11 results on '"Kwan-Wu Chin"'
Search Results
2. Learning Algorithms for Complete Targets Coverage in RF-Energy Harvesting Networks
- Author
-
Chuyu Li, Kwan-Wu Chin, and Changlin Yang
- Subjects
Computer Networks and Communications ,Automotive Engineering ,Aerospace Engineering ,Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
3. Stochastic Targets Monitoring in Wireless Powered Sensor Networks
- Author
-
Changlin Yang, Montserrat Ros, Jia Fei, and Kwan-Wu Chin
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Real-time computing ,Aerospace Engineering ,020302 automobile design & engineering ,02 engineering and technology ,Transmitter power output ,Upper and lower bounds ,0203 mechanical engineering ,Automotive Engineering ,Wireless ,Reinforcement learning ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,Energy (signal processing) ,Communication channel - Abstract
Future Internet of Things (IoTs) networks will consist of a Hybrid Access Point (HAP) that powers devices via Radio Frequency (RF) signals. These devices harvest RF-energy and are tasked with monitoring target(s) such as vehicles at key locations. In order to maximize their expected targets monitoring time, this paper considers the problem of optimizing the HAP's transmit power, and the active time of devices. We formulate a Stochastic Program (SP) and solve it using the Sample Average Approximation method. We also present a sequential Monte-Carlo based reinforcement learning method or SMC-L to learn sensor activation time. Our results show that (i) the confidence interval upper bound of the solution derived by the SP is affected by the number of samples that represent targets appearance time, (ii) increasing the sensing range of devices affects the total expected target monitoring time, (iii) the learning speed of SMC-L is affected by its exploration rate, and (iv) SMC-L does not utilize the energy of devices fully under poor channel conditions.
- Published
- 2020
- Full Text
- View/download PDF
4. Learning to Bond in Dense WLANs With Random Traffic Demands
- Author
-
Yizhou Luo and Kwan-Wu Chin
- Subjects
Channel allocation schemes ,Computer Networks and Communications ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Aerospace Engineering ,Throughput ,Channel bonding ,Interference (wave propagation) ,law.invention ,law ,Automotive Engineering ,Wireless lan ,Bandwidth (computing) ,Wi-Fi ,Electrical and Electronic Engineering ,business ,Computer network ,Communication channel - Abstract
The Access Points (APs) in a Wireless Local Area Network (WLAN) must be assigned one or more channels to meet traffic demands from users. To date, prior works on channel assignment assume APs have a fixed traffic demand, meaning they do not consider or adapt to spatio-temporal changes in traffic demands. To this end, we leverage Deep Reinforcement Learning (DRL), where we equip APs with a DRL-based channel assignment solution, to maximize the average number of slots in which an AP has sufficient bandwidth to meet user demands. Our APs learn from their historical traffic loads and assign themselves partially overlapping channels with minimal interference. Simulation results show that our DRL solution leads to APs satisfying 60% more user demands as compared to fixed and greedy channel bonding algorithms.
- Published
- 2020
- Full Text
- View/download PDF
5. On Maximizing Min Source Rate in Power Beacon Assisted IoTs Networks
- Author
-
Jinming Wen, Kwan-Wu Chin, Tengjiao He, Changlin Yang, and Sieteng Soh
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Aerospace Engineering ,020302 automobile design & engineering ,02 engineering and technology ,Power (physics) ,0203 mechanical engineering ,Transmission (telecommunications) ,Automotive Engineering ,Radio frequency ,Electrical and Electronic Engineering ,Routing (electronic design automation) ,business ,Computer network ,Integer (computer science) - Abstract
Future Internet of Things (IoTs) networks will have Radio Frequency (RF)-energy harvesting devices powered by a Power Beacon (PB). These devices will be tasked with collection and transmission of data over multiple hops to a fusion center. In this paper, our aim is to maximize the minimum data gathering rate of devices acting as sources. We formulate a Mixed Integer Linear Program (MILP) to compute the optimal max-min rate of sources by deciding for each slot the devices to be charged, a PB's transmission power, the amount of data routed over each link, and the active time of transmitting links. We also present a novel distributed protocol called Distributed Charging and Fairness Gathering (D-CFG) that is used by IoT devices to request charging from a PB and to ensure they forward data in a fair manner. Our results show that D-CFG achieves 57.1% of the theoretical max-min rate computed by the MILP.
