Shuang Li, Jiacheng Wang, Baoguo Yu, Hantong Xing, Shuang Wang
{"title":"A deep learning-based approach for pseudo-satellite positioning","authors":"Shuang Li, Jiacheng Wang, Baoguo Yu, Hantong Xing, Shuang Wang","doi":"10.1049/cmu2.12821","DOIUrl":"https://doi.org/10.1049/cmu2.12821","url":null,"abstract":"<p>Traditional pseudo-satellite-based indoor positioning techniques are greatly affected by the presence of multipath effects, leading to a notable reduction in the positioning precision. In order to tackle this challenge, a pseudo-satellite indoor positioning method based on deep learning is proposed. The method grids the localization region, thus transforming positioning from a regression problem to a classification problem in the gridded areas. 1D-convolutional neural network is employed to extract the correlation between pseudo-satellite data and the positioning of indoor areas. Data are collected and the method is validated in three types of areas of the experimental field, namely unobstructed area, semi-unobstructed area and obstructed area. The experimental results demonstrate that the method exhibits superior positioning accuracy compared to traditional methods, enabling effective localization even in obstructed area.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 17","pages":"1140-1150"},"PeriodicalIF":1.5,"publicationDate":"2024-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12821","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal pilot pattern for data-aided channel estimation for MIMO-OFDM wireless systems","authors":"Inaamullah Khan, Michael Cheffena","doi":"10.1049/cmu2.12840","DOIUrl":"https://doi.org/10.1049/cmu2.12840","url":null,"abstract":"<p>This article presents an optimal pilot pattern for the data-aided channel estimation (DACE) scheme for both single-input single-output (SISO) and multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) wireless systems. The research evaluates the performance of the DACE scheme using different comb-type pilot patterns for both least square (LS) and linear minimum mean square error (LMMSE) channel estimators. In this regard, it is found that pilot spacing significantly influences system performance. Inserting pilot symbols in consecutive subcarriers cannot compensate for increased pilot spacing. Hence, the solution to this problem is to place pilot symbols at appropriate locations within the given spectrum. Moreover, data symbols which are reliably detected at the receiver are used as additional pilot signals to further enhance system performance. However, reliable data symbols need to be determined carefully because wrong detection results in severe performance degradation. In this respect, the proposed comb-type pilot pattern using a single pilot subcarrier extracts the maximum number of reliable data symbols for the DACE scheme, improves channel estimation accuracy, and provides bandwidth optimization for MIMO-OFDM systems. Furthermore, it outperforms all other pilot patterns in terms of system mean square error (MSE) and bit-error-rate (BER) performance.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 19","pages":"1474-1484"},"PeriodicalIF":1.5,"publicationDate":"2024-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12840","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142762805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IBTD: A novel ISAC beam tracking based on deep reinforcement learning for mmWave V2V networks","authors":"Yifeng Zhao, Haoran Liu, Xuanhui Liu, Xiaoqi Wang, Zhibin Gao, Lianfen Huang","doi":"10.1049/cmu2.12835","DOIUrl":"https://doi.org/10.1049/cmu2.12835","url":null,"abstract":"<p>Beam tracking is commonly employed in millimetre wave (mmWave) based vehicle-to-vehicle (V2V) networks to align the beams towards the intended targets and compensate for the path loss of mmWave signals. To mitigate the high latency issue arising from the tracking processes, integrated sensing and communication (ISAC) technology leverages the echo signal to sense the motion parameters of the target, achieving low-latency beam tracking without requiring pilot and uplink feedback. Existing studies mainly focus on utilizing ISAC for beam alignment to track the target, without integrating beam tracking with resource allocation. In this paper, we propose the ISAC beam tracking based on deep reinforcement learning (IBTD) algorithm to address this problem. Specifically, we introduce the concept of packet age to measure communication performance. To achieve accurate beam tracking and optimize the transmit power, we integrate the sensing results, such as the position and velocity of the target vehicle, along with the buffer pool status information, with deep reinforcement learning (DRL) to select an appropriate policy. Furthermore, we consider the effect of inter-vehicle distance and incorporate the changing of tracking targets into the DRL-based policy. Simulation results demonstrate that the proposed IBTD algorithm achieves lower packet age and transmit power consumption compared to the baseline algorithms.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 19","pages":"1403-1416"},"PeriodicalIF":1.5,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12835","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142762730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of interference effect in VL-NOMA network considering signal power parameters performance","authors":"Chidi Emmanuel Ngene, Prabhat Thakur, Ghanshyam Singh","doi":"10.1049/cmu2.12812","DOIUrl":"https://doi.org/10.1049/cmu2.12812","url":null,"abstract":"<p>This study analyses the interference effect in a visible light-non-orthogonal multiple access (VL-NOMA) network that considers the signal power parameters performance for near and far users. The light-emitting diode (LED) as a carrier transmits signals, and we investigate the interference effect. The interference effect challenge is a result of unaligned signal power parameters, thereby producing noise or echo during the signal transmission. The signal power parameters are successfully aligned, and NOMA techniques are deployed, which improves the signal performance in terms of bit-error rate (BER), achieved data rate, and signal-to-interference plus noise ratio (SINR). Furthermore, the deployed NOMA techniques, such as power allocations (PA) to assign the signals appropriately, then superposition coding (SC) encodes the entire signal, and successive interference cancellation (SIC) cancels the interference within the signals. The signal behavior of the aligned and the unaligned signal power parameters performance are used to investigate the interference effect. We observed that unaligned signal power parameters reduce the signal performance of achieved data rate, BER, and SINR. Further, the aligned signal power parameter with NOMA techniques improves the signal performance. Moreover, in the aligned signal power scenario of NOMA, the near user performed better than the far user.