messe, Matsue, Japan.
A thesis presentation on Performance Analysis of Cloud Simulation By Using Cloud Simulator Toolkit Held on Department of Computer Science & Engineering , RUET in December, 2015
Magnetic resonance coupling for 5G WPT applicationsjournalBEEI
Inductive Wireless Power Transfer (IWPT) is the most popular and common technology for the resonance coupling power transfer. However, in 2007 it has experimentally demonstrated by a research group from Massachusets Institute of Technology (MIT) that WPT can be improved by using Magnetic Resonance Coupling Wireless Power Transfer (MRC WPT) in terms of the coupling distance and efficiency. Furthermore, by exploiting the unused, high-frequency mm-wave band which are ranging from 3~300 GHz frequency band, the next 5G generations of wireless networks will be able to support a higher number of devices with the increasing data rate, higher energy efficiency and also compatible with the previous technology. In this work, a square planar inductor with the dimension of 6.1 x 6.1 mm is designed, and the resonators have the same self-resonance frequency at 14 GHz. The coil resonators have been laid on Silicon and Oxide substrate to reduce the loss in the design. From the CST software simulation and the analytical model in MATLAB software, it has been shown that the MRC WPT design has improved the performance of IWPT design by 40% power transfer efficiency. MRC WPT design also has larger H-Field value which is 705.5 A/m, as compared to the IWPT design which has only 285.6 A/m when both Transmitter(Tx) and Reciever(RX) is at 0.3 mm coupling distance.
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
The high-level contribution of this paper is a detailed simulation based analysis about the impact of mobility models on the performance of node-disjoint and link-disjoint multipath routing algorithms for mobile ad hoc networks (MANETs).
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
The high-level contribution of this paper is a detailed simulation based analysis about the impact of mobility models on the performance of node-disjoint and link-disjoint multi-path routing algorithms for mobile ad hoc networks (MANETs).
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
Energy efficient intelligent routing in WSN using dominant genetic algorithmIJECEIAES
In the current era of wireless sensor network development, among the various challeng- ing issues, the life enhancement has obtained the prime interest. Reason is clear and straight: the battery operated sensors do have limited period of life hence to keep the network active as much as possible, life of network should be larger. To enhance the life of the network, at different level different approaches has been applied, broadly defining the proper scheduling of sensors and defining the energy efficient communication. In this paper heuristic based energy efficient communication approch has applied. A new development in the Genetic algorithm has presented and called as Dominant Genetic algorithm to determine the optimum energy efficient routing path between sensor nodes and to define the optimal energy efficient trajectory for mobile data gathering node. Dominancy of high fitness solution has included in the Genetic algorithm because of its natural existence. The proposed solution has applied the connection oriented crossover and mutation operator to maintain the feasibility of generated solution. The proposed solution has applied with various simulation experiments under two different scenarios: in first case energy efficient routes among the sensors have explored to deliver the information from source sensor to the sink node and in second case, energy efficient route among all local data hubs for mobile data gathering node has obtained. The proposed solution performances have been analyzed quantitatively and analytically. It has observed with various experimental results that proposed method not only has delivered the better solution but also has faster convergence and high level of reliability in compared to conventional form of Genetic algorithm.
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
Trends in mobile network communication and telematics in 2020ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
Artificial Neural Network (ANN) is a fast-growing method which has been used in different
industries during recent years. The main idea for creating ANN which is a subset of artificial
intelligence is to provide a simple model of human brain in order to solve complex scientific and
industrial problems. ANNs are high-value and low-cost tools in modelling, simulation, control,
condition monitoring, sensor validation and fault diagnosis of different systems. It have high
flexibility and robustness in modeling, simulating and diagnosing the behavior of rotating machines
even in the presence of inaccurate input data. They can provide high computational speed for
complicated tasks that require rapid response such as real-time processing of several simultaneous
signals. ANNs can also be used to improve efficiency and productivity of energy in rotating
equipment
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
Wireless sensor networks are an innovative and rapidly advanced network occupying the broad spectrum of wireless networks. It works on the principle of “use with less expense, effort and with more comfort.” In these networks, routing provides efficient and effective data transmission between different sources to access points using the clustering technique. This work addresses the low-energy adaptive clustering hierarchy (LEACH) protocol’s main backdrop of choosing head nodes based on a random value. In this, the soft computing methods are used, namely the fuzzy approach, to overcome this barrier in LEACH. Our approach’s primary goal is to extend the network lifetime with efficient energy consumption and by choosing the appropriate head node in each cluster based on the fuzzy parameters. The proposed clustering algorithm focused on two fuzzy inference structures, namely Mamdani and Sugeno fuzzy logic models in two scenarios, respectively. We compared our approach with four existing works, the conventional LEACH, LEACH using the fuzzy method, multicriteria cluster head delegation, and fuzzy-based energy efficient clustering approach (FEECA) in wireless sensor network. The proposed scenario based fuzzy LEACH protocol approaches are better than the four existing methods regarding stability, network survivability, and energy consumption.
