SwePub
Sök i SwePub databas

  Utökad sökning

AND är defaultoperator och kan utelämnas

Träfflista för sökning "AMNE:(ENGINEERING AND TECHNOLOGY Electrical Engineering, Electronic Engineering, Information Engineering Communication Systems) "

Sökning: AMNE:(ENGINEERING AND TECHNOLOGY Electrical Engineering, Electronic Engineering, Information Engineering Communication Systems)

  • Resultat 1-25 av 7442
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Rosenstatter, Thomas, et al. (författare)
  • Modelling the Level of Trust in a Cooperative Automated Vehicle Control System
  • 2018
  • Ingår i: IEEE transactions on intelligent transportation systems (Print). - Piscataway, NJ : IEEE Press. - 1524-9050 .- 1558-0016. ; 19:4, s. 1267-1247
  • Tidskriftsartikel (refereegranskat)abstract
    • Vehicle-to-vehicle communication is a key technology for achieving increased perception for automated vehicles, where the communication enables virtual sensing by means of sensors in other vehicles. In addition, this technology also allows detection and recognition of objects that are out-of-sight. This paper presents a trust system that allows a cooperative and automated vehicle to make more reliable and safe decisions. The system evaluates the current situation and generates a trust index indicating the level of trust in the environment, the ego vehicle, and the surrounding vehicles. This research goes beyond secure communication and concerns the verification of the received data on a system level. The results show that the proposed method is capable of correctly identifying various traffic situations and how the trust index is used while manoeuvring in a platoon merge scenario.
  •  
2.
  • Shafiq, ur Réhman, 1978-, et al. (författare)
  • Using Vibrotactile Language for Multimodal Human Animals Communication and Interaction
  • 2014
  • Ingår i: Proceedings of the 2014 Workshops on Advances in Computer Entertainment Conference, ACE '14. - New York, NY, USA : Association for Computing Machinery (ACM). - 9781450333146 ; , s. 1:1-1:5
  • Konferensbidrag (refereegranskat)abstract
    • In this work we aim to facilitate computer mediated multimodal communication and interaction between human and animal based on vibrotactile stimuli. To study and influence the behavior of animals, usually researchers use 2D/3D visual stimuli. However we use vibrotactile pattern based language which provides the opportunity to communicate and interact with animals. We have performed experiment with a vibrotactile based human-animal multimodal communication system to study the effectiveness of vibratory stimuli applied to the animal skin along with audio and visual stimuli. The preliminary results are encouraging and indicate that low-resolution tactual displays are effective in transmitting information.
  •  
3.
  • Lian, Mengke, et al. (författare)
  • What Can Machine Learning Teach Us about Communications
  • 2018
  • Ingår i: IEEE International Symposium on Information Theory - Proceedings. - 2157-8095. ; 15 January 2019
  • Konferensbidrag (refereegranskat)abstract
    • Rapid improvements in machine learning over the past decade are beginning to have far-reaching effects. For communications, engineers with limited domain expertise can now use off-the-shelf learning packages to design high-performance systems based on simulations. Prior to the current revolution in machine learning, the majority of communication engineers were quite aware that system parameters (such as filter coefficients) could be learned using stochastic gradient descent. It was not at all clear, however, that more complicated parts of the system architecture could be learned as well. In this paper, we discuss the application of machine-learning techniques to two communications problems and focus on what can be learned from the resulting systems. We were pleasantly surprised that the observed gains in one example have a simple explanation that only became clear in hindsight. In essence, deep learning discovered a simple and effective strategy that had not been considered earlier.
  •  
4.
  • Zhang, Kewei, et al. (författare)
  • Protecting GNSS Open Service-Navigation Message Authentication against Distance-Decreasing Attacks
  • Annan publikation (övrigt vetenskapligt/konstnärligt)abstract
    • As the security of global navigation satellite systems (GNSS) for civilian usage is increasingly important, navigation message authentication (NMA) significantly improves resilience to spoofing attacks. However, not all attacks can be effectively countered: a strong variant of replay/relay attacks, distance-decreasing (DD) attacks, can shorten pseudorange measurements, without manipulating the cryptographically protected navigation message, thus manipulating the position, velocity, and time solution undetected. First, we discuss how DD attacks can tamper with GNSS signals, demonstrating the attack effectiveness on a recorded Galileo signal. DD attacks might introduce bit errors to the forged signals, but the adversary can keep this error rate very low with proper attack parameter settings. Then, based on our mathematical model of the prompt correlator output of the tracking phase at the victim receiver, we find that the correlator output distribution changes in the presence of DD attacks. This leads us to apply hypothesis testing to detect DD attacks, notably a Goodness of Fit (GoF) test and a generalized likelihood ratio test (GLRT), depending on the victim’s knowledge on the DD attacks. Monte Carlo simulations are used to evaluate the detection probability and the receiver operating characteristic (ROC) curves for two tests, for different adversary configuration and noise settings. Then, we evaluate the effectiveness of the GoF and GLRT tests with a synthesized DD signal. Both tests can detect DD attacks with similar performance in high signal-to-noise ratio (SNR) environments. The GLRT detection probability is approximately 20% higher than that of the GoF test in low SNR environments.
  •  
5.
