bbabanner.jpg

Stochastic travelling advisor problem simulation with a case study: A novel binary gaining-sharing knowledge-based optimization algorithm

This article proposes a new problem which is called the Stochastic Travelling Advisor Problem (STAP) in network optimization, and it is defined for an advisory group who wants to choose a subset of candidate workplaces comprising the most profitable route within the time limit of day working hours. A nonlinear binary mathematical model is formulated and a real application case study in the occupational health and safety field is presented. The problem has a stochastic nature in travelling and advising times since the deterministic models are not appropriate for such real-life problems. The
Artificial Intelligence
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Neural Knapsack: A Neural Network Based Solver for the Knapsack Problem

This paper introduces a heuristic solver based on neural networks and deep learning for the knapsack problem. The solver is inspired by mechanisms and strategies used by both algorithmic solvers and humans. The neural model of the solver is based on introducing several biases in the architecture. We introduce a stored memory of vectors that holds up items representations and their relationship to the capacity of the knapsack and a module that allows the solver to access all the previous outputs it generated. The solver is trained and tested on synthetic datasets that represent a variety of
Artificial Intelligence
Software and Communications
Innovation, Entrepreneurship and Competitiveness

SWIPT Using Hybrid ARQ over Time Varying Channels

We consider a class of wireless powered devices employing hybrid automatic repeat request to ensure reliable end-to-end communications over a two-state time-varying channel. A receiver, with no power source, relies on the energy transferred by a simultaneous wireless information and power transfer enabled transmitter to receive and decode information. Under the two-state channel model, information is received at two different rates while it is only possible to harvest energy in one of the states. The receiver aims to decode its messages with minimum expected number of re-transmissions. Dynamic
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Optimal random access and random spectrum sensing for an energy harvesting cognitive radio

We consider a secondary user with energy harvesting capability. We design access schemes for the secondary user which incorporate random spectrum sensing and random access, and which make use of the primary automatic repeat request (ARQ) feedback. The sensing and access probabilities are obtained such that the secondary throughput is maximized under the constraints that both the primary and secondary queues are stable and that the primary queueing delay is kept lower than a specified value needed to guarantee a certain quality of service (QoS) for the primary user. We consider spectrum sensing

Software and Communications
Agriculture and Crops

Optimal random access for a cognitive radio terminal with energy harvesting capability

We consider a cognitive radio scenario with an energy harvesting secondary user (SU) attempting to access a primary channel randomly. We assume multipacket reception (MPR) capability and investigate a system in which the SU may or may not exploit the primary feedback messages. The access probabilities are obtained to maximize the secondary throughput under the constraints of primary queue stability and such that the primary queueing delay is kept below a specified value in order to guarantee a certain quality of service (QoS) for the primary user (PU). We investigate the impact of the energy
Software and Communications
Agriculture and Crops

The deterministic multicast capacity of 4-node relay networks

In this paper, we completely characterize the deterministic capacity region of a four-node relay network with no direct links between the nodes, where each node communicates with the three other nodes via a relay. Towards this end, we develop an upper bound on the deterministic capacity region, based on the notion of a one-sided genie. To establish achievability, we use the detour schemes that achieve the upper bound by routing specific bits via indirect paths instead of sending them directly. © 2013 IEEE.

Software and Communications
Agriculture and Crops

Towards evolving sensor actor networks

Sensor Actor NETworks (SANET) represent a major component of ubiquitous service environments promising interesting solutions to a wide range of problems. Despite the obvious increase in the research activities proposing architectures and protocols for SANETs, we are still no where near the production of industrial-grade SANET software that can be relied upon for mission critical applications. The cost of programming, deploying and maintaining SANET environments is still highly prohibitive due to the lack of industrial tools capable of realizing adaptive SANET software in a cost effective way

Energy and Water
Circuit Theory and Applications
Software and Communications
Agriculture and Crops

Multiuser MIMO relaying under quality of service constraints

We consider a wireless communication scenario with K source-destination pairs communicating through several half-duplex amplify-and-forward relays. We design the relay beamforming matrices by minimizing the total power transmitted from all the relays subject to quality of service constraints on the received signal to interference-plus-noise ratio at each destination node. We propose a novel method for solving the resulting nonconvex optimization problem in which the problem is decomposed into a group of second-order cone programs (SOCPs) parameterized by K real parameters. Grid search or

Software and Communications
Innovation, Entrepreneurship and Competitiveness

New achievable secrecy rate regions for the two way wiretap channel

This work develops new achievable rate regions for the two way wiretap channel. In our setup, Alice and Bob wish to exchange messages securely in the presence of a passive eavesdropper Eve. In the full-duplex scenario, our achievability argument relies on allowing the two users to jointly optimize their channel prefixing distributions, such that the new channel conditions are favorable compared to that of Eve. Random binning and private key sharing over the channel are then used to exploit the secrecy advantage available in the equivalent cascade channel and to distribute the available secrecy

Software and Communications
Innovation, Entrepreneurship and Competitiveness

Reliability and Security Analysis of an Entanglement-Based QKD Protocol in a Dynamic Ground-to-UAV FSO Communications System

Quantum cryptography is a promising technology that achieves unconditional security, which is essential to a wide range of sensitive applications. In contrast to optical fiber, the free-space optical (FSO) link is efficiently used as a quantum channel without affecting the polarization of transmitted photons. However, the FSO link has several impairments, such as atmospheric turbulence and pointing errors, which affect the performance of the quantum channel. This paper proposes a quantum key distribution (QKD) scheme that uses a time-bin entanglement protocol over the FSO channel that suffers

Circuit Theory and Applications
Software and Communications