{"title":"A Machine Learning Based Design of mmWave Compact Array Antenna for 5G Communications","authors":"N. K. Mallat, A. Jafarieh, M. Nouri, H. Behroozi","doi":"10.1109/ICCSPA55860.2022.10019147","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019147","url":null,"abstract":"Wider impedance bandwidth (IBW), and lower latency rate than older mobile communication systems possess are required for fifth-generation (5G) mobile communication systems. Furthermore, with respect to the high operation frequency of 5G systems, a high released gain is necessary to compensate for the high path loss on these frequencies. With respect to the requirements mentioned above, millimeter-wave (MMW) antennas seem to be a good solution for 5G applications. The low wavelength of MMW frequency bands, makes it practical to use large array antennas for massive multi input multi-output (MIMO) 5G systems with high gain. The high number of design variables of antennas makes an optimum antenna harder to design. Using machine learning (ML) approaches, however, alleviates this challenge. However, most ML approaches entail high computational complexity. Therefore, surrogate-based optimization (SBO) approaches must be used to handle the high computational complexity of ML approaches.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130821944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noha Ghatwary, Ahmed A. Alzughaibi, Ahmed Kantoush, A. Eltawil, Mohamed Ramadan, Mohamed Yasser
{"title":"Intelligent Assistance System for Visually Impaired/Blind People (ISVB)","authors":"Noha Ghatwary, Ahmed A. Alzughaibi, Ahmed Kantoush, A. Eltawil, Mohamed Ramadan, Mohamed Yasser","doi":"10.1109/ICCSPA55860.2022.10019201","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019201","url":null,"abstract":"Visual impairments pose a parsing need to develop new automated systems to assist persons presenting visual impairments. The visual impairments have trouble interacting and sensing their surroundings. Their movement is limited and has to rely on a guided stick for them to move safely from one place to another. However, traditional canes have the disadvantage of failing to detect far-away obstacles and small objects. Therefore, this project is proposed to design and develop an Intelligent Assistance System for Visually Impaired People (ISVB). Our proposed system is composed of three interconnected parts, a smart cap, a 3D-printed intelligent cane and a mobile application that connects the system through an online server. The smart cap uses the Raspberry Pi and camera module, along with a deep learning object detection module for obstacle detection. The intelligent cane will provide the feasibility for the visually impaired person to walk without encountering problems by analyzing the surrounding environment through a microcontroller with multiple sensors and a bluetooth module. The mobile application interacts with the cap and the cane. Additionally, it will provide virtual navigation to help visually impaired people in their movement. To evaluate the performance of the system, different experiments for object detection, sensors and mobile applications have been conducted. The overall performance of the model showed an efficiency of 94.6 %.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124182796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Modulation Classification in Deep Learning","authors":"Khawla A. Alnajjar, S. Ghunaim, Samreen Ansari","doi":"10.1109/ICCSPA55860.2022.10019122","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019122","url":null,"abstract":"Due to the evolution and availability of vast amounts of data for transferring, receiving, and detection, the field of signal recognition and modulation classification has become vital in various fields and applications. Additionally, the classical approaches to machine learning (ML) no more can satisfy the current needs. Hence, this urged researchers to apply deep learning (DL) algorithms that have a very strong ability to train, learn, and automatically classify types of modulation categories. This paper focuses on three vital DL network algorithms, which are deep neural networks (DNN), convolutional neural networks (CNN), and deep belief networks (DBN). The mentioned algorithms are widely used in many applications for automatic modulation classification/recognition (AMC/AMR). Additionally, an empirical study is performed in this paper to compare a large number of different methods for the performance and recognition percentage of each considered technique.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127009408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of the Impact of DDoS Attack on Routing Protocols in Infrastructure-less Mobile Networks","authors":"M. Sultan, Hesham El-Sayed, M. A. Khan","doi":"10.1109/ICCSPA55860.2022.10018968","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10018968","url":null,"abstract":"A Mobil Ad hoc Network (MANET) is a dynamic multi-hop infrastructure-less wireless network that comprises of a collection of mobile, self-organized, self-configured wireless nodes. A routing protocol in MANET is used to find routes between mobile nodes to facilitate communication within the network. Numerous routing protocols have been proposed for MANET. Those routing protocols are designed to adaptively accommodate for dynamic unpredictable changes in network's topology. MANET characteristics such as openness, restricted resources and decentralization impact node's efficiency and made it easy to be affected by various security attacks, especially the Distributed Denial of Service (DDoS) attacks. These DDoS attacks consume all system resources like battery power, bandwidth, energy, CPU, and render those resources and nodes unavailable to the legitimate users. The aim of this research is to implement a simulation model called Distributed Denial of Service Simulation Model (DDoS-Sim) to examine the effect of DDoS attack on various routing protocols in MANETs namely: Ad hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Destination-Sequenced Distance-Vector (DSDV). These routing protocols follow the reactive and proactive routing algorithms. The introduced model uses the network simulator 2 (NS-2) to apply DDoS on the three selected routing protocols. The performance of routings protocols was analyzed under the consequences of the attack in terms of packet delivery fraction and end-to-end delay.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127856989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahmoud Selim, Amr Alanwar, M. El-Kharashi, Hazem Abbas, K. Johansson