  • Jiang, W., et al. (författare)
  • Implementation of an internet-based remote controller with guaranteed exponential stabilization
  • 2008
  • Ingår i: Proceedings of the World Congress on Intelligent Control and Automation (WCICA). - 9781424421145 ; , s. 4063-4068
  • Konferensbidrag (refereegranskat)abstract
    • In this article, an Internet-based remote control system is designed and implemented. The communication is based on the Master-Slave structure. The Master PC communicates with the Slave from about 40km away by UDP protocol. In order to guarantee the Master and Slave clocks to be synchronized, the NTP (Network Time Protocol) is used in both sides. The packets are sent together with time-stamps. The controller design (master) relies on a remote observer that achieves a state prediction of the application (slave), despite the variable communication delays. The Slave comprises a PC and a robot Miabot of Merlin company. The protocol Bluetooth is used between the local PC and the robot. Internet-based remote systems are subject to variable time delays (including communication and data-sampling delays) and data packets losses (due to the unstable Internet network). We have continuously tested the RTT (round-trip-time) between the two PCs in the daytime and nighttime by the protocol ICMP (Internet Control Message). From these tests, an evaluation of the maximal time delay is obtained. Our structure allows one to guarantee an exponential stabilization performance, which is proven via a Lyapunov-Krassovski functional technique and involves the estimated delay upperbound. This means that the guaranteed decay rate is computed (via some LMI optimization) in relation to some maximal value of the communication delays. Of course, for greater delay values, the performance cannot be guaranteed anymore and an alternative solution has to be considered. In our system, we give a command for the robot to stop until the communication comes back to a sufficient quality.
  •  
6.
  • Ivanov, Mikhail, 1986, et al. (författare)
  • Unequal Error Protection in Coded Slotted ALOHA
  • 2016
  • Ingår i: IEEE Wireless Communications Letters. - : Institute of Electrical and Electronics Engineers (IEEE). - 2162-2345 .- 2162-2337. ; 5:5, s. 536-539
  • Tidskriftsartikel (refereegranskat)abstract
    • We analyze the performance of coded slotted ALOHA systems for a scenario where users have different error protection requirements and correspondingly can be divided into user classes. The main goal is to design the system so that the requirements for each class are satisfied. To that end, we derive analytical error floor approximations of the packet loss rate for each class in the finite frame length regime, as well as the density evolution in the asymptotic case. Based on this analysis, we propose a heuristic approach for the optimization of the degree distributions to provide the required unequal error protection. In addition, we analyze the decoding delay for users in different classes and show that better protected users experience a smaller average decoding delay.
  •  
7.
  • Yanggratoke, Rerngvit, 1983-, et al. (författare)
  • Predicting real-time service-level metrics from device statistics
  • 2015
  • Ingår i: Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management, IM 2015. - : Institute of Electrical and Electronics Engineers Inc.. - 9783901882760 ; , s. 414-422
  • Konferensbidrag (refereegranskat)abstract
    • While real-time service assurance is critical for emerging telecom cloud services, understanding and predicting performance metrics for such services is hard. In this paper, we pursue an approach based upon statistical learning whereby the behavior of the target system is learned from observations. We use methods that learn from device statistics and predict metrics for services running on these devices. Specifically, we collect statistics from a Linux kernel of a server machine and predict client-side metrics for a video-streaming service (VLC). The fact that we collect thousands of kernel variables, while omitting service instrumentation, makes our approach service-independent and unique. While our current lab configuration is simple, our results, gained through extensive experimentation, prove the feasibility of accurately predicting client-side metrics, such as video frame rates and RTP packet rates, often within 10-15% error (NMAE), also under high computational load and across traces from different scenarios.
  •  
8.
  • Nopchinda, Dhecha, 1991 (författare)
  • mm-Wave Data Transmission and Measurement Techniques: A Holistic Approach
  • 2019
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The ever-increasing demand on data services places unprecedented technical requirements on networks capacity. With wireless systems having significant roles in broadband delivery, innovative approaches to their development are imperative. By leveraging new spectral resources available at millimeter-wave (mm-wave) frequencies, future systems can utilize new signal structures and new system architectures in order to achieve long-term sustainable solutions. This thesis proposes the holistic development of efficient and cost-effective techniques and systems which make high-speed data transmission at mm-wave feasible. In this paradigm, system designs, signal processing, and measurement techniques work toward a single goal; to achieve satisfactory system level key performance indicators (KPIs). Two intimately-related objectives are simultaneously addressed: the realization of efficient mm-wave data transmission and the development of measurement techniques to enable and assist the design and evaluation of mm-wave circuits. The standard approach to increase spectral efficiency is to increase the modulation order at the cost of higher transmission power. To improve upon this, a signal structure called spectrally efficient frequency division multiplexing (SEFDM) is utilized. SEFDM adds an additional dimension of continuously tunable spectral efficiency enhancement. Two new variants of SEFDM are implemented and experimentally demonstrated, where both variants are shown to outperform standard signals. A low-cost low-complexity mm-wave transmitter architecture is proposed and experimentally demonstrated. A simple phase retarder predistorter and a frequency multiplier are utilized to successfully generate spectrally efficient mm-wave signals while simultaneously mitigating various issues found in conventional mm-wave systems. A measurement technique to characterize circuits and components under antenna array mutual coupling effects is proposed and demonstrated. With minimal setup requirement, the technique effectively and conveniently maps prescribed transmission scenarios to the measurement environment and offers evaluations of the components in terms of relevant KPIs in addition to conventional metrics. Finally, a technique to estimate transmission and reflection coefficients is proposed and demonstrated. In one variant, the technique enables the coefficients to be estimated using wideband modulated signals, suitable for implementation in measurements performed under real usage scenarios. In another variant, the technique enhances the precision of noisy S-parameter measurements, suitable for characterizations of wideband mm-wave components.
  •  
9.