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes
articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all
technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together
researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts
and establishing new collaborations in these areas.
A thesis presentation on Performance Analysis of Cloud Simulation By Using Cloud Simulator Toolkit Held on Department of Computer Science & Engineering , RUET in December, 2015
Magnetic resonance coupling for 5G WPT applicationsjournalBEEI
Inductive Wireless Power Transfer (IWPT) is the most popular and common technology for the resonance coupling power transfer. However, in 2007 it has experimentally demonstrated by a research group from Massachusets Institute of Technology (MIT) that WPT can be improved by using Magnetic Resonance Coupling Wireless Power Transfer (MRC WPT) in terms of the coupling distance and efficiency. Furthermore, by exploiting the unused, high-frequency mm-wave band which are ranging from 3~300 GHz frequency band, the next 5G generations of wireless networks will be able to support a higher number of devices with the increasing data rate, higher energy efficiency and also compatible with the previous technology. In this work, a square planar inductor with the dimension of 6.1 x 6.1 mm is designed, and the resonators have the same self-resonance frequency at 14 GHz. The coil resonators have been laid on Silicon and Oxide substrate to reduce the loss in the design. From the CST software simulation and the analytical model in MATLAB software, it has been shown that the MRC WPT design has improved the performance of IWPT design by 40% power transfer efficiency. MRC WPT design also has larger H-Field value which is 705.5 A/m, as compared to the IWPT design which has only 285.6 A/m when both Transmitter(Tx) and Reciever(RX) is at 0.3 mm coupling distance.
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
The high-level contribution of this paper is a detailed simulation based analysis about the impact of mobility models on the performance of node-disjoint and link-disjoint multipath routing algorithms for mobile ad hoc networks (MANETs).
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
The high-level contribution of this paper is a detailed simulation based analysis about the impact of mobility models on the performance of node-disjoint and link-disjoint multi-path routing algorithms for mobile ad hoc networks (MANETs).
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
Energy efficient intelligent routing in WSN using dominant genetic algorithmIJECEIAES
In the current era of wireless sensor network development, among the various challeng- ing issues, the life enhancement has obtained the prime interest. Reason is clear and straight: the battery operated sensors do have limited period of life hence to keep the network active as much as possible, life of network should be larger. To enhance the life of the network, at different level different approaches has been applied, broadly defining the proper scheduling of sensors and defining the energy efficient communication. In this paper heuristic based energy efficient communication approch has applied. A new development in the Genetic algorithm has presented and called as Dominant Genetic algorithm to determine the optimum energy efficient routing path between sensor nodes and to define the optimal energy efficient trajectory for mobile data gathering node. Dominancy of high fitness solution has included in the Genetic algorithm because of its natural existence. The proposed solution has applied the connection oriented crossover and mutation operator to maintain the feasibility of generated solution. The proposed solution has applied with various simulation experiments under two different scenarios: in first case energy efficient routes among the sensors have explored to deliver the information from source sensor to the sink node and in second case, energy efficient route among all local data hubs for mobile data gathering node has obtained. The proposed solution performances have been analyzed quantitatively and analytically. It has observed with various experimental results that proposed method not only has delivered the better solution but also has faster convergence and high level of reliability in compared to conventional form of Genetic algorithm.
