IEEE Open Journal of the Computer Society最新文献

筛选
英文 中文
Sybil-Resilient Publisher Selection Mechanism in Blockchain-Based MCS Systems 基于区块链的MCS系统中的弹性发布者选择机制
IEEE Open Journal of the Computer Society Pub Date : 2025-04-29 DOI: 10.1109/OJCS.2025.3565620
Ankit Agrawal;Ashutosh Bhatia;Kamlesh Tiwari
{"title":"Sybil-Resilient Publisher Selection Mechanism in Blockchain-Based MCS Systems","authors":"Ankit Agrawal;Ashutosh Bhatia;Kamlesh Tiwari","doi":"10.1109/OJCS.2025.3565620","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3565620","url":null,"abstract":"In Blockchain-based Mobile CrowdSensing (BMCS) systems, publishers (data collectors) can exploit the ability to create multiple blockchain identities, enabling Sybil attacks. Selfish, malicious, and collusive Sybil behaviors undermine both reward and majority-based data validation mechanisms, discouraging honest participation and threatening system integrity. Existing solutions often fail to address these issues, particularly in environments dominated by selfish or malicious publishers. This article proposes a novel two-phase publisher selection mechanism to mitigate Sybil attacks in BMCS systems. Phase-I employs a modified Proof-of-Stake (PoS) mechanism with carefully calibrated parameters, including staked amount, coinage, reputation, and randomness. The strategic combination of staked amount and coinage increases the difficulty of Sybil attacks as the system scales over time. Phase-II introduces a lightweight, reputation-based Proof-of-Work (PoW) mechanism tailored for Mobile CrowdSensing (MCS) environments, where puzzle difficulty adjusts dynamically based on the publisher's reputation. Reputation and penalization mechanisms are central to the proposed mechanism, ensuring robust prevention of task domination, selfish behavior, and malicious activities while fostering honest participation. Comprehensive on-chain and off-chain simulations demonstrate the proposed mechanism's effectiveness in mitigating Sybil attacks, reducing their impact, and promoting fair participation.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"586-598"},"PeriodicalIF":0.0,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979902","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143949190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large Language Model Enhanced Particle Swarm Optimization for Hyperparameter Tuning for Deep Learning Models 基于大语言模型增强粒子群优化的深度学习模型超参数整定
IEEE Open Journal of the Computer Society Pub Date : 2025-04-25 DOI: 10.1109/OJCS.2025.3564493
Saad Hameed;Basheer Qolomany;Samir Brahim Belhaouari;Mohamed Abdallah;Junaid Qadir;Ala Al-Fuqaha
{"title":"Large Language Model Enhanced Particle Swarm Optimization for Hyperparameter Tuning for Deep Learning Models","authors":"Saad Hameed;Basheer Qolomany;Samir Brahim Belhaouari;Mohamed Abdallah;Junaid Qadir;Ala Al-Fuqaha","doi":"10.1109/OJCS.2025.3564493","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3564493","url":null,"abstract":"Determining the ideal architecture for deep learning models, such as the number of layers and neurons, is a difficult and resource-intensive process that frequently relies on human tuning or computationally costly optimization approaches. While Particle Swarm Optimization (PSO) and Large Language Models (LLMs) have been individually applied in optimization and deep learning, their combined use for enhancing convergence in numerical optimization tasks remains underexplored. Our work addresses this gap by integrating LLMs into PSO to reduce model evaluations and improve convergence for deep learning hyperparameter tuning. The proposed LLM-enhanced PSO method addresses the difficulties of efficiency and convergence by using LLMs (particularly ChatGPT-3.5 and Llama3) to improve PSO performance, allowing for faster achievement of target objectives. Our method speeds up search space exploration by substituting underperforming particle placements with best suggestions offered by LLMs. Comprehensive experiments across three scenarios—(1) optimizing the Rastrigin function, (2) using Long Short-Term Memory (LSTM) networks for time series regression, and (3) using Convolutional Neural Networks (CNNs) for material classification—show that the method significantly improves convergence rates and lowers computational costs. Depending on the application, computational complexity is lowered by 20% to 60% compared to traditional PSO methods. Llama3 achieved a 20% to 40% reduction in model calls for regression tasks, whereas ChatGPT-3.5 reduced model calls by 60% for both regression and classification tasks, all while preserving accuracy and error rates. This groundbreaking methodology offers a very efficient and effective solution for optimizing deep learning models, leading to substantial computational performance improvements across a wide range of applications.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"574-585"},"PeriodicalIF":0.0,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10976715","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143929883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems UNSW-MG24:现实微电网系统中网络安全分析的异构数据集