  • Yanggratoke, Rerngvit, 1983- (författare)
  • Data-driven Performance Prediction and Resource Allocation for Cloud Services
  • 2016
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Cloud services, which provide online entertainment, enterprise resource management, tax filing, etc., are becoming essential for consumers, businesses, and governments. The key functionalities of such services are provided by backend systems in data centers. This thesis focuses on three fundamental problems related to management of backend systems. We address these problems using data-driven approaches: triggering dynamic allocation by changes in the environment, obtaining configuration parameters from measurements, and learning from observations. The first problem relates to resource allocation for large clouds with potentially hundreds of thousands of machines and services. We developed and evaluated a generic gossip protocol for distributed resource allocation. Extensive simulation studies suggest that the quality of the allocation is independent of the system size for the management objectives considered.The second problem focuses on performance modeling of a distributed key-value store, and we study specifically the Spotify backend for streaming music. We developed analytical models for system capacity under different data allocation policies and for response time distribution. We evaluated the models by comparing model predictions with measurements from our lab testbed and from the Spotify operational environment. We found the prediction error to be below 12% for all investigated scenarios.The third problem relates to real-time prediction of service metrics, which we address through statistical learning. Service metrics are learned from observing device and network statistics. We performed experiments on a server cluster running video streaming and key-value store services. We showed that feature set reduction significantly improves the prediction accuracy, while simultaneously reducing model computation time. Finally, we designed and implemented a real-time analytics engine, which produces model predictions through online learning.
  •  
10.
  • Homem, Irvin, 1985- (författare)
  • Advancing Automation in Digital Forensic Investigations
  • 2018
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Digital Forensics is used to aid traditional preventive security mechanisms when they fail to curtail sophisticated and stealthy cybercrime events. The Digital Forensic Investigation process is largely manual in nature, or at best quasi-automated, requiring a highly skilled labour force and involving a sizeable time investment. Industry standard tools are evidence-centric, automate only a few precursory tasks (E.g. Parsing and Indexing) and have limited capabilities of integration from multiple evidence sources. Furthermore, these tools are always human-driven.These challenges are exacerbated in the increasingly computerized and highly networked environment of today. Volumes of digital evidence to be collected and analyzed have increased, and so has the diversity of digital evidence sources involved in a typical case. This further handicaps digital forensics practitioners, labs and law enforcement agencies, causing delays in investigations and legal systems due to backlogs of cases. Improved efficiency of the digital investigation process is needed, in terms of increasing the speed and reducing the human effort expended. This study aims at achieving this time and effort reduction, by advancing automation within the digital forensic investigation process.Using a Design Science research approach, artifacts are designed and developed to address these practical problems. Summarily, the requirements, and architecture of a system for automating digital investigations in highly networked environments are designed. The architecture initially focuses on automation of the identification and acquisition of digital evidence, while later versions focus on full automation and self-organization of devices for all phases of the digital investigation process. Part of the remote evidence acquisition capability of this system architecture is implemented as a proof of concept. The speed and reliability of capturing digital evidence from remote mobile devices over a client-server paradigm is evaluated. A method for the uniform representation and integration of multiple diverse evidence sources for enabling automated correlation, simple reasoning and querying is developed and tested. This method is aimed at automating the analysis phase of digital investigations. Machine Learning (ML)-based triage methods are developed and tested to evaluate the feasibility and performance of using such techniques to automate the identification of priority digital evidence fragments. Models from these ML methods are evaluated in identifying network protocols within DNS tunneled network traffic. A large dataset is also created for future research in ML-based triage for identifying suspicious processes for memory forensics.From an ex ante evaluation, the designed system architecture enables individual devices to participate in the entire digital investigation process, contributing their processing power towards alleviating the burden on the human analyst. Experiments show that remote evidence acquisition of mobile devices over networks is feasible, however a single-TCP-connection paradigm scales poorly. A proof of concept experiment demonstrates the viability of the automated integration, correlation and reasoning over multiple diverse evidence sources using semantic web technologies. Experimentation also shows that ML-based triage methods can enable prioritization of certain digital evidence sources, for acquisition or analysis, with up to 95% accuracy.The artifacts developed in this study provide concrete ways to enhance automation in the digital forensic investigation process to increase the investigation speed and reduce the amount of costly human intervention needed. 
  •  
11.
  • Kebande, Victor R., 1985-, et al. (författare)
  • A blockchain-based multi-factor authentication model for a cloud-enabled internet of vehicles
  • 2021
  • Ingår i: Sensors. - : MDPI. - 1424-8220. ; 21:18
  • Tidskriftsartikel (refereegranskat)abstract
    • Continuous and emerging advances in Information and Communication Technology (ICT) have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines and Edge Intelligence-based architectures. Advanced vehicular networks greatly benefit from these architectures due to the implicit functionalities that are focused on realizing the Internet of Vehicle (IoV) vision. However, IoV is susceptible to attacks, where adversaries can easily exploit existing vulnerabilities. Several attacks may succeed due to inadequate or ineffective authentication techniques. Hence, there is a timely need for hardening the authentication process through cutting-edge access control mechanisms. This paper proposes a Blockchain-based Multi-Factor authentication model that uses an embedded Digital Signature (MFBC_eDS) for vehicular clouds and Cloud-enabled IoV. Our proposed MFBC_eDS model consists of a scheme that integrates the Security Assertion Mark-up Language (SAML) to the Single Sign-On (SSO) capabilities for a connected edge to cloud ecosystem. MFBC_eDS draws an essential comparison with the baseline authentication scheme suggested by Karla and Sood. Based on the foundations of Karla and Sood’s scheme, an embedded Probabilistic Polynomial-Time Algorithm (ePPTA) and an additional Hash function for the Pi generated during Karla and Sood’s authentication were proposed and discussed. The preliminary analysis of the proposition shows that the approach is more suitable to counter major adversarial attacks in an IoV-centered environment based on the Dolev–Yao adversarial model while satisfying aspects of the Confidentiality, Integrity, and Availability (CIA) triad. © 2021 by the authors. Licensee MDPI, Basel, Switzerland.
