Amiri, M, Tofigh, F, Ghafoorzadeh Yazdi, A & Abolhasan, M 2017, 'Exponential Antipodal Vivaldi Antenna With Exponential Dielectric Lens', IEEE Antennas and Wireless Propagation Letters, vol. 16, pp. 1-1.
View/Download from: Publisher's site
Antunes, N, Pipiras, V, Abry, P & Veitch, D 2017, 'Small and large scale behavior of moments of Poisson cluster processes', ESAIM: Probability and Statistics, vol. 21, pp. 369-393.
View/Download from: Publisher's site
View description>>
Poisson cluster processes are special point processes that find use in modeling Internet traffic, neural spike trains, computer failure times and other real-life phenomena. The focus of this work is on the various moments and cumulants of Poisson cluster processes, and specifically on their behavior at small and large scales. Under suitable assumptions motivated by the multiscale behavior of Internet traffic, it is shown that all these various quantities satisfy scale free (scaling) relations at both small and large scales. Only some of these relations turn out to carry information about salient model parameters of interest, and consequently can be used in the inference of the scaling behavior of Poisson cluster processes. At large scales, the derived results complement those available in the literature on the distributional convergence of normalized Poisson cluster processes, and also bring forward a more practical interpretation of the so-called slow and fast growth regimes. Finally, the results are applied to a real data trace from Internet traffic.
Awwad, S & Piccardi, M 2017, 'Prototype-based budget maintenance for tracking in depth videos', Multimedia Tools and Applications, vol. 76, no. 20, pp. 21117-21132.
View/Download from: Publisher's site
View description>>
© 2016 Springer Science+Business Media New YorkThe use of conventional video tracking based on color or gray-level videos often raises concerns about the privacy of the tracked targets. To alleviate this issue, this paper presents a novel tracker that operates solely from depth data. The proposed tracker is designed as an extension of the popular Struck algorithm which leverages the effective framework of structural SVM. The main contributions of our paper are: i) a dedicated depth feature based on local depth patterns, ii) a heuristic for handling view occlusions in depth frames, and iii) a technique for keeping the number of the support vectors within a given “budget” so as to limit computational costs. Experimental results over the challenging Princeton Tracking Benchmark (PTB) dataset report a remarkable accuracy compared to the original Struck tracker and other state-of-the-art trackers using depth and RGB data.
Beydoun, G, Hoffmann, A & Gill, A 2017, 'Constructing enhanced default theories incrementally', Complex & Intelligent Systems, vol. 3, no. 2, pp. 83-92.
View/Download from: Publisher's site
View description>>
The main difference between various formalisms of non-monotonic reasoning is the representation of non-monotonic rules. In default logic, they are represented by special expressions called defaults. In default logic, commonsense knowledge about the world is represented as a set of named defaults. The use of defaults is popular because they reduce the complexity of the representation, and they are sufficient for knowledge representation in many naturally occurring contexts. This paper offers an incremental process to acquire defaults from human experts directly and at the same time it provides added semantics to defaults by adding priorities to defaults and creating additional relations between them. The paper uses an existing incremental framework, NRDR, to generate these defaults. This framework is chosen as it not only enables incremental context driven formulation of defaults, but also allows experts to introduce their own domain terms. In choosing this framework, the paper broadens its utility.
Bożejko, W, Chaczko, Z, Uchroński, M & Wodecki, M 2017, 'Parallel patterns determination in solving cyclic flow shop problem with setups', Archives of Control Sciences, vol. 27, no. 2, pp. 183-195.
View/Download from: Publisher's site
View description>>
AbstractThe subject of this work is the new idea of blocks for the cyclic flow shop problem with setup times, using multiple patterns with different sizes determined for each machine constituting optimal schedule of cities for the traveling salesman problem (TSP). We propose to take advantage of the Intel Xeon Phi parallel computing environment during so-called ’blocks’ determination basing on patterns, in effect significantly improving the quality of obtained results.
Chen, S-L, Qin, P-Y, Ding, C & Guo, YJ 2017, 'Cavity-Backed Proximity-Coupled Reconfigurable Microstrip Antenna With Agile Polarizations and Steerable Beams', IEEE Transactions on Antennas and Propagation, vol. 65, no. 10, pp. 5553-5558.
View/Download from: Publisher's site
View description>>
© 1963-2012 IEEE. A major challenge for a combined reconfigurable antenna is to realize both polarization switching and beam steering independently in a compact antenna structure. A cavity-backed proximity-coupled reconfigurable microstrip antenna proposed in this communication provides an efficient solution. Beam lead p-i-n diodes DSM8100-000 are employed as switching elements to achieve reconfiguration. Three different linear polarizations (0°, 45°, and 90°) are realized by switching the diodes on a proximity-coupled feed network. For each polarization state, the main beam can be steered to three directions by using a reconfigurable parasitic-element network. The parasitic-element network is printed on the same plane of the radiating patch, thereby making the antenna compact. This antenna has nine different working modes, and for all the working modes, the reflection coefficients are below -10 dB with the measured realized gains ranging from 7.2 to 8.1 dBi.
Chen, S-L, Qin, P-Y, Guo, YJ, Liu, Y & You, P 2017, 'Generalized 2-D Numerical Pattern Synthesis Algorithm for Low Cross Polarization and Low Sidelobe Synthesis', IEEE Antennas and Wireless Propagation Letters, vol. 16, pp. 2578-2581.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Numerical pattern synthesis (NPS) algorithm based on adaptive array theory is an effective spatial power pattern synthesis method for antenna arrays. In this letter, instead of using the artificial interferences weighted on the total power pattern in the conventional NPS algorithm, a generalized two-dimensional (2-D) NPS algorithm is proposed in which two weighting functions are assigned to control the copolarization and cross-polarization patterns, respectively. The weighting functions are iteratively updated until both the sidelobe and cross-polarization levels reach their prescribed ones. Two numerical examples for synthesizing the patterns of a linearly polarized planar array and a circularly polarized cylindrical array are provided to validate effectiveness and advantages of the proposed generalized 2-D NPS algorithm.
Chen, S-L, Wei, F, Qin, P-Y, Guo, YJ & Chen, X 2017, 'A Multi-linear Polarization Reconfigurable Unidirectional Patch Antenna', IEEE Transactions on Antennas and Propagation, vol. 65, no. 8, pp. 4299-4304.
View/Download from: Publisher's site
View description>>
© 1963-2012 IEEE. A novel multi-linear polarization (multi-LP) reconfigurable unidirectional circular patch antenna is proposed, which can switch among four LPs at every 45° rotation. The patch antenna is fed in the center and shorting posts are used to excite TM11 mode with LP. By controlling the connections between the four shorting posts and the ground plane using p-i-n diodes, four reconfigurable polarization states at φ =0°, φ =45 , φ =90 , or φ =135 can be realized. The size of this antenna is about 0.57λ × 0.57λ × 0.07λ at 2.45 GHz. It can be easily fabricated and has a simple biasing network. The measured overlapping impedance bandwidth for different polarizations under the condition S 11≤ -10 dB is from 2.33 to 2.50 GHz, which agrees well with the simulated one. Moreover, the antenna maintains stable radiation patterns and the measured realized gains range from 5.3 to 5.9 dBi.
Chen, X, Qin, P-Y, Guo, YJ & Fu, G 2017, 'Low-Profile and Wide-Beamwidth Dual-Polarized Distributed Microstrip Antenna', IEEE Access, vol. 5, pp. 2272-2280.
View/Download from: Publisher's site
View description>>
© 2013 IEEE. A low-profile and wide-beamwidth dual-polarized distributed microstrip antenna is presented in this paper. Four isolated micro patches are proposed as the radiation components and are excited by a compact differential-fed network. The micro patches in two diagonals determine the operating frequency bands of the two polarizations, respectively. By increasing the distances between the micro patches, the beamwidth in E plane can be broadened. Shorting poles between the patches and the ground plane are used to achieve good impedance matching. Compact dual-polarized differential-fed networks are also studied and compared with achieve the best antenna performance. To validate the proposed method, a wide-beamwith dual-polarized distributed microstrip antenna, whose dual polarizations operate at 2 and 2.2 GHz, respectively, is manufactured and measured. The external dimensions of the antenna is 70mm × 10 mm (0.49λ × 0.07λ ). The experimental results agree well with the simulated ones. The 3dB beamwidths in E planes reach 116° and 115°, and the gains are 5.15 and 5.5 dB for two polarizations, respectively. Meanwhile, the cross polarizations are less than -26.2 and -27.8 dB. In addition, the impedance bandwidths of 9.2% and 9.9% for VSWR leq 2 are achieved, and the port isolation is greater than 25.4 dB in the bands.
Chen, Y, Yue, X, Xu, RYD & Fujita, H 2017, 'Region scalable active contour model with global constraint', Knowledge-Based Systems, vol. 120, pp. 57-73.
View/Download from: Publisher's site
View description>>
© 2016Existing Active Contour methods suffer from the deficiencies of initialization sensitivity, slow convergence, and being insufficient in the presence of image noise and inhomogeneity. To address these problems, this paper proposes a region scalable active contour model with global constraint (RSGC). The energy function is formulated by incorporating local and global constraints. The local constraint is a region scalable fitting term that draws upon local region information under controllable scales. The global constraint is constructed through estimating the global intensity distribution of image content. Specifically, the global intensity distribution is approximated with a Gaussian Mixture Model (GMM) and estimated by Expectation Maximization (EM) algorithm as a prior. The segmentation process is implemented through optimizing the improved energy function. Comparing with two other representative models, i.e. region-scalable fitting model (RSF) and active contour model without edges (CV), the proposed RSGC model achieves more efficient, stable and precise results on most testing images under the joint actions of local and global constraints.
Cheng, H, Zhang, J, Wu, Q, An, P & Liu, Z 2017, 'Stereoscopic visual saliency prediction based on stereo contrast and stereo focus', EURASIP Journal on Image and Video Processing, vol. 2017, no. 1.
View/Download from: Publisher's site
View description>>
© 2017, The Author(s). In this paper, we exploit two characteristics of stereoscopic vision: the pop-out effect and the comfort zone. We propose a visual saliency prediction model for stereoscopic images based on stereo contrast and stereo focus models. The stereo contrast model measures stereo saliency based on the color/depth contrast and the pop-out effect. The stereo focus model describes the degree of focus based on monocular focus and the comfort zone. After obtaining the values of the stereo contrast and stereo focus models in parallel, an enhancement based on clustering is performed on both values. We then apply a multi-scale fusion to form the respective maps of the two models. Last, we use a Bayesian integration scheme to integrate the two maps (the stereo contrast and stereo focus maps) into the stereo saliency map. Experimental results on two eye-tracking databases show that our proposed method outperforms the state-of-the-art saliency models.
Cooper, CS, Franklin, DR, Ros, M, Safaei, F & Abolhasan, M 2017, 'A Comparative Survey of VANET Clustering Techniques.', IEEE Commun. Surv. Tutorials, vol. 19, no. 1, pp. 657-681.
View/Download from: Publisher's site
View description>>
A vehicular ad hoc network (VANET) is a mobile ad hoc network (MANET) in which network nodes are vehicles – most commonly road vehicles. VANETs present a unique range of challenges and opportunities for routing protocols due to the semi-organised nature of vehicular movements subject to the constraints of road geometry and rules, and the obstacles which limit physical connectivity in urban environments. In particular, the problems of routing protocol reliability and scalability across large urban VANETs are currently the subject of intense research. Clustering can be used to improve routing scalability and reliability in VANETs, as it results in the distributed formation of hierarchical network structures by grouping vehicles together based on correlated spatial distribution and relative velocity. In addition to the benefits to routing, these groups can serve as the foundation for accident or congestion detection, inforomation dissemination and entertainment applications. This paper explores the design choices made in the development of clustering algorithms targeted at VANETs. It presents a taxonomy of the techniques applied to solve the problems of cluster head election, cluster affiliation and cluster management, and identifies new directions and recent trends in the design of these algorithms. Additionally, methodologies for validating clustering performance are reviewed, and a key shortcoming – the lack of realistic vehicular channel modelling – is identified. The importance of a rigorous and standardised performance evaluation regime utilising realistic vehicular channel models is demonstrated.
Cui, Q, Gu, Y, Ni, W & Liu, RP 2017, 'Effective Capacity of Licensed-Assisted Access in Unlicensed Spectrum for 5G: From Theory to Application', IEEE Journal on Selected Areas in Communications, vol. 35, no. 8, pp. 1754-1767.
View/Download from: Publisher's site
View description>>
© 1983-2012 IEEE. License-assisted access (LAA) is a promising technology to offload dramatically increasing cellular traffic to unlicensed bands. Challenges arise from the provision of quality-of-service (QoS) and the quantification of capacity, due to the distributed and heterogeneous nature of LAA and legacy systems (such as Wi-Fi) coexisting in the bands. In this paper, we develop new theories of the effective capacity to measure LAA under statistical QoS requirements. A new four-state semi-Markovian model is developed to capture transmission collisions, random backoffs, and lossy wireless channels of LAA in distributed heterogeneous network environments. A closed-form expression for the effective capacity is derived to comprehensively analyze LAA. The four-state model is further abstracted to an insightful two-state equivalent which reveals the concavity of the effective capacity in terms of transmit rate. Validated by simulations, the concavity is exploited to maximize the effective capacity and effective energy efficiency of LAA, and provide significant improvements of 62.7% and 171.4%, respectively, over existing approaches. Our results are of practical value to holistic designs and deployments of LAA systems.
Ding, C, Jones, B, Guo, YJ & Qin, P-Y 2017, 'Wideband Matching of Full-Wavelength Dipole With Reflector for Base Station', IEEE Transactions on Antennas and Propagation, vol. 65, no. 10, pp. 5571-5576.
View/Download from: Publisher's site
View description>>
© 1963-2012 IEEE. This communication introduces a wideband hybrid feeding method for full-wavelength dipole antennas with a reflector. A full-wavelength dipole is designed to cover the band from 698 to 960 MHz for cellular base station applications. Its matching circuit consists of a triple-tuned circuit and a quasi-quarter-wavelength impedance transformer. The proposed matching circuit can provide balanced feeding as a balun and has a compact size. The working mechanism and a complete design scheme of the proposed matching circuit are elaborated. The matching circuit is designed and optimized using a circuit theory model and then physically realized using microstrip lines based on full-wave simulation. The measured reflection coefficient |S-{11}| is lesser than -14 dB across the entire band from 698 to 960 MHz, exhibiting a bandwidth of 32%. This is the first time that a wideband center-fed full-wavelength dipole is proposed.
Ding, C, Sun, H, Ziolkowski, RW & Guo, YJ 2017, 'Simplified Tightly-Coupled Cross-Dipole Arrangement for Base Station Applications', IEEE Access, vol. 5, pp. 27491-27503.
View/Download from: Publisher's site
View description>>
© 2013 IEEE. The electromagnetic fundamentals that govern the performance characteristics of dual-polarized tightly coupled cross-dipoles that are widely used in cellular base station applications are investigated. The mutual coupling effects and their impact on standard performance indices are stressed. A model is developed that considers this type of cross-dipole as an array. Links between the physical dimensions of the components of these model and key radiation characteristics, including directivity, half-power-beam width, and cross polarization discrimination levels, are established. The model guides the introduction and optimization of a simplified cross-dipole structure that exhibits excellent performance. A prototype was fabricated, assembled, and tested. The measured results are in good agreement with their simulated values, validating the model, and its governing principles.
Dutkiewicz, E, Costa-Perez, X, Kovacs, IZ & Mueck, M 2017, 'Massive Machine-Type Communications', IEEE Network, vol. 31, no. 6, pp. 6-7.
View/Download from: Publisher's site
View description>>
The articles in this special section address the techology and applications supported by machine-type communications (MTC). Here, MTC is characterized by fully automatic data generation, exchange, processing, and actuation among intelligent machines, without or with low intervention of humans. With the rapid penetration of embedded devices, MTC is becoming the dominant communication paradigm for a wide range of emerging smart services including healthcare, manufacturing, utilities, consumer goods, and transportation. Industry analysts predict that 50 billion devices will be connected to mobile networks worldwide by 2020. While mobile phone devices communicating among humans will still exist, machine-type devices sending bits of information to other machines, servers, clouds, or humans will account for a much larger proportion and thus create what is referred to as massive MTC (MMTC).
Edwards, D, Cheng, M, Wong, IA, Zhang, J & Wu, Q 2017, 'Ambassadors of knowledge sharing', International Journal of Contemporary Hospitality Management, vol. 29, no. 2, pp. 690-708.
View/Download from: Publisher's site
View description>>
PurposeThe aim of this study is to understand the knowledge-sharing structure and co-production of trip-related knowledge through online travel forums.Design/methodology/approachThe travel forum threads were collected from TripAdvisor’s Sydney travel forum for the period from 2010 to 2014, which contains 115,847 threads from 8,346 conversations. The data analytical technique was based on a novel methodological approach – visual analytics, including semantic pattern generation and network analysis.FindingsFindings indicate that the knowledge structure is created by community residents who camouflage as local experts and serve as ambassadors of a destination. The knowledge structure presents collective intelligence co-produced by community residents and tourists. Further findings reveal how these community residents associate with each other and form a knowledge repertoire with information covering various travel domain areas.Practical implicationsThe study offers valuable insights to help destination-management organizations and tour operators identify existing and emerging tourism issues to achieve a competitive destination advantage.Originality/valueThis study highlights the process of social media mediated travel knowledge co-production. It also discovers how community residents engage in reaching out to tourists by camouflaging as ordinary users.
Fan, X, Xu, RYD, Cao, L & Song, Y 2017, 'Learning Nonparametric Relational Models by Conjugately Incorporating Node Information in a Network', IEEE Transactions on Cybernetics, vol. 47, no. 3, pp. 589-599.
View/Download from: Publisher's site
View description>>
© 2013 IEEE. Relational model learning is useful for numerous practical applications. Many algorithms have been proposed in recent years to tackle this important yet challenging problem. Existing algorithms utilize only binary directional link data to recover hidden network structures. However, there exists far richer and more meaningful information in other parts of a network which one can (and should) exploit. The attributes associated with each node, for instance, contain crucial information to help practitioners understand the underlying relationships in a network. For this reason, in this paper, we propose two models and their solutions, namely the node-information involved mixed-membership model and the node-information involved latent-feature model, in an effort to systematically incorporate additional node information. To effectively achieve this aim, node information is used to generate individual sticks of a stick-breaking process. In this way, not only can we avoid the need to prespecify the number of communities beforehand, the algorithm also encourages that nodes exhibiting similar information have a higher chance of assigning the same community membership. Substantial efforts have been made toward achieving the appropriateness and efficiency of these models, including the use of conjugate priors. We evaluate our framework and its inference algorithms using real-world data sets, which show the generality and effectiveness of our models in capturing implicit network structures.
Fontugne, R, Abry, P, Fukuda, K, Veitch, D, Cho, K, Borgnat, P & Wendt, H 2017, 'Scaling in Internet Traffic: A 14 Year and 3 Day Longitudinal Study, With Multiscale Analyses and Random Projections', IEEE/ACM Transactions on Networking, vol. 25, no. 4, pp. 2152-2165.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In the mid 1990s, it was shown that the statistics of aggregated time series from Internet traffic departed from those of traditional short range-dependent models, and were instead characterized by asymptotic self-similarity. Following this seminal contribution, over the years, many studies have investigated the existence and form of scaling in Internet traffic. This contribution first aims at presenting a methodology, combining multiscale analysis (wavelet and wavelet leaders) and random projections (or sketches), permitting a precise, efficient and robust characterization of scaling, which is capable of seeing through non-stationary anomalies. Second, we apply the methodology to a data set spanning an unusually long period: 14 years, from the MAWI traffic archive, thereby allowing an in-depth longitudinal analysis of the form, nature, and evolutions of scaling in Internet traffic, as well as network mechanisms producing them. We also study a separate three-day long trace to obtain complementary insight into intra-day behavior. We find that a biscaling (two ranges of independent scaling phenomena) regime is systematically observed: long-range dependence over the large scales, and multifractallike scaling over the fine scales. We quantify the actual scaling ranges precisely, verify to high accuracy the expected relationship between the long range dependent parameter and the heavy tail parameter of the flow size distribution, and relate fine scale multifractal scaling to typical IP packet inter-arrival and to round-trip time distributions.
Gill, AQ, Braytee, A & Hussain, FK 2017, 'Adaptive service e-contract information management reference architecture', VINE Journal of Information and Knowledge Management Systems, vol. 47, no. 3, pp. 395-410.
View/Download from: Publisher's site
View description>>
PurposeThe aim of this paper is to report on the adaptive e-contract information management reference architecture using the systematic literature review (SLR) method. Enterprises need to effectively design and implement complex adaptive e-contract information management architecture to support dynamic service interactions or transactions.Design/methodology/approachThe SLR method is three-fold and was adopted as follows. First, a customized literature search with relevant selection criteria was developed, which was then applied to initially identify a set of 1,573 papers. Second, 55 of 1,573 papers were selected for review based on the initial review of each identified paper title and abstract. Finally, based on the second review, 24 papers relevant to this research were selected and reviewed in detail.FindingsThis detailed review resulted in the adaptive e-contract information management reference architecture elements including structure, life cycle and supporting technology.Research limitations/implicationsThe reference architecture elements could serve as a taxonomy for researchers and practitioners to develop context-specific service e-contract information management architecture to support dynamic service interactions for value co-creation. The results are limited to the number of selected databases and papers reviewed in this study.Originality/valueThis paper offers a review of the body of knowledge and novel e-contract information management reference architecture, ...
Guo, D, Xu, J, Zhang, J, Xu, M, Cui, Y & He, X 2017, 'User relationship strength modeling for friend recommendation on Instagram', Neurocomputing, vol. 239, pp. 9-18.
View/Download from: Publisher's site
View description>>
© 2017 Elsevier B.V. Social strength modeling in the social media community has attracted increasing research interest. Different from Flickr, which has been explored by many researchers, Instagram is more popular for mobile users and is conducive to likes and comments but seldom investigated. On Instagram, a user can post photos/videos, follow other users, comment and like other users’ posts. These actions generate diverse forms of data that result in multiple user relationship views. In this paper, we propose a new framework to discover the underlying social relationship strength. User relationship learning under multiple views and the relationship strength modeling are coupled into one process framework. In addition, given the learned relationship strength, a coarse-to-fine method is proposed for friend recommendation. Experiments on friend recommendations for Instagram are presented to show the effectiveness and efficiency of the proposed framework. As exhibited by our experimental results, it can obtain better performance over other related methods. Although our method has been proposed for Instagram, it can be easily extended to any other social media communities.
Hoang, DT, Niyato, D, Wang, P, Kim, DI & Han, Z 2017, 'Ambient Backscatter: A New Approach to Improve Network Performance for RF-Powered Cognitive Radio Networks', IEEE Transactions on Communications, vol. 65, no. 9, pp. 3659-3674.
View/Download from: Publisher's site
View description>>
© 1972-2012 IEEE. This paper introduces a new solution to improve the performance for secondary systems in radio frequency (RF) powered cognitive radio networks (CRNs). In a conventional RF-powered CRN, the secondary system works based on the harvest-then-transmit protocol. That is, the secondary transmitter (ST) harvests energy from primary signals and then uses the harvested energy to transmit data to its secondary receiver (SR). However, with this protocol, the performance of the secondary system is much dependent on the amount of harvested energy as well as the primary channel activity, e.g., idle and busy periods. Recently, ambient backscatter communication has been introduced, which enables the ST to transmit data to the SR by backscattering ambient signals. Therefore, it is potential to be adopted in the RF-powered CRN. We investigate the performance of RF-powered CRNs with ambient backscatter communication over two scenarios, i.e., overlay and underlay CRNs. For each scenario, we formulate and solve the optimization problem to maximize the overall transmission rate of the secondary system. Numerical results show that by incorporating such two techniques, the performance of the secondary system can be improved significantly compared with the case when the ST performs either harvest-then-transmit or ambient backscatter technique.
Hoang, DT, Wang, P, Niyato, D & Hossain, E 2017, 'Charging and Discharging of Plug-In Electric Vehicles (PEVs) in Vehicle-to-Grid (V2G) Systems: A Cyber Insurance-Based Model', IEEE Access 2017, vol. 5, pp. 732-754.
View/Download from: Publisher's site
View description>>
In addition to being environment-friendly, vehicle-to-grid (V2G) systems canhelp the plug-in electric vehicle (PEV) users in reducing their energy costsand can also help stabilizing energy demand in the power grid. In V2G systems,since the PEV users need to obtain system information (e.g., locations ofcharging/discharging stations, current load and supply of the power grid) toachieve the best charging and discharging performance, data communication playsa crucial role. However, since the PEV users are highly mobile, informationfrom V2G systems is not always available for many reasons, e.g., wireless linkfailures and cyber attacks. Therefore, in this paper, we introduce a novelconcept using cyber insurance to 'transfer' cyber risks, e.g., unavailableinformation, of a PEV user to a third party, e.g., a cyber insurance company.Under the insurance coverage, even without information about V2G systems, a PEVuser is always guaranteed the best price for charging/discharging. Inparticular, we formulate the optimal energy cost problem for the PEV user byadopting a Markov decision process framework. We then propose a learningalgorithm to help the PEV user make optimal decisions, e.g., to charge ordischarge and to buy or not to buy insurance, in an online fashion. Throughsimulations, we show that cyber insurance is an efficient solution not only indealing with cyber risks, but also in maximizing revenue of the PEV user.
Huang, J, Lin, W, Qiu, F, Jiang, C, Lei, D & Guo, YJ 2017, 'A Low Profile, Ultra-Lightweight, High Efficient Circularly-Polarized Antenna Array for Ku Band Satellite Applications', IEEE Access, vol. 5, pp. 18356-18365.
View/Download from: Publisher's site
View description>>
© 2013 IEEE. A novel low-profile, ultra-lightweight, high-efficient circularly polarized (CP) planar patch antenna array is reported for Ku-band satellite TV reception applications. The basic radiating element of the antenna array is realized by a $2 \times 2$ corner-removed patch subarray. This $2 \times 2$ patch subarray is center-fed by a rectangular coupling aperture etched on the top surface of a substrate-integrated-waveguide cavity. A novel compact sequential rotation feeding technique is adopted to broaden the operating bandwidth without occupying additional area. The $2 \times 2$ CP subarray can be easily scaled up for large size antenna arrays due to its single layer feeding network and compact radiating elements. In addition, the patch radiators are printed on a thin layer of Polyimide film backed by a piece of supporting foam to minimize the entire weight. To verify the design concept, a 96-element ( $16 \times 6$ ) CP patch array was fabricated and tested. Measured results show that the operating bandwidth is 700 MHz from 11.55 to 12.25 GHz. The gain is stable across the operating bandwidth with a realized peak gain of 26.4 dBic. The height of the antenna is $0.05~\lambda {0}$ and the total weight is only 66.5 g. It serves as an excellent candidate for Ku-band satellite applications.
Huang, S, Zhang, J, Schonfeld, D, Wang, L & Hua, X-S 2017, 'Two-Stage Friend Recommendation Based on Network Alignment and Series Expansion of Probabilistic Topic Model', IEEE Transactions on Multimedia, vol. 19, no. 6, pp. 1314-1326.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Precise friend recommendation is an important problem in social media. Although most social websites provide some kinds of auto friend searching functions, their accuracies are not satisfactory. In this paper, we propose a more precise auto friend recommendation method with two stages. In the first stage, by utilizing the information of the relationship between texts and users, as well as the friendship information between users, we align different social networks and choose some 'possible friends.' In the second stage, with the relationship between image features and users, we build a topic model to further refine the recommendation results. Because some traditional methods, such as variational inference and Gibbs sampling, have their limitations in dealing with our problem, we develop a novel method to find out the solution of the topic model based on series expansion. We conduct experiments on the Flickr dataset to show that the proposed algorithm recommends friends more precisely and faster than traditional methods.
Huang, X & Guo, YJ 2017, 'Radio Frequency Self-Interference Cancellation With Analog Least Mean-Square Loop', IEEE Transactions on Microwave Theory and Techniques, vol. 65, no. 9, pp. 3336-3350.
