查看更多>>摘要:Abstract For the purpose of exploring the long-term variation of regional sea surface temperature (SST), this paper studies the historical SST in regional sea areas and the emission pattern of greenhouse gases, proposing a Grey model of regional SST atmospheric reflection which can be used to predict SST variation in a long time span. By studying the Grey systematic relationship between historical SST data, the model obtains the development law of temperature variation, and further introduces different greenhouse gas emission scenarios in the future as the indexes coefficient to determine the corresponding changing results of seawater temperature in the next 50 years. Taking the North Atlantic Ocean as an example, the cosine similarity test method is used to verify the model proposed in this paper. The accuracy of the model is as high as 0.99984. The model predicts that the regional SST could reach a maximum of 15.3°C\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$15.3\,^{\circ }{\mathrm {C}}$$\end{document} by 2070. This model is easy to calculate, with advantages of the high accuracy and good robustness.
Vaquerizo-Hdez DanielR-Moreno Maria D.Barrero David F.Mu?oz Pablo...
26页
查看更多>>摘要:Abstract Measuring the consumption of electronic devices is a difficult and sensitive task. Data acquisition (DAQ) systems are often used to determine such consumption. In theory, measuring energy consumption is straight forward, just by acquiring current and voltage signals we can determine the consumption. However, a number of issues arise when a fine analysis is required. The main problem is that sampling frequencies have to be high enough to detect variations in the assessed signals over time. In that regard, some popular DAQ systems are based on RISC ARM processors for microcontrollers combined with analog-to-digital converters to meet high-frequency acquisition requirements. The efficient use of direct memory access (DMA) modules combined with pipelined processing in a microcontroller allows to improve the sample rate overcoming the processing time and the internal communication protocol limitations. This paper presents a novel approach for high-frequency energy measurement composed of a DMA rate improvement (data acquisition logic), a data processing logic and a low-cost hardware. The contribution of the paper is the combination of a double-buffered signal acquisition mechanism and an algorithm that computes the device’s energy consumption using parallel data processing. The combination of these elements enables a high-frequency (continuous) energy consumption measurement of an electronic device, improving the accuracy and reducing the cost of existing systems. We have validated our approach by measuring the energy consumed by elemental circuits and wireless sensors networks (WSNs) motes. The results indicate that the energy measurement error is less than 5% and that the proposed method is suitable to measure WSN motes even during sleep cycles, enabling a better characterization of their consumption profile.
查看更多>>摘要:Abstract As a comprehensive utilization of pipeline resources, communication intelligent manhole cover (CIMC) can effectively real-time monitor communication manhole cover and protect the safety of communication pipeline. Due to the complex working environment of manhole cover and the random error of sensor, the traditional monitoring method usual leads to frequent false alarm in actual applications. In order to ensure the monitoring service quality and improve the service efficiency, a new alarm method of CIMC with multiple event fusion in this paper via jointing analysis of multi-sensor status signals is proposed based on the equipment status signals generated by the CIMC terminal and abnormal alarm events definition. The experimental result shows that the proposed CIMC alarm method by means of multiple sensor signals in this paper can not only make up for the defect of a single sensor, but also reduces the false alarm rate caused by the random error of sensor and CIMC system. It can promote the intelligent monitoring efficiency of the manhole cover and be conducive to the construction of intelligent transportation and smart city.
查看更多>>摘要:Abstract Public key encryption scheme with keyword search is a promising technique supporting search on encrypted data without leaking any information about the keyword. In real applications, it’s critical to find an effective revocation method to revoke users in multi-user cryptosystems, when user’s secret keys are exposed. In this paper, we propose the first designated server-aided revocable identity-based encryption scheme with keyword search (dSR-IBKS) from lattice. The dSR-IBKS model requires each user to keep just one private key corresponding with his identity and does not need to communicate with the key generation center or the server during key updating. We have proved that our scheme can achieve chosen keyword indistinguishability in the standard model. In particular, our scheme can designate a unique tester to test and return the search results, therefore no other entity can guess the keyword embedded in the ciphertext by generating search queries and doing the test by itself. We provide a formal security proof of our scheme assuming the hardness of the learning with errors problem on the standard model.
Tapio VisaHemadeh IbrahimMourad AlainShojaeifard Arman...
18页
查看更多>>摘要:Abstract Reconfigurable intelligent surface (RIS) is a programmable structure that can be used to control the propagation of electromagnetic waves by changing the electric and magnetic properties of the surface. By placing these surfaces in an environment, the properties of radio channels can be controlled. This opens up new opportunities to improve the performance of wireless systems. In this paper, the basic operation of antenna array and metasurface based RIS is described. While the current long term (6G) research on RIS often prioritizes very high frequencies from tens to hundreds of GHz, this paper puts emphasis rather on operating frequencies below 10?GHz which promise a much faster to market track for RIS applications. For this purpose, review of the literature on the use of RIS in wireless communication applications operating below 10?GHz frequency band is provided.