  •  
12.
  • Khanzadi, M Reza, 1983, et al. (författare)
  • Calculation of the Performance of Communication Systems from Measured Oscillator Phase Noise
  • 2014
  • Ingår i: IEEE Transactions on Circuits and Systems I: Regular Papers. - 1549-8328 .- 1558-0806. ; 61:5, s. 1553-1565
  • Tidskriftsartikel (refereegranskat)abstract
    • Oscillator phase noise (PN) is one of the major problems that affect the performance of communication systems. In this paper, a direct connection between oscillator measurements, in terms of measured single-side band PN spectrum, and the optimal communication system performance, in terms of the resulting error vector magnitude (EVM) due to PN, is mathematically derived and analyzed. First, a statistical model of the PN, considering the effect of white and colored noise sources, is derived. Then, we utilize this model to derive the modified Bayesian Cramer-Rao bound on PN estimation, and use it to find an EVM bound for the system performance. Based on our analysis, it is found that the influence from different noise regions strongly depends on the communication bandwidth, i.e., the symbol rate. For high symbol rate communication systems, cumulative PN that appears near carrier is of relatively low importance compared to the white PN far from carrier. Our results also show that 1/f^3 noise is more predictable compared to 1/f^2 noise and in a fair comparison it affects the performance less.
  •  
13.
  • Pérez-Penichet, Carlos, et al. (författare)
  • Poster abstract : Augmenting WSNs with interoperable 802.15.4 sensor tags
  • 2017
  • Ingår i: SenSys 2017 - Proceedings of the 15th ACM Conference on Embedded Networked Sensor Systems. - New York, NY, USA : Association for Computing Machinery, Inc. - 9781450354592
  • Konferensbidrag (refereegranskat)abstract
    • The sensing capabilities of most sensor networks are fixed at the time of deployment. Adding new sensing capabilities to such networks is a costly and cumbersome process. We present Passive Sensor Tags, battery-free sensing devices that could be used to extend the sensing capabilities of an existing network. Sensor tags feature our new 802.15.4 receiver design which is suitable for micro-power operation, making battery-free tags possible. Because our tags can both transmit and receive 802.15.4 frames there is no need for any modification to the deployed hardware. We present preliminary measurements of transmission and reception range. 
  •  
14.
  • Zhang, Kewei (författare)
  • Secure GNSS-based Positioning and Timing : Distance-Decreasing attacks, fault detection and exclusion, and attack detection with the help of opportunistic signals
  • 2021
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • With trillions of devices connected in large scale systems in a wired or wireless manner, positioning and synchronization become vital. Global Navigation Satellite System (GNSS) is the first choice to provide global coverage for positioning and synchronization services. From small mobile devices to aircraft, from intelligent transportation systems to cellular networks, and from cargo tracking to smart grids, GNSS plays an important role, thus, requiring high reliability and security protection.       However, as GNSS signals propagate from satellites to receivers at distance of around 20 000 km, the signal power arriving at the receivers is very low, making the signals easily jammed or overpowered. Another vulnerability stems from that civilian GNSS signals and their specifications are publicly open, so that anyone can craft own signals to spoof GNSS receivers: an adversary forges own GNSS signals and broadcasts them to the victim receiver, to mislead the victim into believing that it is at an adversary desired location or follows a false trajectory, or adjusts its clock to a time dictated by the adversary. Another type of attack is replaying GNSS signals: an adversary transmits a pre-recorded GNSS signal stream to the victim receiver, so that the receiver calculates an erroneous position and time. Recent incidents reported in press show that the GNSS functionalities in a certain area, e.g., Black Sea, have been affected by cyberattacks composed of the above-mentioned attack types.        This thesis, thus, studies GNSS vulnerabilities and proposes detection and mitigation methods for GNSS attacks, notably spoofing and replay attacks. We analyze the effectiveness of one important and powerful replay attack, the so-called Distance-decreasing (DD) attacks that were previously investigated for wireless communication systems, on GNSS signals. DD attacks are physical layer attacks, targeting time-of-flight ranging protocols, to shorten the perceived as measured distance between the transmitter and receiver. The attacker first transmits an adversary-chosen data bit to the victim receiver before the signal arrives at the attacker; upon receipt of the GNSS signal, the attacker estimates the data bit based on the early fraction of the bit period, and then switches to transmitting the estimate to the victim receiver. Consequently, the DD signal arrives at the victim receiver earlier than the genuine GNSS signals would have, which in effect shortens the pseudorange measurement between the sender (satellite) and the victim receiver, consequently, affecting the calculated position and time of the receiver. We study how the DD attacks affect the bit error rate (BER) of the received signals at the victim, and analyze its effectiveness, that is, the ability to shorten pseudorange measurements, on different GNSS signals. Several approaches are considered for the attacker to mount a DD attack with high probability of success (without being detected) against a victim receiver, for cryptographically unprotected and protected signals. We analyze the tracking output of the DD signals at the victim receiver and propose a Goodness of Fit (GoF) test and a Generalized Likelihood Ratio Test (GLRT) to detect the attacks. The evaluation of the two tests shows that they are effective, with the result being perhaps more interesting when considering DD attacks against Galileo signals that can be cryptographically protected.       Moreover, this thesis investigates the feasibility of validating the authenticity of the GNSS signals with the help of opportunistic signals, which is information readily available in modern communication environments, e.g., 3G, 4G and WiFi. We analyze the time synchronization accuracy of different technologies, e.g., Network Time Protocol (NTP), WiFi and local oscillator, as the basis for detecting a discrepancy with the GNSS-obtained time. Two detection approaches are proposed and one testbench is designed for the evaluation. A synthesized spoofing attack is used to verify the effectiveness of the approaches.       Beyond attack detection, we develop algorithms to detect and exclude faulty signals, namely the Clustering-based Solution Separation Algorithm (CSSA) and the Fast Multiple Fault Detection and Exclusion (FM-FDE). They both utilize the redundant available satellites, more than the minimum a GNSS receiver needs for position and time offset calculation. CSSA adopts data clustering to group subsets of positions calculated with different subsets of available satellites. Basically, these positions, calculated with subsets not containing any faulty satellites, should be close to each other, i.e., in a dense area; otherwise they should be scattered. FM-FDE is a more efficient algorithm that uses distances between positions, calculated with fixed-size subsets, as test statistics to detect and exclude faulty satellite signals. As the results show, FM-FDE runs faster than CSSA and other solution-separation fault detection and exclusion algorithms while remaining equally effective.
