-
Achieving Observability on Fog Computing with the use of open-source tools
Authors:
Breno Costa,
Abhik Banerjee,
Prem Prakash Jayaraman,
Leonardo R. Carvalho,
João Bachiega Jr.,
Aleteia Araujo
Abstract:
Fog computing can provide computational resources and low-latency communication at the network edge. But with it comes uncertainties that must be managed in order to guarantee Service Level Agreements. Service observability can help the environment better deal with uncertainties, delivering relevant and up-to-date information in a timely manner to support decision making. Observability is consider…
▽ More
Fog computing can provide computational resources and low-latency communication at the network edge. But with it comes uncertainties that must be managed in order to guarantee Service Level Agreements. Service observability can help the environment better deal with uncertainties, delivering relevant and up-to-date information in a timely manner to support decision making. Observability is considered a superset of monitoring since it uses not only performance metrics, but also other instrumentation domains such as logs and traces. However, as Fog Computing is typically characterised by resource-constrained nodes and network uncertainties, increasing observability in fog can be risky due to the additional load injected into a restricted environment. There is no work in the literature that evaluated fog observability. In this paper, we first outline the challenges of achieving observability in a Fog environment, based on which we present a formal definition of fog observability. Subsequently, a real-world Fog Computing testbed running a smart city use case is deployed, and an empirical evaluation of fog observability using open-source tools is presented. The results show that under certain conditions, it is viable to provide observability in a Fog Computing environment using open-source tools, although it is necessary to control the overhead modifying their default configuration according to the application characteristics.
△ Less
Submitted 25 May, 2024;
originally announced July 2024.
-
The α-Lomax Distribution: A Compound Channel Model
Authors:
Osamah S. Badarneh,
Daniel Benevides da Costa
Abstract:
In this paper, we propose the α-Lomax distribution as a new compound fading channel model. This new distribution generalizes the recently introduced Lomax fading channel model. It is worth noting that the Lomax distribution is a decreasing function, while the α-Lomax is a unimodal function, offering greater flexibility in modeling wireless fading channels. In particular, we derive closed-form expr…
▽ More
In this paper, we propose the α-Lomax distribution as a new compound fading channel model. This new distribution generalizes the recently introduced Lomax fading channel model. It is worth noting that the Lomax distribution is a decreasing function, while the α-Lomax is a unimodal function, offering greater flexibility in modeling wireless fading channels. In particular, we derive closed-form expressions for the probability density function and cumulative distribution function for the instantaneous signal-to-noise ratio (SNR). Additionally, we provide closed-form expressions for several fundamental performance metrics, including outage probability, average bit error rate, and channel capacity. Furthermore, we derive closed-form expression for the average block-length error rate in short-packet communications. Moreover, we fit the PDF of the proposed channel model to empirical data obtained from a device-to-device communication system. We also offer simple and accurate approximations for these expressions in the high SNR regime.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
A Novel Paradigm Shift for Next-Generation: Symbiotic Backscatter Rate-Splitting Multiple Access Systems
Authors:
Thai-Hoc Vu,
Daniel Benevides da Costa,
Bao Vo Nguyen Quoc,
Sunghwan Kim
Abstract:
Next-generation wireless networks are projected to empower a broad range of Internet-of-things (IoT) applications and services with extreme data rates, posing new challenges in delivering large-scale connectivity at a low cost to current communication paradigms. Rate-splitting multiple access (RSMA) is one of the most spotlight nominees, conceived to address spectrum scarcity while reaching massiv…
▽ More
Next-generation wireless networks are projected to empower a broad range of Internet-of-things (IoT) applications and services with extreme data rates, posing new challenges in delivering large-scale connectivity at a low cost to current communication paradigms. Rate-splitting multiple access (RSMA) is one of the most spotlight nominees, conceived to address spectrum scarcity while reaching massive connectivity. Meanwhile, symbiotic communication is said to be an inexpensive way to realize future IoT on a large scale. To reach the goal of spectrum efficiency improvement and low energy consumption, we merge these advances by means of introducing a novel paradigm shift, called symbiotic backscatter RSMA, for the next generation. Specifically, we first establish the way to operate the symbiotic system to assist the readers in apprehending the proposed paradigm, then guide detailed design in beamforming weights with four potential gain-control (GC) strategies for enhancing symbiotic communication, and finally provide an information-theoretic framework using a new metric, called symbiotic outage probability (SOP) to characterize the proposed system performance. Through numerical result experiments, we show that the developed framework can accurately predict the actual SOP and the efficacy of the proposed GC strategies in improving the SOP performance.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
Active RIS-Aided Massive MIMO With Imperfect CSI and Phase Noise
Authors:
Zhangjie Peng,
Jianchen Zhu,
Cunhua Pan,
Zaichen Zhang,
Daniel Benevides da Costa,
Maged Elkashlan,
George K. Karagiannidis
Abstract:
Active reconfigurable intelligent surface (RIS) has attracted significant attention as a recently proposed RIS architecture. Owing to its capability to amplify the incident signals, active RIS can mitigate the multiplicative fading effect inherent in the passive RIS-aided system. In this paper, we consider an active RIS-aided uplink multi-user massive multiple-input multiple-output (MIMO) system i…
▽ More
Active reconfigurable intelligent surface (RIS) has attracted significant attention as a recently proposed RIS architecture. Owing to its capability to amplify the incident signals, active RIS can mitigate the multiplicative fading effect inherent in the passive RIS-aided system. In this paper, we consider an active RIS-aided uplink multi-user massive multiple-input multiple-output (MIMO) system in the presence of phase noise at the active RIS. Specifically, we employ a two-timescale scheme, where the beamforming at the base station (BS) is adjusted based on the instantaneous aggregated channel state information (CSI) and the statistical CSI serves as the basis for designing the phase shifts at the active RIS, so that the feedback overhead and computational complexity can be significantly reduced. The aggregated channel composed of the cascaded and direct channels is estimated by utilizing the linear minimum mean square error (LMMSE) technique. Based on the estimated channel, we derive the analytical closed-form expression of a lower bound of the achievable rate. The power scaling laws in the active RIS-aided system are investigated based on the theoretical expressions. When the transmit power of each user is scaled down by the number of BS antennas M or reflecting elements N, we find that the thermal noise will cause the lower bound of the achievable rate to approach zero, as the number of M or N increases to infinity. Moreover, an optimization approach based on genetic algorithms (GA) is introduced to tackle the phase shift optimization problem. Numerical results reveal that the active RIS can greatly enhance the performance of the considered system under various settings.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Noise-Aware Training of Layout-Aware Language Models
Authors:
Ritesh Sarkhel,
Xiaoqi Ren,
Lauro Beltrao Costa,
Guolong Su,
Vincent Perot,
Yanan Xie,
Emmanouil Koukoumidis,
Arnab Nandi
Abstract:
A visually rich document (VRD) utilizes visual features along with linguistic cues to disseminate information. Training a custom extractor that identifies named entities from a document requires a large number of instances of the target document type annotated at textual and visual modalities. This is an expensive bottleneck in enterprise scenarios, where we want to train custom extractors for tho…
▽ More
A visually rich document (VRD) utilizes visual features along with linguistic cues to disseminate information. Training a custom extractor that identifies named entities from a document requires a large number of instances of the target document type annotated at textual and visual modalities. This is an expensive bottleneck in enterprise scenarios, where we want to train custom extractors for thousands of different document types in a scalable way. Pre-training an extractor model on unlabeled instances of the target document type, followed by a fine-tuning step on human-labeled instances does not work in these scenarios, as it surpasses the maximum allowable training time allocated for the extractor. We address this scenario by proposing a Noise-Aware Training method or NAT in this paper. Instead of acquiring expensive human-labeled documents, NAT utilizes weakly labeled documents to train an extractor in a scalable way. To avoid degradation in the model's quality due to noisy, weakly labeled samples, NAT estimates the confidence of each training sample and incorporates it as uncertainty measure during training. We train multiple state-of-the-art extractor models using NAT. Experiments on a number of publicly available and in-house datasets show that NAT-trained models are not only robust in performance -- it outperforms a transfer-learning baseline by up to 6% in terms of macro-F1 score, but it is also more label-efficient -- it reduces the amount of human-effort required to obtain comparable performance by up to 73%.
△ Less
Submitted 30 March, 2024;
originally announced April 2024.
-
Using Zero-shot Prompting in the Automatic Creation and Expansion of Topic Taxonomies for Tagging Retail Banking Transactions
Authors:
Daniel de S. Moraes,
Pedro T. C. Santos,
Polyana B. da Costa,
Matheus A. S. Pinto,
Ivan de J. P. Pinto,
Álvaro M. G. da Veiga,
Sergio Colcher,
Antonio J. G. Busson,
Rafael H. Rocha,
Rennan Gaio,
Rafael Miceli,
Gabriela Tourinho,
Marcos Rabaioli,
Leandro Santos,
Fellipe Marques,
David Favaro
Abstract:
This work presents an unsupervised method for automatically constructing and expanding topic taxonomies using instruction-based fine-tuned LLMs (Large Language Models). We apply topic modeling and keyword extraction techniques to create initial topic taxonomies and LLMs to post-process the resulting terms and create a hierarchy. To expand an existing taxonomy with new terms, we use zero-shot promp…
▽ More
This work presents an unsupervised method for automatically constructing and expanding topic taxonomies using instruction-based fine-tuned LLMs (Large Language Models). We apply topic modeling and keyword extraction techniques to create initial topic taxonomies and LLMs to post-process the resulting terms and create a hierarchy. To expand an existing taxonomy with new terms, we use zero-shot prompting to find out where to add new nodes, which, to our knowledge, is the first work to present such an approach to taxonomy tasks. We use the resulting taxonomies to assign tags that characterize merchants from a retail bank dataset. To evaluate our work, we asked 12 volunteers to answer a two-part form in which we first assessed the quality of the taxonomies created and then the tags assigned to merchants based on that taxonomy. The evaluation revealed a coherence rate exceeding 90% for the chosen taxonomies. The taxonomies' expansion with LLMs also showed exciting results for parent node prediction, with an f1-score above 70% in our taxonomies.