View/Download from: Publisher's site
View description>>
© 1963-2012 IEEE. A multitap adaptive filter with analog least mean-square (ALMS) loop is proposed in this paper for effective and low complexity self-interference cancellation implemented as part of the radio frequency frontend in a full duplex transceiver. Comprehensive analyses of the ALMS loop's behaviors at both micro and macroscales are presented for a wireless communication system with single carrier signaling. It is revealed that there is always an irreducible residual interference due to the cyclostationary property of the transmitted signal. The interference suppression ratio (ISR) lower bound is derived accordingly, which can be used as a design rule for determining the ALMS loop parameter. Stationary analysis shows that the convergence speed and achievable ISR of the ALMS loop are determined by the loop gain and the autocorrelation function of the transmitted signal. The interference channel modeling error with the adaptive filter also accounts for part of the residual interference power. These theoretical findings are verified by simulation and experimental results.
Hussein, F & Piccardi, M 2017, 'V-JAUNE', ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 13, no. 2, pp. 1-19.
View/Download from: Publisher's site
View description>>
Video summarization and action recognition are two important areas of multimedia video analysis. While these two areas have been tackled separately to date, in this article, we present a latent structural SVM framework to recognize the action and derive the summary of a video in a joint, simultaneous fashion. Efficient inference is provided by a submodular score function that accounts for the action and summary jointly. In this article, we also define a novel measure to evaluate the quality of a predicted video summary against the annotations of multiple annotators. Quantitative and qualitative results over two challenging action datasets—the ACE and MSR DailyActivity3D datasets—show that the proposed joint approach leads to higher action recognition accuracy and equivalent or better summary quality than comparable approaches that perform these tasks separately.
Huynh, NV, Hoang, DT, Lu, X, Niyato, D, Wang, P & Kim, DI 2017, 'Ambient Backscatter Communications: A Contemporary Survey', IEEE Communications Surveys and Tutorials, vol. 20, no. 4, pp. 2889-2922.
View/Download from: Publisher's site
View description>>
Recently, ambient backscatter communications has been introduced as acutting-edge technology which enables smart devices to communicate by utilizingambient radio frequency (RF) signals without requiring active RF transmission.This technology is especially effective in addressing communication and energyefficiency problems for low-power communications systems such as sensornetworks. It is expected to realize numerous Internet-of-Things (IoT)applications. Therefore, this paper aims to provide a contemporary andcomprehensive literature review on fundamentals, applications, challenges, andresearch efforts/progress of ambient backscatter communications. In particular,we first present fundamentals of backscatter communications and briefly reviewbistatic backscatter communications systems. Then, the general architecture,advantages, and solutions to address existing issues and limitations of ambientbackscatter communications systems are discussed. Additionally, emergingapplications of ambient backscatter communications are highlighted. Finally, weoutline some open issues and future research directions.
Jia, Y, Liu, Y, Guo, YJ, Li, K & Gong, S 2017, 'A Dual-Patch Polarization Rotation Reflective Surface and Its Application to Ultra-Wideband RCS Reduction', IEEE Transactions on Antennas and Propagation, vol. 65, no. 6, pp. 3291-3295.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. An ultra-wideband polarization rotation reflective surface (PRRS) with a high polarization conversion ratio (PCR) is proposed, which can reflect a linearly polarized incident wave with 90° polarization rotation. The unit cell of the proposed PRRS consists of a square and L-shaped patches printed on a substrate, which is covered by a superstrate and backed by a metallic ground. The two patches are connected to the ground using two metallic vias, respectively. Compared with the previously reported PRRS, the polarization rotation bandwidth of the proposed PRRS is enhanced from 49% to 97% with a high PCR of 96%. The frequency responses within the operation frequency band are consistent under oblique incident waves. Furthermore, the designed PRRS is applied to the ultra-wideband radar cross-section (RCS) reduction by forming a checkerboard surface. A 10-dB RCS reduction is achieved over an ultrawideband of 98%. To validate the simulation results, a prototype of the checkerboard surface is fabricated and measured. A good agreement between the experimental and simulation results is obtained.
Jozi, B, Braun, R, Samali, B, Li, J & Dackermann, U 2017, 'Limitation of the Lateral Angled Broadband Low Frequency Impact Excitation on the Non-Destructive Condition Assessment of the Timber Utility Poles', International Journal of Advancements in Technology, vol. 08, no. 04, pp. 1-8.
View/Download from: Publisher's site
View description>>
Timber utility poles play a significant role in the infrastructure of Australia as well as many other countries for power distribution and communication networks. Due to the advanced age of Australia’s timber pole infrastructure, substantial efforts are undertaken on maintenance and asset management to avoid any failures of the utility lines. Nevertheless, the lack of reliable tools for assessing the condition of in-service poles seriously jeopardizes the maintenance and asset management. For instance, each year approximately 300,000 poles are replaced in the Eastern States of Australia with up to 80% of them still being in a very good condition, resulting in major waste of natural resources and money. Non-destructive testing (NDT) methods based on stress wave propagation can potentially offer simple and cost-effective tools for identifying the in-service condition of timber poles. Nonetheless, most of the currently available methods are not appropriate for condition assessment of timber poles in-service due to presence of uncertainties such as complicated material properties, environmental conditions, interaction of soil and structure, and an impact excitation type. In order to address these complexities, advanced digital signal processing methodologies are needed to be employed. Deterministic signal separation, blind signal separation, and frequency-wavenumber velocity filtering are the three groups of methodologies, which could most probably provide solutions. In this paper applicability and effectiveness of the blind signal separation methods is investigated through a numerical data obtained from of a timber pole modelled with both isotropic and orthotropic material properties. Principal Component Analysis (PCA), Singular Value Decomposition (SVD), and K-means clustering algorithms are the blind signal separation methodologies that are employed in this research work.
Karmokar, DK, Guo, YJ, Qin, P-Y, Esselle, KP & Bird, TS 2017, 'Forward and Backward Beam-Scanning Tri-Band Leaky-Wave Antenna', IEEE Antennas and Wireless Propagation Letters, vol. 16, pp. 1891-1894.
View/Download from: Publisher's site
View description>>
© 2002-2011 IEEE. The main limitations of uniform half-width microstrip leaky-wave antennas (HW-MLWAs), namely a single operating band and only forward beam scanning, are overcome here with an HW-MLWA loaded with periodic L-shaped slots. The antenna exhibits tri-band operation, and the main beam can be steered in the forward direction in one band, and in the backward direction in the other two bands. Its size is halved with a shorting wall. The antenna was fabricated and tested to validate the concept, and the measured and simulated results agree very well. The measured matched (10-dB return loss) bandwidths of the prototype are 22.34% (5.05-6.32 GHz), 15.85% (8.77-10.28 GHz), and 11.21% (12.63-14.13 GHz) in the first, second, and third bands, respectively. The beam-scanning ranges of the prototyped antenna are 30° to 64°, -75° to -18°, and -19° to -4° when the frequency sweeps from 5 to 6 GHz, 8.85 to 10.5 GHz, and 13 to 14.25 GHz, respectively. The measured peak gains (within the scanning range) are 12.4, 14.3, and 14.7 dBi in the first, second, and third bands with variations of 2.5, 3.4, and 3.1 dB, respectively.
Kong, F, Sun, X, Guo, YJ & Zhu, H 2017, 'Queue-Aware Optimal Bandwidth Allocation in Heterogeneous Networks', IEEE Wireless Communications Letters, vol. 6, no. 6, pp. 730-733.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This letter considers how to allocate the bandwidth to multiple radio access technologies (RATs) in heterogeneous networks. In contrast to previous studies where base stations (BSs) are assumed to be transmitting all the time, it is assumed that the incoming packets from users form a queue in each BS. A minimization problem of the network average power consumption and a maximization problem of the network signalto- interference ratio coverage are formulated, which are shown to be convex and concave with respect to the bandwidth allocation to each RAT, respectively. By using an approximation of the average traffic intensity, closed-form solutions are obtained for both problems.
Li, B, Chen, S, Sutton, GJ, Shi, Y & Liu, RP 2017, 'MAC Performance Analysis for Drive-Thru Internet Networks With Rayleigh Capture', IEEE Access, vol. 5, pp. 10649-10661.
View/Download from: Publisher's site
View description>>
© 2013 IEEE. In practical radio transmissions, channel capture is a dominating factor that affects wireless network performance. The capture effect can occur in wireless network when packets arrive with different powers. Packets with high power can effectively swamp low power packets, such that they are received successfully, when otherwise a collision would have occurred. We present a vehicular network performance-prediction model for a Rayleigh capture channel in Drive-thru Internet scenario. The model incorporates the capture effect into a 2-D Markov chain modeling the high-node mobility and distributed coordination function broadcast scheme. The performance-prediction model unveils the impacts of mobility velocity and number of vehicles on the throughput in a Rayleigh capture channel. We use a vehicular traffic flow model to predict vehicular movement on road by aggregating all vehicles into a flow. Simulation results confirm that our performance-prediction model accurately predicts the performance of traveling vehicles with Rayleigh capture channel in the Drive-thru Internet scenario. We demonstrate that using our performance-prediction model, we can obtain optimal contention window value, by which the best system throughput can be reached without wasting contention time. This is also proved by Anastasi et al.
Li, B, Sutton, GJ, Hu, B, Liu, RP & Chen, S 2017, 'Modeling and QoS analysis of the IEEE 802.11p broadcast scheme in vehicular ad hoc networks', Journal of Communications and Networks, vol. 19, no. 2, pp. 169-179.
View/Download from: Publisher's site
View description>>
© 2011 KICS. Quality of service (QoS) and queue management are critical issues for the broadcast scheme of IEEE 802.11p systems in vehicular ad hoc networks (VANETs). However, existing 1-dimensional (1-D) Markov chain models of 802.11p systems are unable to capture the complete QoS performance and queuing behavior due to the lack of an adequate finite buffer model. We present a 2-dimensional (2-D) Markov chain that integrates the broadcast scheme of the 802.11p system and the queuing process into one model. The extra dimension, which models the queue length, allows us to accurately capture the important QoS measures, delay and loss, plus throughput and queue length, for realistic 802.11p systems with finite buffer under finite load. We derive a simplified method to solve the steady state probabilities of the 2-D Markov chain. Our 2-D Markov chain model is the first finite buffer model defined and solved for the broadcast scheme of 802.11p systems. The 2-D model solutions are validated by extensive simulations. Our analyses reveal that the lack of binary exponential backoff and retransmission in the 802.11p system results in poor QoS performance during heavy traffic load, particularly for large VANETs. We demonstrate that our model provides traffic control guidelines to maintain good QoS performance for VANETs.
Li, H & Huang, X 2017, 'Multicast Systems With Fair Scheduling in Non-identically Distributed Fading Channels', IEEE Transactions on Vehicular Technology, vol. 66, no. 10, pp. 8835-8844.
View/Download from: Publisher's site
View description>>
© 1967-2012 IEEE. Multicasting is emerging as an efficient method to deliver the same data to a group of users, thereby saving network resources. The fairness between different multicast groups is an important quality-of-service (QoS) indication, but it has not been given significant attention. In this paper, we propose a normalized signal-To-noise ratio (SNR)-based fair scheduling for multiple multicast groups in multicast systems. The system fairness and capacity are then analyzed and compared for both fair scheduling and greedy scheduling over independent but non-identically distributed (i.n.d.) fading channels. Closed-form expressions in terms of the system spectral efficiency, outage probability, system fairness, and average bit error rate (BER) are derived in an uncoded/coded M-Ary quadrature amplitude modulation based adaptive transmission multicast system over i.n.d. Rayleigh fading channels. Numerical results show that compared with greedy scheduling, fair scheduling achieves considerably high fairness at the cost of slight system capacity loss, regardless of the number of multicast groups. Our focus is on the physical layer without rate loss, but we also briefly discuss applications of the proposed scheduling in a cross-layer design subject to the loss rate QoS constraint.
Li, J, Deng, C, Da Xu, RY, Tao, D & Zhao, B 2017, 'Robust Object Tracking With Discrete Graph-Based Multiple Experts', IEEE Transactions on Image Processing, vol. 26, no. 6, pp. 2736-2750.
View/Download from: Publisher's site
View description>>
© 1992-2012 IEEE. Variations of target appearances due to illumination changes, heavy occlusions, and target deformations are the major factors for tracking drift. In this paper, we show that the tracking drift can be effectively corrected by exploiting the relationship between the current tracker and its historical tracker snapshots. Here, a multi-expert framework is established by the current tracker and its historical trained tracker snapshots. The proposed scheme is formulated into a unified discrete graph optimization framework, whose nodes are modeled by the hypotheses of the multiple experts. Furthermore, an exact solution of the discrete graph exists giving the object state estimation at each time step. With the unary and binary compatibility graph scores defined properly, the proposed framework corrects the tracker drift via selecting the best expert hypothesis, which implicitly analyzes the recent performance of the multi-expert by only evaluating graph scores at the current frame. Three base trackers are integrated into the proposed framework to validate its effectiveness. We first integrate the online SVM on a budget algorithm into the framework with significant improvement. Then, the regression correlation filters with hand-crafted features and deep convolutional neural network features are introduced, respectively, to further boost the tracking performance. The proposed three trackers are extensively evaluated on three data sets: TB-50, TB-100, and VOT2015. The experimental results demonstrate the excellent performance of the proposed approaches against the state-of-the-art methods.
Li, W, Xu, KD, Tang, X, Yang, Y, Liu, Y & Liu, QH 2017, 'Substrate Integrated Waveguide Cavity-Backed Slot Array Antenna Using High-Order Radiation Modes for Dual-Band Applications in $K$ -Band', IEEE Transactions on Antennas and Propagation, vol. 65, no. 9, pp. 4556-4565.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. A novel compact dual-band cavity-backed substrate integrated waveguide (SIW) array antenna using high-order radiation modes has been proposed in this paper. The first high-order hybrid mode (superposition of TM310 and TM130) and the second high-order mode (TM320) of K-band in the SIW cavity are excited by an inductive window for dual-band application. The operation mechanism of high-order modes is analyzed and then verified through simulations by inserting metallic vias in different positions of the resonant SIW cavity. The designed subarray antenna has the advantages of high gain, high front-to-back ratio, and low cross-polarization level. To further validate the design idea, a dual-frequency band $2 \times 2$ array antenna has been fabricated and measured including reflection coefficients, realized gains, and radiation patterns. The measured results show that the 10-dB impedance bandwidths at resonant frequencies of 21 and 26 GHz are 800 MHz (3.7%) and 700 MHz (2.6%), and the realized gains at boresight direction are around 16 and 17.4 dBi, respectively. Moreover, the proposed array antenna also possesses both advantages of metallic cavity-backed antennas and planar patch antennas, such as low cost, easy fabrication with the printed circuit board technology, and integration with other planar circuits.
Liu, W, Luo, X, Zhang, J, Xue, R & Xu, RYD 2017, 'Semantic summary automatic generation in news event', Concurrency and Computation: Practice and Experience, vol. 29, no. 24, pp. e4287-e4287.
View/Download from: Publisher's site
View description>>
SummaryHow to generate summary with more novel and rich semantics is a challenging issue in the area of multi‐document automatic summary. In this paper, a core semantics extraction model (CSEM) is proposed to improve the novel and rich semantics of multi‐document summary. Firstly, for improving the rich semantics, semantic units, which are a group of association relations of keywords, are used to express texts' semantics. Secondly, for improving the novel semantics, an attenuation function is introduced to adjust the importance of semantic units according to the appearing times that semantic units in the candidate of summary sentences. Thirdly, in order to maximize the novel and rich semantics of summary, the generating process of summary is converted into the optimization process on how to find a set of sentences with a higher importance. Finally, CSEM extracts the least number of sentences to cover the most core semantics in corpus as summary. Experimental results on the benchmark DUC 2004 show that our model outperforms the state‐of‐art approaches (eg, OCCAMS_V, JS‐Gen‐2) under official metric. Especially, the recall of our model in ROUGE‐1 is 40.684%, which is better than other approaches (eg, OCCAMS_V 38.497% and JS‐Gen‐2 36.739%).
Lu, D, Sang, J, Chen, Z, Xu, M & Mei, T 2017, 'Who Are Your “Real” Friends: Analyzing and Distinguishing Between Offline and Online Friendships From Social Multimedia Data', IEEE Transactions on Multimedia, vol. 19, no. 6, pp. 1299-1313.
View/Download from: Publisher's site
Luong, NC, Hoang, DT, Wang, P, Niyato, D & Han, Z 2017, 'Applications of Economic and Pricing Models for Wireless Network Security: A Survey', IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2735-2767.
View/Download from: Publisher's site
View description>>
© 1998-2012 IEEE. This paper provides a comprehensive literature review on applications of economic and pricing theory to security issues in wireless networks. Unlike wireline networks, the broadcast nature and the highly dynamic change of network environments pose a number of nontrivial challenges to security design in wireless networks. While the security issues have not been completely solved by traditional or system-based solutions, economic and pricing models recently were employed as one efficient solution to discourage attackers and prevent attacks to be performed. In this paper, we review economic and pricing approaches proposed to address major security issues in wireless networks including eavesdropping attack, denial-of-service (DoS) attack such as jamming and distributed DoS, and illegitimate behaviors of malicious users. Additionally, we discuss integrating economic and pricing models with cryptography methods to reduce information privacy leakage as well as to guarantee the confidentiality and integrity of information in wireless networks. Finally, we highlight important challenges, open issues and future research directions of applying economic and pricing models to wireless security issues.
Lyu, X, Ni, W, Tian, H, Liu, RP, Wang, X, Giannakis, GB & Paulraj, A 2017, 'Optimal Schedule of Mobile Edge Computing for Internet of Things Using Partial Information', IEEE Journal on Selected Areas in Communications, vol. 35, no. 11, pp. 2606-2615.
View/Download from: Publisher's site
View description>>
© 1983-2012 IEEE. Mobile edge computing is of particular interest to Internet of Things (IoT), where inexpensive simple devices can get complex tasks offloaded to and processed at powerful infrastructure. Scheduling is challenging due to stochastic task arrivals and wireless channels, congested air interface, and more prominently, prohibitive feedbacks from thousands of devices. In this paper, we generate asymptotically optimal schedules tolerant to out-of-date network knowledge, thereby relieving stringent requirements on feedbacks. A perturbed Lyapunov function is designed to stochastically maximize a network utility balancing throughput and fairness. A knapsack problem is solved per slot for the optimal schedule, provided up-to-date knowledge on the data and energy backlogs of all devices. The knapsack problem is relaxed to accommodate out-of-date network states. Encapsulating the optimal schedule under up-to-date network knowledge, the solution under partial out-of-date knowledge preserves asymptotic optimality, and allows devices to self-nominate for feedback. Corroborated by simulations, our approach is able to dramatically reduce feedbacks at no cost of optimality. The number of devices that need to feed back is reduced to less than 60 out of a total of 5000 IoT devices.
Lyu, X, Tian, H, Ni, W, Liu, RP & Zhang, P 2017, 'Adaptive Centralized Clustering Framework for Software-Defined Ultra-Dense Wireless Networks', IEEE Transactions on Vehicular Technology, vol. 66, no. 9, pp. 8553-8557.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper develops a new centralized clustering framework to mitigate strong intercell interference in a software-defined ultra-dense network, where the number of clusters can be adapting to network conditions. A directed interference graph is designed to capture the dominant interference resulting from user mobility. An asymptotically optimal Max-K-Cut method is proposed to partition the graph, achieving a ( $1-1/K$) approximation of the optimum in a polynomial time-complexity, where $K$ is the number of clusters. As a result, $K$ can be adaptively adjusted to leverage among the optimality loss, throughput, and complexity. Numerical results show that our adaptive centralized framework performs significantly better than other centralized or semidistributed clustering schemes in terms of throughput.
Ni, W, Abolhasan, M, Hagelstein, B, Liu, RP & Wang, X 2017, 'A New Trellis Model for MAC Layer Cooperative Retransmission Protocols', IEEE Transactions on Vehicular Technology, vol. 66, no. 4, pp. 3448-3461.
View/Download from: Publisher's site
View description>>
© 1967-2012 IEEE. Comparison studies on timer-based distributed cooperative retransmission protocols are challenging, given a variety of backoff techniques. We propose a new unified model, which can characterize a wide range of cooperative retransmission protocols. The key idea is a new trellis diagram that extrapolates the retransmission probabilities in each timeslot to the entire cooperative process. Following the trellis, performance metrics, such as success rate and collision intensity, can be derived in a structured manner. The new trellis model, coupled with Markov techniques, can be also extended to analyze the distributed binary exponential backoff processes of cooperative retransmissions. Confirmed by simulations, the proposed trellis model accurately reveals the impact of the relays' relative locations and density on different protocols. Our model also has the potential to be used as a management tool to adaptively configure protocol parameters.
Niazi, M, Mahmood, S, Alshayeb, M, Baqais, AAB & Gill, AQ 2017, 'Motivators for adopting social computing in global software development: An empirical study', Journal of Software: Evolution and Process, vol. 29, no. 8, pp. e1872-e1872.
View/Download from: Publisher's site
View description>>
Copyright © 2017 John Wiley & Sons, Ltd. Managing communication in collaborative global software development (GSD) projects is both critical and challenging. While social computing has received much attention from practitioners, social computing adoption is still an emerging research area in GSD. This research paper provides a review of the academic research in social computing and identifies motivators for adopting social computing in the GSD context. We applied the systematic literature review (SLR) and questionnaire survey with 35 software industry experts to address the research objective. Firstly, we implemented a formal SLR approach and identified an initial set of social computing adoption motivators. Secondly, a questionnaire survey was developed based on the SLR and was tested by means of a pilot study. The findings of this combined SLR and questionnaire survey indicate that real-time communication and coordination, knowledge acquisition, expert feedback, and information sharing are the key factors that motivate social computing adoption in GSD projects. The results of t test (ie, t =.558, P =.589) show that there is no significant difference between the findings of SLR and questionnaire. The results of this study suggest the need for developing social computing strategies and policies to guide the strategic adoption of social computing tools in GSD projects.
Niyato, D, Hoang, DT, Wang, P & Han, Z 2017, 'Cyber Insurance for Plug-In Electric Vehicle Charging in Vehicle-to-Grid Systems', IEEE Network, vol. 31, no. 2, pp. 38-46.
View/Download from: Publisher's site
View description>>
© 1986-2012 IEEE. V2G systems bring many benefits to power systems in stabilizing energy demand and supply fluctuations as well as to PEV users in reducing energy costs. To achieve the maximum efficiency of V2G systems, data communication plays an important role. However, it is subject to cyber attack and failure, which hinder the effectiveness of V2G systems. In this article, we introduce a novel concept of using cyber insurance to transfer cyber risk from a user to a third party in PEV charging. We first introduce V2G systems and briefly discuss the cyber risks. Additionally, the basic concepts of cyber insurance are presented. We then introduce the use of cyber insurance to remove the risk of paying high energy costs of PEV charging due to the unavailability of data communication. We show that the PEV user can achieve the maximum benefit in deciding to charge its PEV and to buy insurance.
Pham, TT, Moore, ST, Lewis, SJG, Nguyen, DN, Dutkiewicz, E, Fuglevand, AJ, McEwan, AL & Leong, PHW 2017, 'Freezing of Gait Detection in Parkinson's Disease: A Subject-Independent Detector Using Anomaly Scores', IEEE Transactions on Biomedical Engineering, vol. 64, no. 11, pp. 2719-2728.
View/Download from: Publisher's site
View description>>
© 2012 IEEE. Freezing of gait (FoG) is common in Parkinsonian gait and strongly relates to falls. Current clinical FoG assessments are patients' self-report diaries and experts' manual video analysis. Both are subjective and yield moderate reliability. Existing detection algorithms have been predominantly designed in subject-dependent settings. In this paper, we aim to develop an automated FoG detector for subject independent. After extracting highly relevant features, we apply anomaly detection techniques to detect FoG events. Specifically, feature selection is performed using correlation and clusterability metrics. From a list of 244 feature candidates, 36 candidates were selected using saliency and robustness criteria. We develop an anomaly score detector with adaptive thresholding to identify FoG events. Then, using accuracy metrics, we reduce the feature list to seven candidates. Our novel multichannel freezing index was the most selective across all window sizes, achieving sensitivity (specificity) of 96% (79%). On the other hand, freezing index from the vertical axis was the best choice for a single input, achieving sensitivity (specificity) of 94% (84%) for ankle and 89% (94%) for back sensors. Our subject-independent method is not only significantly more accurate than those previously reported, but also uses a much smaller window (e.g., 3 s versus 7.5 s) and/or lower tolerance (e.g., 0.4 s versus 2 s).
Qiao, M, Xu, RYD, Bian, W & Tao, D 2017, 'Fast Sampling for Time-Varying Determinantal Point Processes', ACM Transactions on Knowledge Discovery from Data, vol. 11, no. 1, pp. 1-24.
View/Download from: Publisher's site
View description>>
Determinantal Point Processes (DPPs) are stochastic models which assign each subset of a base dataset with a probability proportional to the subset’s degree of diversity. It has been shown that DPPs are particularly appropriate in data subset selection and summarization (e.g., news display, video summarizations). DPPs prefer diverse subsets while other conventional models cannot offer. However, DPPs inference algorithms have a polynomial time complexity which makes it difficult to handle large and time-varying datasets, especially when real-time processing is required. To address this limitation, we developed a fast sampling algorithm for DPPs which takes advantage of the nature of some time-varying data (e.g., news corpora updating, communication network evolving), where the data changes between time stamps are relatively small. The proposed algorithm is built upon the simplification of marginal density functions over successive time stamps and the sequential Monte Carlo (SMC) sampling technique. Evaluations on both a real-world news dataset and the Enron Corpus confirm the efficiency of the proposed algorithm.
Qin, C, Ni, W, Tian, H & Liu, RP 2017, 'Fronthaul Load Balancing in Energy Harvesting Powered Cloud Radio Access Networks', IEEE Access, vol. 5, pp. 7762-7775.
View/Download from: Publisher's site
View description>>
© 2013 IEEE. Enhanced with wireless power transfer capability, cloud radio access network (C-RAN) enables energy-restrained mobile devices to function uninterruptedly. Beamforming of C-RAN has potential to improve the efficiency of wireless power transfer, in addition to transmission data rates. In this paper, we design the beamforming jointly for data transmission and energy transfer, under finite fronthaul capacity of C-RAN. A non-convex problem is formulated to balance the fronthaul requirements of different remote radio heads (RRHs). Norm approximations and relaxations are carried out to convexify the problem to second-order cone programming (SOCP). To improve the scalability of the design to large networks, we further decentralize the SOCP problem using the alternating direction multiplier method (ADMM). A series of reformulations and transformations are conducted, such that the resultant problem conforms to the state-of-The-Art ADMM solver and can be efficiently solved in real time. Simulation results show that the distributed algorithm can remarkably reduce the time complexity without compromising the fronthaul load balancing of its centralized counterpart. The proposed algorithms can also reduce the fronthaul bandwidth requirements by 25% to 50%, compared with the prior art.
Qin, C, Ni, W, Tian, H & Liu, RP 2017, 'Joint Rate Maximization of Downlink and Uplink in Multiuser MIMO SWIPT Systems', IEEE Access, vol. 5, pp. 3750-3762.
View/Download from: Publisher's site
View description>>
© 2013 IEEE. Beamforming has the potential to improve the efficiency of simultaneous wireless information and power transfer (SWIPT) systems. Existing beamforming techniques have been focused on the downlink of SWIPT systems. In this paper, we optimize the beamformers and transmit duration to maximize the weighted sum rate of both the downlink and uplink in a multiuser multiple-input multiple-output (MIMO) SWIPT system. Specifically, we formulate and transform the problem into a weighted sum mean square error minimization, conduct difference of convex programming to decouple the downlink and uplink, and convert the problem to quadratic programming (QP), which can be solved iteratively in a centralized fashion. We also decentralize the QP problem using dual decompositions, and reduce the time-complexity without compromising the data rate. Moreover, our algorithms are extended to the case under imperfect channel state information. Confirmed by simulations, the proposed decentralization can dramatically reduce the time-complexity by orders of magnitude. The scalability of the proposed approach can be substantially enhanced to support medium to large networks.
