Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabil...Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G networks.In this regard,UAVs have appeared as a winning candidate to mitigate security risks.In this paper,we leverage UAVs to propose two methods.The first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver devices.Moreover,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,i.e.increasing secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF relay.Additionally,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation distance.Lastly,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations.展开更多
For a 5G wireless communication system,a convolutional deep neural network(CNN)is employed to synthesize a robust channel state estimator(CSE).The proposed CSE extracts channel information from transmit-and-receive pa...For a 5G wireless communication system,a convolutional deep neural network(CNN)is employed to synthesize a robust channel state estimator(CSE).The proposed CSE extracts channel information from transmit-and-receive pairs through offline training to estimate the channel state information.Also,it utilizes pilots to offer more helpful information about the communication channel.The proposedCNN-CSE performance is compared with previously published results for Bidirectional/long short-term memory(BiLSTM/LSTM)NNs-based CSEs.The CNN-CSE achieves outstanding performance using sufficient pilots only and loses its functionality at limited pilots compared with BiLSTM and LSTM-based estimators.Using three different loss function-based classification layers and the Adam optimization algorithm,a comparative study was conducted to assess the performance of the presented DNNs-based CSEs.The BiLSTM-CSE outperforms LSTM,CNN,conventional least squares(LS),and minimum mean square error(MMSE)CSEs.In addition,the computational and learning time complexities for DNN-CSEs are provided.These estimators are promising for 5G and future communication systems because they can analyze large amounts of data,discover statistical dependencies,learn correlations between features,and generalize the gotten knowledge.展开更多
Unmanned and aerial systems as interactors among different system components for communications,have opened up great opportunities for truth data discovery in Mobile Crowd Sensing(MCS)which has not been properly solve...Unmanned and aerial systems as interactors among different system components for communications,have opened up great opportunities for truth data discovery in Mobile Crowd Sensing(MCS)which has not been properly solved in the literature.In this paper,an Unmanned Aerial Vehicles-supported Intelligent Truth Discovery(UAV-ITD)scheme is proposed to obtain truth data at low-cost communications for MCS.The main innovations of the UAV-ITD scheme are as follows:(1)UAV-ITD scheme takes the first step in employing UAV joint Deep Matrix Factorization(DMF)to discover truth data based on the trust mechanism for an Information Elicitation Without Verification(IEWV)problem in MCS.(2)This paper introduces a truth data discovery scheme for the first time that only needs to collect a part of n data samples to infer the data of the entire network with high accuracy,which saves more communication costs than most previous data collection schemes,where they collect n or kn data samples.Finally,we conducted extensive experiments to evaluate the UAV-ITD scheme.The results show that compared with previous schemes,our scheme can reduce estimated truth error by 52.25%–96.09%,increase the accuracy of workers’trust evaluation by 0.68–61.82 times,and save recruitment costs by 24.08%–54.15%in truth data discovery.展开更多
The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundes...The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers.展开更多
We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reco...We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs) help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV,subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control(MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations.展开更多
Background and Purpose: Therapeutic communication is a new term in family health care nursing, defined by Hohashi (2019) as a method of family intervention, and characterized by inclusion of not only verbal conversati...Background and Purpose: Therapeutic communication is a new term in family health care nursing, defined by Hohashi (2019) as a method of family intervention, and characterized by inclusion of not only verbal conversation but also nonverbal interaction. However, specific therapeutic communication methods have not been systematized. The purpose of this study was to clarify therapeutic communication methods for families/family members from the perspectives of verbal communication and non-verbal communication through a review of existing literature. Methods: We conducted a search using the medical literature databases PubMed and Ichushi-Web using the keywords “therapeutic communication”. Analysis was performed on seven articles from PubMed and 14 articles from Ichushi-Web that described therapeutic communication methods performed by