查看更多>>摘要:Abstract The efficient use of resources in wireless communications has always been a major issue. In the Internet of Things (IoT), the energy resource becomes more critical. The transmission policy with the aid of a coordinator is not a viable solution in an IoT network, since a node should report its state to the coordinator for scheduling and it causes serious signaling overhead. Machine learning algorithms can provide the optimal distributed transmission mechanism with little overhead. A node can learn by itself by utilizing the machine learning algorithm and make the optimal transmission decision on its own. In this paper, we propose a novel learning Medium Access Control (MAC) protocol with learning nodes. Nodes learn the optimal transmission policy, i.e., minimizing the data and energy queue levels, using the Q-learning algorithm. The performance evaluation shows that the proposed scheme enhances the queue states and throughput.
查看更多>>摘要:Abstract With the development of smart cities, network security has become more and more important. In order to improve the safety of smart cities, a situation prediction method based on feature separation and dual attention mechanism is presented in this paper. Firstly, according to the fact that the intrusion activity is a time series event, recurrent neural network (RNN) or RNN variant is used to stack the model. Then, we propose a feature separation method, which can alleviate the overfitting problem and reduce cost of model training by keeping the dimension unchanged. Finally, limited attention is proposed according to global attention. We sum the outputs of the two attention modules to form a dual attention mechanism, which can improve feature representation. Experiments have proved that compared with other existing prediction algorithms, the method has higher accuracy in network security situation prediction. In other words, the technology can help smart cities predict network attacks more accurately.
查看更多>>摘要:Abstract Congestion-aware scheduling in case of downlink cellular communication has ignored the distribution of diverse content to different clients with heterogeneous secrecy requirements. Other possible application areas that encounter the preceding issue are secure offloading in mobile-edge computing, and vehicular communication. In this paper, we extend the work in Arvanitaki et al. (SN Comput Sci 1(1):53, 2019) by taking into consideration congestion and random access. Specifically, we study a two-user congestion-aware broadcast channel with heterogeneous traffic and different security requirements. We consider two randomized policies for selecting which packets to transmit, one is congestion-aware by taking into consideration the queue size, whereas the other one is congestion-agnostic. We analyse the throughput and the delay performance under two decoding schemes at the receivers, and provide insights into their relative security performance and into how congestion control at the queue holding confidential information can help decrease the average delay per packet. We show that the congestion-aware policy provides better delay, throughput, and secrecy performance for large arrival packet probabilities at the queue holding the confidential information. The derived results also take account of the self-interference caused at the receiver for whom confidential data is intended due to its full-duplex operation while jamming the communication at the other user. Finally, for two decoding schemes, we formulate our problems in terms of multi-objective optimization, which allows for finding a trade-off between the average packet delay for packets intended for the legitimate user and the throughput for the other user under congestion-aware policy.
Shakir MustafaSarwar M. UsmanAdnan MuhammadKhan Muhammad Rafay...
10页
查看更多>>摘要:Abstract Multiple categories of electronic devices have been introduced recently in response to the demands and developments in the industry. Around 5.19 billion telecom services subscribers today have a significant effect on the allocation and utilization of bandwidth, and hence, there is extensive need to use higher-frequency bands, e.g., mm band to achieve the required quality of service since there is extensive need to shift the paradigm to the next generation. For 5G networks, antenna structuring and designing is an integral part of the communication system. In antenna theory, improving antenna gain is important to attain isotropic antenna, antenna gain can be improved by the controlled behavior of frequencies, beam forming and choosing the right antenna fabric. Through antenna design using different substrates thickness, the propagation losses are examined in order to determine the variation with radiation characteristics. In this way, the examination of the 5G mm-wave spectrum with comparative analysis of input impedance, gain and radiation efficiency is shown through mathematical modeling. Using this approach, the antenna efficiency is improved by up to 20% with increase in substrate thickness. Different antenna arrays have been designed for effective improvement in reflection coefficients. The results are obtained using simulation of antenna in CST and high-frequency structure simulator.
Ali ShahzadZaman SafdarAl Awady AminSaqib Muhammad...
19页
查看更多>>摘要:Abstract Node failures are inevitable in wireless sensor networks (WSNs) because sensor nodes in WSNs are miniature and equipped with small and often irreplaceable batteries. Due to battery drainage, sensor nodes can fail at any instance. Moreover, WSNs operate in hostile environments and environmental factors may also contribute to nodes failure. Failure of nodes leads to disruption of inter-node connectivity and might also lead to network partitioning. Failure to communicate with each other and with the base station can compromise the basic operation of the sensor network. For restoration of connectivity, a robust recovery mechanism is required. The existing connectivity restoration mechanisms suffer from shortcomings because they do not focus on energy-efficient operation and coverage-aware mechanisms while performing connectivity restoration. As a result, most of these mechanisms lead to the excessive mobility of nodes, which itself causes the utilization of excessive battery. In this work, we propose a novel technique called smart node relocation (SNR). SNR is capable of detecting and restoring the connectivity caused by either single or multiple node failures. For achieving energy efficiency, SNR relies on transmitting a lesser number of control packets. For achieving the goal of being coverage-aware, it tries to relocate only essential nodes while trying to restore connectivity. By performing extensive simulations, we prove that SNR outperforms the existing approaches concerning multiple performance metrics including but not limited to the total number of packets transmitted, total distance moved for connectivity restoration, the percentage reduction in field coverage.