Shi, S, Ni, W & Liu, RP 2017, 'Performance analysis of XOR two‐way relay with finite buffers and instant scheduling', IET Communications, vol. 11, no. 4, pp. 507-513.
View/Download from: Publisher's site
View description>>
© The Institution of Engineering and Technology 2017. This study investigates the performance of practical wireless exclusive OR (XOR) two-way relay (TWR) system, in which finite buffer, lossy wireless channels and non-negligible signalling overhead are considered. Specifically, the authors develop a new analytical model to explicitly characterise the transmissions of both the end-nodes and the relay. The impact of scheduling on the throughput, queuing delay, power consumption and buffer overflow probability of XOR-TWR is evaluated. Validated by simulations, the model can precisely quantify the performance of XOR-TWR and adequately allocate the relay's buffer adapting to the wireless link qualities and signalling overhead.
Sun, B, Guo, Y, Fang, G & Dutkiewicz, E 2017, 'An efficient dictionary refinement algorithm for multiple target counting and localization in wireless sensor networks', International Journal of Distributed Sensor Networks, vol. 13, no. 8, pp. 155014771772380-155014771772380.
View/Download from: Publisher's site
View description>>
Many applications provided by wireless sensor networks rely heavily on the location information of the monitored targets. Since the number of targets in the region of interest is limited, localization benefits from compressive sensing, sampling number can be greatly reduced. Despite many compressive sensing–based localization methods proposed, existing solutions are based on the assumption that all targets fall on a sampled and fixed grid, performing poorly when there are targets deviating from the grid. To address such a problem, in this article, we propose a dictionary refinement algorithm where the grid is iteratively adjusted to alleviate the deviation. In each iteration, the representation coefficient and the grid parameters are updated in turn. After several iterations, the measurements can be sparsely represented by the representation coefficient which indicates the number and locations of multiple targets. Extensive simulation results show that the proposed dictionary refinement algorithm achieves more accurate counting and localization compared to the state-of-the-art compressive sensing reconstruction algorithms.
Sun, H, Ding, C, Jones, B & Guo, YJ 2017, 'A Wideband Base Station Antenna Element With Stable Radiation Pattern and Reduced Beam Squint', IEEE Access, vol. 5, pp. 23022-23031.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper presents the design procedure, optimization strategy, theoretical analysis, and experimental results of a wideband dual-polarized base station antenna element with superior performance. The proposed antenna element consists of four electric folded dipoles arranged in an octagon shape that are excited simultaneously for each polarization. It provides ±45° slant-polarized radiation that meets all the requirements for base station antenna elements, including stable radiation patterns, low cross polarization level, high port-to-port isolation, and excellent matching across the wide band. The problem of beam squint for beam-tilted arrays is discussed and it is found that the geometry of this element serves to reduce beam squint. Experimental results show that this element has a wide bandwidth of 46.4% from 1.69 to 2.71 GHz with ≥15-dB return loss and 9.8 ± 0.9-dBi gain. Across this wide band, the variations of the half-power-beamwidths of the two polarizations are all within 66.5° ± 5.5°, the port-to-port isolation is >28 dB, the cross-polarization discrimination is >25 dB, and most importantly, the beam squint is <4° with a maximum 10° down-tilt.
Sutton, GJ, Liu, RP & Guo, YJ 2017, 'Harmonising Coexistence of Machine Type Communications With Wi-Fi Data Traffic Under Frame-Based LBT', IEEE Transactions on Communications, vol. 65, no. 9, pp. 4000-4011.
View/Download from: Publisher's site
View description>>
© 1972-2012 IEEE. The existence of relatively long LTE data blocks within the licensed-assisted access (LAA) framework results in bursty machine-type communications (MTC) packet arrivals, which cause system performance degradation and present new challenges in Markov modeling. We develop an embedded Markov chain to characterize the dynamic behavior of the contention arising from bursty MTC and Wi-Fi data traffic in the LAA framework. Our theoretical model reveals a high-contention phenomenon caused by the bursty MTC traffic, and quantifies the resulting performance degradation for both MTC and Wi-Fi data traffic. The Markov model is further developed to evaluate three potential solutions aiming to alleviate the contention. Our analysis shows that simply expanding the contention window, although successful in reducing congestion, may cause unacceptable MTC data loss. A TDMA scheme instead achieves better MTC packet delivery and overall throughput, but requires centralized coordination. We propose a distributed scheme that randomly spreads the MTC access processes through the available time period. Our model results, validated by simulations, demonstrate that the random spreading solution achieves a near TDMA performance, while preserving the distributed nature of the Wi-Fi protocol. It alleviates the MTC traffic contention and improves the overall throughput by up to 10%.
Tong, X, Ji, Y, Lin, J, Zhu, J, Sun, F, Zhong, Y, Yang, Y & Zhu, X 2017, 'Cooperative spectrum sensing based on a modified shuffled frog leaping algorithm in 5G network', Physical Communication, vol. 25, no. Part 2, pp. 438-444.
View/Download from: Publisher's site
View description>>
© 2017 Elsevier B.V. The explosion of different types of wireless communications is leading to an impending spectrum famine. As a result, spectrum sensing has gained increasing interest from governments, industry and regulators. In this paper, a novel approach for cooperative spectrum sensing is proposed based on a modified shuffled frog leaping algorithm (SFLA). This approach is to fuse the perceived results of multiple nodes, and to improve the detection reliability. Simulations are used to compare the performance of the modified SFLA to the conventional one. The performance of the proposed cooperative spectrum sensing method based on the modified SFLA and that of the cooperative spectrum sensing method using modified deflection coefficient (MDC) are also compared. Results show that the proposed SFLA outperforms the traditional SFLA, and the proposed cooperative spectrum sensing method based on the modified SFLA gives higher miss detection probability than the MDC-based method, which validates the effectiveness of the modified SFLA-based cooperative sensing method.
Tong, X, Yang, Y, Zhong, Y, Zhu, X, Lin, J & Dutkiewicz, E 2017, 'Design of an On-Chip Highly Sensitive Misalignment Sensor in Silicon Technology', IEEE Sensors Journal, vol. 17, no. 5, pp. 1211-1212.
View/Download from: Publisher's site
View description>>
© 2016 IEEE. Advanced micromachining technology has made magnificent progress for fabrication of non-planar circuits. Using this technology, circuits and systems can be implemented in a more cost-effective way. Unlike the conventional planar circuit, low-cost and highly sensitive misalignment sensor is required to detect imperfect placement of different micro-devices, which may be of the order of sub-micrometers. Currently, this is hardly to be achieved by using the existing approaches. In this letter, we present a novel sensor design approach utilizing the parasitic capacitance of an integrated coupled-line resonator for misalignment sensing. Due to vertical misalignment between two metal strips, the parasitic capacitance of the sensor varies, which results in a resonance shift from 53 to 68 GHz, while a reasonably strong transmission notch is still maintained. Taking advantage of this principle, misalignment can be effectively detected. To prove the concept, several devices are fabricated in a standard silicon technology. Three samples with the same structure are used to evaluate the reliability, while eight different structures are used to verify the concept. All results are extensively validated through both simulation and measurements.
Tuyen Le, A, Tran, LC & Huang, X 2017, 'Cyclostationary Analysis of Analog Least Mean Square Loop for Self-Interference Cancellation in In-Band Full-Duplex Systems', IEEE Communications Letters, vol. 21, no. 12, pp. 2738-2741.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Analog least mean square (ALMS) loop is a promising mechanism to suppress self-interference (SI) in an in-band full-duplex (IBFD) system. In this letter, a general solution for the weighting error function is derived to investigate the performance of the ALMS loop employed in any IBFD system. The solution is then applied to IBFD systems with single carrier and multicarrier signaling. Due to the cyclostationary property of the transmitted signal, the weighting error function in the multicarrier system varies more significantly than in the single carrier. Therefore, if the ALMS loop can perfectly mimic the SI channel, SI in the single carrier system can be suppressed to a much smaller level than that in the multi-carrier counterpart.
Unanue, IJ, Borzeshi, EZ & Piccardi, M 2017, 'Recurrent neural networks with specialized word embeddings for health-domain named-entity recognition', Journal of Biomedical Informatics, vol. 76, no. December 2017, pp. 102-109.
View/Download from: Publisher's site
View description>>
Background. Previous state-of-the-art systems on Drug Name Recognition (DNR)and Clinical Concept Extraction (CCE) have focused on a combination of text'feature engineering' and conventional machine learning algorithms such asconditional random fields and support vector machines. However, developing goodfeatures is inherently heavily time-consuming. Conversely, more modern machinelearning approaches such as recurrent neural networks (RNNs) have provedcapable of automatically learning effective features from either randomassignments or automated word 'embeddings'. Objectives. (i) To create a highlyaccurate DNR and CCE system that avoids conventional, time-consuming featureengineering. (ii) To create richer, more specialized word embeddings by usinghealth domain datasets such as MIMIC-III. (iii) To evaluate our systems overthree contemporary datasets. Methods. Two deep learning methods, namely theBidirectional LSTM and the Bidirectional LSTM-CRF, are evaluated. A CRF modelis set as the baseline to compare the deep learning systems to a traditionalmachine learning approach. The same features are used for all the models.Results. We have obtained the best results with the Bidirectional LSTM-CRFmodel, which has outperformed all previously proposed systems. The specializedembeddings have helped to cover unusual words in DDI-DrugBank and DDI-MedLine,but not in the 2010 i2b2/VA IRB Revision dataset. Conclusion. We present astate-of-the-art system for DNR and CCE. Automated word embeddings has allowedus to avoid costly feature engineering and achieve higher accuracy.Nevertheless, the embeddings need to be retrained over datasets that areadequate for the domain, in order to adequately cover the domain-specificvocabulary.
Wang, H, Nguyen, DN, Dutkiewicz, E, Fang, G & Mueck, MD 2017, 'Negotiable Auction Based on Mixed Graph: A Novel Spectrum Sharing Framework', IEEE Transactions on Cognitive Communications and Networking, vol. 3, no. 3, pp. 390-403.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Auction-based spectrum sharing is a promising solution to improve the spectrum utilization in 5G networks. Along with the spatial reuse, we observe that the ability to adjust the coverage of a spectrum bidder can provide room to itself for further negotiation while auctioning. In this paper, we propose a novel economic tool, size-negotiable auction mechanism (SNAM), which provides a hybrid solution between auction and negotiation for multi-buyers sharing spectrum chunks from a common database. Unlike existing auction-based spectrum sharing models, each bidder of the SNAM submits its bid for using the spectrum per unit space and a set of coverage ranges over which the bidder is willing to pay for the spectrum. The auctioneer then coordinates the interference areas (or coverage negotiation) to ensure no two winners interfere with each other while aiming to maximize the auction's total coverage area or revenue. In this scenario, the undirected graph used by existing auction mechanisms fails to model the interference among bidders. Instead, we construct a mixed interference graph and prove that SNAM's auctioning on the mixed graph is truthful and individually rational. Simulation results show that, compared with existing auction approaches, the proposed SNAM dramatically improves the spatial efficiency, hence leads to significantly higher seller revenue and buyer satisfaction under various setups. Thanks to its low complexity and low overhead, SNAM can target fine timescale trading (in minutes or hours) with a large number of bidders and requested coverages.
Wang, TQ, Li, H & Huang, X 2017, 'Diversity Combining for Layered Asymmetrically Clipped Optical OFDM Using Soft Successive Interference Cancellation', IEEE Communications Letters, vol. 21, no. 6, pp. 1309-1312.
View/Download from: Publisher's site
View description>>
© 1997-2012 IEEE. In this letter, we present a novel diversity combining receiver for demodulating layered asymmetrically clipped optical orthogonal frequency division multiplexing. The receiver consists of a soft successive interference cancellation (SIC) module which cancels the inter-layer interference (ILI) using the minimum mean square error (MMSE) estimates of the information symbols, and a diversity combining module which extracts the diversity components from the clipping noise. We show that the soft SIC module alone can effectively suppress the ILI, leading to bit error rates (BERs) resembling those of a genie receiver which is free of error propagation. It is also shown that the diversity combining receiver which combines the MMSE estimates with their diversity components outperforms the genie receiver by up to 2 dB at the BER of 10-6.
Wang, Y, Liu, J, Li, Y, Fu, J, Xu, M & Lu, H 2017, 'Hierarchically Supervised Deconvolutional Network for Semantic Video Segmentation', Pattern Recognition, vol. 64, pp. 437-445.
View/Download from: Publisher's site
View description>>
© 2016 Elsevier Ltd.Semantic video segmentation is a challenging task of fine-grained semantic understanding of video data. In this paper, we present a jointly trained deep learning framework to make the best use of spatial and temporal information for semantic video segmentation. Along the spatial dimension, a hierarchically supervised deconvolutional neural network (HDCNN) is proposed to conduct pixel-wise semantic interpretation for single video frames. HDCNN is constructed with convolutional layers in VGG-net and their mirrored deconvolutional structure, where all fully connected layers are removed. And hierarchical classification layers are added to multi-scale deconvolutional features to introduce more contextual information for pixel-wise semantic interpretation. Besides, a coarse-to-fine training strategy is adopted to enhance the performance of foreground object segmentation in videos. Along the temporal dimension, we introduce Transition Layers upon the structure of HDCNN to make the pixel-wise label prediction consist with adjacent pixels across space and time domains. The learning process of the Transition Layers can be implemented as a set of extra convolutional calculations connected with HDCNN. These two parts are jointly trained as a unified deep network in our approach. Thorough evaluations are performed on two challenging video datasets, i.e., CamVid and GATECH. Our approach achieves state-of-the-art performance on both of the two datasets.
Wong, S-W, Deng, F, Wu, Y-M, Lin, J-Y, Zhu, L, Chu, Q-X & Yang, Y 2017, 'Individually Frequency Tunable Dual- and Triple-band Filters in a Single Cavity', IEEE Access, vol. 5, pp. 11615-11625.
View/Download from: Publisher's site
View description>>
© 2013 IEEE. This paper presents a new class of second-order individually and continuously tunable dual- and triple-band bandpass filters in a single metal cavity. Each passband is realized by two identical metal posts. These dual- and triple-band tunable filters are achieved by putting two or three identical sets of metal-post pair in a single metal cavity. Metal screws are co-designed as a part of the metal posts to control their insertion depth inside the cavity. In this way, the resonant frequencies can be continuously controlled and designed at the desired frequency bands. Moreover, the distance between the two metal posts in a post pair can be freely tuned. Thus, the external quality factor (Qe) and coupling coefficient (k) between the adjacent modes can be easily adjusted to meet the specified requirement in synthesis design. At the bottom of the cavity, some grooves are used to extend the tunable frequency range and make the resonant frequency linearly varied with the height of the metal post. The center frequency of each passband can be independently tuned with a frequency range of 0.8-3.2 GHz and tunable ratio of 4. Finally, the continuously tunable dual- and triple-band bandpass filters prototypes with second order response are designed and fabricated, of which each passband can be individually tuned with a large tuning range.
Wu, G, Liu, RP, Ni, W, Sutton, GJ & Xu, P 2017, 'Modeling Channel Switching and Contention Control in Vehicular Networks', IEEE Access, vol. 5, pp. 23102-23110.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In vehicular networks, multi-channel operation standard IEEE 1609.4 is designed for vehicular communications across multiple channels. It has been revealed that such multi-channel operations may result in high contention in vehicular communications. However, existing analytical models are unable to capture the dynamic characteristic during channel switching. We develop a novel Markov model that takes into account the dynamic contention behavior during channel switching. In particular, our model reveals the high contention caused by the burst arrivals, which are the results of multi-channel operations. To combat such performance decline, we propose two solutions, a centralized equal-spaced algorithm and a distributed random-spaced algorithm. The key idea is to disperse the burst packet arrivals across the available timeframe in order to alleviate contention. Our model, validated by simulations, accurately characterizes the high contention caused by multi-channel operations. Our results demonstrate our proposed solutions can effectively mitigate packet collision, enhance reliability, and improve system throughput during the multi-channel operations.
Xu, Z, Yan, J, Xu, RY & Mei, L 2017, 'Guest Editorial: Visual Multimedia Learning from Big Surveillance Data', Multimedia Tools and Applications, vol. 76, no. 13, pp. 14557-14557.
View/Download from: Publisher's site
Xuan, J, Lu, J, Zhang, G, Xu, RYD & Luo, X 2017, 'A Bayesian nonparametric model for multi-label learning', Machine Learning, vol. 106, no. 11, pp. 1787-1815.
View/Download from: Publisher's site
View description>>
© 2017, The Author(s). Multi-label learning has become a significant learning paradigm in the past few years due to its broad application scenarios and the ever-increasing number of techniques developed by researchers in this area. Among existing state-of-the-art works, generative statistical models are characterized by their good generalization ability and robustness on large number of labels through learning a low-dimensional label embedding. However, one issue of this branch of models is that the number of dimensions needs to be fixed in advance, which is difficult and inappropriate in many real-world settings. In this paper, we propose a Bayesian nonparametric model to resolve this issue. More specifically, we extend a Gamma-negative binomial process to three levels in order to capture the label-instance-feature structure. Furthermore, a mixing strategy for Gamma processes is designed to account for the multiple labels of an instance. The mixed process also leads to a difficulty in model inference, so an efficient Gibbs sampling inference algorithm is then developed to resolve this difficulty. Experiments on several real-world datasets show the performance of the proposed model on multi-label learning tasks, comparing with three state-of-the-art models from the literature.
Xuan, J, Lu, J, Zhang, G, Xu, RYD & Luo, X 2017, 'Bayesian Nonparametric Relational Topic Model through Dependent Gamma Processes', IEEE Transactions on Knowledge and Data Engineering, vol. 29, no. 7, pp. 1357-1369.
View/Download from: Publisher's site
View description>>
© 2016 IEEE. Traditional relational topic models provide a successful way to discover the hidden topics from a document network. Many theoretical and practical tasks, such as dimensional reduction, document clustering, and link prediction, could benefit from this revealed knowledge. However, existing relational topic models are based on an assumption that the number of hidden topics is known a priori, which is impractical in many real-world applications. Therefore, in order to relax this assumption, we propose a nonparametric relational topic model using stochastic processes instead of fixed-dimensional probability distributions in this paper. Specifically, each document is assigned a Gamma process, which represents the topic interest of this document. Although this method provides an elegant solution, it brings additional challenges when mathematically modeling the inherent network structure of typical document network, i.e., two spatially closer documents tend to have more similar topics. Furthermore, we require that the topics are shared by all the documents. In order to resolve these challenges, we use a subsampling strategy to assign each document a different Gamma process from the global Gamma process, and the subsampling probabilities of documents are assigned with a Markov Random Field constraint that inherits the document network structure. Through the designed posterior inference algorithm, we can discover the hidden topics and its number simultaneously. Experimental results on both synthetic and real-world network datasets demonstrate the capabilities of learning the hidden topics and, more importantly, the number of topics.
Yang, T, Yang, L, Guo, YJ & Yuan, J 2017, 'A Non-Orthogonal Multiple-Access Scheme Using Reliable Physical-Layer Network Coding and Cascade-Computation Decoding', IEEE Transactions on Wireless Communications, vol. 16, no. 3, pp. 1633-1645.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper studies non-orthogonal transmission over a K -user fading multiple access channel. We propose a new reliable physical-layer network coding and cascade-computation decoding scheme. In the proposed scheme, K single-antenna users encode their messages by the same practical channel code and QAM modulation, and transmit simultaneously. The receiver chooses K linear coefficient vectors and computes the associated K layers of finite-field linear message combinations in a cascade manner. Finally, the K users' messages are recovered by solving the K linear equations. The proposed can be regarded as a generalized onion peeling. We study the optimal network coding coefficient vectors used in the cascade computation. Numerical results show the performance of the proposed approaches that of the iterative maximum a posteriori probability detection and decoding scheme, but without using receiver iteration. This results in considerable complexity reduction, processing delay, and easier implementation. Our proposed scheme significantly outperforms the iterative detection and decoding scheme with a single iteration, for example, by 1.7 dB for the two user case. The proposed scheme provides a competitive solution for non-orthogonal multiple access.
Yang, Y, Liu, H, Hou, ZJ, Zhu, X, Dutkiewicz, E & Xue, Q 2017, 'Compact On-Chip Bandpass Filter With Improved In-Band Flatness and Stopband Attenuation in 0.13- $\mu \text{m}$ (Bi)-CMOS Technology', IEEE Electron Device Letters, vol. 38, no. 10, pp. 1359-1362.
View/Download from: Publisher's site
View description>>
© 1980-2012 IEEE. In this letter, an on-chip miniaturized bandpass filter (BPF) is presented, which is based on a grounded center-Tapped ring resonator (CTRR) with shunt capacitive loading. To analyze the principle of this design, a simple but effective equivalent circuit model is provided. Using this model, it is easy to show that the CTRR-based approach has a potential to generate two transmission poles within the passband. Compared with the conventional single-pole-based approach, this dual-pole design not only possesses a flexibility of controlling the passband width, but also has better flatness of insertion loss in the passband. In addition, this approach is able to significantly improve the stopband performance. To further demonstrate the feasibility of this approach in practice, the structure is implemented and fabricated in a commercial 0.13-μ (Bi)-CMOS SiGe technology. The measured results show that the BPF has a center frequency at 33 GHz with a bandwidth of 42.4%. The minimum insertion loss is 2.6 dB, while the stopband rejection is maintained to be better than 20 dB beyond 58 GHz. The chip, excluding the pads, is very compact at only 0.03 mm2 (0.11 × 0.28 mm2.
Yang, Y, Simorangkir, RBVB, Zhu, X, Esselle, K & Xue, Q 2017, 'A Novel Boresight and Conical Pattern Reconfigurable Antenna With the Diversity of 360° Polarization Scanning', IEEE Transactions on Antennas and Propagation, vol. 65, no. 11, pp. 5747-5756.
View/Download from: Publisher's site
View description>>
© 1963-2012 IEEE. A novel design of boresight and conical pattern reconfigurable antenna with the capability of 360° polarization scanning is presented in this paper. At boresight mode, the antenna produces a continuously reconfigurable polarization over 360° in the azimuth plane, which provides adaptive-polarization reception between a transmitter and a receiver. The antenna is analyzed in terms of the electric field with an explanation of the generation of TM11 and TM02 resonant modes, which provides an innovative method of designing pattern reconfigurable antennas for the WLAN applications. The proposed method is validated by a good agreement between simulation and experimental results for an antenna designed to provide boresight and conical pattern switching at 2.4 GHz. The gain of 6.05 dBi and efficiency of 86.7% are measured in the boresight mode, corresponding to 4.39 dBi and 82.4% at conical mode.
Yang, Y, Zhu, X, Dutkiewicz, E & Xue, Q 2017, 'Design of a Miniaturized On-Chip Bandpass Filter Using Edge-Coupled Resonators for Millimeter-Wave Applications', IEEE Transactions on Electron Devices, vol. 64, no. 9, pp. 3822-3828.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. A unique miniaturization technique for on-chip passive device implemented in gallium arsenide (GaAs)-based technology is presented, which is based on edge-coupled cells (ECCs). The principle of an ECC is first studied by means of the equivalent LC circuits. Then, using the ECC as a baseline, a combination of different shorting-ground and tapping methods is fully investigated in terms of their impact on frequency responses. By directly shorting the specific edge-coupled fingers to the ground, an ECC can be converted into a resonator without increasing any physical size. To further demonstrate the feasibility of using this technique for miniaturized monolithic microwave integrated circuit design, an on-chip bandpass filter (BPF) is implemented and fabricated in a commercial 0.1-μ m GaAs technology. The measurement results show that the 3-dB bandwidth of the filter is from 21.2 to 26.5 GHz, while the insertion loss is less than 2.9 dB at 23 GHz. In addition, more than 30 dB of suppression is achieved from 0 to 15 GHz and from 44 to 54 GHz. The size of the BPF is only 640 × 280 μ m2, excluding the pads, which is equivalent to 0.17 × 0.08 λg2. (λg is the guided wavelength at 23.5 GHz.)
Yao, Y, Zhang, J, Shen, F, Hua, X, Xu, J & Tang, Z 2017, 'A new web-supervised method for image dataset constructions', Neurocomputing, vol. 236, pp. 23-31.
View/Download from: Publisher's site
View description>>
© 2017 The goal of this work is to automatically collect a large number of highly relevant natural images from Internet for given queries. A novel automatic image dataset construction framework is proposed by employing multiple query expansions. In specific, the given queries are first expanded by searching in the Google Books Ngrams Corpora to obtain a richer semantic descriptions, from which the visually non-salient and less relevant expansions are then filtered. After retrieving images from the Internet with filtered expansions, we further filter noisy images by clustering and progressively Convolutional Neural Networks (CNN) based methods. To evaluate the performance of our proposed method for image dataset construction, we build an image dataset with 10 categories. We then run object detections on our image dataset with three other image datasets which were constructed by weak supervised, web supervised and full supervised learning, the experimental results indicated the effectiveness of our method is superior to weak supervised and web supervised state-of-the-art methods. In addition, we do a cross-dataset classification to evaluate the performance of our dataset with two publically available manual labelled dataset STL-10 and CIFAR-10.
Zha, X, Ni, W, Zheng, K, Liu, RP & Niu, X 2017, 'Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution', IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2261-2275.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Challenges of authentication in decentralized mobile networks arise from frequently changing topologies and unreliable contention-based transmissions. We propose a new protocol to speed up authentications, reduce communication costs, and support opportunistic routing under fast-changing topologies. Key pairs are predistributed across the network. Nodes that predistributed the same pair can instantly verify and route messages for each other in an opportunistic and cooperative fashion, combating fast-changing topologies. We also enable a node to increasingly combine unauthenticated messages and a new message for signature or message authentication code generation, while trying different keys on-the-fly. The messages can be verified altogether, once a key is matched. The communication overhead, thus, becomes independent of the number of keys tried. Closed-form expressions for authentication rate, delay, and throughput are derived through a new three-dimensional Markov model. Validated by simulations, analytical results corroborate the robustness of the proposed protocol against changing topologies, as well as the substantially improved resistance to collusion attacks, as compared with the state of the art.
Zhang, T, Cai, Z, Yang, Y, Bao, J & Wang, Y 2017, 'Compact tunable lowpass filter with sharp roll‐off and low insertion loss', Microwave and Optical Technology Letters, vol. 59, no. 10, pp. 2619-2623.
View/Download from: Publisher's site
View description>>
AbstractA novel continuously tunable lowpass filter (LPF) with compact size, sharp roll‐off and low insertion loss is presented in this paper. The filter employs two varactor diodes, a pair of open‐ended coupled lines and a U‐shape step impedance line (SIL) with an open‐ended stub loaded at the center of the SIL to form a very compact layout. The odd‐ and even‐mode analysis and equivalent circuit model are demonstrated for estimation of the transmission characteristics. Tuning the DC voltage applied on the varactor diodes, the varactor capacitance accordingly changes leading to a varying cutoff frequency fc. The measured results show that the achieved 3‐dB fc tuning range is 60.6% (1.15–2.15 GHz). The measured insertion loss (IL) and roll‐off rate are 0.2‐0.4 dB and 50–73 dB/GHz, respectively. The overall size of the LPF is only 0.005λg2, which shows a competitive advantage comparing with the state‐of‐the‐art work.
Zhang, T, Jia, W, He, X & Yang, J 2017, 'Discriminative Dictionary Learning With Motion Weber Local Descriptor for Violence Detection', IEEE Transactions on Circuits and Systems for Video Technology, vol. 27, no. 3, pp. 696-709.