healthcare professionals for families/family members. Through directed content analysis, therapeutic communication methods were subcategorized, and classified into three categories: verbal communication, non-verbal communication, and verbal/non-verbal communication. Results: A total of 23 subcategories were extracted. Verbal communication included 11 subcategories, such as “asking questions using the communicatee’s words as they are”. Non-verbal communication included five subcategories, such as “noticing changes in the content of the communicatee’s story”. And verbal/non-verbal communication featured seven subcategories, such as “making the communicatee aware of one’s own beliefs”. Conclusion: Therapeutic communication methods included basic care/caring in family interviews/meetings, as well as verbal communication and non-verbal communication that act on family/family members’ beliefs. It is believed that changes in family/family members’ beliefs can be used to eliminate, reduce, or improve problematic conditions in the family. .展开更多
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac...In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification.展开更多
This paper deals with the robust control problem for a class of uncertain nonlinear networked systems with stochastic communication delays via sliding mode conception (SMC). A sequence of variables obeying Bernoulli...This paper deals with the robust control problem for a class of uncertain nonlinear networked systems with stochastic communication delays via sliding mode conception (SMC). A sequence of variables obeying Bernoulli distribution are employed to model the randomly occurring communication delays which could be different for different state variables. A discrete switching function that is different from those in the existing literature is first proposed. Then, expressed as the feasibility of a linear matrix inequality (LMI) with an equality constraint, sufficient conditions are derived in order to ensure the globally mean-square asymptotic stability of the system dynamics on the sliding surface. A discrete-time SMC controller is then synthesized to guarantee the discrete-time sliding mode reaching condition with the specified sliding surface. Finally, a simulation example is given to show the effectiveness of the proposed method.展开更多
This paper studies the problems of H-infinity performance optimization and controller design for continuous-time NCSs with both sensor-to-controller and controller-to-actuator communication constraints (limited commu...This paper studies the problems of H-infinity performance optimization and controller design for continuous-time NCSs with both sensor-to-controller and controller-to-actuator communication constraints (limited communication channels). By taking the derivative character of network-induced delay into full consideration and defining new Lyapunov functions, linear matrix inequalities (LMIs)-based H-infinity performance optimization and controller design are presented for NCSs with limited communication channels. If there do not exist any constraints on the communication channels, the proposed design methods are also applicable. The merit of the proposed methods lies in their Jess conservativeness, which is achieved by avoiding the utilization of bounding inequalities for cross products of vectors. The simulation results illustrate the merit and effectiveness of the proposed H-infinity controller design for NCSs with limited communication channels.展开更多
To facilitate the demand for a higher spectrum and power efficiency arising from the next generation mobile communication system, the introduction of relay-aided cooperative communication into the existing cellular in...To facilitate the demand for a higher spectrum and power efficiency arising from the next generation mobile communication system, the introduction of relay-aided cooperative communication into the existing cellular infrastructure is considered as the most practical improvement under high rate and coverage. In comparison with the legacy cellular network, relay-aided cooperative communication network enjoys relative advantages over coverage efficiency, operation cost and transmission capacity. Transmission in relay-aided cooperative system falls into three types: the three-terminal transmission model, two-hop multi-relay parallel transmission model, and multi-hop multi-relay transmission model. For the extensive perspective of relay-aided cooperative communication in application, a profound research has been carried out in communication standards such as Worldwide Interoperability for Microwave Access (WiMAX) and Wireless World Initiative New Radio (WINNER).展开更多
Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highl...Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highly depends on the security level of vehicular communication systems (VCS). Security applications in VCS are fulfilled through secured group broadcast. Therefore, secure key management schemes are considered as a critical research topic for network security. In this paper, we propose a framework for providing secure key management within heterogeneous network. The seeurity managers (SMs) play a key role in the framework by retrieving the vehicle departnre infi^rmation, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel Group Key Management (GKM) scheme basing on leaving probability (LP) of vehicles to depart current VCS region. Vehicle's LP factor is introduced into GKM scheme to achieve a more effieient rekeying scheme and less rekeying costs. The second component of the framework using the blockchain concept to simplify the distributed key management in heterogeneous VCS domains. Extensive simulations and analysis are provided to show the effectiveness and effieiency of the proposed framework: Our GKM results demonstrate that probability-based BR reduees rekeying eost compared to the benchmark scheme, while the blockchain deereases the time eost of key transmission over heterogeneous net-works.展开更多
In this paper,low profile frequency reconfigurable monopole antenna is designed on FR-4 substrate with a compact size of 30 mm^(3)×20 mm^(3)×1.6 mm^(3).The antenna is tuned to four different modes through th...In this paper,low profile frequency reconfigurable monopole antenna is designed on FR-4 substrate with a compact size of 30 mm^(3)×20 mm^(3)×1.6 mm^(3).The antenna is tuned to four different modes through three pin diode switches.In Mode 1(SW1 to SW3=OFF),antenna covers a wideband of 3.15–8.51 GHz.For Mode 2(SW1=ON,SW2 to SW3=OFF),the proposed antenna resonates at 3.5 GHz.The antenna shows dual band behavior and covers 2.6 and 6.4 GHz in Mode 3(SW1 and SW2=ON,SW3=OFF).The same antenna covers three different bands of 2.1,5 and 6.4 GHz when operating in Mode 4(SW1 to SW3=ON).The proposed antenna has good radiation efficiency ranges from 70%∼84%,providing adequate average gain of 2.05 dBi in mode 1,1.87 dBi in mode 2,1.4–1.75 dBi in mode 3 and 1.05–1.56 dBi in mode 4.The achieved impedance bandwidths at respective frequencies ranges from 240 to 5000 MHz.The Voltage Standing Waves Ratio(VSWR)of less than 1.5 is achieved for all operating bands.To validate the simulation results,the proposed antenna is fabricated and experimentally tested in antenna measurement laboratory.Due to its reasonably small size and support of multiple bands operation,the proposed antenna can be used in modern communication systems for supporting various applications such as fifth generation(5G)mobile and wireless local area networks(WLAN).展开更多
ISSN (Online): 1755-9359; ISSN (Print): 1755-9340Published in 4 issues per year. Description One of the most dramatic technological developments in the era of information is the deployment of communication networks. T...ISSN (Online): 1755-9359; ISSN (Print): 1755-9340Published in 4 issues per year. Description One of the most dramatic technological developments in the era of information is the deployment of communication networks. This on-going revolution展开更多
The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple li...The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple linear state feedback controller is designed to synchronize the master chaotic system and the slave chaotic systems with a time- varying communication topology connection. The exponential stability of the closed-loop networked synchronization error system is guaranteed by applying Lyapunov stability theory. The derived novel criteria are in the form of linear matrix inequalities (LMIs), which are easy to examine and tremendously reduce the computation burden from the feedback matrices. This paper provides an alternative networked secure communication scheme which can be extended conveniently. An illustrative example is given to demonstrate the effectiveness of the proposed networked synchronization method.展开更多
This study deals with reliable control problems in data-driven cyber-physical systems(CPSs) with intermittent communication faults, where the faults may be caused by bad or broken communication devices and/or cyber at...This study deals with reliable control problems in data-driven cyber-physical systems(CPSs) with intermittent communication faults, where the faults may be caused by bad or broken communication devices and/or cyber attackers. To solve them, a watermark-based anomaly detector is proposed, where the faults are divided to be either detectable or undetectable.Secondly, the fault's intermittent characteristic is described by the average dwell-time(ADT)-like concept, and then the reliable control issues, under the undetectable faults to the detector, are converted into stabilization issues of switched systems. Furthermore,based on the identifier-critic-structure learning algorithm, a datadriven switched controller with a prescribed-performance-based switching law is proposed, and by the ADT approach, a tolerated fault set is given. Additionally, it is shown that the presented switching laws can improve the system performance degradation in asynchronous intervals, where the degradation is caused by the fault-maker-triggered switching rule, which is unknown for CPS operators. Finally, an illustrative example validates the proposed method.展开更多