△ Less
Submitted 11 February, 2024; v1 submitted 7 January, 2024;
originally announced January 2024.
-
Evaluating the Uncanny Valley Effect in Dark Colored Skin Virtual Humans
Authors:
Victor Araujo,
Angelo Brandelli Costa,
Soraia Raupp Musse
Abstract:
With the rapid advancement of technology, the design of virtual humans has led to a very realistic user experience, such as in movies, video games, and simulations. As a result, virtual humans are becoming increasingly similar to real humans. However, following the Uncanny Valley (UV) theory, users tend to feel discomfort when watching entities with anthropomorphic traits that differ from real hum…
▽ More
With the rapid advancement of technology, the design of virtual humans has led to a very realistic user experience, such as in movies, video games, and simulations. As a result, virtual humans are becoming increasingly similar to real humans. However, following the Uncanny Valley (UV) theory, users tend to feel discomfort when watching entities with anthropomorphic traits that differ from real humans. This phenomenon is related to social identity theory, where the observer looks for something familiar. In Computer Graphics (CG), techniques used to create virtual humans with dark skin tones often rely on approaches initially developed for rendering characters with white skin tones. Furthermore, most CG characters portrayed in various media, including movies and games, predominantly exhibit white skin tones. Consequently, it is pertinent to explore people's perceptions regarding different groups of virtual humans. Thus, this paper aims to examine and evaluate the human perception of CG characters from different media, comparing two types of skin colors. The findings indicate that individuals felt more comfortable and perceived less realism when watching characters with dark colored skin than those with white colored skin. Our central hypothesis is that dark colored characters, rendered with classical developed algorithms, are considered more cartoon than realistic and placed on the left of the Valley in the UV chart.
△ Less
Submitted 11 December, 2023;
originally announced December 2023.
-
Generative Large Language Models Are All-purpose Text Analytics Engines: Text-to-text Learning Is All Your Need
Authors:
Cheng Peng,
Xi Yang,
Aokun Chen,
Zehao Yu,
Kaleb E Smith,
Anthony B Costa,
Mona G Flores,
Jiang Bian,
Yonghui Wu
Abstract:
Objective To solve major clinical natural language processing (NLP) tasks using a unified text-to-text learning architecture based on a generative large language model (LLM) via prompt tuning. Methods We formulated 7 key clinical NLP tasks as text-to-text learning and solved them using one unified generative clinical LLM, GatorTronGPT, developed using GPT-3 architecture and trained with up to 20 b…
▽ More
Objective To solve major clinical natural language processing (NLP) tasks using a unified text-to-text learning architecture based on a generative large language model (LLM) via prompt tuning. Methods We formulated 7 key clinical NLP tasks as text-to-text learning and solved them using one unified generative clinical LLM, GatorTronGPT, developed using GPT-3 architecture and trained with up to 20 billion parameters. We adopted soft prompts (i.e., trainable vectors) with frozen LLM, where the LLM parameters were not updated (i.e., frozen) and only the vectors of soft prompts were updated, known as prompt tuning. We added additional soft prompts as a prefix to the input layer, which were optimized during the prompt tuning. We evaluated the proposed method using 7 clinical NLP tasks and compared them with previous task-specific solutions based on Transformer models. Results and Conclusion The proposed approach achieved state-of-the-art performance for 5 out of 7 major clinical NLP tasks using one unified generative LLM. Our approach outperformed previous task-specific transformer models by ~3% for concept extraction and 7% for relation extraction applied to social determinants of health, 3.4% for clinical concept normalization, 3.4~10% for clinical abbreviation disambiguation, and 5.5~9% for natural language inference. Our approach also outperformed a previously developed prompt-based machine reading comprehension (MRC) model, GatorTron-MRC, for clinical concept and relation extraction. The proposed approach can deliver the ``one model for all`` promise from training to deployment using a unified generative LLM.
△ Less
Submitted 10 December, 2023;
originally announced December 2023.
-
Portuguese FAQ for Financial Services
Authors:
Paulo Finardi,
Wanderley M. Melo,
Edgard D. Medeiros Neto,
Alex F. Mansano,
Pablo B. Costa,
Vinicius F. Caridá
Abstract:
Scarcity of domain-specific data in the Portuguese financial domain has disfavored the development of Natural Language Processing (NLP) applications. To address this limitation, the present study advocates for the utilization of synthetic data generated through data augmentation techniques. The investigation focuses on the augmentation of a dataset sourced from the Central Bank of Brazil FAQ, empl…
▽ More
Scarcity of domain-specific data in the Portuguese financial domain has disfavored the development of Natural Language Processing (NLP) applications. To address this limitation, the present study advocates for the utilization of synthetic data generated through data augmentation techniques. The investigation focuses on the augmentation of a dataset sourced from the Central Bank of Brazil FAQ, employing techniques that vary in semantic similarity. Supervised and unsupervised tasks are conducted to evaluate the impact of augmented data on both low and high semantic similarity scenarios. Additionally, the resultant dataset will be publicly disseminated on the Hugging Face Datasets platform, thereby enhancing accessibility and fostering broader engagement within the NLP research community.
△ Less
Submitted 19 November, 2023;
originally announced November 2023.
-
Domain Knowledge Distillation from Large Language Model: An Empirical Study in the Autonomous Driving Domain
Authors:
Yun Tang,
Antonio A. Bruto da Costa,
Jason Zhang,
Irvine Patrick,
Siddartha Khastgir,
Paul Jennings
Abstract:
Engineering knowledge-based (or expert) systems require extensive manual effort and domain knowledge. As Large Language Models (LLMs) are trained using an enormous amount of cross-domain knowledge, it becomes possible to automate such engineering processes. This paper presents an empirical automation and semi-automation framework for domain knowledge distillation using prompt engineering and the L…
▽ More
Engineering knowledge-based (or expert) systems require extensive manual effort and domain knowledge. As Large Language Models (LLMs) are trained using an enormous amount of cross-domain knowledge, it becomes possible to automate such engineering processes. This paper presents an empirical automation and semi-automation framework for domain knowledge distillation using prompt engineering and the LLM ChatGPT. We assess the framework empirically in the autonomous driving domain and present our key observations. In our implementation, we construct the domain knowledge ontology by "chatting" with ChatGPT. The key finding is that while fully automated domain ontology construction is possible, human supervision and early intervention typically improve efficiency and output quality as they lessen the effects of response randomness and the butterfly effect. We, therefore, also develop a web-based distillation assistant enabling supervision and flexible intervention at runtime. We hope our findings and tools could inspire future research toward revolutionizing the engineering of knowledge-based systems across application domains.
△ Less
Submitted 17 July, 2023;
originally announced July 2023.
-
IRS-Aided Overloaded Multi-Antenna Systems: Joint User Grou** and Resource Allocation
Authors:
Ying Gao,
Qingqing Wu,
Wen Chen,
Yang Liu,
Ming Li,
Daniel Benevides da Costa
Abstract:
This paper studies an intelligent reflecting surface (IRS)-aided multi-antenna simultaneous wireless information and power transfer (SWIPT) system where an $M$-antenna access point (AP) serves $K$ single-antenna information users (IUs) and $J$ single-antenna energy users (EUs) with the aid of an IRS with phase errors. We explicitly concentrate on overloaded scenarios where $K + J > M$ and…
▽ More
This paper studies an intelligent reflecting surface (IRS)-aided multi-antenna simultaneous wireless information and power transfer (SWIPT) system where an $M$-antenna access point (AP) serves $K$ single-antenna information users (IUs) and $J$ single-antenna energy users (EUs) with the aid of an IRS with phase errors. We explicitly concentrate on overloaded scenarios where $K + J > M$ and $K \geq M$. Our goal is to maximize the minimum throughput among all the IUs by optimizing the allocation of resources (including time, transmit beamforming at the AP, and reflect beamforming at the IRS), while guaranteeing the minimum amount of harvested energy at each EU. Towards this goal, we propose two user grou** (UG) schemes, namely, the non-overlap** UG scheme and the overlap** UG scheme, where the difference lies in whether identical IUs can exist in multiple groups. Different IU groups are served in orthogonal time dimensions, while the IUs in the same group are served simultaneously with all the EUs via spatial multiplexing. The two problems corresponding to the two UG schemes are mixed-integer non-convex optimization problems and difficult to solve optimally. We propose efficient algorithms for these two problems based on the big-M formulation, the penalty method, the block coordinate descent, and the successive convex approximation. Simulation results show that: 1) the non-robust counterparts of the proposed robust designs are unsuitable for practical IRS-aided SWIPT systems with phase errors since the energy harvesting constraints cannot be satisfied; 2) the proposed UG strategies can significantly improve the max-min throughput over the benchmark schemes without UG or adopting random UG; 3) the overlap** UG scheme performs much better than its non-overlap** counterpart when the absolute difference between $K$ and $M$ is small and the EH constraints are not stringent.
△ Less
Submitted 1 July, 2023;
originally announced July 2023.
-
A Study of Generative Large Language Model for Medical Research and Healthcare
Authors:
Cheng Peng,
Xi Yang,
Aokun Chen,
Kaleb E Smith,
Nima PourNejatian,
Anthony B Costa,
Cheryl Martin,
Mona G Flores,
Ying Zhang,
Tanja Magoc,
Gloria Lipori,
Duane A Mitchell,
Naykky S Ospina,
Mustafa M Ahmed,
William R Hogan,
Elizabeth A Shenkman,
Yi Guo,
Jiang Bian,
Yonghui Wu
Abstract:
There is enormous enthusiasm and concerns in using large language models (LLMs) in healthcare, yet current assumptions are all based on general-purpose LLMs such as ChatGPT. This study develops a clinical generative LLM, GatorTronGPT, using 277 billion words of mixed clinical and English text with a GPT-3 architecture of 20 billion parameters. GatorTronGPT improves biomedical natural language proc…
▽ More
There is enormous enthusiasm and concerns in using large language models (LLMs) in healthcare, yet current assumptions are all based on general-purpose LLMs such as ChatGPT. This study develops a clinical generative LLM, GatorTronGPT, using 277 billion words of mixed clinical and English text with a GPT-3 architecture of 20 billion parameters. GatorTronGPT improves biomedical natural language processing for medical research. Synthetic NLP models trained using GatorTronGPT generated text outperform NLP models trained using real-world clinical text. Physicians Turing test using 1 (worst) to 9 (best) scale shows that there is no significant difference in linguistic readability (p = 0.22; 6.57 of GatorTronGPT compared with 6.93 of human) and clinical relevance (p = 0.91; 7.0 of GatorTronGPT compared with 6.97 of human) and that physicians cannot differentiate them (p < 0.001). This study provides insights on the opportunities and challenges of LLMs for medical research and healthcare.