  •  
15.
  • Åkerberg, Johan, et al. (författare)
  • Design challenges and objectives in industrial wireless sensor networks
  • 2017
  • Ingår i: Industrial Wireless Sensor Networks: Applications, Protocols, and Standards. - Boca Raton : CRC Press. - 9781466500525 - 9781466500518 ; , s. 79-100
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • In recent years the advances in wireless sensor networks have grown exponentially and WSNs have been deployed in diverse application areas such as agriculture, disaster management, intelligent transport systems, and industrial automation. In industrial automation, wireless sensor networks have so far mostly been considered within building automation, factory automation, and process automation in order to save cost in cable reduction and maintenance but also improved flexibility [14]. Recently, wireless sensor networks for smart grid applications have been discussed. Several market forecasts have recently predicted exponential growths in the sensor market over the next few years, resulting in a multi-billion dollar market in the near future. For instance, ABI research [18] predicts that in 2015 around 645 million IEEE 802.15.4 chipsets will be shipped and that the worldwide market for automation systems in process industries will grow to roughly $150 billion.
  •  
16.
  • Wang, Chao, et al. (författare)
  • On the Degrees of Freedom of Parallel Relay Networks
  • 2010
  • Ingår i: 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010. - 1930-529X. - 9781424456383 - 9781424456369
  • Konferensbidrag (refereegranskat)abstract
    • We study the degrees of freedom (DOF) of a single-antenna M-user time-varying parallel relay network, where the communications between M pairs of unconnected sources and destinations are provided by a large number of half-duplex decode-and-forward (DF) relays. Unlike the conventional relaying strategy which demands all the relays to simultaneously assist the sources, we divide the relays into two clusters and permit them to take turns forwarding the source messages. With appropriate interference alignment design, it is proved that the M-user time-varying relay network has M DOF, provided that the number of relays is infinitely large.
  •  
17.
  • Mahdavi, Mojtaba (författare)
  • Baseband Processing for 5G and Beyond: Algorithms, VLSI Architectures, and Co-design
  • 2021
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • In recent years the number of connected devices and the demand for high data-rates have been significantly increased. This enormous growth is more pronounced by the introduction of the Internet of things (IoT) in which several devices are interconnected to exchange data for various applications like smart homes and smart cities. Moreover, new applications such as eHealth, autonomous vehicles, and connected ambulances set new demands on the reliability, latency, and data-rate of wireless communication systems, pushing forward technology developments. Massive multiple-input multiple-output (MIMO) is a technology, which is employed in the 5G standard, offering the benefits to fulfill these requirements. In massive MIMO systems, base station (BS) is equipped with a very large number of antennas, serving several users equipments (UEs) simultaneously in the same time and frequency resource. The high spatial multiplexing in massive MIMO systems, improves the data rate, energy and spectral efficiencies as well as the link reliability of wireless communication systems. The link reliability can be further improved by employing channel coding technique. Spatially coupled serially concatenated codes (SC-SCCs) are promising channel coding schemes, which can meet the high-reliability demands of wireless communication systems beyond 5G (B5G). Given the close-to-capacity error correction performance and the potential to implement a high-throughput decoder, this class of code can be a good candidate for wireless systems B5G. In order to achieve the above-mentioned advantages, sophisticated algorithms are required, which impose challenges on the baseband signal processing. In case of massive MIMO systems, the processing is much more computationally intensive and the size of required memory to store channel data is increased significantly compared to conventional MIMO systems, which are due to the large size of the channel state information (CSI) matrix. In addition to the high computational complexity, meeting latency requirements is also crucial. Similarly, the decoding-performance gain of SC-SCCs also do come at the expense of increased implementation complexity. Moreover, selecting the proper choice of design parameters, decoding algorithm, and architecture will be challenging, since spatial coupling provides new degrees of freedom in code design, and therefore the design space becomes huge. The focus of this thesis is to perform co-optimization in different design levels to address the aforementioned challenges/requirements. To this end, we employ system-level characteristics to develop efficient algorithms and architectures for the following functional blocks of digital baseband processing. First, we present a fast Fourier transform (FFT), an inverse FFT (IFFT), and corresponding reordering scheme, which can significantly reduce the latency of orthogonal frequency-division multiplexing (OFDM) demodulation and modulation as well as the size of reordering memory. The corresponding VLSI architectures along with the application specific integrated circuit (ASIC) implementation results in a 28 nm CMOS technology are introduced. In case of a 2048-point FFT/IFFT, the proposed design leads to 42% reduction in the latency and size of reordering memory. Second, we propose a low-complexity massive MIMO detection scheme. The key idea is to exploit channel sparsity to reduce the size of CSI matrix and eventually perform linear detection followed by a non-linear post-processing in angular domain using the compressed CSI matrix. The VLSI architecture for a massive MIMO with 128 BS antennas and 16 UEs along with the synthesis results in a 28 nm technology are presented. As a result, the proposed scheme reduces the complexity and required memory by 35%–73% compared to traditional detectors while it has better detection performance. Finally, we perform a comprehensive design space exploration for the SC-SCCs to investigate the effect of different design parameters on decoding performance, latency, complexity, and hardware cost. Then, we develop different decoding algorithms for the SC-SCCs and discuss the associated decoding performance and complexity. Also, several high-level VLSI architectures along with the corresponding synthesis results in a 12 nm process are presented, and various design tradeoffs are provided for these decoding schemes.
