-
Secured and Cooperative Publish/Subscribe Scheme in Autonomous Vehicular Networks
Authors:
Yuntao Wang,
Zhou Su,
Qichao Xu,
Tom H. Luan,
Rongxing Lu
Abstract:
In order to save computing power yet enhance safety, there is a strong intention for autonomous vehicles (AVs) in future to drive collaboratively by sharing sensory data and computing results among neighbors. However, the intense collaborative computing and data transmissions among unknown others will inevitably introduce severe security concerns. Aiming at addressing security concerns in future A…
▽ More
In order to save computing power yet enhance safety, there is a strong intention for autonomous vehicles (AVs) in future to drive collaboratively by sharing sensory data and computing results among neighbors. However, the intense collaborative computing and data transmissions among unknown others will inevitably introduce severe security concerns. Aiming at addressing security concerns in future AVs, in this paper, we develop SPAD, a secured framework to forbid free-riders and {promote trustworthy data dissemination} in collaborative autonomous driving. Specifically, we first introduce a publish/subscribe framework for inter-vehicle data transmissions{. To defend against free-riding attacks,} we formulate the interactions between publisher AVs and subscriber AVs as a vehicular publish/subscribe game, {and incentivize AVs to deliver high-quality data by analyzing the Stackelberg equilibrium of the game. We also design a reputation evaluation mechanism in the game} to identify malicious AVs {in disseminating fake information}. {Furthermore, for} lack of sufficient knowledge on parameters of {the} network model and user cost model {in dynamic game scenarios}, a two-tier reinforcement learning based algorithm with hotbooting is developed to obtain the optimal {strategies of subscriber AVs and publisher AVs with free-rider prevention}. Extensive simulations are conducted, and the results validate that our SPAD can effectively {prevent free-riders and enhance the dependability of disseminated contents,} compared with conventional schemes.
△ Less
Submitted 28 April, 2023; v1 submitted 18 April, 2023;
originally announced April 2023.
-
Search for bosonic super-weakly interacting massive particles at COSINE-100
Authors:
G. Adhikari,
N. Carlin,
J. J. Choi,
S. Choi,
A. C. Ezeribe,
L. E. Franca,
C. Ha,
I. S. Hahn,
S. J. Hollick,
E. J. Jeon,
J. H. Jo,
H. W. Joo,
W. G. Kang,
M. Kauer,
B. H. Kim,
H. J. Kim,
J. Kim,
K. W. Kim,
S. H. Kim,
S. K. Kim,
W. K. Kim,
Y. D. Kim,
Y. H. Kim,
Y. J. Ko,
D. H. Lee
, et al. (34 additional authors not shown)
Abstract:
We present results of a search for bosonic super-weakly interacting massive particles (BSW) as keV scale dark matter candidates that is based on an exposure of 97.7 kg$\cdot$year from the COSINE experiment. In this search, we employ, for the first time, Compton-like as well as absorption processes for pseudoscalar and vector BSWs. No evidence for BSWs is found in the mass range from 10…
▽ More
We present results of a search for bosonic super-weakly interacting massive particles (BSW) as keV scale dark matter candidates that is based on an exposure of 97.7 kg$\cdot$year from the COSINE experiment. In this search, we employ, for the first time, Compton-like as well as absorption processes for pseudoscalar and vector BSWs. No evidence for BSWs is found in the mass range from 10 $\mathrm{keV/c}^2$ to 1 $\mathrm{MeV/c}^2$, and we present the exclusion limits on the dimensionless coupling constants to electrons $g_{ae}$ for pseudoscalar and $κ$ for vector BSWs at 90% confidence level. Our results show that these limits are improved by including the Compton-like process in masses of BSW, above $\mathcal{O}(100\,\mathrm{keV/c}^2)$.
△ Less
Submitted 27 August, 2023; v1 submitted 3 April, 2023;
originally announced April 2023.
-
From Wide to Deep: Dimension Lifting Network for Parameter-efficient Knowledge Graph Embedding
Authors:
Borui Cai,
Yong Xiang,
Longxiang Gao,
Di Wu,
He Zhang,
Jiong Jin,
Tom Luan
Abstract:
Knowledge graph embedding (KGE) that maps entities and relations into vector representations is essential for downstream applications. Conventional KGE methods require high-dimensional representations to learn the complex structure of knowledge graph, but lead to oversized model parameters. Recent advances reduce parameters by low-dimensional entity representations, while developing techniques (e.…
▽ More
Knowledge graph embedding (KGE) that maps entities and relations into vector representations is essential for downstream applications. Conventional KGE methods require high-dimensional representations to learn the complex structure of knowledge graph, but lead to oversized model parameters. Recent advances reduce parameters by low-dimensional entity representations, while developing techniques (e.g., knowledge distillation or reinvented representation forms) to compensate for reduced dimension. However, such operations introduce complicated computations and model designs that may not benefit large knowledge graphs. To seek a simple strategy to improve the parameter efficiency of conventional KGE models, we take inspiration from that deeper neural networks require exponentially fewer parameters to achieve expressiveness comparable to wider networks for compositional structures. We view all entity representations as a single-layer embedding network, and conventional KGE methods that adopt high-dimensional entity representations equal widening the embedding network to gain expressiveness. To achieve parameter efficiency, we instead propose a deeper embedding network for entity representations, i.e., a narrow entity embedding layer plus a multi-layer dimension lifting network (LiftNet). Experiments on three public datasets show that by integrating LiftNet, four conventional KGE methods with 16-dimensional representations achieve comparable link prediction accuracy as original models that adopt 512-dimensional representations, saving 68.4% to 96.9% parameters.
△ Less
Submitted 1 September, 2024; v1 submitted 22 March, 2023;
originally announced March 2023.
-
Search for solar bosonic dark matter annual modulation with COSINE-100
Authors:
G. Adhikari,
N. Carlin,
J. J. Choi,
S. Choi,
A. C. Ezeribe,
L. E. França,
C. Ha,
I. S. Hahn,
S. J. Hollick,
E. J. Jeon,
J. H. Jo,
H. W. Joo,
W. G. Kang,
M. Kauer,
B. H. Kim,
H. J. Kim,
J. Kim,
K. W. Kim,
S. H. Kim,
S. K. Kim,
W. K. Kim,
Y. D. Kim,
Y. H. Kim,
Y. J. Ko,
D. H. Lee
, et al. (34 additional authors not shown)
Abstract:
We present results from a search for solar bosonic dark matter using the annual modulation method with the COSINE-100 experiment. The results were interpreted considering three dark sector bosons models: solar dark photon; DFSZ and KSVZ solar axion; and Kaluza-Klein solar axion. No modulation signal that is compatible with the expected from the models was found from a data-set of 2.82 yr, using 61…
▽ More
We present results from a search for solar bosonic dark matter using the annual modulation method with the COSINE-100 experiment. The results were interpreted considering three dark sector bosons models: solar dark photon; DFSZ and KSVZ solar axion; and Kaluza-Klein solar axion. No modulation signal that is compatible with the expected from the models was found from a data-set of 2.82 yr, using 61.3 kg of NaI(Tl) crystals. Therefore, we set a 90$\%$ confidence level upper limits for each of the three models studied. For the solar dark photon model, the most stringent mixing parameter upper limit is $1.61 \times 10^{-14}$ for dark photons with a mass of 215 eV. For the DFSZ and KSVZ solar axion, and the Kaluza-Klein axion models, the upper limits exclude axion-electron couplings, $g_{ae}$, above $1.61 \times 10^{-11}$ for axion mass below 0.2 keV; and axion-photon couplings, $g_{aγγ}$, above $1.83 \times 10^{-11}$ GeV$^{-1}$ for an axion number density of $4.07 \times 10^{13}$ cm$^{-3}$. This is the first experimental search for solar dark photons and DFSZ and KSVZ solar axions using the annual modulation method. The lower background, higher light yield and reduced threshold of NaI(Tl) crystals of the future COSINE-200 experiment are expected to enhance the sensitivity of the analysis shown in this paper. We show the sensitivities for the three models studied, considering the same search method with COSINE-200.
△ Less
Submitted 20 February, 2023;
originally announced February 2023.
