4,114 results on '"Multi-user"'
Search Results
2. Behavioral science labs: How to solve the multi-user problem.
- Author
-
Niehorster, Diederick C., Gullberg, Marianne, and Nyström, Marcus
- Subjects
- *
GENERAL Data Protection Regulation, 2016 , *BEHAVIORAL sciences , *RESEARCH personnel , *EYE tracking , *PROBLEM solving - Abstract
When lab resources are shared among multiple research projects, issues such as experimental integrity, replicability, and data safety become important. Different research projects often need different software and settings that may well conflict with one another, and data collected for one project may not be safeguarded from exposure to researchers from other projects. In this paper we provide an infrastructure design and an open-source tool, labManager, that render multi-user lab facilities in the behavioral sciences accessible to research projects with widely varying needs. The solutions proposed ensure ease of management while simultaneously offering maximum flexibility by providing research projects with fully separated bare metal environments. This solution also ensures that collected data is kept separate, and compliant with relevant ethical standards and regulations such as General Data Protection Regulation (GDPR) legislation. Furthermore, we discuss preconditions for running shared lab facilities and provide practical advice. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Spectral efficiency of hybrid precoding and combining design for mm-Wave multi-user massive MIMO systems.
- Author
-
Umaria, Krupali and Shah, Shweta
- Subjects
TELECOMMUNICATION systems ,NEXT generation networks ,MIMO systems ,DESIGN - Abstract
Signal loss remains a persistent challenge in communication systems, impacting Multiple Input Multiple Output (MIMO) systems, especially in the millimeter-wave (mm-Wave) context. This paper explores the effectiveness of the proposed Hybrid Precoding/Combining Design (HPCD) algorithm within a fully connected structure of an mm-Wave downlink massive MIMO system. The primary objective is to enhance the overall system's performance, specifically focusing on improving spectral efficiency. Simulation results consistently demonstrate the superiority of the HPCD algorithm over state-of-the-art techniques, revealing substantial improvements in spectral efficiency. This thorough examination highlights the potential of the proposed approach, positioning it as a compelling solution for next-generation communication networks. The findings are anticipated to significantly contribute to spectral efficiency optimization, facilitating the seamless integration of the proposed technique into practical communication scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. 基于DTW K-medoids 与VMD-多分支神经网络的 多用户短期负荷预测.
- Author
-
王宇飞, 杜桐, 边伟国, 张钊, 刘慧婷, and 杨丽君
- Abstract
Copyright of Electric Power is the property of Electric Power Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
5. A Sponge-Based PRF with Good Multi-user Security
- Author
-
Bhattacharjee, Arghya, Bhaumik, Ritam, Nandi, Mridul, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Smith, Benjamin, editor, and Wu, Huapeng, editor
- Published
- 2024
- Full Text
- View/download PDF
6. Privacy-Preserving Data Search in Cloud Storage
- Author
-
Huang, Cheng, Shen, Xuemin (Sherman), Shen, Xuemin Sherman, Series Editor, Huang, Cheng, and Shen, Xuemin (Sherman)
- Published
- 2024
- Full Text
- View/download PDF
7. Metaverse Immersive Virtual Reality Enhances Multiple Collaboration in the Construction Design Review Phase
- Author
-
Tran, Duc-Hoc, Pham, Duc-Thang, Huynh, Phu Hai, di Prisco, Marco, Series Editor, Chen, Sheng-Hong, Series Editor, Vayas, Ioannis, Series Editor, Kumar Shukla, Sanjay, Series Editor, Sharma, Anuj, Series Editor, Kumar, Nagesh, Series Editor, Wang, Chien Ming, Series Editor, Cui, Zhen-Dong, Series Editor, Reddy, J. N., editor, Luong, Van Hai, editor, and Le, Anh Tuan, editor
- Published
- 2024
- Full Text
- View/download PDF
8. Multi-user fine-grained task offloading scheduling strategy under cloud-edge-end collaboration
- Author
-
XIE Mande, HUANG Zhufang, and SUN Hao
- Subjects
edge computing ,task offloading ,cloud-edge-end collaboration ,multi-user ,fine-grained scheduling ,Telecommunication ,TK5101-6720 ,Technology - Abstract
To solve the current problems of inefficiency, low utilization of intensive network resources, and high system cost in handling multi-user applications, a multi-user fine-grained task offloading scheduling approach under cloud-edge-end collaboration was proposed. Latency, energy consumption, and server rental costs were jointly considered. Application tasks were firstly divided and subtask priorities were designed. Then, a multi-user subtask scheduling scheme was proposed and an improved simulated annealing particle swarm algorithm was designed to minimize the total system cost to achieve the optimal offloading decision. Experimental results show that the proposed method reduces the total cost by at least 12.28% and 7.42% compared to other methods such as particle swarm and simulated annealing binary particle swarm, respectively.
- Published
- 2024
- Full Text
- View/download PDF
9. Research on hybrid synchronization methods in multi‐user collaborative VR simulation medical surgery training system.
- Author
-
Gong, Ao, Cheng, Yun, Su, Jing, and Zhang, Li
- Subjects
SURGICAL education ,MEDICAL simulation ,SYNCHRONIZATION ,VIRTUAL reality ,TRAINING needs ,CLINICAL medicine ,HEAD-mounted displays - Abstract
Summary: The simulation training system based on VR technology has been applied in clinical medicine due to its immersive interactive experience, economy, and safety. In response to the limitation that most medical surgery training systems can only achieve single user operations, a hybrid synchronous model based multi‐user collaborative framework design is proposed to meet the needs of collaborative training in virtual reality teaching processes. Based on the characteristics of frame synchronization and state synchronization, the synchronization method has been improved. Based on frame synchronization, specific state synchronization is used on interactive events to improve the consistency of operation details and real‐time action. On this basis, a system prototype has been implemented using Unity 3D, and compared with traditional schemes, analysis shows that it has faster response speed for disconnected reconnection and more stable interaction state. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Many-objective joint optimization for dependency-aware task offloading and service caching in mobile edge computing.