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
Trends in mobile network communication and telematics in 2020ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
Artificial Neural Network (ANN) is a fast-growing method which has been used in different
industries during recent years. The main idea for creating ANN which is a subset of artificial
intelligence is to provide a simple model of human brain in order to solve complex scientific and
industrial problems. ANNs are high-value and low-cost tools in modelling, simulation, control,
condition monitoring, sensor validation and fault diagnosis of different systems. It have high
flexibility and robustness in modeling, simulating and diagnosing the behavior of rotating machines
even in the presence of inaccurate input data. They can provide high computational speed for
complicated tasks that require rapid response such as real-time processing of several simultaneous
signals. ANNs can also be used to improve efficiency and productivity of energy in rotating
equipment
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
Wireless sensor networks are an innovative and rapidly advanced network occupying the broad spectrum of wireless networks. It works on the principle of “use with less expense, effort and with more comfort.” In these networks, routing provides efficient and effective data transmission between different sources to access points using the clustering technique. This work addresses the low-energy adaptive clustering hierarchy (LEACH) protocol’s main backdrop of choosing head nodes based on a random value. In this, the soft computing methods are used, namely the fuzzy approach, to overcome this barrier in LEACH. Our approach’s primary goal is to extend the network lifetime with efficient energy consumption and by choosing the appropriate head node in each cluster based on the fuzzy parameters. The proposed clustering algorithm focused on two fuzzy inference structures, namely Mamdani and Sugeno fuzzy logic models in two scenarios, respectively. We compared our approach with four existing works, the conventional LEACH, LEACH using the fuzzy method, multicriteria cluster head delegation, and fuzzy-based energy efficient clustering approach (FEECA) in wireless sensor network. The proposed scenario based fuzzy LEACH protocol approaches are better than the four existing methods regarding stability, network survivability, and energy consumption.
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes
articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all
technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together
researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts
and establishing new collaborations in these areas.
Human body blockage effect on wireless network performance for outdoor coverageIJECEIAES
The rapid development in the field of communications and growing numbers of the population every year stimulate telecommunications companies to develop communications systems to accommodate all users. In this paper, we will study the blockage effect of the student body on the propagation of the signals in the external wireless network. We took various numbers of the student density on the campus to know the extent it affects especially in crowded environments. The student body structure and buildings are designed in the college according to the real dimensions by Wireless InSite software. We compared scenarios for the different numbers of student density, we noticed that whenever an increase in the student density in the college will lead to increased path loss and delay spread time. In addition, note there is a gradual decrease in the received power (RP) if there is no student density highest RP is -28.2 dBm, when there are 300 students highest RP is -34.7 dBm, and when there are 600 students highest RP is -36.5 dBm. The reasons are that signals path spread inside the college will be passing through several collisions whether student body blockage or buildings that are built from different materials.
● A Dynamic Steganography Method for Web Images with Average RunLength-Coding
● Determining Learning Style Preferences of Learners
● Radio Network Planning and Optimization for 5G Telecommunication System Based on Physical Constraints
● Secure Remote Access IPSEC Virtual Private Network to University Network System
● The Formation of the Electronic Tornado is the Basis of Superconductivity
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
The cloud computing has increased in many organizations. It provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. In this project we propose anIntrusion Detection and Countermeasure in Virtual Network Systems mechanism called NICE to prevent vulnerable virtual machines from being compromised in the cloud. NICE detects and mitigates collaborative attacks in the cloud virtual networking environment. The system performance evaluation demonstrates the feasibility of NICE and shows that the proposed solution can significantly reduce the risk of the cloud system from being exploited and abused by internal and external attackers.
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networksijsrd.com
Efficiency in a Wireless Sensor Network can only be obtained with effective routing mechanisms. This paper uses Particle Swarm Optimization (PSO, a metaheuristic algorithm to perform the process of routing. Since PSO does not have a defined fitness function, it is flexible to incorporate user defined QoS parameters to define the fitness function.
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...IJASRD Journal
The proposed technology can reduce network costs by allowing optimized use of radio resources in mobile wireless networks. The system provides reliable and high-capacity channels, while the wireless part allows user mobility. Solving the problem involves an attempt to determine an optimal distribution of radio resources to the RAUs (radio allocation unit) and network cells can be split or merged dynamically to optimize this distribution as a function of the fluctuation of demands.
