Short-Packet Amplify-and-Forward Relaying for the Internet-of-Things in the Face of Imperfect Channel Estimation and Hardware Impairments

Author(s):  
Vahid Shahiri ◽  
Ali Kuhestani ◽  
Lajos Hanzo
Computers ◽  
2018 ◽  
Vol 7 (4) ◽  
pp. 48 ◽  
Author(s):  
Lorenzo Vangelista ◽  
Marco Centenaro

Hybrid Automatic Repeat reQuest (HARQ) techniques are widely employed in the most important wireless systems, e.g., the Long Term Evolution (LTE) cellular standard, to increase the reliability of the communication. Despite these schemes have been widely studied in literature in the past several years, the recent results obtained by Polyanskiy, Poor, and Verdú on the finite-blocklength regime disclosed new possibilities for the research on HARQ schemes. Indeed, new communications trends, which are usually part of the Internet of Things (IoT) paradigm, are characterized by very short packet sizes and a high reliability requirement and, therefore, they call for efficient HARQ techniques. In many scenarios, the energy efficiency of the communication plays a key role as well. In this paper, we aim at providing a comprehensive performance comparison of various kinds of HARQ schemes in the context of short-packet transmissions with energy constraints. We derive optimal power allocation strategies and we show that a minimum 50% energy saving can be achieved after very few transmission attempts if we enable packet combining at the receiver side.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Yichuan Wang ◽  
Han Yu ◽  
Xinhong Hei ◽  
Binbin Bai ◽  
Wenjiang Ji

Internet of Things (IoT) is the development and extension of computer, Internet, and mobile communication network and other related technologies, and in the new era of development, it increasingly shows its important role. To play the role of the Internet of Things, it is especially important to strengthen the network communication information security system construction, which is an important foundation for the Internet of Things business relying on Internet technology. Therefore, the communication protocol between IoT devices is a point that cannot be ignored, especially in recent years; the emergence of a large number of botnet and malicious communication has seriously threatened the communication security between connected devices. Therefore, it is necessary to identify these unknown protocols by reverse analysis. Although the development of protocol analysis technology has been quite mature, it is impossible to identify and analyze the unknown protocols of pure bitstreams with zero a priori knowledge using existing protocol analysis tools. In this paper, we make improvements to the existing protocol analysis algorithm, summarize and learn from the experience and knowledge of our predecessors, improve the algorithm ideas based on the Apriori algorithm idea, and perform feature string finding under the idea of composite features of CFI (Combined Frequent Items) algorithm. The advantages of existing algorithm ideas are combined together to finally propose a more efficient OFS (Optimal Feature Strings) algorithm with better performance in the face of bitstream protocol feature extraction problems.


Intruders usually break into houses with the intention of committing burglaries. This research proposed a development of an intrusion detection and security Alarm System using the Internet of Things. The methodology of the proposed system consists of five components. First, the hardware components are Raspberry Pi 3 Model B+, a camera for Raspberry Pi, motion sensors, relays and speakers, while the software system was developed by Python. Second, the architecture of the proposed system. Third, the design and construction of the electronic circuit connected with sensors. Fourth, the intruder image analysis for the alarm system using OpenCV and Deep Learning. The face detected by the camera was compared with homeowner’s pictures. If the detected face was not the homeowner, the system alarms the user or the owner via the smartphone LINE Application. Last, the Anto, which is the free and easy Internet of Things platform, connect the devices and the smartphone application together via the internet. Hence, the users or homeowners can control the devices or take the picture from a distance using a smartphone. The experimental results show that the proposed system can detect the intruder and alarm the homeowner via LINE Application on the smartphone. The experimental results show that the proposed system can efficiently detect the intruder and alarm the homeowner via LINE Application on the smartphone. The performance of the proposed system is excellent with the average score of 97.40%. The developed application on the Android smartphone is user-friendly, simple and efficient as well.


2019 ◽  
Vol 6 (4) ◽  
pp. 5990-5998 ◽  
Author(s):  
Zhenyu Na ◽  
Zheng Pan ◽  
Mudi Xiong ◽  
Junjuan Xia ◽  
Weidang Lu

2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


2019 ◽  
pp. 4-44 ◽  
Author(s):  
Peter Thorns

This paper discusses the organisations involved in the development of application standards, European regulations and best practice guides, their scope of work and internal structures. It considers their respective visions for the requirements for future standardisation work and considers in more detail those areas where these overlap, namely human centric or integrative lighting, connectivity and the Internet of Things, inclusivity and sustainability.


Sign in / Sign up

Export Citation Format

Share Document