-
A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects
Authors:
Yuntao Wang,
Zhou Su,
Shaolong Guo,
Minghui Dai,
Tom H. Luan,
Yiliang Liu
Abstract:
By interacting, synchronizing, and cooperating with its physical counterpart in real time, digital twin is promised to promote an intelligent, predictive, and optimized modern city. Via interconnecting massive physical entities and their virtual twins with inter-twin and intra-twin communications, the Internet of digital twins (IoDT) enables free data exchange, dynamic mission cooperation, and eff…
▽ More
By interacting, synchronizing, and cooperating with its physical counterpart in real time, digital twin is promised to promote an intelligent, predictive, and optimized modern city. Via interconnecting massive physical entities and their virtual twins with inter-twin and intra-twin communications, the Internet of digital twins (IoDT) enables free data exchange, dynamic mission cooperation, and efficient information aggregation for composite insights across vast physical/virtual entities. However, as IoDT incorporates various cutting-edge technologies to spawn the new ecology, severe known/unknown security flaws and privacy invasions of IoDT hinders its wide deployment. Besides, the intrinsic characteristics of IoDT such as \emph{decentralized structure}, \emph{information-centric routing} and \emph{semantic communications} entail critical challenges for security service provisioning in IoDT. To this end, this paper presents an in-depth review of the IoDT with respect to system architecture, enabling technologies, and security/privacy issues. Specifically, we first explore a novel distributed IoDT architecture with cyber-physical interactions and discuss its key characteristics and communication modes. Afterward, we investigate the taxonomy of security and privacy threats in IoDT, discuss the key research challenges, and review the state-of-the-art defense approaches. Finally, we point out the new trends and open research directions related to IoDT.
△ Less
Submitted 30 January, 2023;
originally announced January 2023.
-
Trade Privacy for Utility: A Learning-Based Privacy Pricing Game in Federated Learning
Authors:
Yuntao Wang,
Zhou Su,
Yanghe Pan,
Abderrahim Benslimane,
Yiliang Liu,
Tom H. Luan,
Ruidong Li
Abstract:
To prevent implicit privacy disclosure in sharing gradients among data owners (DOs) under federated learning (FL), differential privacy (DP) and its variants have become a common practice to offer formal privacy guarantees with low overheads. However, individual DOs generally tend to inject larger DP noises for stronger privacy provisions (which entails severe degradation of model utility), while…
▽ More
To prevent implicit privacy disclosure in sharing gradients among data owners (DOs) under federated learning (FL), differential privacy (DP) and its variants have become a common practice to offer formal privacy guarantees with low overheads. However, individual DOs generally tend to inject larger DP noises for stronger privacy provisions (which entails severe degradation of model utility), while the curator (i.e., aggregation server) aims to minimize the overall effect of added random noises for satisfactory model performance. To address this conflicting goal, we propose a novel dynamic privacy pricing (DyPP) game which allows DOs to sell individual privacy (by lowering the scale of locally added DP noise) for differentiated economic compensations (offered by the curator), thereby enhancing FL model utility. Considering multi-dimensional information asymmetry among players (e.g., DO's data distribution and privacy preference, and curator's maximum affordable payment) as well as their varying private information in distinct FL tasks, it is hard to directly attain the Nash equilibrium of the mixed-strategy DyPP game. Alternatively, we devise a fast reinforcement learning algorithm with two layers to quickly learn the optimal mixed noise-saving strategy of DOs and the optimal mixed pricing strategy of the curator without prior knowledge of players' private information. Experiments on real datasets validate the feasibility and effectiveness of the proposed scheme in terms of faster convergence speed and enhanced FL model utility with lower payment costs.
△ Less
Submitted 14 February, 2023; v1 submitted 20 January, 2023;
originally announced January 2023.
-
Social-Aware Clustered Federated Learning with Customized Privacy Preservation
Authors:
Yuntao Wang,
Zhou Su,
Yanghe Pan,
Tom H Luan,
Ruidong Li,
Shui Yu
Abstract:
A key feature of federated learning (FL) is to preserve the data privacy of end users. However, there still exist potential privacy leakage in exchanging gradients under FL. As a result, recent research often explores the differential privacy (DP) approaches to add noises to the computing results to address privacy concerns with low overheads, which however degrade the model performance. In this p…
▽ More
A key feature of federated learning (FL) is to preserve the data privacy of end users. However, there still exist potential privacy leakage in exchanging gradients under FL. As a result, recent research often explores the differential privacy (DP) approaches to add noises to the computing results to address privacy concerns with low overheads, which however degrade the model performance. In this paper, we strike the balance of data privacy and efficiency by utilizing the pervasive social connections between users. Specifically, we propose SCFL, a novel Social-aware Clustered Federated Learning scheme, where mutually trusted individuals can freely form a social cluster and aggregate their raw model updates (e.g., gradients) inside each cluster before uploading to the cloud for global aggregation. By mixing model updates in a social group, adversaries can only eavesdrop the social-layer combined results, but not the privacy of individuals. We unfold the design of SCFL in three steps.i) Stable social cluster formation. Considering users' heterogeneous training samples and data distributions, we formulate the optimal social cluster formation problem as a federation game and devise a fair revenue allocation mechanism to resist free-riders. ii) Differentiated trust-privacy mapping}. For the clusters with low mutual trust, we design a customizable privacy preservation mechanism to adaptively sanitize participants' model updates depending on social trust degrees. iii) Distributed convergence}. A distributed two-sided matching algorithm is devised to attain an optimized disjoint partition with Nash-stable convergence. Experiments on Facebook network and MNIST/CIFAR-10 datasets validate that our SCFL can effectively enhance learning utility, improve user payoff, and enforce customizable privacy protection.
△ Less
Submitted 19 March, 2024; v1 submitted 25 December, 2022;
originally announced December 2022.
-
A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue
Authors:
Yuntao Wang,
Zhou Su,
Qichao Xu,
Ruidong Li,
Tom H. Luan,
Pinghui Wang
Abstract:
Unmanned aerial vehicles (UAVs) have the potential to establish flexible and reliable emergency networks in disaster sites when terrestrial communication infrastructures go down. Nevertheless, potential security threats may occur on UAVs during data transmissions due to the untrusted environment and open-access UAV networks. Moreover, UAVs typically have limited battery and computation capacity, m…
▽ More
Unmanned aerial vehicles (UAVs) have the potential to establish flexible and reliable emergency networks in disaster sites when terrestrial communication infrastructures go down. Nevertheless, potential security threats may occur on UAVs during data transmissions due to the untrusted environment and open-access UAV networks. Moreover, UAVs typically have limited battery and computation capacity, making them unaffordable for heavy security provisioning operations when performing complicated rescue tasks. In this paper, we develop RescueChain, a secure and efficient information sharing scheme for UAV-assisted disaster rescue. Specifically, we first implement a lightweight blockchain-based framework to safeguard data sharing under disasters and immutably trace misbehaving entities. A reputation-based consensus protocol is devised to adapt the weakly connected environment with improved consensus efficiency and promoted UAVs' honest behaviors. Furthermore, we introduce a novel vehicular fog computing (VFC)-based off-chain mechanism by leveraging ground vehicles as moving fog nodes to offload UAVs' heavy data processing and storage tasks. To offload computational tasks from the UAVs to ground vehicles having idle computing resources, an optimal allocation strategy is developed by choosing payoffs that achieve equilibrium in a Stackelberg game formulation of the allocation problem. For lack of sufficient knowledge on network model parameters and users' private cost parameters in practical environment, we also design a two-tier deep reinforcement learning-based algorithm to seek the optimal payment and resource strategies of UAVs and vehicles with improved learning efficiency. Simulation results show that RescueChain can effectively accelerate consensus process, improve offloading efficiency, reduce energy consumption, and enhance user payoffs.
△ Less
Submitted 23 November, 2022;
originally announced November 2022.
-
A Platform-Free Proof of Federated Learning Consensus Mechanism for Sustainable Blockchains
Authors:
Yuntao Wang,
Haixia Peng,
Zhou Su,
Tom H Luan,
Abderrahim Benslimane,
Yuan Wu
Abstract:
Proof of work (PoW), as the representative consensus protocol for blockchain, consumes enormous amounts of computation and energy to determine bookkeeping rights among miners but does not achieve any practical purposes. To address the drawback of PoW, we propose a novel energy-recycling consensus mechanism named platform-free proof of federated learning (PF-PoFL), which leverages the computing pow…
▽ More
Proof of work (PoW), as the representative consensus protocol for blockchain, consumes enormous amounts of computation and energy to determine bookkeeping rights among miners but does not achieve any practical purposes. To address the drawback of PoW, we propose a novel energy-recycling consensus mechanism named platform-free proof of federated learning (PF-PoFL), which leverages the computing power originally wasted in solving hard but meaningless PoW puzzles to conduct practical federated learning (FL) tasks. Nevertheless, potential security threats and efficiency concerns may occur due to the untrusted environment and miners' self-interested features. In this paper, by devising a novel block structure, new transaction types, and credit-based incentives, PF-PoFL allows efficient artificial intelligence (AI) task outsourcing, federated mining, model evaluation, and reward distribution in a fully decentralized manner, while resisting spoofing and Sybil attacks. Besides, PF-PoFL equips with a user-level differential privacy mechanism for miners to prevent implicit privacy leakage in training FL models. Furthermore, by considering dynamic miner characteristics (e.g., training samples, non-IID degree, and network delay) under diverse FL tasks, a federation formation game-based mechanism is presented to distributively form the optimized disjoint miner partition structure with Nash-stable convergence. Extensive simulations validate the efficiency and effectiveness of PF-PoFL.
