Malmö University Publications
Change search
Refine search result
1 - 26 of 26
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abid, Muhammad Adil
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Amouzad Mahdiraji, Saeid
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Lorig, Fabian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Holmgren, Johan
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Mihailescu, Radu-Casian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Petersson, Jesper
    Department of Health Care Management, Region Skåne, 21428 Malmö, Sweden; Department of Neurology, Lund University, 22242 Malmö, Sweden.
    A Genetic Algorithm for Optimizing Mobile Stroke Unit Deployment2023In: Procedia Computer Science, ISSN 1877-0509, Vol. 225, p. 3536-3545Article in journal (Refereed)
    Abstract [en]

    A mobile stroke unit (MSU) is an advanced ambulance equipped with specialized technology and trained healthcare personnel to provide on-site diagnosis and treatment for stroke patients. Providing efficient access to healthcare (in a viable way) requires optimizing the placement of MSUs. In this study, we propose a time-efficient method based on a genetic algorithm (GA) to find the most suitable ambulance sites for the placement of MSUs (given the number of MSUs and a set of potential sites). We designed an efficient encoding scheme for the input data (the number of MSUs and potential sites) and developed custom selection, crossover, and mutation operators that are tailored according to the characteristics of the MSU allocation problem. We present a case study on the Southern Healthcare Region in Sweden to demonstrate the generality and robustness of our proposed GA method. Particularly, we demonstrate our method's flexibility and adaptability through a series of experiments across multiple settings. For the considered scenario, our proposed method outperforms the exhaustive search method by finding the best locations within 0.16, 1.44, and 10.09 minutes in the deployment of three MSUs, four MSUs, and five MSUs, resulting in 8.75x, 16.36x, and 24.77x faster performance, respectively. Furthermore, we validate the method's robustness by iterating GA multiple times and reporting its average fitness score (performance convergence). In addition, we show the effectiveness of our method by evaluating key hyperparameters, that is, population size, mutation rate, and the number of generations.

    Download full text (pdf)
    fulltext
  • 2.
    Ashouri, Majid
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Towards Supporting IoT System Designers in Edge Computing Deployment Decisions2021Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    The rapidly evolving Internet of Things (IoT) systems demands addressing new requirements. This particularly needs efficient deployment of IoT systems to meet the quality requirements such as latency, energy consumption, privacy, and bandwidth utilization. The increasing availability of computational resources close to the edge has prompted the idea of using these for distributed computing and storage, known as edge computing. Edge computing may help and complement cloud computing to facilitate deployment of IoT systems and improve their quality. However, deciding where to deploy the various application components is not a straightforward task, and IoT system designer should be supported for the decision.

    To support the designers, in this thesis we focused on the system qualities, and aimed for three main contributions. First, by reviewing the literature, we identified the relevant and most used qualities and metrics. Moreover, to analyse how computer simulation can be used as a supporting tool, we investigated the edge computing simulators, and in particular the metrics they provide for modeling and analyzing IoT systems in edge computing. Finally, we introduced a method to represent how multiple qualities can be considered in the decision. In particular, we considered distributing Deep Neural Network layers as a use case and raked the deployment options by measuring the relevant metrics via simulation.

    List of papers
    1. Analyzing Distributed Deep Neural Network Deployment on Edge and Cloud Nodes in IoT Systems
    Open this publication in new window or tab >>Analyzing Distributed Deep Neural Network Deployment on Edge and Cloud Nodes in IoT Systems
    Show others...
    2020 (English)In: IEEE International Conference on Edge Computing (EDGE), Virtual conference, October 18–24, 2020., 2020, p. 59-66Conference paper, Published paper (Refereed)
    Abstract [en]

    For the efficient execution of Deep Neural Networks (DNN) in the Internet of Things, computation tasks can be distributed and deployed on edge nodes. In contrast to deploying all computation to the cloud, the use of Distributed DNN (DDNN) often results in a reduced amount of data that is sent through the network and thus might increase the overall performance of the system. However, finding an appropriate deployment scenario is often a complex task and requires considering several criteria. In this paper, we introduce a multi-criteria decision-making method based on the Analytical Hierarchy Process for the comparison and selection of deployment alternatives. We use the RECAP simulation framework to model and simulate DDNN deployments on different scales to provide a comprehensive assessment of deployments to system designers. In a case study, we apply the method to a smart city scenario where different distributions and deployments of a DNN are analyzed and compared.

    Keywords
    Edge Computing, Internet of Things, Distributed Deep Neural Networks, Simulation, Smart Cities
    National Category
    Computer Systems Communication Systems
    Identifiers
    urn:nbn:se:mau:diva-37023 (URN)10.1109/EDGE50951.2020.00017 (DOI)000659316400010 ()2-s2.0-85100251401 (Scopus ID)978-1-7281-8254-4 (ISBN)978-1-7281-8255-1 (ISBN)
    Conference
    IEEE International Conference on Edge Computing (EDGE) 2020. 19-23 Oct. 2020. Beijing, China
    Available from: 2020-11-27 Created: 2020-11-27 Last updated: 2024-06-17Bibliographically approved
    2. Edge Computing Simulators for IoT System Design: An Analysis of Qualities and Metrics
    Open this publication in new window or tab >>Edge Computing Simulators for IoT System Design: An Analysis of Qualities and Metrics
    2019 (English)In: Future Internet, E-ISSN 1999-5903, Vol. 11, no 11, p. 235-246Article in journal (Refereed) Published
    Abstract [en]

    The deployment of Internet of Things (IoT) applications is complex since many quality characteristics should be taken into account, for example, performance, reliability, and security. In this study, we investigate to what extent the current edge computing simulators support the analysis of qualities that are relevant to IoT architects who are designing an IoT system. We first identify the quality characteristics and metrics that can be evaluated through simulation. Then, we study the available simulators in order to assess which of the identified qualities they support. The results show that while several simulation tools for edge computing have been proposed, they focus on a few qualities, such as time behavior and resource utilization. Most of the identified qualities are not considered and we suggest future directions for further investigation to provide appropriate support for IoT architects.