- Published
- 2020
- Full Text
- View/download PDF
6. Charge-and-Activate Policies for Targets Monitoring in RF-Harvesting Sensor Networks
- Author
-
Jia Fei, Changlin Yang, Montserrat Ros, and Kwan-Wu Chin
- Subjects
Transmission (telecommunications) ,Computer Networks and Communications ,Computer science ,Automotive Engineering ,Energy conversion efficiency ,Real-time computing ,Aerospace Engineering ,Radio frequency ,Electrical and Electronic Engineering ,Wireless sensor network ,Energy storage ,Energy (signal processing) ,Power (physics) - Abstract
In this paper, we consider a Hybrid Access Point (HAP) that supplies energy to sensor devices tasked with monitoring one or more mobile targets with a known trajectory. The HAP's goal is to maximize a Quality of Monitoring (QoM) metric that is a ratio of the following quantities: (i) distance between a sensor device and a target, and (ii) duration in which a target is monitored by a sensor device. We formulate a Mixed Integer Linear Program (MILP) and use it to determine the subset of sensor devices to be charged in each time slot, their activation time, and the transmission or charging power used by the HAP. We also propose a Cross-Entropy (CE) approach and a heuristic algorithm called Energy Reallocation Linear Programming Approximation (ERLPA) to select sensor devices for charging in large-scale networks. Our results show that (i) QoM is affected by the energy requirement of sensor devices, energy storage capacity, number of channels available to the HAP, sensor sensing radius and energy conversion efficiency of sensor devices, and (ii) both the CE method and ERLPA are capable of producing schedules that are near optimal.
- Published
- 2020
- Full Text
- View/download PDF
7. Uplinks Schedulers for RF-Energy Harvesting Networks With Imperfect CSI
- Author
-
Changlin Yang, Ying Liu, and Kwan-Wu Chin
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Heuristic (computer science) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Time division multiple access ,Aerospace Engineering ,Throughput ,Data_CODINGANDINFORMATIONTHEORY ,Single antenna interference cancellation ,Channel state information ,Automotive Engineering ,Telecommunications link ,Computer Science::Networking and Internet Architecture ,Radio frequency ,Electrical and Electronic Engineering ,business ,Computer Science::Information Theory ,Data transmission ,Computer network - Abstract
We consider a Hybrid Access Point (HAP) that is equipped with a Successive Interference Cancellation (SIC) radio, and it is responsible for charging Radio Frequency (RF) energy harvesting devices. In addition, the HAP assigns one or more uplinks data transmission slots to these devices. In this work, we address an important and challenging problem: determine an uplink transmission schedule that maximizes the throughput at the HAP. Unlike past works, we do not assume the HAP has perfect Channel State Information (CSI). We outline a discrete optimization approach that allows the HAP to learn the best transmission schedule. We also present a heuristic approach that allows the HAP to iteratively construct a schedule. Our results show that the HAP is able to learn a transmission schedule that has higher throughput than Time Division Multiple Access (TDMA) where each slot has one device.
- Published
- 2020
- Full Text
- View/download PDF
8. Robust Targets Coverage for Energy Harvesting Wireless Sensor Networks
- Author
-
Kwan-Wu Chin, Ying Liu, Junbao Zhang, Tengjiao He, and Changlin Yang
- Subjects
Energy expenditure ,Computer Networks and Communications ,Computer science ,Robustness (computer science) ,Sensor node ,Automotive Engineering ,Energy harvesting wireless sensor networks ,Real-time computing ,Aerospace Engineering ,Electrical and Electronic Engineering ,Energy harvesting ,Wireless sensor network - Abstract
Energy harvesting wireless sensor networks (EH-WSNs) form the foundation of Internet of Things (IoTs) systems. Energy harvesting nodes can be deployed strategically to monitor one or more targets such as a valuable asset. However, as these nodes rely on ambient energy sources such as solar, they experience random energy arrivals. Consequently, they may exhaust their harvested energy while monitoring a target. Therefore, network operators require a robust solution that ensures all targets are monitored continuously over some time period with a given probability. In this paper, we consider three novel robust coverage requirements; each must hold with probability ( $1-\epsilon$ ), where $\epsilon$ is the probability of failures. First, sensor nodes must not expend more than their total harvested energy over $T$ time slots. Second, the energy expenditure of each sensor node must not exceed the energy harvested in each slot . Third, the energy expenditure of sensor nodes must not exceed the energy accumulated up to the current slot. We formulate chance-constrained stochastic programs that incorporate these requirements and solve them using the sample average approximation method. We confirm via extensive simulation studies that our programs are capable of computing sensor nodes activation times that meet a given coverage failure probability.
