-
A Unified Framework for Real-Time Failure Handling in Robotics Using Vision-Language Models, Reactive Planner and Behavior Trees
Authors:
Faseeh Ahmad,
Hashim Ismail,
Jonathan Styrud,
Maj Stenmark,
Volker Krueger
Abstract:
Robotic systems often face execution failures due to unexpected obstacles, sensor errors, or environmental changes. Traditional failure recovery methods rely on predefined strategies or human intervention, making them less adaptable. This paper presents a unified failure recovery framework that combines Vision-Language Models (VLMs), a reactive planner, and Behavior Trees (BTs) to enable real-time…
▽ More
Robotic systems often face execution failures due to unexpected obstacles, sensor errors, or environmental changes. Traditional failure recovery methods rely on predefined strategies or human intervention, making them less adaptable. This paper presents a unified failure recovery framework that combines Vision-Language Models (VLMs), a reactive planner, and Behavior Trees (BTs) to enable real-time failure handling. Our approach includes pre-execution verification, which checks for potential failures before execution, and reactive failure handling, which detects and corrects failures during execution by verifying existing BT conditions, adding missing preconditions and, when necessary, generating new skills. The framework uses a scene graph for structured environmental perception and an execution history for continuous monitoring, enabling context-aware and adaptive failure handling. We evaluate our framework through real-world experiments with an ABB YuMi robot on tasks like peg insertion, object sorting, and drawer placement, as well as in AI2-THOR simulator. Compared to using pre-execution and reactive methods separately, our approach achieves higher task success rates and greater adaptability. Ablation studies highlight the importance of VLM-based reasoning, structured scene representation, and execution history tracking for effective failure recovery in robotics.
△ Less
Submitted 21 March, 2025; v1 submitted 19 March, 2025;
originally announced March 2025.
-
Enhanced Suicidal Ideation Detection from Social Media Using a CNN-BiLSTM Hybrid Model
Authors:
Mohaiminul Islam Bhuiyan,
Nur Shazwani Kamarudin,
Nur Hafieza Ismail
Abstract:
Suicidal ideation detection is crucial for preventing suicides, a leading cause of death worldwide. Many individuals express suicidal thoughts on social media, offering a vital opportunity for early detection through advanced machine learning techniques. The identification of suicidal ideation in social media text is improved by utilising a hybrid framework that integrates Convolutional Neural Net…
▽ More
Suicidal ideation detection is crucial for preventing suicides, a leading cause of death worldwide. Many individuals express suicidal thoughts on social media, offering a vital opportunity for early detection through advanced machine learning techniques. The identification of suicidal ideation in social media text is improved by utilising a hybrid framework that integrates Convolutional Neural Networks (CNN) and Bidirectional Long Short-Term Memory (BiLSTM), enhanced with an attention mechanism. To enhance the interpretability of the model's predictions, Explainable AI (XAI) methods are applied, with a particular focus on SHapley Additive exPlanations (SHAP), are incorporated. At first, the model managed to reach an accuracy of 92.81%. By applying fine-tuning and early stopping techniques, the accuracy improved to 94.29%. The SHAP analysis revealed key features influencing the model's predictions, such as terms related to mental health struggles. This level of transparency boosts the model's credibility while helping mental health professionals understand and trust the predictions. This work highlights the potential for improving the accuracy and interpretability of detecting suicidal tendencies, making a valuable contribution to the progress of mental health monitoring systems. It emphasizes the significance of blending powerful machine learning methods with explainability to develop reliable and impactful mental health solutions.
△ Less
Submitted 19 January, 2025;
originally announced January 2025.