In the present work, we investigate threshold characteristics of a single mode 1.55 μm InGaAsP vertical cavity surface emitting laser (VCSEL) with two different optical confinement structures. The device employs InGa...In the present work, we investigate threshold characteristics of a single mode 1.55 μm InGaAsP vertical cavity surface emitting laser (VCSEL) with two different optical confinement structures. The device employs InGaAsP active region, which is sandwiched between GaAs/AlGaAs and GaAs/AlAs distributed Bragg reflectors (DBRs). The optical confinement introduced by the oxide aperture or a single defect photonic crystal design with holes etched throughout the whole structure, is compared with previous work. Photonic crystal VCSEL shows 30.86% and 57.02% lower threshold current than that of the similar oxide confined VCSEL and previous results, respectively. This paper provides key results of the threshold characteristics, including the threshold current and the threshold power. Results suggest that, the 1.55 μm InGaAsP photonic crystal VCSEL seems to be the most optimal one for light sources in high performance optical communication systems.展开更多
A nonlocality distillation protocol for arbitrary high-dimensional systems is proposed. We study the nonlocality distillation in the 2-input d-output bi-partite case. Firstly, we give the one-parameter nonlocal boxes ...A nonlocality distillation protocol for arbitrary high-dimensional systems is proposed. We study the nonlocality distillation in the 2-input d-output bi-partite case. Firstly, we give the one-parameter nonlocal boxes and their correlated distilling protocol. Then, we generalize the one-parameter nonlocality distillation protocol to the twoparameter case. Furthermore, we introduce a contracting protocol testifying that the 2-input d-output nonlocal boxes make communication complexity trivial.展开更多
We study the mean-square composite-rotating consensus problem of second-order multi-agent systems with communication noises, where all agents rotate around a common center and the center of rotation spins around a fix...We study the mean-square composite-rotating consensus problem of second-order multi-agent systems with communication noises, where all agents rotate around a common center and the center of rotation spins around a fixed point simultaneously. Firstly, a time-varying consensus gain is introduced to attenuate to the effect of communication noises. Secondly, sufficient conditions are obtained for achieving the mean-square composite-rotating consensus. Finally, simulations are provided to demonstrate the effectiveness of the proposed algorithm.展开更多
Modulation signal classification in communication systems can be considered a pattern recognition problem.Earlier works have focused on several feature extraction approaches such as fractal feature,signal constellatio...Modulation signal classification in communication systems can be considered a pattern recognition problem.Earlier works have focused on several feature extraction approaches such as fractal feature,signal constellation reconstruction,etc.The recent advent of deep learning(DL)models makes it possible to proficiently classify the modulation signals.In this view,this study designs a chaotic oppositional satin bowerbird optimization(COSBO)with bidirectional long term memory(BiLSTM)model for modulation signal classification in communication systems.The proposed COSBO-BiLSTM technique aims to classify the different kinds of digitally modulated signals.In addition,the fractal feature extraction process takes place by the use of Sevcik Fractal Dimension(SFD)approach.Moreover,the modulation signal classification process takes place using BiLSTM with fully convolutional network(BiLSTM-FCN).Furthermore,the optimal hyperparameter adjustment of the BiLSTM-FCN technique takes place by the use of COSBO algorithm.In order to ensure the enhanced classification performance of the COSBO-BiLSTM model,a wide range of simulations were carried out.The experimental results highlighted that the COSBO-BiLSTM technique has accomplished improved performance over the existing techniques.展开更多
The rapid developing of the fourth generation(4G)wireless communications has aroused tremendous demands for high speed data transmission due to the dissemination of various types of the intelligent user terminals as w...The rapid developing of the fourth generation(4G)wireless communications has aroused tremendous demands for high speed data transmission due to the dissemination of various types of the intelligent user terminals as well as the wireless multi-media services.It is predicted that the network throughput will increase展开更多
文摘Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G networks.In this regard,UAVs have appeared as a winning candidate to mitigate security risks.In this paper,we leverage UAVs to propose two methods.The first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver devices.Moreover,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,i.e.increasing secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF relay.Additionally,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation distance.Lastly,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations.