{"title":"Safe Reinforcement Learning using Data-Driven Predictive Control","authors":"Mahmoud Selim, Amr Alanwar, M. El-Kharashi, Hazem Abbas, K. Johansson","doi":"10.1109/ICCSPA55860.2022.10018994","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10018994","url":null,"abstract":"Reinforcement learning (RL) algorithms can achieve state-of-the-art performance in decision-making and continuous control tasks. However, applying RL algorithms on safety-critical systems still needs to be well justified due to the exploration nature of many RL algorithms, especially when the model of the robot and the environment are unknown. To address this challenge, we propose a data-driven safety layer that acts as a filter for unsafe actions. The safety layer uses a data-driven predictive controller to enforce safety guarantees for RL policies during training and after deployment. The RL agent proposes an action that is verified by computing the data-driven reachability analysis. If there is an intersection between the reachable set of the robot using the proposed action, we call the data-driven predictive controller to find the closest safe action to the proposed unsafe action. The safety layer penalizes the RL agent if the proposed action is unsafe and replaces it with the closest safe one. In the simulation, we show that our method outperforms state-of-the-art safe RL methods on the robotics navigation problem for a Turtlebot 3 in Gazebo and a quadrotor in Unreal Engine 4 (UE4).","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125427696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ziyou Ren, Nan Cheng, Ruijin Sun, Xiucheng Wang, N. Lu, Wenchao Xu
{"title":"SigT: An Efficient End-to-End MIMO-OFDM Receiver Framework Based on Transformer","authors":"Ziyou Ren, Nan Cheng, Ruijin Sun, Xiucheng Wang, N. Lu, Wenchao Xu","doi":"10.1109/ICCSPA55860.2022.10019001","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019001","url":null,"abstract":"Multiple-input multiple-output and orthogonal frequency-division multiplexing (MIMO-OFDM) are the key technologies in 4G and subsequent wireless communication systems. Conventionally, the MIMO-OFDM receiver is performed by multiple cascaded blocks with different functions and the algorithm in each block is designed based on ideal assumptions of wireless channel distributions. However, these assumptions may fail in practical complex wireless environments. The deep learning (DL) method has the ability to capture key features from complex and huge data. In this paper, a novel end-to-end MIMO-OFDM receiver framework based on transformer, named SigT, is proposed. By regarding the signal received from each antenna as a token of the transformer, the spatial correlation of different antennas can be learned and the critical zero-shot problem can be mitigated. Furthermore, the proposed SigT framework can work well without the inserted pilots, which improves the useful data transmission efficiency. Experiment results show that SigT achieves much higher performance in terms of signal recovery accuracy than benchmark methods, even in a low SNR environment or with a small number of training samples. Code is available at https://github.com/SigTransformer/SigT.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124973790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mhd Saria Allahham, Amr Mohamed, A. Erbad, H. Hassanein
{"title":"On the Modeling of Reliability in Extreme Edge Computing Systems","authors":"Mhd Saria Allahham, Amr Mohamed, A. Erbad, H. Hassanein","doi":"10.1109/ICCSPA55860.2022.10019108","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019108","url":null,"abstract":"Extreme edge computing (EEC) refers to the end-most part of edge computing wherein computational tasks and edge services are deployed only on extreme edge devices (EEDs). EEDs are consumer or user-owned devices that offer computational resources, which may consist of wearable devices, personal mobile devices, drones, etc. Such devices are opportunistically or naturally present within the proximity of other user devices. Hence, utilizing EEDs to deploy edge services or perform computational tasks fulfills the promise of edge computing of bringing the services and computation as close as possible to the end-users. However, the lack of knowledge and control over the EEDs computational resources raises a red flag, since executing the computational tasks successfully becomes doubtful. To this end, we aim to study the EEDs randomness from the computational perspective, and how reliable is an EED in terms of executing the tasks on time. Specifically, we provide a reliability model for the EEDs that takes into account the probabilistic nature of the availability of the EEDs' computational resources. Moreover, we study the reliability of executing different types of computational tasks in EEC systems that are distributed across the EEDs. Lastly, we carry out experimental results to analyze the EEDs and the EEC systems' reliability behavior in different scenarios.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116392894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}