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Comparative Performance Analysis of Wireless Communication Protocols for Inte...chokrio
The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements…The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kind of systems. The mains objectives of this paper is to present a solution of the problem related to the selection criteria of a better wireless communication technology face up to the constraints imposed by the intended application and the evaluation of its key features. The comparison between the different wireless technologies (Wi-Fi, Wi-Max, UWB, Bluetooth, ZigBee, ZigBeeIP, GSM/GPRS) focuses on their performance which depends on the areas of utilization. Furthermore, it shows the limits of their characteristics. Study findings can be used by the developers/ engineers to deduce the optimal mode to integrate and to operate a system that guarantees quality of communication, minimizing energy consumption, reducing the implementation cost and avoiding time constraints.
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...ijtsrd
We propose clusters based cooperatives based verbal architecture coop on the cellular ad hoc wireless sensor network Mawsn with the environment fading Rayleigh. The main ability and contributions of this paper are as follows. First, the proposed cage uses a cluster as a underlying system to help stable transmission services. 2D, the proposed enclosure uses a cluster based verbal cooperative exchange to effectively guide the package delivery ratio with multi hop power saving transmission. 0.33, we do not forget reasonable methods mainly based on cellular ad hoc nodes with sensing features and constant sensor nodes in the sensor field along with conventional research for the introduction of constant network sensors. Fourth, we have theoretical analysis with blackouts opportunities for proposed cooperative transmissions. Overall performance evaluation is run through simulation and evaluation. Sweeti Kumari | Dr. Ranjan Kumar Singh "Wireless Sensor Network Based Clustering Architecture for Cooperative Communication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd43670.pdf Paper URL: https://www.ijtsrd.comengineering/electronics-and-communication-engineering/43670/wireless-sensor-network-based-clustering-architecture-for-cooperative-communication/sweeti-kumari
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
Beamforming for millimetre-wave (mmWave) frequencies has been studied for many years. It is considered as an important enabling technology for communications in these high-frequency ranges and it received a lot of attention in the research community. The special characteristics of the mmWave band made the beamforming problem a challenging one because it depends on many environmental and operational factors. These challenges made any model-based architecture fit only special applications, working scenarios, and specific environment geometry. All these reasons increased the need for more general machine learning based beamforming systems that can work in different environments and conditions. This increased the need for an extended adjustable dataset that can serve as a tool for any machine learning technique to build an efficient beamforming architecture. Deep MIMO dataset has been used in many architectures and designs and has proved its benefits and flexibility to fit in many cases. In this paper, we study the extension of collaborative beamforming that includes many cooperating base stations by studying the impact of User Equipment (UE) speed ranges on the beamforming performance, optimizing the parameters of the neural network architecture of the beamforming design, and suggesting the optimal design that gives the best performance for as a small dataset as possible. Suggested architecture can achieve the same performance achieved before with up to 33% reduction in the dataset size used to train the system which provides a huge reduction in the data collection and processing time.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
2. 2
王蒞君 講座教授
Prof. Li-Chun Wang (ED813、MIRC516)
Research Areas:
5G Wireless and Mobile Communications
UAV Communications and Networking
Intelligent Internet of Things (IIoT)
Big Data Analysis and AI Solutions for complex
systems
Honor
IEEE Fellow
科技部傑出研究獎 (2011 and 2017)
24. 24
Data-Driven 3D Placement of UAV Base Stations
for Arbitrarily Distributed Crowds
July 4th 2019
Primary result:
Chuan-Chi Lai, Li-Chun Wang, and Zhu Han, “Data-Driven 3D Placement of
UAV Base Stations for Arbitrarily Distributed Crowds.” To appear in IEEE
Globecom 2019.
Extended version:
Chuan-Chi Lai, Li-Chun Wang, and Zhu Han, “Drone Base Station as a
Service for Arbitrary Crowds: A Data-Driven Approach.” Plan to submit to
IEEE Transactions on Mobile Computing.
25. 25
DBS in wireless networks has attracted great attention recently
and DBS can be used to assist ground base stations for increasing
capacity and coverage
In this project, we will develop the dynamic 3D placement of DBS
for satisfying the communications demand of arbitrary flash crowds
25
Background and Motivation
Maratho
n
AR Games
Pokémon Go
Concert
26. 26
System Model and Assumptions
26
o Consider how to let a ground base station (GBS)
and 𝑘𝑘 DBS, coordinately serve 𝑁𝑁 ground users
and thereby improve the sum rate of the cellular
system.
o The GBS is equipped with omni-directional
antennas for ground communications and
mmWave directional antennas for the back-haul
connections of DBSs
o If the spatial information of UEs, 𝑁𝑁, 𝑁𝑁𝐺𝐺, and
𝑁𝑁𝑗𝑗 are known, the system sum rate can be
formulated as
o 𝐶𝐶𝑇𝑇𝑇𝑇𝑇𝑇𝑇𝑇𝑇𝑇 = ∑𝑗𝑗=1
𝑘𝑘
∑𝑖𝑖=1
𝑁𝑁𝑗𝑗
𝑐𝑐𝑖𝑖,𝑗𝑗 + ∑𝑖𝑖=1
𝑁𝑁𝐺𝐺
𝑐𝑐𝑖𝑖,𝐺𝐺
o 𝑐𝑐𝑖𝑖,𝑗𝑗 is the allocated data rate of a user
associated with the 𝑈𝑈𝑗𝑗, where 𝑗𝑗 = 1,2, … , 𝑘𝑘
o 𝑐𝑐𝑖𝑖,𝐺𝐺 is the allocated data rate of a user
associated with the 𝐺𝐺
o 𝑈𝑈 = {𝑈𝑈1, 𝑈𝑈2, … , 𝑈𝑈𝑘𝑘} is the set of DBSs,
o 𝐸𝐸 = {𝑢𝑢1, 𝑢𝑢2, … , 𝑢𝑢𝑁𝑁} is the set of target users
o 𝑁𝑁 is the total number of UEs,
o 𝑁𝑁𝐺𝐺 is the number of served UEs for the GBS, 𝐺𝐺,
o 𝑁𝑁𝑗𝑗 is the number of served UEs for each𝑈𝑈𝑗𝑗,
and then 𝑁𝑁𝐺𝐺 + ∑𝑗𝑗=1
𝑘𝑘
𝑁𝑁𝑗𝑗 = 𝑁𝑁
Down link:
1. GBS to UE
2. UAV to UE
3. GBS to UAV
27. 27
Existing Art & Motivations
Research Directions
• Maximize the number of covered users[1][4]
• Minimize the number of UAVs to serve users[2]
• Minimize the total power consumption[3]
Limitations
• Most of existing methods only consider the PPP based homogeneous distribution
Model[1][2]
• They do not consider the coexistence of the ground base station[1][2][3][4]
• They do not consider the coverage overlapping/co-channel interference issue[1][2][3][4]
• They do not consider the minimum data rate requirement of UE
1. E. Kalantari, H. Yanikomeroglu and A. Yongacoglu, "On the Number and 3D Placement of Drone Base Stations in Wireless Cellular Networks," 2016
IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, 2016, pp. 1-6.
2. J. Lyu, Y. Zeng, R. Zhang and T. J. Lim, "Placement Optimization of UAV-Mounted Mobile Base Stations," in IEEE Communications Letters, vol. 21,
no. 3, pp. 604-607, March 2017.
3. Q. Zhang, M. Mozaffari, W. Saad, M. Bennis and M. Debbah, "Machine Learning for Predictive On-Demand Deployment of Uavs for Wireless Communications," 2018 IEEE Global
Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 2018, pp. 1-6.
4. A. V. Savkin and H. Huang, "Deployment of Unmanned Aerial Vehicle Base Stations for Optimal Quality of Coverage," in IEEE Wireless
Communications Letters, vol. 8, no. 1, pp. 321-324, Feb. 2019.