- Published
- 2019
- Full Text
- View/download PDF
9. Nodes Deployment for Coverage in Rechargeable Wireless Sensor Networks
- Author
-
Tengjiao He, Kwan-Wu Chin, Ying Liu, and Changlin Yang
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Node (networking) ,Aerospace Engineering ,Approximation algorithm ,Energy consumption ,Critical infrastructure ,Automotive Engineering ,Computer Science::Networking and Internet Architecture ,Electrical and Electronic Engineering ,business ,Energy harvesting ,Wireless sensor network ,Efficient energy use ,Integer (computer science) ,Computer network - Abstract
This paper considers a novel problem in rechargeable wireless sensor networks (WSNs), given a set of locations with one or more targets, determine the minimum number of sensor nodes to deploy in order to ensure a given coverage quality. This problem is significant as sensor nodes are often used to monitor one or more valuable assets or critical infrastructure. We formulate the problem as an integer linear program (ILP) and use it to compute the minimum number of sensor nodes required to monitor targets in small-scale WSNs. For large-scale WSNs, we relax the integer variables of the ILP and devise three approximation algorithms: greedy round node placement, target protection node placement, and energy efficient node placement (EENP). We prove the worst case performance bound of these algorithms. We also conducted simulation to compare these algorithms against the optimal solution produced by the ILP. Our results show that the solution computed by EENP is within one percentage point from the optimal solution.
- Published
- 2019
- Full Text
- View/download PDF
10. A Novel Distributed Pseudo-TDMA Channel Access Protocol for Multi-Transmit-Receive Wireless Mesh Networks
- Author
-
Sieteng Soh, Kwan-Wu Chin, and Yuanhuizi Xu
- Subjects
Routing protocol ,Engineering ,Schedule ,Wireless mesh network ,Computer Networks and Communications ,business.industry ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Time division multiple access ,Aerospace Engineering ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Network topology ,0203 mechanical engineering ,Automotive Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Benchmark (computing) ,Superframe ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
A key approach to improve the capacity of wireless mesh networks (WMNs) is to equip routers with multiple transmissions or receptions (MTR) capability. Thus, the resulting MTR WMN has significantly higher network capacity because routers can activate multiple links simultaneously. This, however, requires an MTR link scheduler that maximizes network capacity or equivalently, one that is capable of deriving a short schedule. Henceforth, we propose period controlled pseudo time-division multiple access (PCP-TDMA), a link scheduler that allows nodes to cooperatively reduce an initial link schedule or superframe over time in a distributed manner. Routers are able to adapt the superframe size iteratively using only local information to accommodate any topological changes. This means PCP-TDMA is particularly suited for use in large-scale MTR WMNs. We have evaluated PCP-TDMA in various network topologies, and compared it against ALGO-2, a centralized algorithm that uses global topological information to derive a schedule and thus serves as a benchmark. We also compare PCP-TDMA against two distributed approaches: JazzyMAC and ROMA. The results show that PCP-TDMA achieves similar performance with the centralized algorithm in all scenarios, and outperforms the distributed approaches significantly. Specifically, in a fully connected network, the resulting superframe length of PCP-TDMA is less than $1/3$ and $1/2$ of JazzyMAC and ROMA, respectively.
- Published
- 2018
- Full Text
- View/download PDF
11. An Energy-Efficient Mobile-Sink Path Selection Strategy for Wireless Sensor Networks
- Author
-
Fazel Naghdy, Kwan-Wu Chin, and Hamidreza Salarian
- Subjects
Engineering ,Computer Networks and Communications ,business.industry ,Network packet ,Real-time computing ,Rendezvous ,Aerospace Engineering ,Energy consumption ,Sensor node ,Automotive Engineering ,Wireless ,Mobile telephony ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,Computer network ,Efficient energy use - Abstract
Several studies have demonstrated the benefits of using a mobile sink to reduce the energy consumption of nodes and to prevent the formation of energy holes in wireless sensor networks (WSNs). However, these benefits are dependent on the path taken by the mobile sink, particularly in delay-sensitive applications, as all sensed data must be collected within a given time constraint. An approach proposed to address this challenge is to form a hybrid moving pattern in which a mobile-sink node only visits rendezvous points (RPs), as opposed to all nodes. Sensor nodes that are not RPs forward their sensed data via multihopping to the nearest RP. The fundamental problem then becomes computing a tour that visits all these RPs within a given delay bound. Identifying the optimal tour, however, is an NP-hard problem. To address this problem, a heuristic called weighted rendezvous planning (WRP) is proposed, whereby each sensor node is assigned a weight corresponding to its hop distance from the tour and the number of data packets that it forwards to the closest RP. WRP is validated via extensive computer simulation, and our results demonstrate that WRP enables a mobile sink to retrieve all sensed data within a given deadline while conserving the energy expenditure of sensor nodes. More specifically, WRP reduces energy consumption by 22% and increases network lifetime by 44%, as compared with existing algorithms.
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.