- Author
-
Xiangyu Shi, Zhixia Zhang, Zhihua Cui, and Xingjuan Cai
- Subjects
EDGE computing ,MOBILE computing ,EVOLUTIONARY algorithms ,MATE selection ,ENERGY consumption ,USER experience ,CONSTRAINED optimization - Abstract
Previous studies on joint optimization of computation offloading and service caching policies in Mobile Edge Computing (MEC) have often neglected the impact of dependency-aware subtasks, edge server resource constraints, and multiple users on policy formulation. To remedy this deficiency, this paper proposes a many-objective joint optimization dependencyaware task offloading and service caching model (MaJDTOSC). MaJDTOSC considers the impact of dependencies between subtasks on the joint optimization problem of task offloading and service caching in multi-user, resource-constrained MEC scenarios, and takes the task completion time, energy consumption, subtask hit rate, load variability, and storage resource utilization as optimization objectives. Meanwhile, in order to better solve MaJDTOSC, a many-objective evolutionary algorithm TSMSNSGAIII based on a three-stage mating selection strategy is proposed. Simulation results show that TSMSNSGAIII exhibits an excellent and stable performance in solving MaJDTOSC with different number of users setting and can converge faster. Therefore, it is believed that TSMSNSGAIII can provide appropriate sub-task offloading and service caching strategies in multi-user and resource-constrained MEC scenarios, which can greatly improve the system offloading efficiency and enhance the user experience. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Research on Dynamic Searchable Encryption Method Based on Bloom Filter.
- Author
-
Jin, Ziqi, Li, Dongmei, Zhang, Xiaomei, and Cai, Zhi
- Subjects
SEARCH algorithms ,LEAKS (Disclosure of information) ,DATA encryption ,BACK exercises ,CONTRACTING out ,PRIVACY ,BLOCK ciphers - Abstract
Data outsourcing has become more and more popular due to its low cost and flexibility. However, there is a problem that the cloud server used to store data is partially trusted. Searchable encryption is an efficient technology that is devoted to helping people conduct accurate searches without leaking information. Nonetheless, most existing schemes cannot support dynamic updates or meet the privacy requirements of all users. There have been some experiments to solve these issues by implementing a dynamically searchable asymmetric encryption scheme. This paper proposes an efficient searchable encryption scheme based on the Authenticator Bloom Filter (ABF). The solution can support dynamic updates and multiple users and meet forward and backward security. This paper uses an ABF to improve the efficiency of searches and updates while playing a significant role in dynamic updates. This paper designs a new token encryption scheme and file set encryption scheme, which not only helps users reduce time in searches and updates but also supports multi-user modes. Experiments show that the proposed scheme takes less time in searching and updating algorithms, especially when the keyword does not exist. The solution also takes into account the problem of history storage when updating, which reduces the unnecessary consumption of memory and avoids multiple storage states for the same file. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. 云边端协同下多用户细粒度任务卸载调度策略.
- Author
-
谢满德, 黄竹芳, and 孙浩
- Abstract
Copyright of Telecommunications Science is the property of Beijing Xintong Media Co., Ltd. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
13. Impact of Latency on QoE, Performance, and Collaboration in Interactive Multi-User Virtual Reality.
- Author
-
Van Damme, Sam, Sameri, Javad, Schwarzmann, Susanna, Wei, Qing, Trivisonno, Riccardo, De Turck, Filip, and Torres Vega, Maria
- Subjects
GROUP dynamics ,SOCIAL groups ,REQUIREMENTS engineering ,SIMULATOR sickness ,VIRTUAL reality - Abstract
Interactive, multi-user experiences are meant to define the present and future of Virtual Reality (VR). Such immersive experiences will typically consist of remote collaborations where content is streamed and/or synchronized over a network connection. Thus, real-time collaboration will be key. In this light, the responsiveness of the system and the network will define the overall experience. As such, understanding the effect of network distortions, especially related to time delay, on end-user's perception (in terms of Quality-of-Experience (QoE)), performance, and collaboration becomes crucial. The existing literature, however, has mostly focused on network requirements from a system point-of-view, where the key performance parameters are only provided in the form of Quality-of-Service (QoS) parameters (such as end-to-end latency). However, the translation of these network impairments to the end-user experience is often omitted. The purpose of this paper is to fill the gap by providing a thorough investigation of the impact of latency on the perception of users while performing collaborative tasks in multi-user VR. To this end, an experimental framework was designed, developed, and tested. It is based on a multi-device synchronizing architecture, enabling two simultaneous users to work together in a gamified virtual environment. The developed test environment also allows for the identification of the most prominent network requirements and objective analysis for each traffic link. To experimentally investigate the impact of latency on user perception, a user study was conducted. Participants were paired and asked to perform the collaborative task under different latency-prone scenarios. The results show that users are able to easily distinguish between distorted and non-distorted network configurations. However, making a distinction between different manifestations of latency is much less straightforward. Moreover, factors such as the user's role in the experience and the required task, and the level of interactivity and movement have an important influence on the subjective level of perception, the strength of the user's preferences, and the occurrence of cybersickness. In contrast, no significant differences in objective metrics, such as system performance and user completion time were observed. These results can support the creation of collective QoE metrics that model the group as a whole rather than each individual separately. As such, this work provides an important step to dynamically counteract any drops in group dynamics and performance by means of smart interventions in the transmission system and/or virtual environment. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Multi-user centered design: acceptance, user experience, user research and user testing.
- Author
-
Fleury, Sylvain and Chaniaud, Noémie
- Subjects
- *
DIGITAL technology , *MEDICAL protocols , *ERGONOMICS , *INTERPROFESSIONAL relations , *PRODUCT design , *REFLECTION (Philosophy) , *MATHEMATICAL models , *RESEARCH methodology , *CONCEPTUAL structures , *SOCIAL values , *THEORY , *SOFTWARE architecture , *USER interfaces , *PATIENTS' attitudes - Abstract
In recent years, technologies have evolved towards social, universal and collaborative uses involving multiple users. However, methods and models from user centered design are focused on single-user design and do not take into account the impact of other users on intentions and behaviors to use the technology. The objective of this article is to provide paths of reflection on how to integrate a multi-user centered approach to existing user centered design methods and models. Each phase of user-centered design has been rethought to implement this new framework. Guidelines for moving from user experience to Multi-User eXperience (MUX) are provided. In the same way, we recommend adding a multi-user variable in the technology acceptance models to become the Multi-user Acceptance Model (MAM). User research and user testing have also been rethought to a multi-user reach and a multi-user testing. All these considerations are discussed, and lead to a proposal of a future Multi-user Centered Design (MCD) approach, specifically adapted to manage multi-user digital technology development projects. Finally, it is therefore necessary and important to direct research in the fields (acceptance, user experience, user research and user testing) to assist designers with the development of new methods of product design more respectful of social, environmental and collaborative values. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Multi-Agent Systems for Collaborative Inference Based on Deep Policy Q-Inference Network.