-
Understanding Mental Health Content on Social Media and Its Effect Towards Suicidal Ideation
Authors:
Mohaiminul Islam Bhuiyan,
Nur Shazwani Kamarudin,
Nur Hafieza Ismail
Abstract:
This review underscores the critical need for effective strategies to identify and support individuals with suicidal ideation, exploiting technological innovations in ML and DL to further suicide prevention efforts. The study details the application of these technologies in analyzing vast amounts of unstructured social media data to detect linguistic patterns, keywords, phrases, tones, and context…
▽ More
This review underscores the critical need for effective strategies to identify and support individuals with suicidal ideation, exploiting technological innovations in ML and DL to further suicide prevention efforts. The study details the application of these technologies in analyzing vast amounts of unstructured social media data to detect linguistic patterns, keywords, phrases, tones, and contextual cues associated with suicidal thoughts. It explores various ML and DL models like SVMs, CNNs, LSTM, neural networks, and their effectiveness in interpreting complex data patterns and emotional nuances within text data. The review discusses the potential of these technologies to serve as a life-saving tool by identifying at-risk individuals through their digital traces. Furthermore, it evaluates the real-world effectiveness, limitations, and ethical considerations of employing these technologies for suicide prevention, stressing the importance of responsible development and usage. The study aims to fill critical knowledge gaps by analyzing recent studies, methodologies, tools, and techniques in this field. It highlights the importance of synthesizing current literature to inform practical tools and suicide prevention efforts, guiding innovation in reliable, ethical systems for early intervention. This research synthesis evaluates the intersection of technology and mental health, advocating for the ethical and responsible application of ML, DL, and NLP to offer life-saving potential worldwide while addressing challenges like generalizability, biases, privacy, and the need for further research to ensure these technologies do not exacerbate existing inequities and harms.
△ Less
Submitted 16 January, 2025;
originally announced January 2025.
-
6RLR-ABC: 6LoWPAN Routing Protocol With Local Repair Using Bio Inspired Artificial Bee Colony
Authors:
Nurul Halimatul Asmak Ismail,
Samer A. B. Awwad,
Rosilah Hassan
Abstract:
In recent years, Micro-Electro-Mechanical System (MEMS) has successfully enabled the development of IPv6 over Low power Wireless Personal Area Network (6LoWPAN). This network is equipped with low-cost, low-power, lightweight and varied functions devices. These devices are capable of amassing, storing, processing environmental information and conversing with neighbouring sensors. These requisites p…
▽ More
In recent years, Micro-Electro-Mechanical System (MEMS) has successfully enabled the development of IPv6 over Low power Wireless Personal Area Network (6LoWPAN). This network is equipped with low-cost, low-power, lightweight and varied functions devices. These devices are capable of amassing, storing, processing environmental information and conversing with neighbouring sensors. These requisites pose a new and interesting challenge for the development of IEEE 802.15.4 together with routing protocol. In this work, 6LoWPAN Routing Protocol with Local Repair Using Bio Inspired Artificial Bee Colony (6RLR-ABC) has been introduced. This protocol supports connection establishment between nodes in an energy-efficient manner while maintaining high packet delivery ratio and throughput and minimizing average end-to-end delay. This protocol has been evaluated based on increasing generated traffic. The performance of the designed 6RLR-ABC routing protocol has been evaluated compared to 6LoWPAN Ad-hoc On-Demand Distance Vector (LOAD) routing protocol. LOAD protocol has been chosen since it is the most relevant existed 6LoWPANrouting protocol. The simulation results show that the introduced 6RLR-ABC protocol achieves lower packet average end-to-end delay and lower energy consumption compared to LOAD protocol.Additionally,the packet delivery ratio of the designed protocol is much higher than LOAD protocol. The proposed 6RLR-ABC achieved about 39% higher packet delivery ratio and about 54.8% higher throughput while simultaneously offering lower average end-to-end delay and lower average energy consumption than LOAD protocol.
△ Less
Submitted 5 June, 2020;
originally announced June 2020.
-
An Exploratory Study of Hierarchical Fuzzy Systems Approach in Recommendation System
Authors:
Tajul Rosli Razak,
Iman Hazwam Abd Halim,
Muhammad Nabil Fikri Jamaludin,
Mohammad Hafiz Ismail,
Shukor Sanim Mohd Fauzi
Abstract:
Recommendation system or also known as a recommender system is a tool to help the user in providing a suggestion of a specific dilemma. Thus, recently, the interest in developing a recommendation system in many fields has increased. Fuzzy Logic system (FLSs) is one of the approaches that can be used to model the recommendation systems as it can deal with uncertainty and imprecise information. Howe…
▽ More
Recommendation system or also known as a recommender system is a tool to help the user in providing a suggestion of a specific dilemma. Thus, recently, the interest in developing a recommendation system in many fields has increased. Fuzzy Logic system (FLSs) is one of the approaches that can be used to model the recommendation systems as it can deal with uncertainty and imprecise information. However, one of the fundamental issues in FLS is the problem of the curse of dimensionality. That is, the number of rules in FLSs is increasing exponentially with the number of input variables. One effective way to overcome this problem is by using Hierarchical Fuzzy System (HFSs). This paper aims to explore the use of HFSs for Recommendation system. Specifically, we are interested in exploring and comparing the HFS and FLS for the Career path recommendation system (CPRS) based on four key criteria, namely topology, the number of rules, the rules structures and interpretability. The findings suggested that the HFS has advantages over FLS towards improving the interpretability models, in the context of a recommendation system example. This study contributes to providing an insight into the development of interpretable HFSs in the Recommendation systems.