    Place, publisher, year, edition, pages
    MDPI, 2019
    Keywords
    Internet of Things, edge computing, simulation tools, quality characteristics, metrics, ISO/IEC 25023
    National Category
    Computer Systems Communication Systems Embedded Systems
    Identifiers
    urn:nbn:se:mau:diva-37014 (URN)10.3390/fi11110235 (DOI)000502277600015 ()2-s2.0-85075344380 (Scopus ID)
    Available from: 2020-11-27 Created: 2020-11-27 Last updated: 2024-02-05Bibliographically approved
    3. Cloud, Edge, or Both? Towards Decision Support for Designing IoT Applications
    Open this publication in new window or tab >>Cloud, Edge, or Both? Towards Decision Support for Designing IoT Applications
    2018 (English)In: 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, 2018Conference paper, Published paper (Other academic)
    Abstract [en]

    The rapidly evolving Internet of Things (IoT) includes applications which might generate a huge amount of data, this requires appropriate platforms and support methods. Cloud computing offers attractive computational and storage solutions to cope with these issues. However, sending to centralized servers all the data generated at the edge of the network causes latency, energy consumption, and high bandwidth demand. Performing some computations at the edge of the network, known as Edge computing, and using a hybrid Edge-Cloud architecture can help addressing these challenges. While such architecture may provide new opportunities to distribute IoT applications, making optimal decisions regarding where to deploy the different application components is not an easy and straightforward task for designers. Supporting designers’ decisions by considering key quality attributes impacting them in an Edge-Cloud architecture has not been investigated yet. In this paper, we: explore the importance of decision support for the designers, discuss how different attributes impact the decisions, and describe the required steps toward a decision support framework for IoT application designers.

    National Category
    Engineering and Technology
    Identifiers
    urn:nbn:se:mau:diva-16827 (URN)10.1109/IoTSMS.2018.8554827 (DOI)000455671800023 ()2-s2.0-85059973173 (Scopus ID)26740 (Local ID)978-1-5386-9585-2 (ISBN)26740 (Archive number)26740 (OAI)
    Conference
    The Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS 2018), Valencia, Spain (15-18 Oct 2018)
    Available from: 2020-03-30 Created: 2020-03-30 Last updated: 2023-12-28Bibliographically approved
    4. Quality attributes in edge computing for the Internet of Things: A systematic mapping study
    Open this publication in new window or tab >>Quality attributes in edge computing for the Internet of Things: A systematic mapping study
    2021 (English)In: Internet of Things: Engineering Cyber Physical Human Systems, E-ISSN 2542-6605, Vol. 13, article id 100346Article in journal (Refereed) Published
    Abstract [en]

    Many Internet of Things (IoT) systems generate a massive amount of data needing to be processed and stored efficiently. Cloud computing solutions are often used to handle these tasks. However, the increasing availability of computational resources close to the edge has prompted the idea of using these for distributed computing and storage. Edge computing may help to improve IoT systems regarding important quality attributes like latency, energy consumption, privacy, and bandwidth utilization. However, deciding where to deploy the various application components is not a straightforward task. This is largely due to the trade-offs between the quality attributes relevant for the application. We have performed a systematic mapping study of 98 articles to investigate which quality attributes have been used in the literature for assessing IoT systems using edge computing. The analysis shows that time behavior and resource utilization are the most frequently used quality attributes; further, response time, turnaround time, and energy consumption are the most used metrics for quantifying these quality attributes. Moreover, simulation is the main tool used for the assessments, and the studied trade-offs are mainly between only two qualities. Finally, we identified a number of research gaps that need further study.

    Place, publisher, year, edition, pages
    Elsevier, 2021
    Keywords
    Internet of Things, Edge computing, Quality attributes, Metrics, Systematic mapping study
    National Category
    Computer Systems Communication Systems Embedded Systems
    Identifiers
    urn:nbn:se:mau:diva-39120 (URN)10.1016/j.iot.2020.100346 (DOI)000695695700015 ()2-s2.0-85106740791 (Scopus ID)
    Available from: 2021-01-13 Created: 2021-01-13 Last updated: 2024-02-05Bibliographically approved
    Download full text (pdf)
    Comprehensive summary
    Download (jpg)
    presentationsbild
  • 3.
    Ashouri, Majid
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Quality attributes in edge computing for the Internet of Things: A systematic mapping study2021In: Internet of Things: Engineering Cyber Physical Human Systems, E-ISSN 2542-6605, Vol. 13, article id 100346Article in journal (Refereed)
    Abstract [en]

    Many Internet of Things (IoT) systems generate a massive amount of data needing to be processed and stored efficiently. Cloud computing solutions are often used to handle these tasks. However, the increasing availability of computational resources close to the edge has prompted the idea of using these for distributed computing and storage. Edge computing may help to improve IoT systems regarding important quality attributes like latency, energy consumption, privacy, and bandwidth utilization. However, deciding where to deploy the various application components is not a straightforward task. This is largely due to the trade-offs between the quality attributes relevant for the application. We have performed a systematic mapping study of 98 articles to investigate which quality attributes have been used in the literature for assessing IoT systems using edge computing. The analysis shows that time behavior and resource utilization are the most frequently used quality attributes; further, response time, turnaround time, and energy consumption are the most used metrics for quantifying these quality attributes. Moreover, simulation is the main tool used for the assessments, and the studied trade-offs are mainly between only two qualities. Finally, we identified a number of research gaps that need further study.

