-
Empirical 3D Channel Modeling for Cellular-Connected UAVs: A Triple-Layer Machine Learning Approach
Authors:
Haider A. H. Alobaidy,
Mehran Behjati,
Rosdiadee Nordin,
Muhammad Aidiel Zulkifley,
Nor Fadzilah Abdullah,
Nur Fahimah Mat Salleh
Abstract:
This work proposes an empirical air to ground (A2G) propagation model specifically designed for cellular connected unmanned aerial vehicles (UAVs). An in depth aerial drive test was carried out within an operating Long Term Evolution (LTE) network, gathering thorough measurements of key network parameters. Rigid preprocessing and statistical analysis of these data produced a strong foundation for…
▽ More
This work proposes an empirical air to ground (A2G) propagation model specifically designed for cellular connected unmanned aerial vehicles (UAVs). An in depth aerial drive test was carried out within an operating Long Term Evolution (LTE) network, gathering thorough measurements of key network parameters. Rigid preprocessing and statistical analysis of these data produced a strong foundation for training a new triple layer machine learning (ML) model. The proposed ML framework employs a systematic hierarchical approach. Accordingly, the first two layers, Stepwise Linear Regression (STW) and Ensemble of Bagged Trees (EBT) generate predictions independently, meanwhile, the third layer, Gaussian Process Regression (GPR), explicitly acts as an aggregation layer, refining these predictions to accurately estimate Key Performance Indicators (KPIs) such as Reference Signal Received Power (RSRP), Reference Signal Received Quality (RSRQ), Received Signal Strength (RSSI), and Path Loss (PL). Compared to traditional single layer ML or computationally intensive ray tracing approaches, the proposed triple layer ML framework significantly improves predictive accuracy and robustness, achieving around 99 percent accuracy in training and above 90 percent in testing while utilizing a minimal but effective feature set log transformed 3D and 2D propagation distances, azimuth, and elevation angles. This streamlined feature selection substantially reduces computing complexity, thus enhancing scalability across various operating environments. The proposed frameworks practicality and efficacy for real world deployment in UAV integrated cellular networks are further demonstrated by comparative analyses, which underscore its substantial improvement.
△ Less
Submitted 26 May, 2025;
originally announced May 2025.
-
A Conceptual Model for Holistic Classification of Insider
Authors:
Ikuesan Richard Adeyemi,
Shukor Abd Razak,
Mazleena Salleh
Abstract:
The process through which an insider to an organization can be described or classified is lined within the orthodox paradigm of classification in which an organization considers only subject with requisite employee criterion as an insider to that organization. This is further clouded with the relative rigidity in operational security policies being implemented in organizations. Establishing invest…
▽ More
The process through which an insider to an organization can be described or classified is lined within the orthodox paradigm of classification in which an organization considers only subject with requisite employee criterion as an insider to that organization. This is further clouded with the relative rigidity in operational security policies being implemented in organizations. Establishing investigation process in instances of misuse occurrence and or ascertaining the efficiency of staff member using such archaic paradigm is maligned with endless possibilities of uncertainties. This study, therefore, proposes a holistic model for which insider classification can be crystallized using the combination of qualitative research process and analysis of moment structure evaluation process. A full comprehension of this proposition could serve as a hinge through which insider misuse investigation can be thoroughly carried out. In addition, integrating this paradigm into existing operational security policies could serve as a metric upon which an organization can understand insider dynamics, in order to prevent misuses, and enhance staff management.
△ Less
Submitted 16 June, 2017;
originally announced June 2017.
-
A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB) and Inverse Bit
Authors:
Abdullah Bamatraf,
Rosziati Ibrahim,
Mohd. Najib Mohd. Salleh
Abstract:
In this paper, we introduce a new digital watermarking algorithm using least significant bit (LSB). LSB is used because of its little effect on the image. This new algorithm is using LSB by inversing the binary values of the watermark text and shifting the watermark according to the odd or even number of pixel coordinates of image before embedding the watermark. The proposed algorithm is flexible…
▽ More
In this paper, we introduce a new digital watermarking algorithm using least significant bit (LSB). LSB is used because of its little effect on the image. This new algorithm is using LSB by inversing the binary values of the watermark text and shifting the watermark according to the odd or even number of pixel coordinates of image before embedding the watermark. The proposed algorithm is flexible depending on the length of the watermark text. If the length of the watermark text is more than ((MxN)/8)-2 the proposed algorithm will also embed the extra of the watermark text in the second LSB. We compare our proposed algorithm with the 1-LSB algorithm and Lee's algorithm using Peak signal-to-noise ratio (PSNR). This new algorithm improved its quality of the watermarked image. We also attack the watermarked image by using cropping and adding noise and we got good results as well.
△ Less
Submitted 29 November, 2011;
originally announced November 2011.