Cellular networks are potential targets of jamming attacks to disrupt wireless communications. Since the fifth generation (5G) of cellular networks enables mission-critical applications, such as autonomous driving or ...
详细信息
Cellular networks are potential targets of jamming attacks to disrupt wireless communications. Since the fifth generation (5G) of cellular networks enables mission-critical applications, such as autonomous driving or ...
详细信息
ISBN:
(数字)9798350304053
ISBN:
(纸本)9798350304060
Cellular networks are potential targets of jamming attacks to disrupt wireless communications. Since the fifth generation (5G) of cellular networks enables mission-critical applications, such as autonomous driving or smart manufacturing, the resulting malfunctions can cause serious damage. This paper proposes to detect broadband jammers by an online classification of spectrograms. These spectrograms are computed from a stream of in-phase and quadrature (IQ) samples of 5G radio signals. We obtain these signals experimentally and describe how to design a suitable dataset for training. Based on this data, we compare two classification methods: a supervised learning model built on a basic convolutional neural network (CNN) and an unsupervised learning model based on a convolutional autoencoder (CAE). After comparing the structure of these models, their performance is assessed in terms of accuracy and computational complexity.
Participation of Electric Vehicles (EVs) in providing grid services is becoming popular for the economic benefits to their stakeholders, i.e., Local Distribution Companies (LDCs), ratepayers, and EV owners. Battery El...
详细信息
ISBN:
(数字)9798350371628
ISBN:
(纸本)9798350371635
Participation of Electric Vehicles (EVs) in providing grid services is becoming popular for the economic benefits to their stakeholders, i.e., Local Distribution Companies (LDCs), ratepayers, and EV owners. Battery Electric Vehicles can be effectively used for power system applications such as demand response and peak shaving. However, there is a lack of region-wide cost-benefit analysis of Vehicle to Grid (V2G) participation in providing grid services. Thus, this paper introduces a model that could be utilized to perform residential V2G mainly to evaluate its effect on non-participating ratepayers as a measure of fairness. The developed model yields the benefit-to-cost ratios (BCRs) for LDCs (administrators), ratepayers (those who don’t participate in V2G), and EV owners (participants).
Forecasting time series (TS) from their historical data is used in many preventive monitoring and decision support systems in industry. For systems operating in real-time, an urgent problem is to reduce forecasting ti...
详细信息
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management....
详细信息
The 5G LAN-type service refers to a service that supports communication between users within a group through the 5G system. It provides functions similar to those of traditional Local Area Networks (LAN) or Virtual Pr...
详细信息
To support XR services, the 3GPP standards intro-duce a protocol data unit (PDU) set, which is the minimum group of packets needed to carry a video frame, and also define the relative importance of different PDU sets....
详细信息
Human activity recognition (HAR) is crucial in various fields, including healthcare, assistive technologies, and human-computer interaction. Recognizing hand-based micro activities presents a unique challenge due to t...
详细信息
ISBN:
(数字)9798350349597
ISBN:
(纸本)9798350349603
Human activity recognition (HAR) is crucial in various fields, including healthcare, assistive technologies, and human-computer interaction. Recognizing hand-based micro activities presents a unique challenge due to their complexity and variability. In this paper, we propose a novel HAR methodology to identify 24 distinct hand-based Activities of Daily Living (ADLs) using data from a wrist-weared inertial sensor. Our approach, tested on a dataset of 30 participants, employs a unique two- level segmentation and lightweight machine-learning model to handle the complex dynamics of micro-ADLs. The experimental outcomes, showcasing an overall accuracy of 84% and precision, recall, and F1-Scores above 83% underscore the method's efficacy and subject-indep.ndent reliability compared to the existing literature on micro-ADL recognition.
Fifth-generation (5G) mobile networks are vulnerable to jamming attacks that may jeopardize valuable applications such as industry automation. In this paper, we propose to analyze radio signals with a dedicated device...
详细信息
Fifth-generation (5G) mobile networks are vulnerable to jamming attacks that may jeopardize valuable applications such as industry automation. In this paper, we propose to analyze radio signals with a dedicated device...
详细信息
ISBN:
(数字)9798350393187
ISBN:
(纸本)9798350393194
Fifth-generation (5G) mobile networks are vulnerable to jamming attacks that may jeopardize valuable applications such as industry automation. In this paper, we propose to analyze radio signals with a dedicated device to detect jamming attacks. We pursue a learning approach, with the detector being a convolutional neural network (CNN) implementing a generalized likelihood ratio test (GLRT). To this end, the CNN is trained as a two-class classifier using two datasets: one of real legitimate signals and another generated artificially so that the resulting classifier implements the GLRT. The artificial dataset is generated mimicking different types of jamming signals. We evaluate the performance of this detector using experimental data obtained from a private 5G network and several jamming signals, showing the technique’s effectiveness in detecting the attacks.
暂无评论