基金funded by Taif University Researchers Supporting Project No.(TURSP-2020/214),Taif University,Taif,Saudi Arabia。
文摘For a 5G wireless communication system,a convolutional deep neural network(CNN)is employed to synthesize a robust channel state estimator(CSE).The proposed CSE extracts channel information from transmit-and-receive pairs through offline training to estimate the channel state information.Also,it utilizes pilots to offer more helpful information about the communication channel.The proposedCNN-CSE performance is compared with previously published results for Bidirectional/long short-term memory(BiLSTM/LSTM)NNs-based CSEs.The CNN-CSE achieves outstanding performance using sufficient pilots only and loses its functionality at limited pilots compared with BiLSTM and LSTM-based estimators.Using three different loss function-based classification layers and the Adam optimization algorithm,a comparative study was conducted to assess the performance of the presented DNNs-based CSEs.The BiLSTM-CSE outperforms LSTM,CNN,conventional least squares(LS),and minimum mean square error(MMSE)CSEs.In addition,the computational and learning time complexities for DNN-CSEs are provided.These estimators are promising for 5G and future communication systems because they can analyze large amounts of data,discover statistical dependencies,learn correlations between features,and generalize the gotten knowledge.
基金supported by the National Natural Science Foundation of China under Grant No.62072475.
文摘Unmanned and aerial systems as interactors among different system components for communications,have opened up great opportunities for truth data discovery in Mobile Crowd Sensing(MCS)which has not been properly solved in the literature.In this paper,an Unmanned Aerial Vehicles-supported Intelligent Truth Discovery(UAV-ITD)scheme is proposed to obtain truth data at low-cost communications for MCS.The main innovations of the UAV-ITD scheme are as follows:(1)UAV-ITD scheme takes the first step in employing UAV joint Deep Matrix Factorization(DMF)to discover truth data based on the trust mechanism for an Information Elicitation Without Verification(IEWV)problem in MCS.(2)This paper introduces a truth data discovery scheme for the first time that only needs to collect a part of n data samples to infer the data of the entire network with high accuracy,which saves more communication costs than most previous data collection schemes,where they collect n or kn data samples.Finally,we conducted extensive experiments to evaluate the UAV-ITD scheme.The results show that compared with previous schemes,our scheme can reduce estimated truth error by 52.25%–96.09%,increase the accuracy of workers’trust evaluation by 0.68–61.82 times,and save recruitment costs by 24.08%–54.15%in truth data discovery.
基金funded by Taif University,Taif,Saudi Arabia,Project No.(TUDSPP-2024-139).
文摘The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers.
基金funding from the Australian Government,via grant AUSMURIB000001 associated with ONR MURI Grant N00014-19-1-2571。
文摘We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs) help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV,subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control(MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations.
文摘Background and Purpose: Therapeutic communication is a new term in family health care nursing, defined by Hohashi (2019) as a method of family intervention, and characterized by inclusion of not only verbal conversation but also nonverbal interaction. However, specific therapeutic communication methods have not been systematized. The purpose of this study was to clarify therapeutic communication methods for families/family members from the perspectives of verbal communication and non-verbal communication through a review of existing literature. Methods: We conducted a search using the medical literature databases PubMed and Ichushi-Web using the keywords “therapeutic communication”. Analysis was performed on seven articles from PubMed and 14 articles from Ichushi-Web that described therapeutic communication methods performed by healthcare professionals for families/family members. Through directed content analysis, therapeutic communication methods were subcategorized, and classified into three categories: verbal communication, non-verbal communication, and verbal/non-verbal communication. Results: A total of 23 subcategories were extracted. Verbal communication included 11 subcategories, such as “asking questions using the communicatee’s words as they are”. Non-verbal communication included five subcategories, such as “noticing changes in the content of the communicatee’s story”. And verbal/non-verbal communication featured seven subcategories, such as “making the communicatee aware of one’s own beliefs”. Conclusion: Therapeutic communication methods included basic care/caring in family interviews/meetings, as well as verbal communication and non-verbal communication that act on family/family members’ beliefs. It is believed that changes in family/family members’ beliefs can be used to eliminate, reduce, or improve problematic conditions in the family. .