△ Less
Submitted 22 May, 2023;
originally announced May 2023.
-
GA-Aided Directivity in Volumetric and Planar Massive-Antenna Array Design
Authors:
Bruno Felipe Costa,
Taufik Abrão
Abstract:
The problem of directivity enhancement, leading to the increase in the directivity gain over a certain desired angle of arrival/departure (AoA/AoD), is considered in this work. A new formulation of the volumetric array directivity problem is proposed using the rectangular coordinates to describe each antenna element and the desired azimuth and elevation angles with a general element pattern. Such…
▽ More
The problem of directivity enhancement, leading to the increase in the directivity gain over a certain desired angle of arrival/departure (AoA/AoD), is considered in this work. A new formulation of the volumetric array directivity problem is proposed using the rectangular coordinates to describe each antenna element and the desired azimuth and elevation angles with a general element pattern. Such a directivity problem is formulated to find the optimal minimum distance between the antenna elements $d_\text{min}$ aiming to achieve as high directivity gains as possible. {An expedited implementation method is developed to place the antenna elements in a distinctive plane dependent on ($θ_0$; $φ_0$). A novel concept on optimizing directivity for the uniform planar array (OUPA) is introduced to find a quasi-optimal solution for the non-convex optimization problem with low complexity. This solution is reached by deploying the proposed successive evaluation and validation (SEV) method. {Moreover, the genetic} algorithm (GA) method was deployed to find the directivity optimization solution expeditiously. For a small number of antenna elements {, typically $N\in [4,\dots, 9]$,} the achievable directivity by GA optimization demonstrates gains of $\sim 3$ dBi compared with the traditional beamforming technique, using steering vector for uniform linear arrays (ULA) and uniform circular arrays (UCA), while gains of $\sim1.5$ dBi are attained when compared with an improved UCA directivity method. For a larger number of antenna elements {, two improved GA procedures, namely GA-{\it marginal} and GA-{\it stall}, were} proposed and compared with the OUPA method. OUPA also indicates promising directivity gains surpassing $30$ dBi for massive MIMO scenarios.
△ Less
Submitted 7 January, 2023;
originally announced January 2023.
-
Ensemble learning techniques for intrusion detection system in the context of cybersecurity
Authors:
Andricson Abeline Moreira,
Carlos A. C. Tojeiro,
Carlos J. Reis,
Gustavo Henrique Massaro,
Igor Andrade Brito e Kelton A. P. da Costa
Abstract:
Recently, there has been an interest in improving the resources available in Intrusion Detection System (IDS) techniques. In this sense, several studies related to cybersecurity show that the environment invasions and information kidnap** are increasingly recurrent and complex. The criticality of the business involving operations in an environment using computing resources does not allow the vul…
▽ More
Recently, there has been an interest in improving the resources available in Intrusion Detection System (IDS) techniques. In this sense, several studies related to cybersecurity show that the environment invasions and information kidnap** are increasingly recurrent and complex. The criticality of the business involving operations in an environment using computing resources does not allow the vulnerability of the information. Cybersecurity has taken on a dimension within the universe of indispensable technology in corporations, and the prevention of risks of invasions into the environment is dealt with daily by Security teams. Thus, the main objective of the study was to investigate the Ensemble Learning technique using the Stacking method, supported by the Support Vector Machine (SVM) and k-Nearest Neighbour (kNN) algorithms aiming at an optimization of the results for DDoS attack detection. For this, the Intrusion Detection System concept was used with the application of the Data Mining and Machine Learning Orange tool to obtain better results
△ Less
Submitted 21 December, 2022;
originally announced December 2022.
-
Counteracting Eavesdropper Attacks Through Reconfigurable Intelligent Surfaces: A New Threat Model and Secrecy Rate Optimization
Authors:
George C. Alexandropoulos,
Konstantinos D. Katsanos,
Miaowen Wen,
Daniel B. da Costa
Abstract:
The potential of Reconfigurable Intelligent Surfaces (RISs) for energy-efficient and performance-boosted wireless communications is recently gaining remarkable research attention, motivating their consideration for various $5$-th Generation (5G) Advanced and beyond applications. In this paper, we consider a Multiple-Input Multiple-Output (MIMO) Physical Layer Security (PLS) system with multiple da…
▽ More
The potential of Reconfigurable Intelligent Surfaces (RISs) for energy-efficient and performance-boosted wireless communications is recently gaining remarkable research attention, motivating their consideration for various $5$-th Generation (5G) Advanced and beyond applications. In this paper, we consider a Multiple-Input Multiple-Output (MIMO) Physical Layer Security (PLS) system with multiple data streams including one legitimate passive RIS and one malicious passive RIS, with the former being transparent to the multi-antenna eavesdropper and the latter's presence being unknown at the legitimate multi-antenna transceivers. We first present a novel threat model for the RIS-boosted eavesdrop** system and design a joint optimization framework for the eavesdropper's receive combining matrix and the reflection coefficients of the malicious RIS. Focusing next on the secrecy rate maximization problem, we present an RIS-empowered PLS scheme that jointly designs the legitimate precoding matrix and number of data streams, the Artificial Noise (AN) covariance matrix, the receive combining matrix, and the reflection coefficients of the legitimate RIS. The proposed optimization algorithms, whose convergence to at least local optimum points is proved, are based on alternating maximization, minorization-maximization, and manifold optimization, including semi-closed form expressions for the optimization variables. Our extensive simulation results for two representative system setups reveal that, in the absence of a legitimate RIS, transceiver spatial filtering and AN are incapable of offering non-zero secrecy rates, even for malicious RISs with small numbers of elements. However, when an $L$-element legitimate RIS is deployed, confidential communication can be safeguarded against eavesdrop** systems possessing even more than a $5L$-element malicious RIS.
△ Less
Submitted 5 December, 2022;
originally announced December 2022.
-
Semantic-Native Communication: A Simplicial Complex Perspective
Authors:
Qiyang Zhao,
Mehdi Bennis,
Merouane Debbah,
Daniel Benevides da Costa
Abstract:
Semantic communication enables intelligent agents to extract meaning (or semantics) of information via interaction, to carry out collaborative tasks. In this paper, we study semantic communication from a topological space perspective, in which higher-order data semantics live in a simplicial complex. Specifically, a transmitter first maps its data into a $k$-order simplicial complex and then learn…
▽ More
Semantic communication enables intelligent agents to extract meaning (or semantics) of information via interaction, to carry out collaborative tasks. In this paper, we study semantic communication from a topological space perspective, in which higher-order data semantics live in a simplicial complex. Specifically, a transmitter first maps its data into a $k$-order simplicial complex and then learns its high-order correlations. The simplicial structure and corresponding features are encoded into semantic embeddings in latent space for transmission. Subsequently, the receiver decodes the structure and infers the missing or distorted data. The transmitter and receiver collaboratively train a simplicial convolutional autoencoder to accomplish the semantic communication task. Experiments are carried out on a real dataset of Semantic Scholar Open Research Corpus, where one part of the semantic embedding is missing or distorted during communication. Numerical results show that the simplicial convolutional autoencoder enabled semantic communication effectively rebuilds the simplicial features and infer the missing data with $95\%$ accuracy, while achieving stable performance under channel noise. In contrast, the conventional autoencoder enabled communication fails to infer any missing data. Moreover, our approach is shown to effectively infer the distorted data without prior simplicial structure knowledge at the receiver, by learning extracted semantic information during communications. Leveraging the topological nature of information, the proposed method is also shown to be more reliable and efficient compared to several baselines, notably at low signal-to-noise (SNR) levels.
△ Less
Submitted 30 October, 2022;
originally announced October 2022.
-
Can gender categorization influence the perception of animated virtual humans?
Authors:
V. Araujo,
D. Schaffer,
A. B. Costa,
S. R. Musse
Abstract:
Animations have become increasingly realistic with the evolution of Computer Graphics (CG). In particular, human models and behaviors were represented through animated virtual humans, sometimes with a high level of realism. In particular, gender is a characteristic that is related to human identification, so that virtual humans assigned to a specific gender have, in general, stereotyped representa…
▽ More
Animations have become increasingly realistic with the evolution of Computer Graphics (CG). In particular, human models and behaviors were represented through animated virtual humans, sometimes with a high level of realism. In particular, gender is a characteristic that is related to human identification, so that virtual humans assigned to a specific gender have, in general, stereotyped representations through movements, clothes, hair and colors, in order to be understood by users as desired by designers. An important area of study is finding out whether participants' perceptions change depending on how a virtual human is visually presented. Findings in this area can help the industry to guide the modeling and animation of virtual humans to deliver the expected impact to the audience. In this paper, we reproduce, through CG, a perceptual study that aims to assess gender bias in relation to a simulated baby. In the original study, two groups of people watched the same video of a baby reacting to the same stimuli, but one group was told the baby was female and the other group was told the same baby was male, producing different perceptions. The results of our study with virtual babies were similar to the findings with real babies. First, it shows that people's emotional response change depending on the character gender attribute, in this case the only difference was the baby's name. Our research indicates that by just informing the name of a virtual human can be enough to create a gender perception that impact the participant emotional answer.
△ Less
Submitted 3 August, 2022;
originally announced August 2022.