    Download full text (pdf)
    fulltext
  • 4.
    Ashouri, Majid
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Lorig, Fabian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Edge Computing Simulators for IoT System Design: An Analysis of Qualities and Metrics2019In: Future Internet, E-ISSN 1999-5903, Vol. 11, no 11, p. 235-246Article in journal (Refereed)
    Abstract [en]

    The deployment of Internet of Things (IoT) applications is complex since many quality characteristics should be taken into account, for example, performance, reliability, and security. In this study, we investigate to what extent the current edge computing simulators support the analysis of qualities that are relevant to IoT architects who are designing an IoT system. We first identify the quality characteristics and metrics that can be evaluated through simulation. Then, we study the available simulators in order to assess which of the identified qualities they support. The results show that while several simulation tools for edge computing have been proposed, they focus on a few qualities, such as time behavior and resource utilization. Most of the identified qualities are not considered and we suggest future directions for further investigation to provide appropriate support for IoT architects.

    Download full text (pdf)
    fulltext
  • 5.
    Ashouri, Majid
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Lorig, Fabian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Spalazzese, Romina
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Svorobej, Sergej
    School of Computer Science and Statistics, Trinity College Dublin, Dublin 2, Ireland.
    Analyzing Distributed Deep Neural Network Deployment on Edge and Cloud Nodes in IoT Systems2020In: IEEE International Conference on Edge Computing (EDGE), Virtual conference, October 18–24, 2020., 2020, p. 59-66Conference paper (Refereed)
    Abstract [en]

    For the efficient execution of Deep Neural Networks (DNN) in the Internet of Things, computation tasks can be distributed and deployed on edge nodes. In contrast to deploying all computation to the cloud, the use of Distributed DNN (DDNN) often results in a reduced amount of data that is sent through the network and thus might increase the overall performance of the system. However, finding an appropriate deployment scenario is often a complex task and requires considering several criteria. In this paper, we introduce a multi-criteria decision-making method based on the Analytical Hierarchy Process for the comparison and selection of deployment alternatives. We use the RECAP simulation framework to model and simulate DDNN deployments on different scales to provide a comprehensive assessment of deployments to system designers. In a case study, we apply the method to a smart city scenario where different distributions and deployments of a DNN are analyzed and compared.

  • 6.
    Banda, Laurence
    et al.
    Wits Business School (WBS), University of the Witwatersrand (Wits), Johannesburg, South Africa.
    Mjumo, Mzyece
    Wits Business School (WBS), University of the Witwatersrand (Wits), Johannesburg, South Africa.
    Mekuria, Fisseha
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Wits Business School (WBS), University of the Witwatersrand (Wits), Johannesburg, South Africa.
    Business Models for 5G and Future Mobile Network Operators2022In: 2022 IEEE Future Networks World Forum (FNWF), IEEE, 2022, article id M17754Conference paper (Refereed)
    Abstract [en]

    Emerging 5G and future networks (5GFNs) will change the mobile communication business ecosystem by introducing multi-service wireless applications with diverse specifications. These smart and future-oriented wireless networks are intended to address not only consumer-based smartphone applications, but also the needs of various vertical industry markets (e.g., education, energy, healthcare, transportation, manufacturing, agriculture, and so forth). 5GFNs are aimed at attaining economic value for all key stakeholders, including customers, mobile network operators (MNOs), equipment vendors, public institutions, private enterprises, digital business start-ups and various third parties. This paper discusses business model options for 5GFNs from the MNOs’ perspective.  We describe current MNOs’ business models and their shortcomings. Thereafter, we present emerging business models for 5GFNs which MNOs should consider when rolling out these networks.  

  • 7.
    Banda, Laurence
    et al.
    Univ Witwatersrand, Wits Business Sch WBS, ZA-2000 Johannesburg, South Africa..
    Mzyece, Mjumo
    Univ Witwatersrand, Wits Business Sch WBS, ZA-2000 Johannesburg, South Africa..
    Mekuria, Fisseha
    Univ Witwatersrand, Wits Business Sch WBS, ZA-2000 Johannesburg, South Africa.;Council Sci & Ind Res CSIR, ZA-0001 Pretoria, South Africa..
    5G Business Models for Mobile Network Operators-A Survey2022In: IEEE Access, E-ISSN 2169-3536, Vol. 10, p. 94851-94886Article in journal (Refereed)
    Abstract [en]

    Emerging Fifth-generation (5G) mobile networks and associated technologies are expected to provide multi-service wireless applications with diverse specifications intended to address not only consumer-based smartphone applications, but also the needs of various vertical industry markets (e.g., healthcare, education, energy, mining, agriculture, manufacturing, and so forth). This paper extends 5G networks' technology orientation towards attaining economic value for all key 5G stakeholders, including customers, mobile network operators (MNOs), equipment vendors, public institutions, private enterprises, digital business start-ups and other third parties. Although several surveys and tutorials have discussed business models in connection with 5G networks, there is no comprehensive study on business models for emerging 5G networks from the MNO's perspective. In this survey article, we present and investigate key advances on business models for 5G networks and 5G MNOs in particular, from industry, use cases and research community perspectives. The paper focuses the theoretical business model concept from both strategic management and technological innovation perspectives. Thereafter, we discuss conventional business models for MNOs before presenting particular disruptive business models which can be considered for rolling out 5G networks with an aim to improve business efficiency. Additionally, the paper explores the emerging network deployment concept of private 5G networks and their related business models. Finally, we present some of the open research challenges and provide possible guidelines for implementing 5G business models based on various countries' socio-economic status and relevant 5G use cases applicable in a specific context of emerging economies.