△ Less
Submitted 29 October, 2022; v1 submitted 23 August, 2022;
originally announced August 2022.
-
An Efficient and Reliable Asynchronous Federated Learning Scheme for Smart Public Transportation
Authors:
Chenhao Xu,
Youyang Qu,
Tom H. Luan,
Peter W. Eklund,
Yong Xiang,
Longxiang Gao
Abstract:
Since the traffic conditions change over time, machine learning models that predict traffic flows must be updated continuously and efficiently in smart public transportation. Federated learning (FL) is a distributed machine learning scheme that allows buses to receive model updates without waiting for model training on the cloud. However, FL is vulnerable to poisoning or DDoS attacks since buses t…
▽ More
Since the traffic conditions change over time, machine learning models that predict traffic flows must be updated continuously and efficiently in smart public transportation. Federated learning (FL) is a distributed machine learning scheme that allows buses to receive model updates without waiting for model training on the cloud. However, FL is vulnerable to poisoning or DDoS attacks since buses travel in public. Some work introduces blockchain to improve reliability, but the additional latency from the consensus process reduces the efficiency of FL. Asynchronous Federated Learning (AFL) is a scheme that reduces the latency of aggregation to improve efficiency, but the learning performance is unstable due to unreasonably weighted local models. To address the above challenges, this paper offers a blockchain-based asynchronous federated learning scheme with a dynamic scaling factor (DBAFL). Specifically, the novel committee-based consensus algorithm for blockchain improves reliability at the lowest possible cost of time. Meanwhile, the devised dynamic scaling factor allows AFL to assign reasonable weights to stale local models. Extensive experiments conducted on heterogeneous devices validate outperformed learning performance, efficiency, and reliability of DBAFL.
△ Less
Submitted 26 December, 2022; v1 submitted 15 August, 2022;
originally announced August 2022.
-
Digital Twin-Assisted Efficient Reinforcement Learning for Edge Task Scheduling
Authors:
Xiucheng Wang,
Longfei Ma,
Haocheng Li,
Zhisheng Yin,
Tom. Luan,
Nan Cheng
Abstract:
Task scheduling is a critical problem when one user offloads multiple different tasks to the edge server. When a user has multiple tasks to offload and only one task can be transmitted to server at a time, while server processes tasks according to the transmission order, the problem is NP-hard. However, it is difficult for traditional optimization methods to quickly obtain the optimal solution, wh…
▽ More
Task scheduling is a critical problem when one user offloads multiple different tasks to the edge server. When a user has multiple tasks to offload and only one task can be transmitted to server at a time, while server processes tasks according to the transmission order, the problem is NP-hard. However, it is difficult for traditional optimization methods to quickly obtain the optimal solution, while approaches based on reinforcement learning face with the challenge of excessively large action space and slow convergence. In this paper, we propose a Digital Twin (DT)-assisted RL-based task scheduling method in order to improve the performance and convergence of the RL. We use DT to simulate the results of different decisions made by the agent, so that one agent can try multiple actions at a time, or, similarly, multiple agents can interact with environment in parallel in DT. In this way, the exploration efficiency of RL can be significantly improved via DT, and thus RL can converges faster and local optimality is less likely to happen. Particularly, two algorithms are designed to made task scheduling decisions, i.e., DT-assisted asynchronous Q-learning (DTAQL) and DT-assisted exploring Q-learning (DTEQL). Simulation results show that both algorithms significantly improve the convergence speed of Q-learning by increasing the exploration efficiency.
△ Less
Submitted 2 August, 2022;
originally announced August 2022.
-
Green Interference Based Symbiotic Security in Integrated Satellite-terrestrial Communications
Authors:
Zhisheng Yin,
Nan Cheng,
Tom H. Luan,
Yilong Hui,
Wei Wang
Abstract:
In this paper, we investigate secure transmissions in integrated satellite-terrestrial communications and the green interference based symbiotic security scheme is proposed. Particularly, the co-channel interference induced by the spectrum sharing between satellite and terrestrial networks and the inter-beam interference due to frequency reuse among satellite multi-beam serve as the green interfer…
▽ More
In this paper, we investigate secure transmissions in integrated satellite-terrestrial communications and the green interference based symbiotic security scheme is proposed. Particularly, the co-channel interference induced by the spectrum sharing between satellite and terrestrial networks and the inter-beam interference due to frequency reuse among satellite multi-beam serve as the green interference to assist the symbiotic secure transmission, where the secure transmissions of both satellite and terrestrial links are guaranteed simultaneously. Specifically, to realize the symbiotic security, we formulate a problem to maximize the sum secrecy rate of satellite users by cooperatively beamforming optimizing and a constraint of secrecy rate of each terrestrial user is guaranteed. Since the formulated problem is non-convex and intractable, the Taylor expansion and semi-definite relaxation (SDR) are adopted to further reformulate this problem, and the successive convex approximation (SCA) algorithm is designed to solve it. Finally, the tightness of the relaxation is proved. In addition, numerical results verify the efficiency of our proposed approach.
△ Less
Submitted 6 June, 2022;
originally announced June 2022.
-
Cybertwin-enabled 6G Space-air-ground Integrated Networks: Architecture, Open Issue, and Challenges
Authors:
Zhisheng Yin,
Tom H. Luan,
Nan Cheng,
Yilong Hui,
Wei Wang
Abstract:
Space-air-ground integrated network (SAGIN) is considered as a core requirement in emerging 6G networks, which integrates the terrestrial and non-terrestrial networks to reach the full network coverage and ubiquitous services. To envision the ubiquitous intelligence and the deep integration in 6G SAGIN, a paradigm of cybertwin-enabled 6G SAGIN is presented in this paper. Specifically, a cybertwin-…
▽ More
Space-air-ground integrated network (SAGIN) is considered as a core requirement in emerging 6G networks, which integrates the terrestrial and non-terrestrial networks to reach the full network coverage and ubiquitous services. To envision the ubiquitous intelligence and the deep integration in 6G SAGIN, a paradigm of cybertwin-enabled 6G SAGIN is presented in this paper. Specifically, a cybertwin-enabled SAGIN architecture is first presented, where a novel five-dimension digital twin (DT) model is presented. Particularly, three categories of critical technologies are presented based on the cybertwin of SAGIN, i.e., cybertwin-based multi-source heterogeneous network integration, cybertwin-based integrated cloud-edge-end, and cybertwin-based integrated sensing-communication-computing. Besides, two open issues in the cybertwin-enabled SAGIN are studied, i.e., the networking decision and optimization and the cybertwin-enabled cross-layer privacy and security, where the challenges are discussed and the potential solutions are directed. In addition, a case study with federal learning is developed and open research issues are discussed.
△ Less
Submitted 26 April, 2022;
originally announced April 2022.
-
Collaborative Driving: Learning- Aided Joint Topology Formulation and Beamforming
Authors:
Yao Zhang,
Changle Li,
Tom H. Luan,
Chau Yuen Yuchuan Fu
Abstract:
Currently, autonomous vehicles are able to drive more naturally based on the driving policies learned from millions of driving miles in real environments. However, to further improve the automation level of vehicles is a challenging task, especially in the case of multi-vehicle cooperation. In recent heated discussions of 6G, millimeter-wave (mmWave) and terahertz (THz) bands are deemed to play im…
▽ More
Currently, autonomous vehicles are able to drive more naturally based on the driving policies learned from millions of driving miles in real environments. However, to further improve the automation level of vehicles is a challenging task, especially in the case of multi-vehicle cooperation. In recent heated discussions of 6G, millimeter-wave (mmWave) and terahertz (THz) bands are deemed to play important roles in new radio communication architectures and algorithms. To enable reliable autonomous driving in 6G, in this paper, we envision collaborative autonomous driving, a new framework that jointly controls driving topology and formulate vehicular networks in the mmWave/THz bands. As a swarm intelligence system, the collaborative driving scheme goes beyond existing autonomous driving patterns based on single-vehicle intelligence in terms of safety and efficiency. With efficient data sharing, the proposed framework is able to achieve cooperative sensing and load balancing so that improve sensing efficiency with saved computational resources. To deal with the new challenges in the collaborative driving framework, we further illustrate two promising approaches for mmWave/THz-based vehicle-to-vehicle (V2V) communications. Finally, we discuss several potential open research problems for the proposed collaborative driving scheme.
△ Less
Submitted 18 March, 2022;
originally announced March 2022.