5. C.-C. Lai, C.-T. Chen and L.-C. Wang, "On-Demand Density-Aware UAV Base Station 3D Placement for Arbitrarily Distributed Users with Guaranteed Data Rates," in IEEE
Wireless Communications Letters, vol. 8, no. 3, pp. 913-916, June 2019. doi: 10.1109/LWC.2019.2899599
28. 28
28
Goal
• Maximize the system sumrate using a minimum number of DBS while
satisfying the minimum data rate requirement of UE
Novelty (Contribution)
• To support arbitrarily distributed UEs[4] for dynamic events/flash crowds
• Coordinate multiple UAVs with the ground base station
• Effectively reduce the overlapping coverage/co-channel interference
• The proposed method can automatically determine the appropriate
number, locations, altitudes of DBSs
Goal & Novelty of Our Work
29. 29
Problem Formulation
29
o Thus, we need to search the optimal 𝑁𝑁𝐺𝐺 and 𝑁𝑁𝑗𝑗 to optimize the considered System
Sum rate Optimization (SSO) problem and it can be defined as
o SSO is a NP-complete 0-1
Multiple Knapsack-like problem
30. 30
Step 3 : (Association) Associate each UE with a DBS using SINR constraint and update SINR of each UE
Step 3-A : (Constraints Check) If some UEs does not meet the communications constraints, try to
re-associate these UEs with the other nearby DBSs
Step 3-B : (Refinement) Solve the Minimum Covering Circle Problem of each cluster to minimize the
overlapping coverage and thus reduce the effect of co-channel interference
Step 3-C : Repeat Steps 3, 3-A, and 3-C until the communications constraints are satisfied; If not,
after repeat 𝑘𝑘 − 1 times, set 𝑘𝑘 = 𝑘𝑘 + 1 and jump to Step 2
Step 3-D : Compute the part B
Step 1 : (Initialization) Maximize the part A by associating neighboring UEs with
the GBS and then let 𝑘𝑘 = (𝑁𝑁 − 𝑁𝑁𝐺𝐺) 𝑐𝑐min/𝐶𝐶max
Proposed scheme
Data-Driven 3D Placement of DBSs
A B
Step 2 : (Clustering) Cluster unassociated UEs into to 𝑘𝑘 clusters using Balanced k-Means
1. Simple and effective
2. Do not need to know
the exact value of k
in advance
31. 31
31
Simulation Settings
o Settings
o 100 different artificial datasets as
the input spatial information
o Each dataset contains 600 to 1, 300
UE locations which are arbitrarily
distributed
o The size of target area is a 1, 200 ×
1, 200 m2 area
o We consider the urban scenario and
its environmental parameters
o The maximum allowable path-loss
of the DBS to the UE link is
34. 34
34
Conclusion
• The proposed approach can effectively maximize the system
sumrate and satisfy the traffic demands caused by arbitrary flash
crowds
• Unlike the conventional k-means++ which cannot determine the
value of 𝑘𝑘 by the algorithm itself, the proposed approach will
automatically determine an appropriate value of 𝑘𝑘 according to the
input spatial information, environmental parameters, and
communications constraints
• In this way, the system can save a lot of computational costs (time and
energy) on checking the impossible value of 𝑘𝑘.
35. 35
Enabling Mobile Service Continuity across
Orchestrated Edge Networks
Student: Osamah Ibrahiem Abdullaziz
Advisor: Prof. Li-Chun Wang
Department of Electrical and Computer Engineering, National
Chiao Tung University, Taiwan
July 4th 2019
36. 36
36
Service interruption issue in edge-enabled WiFi networks
o Handoff decision is locally made by users and the re-association process takes 1~
2s[1]. During this process, clients experience connectivity interruption.
o Hop count increases as users move away from the initial serving edge. This may
effect user experience especially for latency-sensitive applications.
Why service continuity is important?
o Wireless communication systems are driven by the quality of services they provide to
the end users. Industrial verticals such as smart transportation, e-health, cloud
robotics require very low-latency.
o Service interruption due to user mobility creates challenges to sustain the reliability and
latency requirements of these services.
1. A. Mishra, M. Shin, and W. A. Arbaugh, “An empirical analysis of the IEEE 802.11 MAC layer handoff process,” Comput. Commun. Rev.,
vol. 33, no. 2, pp. 93–102, Apr. 2003.
2. Machen, A., Wang, S., Leung, K.K., Ko, B.J. and Salonidis, T., 2018. Live service migration in mobile edge clouds. IEEE Wireless
Communications.
37. 37
37
A holistic service continuity approach
• ARNAB: Architecture for transparent service continuity via double-tier migration.
• The term ARNAB means rabbit in Arabic. The service with ARNAB behaves like a
rabbit hopping through the WiFi infrastructure.
• Fundamentally, the proposed architecture is divided into two tiers:
Tier 1: User connectivity migration
o Utilizes virtual access point (vAP) to deliver seamless WiFi experience using
commodity hardware.
Tier 2: Edge application migration
o Proposes a pre-copy container migration scheme to deliver seamless applications
experience at the proximity of the users.
38. 38
38
Work Contributions
• Proposed a novel architecture to provide transparent service continuity for mobile
users in edge-enabled WiFi infrastructure.
o Developed a virtual access point solution to enable ARNAB connectivity
migration.
o Developed a pre-copy migration scheme to relocate containerized applications in
edge environment.