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 17","pages":"1062-1070"},"PeriodicalIF":1.5,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12812","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ship target detection in SAR images based on SimAM attention YOLOv8","authors":"Yuqiao Xu, Wei Du, Lewu Deng, Yi Zhang, Wanli Wen","doi":"10.1049/cmu2.12837","DOIUrl":"https://doi.org/10.1049/cmu2.12837","url":null,"abstract":"<p>Deep learning has been widely applied in ship detection in synthetic aperture radar (SAR) imagery due to their powerful feature representation capabilities. However, YOLOv8 models treat all regions of the image equally during convolutional feature processing, resulting in less-than-ideal outcomes. To address this limitation, this study proposes a simple, parameter-free attention module (SimAM) attention-based YOLOv8 algorithm for ship detection in SAR images. The proposed algorithm first passes through a backbone network, which incorporates SimAM attention modules. The SimAM attention mechanism successfully allocates the convolutional neural network's 3D weights effectively using an energy function method, without introducing additional parameters. This mechanism enables the network to automatically emphasize key features in the image, enhancing its ability to represent target areas and suppress background interference. Subsequently, deep features are upsampled and fused with relatively shallow features to extract features at three different scales and achieve target detection, ultimately outputting classification and positional information of the targets. The effectiveness of the model on the SAR-ship-dataset is experimentally validated achieving an mAP50 value of 97.72% and an mAP50-95 value of 68.99%, confirming the superiority of the proposed model.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 19","pages":"1428-1436"},"PeriodicalIF":1.5,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12837","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142762615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient provable dual receiver hybrid and light weight public key schemes based on the discrete logarithm problem without pairings","authors":"Eman Abouelkheir","doi":"10.1049/cmu2.12836","DOIUrl":"https://doi.org/10.1049/cmu2.12836","url":null,"abstract":"<p>Dual-receiver proxy re-encryption is a cryptographic technique that enables secure data sharing among multiple authorized users or entities. It has gained significant attention for its ability to manage access permissions, data confidentiality, and streamline communication channels. These schemes have been widely used in various applications, including healthcare systems, cloud computing, Internet of Things (IoT) systems, collaborative environments, and secure communication channels. This paper aims to propose two proxy re-encryption schemes for dual receivers without pairings. The first is dual receiver lightweight proxy re-encryption without pairings (DR-LWPRE-WP), which uses a public key scheme to reduce computational complexity. The second is dual receiver hybrid proxy re-encryption without pairings (DR-HPRE-WP), which incorporates public key and symmetric key schemes. Both schemes offer protection against selected plaintext attacks based on the decisional Diffie-Hellman principle. The DR-LWPRE-WP scheme reduces computation by approximately 53% compared to pairing-based schemes, making it suitable for lightweight applications like the Internet of Things. The computational efficacy of these schemes offers significant benefits for resource-constrained environments and practical implementations.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 19","pages":"1417-1427"},"PeriodicalIF":1.5,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12836","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142762790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arash Salehpour, Monire Norouzi, Mohammad Ali Balafar, Karim SamadZamini
{"title":"A cloud-based hybrid intrusion detection framework using XGBoost and ADASYN-Augmented random forest for IoMT","authors":"Arash Salehpour, Monire Norouzi, Mohammad Ali Balafar, Karim SamadZamini","doi":"10.1049/cmu2.12833","DOIUrl":"https://doi.org/10.1049/cmu2.12833","url":null,"abstract":"<p>Internet of Medical Things have vastly increased the potential for remote patient monitoring, data-driven care, and networked healthcare delivery. However, the connectedness lays sensitive patient data and fragile medical devices open to security threats that need robust intrusion detection solutions within cloud-edge services. Current approaches need modification to be able to handle the practical challenges that result from problems with data quality. This paper presents a hybrid intrusion detection framework that enhances the security of IoMT networks. There are three modules in the design. First, an XGBoost-based noise detection model is used to identify data anomalies. Second, adaptive resampling with ADASYN is done to fine-tune the class distribution to address class imbalance. Third, ensemble learning performs intrusion detection through a Random Forest classifier. This stacked model coordinates techniques that filter noise and preprocess imbalanced data, identifying threats with high accuracy and reliability. These results are then experimentally validated on the UNSW-NB15 benchmark to demonstrate effective detection under realistically noisy conditions. The novel contributions of the work are a new hybrid structural paradigm coupled with integrated noise filtering, and ensemble learning. The proposed advanced oversampling with ADASYN gives a performance that surpasses all others with a reported 92.23% accuracy.