IEEE Open Journal of the Computer Society Pub Date : 2025-04-24 DOI: 10.1109/OJCS.2025.3564266
Zhibo Zhang;Benjamin Turnbull;Shabnam Kasra Kermanshahi;Hemanshu Pota;Jiankun Hu
{"title":"UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems","authors":"Zhibo Zhang;Benjamin Turnbull;Shabnam Kasra Kermanshahi;Hemanshu Pota;Jiankun Hu","doi":"10.1109/OJCS.2025.3564266","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3564266","url":null,"abstract":"One of the major challenges of microgrid systems is the lack of comprehensive Intrusion Detection System (IDS) datasets specifically for realistic microgrid systems' communication. To address the unavailability of comprehensive IDS datasets for realistic microgrid systems, this article presents a UNSW-MG24 dataset based on realistic microgrid testbeds. This dataset contains synthesized benign network traffic from different campus departments, network flow of attack activities, system call traces, and microgrid-specific data from an integrated Festo LabVolt microgrid system. Additionally, pivoting attacks and mimicry attacks are implemented to increase this dataset's heterogeneity for intrusion detection. Comprehensive features such as network flow attributes, system call parameters, and power measurement metrics are extracted from the generated dataset. Finally, a premiminary analysis is presented to elaborate the UNSW-MG24 dataset.This dataset is publicly available for research purposes at UNSW-MG24 dataset.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"543-553"},"PeriodicalIF":0.0,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10976542","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143929690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Orchestration in 5G and Beyond Smart Network Technologies 5G及超越智能网络技术中的安全编排
IEEE Open Journal of the Computer Society Pub Date : 2025-04-23 DOI: 10.1109/OJCS.2025.3563619
Sadeep Batewela;Madhusanka Liyanage;Engin Zeydan;Mika Ylianttila;Pasika Ranaweera
{"title":"Security Orchestration in 5G and Beyond Smart Network Technologies","authors":"Sadeep Batewela;Madhusanka Liyanage;Engin Zeydan;Mika Ylianttila;Pasika Ranaweera","doi":"10.1109/OJCS.2025.3563619","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3563619","url":null,"abstract":"Security Orchestration (SCO) represents a pivotal element in achieving intelligent and automated security monitoring and management within intricate and dynamic network environments, notably the 5th Generation (5G) and Beyond 5G (B5G) networks. The seamless integration of SCO into emerging 5G/B5G technologies, such as Open Radio Access Networks (ORAN), Zero-touch network and Service Management (ZSM), Software-Defined Networking (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC), cloud computing, and Network Slicing (NS), is of paramount importance for realizing the vision of zero-touch, self-repair, self-healing, and secure networks. Furthermore, these advanced technologies offer opportunities to enhance SCO's functionalities. This article offers an in-depth exploration of SCO's evolution, significance, functionalities, and critical components, considering its potential within the realm of 5G and B5G network technologies. The primary objective of this specify is to provide an informative analysis of the integration of SCO into 5G and B5G network technologies and how these implementations can be harmoniously combined within a unified framework. Lastly, we present valuable insights, remaining research problems, and future directions toward achieving the goal of zero-touch security and networks.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"554-573"},"PeriodicalIF":0.0,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10974672","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143929882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emerging Computing Tools for Emergency Management: Applications, Limitations and Future Prospects 新兴的应急管理计算工具:应用、限制和未来展望