  •  
18.
  • Kleyko, Denis, et al. (författare)
  • Vehicle Classification using Road Side Sensors and Feature-free Data Smashing Approach
  • 2016
  • Ingår i: 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC). - Piscataway : IEEE. - 9781509018895 - 9781509018888 - 9781509018901 ; , s. 1988-1993
  • Konferensbidrag (refereegranskat)abstract
    • The main contribution of this paper is a study of the applicability of data smashing - a recently proposed data mining method - for vehicle classification according to the "Nordic system for intelligent classification of vehicles" standard, using measurements of road surface vibrations and magnetic field disturbances caused by passing vehicles. The main advantage of the studied classification approach is that it, in contrast to the most of traditional machine learning algorithms, does not require the extraction of features from raw signals. The proposed classification approach was evaluated on a large dataset consisting of signals from 3074 vehicles. Hence, a good estimate of the actual classification rate was obtained. The performance was compared to the previously reported results on the same problem for logistic regression. Our results show the potential trade-off between classification accuracy and classification method's development efforts could be achieved.
  •  
19.
  • Pelliccione, Patrizio, 1975, et al. (författare)
  • Beyond connected cars: A systems of systems perspective
  • 2020
  • Ingår i: Science of Computer Programming. - Amsterdam : Elsevier BV. - 0167-6423 .- 1872-7964. ; 191
  • Tidskriftsartikel (refereegranskat)abstract
    • The automotive domain is rapidly changing in the last years. Among the different challenges OEMs (i.e. the vehicle manufacturers) are facing, vehicles are evolving into systems of systems. In fact, over the last years vehicles have evolved from disconnected and “blind” systems to systems that are (i) able to sense the surrounding environment and (ii) connected with other vehicles, the city, pedestrians, cyclists, etc. Future transportation systems can be seen as a System of Systems (SoS). In an SoS, constituent systems, i.e. the units that compose an SoS, can act as standalone systems, but their cooperation enables new emerging and promising scenarios. While this trend creates new opportunities, it also poses a risk to compromise key qualities such as safety, security, and privacy. In this paper we focus on the automotive domain and we investigate how to engineer and architect cars in order to build them as constituents of future transportation systems. Our contribution is an architectural viewpoint for System of Systems, which we demonstrate based on an automotive example. Moreover, we contribute a functional reference architecture for cars as constituents of an SoS. This reference architecture can be considered as an imprinting for the implementations that would be devised in specific projects and contexts. We also point out the necessity for a collaboration among different OEMs and with other relevant stakeholders, such as road authorities and smart cities, to properly engineer systems of systems composed of cars, trucks, roads, pedestrians, etc. This work is realized in the context of two Swedish projects coordinated by Volvo Cars and involving some universities and research centers in Sweden and many suppliers of the OEM, including Autoliv, Arccore, Combitech, Cybercom, Knowit, Prevas, ÅF-Technology, Semcom, and Qamcom.
  •  
20.
  • Theorin, Alfred, et al. (författare)
  • An event-driven manufacturing information system architecture for Industry 4.0
  • 2017
  • Ingår i: International Journal of Production Research. - : Taylor & Francis. - 0020-7543 .- 1366-588X. ; 55:5, s. 1297-1311
  • Forskningsöversikt (refereegranskat)abstract
    • Future manufacturing systems need to be more flexible, to embrace tougher and constantly changing market demands. They need to make better use of plant data, ideally utilising all data from the entire plant. Low-level data should be refined to real-time information for decision-making, to facilitate competitiveness through informed and timely decisions. The Line Information System Architecture (LISA), is presented in this paper. It is an event-driven architecture featuring loose coupling, a prototype-oriented information model and formalised transformation services. LISA is designed to enable flexible factory integration and data utilisation. The focus of LISA is on integration of devices and services on all levels, simplifying hardware changes and integration of new smart services as well as supporting continuous improvements on information visualisation and control. The architecture has been evaluated on both real industrial data and industrial demonstrators and it is also being installed at a large automotive company. This article is an extended and revised version of the paper presented at the 2015 IFAC Symposium on Information Control in Manufacturing (INCOM 2015). The paper has been restructured in regards to the order and title of the chapters, and additional information about the integration between devices and services aspects have been added. The introduction and the general structure of the paper now better highlight the contributions of the paper and the uniqueness of the framework.
