Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 9 de 9
Filtrar
Más filtros




Base de datos
Asunto de la revista
Intervalo de año de publicación
1.
PLoS One ; 18(8): e0290432, 2023.
Artículo en Inglés | MEDLINE | ID: mdl-37611018

RESUMEN

In this paper, an integration between a low earth orbit satellite (LEO-Sat) and unmanned aerial vehicle (UAV) is proposed to assist users in post-disaster areas. In this scenario, multiple UAVs will be distributed to fully cover the victims and provide rescue services, while LEO-Sat provides backhaul links for UAVs to the ground base station (GBS). In this regard, we consider the problem of efficient UAVs distribution to maximize the total sum rate of the victims while assuring fairness in their coverage within the limited resources of UAVs batteries and LEO-Sat bandwidth. In this paper, UAV distribution problem is considered as a combinatorial multi-armed bandit (MAB) with arms' fairness and limited UAVs battery budget (CMAB-FB) constraints. Additionally, the utilization of LEO-Sat bandwidth resources is optimized based on the average traffic demands of the LEO-UAV links by means of gradient decent algorithm. The results of numerical analysis indicate that the proposed approach outperforms other naïve ben chmarks.


Asunto(s)
Desastres , Dispositivos Aéreos No Tripulados , Algoritmos , Presupuestos , Planeta Tierra
2.
Sensors (Basel) ; 23(3)2023 Jan 26.
Artículo en Inglés | MEDLINE | ID: mdl-36772443

RESUMEN

Over the past few years, with the rapid increase in the number of natural disasters, the need to provide smart emergency wireless communication services has become crucial. Unmanned aerial Vehicles (UAVs) have gained much attention as promising candidates due to their unprecedented capabilities and broad flexibility. In this paper, we investigate a UAV-based emergency wireless communication network for a post-disaster area. Our optimization problem aims to optimize the UAV's flight trajectory to maximize the number of visited ground users during the flight period. Then, a dual cost-aware multi-armed bandit algorithm is adopted to tackle this problem under the limited available energy for both the UAV and ground users. Simulation results show that the proposed algorithm could solve the optimization problem and maximize the achievable throughput under these energy constraints.

3.
Diagnostics (Basel) ; 12(12)2022 Dec 02.
Artículo en Inglés | MEDLINE | ID: mdl-36553031

RESUMEN

Existing nuclei segmentation methods face challenges with hematoxylin and eosin (H&E) whole slide imaging (WSI) due to the variations in staining methods and nuclei shapes and sizes. Most existing approaches require a stain normalization step that may cause losing source information and fail to handle the inter-scanner feature instability problem. To mitigate these issues, this article proposes an efficient staining-invariant nuclei segmentation method based on self-supervised contrastive learning and an effective weighted hybrid dilated convolution (WHDC) block. In particular, we propose a staining-invariant encoder (SIE) that includes convolution and transformers blocks. We also propose the WHDC block allowing the network to learn multi-scale nuclei-relevant features to handle the variation in the sizes and shapes of nuclei. The SIE network is trained on five unlabeled WSIs datasets using self-supervised contrastive learning and then used as a backbone for the downstream nuclei segmentation network. Our method outperforms existing approaches in challenging multiple WSI datasets without stain color normalization.

4.
IEEE Access ; 10: 87168-87181, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-36345377

RESUMEN

To date, the novel Coronavirus (SARS-CoV-2) has infected millions and has caused the deaths of thousands of people around the world. At the moment, five antibodies, two from China, two from the U.S., and one from the UK, have already been widely utilized and numerous vaccines are under the trail process. In order to reach herd immunity, around 70% of the population would need to be inoculated. It may take several years to hinder the spread of SARS-CoV-2. Governments and concerned authorities have taken stringent measurements such as enforcing partial, complete, or smart lockdowns, building temporary medical facilities, advocating social distancing, and mandating masks in public as well as setting up awareness campaigns. Furthermore, there have been massive efforts in various research areas and a wide variety of tools, technologies and techniques have been explored and developed to combat the war against this pandemic. Interestingly, machine learning (ML) algorithms and internet of Things (IoTs) technology are the pioneers in this race. Up till now, several real-time and intelligent IoT-based COVID-19 diagnosing, and monitoring systems have been proposed to tackle the pandemic. In this article we have analyzed a wide range of IoTs technologies which can be used in diagnosing and monitoring the infected individuals and hotspot areas. Furthermore, we identify the challenges and also provide our vision about the future research on COVID-19.

5.
Sensors (Basel) ; 22(6)2022 Mar 10.
Artículo en Inglés | MEDLINE | ID: mdl-35336350

RESUMEN

A reconfigurable intelligent surface (RIS) is a promising technology that can extend short-range millimeter wave (mmWave) communications coverage. However, phase shifts (PSs) of both mmWave transmitter (TX) and RIS antenna elements need to be optimally adjusted to effectively cover a mmWave user. This paper proposes codebook-based phase shifters for mmWave TX and RIS to overcome the difficulty of estimating their mmWave channel state information (CSI). Moreover, to adjust the PSs of both, an online learning approach in the form of a multiarmed bandit (MAB) game is suggested, where a nested two-stage stochastic MAB strategy is proposed. In the proposed strategy, the PS vector of the mmWave TX is adjusted in the first MAB stage. Based on it, the PS vector of the RIS is calibrated in the second stage and vice versa over the time horizon. Hence, we leverage and implement two standard MAB algorithms, namely Thompson sampling (TS) and upper confidence bound (UCB). Simulation results confirm the superior performance of the proposed nested two-stage MAB strategy; in particular, the nested two-stage TS nearly matches the optimal performance.