- Author
-
Wang, Shangshang, Jing, Yuqin, Wang, Kezhu, and Wang, Xue
- Abstract
This study tackles the problem of increasing efficiency and scalability in deep neural network (DNN) systems by employing collaborative inference, an approach that is gaining popularity because to its ability to maximize computational resources. It involves splitting a pre-trained DNN model into two parts and running them separately on user equipment (UE) and edge servers. This approach is advantageous because it results in faster and more energy-efficient inference, as computation can be offloaded to edge servers rather than relying solely on UEs. However, a significant challenge of collaborative belief is the dynamic coupling of DNN layers, which makes it difficult to separate and run the layers independently. To address this challenge, we proposed a novel approach to optimize collaborative inference in a multi-agent scenario where a single-edge server coordinates the assumption of multiple UEs. Our proposed method suggests using an autoencoder-based technique to reduce the size of intermediary features and constructing tasks using the deep policy inference Q-inference network’s overhead (DPIQN). To optimize the collaborative inference, employ the Deep Recurrent Policy Inference Q-Network (DRPIQN) technique, which allows for a hybrid action space. The results of the tests demonstrate that this approach can significantly reduce inference latency by up to 56% and energy usage by up to 72% on various networks. Overall, this proposed approach provides an efficient and effective method for implementing collaborative inference in multi-agent scenarios, which could have significant implications for developing DNN systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. A Multi-user Cross-platform hands-on virtual lab within the Metaverse – the case of machining training.
- Author
-
Chuang, Tung-Jui and Smith, Shana
- Abstract
Distance learning has become a popular learning channel today. However, while various distance learning tools are available, most of them only support a single platform, offer only the trainer’s perspective, and do not facilitate student-instructor interaction. As a result, distance learning systems tend to be inflexible and less effective. To address the limitations of existing distance learning systems, this study developed a cross-platform hands-on virtual lab within the Metaverse that enables multi-user participation and interaction for distance education. Four platforms, HTC VIVE Pro, Microsoft HoloLens 2, PC, and Android smartphone, are supported. The virtual lab allows trainers to demonstrate operation steps and engage with multiple trainees simultaneously. Meanwhile, trainees have the opportunity to practice their operational skills on their virtual machines within the Metaverse, utilizing their preferred platforms. Additionally, participants can explore the virtual environment and interact with each other by moving around within the virtual space, similar to a physical lab setting. The user test compares the levels of presence and usability in the hands-on virtual lab across different platforms, providing insights into the challenges associated with each platform within the Metaverse for training purposes. Furthermore, the results of the user test highlight the promising potential of the architecture due to its flexibility and adaptability. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. SAAC: Secure Access Control Management Framework for Multi-User Smart Home Systems
- Author
-
Iram Fatima Hashmi, Zafar Iqbal, Eman Munir, Natalia Kryvinska, Iryna Ivanochko, and Gabriel Avelino Sampedro
- Subjects
Smart home ,access control ,authorization ,multi-user ,attribute-based access control ,role-based access control ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In a smart home environment, multiple users can access a single smart device simultaneously. Moreover, these multiple users may have conflicting demands at a time; that is, one user’s demands differ from another for the same device based on the role of users and environmental factors. Therefore, existing single-user access control systems cannot handle such conflicting and dynamically changing demands, considering both roles and environmental factors in the multi-user smart home environment. Considering this issue, we proposed a Smart Access Control and Authorization framework (SAAC). It is a multi-user access control solution that has four modules, namely, a user interaction module, a backend server module, a policy manager module, and a policy execution module. The user interaction module collects user data and resource policies, which are processed by the backend server and forwarded to the policy manager. The policy manager resolves conflicts and generates final policies, which are stored in the backend server for enforcement by the policy execution module. The finalized policies are shared with the backend server module and saved there till needed for execution by the policy execution module to enforce the access control decision. We have implemented a proof of concept of the proposed framework on VS Code using the Casbin library. The performance evaluation results show our framework’s effectiveness and efficiency with lower computational complexity requirements than existing methods. Finally, we performed a security analysis of the proposed model based on the STRIDE model that confirms its robustness against access control attacks.
- Published
- 2024
- Full Text
- View/download PDF
18. Multi-User Human Activity Recognition Through Adaptive Location-Independent WiFi Signal Characteristics
- Author
-
Fahd Abuhoureyah, Kok Swee Sim, and Yan Chiew Wong
- Subjects
WiFi sensing ,multi-user ,human activity recognition ,channel state information ,independent component analysis ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In recent years, the remarkable advancement of WiFi sensing technologies has opened new frontiers in human activity recognition, enabling innovative solutions that transcend traditional methods and improve the capabilities of intelligent environments. Individual dynamic movements such as walking, sitting, standing, and running, as well as more complex interactions such as sports activities, are all examples of human activity. WiFi sensing has emerged as a powerful tool for human activity recognition; however, certain restrictions persist, especially when sensing activities involving multiple users across different locations. These limitations highlight the need for innovative techniques to address the intricacies of multi-user scenarios and environmental effects, ensuring the robustness and accuracy of WiFi-based sensing systems. To address multi-user effects in WiFi signals, we propose a few layering LSTM deep learning models with Raspberry Pi for edge computing solutions. The method leverages the decomposition of Channel State Information (CSI) signals through Independent Component Analysis (ICA) and Continuous Wavelet Transform (CWT). The integration of signal decomposition and deep learning holds promise for advancing WiFi sensing systems’ accuracy, reliability, and real-time capabilities in complex environments and multi-user scenarios. Experimental findings prove the system’s ability to handle complex activities with high classification accuracy. Furthermore, the system displays a remarkable ability to classify complex activities. By leveraging the power of deep learning, the model learns intricate patterns and relationships within the decomposed CSI signals, enabling it to distinguish between diverse activities with high accuracy.