  • 8.
    Banda, Laurence
    et al.
    University of the Witwatersrand (Wits), Wits Business School (WBS), Johannesburg, South Africa.
    Mzyece, Mjumo
    University of the Witwatersrand (Wits), Wits Business School (WBS), Johannesburg, South Africa; Northwestern College, Department of Business and Economics, Orange City, IA, United States.
    Mekuria, Fisseha
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). University of the Witwatersrand (Wits), Wits Business School (WBS), Johannesburg, South Africa.
    5G-IoT and Sustainability: Smart City Use Case2024In: 2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall), Institute of Electrical and Electronics Engineers (IEEE), 2024Conference paper (Refereed)
    Abstract [en]

    The future delivery of intelligent services and the sustainable digitalization of industry can be enhanced through the ongoing integration of Internet of Things (IoT) smart sensors with the fifth-generation (5G) wireless ecosystems. 5G-IoT technologies are intended to support a variety of use cases, each with different requirements. These applications are so diverse and demanding that 5G networks must be adaptable to a wide variety of individual scenarios. One of the main use cases for 5G-IoT technologies is smart cities, which prioritize enhancing the quality of life, fostering teamwork, and resolving resource limitations. Typical smart city networks include a plethora of services related to smart buildings, smart offices, smart industry, smart universities, smart transportation, smart health, and more. This paper aims to explore role of 5G-IoT technologies for developing sustainable smart city systems, including the role of mobile operators to enable innovative smart city services

  • 9.
    Bian, Xiaojie
    et al.
    School of Computer Science, Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China.
    Sha, Chao
    School of Computer Science, Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Zhao, Chuanxin
    School of Computer and Information, Anhui Normal University, Wuhu, Anhui, China.
    Wang, Ruchuan
    School of Computer Science, Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China.
    Balanced Distribution Strategy for the Number of Recharging Requests Based on Dynamic Dual-Thresholds in WRSNs2024In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 11, no 19, p. 30551-30570Article in journal (Refereed)
    Abstract [en]

    “Request Triggered Recharging” has been a flexible type of scheduling schemes to allow the Mobile Charging Vehicle (MCV) to supply energy for sensor nodes on demand. However, in most existing works, MCV always passively waits for the arrival of the unpredictable requests that may cause it missing the best departure time to serve nodes. To solve this problem, we propose a Balanced Distribution strategy for the number of Recharging Requests based on dynamic dual-thresholds (BDRR). Firstly, the adjustable Double Recharging Request Thresholds (DRRTs) are set for each node to ensure that all the requesting nodes can be successfully charged. Then, the Method for Setting the Energy Replenishment Value (MSERV) is proposed to enable the distribution of the moments at which nodes send out their recharging requests being concentrated within each period. Furthermore, an efficient traversal path for the MCV is constructed by safe or dangerous scheduling strategy, and the Charging Capacity Reduction Scheme (CCRS) is also executed to help survive more nodes in need. Finally, a Passer-by Recharging Scheme (PRS) is introduced to further improve the energy efficiency of the MCV. Simulation results show that BDRR outperforms the compared algorithms in terms of surviving rate of sensors as well as the energy efficiency of MCV with different network scales.

  • 10.
    Guo, Xueying
    et al.
    College of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, 210023, China.
    Wang, Wenming
    College of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, 210023, China; School of Computer and Information, Anqing Normal University, Anqing, 246011, China.
    Huang, Haiping
    College of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, 210023, China; School of Computer and Information, Anqing Normal University, Anqing, 246011, China.
    Li, Qi
    College of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, 210023, China; High Technology Research Key Laboratory of Wireless Sensor Network of Jiangsu Province, Nanjing, 210023, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Location Privacy-Preserving Method Based on Historical Proximity Location2020In: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2020, article id 8892079Article in journal (Refereed)
    Abstract [en]

    With the rapid development of Internet services, mobile communications, and IoT applications, Location-Based Service (LBS) has become an indispensable part in our daily life in recent years. However, when users benefit from LBSs, the collection and analysis of users' location data and trajectory information may jeopardize their privacy. To address this problem, a new privacy-preserving method based on historical proximity locations is proposed. The main idea of this approach is to substitute one existing historical adjacent location around the user for his/her current location and then submit the selected location to the LBS server. This method ensures that the user can obtain location-based services without submitting the real location information to the untrusted LBS server, which can improve the privacy-preserving level while reducing the calculation and communication overhead on the server side. Furthermore, our scheme can not only provide privacy preservation in snapshot queries but also protect trajectory privacy in continuous LBSs. Compared with other location privacy-preserving methods such ask-anonymity and dummy location, our scheme improves the quality of LBS and query efficiency while keeping a satisfactory privacy level.

    Download full text (pdf)
    fulltext
  • 11.
    Huang, Haiping
    et al.
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Wu, Yuhan
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Xiao, Fu
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). University of Pretoria, Pretoria, South Africa.
    An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT Environment2021In: IEEE Transactions on Computational Social Systems, E-ISSN 2329-924X, Vol. 8, no 5, p. 1108-1120Article in journal (Refereed)
    Abstract [en]

    Named data networking (NDN) is an emerging information-centric networking paradigm, in which the Internet of Things (IoT) achieves excellent scalability. Recent literature proposes the concept of NDN-IoT, which maximizes the expansion of IoT applications by deploying NDN in the IoT. In the NDN, the security is built into the network by embedding a public signature in each data package to verify the authenticity and integrity of the content. However, signature schemes in the NDN-IoT environment are facing several challenges, such as signing security challenge for resource-constrained IoT end devices (EDs) and verification efficiency challenge for NDN routers. This article mainly studies the data package authentication scheme in the package-level security mechanism. Based on mobile edge computing (MEC), an efficient certificateless group signature scheme featured with anonymity, unforgeability, traceability, and key escrow resilience is proposed. The regional and edge architecture is utilized to solve the device management problem of IoT, reducing the risks of content pollution attacks from the data source. By offloading signature pressure to MEC servers, the contradiction between heavy overhead and shortage of ED resources is avoided. Moreover, the verification efficiency in NDN router is much improved via batch verification in the proposed scheme. Both security analysis and experimental simulations show that the proposed MEC-based certificateless group signature scheme is provably secure and practical.