-
Adaptive Decoding Mechanisms for UAV-enabled Double-Uplink Coordinated NOMA
Authors:
Thanh Luan Nguyen,
Georges Kaddoum,
Tri Nhu Do,
Daniel Benevides da Costa,
Zygmunt J. Haas
Abstract:
In this paper, we propose a novel adaptive decoding mechanism (ADM) for the unmanned aerial vehicle (UAV)-enabled uplink (UL) non-orthogonal multiple access (NOMA) communications. Specifically, considering a harsh UAV environment, where ground-to-ground links are regularly unavailable, the proposed ADM overcomes the challenging problem of conventional UL-NOMA systems whose performance is sensitive…
▽ More
In this paper, we propose a novel adaptive decoding mechanism (ADM) for the unmanned aerial vehicle (UAV)-enabled uplink (UL) non-orthogonal multiple access (NOMA) communications. Specifically, considering a harsh UAV environment, where ground-to-ground links are regularly unavailable, the proposed ADM overcomes the challenging problem of conventional UL-NOMA systems whose performance is sensitive to the transmitter's statistical channel state information and the receiver's decoding order. To evaluate the performance of the ADM, we derive closed-form expressions for the system outage probability (OP) and system throughput. In the performance analysis section, we provide novel expressions for practical air-to-ground and ground-to-air channels, while taking into account the practical implementation of imperfect successive interference cancellation (SIC) in UL-NOMA. Moreover, the obtained expression can be adopted to characterize the OP of various systems under a Mixture of Gamma (MG) distribution-based fading channels. Next, we propose a sub-optimal Gradient Descent-based algorithm to obtain the power allocation coefficients that result in maximum throughput with respect to each location on UAV's trajectory. To determine the significance of the proposed ADM in nonstationary environments, we consider the ground users and the UAV to move according to the Random Waypoint Mobility (RWM) and Reference Point Group Mobility (RPGM) models, respectively. Accurate formulas for the distance distributions are also provided. Numerical solutions demonstrate that the ADM-enhanced NOMA not only outperforms Orthogonal Multiple Access (OMA), but also improves the performance of UAV-enabled UL-NOMA even in mobile environments.
△ Less
Submitted 8 March, 2023; v1 submitted 27 June, 2022;
originally announced June 2022.
-
Monitoring Fog Computing: a Review, Taxonomy and Open Challenges
Authors:
Breno Costa,
Joao Bachiega Jr,
Leonardo Reboucas de Carvalho,
Michel Rosa,
Aleteia Araujo
Abstract:
Fog computing is a distributed paradigm that provides computational resources in the users' vicinity. Fog orchestration is a set of functionalities that coordinate the dynamic infrastructure and manage the services to guarantee the Service Level Agreements. Monitoring is an orchestration functionality of prime importance. It is the basis for resource management actions, collecting status of resour…
▽ More
Fog computing is a distributed paradigm that provides computational resources in the users' vicinity. Fog orchestration is a set of functionalities that coordinate the dynamic infrastructure and manage the services to guarantee the Service Level Agreements. Monitoring is an orchestration functionality of prime importance. It is the basis for resource management actions, collecting status of resource and service and delivering updated data to the orchestrator. There are several cloud monitoring solutions and tools, but none of them comply with fog characteristics and challenges. Fog monitoring solutions are scarce, and they may not be prepared to compose an orchestration service. This paper updates the knowledge base about fog monitoring, assessing recent subjects in this context like observability, data standardization and instrumentation domains. We propose a novel taxonomy of fog monitoring solutions, supported by a systematic review of the literature. Fog monitoring proposals are analyzed and categorized by this new taxonomy, offering researchers a comprehensive overview. This work also highlights the main challenges and open research questions.
△ Less
Submitted 16 June, 2022; v1 submitted 13 May, 2022;
originally announced June 2022.
-
Multiple RISs-Aided Networks: Performance Analysis and Optimization
Authors:
Mahmoud Aldababsa,
Anas M. Salhab,
Ali Arshad Nasir,
Monjed H. Samuh,
Daniel Benevides da Costa
Abstract:
This paper analyzes the performance of multiple reconfigurable intelligent surfaces (RISs)-aided networks. The paper also provides some optimization results on the number of reflecting elements on RISs and the optimal placement of RISs. We first derive accurate closed-form approximations for RIS channels' distributions assuming independent non-identically distributed (i.ni.d.) Nakagami-\emph{m} fa…
▽ More
This paper analyzes the performance of multiple reconfigurable intelligent surfaces (RISs)-aided networks. The paper also provides some optimization results on the number of reflecting elements on RISs and the optimal placement of RISs. We first derive accurate closed-form approximations for RIS channels' distributions assuming independent non-identically distributed (i.ni.d.) Nakagami-\emph{m} fading environment. Then, the approximate expressions for outage probability (OP) and average symbol error probability are derived in closed-form. Furthermore, to get more insights into the system performance, we derive the asymptotic OP at the high signal-to-noise ratio regime and provide closed-form expressions for the system diversity order and coding gain. Finally, the accuracy of our theoretical analysis is validated through Monte-Carlo simulations. The obtained results show that the considered RIS scenario can provide a diversity order of $\frac{a}{2}K$, where $a$ is a function of the Nakagami fading parameter $m$ and the number of meta-surface elements $N$, and $K$ is the number of RISs.
△ Less
Submitted 11 June, 2022;
originally announced June 2022.
-
Rate-Splitting Multiple Access and its Interplay with Intelligent Reflecting Surfaces
Authors:
Arthur S. de Sena,
Pedro H. J. Nardelli,
Daniel B. da Costa,
Petar Popovski,
Constantinos B. Papadias
Abstract:
Rate-splitting multiple access (RSMA) has recently appeared as a powerful technique for improving the downlink performance of multiple-input multiple-output (MIMO) systems. By flexibly managing interference, RSMA can deliver high spectral and energy efficiency, as well as robustness to imperfect channel state information (CSI). In another development, an intelligent reflecting surface (IRS) has em…
▽ More
Rate-splitting multiple access (RSMA) has recently appeared as a powerful technique for improving the downlink performance of multiple-input multiple-output (MIMO) systems. By flexibly managing interference, RSMA can deliver high spectral and energy efficiency, as well as robustness to imperfect channel state information (CSI). In another development, an intelligent reflecting surface (IRS) has emerged as a method to control the wireless environment through software-configurable, near-passive, sub-wavelength reflecting elements. This article presents the potential of synergy between IRS and RSMA. Three important improvements achievable by IRS-RSMA schemes are identified, supported by insightful numerical examples, and mapped to beyond-5G use cases, along with future research directions.
△ Less
Submitted 24 May, 2022;
originally announced May 2022.
-
Blockchain for the Metaverse: A Review
Authors:
Thippa Reddy Gadekallu,
Thien Huynh-The,
Weizheng Wang,
Gokul Yenduri,
Pasika Ranaweera,
Quoc-Viet Pham,
Daniel Benevides da Costa,
Madhusanka Liyanage
Abstract:
Since Facebook officially changed its name to Metaverse in Oct. 2021, the metaverse has become a new norm of social networks and three-dimensional (3D) virtual worlds. The metaverse aims to bring 3D immersive and personalized experiences to users by leveraging many pertinent technologies. Despite great attention and benefits, a natural question in the metaverse is how to secure its users' digital…
▽ More
Since Facebook officially changed its name to Metaverse in Oct. 2021, the metaverse has become a new norm of social networks and three-dimensional (3D) virtual worlds. The metaverse aims to bring 3D immersive and personalized experiences to users by leveraging many pertinent technologies. Despite great attention and benefits, a natural question in the metaverse is how to secure its users' digital content and data. In this regard, blockchain is a promising solution owing to its distinct features of decentralization, immutability, and transparency. To better understand the role of blockchain in the metaverse, we aim to provide an extensive survey on the applications of blockchain for the metaverse. We first present a preliminary to blockchain and the metaverse and highlight the motivations behind the use of blockchain for the metaverse. Next, we extensively discuss blockchain-based methods for the metaverse from technical perspectives, such as data acquisition, data storage, data sharing, data interoperability, and data privacy preservation. For each perspective, we first discuss the technical challenges of the metaverse and then highlight how blockchain can help. Moreover, we investigate the impact of blockchain on key-enabling technologies in the metaverse, including Internet-of-Things, digital twins, multi-sensory and immersive applications, artificial intelligence, and big data. We also present some major projects to showcase the role of blockchain in metaverse applications and services. Finally, we present some promising directions to drive further research innovations and developments towards the use of blockchain in the metaverse in the future.
△ Less
Submitted 21 March, 2022; v1 submitted 18 March, 2022;
originally announced March 2022.
-
Computational Perspective of the Fog Node
Authors:
João Bachiega Jr,
Breno Costa,
Aleteia P. F. Araujo
Abstract:
Fog computing is a recent computational paradigm that was proposed to solve some weaknesses in cloud-based systems. For this reason, this technology has been extensively studied by several technology areas. It is still in a maturing stage, so there is no consensus in academia about its concepts and definitions, and each area adopts the ones that are convenient for each use case. This article propo…
▽ More
Fog computing is a recent computational paradigm that was proposed to solve some weaknesses in cloud-based systems. For this reason, this technology has been extensively studied by several technology areas. It is still in a maturing stage, so there is no consensus in academia about its concepts and definitions, and each area adopts the ones that are convenient for each use case. This article proposes a definition and a classification relying on a computational perspective for the fog node, which is a fundamental element in a fog computing environment. In addition, the main challenges related to the fog node are also presented.
△ Less
Submitted 14 March, 2022;
originally announced March 2022.
-
An Efficient Deep CNN Design for EH Short-Packet Communications in Multihop Cognitive IoT Networks
Authors:
Toan-Van Nguyen,
Thien Huynh-The,
Van-Dinh Nguyen,
Daniel Benevides da Costa,
Rose Qingyang Hu,
Beongku An
Abstract:
In this paper, we design an efficient deep convolutional neural network (CNN) to improve and predict the performance of energy harvesting (EH) short-packet communications in multi-hop cognitive Internet-of-Things (IoT) networks. Specifically, we propose a Sum-EH scheme that allows IoT nodes to harvest energy from either a power beacon or primary transmitters to improve not only packet transmission…
▽ More
In this paper, we design an efficient deep convolutional neural network (CNN) to improve and predict the performance of energy harvesting (EH) short-packet communications in multi-hop cognitive Internet-of-Things (IoT) networks. Specifically, we propose a Sum-EH scheme that allows IoT nodes to harvest energy from either a power beacon or primary transmitters to improve not only packet transmissions but also energy harvesting capabilities. We then build a novel deep CNN framework with feature enhancement-collection blocks based on the proposed Sum-EH scheme to simultaneously estimate the block error rate (BLER) and throughput with high accuracy and low execution time. Simulation results show that the proposed CNN framework achieves almost exactly the BLER and throughput of Sum-EH one, while it considerably reduces computational complexity, suggesting a real-time setting for IoT systems under complex scenarios. Moreover, the designed CNN model achieves the root-mean-square-error (RMSE) of ${1.33\times10^{-2}}$ on the considered dataset, which exhibits the lowest RMSE compared to the deep neural network and state-of-the-art machine learning approaches.