- Published
- 2024
- Full Text
- View/download PDF
19. Design and Implementation of Secure CP-Less Multi-User OCDM Transceiver for 6G Wireless Communication Networks
- Author
-
Md. Najmul Hossain, Raad Raad, Kottakkaran Sooppy Nisar, Shaikh Enayet Ullah, Fowzia Jabin, Sk. Tamanna Kamal, Tetsuya Shimamura, Faisel Tubbal, and Suhila Abulgasem
- Subjects
OCDM ,6G ,multi-user ,OFDM ,physical layer security encryption ,cyclic prefix-less ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In this paper, we designed and implemented a multi-antenna configured secure millimeter-wave (mmWave) CP-less multi-user orthogonal chirp division multiplexing (OCDM) transceiver. The proposed simulated system emphasizes more applicable performance metrics for a typically assumed case of four users and a passive eavesdropper for audio data transmission. We introduce a four-dimensional hyperchaotic system-based encryption algorithm to enhance physical layer security (PLS). In addition, low-density parity check (LDPC), TURBO, ( $3, 2$ ) single parity check (SPC), and repeat and accumulate (RA) channel coding with Cholesky decomposition-based zero-forcing (CD-ZF) and minimum mean square error (MMSE) signal detection techniques for a better bit error rate (BER) were also implemented. The simulation results signify the effectiveness of the proposed system in terms of PLS enhancement with low correlation coefficients (14.62%, 7.61%, 13.61%, and 15.39% for users 1, 2, 3, and 4, respectively), an achievable secrecy rate with a low signal-to-interference and noise ratio (SINR) of the passive eavesdropper, an achievable out-of-band (OOB) power emission of 341 dB, an estimated average short-time Fourier transform (STFT) spectral power difference of 7.68 dB and estimated peak-to-average power ratios (PAPRs) ranging from 7 to 7.5 dB at a complementary cumulative distribution function (CCDF) of $1\times 10^{-3}$ for different ground transmitting channels. At an identical signal-to-noise ratio (SNR) of 17 dB, all four users achieved a bit error rate of $1\times 10^{-4}$ under RA channel coding, CD-ZF, and 16-QAM (quadrature amplitude modulation) digital modulation.
- Published
- 2024
- Full Text
- View/download PDF
20. Pipelined Multi-User IR-HARQ Scheme for Improved Latency Performance in URLLC
- Author
-
Rafael Santos, Daniel Castanheira, Adao Silva, and Atilio Gameiro
- Subjects
URLLC ,low-latency ,grant-free ,multi-user ,control-networks ,multi-user diversity ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The demand for ultra-reliable low-latency communications (URLLC) has led to the adoption of grant-free (GF) access techniques by the 5G NR, with the goal of reducing uplink access time. When GF access is employed, the base station (BS) preallocates multiple transmission opportunities (TOs) that can be utilized by the user equipment (UE) as needed. However, this approach results in inefficient resource utilization as unused TOs are wasted. To overcome this inefficiency, the 5G NR allows the assignment of configured grants (CG) to a group of UEs instead of a single one. This development has led research into group-based CG (GCG) schemes, whose reliance on shared resources can result in collisions. The collisions can be prevented by the use of stop-and-wait IR-HARQ schemes. Nevertheless, the delay caused by feedback latency is also undesirable as it severely affects latency performance. This work proposes two new IR-HARQ GCG schemes to efficiently handle feedback latency. The first one is able to eliminate the feedback latency overhead and is proven to simultaneously achieve the latency of a one-shot transmission and the energy efficiency of IR-HARQ, even in the presence of non-instantaneous feedback signaling. The second one features both a feedback latency protection mechanism, similar to the first scheme, and a mechanism specifically designed to further reduce latency. The performance of the proposed schemes is compared with scenarios where each UE uses either an individual one-shot or an IR-HARQ scheme. These comparisons encompass scenarios with either power or energy constraints. The results have shown that the second scheme always outperforms the IR-HARQ scheme and that it is able to outperform the one-shot scheme on a wide interval of feedback latency values, achieving a lower latency both for power and energy constrained cases.
- Published
- 2024
- Full Text
- View/download PDF
21. Joint Beamforming and Combining Design for mmWave Integrated Access and Backhaul Networks
- Author
-
Zou Linfu, Pan Zhiwen, Alaa Alameer Ahmad, Hayssam Dahrouj, and Mohammed El-Hajjar
- Subjects
Beamforming ,full-duplex ,multi-user ,MIMO ,integrated access and backhaul ,millimeter wave ,Telecommunication ,TK5101-6720 ,Transportation and communications ,HE1-9990 - Abstract
Integrated access and backhaul (IAB) networks operating in full-duplex (FD) mode at millimeter wave frequencies have been actively investigated in the context of future-generation communications networks. However, conventional analog cancellation techniques cannot adequately mitigate the self-interference resulting from the FD operation and the multi-user interference. Hence, in this paper, we consider a multi-cell, multi-user IAB network and jointly design the beamforming and combining matrices to maximize the network’s weighted sum rate. Given the non-convex nature of the problem, we reformulate it using weighted minimum-mean-square-error (WMMSE) and extended fractional programming (FP) techniques followed by a block coordinate descent (BCD) approach. Extensive simulation results validate the superior performance of our proposed algorithms. Specifically, the WMMSE and FP methods can achieve 50 bits/sec/Hz higher than the benchmark scheme for a network employing three cells with two uplink and two downlink users per cell.
- Published
- 2024
- Full Text
- View/download PDF
22. On Weighted Sum Rate of Multi-User Photon-Counting Multiple-Input Multiple-Output Visible Light Communication Systems under Poisson Shot Noise.
- Author
-
Chen, Ying, Zhou, Xiaolin, Wang, Jian, Dong, Zhichao, and Chen, Yongkang
- Subjects
OPTICAL communications ,VISIBLE spectra ,TELECOMMUNICATION systems ,QUANTUM noise ,PHOTON counting ,SYSTEM analysis - Abstract
Photon counting has been proven to possess excellent signal detection capabilities at low power levels and has extensive potential applications in sixth-generation (6G) communications. However, the inherent dependency between the signal and noise complicates system analysis, and optimizing achievable rates in photon-counting visible light communication (VLC) systems remains unresolved. This paper introduces a new method aimed at minimizing multi-user interference (MUI) through a zero-forcing (ZF) scheme and maximizing the weighted sum rate of the proposed downlink multi-user photon-counting multiple-input multiple-output (MU-PhC-MIMO) VLC system by solving an optimization problem. The key point lies in our utilization of the ZF approach to derive a reasonable asymptotic approximation expression for the weighted sum rate. Subsequently, we use variable substitution and methods like successive convex approximation (SCA) to iteratively convexify the non-convex optimization problem and maximize the weighted sum rate under the ZF form. Compared to other algorithms, this approach can save 2.5 dB of transmission power to achieve the same system-weighted sum rate and significantly outperforms the repetition coding scheme at sufficient transmission power. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. A-DisETrac Advanced Analytic Dashboard for Distributed Eye Tracking.