△ Less
Submitted 27 May, 2020;
originally announced May 2020.
-
Reducing Honeypot Log Storage Capacity Consumption -- Cron Job with Perl-Script Approach
Authors:
Iman Hazwam Abd Halim,
Nur Muhammad Irfan Abu Hassan,
Tajul Rosli Razak,
Muhammad Nabil Fikri Jamaluddin,
Mohammad Hafiz Ismail
Abstract:
Honeypot is a decoy computer system that is used to attract and monitor hackers' activities in the network. The honeypot aims to collect information from the hackers in order to create a more secure system. However, the log file generated by honeypot can grow very large when heavy traffic occurred in the system, such as Distributed Denial of Services' (DDoS) attack. The DDoS possesses difficulty w…
▽ More
Honeypot is a decoy computer system that is used to attract and monitor hackers' activities in the network. The honeypot aims to collect information from the hackers in order to create a more secure system. However, the log file generated by honeypot can grow very large when heavy traffic occurred in the system, such as Distributed Denial of Services' (DDoS) attack. The DDoS possesses difficulty when it is being processed and analyzed by the network administrator as it required a lot of time and resources. Therefore, in this paper, we propose an approach to decrease the log size that is by using a Cron job that will run with a Perl-script. This approach parses the collected data into the database periodically to decrease the log size. Three DDoS attack cases were conducted in this study to show the increasing of the log size by sending a different amount of packet per second for 8 hours in each case. The results have shown that by utilizing the Cron job with Perl-script, the log size has been significantly reduced, the disk space used in the system has also decreased. Consequently, this approach capable of speeding up the process of parsing the log file into the database and thus, improving the overall system performance. This study contributes to providing a pathway in reducing honeypot log storage using the Cron job with Perl-Script.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.
-
A Simple Recommender Engine for Matching Final-Year Project Student with Supervisor
Authors:
Mohammad Hafiz Ismail,
Tajul Rosli Razak,
Muhamad Arif Hashim,
Alif Faisal Ibrahim
Abstract:
This paper discusses a simple recommender engine, which can match final year project student based on their interests with potential supervisors. The recommender engine is constructed based on Euclidean distance algorithm. The initial input data for the recommender system is obtained by distributing questionnaire to final year students and recording their response in CSV format. The recommender en…
▽ More
This paper discusses a simple recommender engine, which can match final year project student based on their interests with potential supervisors. The recommender engine is constructed based on Euclidean distance algorithm. The initial input data for the recommender system is obtained by distributing questionnaire to final year students and recording their response in CSV format. The recommender engine is implemented using Java class and application, and result of the initial tests has shown promises that the project is feasible to be pursued as it has the potential of solving the problem of final year students in finding their potential supervisors.
△ Less
Submitted 8 August, 2019;
originally announced August 2019.
-
A Unified Algebraic Framework for Non-Monotonicity
Authors:
Nourhan Ehab,
Haythem O. Ismail
Abstract:
Tremendous research effort has been dedicated over the years to thoroughly investigate non-monotonic reasoning. With the abundance of non-monotonic logical formalisms, a unified theory that enables comparing the different approaches is much called for. In this paper, we present an algebraic graded logic we refer to as LogAG capable of encompassing a wide variety of non-monotonic formalisms. We bui…
▽ More
Tremendous research effort has been dedicated over the years to thoroughly investigate non-monotonic reasoning. With the abundance of non-monotonic logical formalisms, a unified theory that enables comparing the different approaches is much called for. In this paper, we present an algebraic graded logic we refer to as LogAG capable of encompassing a wide variety of non-monotonic formalisms. We build on Lin and Shoham's argument systems first developed to formalize non-monotonic commonsense reasoning. We show how to encode argument systems as LogAG theories, and prove that LogAG captures the notion of belief spaces in argument systems. Since argument systems capture default logic, autoepistemic logic, the principle of negation as failure, and circumscription, our results show that LogAG captures the before-mentioned non-monotonic logical formalisms as well. Previous results show that LogAG subsumes possibilistic logic and any non-monotonic inference relation satisfying Makinson's rationality postulates. In this way, LogAG provides a powerful unified framework for non-monotonicity.