View/Download from: Publisher's site
View description>>
© 1991-2012 IEEE. Automatic violence detection from video is a hot topic for many video surveillance applications. However, there has been little success in developing an algorithm that can detect violence in surveillance videos with high performance. In this paper, following our recently proposed idea of motion Weber local descriptor (WLD), we make two major improvements and propose a more effective and efficient algorithm for detecting violence from motion images. First, we propose an improved WLD (IWLD) to better depict low-level image appearance information, and then extend the spatial descriptor IWLD by adding a temporal component to capture local motion information and hence form the motion IWLD. Second, we propose a modified sparse-representation-based classification model to both control the reconstruction error of coding coefficients and minimize the classification error. Based on the proposed sparse model, a class-specific dictionary containing dictionary atoms corresponding to the class labels is learned using class labels of training samples. With this learned dictionary, not only the representation residual but also the representation coefficients become discriminative. A classification scheme integrating the modified sparse model is developed to exploit such discriminative information. The experimental results on three benchmark data sets have demonstrated the superior performance of the proposed approach over the state of the arts.
Zhang, T, Jia, W, Yang, B, Yang, J, He, X & Zheng, Z 2017, 'MoWLD: a robust motion image descriptor for violence detection', Multimedia Tools and Applications, vol. 76, no. 1, pp. 1419-1438.
View/Download from: Publisher's site
View description>>
© 2015, Springer Science+Business Media New York. Automatic violence detection from video is a hot topic for many video surveillance applications. However, there has been little success in designing an algorithm that can detect violence in surveillance videos with high performance. Existing methods typically apply the Bag-of-Words (BoW) model on local spatiotemporal descriptors. However, traditional spatiotemporal features are not discriminative enough, and also the BoW model roughly assigns each feature vector to only one visual word and therefore ignores the spatial relationships among the features. To tackle these problems, in this paper we propose a novel Motion Weber Local Descriptor (MoWLD) in the spirit of the well-known WLD and make it a powerful and robust descriptor for motion images. We extend the WLD spatial descriptions by adding a temporal component to the appearance descriptor, which implicitly captures local motion information as well as low-level image appear information. To eliminate redundant and irrelevant features, the non-parametric Kernel Density Estimation (KDE) is employed on the MoWLD descriptor. In order to obtain more discriminative features, we adopt the sparse coding and max pooling scheme to further process the selected MoWLDs. Experimental results on three benchmark datasets have demonstrated the superiority of the proposed approach over the state-of-the-arts.
Zhao, Y, Di, H, Zhang, J, Lu, Y, Lv, F & Li, Y 2017, 'Region-based Mixture Models for human action recognition in low-resolution videos', Neurocomputing, vol. 247, pp. 1-15.
View/Download from: Publisher's site
View description>>
© 2017 State-of-the-art performance in human action recognition is achieved by the use of dense trajectories which are extracted by optical flow algorithms. However, optical flow algorithms are far from perfect in low-resolution (LR) videos. In addition, the spatial and temporal layout of features is a powerful cue for action discrimination. While, most existing methods encode the layout by previously segmenting body parts which is not feasible in LR videos. Addressing the problems, we adopt the Layered Elastic Motion Tracking (LEMT) method to extract a set of long-term motion trajectories and a long-term common shape from each video sequence, where the extracted trajectories are much denser than those of sparse interest points (SIPs); then we present a hybrid feature representation to integrate both of the shape and motion features; and finally we propose a Region-based Mixture Model (RMM) to be utilized for action classification. The RMM encodes the spatial layout of features without any needs of body parts segmentation. Experimental results show that the approach is effective and, more importantly, the approach is more general for LR recognition tasks.
Zhong, Y, Yang, Y, Zhu, X, Dutkiewicz, E, Shum, KM & Xue, Q 2017, 'An On-Chip Bandpass Filter Using a Broadside-Coupled Meander Line Resonator With a Defected-Ground Structure', IEEE Electron Device Letters, vol. 38, no. 5, pp. 626-629.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. An on-chip bandpass filter (BPF) is designed and fabricated in a 0.13-μm SiGe (Bi)-CMOS technology. This BPF consists of a broadside-coupled meander-line resonator (BCMLR) in conjunction with a defected-ground structure (DGS). By simply grounding a BCMLR, the resonator can be converted into a BPF. Further applying a DGS to this BPF, an additional transmission zero can be generated in the high-frequency band. To understand the fundamentals of this design, an $LC$-equivalent circuit is given for investigation of the transmission zeros and poles. The measured results show that the BPF has a center frequency at 33 GHz with a bandwidth of 18%. The minimum insertion loss is 2.6 dB, while the maximum stopband attenuation is 44 dB. The chip size, excluding the pads, is only 0.038 mm2 ( 0.126×0.3 mm2).
Zhong, Y, Yang, Y, Zhu, X, Dutkiewicz, E, Zhou, Z & Jiang, T 2017, 'Device-Free Sensing for Personnel Detection in a Foliage Environment', IEEE Geoscience and Remote Sensing Letters, vol. 14, no. 6, pp. 921-925.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this letter, the possibility of using device-free sensing (DFS) technology for personnel detection in a foliage environment is investigated. Although the conventional algorithm that based on statistical properties of the received-signal strength (RSS) for target detection at indoor or open-field environment has come a long way in recent years, it is still questionable if this algorithm is fully functional at outdoor with the changing atmosphere and ground conditions, such as a foliage environment. To answer this question, a variety of the measured data have been taken using different targets in a foliage environment. Applying these data along with support vector machine, the impact on detection accuracy due to different classification algorithms is studied. An algorithm that based on the extraction of the high-order cumulant (HOC) of the signals is presented, while the conventional RSS-based one is used as a benchmark. The measurement results show that the classification accuracy of the HOC-based algorithm is better than the RSS-based one by at least 17%. Moreover, to ensure the reliability of the HOC-based approach, the impact on classification accuracy due to different numbers of training samples and different values of signal-to-noise ratio is extensively verified using experimentally recorded samples. To the best of our knowledge, this is the first time that a DFS-based sensing approach is demonstrated to have a potential to distinguish between human and small-animal targets in a foliage environment.
Zhou, Y, Ni, W, Zheng, K, Liu, RP & Yang, Y 2017, 'Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks', Security and Communication Networks, vol. 2017, pp. 1-13.
View/Download from: Publisher's site
View description>>
Exploiting software-defined networking techniques, randomly and instantly mutating routes can disguise strategically important infrastructure and protect the integrity of data networks. Route mutation has been to date formulated as NP-complete constraint satisfaction problem where feasible sets of routes need to be generated with exponential computational complexities, limiting algorithmic scalability to large-scale networks. In this paper, we propose a novel node-centric route mutation method which interprets route mutation as a signature matching problem. We formulate the route mutation problem as a three-dimensional earth mover’s distance (EMD) model and solve it by using a binary branch and bound method. Considering the scalability, we further propose that a heuristic method yields significantly lower computational complexities with marginal loss of robustness against eavesdropping. Simulation results show that our proposed methods can effectively disguise key infrastructure by reducing the difference of historically accumulative traffic among different switches. With significantly reduced complexities, our algorithms are of particular interest to safeguard large-scale networks.
Zhu, HL, Chung, KL, Ding, C, Wei, G, Zhang, C & Guo, YJ 2017, 'Polarization-Rotated Waveguide Antennas for Base-Station Applications', IEEE Antennas and Wireless Propagation Letters, vol. 16, pp. 1545-1548.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. A novel base-station antenna element is proposed. It consists of an artificial surface composed of parallel strips rotating in the polarization direction and a segment of a rectangular waveguide. The surface is designed on a single-sided substrate, which has the same area as the aperture of the waveguide. To achieve the polarization rotation, the parallel strips on the surface are rotated by 45° with respect to the orientation of the waveguide antenna. By adding the surface, the linear polarization direction of the rectangular waveguide antenna rotates by 45° to comply with the requirements of the cellular industry. To verify the simulation results, the proposed antenna was fabricated and measured. Results show that the antenna has an operating bandwidth from 698-960 MHz, where a stable radiation pattern is achieved.
Abeywickrama, HV, Jayawickrama, BA, He, Y & Dutkiewicz, E 1970, 'Algorithm for energy efficient inter-UAV collision avoidance', 2017 17th International Symposium on Communications and Information Technologies (ISCIT), 2017 17th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Cairns, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Unmanned Aerial Vehicles (UAV) are fast gaining popularity. Due to their many desired features, in the near future, UAVs will be an inevitable part of many fields. This increased use of UAVs, has given rise to the idea of multi-UAV systems, commonly known as UAV swarms, where a number of UAVs ranging from two to hundreds have to collaborate with each other and perform a common shared task or tasks. When sharing a common air space and flying in close proximity of each other, inter-UAV collision avoidance becomes an important factor in UAV swarms. Thus, for effective use of UAV swarms, it is essential to have an efficient inter-UAV collision avoidance mechanism. Although there are a number of suggested techniques, avoiding inter-UAV collisions while minimising the energy consumption of the UAV system is a challenge. In this paper, a Potential Field Method based algorithm to avoid collisions of a UAV system, considering the minimising of system energy usage, is suggested. We consider the energy consumption of a UAV system to depend on the distance travelled and the turns- A ngular changes, in trajectories. Our method reduces the angular changes in trajectories by an average of 36% and total travel distance by 6-8%. The total time taken to achieve targets is reduced by 3-14% depending on the scenario.
Aldebei, K, Farhood, H, Jia, W, Nanda, P & He, X 1970, 'Sequential and Unsupervised Document Authorial Clustering Based on Hidden Markov Model', 2017 IEEE Trustcom/BigDataSE/ICESS, 2017 IEEE Trustcom/BigDataSE/ICESS, IEEE, Sydney, pp. 379-385.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Document clustering groups documents of certain similar characteristics in one cluster. Document clustering has shown advantages on organization, retrieval, navigation and summarization of a huge amount of text documents on Internet. This paper presents a novel, unsupervised approach for clustering single-author documents into groups based on authorship. The key novelty is that we propose to extract contextual correlations to depict the writing style hidden among sentences of each document for clustering the documents. For this purpose, we build an Hidden Markov Model (HMM) for representing the relations of sequential sentences, and a two-level, unsupervised framework is constructed. Our proposed approach is evaluated on four benchmark datasets, widely used for document authorship analysis. A scientific paper is also used to demonstrate the performance of the approach on clustering short segments of a text into authorial components. Experimental results show that the proposed approach outperforms the state-of-the-art approaches.
Al-Doghman, F, Chaczko, Z & Jiang, J 1970, 'A Review of Aggregation Algorithms for the Internet of Things', 2017 25th International Conference on Systems Engineering (ICSEng), 2017 25th International Conference on Systems Engineering (ICSEng), IEEE, Piscataway, USA, pp. 480-487.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. The Internet of Things (IoT) epitomizes the upcoming eminent transition in the world’s economy and human lifestyle where people and various objects are correlated within networks. Data Aggregation is a technique which can be used to mitigate Big Data challenges within IoT. This paper provides an overview of various approaches for aggregation of data in IoT infrastructure. A new class of reliable Data Aggregation algorithm is discussed as well. This new class of algorithm uses a consensus based aggregation with fault tolerance methodology in Fog Computing. The new approach allows promoting adaptive behavior and more efficient delivery of the aggregation outcomes to the ascendant node(s). The proposed method is fault tolerant and deals with nodes reliability issues.
Alenazy, WM & Chaczko, Z 1970, 'ETAM towards ICT teaching and learning studio for interactive learning in Information and Communication Technology', 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), IEEE, Ohrid, Macedonia, pp. 1-11.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Recent advances in Information and Communication Technology (ICT) have stimulated the need for adaptation of new models of teaching and learning in educational institutions. Since the beginning, the use of technology in education has gained a lot of attention and has been applied to many areas in the academic domain. The introduction of ICT has motivated scholars to find out how various ICT tools could be deployed and efficiently used. Due to rapid changes in ICT, an extended TAM (ETAM) has been developed to highlight the demand for using advanced ICT tools in the education process. The idea is to support the acceptance of technology implementations by modifying the conventional model with the pre-acknowledgement of additional elements that reflect the state of art technological advances. These additional factors aim to increase the motivation acceptance levels by instructors and students alike towards ICT teaching and learning studio style.
Al-Manasia, M, Chaczko, Z & Ounzar, A 1970, 'AHRC: An Optimized Cache Associativity', Proceedings - 18th IEEE International Conference on High Performance Computing and Communications, 14th IEEE International Conference on Smart City and 2nd IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2016, IEEE International Conference on High Performance Computing and Communications, IEEE, Sydney, NSW, Australia, pp. 811-817.
View/Download from: Publisher's site
View description>>
Hardware resources require efficient scaling because the future of computing technology seems to be intensive multithreaded. One of the main challenges in the scalability of computers hardware is the hierarchy of the memory. Chip-multiprocessors (CMPs) rely on large and multi-level hierarchies of caches to reduce cost of resources and improve systems performance. These multi-level hierarchies are the ones, which also help to solve the issue of limited bandwidth and minimize the latency of the main memory. Almost half of the area of the chip and a large percentage of the system energy is used by caches. One of the main problems limiting the scalability of cache hierarchies is called cache associativity. Caches consume a lot of energy to implement associative lookups. This affects the performance of the system by reducing the efficiency of caches. This paper describes a new design of cache that we called - Adaptive Hashing and Replacement Cache (AHRC). This design has the ability of maintaining high associativity with an advanced method of replacement policy. AHRC can improve associativity and maintain the number of possible locations, where each block is kept as small as possible. Several workloads were simulated on a large-scale CMP with AHRC as the last-level cache. We propose an Adaptive Reuse Interval Prediction (ARIP) scheme for AHRC, which is superior to the NRU scheme that was described by Seznec. Results demonstrate that AHRC has better energy efficiency and higher performance as compared to conventional caches. Additionally, large caches that utilize AHRC are the most suitable in many core CMPs to provide a more significant improvement and scalability than the smaller caches. However, AHRC with a higher-level replacement may lead to loss of energy for workloads that are not sensitive to the policy governing the replacement process.
Alzughaibi, A & Chaczko, Z 1970, 'Human Detection Using Illumination Invariant Feature Extraction for Natural Scenes in Big Data Video Frames', 2017 25th International Conference on Systems Engineering (ICSEng), 2017 25th International Conference on Systems Engineering (ICSEng), IEEE, Las Vegas, NV, USA, pp. 443-450.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This research proposes a reliable machine learning based computational solution for human detection. The proposed model is specifically applicable for illumination-variant natural scenes in big data video frames. In order to solve the illumination variation problem, a new feature set is formed by extracting features using histogram of gradients (HoG) and linear phase quantization (LPQ) techniques, which are combined to form a single feature-set to describe features in illumination variant natural scenes. Pre-processing is applied to reduce the search space and improve results, and as the humans are in constant motion in the frames, a search space pruning algorithm is applied to reduce the search space and improve detection accuracy. Non-maximal suppression is also applied for improved performance. A Support Vector Machine (SVM) based classifier is used for fast and accurate detection. Most of the current state-of-the-art detectors face numerous problems including false, missed, and inaccurate detections. The proposed detector model shows good performance, which was validated using relevant UCF and CDW test data-sets. In order to compare the performance of the proposed methodology with the state-of-the-art detectors, some selected detected frames were chosen considering their Receiver Operating Characteristic (ROC) curves. These curves are plotted to compare and evaluate the results based on miss rates and true positives rates. The results show the proposed model achieves best results.
Antunes, N, Pipiras, V & Veitch, D 1970, 'Skampling for the Flow Duration Distribution', 2017 29th International Teletraffic Congress (ITC 29), 2017 29th International Teletraffic Congress (ITC 29), IEEE, Genoa, Italy, pp. 63-71.
View/Download from: Publisher's site
View description>>
© 2017 ITC Press. This paper concerns the problem of estimating the Internet flow duration distribution from indirect measurements due to network constraints. The aim is to estimate the distribution from observing: the possible superpositions (collisions) of sampled flow durations, the flow arrivals-to-departures times without identification of sampled flows and the number of sampled flows in progress. For each type of data available, we present estimators of the flow duration distribution, formulating the problem in queueing system terms. We also propose data streaming algorithms using sampling and sketching (through counters) to obtain the considered partial information from flows. At the core of this skampling (i.e. sampling and sketching) approach is the ability to tune the flow sampling probability for 'optimal' flow load onto sketch entries (queues). Finally, we present numerical results comparing the different estimators of the flow duration distribution using two real Internet traces.
Barua, S & Braun, R 1970, 'A Markovian Approach to the Mobility Management for the D2D Communication in 5G Cellular Network System', The Fifth Asia-Pacific.
Barua, S & Braun, R 1970, 'Mobility management of D2D communication for the 5G cellular network system: A study and result', 2017 17th International Symposium on Communications and Information Technologies (ISCIT), 2017 17th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Cairns, QLD, Australia, pp. 1-6.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Wireless devices connected to the networks have been increasing remarkably for the last couple of decades. Ubiquitous voice and data connection are the key requisite for the next generation of wireless technology. Device to Device communication is widely known as D2D communication which is a new paradigm of cellular communication, and it was initially proposed to boost the network performance. It takes place when two devices communicate directly without taking significant help from the base station. Similar to other wireless communication systems, mobility management for the D2D communication is a big challenge which is yet to explore properly. Mobility management of D2D communications was enlightened in few papers. It should be managed in such a smart way in a cellular network that should enable lower latency, lower power consumptions, less complexity and last but not the least possible uninterrupted data connections which are primarily the requirements of next generations mobile cellular network. This paper extends our algorithm paradigm of mobility management of D2D communication that was proposed and published previously. We come up with the simulation results in this paper that validate our proposed model. However, we also highlight the D2D communications and mobility issues within it.
Bashir, MR & Gill, AQ 1970, 'IoT enabled smart buildings: A systematic review', 2017 Intelligent Systems Conference (IntelliSys), 2017 Intelligent Systems Conference (IntelliSys), IEEE, London, UK, pp. 151-159.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. There is an increasing interest in the Internet of Things (IoT) enabled smart buildings. The main question is: What are the key challenges, which must be addressed to effectively manage and analyze the big data for IoT enabled smart buildings. There is a need for the systematic literature review to understand the challenges and the solutions to overcome such challenges. Using the SLR approach, 22 relevant studies were identified and reviewed in this paper. The data from these selected studies were extracted to identify the challenges and relevant solutions. The findings from this research paper will serve as a knowledge base for researchers and practitioners for conducting further research and development in this important area.
Basnet, S, Jayawickrama, BA, He, Y & Dutkiewicz, E 1970, 'Considering switching overhead for transmit power allocation for GAA in spectrum access system', 2017 17th International Symposium on Communications and Information Technologies (ISCIT), 2017 17th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Cairns, QLD, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. To enable spectrum sharing the Federal Communication Commission (FCC) has proposed the Spectrum Access System (SAS). In SAS General Authorised Access (GAA) can opportunistically access any part of the 3.5 GHz band. In SAS prior information regarding the time usage of spectrum is not provided by Priority Access Licensee (PAL) and when PAL operation starts the GAA needs to ensure they do not cause interference above a predetermined threshold. In this work we propose a method for GAA Citizen Broadband Radio Service Devices (CBSDs) to switch to different channel considering the probability of spectrum utilisation of GAA. Switching overhead is the time delay when switching the channel from one to another. In our work we proposed the method to calculate switching overhead and maximised average sum capacity of GAA CBSDs considering switching overhead and Root Mean Square (RMS) interference at PAL protection area. Simulations result shows that average sum capacity of GAA CBSDs can be maximised using the proposed method.
Basnet, S, Jayawickrama, BA, He, Y, Dutkiewicz, E & Mueck, MD 1970, 'Opportunistic Access to PAL Channel for Multi-RAT GAA Transmission in Spectrum Access System', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, NSW, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Spectrum Access System (SAS) is a three tier spectrum sharing framework proposed by the FCC. In this framework the aggregate interference of tier-3 General Authorised Access (GAA) users should be below a predetermined threshold anywhere within the tier-2 Priority Access Licensee (PAL) exclusion zone. GAA are expected to use a diverse range of Radio Access Technologies (RATs) with different levels of loading. We propose an optimal transmit power and probability of spectrum utilisation allocation scheme for GAA users that meets the average aggregate interference constraint within the GAA network. Most of the capacity maximisation studies consider the instantaneous aggregated interference from secondary users. In this paper we present an average aggregated interference method to optimise the capacity of GAA users in a single channel. Simulation results suggest that we can significantly increase the capacity of the channel by considering the probability spectrum utilisation of GAA users.
Bautista, MG, Dutkiewicz, E & Yang, Y 1970, 'Design of a compact self-coupled resonator and dual-band bandpass filter in 0.13-μm CMOS technology for millimetre-wave application', 2017 Progress in Electromagnetics Research Symposium - Fall (PIERS - FALL), 2017 Progress in Electromagnetics Research Symposium - Fall (PIERS - FALL), IEEE, Singapore, Singapore, pp. 2653-2658.
View/Download from: Publisher's site
View description>>
© 2018 Electromagnetics Academy. All rights reserved. Design of a miniaturized resonator and its application for dual-band bandpass filter design for millimeter-wave application is presented in this paper. Both the resonator and filter are implemented in a standard 0.13-μm (Bi)-CMOS technology. The performance is extensively verified using an EM simulator from NI-AWR. Using the presented resonator structure, two transmission zeros can be generated and effectively controlled. By feeding the resonator using a capacitive coupling technique, a dual-band bandpass filter that operated at 40 GHz with insertion loss of −0.7 dB and at 71 GHz with insertion loss of −1.5 dB, respectively. The proposed design achieves a reduced layout size of 302 μm × 131 μm.
Bautista, MG, Yang, Y & Dutkiewicz, E 1970, 'Compact on-chip 60 GHz resonator with ring defected ground structure for millimetre-wave applications', 2017IEEE 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), 2017 IEEE 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management (HNICEM), IEEE, Manila, Philippines, pp. 1-4.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper presents a design of a miniaturized resonator for millimeter-wave applications. The resonator is implemented in a standard 0.13μm (Bi)CMOS technology. Its performance is verified using an EM simulator from NI-AWR. The designed resonator is based on a unique structure, a combination of spiral loop and meander line structure. The ground plane is characteristically altered with a ring defected ground structure (DGS) to enhance the overall performance. The resonator design exhibits tuning flexibility at its resonance frequency within the mm-wave spectrum that is proportional to its design dimension. By using capacitive feeding, the designed resonator generates one transmission zero at 60 GHz with insertion loss of -2.7 dB and -29.4 dB return loss respectively. The chip size of the resonator excluding the pads is only 116 μm × 236 μm (0.027mm2).
Bautista, MG, Zhu, F, Nguyen, DN & Dutkiewicz, E 1970, 'Double-Balanced Gilbert Mixer with Current Bleeding for RF Front-End Using 0.13µm SiGe BiCMOS Technology', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper presents the design of a differential double-balanced Gilbert mixer in 0.13 um SiGe BiCMOS technology. A current-bleeding injection technique is adopted to increase the bias current at the driver stage without causing overvoltage headroom at the differential pair stage. This mechanism improves the performance in terms of conversion gain, linearity and noise figure. The proposed mixer achieves 10.7 dB conversion gain, 15 dB noise figure, -1.67 dBm 1-dB compression point, and 5 dBm IIP3. The designed double balanced Gilbert mixer with current bleeding is part of an integrated RF front-end for full duplex radio applications in the 2.4 GHz band and occupies an area of 0.1002 × 0.0748 mm2 excluding the pads.
Bautista, MG, Zhu, JB, Zhu, F, Yang, Y & Dutkiewicz, E 1970, 'Design of on-chip quadrature hybrid (3dB) branch-line couplers in 0.13-μm SiGe technology for millimetre-wave applications', 2017 17th International Symposium on Communications and Information Technologies (ISCIT), 2017 17th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Cairns, QLD, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this paper, design of miniaturized on-chip quadrature hybrid branch-line coupler is investigated. The motivation of this work is to minimize the footprint of the designed coupler while maintaining high performance of the circuit in the mm-wave band spectrum. Three examples are implemented in a standard (Bi)-CMOS process for millimetre wave applications. Excluding the pads, the chip size of the conventional design is 0.35 mm2, and the proposed two other designs structures are 0.26 mm2 and 0.21 mm2, respectively, which indicates an area reduction by 13% and 30% respectively.
Binh, HTT, Trung, VK, Son, NH, Dutkiewicz, E & Nguyen, DN 1970, 'A Local Search Algorithm for Saving Energy Cost in Duty-Cycle Wireless Sensor Network', INTELLIGENT AND EVOLUTIONARY SYSTEMS, IES 2016, Asia Pacific Symposium, Intelligent and Evolutionary Systems, Springer International Publishing, Univ New S Wales, Canberra Campus, Australian Def Force Acad, Canberra, AUSTRALIA, pp. 45-59.
View/Download from: Publisher's site
View description>>
Wireless Sensor Networks (WSNs) have been recently used for various applications. Due to the distributed and (often) unattended nature of the nodes after deployment, the lack of energy and the interruptive process in each sensor are the two major problems of WSN systems. Hence, designing a protocol which not only improves system performance but also lowers sensors’ energy consumption so as to maximize the network lifetime is very much desirable. The network lifetime maximization problem was known to be NP-Hard. This paper addresses the Minimum Energy-Multicasting (MEM) problem in Duty-Cycle Wireless Sensor Networks (DC-WSNs) in which sensors cyclically switch between on/off (wake/sleep) modes. To that end, we propose a local search algorithm and compare its performance with the best algorithm so far called GS-MEM over the four datasets designated for the MEM problem. The experimental results show that our proposed algorithm significantly outperforms GS-MEM in terms of energy cost
Braun, R & Chaczko, Z 1970, 'Using Matlab modeling in cody to teach Teletraffic engineering', 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), IEEE, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Engineering students are having to model increasingly complex constructed environments at the same time that their traditional mathematical skills are decreasing[?]. New approaches to modeling are needed. We started with the premise that students find mathematical modeling of Teletraffic problems challenging, and that this can be replaced through modeling in a 'computational' environment such as Matlab. In this paper, we show how the Teletraffic Engineering part of a Network Management subject can be made more interesting and accessible. We plot the student satisfaction scores to show the effectiveness of the approach.
Chaczko, Z & Braun, R 1970, 'Learning data engineering: Creating IoT apps using the node-RED and the RPI technologies', 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), IEEE, Ohrid, Macedonia.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper demonstrates the suitability and the practicality of using the advanced open source tools such as the Raspberry Pi and the Node-RED for teaching and learning in the Internet of Things (IOT) subject within a newly created major of Data Engineering in the Faculty of Engineering and IT at University of Technology, Sydney. Understanding and practicing of the Internet of Things largely depend on the high availability of tools, their low cost, and ease of use that can accelerate learning processes. This paper demonstrates relatively uncomplicated practical lab exercises involving the Raspberry Pi hardware, firmware and the Node-RED programming environment that students can execute to stimulate their learning, understanding of the Internet of Things technology and acquire fundamental data engineering skills.
Chaczko, Z, Jiang, F & Ahmed, B 1970, 'Road Vehicle Alert System Using IOT', 2017 25th International Conference on Systems Engineering (ICSEng), 2017 25th International Conference on Systems Engineering (ICSEng), IEEE, Las Vegas, NV, USA, pp. 488-496.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. The consequence of road accidents that involves a motorcycle is far more fatal for the rider than the other drivers. Yet, there has not been an effective vehicle alert system that can eliminate these avoidable motorcycle accidents caused by other drivers where they fail to notice the motorcycles. One of the major flaws with the existing vehicle alert systems is that it should not treat motorcycles as same as other vehicles as they take much longer time to brake than a cars do. Therefore, this project aimed to find an effective method to identify motorcycles and alert the other drivers when motorcyclists are around them in 20-meter radius. After extensive literature review, the best method to solve the problem is to use road side infrastructure based Internet of Things (IOT) that divides the network into a set of clusters. In this method to identify a vehicle, it is identifying the driver and the rider from their smartphone application that beacons custom, unique Media Access Control (MAC) addresses via Bluetooth or Wi-Fi to the IOT probes. The probe differentiates the users, registers them when they arrive into the network, alerts the driver about motorcycles around them and removes them from the database when they move to other cluster. The whole scenario is simulated using the OMNET++ simulator and INET framework to demonstrate how the methodology works. If the concept is implemented in real-life, many valuable lives of motorists will be much safer on the road.