  •  
21.
  • Khanzadi, M Reza, 1983 (författare)
  • Modeling and Estimation of Phase Noise in Oscillators with Colored Noise Sources
  • 2013
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The continuous increase in demand for higher data rates due to applications with massive number of users motivates the design of faster and more spectrum efficient communication systems. In theory, the current communication systems must be able to operate close to Shannon capacity bounds. However, the real systems perform below capacity limits, mainly due to channel estimation error and hardware impairments that have been neglected by idealistic or simplistic assumptions on the imperfections. Oscillator phase noise is one of the hardware impairments that is becoming a limiting factor in high data rate digital communication systems. Phase noise severely limits the performance of systems that employ dense constellations. Moreover, the level of phase noise (at a given off-set frequency) increases with carrier frequency which means that the problem of phase noise may be even more severe in systems with high carrier frequency.The focus of this thesis is on finding accurate statistical models of phase noise, as well as the design of efficient algorithms to mitigate the effect of this phenomenon on the performance of modern communication systems. First we derive the statistics of phase noise with white and colored noise sources in free-running and phase-locked-loop-stabilized oscillators. We investigate the relation between real oscillator phase noise measurements and the performance of communication systems by means of the proposed model. Our findings can be used by hardware and frequency generator designers to better understand the effect of phase noise with different sources on the system performance and optimize their design criteria respectively. Then, we study the design of algorithms for estimation of phase noise with colored noise sources. A soft-input maximum a posteriori phase noise estimator and a modified soft-input extended Kalman smoother are proposed. The performance of the proposed algorithms is compared against that of those studied in the literature, in terms of mean square error of phase noise estimation, and symbol error rate of the considered communication system. The comparisons show that considerable performance gains can be achieved by designing estimators that employ correct knowledge of the phase noise statistics. The performance improvement is more significant in low-SNR or low-pilot density scenarios.
  •  
22.
  • Steinmetz, Erik, et al. (författare)
  • Theoretical Limits on Cooperative Positioning in Mixed Traffic
  • 2019
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers Inc.. - 2169-3536. ; 7, s. 49712-49725
  • Tidskriftsartikel (refereegranskat)abstract
    • A promising solution to meet the demands on accurate positioning and real-time situational awareness in future intelligent transportation systems (ITSs) is cooperative positioning, where vehicles share sensor information over the wireless channel. However, the sensing and communication technologies required for this will be gradually introduced into the market, and it is, therefore, important to understand what performance we can expect from cooperative positioning systems as we transition to a more modern vehicle fleet. In this paper, we study what effects a gradual market penetration has on cooperative positioning applications, through a Fisher information analysis. The simulation results indicate that solely introducing a small fraction of automated vehicles with high-end sensors significantly improves the positioning quality but is not enough to meet the stringent demands posed by safety critical ITS applications. Furthermore, we find that retrofitting vehicles with low-cost satellite navigation receivers and communication have marginal impact when the positioning requirements are stringent and that the longitudinal road position can be estimated more accurately than lateral. © 2013 IEEE.
  •  
23.
  • Al Nahas, Beshr, 1985, et al. (författare)
  • Low-power listening goes multi-channel
  • 2014
  • Ingår i: Proceedings - IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2014. ; , s. 2-9
  • Konferensbidrag (refereegranskat)abstract
    • Exploiting multiple radio channels for communication has been long known as a practical way to mitigate interference in wireless settings. In Wireless Sensor Networks, however, multi-channel solutions have not reached their full potential: the MAC layers included in TinyOS or the Contiki OS for example are mostly single-channel. The literature offers a number of interesting solutions, but experimental results were often too few to build confidence. We propose a practical extension of low-power listening, MiCMAC, that performs channel hopping, operates in a distributed way, and is independent of upper layers of the protocol stack. The above properties make it easy to deploy in a variety of scenarios, without any extra configuration/scheduling/channel selection hassle. We implement our solution in Contiki and evaluate it in a 97-node~testbed while running a complete, out-of-the-box low-power IPv6 communication stack (UDP/RPL/6LoWPAN). Our experimental results demonstrate increased resilience to emulated WiFi interference (e.g., data yield kept above 90% when Contiki MAC drops in the 40% range). In noiseless environments, MiCMAC keeps the overhead low in comparison to Contiki MAC, achieving performance as high as 99% data yield along with sub-percent duty cycle and sub-second latency for a 1-minute inter-packet interval data collection. © 2014 IEEE.
  •  
24.
  • Chen, Dongliang, et al. (författare)
  • The Scanner of Heterogeneous Traffic Flow in Smart Cities by an Updating Model of Connected and Automated Vehicles
  • 2022
  • Ingår i: IEEE transactions on intelligent transportation systems (Print). - : IEEE. - 1524-9050 .- 1558-0016. ; 23:12, s. 25361-25370
  • Tidskriftsartikel (refereegranskat)abstract
    • The problems of traditional traffic flow detection and calculation methods include limited traffic scenes, high system costs, and lower efficiency over detecting and calculating. Therefore, in this paper, we presented the updating Connected and Automated Vehicles (CAVs) model as the scanner of heterogeneous traffic flow, which uses various sensors to detect the characteristics of traffic flow in several traffic scenes on the roads. The model contains the hardware platform, software algorithm of CAV, and the analysis of traffic flow detection and simulation by Flow Project, where the driving of vehicles is mainly controlled by Reinforcement Learning (RL). Finally, the effectiveness of the proposed model and the corresponding swarm intelligence strategy is evaluated through simulation experiments. The results showed that the traffic flow scanning, tracking, and data recording performed continuously by CAVs are effective. The increase in the penetration rate of CAVs in the overall traffic flow has a significant effect on vehicle detection and identification. In addition, the vehicle occlusion rate is independent of the CAV lane position in all cases. The complete street scanner is a new technology that realizes the perception of the human settlement environment with the help of the Internet of Vehicles based on 5G communications and sensors. Although there are some shortcomings in the experiment, it still provides an experimental reference for the development of smart vehicles.
