In this paper, we investigate the joint channel allocation and power control problem in vehicular networks. Considering the different quality-of-service (QoS) requirements for vehicle-to-infrastructure (V2I) and vehic...
详细信息
ISBN:
(数字)9781665455442
ISBN:
(纸本)9781665455442
In this paper, we investigate the joint channel allocation and power control problem in vehicular networks. Considering the different quality-of-service (QoS) requirements for vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) links, we transform the optimization problem using reinforcement learning (RL) and then propose a distributed resource allocation scheme based on the deep Q network (DQN) and deep deterministic policy gradient (DDPG), which enables joint optimization of continuous power control and discrete channel allocation. Additionally, we consider the reward fluctuation caused by the strong dynamics of vehicular networks, and propose the advantage reward to alleviate this instability. Simulation results demonstrate that the proposed DQN-DDPG based resource allocation algorithm improves both the total capacity of V2I links and the payload delivery rate of V2V links, achieving higher QoS satisfaction compared to other baselines.
The concept of decentralization has involved in the varieties of the research area including computer science, management, politics. Bitcoin is the first cryptocurrency that indicates the power of decentralization fro...
详细信息
ISBN:
(纸本)9798350394283;9798350394276
The concept of decentralization has involved in the varieties of the research area including computer science, management, politics. Bitcoin is the first cryptocurrency that indicates the power of decentralization from blockchain, the emergence of blockchain has established a new solution to solve the problem in centralization. The technology avoids the centralized controller and creates a trusted network in which all participants have a right to verify the information that flows all over the network. Considering the network layer of system architecture, an important aspect of any decentralized distributedsystems including blockchain is the epidemic (gossip-based) protocols which maintain the network consistency properties namely, robustness, scalability, convergence speed, and accuracy, across the distributedsystems. Epidemic protocols are bio-inspired paradigm that provides randomized communication and computation for extreme-scale networked systems. However, one of the drawback of Epidemic protocol is that each node receives multiple duplicated data with high traffic in the data transmission of data can cause high bandwidth in the network. The ability to extract relevant data from an enormous amount of data which is distributed in the network is necessary. In previous research, local convergence detection is proposed to detect global convergence for a given approximation error of the aggregation estimation. This work adapts the concept of local convergence detection to epidemic aggregation protocols to the scenario of decentralized IoT network architecture and evaluates with the standard benchmark. The results show that the adapted protocols can adjust themselves to be capable of dynamic conditions regarding global convergence.
作者:
Bounceur, AhceneKfupm University
Information And Computer Science Department Interdisciplinary Research Center Intelligent Secure Systems Saudi Arabia
In a distributed environment where IoT devices collaborate on shared data, ensuring a secure turn-taking process during data updates remains crucial. Unlike in centralized systems, the concept of mutexes is no longer ...
详细信息
More and more objects are orbiting the Earth. Especially mega-constellations lead to a big number of artificial objects in space, both active and debris. This increasing amount of space debris is becoming more and mor...
详细信息
ISBN:
(数字)9781665441667
ISBN:
(纸本)9781665441667
More and more objects are orbiting the Earth. Especially mega-constellations lead to a big number of artificial objects in space, both active and debris. This increasing amount of space debris is becoming more and more dangerous for human spaceflight. An accurate catalogue of the debris particles orbiting the Earth enables satellites to avoid collisions. The space surveillance radar GESTRA, which was developed by Fraunhofer FHR, is a first step to create a German catalogue of objects in space. Additional transmitter and receiver units are built to create a distributed phased array radar network to increase the detection performance and accuracy of the GESTRA systems, allowing to detect even smaller debris particles with simultaniously decreased estimation uncertainity.
The rapid deployment of IoT networks in different industrial services has caused the emanation of a huge volume of data from sensors and monitors. The efficient analysis and compact representation of the big data gene...
详细信息
Training distributed reinforcement learning models over a network of users (or agents) has great potential for many applications in distributed devices such as face recognition, health tracking, recommender systems, a...
详细信息
Conflict-free Replicated Data Types (CRDTs) are a class of algorithms that allow decentralized editing of documents as data structures in which concurrent operations are commutative, while there has been extensive res...
详细信息
There has been a significant change in the management and operation of buildings as a result of the incorporation of distributed Intelligence into Building Management systems. This paper analyzes the revolutionary pot...
详细信息
5G networks are highly distributed, built on an open service-based architecture that requires multi-vendor hardware and software development environments, all of which create a high attack surface in the 5G networks t...
详细信息
ISBN:
(纸本)9798350319439
5G networks are highly distributed, built on an open service-based architecture that requires multi-vendor hardware and software development environments, all of which create a high attack surface in the 5G networks than other proprietary fixed-function networks. Besides that, cloud-native architectures also present new security challenges. Cloud-native separates monolithic virtual machines into microservice pods, resulting in higher volumes of signaling and communication flowing through and between microservices. In addition, secure connections in monolithic applications have been replaced by untrusted communication between microservice pods, requiring additional cybersecurity capabilities. Access control systems were created to provide reliability and limit access to an organization's assets. However, due to technology's constant evolution and dynamicity, these conventional security systems lack the security to protect an organization's information because they were created to address access control for known users. For 5G based cloud native technology, these access controls need to be taken further by implementing a Zero Trust model to secure one's essential assets for all users within the system. Zero Trust is implemented in an access control system under the concept "Never Trust, Always Verify". In this paper, we implement zero trust as a factor within access control systems by combining the principles of access control systems and zero-trust security by factoring in the user's historical behavior and recommendations into the mix.
In response to the National Grid's initiative for rapid isolation of permanent faults, this paper proposes a rapid and safe disposal technique for grounding faults by regulating the neutral point voltage. Targetin...
详细信息
暂无评论