- Author
-
Abeysinghe, Yasasi, Mahanama, Bhanuka, Jayawardena, Gavindya, Jayawardana, Yasith, Sunkara, Mohan, Duchowski, Andrew T., Ashok, Vikas, and Jayarathna, Sampath
- Subjects
- *
EYE tracking , *DASHBOARDS (Management information systems) - Abstract
Understanding how individuals focus and perform visual searches during collaborative tasks can help improve user engagement. Eye tracking measures provide informative cues for such understanding. This article presents A-DisETrac, an advanced analytic dashboard for distributed eye tracking. It uses off-the-shelf eye trackers to monitor multiple users in parallel, compute both traditional and advanced gaze measures in real-time, and display them on an interactive dashboard. Using two pilot studies, the system was evaluated in terms of user experience and utility, and compared with existing work. Moreover, the system was used to study how advanced gaze measures such as ambient-focal coefficient K and real-time index of pupillary activity relate to collaborative behavior. It was observed that the time a group takes to complete a puzzle is related to the ambient visual scanning behavior quantified and groups that spent more time had more scanning behavior. User experience questionnaire results suggest that their dashboard provides a comparatively good user experience. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. A multiple access channel game with users implementing throughput and latency metrics
- Author
-
Andrey Garnaev and Wade Trappe
- Subjects
Multi-user ,Multi-access channel ,Throughput ,Latency ,Equilibrium ,Information technology ,T58.5-58.64 - Abstract
We consider a multiple access channel (MAC) problem where several users communicate with a base station and in which the users may have different applications or communication purposes for using the network, which is reflected via associated communication metrics. Specifically, we use throughput as the metric to reflect regular data transmission purposes, and latency, modeled by the inverse throughput, is used to reflect data transmission speed as another metric. The problem is formulated as a non-zero sum game. The equilibrium is derived in closed form. Stability in communication for such a heterogeneous network is established by proving the uniqueness of the equilibrium, except for particular cases where stability still can be maintained via cooperation of users with throughput metric or their switching to latency metric.
- Published
- 2023
- Full Text
- View/download PDF
25. Research on interleaved training for massive MIMO downlink with multi-user zero-forcing precoding
- Author
-
Cheng ZHANG, Minjie DING, Chang LIU, Jing Yindi, Fei YU, and Yongming HUANG
- Subjects
massive MIMO ,multi-user ,channel acquisition ,zero-forcing precoding ,interleaved training ,Telecommunication ,TK5101-6720 - Abstract
To solve the channel acquisition overhead problem of frequency division duplex massive MIMO, for the typical scenario of zero-forcing (ZF) precoding at the base station with users’ quality of service guarantee, a supervisory mechanism for the signal-to-interference-and-noise ratio (SINR) was introduced, and a multi-user antenna-by-antenna interleaved training scheme was designed.Then, considering the additional time overhead introduced by the interleaved training, a multi-user interleaved training scheme based on antenna grouping was designed.Closed-form expressions of the average training length, transmission success rate, and average effective sum spectrum efficiency were derived for the proposed schemes.Theoretical and simulation results reveal the impact of transmit power, SINR threshold, user number, group length, and the error level of channel on the performance of the proposed schemes, and demonstrate that the proposed schemes significantly reduce the pilot overhead and improve the transmission success rate compared to the full and partial training.
- Published
- 2023
- Full Text
- View/download PDF
26. MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption
- Author
-
Li, Jinyang, Cao, Zhenfu, Shen, Jiachen, Dong, Xiaolei, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Chen, Chao, editor, and Meng, Weizhi, editor
- Published
- 2023
- Full Text
- View/download PDF
27. Multi-User On-Chain and Off-Chain Collaborative Query Optimization Based on Consortium Blockchain
- Author
-
Wang, Jiali, Li, Yunuo, Tan, Aiping, Gong, Zheng, Wang, Yan, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Yuan, Long, editor, Yang, Shiyu, editor, Li, Ruixuan, editor, Kanoulas, Evangelos, editor, and Zhao, Xiang, editor
- Published
- 2023
- Full Text
- View/download PDF
28. A Framework for Developing Multi-user Immersive Virtual Reality Learning Environments
- Author
-
Checa, David, Rodriguez-Garcia, Bruno, Guillen-Sanz, Henar, Miguel-Alonso, Ines, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, De Paolis, Lucio Tommaso, editor, Arpaia, Pasquale, editor, and Sacco, Marco, editor
- Published
- 2023
- Full Text
- View/download PDF
29. Together Porting: Multi-user Locomotion in Social Virtual Reality
- Author
-
Wood, Gavin, Dickinson, Patrick, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Abdelnour Nocera, José, editor, Kristín Lárusdóttir, Marta, editor, Petrie, Helen, editor, Piccinno, Antonio, editor, and Winckler, Marco, editor
- Published
- 2023
- Full Text
- View/download PDF
30. Design of a Multi-user Collaborative Innovation Digital Resource Library for Miao Embroidery
- Author
-
Chen, Guoying, Mo, Honglei, Yin, Cheng, Cheng, Can, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Marcus, Aaron, editor, Rosenzweig, Elizabeth, editor, and Soares, Marcelo M., editor
- Published
- 2023
- Full Text
- View/download PDF
31. Robust Hybrid Beamforming for Multi-user Millimeter Wave Systems with Sub-connected Structure
- Author
-
Luo, Zhen, Luo, Lang, Zhang, Xin, Liu, Hongqing, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin, Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Gao, Feifei, editor, Wu, Jun, editor, Li, Yun, editor, and Gao, Honghao, editor
- Published
- 2023
- Full Text
- View/download PDF
32. A Novel Two Stage Hybrid Multi-user Precoding Design for Massive MIMO System
- Author
-
Zhang, Liuwei, Zhang, Xin, Zhang, Xiu, Wang, Yue, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Wang, Wei, editor, Liu, Xin, editor, Na, Zhenyu, editor, and Zhang, Baoju, editor
- Published
- 2023
- Full Text
- View/download PDF
33. Design and Research of Multi-user Distributed Configuration Management Based on Zookeeper
- Author
-
Zhang, Ming, Shen, Zhaojian, Yin, Bin, Cui, Li, Xu, Fan, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Wang, Yue, editor, Liu, Yuyang, editor, Zou, Jiaqi, editor, and Huo, Mengyao, editor
- Published
- 2023
- Full Text
- View/download PDF
34. Generic Millimeter-Wave Multi-User Transceiver Design
- Author
-
Cheng, Xiang, Gao, Shijian, Yang, Liuqing, Shen, Xuemin Sherman, Series Editor, Cheng, Xiang, Gao, Shijian, and Yang, Liuqing