Chehrazad, S, Aghdasi, HS, Shariati, N & Abolhasan, M 1970, 'Addressing coverage problem in wireless sensor networks based on evolutionary algorithms', 2017 23rd Asia-Pacific Conference on Communications (APCC), 2017 23rd Asia-Pacific Conference on Communications (APCC), IEEE, Perth, WA, Australia.
View/Download from: Publisher's site
View description>>
Wireless Sensor Networks (WSNs) are the key part of Internet of Things, as they provide the physical interface between on-field information and backbone analytic engines. An important role of WSNs-when collecting vital information-is to provide a consistent and reliable coverage. To Achieve this, WSNs must implement a highly reliable and efficient coverage recovery algorithm. In this paper, we take a fresh new approach to coverage recovery based on evolutionary algorithms. We propose EMACB-SA, which introduces a new evolutionary algorithm that selects coverage sets using a fitness function that balances energy efficiency and redundancy. The proposed algorithm improves network's coverage and lifetime in areas with heterogeneous event rate in comparison to previous works and hence, it is suitable for using in disaster management.
Chen, S-L, Qin, P-Y & Guo, YJ 1970, 'Multi-linear polarization reconfigurable center-fed circular patch antenna with shorting posts', 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, IEEE, San Diego, CA, USA, pp. 2209-2210.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this paper, a novel multi-linear polarization reconfigurable antenna with shorting posts, which can achieve four linear polarizations (0°, 45°, 90°, 135°), has been proposed. By switching the diodes between two groups of shorting posts, four linear polarizations can be realized. The dimensions of the proposed antenna are about 0.56λ× 0.56λ×0.07λ at 2.4 GHz. The measured results agree well with the simulated ones.
Chen, S-L, Qin, P-Y, Guo, YJ, Liu, Y & You, P 1970, 'Array pattern synthesis using numerical pattern synthesis algorithm including mutual coupling', 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, IEEE, San Diego, CA, USA, pp. 2295-2296.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this paper, numerical pattern synthesis (NPS) algorithm integrated with seeded region growing (SRG) method is proposed to synthesize the array in the presence of mutual coupling. In order to obtain the mutual coupling between the array elements, active pattern technique is used to find active element patterns. A 4 × 8 microstrip antenna array is employed to validate the effectiveness of the proposed algorithm including mutual coupling.
Chen, X, Ge, Y & Bird, TS 1970, 'Improved design of a low sidelobe pyramidal horn antenna loaded with a metasurface lens', 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, IEEE, San Diego, CA, USA, pp. 1951-1952.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. A technique for the design of low side-lobe pyramidal horn antennas loaded with a thin single-layer metasurface lens is extended using a subwavelength-size element. The single dielectric lens is printed on both sides with two identical subwavelength metallic square-ring resonators arrays. By placing the metasurface lens inside an existing standard horn antenna, both amplitudes and phases of electromagnetic waves can be controlled. An example is given of a metamaterial lens and horn (metahorn) antenna that simultaneously possesses high gain and low sidelobes. The measurement of this metahorn shows a 35-dB reduction of the first sidelobe level in the E plane, compared with that of the original air-filled standard pyramidal horn.
Chen, X, Ni, W, Chen, T, Collings, IB, Wang, X, Liu, RP & Giannakis, GB 1970, 'Distributed Stochastic Optimization of Network Function Virtualization', GLOBECOM 2017 - 2017 IEEE Global Communications Conference, 2017 IEEE Global Communications Conference (GLOBECOM 2017), IEEE, Singapore, Singapore, pp. 1-6.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Decoupling network services from underlying hardware, network function virtualization (NFV) is expected to significantly improve agility and reduce network cost. However, network services, sequences of network functions, need to be processed in specific orders at specific types of virtual machines (VMs), which couples decisions of VMs on processing or routing network services. Built on a new stochastic dual gradient method, our approach suppresses the couplings, minimizes the time-average cost of NFV, stabilizes queues at VMs, and reduces the backlogs of unprocessed services through online learning and adaptation. Asymptotically optimal decisions are instantly generated at individual VMs, with a cost-delay tradeoff [(ϵ)/√ϵ]. Numerical results show that the proposed method is able to reduce the time-average cost of NFV by 30% and reduce the queue length (or delay) by 83%, as compared to existing non-stochastic approaches.
Cheng, P, Chen, Z, Zhang, JA, Li, Y & Vucetic, B 1970, 'Low-Complexity Precoding for Spatial Modulation', 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), IEEE, Toronto, ON, Canada, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this paper, we investigate linear precoding for spatial modulation (SM) over multiple-input-multiple-output (MIMO) fading channels. With channel state information available at the transmitter, our focus is to maximize the minimum Euclidean distance among all candidates of SM symbols. We prove that the precoder design is a large-scale non-convex quadratically constrained quadratic program (QCQP) problem. However, the conventional methods, such as semi-definite relaxation and iterative concave-convex process, cannot tackle this challenging problem effectively or efficiently. To address this issue, we leverage augmented Lagrangian and dual ascent techniques, and transform the original large-scale non-convex QCQP problem into a sequence of subproblems. These subproblems can be solved in an iterative manner efficiently. Numerical results show that the proposed method can significantly improve the system error performance relative to the SM without precoding, and features extremely fast convergence rate with very low computational complexity.
Cheng, Q, Dutkiewicz, E, Fang, G, Shi, Z, Nguyen, DN & Wang, H 1970, 'A Novel Full-Duplex Spectrum Sensing Algorithm for OFDM Signals in Cognitive Radio Networks', GLOBECOM 2017 - 2017 IEEE Global Communications Conference, 2017 IEEE Global Communications Conference (GLOBECOM 2017), IEEE, Singapore, pp. 1-6.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Full duplex (FD) capability enables a 'listen and talk' protocol for spectrum sensing that has been used as a new paradigm to increase the spectrum utilization in cognitive radio networks (CRNs). However, the spectrum sensing performance suffers from the imperfect self-interference suppression (SIS). This could significantly degrade the performance of FD systems in CRNs. In this paper, we investigate the issue of spectrum sensing with imperfect SIS in FD systems. By drawing support from a cyclic prefix (CP) of Orthogonal Frequency Division Modulation (OFDM) signals, we propose a novel spectrum sensing mechanism that is robust to self-interference. Comparing with other conventional sensing approaches in FD systems, the proposed method is independent of timing delay. That significantly improves the sensing performance, even without requiring a complex process for timing delay estimation. As a result, it also reduces the overhead of spectrum sensing. Extensive simulation results indicate that even with serious self-interference and timing delay, the presented approach is still able to achieve much higher performance than the conventional energy detection and waveform-based detection approaches.
Cheng, Q, Nguyen, DN, Dutkiewicz, E & Mueck, MD 1970, 'Preserving operational information in spectrum access system with dishonest users', 2017 17th International Symposium on Communications and Information Technologies (ISCIT), 2017 17th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Cairns, QLD, Australia, pp. 1-6.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Privacy has been regarded as one of the most critical issues in light of promoting the development of centralized spectrum management, hence attracting wide attention. However, researchers in the current literature are usually protecting users' privacy based on the assumption that all users are honest, which is reasonable but not practical. In this paper, we investigate the privacy issue among different tiers of users in the centralized spectrum access system (SAS), mainly focusing on honest Priority Access Licenses (PALs) and dishonest General Authorized Accesses (GAAs). To that end, we propose an authentication scheme to prevent GAAs from using other users' information by the aid of a public key cryptosystem. Moreover, we propose a 'punishment and forgiveness' scheme, which draws support from GAAs' reputation stores (RSs) and reputation histories (RHs), to encourage GAAs to engage in positive and true activities. Besides, we propose a privacy preservation scheme cooperating with the 'punishment and forgiveness' scheme (PS-PFS) in order to effectively mitigate the impact of dishonest users while fully preserving all users' privacy as well as successfully realizing spectrum sharing.
Chiu, C, Chaczko, Z & Yu, Z 1970, 'Assessment of a Multi-Agent RFID Platform for Industrial Logistic Operations', 5th Asia-Pacific Conference on Computer-Aided System Engineering, 5th Asia-Pacific Conference on Computer-Aided System Engineering, APCASE Foundation, Guilin, Guangxi, China.
Dasgupta, A & Gill, AQ 1970, 'Fog computing challenges: A systematic review', Proceedings of the 28th Australasian Conference on Information Systems, ACIS 2017, Australasian Conference on Information Systems, Hobart, Australia.
View description>>
Internet of Things (IoT) applications continue to grow at a rapid scale. However, current cloud centric IoT architectures are not feasible to support the mobility needs as well as latency requirements of time critical IoT applications. This has restricted the growth of IoT in certain sectors. This paper investigates the fog-computing paradigm as an alternative for IoT applications. There is a need to systematically review and synthesize fog computing concerns or challenges for IoT applications. This paper aims to address this important research need using a well-known systematic literature review (SLR) approach. Using the SLR approach and applying customized search criteria derived from the research question, 17 relevant studies were identified and reviewed in this regard from an initial set of 439 papers. In addition, 4 papers were manually identified based on their relevance. The data was organized into four major challenge categories. The findings of this research paper can help practitioners and researchers to understand fog computing related concerns, and provide a number of useful insights for future work. The scope of this paper is limited to the number of reviewed studies from chosen database.
Ding, C, Jones, B, Sun, H, Qin, P-Y, Guo, YJ & Ji, L 1970, 'Wideband feeding method for full-wave dipole', 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, IEEE, San Diego, CA, USA, pp. 2131-2132.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper introduces a wide-band feeding method for full-wave dipole antennas. A full-wave dipole is designed to cover the band from 698 MHz to 960 MHz for cellular base station applications. Its matching circuit consists of a laddertype filter design and a quasi-quarter-wavelength resistance transformer. The proposed matching circuit can provide balanced feeding as a balun and has a compact size. The matching circuit is designed and optimized using a circuit theory model and then physically realized using microstrip lines based on full-wave simulation. The simulated reflection coefficient |S11| is < -15 dB across the entire target band, exhibiting a bandwidth of 32%.
Dong, L, Niyato, D, Kim, DI & Hoang, DT 1970, 'A Joint Scheduling and Content Caching Scheme for Energy Harvesting Access Points with Multicast', GLOBECOM 2017 - 2017 IEEE Global Communications Conference, GLOBECOM 2017 - 2017 IEEE Global Communications Conference, IEEE, Singapore, Singapore, pp. 1-6.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this work, we investigate a system where users are served by an access point that is equipped with energy harvesting and caching mechanism. Focusing on the design of an efficient content delivery scheduling, we propose a joint scheduling and caching scheme. The scheduling problem is formulated as a Markov decision process and solved by an on-line learning algorithm. To deal with large state space, we apply the linear approximation method to the state-Action value functions, which significantly reduces the memory space for storing the function values. In addition, the preference learning is incorporated to speed up the convergence when dealing with the requests from users that have obvious content preferences. Simulation results confirm that the proposed scheme outperforms the baseline scheme in terms of convergence and system throughput, especially when the personal preference is concentrated to one or two contents.
Dutkiewicz, E 1970, 'VTC2017-Spring Welcome from the General Chair', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference: VTC2017-Spring, IEEE, Sydney, NSW, Australia.
View/Download from: Publisher's site
Dutkiewicz, E, He, Y, Jayawickrama, BA & Abeywickrama, HV 1970, 'Radio environment maps generation and spectrum sensing testbed for spectrum sharing in 5G networks', 2017 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications (APWC), 2017 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications (APWC), IEEE, Verona, ITALY, pp. 33-36.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. To deliver on the data rate and latency promises of 5G, more spectrum resources below 6 GHz are required. Therefore the regulators are now promoting spectrum sharing. Having access to realtime spatio-Temporal spectrum usage information enables efficient decision making and monitoring. This knowledge can be represented in Radio Environment Maps constructed through geolocation aware spectrum measurements. In this paper, we give an overview of the spectrum sharing concept and its emergence in 5G standardisation. We also present our research on spectrum sharing including methods for efficient and accurate generation of Radio Environment Maps and a practical radio spectrum measurements testbed.
Dutkiewicz, E, Jayawickrama, BA & He, Y 1970, 'Radio spectrum maps for emerging IoT and 5G networks: Applications to smart buildings', 2017 International Conference on Electrical Engineering and Computer Science (ICECOS), 2017 International Conference on Electrical Engineering and Computer Science (ICECOS), IEEE, Palembang, Indonesia, pp. 7-9.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. The high demand for wireless Internet including emerging Internet of Things (IoT) applications is putting extreme pressure on better utilisation of the available radio spectrum. The expected spectrum 'crunch' requires highly efficient radio resource management schemes with low complexity and high responsiveness to the changing network conditions. Spectrum sharing is regarded as an essential approach to regaining access to otherwise unused spectrum and it is considered an essential component in the development of IoT and 5G networks. Spectrum sharing can be conducted at different time scales. As the time scale of the operation of spectrum sharing decreases, the possibility for utilising more available spectrum holes increases. However, the shorter time scale brings with it challenges. Efficient decisions regarding the use of spectrum sharing require accurate knowledge of the spatial and temporal spectrum use in a geographical area of interest. This knowledge can be represented in Radio Spectrum Maps which need to be generated efficiently and accurately. In this paper we give an overview of the spectrum sharing concept for IoT and 5G networks. We also present our research on spectrum sharing to enable Smart Building IoT applications.
Fang, L, Li, H, David Huang, D & Huang, X 1970, 'A low cost interpolation based detection algorithm for medium-size massive MIMO-OFDM systems', 2017 17th International Symposium on Communications and Information Technologies (ISCIT), 2017 17th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Cairns, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. The great potential of exploiting millimeter wave (mmwave) frequency spectrum for emerging fifth-generation (5G) wireless networks has motivated the study of massive multiple-input multiple-output (MIMO) for achieving high data rate. For medium-size massive MIMO with orthogonal frequency division multiplexing (OFDM) uplink systems, the minimum mean square error (MMSE) based soft-output detector is often used due to its better bit error rate (BER) performance compared to the matched filter detector. Although the multipath channel can be converted into a set of parallel flat-fading channels by using OFDM thus reducing the complexity of receiver design, the tone by tone (per subcarrier) detection methods based on the state-of-The-Art low complexity MMSE still incur considerably high computational complexity since the number of tones is typically very large. To reduce the complexity, the interpolation-based matrix inversion algorithms for small-size MIMO-OFDM systems have been proposed, which compute the matrix inversion by interpolating separately the adjoint and determinant. In this paper, we find that the (regularized) Gram matrix inversions have strong correlation between different subcarriers. By exploiting this strong correlation, we propose a linear interpolation based MMSE detection algorithm that directly interpolates the inverted MMSE matrices for a small number of subcarriers to obtain matrix inversions for all other subcarriers, thereby significantly reducing the number of matrix inversion required. Extensive simulations show that with small BER performance loss compared to the exact MMSE detector, the proposed algorithm can reduce the complexity to the level of the matched filter algorithm.
Farhood, H, He, X, Jia, W, Blumenstein, M & Li, H 1970, 'Counting People Based on Linear, Weighted, and Local Random Forests', 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Sydney, pp. 1-7.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Recently, many works have been published for counting people. However, when being applied to real-world train station videos, they have exposed many limitations due to problems such as low resolution, heavy occlusion, various density levels and perspective distortions. In this paper, following the recent trend of regression-based density estimation, we present a linear regression approach based on local Random Forests for counting either standing or moving people on station platforms. By dividing each frame into sub-windows and extracting features with ground truth densities as well as learned weights, we perform a linear transformation for counting people to overcome the perspective problems of the existing patch-based approaches. We present improvements against several recent baselines on the UCSD dataset and a dataset of CCTV videos taken from a train station. We also show improvements in speed compared with the state-of-the-art models based on detection and Deep Learning.
Gao, X, Du, J, Zhang, T & Guo, YJ 1970, 'Design of a monolithic-integrated circularly-polarized antenna-coupled high-T<inf>c</inf> superconducting terahertz harmonic mixer', 2017 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications (APWC), 2017 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications (APWC), IEEE, Verona, ITALY, pp. 324-325.
View/Download from: Publisher's site
Ghantous, GB & Gill, AQ 1970, 'DevOps: Concepts, practices, tools, benefits and challenges', Proceedings ot the 21st Pacific Asia Conference on Information Systems: ''Societal Transformation Through IS/IT'', PACIS 2017, PACIS2017, AIS Electronic Library (AISeL), Malaysia.
View description>>
DevOps, originated in the context of agile software development, seems an appropriate approach to enable the continuous delivery and deployment of working software in small releases. Organizations are taking significant interest in adopting DevOps ways of working. The interest is there, however the challenge is how to effectively adopt DevOps in practice? Before disembarking on the journey of DevOps, there is a need to clearly understand the DevOps concepts, practice, tools, benefits and underlying challenges. Thus, in order to address the research question in hand, this paper adopts a Systematic Literature Review (SLR) approach to identify, review and synthesize the relevant studies published in public domain between: 2010-2016. SLR approach was applied to initially identify a set of 450 papers. Finally, 30 of 450 relevant papers were selected and reviewed to identify the eight key DevOps concepts, twenty practices, and a twelve categories tools. The research also identified seventeen benefits of using DevOps approach for application development and encountered four known challenges. The results of this review will serve as a knowledge base for researchers and practitioners, which can be used to effectively understand and establish the integrated DevOps capability in the local context.
Giampietro, C, Chaczko, Z, De La Villefromoy, M & Braun, R 1970, 'A new strategy for higher education and training: Peer support system for practical laboratories', 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), IEEE, Ohrid, Macedonia, pp. 3-6.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. One of the many challenges facing practical student workshops is the proliferation of rapid prototyping and similar technologies. 3D printers have enabled students to take ideas and concepts further than ever before and sometimes to completion. The only limitations at this stage are the materials available for the manufacture of components and prototypes on 3D printers. Traditional manufacturing processes like fabrication and machining are still sometimes required to complete projects. This has seen a greater demand and workload for traditional machine shops and trades people. Some of the manufacturing work has to still be completed by skilled experienced trade's people but some of the simpler less complex machining and fabrication tasks could be easily completed by unskilled students with basic training and minimal supervision. We needed to come up with a system that provided students access to industrial fabrication and machining equipment in a safe and productive environment. The peer support system provides a framework enabling students with little or no machine operating skills to safely access industrial equipment with minimal staff, supervision and danger of injury. This paper is a justification of these concepts, interest, approaches, and practices of the peers support framework and philosophy.
Gill, AQ, Behbood, V, Ramadan-Jradi, R & Beydoun, G 1970, 'IoT architectural concerns: a systematic review.', ICC, International Conference on Internet of things and Cloud Computing, ACM, Cambridge, United Kingdom, pp. 117:1-117:1.
View/Download from: Publisher's site
View description>>
© 2017 ACM. There is increasing interest in studying and applying Internet of Things (IoT) within the overall context of digital-physical ecosystems. Most recently, much has been published on the benefits and applications of IoT. The main question is: what are the key IoT architectural concerns, which must be addressed to effectively develop and implement an IoT architecture? There is a need to systematically review and synthesize the literature on IoT architectural challenges or concerns. Using the SLR approach and applying customised search criteria derived from the research question, 22 relevant studies were identified and reviewed in this paper. The data from these papers were extracted to identify the IoT architectural challenges and relevant solutions. These results were organised into to 9 major challenge and 7 solution categories. The results of this research will serve as a resource for practitioners and researchers for the effective adoption, and setting future research priorities and directions in this emerging area of IoT architecture.
Gineste, M, Deleu, T, Cohen, M, Chuberre, N, Saravanan, V, Frascolla, V, Mueck, M, Strinati, EC & Dutkiewicz, E 1970, 'Narrowband IoT Service Provision to 5G User Equipment via a Satellite Component', 2017 IEEE Globecom Workshops (GC Wkshps), 2017 IEEE Globecom Workshops (GC Wkshps), IEEE, Singapore, SINGAPORE, pp. 1-4.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Today an estimated 15 billion of connected objects communicate with each other's. These connected objects that compose the Internet of Things (IoT) are expected to extend to 50 or 80 billion worldwide by 2020. Bringing wide-area connectivity for the IoT using satellite technology is therefore an attractive solution to complement terrestrial networks, allowing densification and coverage extension in remote areas. This paper deals with seamless integration of satellites and high altitude platforms (HAPS) into 5G networks. It describes the necessary modifications to operate on 5G systems in order to take satellite and HAPS specifics into account. Link budget calculations and system dimensioning, including channel modeling, are provided to determine the required satellite and HAPS performance as well as to estimate the number of served users per km.
Gordon, LC & Chaczko, Z 1970, 'Ontological Metamodel for Consistency of Data Heritage Preservation (DHP)', 2017 25th International Conference on Systems Engineering (ICSEng), 2017 25th International Conference on Systems Engineering (ICSEng), IEEE, Las Vegas, NV, USA, pp. 438-442.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this stage of Data Preservation the challenge is how to keep the attributes of the data and how to preserve the originality. It is like to keep the living part of the data. It is how the concepts of Heritage have sense. Heritage is the concrete data, it gives the interconnection to other aspects of the reality. Nowadays the physical value and the aspects of items complete the relevance of information. The relation between Preservation and Digital patterns of Heritage is well related because of the two aspects to consider: Accessibility and Context.
Gu, S, Lu, Y, Zhang, L & Zhang, J 1970, 'RGB-D Tracking Based on Kernelized Correlation Filter with Deep Features', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), International Conference on Neural Information ProcessingConference on Neural Information Processingtional Conference on Neural Information Processing, Springer International Publishing, Guangzhou, China, pp. 105-113.
View/Download from: Publisher's site
View description>>
© 2017, Springer International Publishing AG. This paper proposes a new RGB-D tracker which is upon Kernelized Correlation Filter(KCF) with deep features. KCF is a high-speed target tracker. However, the HOG feature used in KCF shows some weaknesses, such as not robust to noise. Therefore, we consider using RGB-D deep features in KCF, which refer to deep features of RGB and depth images and the deep features contain abundant and discriminated information for tracking. The mixture of deep features highly improves the performance of the tracker. Besides, KCF is sensitive to scale variations while depth images benefit for handling this problem. According to the principle of similar triangle, the ratio of scale variation can be observed simply. Tested over Princeton RGB-D Tracking Benchmark, Our RGB-D tracker achieves the highest accuracy when no occlusion happens. Meanwhile, we keep the high-speed tracking even if deep features are calculated during tracking and the average speed is 10 FPS.
Guan, D, Ding, C & Guo, YJ 1970, 'A compact multi-beam antenna without beam forming network', ISAP 2016 - International Symposium on Antennas and Propagation, International Symposium on Antennas and Propagation (ISAP), IEEE, Okinawa, Japan, pp. 404-405.
View description>>
A novel approach to design a multi-beam array antenna without a beam forming network (BFN) is presented. The proposed antenna consists of 3×3 microstrip patches that are tightly coupled through microstrip lines. By exciting any one of these patches, the energy can be coupled to all the patches. Nine beams towards different directions are obtained by selecting different feeding ports. The resultant gain varies from 10 dBi to 11 dBi. The scanning ranges of the beams are ±24° and ±45° in the elevation and horizontal directions, respectively. The proposed antenna has a single-layered structure without complex feeding network, which significantly lowers its cost.
Guo, YJ & Qin, P-Y 1970, 'Single-layer reflectarrays — Past, present and future', 2017 11th European Conference on Antennas and Propagation (EUCAP), 2017 11th European Conference on Antennas and Propagation (EUCAP), IEEE, Paris, France, France, pp. 92-94.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper presents an overview of the advances in single layer reflectarrays. In particular, it reports the progress in wideband reflectarrays and reconfigurable reflectarrays.
Haider, N, Dutkiewicz, E, Nguyen, DN, Mueck, M & Srikanteswarae, S 1970, 'The Impact on Full Duplex D2D Communication of Different LTE Transmission Techniques', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. To augment capacity of spectrum limited cellular systems, 3GPP proposed Licensed Assisted Access (LAA-LTE) while efforts are underway to standardize the standalone MulteFire (a small cell standalone version of LTE). LAA is expected to boost capacity of LTE via unlicensed spectrum (5GHz). On the other hand, recent advances in Self Interference Suppression (SIS) techniques allow radios to transmit and receive simultaneously on the same channel (i.e., in-band Full-Duplex, FD). As part of future wireless networks, Device-to-device (D2D) communications would find its great potential through this FD capability. However, due to high induced aggregate interference from FD and its impact on medium access probability, the rigorous and critical analysis is needed to find an optimum trade-off between performance efficiency and overheads. Using stochastic geometry and the random graph theory, in this article, we analyze the impact of different LTE network paradigms with HD/FD D2D devices. Moreover, the impact of state- of-the-art coexistence techniques (discontinuous transmission and listen-before-talk) recommended for LTE in unlicensed spectrum over HD/FD D2D network is also discussed. The analysis is supported with extensive simulation results that reveal insights of the coexistence mechanism efficiency employed by LTE, the impact of SIS and the cost of FD operation in D2D.
Hoang, DT, Niyato, D & Wang, P 1970, 'Optimal Cost-Based Cyber Insurance Policy Management for Mobile Services', 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), IEEE, Toronto, ON, Canada, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper introduces a cyber insurance policy management for the mobile networks in which if a mobile user agrees to purchase an insurance policy from an insurer, the loss of the mobile user, i.e., the insured, will be covered by the insurance policy when the risks happen. To protect mobile users from cyber attacks, the insurer can deploy security protection solutions, e.g., anti-virus software or personal firewall, to the insureds, thereby reducing the risks for mobile users. However, when the solutions are deployed, they will incur a certain cost to the insurer. Therefore, we propose a stochastic optimization based on the reserve state of the insurer and the number of active mobile users to determine whether the protection solutions should be deployed or not to maximize the revenue for the insurer. The performance evaluation reveals that the optimal policy can achieve significantly higher revenue than those of baseline schemes for the insurer. Alternatively, the coalitional game is studied to share the reward among the insurers, and we show that the insurers can gain higher individual rewards through the cooperation.
Hoang, DT, Niyato, D, Wang, P & Kim, DI 1970, 'Optimal time sharing in RF-powered backscatter cognitive radio networks', 2017 IEEE International Conference on Communications (ICC), ICC 2017 - 2017 IEEE International Conference on Communications, IEEE, Paris, France.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this paper, we propose a novel network model for RF-powered cognitive radio networks and ambient backscatter communications. In the network under consideration, each secondary transmitter is able to backscatter primary signals to the gateway for data transfer or to harvest energy from the primary signals and then use that energy to transmit data to the gateway. To maximize overall network throughput of the network, we formulate an optimization problem with the aim of finding not only an optimal tradeoff between data backscattering time and energy harvesting time, but also time sharing among multiple secondary transmitters. Through the numerical results, we demonstrate that the solution of the optimization problem always achieves the best performance compared with two other baseline schemes.
Hoang, DT, Niyato, D, Wang, P, Domenico, AD & Strinati, EC 1970, 'Optimal Cross Slice Orchestration for 5G Mobile Services', IEEE Vehicular Technology Conference, IEEE Vehicular Technology Conference, IEEE, Chicago, IL, USA, USA.
View/Download from: Publisher's site
View description>>
5G mobile networks encompass the capabilities of hosting a variety ofservices such as mobile social networks, multimedia delivery, healthcare,transportation, and public safety. Therefore, the major challenge in designingthe 5G networks is how to support different types of users and applicationswith different quality-of-service requirements under a single physical networkinfrastructure. Recently, network slicing has been introduced as a promisingsolution to address this challenge. Network slicing allows programmable networkinstances which match the service requirements by using network virtualizationtechnologies. However, how to efficiently allocate resources across networkslices has not been well studied in the literature. Therefore, in this paper,we first introduce a model for orchestrating network slices based on theservice requirements and available resources. Then, we propose a Markovdecision process framework to formulate and determine the optimal policy thatmanages cross-slice admission control and resource allocation for the 5Gnetworks. Through simulation results, we show that the proposed framework andsolution are efficient not only in providing slice-as-a-service based on theservice requirements, but also in maximizing the provider's revenue.