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 19","pages":"1371-1390"},"PeriodicalIF":1.5,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12833","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142762606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An innovative model for an enhanced dual intrusion detection system using LZ-JC-DBSCAN, EPRC-RPOA and EG-GELU-GRU","authors":"Jeyavim Sherin R. C., Parkavi K.","doi":"10.1049/cmu2.12831","DOIUrl":"https://doi.org/10.1049/cmu2.12831","url":null,"abstract":"<p>The rise of suspicious activities in network communication, driven by increased internet accessibility, necessitates the development of advanced intrusion detection systems (IDS). Existing IDS solutions often exhibit poor performance in detecting suspicious activity and fail to identify various attack types within packet capture (PCAP) files, which monitor network traffic. This paper proposes a deep learning-based dual IDS model designed to address these issues. The process begins with utilizing the CSE-CIC-IDS2019 dataset to extract features from PCAP files. Suspicious activities are detected using the Exponential Geometric-Gaussian Error Linear Units-Gated Recurrent Unit (EG-GELU-GRU) method. Normal data undergoes further feature extraction and preprocessing through Log ZScore-Jacosine Density-Based Spatial Clustering of Applications with Noise (LZ-JC-DBSCAN). Feature selection is optimized using the Entropy Pearson R Correlation-Red Panda optimization algorithm. Suspicious files are flagged, while load balancing is performed on normal data. Attack detection is achieved through word embedding with the Glorot Kaufman-bidirectional encoder representations from transformers technique and classification via the EG-GELU-GRU model. Attacked packets are blocked, and the method is reapplied for attack-type classification. Experimental results using Python demonstrate the model’s superior performance, achieving 98.18% accuracy and 98.73% precision, surpassing existing approaches and significantly enhancing intrusion detection capabilities.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 18","pages":"1300-1318"},"PeriodicalIF":1.5,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12831","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A high-precision timing and frequency synchronization algorithm for multi-h CPM signals","authors":"Yukai Liu, Rongke Liu, Qizhi Chen, Ling Zhao","doi":"10.1049/cmu2.12809","DOIUrl":"https://doi.org/10.1049/cmu2.12809","url":null,"abstract":"<p>In the context of certain specific digital communication systems, where there are limitations such as spectral resources and energy availability, continuous phase modulation (CPM) emerges as an appealing choice among various modulation methods. Among CPM signals, multi-h CPM is particularly noteworthy for its ability to address these constraints within the realm of single-carrier and constant-envelope waveforms. At the physical layer, the design of a multi-h CPM receiver necessitates the efficient implementation of timing and frequency synchronization algorithm within a high dynamic environment. So this paper presents an innovative approach for achieving timing and frequency synchronization. To rectify timing offset and mitigate the adverse effects of noise in received signals, a re-configurable local filter generation method is integrated into the timing synchronization algorithm. Simultaneously, an enhanced least mean square adaptive filter algorithm is applied to address frequency synchronization. A comprehensive series of simulations rigorously evaluates the outcomes of proposed novel synchronization methodology. These analyses demonstrate a notable proximity between the synchronization errors of proposed algorithm in this paper and the performance benchmark set by the modified Cramer–Rao bound. The proposed synchronization technology also exhibits the capability to substantially reduce the bit error rate, thereby effectively enhancing demodulation performance in multi-h CPM receivers.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 17","pages":"1049-1061"},"PeriodicalIF":1.5,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12809","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142435177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mehran Kakavand, Mohammadreza Hassannejad Bibalan, Mina Baghani
{"title":"Capacity analysis over fractional order Rayleigh fading channel under additive white generalized Gaussian noise","authors":"Mehran Kakavand, Mohammadreza Hassannejad Bibalan, Mina Baghani","doi":"10.1049/cmu2.12834","DOIUrl":"https://doi.org/10.1049/cmu2.12834","url":null,"abstract":"<p>This study presents an innovative fractional order Rayleigh fading model that can be used for channel capacity estimation in the presence of additive white generalized Gaussian noise. The proposed model assumes that the real and imaginary parts of channel gains are generalized Gaussian random variables, which makes it possible to consider the traditional Rayleigh fading model as a special case of fractional order Rayleigh fading. Compared to the Rayleigh model, the fractional order Rayleigh fading model offers a more precise representation of new real-world communication, such as integrating terrestrial and underwater networks in sixth-generation communications channels. The probability density function of the channel gain with additive white generalized Gaussian noise is analyzed here. Furthermore, the ergodic and outage capacities of the channel are determined, taking into account the assumption that the channel state information is only available at the receiver. The ergodic capacity is calculated using Meijer's G-functions, resulting in a closed-form expression. Numerical simulations demonstrate the superiority of the fractional order Rayleigh fading model over the Rayleigh channel. Moreover, the impact of ergodic and outage capacities under diverse channel characteristics is assessed.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"18 19","pages":"1391-1402"},"PeriodicalIF":1.5,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12834","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142762781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}