△ Less
Submitted 21 July, 2019;
originally announced July 2019.
-
Applying Multi-Core Model Checking to Hardware-Software Partitioning in Embedded Systems (extended version)
Authors:
Alessandro Trindade,
Hussama Ismail,
Lucas Cordeiro
Abstract:
We present an alternative approach to solve the hardware (HW) and software (SW) partitioning problem, which uses Bounded Model Checking (BMC) based on Satisfiability Modulo Theories (SMT) in conjunction with a multi-core support using Open Multi-Processing. The multi-core SMT-based BMC approach allows initializing many verification instances based on processors cores numbers available to the model…
▽ More
We present an alternative approach to solve the hardware (HW) and software (SW) partitioning problem, which uses Bounded Model Checking (BMC) based on Satisfiability Modulo Theories (SMT) in conjunction with a multi-core support using Open Multi-Processing. The multi-core SMT-based BMC approach allows initializing many verification instances based on processors cores numbers available to the model checker. Each instance checks for a different optimum value until the optimization problem is satisfied. The goal is to show that multi-core model-checking techniques can be effective, in particular cases, to find the optimal solution of the HW-SW partitioning problem using an SMT-based BMC approach. We compare the experimental results of our proposed approach with Integer Linear Programming and the Genetic Algorithm.
△ Less
Submitted 8 September, 2015;
originally announced September 2015.
-
Model Checking Embedded C Software using k-Induction and Invariants (extended version)
Authors:
Herbert Rocha,
Hussama Ismail,
Lucas Cordeiro,
Raimundo Barreto
Abstract:
We present a proof by induction algorithm, which combines k-induction with invariants to model check embedded C software with bounded and unbounded loops. The k-induction algorithm consists of three cases: in the base case, we aim to find a counterexample with up to k loop unwindings; in the forward condition, we check whether loops have been fully unrolled and that the safety property P holds in…
▽ More
We present a proof by induction algorithm, which combines k-induction with invariants to model check embedded C software with bounded and unbounded loops. The k-induction algorithm consists of three cases: in the base case, we aim to find a counterexample with up to k loop unwindings; in the forward condition, we check whether loops have been fully unrolled and that the safety property P holds in all states reachable within k unwindings; and in the inductive step, we check that whenever P holds for k unwindings, it also holds after the next unwinding of the system. For each step of the k-induction algorithm, we infer invariants using affine constraints (i.e., polyhedral) to specify pre- and post-conditions. Experimental results show that our approach can handle a wide variety of safety properties in typical embedded software applications from telecommunications, control systems, and medical devices; we demonstrate an improvement of the induction algorithm effectiveness if compared to other approaches.
△ Less
Submitted 8 September, 2015;
originally announced September 2015.
-
Model Checking C Programs with Loops via k-Induction and Invariants
Authors:
Herbert Rocha,
Hussama Ismail,
Lucas Cordeiro,
Raimundo Barreto
Abstract:
We present a novel proof by induction algorithm, which combines k-induction with invariants to model check C programs with bounded and unbounded loops. The k-induction algorithm consists of three cases: in the base case, we aim to find a counterexample with up to k loop unwindings; in the forward condition, we check whether loops have been fully unrolled and that the safety property P holds in all…
▽ More
We present a novel proof by induction algorithm, which combines k-induction with invariants to model check C programs with bounded and unbounded loops. The k-induction algorithm consists of three cases: in the base case, we aim to find a counterexample with up to k loop unwindings; in the forward condition, we check whether loops have been fully unrolled and that the safety property P holds in all states reachable within k unwindings; and in the inductive step, we check that whenever P holds for k unwindings, it also holds after the next unwinding of the system. For each step of the k-induction algorithm, we infer invariants using affine constraints (i.e., polyhedral) to specify pre- and post-conditions. The algorithm was implemented in two different ways, with and without invariants using polyhedral, and the results were compared. Experimental results show that both forms can handle a wide variety of safety properties; however, the k-induction algorithm adopting polyhedral solves more verification tasks, which demonstrate an improvement of the induction algorithm effectiveness.