- Published
- 2023
- Full Text
- View/download PDF
35. Demonstration of 75 km-fiber quantum clock synchronization in quantum entanglement distribution network.
- Author
-
Tang, Bang-Ying, Tian, Ming, Chen, Huan, Han, Hui, Zhou, Han, Li, Si-Chen, Xu, Bo, Dong, Rui-Fang, Liu, Bo, and Yu, Wan-Rong
- Subjects
QUANTUM entanglement ,WAVELENGTH division multiplexing ,SYNCHRONIZATION ,PHOTON correlation ,COMMUNICATION infrastructure - Abstract
The quantum entanglement distribution network, serviced as the communication infrastructure which distributes quantum information among remote users, enables many applications beyond the reach of classical networks. Recently, the applications such as quantum key distribution and quantum secure direct communication, have been successfully demonstrated in the quantum entanglement distribution network. In this article, we propose a multi-user round-trip quantum clock synchronization (QCS) scheme in the quantum network, which can be implemented with one single entangled photon source located at the server. The server distributes the entangled photons to remote multiple users with the wavelength division multiplexing strategy, and each user feeds partial received photons back to the server. The clock difference between the server and each user is calculated from the one-way and round-trip propagation times, which are determined according to the time correlation of entangled photons. Afterwards, the demonstration has been conducted between the server and a user over a 75-km-long fiber link, where the measured clock difference uncertainty is 4.45 ps, and the time deviation is 426 fs with an average time of 4000 s. Furthermore, the proposed QCS scheme is linearly scalable to many users, with respect to user hardware and number of deployed fibers. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. Owner-free Distributed Symmetric Searchable Encryption Supporting ConjunctiveQueries.
- Author
-
QIUYUN TONG, XINGHUA LI, YINBIN MIAO, YUNWEI WANG, XIMENG LIU, and DENG, ROBERT H.
- Subjects
DATA privacy ,ELECTRONIC information resource searching ,INFORMATION sharing ,DATA encryption - Abstract
Symmetric Searchable Encryption (SSE), as an ideal primitive, can ensure data privacy while supporting retrieval over encrypted data. However, existing multi-user SSE schemes require the data owner to share the secret key with all query users or always be online to generate search tokens. While there are some solutions to this problem, they have at least one weakness, such as non-supporting conjunctive query, result decryption assistance of the data owner, and unauthorized access. To solve the above issues, we propose an Owner-free Distributed Symmetric searchable encryption supporting Conjunctive query (ODiSC). Specifically, we first evaluate the Learning-Parity-with-Noise weak Pseudorandom Function (LPN-wPRF) in dual-cloud architecture to generate search tokens with the data owner free from sharing key and being online. Then, we provide fine-grained conjunctive query in the distributed architecture using additive secret sharing and symmetric-key hidden vector encryption. Finally, formal security analysis and empirical performance evaluation demonstrate that ODiSC is adaptively simulation-secure and efficient. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
37. A Hybrid Spatial Adaptive Modulation and Frequency Stochastic Approach for MU-MIMO-OFDM Systems in the Context of Underlay Cognitive Radios.
- Author
-
Labdaoui, Rym, Ghanem, Khalida, and Ettoumi, Fatiha Youcef
- Subjects
ADAPTIVE modulation ,COGNITIVE radio ,FREQUENCY division multiple access - Abstract
In this paper, low complexity rate and power optimization schemes operating in the spatial and frequency domains are proposed in a cognitive radio (CR) setting involving multi-user multiple-input-multiple-output-orthogonal frequency division multiplexing (MU-MIMO-OFDM). Under the assumption of a perfect secondary channel state information (CSI) at the receiver, the presented architectures encompass two main stages. In the first one, spatial power waterfilling-like method is performed per each MIMO subchannel pertaining to each subcarrier of each secondary user (SU). The resulting allocated power per each eigen-channel is considered as the power budget in the second stage. In this latter, stochastic algorithm-based approach wherein the transmit parameters per each subcarrier of each SU are adapted such that to maximize the achievable sum-rate capacity of the SUs. Three different schemes are introduced in this work. First, the derivation of the continuous rate MU-MIMO-OFDM-CR version, referred to as C-MU-MIMO-OFDM-CR is presented. Obviously, this proposition is theoretical and is taken as a benchmark for the two remaining counterparts. The second proposition we called discrete-rate MU-MIMO-OFDM-CR, and briefly designated as D-MU-MIMO-OFDM-CR which is to round the provided allocated rate. Finally, the third modified solution, denoted as P-D-MU-MIMO-OFDM-CR proceeds in a similar way as the D-MU-MIMO-OFDM-CR alternative, but superimposes the non/over-used amount of power to the power budget in next iteration. The simulation results show that, compared to the discrete rate D-MU-MIMO-OFDM-CR solution, the P-D-MU-MIMOOFDM-CR approach exhibits an approximate power gain of 1 dB when the SNR level is low, and of 5 dB at high SNR range. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
38. Contactless Multi-User Virtual Hair Design Synthesis.
- Author
-
Sung, Changjo and Chin, Seongah
- Subjects
VIRTUAL design ,HAIRDRESSING ,IMMERSIVE design ,HAIRSTYLES ,DISTANCE education ,VIRTUAL reality ,HEAD-mounted displays - Abstract
This study introduces a virtual reality (VR)-based remote hair design training system that addresses the limitations of physical presence. By leveraging virtual environments and eliminating the need for tangible tools, this system allows hairstylists and learners to collaborate and master hair-design techniques from a distance. In this approach, a section of a user's hair was derived from their photograph, and during the training, the most compatible 3D hair model was integrated with the user's 3D avatar using the recommended matching procedure. This aligned hairstyle was subsequently incorporated into a 3D model for hair simulation. Further, VR HMD interaction mapping was used for hair cutting and styling. A collaborative environment for hair design has been crafted, enabling multiple participants to partake in remote hairstyle education. This system offers cost-effective training, enhances cooperative learning, and aligns with the requirements of contact-free education. In essence, this research has transformed remote hair design training with immersive VR technology. To verify the system's accuracy, tests were conducted, and the results showcased enhancements in the matching procedure. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. 面向大规模MIMO下行多用户迫零预编码的交替训练研究.