-
A Survey on Metaverse: Fundamentals, Security, and Privacy
Authors:
Yuntao Wang,
Zhou Su,
Ning Zhang,
Rui Xing,
Dongxiao Liu,
Tom H. Luan,
Xuemin Shen
Abstract:
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize. Driven by recent advances in emerging technologies such as extended reality, artificial intelligence, and blockchain, metaverse is stepping from science fiction to an upcoming reality. However, s…
▽ More
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize. Driven by recent advances in emerging technologies such as extended reality, artificial intelligence, and blockchain, metaverse is stepping from science fiction to an upcoming reality. However, severe privacy invasions and security breaches (inherited from underlying technologies or emerged in the new digital ecology) of metaverse can impede its wide deployment. At the same time, a series of fundamental challenges (e.g., scalability and interoperability) can arise in metaverse security provisioning owing to the intrinsic characteristics of metaverse, such as immersive realism, hyper spatiotemporality, sustainability, and heterogeneity. In this paper, we present a comprehensive survey of the fundamentals, security, and privacy of metaverse. Specifically, we first investigate a novel distributed metaverse architecture and its key characteristics with ternary-world interactions. Then, we discuss the security and privacy threats, present the critical challenges of metaverse systems, and review the state-of-the-art countermeasures. Finally, we draw open research directions for building future metaverse systems.
△ Less
Submitted 8 September, 2022; v1 submitted 5 March, 2022;
originally announced March 2022.
-
Learning Based Task Offloading in Digital Twin Empowered Internet of Vehicles
Authors:
Jinkai Zheng,
Tom H. Luan,
Longxiang Gao,
Yao Zhang,
Yuan Wu
Abstract:
Mobile edge computing has become an effective and fundamental paradigm for futuristic autonomous vehicles to offload computing tasks. However, due to the high mobility of vehicles, the dynamics of the wireless conditions, and the uncertainty of the arrival computing tasks, it is difficult for a single vehicle to determine the optimal offloading strategy. In this paper, we propose a Digital Twin (D…
▽ More
Mobile edge computing has become an effective and fundamental paradigm for futuristic autonomous vehicles to offload computing tasks. However, due to the high mobility of vehicles, the dynamics of the wireless conditions, and the uncertainty of the arrival computing tasks, it is difficult for a single vehicle to determine the optimal offloading strategy. In this paper, we propose a Digital Twin (DT) empowered task offloading framework for Internet of Vehicles. As a software agent residing in the cloud, a DT can obtain both global network information by using communications among DTs, and historical information of a vehicle by using the communications within the twin. The global network information and historical vehicular information can significantly facilitate the offloading. In specific, to preserve the precious computing resource at different levels for most appropriate computing tasks, we integrate a learning scheme based on the prediction of futuristic computing tasks in DT. Accordingly, we model the offloading scheduling process as a Markov Decision Process (MDP) to minimize the long-term cost in terms of a trade off between task latency, energy consumption, and renting cost of clouds. Simulation results demonstrate that our algorithm can effectively find the optimal offloading strategy, as well as achieve the fast convergence speed and high performance, compared with other existing approaches.
△ Less
Submitted 28 December, 2021;
originally announced January 2022.
-
Autonomous Vehicular Networks: Perspective and Open Issues
Authors:
Tom H. Luan,
Yao Zhang,
Lin Cai,
Yilong Hui,
Changle Li,
Nan Cheng
Abstract:
The vehicular ad hoc networks (VANETs) have been researched for over twenty years. Although being a fundamental communication approach for vehicles, the conventional VANETs are challenged by the newly emerged autonomous vehicles (AVs) which introduce new features and challenges on communications. In the meantime, with the recent advances of artificial intelligence and 5G cellular networks, how sho…
▽ More
The vehicular ad hoc networks (VANETs) have been researched for over twenty years. Although being a fundamental communication approach for vehicles, the conventional VANETs are challenged by the newly emerged autonomous vehicles (AVs) which introduce new features and challenges on communications. In the meantime, with the recent advances of artificial intelligence and 5G cellular networks, how should the fundamental framework of VANET evolve to utilize the new technologies? In this article, we reconsider the problem of vehicle-to-vehicle communications when the network is composed of AVs. We discuss the features and specific demands of AVs and how the conventional VANETs should adapt to fit them.
△ Less
Submitted 2 December, 2021;
originally announced December 2021.
-
Learning Dynamical Human-Joint Affinity for 3D Pose Estimation in Videos
Authors:
Junhao Zhang,
Yali Wang,
Zhipeng Zhou,
Tianyu Luan,
Zhe Wang,
Yu Qiao
Abstract:
Graph Convolution Network (GCN) has been successfully used for 3D human pose estimation in videos. However, it is often built on the fixed human-joint affinity, according to human skeleton. This may reduce adaptation capacity of GCN to tackle complex spatio-temporal pose variations in videos. To alleviate this problem, we propose a novel Dynamical Graph Network (DG-Net), which can dynamically iden…
▽ More
Graph Convolution Network (GCN) has been successfully used for 3D human pose estimation in videos. However, it is often built on the fixed human-joint affinity, according to human skeleton. This may reduce adaptation capacity of GCN to tackle complex spatio-temporal pose variations in videos. To alleviate this problem, we propose a novel Dynamical Graph Network (DG-Net), which can dynamically identify human-joint affinity, and estimate 3D pose by adaptively learning spatial/temporal joint relations from videos. Different from traditional graph convolution, we introduce Dynamical Spatial/Temporal Graph convolution (DSG/DTG) to discover spatial/temporal human-joint affinity for each video exemplar, depending on spatial distance/temporal movement similarity between human joints in this video. Hence, they can effectively understand which joints are spatially closer and/or have consistent motion, for reducing depth ambiguity and/or motion uncertainty when lifting 2D pose to 3D pose. We conduct extensive experiments on three popular benchmarks, e.g., Human3.6M, HumanEva-I, and MPI-INF-3DHP, where DG-Net outperforms a number of recent SOTA approaches with fewer input frames and model size.
△ Less
Submitted 15 September, 2021;
originally announced September 2021.
-
Multirate Exponential Rosenbrock Methods
Authors:
Vu Thai Luan,
Rujeko Chinomona,
Daniel R. Reynolds
Abstract:
In this paper we propose a novel class of methods for high order accurate integration of multirate systems of ordinary differential equation initial-value problems. The proposed methods construct multirate schemes by approximating the action of matrix $\varphi$-functions within explicit exponential Rosenbrock (ExpRB) methods, thereby called Multirate Exponential Rosenbrock (MERB) methods. They con…
▽ More
In this paper we propose a novel class of methods for high order accurate integration of multirate systems of ordinary differential equation initial-value problems. The proposed methods construct multirate schemes by approximating the action of matrix $\varphi$-functions within explicit exponential Rosenbrock (ExpRB) methods, thereby called Multirate Exponential Rosenbrock (MERB) methods. They consist of the solution to a sequence of modified "fast" initial-value problems, that may themselves be approximated through subcycling any desired IVP solver. In addition to proving how to construct MERB methods from certain classes of ExpRB methods, we provide rigorous convergence analysis of these methods and derive efficient MERB schemes of orders two through six (the highest order ever constructed infinitesimal multirate methods). We then present numerical simulations to confirm these theoretical convergence rates, and to compare the efficiency of MERB methods against other recently-introduced high order multirate methods.
△ Less
Submitted 25 July, 2021; v1 submitted 9 June, 2021;
originally announced June 2021.
-
Futuristic Intelligent Transportation System
Authors:
Yilong Hui,
Zhou Su,
Tom H. Luan,
Nan Cheng
Abstract:
The emerging autonomous vehicles (AVs) will inevitably revolutionize the transportation systems. This is because of a key feature of AVs; instead of being managed by human drivers as the conventional vehicles, AVs are of the complete capability to manage the driving by themselves. As a result, the futuristic intelligent transportation system (FITS) can be a centrally managed and optimized system w…
▽ More
The emerging autonomous vehicles (AVs) will inevitably revolutionize the transportation systems. This is because of a key feature of AVs; instead of being managed by human drivers as the conventional vehicles, AVs are of the complete capability to manage the driving by themselves. As a result, the futuristic intelligent transportation system (FITS) can be a centrally managed and optimized system with the fully coordinated driving of vehicles, which is impossible by the current transportation systems controlled by humans. In this article, we envision the operation of such FITS when AVs, advanced vehicular networks (VANETs) and artificial intelligence (AI) are adopted. Specifically, we first develop the autonomous vehicular networks (AVNs) based on the advanced development of AVs and heterogeneous vehicular communication technologies to achieve global data collection and real-time data sharing. With this network architecture, we then integrate AVNs and AI based on the intelligent digital twin (IDT) to design the FITS with the target of setting up an accurate and efficient global traffic scheduling system. After that, compared with the conventional schemes, a customized path planning case is studied to evaluate the performance of the proposed FITS. Finally, we highlight the emerging issues related to the FITS for future research.