△ Less
Submitted 8 February, 2015;
originally announced February 2015.
-
Achievable Degrees-of-Freedom of the K-user SISO Interference Channel with Blind Interference Alignment using Staggered Antenna Switching
Authors:
Ahmed M. Alaa,
Mahmoud H. Ismail
Abstract:
In this letter, we present the first characterization for the achievable Degrees-of-Freedom (DoF) by Blind Interference Alignment (BIA) using staggered antenna switching in the $K$-user Gaussian Interference Channel. In such scheme, each transmitter is equipped with one conventional antenna and each receiver is equipped with one reconfigurable (multi-mode) antenna. Assuming that the channel is kno…
▽ More
In this letter, we present the first characterization for the achievable Degrees-of-Freedom (DoF) by Blind Interference Alignment (BIA) using staggered antenna switching in the $K$-user Gaussian Interference Channel. In such scheme, each transmitter is equipped with one conventional antenna and each receiver is equipped with one reconfigurable (multi-mode) antenna. Assuming that the channel is known to the receivers only, we show that BIA can achieve $\frac{2K}{K+2}$ DoF, which surpasses the sum DoF achieved by previously known interference alignment schemes with delayed channel state information at transmitters (CSIT). This result implies that the sum DoF is upper bounded by 2, which means that the best we can do with BIA is to double the DoF achieved by orthogonal multiple access schemes. Moreover, we propose an algorithm to generate the transmit beamforming vectors and the reconfigurable antenna switching patterns, and apply this algorithm to the 4-user SISO Interference Channel, showing that $\frac{4}{3}$ sum DoF is achievable.
△ Less
Submitted 21 May, 2016; v1 submitted 27 August, 2014;
originally announced August 2014.
-
Opportunistic Beamforming using Dumb Basis Patterns in Multiple Access Cognitive Channels
Authors:
Ahmed M. Alaa,
Mahmoud H. Ismail,
Hazim Tawfik
Abstract:
In this paper, we investigate multiuser diversity in interference-limited Multiple Access (MAC) underlay cognitive channels with Line-of-Sight interference (LoS) from the secondary to the primary network. It is shown that for $N$ secondary users, and assuming Rician interference channels, the secondary sum capacity scales like…
▽ More
In this paper, we investigate multiuser diversity in interference-limited Multiple Access (MAC) underlay cognitive channels with Line-of-Sight interference (LoS) from the secondary to the primary network. It is shown that for $N$ secondary users, and assuming Rician interference channels, the secondary sum capacity scales like $\log\left(\frac{K^{2}+K}{\mathcal{W}\left(\frac{K e^{K}}{N}\right)}\right)$, where $K$ is the $K$-factor of the Rician channels, and $\mathcal{W}(.)$ is the Lambert W function. Thus, LoS interference hinders the achievable multiuser diversity gain experienced in Rayleigh channels, where the sum capacity grows like $\log(N)$. To overcome this problem, we propose the usage of single radio Electronically Steerable Parasitic Array Radiator (ESPAR) antennas at the secondary mobile terminals. Using ESPAR antennas, we induce artificial fluctuations in the interference channels to restore the $\log(N)$ growth rate by assigning random weights to orthogonal {\it basis patterns}. We term this technique as {\it Random Aerial Beamforming} (RAB). While LoS interference is originally a source of capacity hindrance, we show that using RAB, it can actually be exploited to improve multiuser interference diversity by boosting the {\it effective number of users} with minimal hardware complexity.
△ Less
Submitted 5 July, 2014;
originally announced July 2014.