• Identified the root-causes of prolonged downtime during container migration.
• Enhanced the container migration scheme by incorporating real-time computing
capabilities and fast storage.
39. 39
39
Tier 2: Edge Application Migration
Tier 1: User Connectivity Migration
o When C2 join the network, it associates with
a dedicated vAPC2.
o The RSSI received by C2 is monitored so that
when C2 moves away from AP1, vAPC2 gets
migrated to the nearest AP (AP2).
o An edge containerized application gets
created to serve C2 (e.g., video streaming
server).
o Edge application is also migrated to the
proximity of AP2.
C2
ARNAB in a Nutshell
40. 40
40
Migration Anatomy – downtime root-causes
n
Checkpoint latency
Memory to be copied Copying latency
Restore latency
Migration
Downtime
41. 41
Tier 1
user connectivity migration
Tier 2
edge application migration
41
Experimental Results – Service downtime
42. 42
42
Collaboration
Contributed to EU-TW H2020 Project (5G-CORAL) http://5g-coral.eu/
Publication
1. O.I. Abdullaziz, Wang LC, S. B. Chundrigar, Huang KL “Enabling Mobile Service Continuity across Orchestrated Edge
Networks", IEEE Transactions on Network Science and Engineering, (Under Review).
2. O.I. Abdullaziz, Wang LC, S. B. Chundrigar, Huang KL ”ARNAB: Transparent Service Continuity across Orchestrated Edge
Networks", In IEEE Global Communications Conference (GLOBECOM), Dec. 2018
Dissemination & Publication
43. 43
Ph.D. Group Meeting
August 1, 2019
Optimizing Offloading Ratio for 5G Multi-access Edge
Computing and Communications
Yung-Sheng Chao
Institute of Electrical and Computer Engineering
, National Chiao Tung University, Taiwan
44. 44
Background
50 billion smart mobile devices in use in the world by 2020 [1].
Due to the growing number of mobile devices, it is imperative
to enhance services using small base stations (BSs). Especially
in high-density hotspot scenarios.
44
[1] D. Evans, “The internet of things: How the next evolution of the internet is changing everything,” CISCO white paper, vol. 1, no. 2011, pp. 1–
11, 2011.
45. 45
System Architecture
Network construction using the Multi-access Edge Computing
(MEC) platform as the core equipment with radio access
network (RAN) is called MEC-RAN.
Improve network coverage and capacity.
The MEC-CRAN provides different protocol services for users
using different Radio Access Technologies (RATs).
45
Base Station Edge Computing User Equipment
Communication Link Computing Offloading Link
46. 46
Problem
In the MEC-RAN system, There is no effective management
mechanism to handle large packet traffic, which can cause
serious delays.
The fairness and effectiveness of resource allocation is a fundamental
issue in distributed computing systems.
How to implement optimal and efficient management of the
MEC -RAN will be a challenge.
46
Base Station Edge Computing User Equipment
Communication Link Computing Offloading Link
47. 47
Existing Art
47
Reference 1 2 3 4 5 6 7 Our
work
Minimize Latency X X X
MEC Resources allocation X X X X
Low Complexity X X X X
Communication Offloading X X X X X X
Computing Offloading X
1. Y. Lin, Y. Lai, J. Huang and H. Chien, "Three-Tier Capacity and Traffic Allocation for Core, Edges, and Devices
for Mobile Edge Computing," in IEEE Transactions on Network and Service Management, vol. 15, no. 3, pp. 923-933,
Sept. 2018..
2. X. Sun and N. Ansari, "Latency Aware Workload Offloading in the Cloudlet Network," in IEEE Communications
Letters, vol. 21, no. 7, pp. 1481-1484, July 2017.
3. Q. Li, J. Lei and J. Lin, "Min-Max Latency Optimization for Multiuser Computation Offloading in Fog-Radio Access
Networks," 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, AB,
2018, pp. 3754-3758.
4. J. Zhang, W. Xia, F. Yan and L. Shen, "Joint Computation Offloading and Resource Allocation Optimization in
Heterogeneous Networks With Mobile Edge Computing," in IEEE Access, vol. 6, pp. 19324-19337, 2018.