△ Less
Submitted 19 May, 2021;
originally announced May 2021.
-
The Paradigm of Digital Twin Communications
Authors:
Tom H. Luan,
Ruhan Liu,
Longxiang Gao,
Rui Li,
Haibo Zhou
Abstract:
With the fast evolving of cloud computing and artificial intelligence (AI), the concept of digital twin (DT) has recently been proposed and finds broad applications in industrial Internet, IoT, smart city, etc. The DT builds a mirror integrated multi-physics of the physical system in the digital space. By doing so, the DT can utilize the rich computing power and AI at the cloud to operate on the m…
▽ More
With the fast evolving of cloud computing and artificial intelligence (AI), the concept of digital twin (DT) has recently been proposed and finds broad applications in industrial Internet, IoT, smart city, etc. The DT builds a mirror integrated multi-physics of the physical system in the digital space. By doing so, the DT can utilize the rich computing power and AI at the cloud to operate on the mirror physical system, and accordingly provides feedbacks to help the real-world physical system in their practical task completion. The existing literature mainly considers DT as a simulation/emulation approach, whereas the communication framework for DT has not been clearly defined and discussed. In this article, we describe the basic DT communication models and present the open research issues. By combining wireless communications, artificial intelligence (AI) and cloud computing, we show that the DT communication provides a novel framework for futuristic mobile agent systems.
△ Less
Submitted 15 May, 2021;
originally announced May 2021.
-
PC-HMR: Pose Calibration for 3D Human Mesh Recovery from 2D Images/Videos
Authors:
Tianyu Luan,
Yali Wang,
Junhao Zhang,
Zhe Wang,
Zhipeng Zhou,
Yu Qiao
Abstract:
The end-to-end Human Mesh Recovery (HMR) approach has been successfully used for 3D body reconstruction. However, most HMR-based frameworks reconstruct human body by directly learning mesh parameters from images or videos, while lacking explicit guidance of 3D human pose in visual data. As a result, the generated mesh often exhibits incorrect pose for complex activities. To tackle this problem, we…
▽ More
The end-to-end Human Mesh Recovery (HMR) approach has been successfully used for 3D body reconstruction. However, most HMR-based frameworks reconstruct human body by directly learning mesh parameters from images or videos, while lacking explicit guidance of 3D human pose in visual data. As a result, the generated mesh often exhibits incorrect pose for complex activities. To tackle this problem, we propose to exploit 3D pose to calibrate human mesh. Specifically, we develop two novel Pose Calibration frameworks, i.e., Serial PC-HMR and Parallel PC-HMR. By coupling advanced 3D pose estimators and HMR in a serial or parallel manner, these two frameworks can effectively correct human mesh with guidance of a concise pose calibration module. Furthermore, since the calibration module is designed via non-rigid pose transformation, our PC-HMR frameworks can flexibly tackle bone length variations to alleviate misplacement in the calibrated mesh. Finally, our frameworks are based on generic and complementary integration of data-driven learning and geometrical modeling. Via plug-and-play modules, they can be efficiently adapted for both image/video-based human mesh recovery. Additionally, they have no requirement of extra 3D pose annotations in the testing phase, which releases inference difficulties in practice. We perform extensive experiments on the popular bench-marks, i.e., Human3.6M, 3DPW and SURREAL, where our PC-HMR frameworks achieve the SOTA results.
△ Less
Submitted 18 March, 2021; v1 submitted 16 March, 2021;
originally announced March 2021.
-
Exponentially fitted two-derivative DIRK methods for oscillatory differential equations
Authors:
Julius O. Ehigie,
Vu Thai Luan,
Solomon A. Okunuga,
Xiong You
Abstract:
In this work, we construct and derive a new class of exponentially fitted two-derivative diagonally implicit Runge--Kutta (EFTDDIRK) methods for the numerical solution of differential equations with oscillatory solutions. First, a general format of so-called modified two-derivative diagonally implicit Runge--Kutta methods (TDDIRK) is proposed. Their order conditions up to order six are derived by…
▽ More
In this work, we construct and derive a new class of exponentially fitted two-derivative diagonally implicit Runge--Kutta (EFTDDIRK) methods for the numerical solution of differential equations with oscillatory solutions. First, a general format of so-called modified two-derivative diagonally implicit Runge--Kutta methods (TDDIRK) is proposed. Their order conditions up to order six are derived by introducing a set of bi-coloured rooted trees and deriving new elementary weights. Next, we build exponential fitting conditions in order for these modified TDDIRK methods to treat oscillatory solutions, leading to EFTDDIRK methods. In particular, a family of 2-stage fourth-order, a fifth-order, and a 3-stage sixth-order EFTDDIRK schemes are derived. These can be considered as superconvergent methods. The stability and phase-lag analysis of the new methods are also investigated, leading to optimized fourth-order schemes, which turn out to be much more accurate and efficient than their non-optimized versions. Finally, we carry out numerical experiments on some oscillatory test problems. Our numerical results clearly demonstrate the accuracy and efficiency of the newly derived methods when compared with existing implicit Runge--Kutta methods and two-derivative Runge--Kutta methods of the same order in the literature.
△ Less
Submitted 25 April, 2021; v1 submitted 27 December, 2020;
originally announced December 2020.
-
Eliminating the Barriers: Demystifying Wi-Fi Baseband Design and Introducing the PicoScenes Wi-Fi Sensing Platform
Authors:
Zhiping Jiang,
Tom H. Luan,
Xincheng Ren,
Dongtao Lv,
Han Hao,
Jing Wang,
Kun Zhao,
Wei Xi,
Yueshen Xu,
Rui Li
Abstract:
The research on Wi-Fi sensing has been thriving over the past decade but the process has not been smooth. Three barriers always hamper the research: unknown baseband design and its influence, inadequate hardware, and the lack of versatile and flexible measurement software. This paper tries to eliminate these barriers through the following work. First, we present an in-depth study of the baseband d…
▽ More
The research on Wi-Fi sensing has been thriving over the past decade but the process has not been smooth. Three barriers always hamper the research: unknown baseband design and its influence, inadequate hardware, and the lack of versatile and flexible measurement software. This paper tries to eliminate these barriers through the following work. First, we present an in-depth study of the baseband design of the Qualcomm Atheros AR9300 (QCA9300) NIC. We identify a missing item of the existing CSI model, namely, the CSI distortion, and identify the baseband filter as its origin. We also propose a distortion removal method. Second, we reintroduce both the QCA9300 and software-defined radio (SDR) as powerful hardware for research. For the QCA9300, we unlock the arbitrary tuning of both the carrier frequency and bandwidth. For SDR, we develop a high?performance software implementation of the 802.11a/g/n/ac/ax baseband, allowing users to fully control the baseband and access the complete physical-layer information. Third, we release the PicoScenes software, which supports concurrent CSI measure?ment from multiple QCA9300, Intel Wireless Link (IWL5300) and SDR hardware. PicoScenes features rich low-level controls, packet injection and software baseband implementation. It also allows users to develop their own measurement plugins. Finally, we report state-of-the-art results in the extensive evaluations of the PicoScenes system, such as the >2 GHz available spectrum on the QCA9300, concurrent CSI measurement, and up to 40 kHz and 1 kHz CSI measurement rates achieved by the QCA9300 and SDR. PicoScenes is available at https://ps.zpj.io.
△ Less
Submitted 11 August, 2021; v1 submitted 20 October, 2020;
originally announced October 2020.
-
Efficient exponential Runge--Kutta methods of high order: construction and implementation
Authors:
Vu Thai Luan
Abstract:
Exponential Runge--Kutta methods have shown to be competitive for the time integration of stiff semilinear parabolic PDEs. The current construction of stiffly accurate exponential Runge--Kutta methods, however, relies on a convergence result that requires weakening many of the order conditions, resulting in schemes whose stages must be implemented in a sequential way. In this work, after showing a…
▽ More
Exponential Runge--Kutta methods have shown to be competitive for the time integration of stiff semilinear parabolic PDEs. The current construction of stiffly accurate exponential Runge--Kutta methods, however, relies on a convergence result that requires weakening many of the order conditions, resulting in schemes whose stages must be implemented in a sequential way. In this work, after showing a stronger convergence result, we are able to derive two new families of fourth- and fifth-order exponential Runge--Kutta methods, which, in contrast to the existing methods, have multiple stages that are independent of one another and share the same format, thereby allowing them to be implemented in parallel or simultaneously, and making the methods to behave like using with much less stages. Moreover, all of their stages involve only one linear combination of the product of $\varphi$-functions (using the same argument) with vectors. Overall, these features make these new methods to be much more efficient to implement when compared to the existing methods of the same orders. Numerical experiments on a one-dimensional semilinear parabolic problem, a nonlinear Schrödinger equation, and a two-dimensional Gray--Scott model are given to confirm the accuracy and efficiency of the two newly constructed methods.