- Author
-
张铖, 丁敏捷, 刘畅, Yindi Jing, 俞菲, and 黄永明
- Abstract
Copyright of Journal on Communication / Tongxin Xuebao is the property of Journal on Communications Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
40. Research on Dynamic Searchable Encryption Method Based on Bloom Filter
- Author
-
Ziqi Jin, Dongmei Li, Xiaomei Zhang, and Zhi Cai
- Subjects
forwardprivacy ,backward privacy ,asymmetric searchable encryption ,multi-user ,Bloom filter ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
Data outsourcing has become more and more popular due to its low cost and flexibility. However, there is a problem that the cloud server used to store data is partially trusted. Searchable encryption is an efficient technology that is devoted to helping people conduct accurate searches without leaking information. Nonetheless, most existing schemes cannot support dynamic updates or meet the privacy requirements of all users. There have been some experiments to solve these issues by implementing a dynamically searchable asymmetric encryption scheme. This paper proposes an efficient searchable encryption scheme based on the Authenticator Bloom Filter (ABF). The solution can support dynamic updates and multiple users and meet forward and backward security. This paper uses an ABF to improve the efficiency of searches and updates while playing a significant role in dynamic updates. This paper designs a new token encryption scheme and file set encryption scheme, which not only helps users reduce time in searches and updates but also supports multi-user modes. Experiments show that the proposed scheme takes less time in searching and updating algorithms, especially when the keyword does not exist. The solution also takes into account the problem of history storage when updating, which reduces the unnecessary consumption of memory and avoids multiple storage states for the same file.
- Published
- 2024
- Full Text
- View/download PDF
41. Impact of Latency on QoE, Performance, and Collaboration in Interactive Multi-User Virtual Reality
- Author
-
Sam Van Damme, Javad Sameri, Susanna Schwarzmann, Qing Wei, Riccardo Trivisonno, Filip De Turck, and Maria Torres Vega
- Subjects
collaborative VR ,multi-user ,QoE ,performance ,network impairments ,latency ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
Interactive, multi-user experiences are meant to define the present and future of Virtual Reality (VR). Such immersive experiences will typically consist of remote collaborations where content is streamed and/or synchronized over a network connection. Thus, real-time collaboration will be key. In this light, the responsiveness of the system and the network will define the overall experience. As such, understanding the effect of network distortions, especially related to time delay, on end-user’s perception (in terms of Quality-of-Experience (QoE)), performance, and collaboration becomes crucial. The existing literature, however, has mostly focused on network requirements from a system point-of-view, where the key performance parameters are only provided in the form of Quality-of-Service (QoS) parameters (such as end-to-end latency). However, the translation of these network impairments to the end-user experience is often omitted. The purpose of this paper is to fill the gap by providing a thorough investigation of the impact of latency on the perception of users while performing collaborative tasks in multi-user VR. To this end, an experimental framework was designed, developed, and tested. It is based on a multi-device synchronizing architecture, enabling two simultaneous users to work together in a gamified virtual environment. The developed test environment also allows for the identification of the most prominent network requirements and objective analysis for each traffic link. To experimentally investigate the impact of latency on user perception, a user study was conducted. Participants were paired and asked to perform the collaborative task under different latency-prone scenarios. The results show that users are able to easily distinguish between distorted and non-distorted network configurations. However, making a distinction between different manifestations of latency is much less straightforward. Moreover, factors such as the user’s role in the experience and the required task, and the level of interactivity and movement have an important influence on the subjective level of perception, the strength of the user’s preferences, and the occurrence of cybersickness. In contrast, no significant differences in objective metrics, such as system performance and user completion time were observed. These results can support the creation of collective QoE metrics that model the group as a whole rather than each individual separately. As such, this work provides an important step to dynamically counteract any drops in group dynamics and performance by means of smart interventions in the transmission system and/or virtual environment.
- Published
- 2024
- Full Text
- View/download PDF
42. Physical Layer Security Performance of Multi-User Mixed Radio-Frequency/Free-Space-Optics System Based on Optimal User Interference.
- Author
-
Shen, Zihe, Wang, Yi, and Wu, Jiamin
- Subjects
- *
PHYSICAL layer security , *GAUSSIAN channels , *RADIO frequency , *MONTE Carlo method , *WIRELESS power transmission , *FREE-space optical technology , *ANTENNAS (Electronics) - Abstract
This paper presents research on the physical layer security performance of a multi-user mixed RF/FSO system based on optimal user interference. In this system model, the RF link experiences Rayleigh fading, and the FSO link follows the Fischer–Snedecor F distribution. The system adopts a double-hop-decode-and-forward (DF) relay scheme. We also consider the effect of directivity errors in the FSO link and assume the presence of an illegal eavesdropper with a single antenna near the RF link. The source node controls the energy collection and information forwarding using a multi-user structure based on simultaneous wireless information and power transfer (SWIPT). We select the optimal user to jam the eavesdropper's communication. We derive closed-form expressions for the mixed RF/FSO communication system's secrecy outage probability (SOP) and average secrecy capacity (ASC). Monte Carlo simulations are performed to verify the accuracy of these expressions. By formulating and simulating the simulation system, the impact of various important factors on the mixed system's physical layer security (PLS) is analyzed. The analysis indicates that increasing the number of antennas and interference signal-to-noise ratio (SNR) of the optimal user, the time allocation factor and energy conversion efficiency, and the improvement in the quality of atmospheric channels with improved weather will significantly enhance this system's PLS. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. Correlation and contrast of multi-user edge computation with single-user edge computation for data offload on terrain electric vehicular applications.
- Author
-
Gauni, Sabitha, Bhanupriya, P., Kalimuthu, K., and Manimegalai, C. T.
- Subjects
INTELLIGENT transportation systems ,TECHNOLOGICAL innovations ,ELECTRONIC paper ,TELECOMMUNICATION ,ENERGY harvesting ,TRAFFIC congestion ,ELECTRIC charge - Abstract
Vehicles are getting equipped in technology, communication between vehicle and the user is getting better. The vehicular network is an emerging technology to provide mobile users with the flexibility to use various services such as entertainment and navigation on wheels. The users are served with data related to their travel in terms of road map, weather updates, traffic congestions, radio services, social network applications and place of interest. The data communication takes place with the help of Smart On-board Unit (SOBU) present on the vehicle. There is a requirement of compound data computations with firm latency. Vehicle Edge computing (VEC) is the emerging technology that has serves at the edge in the neighbourhood of vehicle that enables data offloading. There will be much of energy consumption and latency resulting from offloading and computations. In this paper smart offloading scheme is proposed that will efficiently harvest the energy and reduce the energy consumption problem. As a performance statistic, the execution cost is used, which accounts for both execution delay and task failure. And also, the offloading scheme is analyzed for single user and multiuser by simulations and the results are compared graphically for battery energy level, average execution cost and channel mode select parameters respectively. The factors affecting both Single-user and multi-user computation are identified from the results. Experimental results show that offloading schemes proposed for single user and multi user work better than the other state-of-the-art algorithms for vehicular networks. This single-user analysis will be a benchmark for developing auto pilot vehicle for people with special needs and multi-user analysis will help in developing to all kinds of Electric Vehicle communication. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
