small cell
Improved MDL Estimators Using Fiber Bundle of Local Exponential Families for Non-exponential Families
Miyamoto, Kohei, Barron, Andrew R., Takeuchi, Jun'ichi
Minimum Description Length (MDL) estimators, using two-part codes for universal coding, are analyzed. For general parametric families under certain regularity conditions, we introduce a two-part code whose regret is close to the minimax regret, where regret of a code with respect to a target family M is the difference between the code length of the code and the ideal code length achieved by an element in M. This is a generalization of the result for exponential families by Gr\"unwald. Our code is constructed by using an augmented structure of M with a bundle of local exponential families for data description, which is not needed for exponential families. This result gives a tight upper bound on risk and loss of the MDL estimators based on the theory introduced by Barron and Cover in 1991. Further, we show that we can apply the result to mixture families, which are a typical example of non-exponential families.
- Asia > Japan > Kyūshū & Okinawa > Kyūshū > Fukuoka Prefecture > Fukuoka (0.04)
- North America > United States > Connecticut > New Haven County > New Haven (0.04)
- Europe > France > Île-de-France > Paris > Paris (0.04)
- Asia > Japan > Honshū > Kantō > Tokyo Metropolis Prefecture > Tokyo (0.04)
A Multi-robot Coverage Path Planning Algorithm Based on Improved DARP Algorithm
Huang, Yufan, Li, Man, Zhao, Tao
The research on multi-robot coverage path planning (CPP) has been attracting more and more attention. In order to achieve efficient coverage, this paper proposes an improved DARP coverage algorithm. The improved DARP algorithm based on A* algorithm is used to assign tasks to robots and then combined with STC algorithm based on Up-First algorithm to achieve full coverage of the task area. Compared with the initial DARP algorithm, this algorithm has higher efficiency and higher coverage rate.
- Asia > China > Sichuan Province > Chengdu (0.05)
- Asia > China > Liaoning Province > Shenyang (0.04)
Deep Attention Recognition for Attack Identification in 5G UAV scenarios: Novel Architecture and End-to-End Evaluation
Viana, Joseanne, Farkhari, Hamed, Sebastiao, Pedro, Campos, Luis Miguel, Koutlia, Katerina, Bojovic, Biljana, Lagen, Sandra, Dinis, Rui
Despite the robust security features inherent in the 5G framework, attackers will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations and decrease UAV control communication performance in Air-to-Ground (A2G) links. Operating under the assumption that the 5G UAV communications infrastructure will never be entirely secure, we propose Deep Attention Recognition (DAtR) as a solution to identify attacks based on a small deep network embedded in authenticated UAVs. In the tested scenarios, a number of attackers are located in random positions, while their power is varied in each simulation. Moreover, terrestrial users are included in the network to impose additional complexity on attack detection. To improve the system's overall performance in the attack scenarios, we propose complementing the deep network decision with two mechanisms based on data manipulation and majority voting techniques. We compare several performance parameters in our proposed Deep Network. For example, the impact of Long Short-Term-Memory (LSTM) and Attention layers in terms of their overall accuracy, the window size effect, and test the accuracy when only partial data is available in the training process. Finally, we benchmark our deep network with six widely used classifiers regarding classification accuracy. Our algorithm's accuracy exceeds 4% compared with the eXtreme Gradient Boosting (XGB) classifier in LoS condition and around 3% in the short distance NLoS condition. Considering the proposed deep network, all other classifiers present lower accuracy than XGB. UAVs will play a crucial role in emergency response [1, 2], package delivery in the logistics industry, and in temporal events, [2]. UAVs are becoming more common and reliable [3] due to technological advancements [4, 5], as well as the improvements in energy-efficient UAV's trajectory optimizations algorithms to be feasible in practice to take into account the dynamics of the UAV as a parametrized method [6, 7, 8], thus integrating UAVs into 5G and 6G networks will increase telecommunication coverage and reduce costs for businesses willing to invest in this technology. However, UAVs can easily be hacked by malicious users [9] throughout their wireless communication channels, which might divert delivery packets from their destinations. This can have disastrous consequences in unfortunate climate events where UAVs are transporting people to hospitals, or in cases of criminal investigations.