6.
Sensors (Basel) ; 21(23)2021 Nov 25.
Artículo en Inglés | MEDLINE | ID: mdl-34883856

RESUMEN

Modern wireless networks are notorious for being very dense, uncoordinated, and selfish, especially with greedy user needs. This leads to a critical scarcity problem in spectrum resources. The Dynamic Spectrum Access system (DSA) is considered a promising solution for this scarcity problem. With the aid of Unmanned Aerial Vehicles (UAVs), a post-disaster surveillance system is implemented using Cognitive Radio Network (CRN). UAVs are distributed in the disaster area to capture live images of the damaged area and send them to the disaster management center. CRN enables UAVs to utilize a portion of the spectrum of the Electronic Toll Collection (ETC) gates operating in the same area. In this paper, a joint transmission power selection, data-rate maximization, and interference mitigation problem is addressed. Considering all these conflicting parameters, this problem is investigated as a budget-constrained multi-player multi-armed bandit (MAB) problem. The whole process is done in a decentralized manner, where no information is exchanged between UAVs. To achieve this, two power-budget-aware PBA-MAB) algorithms, namely upper confidence bound (PBA-UCB (MAB) algorithm and Thompson sampling (PBA-TS) algorithm, were proposed to realize the selection of the transmission power value efficiently. The proposed PBA-MAB algorithms show outstanding performance over random power value selection in terms of achievable data rate.


Asunto(s)
Desastres , Dispositivos Aéreos No Tripulados , Algoritmos , Concienciación , Investigación
7.
Sensors (Basel) ; 21(11)2021 Jun 05.
Artículo en Inglés | MEDLINE | ID: mdl-34198755

RESUMEN

Recently, by the rapid development of Vehicular Ad Hoc Networks (VANETs) and the advancement of Software Defined Networking (SDN) as an emerging technology, the Software-Defined Vehicular Network (SDVN) has a tremendous attraction in the academia and research community. SDN's unique properties and features, such as its flexibility, programmability, and centralized control, make the network scalable and straightforward. In VANETs, traffic management and secure communication of vehicle information using the public network are the main research dimensions in the current era for the researchers to be considered while designing an efficient and secure VANETs architecture. This paper highlights the possible identified threat vectors and efficiently resolves the network vulnerabilities to design a novel and secure hierarchic architecture for SDVN. To solve the above problem, we proposed a Public Key Infrastructure-based digital signature model for efficient and secure communication from Vehicle to Vehicle. We also used the public key authority infrastructure for Vehicle to Infrastructure and the three-way handshake method for secure session creation and secure data communication in the SDN controller. The proposed security is validated through the well-known simulation tool AVISPA. Additionally, a formal security model is applied to validate the design hierarchic architecture's fundamental security properties for SDVN in an efficient and desirable way. In a comparative analysis, we prove that our proposed scheme fulfills all the essential security properties compared to other states of the art schemes.

8.
Appl Opt ; 60(15): 4291-4298, 2021 May 20.
Artículo en Inglés | MEDLINE | ID: mdl-34143115

RESUMEN

Data offloading is a promising low-cost and power-efficient solution for the expected high demands for high-speed connectivity in the near future. We investigate offloading efficiency in a cellular/light fidelity (LiFi) network. This offloading efficiency is a measure of the ratio of traffic carried by the LiFi network to the total traffic carried by both LiFi and cellular networks. We consider the two scenarios of opportunistic and delayed offloading. Effects of user density, user mobility, LiFi-signal blocking, and channel characteristics are investigated. We use Zemax to simulate LiFi channels in the proposed model. Based on our results, delayed offloading can achieve up to 60% offloading efficiency while opportunistic offloading achieves up to 18% offloading efficiency.

9.
Sensors (Basel) ; 20(14)2020 Jul 16.
Artículo en Inglés | MEDLINE | ID: mdl-32708559

RESUMEN

Recently, unmanned aerial vehicle (UAV)-based communications gained a lot of attention due to their numerous applications, especially in rescue services in post-disaster areas where the terrestrial network is wholly malfunctioned. Multiple access/gateway UAVs are distributed to fully cover the post-disaster area as flying base stations to provide communication coverage, collect valuable information, disseminate essential instructions, etc. The access UAVs after gathering/broadcasting the necessary information should select and fly towards one of the surrounding gateways for relaying their information. In this paper, the gateway UAV selection problem is addressed. The main aim is to maximize the long-term average data rates of the UAVs relays while minimizing the flights' battery cost, where millimeter wave links, i.e., using 30~300 GHz band, employing antenna beamforming, are used for backhauling. A tool of machine learning (ML) is exploited to address the problem as a budget-constrained multi-player multi-armed bandit (MAB) problem. In this setup, access UAVs act as the players, and the arms are the gateway UAVs, while the rewards are the average data rates of the constructed relays constrained by the battery cost of the access UAV flights. In this decentralized setting, where information is neither prior available nor exchanged among UAVs, a selfish and concurrent multi-player MAB strategy is suggested. Towards this end, three battery-aware MAB (BA-MAB) algorithms, namely upper confidence bound (UCB), Thompson sampling (TS), and the exponential weight algorithm for exploration and exploitation (EXP3), are proposed to realize gateways selection efficiently. The proposed BA-MAB-based gateway UAV selection algorithms show superior performance over approaches based on near and random selections in terms of total system rate and energy efficiency.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA