Volume 14, Nº 2 (2024)
- Ano: 2024
- Artigos: 6
- URL: https://ter-arkhiv.ru/2210-3279/issue/view/10133
Computer and Information Science
ETSI ITS: A Comprehensive Overview of the Architecture, Challenges and Issues
Resumo
Intelligent Transportation Systems (ITS) have attracted the attention of developing nations because of their potential to enhance mobility and road safety, two issues that have become increasingly pressing in recent years. Information and Communication Technology (ICT) has accentuated every industry, and the automobile industry is no exception, allowing vehicles to communicate among themselves and the surrounding infrastructure for information exchange using Vehicle-to-Everything (V2X) communication. Vehicle-to-vehicle (V2V), vehicle- to-infrastructure (V2I), vehicle-to-pedestrian (V2P), and vehicle-to-cloud (V2C) connections are made possible through the use of state-of-the-art networking technology. With EVehicles at the forefront, the vision of an ITS expands further. ITS is anticipated to offer wireless network-based services including vehicle occupant entertainment, traffic flow optimization, and accident prevention. Most nations have been trying to standardize the ITS architecture, and the European Union (EU) has been at the forefront by developing and standardizing the ETSI (European Telecommunications Standards Institute) architecture. As the most mature ITS architecture, this paper thoroughly explains the ETSI architecture in a single document for both the researcher's and newcomers' ease. Additionally, the challenges and issues pertinent to adopting and implementing the ITS ecosystem have also been discussed in detail.



Outage Performance of Underlay CR-NOMA-based D2D Communications under Imperfect CSI and SIC
Resumo
Background:Non-orthogonal multiple access (NOMA) is a promising technique for improving wireless communication performance in the future. In addition to NOMA, cognitive radio (CR) is another technology that can address the issue of limited spectrum availability and meet the increasing demands for wireless connectivity.
Methods:This paper focuses on investigating underlay CR-NOMA-based D2D communications. The study assumes a decode-and-forward (DF) mode used in the system, where nearby users (D1, D2) act as helper users to assist distant users (D3, D4). The paper derives the closed-form expressions for outage probability (OP) and throughput at the far users in three scenarios: (1) Perfect successive interference cancellation (SIC) and perfect channel state information (CSI), (2) Imperfect CSI, and (3) Imperfect SIC.
Results:In CR-NOMA mode, the results indicate that the performance of user D4 was better than user D3. Additionally, the OP performance of distant users employing CR-NOMA mode surpasses that of users using CR-OMA mode. The optimal power allocation (PA) values are investigated.
Conclusion:The presence of imperfect CSI and SIC has an unfavorable influence on the outage performance. Monte Carlo simulations are used to validate the derived analytical expressions.



An Approach for Evaluation and Recognition of Facial Emotions Using EMG Signal
Resumo
Background:Facial electromyography (fEMG) records muscular activities from the facial muscles, which provides details regarding facial muscle stimulation patterns in experimentation.
Objectives:The Principal Component Analysis (PCA) is mostly implemented, whereas the actual or unprocessed initial fEMG data are rendered into low-spatial units with minimizing the level of data repetition.
Methods:Facial EMG signal was acquired by using the instrument BIOPAC MP150. Four electrodes were fixed on the face of each participant for capturing the four different emotions like happiness, anger, sad and fear. Two electrodes were placed on arm for grounding purposes.
Results:The aim of this research paper is to propagate the functioning of PCA in synchrony with the subjective fEMG analysis and to give a thorough apprehension of the advanced PCA in the areas of machine learning. It describes its arithmetical characteristics, while PCA is estimated by implying the covariance matrix. Datasets which are larger in size are progressively universal and their interpretation often becomes complex or tough. So, it is necessary to minimize the number of variables and elucidate linear compositions of the data to explicate it on a huge number of variables with a relevant approach. Therefore, Principal Component Analysis (PCA) is applied because it is an unsupervised training method that utilizes advanced statistical concept to minimize the dimensionality of huge datasets.
Conclusion:This work is furthermore inclined toward the analysis of fEMG signals acquired for four different facial expressions using Analysis of Variance (ANOVA) to provide clarity on the variation of features.



Effective Hybrid Deep Learning Model of GAN and LSTM for Clustering and Data Aggregation in Wireless Sensor Networks
Resumo
Background:Wireless Sensor Networks (WSNs) have emerged as a crucial technology for various applications, but they face a lot of challenges relevant to limited energy resources, delayed communications, and complex data aggregation. To address these issues, this study proposes novel approaches called GAN-based Clustering and LSTM-based Data Aggregation (GCLD) that aim to enhance the performance of WSNs.
Methods:The proposed GCLD method enhances the Quality of Service (QoS) of WSN by leveraging the capabilities of Generative Adversarial Networks (GANs) and the Long Short-Term Memory (LSTM) method. GANs are employed for clustering, where the generator assigns cluster assignments or centroids, and the discriminator distinguishes between real and generated cluster assignments. This adversarial learning process refines the clustering results. Subsequently, LSTM networks are used for data aggregation, capturing temporal dependencies and enabling accurate predictions.
Results:The evaluation results demonstrate the superior performance of GCLD in terms of delay, PDR, energy consumption, and accuracy than the existing methods.
Conclusion:Overall, the significance of GCLD in advancing WSNs highlights its potential impact on various applications.



Delay and Fairness Analysis of C-RAN for Single and Multi Scheduling Domain Strategies
Resumo
Background:Centralized Radio Access Network (C-RAN) is the most promising network architecture for next-generation communication networks. It meets the need for flexibility on fronthaul as well as large bandwidth on backhaul of the network. All along, scheduling is very important for the transmission of information in an organized manner. C-RAN has not been studied with the scheduling domain strategies yet in the literature.
Objective:In this work, packet transmission duration, overall transmission time, wait time, and fairness index parameters have been calculated and analysed for C-RAN architecture for two different scheduling domains. The total transmission cycle time parameter is calculated for the three upper functional split options of C-RAN. The overall transmission time is a parameter calculated for the entire uplink channel.
Methods:To implement the network scenario, extensive scripting is done on MATLAB Editor for single scheduling domain (SSD) and multi-scheduling domain (MSD) for three higher functional split options of C-RAN. The data traffic generated in the network is considered random.
Results:A closer examination of results reveals the advantages and disadvantages of both algorithms, as well as trade-offs between them.
Conclusion:For quicker data transmission, SSD should be preferred whereas MSD should be preferred if multiple users want to access resources simultaneously. Lower functional split options of C-RAN require less transmission cycle time. The MSD technique is fairer than SSD.



Learning Framework for Joint Optimal Node Placement and Resource Management in Dynamic Fog Environment
Resumo
Background:With recent improvements in fog computing, it is now feasible to offer faster response time and better service delivery quality; however, the impending challenge is to place the fog nodes within the environment optimally. A review of existing literature showcases that consideration of joint problems such as fog node placement and resource management are less reported. Irrespective of different available methodologies, it is noted that a learning scheme facilitates better capability to incorporate intelligence in the network device, which can act as an enabling technique for superior operation of fog nodes.
Objective:The prime objective of the study is to introduce simplified and novel computational modelling toward the optimal placement of fog nodes with improved resource allocation mechanisms concerning bandwidth
Methods:Implemented in Python, the proposed scheme performs predictive operations using the Deep Deterministic Policy Gradient (DDPG) method. Markov modelling is used to frame the model. OpenAI Gym library is used for environment modelling, bridging communication between the environment and the learning agent.
Results:Quantitative results indicate that the proposed scheme performs better than existing schemes by approximately 30%.
Conclusion:The prime innovative approach introduced is the implementation of a reinforcement learning algorithm with a Markov chain towards enriching the predictive analytical capabilities of the controller system with faster service relaying operations a.