基金supported by the National Natural Science Fandation of China (6067208960772075)
文摘In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification.
基金supported by the Engineering and Physical Sciences Research Council(EPSRC)of the UK(No.GR/S27658/01)the Royal Society of the UK and the Alexander von Humboldt Foundation of Germany
文摘This paper deals with the robust control problem for a class of uncertain nonlinear networked systems with stochastic communication delays via sliding mode conception (SMC). A sequence of variables obeying Bernoulli distribution are employed to model the randomly occurring communication delays which could be different for different state variables. A discrete switching function that is different from those in the existing literature is first proposed. Then, expressed as the feasibility of a linear matrix inequality (LMI) with an equality constraint, sufficient conditions are derived in order to ensure the globally mean-square asymptotic stability of the system dynamics on the sliding surface. A discrete-time SMC controller is then synthesized to guarantee the discrete-time sliding mode reaching condition with the specified sliding surface. Finally, a simulation example is given to show the effectiveness of the proposed method.
基金supported by the Funds for Creative Research Groups of China(No.60821063)the State Key Program of National Natural Science of China(No.60534010)+3 种基金the National 973 Program of China(No.2009CB320604)the Funds of National Science of China(No.60674021,60804024)the 111 Project(No.B08015)the Funds of PhD program of MOE,China(No.20060145019)
文摘This paper studies the problems of H-infinity performance optimization and controller design for continuous-time NCSs with both sensor-to-controller and controller-to-actuator communication constraints (limited communication channels). By taking the derivative character of network-induced delay into full consideration and defining new Lyapunov functions, linear matrix inequalities (LMIs)-based H-infinity performance optimization and controller design are presented for NCSs with limited communication channels. If there do not exist any constraints on the communication channels, the proposed design methods are also applicable. The merit of the proposed methods lies in their Jess conservativeness, which is achieved by avoiding the utilization of bounding inequalities for cross products of vectors. The simulation results illustrate the merit and effectiveness of the proposed H-infinity controller design for NCSs with limited communication channels.
基金the National High-Tech Research and Development Plan of China("863"Program)under Grant No.2007AA01Z262National Natural Science Foundation of China under Grant Nos.60672093and60496310National Basic Research Program of China("973"Program)under Grant No.2007CB310603
文摘To facilitate the demand for a higher spectrum and power efficiency arising from the next generation mobile communication system, the introduction of relay-aided cooperative communication into the existing cellular infrastructure is considered as the most practical improvement under high rate and coverage. In comparison with the legacy cellular network, relay-aided cooperative communication network enjoys relative advantages over coverage efficiency, operation cost and transmission capacity. Transmission in relay-aided cooperative system falls into three types: the three-terminal transmission model, two-hop multi-relay parallel transmission model, and multi-hop multi-relay transmission model. For the extensive perspective of relay-aided cooperative communication in application, a profound research has been carried out in communication standards such as Worldwide Interoperability for Microwave Access (WiMAX) and Wireless World Initiative New Radio (WINNER).
