network user
Spectrum Sharing between UAV-based Wireless Mesh Networks and Ground Networks
Wei, Zhiqing, Guo, Zijun, Feng, Zhiyong, Zhu, Jialin, Zhong, Caijun, Wu, Qihui, Wu, Huici
The unmanned aerial vehicle (UAV)-based wireless mesh networks can economically provide wireless services for the areas with disasters. However, the capacity of air-to-air communications is limited due to the multi-hop transmissions. In this paper, the spectrum sharing between UAV-based wireless mesh networks and ground networks is studied to improve the capacity of the UAV networks. Considering the distribution of UAVs as a three-dimensional (3D) homogeneous Poisson point process (PPP) within a vertical range, the stochastic geometry is applied to analyze the impact of the height of UAVs, the transmit power of UAVs, the density of UAVs and the vertical range, etc., on the coverage probability of ground network user and UAV network user, respectively. The optimal height of UAVs is numerically achieved in maximizing the capacity of UAV networks with the constraint of the coverage probability of ground network user. This paper provides a basic guideline for the deployment of UAV-based wireless mesh networks.
- Asia > China > Beijing > Beijing (0.05)
- North America > Canada > Ontario > Toronto (0.04)
- Asia > China > Jiangsu Province > Nanjing (0.04)
- (2 more...)
- Transportation > Freight & Logistics Services (1.00)
- Telecommunications (1.00)
- Information Technology > Communications > Networks (1.00)
- Information Technology > Artificial Intelligence > Robots > Autonomous Vehicles > Drones (0.67)
The Performance Analysis of Spectrum Sharing between UAV enabled Wireless Mesh Networks and Ground Networks
Wei, Zhiqing, Zhu, Jialin, Guo, Zijun, Ning, Fan
Unmanned aerial vehicle (UAV) has the advantages of large coverage and flexibility, which could be applied in disaster management to provide wireless services to the rescuers and victims. When UAVs forms an aerial mesh network, line-of-sight (LoS) air-to-air (A2A) communications have long transmission distance, which extends the coverage of multiple UAVs. However, the capacity of UAV is constrained due to the multiple hop transmissions in aerial mesh networks. In this paper, spectrum sharing between UAV enabled wireless mesh networks and ground networks is studied to improve the capacity of UAV networks. Considering two-dimensional (2D) and three-dimensional (3D) homogeneous Poisson point process (PPP) modeling for the distribution of UAVs within a vertical range {\Delta}h, stochastic geometry is applied to analyze the impact of the height of UAVs, the transmit power of UAVs, the density of UAVs and the vertical range, etc., on the coverage probability of ground network user and UAV network user. Besides, performance improvement of spectrum sharing with directional antenna is verified. With the object function of maximizing the transmission capacity, the optimal altitude of UAVs is obtained. This paper provides a theoretical guideline for the spectrum sharing of UAV enabled wireless mesh networks, which may contribute significant value to the study of spectrum sharing mechanisms for UAV enabled wireless mesh networks.
- Telecommunications (0.88)
- Transportation > Freight & Logistics Services (0.86)
- Information Technology > Communications > Networks (1.00)
- Information Technology > Artificial Intelligence > Robots > Autonomous Vehicles > Drones (1.00)
On a Bernoulli Autoregression Framework for Link Discovery and Prediction
Yan, Xiaohan, Bijral, Avleen S.
We present a dynamic prediction framework for binary sequences that is based on a Bernoulli generalization of the auto-regressive process. Our approach lends itself easily to variants of the standard link prediction problem for a sequence of time dependent networks. Focusing on this dynamic network link prediction/recommendation task, we propose a novel problem that exploits additional information via a much larger sequence of auxiliary networks and has important real-world relevance. To allow discovery of links that do not exist in the available data, our model estimation framework introduces a regularization term that presents a trade-off between the conventional link prediction and this discovery task. In contrast to existing work our stochastic gradient based estimation approach is highly efficient and can scale to networks with millions of nodes. We show extensive empirical results on both actual product-usage based time dependent networks and also present results on a Reddit based data set of time dependent sentiment sequences.
- South America > Paraguay > Asunción > Asunción (0.04)
- North America > United States > Washington > King County > Redmond (0.04)
- North America > United States > California > Santa Clara County > Palo Alto (0.04)
- (2 more...)
- Information Technology > Information Management > Search (1.00)
- Information Technology > Data Science > Data Mining (1.00)
- Information Technology > Communications > Social Media (1.00)
- (2 more...)
How BalaBit adapted machine learning to secure privileged account 'blind spot'
In an unassuming building on the outskirts of Budapest engineers working for small Hungarian security firm BalaBit have spent the last three years working on technology its makers are convinced can contain one of cybersecurity's most intractable woes. In 2014 the relatively unknown firm launched a system called Blindspotter which, as its name suggests, gives its customers mostly in finance and telco sector buyers the ability to see things most networks barely acknowledge as existing let alone attempt to look for. Blindspotter is designed to watch what network users are doing in a lot of detail, a boon for organisations that worry about user credentials being abused, either deliberately from within by attackers who've somehow pilfered them. When used in conjunction with the firm's network proxy appliance, Shell Control Box (SCB), organisations suddenly have the ability to monitor their whole infrastructure using measurements of user behaviour rather than packets, ports and protocols. The system's real intrigue isn't what it does – cybersecurity is already chock full of network monitoring in different forms – so much as how it does it.