44. Multi-user semi-device independent quantum private query.
- Author
-
Basak, Jyotirmoy
- Abstract
Existing quantum private query (QPQ) proposals are mostly for single-user scenarios, while recent multi-user proposals assume the existence of a semi-trusted server and only consider the retrieval of the items of common interest. To address these limitations, here we propose a semi-device independent multi-user QPQ scheme exploiting the verification of distributed multipartite GHZ states and the self-testing of a specific class of POVM operators used by the clients. Our scheme allows each user to retrieve different items simultaneously while keeping their choices confidential and also enables the users to retrieve optimal raw key bits during oblivious key generation phase. Additionally, we perform a formal evaluation of the security concerns and are able to determine the maximum likelihood of cheating for both the server and users. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
45. Exploiting Time Asynchrony in Multi-User Transmit Beamforming
- Author
-
Ganji, Mehdi, Zou, Xun, and Jafarkhani, Hamid
- Subjects
Beamforming ,asynchronous transmission ,interference management ,power minimization ,frequency-selectivity ,timing mismatch ,multi-user ,SDMA ,Networking & Telecommunications ,Distributed Computing ,Electrical and Electronic Engineering ,Communications Technologies - Published
- 2020
46. Multi-User IR-HARQ Latency and Resource Optimization for URLLC
- Author
-
Rafael Santos, Daniel Castanheira, Ad Ao Silva, and Atilio Gameiro
- Subjects
URLLC ,low-latency ,grant-free ,multi-user ,control-networks ,multi-user diversity ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The ultra-reliable low-latency communications (URLLC) tight latency requirements paired with transmission of small payload packets motivates the development of techniques that reduce or eliminate the need for dynamic scheduling. This justifies the study of grant free (GF) leveraged techniques in order to reduce both the latency and control signaling overhead. Previous works considered preallocating resources not only for the first transmission, but also for all possible IR-HARQ transmissions, effectively reducing the scheduling latency and control signaling overhead. However, this has several drawbacks, as it translates into wasted resources. To address these issues, we propose a group-based preallocation method combined with IR-HARQ. Initially, a pool of preallocated resources is assigned to a group of users, which then cooperatively use IR-HARQ feedback signals to distribute, on the fly, the resources amongst them without collisions. The proposed method has two phases: a preallocation phase that takes place once at the group formation stage and a transmission phase which happens at each uplink transmission. The transmission parameters for all possible transmission scenarios are selected at the preallocation stage, with the goal of reducing the latency under reliability and energy constraints. The transmission parameters are obtained through a constrained latency optimization procedure, which considers the stochastic nature of the underlying process. We prove that, asymptotically, the proposed scheme is able to reduce the latency, at least, down to the average latency of any single user (SU) HARQ. The numerical results show that the latency and resources wastage is significantly reduced comparatively to single user IR-HARQ with preallocated resources.
- Published
- 2023
- Full Text
- View/download PDF
47. Frequency Selective Hybrid Beamforming and Optimal Power Loading for Multiuser Millimeter Wave Cognitive Radio Networks
- Author
-
Indranil Chatterjee, Jitendra Singh, Suraj Srivastava, and Aditya K. Jagannatham
- Subjects
mmWave ,cognitive radio networks ,frequency selective ,hybrid beamforming ,multi-user ,MIMO ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In this work, frequency selective hybrid precoders and combiners are designed for a millimeter wave (mmWave) multiuser (MU) multiple-input-multiple-output (MIMO) downlink underlay cognitive radio network (CRN) utilizing multiple radio frequency (RF) chains and uniform rectangular planar arrays (URPAs) both at the CR base station (CBS) and the secondary users (SUs). The proposed designs maximize the downlink spectral efficiency (SE) of the secondary users, while keeping the interference introduced to the primary user within a prescribed threshold. In the first phase, considering only the channel knowledge at each subcarrier, a novel blind hybrid MMSE-RC (minimum mean squared error-receiver combiner) design is determined using the modified simultaneous orthogonal matching pursuit (MSOMP). Further, employing feedback for each SU’s effective channel, a two-stage decoupled strategy is developed for hybrid transmit precoder (TPC) design, wherein the RF and stage-1 BB-TPC are designed in the first step relying on a capacity-optimal fully digital (FD)-TPC approximation problem followed by the stage-2 BB-TPC design using a low-complexity ZF approach with the goal of mitigating the MUI. Towards this, a novel Modified Alternating Minimization-Zeroforcing (MAM-ZF) algorithm is proposed to compute the hybrid-TPC weights. Furthermore, a low complexity alternating minimization-zeroforcing (LAM-ZF)-based precoding algorithm is also proposed towards the same. Finally, a per-subcarrier optimal power loading solution is derived in closed-form with the objective of maximizing the sum SE while satisfying the interference and transmit power budget limitations. Our simulation findings show that the proposed schemes outperform other state-of-the-art techniques and achieve a spectral efficiency comparable to that achieved by fully-digital beamforming, while requiring a significantly fewer number of RF chains.
- Published
- 2023
- Full Text
- View/download PDF
48. A Tale of Four Gates : Privilege Escalation and Permission Bypasses on Android Through App Components
- Author
-
Aldoseri, Abdulla, Oswald, David, Chiper, Robert, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Atluri, Vijayalakshmi, editor, Di Pietro, Roberto, editor, Jensen, Christian D., editor, and Meng, Weizhi, editor
- Published
- 2022
- Full Text
- View/download PDF
49. Multi-user Multi-platform xR Collaboration: System and Evaluation
- Author
-
Tümler, Johannes, Toprak, Alp, Yan, Baixuan, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Chen, Jessie Y. C., editor, and Fragomeni, Gino, editor
- Published
- 2022
- Full Text
- View/download PDF
50. Verifiable Dynamic Searchable Symmetric Encryption with Forward Privacy in Cloud-Assisted E-Healthcare Systems
- Author
-
Lu, Haitang, Chen, Jie, Zhang, Kai, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Lai, Yongxuan, editor, Wang, Tian, editor, Jiang, Min, editor, Xu, Guangquan, editor, Liang, Wei, editor, and Castiglione, Aniello, editor
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.