文摘Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highly depends on the security level of vehicular communication systems (VCS). Security applications in VCS are fulfilled through secured group broadcast. Therefore, secure key management schemes are considered as a critical research topic for network security. In this paper, we propose a framework for providing secure key management within heterogeneous network. The seeurity managers (SMs) play a key role in the framework by retrieving the vehicle departnre infi^rmation, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel Group Key Management (GKM) scheme basing on leaving probability (LP) of vehicles to depart current VCS region. Vehicle's LP factor is introduced into GKM scheme to achieve a more effieient rekeying scheme and less rekeying costs. The second component of the framework using the blockchain concept to simplify the distributed key management in heterogeneous VCS domains. Extensive simulations and analysis are provided to show the effectiveness and effieiency of the proposed framework: Our GKM results demonstrate that probability-based BR reduees rekeying eost compared to the benchmark scheme, while the blockchain deereases the time eost of key transmission over heterogeneous net-works.
文摘In this paper,low profile frequency reconfigurable monopole antenna is designed on FR-4 substrate with a compact size of 30 mm^(3)×20 mm^(3)×1.6 mm^(3).The antenna is tuned to four different modes through three pin diode switches.In Mode 1(SW1 to SW3=OFF),antenna covers a wideband of 3.15–8.51 GHz.For Mode 2(SW1=ON,SW2 to SW3=OFF),the proposed antenna resonates at 3.5 GHz.The antenna shows dual band behavior and covers 2.6 and 6.4 GHz in Mode 3(SW1 and SW2=ON,SW3=OFF).The same antenna covers three different bands of 2.1,5 and 6.4 GHz when operating in Mode 4(SW1 to SW3=ON).The proposed antenna has good radiation efficiency ranges from 70%∼84%,providing adequate average gain of 2.05 dBi in mode 1,1.87 dBi in mode 2,1.4–1.75 dBi in mode 3 and 1.05–1.56 dBi in mode 4.The achieved impedance bandwidths at respective frequencies ranges from 240 to 5000 MHz.The Voltage Standing Waves Ratio(VSWR)of less than 1.5 is achieved for all operating bands.To validate the simulation results,the proposed antenna is fabricated and experimentally tested in antenna measurement laboratory.Due to its reasonably small size and support of multiple bands operation,the proposed antenna can be used in modern communication systems for supporting various applications such as fifth generation(5G)mobile and wireless local area networks(WLAN).
文摘ISSN (Online): 1755-9359; ISSN (Print): 1755-9340Published in 4 issues per year. Description One of the most dramatic technological developments in the era of information is the deployment of communication networks. This on-going revolution
基金supported by the National Natural Science Foundation of China (Grant Nos. 60904046, 60972164, 60974071, and 60804006)the Special Fund for Basic Scientific Research of Central Colleges, Northeastern University, China (Grant No. 090604005)+2 种基金the Science and Technology Program of Shenyang (Grant No. F11-264-1-70)the Program for Liaoning Excellent Talents in University (Grant No. LJQ2011137)the Program for Liaoning Innovative Research Team in University (Grant No. LT2011019)
文摘The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple linear state feedback controller is designed to synchronize the master chaotic system and the slave chaotic systems with a time- varying communication topology connection. The exponential stability of the closed-loop networked synchronization error system is guaranteed by applying Lyapunov stability theory. The derived novel criteria are in the form of linear matrix inequalities (LMIs), which are easy to examine and tremendously reduce the computation burden from the feedback matrices. This paper provides an alternative networked secure communication scheme which can be extended conveniently. An illustrative example is given to demonstrate the effectiveness of the proposed networked synchronization method.
基金supported in part by the National Natural Science Foundation of China(61873056,61473068,61273148,61621004,61420106016)the Fundamental Research Funds for the Central Universities in China(N170405004,N182608004)the Research Fund of State Key Laboratory of Synthetical Automation for Process Industries in China(2013ZCX01)。
文摘This study deals with reliable control problems in data-driven cyber-physical systems(CPSs) with intermittent communication faults, where the faults may be caused by bad or broken communication devices and/or cyber attackers. To solve them, a watermark-based anomaly detector is proposed, where the faults are divided to be either detectable or undetectable.Secondly, the fault's intermittent characteristic is described by the average dwell-time(ADT)-like concept, and then the reliable control issues, under the undetectable faults to the detector, are converted into stabilization issues of switched systems. Furthermore,based on the identifier-critic-structure learning algorithm, a datadriven switched controller with a prescribed-performance-based switching law is proposed, and by the ADT approach, a tolerated fault set is given. Additionally, it is shown that the presented switching laws can improve the system performance degradation in asynchronous intervals, where the degradation is caused by the fault-maker-triggered switching rule, which is unknown for CPS operators. Finally, an illustrative example validates the proposed method.
文摘In the present work, we investigate threshold characteristics of a single mode 1.55 μm InGaAsP vertical cavity surface emitting laser (VCSEL) with two different optical confinement structures. The device employs InGaAsP active region, which is sandwiched between GaAs/AlGaAs and GaAs/AlAs distributed Bragg reflectors (DBRs). The optical confinement introduced by the oxide aperture or a single defect photonic crystal design with holes etched throughout the whole structure, is compared with previous work. Photonic crystal VCSEL shows 30.86% and 57.02% lower threshold current than that of the similar oxide confined VCSEL and previous results, respectively. This paper provides key results of the threshold characteristics, including the threshold current and the threshold power. Results suggest that, the 1.55 μm InGaAsP photonic crystal VCSEL seems to be the most optimal one for light sources in high performance optical communication systems.
基金Supported by the National Basic Research Program of China under Grant No 2012CB921900the National Natural Science Foundation of China under Grant Nos 11175089 and 11475089
文摘A nonlocality distillation protocol for arbitrary high-dimensional systems is proposed. We study the nonlocality distillation in the 2-input d-output bi-partite case. Firstly, we give the one-parameter nonlocal boxes and their correlated distilling protocol. Then, we generalize the one-parameter nonlocality distillation protocol to the twoparameter case. Furthermore, we introduce a contracting protocol testifying that the 2-input d-output nonlocal boxes make communication complexity trivial.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61304155 and 11371049)Beijing Municipal Government Foundation for Talents,China(Grant No.2012D005003000005)
文摘We study the mean-square composite-rotating consensus problem of second-order multi-agent systems with communication noises, where all agents rotate around a common center and the center of rotation spins around a fixed point simultaneously. Firstly, a time-varying consensus gain is introduced to attenuate to the effect of communication noises. Secondly, sufficient conditions are obtained for achieving the mean-square composite-rotating consensus. Finally, simulations are provided to demonstrate the effectiveness of the proposed algorithm.
文摘Modulation signal classification in communication systems can be considered a pattern recognition problem.Earlier works have focused on several feature extraction approaches such as fractal feature,signal constellation reconstruction,etc.The recent advent of deep learning(DL)models makes it possible to proficiently classify the modulation signals.In this view,this study designs a chaotic oppositional satin bowerbird optimization(COSBO)with bidirectional long term memory(BiLSTM)model for modulation signal classification in communication systems.The proposed COSBO-BiLSTM technique aims to classify the different kinds of digitally modulated signals.In addition,the fractal feature extraction process takes place by the use of Sevcik Fractal Dimension(SFD)approach.Moreover,the modulation signal classification process takes place using BiLSTM with fully convolutional network(BiLSTM-FCN).Furthermore,the optimal hyperparameter adjustment of the BiLSTM-FCN technique takes place by the use of COSBO algorithm.In order to ensure the enhanced classification performance of the COSBO-BiLSTM model,a wide range of simulations were carried out.The experimental results highlighted that the COSBO-BiLSTM technique has accomplished improved performance over the existing techniques.
文摘The rapid developing of the fourth generation(4G)wireless communications has aroused tremendous demands for high speed data transmission due to the dissemination of various types of the intelligent user terminals as well as the wireless multi-media services.It is predicted that the network throughput will increase