5. J. Ren, G. Yu, Y. Cai and Y. He, "Latency Optimization for Resource Allocation in Mobile-Edge Computation
Offloading," in IEEE Transactions on Wireless Communications, vol. 17, no. 8, pp. 5506-5519, Aug. 2018.
6. A. Roy, P. Chaporkar and A. Karandikar, "Optimal Radio Access Technology Selection Algorithm for LTE-WiFi
Network," in IEEE Transactions on Vehicular Technology, vol. 67, no. 7, pp. 6446-6460, July 2018.
7. C. Zhou, C.K. Tham, and M. Motani, “Online Auction for Truthful Stochastic Offloading in Mobile Cloud
Computing”, IEEE GLOBECOM 2017, Singapore, Dec. 2017. C142.
48. 48
System Model
𝐿𝐿𝑖𝑖 denote the average latency for the i-th UE group’s packet.
48
, , , , , , , , ,
1 1 1 1
* * *
N L N L
C C P P C C S
i i j k j k j s j s i j k j k i j
j k s k
L L R L R L R R
= = = =
= + +
∑ ∑ ∑ ∑
49. 49
Problem Statement
Input :
In MEC-CRAN system, there are M UE groups and N BSs, each BS
with L Multi-RAT network interface functions. Each UE with traffic
arrival rate 𝜆𝜆𝑖𝑖, UE – BS selecting table 𝑅𝑅𝑖𝑖,𝑗𝑗
𝑆𝑆
, and the BS with RAT’s
capacity of communication service function 𝜇𝜇𝑗𝑗,𝑘𝑘
𝑐𝑐
and capacity of
service function 𝜇𝜇𝑗𝑗
𝑝𝑝
.
Output :
The created communication offload ratio table parameters {ℛ𝑗𝑗,𝑘𝑘
𝑐𝑐
} and
computing offload ratio table parameters {ℛ𝑖𝑖𝑖𝑖
𝑝𝑝
}.
Objective :
Minimize the total latency ∑ 𝑳𝑳𝒊𝒊 of packets.
49
50. 50
Proposed scheme
We propose flexible offloading ratio decision optimization
(ForDo) to decide the offloading ratio of the communications
and computing for each MEC.
All Services in MEC-RAN system are modeled as M/M/1 queuing
system.
According to the UEs‘ traffic arrival rate (𝜆𝜆) and the MECs’ computing
capacity (𝜇𝜇)
Minimize the latency by optimizing the traffic offloading over
communications and computing.
Under M/M/1 queuing model, the latency minimization problem is
proved to be convex.
Find the analytic solution under linearly time complexity O(n) by
Cauchy–Schwarz Inequality.
50
51. 51
Objective function
51
1
,
1 1 1, ,
, , ,
1 1 1, ,
,
1 , ,
1
min *
2 1
min min
2 1
min min
2
min
M
i i
i
C PN L N
j k s
C C P P
j k sj k j k s s
C C C P P PN L N
j k j k j k s s s
C C P P
j k sj k j k s s
C
j k
C C
k j k j k
L λ
λ
λ λ
λ µ λ λ µ λ
µ µ λ µ µ λ
λ µ λ λ µ λ
µ
λ µ λ
=
= = =
= = =
=
+ − −
− + − +
+ − −
=
−
∑
∑
∑ ∑ ∑
∑ ∑
∑ ∑ ∑
∑ ∑
∑ 1 1
,
1 1 1, ,
1
1 min 1
2 1
* min min
PN L N
s
P P
j s s s
C PN L N
j k s
C C P P
j k sj k j k s s
N L N
µ
λ µ λ
µ µ
λ µ λ λ µ λ
=
= = =
− + − −
= − + + − + − −
∑ ∑ ∑
∑
∑ ∑ ∑
∑ ∑
Communications part Computing part
The latency minimization problem is proved to be convex.
Find the analytic solution under linearly time complexity O(n) by Cauchy–
Schwarz Inequality.
53. 53
Conclusion
Based on the packets arrival rate of UEs and the computing
capacity of the MECs , ForDo provides different offloading
ratios for different UEs packet traffic demands.
Operators use the capacity and latency limits of each MEC to
quickly assess the upper limit of the UE’s traffic arrival rate.
Operators also use the UE’s traffic arrival rate to assess how
much computing capacity needs to be added in MEC-RAN to
provide efficient computing with time constrain in 5G.
53