- Europe > Portugal > Lisbon > Lisbon (0.04)
- North America > United States > California > Los Angeles County > Long Beach (0.04)
- Asia > Middle East > Iran > Tehran Province > Tehran (0.04)
- Transportation (1.00)
- Telecommunications (1.00)
- Information Technology > Security & Privacy (1.00)
A Synthetic Dataset for 5G UAV Attacks Based on Observable Network Parameters
Viana, Joseanne, Farkhari, Hamed, Sebastiao, Pedro, Lagen, Sandra, Koutlia, Katerina, Bojovic, Biljana, Dinis, Rui
Synthetic datasets are beneficial for machine learning researchers due to the possibility of experimenting with new strategies and algorithms in the training and testing phases. These datasets can easily include more scenarios that might be costly to research with real data or can complement and, in some cases, replace real data measurements, depending on the quality of the synthetic data. They can also solve the unbalanced data problem, avoid overfitting, and can be used in training while testing can be done with real data. In this paper, we present, to the best of our knowledge, the first synthetic dataset for Unmanned Aerial Vehicle (UAV) attacks in 5G and beyond networks based on the following key observable network parameters that indicate power levels: the Received Signal Strength Indicator (RSSI) and the Signal to Interference-plus-Noise Ratio (SINR). The main objective of this data is to enable deep network development for UAV communication security. Especially, for algorithm development or the analysis of time-series data applied to UAV attack recognition. Our proposed dataset provides insights into network functionality when static or moving UAV attackers target authenticated UAVs in an urban environment. The dataset also considers the presence and absence of authenticated terrestrial users in the network, which may decrease the deep networks ability to identify attacks. Furthermore, the data provides deeper comprehension of the metrics available in the 5G physical and MAC layers for machine learning and statistics research. The dataset will available at link archive-beta.ics.uci.edu
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Networks (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.70)
- Information Technology > Artificial Intelligence > Robots > Autonomous Vehicles > Drones (0.48)
A Convolutional Attention Based Deep Network Solution for UAV Network Attack Recognition over Fading Channels and Interference
Viana, Joseanne, Farkhari, Hamed, Campos, Luis Miguel, Sebastiao, Pedro, Koutlia, Katerina, Lagen, Sandra, Bernardo, Luis, Dinis, Rui
When users exchange data with Unmanned Aerial vehicles - (UAVs) over air-to-ground (A2G) wireless communication networks, they expose the link to attacks that could increase packet loss and might disrupt connectivity. For example, in emergency deliveries, losing control information (i.e data related to the UAV control communication) might result in accidents that cause UAV destruction and damage to buildings or other elements in a city. To prevent these problems, these issues must be addressed in 5G and 6G scenarios. This research offers a deep learning (DL) approach for detecting attacks in UAVs equipped with orthogonal frequency division multiplexing (OFDM) receivers on Clustered Delay Line (CDL) channels in highly complex scenarios involving authenticated terrestrial users, as well as attackers in unknown locations. We use the two observable parameters available in 5G UAV connections: the Received Signal Strength Indicator (RSSI) and the Signal to Interference plus Noise Ratio (SINR). The prospective algorithm is generalizable regarding attack identification, which does not occur during training. Further, it can identify all the attackers in the environment with 20 terrestrial users. A deeper investigation into the timing requirements for recognizing attacks show that after training, the minimum time necessary after the attack begins is 100 ms, and the minimum attack power is 2 dBm, which is the same power that the authenticated UAV uses. Our algorithm also detects moving attackers from a distance of 500 m.
- Telecommunications (1.00)
- Information Technology > Security & Privacy (1.00)
A Fast Heuristic for Gateway Location in Wireless Backhaul of 5G Ultra-Dense Networks
Raithatha, Mital, Chaudhry, Aizaz U., Hafez, Roshdy H. M., Chinneck, John W.
In 5G Ultra-Dense Networks, a distributed wireless backhaul is an attractive solution for forwarding traffic to the core. The macro-cell coverage area is divided into many small cells. A few of these cells are designated as gateways and are linked to the core by high-capacity fiber optic links. Each small cell is associated with one gateway and all small cells forward their traffic to their respective gateway through multi-hop mesh networks. We investigate the gateway location problem and show that finding near-optimal gateway locations improves the backhaul network capacity. An exact p-median integer linear program is formulated for comparison with our novel K-GA heuristic that combines a Genetic Algorithm (GA) with K-means clustering to find near-optimal gateway locations. We compare the performance of KGA with six other approaches in terms of average number of hops and backhaul network capacity at different node densities through extensive Monte Carlo simulations. All approaches are tested in various user distribution scenarios, including uniform distribution, bivariate Gaussian distribution, and cluster distribution. In all cases K-GA provides near-optimal results, achieving average number of hops and backhaul network capacity within 2% of optimal while saving an average of 95% of the execution time.
- North America > Canada > Ontario > National Capital Region > Ottawa (0.28)
- North America > United States > New York > New York County > New York City (0.04)
- North America > United States > Florida > Miami-Dade County > Miami (0.04)
- (22 more...)
- Telecommunications (1.00)
- Information Technology > Networks (0.46)
- Information Technology > Communications > Networks (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Evolutionary Systems (1.00)
- Information Technology > Artificial Intelligence > Representation & Reasoning > Optimization (0.93)
- Information Technology > Artificial Intelligence > Machine Learning > Statistical Learning > Clustering (0.67)
Five Issues in Deploying 5G and Potential Solutions for Telecom Service Providers - Coruzant - The largest technology publication on emerging tech and trends.
Widespread deployment of 5G brings with it the promise of a network of connectivity with greatly improved latency and downtime. To reach full 5G capabilities, telecom service providers would be required to reach enough density to monetize the network by installing 5,000 to 20,000 5G small cells in every major city within the next five to ten years. This brings the network much closer to mobile phones and every type of IoT sensor or device that needs connectivity. The explosive increase in bandwidth will open new possibilities, from remote surgeries guided from New York City to a small African village, to enabling new ways for humans and robots to work together on a factory floor. Full 5G coverage is an ambitious goal, requiring the biggest telecom players to invest $20 billion annually in the US.
Realtime Scheduling and Power Allocation Using Deep Neural Networks
Xu, Shenghe, Liu, Pei, Wang, Ran, Panwar, Shivendra S.
With the increasing number of base stations (BSs) and network densification in 5G, interference management using link scheduling and power control are vital for better utilization of radio resources. However, the complexity of solving link scheduling and the power control problem grows exponentially with the number of BS. Due to high computation time, previous methods are useful for research purposes but impractical for real time usage. In this paper we propose to use deep neural networks (DNNs) to approximate optimal link scheduling and power control for the case with multiple small cells. A deep Q-network (DQN) estimates a suitable schedule, then a DNN allocates power for the corresponding schedule. Simulation results show that the proposed method achieves over five orders of magnitude speed-up with less than nine percent performance loss, making real time usage practical.
5G will need small cells, so Nokia is sending in the drones
If you want 5G, there's a good chance you'll need a small cell nearby to deliver it. Putting up that cell may be hard because of a host of problems, but Nokia Bell Labs thinks it can solve some of them with drones and tiny solar panels. Nokia's F-Cell is an experimental LTE small cell that doesn't need any wires. It gets power from solar panels on its surface and communicates with the carrier's core network over a high-speed wireless connection. No one even needs to climb up on a roof to install it: The company recently delivered an F-Cell to the roof of one of its buildings in Sunnyvale, California, using a drone.
- Energy > Renewable > Solar (0.99)
- Telecommunications (0.74)
- Information Technology > Communications > Networks (0.51)
- Information Technology > Artificial Intelligence > Robots > Autonomous Vehicles > Drones (0.36)