△ Less
Submitted 25 January, 2022;
originally announced January 2022.
-
The Interplay of Reconfigurable Intelligent Surfaces and Mobile Edge Computing in Future Wireless Networks: A Win-Win Strategy to 6G
Authors:
Mithun Mukherjee,
Vikas Kumar,
Mian Guo,
Daniel Benevides da Costa,
Ertugrul Basar,
Zhiguo Ding
Abstract:
Reconfigurable intelligent surface (RIS)-empowered communication is being considered as an enabling technology for sixth generation (6G) wireless networks. The key idea of RIS-assisted communication is to enhance the capacity, coverage, energy efficiency, physical layer security, and many other aspects of modern wireless networks. At the same time, mobile edge computing (MEC) has already shown its…
▽ More
Reconfigurable intelligent surface (RIS)-empowered communication is being considered as an enabling technology for sixth generation (6G) wireless networks. The key idea of RIS-assisted communication is to enhance the capacity, coverage, energy efficiency, physical layer security, and many other aspects of modern wireless networks. At the same time, mobile edge computing (MEC) has already shown its huge potential by extending the computation, communication, and caching capabilities of a standalone cloud server to the network edge. In this article, we first provide an overview of how MEC and RIS can benefit each other. We envision that the integration of MEC and RIS will bring an unprecedented transformation to the future evolution of wireless networks. We provide a system-level perspective on the MEC-aided RIS (and RIS-assisted MEC) that will evolve wireless network towards 6G. We also outline some of the fundamental challenges that pertain to the implementation of MEC-aided RIS (and RIS-assisted MEC) networks. Finally, the key research trends in the RIS-assisted MEC are discussed.
△ Less
Submitted 12 May, 2021;
originally announced June 2021.
-
Aerial Reconfigurable Intelligent Surface-Aided Wireless Communication Systems
Authors:
Tri Nhu Do,
Georges Kaddoum,
Thanh Luan Nguyen,
Daniel Benevides da Costa,
Zygmunt J. Haas
Abstract:
In this paper, we propose and investigate an aerial reconfigurable intelligent surface (aerial-RIS)-aided wireless communication system. Specifically, considering practical composite fading channels, we characterize the air-to-ground (A2G) links by Namkagami-m small-scale fading and inverse-Gamma large-scale shadowing. To investigate the delay-limited performance of the proposed system, we derive…
▽ More
In this paper, we propose and investigate an aerial reconfigurable intelligent surface (aerial-RIS)-aided wireless communication system. Specifically, considering practical composite fading channels, we characterize the air-to-ground (A2G) links by Namkagami-m small-scale fading and inverse-Gamma large-scale shadowing. To investigate the delay-limited performance of the proposed system, we derive a tight approximate closed-form expression for the end-to-end outage probability (OP). Next, considering a mobile environment, where performance analysis is intractable, we rely on machine learning-based performance prediction to evaluate the performance of the mobile aerial-RIS-aided system. Specifically, taking into account the three-dimensional (3D) spatial movement of the aerial-RIS, we build a deep neural network (DNN) to accurately predict the OP. We show that: (i) fading and shadowing conditions have strong impact on the OP, (ii) as the number of reflecting elements increases, aerial-RIS achieves higher energy efficiency (EE), and (iii) the aerial-RIS-aided system outperforms conventional relaying systems.
△ Less
Submitted 9 June, 2021;
originally announced June 2021.
-
On the Secrecy Rate of Downlink NOMA in Underlay Spectrum Sharing with Imperfect CSI
Authors:
Vaibhav Kumar,
Mark F. Flanagan,
Daniel Benevides da Costa,
Le-Nam Tran
Abstract:
In this paper, we present the ergodic sum secrecy rate (ESSR) analysis of an underlay spectrum sharing non-orthogonal multiple access (NOMA) system. We consider the scenario where the power transmitted by the secondary transmitter (ST) is constrained by the peak tolerable interference at multiple primary receivers (PRs) as well as the maximum transmit power of the ST. The effect of channel estimat…
▽ More
In this paper, we present the ergodic sum secrecy rate (ESSR) analysis of an underlay spectrum sharing non-orthogonal multiple access (NOMA) system. We consider the scenario where the power transmitted by the secondary transmitter (ST) is constrained by the peak tolerable interference at multiple primary receivers (PRs) as well as the maximum transmit power of the ST. The effect of channel estimation error is also taken into account in our analysis. We derive exact and asymptotic closed-form expressions for the ESSR of the downlink NOMA system, and show that the performance can be classified into two distinct regimes, i.e., it is dictated either by the interference constraint or by the power constraint. Our results confirm the superiority of the NOMA-based system over its orthogonal multiple access (OMA) based counterpart. More interestingly, our results show that NOMA helps in maintaining the secrecy rate of the strong user while significantly enhancing the secrecy performance of the weak user as compared to OMA. The correctness of the proposed investigation is corroborated through Monte Carlo simulation.
△ Less
Submitted 16 May, 2021;
originally announced May 2021.
-
Explaining Outcomes of Multi-Party Dialogues using Causal Learning
Authors:
Priyanka Sinha,
Pabitra Mitra,
Antonio Anastasio Bruto da Costa,
Nikolaos Kekatos
Abstract:
Multi-party dialogues are common in enterprise social media on technical as well as non-technical topics. The outcome of a conversation may be positive or negative. It is important to analyze why a dialogue ends with a particular sentiment from the point of view of conflict analysis as well as future collaboration design. We propose an explainable time series mining algorithm for such analysis. A…
▽ More
Multi-party dialogues are common in enterprise social media on technical as well as non-technical topics. The outcome of a conversation may be positive or negative. It is important to analyze why a dialogue ends with a particular sentiment from the point of view of conflict analysis as well as future collaboration design. We propose an explainable time series mining algorithm for such analysis. A dialogue is represented as an attributed time series of occurrences of keywords, EMPATH categories, and inferred sentiments at various points in its progress. A special decision tree, with decision metrics that take into account temporal relationships between dialogue events, is used for predicting the cause of the outcome sentiment. Interpretable rules mined from the classifier are used to explain the prediction. Experimental results are presented for the enterprise social media posts in a large company.
△ Less
Submitted 3 May, 2021;
originally announced May 2021.
-
Detecting Personality and Emotion Traits in Crowds from Video Sequences
Authors:
Rodolfo Migon Favaretto,
Paulo Knob,
Soraia Raupp Musse,
Felipe Vilanova,
Ângelo Brandelli Costa
Abstract:
This paper presents a methodology to detect personality and basic emotion characteristics of crowds in video sequences. Firstly, individuals are detected and tracked, then groups are recognized and characterized. Such information is then mapped to OCEAN dimensions, used to find out personality and emotion in videos, based on OCC emotion models. Although it is a clear challenge to validate our resu…
▽ More
This paper presents a methodology to detect personality and basic emotion characteristics of crowds in video sequences. Firstly, individuals are detected and tracked, then groups are recognized and characterized. Such information is then mapped to OCEAN dimensions, used to find out personality and emotion in videos, based on OCC emotion models. Although it is a clear challenge to validate our results with real life experiments, we evaluate our method with the available literature information regarding OCEAN values of different Countries and also emergent Personal distance among people. Hence, such analysis refer to cultural differences of each country too. Our results indicate that this model generates coherent information when compared to data provided in available literature, as shown in qualitative and quantitative results.
△ Less
Submitted 26 April, 2021;
originally announced April 2021.
-
Multi-RIS-aided Wireless Systems: Statistical Characterization and Performance Analysis
Authors:
Tri Nhu Do,
Georges Kaddoum,
Thanh Luan Nguyen,
Daniel Benevides da Costa,
Zygmunt J. Haas
Abstract:
In this paper, we study the statistical characterization and modeling of distributed multi-reconfigurable intelligent surface (RIS)-aided wireless systems. Specifically, we consider a practical system model where the RISs with different geometric sizes are distributively deployed, and wireless channels associated to different RISs are assumed to be independent but not identically distributed (i.n.…
▽ More
In this paper, we study the statistical characterization and modeling of distributed multi-reconfigurable intelligent surface (RIS)-aided wireless systems. Specifically, we consider a practical system model where the RISs with different geometric sizes are distributively deployed, and wireless channels associated to different RISs are assumed to be independent but not identically distributed (i.n.i.d.). We propose two purpose-oriented multi-RIS-aided schemes, namely, the exhaustive RIS-aided (ERA) and opportunistic RIS-aided (ORA) schemes. A mathematical framework, which relies on the method of moments, is proposed to statistically characterize the end-to-end (e2e) channels of these schemes. It is shown that either a Gamma distribution or a Log-Normal distribution can be used to approximate the distribution of the magnitude of the e2e channel coefficients in both schemes. With these findings, we evaluate the performance of the two schemes in terms of outage probability (OP) and ergodic capacity (EC), where tight approximate closed-form expressions for the OP and EC are derived. Representative results show that the ERA scheme outperforms the ORA scheme in terms of OP and EC. In addition, under i.n.i.d. fading channels, the reflecting element settings and location settings of RISs have a significant impact on the system performance of both the ERA or ORA schemes.
△ Less
Submitted 29 September, 2021; v1 submitted 5 April, 2021;
originally announced April 2021.
-
Efficient data-driven encoding of scene motion using Eccentricity
Authors:
Bruno Costa,
Enrique Corona,
Mostafa Parchami,
Gint Puskorius,
Dimitar Filev
Abstract:
This paper presents a novel approach of representing dynamic visual scenes with static maps generated from video/image streams. Such representation allows easy visual assessment of motion in dynamic environments. These maps are 2D matrices calculated recursively, in a pixel-wise manner, that is based on the recently introduced concept of Eccentricity data analysis. Eccentricity works as a metric o…
▽ More
This paper presents a novel approach of representing dynamic visual scenes with static maps generated from video/image streams. Such representation allows easy visual assessment of motion in dynamic environments. These maps are 2D matrices calculated recursively, in a pixel-wise manner, that is based on the recently introduced concept of Eccentricity data analysis. Eccentricity works as a metric of a discrepancy between a particular pixel of an image and its normality model, calculated in terms of mean and variance of past readings of the same spatial region of the image. While Eccentricity maps carry temporal information about the scene, actual images do not need to be stored nor processed in batches. Rather, all the calculations are done recursively, based on a small amount of statistical information stored in memory, thus resulting in a very computationally efficient (processor- and memory-wise) method. The list of potential applications includes video-based activity recognition, intent recognition, object tracking, video description, and so on.
△ Less
Submitted 3 March, 2021;
originally announced March 2021.
-
Quantitative Corner Case Feature Analysis of Hybrid Automata with ForFET$^{SMT}$
Authors:
Antonio Anastasio Bruto da Costa,
Pallab Dasgupta,
Nikolaos Kekatos
Abstract:
The analysis and verification of hybrid automata (HA) models against rich formal properties can be a challenging task. Existing methods and tools can mainly reason whether a given property is satisfied or violated. However, such qualitative answers might not provide sufficient information about the model behaviors. This paper presents the ForFET$^{SMT}$ tool which can be used to reason quantitativ…
▽ More
The analysis and verification of hybrid automata (HA) models against rich formal properties can be a challenging task. Existing methods and tools can mainly reason whether a given property is satisfied or violated. However, such qualitative answers might not provide sufficient information about the model behaviors. This paper presents the ForFET$^{SMT}$ tool which can be used to reason quantitatively about such properties. It employs feature automata and can evaluate quantitative property corners of HA. ForFET$^{SMT}$ uses two third-party formal verification tools as its backbone: the SpaceEx reachability tool and the SMT solver dReach/dReal. Herein, we describe the design and implementation of ForFET$^{SMT}$ and present its functionalities and modules. To improve the usability of the tool for non-expert users, we also provide a list of quantitative property templates.
△ Less
Submitted 30 December, 2020;
originally announced January 2021.
-
Free-Space Optical Communication With Reconfigurable Intelligent Surfaces
Authors:
Liang Yang,
Wang Guo,
Daniel Benevides da Costa,
Mohamed-Slim Alouini
Abstract:
Despite the promising gains, free-space optical (FSO) communication is severely influenced by atmospheric turbulence and pointing error issues, which make its practical design a bit challenging. In this paper, with the aim to increase the communication coverage and improve the system performance, reconfigurable intelligent surfaces (RISs) are considered in an FSO communication setup, in which both…
▽ More
Despite the promising gains, free-space optical (FSO) communication is severely influenced by atmospheric turbulence and pointing error issues, which make its practical design a bit challenging. In this paper, with the aim to increase the communication coverage and improve the system performance, reconfigurable intelligent surfaces (RISs) are considered in an FSO communication setup, in which both atmospheric turbulence and pointing errors are considered. Closed-form expressions for the outage probability, average bit error rate, and channel capacity are derived assuming large number of reflecting elements at the RIS. Specifically, according to central limit theorem (CLT), while assuming multiple reflecting elements approximate expressions are proposed. It is shown that the respective accuracies increase as the number of elements at the RIS increases. Illustrative numerical examples are shown along with insightful discussions. Finally, Monte Carlo simulations are presented to verify the correctness of the analytical results.
△ Less
Submitted 17 November, 2020;
originally announced December 2020.
-
Performance Analysis of UAV-based Mixed RF-UWOC Transmission Systems
Authors:
Sai Li,
Liang Yang,
Daniel Benevides da Costa
Abstract:
In this paper, we investigate the performance of a mixed radio-frequency-underwater wireless optical communication (RF-UWOC) system where an unmanned aerial vehicle (UAV), as a low-altitude mobile aerial base station, transmits information to an autonomous underwater vehicle (AUV) through a fixed-gain amplify-and-forward (AF) or decode-and-forward (DF) relay. Our analysis accounts for the main fac…
▽ More
In this paper, we investigate the performance of a mixed radio-frequency-underwater wireless optical communication (RF-UWOC) system where an unmanned aerial vehicle (UAV), as a low-altitude mobile aerial base station, transmits information to an autonomous underwater vehicle (AUV) through a fixed-gain amplify-and-forward (AF) or decode-and-forward (DF) relay. Our analysis accounts for the main factors that affect the system performance, such as the UAV height, air bubbles, temperature gradient, water salinity variations, and detection techniques. Employing fixed-gain AF relaying and DF relaying, we derive closed-form expressions for some key performance metrics, e.g., outage probability (OP), average bit error rate (ABER), and average channel capacity (ACC). In addition, in order to get further insights, asymptotic analyses for the OP and ABER are also carried out. Furthermore, assuming DF relaying, we derive analytical expressions for the optimal UAV altitude that minimizes the OP. Simulation results show that the UAV altitude influences the system performance and there is an optimal altitude which ensures a minimum OP. Moreover, based on the asymptotic results, it is demonstrated that the diversity order of fixed-gain AF relaying and DF relaying are respectively determined by the RF link and by the detection techniques of the UWOC link.
△ Less
Submitted 17 November, 2020;
originally announced November 2020.
-
On the Performance of RIS-Assisted Dual-Hop Mixed RF-UWOC Systems
Authors:
Sai Li,
Liang Yang,
Daniel Benevides da Costa,
Marco Di Renzo,
Mohamed-Slim Alouini
Abstract:
In this paper, we investigate the performance of a reconfigurable intelligent surface (RIS)-assisted dual-hop mixed radio-frequency underwater wireless optical communication (RF-UWOC) system. An RIS is an emerging and low-cost technology that aims to enhance the strength of the received signal, thus improving the system performance. In the considered system setup, a ground source does not have a r…
▽ More
In this paper, we investigate the performance of a reconfigurable intelligent surface (RIS)-assisted dual-hop mixed radio-frequency underwater wireless optical communication (RF-UWOC) system. An RIS is an emerging and low-cost technology that aims to enhance the strength of the received signal, thus improving the system performance. In the considered system setup, a ground source does not have a reliable direct link to a given marine buoy and communicates with it through an RIS installed on a building. In particular, the buoy acts as a relay that sends the signal to an underwater destination. In this context, analytical expressions for the outage probability (OP), average bit error rate (ABER), and average channel capacity (ACC) are derived assuming fixed-gain amplify-and-forward (AF) and decode-and-forward (DF) relaying protocols at the marine buoy. Moreover, asymptotic analyses of the OP and ABER are carried out in order to gain further insights from the analytical frameworks. In particular, the system diversity order is derived and it is shown to depend on the RF link parameters and on the detection schemes of the UWOC link. Finally, it is demonstrated that RIS-assisted systems can effectively improve the performance of mixed dual-hop RF-UWOC systems.
△ Less
Submitted 17 November, 2020;
originally announced November 2020.
-
Performance Analysis of Dual-Hop Mixed PLC/RF Communication Systems
Authors:
Liang Yang,
Xiaoqin Yan,
Sai Li,
Daniel Benevides da Costa,
Mohamed-Slim Alouini
Abstract:
In this paper, we study a dual-hop mixed power line communication and radio-frequency communication (PLC/RF) system, where the connection between the PLC link and the RF link is made by a decode-and-forward (DF) or amplify-and-forward (AF) relay. Assume that the PLC channel is affected by both additive background noise and impulsive noise suffers from Log-normal fading, while the RF link undergoes…
▽ More
In this paper, we study a dual-hop mixed power line communication and radio-frequency communication (PLC/RF) system, where the connection between the PLC link and the RF link is made by a decode-and-forward (DF) or amplify-and-forward (AF) relay. Assume that the PLC channel is affected by both additive background noise and impulsive noise suffers from Log-normal fading, while the RF link undergoes Rician fading. Based on this model, analytical expressions of the outage probability (OP), average bit error rate (BER), and the average channel capacity (ACC) are derived. Furthermore, an asymptotic analysis for the OP and average BER, as well as an upper bound expression for the ACC are presented. At last, numerical results are developed to validate our analytical results, and in-depth discussions are conducted.
△ Less
Submitted 17 November, 2020;
originally announced November 2020.
-
Recurrence in Dense-time AMS Assertions
Authors:
Sayandeep Sanyal,
Antonio Anastasio Bruto da Costa,
Pallab Dasgupta
Abstract:
The notion of recurrence over continuous or dense time, as required for expressing Analog and Mixed-Signal (AMS) behaviours, is fundamentally different from what is offered by the recurrence operators of SystemVerilog Assertions (SVA). This article introduces the formal semantics of recurrence over dense time and provides a methodology for the runtime verification of such properties using interval…
▽ More
The notion of recurrence over continuous or dense time, as required for expressing Analog and Mixed-Signal (AMS) behaviours, is fundamentally different from what is offered by the recurrence operators of SystemVerilog Assertions (SVA). This article introduces the formal semantics of recurrence over dense time and provides a methodology for the runtime verification of such properties using interval arithmetic. Our property language extends SVA with dense real-time intervals and predicates containing real-valued signals. We provide a tool kit which interfaces with off-the-shelf EDA tools through standard VPI.
△ Less
Submitted 17 November, 2020;
originally announced November 2020.
-
Performance Analysis of an Interference-Limited RIS-Aided Network
Authors:
Liang Yang,
Yin Yang,
Daniel Benevides da Costa,
Imene Trigui
Abstract:
In this work, the performance of reconfigurable intelligent surface (RIS)-aided communication systems corrupted by the co-channel interference (CCI) at the destination is investigated. Assuming Rayleigh fading and equal-power CCI, we present the analysis for the outage probability (OP), average bit error rate (BER), and ergodic capacity. In addition, an asymptotic outage analysis is carried in ord…
▽ More
In this work, the performance of reconfigurable intelligent surface (RIS)-aided communication systems corrupted by the co-channel interference (CCI) at the destination is investigated. Assuming Rayleigh fading and equal-power CCI, we present the analysis for the outage probability (OP), average bit error rate (BER), and ergodic capacity. In addition, an asymptotic outage analysis is carried in order to obtain further insights. Our analysis shows that the number of reflecting elements as well as the number of interferers have a great impact on the overall system performance.
△ Less
Submitted 15 November, 2020;
originally announced November 2020.
-
Investigating Cultural Aspects in the Fundamental Diagram using Convolutional Neural Networks and Simulation
Authors:
Rodolfo M. Favaretto,
Roberto R. Santos,
Marcio Ballotin,
Paulo Knob,
Soraia R. Musse,
Felipe Vilanova,
Angelo B. Costa
Abstract:
This paper presents a study regarding group behavior in a controlled experiment focused on differences in an important attribute that vary across cultures -- the personal spaces -- in two Countries: Brazil and Germany. In order to coherently compare Germany and Brazil evolutions with same population applying same task, we performed the pedestrian Fundamental Diagram experiment in Brazil, as perfor…
▽ More
This paper presents a study regarding group behavior in a controlled experiment focused on differences in an important attribute that vary across cultures -- the personal spaces -- in two Countries: Brazil and Germany. In order to coherently compare Germany and Brazil evolutions with same population applying same task, we performed the pedestrian Fundamental Diagram experiment in Brazil, as performed in Germany. We use CNNs to detect and track people in video sequences. With this data, we use Voronoi Diagrams to find out the neighbor relation among people and then compute the walking distances to find out the personal spaces. Based on personal spaces analyses, we found out that people behavior is more similar, in terms of their behaviours, in high dense populations and vary more in low and medium densities. So, we focused our study on cultural differences between the two Countries in low and medium densities. Results indicate that personal space analyses can be a relevant feature in order to understand cultural aspects in video sequences. In addition to the cultural differences, we also investigate the personality model in crowds, using OCEAN. We also proposed a way to simulate the FD experiment from other countries using the OCEAN psychological traits model as input. The simulated countries were consistent with the literature.
△ Less
Submitted 30 September, 2020;
originally announced October 2020.
-
Channel Estimation via Direct Calculation and Deep Learning for RIS-Aided mmWave Systems
Authors:
Fangqing Jiang,
Liang Yang,
Daniel Benevides da Costa,
Qingqing Wu
Abstract:
This paper proposes a novel reconfigurable intelligent surface (RIS) architecture which enables channel estimation of RIS-assisted millimeter wave (mmWave) systems. More specifically, two channel estimation methods, namely, direct calculation (DC) and deep learning (DL) methods, are proposed to skillfully convert the overall channel estimation into two tasks: the channel estimation and the angle p…
▽ More
This paper proposes a novel reconfigurable intelligent surface (RIS) architecture which enables channel estimation of RIS-assisted millimeter wave (mmWave) systems. More specifically, two channel estimation methods, namely, direct calculation (DC) and deep learning (DL) methods, are proposed to skillfully convert the overall channel estimation into two tasks: the channel estimation and the angle parameter estimation of a small number of active elements. In particular, the direct calculation method calculates the angle parameters directly through the channel estimates of adjacent active elements and, based on it, the DL method reduces the angle offset rate and further improves the accuracy of angle parameter estimation. Compared with the traditional methods, the proposed schemes reduce the complexity of the RIS channel estimation while outperforming the beam training method in terms of minimum square error, achievable rate, and outage probability.
△ Less
Submitted 19 August, 2020; v1 submitted 2 August, 2020;
originally announced August 2020.
-
Outage Probability and Capacity Scaling Law of Multiple RIS-Aided Cooperative Networks
Authors:
Liang Yang,
Yin Yang,
Daniel Benevides da Costa,
Imene Trigui
Abstract:
In this letter, we consider a dual-hop cooperative network assisted by multiple reconfigurable intelligent surfaces (RISs). Assuming that the RIS with the highest instantaneous end-to-end signal-to-noise ratio (SNR) is selected to aid the communication, the outage probability (OP) and average sum-rate are investigated. Specifically, an exact analysis for the OP is developed. In addition, relying o…
▽ More
In this letter, we consider a dual-hop cooperative network assisted by multiple reconfigurable intelligent surfaces (RISs). Assuming that the RIS with the highest instantaneous end-to-end signal-to-noise ratio (SNR) is selected to aid the communication, the outage probability (OP) and average sum-rate are investigated. Specifically, an exact analysis for the OP is developed. In addition, relying on the extreme value theory, closed-form expressions for the asymptotic OP and asymptotic sum-rate are derived, based on which the capacity scaling law is established. Our results are corroborated through simulations and insightful discussions are provided. In particular, our analysis shows that the number of RISs as well as the number of reflecting elements play a crucial role in the capacity scaling law of multiple RIS-aided cooperative networks. Also, comparisons with relay-aided systems are carried out to demonstrate that the proposed system setup outperforms relaying schemes both in terms of the OP and average sum-rate.
△ Less
Submitted 26 July, 2020;
originally announced July 2020.
-
Accurate Closed-Form Approximations to Channel Distributions of RIS-Aided Wireless Systems
Authors:
Liang Yang,
Fanxu Meng,
Qingqing Wu,
Daniel Benevides da Costa,
Mohamed-Slim Alouini
Abstract:
This paper proposes highly accurate closed-form approximations to channel distributions of two different reconfigurable intelligent surface (RIS)-based wireless system setups, namely, dual-hop RIS-aided (RIS-DH) scheme and RIS-aided transmit (RIS-T) scheme. Differently from previous works, the proposed approximations reveal to be very tight for arbitrary number $N$ of reflecting metasurface's elem…
▽ More
This paper proposes highly accurate closed-form approximations to channel distributions of two different reconfigurable intelligent surface (RIS)-based wireless system setups, namely, dual-hop RIS-aided (RIS-DH) scheme and RIS-aided transmit (RIS-T) scheme. Differently from previous works, the proposed approximations reveal to be very tight for arbitrary number $N$ of reflecting metasurface's elements. Our findings are then applied to the performance analysis of the considered systems, in which the outage probability, bit error rate, and average channel capacity are derived. Results show that the achievable diversity orders $G_d$ for RIS-DH and RIS-T schemes are $N-1<G_d<N$ and $N$, respectively. Furthermore, it is revealed that both schemes can not provide the multiplexing gain and only diversity gains are achieved. For the RIS-DH scheme, the channels are similar to the keyhole multiple-input multiple-output (MIMO) channels with only one degree of freedom, while the RIS-T scheme is like the transmit diversity structure.
△ Less
Submitted 10 July, 2020;
originally announced July 2020.
-
Towards the Adoption of OMG Standards in the Development of SOA-Based IoT Systems
Authors:
Bruno Costa,
Paulo F. Pires,
Flavia C. Delicato
Abstract:
A common feature of the Internet of Things (IoT) is the high heterogeneity, regarding network protocols, data formats, hardware and software platforms. Aiming to deal with such a degree of heterogeneity, several frameworks have applied the Model-Driven Development (MDD) to build IoT applications. On the software architecture viewpoint, the literature has shown that the Service-Oriented Architectur…
▽ More
A common feature of the Internet of Things (IoT) is the high heterogeneity, regarding network protocols, data formats, hardware and software platforms. Aiming to deal with such a degree of heterogeneity, several frameworks have applied the Model-Driven Development (MDD) to build IoT applications. On the software architecture viewpoint, the literature has shown that the Service-Oriented Architecture (SOA) is a promising style to address the interoperability of entities composing these solutions. Some features of IoT make it challenging to analyze the impact of design decisions on the SOA-based IoT applications behavior. Thus, it is a key requirement to simulate the model to verify whether the system performs as expected before its implementation. Although the literature has identified that the SOA style is suitable for addressing the interoperability, existing modelling languages do not consider SOA elements as first-class citizens when designing IoT applications. Furthermore, although existing MDD frameworks provide modeling languages comprising well-defined syntax, they lack execution semantics, thus, are not suitable for model execution and analysis. This work aims at addressing these issues by introducing IoTDraw. The framework provides a fully OMG-compliant executable modeling language for SOA-based IoT systems; thus, its specifications can be implemented by any tool implementing OMG standards.
△ Less
Submitted 3 July, 2020;
originally announced July 2020.
-
Backscatter Cooperation in NOMA Communications Systems
Authors:
Weiyu Chen,
Haiyang Ding,
Shilian Wang,
Daniel Benevides da Costa,
Fengkui Gong,
Pedro Henrique Juliano Nardelli
Abstract:
In this paper, a backscatter cooperation (BC) scheme is proposed for non-orthogonal multiple access (NOMA) downlink transmission. The key idea is to enable one user to split and then backscatter part of its received signals to improve the reception at another user. To evaluate the performance of the proposed BC-NOMA scheme, three benchmark schemes are introduced. They are the non-cooperation (NC)-…
▽ More
In this paper, a backscatter cooperation (BC) scheme is proposed for non-orthogonal multiple access (NOMA) downlink transmission. The key idea is to enable one user to split and then backscatter part of its received signals to improve the reception at another user. To evaluate the performance of the proposed BC-NOMA scheme, three benchmark schemes are introduced. They are the non-cooperation (NC)-NOMA scheme, the conventional relaying (CR)-NOMA scheme, and the incremental relaying (IR)-NOMA scheme. For all these schemes, the analytical expressions of the minimum total power to avoid information outage are derived, based on which their respective outage performance, expected rates, and diversity-multiplexing trade-off (DMT) are investigated. Analytical results show that the proposed BC-NOMA scheme strictly outperforms the NC-NOMA scheme in terms of all the three metrics. Furthermore, theoretical analyses are validated via Monte-Carlo simulations. It is shown that unlike the CR-NOMA scheme and the IR-NOMA scheme, the proposed BC-NOMA scheme can enhance the transmission reliability without impairing the transmission rate, which makes backscattering an appealing solution to cooperative NOMA downlinks.
△ Less
Submitted 24 June, 2020;
originally announced June 2020.