IEEE Open Journal of the Computer Society Pub Date : 2025-04-23 DOI: 10.1109/OJCS.2025.3563759
Ali Daud;Khameis Mohamed Al Abdouli;Afzal Badshah
{"title":"Emerging Computing Tools for Emergency Management: Applications, Limitations and Future Prospects","authors":"Ali Daud;Khameis Mohamed Al Abdouli;Afzal Badshah","doi":"10.1109/OJCS.2025.3563759","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3563759","url":null,"abstract":"Emerging Technologies (ET) as tools are reshaping every aspect of daily life and revolutionizing the global landscape. Emergency Management (EM), in particular, is a critical domain significantly impacted by these technologies as emergency tools. Organizations and governments actively adopt tools powered by Emerging Technologies (ET) to improve Emergency Management (EM) strategies in a technology driven world. This research aims to comprehensively evaluate the role of ET as tools in EM, focusing on their utilization, effectiveness across different phases, and the challenges associated with their deployment. By exploring key domains influenced by these tools, this research identifies their primary use cases and examines how their integration has transformed the operational framework of EM. This research contributes valuable insights for academia, market entities, and government agencies to integrate ET tools effectively into EM practices, ultimately leading to improved efficiency and a higher probability of saving lives and protecting assets.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"627-644"},"PeriodicalIF":0.0,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10974680","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144073184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Neural Cell Architecture for Spiking Neural Networks 一种用于脉冲神经网络的高效神经细胞结构
IEEE Open Journal of the Computer Society Pub Date : 2025-04-22 DOI: 10.1109/OJCS.2025.3563423
Kasem Khalil;Ashok Kumar;Magdy Bayoumi
{"title":"An Efficient Neural Cell Architecture for Spiking Neural Networks","authors":"Kasem Khalil;Ashok Kumar;Magdy Bayoumi","doi":"10.1109/OJCS.2025.3563423","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3563423","url":null,"abstract":"Neurons in a Spiking Neural Network (SNN) communicate using electrical pulses or spikes. They fire or trigger conditionally, and learning is sensitive to such triggers' timing and duration. The Leaky Integrate and Fire (LIF) model is the most widely used SNN neuron model. Most existing LIF-based neurons use a fixed spike frequency, which prevents them from attaining near-optimal accuracy. A research challenge is to design energy and area-efficient SNN neural cells that provide high learning accuracy and are scalable. Recently, the idea of tuning the spiking pulses in SNN was proposed and found promising. This work builds on the pulse-tuning idea by proposing an area and energy-efficient, stable, and reconfigurable SNN cell that generates spikes and reconfigures its pulse width to achieve near-optimal learning. It auto-adapts spike rate and duration to attain near-optimal accuracies for various SNN applications. The proposed cell is designed in mixed-signal, known to be beneficial to SNN, implemented using 45-nm technology, occupies an area of 27 <inline-formula><tex-math>$mu {rm m}^{2}$</tex-math></inline-formula>, incurs 1.86 <inline-formula><tex-math>$mu {rm W}$</tex-math></inline-formula>, and yields a high learning performance of 99.12%, 96.37%, and 78.64% in N-MNIST, MNIST, and N-Caltech101 datasets, respectively. The proposed cell attains higher accuracy, scalability, energy, and area economy than the state-of-the-art SNN neurons. Its energy efficiency and compact design make it highly suitable for sensor network applications and embedded systems requiring real-time, low-power neuromorphic computing.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"599-612"},"PeriodicalIF":0.0,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10972324","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144073381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A B-Spline Function Based 3D Point Cloud Unwrapping Scheme for 3D Fingerprint Recognition and Identification 一种基于b样条函数的三维点云展开方案用于三维指纹识别与识别
IEEE Open Journal of the Computer Society Pub Date : 2025-04-11 DOI: 10.1109/OJCS.2025.3559975
Mohammad Mogharen Askarin;Jiankun Hu;Min Wang;Xuefei Yin;Xiuping Jia