△ Less
Submitted 26 September, 2020;
originally announced September 2020.
-
Galactic interstellar sulfur isotopes: A radial $^{32}$S$/$$^{34}$S gradient?
Authors:
H. Z. Yu,
J. S. Zhang,
C. Henkel,
Y. T. Yan,
W. Liu,
X. D. Tang,
N. Langer,
T. C. Luan,
J. L. Chen,
Y. X. Wang,
G. G. Deng,
Y. P. Zhou
Abstract:
We present observations of $^{12}$C$^{32}$S, $^{12}$C$^{34}$S, $^{13}$C$^{32}$S and $^{12}$C$^{33}$S J=2$-$1 lines toward a large sample of massive star forming regions by using the Arizona Radio Observatory 12-m telescope and the IRAM\,30-m. Taking new measurements of the carbon $^{12}$C/$^{13}$C ratio, the $^{32}$S$/$$^{34}$S isotope ratio was determined from the integrated $^{13}$C$^{32}$S/…
▽ More
We present observations of $^{12}$C$^{32}$S, $^{12}$C$^{34}$S, $^{13}$C$^{32}$S and $^{12}$C$^{33}$S J=2$-$1 lines toward a large sample of massive star forming regions by using the Arizona Radio Observatory 12-m telescope and the IRAM\,30-m. Taking new measurements of the carbon $^{12}$C/$^{13}$C ratio, the $^{32}$S$/$$^{34}$S isotope ratio was determined from the integrated $^{13}$C$^{32}$S/$^{12}$C$^{34}$S line intensity ratios for our sample. Our analysis shows a $^{32}$S$/$$^{34}$S gradient from the inner Galaxy out to a galactocentric distance of 12\,kpc. An unweighted least-squares fit to our data yields $^{32}$S$/$$^{34}$S = (1.56 $\pm$ 0.17)$\rm D_{\rm GC}$ + (6.75 $\pm$ 1.22) with a correlation coefficient of 0.77. Errors represent 1$σ$ standard deviations. Testing this result by (a) excluding the Galactic center region, (b) excluding all sources with C$^{34}$S opacities $>$ 0.25, (c) combining our data and old data from previous study, and (d) using different sets of carbon isotope ratios leads to the conclusion that the observed $^{32}$S$/$$^{34}$S gradient is not an artefact but persists irrespective of the choice of the sample and carbon isotope data. A gradient with rising $^{32}$S$/$$^{34}$S values as a function of galactocentric radius implies that the solar system ratio should be larger than that of the local interstellar medium. With the new carbon isotope ratios we obtain indeed a local $^{32}$S$/$$^{34}$S isotope ratio about 10$\%$ below the solar system one, as expected in case of decreasing $^{32}$S$/$$^{34}$S ratios with time and increased amounts of stellar processing. However, taking older carbon isotope ratios based on a lesser amount of data, such a decrease is not seen. No systematic variation of $^{34}$S$/$$^{33}$S ratios along galactocentric distance was found.
△ Less
Submitted 29 August, 2020; v1 submitted 11 August, 2020;
originally announced August 2020.
-
A new class of high-order methods for multirate differential equations
Authors:
Vu Thai Luan,
Rujeko Chinomona,
Daniel R. Reynolds
Abstract:
This work focuses on the development of a new class of high-order accurate methods for multirate time integration of systems of ordinary differential equations. The proposed methods are based on a specific subset of explicit one-step exponential integrators. More precisely, starting from an explicit exponential Runge--Kutta method of the appropriate form, we derive a multirate algorithm to approxi…
▽ More
This work focuses on the development of a new class of high-order accurate methods for multirate time integration of systems of ordinary differential equations. The proposed methods are based on a specific subset of explicit one-step exponential integrators. More precisely, starting from an explicit exponential Runge--Kutta method of the appropriate form, we derive a multirate algorithm to approximate the action of the matrix exponential through the definition of modified "fast" initial-value problems. These fast problems may be solved using any viable solver, enabling multirate simulations through use of a subcycled method. Due to this structure, we name these Multirate Exponential Runge--Kutta (MERK) methods. In addition to showing how MERK methods may be derived, we provide rigorous convergence analysis, showing that for an overall method of order $p$, the fast problems corresponding to internal stages may be solved using a method of order $p-1$, while the final fast problem corresponding to the time-evolved solution must use a method of order $p$. Numerical simulations are then provided to demonstrate the convergence and efficiency of MERK methods with orders three through five on a series of multirate test problems.
△ Less
Submitted 12 April, 2019;
originally announced April 2019.
-
A Mobility-Aware Vehicular Caching Scheme in Content Centric Networks: Model and Optimization
Authors:
Yao Zhang,
Changle Li,
Tom H. Luan,
Yuchuan Fu,
Weisong Shi,
Lina Zhu
Abstract:
Edge caching is being explored as a promising technology to alleviate the network burden of cellular networks by separating the computing functionalities away from cellular base stations. However, the service capability of existing caching scheme is limited by fixed edge infrastructure when facing the uncertainties of users' requests and locations. The vehicular caching, which uses the moving vehi…
▽ More
Edge caching is being explored as a promising technology to alleviate the network burden of cellular networks by separating the computing functionalities away from cellular base stations. However, the service capability of existing caching scheme is limited by fixed edge infrastructure when facing the uncertainties of users' requests and locations. The vehicular caching, which uses the moving vehicles as cache carriers, is regard as an efficient method to solve the problem above. This paper studies the effectiveness of vehicular caching scheme in content centric networks by developing optimization model towards the minimization of network energy consumption. Particularly, we model the interactions between caching vehicles and mobile users as a 2-D Markov process, in order to characterize the network availability of mobile users. Based on the developed model, we propose an online vehicular caching design by optimizing network energy efficiency. Specifically, the problem of caching decision making is firstly formulated as a fractional optimization model, towards the optimal energy efficiency. Using nonlinear fractional programming technology and Lyapunov optimization theory, we derive the theoretical solution for the optimization model. An online caching algorithm to enable the optimal vehicular caching is developed based on the solution. Finally, extensive simulations are conducted to examine the performance of our proposal. By comparison, our online caching scheme outperforms the existing scheme in terms of energy efficiency, hit ratio, cache utilization, and system gain.
△ Less
Submitted 19 February, 2019;
originally announced February 2019.
-
Building Transmission Backbone for Highway Vehicular Networks: Framework and Analysis
Authors:
Changle Li,
Yao Zhang,
Tom H. Luan,
Yuchuan Fu
Abstract:
The highway vehicular ad hoc networks, where vehicles are wirelessly inter-connected, rely on the multi-hop transmissions for end-to-end communications. This, however, is severely challenged by the unreliable wireless connections, signal attenuation and channel contentions in the dynamic vehicular environment. To overcome the network dynamics, selecting appropriate relays for end-to-end connection…
▽ More
The highway vehicular ad hoc networks, where vehicles are wirelessly inter-connected, rely on the multi-hop transmissions for end-to-end communications. This, however, is severely challenged by the unreliable wireless connections, signal attenuation and channel contentions in the dynamic vehicular environment. To overcome the network dynamics, selecting appropriate relays for end-to-end connections is important. Different from the previous efforts (\emph{e.g.}, clustering and cooperative downloading), this paper explores the existence of stable vehicles and propose building a stable multi-hop transmission backbone network in the highway vehicular ad hoc network. Our work is composed of three parts. Firstly, by analyzing the real-world vehicle traffic traces, we observe that the large-size vehicles, \emph{e.g.}, trucks, are typically stable with low variations of mobility and stable channel condition of low signal attenuation; this makes their inter-connections stable in both connection time and transmission rate. Secondly, by exploring the stable vehicles, we propose a distributed protocol to build a multi-hop backbone link for end-to-end transmissions, accordingly forming a two-tier network architecture in highway vehicular ad hoc networks. Lastly, to show the resulting data performance, we develop a queueing analysis model to evaluate the end-to-end transmission delay and throughput.
Using extensive simulations, we show that the proposed transmission backbone can significantly improve the reliability of multi-hop data transmissions with higher throughput, less transmission interruptions and end-to-end delay.
△ Less
Submitted 5 July, 2018;
originally announced July 2018.
-
Explicit Exponential Rosenbrock Methods and their Application in Visual Computing
Authors:
Vu Thai Luan,
Dominik L. Michels
Abstract:
We introduce a class of explicit exponential Rosenbrock methods for the time integration of large systems of stiff differential equations. Their application with respect to simulation tasks in the field of visual computing is discussed where these time integrators have shown to be very competitive compared to standard techniques. In particular, we address the simulation of elastic and nonelastic d…
▽ More
We introduce a class of explicit exponential Rosenbrock methods for the time integration of large systems of stiff differential equations. Their application with respect to simulation tasks in the field of visual computing is discussed where these time integrators have shown to be very competitive compared to standard techniques. In particular, we address the simulation of elastic and nonelastic deformations as well as collision scenarios focusing on relevant aspects like stability and energy conservation, large stiffnesses, high fidelity and visual accuracy.
△ Less
Submitted 21 May, 2018;
originally announced May 2018.
-
Further development of efficient and accurate time integration schemes for meteorological models
Authors:
Vu Thai Luan,
Janusz A. Pudykiewicz,
Daniel R. Reynolds
Abstract:
In this paper, we investigate the use of higher-order exponential Rosenbrock time integration methods on the shallow water equations on the sphere. This stiff, nonlinear model provides a testing ground for accurate and stable time integration methods in weather modeling, serving as the focus for exploration of novel methods for many years. We therefore identify a candidate set of three recent expo…
▽ More
In this paper, we investigate the use of higher-order exponential Rosenbrock time integration methods on the shallow water equations on the sphere. This stiff, nonlinear model provides a testing ground for accurate and stable time integration methods in weather modeling, serving as the focus for exploration of novel methods for many years. We therefore identify a candidate set of three recent exponential Rosenbrock methods of orders four and five (exprb42, pexprb43 and exprb53) for use on this model. Based on their multi-stage structure, we propose a set of modifications to the phipm_IOM2 algorithm for efficiently calculating the matrix phi-functions. We then investigate the performance of these methods on a suite of four challenging test problems, comparing them against the epi3 method investigated previously in [1, 2] on these problems. In all cases, the proposed methods enable accurate solutions at much longer time-steps than epi3, proving considerably more efficient as either the desired solution error decreases, or as the test problem nonlinearity increases.
△ Less
Submitted 9 October, 2018; v1 submitted 5 May, 2018;
originally announced May 2018.
-
Optimal Base Station Antenna Downtilt in Downlink Cellular Networks
Authors:
Junnan Yang,
Ming Ding,
Guoqiang Mao,
Zihuai Lin,
De-gan Zhang,
Tom Hao Luan
Abstract:
From very recent studies, the area spectral efficiency (ASE) performance of downlink (DL) cellular networks will continuously decrease and finally to zero with the network densification in a fully loaded ultra-dense network (UDN) when the absolute height difference between a base station (BS) antenna and a user equipment (UE) antenna is larger than zero, which is referred as the ASE Crash. We revi…
▽ More
From very recent studies, the area spectral efficiency (ASE) performance of downlink (DL) cellular networks will continuously decrease and finally to zero with the network densification in a fully loaded ultra-dense network (UDN) when the absolute height difference between a base station (BS) antenna and a user equipment (UE) antenna is larger than zero, which is referred as the ASE Crash. We revisit this issue by considering the impact of the BS antenna downtilt on the downlink network capacity. In general, there exists a height difference between a BS and a UE in practical networks. It is common to utilize antenna downtilt to adjust the direction of the vertical antenna pattern, and thus increase received signal power or reduce inter-cell interference power to improve network performance. This paper focuses on investigating the relationship between the base station antenna downtilt and the downlink network capacity in terms of the coverage probability and the ASE. The analytical results of the coverage probability and the ASE are derived, and we find that there exists an optimal antenna downtilt to achieve the maximal coverage probability for each base station density. Moreover, we derive numerically solvable expressions for the optimal antenna downtilt, which is a function of the base station density. Our theoretical and numerical results show that after applying the optimal antenna downtilt, the network performance can be improved significantly. Specifically, with the optimal antenna downtilt, the ASE crash can be delayed by nearly one order of magnitude in terms of the base station density.
△ Less
Submitted 21 February, 2018;
originally announced February 2018.
-
Connected Vehicular Transportation: Data Analytics and Traffic-dependent Networking
Authors:
Cailian Chen,
Tom Hao Luan,
Xinping Guan,
Ning Lu,
Yunshu Liu
Abstract:
With onboard operating systems becoming increasingly common in vehicles, the real-time broadband infotainment and Intelligent Transportation System (ITS) service applications in fast-motion vehicles become ever demanding, which are highly expected to significantly improve the efficiency and safety of our daily on-road lives. The emerging ITS and vehicular applications, e.g., trip planning, however…
▽ More
With onboard operating systems becoming increasingly common in vehicles, the real-time broadband infotainment and Intelligent Transportation System (ITS) service applications in fast-motion vehicles become ever demanding, which are highly expected to significantly improve the efficiency and safety of our daily on-road lives. The emerging ITS and vehicular applications, e.g., trip planning, however, require substantial efforts on the real-time pervasive information collection and big data processing so as to provide quick decision making and feedbacks to the fast moving vehicles, which thus impose the significant challenges on the development of an efficient vehicular communication platform. In this article, we present TrasoNET, an integrated network framework to provide realtime intelligent transportation services to connected vehicles by exploring the data analytics and networking techniques. TrasoNET is built upon two key components. The first one guides vehicles to the appropriate access networks by exploring the information of realtime traffic status, specific user preferences, service applications and network conditions. The second component mainly involves a distributed automatic access engine, which enables individual vehicles to make distributed access decisions based on access recommender, local observation and historic information. We showcase the application of TrasoNET in a case study on real-time traffic sensing based on real traces of taxis.
△ Less
Submitted 26 April, 2017;
originally announced April 2017.
-
CFT: A Cluster-based File Transfer Scheme for Highway
Authors:
Quyuan Luo,
Changle Li,
Qiang Ye,
Tom H. Luan,
Lina Zhu,
Xiaolei Han
Abstract:
Effective file transfer between vehicles is fundamental to many emerging vehicular infotainment applications in the highway Vehicular Ad Hoc Networks (VANETs), such as content distribution and social networking. However, due to fast mobility, the connection between vehicles tends to be short-lived and lossy, which makes intact file transfer extremely challenging. To tackle this problem, we present…
▽ More
Effective file transfer between vehicles is fundamental to many emerging vehicular infotainment applications in the highway Vehicular Ad Hoc Networks (VANETs), such as content distribution and social networking. However, due to fast mobility, the connection between vehicles tends to be short-lived and lossy, which makes intact file transfer extremely challenging. To tackle this problem, we presents a novel Cluster-based File Transfer (CFT) scheme for highway VANETs in this paper. With CFT, when a vehicle requests a file, the transmission capacity between the resource vehicle and the destination vehicle is evaluated. If the requested file can be successfully transferred over the direct Vehicular-to-Vehicular (V2V) connection, the file transfer will be completed by the resource and the destination themselves. Otherwise, a cluster will be formed to help the file transfer. As a fully-distributed scheme that relies on the collaboration of cluster members, CFT does not require any assistance from roadside units or access points. Our experimental results indicate that CFT outperforms the existing file transfer schemes for highway VANETs.
△ Less
Submitted 8 January, 2017;
originally announced January 2017.
-
See the Near Future: A Short-Term Predictive Methodology to Traffic Load in ITS
Authors:
Xun Zhou,
Changle Li,
Zhe Liu,
Tom H. Luan,
Zhifang Miao,
Lina Zhu,
Lei Xiong
Abstract:
The Intelligent Transportation System (ITS) targets to a coordinated traffic system by applying the advanced wireless communication technologies for road traffic scheduling. Towards an accurate road traffic control, the short-term traffic forecasting to predict the road traffic at the particular site in a short period is often useful and important. In existing works, Seasonal Autoregressive Integr…
▽ More
The Intelligent Transportation System (ITS) targets to a coordinated traffic system by applying the advanced wireless communication technologies for road traffic scheduling. Towards an accurate road traffic control, the short-term traffic forecasting to predict the road traffic at the particular site in a short period is often useful and important. In existing works, Seasonal Autoregressive Integrated Moving Average (SARIMA) model is a popular approach. The scheme however encounters two challenges: 1) the analysis on related data is insufficient whereas some important features of data may be neglected; and 2) with data presenting different features, it is unlikely to have one predictive model that can fit all situations. To tackle above issues, in this work, we develop a hybrid model to improve accuracy of SARIMA. In specific, we first explore the autocorrelation and distribution features existed in traffic flow to revise structure of the time series model. Based on the Gaussian distribution of traffic flow, a hybrid model with a Bayesian learning algorithm is developed which can effectively expand the application scenarios of SARIMA. We show the efficiency and accuracy of our proposal using both analysis and experimental studies. Using the real-world trace data, we show that the proposed predicting approach can achieve satisfactory performance in practice.
△ Less
Submitted 8 January, 2017;
originally announced January 2017.
-
Urban Rail Transit System Operation Optimization A Game Theoretical Methodology
Authors:
Jiao Ma,
Changle Li,
Weiwei Dong,
Zhe Liu,
Tom H. Luan,
Lina Zhu,
Lei Xiong
Abstract:
The Urban Rail Transit (URT) has been one of the major trip modes in cities worldwide. As the passengers arrive at variable rates in different time slots, e.g., rush and non-rush hours, the departure frequency at a site directly relates to perceived service quality of passengers; the high departure frequency, however, incurs more operation cost to URT. Therefore, a tradeoff between the interest of…
▽ More
The Urban Rail Transit (URT) has been one of the major trip modes in cities worldwide. As the passengers arrive at variable rates in different time slots, e.g., rush and non-rush hours, the departure frequency at a site directly relates to perceived service quality of passengers; the high departure frequency, however, incurs more operation cost to URT. Therefore, a tradeoff between the interest of railway operator and the service quality of passengers needs to be addressed. In this paper, we develop a model on the operation method of train operation scheduling using a Stackelberg game model. The railway operator is modeled as the game leader and the passengers as the game follower, and an optimal departure frequency can be determine the tradeoff between passengers' service quality and operation cost. We present several numerical examples based on the operation data from Nanjing transit subway at China. The results demonstrate that the proposed model can significantly improve the traffic efficiency.
△ Less
Submitted 7 January, 2017;
originally announced January 2017.
-
Fourth-order two-stage explicit exponential integrators for solving differential equations
Authors:
Vu Thai Luan
Abstract:
Among the family of fourth-order time integration schemes, the two-stage Gauss--Legendre method, which is an implicit Runge--Kutta method based on collocation, is the only superconvergent. The computational cost of this implicit scheme for large systems, however, is very high since it requires solving a nonlinear system at every step. Surprisingly, in this work we show that one can construct and p…
▽ More
Among the family of fourth-order time integration schemes, the two-stage Gauss--Legendre method, which is an implicit Runge--Kutta method based on collocation, is the only superconvergent. The computational cost of this implicit scheme for large systems, however, is very high since it requires solving a nonlinear system at every step. Surprisingly, in this work we show that one can construct and prove convergence results for exponential methods of order four which use two stages only. Specifically, we derive two new fourth-order two-stage exponential Rosenbrock schemes for solving large systems of differential equations. Moreover, since the newly schemes are not only superconvergent but also fully explicit, they clearly offer great advantages over the two-stage Gauss--Legendre method as well as other time integration schemes. Numerical experiments are given to demonstrate the efficiency of the new integrators.
△ Less
Submitted 17 June, 2016;
originally announced June 2016.
-
Preconditioned Implicit-Exponential (IMEXP) Time Integrators for Stiff Differential Equations
Authors:
Vu Thai Luan,
Mayya Tokman,
Greg Rainwater
Abstract:
We propose two new classes of time integrators for stiff DEs: the implicit-explicit exponential (IMEXP) and the hybrid exponential methods. In contrast to the existing exponential schemes, the new methods offer significant computational advantages when used with preconditioners. Any preconditioner can be used with any of these new schemes. This leads to a broader applicability of exponential metho…
▽ More
We propose two new classes of time integrators for stiff DEs: the implicit-explicit exponential (IMEXP) and the hybrid exponential methods. In contrast to the existing exponential schemes, the new methods offer significant computational advantages when used with preconditioners. Any preconditioner can be used with any of these new schemes. This leads to a broader applicability of exponential methods. The proof of stability and convergence of these integrators and numerical demonstration of their efficiency are presented.
△ Less
Submitted 10 May, 2016;
originally announced May 2016.
-
A View of Fog Computing from Networking Perspective
Authors:
Tom H. Luan,
Longxiang Gao,
Zhi Li,
Yang Xiang,
Guiyi We,
Limin Sun
Abstract:
With smart devices, particular smartphones, becoming our everyday companions, the ubiquitous mobile Internet and computing applications pervade people's daily lives. With the surge demand on high-quality mobile services at anywhere, how to address the ubiquitous user demand and accommodate the explosive growth of mobile traffics is the key issue of the next generation mobile networks. The Fog comp…
▽ More
With smart devices, particular smartphones, becoming our everyday companions, the ubiquitous mobile Internet and computing applications pervade people's daily lives. With the surge demand on high-quality mobile services at anywhere, how to address the ubiquitous user demand and accommodate the explosive growth of mobile traffics is the key issue of the next generation mobile networks. The Fog computing is a promising solution towards this goal. Fog computing extends cloud computing by providing virtualized resources and engaged location-based services to the edge of the mobile networks so as to better serve mobile traffics. Therefore, Fog computing is a lubricant of the combination of cloud computing and mobile applications. In this article, we outline the main features of Fog computing and describe its concept, architecture and design goals. Lastly, we discuss some of the future research issues from the networking perspective.
△ Less
Submitted 7 March, 2016; v1 submitted 3 February, 2016;
originally announced February 2016.
-
Fog Computing: Focusing on Mobile Users at the Edge
Authors:
Tom H. Luan,
Longxiang Gao,
Zhi Li,
Yang Xiang,
Guiyi Wei,
Limin Sun
Abstract:
With smart devices, particular smartphones, becoming our everyday companions, the ubiquitous mobile Internet and computing applications pervade people daily lives. With the surge demand on high-quality mobile services at anywhere, how to address the ubiquitous user demand and accommodate the explosive growth of mobile traffics is the key issue of the next generation mobile networks. The Fog comput…
▽ More
With smart devices, particular smartphones, becoming our everyday companions, the ubiquitous mobile Internet and computing applications pervade people daily lives. With the surge demand on high-quality mobile services at anywhere, how to address the ubiquitous user demand and accommodate the explosive growth of mobile traffics is the key issue of the next generation mobile networks. The Fog computing is a promising solution towards this goal. Fog computing extends cloud computing by providing virtualized resources and engaged location-based services to the edge of the mobile networks so as to better serve mobile traffics. Therefore, Fog computing is a lubricant of the combination of cloud computing and mobile applications. In this article, we outline the main features of Fog computing and describe its concept, architecture and design goals. Lastly, we discuss some of the future research issues from the networking perspective.
△ Less
Submitted 29 March, 2016; v1 submitted 6 February, 2015;
originally announced February 2015.
-
Mathematical Modelling and Parameter Optimization of Pulsating Heat Pipes
Authors:
Xin-She Yang,
Mehmet Karamanoglu,
Tao Luan,
Slawomir Koziel
Abstract:
Proper heat transfer management is important to key electronic components in microelectronic applications. Pulsating heat pipes (PHP) can be an efficient solution to such heat transfer problems. However, mathematical modelling of a PHP system is still very challenging, due to the complexity and multiphysics nature of the system. In this work, we present a simplified, two-phase heat transfer model,…
▽ More
Proper heat transfer management is important to key electronic components in microelectronic applications. Pulsating heat pipes (PHP) can be an efficient solution to such heat transfer problems. However, mathematical modelling of a PHP system is still very challenging, due to the complexity and multiphysics nature of the system. In this work, we present a simplified, two-phase heat transfer model, and our analysis shows that it can make good predictions about startup characteristics. Furthermore, by considering parameter estimation as a nonlinear constrained optimization problem, we have used the firefly algorithm to find parameter estimates efficiently. We have also demonstrated that it is possible to obtain good estimates of key parameters using very limited experimental data.
△ Less
Submitted 30 March, 2014;
originally announced March 2014.
-
Explicit exponential Runge-Kutta methods of high order for parabolic problems
Authors:
Vu Thai Luan,
Alexander Ostermann
Abstract:
Exponential Runge-Kutta methods constitute efficient integrators for semilinear stiff problems. So far, however, explicit exponential Runge-Kutta methods are available in the literature up to order 4 only. The aim of this paper is to construct a fifth-order method. For this purpose, we make use of a novel approach to derive the stiff order conditions for high-order exponential methods. This allows…
▽ More
Exponential Runge-Kutta methods constitute efficient integrators for semilinear stiff problems. So far, however, explicit exponential Runge-Kutta methods are available in the literature up to order 4 only. The aim of this paper is to construct a fifth-order method. For this purpose, we make use of a novel approach to derive the stiff order conditions for high-order exponential methods. This allows us to obtain the conditions for a method of order 5 in an elegant way. After stating the conditions, we first show that there does not exist an explicit exponential Runge-Kutta method of order 5 with less than or equal to 6 stages. Then, we construct a fifth-order method with 8 stages and prove its convergence for semilinear parabolic problems. Finally, a numerical example is given that illustrates our convergence bound.
△ Less
Submitted 2 July, 2013;
originally announced July 2013.