Hoang, DT, Niyato, D, Wang, P, Kim, DI & Le, LB 1970, 'Overlay RF-powered backscatter cognitive radio networks: A game theoretic approach', 2017 IEEE International Conference on Communications (ICC), ICC 2017 - 2017 IEEE International Conference on Communications, IEEE, Paris, France.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this paper, we study an overlay RF-powered cognitive radio network with ambient backscatter communications. In the network, when the channel is occupied, the secondary transmitter (ST) can perform either energy harvesting or data transmission using ambient backscattering technique to a gateway. We consider the case that the gateway charges the ST a certain price if the ST transmits information. This leads to questions of how to determine the best price for the gateway and how to find the optimal backscatter time. To address this problem, we propose a Stackelberg game in which the gateway is the leader adapting the price to maximize its profit in the first stage. Meanwhile, the ST chooses its backscatter time to maximize its utility in the second stage. To analyze the game, we apply the backward induction technique. We show that the game always has a unique subgame perfect Nash equilibrium. Additionally, our results provide insights on the impact of the competition on the players' profit and utility.
Hoang, DT, Niyato, D, Wang, P, Wang, SS, Nguyen, D & Dutkiewicz, E 1970, 'A Stochastic Programming Approach for Risk Management in Mobile Cloud Computing', IEEE Wireless Communications and Networking Conference, WCNC, IEEE Wireless Communications and Networking Conference, IEEE, Barcelona, Spain, pp. 1-6.
View/Download from: Publisher's site
View description>>
The development of mobile cloud computing has brought many benefits to mobileusers as well as cloud service providers. However, mobile cloud computing isfacing some challenges, especially security-related problems due to the growingnumber of cyberattacks which can cause serious losses. In this paper, wepropose a dynamic framework together with advanced risk management strategiesto minimize losses caused by cyberattacks to a cloud service provider. Inparticular, this framework allows the cloud service provider to selectappropriate security solutions, e.g., security software/hardware implementationand insurance policies, to deal with different types of attacks. Furthermore,the stochastic programming approach is adopted to minimize the expected totalloss for the cloud service provider under its financial capability anduncertainty of attacks and their potential losses. Through numericalevaluation, we show that our approach is an effective tool in not only dealingwith cyberattacks under uncertainty, but also minimizing the total loss for thecloud service provider given its available budget.
Hou, ZJ, Xue, Q, Yang, Y, Zhu, X & Dutkiewicz, E 1970, 'Miniaturized millimeter-wave on-chip bandpass filter design in 0.13-μm SiGe BiCMOS technology', 2017 17th International Symposium on Communications and Information Technologies (ISCIT), 2017 17th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Cairns, QLD, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. The full potential of active device in current Si-based technology has almost reached its limit. However, the passive devices that are integrated with transistors in the same technology have yet been fully explored. Improving the quality of on-chip passive devices is not only beneficial for energy efficiency, but also has significant meaning in cost reduction for a system-on-chip (SoC) solution while the passive circuits are miniaturized. A review of on-chip circuit miniaturization techniques for bandpass filter (BPF) design is demonstrated in this paper. Although the recently presented broadside-coupled meander line resonator (BCMLR) is very compact, the stopband attenuation is quite limited. To solve this issue, a ring-based structure is studied in this work. Using this approach, the size of the proposed millimeter-wave on-chip BPF can be significantly reduced due to the multi-mode characteristics of the proposed resonators, of which the equivalent circuits can be effectively modeled through the accurately extracted lumped components values. Our works exhibit excellent performance comparing with the state-of-the-art designs.
Hou, ZJ, Yang, Y, Zhu, X, Liao, S, Man, SK & Xue, Q 1970, 'A 320 GHz on-chip slot antenna array using CBCPW feeding network in 0.13-μm SiGe technology', 2017 IEEE MTT-S International Microwave Symposium (IMS), 2017 IEEE/MTT-S International Microwave Symposium - IMS 2017, IEEE, Honolulu, Hawaii, pp. 843-846.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. A 320 GHz on-chip 2 × 2 antenna array employing a compact feeding network is presented in this paper. The feeding network is designed based on the conducted-back coplanar waveguide (CBCPW) transmission line with a compact size, which has the full shielding performance providing good isolation from circuits around or below the CBCPW transmission lines. The proposed on-chip feeding network and antenna array are fabricated using standard 0.13-μm SiGe process. The antenna array is measured using a specially designed backside radiation measurement system. The simulated and measured results show that the backside radiation on-chip antenna array has a measured peak gain of 7.9 dBi at 320 GHz.
Hussein, F & Piccardi, M 1970, 'Minimum-Risk Structured Learning of Video Summarization', 2017 IEEE International Symposium on Multimedia (ISM), 2017 IEEE International Symposium on Multimedia (ISM), IEEE, Taichung, Taiwan.
View/Download from: Publisher's site
View description>>
Video summarization is an important multimedia task for applications such as video indexing and retrieval, video surveillance, human-computer interaction and video "storyboarding". In this paper, we present a new approach for automatic summarization of video collections that leverages a structured minimum-risk classifier and efficient submodular inference. To test the accuracy of the predicted summaries we utilize a recently-proposed measure (V-JAUNE) that considers both the content and frame order of the original video. Qualitative and quantitative tests over two action video datasets - the ACE and the MSR DailyActivity3D datasets - show that the proposed approach delivers more accurate summaries than the compared minimum-risk and syntactic approaches.
Ismaiel, B, Abolhasan, M, Smith, DB, Ni, W & Franklin, DR 1970, 'A Survey and Comparison of Device-to-Device Architecture Using LTE Unlicensed Band.', VTC Spring, IEEE Vehicular Technology Conference, IEEE, Sydney, NSW, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Due to the rapid increase in data traffic, one of the solutions provided by mobile operators is to operate Long Term Evolution (LTE) in the unlicensed 5GHz band, as the licensed spectrum is becoming scarce. Mobile operators can expand their network capacity by operating LTE in the unlicensed band at lower cost when compared with using other licensed bands. Device to Device (D2D) communication, proven to be another effective way to enhance the capacity of a network, enables direct data exchange of localized traffic of users in proximity. Applying D2D communication to LTE unlicensed 5GHz band will further improve the network performance and user experience. In this article, we will discuss the new type of solutions that have been proposed for LTE operating in an unlicensed 5GHz band that includes; LTE-Unlicensed (LTE-U), LTE-License Assisted Access (LTE-LAA), LTE WiFi Link Aggregation (LWA), and MuLTEfire. We will discuss the important features along with their advantages and disadvantages and compare these technologies as well. We simulate LTE-LAA, LWA and MuLTEfire technologies in the presence of Wi-Fi hotspot and compare their results. Furthermore, we apply D2D communication to these technologies and from the results we conclude that MuLTEfire can increase the throughput drastically but network saturates quickly. Whereas, applying D2D communication with LWA is beneficial for a scalable network as it will not only increase the network throughput but will increase the network capacity as well.
Ismaiel, B, Abolhasan, M, Smith, DB, Ni, W & Franklin, DR 1970, 'Scalable MAC protocol for D2D communication for future 5G networks.', CCNC, 2017 14th IEEE Annual Consumer Communications & Networking Conference, IEEE, Las Vegas, NV, USA, pp. 542-547.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Device-to-device communication (D2D) will be an integral part of 5G wireless networks. Device-to-Device (D2D) communication provide the additional resources to the cellular users for spatially reusing licensed/unlicensed spectrum by establishing direct communication. Although, D2D communication is gaining significant attention towards offloading traffic in heterogeneous networks in licensed band, no attention has been given to offload traffic in an unlicensed band in a centralized manner. However, a major challenge of D2D communication is managing resources in an efficient manner in a heterogeneous network. This paper will direct a new approach to D2D Communication and will present a scalable MAC protocol for D2D communications based on Point Coordination Function (PCF) access mechanism. The importance of PCF access mechanism is that it operates in a centralized manner and highly suitable for the dense environment, hence, can create a centralized control in a distributive manner. In this article, we propose an innovative three tier 5G architecture for D2D communication, which will offload cellular traffic from the cellular network to the WLAN in a dense environment. Moreover, we will present a new centralized scalable MAC protocol for D2D communication between WLAN users, based on the IEEE 802.11 Point Coordination Function (PCF) access mechanism. Our simulation results show that the proposed MAC scheme can increase the capacity of the network and perform better relative to the legacy Distributed coordination Function (DCF) defined in IEEE 802.11.
Ji, L-Y, Zhu, H-L, Qin, P-Y & Guo, YJ 1970, 'Broadband partially reflective surface antenna with tapered corrugated ground', 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, IEEE, San Diego, CA, USA, pp. 509-510.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper proposes a broadband Partially Reflective Surface antenna. It consists of a U-slot microstrip antenna as the source, an FR4 superstrate as the partially reflective surface, and a tapered corrugated ground structure. By employing the corrugated ground, the 3dB gain bandwidth is improved from 17% to 24% with the maximum realized gain and the 10dB impedance bandwidth unchanged. Therefore, the corrugated ground structure can be a good candidate to enhance the gain bandwidth of PRS antennas.
Jiang, J, Chaczko, Z, Al-Doghman, F & Narantaka, W 1970, 'New LQR Protocols with Intrusion Detection Schemes for IOT Security', 2017 25th International Conference on Systems Engineering (ICSEng), 2017 25th International Conference on Systems Engineering (ICSEng), IEEE, Las Vegas, NV, USA, pp. 466-474.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Link quality protocols employ link quality estimators to collect statistics on the wireless link either independently or cooperatively among the sensor nodes. Furthermore, link quality routing protocols for wireless sensor networks may modify an estimator to meet their needs. Link quality estimators are vulnerable against malicious attacks that can exploit them. A malicious node may share false information with its neighboring sensor nodes to affect the computations of their estimation. Consequently, malicious node may behave maliciously such that its neighbors gather incorrect statistics about their wireless links. This paper aims to detect malicious nodes that manipulate the link quality estimator of the routing protocol. In order to accomplish this task, MINTROUTE and CTP routing protocols are selected and updated with intrusion detection schemes (IDSs) for further investigations with other factors. It is proved that these two routing protocols under scrutiny possess inherent susceptibilities, that are capable of interrupting the link quality calculations. Malicious nodes that abuse such vulnerabilities can be registered through operational detection mechanisms. The overall performance of the new LQR protocol with IDSs features is experimented, validated and represented via the detection rates and false alarm rates.
Jiang, Z, Huynh, DQ, Zhang, J & Wu, Q 1970, 'Part-Based Data Association for Visual Tracking', 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Sydney, NSW, Australia, pp. 1-8.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. We present a method that integrates a part-based sparse appearance model in a Bayesian inference framework for tracking targets in video sequences. We formulate the sparse appearance model as a set of smoothed colour histograms corresponding to the object windows detected by the Deformable Part Model (DPM) detector. The data association of each body part between frames is solved based on the position constraint, appearance coherence, and motion consistency. To deal with missing and noisy observations, the part detection window in the following frame is also predicted using an interacting multiple model (IMM) tracker. We have tested our tracking method on all the video sequences that involve people in upright poses from the TB-50 and TB-100 benchmark videos datasets. Our experimental results show that our tracking method outperforms six state-of-the-art tracking techniques.
Kale, A & Chaczko, Z 1970, 'iMuDS: An Internet of Multimodal Data Acquisition and Analysis Systems for Monitoring Urban Waterways', 2017 25th International Conference on Systems Engineering (ICSEng), 2017 25th International Conference on Systems Engineering (ICSEng), IEEE, Las Vegas, NV, USA, pp. 431-437.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Freshwater monitoring is becoming an essential activity due to limited availability of drinking water and an increasing presence of various pollutants. Tons of toxic waste added to water sources everyday contributes to the decrease in the planet's biodiversity and even an extinction of many species of animals and marine life. Many millions of birds perish each year due to waterway pollution. New technologies such as the Internet of Things (IoT), Wireless Sensor Networks and computer vision allow us to monitor fresh water sources in a continuous mode. To minimize the effects of pollution, various monitoring activities can be planned and executed for very large areas and geographical regions. This work presents a system architecture for the IoT-based multimodal data acquisition and analysis system. The idea is to deploy sensor clusters in various locations of a waterway to create a network of sensing and measuring smart devices. Every cluster of such devices can be perceived as a 'thing'. Such a 'thing' or a node has camera sensing modalities for a macro level pollution detection with analog sensors to measure microlevel water parameters. Our solution involves a low power microprocessor devices provisioned to capture raw data, extract features from the raw data and then transmit these data to the Cloud for further analysis and reporting. A 5G mobile network communication is used for data transmission. The Cloud server runs a software framework that supports a sophisticated analysis and trending of various environmental parameters such as surface density of water, salinity, temperature, etc. The proposed software framework has a set of computational algorithms to process features supplied by each node. These algorithms can classify features into various classes like floating objects, water salinity level, etc. An experiment to simulate the 'IoT' data acquisition is conducted to validate the proposed solution. Based on a case study, this soluti...
Karmokar, DK & Guo, YJ 1970, 'Planar leaky-wave antennas for low-cost radar', 2017 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications (APWC), 2017 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications (APWC), IEEE, Verona, ITALY, pp. 112-115.
View/Download from: Publisher's site
Kha, VA, Nguyen, DN, Kha, HH & Dutkiewicz, E 1970, 'Dynamic stopping using eSVM scores analysis for event-related potential brain-computer interfaces', 2017 11th International Symposium on Medical Information and Communication Technology (ISMICT), 2017 11th International Symposium on Medical Information and Communication Technology (ISMICT), IEEE, Lisbon, Portugal, pp. 82-85.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In brain-computer interface (BCI) research, there must be a trade-off between accuracy and speed of the BCI system, especially those based on event-related potentials (ERPs). This paper proposes a novel method which can significantly increase the spelling bit rate while also maintaining the desired accuracy. We provide an adaptive real-time stopping method based on the scores of ensemble support vector machine classifiers. We apply a criteria assessment process on the classifiers' scores to dynamically stop the ERP-evoked paradigms at any flashing sequence. Our experiments were conducted on three different P300-Speller data sets (BCI Competition II, BCI Competition III and Akimpech). Our proposed framework significantly outperformed the related state-of-the-art studies in terms of character output accuracy and elicitation bit rate rise between static and dynamic stopping schemes. We improve the average bit rate by over 80% while perfectly maintaining the best original static accuracy of over 96%.
Kong, F, Sun, X, Leung, VCM, Guo, YJ, Zhu, Q & Zhu, H 1970, 'Queue-Aware Small Cell Activation for Energy Efficiency in Two-Tier Heterogeneous Networks', 2017 IEEE Wireless Communications and Networking Conference (WCNC), 2017 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, San Francisco, CA, USA.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In heterogeneous networks (HetNets), the network energy efficiency is critically determined by the base station (BS) deployment density. In this paper, we consider a BS density optimization problem by turning on only a fraction of micro BSs according to an activation ratio to minimize the network average power consumption per area in a 2- tier HetNet. In contrast to previous studies where a BS is assumed to be transmitting packets all the time, such that the network power consumption monotonically increases as the BS density increases, we assume that each BS can be busy or idle depending on the dynamic packet arrivals. The network power consumption is thus closely related to the average traffic intensity of each tier. With the assumption of universal spectrum reuse, the average traffic intensity of each tier is found to be uniquely determined by a set of fixed-point equations, based on which the network average power consumption per area is characterized. Simulation results demonstrate that the network average power consumption per area can be minimized by properly tuning the activation ratio. It is further revealed that the optimal activation ratio increases as the mean packet arrival rate of each user increases.
Kusakunniran, W, Qiang Wu, Ritthipravad, P & Zhang, J 1970, 'Three-stages hard exudates segmentation in retinal images', 2017 9th International Conference on Information Technology and Electrical Engineering (ICITEE), 2017 9th International Conference on Information Technology and Electrical Engineering (ICITEE), IEEE, Phuket, Thailand, pp. 1-6.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper proposes a three-stages method of hard exudate segmentation in retinal images. The first stage is the pre-processing. The color transfer is applied to make all retinal images to have the same color characteristics, based on statistical analysis. Then, only a yellow channel of each image is used in the further analysis. The second stage is the blob initialization. The blob detection based on color, size, and shape including circularity and convexity is used to identify initial pixels of hard exudates. The detected blobs must not be inside the optic disk. The third stage is the segmentation. The graph cut is iteratively applied on partitions of the image. The fine-tune segmentation in sub-images is necessary because the portion of hard exudates is significantly less than the portion of non-hard exudates. The proposed method is evaluated using the two well-known datasets, namely e-ophtha and DIARETDB1, in both aspects of pixel-level and image-level. Based on the comprehensive comparisons with the existing works, the proposed method is shown to be very promising. In the image-level, it achieves 96% sensitivity and 94% specificity for the e-ophtha dataset, and 96% sensitivity and 98% specificity for the DIARETDB1 dataset.
Kusakunniran, W, Wu, Q & Zhang, J 1970, 'Action Recognition Based on Correlated Codewords of Body Movements', 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Sydney, Australia, pp. 1-8.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Using spatio-temporal features is popular for action recognition. However, existing methods embed these local features into a global representation. Orders and correlations among local motions of each action are missing. This can make it difficult to distinguish closely related actions. This paper proposes a solution to address this challenge by encoding correlations of movements. Space-time interest points are detected in each action video. Then, feature descriptors are extracted from these key points and clustered into different codewords implicitly representing different characteristics of motions. The final representation of each action video is a combination of a bag of words and correlations between codewords. Then, the support vector machine is used as a classification tool. Based on the experimental results, the proposed method achieves a very promising performance and particularly outperforms the other existing methods that rely on spatio-temporal features.
Lai, W, Ni, W, Wang, H & Liu, RP 1970, 'Decentralized Relaying and Performance Analysis in Vehicular Ad Hoc Networks', 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), IEEE, Toronto, ON, Canada, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Vehicular Ad Hoc Networks (VANET) is an important network technology. Relay communication can effectively improve the connectivity and coverage of VANET, especially in distributed environments. Challenges arise from intense collision resulting from inherently synchronized relays. In this paper, we propose a decentralized relay scheme without collecting neighbor nodes' information. Particularly, we design a new score function to prioritize the relays based on their reception quality from source and channel conditions towards intended destination. A closed-form expression for packet delivery ratio (PDR) is derived based on time-out probabilities. Our analyses, validated by simulations, show that the proposed scheme, in terms of PDR, is much better than DAFMAC protocol.
Le, AT, Tran, LC & Huang, X 1970, 'On Performance of Analog Least Mean Square Loop for Self-Interference Cancellation in In-Band Full-Duplex OFDM Systems', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper evaluates the performance of an analog least mean square (ALMS) loop employed to cancel self-interference in in-band full-duplex (IBFD) orthogonal frequency division multiplexing (OFDM) systems. Cyclostationary analysis is applied to investigate the behavior of the ALMS filter. It is revealed that the performance of the ALMS filter for OFDM systems primarily depends on windowing function rather than pulse shaping as in single carrier systems. It is also noticed that the ALMS loop in OFDM systems provides a much higher level of sel-interference (SI) suppression because OFDM signals lead to reduced the error of the interference channel modelling with the adaptive filter. Simulations are then conducted to verify the theoretical findings.
Li, H, Wang, TQ, Huang, X & Zhang, JA 1970, 'Low-Complexity Uplink Multiuser Receivers for MIMO System with Massive Hybrid Array', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Due to the enormous needs for signal processing and hardware constraints, the full digital implementation for a large antenna array at mmWave frequencies becomes intractable. Hence, receiver design for MIMO system with massive hybrid array is very demanding, particularly for subarray structure. In this paper, we propose two low- complexity uplink multiuser receiver design schemes (single-beam and multi-beam) under the circumstances of only users' angles of arrival (AOAs) available at base station, which greatly simplify the analog beamforming structure and reduce the complexity of channel estimation especially when the number of antenna elements is considerably large. In the single-beam scheme, subarrays are mapped to different users one by one such that each subarray serves a specific user. In the multibeam scheme, all subarrays use the same analog beamforming and any subarray's beamforming signal potentially points at all users. Digital beamforming is then employed to combine all subarray signals followed by equalization. Simulations are performed to compare the proposed schemes with other schemes that need channel information available at the subarray output. Since only AOAs are required for analog and digital beamformings, the proposed schemes are more suitable for mmWave MIMO system with massive hybrid array in spite of slight sum-rate loss.
Li, K, Ni, W, Duan, L, Abolhasan, M & Niu, J 1970, 'SWPT: A Joint-Scheduling Model for Wireless Powered Sensor Networks', GLOBECOM 2017 - 2017 IEEE Global Communications Conference, 2017 IEEE Global Communications Conference (GLOBECOM 2017), IEEE, Singapore, Singapore, pp. 1-6.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In a rechargeable wireless sensor network, the data packets are generated by sensor nodes at a specific data rate, and transmitted to a base station. Moreover, the base station transfers power to the nodes by using Wireless Power Transfer (WPT) to extend their battery life. However, inadequately scheduling WPT and data collection causes some of the nodes to drain their battery and have their data buffer overflow, while the others waste their harvested energy, which is more than they need to transmit their packets. In this paper, we investigate a novel optimal scheduling strategy, called Scheduled WPT (SWPT), aiming to minimize data packet loss from a network of wireless powered sensor nodes by jointly considering the sensor nodes' energy consumption and data queue state information. The scheduling problem is formulated by a MDP model, assuming that the complete states of each sensor node are well known by the base station. This presents the best effort performance of the scheduling that can be collected in a wireless powered sensor network. The simulation results show that, in terms of network throughput and packet loss rate, the proposed scheduling model significantly improves the network performance.
Li, M, Liu, Y, Chen, S-L, Qin, P-Y & Guo, YJ 1970, 'Low sidelobe synthesis of dipole arrays by element orientation selection using binary codec genetic algorithm', 2017 11th European Conference on Antennas and Propagation (EUCAP), 2017 11th European Conference on Antennas and Propagation (EUCAP), IEEE, Paris, France, France, pp. 2838-2840.
View/Download from: Publisher's site
View description>>
© 2017 Euraap. Selecting appropriate element orientations can significantly reduce the sidelobe level of the antenna array. In this paper, a binary coded genetic algorithm (BCGA) which selects the element orientations from specified discrete angles, is proposed to reduce the sidelobe level (SLL) of the array. Compared to the conventional GA, the BCGA is much faster in this application. Synthesis results show the effectiveness and efficiency of the proposed method.
Li, W, Ni, W, Liu, D, Liu, RP, Wang, P & Luo, S 1970, 'Fine-Grained Access Control for Personal Health Records in Cloud Computing', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, NSW, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper presents a novel access control scheme for personal health record(PHR) data in cloud computing. The scheme utilizes attribute-based encryption(ABE), hash function and symmetric encryption to realize a fine-grained, multi- privilege access control to PHR. The patients can share their PHR with medical staff from various departments with different privileges securely. The experimental results show the efficiency of our scheme in terms of running-time, communication cost and storage overhead.
Lin, S, Yu, J, Ni, W & Liu, R 1970, 'Radio Resource Management for Ultra-Dense Smallcell Networks: A Hybrid Spectrum Reuse Approach', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, NSW, Australia, pp. 1-7.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Smallcells have great potential to enhance cellular networks, complementing macrocells. Severe interference may occur, as smallcells are expected to be deployed and operated uncoordinatedly. However, existing resource management methods require significant overhead to suppress interference. We propose a new resource management approach which is able to mitigate the cross-tier and co-tier interference with substantially reduced overhead. The key idea is to categorize the smallcells into two regions based on a judiciously designed cross-tier interference criterion. Smallcells in the high-interference zone occupy orthogonal radio resources with the macrocell; smallcells in the other zone can reuse the resources that the macrocell is using. Another crucial aspect is that we formulate the resource sharing between the macrocell and smallcells in the low-interference zone to a multi-agent Q-learning process which assigns adequate transmit power levels in a decentralized manner to suppress the co/cross-tier interference. As a result, our approach is able to reduce the outage probabilities of macrocell users significantly to 0%, respectively, in a dense smallcell deployment (200 smallcells), as evidenced by simulation results.
Movassaghi, S, Maleki, B, Smith, DB & Abolhasan, M 1970, 'Biologically inspired self-organization and node-level interference mitigation amongst multiple coexisting wireless body area networks', 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), IEEE, Valencia, Spain, pp. 1221-1226.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper presents a node-level self-organizing interference avoidance scheme (SIAC) between multiple coexisting wireless body area networks (WBANs) that incorporates self-organization and smart spectrum allocation. It follows a biologically inspired approach based on the theory of pulse-coupled oscillators for self-organization. The proposed scheme makes three major contributions as compared to the current literature. Firstly, it considers node-level interference for internetwork interference mitigation rather than considering each WBAN as a whole. Secondly, it allocates synchronous and parallel transmission intervals for interference avoidance in an optimal manner and dynamically adapts to changes in their coexistence. Finally, it achieves collision-free, self-organized communication with only information of the firing signal of each WBAN and does not require a global coordinator to manage its communications. It operates on a nodes traffic priority, signal strength, and density of sensors in a WBAN. Simulation results show that our proposal achieves a fast convergence time despite the little information it receives. Moreover, SIAC is shown to be robust to variations in signal strength, number of coexisting WBANs and number of sensor nodes within each WBAN.
Mueck, M, Choi, S, Bender, P, Ivanov, V, Jin, Y, Ahn, H, Kim, K & Dutkiewicz, E 1970, 'Radio Equipment Directive - A Novel Software Reconfiguration Framework', 2017 IEEE Globecom Workshops (GC Wkshps), 2017 IEEE Globecom Workshops (GC Wkshps), IEEE, Singapore, Singapore, pp. 1-4.
View/Download from: Publisher's site
View description>>
The European Commission recently published the revision of the novel Radio Equipment Directive 2014/53/EU replacing the R&TTE Directive which has been in force since 1999. This Directive represents the basic regulation framework for the making available of radio equipment on the Single European Market. Among several changes, the new RED includes specific provisions enabling the usage Software Reconfiguration for Radio Equipment in Europe. At the same time, ETSI has developed a novel Software Radio Reconfiguration framework specifically meeting the requirements of the Directive and encompassing technical, certification and security solutions. This paper introduces and comments the related changes on the regulation level and introduces the ETSI solution which is ready to be applied for new type of radio equipment to be introduced in Europe.
Mukunthan, A, Cooper, CS, Safaei, F, Franklin, DR & Abolhasan, M 1970, 'Leveraging the Propagation Model to Make Greedy Routing Decisions in Urban Environments.', VTC Spring, IEEE Vehicular Technology Conference, IEEE, Sydney, NSW, Australia, pp. 1-6.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. The CORNER propagation model, first proposed in 2010, has been previously validated and found to be a reasonably accurate representation of propagation scenarios in urban Vehicular Ad Hoc Networks (VANETs). This paper considers the impact of the propagation environment on routing performance and reveals a pressing need to consider more accurate propagation models when designing urban VANET routing protocols. A greedy routing protocol, which uses CORNER's propagation estimates for neighbour selection, is then presented. The new protocol, named Corner Propagation Stateless Routing (CPSR) is compared to GPSR, a benchmark protocol for VANETs, showing between 87% and 300% improvement in packet delivery ratio at higher network loads.
Nan, Y, Huang, X & Guo, YJ 1970, 'A Generalized Continuous Wave Synthetic Aperture Radar', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Attention has been devoted to Synthetic Aperture Radar (SAR) for half a century. Though it is a well-proven remote sensing technique, conventional pulsed SAR has several inherent limitations. In this paper, we present a new SAR concept, called Generalized Continuous Wave SAR (GCW-SAR). By using continuous wave signaling, the GCW-SAR system achieves better performance and overcomes the limitations such as the minimum antenna area in conventional SAR. Unlike the frequency modulated continuous wave SAR (FMCW-SAR) system, the GCW-SAR image is reconstructed by correlation between the sampled raw data and the location dependent reference signals. A fast image reconstruction algorithm is also presented in the paper. The principle of GCW-SAR and the effectiveness of the proposed algorithm are validated by numerical simulation results.