  •  
25.
  • Ivashina, Marianna, 1975, et al. (författare)
  • Antenna Technologies for Beyond-5G Wireless Communication : Challenges and Opportunities
  • 2021
  • Ingår i: 2021 International Symposium on Antennas and Propagation, ISAP 2021. - : Institute of Electrical and Electronics Engineers (IEEE).
  • Konferensbidrag (refereegranskat)abstract
    • This paper provides an overview of the Sweden-Taiwan collaborative research framework project 'Antenna Technologies for Beyond-5G Wireless Communication' that has been recently established to develop robust and energy-efficient integrated antenna solutions for frequencies beyond 100 GHz as future enabling technologies for the 5G+ applications. Technological challenges in manufacturing and integration with electronics as well as available opportunities are discussed.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-25 av 7442
Typ av publikation
konferensbidrag (3975)
tidskriftsartikel (2467)
doktorsavhandling (306)
licentiatavhandling (195)
bokkapitel (117)
rapport (113)
visa fler...
annan publikation (101)
patent (73)
forskningsöversikt (31)
bok (25)
proceedings (redaktörskap) (25)
samlingsverk (redaktörskap) (12)
konstnärligt arbete (6)
recension (1)
visa färre...
Typ av innehåll
refereegranskat (6346)
övrigt vetenskapligt/konstnärligt (992)
populärvet., debatt m.m. (101)
Författare/redaktör
Wymeersch, Henk, 197 ... (267)
Vinel, Alexey, 1983- (206)
Svensson, Tommy, 197 ... (161)
Larsson, Erik G (145)
Agrell, Erik, 1965 (132)
Wosinska, Lena, 1951 ... (113)
visa fler...
Björnson, Emil, Prof ... (111)
Graell i Amat, Alexa ... (105)
Karlsson, Magnus, 19 ... (104)
Skoglund, Mikael (100)
Tufvesson, Fredrik (97)
Voigt, Thiemo (91)
Monti, Paolo, 1973- (90)
Eriksson, Thomas, 19 ... (90)
Gidlund, Mikael, 197 ... (87)
Durisi, Giuseppe, 19 ... (86)
Fischione, Carlo (86)
Chen, Jiajia (85)
Pang, Xiaodan, Dr. (82)
Maguire Jr., Gerald ... (81)
Gross, James, 1975- (76)
Kihl, Maria (70)
Popov, Sergei (70)
Xiao, Ming, 1975- (67)
Cavdar, Cicek, 1977- (66)
Ozolins, Oskars (66)
Ottersten, Björn, 19 ... (64)
Wosinska, Lena (63)
Zander, Jens (63)
Larsson, Peter, 1966 (63)
Andrekson, Peter, 19 ... (61)
Yuan, Di (60)
Pioro, Michal (60)
Ström, Erik, 1965 (59)
Makki, Behrooz, 1980 (58)
Edfors, Ove (57)
Pappas, Nikolaos (56)
Vyatkin, Valeriy (55)
Papadimitratos, Pana ... (54)
Fager, Christian, 19 ... (48)
Natalino Da Silva, C ... (48)
Dán, György (47)
Uz Zaman, Ashraf, 19 ... (47)
He, Zhongxia Simon, ... (47)
Yu, Xianbin (47)
Sung, Ki Won (47)
Pang, Xiaodan, 1986- (46)
Häger, Christian, 19 ... (46)
Mahmood, Aamir, 1980 ... (45)
Ivashina, Marianna, ... (44)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (2898)
Chalmers tekniska högskola (1917)
Linköpings universitet (652)
Lunds universitet (615)
Uppsala universitet (476)
RISE (364)
visa fler...
Högskolan i Halmstad (349)
Mittuniversitetet (243)
Luleå tekniska universitet (199)
Mälardalens universitet (167)
Blekinge Tekniska Högskola (120)
Karlstads universitet (117)
Umeå universitet (72)
Högskolan i Gävle (33)
Linnéuniversitetet (33)
Göteborgs universitet (28)
Stockholms universitet (27)
Örebro universitet (22)
Malmö universitet (22)
Högskolan Kristianstad (21)
Högskolan i Borås (9)
VTI - Statens väg- och transportforskningsinstitut (9)
Jönköping University (8)
Högskolan Väst (7)
Högskolan i Skövde (7)
Sveriges Lantbruksuniversitet (6)
Handelshögskolan i Stockholm (5)
Karolinska Institutet (3)
Södertörns högskola (2)
Försvarshögskolan (2)
Högskolan Dalarna (1)
visa färre...
Språk
Engelska (7412)
Svenska (23)
Italienska (2)
Tyska (1)
Franska (1)
Norska (1)
visa fler...
Polska (1)
Kinesiska (1)
visa färre...
Forskningsämne (UKÄ/SCB)
Teknik (7441)
Naturvetenskap (1308)
Samhällsvetenskap (112)
Medicin och hälsovetenskap (35)
Humaniora (17)
Lantbruksvetenskap (7)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy