Modulation depth and its associated loss pose a significant challenge in electro-optical telecommunication systems. Optimal modulators strive to enhance modulation depth while minimizing loss rates. We propose a high-...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Securi...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Security (PLS). Ensuring data confidentiality and integrity during wireless communications poses a primary challenge in IoT environments. Additionally, within the constrained frequency bands available, Cognitive Radio Networks (CRNs) has emerged as an urgent necessity to optimize spectrum utilization. This technology enables intelligent management of radio frequencies, enhancing network efficiency and adaptability to dynamic environmental changes. In this research, we focus on examining the PLS for the primary channel within the underlying CRNs. Our proposed model involves a primary source-destination pair and a secondary transmitter-receiver pair sharing the same frequency band simultaneously. In the presence of a common eavesdropper, the primary concern lies in securing the primary link communication. The secondary user (SU) acts as cooperative jamming, strategically allocating a portion of its transmission power to transmit artificial interference, thus confusing the eavesdropper and protecting the primary user's (PU) communication. The transmit power of the SU is regulated by the maximum interference power tolerated by the primary network's receiver. To evaluate the effectiveness of our proposed protocol, we develop closed-form mathematical expressions for intercept probability ((Formula presented.)) and outage probability (OP) along the primary communication link. Additionally, we derive mathematical expressions for OP along the secondary communications network. Furthermore, we investigate the impact of transmit power allocation on intercept and outage probabilities across various links. Through both simulation and theoretical analysis, our protocol aims to enhance protection and outage efficiency for the primary link while ensuring appropriate secondary
High penetration of renewable energy sources(RESs)induces sharply-fluctuating feeder power,leading to volt-age deviation in active distribution *** prevent voltage violations,multi-terminal soft open points(M-sOPs)hav...
详细信息
High penetration of renewable energy sources(RESs)induces sharply-fluctuating feeder power,leading to volt-age deviation in active distribution *** prevent voltage violations,multi-terminal soft open points(M-sOPs)have been integrated into the distribution systems to enhance voltage con-trol ***,the M-SOP voltage control recalculated in real time cannot adapt to the rapid fluctuations of photovol-taic(PV)power,fundamentally limiting the voltage controllabili-ty of *** address this issue,a full-model-free adaptive graph deep deterministic policy gradient(FAG-DDPG)model is proposed for M-SOP voltage ***,the attention-based adaptive graph convolutional network(AGCN)is lever-aged to extract the complex correlation features of nodal infor-mation to improve the policy learning ***,the AGCN-based surrogate model is trained to replace the power flow cal-culation to achieve model-free ***,the deep deterministic policy gradient(DDPG)algorithm allows FAG-DDPG model to learn an optimal control strategy of M-SOP by continuous interactions with the AGCN-based surrogate *** tests have been performed on modified IEEE 33-node,123-node,and a real 76-node distribution systems,which demonstrate the effectiveness and generalization ability of the proposed FAG-DDPGmodel.
In this paper,we present a Deep Neural Network(DNN)based framework that employs Radio Frequency(RF)hologram tensors to locate multiple Ultra-High Frequency(UHF)passive Radio-Frequency Identification(RFID)*** RF hologr...
详细信息
In this paper,we present a Deep Neural Network(DNN)based framework that employs Radio Frequency(RF)hologram tensors to locate multiple Ultra-High Frequency(UHF)passive Radio-Frequency Identification(RFID)*** RF hologram tensor exhibits a strong relationship between observation and spatial location,helping to improve the robustness to dynamic environments and *** RFID data is often marred by noise,we implement two types of deep neural network architectures to clean up the RF hologram *** the spatial relationship between tags,the deep networks effectively mitigate fake peaks in the hologram tensors resulting from multipath propagation and phase *** contrast to fingerprinting-based localization systems that use deep networks as classifiers,our deep networks in the proposed framework treat the localization task as a regression problem preserving the ambiguity between *** also present an intuitive peak finding algorithm to obtain estimated locations using the sanitized hologram *** proposed framework is implemented using commodity RFID devices,and its superior performance is validated through extensive experiments.
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanism...
详细信息
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and monitoring system using switches and controllers that will route the packets through the network, identify any false nodes, take preventive measures against them and preventing them for any future problems. Next, the system is powered by Blockchain cryptographic features by utilizing the TrustChain features to create a private, secure, and temper-free ledger of the transactions performed inside the network. Results are achieved in the legitimate devices connecting to the network, transferring their packets to their destination under supervision, reporting whenever a false node is causing hurdles, and recording the transactions for temper-proof records. Evaluation results based on 1000+ transactions illustrate that the proposed mechanism not only outshines most aspects of Cyber-Physical systems but also consumes less computation power with a low latency of 0.1 seconds only.
Under perfect competition,marginal pricing results in short-term efficiency and the subsequent right short-term price ***,the main reason for the adoption of marginal pricing is not the above,but investment cost *** i...
详细信息
Under perfect competition,marginal pricing results in short-term efficiency and the subsequent right short-term price ***,the main reason for the adoption of marginal pricing is not the above,but investment cost *** is,the fact that the profits obtained by infra-marginal technologies(technologies whose production cost is below the marginal price)allow them just to recover their investment *** the other hand,if the perfect competition assumption is removed,investment over-recovery or under-recovery generally occurs for infra-marginal technologies.
Side lobe level reduction(SLL)of antenna arrays significantly enhances the signal-to-interference ratio and improves the quality of service(QOS)in recent and future wireless communication systems starting from 5G up t...
详细信息
Side lobe level reduction(SLL)of antenna arrays significantly enhances the signal-to-interference ratio and improves the quality of service(QOS)in recent and future wireless communication systems starting from 5G up to ***,it improves the array gain and directivity,increasing the detection range and angular resolution of radar *** study proposes two highly efficient SLL reduction *** techniques are based on the hybridization between either the single convolution or the double convolution algorithms and the genetic algorithm(GA)to develop the Conv/GA andDConv/GA,*** convolution process determines the element’s excitations while the GA optimizes the element *** M elements linear antenna array(LAA),the convolution of the excitation coefficients vector by itself provides a new vector of excitations of length N=(2M−1).This new vector is divided into three different sets of excitations including the odd excitations,even excitations,and middle excitations of lengths M,M−1,andM,*** the same element spacing as the original LAA is used,it is noticed that the odd and even excitations provide a much lower SLL than that of the LAA but with amuch wider half-power beamwidth(HPBW).While the middle excitations give the same HPBWas the original LAA with a relatively higher *** the increased HPBWof the odd and even excitations,the element spacing is optimized using the ***,the synthesized arrays have the same HPBW as the original LAA with a two-fold reduction in the ***,for extreme SLL reduction,the DConv/GA is *** this technique,the same procedure of the aforementioned Conv/GA technique is performed on the resultant even and odd excitation *** provides a relatively wider HPBWthan the original LAA with about quad-fold reduction in the SLL.
The significant increase in civil aircraft traffic has led to frequent congestion and various negative outcomes within the terminal area. To mitigate these challenges, addressing and studying the aircraft landing prob...
详细信息
Artificial intelligence (AI) hardware accelerator is an emerging research for several applications and domains. The hardware accelerator's direction is to provide high computational speed with retaining low-cost a...
详细信息
Considering the expansion of the Internet of Things (IoT) and the volume of data and user requests, Mobile Edge Computing (MEC) is considered a novel and efficient solution that puts decentralized servers at the netw...
详细信息
暂无评论