Nan, Y, Huang, X & Guo, YJ 1970, 'Passive synthetic aperture radar imaging with piecewise constant Doppler algorithm', 2017 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications (APWC), 2017 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications (APWC), IEEE, Veorna, Italy, pp. 41-44.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. This paper presents a non-cooperative space-surface bistatic synthetic aperture radar (SS-BSAR) with a novel image reconstruction algorithm. Exploiting the continuous wave signal from the transmitters of opportunity, the new algorithm produces better imaging performance. Unlike the conventional passive SAR, the image reconstruction is achieved by correlation in time-domain without distinction between fast time and slow time. With the movement of the radar, the range curve can be linearized within multiple segments. In each segment, the Doppler frequency shift incurred in the reflected signal from a target can be assumed to be constant and thus the SAR image can be reconstructed recursively. The proposed piecewise constant Doppler (PCD) algorithm is validated by the simulation results.
Nguyen, KK, Hoang, DT, Niyato, D, Wang, P, Nguyen, D & Dutkiewicz, E 1970, 'Cyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach', IEEE Wireless Communications and Networking Conference, WCNC, IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, pp. 1-6.
View/Download from: Publisher's site
View description>>
With the rapid growth of mobile applications and cloud computing, mobilecloud computing has attracted great interest from both academia and industry.However, mobile cloud applications are facing security issues such as dataintegrity, users' confidentiality, and service availability. A preventiveapproach to such problems is to detect and isolate cyber threats before theycan cause serious impacts to the mobile cloud computing system. In this paper,we propose a novel framework that leverages a deep learning approach to detectcyberattacks in mobile cloud environment. Through experimental results, we showthat our proposed framework not only recognizes diverse cyberattacks, but alsoachieves a high accuracy (up to 97.11%) in detecting the attacks. Furthermore,we present the comparisons with current machine learning-based approaches todemonstrate the effectiveness of our proposed solution.
Nguyen, T, Hoang, D, Nguyen, D & Seneviratne, A 1970, 'Initial trust establishment for personal space IoT systems', 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2017 IEEE Conference on Computer Communications: Workshops (INFOCOM WKSHPS), IEEE, Atlanta, USA, pp. 784-789.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Increasingly, trust has played a crucial role in the security of an IoT system from its inception to the end of its lifecycle. A device has to earn some level of trust even before it is authenticated for admission to the system. Furthermore, once the device is admitted to the system, it may behave maliciously over time; hence its behavior must be evaluated constantly in the form of trust to ensure the integrity of the system. Currently, no mechanism exists to establish an initial trust on a device, without prior knowledge, before its admission to an IoT system. Even when trust is applicable, trust evaluation models require direct/indirect observations over time, historical data on past encounters, or third party recommendations. However, this type of past data is not available in the first encounter between the system and the device. The question is how to establish whether a device can be trusted to a level that merits further evaluation for admission into a mobile and dynamic IoT system when it encounters the system for the first time? This paper addresses this challenge by proposing a challenge-response method and a trust assessment model to establish, without prior knowledge, the initial trust that a device places on another in a mobile and dynamic environment called personal space IoT. The initial trust is established before further interaction can take place and under the assumption that only a limited window of time is available for the trust assessment. The paper describes and evaluates the proposed model theoretically and by simulation. It also describes a practical scheme for realizing the proposed solution.
Pham, TT, Nguyen, DN, Dutkiewicz, E, McEwan, AL & Leong, PHW 1970, 'An anomaly detection technique in wearable wireless monitoring systems for studies of gait freezing in Parkinson's disease', 2017 International Conference on Information Networking (ICOIN), 2017 International Conference on Information Networking (ICOIN), IEEE, Da Nang, Vietnam, pp. 41-45.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Wearable monitoring systems have been in need for studies of gaits especially freezing of gait detection in patients with Parkinson's disease. The causality of gait freezing is still not fully understood. The histogram of gait freezing is the key assessment of the disease, thus monitoring them in patients' daily life is much appreciated. A real-Time signal processing platform for wearable sensors can help record freezing time instances. However, current monitor systems are calibrated with offline training (patient-dependent) that is cumbersome and time-consuming. In this work, by using acceleration data and spectral analysis, we propose an online/real-Time detection technique. Periods of low acceleration and low spectral coherence are identified and patient-independent parameters are then extracted. Using this set of new features, we validated our method by comparing it with clinicians' labels. The proposed approach achieved an overall mean (±SD) sensitivity (specificity) of 87 ± 0.3% (94±0.3%). To our best knowledge, this is the best performance for automated subject-independent approaches.
Pham, TT, Nguyen, DN, Dutkiewicz, E, McEwan, AL & Leong, PHW 1970, 'Wearable healthcare systems: A single channel accelerometer based anomaly detector for studies of gait freezing in Parkinson's disease', 2017 IEEE International Conference on Communications (ICC), ICC 2017 - 2017 IEEE International Conference on Communications, IEEE, Paris, France.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. The causality of gait freezing in patients with advanced Parkinson's disease is still not fully understood. Clinicians are interested in investigating the freezing of gait (FoG) histogram of patients in their daily life. To that end, one needs a real-time signal processing platform that can help record freezing information (e.g., timing and the duration of every gait freezing occurrences). Wearable wireless sensors have been proposed to monitor FoG epochs. Existing automated methods using accelerometers have been introduced with high accuracy performance only for subject-dependent settings (e.g., an individual offline training process). This is a troublesome for large scale out-of-lab deployment and time-consuming. In this work, we used spectral coherence analysis for accelerometer data to apply an anomaly detection approach. Conventional features such as energy and freezing index are introduced to help refine normal epochs while the anomaly scores from spectral coherence measures define FoG epochs. Using this new set of features, our new FoG detector for subject-independent settings achieves the mean ±SD sensitivity (specificity) of 89.2±0.3% (95.6 ± 0.3%). To our best knowledge, this is the best performance for automated subject-independent approaches in literature of freezing of gait detection.
Qin, P-Y, Chen, S-L & Guo, YJ 1970, 'A compound reconfigurable microstrip antenna with agile polarizations and steerable beams', 2017 International Symposium on Antennas and Propagation (ISAP), 2017 International Symposium on Antennas and Propagation (ISAP), IEEE, Phuket, Thailand, pp. 1-2.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Achieving both polarization switching and beam steering independently, in a compact antenna structure, is a major challenge for compound reconfigurable antennas. In this paper, a new cavity-backed proximity-coupled reconfigurable microstrip antenna provides an efficient solution. Three different linear polarizations (0°, 45°, 90°) can be obtained by switching PIN diodes on a proximity-coupled feed network. For each polarization state, the main beam can be steered in three directions by using a reconfigurable parasitic-element network. The antenna has nine different working states in total. For all states, the measured input reflection coefficients are below -10 dB, with the measured realized gains ranging from 7.2-8 dBi.
Qin, P-Y, Guo, YJ & Ji, L-Y 1970, 'Reconfigurable partially reflective surface antennas', 2017 Sixth Asia-Pacific Conference on Antennas and Propagation (APCAP), 2017 Sixth Asia-Pacific Conference on Antennas and Propagation (APCAP), IEEE, Xi'an, China, pp. 1-3.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this paper, the research of reconfigurable partially reflective surface (PRS) antennas at University of Technology Sydney (UTS) is introduced. Two reconfigurable PRS antennas are described that can achieve beam scanning and wideband polarization switch, respectively.
Rafiei, A, Abolhasan, M, Franklin, DR, Safaei, F, Smith, S & Ni, W 1970, 'Cooperative recovery of coverage holes in WSNs via disjoint spanning trees.', ICSPCS, International Conference on Signal Processing and Communication Systems, IEEE, Gold Coast, QLD, Australia, pp. 1-10.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Large scale coverage holes (CHs) resulting from correlated node failures, can significantly degrade quality of service and also jeopardise the integrity of WSNs. In the absence of centralised control, the distributed relocation of deployed nodes becomes a promising solution especially in harsh and hostile environments. In this paper, a distributed method is proposed that enables a network to partially or entirely repair itself through a collection of distributed movements of disjoint spanned trees (DS-Trees) towards the CHs. DS-Trees are spanned based on the nodes distances from the CHs, which are autonomously perceived by the nodes and their one-hop neighbours. DS-Trees around the CHs are spanned in a downstream style outwards from the holes, as nodes select their parents based on the minimum distance to the CH from their neighbours; nodes then decide whether or not to follow the movements of their DS-Trees parents. To examine the efficiency of the proposed model, its performance is compared with two Voronoi-based and one force-based node relocation algorithms. Results show that the proposed DS-Tree model either outperforms or matches the alternative approaches across a wide range of scenarios.
Rafiei, A, Abolhasan, M, Franklin, DR, Safaei, F, Smith, S & Ni, W 1970, 'Effect of the number of participating nodes on recovery of WSN coverage holes.', ITNAC, International Telecommunication Networks and Applications Conference, IEEE Computer Society, Melbourne, VIC, Australia, pp. 1-8.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Coverage holes (CHs) due to the correlated node failures, if not appropriately addressed in a timely manner, not only disrupt network's operation but also can compromise its integrity. In the absence of centralised control, distributed node relocation can be an effective solution to recover CHs. Relocation algorithms that mainly applied to all nodes to address networks' coverage and unbalanced deployments problems, are not efficient as participating nodes beyond a certain distance and depth from the CHs do not significantly contribute to recovery of CHs. Here, the effects of the number of participating nodes and movement iterations on recovery of CHs are examined in two Voronoi-based and one force-based node relocation algorithms.
Rahman, ML, Zhang, JA, Huang, X & Quo, YJ 1970, 'Analog antenna array based sensing in perceptive mobile networks', 2017 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications (APWC), 2017 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications (APWC), IEEE, Veorna, Italy, pp. 199-202.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this paper, we consider an alternative low-cost and flexible solution of using an analog antenna array for radio sensing at the base station receiver in the recently proposed perceptive mobile networks. We provide receiver beamforming design, and advanced compressive sensing (CS) signal processing techniques for sensing parameter estimation in a multiuser-MIMO (MU-MIMO) communications system. Simulation results are provided and validate the effectiveness of the proposed solution and sensing algorithms.
Sadra, S & Abolhasan, M 1970, 'On improving the saturation performance of IEEE802.15.6-based MAC protocols in Wireless Body Area Networks', 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), IEEE, Valencia, Spain, pp. 1233-1238.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Wireless Body Area Networks (WBANs) were designed to collect and transfer vital physiological parameters within a short distance of the human body by employing low-power, light-weight, small-sized and smart implantable or wearable sensor devices. Lately, WBANs are expected to support various types of applications with data rates from a few Kbps upto 10 Mbps and satisfy the heterogeneous requirements of both medical and consumer electronics applications. Hence, novel communication protocols that consider a unique set of constraints and demands of these networks need to be developed to provide optimum system efficiency and data transmission reliability. As the IEEE 802.15.6 Medium Access Control (MAC) protocol based on the latest WBANs standard, cannot maintain the balance between the strict energy limitation and Quality of Service (QoS) requirements of such networks, this paper focuses on developing MAC protocols to improve the performance of WBANs specifically in the saturation condition. Two IEEE802.15.6-based MAC protocols are proposed to enhance channel access for the highest user priority and the other user priorities in saturated networks. The simulation results show better network performance as well as lower energy consumption in the proposed MAC protocols compared to the IEEE 802.15.6 MAC protocol.
Simorangkir, RBVB, Yang, Y & Esselle, K 1970, 'Active and Passive Antennas Based on Unconventional Materials, for Next Generation Wearable Wireless Devices (Invited Paper)', 2017 IEEE MTT-S International Microwave Symposium, Honolulu, Hawaii.
Simorangkir, RBVB, Yang, Y, Esselle, KP & Diao, Y 1970, 'A varactor-tuned frequency-reconfigurable fabric antenna embedded in polymer: Assessment of suitability for wearable applications', 2017 IEEE MTT-S International Microwave Symposium (IMS), 2017 IEEE/MTT-S International Microwave Symposium - IMS 2017, IEEE, Honolulu, Hawaii, pp. 204-207.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this paper, we present a novel class of wearable antennas that are flexible, electronically tunable, and robust. They consist of conductive fabric parts, used as the radiator, with polydimethylsiloxane (PDMS) polymer utilized to form the substrate as well as the full encapsulation of the radiator including its electronic tuning elements. To validate the concept, a prototype that provides frequency tuning from 2.3 to 2.65 GHz has been fabricated and tested. The fabrication process is detailed and experimental investigations on its suitability for wearable applications are presented. To assess the antenna robustness, its reconfigurability under severe physical deformations has been studied through washing the antenna and also by wrapping it on the head and wrist of a UWB human muscle equivalent phantom. The antenna's effect on body has also been investigated through Specific Absorption Rate (SAR) measurement. The results confirm that the antenna is a promising candidate for modern wearable devices.
Sinha, S & Chaczko, Z 1970, 'Concepts and Observations in Artificial Endocrine Systems for IoT Infrastructure', 2017 25th International Conference on Systems Engineering (ICSEng), 2017 25th International Conference on Systems Engineering (ICSEng), IEEE, Las Vegas, NV, USA, pp. 427-430.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Artificial Endocrine Systems is the study of nature’s highly evolved and advanced resource management system that sustains life. The basic units of the endocrine system are the chemical messengers, otherwise known as hormones, which in enough numbers produce cascading effects in the host organism that promotes growth, maintains metabolism and much more. This behaviour is in effect a living metaphor indicative of the high throughput, constant flux and stochastic interactions that exist in complex topologies such as large scale IoT infrastructures.
Siyari, P, Krunz, M & Nguyen, DN 1970, 'Joint Transmitter- and Receiver-based Friendly Jamming in a MIMO Wiretap Interference Network', 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), IEEE International Conference on Communications (ICC) / Wireless Communications Symposium / 3rd Workshop on Optical Wireless Communications (OWC), IEEE, FRANCE, Paris, pp. 1323-1328.
Siyari, P, Krunz, M & Nguyen, DN 1970, 'Joint transmitter- and receiver-based friendly jamming in a MIMO wiretap interference network', 2017 IEEE International Conference on Communications Workshops (ICC Workshops), 2017 IEEE International Conference on Communications Workshops (ICC Workshops), IEEE, Paris, France, pp. 1323-1328.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. We consider an interference network tapped by external eavesdropper(s) in which each legitimate transmit-receive pair conceals its communications by using joint transmit-based friendly jamming (TxFJ) and receiver-based friendly jamming (RxFJ). Specifically, TxFJ is realized at the transmit side using MIMO precoding while RxFJ is achieved at the receiver side of each link by leveraging the state-of-the-art self-interference-suppression techniques (allowing a radio to cancel the self-interference effect of its transmit signal). We show that with a careful power allocation between the information signal and TxFJ at the transmit side of each link, the corresponding receiver is able decide on using RxFJ independent of any multi-user interference factor. This ability sets the receivers free from having to measure multi-user interference at eavesdropper(s). With every link following such strategy, we model this interaction as a non-cooperative game. We derive sufficient conditions under which the game admits a unique Nash equilibrium. We then propose a robust version of the game that requires only statistical knowledge of eavesdropping channel.
Song, H, Wu, Q & Dong, H 1970, 'EMI-based Diagnosis to Grounding Grids by Combining Ensemble Empirical Mode Decomposition and ICA', Proceedings of the 8th International Conference on Computer Modeling and Simulation, ICCMS '17: 8th International Conference on Computer Modeling and Simulation, ACM, Canberra, Australia, pp. 196-200.
View/Download from: Publisher's site
View description>>
© 2017 ACM. Grounding grids have been performed an essential role in electric transformer substations. The nondestructive diagnosis system applies transforms the condition of the undergrounding conductors to the surficial induced electric signal in sensing coil. However, the induced signal cannot be used directly to diagnosis due to the raw measurement is a mixture of responses from signal of interest, strong interference and other unknown noises. Therefore the separation of individual signatures from the mixture is posed as a blind source separation (BSS) problem. To extract the induced signal corrupted by noise, the independent component analysis (ICA) method is considered. By combining the EEMD and FastICA, the single-channel signal is decomposed into its ICs. The desired signal is then reconstructed to visualize the break point of the grounding grid. The results show this approach can be used to effectively diagnosis grounding gird in harsh electromagnetic environment.
Suankaewmanee, K, Hoang, DT, Niyato, D, Sawadsitang, S, Wang, P & Han, Z 1970, 'Performance Analysis and Application of Mobile Blockchain', 2018 International Conference on Computing, Networking and Communications, ICNC 2018, International Conference on Computing, Networking and Communications, IEEE, Maui, HI, USA, pp. 642-646.
View/Download from: Publisher's site
View description>>
Mobile security has become more and more important due to the boom of mobilecommerce (m-commerce). However, the development of m-commerce is facing manychallenges regarding data security problems. Recently, blockchain has beenintroduced as an effective security solution deployed successfully in manyapplications in practice, such as, Bitcoin, cloud computing, andInternet-of-Things. However, the blockchain technology has not been adopted andimplemented widely in m-commerce because its mining processes usually requireto be performed on standard computing units, e.g., computers. Therefore, inthis paper, we introduce a new m-commerce application using blockchaintechnology, namely, MobiChain, to secure transactions in the m-commerce.Especially, in the MobiChain application, the mining processes can be executedefficiently on mobile devices using our proposed Android core module. Throughreal experiments, we evaluate the performance of the proposed model and showthat blockchain will be an efficient security solution for future m-commerce.
Suarez-Rodriguez, C, Jayawickrama, BA, He, Y, Bader, F & Heimlich, M 1970, 'Performance analysis of REM-based handover algorithm for multi-tier cellular networks.', PIMRC, Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, IEEE, Montreal, QC, Canada, pp. 1-6.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. The advent of 5G networks, where a plethora of spectrum-sharing schemes are expected to be adopted as an answer to the ever-growing users' need for data traffic, will require addressing mobility ubiquitously. The trend initiated with the deployment of heterogeneous networks and past standards will give way to a multi-tiered network where different services will coexist, such as device-to-device, vehicle-to-vehicle or massive-machine communications. Because of the high variability in the cell sizes given the different transmit powers, the classical handover process, which relies solely on measurements, will lead to an unbearable network overhead as a consequence of the high number of handovers. The use of spatial databases, also known as radio environment maps (REM), was first introduced as a tool to detect opportunistic spectrum access opportunities in cognitive radio applications. Since then, REM usage has been widely expanded to cover deployment optimization, interference management or resource allocation to name a few. In this paper, we introduce a handover algorithm that can predict the best network connection for the current user's trajectory from a radio environment map. We consider a geometric approach to derive the handover and handover-failure regions and compare the current handover algorithm used in Long-Term Evolution with our proposed one. Results show a drastic reduction in the number of handovers while maintaining a trade-off between the ping-pong handover and the handover-failure probabilities.
Sun, H, Ding, C, Guo, YJ & Mittra, R 1970, 'A wideband dipole antenna based on a non-uniformly segmented structure', 2017 11th European Conference on Antennas and Propagation (EUCAP), 2017 11th European Conference on Antennas and Propagation (EUCAP), IEEE, Paris, France, pp. 3572-3574.
View/Download from: Publisher's site
View description>>
© 2017 Euraap. The design of a wideband, vertically polarized omnidirectional dipole antenna based on a non-uniformly segmented structure is presented. The proposed non-uniformly segmented configuration mitigates the phase change of the currents flowing in the long dipole arms, so that the reverse currents which deteriorate the radiation pattern can be avoided, and a stable omnidirectional pattern can be maintained over a wide frequency band. Simulation results show that the proposed dipole has a wide pattern bandwidth of 66%, ranging from 1.96 GHz to 3.90 GHz, with S11 less than -10 dB. Within the band, the main lobe of the dipole remains in the broadside direction in the E-plane and the antenna achieves the desirable omnidirectional radiation pattern, with a gain flatness of less than 0.3 dB in the H-plane.
Sun, Y, Bautista, MG, Zhu, F & Dutkiewicz, E 1970, 'Design of an Elliptic Filter Using Multiple-Loop Feedback Structure in CMOS Technology for Analogue Signal Processing', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, NSW, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Design of high-performance continuous- time filter (CTF) for analogue signal processing is presented in this paper. To demonstrate of using a novel voltage-mode multiple-loop feedback (MLF) approach for CTF design, a 5th-order elliptic lowpass filter (LPF) is implemented in a standard 0.18-μm CMOS technology. The LPF is based on an inverse-follow-the-leader feedback structure with an input distribution network to generate the required transmission zeros. The LPF consumes 35 mA from a single 1.8 V power supply and it has a cut-off frequency of 30 MHz with less than 0.7 dB passband ripple and more than 60 dB stopband attenuation. In addition, a 65 dB dynamic range is achieved.
Takalkar, MA & Xu, M 1970, 'Image Based Facial Micro-Expression Recognition Using Deep Learning on Small Datasets', 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Sydney, Australia, pp. 1-7.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Facial micro-expression refers to split-second muscle changes in the face, indicating that a person is either consciously or unconsciously suppressing their true emotions and even mental health. Therefore, micro-expression recognition attracts increasing research efforts in both fields of psychology and computer vision. Existing research on micro-expression recognition has mainly used hand-crafted features, for example, Local Binary Pattern-Three Orthogonal Planes (LBP-TOP), Gabor filter and optical flow. Recently, Deep Convolutional neural systems have demonstrated a high degree effectiveness for difficult face recognition tasks. This paper explores the possible use of deep learning for micro-expression recognition. To develop a reliable deep neural network extensive training sets are required with a huge number of labeled image samples. However, micro-expression recognition is a challenging task due to the repressed facial appearance and short duration, which results in the lack of training data. In this paper, we propose to generate extensive training datasets of synthetic images using data augmentation on CASME and CASME II databases. Then, these datasets are combined to tune a satisfactory CNN-based micro-expression recognizer. Experimental results demonstrate the effectiveness of the proposed CNN approach in image based micro- expression recognition and present comparable results with the best-related works.
Tan, Z, Jamdagni, A & Liu, RP 1970, 'Message from the SECSOC 2017 Workshop Chairs', 2017 IEEE Trustcom/BigDataSE/ICESS, 2017 IEEE Trustcom/BigDataSE/ICESS, IEEE, p. xxxi.
View/Download from: Publisher's site
Thanh Tu, DT, Ngoc, NT, Zhu, F, Nguyen, DN, Dutkiewicz, E & Van Yem, V 1970, 'Quad-band antenna for GSM/WSN/WLAN/LTE-A application in IoT devices', 2017 17th International Symposium on Communications and Information Technologies (ISCIT), 2017 17th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Cairns, Australia.
View/Download from: Publisher's site
View description>>
We designed, fabricated, and experimented a quad-band Double-PIFA (Planar Inverted-F Antenna) for Internet of Things (IoT) applications. Using the Double-PIFA structure allowed us to fabricate the antenna easily and optimize the operating bands for desired frequencies. Combining DGS (Defected Ground Structure) and two shorting pin of PIFA structure, the antenna is compact in size with radiating patch of 184 mm2 basing on RO4350B substrate with height of 1.52 mm. Operating at 900MHz, 1.8GHz, 2.6GHz and 5GHzwith large bandwidth of 6.67%, 11.11%, 5.77% and 16%, respectively. As the proposed antenna can operate for ZigBee, Z-Wave, RFID (Radio-Frequency Identification), WLAN (Wireless Local Area Network), and LTE-A (Long Term Evolution - Advanced), it is suitable for both IoT devices and wide-band wireless communication systems.
Tian, J, Liu, R-P & Lin, S-J 1970, 'A Markov Chain Analysis Model of IEEE 802.11p', Proceedings of the 2017 International Conference on Wireless Communications, Networking and Applications, WCNA 2017: 2017 International Conference on Wireless Communications, Networking and Applications, ACM, Shenzhen, China, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 Association for Computing Machinery. Quality of Service (QoS) is a critical issue for the broadcast scheme of IEEE 802.11p systems in Vehicular Ad hoc Networks (VANETs)1. We present a 3-dimensional (3-D) Markov chain model to accurately solve for the broadcast scheme of 802.11p systems. The 3th dimension models remaining frozen time in the deferring period. The 3-D model solutions are validated by key simulations. Our analyses reveal that the lack of retransmission in the 802.11p system results in poor QoS performance during heavy traffic load, particularly for large VANETs.
Venemyr, GO, Bakken, BT, Kionig, L, Ranglund, OJS, Holen, S, Haave, H, Vold, T & Braun, R 1970, 'Flipped gaming for enhanced learning outcome crisis preparedness courses', 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), 2017 16th International Conference on Information Technology-Based Higher Education and Training (ITHET), IEEE, Ohrid, Macedonia, pp. 1-4.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Preparing for crisis and incidents have gained an increased focus, also within the educational system. At The Inland University of Applied Sciences, Campus Rena, in Norway, a Bachelor study is developed to cater for the increased need for educating staff not only in municipalities, but also in private organizations. Regulations and governmental instructions have also created a void between staff that can and know how to handle crisis and staff that need to know how to handle crisis. In addition, the preparedness issue, in order to avoid crisis, has received a lot of attention. The study has until recently been a mix of ordinary classroom education and exercises, both live and table top exercises, both which is costly and time consuming both in planning and execution. Two years ago, some faculty staff and a small group of students started to look into using games for educational purposes. Some of the games were free ware and downloadable from the internet, another game was developed by Bohemia Interactive Simulations (https://bisimulations.com/). Combining using MeTracker (http://www.concorde-project.eu/index.php/results/developments/the-training-tools/1-metracker) for organizing the work during a training process, and the developed game, this has proved to be a powerful tool for learning about how to be prepared for and handle crisis. Even if the initial costs for development and licenses have been somewhat substantial, the tools will provide the students with a unique possibility of simulating crisis in a higher volume than what is possible using live exercises. So far, the faculty staff has developed the scenarios for the students to play. The change from this is now to use a game based environment to play scenarios developed by the students themselves. The students that have tested this is in the third year of their study and the preliminary feedback from the students on this approach has been positive. The paper presents the results fro...
Vo, K, Nguyen, DN, Kha, HH & Dutkiewicz, E 1970, 'Real-time analysis on ensemble SVM scores to reduce P300-Speller intensification time', 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), IEEE, Korea, pp. 4383-4386.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In most Brain-Computer Interface systems, especially the P300-Speller, there must be a harmonized balance between the accuracy and the spelling time. One major drawback of the classical 36-choice P300-Speller is the slow rate of character elicitation. This paper aims to propose a real-time signal processing method to decrease the spelling time by exploiting the score margins of the ensemble Support Vector Machine classifiers during real-time P300-Speller flashes, rather than just getting the classifiers' highest scores. Our experiments were conducted on the dataset of the BCI Competition III and resulted in a successful character rate of over 96% with just approximately 15 to 20 seconds for each character spelling session. As compared with the fixed 31.5 seconds of the best original approach of the competition, our proposed method significantly reduces the required spelling time by over 30% while maintaining the desired classification accuracy.
Vo, K, Nguyen, DN, Kha, HH & Dutkiewicz, E 1970, 'Subject-Independent P300 BCI Using Ensemble Classifier, Dynamic Stopping and Adaptive Learning', GLOBECOM 2017 - 2017 IEEE Global Communications Conference, 2017 IEEE Global Communications Conference (GLOBECOM 2017), IEEE, Singapore.
View/Download from: Publisher's site
View description>>
Brain-computer interfaces (BCIs) are used to assist people, especially those with verbal or physical disabilities, communicate with the computer to indicate their selections, control a device or answer questions only by their mere thoughts. Due to the noisy nature of brain signals, the required time for each experimental session must be lengthened to reach satisfactory accuracy. This is the trade-off between the speed and the precision of a BCI system. In this paper, we propose a unified method which is the integration of ensemble classifier, dynamic stopping, and adaptive learning. We are able to both increase the accuracy, as well as to reduce the spelling time of the P300-Speller. Another merit of our study is that it does not require the training phase for any new subject, hence eliminates the extensively time-consuming process for learning purposes. Experimental results show that we achieve the averaged bit rate boost up of 182% on 15 subjects. Our best achieved accuracy is 95.95% by using 7.49 flashing iterations and our best achieved bit rate is 40.87 bits/min with 83.99% accuracy and 3.64 iterations. To the best of our knowledge, these results outperformed most of the related P300-based BCI studies.