{"title":"A B-Spline Function Based 3D Point Cloud Unwrapping Scheme for 3D Fingerprint Recognition and Identification","authors":"Mohammad Mogharen Askarin;Jiankun Hu;Min Wang;Xuefei Yin;Xiuping Jia","doi":"10.1109/OJCS.2025.3559975","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3559975","url":null,"abstract":"A three-dimensional (3D) fingerprint recognition and identification system offers several advantages: in addition to sharing the hygiene property of a 2D contactless fingerprint system in reducing the risk of contamination, it offers an exceptional anti-proofing attack capability over the traditional two-dimensional (2D) fingerprint, including 2D contactless fingerprint, recognition and identification systems. This is because capturing a 3D fingerprint sample will require a synchronized operation of multiple 3D-spaced cameras. It is infeasible to construct a quality 3D fingerprint sample based on a set of random 2D fingerprint images. In addition to capturing surface ridge and valley patterns similar to a 2D fingerprint system, 3D fingerprints capture depth, curvature, and shape information, enabling the development of more precise and robust authentication systems. Despite recent advancements, significant challenges remain. The topological height of fingerprint pixels complicates the extraction of ridge and valley patterns. Furthermore, registration issues limit the acquisition process, requiring consistent direction and orientation across all samples. To address these challenges, this article introduces a method that unwraps 3D fingerprints, represented as 3D point clouds, using B-spline curve fitting to mitigate height variation and reduce registration limitations. The unwrapped point cloud is then converted into a grayscale image by mapping the relative heights of the points. This grayscale image is subsequently used for recognition through conventional 2D fingerprint identification methods. The proposed approach demonstrated superior performance in 3D fingerprint recognition, achieving Equal Error Rates (EERs) of 0.2072%, 0.26%, and 0.22% across three experiments, outperforming existing methods. Additionally, the method surpassed 3D fingerprint flattening technique in both recognition and identification during cross-session experiments, achieving an EER of 1.50% when fingerprints with varying registrations were included.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"480-490"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10962329","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143871001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimizing the Carbon Footprint in LoRa-Based IoT Networks: A Machine Learning Perspective on Gateway Positioning 最小化基于lora的物联网网络中的碳足迹:网关定位的机器学习视角
IEEE Open Journal of the Computer Society Pub Date : 2025-04-09 DOI: 10.1109/OJCS.2025.3559331
Francisco-Jose Alvarado-Alcon;Rafael Asorey-Cacheda;Antonio-Javier Garcia-Sanchez;Joan Garcia-Haro
{"title":"Minimizing the Carbon Footprint in LoRa-Based IoT Networks: A Machine Learning Perspective on Gateway Positioning","authors":"Francisco-Jose Alvarado-Alcon;Rafael Asorey-Cacheda;Antonio-Javier Garcia-Sanchez;Joan Garcia-Haro","doi":"10.1109/OJCS.2025.3559331","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3559331","url":null,"abstract":"The Internet of Things (IoT) is gaining significant attention for its ability to digitally transform various sectors by enabling seamless connectivity and data exchange. However, deploying these networks is challenging due to the need to tailor configurations to diverse application requirements. To date, there has been limited focus on examining and enhancing the carbon footprint (CF) associated with these network deployments. In this study, we present an optimization framework leveraging machine learning techniques to minimize the CF associated with IoT multi-hop network deployments by varying the placement of the required gateways. Additionally, we establish a direct comparison between our proposed machine learning method and the integer linear program (ILP) approach. Our findings reveal that placing gateways using neural networks can achieve a 14% reduction in the CF for simple networks compared to those not using optimization for gateway placement. The ILP method could reduce the CF by 16.6% for identical networks, although it incurs a computational cost more than 250 times higher, which has its own environmental impact. Furthermore, we highlight the superior scalability of machine learning techniques, particularly advantageous for larger networks, as discussed in our concluding remarks.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"531-542"},"PeriodicalIF":0.0,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10959076","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143892357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kolmogorov-Arnold Vision Transformer for Image Reconstruction in Lung Electrical Impedance Tomography 用于肺电阻抗断层成像图像重建的Kolmogorov-Arnold视觉变压器
IEEE Open Journal of the Computer Society Pub Date : 2025-04-09 DOI: 10.1109/OJCS.2025.3559390
Ibrar Amin;Shuaikai Shi;Hasan AlMarzouqi;Zeyar Aung;Waqar Ahmed;Panos Liatsis
{"title":"Kolmogorov-Arnold Vision Transformer for Image Reconstruction in Lung Electrical Impedance Tomography","authors":"Ibrar Amin;Shuaikai Shi;Hasan AlMarzouqi;Zeyar Aung;Waqar Ahmed;Panos Liatsis","doi":"10.1109/OJCS.2025.3559390","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3559390","url":null,"abstract":"Electrical impedance tomography is a non-invasive and non-ionizing imaging technique, which can provide real-time monitoring of the internal structures and function of the human body, and has been particularly popular in lung monitoring. However, the associated inverse problem is ill-posed, leading to suboptimal image quality with low spatial resolution, which hinders its practical use in the clinical settings. To achieve reliable image reconstruction, this work proposes a novel deep learning approach, applied to lung monitoring. The proposed model is a hybrid of the vision transformer and the recently introduced Kolmogorov Arnold Network (KAN). The fully connected layers in the transformer are replaced with KAN layers, which enhances its ability to learn the complex relationship between the voltage measurements and the conductivity distribution within the lungs. In comparison with the use of convolutional models and Vision Transformer, the proposed method achieves outstanding performance with a mean squared error of 0.0045, structural similarity index of 0.96, relative error of 0.11, and correlation coefficient of 0.98.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"519-530"},"PeriodicalIF":0.0,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10960369","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143896479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Joint Active and Passive Beamforming for Reconfigurable Intelligent Surface Assisted Full-Duplex Transmissions Under Imperfect Channels 不完全信道下可重构智能表面辅助全双工传输的鲁棒联合主被动波束形成
IEEE Open Journal of the Computer Society Pub Date : 2025-04-01 DOI: 10.1109/OJCS.2025.3556710
Li-Hsiang Shen;Chia-Jou Ku;Kai-Ten Feng
{"title":"Robust Joint Active and Passive Beamforming for Reconfigurable Intelligent Surface Assisted Full-Duplex Transmissions Under Imperfect Channels","authors":"Li-Hsiang Shen;Chia-Jou Ku;Kai-Ten Feng","doi":"10.1109/OJCS.2025.3556710","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3556710","url":null,"abstract":"The sixth-generation (6G) wireless technology recognizes the potential of reconfigurable intelligent surfaces (RIS) as an effective technique for intelligently manipulating channel paths through reflection to serve desired users. Full-duplex (FD) systems, enabling simultaneous transmission and reception from a base station (BS), offer the theoretical advantage of doubled spectrum efficiency. However, the presence of strong self-interference (SI) in FD systems significantly degrades performance, which can be mitigated by leveraging the capabilities of RIS. Moreover, accurately obtaining channel state information (CSI) from RIS poses a critical challenge. Our objective is to maximize downlink (DL) user data rates while ensuring quality-of-service (QoS) for uplink (UL) users under imperfect CSI from reflected channels. To address this, we propose a robust active BS and passive RIS beamforming (RAPB) scheme for RIS-FD, accounting for both SI and imperfect CSI. RAPB incorporates distributionally robust design, conditional value-at-risk (CVaR), and penalty convex-concave programming (PCCP) techniques. Simulation results demonstrate the UL/DL rate improvement are achieved by considering different levels of imperfect CSI. The proposed RAPB schemes validate their effectiveness across different RIS deployments and RIS/BS configurations. Benefited from robust beamforming, RAPB outperforms the existing methods in terms of non-robustness, deployment without RIS, conventional approximation, and half-duplex systems.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"502-518"},"PeriodicalIF":0.0,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10946837","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143892521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信