-
Random Aerial Beamforming for Underlay Cognitive Radio with Exposed Secondary Users
Authors:
Ahmed M. Alaa,
Mahmoud H. Ismail,
Hazim Tawfik
Abstract:
In this paper, we introduce the exposed secondary users problem in underlay cognitive radio systems, where both the secondary-to-primary and primary-to-secondary channels have a Line-of-Sight (LoS) component. Based on a Rician model for the LoS channels, we show, analytically and numerically, that LoS interference hinders the achievable secondary user capacity when interference constraints are imp…
▽ More
In this paper, we introduce the exposed secondary users problem in underlay cognitive radio systems, where both the secondary-to-primary and primary-to-secondary channels have a Line-of-Sight (LoS) component. Based on a Rician model for the LoS channels, we show, analytically and numerically, that LoS interference hinders the achievable secondary user capacity when interference constraints are imposed at the primary user receiver. This is caused by the poor dynamic range of the interference channels fluctuations when a dominant LoS component exists. In order to improve the capacity of such system, we propose the usage of an Electronically Steerable Parasitic Array Radiator (ESPAR) antennas at the secondary terminals. An ESPAR antenna involves a single RF chain and has a reconfigurable radiation pattern that is controlled by assigning arbitrary weights to M orthonormal basis radiation patterns via altering a set of reactive loads. By viewing the orthonormal patterns as multiple virtual dumb antennas, we randomly vary their weights over time creating artificial channel fluctuations that can perfectly eliminate the undesired impact of LoS interference. This scheme is termed as Random Aerial Beamforming (RAB), and is well suited for compact and low cost mobile terminals as it uses a single RF chain. Moreover, we investigate the exposed secondary users problem in a multiuser setting, showing that LoS interference hinders multiuser interference diversity and affects the growth rate of the SU capacity as a function of the number of users. Using RAB, we show that LoS interference can actually be exploited to improve multiuser diversity via opportunistic nulling.
△ Less
Submitted 1 August, 2015; v1 submitted 6 June, 2014;
originally announced June 2014.
-
Opportunistic Spectrum Sharing using Dumb Basis Patterns: The Line-of-Sight Interference Scenario
Authors:
Ahmed M. Alaa,
Mahmoud H. Ismail,
Hazim Tawfik
Abstract:
We investigate a spectrum-sharing system with non-severely faded mutual interference links, where both the secondary-to-primary and primary-to-secondary channels have a Line-of-Sight (LoS) component. Based on a Rician model for the LoS channels, we show, analytically and numerically, that LoS interference hinders the achievable secondary user capacity. This is caused by the poor dynamic range of t…
▽ More
We investigate a spectrum-sharing system with non-severely faded mutual interference links, where both the secondary-to-primary and primary-to-secondary channels have a Line-of-Sight (LoS) component. Based on a Rician model for the LoS channels, we show, analytically and numerically, that LoS interference hinders the achievable secondary user capacity. This is caused by the poor dynamic range of the interference channels fluctuations when a dominant LoS component exists. In order to improve the capacity of such system, we propose the usage of an Electronically Steerable Parasitic Array Radiator (ESPAR) antenna at the secondary terminals. An ESPAR antenna requires a single RF chain and has a reconfigurable radiation pattern that is controlled by assigning arbitrary weights to M orthonormal basis radiation patterns. By viewing these orthonormal patterns as multiple virtual dumb antennas, we randomly vary their weights over time creating artificial channel fluctuations that can perfectly eliminate the undesired impact of LoS interference. Because the proposed scheme uses a single RF chain, it is well suited for compact and low cost mobile terminals.
△ Less
Submitted 28 March, 2014;
originally announced March 2014.