  • 12.
    Jaber, Hussein
    Malmö University, Faculty of Technology and Society (TS).
    Effects of skin color on the Accuracy of heart ratedetection of commercial wearable devices2023Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The ownership and demand for fitness trackers, smartwatches, and wrist-worn deviceshave been increasing globally. These devices offer various features such as measuringphysical activity, sleep monitoring, and health-related measurements like heart rate andheart rate variability using PhotoPlethysmoGraphy (PPG). However, research indicatesthat PPG measurements are less accurate on darker skin compared to lighter skin due to thehigher presence of melanin, a light-absorbing substance in dark skin. This thesis addresses the impact of melanin on the accuracy of heart rate measurements on different skin colors using four commercial smartwatches. The study involves analyzing the accuracy of these smartwatches on individuals with varying skin colors while controlling for external factors. The collected data from the smartwatches are compared to a reference sensor that uses electrocardiography (ECG) measurements with electrodes placed around the chest. Three different tests are conducted wearing the devices, with no movement, while walking, and with circular hand motions.The tests were conducted on twelve participants representing the 6 different skin types categorized using the Fitzpatrick scale. With the presented results in this thesis, it was concluded that the 4 smartwatches' measurement accuracy does not seem to be dependent on specific skin types. 

  • 13.
    Jayram, Shastri
    et al.
    Univ Johannesburg, Dept Elect & Elect Engn Sci, Auckland Pk, South Africa..
    Ouahada, Khmaies
    Univ Johannesburg, Dept Elect & Elect Engn Sci, Auckland Pk, South Africa..
    Rimer, Suvendi
    Univ Johannesburg, Dept Elect & Elect Engn Sci, Auckland Pk, South Africa..
    Mekuria, Fisseha
    CSIR, Future Wireless Networks, Pretoria, South Africa..
    Stochastically Resonant Interference Managing Ontological Cognitive Radio for TV White Space An introduction, review of current research and demonstrating stochastic resonance2016In: 2016 THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND ENGINEERING (ICACCE 2016) / [ed] Kumar, V Singh, UG Sudarsan, SD, Institute of Electrical and Electronics Engineers (IEEE), 2016, p. 336-341Conference paper (Refereed)
    Abstract [en]

    In this paper a review of current research, design and development of an Ontological Cognitive Radio (OCR) which uses Stochastically Resonant Spectrum Sensing (SRSS) and Interference Management (IM) to facilitate, expedite and optimize TV White Space is provided. We discuss the OCR basis and address IM aspects briefly, and, discuss and demonstrate the Stochastic Resonance (SR) effect using additive noise.

  • 14.
    Larsson, Alva
    Malmö University, Faculty of Culture and Society (KS), Department of Urban Studies (US).
    Hur byggbranschen är i gasen: Om medvetenheten och byggsektorns utsläpp av växthusgaser2022Independent thesis Basic level (degree of Bachelor), 20 HE creditsStudent thesis
    Abstract [en]

    This work is the research result of the study conducted to try to find the common denominators between the construction industry and the climate crisis. During the education that the author has received, large parts of the teaching have been linked to the industry's climate impact and the non-existent climate awareness that the industry seems to have. As society's climate measures are perhaps the most important issue today, the author is interested in seeing how the theoretical claims about construction and the environment actually correspond to the practical reality. Reading about construction and architecture is one thing, but what happens physically in the industry is at least as crucial. Therefore, it is important that architecture students also study the practical reality, which is the reason why this report has been published. The research aims to show the simplicity required to solve and unite several complex systems based on understanding what the construction industry's greenhouse gas emissions depend on and how this can be reduced in the long term. This includes how the construction industry's active craftsmen and actors who may already be trying to influence the industry's transition to climate neutrality think and do, as well as how the higher efforts work in the issue. The research has been conducted through two cases, a Swedish Large City and a Swedish Small City, where comparisons in the planning work and sustainability work around the construction industry have been investigated. In this way, this research is triangulating. A database search is also done to support the case study and the interviews with theoretical knowledge. Several key people from the entire industry's value chain have been interviewed to gain an understanding of how the work is done at all levels and to see the attitude and how the knowledge levels are. Research shows that the climate crisis does not belong in our lives if we want to save future generations. The climate crisis unites world societies and business, and forces us to find new solutions for a common tomorrow. And the construction industry has a responsibility in that work just like everyone else. Just as suspected, there is in the world, the EU and Sweden a well-established work to counteract the climate crisis and achieve climate neutrality by the year 2045, but that this work is not followed up and worked on in a clear way by the private builders. The reasons for this are many. Among other things, poorly specified laws and regulations but also a large gap in the general level of knowledge among authorities and the industry's craftsmen or performers.

