itcsbanner.jpg

Collision Probability Computation for Road Intersections Based on Vehicle to Infrastructure Communication

In recent years, many probability models proposed to calculate the collision probability for each vehicle and those models used in collision avoidance algorithms and intersection management algorithms. In this paper, we introduce a method to calculate the collision probability of vehicles at an urban intersection. The proposed model uses the current position, speed, acceleration, and turning direction then each vehicle shares its required information to the roadside unit (RSU) via the Vehicle to Infrastructures (V2I). RSU can predict each vehicle's path in intersections by using the received

Artificial Intelligence
Software and Communications

Overlapping multihop clustering for wireless sensor networks

Clustering is a standard approach for achieving efficient and scalable performance in wireless sensor networks. Traditionally, clustering algorithms aim at generating a number of disjoint clusters that satisfy some criteria. In this paper, we formulate a novel clustering problem that aims at generating overlapping multihop clusters. Overlapping clusters are useful in many sensor network applications, including intercluster routing, node localization, and time synchronization protocols. We also propose a randomized, distributed multihop clustering algorithm (KOCA) for solving the overlapping

Artificial Intelligence
Software and Communications

Feedback-based access schemes in CR networks: A reinforcement learning approach

In this paper, we propose a Reinforcement Learning-based MAC layer protocol for cognitive radio networks, based on exploiting the feedback of the Primary User (PU). Our proposed model relies on two pillars, namely an infinite-state Partially Observable Markov Decision Process (POMDP) to model the system dynamics besides a queuing-theoretic model for the PU queue, where the states represent whether a packet is delivered or not from the PU's queue and the PU channel state. Based on the stability constraint for the primary user queue, the quality of service (QoS) for the PU is guaranteed. Towards

Artificial Intelligence
Software and Communications

Real-Time Collision Warning System Based on Computer Vision Using Mono Camera

This paper aims to help self-driving cars and autonomous vehicles systems to merge with the road environment safely and ensure the reliability of these systems in real life. Crash avoidance is a complex system that depends on many parameters. The forward-collision warning system is simplified into four main objectives: detecting cars, depth estimation, assigning cars into lanes (lane assign) and tracking technique. The presented work targets the software approach by using YOLO (You Only Look Once), which is a deep learning object detector network to detect cars with an accuracy of up to 93%

Artificial Intelligence
Software and Communications

Optimum functional splits for optimizing energy consumption in V-RAn

A virtualized radio access network (V-RAN) is considered one of the key research points in the development of 5G and the interception of machine learning algorithms in the Telecom industry. Recent technological advancements in Network Function Virtualization (NFV) and Software Defined Radio (SDR) are the main blocks towards V-RAN that have enabled the virtualization of dual-site processing instead of all BBU processing as in the traditional RAN. As a result, several types of research discussed the trade-off between power and bandwidth consumption in V-RAN. Processing at remote locations

Artificial Intelligence
Software and Communications

Interference alignment for secrecy

This paper studies the frequency/time selective K-user Gaussian interference channel with secrecy constraints. Two distinct models, namely the interference channel with confidential messages and the interference channel with an external eavesdropper, are analyzed. The key difference between the two models is the lack of channel state information (CSI) of the external eavesdropper. Using interference alignment along with secrecy precoding, it is shown that each user can achieve non-zero secure degrees of freedom (DoF) for both cases. More precisely, the proposed coding scheme achieves K-2/2K-2

Artificial Intelligence
Software and Communications

An artificial intelligence approach for solving stochastic transportation problems

Recent years witness a great deal of interest in artificial intelligence (AI) tools in the area of optimization. AI has developed a large number of tools to solve the most difficult search-and-optimization problems in computer science and operations research. Indeed, metaheuristic-based algorithms are a sub-field of AI. This study presents the use of the metaheuristic algorithm, that is, water cycle algorithm (WCA), in the transportation problem. A stochastic transportation problem is considered in which the parameters supply and demand are considered as random variables that follow the

Artificial Intelligence
Software and Communications

Graph transformer for communities detection in social networks

Graphs are used in various disciplines such as telecommunication, biological networks, as well as social networks. In large-scale networks, it is challenging to detect the communities by learning the distinct properties of the graph. As deep learning has made contributions in a variety of domains, we try to use deep learning techniques to mine the knowledge from large-scale graph networks. In this paper, we aim to provide a strategy for detecting communities using deep autoencoders and obtain generic neural attention to graphs. The advantages of neural attention are widely seen in the field of

Artificial Intelligence
Software and Communications

Novel reliability-based hybrid ARQ technique

In this paper we propose a novel technique for hybrid automatic repeat request (HARQ) systems where turbo codes are used as the forward error correction (FEC) techniques. This technique uses the histogram of the soft values generated by the turbo decoder to control the size and the contents of the retransmissions needed when the packet can not be decoded correctly. These soft values represent the reliabilities of the information bits; hence the proposed technique is a reliability-based (RB) HARQ technique. The proposed technique is compared to the conventional RB-HARQ and the conventional rate

Artificial Intelligence
Software and Communications

A Digital Hardware Implementation for A new Mixed-Order Nonlinear 3-D Chaotic System

This paper introduces a generic modeling for a 3-D nonlinear chaotic based on fractional-order mathematical rules. Also, a novel modeling for the system using a mixture between integer and fractional-order calculus is proposed. Dynamics of the new realization are illustrated using phase portrait diagrams with complex behavior. Also, a great change in the parameter ranges is investigated using bifurcation diagrams. MATLAB and Xilinx ISE 14.5 are used in system simulations. Furthermore, the digital hardware implementation is done using Xilinx FPGA Virtex-5 kit. The synthesis report shows that

Circuit Theory and Applications
Software and Communications
Mechanical Design