-
Safeguarding MIMO Communications with Reconfigurable Metasurfaces and Artificial Noise
Authors:
George C. Alexandropoulos,
Konstantinos Katsanos,
Miaowen Wen,
Daniel B. da Costa
Abstract:
Wireless communications empowered by Reconfigurable Intelligent (meta)Surfaces (RISs) are recently gaining remarkable research attention due to the increased system design flexibility offered by RISs for diverse functionalities. In this paper, we consider a Multiple Input Multiple Output (MIMO) physical layer security system with multiple data streams including one legitimate and one eavesdrop**…
▽ More
Wireless communications empowered by Reconfigurable Intelligent (meta)Surfaces (RISs) are recently gaining remarkable research attention due to the increased system design flexibility offered by RISs for diverse functionalities. In this paper, we consider a Multiple Input Multiple Output (MIMO) physical layer security system with multiple data streams including one legitimate and one eavesdrop** passive RISs, with the former being transparent to the eavesdropper and the latter's presence being unknown at the legitimate link. We first focus on the eavesdrop** subsystem and present a joint design framework for the eavesdropper's combining vector and the reflection coefficients of the eavesdrop** RIS. Then, focusing on the secrecy rate maximization, we propose a physical layer security scheme that jointly designs the legitimate precoding vector and the Artificial Noise (AN) covariance matrix, as well as the legitimate combining vector and the reflection coefficients of the legitimate RIS. Our simulation results reveal that, in the absence of a legitimate RIS, transceiver spatial filtering and AN are incapable of offering nonzero secrecy rates, even for eavesdrop** RISs with small numbers of elements. However, when a L-element legitimate RIS is deployed, confidential communication can be safeguarded against cases with even more than a 5L-element eavesdrop** RIS.
△ Less
Submitted 2 November, 2020; v1 submitted 20 May, 2020;
originally announced May 2020.
-
Analysis of Asymmetric Dual-Hop Energy Harvesting-Based Wireless Communication Systems in Mixed Fading Environments
Authors:
Elmehdi Illi,
Faissal El Bouanani,
Paschalis C. Sofotasios,
Sami Muhaidat,
Daniel Benevides da Costa,
Fouad Ayoub,
Ala Al-Fuqaha
Abstract:
In this paper, the performance of a dual-hop energy harvesting-based fixed-gain amplify-and-forward (AF) relaying communication system, subject to fading impairments, is investigated. We consider a source node ($S$) communicating with a destination node ($D$) through a fixed distant relay ($R$), which harvests energy from its received signals and uses it to amplify and forward the received signals…
▽ More
In this paper, the performance of a dual-hop energy harvesting-based fixed-gain amplify-and-forward (AF) relaying communication system, subject to fading impairments, is investigated. We consider a source node ($S$) communicating with a destination node ($D$) through a fixed distant relay ($R$), which harvests energy from its received signals and uses it to amplify and forward the received signals to $D$. Power-splitting (PS) and time-switching (TS) schemes are considered in the analysis for energy harvesting. The $S$-$R$ and $R$-$D$ hops are modeled by the Nakagami-$m$ and $α$-$μ$ fading models, respectively. Closed-form expressions for the statistical properties of the end-to-end signal-to-noise ratio (SNR) are derived, based on which novel closed-form expressions for the average symbol error rate (ASER) as well as average channel capacity (ACC) considering four adaptive transmission policies are derived. The derived expressions are validated through Monte-Carlo simulations.
△ Less
Submitted 5 April, 2020;
originally announced April 2020.
-
Analysis and Optimization of Tail-Biting Spatially Coupled Protograph LDPC Codes for BICM-ID Systems
Authors:
Zhaojie Yang,
Yi Fang,
Guohua Zhang,
Francis C. M. Lau,
Shahid Mumtaz,
Daniel B. da Costa
Abstract:
As a typical example of bandwidth-efficient techniques, bit-interleaved coded modulation with iterative decoding (BICM-ID) provides desirable spectral efficiencies in various wireless communication scenarios. In this paper, we carry out a comprehensive investigation on tail-biting (TB) spatially coupled protograph (SCP) low-density parity-check (LDPC) codes in BICM-ID systems. Specifically, we fir…
▽ More
As a typical example of bandwidth-efficient techniques, bit-interleaved coded modulation with iterative decoding (BICM-ID) provides desirable spectral efficiencies in various wireless communication scenarios. In this paper, we carry out a comprehensive investigation on tail-biting (TB) spatially coupled protograph (SCP) low-density parity-check (LDPC) codes in BICM-ID systems. Specifically, we first develop a two-step design method to formulate a novel type of constellation mappers, referred to as labeling-bit-partial-match (LBPM) constellation mappers, for SC-P-based BICM-ID systems. The LBPM constellation mappers can be seamlessly combined with high-order modulations, such as M-ary phase-shift keying (PSK) and M-ary quadrature amplitude modulation (QAM). Furthermore, we conceive a new bit-level interleaving scheme, referred to as variable node matched map** (VNMM) scheme, which can substantially exploit the structure feature of SC-P codes and the unequal protection-degree property of labeling bits to trigger the wave-like convergence for TB-SC-P codes. In addition, we propose a hierarchical extrinsic information transfer (EXIT) algorithm to predict the convergence performance (i.e., decoding thresholds) of the proposed SC-P-based BICM-ID systems. Theoretical analyses and simulation results illustrate that the LBPM-mapped SC-P-based BICM-ID systems are remarkably superior to the state-of-the-art mapped counterparts. Moreover, the proposed SC-P-based BICM-ID systems can achieve even better error performance with the aid of the VNMM scheme. As a consequence, the proposed LBPM constellation mappers and VNMM scheme make the SC-P-based BICM-ID systems a favorable choice for the future-generation wireless communication systems.
△ Less
Submitted 6 November, 2019;
originally announced November 2019.
-
Impartial SWIPT-Assisted User Cooperation Schemes
Authors:
Weiyu Chen,
Haiyang Ding,
Shilian Wang,
Daniel Benevides da Costa,
Fengkui Gong
Abstract:
In this paper, we propose an impartial simultaneous wireless information and power transfer (SWIPT)-assisted cooperation mechanism for a non-orthogonal multiple access (NOMA) downlink scenario. Specifically, both a cell-center user and a cell-edge user apply the power-splitting technique and utilize the harvested energy to forward the other user's information on the premise of successful decoding…
▽ More
In this paper, we propose an impartial simultaneous wireless information and power transfer (SWIPT)-assisted cooperation mechanism for a non-orthogonal multiple access (NOMA) downlink scenario. Specifically, both a cell-center user and a cell-edge user apply the power-splitting technique and utilize the harvested energy to forward the other user's information on the premise of successful decoding of their own information. Both analytical and numerical results show that the proposed impartial user cooperation mechanism (IUCM) outperforms the traditional partial cooperation mechanism in terms of outage probability, diversity order and diversity-multiplexing trade-off (DMT). For comparison, we further incorporate the IUCM into an orthogonal frequency-division multiple access (OFDMA) framework, which is shown to preserve the same diversity order, while has a worse but more flexible DMT performance in comparison with the IUCM in the NOMA framework. Although the IUCM in OFDMA has a worse outage performance, it is proved that it has the same optimal system outage probability with the IUCM in NOMA when the relaying channel between the two users is error-free.
△ Less
Submitted 1 October, 2019;
originally announced October 2019.
-
vSDNEmul: A Software-Defined Network Emulator Based on Container Virtualization
Authors:
Fernando N. N. Farias,
Antônio de O. Junior,
Leonardo B. da Costa,
Billy A. Pinheiro,
Antônio J. G. Abelém
Abstract:
The main issue related to Software-Defined Network emulators is how to replicate real behavior in experiments. Mininet and others SDN emulators have an architecture that limits both the scope of experiments and the fidelity of networking tests. Consequently, the serialization, contention, and load of background processes may produce delays that compromise the operation of events such as transmitti…
▽ More
The main issue related to Software-Defined Network emulators is how to replicate real behavior in experiments. Mininet and others SDN emulators have an architecture that limits both the scope of experiments and the fidelity of networking tests. Consequently, the serialization, contention, and load of background processes may produce delays that compromise the operation of events such as transmitting a packet or completing a computation, possibly invalidating the performance evaluation of a network emulation. To address these problems, this paper presents vSDNEmul, a network emulator based on Docker container virtualization. Different from Mininet, vSDNEmul isolates each node in a container and interconnects the nodes through virtual or tunnel links. By using containers, vSDNEmul allows autonomous and flexible creation of independent network elements, resulting in more realistic emulations. This paper reports performance evaluations comparing vSDNEmul and Mininet. The results obtained with the vSDNEmul emulator are more realistic and present higher accuracy.
△ Less
Submitted 28 August, 2019;
originally announced August 2019.
-
A Software to Detect OCC Emotion, Big-Five Personality and Hofstede Cultural Dimensions of Pedestrians from Video Sequences
Authors:
Rodolfo Migon Favaretto,
Victor Araujo,
Soraia Raupp Musse,
Felipe Vilanova,
Angelo Brandelli Costa
Abstract:
This paper presents a video analysis application to detect personality, emotion and cultural aspects from pedestrians in video sequences, along with a visualizer of features. The proposed model considers a series of characteristics of the pedestrians and the crowd, such as number and size of groups, distances, speeds, among others, and performs the map** of these characteristics in personalities…
▽ More
This paper presents a video analysis application to detect personality, emotion and cultural aspects from pedestrians in video sequences, along with a visualizer of features. The proposed model considers a series of characteristics of the pedestrians and the crowd, such as number and size of groups, distances, speeds, among others, and performs the map** of these characteristics in personalities, emotions and cultural aspects, considering the Cultural Dimensions of Hofstede (HCD), the Big-Five Personality Model (OCEAN) and the OCC Emotional Model. The main hypothesis is that there is a relationship between so-called intrinsic human variables (such as emotion) and the way people behave in space and time. The software was tested in a set of videos from different countries and results seem promising in order to identify these three different levels of psychological traits in the filmed sequences. In addition, the data of the people present in the videos can be seen in a crowd viewer.
△ Less
Submitted 18 August, 2019;
originally announced August 2019.