-
Spectrum Sensing Via Reconfigurable Antennas: Fundamental Limits and Potential Gains
Authors:
Ahmed M. Alaa,
Mahmoud H. Ismail,
Hazim Tawfik
Abstract:
We propose a novel paradigm for spectrum sensing in cognitive radio networks that provides diversity and capacity benefits using a single antenna at the Secondary User (SU) receiver. The proposed scheme is based on a reconfigurable antenna: an antenna that is capable of altering its radiation characteristics by changing its geometric configuration. Each configuration is designated as an antenna mo…
▽ More
We propose a novel paradigm for spectrum sensing in cognitive radio networks that provides diversity and capacity benefits using a single antenna at the Secondary User (SU) receiver. The proposed scheme is based on a reconfigurable antenna: an antenna that is capable of altering its radiation characteristics by changing its geometric configuration. Each configuration is designated as an antenna mode or state and corresponds to a distinct channel realization. Based on an abstract model for the reconfigurable antenna, we tackle two different settings for the cognitive radio problem and present fundamental limits on the achievable diversity and throughput gains. First, we explore the (to cooperate or not to cooperate) tradeoff between the diversity and coding gains in conventional cooperative and noncooperative spectrum sensing schemes, showing that cooperation is not always beneficial. Based on this analysis, we propose two sensing schemes based on reconfigurable antennas that we term as state switching and state selection. It is shown that each of these schemes outperform both cooperative and non-cooperative spectrum sensing under a global energy constraint. Next, we study the (sensing-throughput) trade-off, and demonstrate that using reconfigurable antennas, the optimal sensing time is reduced allowing for a longer transmission time, and thus better throughput. Moreover, state selection can be applied to boost the capacity of SU transmission.
△ Less
Submitted 4 March, 2014;
originally announced March 2014.
-
Spectrum Sensing Via Reconfigurable Antennas: Is Cooperation of Secondary Users Indispensable?
Authors:
Ahmed M. Alaa,
Mahmoud H. Ismail,
Hazim Tawfik
Abstract:
This work presents an analytical framework for characterizing the performance of cooperative and noncooperative spectrum sensing schemes by figuring out the tradeoff between the achieved diversity and coding gains in each scheme. Based on this analysis, we try to answer the fundamental question: can we dispense with SUs cooperation and still achieve an arbitrary diversity gain? It is shown that th…
▽ More
This work presents an analytical framework for characterizing the performance of cooperative and noncooperative spectrum sensing schemes by figuring out the tradeoff between the achieved diversity and coding gains in each scheme. Based on this analysis, we try to answer the fundamental question: can we dispense with SUs cooperation and still achieve an arbitrary diversity gain? It is shown that this is indeed possible via a novel technique that can offer diversity gain for a single SU using a single antenna. The technique is based on the usage of a reconfigurable antenna that changes its propagation characteristics over time, thus creating an artificial temporal diversity. It is shown that the usage of reconfigurable antennas outperforms cooperative as well as non-cooperative schemes at low and high Signal-to-Noise Ratios (SNRs). Moreover, if the channel state information is available at the SU, an additional SNR gain can also be achieved.
△ Less
Submitted 30 January, 2014;
originally announced January 2014.
-
The IceProd Framework: Distributed Data Processing for the IceCube Neutrino Observatory
Authors:
M. G. Aartsen,
R. Abbasi,
M. Ackermann,
J. Adams,
J. A. Aguilar,
M. Ahlers,
D. Altmann,
C. Arguelles,
J. Auffenberg,
X. Bai,
M. Baker,
S. W. Barwick,
V. Baum,
R. Bay,
J. J. Beatty,
J. Becker Tjus,
K. -H. Becker,
S. BenZvi,
P. Berghaus,
D. Berley,
E. Bernardini,
A. Bernhard,
D. Z. Besson,
G. Binder,
D. Bindig
, et al. (262 additional authors not shown)
Abstract:
IceCube is a one-gigaton instrument located at the geographic South Pole, designed to detect cosmic neutrinos, iden- tify the particle nature of dark matter, and study high-energy neutrinos themselves. Simulation of the IceCube detector and processing of data require a significant amount of computational resources. IceProd is a distributed management system based on Python, XML-RPC and GridFTP. It…
▽ More
IceCube is a one-gigaton instrument located at the geographic South Pole, designed to detect cosmic neutrinos, iden- tify the particle nature of dark matter, and study high-energy neutrinos themselves. Simulation of the IceCube detector and processing of data require a significant amount of computational resources. IceProd is a distributed management system based on Python, XML-RPC and GridFTP. It is driven by a central database in order to coordinate and admin- ister production of simulations and processing of data produced by the IceCube detector. IceProd runs as a separate layer on top of other middleware and can take advantage of a variety of computing resources, including grids and batch systems such as CREAM, Condor, and PBS. This is accomplished by a set of dedicated daemons that process job submission in a coordinated fashion through the use of middleware plugins that serve to abstract the details of job submission and job management from the framework.
△ Less
Submitted 22 August, 2014; v1 submitted 22 November, 2013;
originally announced November 2013.