Vold, T, Bergum, S, Ranglund, OJS, Kionig, L, Bakken, G, Kaloudis, A & Braun, R 1970, 'Student input — A case of an extended flipped classroom', 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), IEEE, Ohrid, Macedonia, pp. 1-6.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. The idea from Socrates about the knowledge being a part of the students' knowledge base or ability of combining accessible knowledge forms the backdrop for how the most recent course in Knowledge Management (spring of 2017) was conducted. The course is 7,5 ECTS and the students are primarily adults in a worklife. The course is net and seminar based, with three seminars per semester. During the seminars the concept of Flipped Classroom is used. This means that the students are provided with a recorded lecture in beforehand and only highlights are presented. The rest of the time during the seminar is used to activate the students through tasks and problem solving. However, the tasks are not predefined and prefabricated. The way this course is structured, the students themselves are giving the input to the tasks and assignments. This is based on the idea that the students themselves, coming from a worklife where knowledge management is a part of their every day worklife, should reflect upon their own practice. Also, it is important to share knowledge and by utilizing each students own experiences it is possible to enrich the 'database' of cases or tasks for the students to solve and work with in order to incorporate the new theory from the course curriculum. Basing the problem solving on student input provide the lecturer AND the students with a richer knowledge base and case portfolio. This does, however, require some effort from the lecturers side. The input from the students are generally key words and fragments. The session is facilitated by the lecturer, encouraging the students to bring forward own experiences or situations they would like resolved, either real or fiction. The key words and fragments are discussed amongst the students and the lecturer makes notes on a blackboard or on a digital canvas (MS PowerPoint or similar). The students are given a break and the lecturer collects the key words and synthesizes this into a case. Upon ...
Wang, H, Dutkiewicz, E, Jayawickrama, BA & Mueck, MD 1970, 'Design of Contour Based Protection Zones for Sublicensing in Spectrum Access Systems', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, NSW, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Spectrum Access System (SAS) allows incumbent military systems to share spectrum in a hierarchical manner with tier-2 Priority Access License (PAL) users and tier-3 General Authorized Access (GAA) users. FCC has recently allowed PAL owners to sublicense their channels. Therefore, when GAA channels are congested they can request a sublicense to access the PAL channel on a coordinated basis, which provides interference protection from other GAA users. In this paper, we propose a grid map to measure and monitor the secondary spectrum market for the purpose of spectrum trading with QoS guarantee. This work provides the subsequent spectrum trading models with a reasonable and dedicated interference graph for further optimization of spectrum allocation. Compared with traditional longterm spectrum licensing policy, short-term licensing makes the spectrum allocated effectively. We find the optimal resolution of the discrete grid map that maximizes the profit from sublicensing. Simulation results are provided to demonstrate how fine to grid the region and let the PAL owner achieve monetary benefit, in a given number of sensors.
Wang, H, Dutkiewicz, E, Jayawickrama, BA & Mueck, MD 1970, 'Detection of contour boundary for sublicensing in spectrum access systems', 2017 17th International Symposium on Communications and Information Technologies (ISCIT), 2017 17th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Cairns, QLD, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Associated to database and a local centralized system, the short-term spectrum sublicensing is one of the potential approaches to improve the spectrum efficiency in the 5G networks. If the sublicences are assigned to the heterogeneous base stations that are from different operators, the interference issue becomes challenging to tackle. In this paper, we propose a solution of contour boundary detection for sublicensing to coordinate the interference among heterogeneous base stations in the space domain. As the direct access points to sever the end users, the base stations know and even could predict the traffic requirements over their coverage areas. Therefore, we enable individual base station as a sublicensee based on self-reported protection contour and optimize the best allocation for the system to guarantee the interference-free operations among those who spatially use the same sublicense simultaneously. Considering the selfish behaviours of base stations, we employ the sensor networks to monitor and measure their contours. Then we estimate the contour boundary by detecting the inner and outer contour boundary. Finally we compare the estimation accuracies of different sensor networks and demonstrate an interference-free allocation for the sublicensees.
Wang, H, Dutkiewicz, E, Nguyen, D & Mueck, MD 1970, 'Game theoretic analysis of sublicensing for PAL and GAA bands in spectrum access system', 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), IEEE, Montreal, QC, Canada, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Motivated by recent efforts in enabling economic models for spectrum sharing systems, in particular, for the Spectrum Access System in the US, we propose a game theoretic analysis of sublicensing between two types of access methods in such system - PAL and GAA. The aim of this paper is to illustrate how the operators' strategies affect their own payoffs and the overall utility in the Sublicenseing Game in a spectrum sharing system. We consider the problem of spectrum sharing among multiple operators who have to pay for a temporary PAL sublicense with the exclusive right to the PAL band or stay in the GAA band and share the spectrum for free with other GAA users. We first formulate this scenario as a non-cooperative game, and then study the existence of a Nash equilibrium. Finally, to reduce the overall utility loss we let the spectrum sharing platform to coordinate individual operators by forming pair coalitions for them. According to our findings, when an operator has a large number of subscribers GAA band is the best response and a high PAL sublicense price holds back operators to access the PAL band. Additionally, making equal coalitions among operators can avoid overall utility loss.
Wang, TQ & Huang, X 1970, 'Dimming Compatible Optical OFDM for High Speed Visible Light Communications', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, Australia, pp. 1-4.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this paper, we study a novel optical orthogonal frequency division multiplexing (OFDM) scheme, fractional reversed polarity optical OFDM (FRPO- OFDM), which enables dimmable visible light communications. The scheme combines an asymmetrically clipped optical OFDM (ACO-OFDM) sequence with an information-carrying brightness control sequence (BCS). We show that the new scheme can create a wide range of brightness levels whilst transmitting extra information using the BCS to enhance the spectral efficiency. The detector which can recover information from both sequences is derived based on maximum likelihood (ML) detection and estimation. It is shown that the information carried by the BCS using variable on-off keying (VOOK) can be detected with extremely low bit error rate (BER) and that the resulting overall BER of FRPO-OFDM is constant over a wide dimming range.
Wang, Z & Piccardi, M 1970, 'Dissimilarity-based action recognition with the pair hidden Markov support vector machine', 2017 IEEE 19th International Workshop on Multimedia Signal Processing, IEEE International Workshop on Multimedia Signal Processing, IEEE, Luton, UK, pp. 1-6.
View/Download from: Publisher's site
View description>>
Human action recognition in video is highly challenging due to the substantial variations in motion performance, recording settings and inter-personal differences. Most current research focuses on the extraction of effective features and the design of suitable classifiers. Conversely, in this paper we tackle this problem by a dissimilarity-based approach where classification is performed in terms of minimum distance from templates. To measure the dissimilarity between any two action instances, we propose leveraging the Pair Hidden Markov Support Vector Machine (PHMM-SSVM) that was recently proposed for tasks of video alignment. The main advantages of PHMM-SSVM are its ability to learn optimal alignment models from training sets of manually-aligned action pairs and provide alignment scores that can be used for action classification. The experimental results over two popular action datasets show that the proposed approach has been capable of achieving an accuracy higher than many existing methods and comparable to a state-of-the-art algorithm.
Wazirali, R, Chaczko, Z & Chiang, E 1970, 'Steganographic Authentication in Cloud Storage for Mitigation of Security Risks', 2017 25th International Conference on Systems Engineering (ICSEng), 2017 25th International Conference on Systems Engineering (ICSEng), IEEE, Las Vegas, NV, USA, pp. 451-458.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Identity theft is a serious crime where the criminals steal user's identity to access their bank accounts, personal hospital records and etc. The usage of cloud storage has allowed the hackers to attack the victims easily by accessing the victim's data stored in a remote location. Cloud storage may be convenient to allow users to store any data files and access those files from different devices and in different locations around the world. However, it can still pose security threats as with a lot of important data stored in one location is very appealing to cunning hackers. The solution of using image steganography application to hide important data or documents under an image before uploading them to the cloud storage will avoid the risks of attracting hackers or outsiders to discover the importance of the data hidden. The application uses one of simplest image steganography approach 'LSB algorithm' to achieve best quality of encoded image/stego-image. Besides, the application can be deployed via offline or online depending whether they want to upload the encoded image/stego-image to the cloud storage.
Wazirali, R, Chaczko, Z & Gibbon, J 1970, 'Steganographic Image Sharing App', 2017 25th International Conference on Systems Engineering (ICSEng), 2017 25th International Conference on Systems Engineering (ICSEng), IEEE, Las Vegas, NV, USA, pp. 494-499.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. With the advent of smartphones, many people have the ability to take a photo and upload it to the internet whenever they want. Most smartphones will include basic metadata in the image file; however, this is usually limited to information about the camera itself, and not the content of the photo. This data is also easy to access, as there are many websites and applications that will extract the metadata from an image, thus it is unsuitable for personal information. While there are many applications out there which will allow a user to take and upload photos for their friends or the public to view, such as Facebook or Instagram, these applications rely on information provided along side the image for privacy settings, commenting, and image searching. Other search engines would have difficulty categorising the pictures they find on various sites, and if the image is saved and re-uploaded somewhere else, the information about them would likely be lost. Steganography provides a feasible and viable solution to these problems. By embedding information directly into the image, the information about the image will not be lost, if it is separated from its original source. The aim of the capstone is to demonstrate this aspect via an image sharing app that allows users to exchange messages and personalised information that is embedded in the image such that it is inaccessible without knowing their keys, and metadata that can be used by search engines to categorise the image and its contents. The developed application will provide a platform for users to create an account, share images, embed information within the image, and search for images other users have uploaded.
Wu, G, Liu, RP, Ni, W & Xu, P 1970, 'Modeling CCH Switch to SCH in IEEE 802.11p/WAVE Vehicular Networks', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, NSW, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Packet collision and packet delay are considered to be critical for safety applications in vehicular networks. This paper designs a new analytical model to evaluate the performance of channel switching for IEEE 802.11p/WAVE in vehicular networks. Under this model, it explicitly expresses the WAVE channel switching, and constructs contention window size and number of vehicles as packet collision probability and packet delay time function of variables. Finally, we evaluate accuracy of the designed model of collision caused by channel switching and transmission delay in vehicular networks. The results show that the model could analyzes perfectly packet collision which is caused by channel switching and packet delay in vehicular networks.
Wu, W, Liu, R, Ni, W, Kaafar, D & Huang, X 1970, 'AC-PROT: An Access Control Model to Improve Software-Defined Networking Security', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. The logically-centralized controllers have largely operated as the coordination points in software-defined networking(SDN), through which applications submit network operations to manage the global network resource. Therefore, the validity of these network operations from SDN applications are critical for the security of SDN. In this paper, we analyze the mechanism that generates network operations in SDN, and present a fine-grained access control model, called Access Control Protector(AC-PROT),that employs an attribute-based signature scheme for network applications. The simulation result demonstrates that AC-PROT can efficiently identify and reject unauthorized network operations generated by applications.
Xin, J-N, Du, X & Zhang, J 1970, 'Deep learning for robust outdoor vehicle visual tracking', 2017 IEEE International Conference on Multimedia and Expo (ICME), 2017 IEEE International Conference on Multimedia and Expo (ICME), IEEE, Hong Kong, China, pp. 613-618.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Robust visual tracking for outdoor vehicle is still a challenging problem due to large appearance variations caused by illumination variation, occlusion and scale variation, etc. In this paper, a deep-learning-based approach for robust outdoor vehicle tracking is proposed. Firstly, a stacked denoising auto-encoder is pre-trained to learn the feature representation way of images. Then, a k-sparse constraint is added to the stacked denoising auto-encoder and the encoder of k-sparse stacked denoising auto-encoder (kSSDAE) is connected with a classification layer to construct a classification neural network. After fine-tuning, the classification neural network is applied to online tracking under particle filter framework. Extensive tracking experiments are conducted on a challenging single object online tracking evaluation platform benchmark to verify the effectiveness of our tracker. Experiments show that our tracker outperforms most state-of-the-art trackers.
Yang, Y, Zhu, X & Xue, Q 1970, 'On-chip circuit miniaturization techniques for millimeter-wave bandpass filter design', 2017 10th Global Symposium on Millimeter-Waves, 2017 10th Global Symposium on Millimeter-Waves (GSMM), IEEE, Hong Kong, pp. 24-27.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this paper, the millimeter-wave circuit miniaturization techniques using BCMLR and interdigital resonators are introduced. Using these structures, the physical size of the on-chip filter can be dramatically reduced. The designed BPFs are implemented in standard 0.13-μm SiGe and 0.1-μm GaAs technologies for concept approval. Compared with other state-of-the-art work at millimeter-wave frequencies, our proposed designs have the merits of ultra-compact size as small as 0.038 mm2, competitive insertion loss (1 dB in GaAs BPF) and harmonic suppression of more than 44 dB.
Yao, L, Kusakunniran, W, Wu, Q, Zhang, J & Tang, Z 1970, 'Robust Gait Recognition under Unconstrained Environments Using Hybrid Descriptions', 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2017 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Sydney, Australia, pp. 1-7.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Gait is one of the key biometric features that has been widely applied for human identification. Appearance-based features and motion-based features are the two mainly used presentations in the gait recognition. However, appearance-based features are sensitive to the body shape changes and silhouette extraction from real-world images and videos also remains a challenge. As for motion features, due to the difficulty in extracting the underlying models from gait sequences, the localization of human joints lacks of high reliability and strong robustness. This paper proposes a new approach which utilizes Two-Point Gait (TPG) as the motion feature to remedy the deficiency of the appearance feature based on Gait Energy Image (GEI), in order to increase the robustness of gait recognition under the unconstrained environments with view changes and cloth changes. Another contribution of this paper is that this is the first time that TPG has been applied for view change and cloth change issues since it was proposed. The extensive experiments show that the proposed method is more invariant to the view change and cloth change, and can significantly improve the robustness of gait recognition.
Zha, X, Wang, X, Ni, W, Liu, RP, Guo, YJ, Niu, X & Zheng, K 1970, 'Analytic model on data security in VANETs', 2017 17th International Symposium on Communications and Information Technologies (ISCIT), 2017 17th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Cairns, QLD, Australia, pp. 1-6.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Fast-changing topologies and uncoordinated transmissions are two critical challenges of implementing data security in vehicular ad-hoc networks (VANETs). We propose a new protocol, where transmitters adaptively switch between backing off retransmissions and changing keys to improve success rate. A new 3-dimensional (3-D) Markov model, which can analyze the proposed protocol with symmetric or asymmetric keys in terms of data security and connectivity, is developed. Analytical results, validated by simulations, show that the proposed protocol achieves substantially improved resistance against collusion attacks.
Zhang, H, Huang, X & Guo, YJ 1970, 'A 20 Gbps Digital Modem for High Speed Wireless Backhaul Applications', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. The rapid growth of mobile broadband wireless services in recent years demands high speed data transmission for both access and backhaul networks. With the increase of data rate for 5G access to tens of Gigabits per second (Gbps), higher speed transmission for backhaul network is necessary. Current wireless backhaul systems have been able to achieve the data rate of multiple Gbps, but the ability to deal with significant practical impairments such as large carrier frequency offset and IQ mismatch is still a technical challenge. In this paper, a 20 Gbps digital modem for wireless backhaul applications is proposed. Simulation and field programmable gate array implementation show that the the proposed design and signal processing algorithms meet the targeted system performance.
Zhang, J, Wu, Q, Zhang, J, Shen, C & Lu, J 1970, 'Kill Two Birds with One Stone: Weakly-Supervised Neural Network for Image Annotation and Tag Refinement', The Thirty-Second AAAI Conference on Artificial Intelligence, The Thirty-Second AAAI Conference on Artificial Intelligence, AAAI Press, USA, pp. 7550-7557.
View description>>
The number of social images has exploded by the wide adoption of socialnetworks, and people like to share their comments about them. These commentscan be a description of the image, or some objects, attributes, scenes in it,which are normally used as the user-provided tags. However, it is well-knownthat user-provided tags are incomplete and imprecise to some extent. Directlyusing them can damage the performance of related applications, such as theimage annotation and retrieval. In this paper, we propose to learn an imageannotation model and refine the user-provided tags simultaneously in aweakly-supervised manner. The deep neural network is utilized as the imagefeature learning and backbone annotation model, while visual consistency,semantic dependency, and user-error sparsity are introduced as the constraintsat the batch level to alleviate the tag noise. Therefore, our model is highlyflexible and stable to handle large-scale image sets. Experimental results ontwo benchmark datasets indicate that our proposed model achieves the bestperformance compared to the state-of-the-art methods.
Zhang, J, Zhang, J, Wu, Q, Wu, Q, Xu, J, Lu, J, Phua, R, Curr, K & Tang, Z 1970, 'Historical Image Annotation by Exploring the Tag Relevance', 2017 4th IAPR Asian Conference on Pattern Recognition (ACPR), 2017 4th IAPR Asian Conference on Pattern Recognition (ACPR), IEEE, Nanjing, China, pp. 646-651.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Historical images usually contain enormous historical research value and are highly related to the history objects, events and background stories etc. Therefore, annotating these images always requires selecting tags within a large set. In this paper, we propose to annotate historical images by exploring the tag relevance. We measure the tag relevance from three different perspectives, including its visual relevance, its dependencies with other tags and its relationship with location based meta-data. By using tag relevance as guidance, we generate three tag sub-sets and use them to fulfill the annotation. Experimental results on the benchmark dataset indicate the significance of exploring the tag relevance by comparing with the baseline experiments.
Zhang, JA, Cantoni, A, Huang, X, Guo, YJ & Heath, RW 1970, 'Joint Communications and Sensing Using Two Steerable Analog Antenna Arrays', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, Australia.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Beam-steering has great potentials for joint communications and sensing, which is becoming a demanding feature on many emerging platforms such as unmanned aerial vehicles and smart cars. Although beam-steering has been extensively studied for communications and radar sensing respectively, its application in the joint system is not straightforward due to different beamforming requirements by communications and sensing. In this paper, we propose a low-cost system framework which allows seamless operation of communications and sensing, using two small- size steerable analog antenna arrays. We provide system architecture, high-level protocols, detailed signal model, novel beamforming design and advanced 1D compressive sensing algorithms for joint communications and sensing. We also provide preliminary simulation results which validate the effectiveness of the proposed technique in resolving closely located objects.
Zhang, JA, Cantoni, A, Huang, X, Guo, YJ & Jr, RWH 1970, 'Framework for an Innovative Perceptive Mobile Network Using Joint Communication and Sensing', IEEE Vehicular Technology Conference, IEEE Vehicular Technology Conference, IEEE, Sydney, pp. 1-5.
View/Download from: Publisher's site
View description>>
In this paper, we develop a framework for an innovative perceptive mobile(i.e. cellular) network that integrates sensing with communication, andsupports new applications widely in transportation, surveillance andenvironmental sensing. Three types of sensing methods implemented in thebase-stations are proposed, using either uplink or downlink multiusercommunication signals. The required changes to system hardware and majortechnical challenges are briefly discussed. We also demonstrate the feasibilityof estimating sensing parameters via developing a compressive sensing basedscheme and providing simulation results to validate its effectiveness.
Zhang, JA, Huang, X, Guo, YJ & Rahman, ML 1970, 'Signal stripping based sensing parameter estimation in perceptive mobile networks', 2017 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications (APWC), 2017 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications (APWC), IEEE, Verona, Italy, pp. 67-70.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. We propose signal stripping based approaches for estimating detailed channel composition parameters for sensing in the recently proposed perceptive mobile networks where simultaneous communication and radar sensing is performed. Via reconstructing a (differentiated) channel matrix, we obtain a signal model which can be solved by conventional compressive sensing (CS) techniques. Parameter estimation methods based on a 1-D CS algorithm are proposed and their effectiveness is validated by provided simulation results.
Zhang, JA, Li, H, Huang, X, Guo, YJ & Cantoni, A 1970, 'User-Directed Analog Beamforming for Multiuser Millimeter-Wave Hybrid Array Systems', 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), IEEE, Sydney, Australia, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Beamforming design for millimeter-Wave hybrid array with the subarray structure is very challenging. There is neither known optimal solution that maximizes the sum rate capacity nor near-optimal solution. This paper proposes some low-complexity user-directed analog radio- frequency (RF) beamforming design schemes. The basic idea is to iteratively allocate different subarrays to different users such that users' channel correlation can be efficiently reduced via RF beamforming. Several new but less efficient schemes are also presented to shed light on RF beamforming design, and to serve as comparisons for the user-directed schemes. Simulation results are provided for these proposed schemes, existing ones in the literature and an upper-bound for hybird array with a fully-connected structure. The user-directed schemes demonstrate significantly better sum-rate and BER performance over other schemes, although the gap to the upperbound is still large.
Zhang, W, Szymanski, J, Chiu, C, Chaczko, Z, Su, S & Zhou, J 1970, 'How the Internet of Things is Changing Teaching of Technical Subjects at UTS', 5th Asia-Pacific Conference on Computer-Aided System Engineering, Asia-Pacific Conference on Computer Aided System Engineering, APCASE Foundation, Guilin, Guangxi, China, pp. 71-77.
Zhao, M, Zhang, J, Porikli, F, Zhang, C & Zhang, W 1970, 'Learning a perspective-embedded deconvolution network for crowd counting', 2017 IEEE International Conference on Multimedia and Expo (ICME), 2017 IEEE International Conference on Multimedia and Expo (ICME), IEEE, Hong Kong, China, pp. 403-408.
View/Download from: Publisher's site
View description>>
We present a novel deep learning framework for crowd counting
by learning a perspective-embedded deconvolution network.
Perspective is an inherent property of most surveillance
scenes. Unlike the traditional approaches that exploit the perspective
as a separate normalization, we propose to fuse the
perspective into a deconvolution network, aiming to obtain a
robust, accurate and consistent crowd density map. Through
layer-wise fusion, we merge perspective maps at different resolutions
into the deconvolution network. With the injection of
perspective, our network is driven to learn to combine the underlying
scene geometric constraints adaptively, thus enabling
an accurate interpretation from high-level feature maps to the
pixel-wise crowd density map. In addition, our network allows
generating density map for arbitrary-sized input in an
end-to-end fashion. The proposed method achieves competitive
result on the WorldExpo2010 crowd dataset.
Zhong, Y, Zhu, JB, Dutkiewicz, E, Jiang, T & Zhou, Z 1970, 'Device-free sensing for classification of human activities using high-order cumulant algorithm', 2017 17th International Symposium on Communications and Information Technologies (ISCIT), 2017 17th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Cairns, QLD, Australia, pp. 1-4.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. In this paper, the possibility of using an emerging approach, namely device-free sensing (DFS) technology, for classification of human activities is investigated. To fully evaluate this approach, several samples have been collected in an outdoor open-field environment. Using the collected data along with a classifier, a high-order cumulant (HOC) based feature extraction algorithm is investigated. To demonstrate the improvement of using this algorithm, the classical approach that is based on received-signal strength (RSS) is chosen as a benchmark. The experiment results demonstrated that the classification accuracy of the proposed algorithm is better than the classical approach by at least 15%. In addition, the reliability of the presented approach due to variation of training samples and signal-to-noise ratio (SNR) are also carefully tested using experimentally recorded samples, so that a good reliability can be ensured.
Zhou, Y, Ni, W, Zheng, K, Liu, RP & Yang, Y 1970, 'Node-centric route mutation for large-scale SDN based on 3D earth mover's distance model', 2017 17th International Symposium on Communications and Information Technologies (ISCIT), 2017 17th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Cairns, QLD, Australia, pp. 1-6.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Exploiting software-defined networking techniques, randomly and instantly mutating routes can disguise strategically important infrastructure, and protect the integrity of data networks. Route mutation has been to date formulated as NP-complete constraint satisfaction problems where feasible sets of routes need to be generated with exponential computational complexities, limiting algorithmic scalability to large-scale networks. In this paper, we propose a novel node-centric route mutation method which interprets route mutation as a signature matching problem. We formulate the route mutation problem as a three-dimensional earth mover's distance (EMD) model and solve it by using a binary branch and bound method. Considering the scalability, we further propose a heuristic method yields significantly lower computational complexities with marginal loss of robustness against eavesdropping. Simulation results show that our proposed methods can effectively disguise key infrastructure by reducing the difference of historically accumulative traffic among different switches. With significantly reduced complexities, our algorithms are of particular interest to safeguard large-scale networks.
Zhu, HL, Ding, C, Wei, G & Guo, YJ 1970, 'A novel base station antenna based on rectangular waveguide', ISAP 2016 - International Symposium on Antennas and Propagation, International Symposium on Antennas and Propagation (ISAP), IEEE, Okinawa, Japan, pp. 196-197.
View description>>
A novel base station antenna element is proposed. It consists of a surface of parallel strips to rotate the polarization direction and a segment of a rectangular waveguide. The surface is designed on a single-sided substrate, which has the same area as the aperture of the waveguide. In assembling, the non-copper side of the substrate is placed in direct contact with the aperture of the waveguide antenna. To achieve the polarization rotation, the parallel strips on the surface are rotated by 45° with respect to the walls of the waveguide antenna. By adding the surface, the linear polarization direction of the rectangular waveguide antenna is rotated by 45° to comply with the requirements of cellular industry. SMA connector with a conical probe is used as the coaxial-to-waveguide adaptor. Results have shown that the proposed antenna has a fractional impedance bandwidth of 35%, and a stable radiation pattern is also achieved.
Zhu, X, Li, L, Zhang, W, Rao, T, Xu, M, Huang, Q & Xu, D 1970, 'Dependency Exploitation: A Unified CNN-RNN Approach for Visual Emotion Recognition', Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, Twenty-Sixth International Joint Conference on Artificial Intelligence, International Joint Conferences on Artificial Intelligence Organization, Melbourne, Australia, pp. 3595-3601.
View/Download from: Publisher's site
View description>>
Visual emotion recognition aims to associate images with appropriate emotions. There are different visual stimuli that can affect human emotion from low-level to high-level, such as color, texture, part, object, etc. However, most existing methods treat different levels of features as independent entity without having effective method for feature fusion. In this paper, we propose a unified CNN-RNN model to predict the emotion based on the fused features from different levels by exploiting the dependency among them. Our proposed architecture leverages convolutional neural network (CNN) with multiple layers to extract different levels of features with in a multi-task learning framework, in which two related loss functions are introduced to learn the feature representation. Considering the dependencies within the low-level and high-level features, a new bidirectional recurrent neural network (RNN) is proposed to integrate the learned features from different layers in the CNN model. Extensive experiments on both Internet images and art photo datasets demonstrate that our method outperforms the state-of-the-art methods with at least 7% performance improvement.
Zuo, Y, Wu, Q, Zhang, J & An, P 1970, 'Minimum spanning forest with embedded edge inconsistency measurement for color-guided depth map upsampling', 2017 IEEE International Conference on Multimedia and Expo (ICME), 2017 IEEE International Conference on Multimedia and Expo (ICME), IEEE, Hong Kong, China, pp. 211-216.
View/Download from: Publisher's site
View description>>
© 2017 IEEE. Color-guided depth map up-sampling, such as Markov-Random-Field-based (MRF-based) methods, is a popular depth map enhancement solution, which normally assumes edge consistency between color image and corresponding depth map. It calculates the coefficients of smoothness term in MRF according to such assumption. However, such consistency is not always true which leads to texture-copying artifacts and blurring depth edges. In this paper, we propose a novel coefficient computing scheme for smoothness term in MRF which is based on the distance between pixels in the Minimum Spanning Trees (Forest) to better preserve depth edges. The explicit edge inconsistency measurement is embedded into weights of edges in Minimum Spanning Trees, which significantly mitigates texture-copying artifacts. The proposed method is evaluated on Middlebury datasets and ToF-Mark datasets which demonstrates improved results compared with state-of-the-art methods.