    Download full text (pdf)
    fulltext
  • 15.
    Mahdiraji, Saeid Amouzad
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Holmgren, Johan
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Mihailescu, Radu-Casian
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Petersson, Jesper
    Region Skåne; Lund University.
    An Optimization Model for the Tradeoff Between Efficiency and Equity for Mobile Stroke Unit Placement2021In: Innovation in Medicine and Healthcare: Proceedings of 9th KES-InMed 2021, Springer, 2021, p. 183-193Conference paper (Refereed)
    Abstract [en]

    A mobile stroke unit (MSU) is an ambulance, where stroke patients can be diagnosed and treated. Recently, placement of MSUs has been studied focusing on either maximum population coverage or equal service for all patients, termed efficiency and equity, respectively. In this study, we propose an unconstrained optimization model for the placement of MSUs, designed to introduce a tradeoff between efficiency and equity. The tradeoff is based on the concepts of weighted average time to treatment and the time difference between the expected time to treatment for different geographical areas. We conduct a case-study for Sweden’s Southern Health care Region (SHR), generating three scenarios (MSU1, MSU2, and MSU3) including 1, 2, and 3 MSUs, respectively. We show that our proposed optimization model can tune the tradeoff between the efficiency and equity perspectives for the MSU(s) allocation. This enables a high level of equal service for most inhabitants, as well as reducing the time to treatment for most inhabitants of a geographic region. In particular, placing three MSUs in the SHR with the proposed tradeoff, the share of inhabitants who are expected to receive treatment within an hour potentially improved by about a factor of 14 in our model.

  • 16.
    Mohammed Abdu, Mohammed
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Alsaif, Anas
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Hur åtgärdar offentliga aktörer deras cybersäkerhet efter att ha blivit utsatta för cyberattacker?2023Independent thesis Basic level (degree of Bachelor), 13 HE creditsStudent thesis
    Abstract [en]

    Digitization has been a growing phenomenon in today's society where organizations, individuals and society at large are affected by it. In pace with the emerging use of digitization,a realization of the relevance of cyber security in the public sector has increased, but not to a sufficient extent. Cyber security is about processes used to protect personal information and important data in organizations. Cyber security also includes knowledge of cyberattacks, where actors attack an organization's data most often for financial reasons. Cyber attacks have affected the public sector in several countries. The study focuses on known cyber attacks around the world that are related to public actors in healthcare, transport and electricity supply,among others. The study's analysis compares implemented measures after the incidents based on a cyber risk assessment framework. The survey shows that increased investments, new and clear work routines, training for employees and continuous testing of computer systems are important measures for the prevention of cyber attacks. The mentioned main actions that are common between the studied actors are supported by the theoretical frame of reference. This is because frameworks linked to cyber attacks also point out that investments, clear work routines and monitoring of systems contribute to protection against cyber attacks.

    Download full text (pdf)
    fulltext
  • 17. Mukanga, Marianne
    Grafklart: Digitalisering av nätverkskarta för analys över hedersvåld och förtryck2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Den här studien ämnar minska gapet mellan socialt arbete och datavetenskap. När socialtjänsten utreder fall som handlar om hedersvåld och förtryck så brukar verktyget Nätverkskartan att användas. Ändamålet är att kartlägga klientens nätverk med syftet att hitta trygga eller otrygga punkter i nätverket, samt för att ta reda på om det finns någon eller några i nätverket som påverkar klienten negativt. Problemet är att kartan ritas upp med hjälp av papper och penna, vilket begränsar möjligheterna för djupare analyser av klientens nätverk. Genom att digitalisera verktyget Nätverkskartan med hjälp av grafteori så öppnas det dörrar för djupare analyser. Med hjälp av metodiken Design and Creation research besvaras frågorna om hur en analog nätverkskarta, anpassad för att analysera fall av hedersvåld och förtryck och genom vilka medel inom grafteori verktyget nätverkskartan skulle gynnas av digitaliseringen. Resultatet pekar på att en digitalisering av verktyget nätverkskartan är gynnsamt eftersom det möjliggör analyser av nätverkskartan utifrån fler olika perspektiv.

    Download full text (pdf)
    fulltext
  • 18.
    Ntuli, Elesa
    et al.
    Tshtwane Univ Technol, Dept Comp Engn, Pretoria, South Africa..
    Du, Chunling
    Tshtwane Univ Technol, Dept Comp Engn, Pretoria, South Africa..
    Mekuria, Fisseha
    CSIR, Future Wireless Technol, Pretoria, South Africa..
    Review of Interference Mitigation Techniques for White Space Networks2019In: 2nd IEEE Wireless Africa Conference (IEEE WAC), Institute of Electrical and Electronics Engineers (IEEE), 2019, p. 31-36Conference paper (Refereed)
    Abstract [en]

    An important challenge to guarantee the successful operation of white space networks based on spectrum sharing, in a heterogeneous wireless network environment, is mitigation of interference. Interference mitigation (IM) is a term used to describe the techniques applied to minimize interference between networks operating in the same or adjacent spectrum hands. This paper will present a review of existing interference mitigation techniques with the aim of improving co-existence between spectrum sharing white space networks; it will also improve network quality of service. Furthermore, the paper will provide a detailed description of some of the recent IM techniques developed for TV white space networks, involving the geo-location spectrum database (GLSD) and reconfigurable radio devices.

  • 19.
    Olwal, Thomas Otieno
    et al.
    CSIR, Meraka Inst, ZA-0001 Pretoria, South Africa..
    Montsi, Litsietsi
    CSIR, Meraka Inst, ZA-0001 Pretoria, South Africa..
    Mofolo, Mofolo
    CSIR, Meraka Inst, ZA-0001 Pretoria, South Africa..
    Mekuria, Fisseha
    CSIR, Meraka Inst, ZA-0001 Pretoria, South Africa..
    The eCOMBAT: Energy Consumption Monitoring Tool for Battery Powered Communication Device2013In: AFRICON, 2013, Institute of Electrical and Electronics Engineers (IEEE), 2013, p. 453-457Conference paper (Refereed)
    Abstract [en]

    The ever rising demand for energy all over the world, following the dwindling of the fossil fuel resources and adverse effects on the climate change, has compelled the need to save energy and lower the cost of energy utilization in the wireless computing, communication and networking applications. One of the best ways to obtain energy-efficient communication and networking is to invest in the renewable energy sources to charge batteries for communication devices and to develop smart energy consumption monitoring tools. As a result, this paper presents an energy monitoring software tool hereby referred to as the 'eCOMBAT' which is aimed at getting real-time information on the quantity of energy consumed by the communication and networking device. The knowledge of such data on time may enable the device user to reduce energy consumption thereby lowering the CO2 emissions into the environment. This paper proposes an integrated battery's discharge and device's energy consumption model; the description of the developed tool and experimental results of the tool obtained via a user friendly and well designed graphic user interface (GUI).

  • 20.
    Sellami, Enis
    et al.
    Malmö University, Faculty of Technology and Society (TS).
    Belis, Sabanovic
    Malmö University, Faculty of Technology and Society (TS).
    FindMeAJob: Utvärdering Av Ett Koncept För Socialt Missgynnade Arbetssökande2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Jobbsökning är den process som syftar till att matcha arbetssökande med lämpliga jobb och jobbmöjligheter. Den vanligaste metoden för jobbsökning är användningen av Internet, som tillhandahåller diverse sociala nätverk. Dessa tjänster lockar miljontals besökare varje år, vilket bland annat resulterat i att Internet i nuläget spelar en genomgripande roll vad gäller jobbsökning och sysselsättning. Internet och dess informations- och kommunikationsteknologi kommer framöver fortsätta ta en mer betydelsefull roll i en del av arbets- och jobbsökningsprocessen, vilket efterlämnar dagens socialt missgynnade arbetssökande eftersom nätverken inte täcker dessa individers behov. Således utvärderades konceptet FindMeAJob vars idé handlar om att sammanknyta socialt missgynnade arbetssökande med olika typer av individer och verksamheter som är i behov av arbetskraft. Studien rekryterade socialt missgynnade arbetssökande, HR-specialister, rekryterare och Arbetsmarknadsförvaltningen i Helsingborg för att besvara frågeformulär baserat på Likertskala, fördjupningsfrågor och Storyboard. Resultaten var blandade; respondenter för gruppen socialt missgynnade arbetssökande ser i helhet positivt på FindMeAJob och anser att deras behov kan täckas någorlunda, medan sakkunniga respondenter har delade meningar. En djupare analys av resultatet resulterade i en slutsats om vad FindMeAJob torde innehålla för att möta de behov som kan ställas av de socialt missgynnade arbetssökande.

    Download full text (pdf)
    fulltext
  • 21.
    Sha, Chao
    et al.
    chool of Computer Science Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, 210003, China.
    Song, Dandan
    chool of Computer Science Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, 210003, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    A Periodic and Distributed Energy Supplement Method based on Maximum Recharging Benefit in Sensor Networks2021In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 8, no 4, p. 2649-2669Article in journal (Refereed)
    Abstract [en]

    The issue of using vehicles to wirelessly recharge nodes for energy supplement in Wireless Sensor Networks has become a research hotspot in recent works. Unfortunately, most of the researches did not consider the rationality of the recharging request threshold and also overlooked the difference of node’s power consumption, which may lead to premature death of nodes as well as low efficiency of Wireless Charging Vehicles(WCVs). In order to solve the above problems, a Periodic and Distributed Energy Supplement Method based on maximum recharging benefit (PDESM) is proposed in this paper. Firstly, to avoid frequent recharging requests from nodes, we put forward an annuluses based cost-balanced data uploading strategy under deterministic deployment. Then, one WCV in each annulus periodically selects and recharges nodes located in this region which send the energy supplement requests. In addition, the predicted value of power consumption of nodes are calculated out according to the real-time energy consumption rate, and thus the most appropriate recharging request threshold is obtained. Finally, a moving path optimization scheme based on Minimum Spanning Tree is constructed for distributed recharging. Simulation results show that, PDESM performs well on enhancing the proportion of the alive nodes as well as the wireless recharging efficiency compared with NFAOC and FCFS. Moreover, it also has advantage in balancing the energy consumption of WCVs.

  • 22.
    Sha, Chao
    et al.
    School of Computer Science, Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, China.
    Sun, Yang
    School of Computer Science, Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Research on Cost-Balanced Mobile Energy Replenishment Strategy for Wireless Rechargeable Sensor Networks2020In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, ISSN 0018-9545, Vol. 69, no 3, p. 3135-3150Article in journal (Refereed)
    Abstract [en]

    In order to maximize the utilization rate of the Mobile Wireless Chargers (MWCs) and reduce the recharging delay in large-scale Rechargeable Wireless Sensor Networks (WRSNs), a type of C ost- B alanced M obile E nergy R eplenishment S trategy (CBMERS) is proposed in this paper. Firstly, nodes are assigned into groups according to their remaining lifetime, which ensures that only the ones with lower residual energy are recharged in each time slot. Then, to balance energy consumption among multiple MWCs, the moving distance as well as the power cost of the MWC are taken as constraints to get the optimal trajectory allocation scheme. Moreover, by further adjusting the amount of energy being replenished to some sensor nodes, it ensures that the MWC have enough energy to fulfill the recharging task and return back to the base station. Experiment results show that, compared with the Periodic recharging strategy and the C luster based M ultiple C harges C oordination algorithm (C-MCC), the proposed method can improve the recharging efficiency of MWCs by about 48.22% and 43.35%, and the average waiting time of nodes is also reduced by about 55.72% and 30.7%, respectively.

    Download full text (pdf)
    fulltext
  • 23.
    Tas, Mustafa Can
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    AlKurdi, Fatima
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Visualization of digital modulation techniques2021Independent thesis Basic level (university diploma), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Digital communication has gone through much development in the past decade. The literature in this field has developed and improved as well, but the educational materials still lack illustrative descriptions. The modulation techniques are a very complex area that needs practical implementation to facilitate intuitive understanding for engineering students. This thesis presents an educational application where users conduct experiments in digital modulation techniques, ASK, PSK, QAM, and OFDM. The product is a simulation application of the transmission of information from transmitter to receiver with a theoretical description. The application is programmed within the MATLAB environment, and the result is presented with a GUI that contains signal diagrams for each step of the modulation and demodulation process. This tool provides an illustrative description of the modulation techniques without any need for more extensive mathematical knowledge.

    Download full text (pdf)
    fulltext
  • 24.
    von Uthmann, Andreas
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Ljungcrantz, Sofie
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    EasyReport App: Vad rapportskrivning med tal till text kan ha för påverkan på kommunikationen och arbetet hos vaktmästare2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This article has the objective to study the effect voice recognition can have on the documentation and team work for janitors in EOS-Hallen in Lund. The study is built up on design and creation. An application was built for the janitors with the help of Microsoft’s voice recognition service. To gather data from the janitors, observations and interviews were conducted. The observations were conducted on 4 janitors for 2 hours during their normal work days. From the observations and the interviews conducted after the observations showed that voice recognition was welcomed by the janitors. They felt that the team work between the colleagues improved and the documentation became faster, more frequent and more detailed.

    Download full text (pdf)
    fulltext
  • 25.
    Zhang, Hongyi
    et al.
    Chalmers Univ Technol, Gothenburg, Sweden..
    Li, Jingya
    Ericsson, Ericsson Research, Stockholm, Sweden..
    Qi, Zhiqiang
    Ericsson, Ericsson Research, Stockholm, Sweden..
    Lin, Xingqin
    Ericsson, Ericsson Research, Stockholm, Sweden..
    Aronsson, Anders
    Ericsson, Ericsson Research, Stockholm, Sweden..
    Bosch, Jan
    Chalmers Univ Technol, Gothenburg, Sweden..
    Olsson, Helena Holmström
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Autonomous Navigation and Configuration of Integrated Access Backhauling for UAV Base Station Using Reinforcement Learning2022In: 2022 IEEE future networks world forum: 2022 FNWF, IEEE, 2022, p. 184-189Conference paper (Refereed)
    Abstract [en]

    Fast and reliable connectivity is essential to enhance situational awareness and operational efficiency for public safety mission-critical (MC) users. In emergency or disaster circumstances, where existing cellular network coverage and capacity may not be available to meet MC communication demands, deployable-network-based solutions such as cells-on-wheels/wings can be utilized swiftly to ensure reliable connection for MC users. In this paper, we consider a scenario where a macro base station (BS) is destroyed due to a natural disaster and an unmanned aerial vehicle carrying BS (UAV-BS) is set up to provide temporary coverage for users in the disaster area. The UAV-BS is integrated into the mobile network using the 5G integrated access and backhaul (IAB) technology. We propose a framework and signalling procedure for applying machine learning to this use case. A deep reinforcement learning algorithm is designed to jointly optimize the access and backhaul antenna tilt as well as the three-dimensional location of the UAV-BS in order to best serve the on-ground MC users while maintaining a good backhaul connection. Our result shows that the proposed algorithm can autonomously navigate and configure the UAV-BS to improve the throughput and reduce the drop rate of MC users.

  • 26.
    Zhang, Hongyi
    et al.
    Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg, Sweden.
    Qi, Zhiqiang
    Ericsson Research, Ericsson, Stockholm, Sweden.
    Li, Jingya
    Ericsson Research, Ericsson, Stockholm, Sweden.
    Aronsson, Anders
    Ericsson Research, Ericsson, Stockholm, Sweden.
    Bosch, Jan
    Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg, Sweden.
    Olsson, Helena Holmström
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    5G Network on Wings: A Deep Reinforcement Learning Approach to the UAV-Based Integrated Access and Backhaul2024In: IEEE Transactions on Machine Learning in Communications and Networking, E-ISSN 2831-316X, Vol. 2, p. 1109-1126Article in journal (Refereed)
    Abstract [en]

    Fast and reliable wireless communication has become a critical demand in human life. In the case of mission-critical (MC) scenarios, for instance, when natural disasters strike, providing ubiquitous connectivity becomes challenging by using traditional wireless networks. In this context, unmanned aerial vehicle (UAV) based aerial networks offer a promising alternative for fast, flexible, and reliable wireless communications. Due to unique characteristics such as mobility, flexible deployment, and rapid reconfiguration, drones can readily change location dynamically to provide on-demand communications to users on the ground in emergency scenarios. As a result, the usage of UAV base stations (UAV-BSs) has been considered an appropriate approach for providing rapid connection in MC scenarios. In this paper, we study how to control multiple UAV-BSs in both static and dynamic environments. We use a system-level simulator to model an MC scenario in which a macro-BS of a cellular network is out of service and multiple UAV-BSs are deployed using integrated access and backhaul (IAB) technology to provide coverage for users in the disaster area. With the data collected from the system-level simulation, a deep reinforcement learning algorithm is developed to jointly optimize the three-dimensional placement of these multiple UAV-BSs, which adapt their 3-D locations to the on-ground user movement. The evaluation results show that the proposed algorithm can support the autonomous navigation of the UAV-BSs to meet the MC service requirements in terms of user throughput and drop rate.

    Download full text (pdf)
    fulltext
1 - 26 of 26
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf