50 results on '"Hoang, Dinh Thai"'
Search Results
2. Variation in quinoa roots growth responses to drought stresses.
- Author
-
Nguyen, Loc Van, Bertero, Daniel, Hoang, Dinh Thai, and Long, Nguyen Viet
- Subjects
QUINOA ,ROOT growth ,DROUGHT tolerance ,ROOT development ,PLANT indicators ,DROUGHTS - Abstract
Soil moisture stress has become a serious environmental limitation to crop productivity and quality. The root system is the first organ sensing the changes in soil moisture; therefore, root development under water deficit is an important indicator for plant's drought tolerance. Previous studies focused on quinoa varietal differences in morphological traits under water stress; however, variation in root development including both growth and diameter responses to drought remains largely unclear. We conducted a preliminary screening of a diverse set of 30 quinoa genotypes to evaluate genetic variation in growth and yield performance in response to drought stress. Variation in drought tolerance indices showed large variation across the quinoa collection. Based on these results, five genotypes representative of a range of drought tolerance levels including 2‐Want, Atlas, NL‐6, Pichamán and Sayaña were selected to evaluate root development under control and severe drought conditions. Inhibition of root development was found for all genotypes as compared to controls; however, significant variation in root growth response to drought stress was observed. Among genotypes, Atlas and 2‐Want expressed drought‐tolerant phenotypes. The analysis of the interrelations between genotypes root length, root diameter, root surface area, drought tolerance and geographical origins reveals interesting guidelines for further studies to explore the mechanisms behind quinoa roots adaptation to drought. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
3. BlockRoam: Blockchain-Based Roaming Management System for Future Mobile Networks.
- Author
-
Nguyen, Cong T., Nguyen, Diep N., Hoang, Dinh Thai, Pham, Hoang-Anh, Tuong, Nguyen Huynh, Xiao, Yong, and Dutkiewicz, Eryk
- Subjects
BLOCKCHAINS ,FRAUD ,ECONOMIC models ,COMPUTER network security ,ELECTRONIC data processing ,INFORMATION sharing - Abstract
Mobile service providers (MSPs) are particularly vulnerable to roaming frauds, especially ones that exploit the long delay in the data exchange process of the contemporary roaming management systems, causing multi-billion dollars loss each year. In this paper, we introduce BlockRoam, a novel blockchain-based roaming management system that provides an efficient data exchange platform among MSPs and mobile subscribers. Utilizing the Proof-of-Stake (PoS) consensus mechanism and smart contracts, BlockRoam can significantly shorten the information exchanging delay, thereby addressing the roaming fraud problems. Through intensive analysis, we show that the security and performance of such PoS-based blockchain network can be further enhanced by incentivizing more users (e.g., subscribers) to participate in the network. Moreover, users in such networks often join stake pools (e.g., formed by MSPs) to increase their profits. Therefore, we develop an economic model based on Stackelberg game to jointly maximize the profits of the network users and the stake pool, thereby encouraging user participation. We also propose an effective method to guarantee the uniqueness of this game’s equilibrium. The performance evaluations show that the proposed economic model helps the MSPs to earn additional profits, attracts more investment to the blockchain network, and enhances the network’s security and performance. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. Defeating Super-Reactive Jammers With Deception Strategy: Modeling, Signal Detection, and Performance Analysis.
- Author
-
Van Huynh, Nguyen, Nguyen, Diep N., Hoang, Dinh Thai, Vu, Thang X., Dutkiewicz, Eryk, and Chatzinotas, Symeon
- Abstract
This paper develops a novel framework to defeat a super-reactive jammer, one of the most difficult jamming attacks to deal with in practice. Specifically, the jammer has an unlimited power budget and is equipped with the self-interference suppression capability to simultaneously attack and listen to the transmitter’s activities. Consequently, dealing with super-reactive jammers is very challenging. Thus, we introduce a smart deception mechanism to attract the jammer to continuously attack the channel and then leverage jamming signals to transmit data based on the ambient backscatter communication technology. To detect the backscattered signals, the maximum likelihood detector can be adopted. However, this method is notorious for its high computational complexity and requires the model of the current propagation environment as well as channel state information. Hence, we propose a deep learning-based detector that can dynamically adapt to any channels and noise distributions. With a Long Short-Term Memory network, our detector can learn the received signals’ dependencies to achieve a performance close to that of the optimal maximum likelihood detector. Through simulation and theoretical results, we demonstrate that with our approaches, the more power the jammer uses to attack the channel, the better bit error rate performance the transmitter can achieve. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
5. Federated Learning Meets Contract Theory: Economic-Efficiency Framework for Electric Vehicle Networks.
- Author
-
Saputra, Yuris Mulya, Nguyen, Diep N., Hoang, Dinh Thai, Vu, Thang X., Dutkiewicz, Eryk, and Chatzinotas, Symeon
- Subjects
CONTRACT theory ,ELECTRIC networks ,CASCADING style sheets ,DATA privacy ,ENERGY consumption - Abstract
In this paper, we propose a novel economic-efficiency framework for an electric vehicle (EV) network to maximize the profits (i.e., the amount of money that can be earned) for charging stations (CSs). To that end, we first introduce an energy demand prediction method for CSs leveraging federated learning approaches, in which each CS can train its own energy transactions locally and exchange its learned model with other CSs to improve the learning quality while protecting the CS's information privacy. Based on the predicted energy demands, each CS can reserve energy from the smart grid provider (SGP) in advance to optimize its profit. Nonetheless, due to the competition among the CSs as well as unknown information from the SGP, i.e., the willingness to transfer energy, we develop a multi-principal one-agent (MPOA) contract-based method to address these issues. In particular, we formulate the CSs’ profit maximization as a non-collaborative energy contract problem under the SGP's unknown information and common constraints as well as other CSs’ contracts. To solve this problem, we transform it into an equivalent low-complexity optimization problem and develop an iterative algorithm to find the optimal contracts for the CSs. Through simulation results using a real CS dataset, we demonstrate that our proposed framework can enhance energy demand prediction accuracy up to 24.63 percent compared with other machine learning algorithms. Furthermore, our proposed framework can outperform other economic models by 48 and 36 percent in terms of the CSs’ utilities and social welfare (i.e., the total profits of all participating entities) of the network, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
6. Transfer Learning for Wireless Networks: A Comprehensive Survey.
- Author
-
Nguyen, Cong T., Van Huynh, Nguyen, Chu, Nam H., Saputra, Yuris Mulya, Hoang, Dinh Thai, Nguyen, Diep N., Pham, Quoc-Viet, Niyato, Dusit, Dutkiewicz, Eryk, and Hwang, Won-Joo
- Subjects
HUMAN activity recognition ,SPECTRUM allocation ,NEXT generation networks ,MACHINE learning ,WIRELESS sensor networks - Abstract
With outstanding features, machine learning (ML) has become the backbone of numerous applications in wireless networks. However, the conventional ML approaches face many challenges in practical implementation, such as the lack of labeled data, the constantly changing wireless environments, the long training process, and the limited capacity of wireless devices. These challenges, if not addressed, can impede the effectiveness and applicability of ML in wireless networks. To address these problems, transfer learning (TL) has recently emerged to be a promising solution. The core idea of TL is to leverage and synthesize distilled knowledge from similar tasks and valuable experiences accumulated from the past to facilitate the learning of new problems. By doing so, TL techniques can reduce the dependence on labeled data, improve the learning speed, and enhance the ML methods’ robustness to different wireless environments. This article aims to provide a comprehensive survey on the applications of TL in wireless networks. Particularly, we first provide an overview of TL, including formal definitions, classification, and various types of TL techniques. We then discuss diverse TL approaches proposed to address emerging issues in wireless networks. The issues include spectrum management, signal recognition, security, caching, localization, and human activity recognition, which are all important to next-generation networks, such as 5G and beyond. Finally, we highlight important challenges, open issues, and future research directions of TL in future wireless networks. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
7. Transferable Deep Reinforcement Learning Framework for Autonomous Vehicles With Joint Radar-Data Communications.
- Author
-
Hieu, Nguyen Quang, Hoang, Dinh Thai, Niyato, Dusit, Wang, Ping, Kim, Dong In, and Yuen, Chau
- Subjects
REINFORCEMENT learning ,MACHINE learning ,AUTONOMOUS vehicles ,TRAFFIC safety ,DATA transmission systems ,MARKOV processes ,TRACKING radar - Abstract
Autonomous Vehicles (AVs) are required to operate safely and efficiently in dynamic environments. For this, the AVs equipped with Joint Radar-Communications (JRC) functions can enhance the driving safety by utilizing both radar detection and data communication functions. However, optimizing the performance of the AV system with two different functions under uncertainty and dynamic of surrounding environments is very challenging. In this work, we first propose an intelligent optimization framework based on the Markov Decision Process (MDP) to help the AV make optimal decisions in selecting JRC operation functions under the dynamic and uncertainty of the surrounding environment. We then develop an effective learning algorithm leveraging recent advances of deep reinforcement learning techniques to find the optimal policy for the AV without requiring any prior information about surrounding environment. Furthermore, to make our proposed framework more scalable, we develop a Transfer Learning (TL) mechanism that enables the AV to leverage valuable experiences for accelerating the training process when it moves to a new environment. Extensive simulations show that the proposed transferable deep reinforcement learning framework reduces the obstacle miss detection probability by the AV up to 67% compared to other conventional deep reinforcement learning approaches. With the deep reinforcement learning and transfer learning approaches, our proposed solution can find its applications in a wide range of autonomous driving scenarios from driver assistance to full automation transportation. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. Learning Latent Representation for IoT Anomaly Detection.
- Author
-
Vu, Ly, Cao, Van Loi, Nguyen, Quang Uy, Nguyen, Diep N., Hoang, Dinh Thai, and Dutkiewicz, Eryk
- Abstract
Internet of Things (IoT) has emerged as a cutting-edge technology that is changing human life. The rapid and widespread applications of IoT, however, make cyberspace more vulnerable, especially to IoT-based attacks in which IoT devices are used to launch attack on cyber-physical systems. Given a massive number of IoT devices (in order of billions), detecting and preventing these IoT-based attacks are critical. However, this task is very challenging due to the limited energy and computing capabilities of IoT devices and the continuous and fast evolution of attackers. Among IoT-based attacks, unknown ones are far more devastating as these attacks could surpass most of the current security systems and it takes time to detect them and “cure” the systems. To effectively detect new/unknown attacks, in this article, we propose a novel representation learning method to better predictively “describe” unknown attacks, facilitating supervised learning-based anomaly detection methods. Specifically, we develop three regularized versions of autoencoders (AEs) to learn a latent representation from the input data. The bottleneck layers of these regularized AEs trained in a supervised manner using normal data and known IoT attacks will then be used as the new input features for classification algorithms. We carry out extensive experiments on nine recent IoT datasets to evaluate the performance of the proposed models. The experimental results demonstrate that the new latent representation can significantly enhance the performance of supervised learning methods in detecting unknown IoT attacks. We also conduct experiments to investigate the characteristics of the proposed models and the influence of hyperparameters on their performance. The running time of these models is about 1.3 ms that is pragmatic for most applications. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. Joint Coding and Scheduling Optimization for Distributed Learning Over Wireless Edge Networks.
- Author
-
Van Huynh, Nguyen, Hoang, Dinh Thai, Nguyen, Diep N., and Dutkiewicz, Eryk
- Subjects
LINEAR network coding ,MARKOV processes ,REINFORCEMENT learning ,HETEROGENEOUS computing ,MACHINE learning ,DEEP learning - Abstract
Unlike theoretical analysis of distributed learning (DL) in the literature, DL over wireless edge networks faces the inherent dynamics/uncertainty of wireless connections and edge nodes, making DL less efficient or even inapplicable under the highly dynamic wireless edge networks. This article addresses these problems by leveraging recent advances in coded computing and the deep dueling neural network architecture. By introducing coded structures/redundancy, a distributed learning task can be completed without waiting for straggling nodes. Unlike conventional coded computing that only optimizes the code structure, coded distributed learning over the wireless edge also requires to optimize the selection/scheduling of wireless edge nodes with heterogeneous connections, computing capability, and straggling effects. However, even neglecting the aforementioned dynamics/uncertainty, the resulting joint optimization of coding and scheduling to minimize the distributed learning time turns out to be NP-hard. To tackle this and to account for the dynamics and uncertainty of wireless connections and edge nodes, we reformulate the problem as a Markov Decision Process and design a novel deep reinforcement learning algorithm that employs the deep dueling neural network architecture to find the jointly optimal coding scheme and the best set of edge nodes for different learning tasks without explicit information about the wireless environment and edge nodes’ straggling parameters. Simulations show that the proposed framework reduces the average learning delay in wireless edge computing up to 66% compared with other DL approaches. The jointly optimal framework in this article is also applicable to any distributed learning scheme with heterogeneous and uncertain computing nodes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
10. Optimization-Driven Hierarchical Learning Framework for Wireless Powered Backscatter-Aided Relay Communications.
- Author
-
Gong, Shimin, Zou, Yuze, Xu, Jing, Hoang, Dinh Thai, Lyu, Bin, and Niyato, Dusit
- Abstract
In this paper, we employ multiple wireless-powered relays to assist information transmission from a multi-antenna access point to a single-antenna receiver. The wireless relays can operate in either the passive mode via backscatter communications or the active mode via RF communications, depending on their channel conditions and energy states. We aim to maximize the overall throughput by jointly optimizing the transmit beamforming and the relays’ radio modes and operating parameters. Due to the non-convex and combinatorial problem structure, we develop a novel optimization-driven hierarchical deep deterministic policy gradient (H-DDPG) approach to adapt the beamforming and relay strategies. The optimization-driven H-DDPG algorithm firstly decomposes the binary relay mode selection into the outer-loop deep $Q$ -network (DQN) algorithm and then optimizes the continuous beamforming and relaying strategies by using the inner-loop DDPG algorithm. Secondly, to improve the learning efficiency, we integrate the model-based optimization into the inner-loop DDPG framework by providing a better-informed target estimation for DNN training. Simulation results reveal that these two special designs ensure a more stable learning performance and achieve a higher reward, up to 20%, compared to the conventional model-free DDPG approach. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. Secure Wirelessly Powered Networks at the Physical Layer: Challenges, Countermeasures, and Road Ahead.
- Author
-
Lu, Xiao, Cong Luong, Nguyen, Hoang, Dinh Thai, Niyato, Dusit, Xiao, Yong, and Wang, Ping
- Subjects
PHYSICAL layer security ,ENERGY harvesting ,WIRELESS sensor networks - Abstract
Harvesting wireless power to energize miniature devices has been envisioned as a promising solution to sustain future-generation energy-sensitive networks, e.g., Internet-of-Things systems. However, due to the limited computing and communication capabilities, wirelessly powered networks (WPNs) may be incapable of employing complex security practices, e.g., encryption, which may incur considerable computation and communication overheads. This challenge makes securing energy harvesting communications an arduous task and, thus, limits the use of WPNs in many high-security applications. In this context, security at the physical layer (PHY) that exploits the intrinsic properties of the wireless medium to achieve secure communication has emerged as an alternative paradigm. This article first introduces the fundamental principles of primary PHY attacks, covering jamming, eavesdropping, and detection of covert, and then presents an overview of the prevalent countermeasures to secure both active and passive communications in WPNs. Furthermore, a number of open research issues are identified to inspire possible future research. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
12. IRS-Assisted Downlink and Uplink NOMA in Wireless Powered Communication Networks.
- Author
-
Lyu, Bin, Ramezani, Parisa, Hoang, Dinh Thai, and Jamalipour, Abbas
- Subjects
WIRELESS communications ,REFLECTANCE ,ENERGY transfer ,SIGNAL-to-noise ratio ,RESOURCE allocation - Abstract
This paper studies the integration of the newly-emerged intelligent reflecting surface (IRS) technology into non-orthogonal multiple access (NOMA)-based wireless powered communication networks (WPCNs). We consider two WPCNs which communicate with a common hybrid access point (HAP), where there exists two types of devices in each WPCN, namely information receiving device (IRD) and harvest-then-transmit device (HTTD). Downlink communication from the HAP to IRDs, downlink energy transfer (ET) from the HAP to HTTDs, and uplink information transmission (IT) from the HTTDs to the HAP are assisted by two IRSs, one in each WPCN. Under this setup, we propose efficient algorithms to optimize reflection coefficients, beamforming vectors, and resource allocation for the sake of uplink sum-rate maximization, taking into account the minimum rate requirement at the IRDs. Numerical results show the considerable performance gain of the proposed NOMA-based scheme as compared to the conventional orthogonal multiple access (OMA)-based counterpart. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
13. DeepFake: Deep Dueling-Based Deception Strategy to Defeat Reactive Jammers.
- Author
-
Van Huynh, Nguyen, Hoang, Dinh Thai, Nguyen, Diep N., and Dutkiewicz, Eryk
- Abstract
In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy to deal with reactive jamming attacks. In particular, for a smart and reactive jamming attack, the jammer is able to sense the channel and attack the channel if it detects communications from the legitimate transmitter. To deal with such attacks, we propose an intelligent deception strategy which allows the legitimate transmitter to transmit “fake” signals to attract the jammer. Then, if the jammer attacks the channel, the transmitter can leverage the strong jamming signals to transmit data by using ambient backscatter communication technology or harvest energy from the strong jamming signals for future use. By doing so, we can not only undermine the attack ability of the jammer, but also utilize jamming signals to improve the system performance. To effectively learn from and adapt to the dynamic and uncertainty of jamming attacks, we develop a novel deep reinforcement learning algorithm using the deep dueling neural network architecture to obtain the optimal policy with thousand times faster than those of the conventional reinforcement algorithms. Extensive simulation results reveal that our proposed DeepFake framework is superior to other anti-jamming strategies in terms of throughput, packet loss, and learning rate. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
14. Time Scheduling and Energy Trading for Heterogeneous Wireless-Powered and Backscattering-Based IoT Networks.
- Author
-
Nguyen, Ngoc-Tan, Nguyen, Diep N., Hoang, Dinh Thai, Van Huynh, Nguyen, Dutkiewicz, Eryk, Nguyen, Nam-Hoang, and Nguyen, Quoc-Tuan
- Abstract
This article studies the strategic interactions between an IoT service provider (IoTSP) which consists of heterogeneous IoT devices and its energy service provider (ESP). To that end, we propose an economic framework using the Stackelberg game to maximize the network throughput and energy efficiency of both the IoTSP and ESP. To obtain the Stackelberg equilibrium (SE), we apply a backward induction technique which first derives a closed-form solution for the ESP (follower). Then, to tackle the non-convex optimization problem for the IoTSP (leader), we leverage the block coordinate descent and convex-concave procedure techniques to design two partitioning schemes (i.e., partial adjustment (PA) and joint adjustment (JA)) to find the optimal energy price and service time that constitute local SEs. Numerical results reveal that by jointly optimizing the energy trading and time allocation for IoT devices, one can achieve significant improvements in terms of the IoTSP’s profit compared with those of conventional transmission methods (up to 38.7 folds). Different tradeoffs between the ESP’s and IoTSP’s profits and complexities of the PA/JA schemes can also be numerically tuned. Simulations also show that the obtained local SEs approach the optimal social welfare when the benefit per transmitted bit exceeds a given threshold. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
15. Optimal Beam Association for High Mobility mmWave Vehicular Networks: Lightweight Parallel Reinforcement Learning Approach.
- Author
-
Van Huynh, Nguyen, Nguyen, Diep N., Hoang, Dinh Thai, and Dutkiewicz, Eryk
- Subjects
REINFORCEMENT learning ,INTELLIGENT transportation systems ,MILLIMETER waves ,PARALLEL algorithms ,DEEP learning - Abstract
In intelligent transportation systems (ITS), vehicles are expected to feature with advanced applications and services which demand ultra-high data rates and low-latency communications. For that, the millimeter wave (mmWave) communication has been emerging as a very promising solution. However, incorporating the mmWave into ITS is particularly challenging due to the high mobility of vehicles and the inherent sensitivity of mmWave beams to dynamic blockages. This article addresses these problems by developing an optimal beam association framework for mmWave vehicular networks under high mobility. Specifically, we use the semi-Markov decision process to capture the dynamics and uncertainty of the environment. The Q-learning algorithm is then often used to find the optimal policy. However, Q-learning is notorious for its slow-convergence. Instead of adopting deep reinforcement learning structures (like most works in the literature), we leverage the fact that there are usually multiple vehicles on the road to speed up the learning process. To that end, we develop a lightweight yet very effective parallel Q-learning algorithm to quickly obtain the optimal policy by simultaneously learning from various vehicles. Extensive simulations demonstrate that our proposed solution can increase the data rate by 47% and reduce the disconnection probability by 29% compared to other solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
16. Radio Resource Management in Joint Radar and Communication: A Comprehensive Survey.
- Author
-
Luong, Nguyen Cong, Lu, Xiao, Hoang, Dinh Thai, Niyato, Dusit, and Kim, Dong In
- Published
- 2021
- Full Text
- View/download PDF
17. Optimal Energy Efficiency With Delay Constraints for Multi-Layer Cooperative Fog Computing Networks.
- Author
-
Vu, Thai T., Nguyen, Diep N., Hoang, Dinh Thai, Dutkiewicz, Eryk, and Nguyen, Thuy V.
- Subjects
ENERGY consumption ,RESOURCE allocation ,REAL variables ,ALGORITHMS ,PARALLEL processing ,MOBILE computing - Abstract
We develop a joint offloading and resource allocation framework for a multi-layer cooperative fog computing network, aiming to minimize the total energy consumption of multiple mobile devices subject to their service delay requirements. The resulting optimization involves both binary (offloading decisions) and real variables (resource allocations), making it an NP-hard and computationally intractable problem. To tackle it, we first propose an improved branch-and-bound algorithm (IBBA) that is implemented in a centralized manner. However, due to the large size of the cooperative fog computing network, the computational complexity of the proposed IBBA is relatively high. To speed up the optimal solution searching as well as to enable its distributed implementation, we then leverage the unique structure of the underlying problem and the parallel processing at fog nodes. To that end, we propose a distributed framework, namely feasibility finding Benders decomposition (FFBD), that decomposes the original problem into a master problem for the offloading decision and subproblems for resource allocation. The master problem (MP) is then equipped with powerful cutting-planes to exploit the fact of resource limitation at fog nodes. The subproblems (SP) for resource allocation can find their closed-form solutions using our fast solution detection method. These (simpler) subproblems can then be solved in parallel at fog nodes. The numerical results show that the FFBD always returns the optimal solution of the problem with significantly less computation time (e.g., compared with the centralized IBBA approach). The FFBD with the fast solution detection method, namely FFBD-F, can reduce up to 60% and 90% of computation time, respectively, compared with those of the conventional FFBD, namely FFBD-S, and IBBA. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
18. A Novel Mobile Edge Network Architecture with Joint Caching-Delivering and Horizontal Cooperation.
- Author
-
Saputra, Yuris Mulya, Hoang, Dinh Thai, Nguyen, Diep N., and Dutkiewicz, Eryk
- Subjects
INTERIOR-point methods ,ALGORITHMS ,DISTRIBUTED algorithms ,STATISTICAL decision making ,NONLINEAR programming - Abstract
Mobile edge caching/computing (MEC) has been emerging as a promising paradigm to provide ultra-high rate, ultra-reliable, and/or low-latency communications in future wireless networks. In this paper, we introduce a novel MEC network architecture that leverages the optimal joint caching-delivering with horizontal cooperation among mobile edge nodes (MENs). To that end, we first formulate the content-access delay minimization problem by jointly optimizing the content caching and delivering decisions under various network constraints (e.g., network topology, storage capacity and users’ demands at each MEN). However, the strongly mutual dependency between the decisions makes the problem a nested dual optimization that is proved to be NP-hard. To deal with it, we propose a novel transformation method to transform the nested dual problem to an equivalent mixed-integer nonlinear programming (MINLP) optimization problem. Then, we design a centralized solution using an improved branch-and-bound algorithm with the interior-point method to find the joint caching and delivering policy which is within 1 percent of the optimal solution. Since the centralized solution requires the full network topology and information from all MENs, to make our solution scalable, we develop a distributed algorithm which allows each MEN to make its own decisions based on its local observations. Extensive simulations demonstrate that the proposed solutions can reduce the total average delay for the whole network up to 40 percent compared with other current caching policies. Furthermore, the proposed solutions also increase the cache hit ratio for the network up to 4 times, thereby dramatically reducing the traffic load on the backhaul network. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
19. Optimized Energy and Information Relaying in Self-Sustainable IRS-Empowered WPCN.
- Author
-
Lyu, Bin, Ramezani, Parisa, Hoang, Dinh Thai, Gong, Shimin, Yang, Zhen, and Jamalipour, Abbas
- Subjects
WIRELESS communications ,ENERGY harvesting ,RESOURCE allocation ,ENERGY transfer ,SIGNAL processing - Abstract
This paper proposes a hybrid-relaying scheme empowered by a self-sustainable intelligent reflecting surface (IRS) in a wireless powered communication network (WPCN), to simultaneously improve the performance of downlink energy transfer (ET) from a hybrid access point (HAP) to multiple users and uplink information transmission (IT) from users to the HAP. We propose time-switching (TS) and power-splitting (PS) schemes for the IRS, where the IRS can harvest energy from the HAP’s signals by switching between energy harvesting and signal reflection in the TS scheme or adjusting its reflection amplitude in the PS scheme. For both the TS and PS schemes, we formulate the sum-rate maximization problems by jointly optimizing the IRS’s phase shifts for both ET and IT and network resource allocation. To address each problem’s non-convexity, we propose a two-step algorithm to obtain the near-optimal solution with high accuracy. To show the structure of resource allocation, we also investigate the optimal solutions for the schemes with random phase shifts. Through numerical results, we show that our proposed schemes can achieve significant system sum-rate gain compared to the baseline scheme without IRS. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
20. Toward Smart Wireless Communications via Intelligent Reflecting Surfaces: A Contemporary Survey.
- Author
-
Gong, Shimin, Lu, Xiao, Hoang, Dinh Thai, Niyato, Dusit, Shu, Lei, Kim, Dong In, and Liang, Ying-Chang
- Published
- 2020
- Full Text
- View/download PDF
21. Wireless Powered Intelligent Reflecting Surfaces for Enhancing Wireless Communications.
- Author
-
Zou, Yuze, Gong, Shimin, Xu, Jing, Cheng, Wenqing, Hoang, Dinh Thai, and Niyato, Dusit
- Subjects
ENERGY harvesting ,TIME management ,ARRAY processing ,MISO ,BEAMFORMING ,TRANSMITTERS (Communication) ,INTELLIGENT transportation systems - Abstract
Recently, the intelligent reflecting surface (IRS) has become a promising technology for energy-, and spectrum-efficient communications by reconfiguring the radio environment. In this paper, we consider multiple-input single-output (MISO) transmissions from a multi-antenna access point (AP) to a receiver, assisted by a practical IRS with a power budget constraint. The IRS can work in energy harvesting, and signal reflecting phases. It firstly harvests RF energy from the AP's signal beamforming, and then uses it to sustain its operations in the signal reflecting phase. We aim to characterize the maximum capacity by optimizing the AP's transmit beamforming, the IRS's time allocation in two operational phases, and the IRS's passive beamforming to enhance the information rate. To solve the non-convex maximization problem, we exploit its structural properties, and decompose it into two sub-problems in two phases. The IRS's phase shift optimization in the reflecting phase follows a conventional passive beamforming problem to maximize the received signal power. In the energy harvesting phase, the IRS's time allocation, and the AP's transmit beamforming are jointly optimized using monotonic optimization. Simulation results verify the effectiveness of the proposed algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
22. Federated Learning in Mobile Edge Networks: A Comprehensive Survey.
- Author
-
Lim, Wei Yang Bryan, Luong, Nguyen Cong, Hoang, Dinh Thai, Jiao, Yutao, Liang, Ying-Chang, Yang, Qiang, Niyato, Dusit, and Miao, Chunyan
- Published
- 2020
- Full Text
- View/download PDF
23. "Borrowing Arrows with Thatched Boats": The Art of Defeating Reactive Jammers in IoT Networks.
- Author
-
Hoang, Dinh Thai, Nguyen, Diep N., Alsheikh, Mohammad Abu, Gong, Shimin, Dutkiewicz, Eryk, Niyato, Dusit, and Han, Zhu
- Abstract
In this article, we introduce a novel deception strategy inspired by the "Borrowing Arrows with Thatched Boats" strategy, one of the most famous military tactics in history, in order to defeat reactive jamming attacks for low-power IoT networks. Our proposed strategy allows resource-constrained IoT devices to be able to defeat powerful reactive jammers by leveraging their own jamming signals. More specifically, by stimulating the jammer to attack the channel through transmitting fake transmissions, the IoT system can not only undermine the jammer's power, but also harvest energy or utilize jamming signals as a communication means to transmit data through using RF energy harvesting and ambient backscatter techniques, respectively. Furthermore, we develop a low-cost deep reinforcement learning framework that enables the hardware-constrained IoT device to quickly obtain an optimal defense policy without requiring any information about the jammer in advance. Simulation results reveal that our proposed framework can not only be very effective in defeating reactive jamming attacks, but also leverage a jammer's power to enhance system performance for the IoT network. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
24. Optimal Pricing of Internet of Things: A Machine Learning Approach.
- Author
-
Alsheikh, Mohammad Abu, Hoang, Dinh Thai, Niyato, Dusit, Leong, Derek, Wang, Ping, and Han, Zhu
- Subjects
INTERNET of things ,MACHINE learning ,COOPERATIVE game theory ,PROFIT-sharing ,QUALITY of service - Abstract
Internet of things (IoT) produces massive data from devices embedded with sensors. The IoT data allows creating profitable services using machine learning. However, previous research does not address the problem of optimal pricing and bundling of machine learning-based IoT services. In this paper, we define the data value and service quality from a machine learning perspective. We present an IoT market model which consists of data vendors selling data to service providers, and service providers offering IoT services to customers. Then, we introduce optimal pricing schemes for the standalone and bundled selling of IoT services. In standalone service sales, the service provider optimizes the size of bought data and service subscription fee to maximize its profit. For service bundles, the subscription fee and data sizes of the grouped IoT services are optimized to maximize the total profit of cooperative service providers. We show that bundling IoT services maximizes the profit of service providers compared to the standalone selling. For profit sharing of bundled services, we apply the concepts of core and Shapley solutions from cooperative game theory as efficient and fair allocations of payoffs among the cooperative service providers in the bundling coalition. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
25. Applications of Deep Reinforcement Learning in Communications and Networking: A Survey.
- Author
-
Luong, Nguyen Cong, Hoang, Dinh Thai, Gong, Shimin, Niyato, Dusit, Wang, Ping, Liang, Ying-Chang, and Kim, Dong In
- Published
- 2019
- Full Text
- View/download PDF
26. “Jam Me If You Can:” Defeating Jammer With Deep Dueling Neural Network Architecture and Ambient Backscattering Augmented Communications.
- Author
-
Van Huynh, Nguyen, Nguyen, Diep N., Hoang, Dinh Thai, and Dutkiewicz, Eryk
- Subjects
BACKSCATTERING ,MACHINE learning ,DEEP learning ,ENERGY harvesting ,LEARNING strategies ,REINFORCEMENT learning - Abstract
With conventional anti-jamming solutions like frequency hopping or spread spectrum, legitimate transceivers often tend to “escape” or “hide” themselves from jammers. These reactive anti-jamming approaches are constrained by the lack of timely knowledge of jamming attacks (especially from smart jammers). Bringing together the latest advances in neural network architectures and ambient backscattering communications, this work allows wireless nodes to effectively “face” the jammer (instead of escaping) by first learning its jamming strategy, then adapting the rate or transmitting information right on the jamming signals (i.e., backscattering modulated information on the jamming signals). Specifically, to deal with unknown jamming attacks (e.g., jamming strategies, jamming power levels, and jamming capability), existing work often relies on reinforcement learning algorithms, e.g., ${Q}$ -learning. However, the ${Q}$ -learning algorithm is notorious for its slow convergence to the optimal policy, especially when the system state and action spaces are large. This makes the ${Q}$ -learning algorithm pragmatically inapplicable. To overcome this problem, we design a novel deep reinforcement learning algorithm using the recent dueling neural network architecture. Our proposed algorithm allows the transmitter to effectively learn about the jammer and attain the optimal countermeasures (e.g., adapt the transmission rate or backscatter or harvest energy or stay idle) thousand times faster than that of the conventional ${Q}$ -learning algorithm. Through extensive simulation results, we show that our design (using ambient backscattering and the deep dueling neural network architecture) can improve the average throughput (under smart and reactive jamming attacks) by up to 426% and reduce the packet loss by 24%. By augmenting the ambient backscattering capability on devices and using our algorithm, it is interesting to observe that the (successful) transmission rate increases with the jamming power. Our proposed solution can find its applications in both civil (e.g., ultra-reliable and low-latency communications or URLLC) and military scenarios (to combat both inadvertent and deliberate jamming). [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
27. Optimal and Low-Complexity Dynamic Spectrum Access for RF-Powered Ambient Backscatter System With Online Reinforcement Learning.
- Author
-
Van Huynh, Nguyen, Hoang, Dinh Thai, Nguyen, Diep N., Dutkiewicz, Eryk, Niyato, Dusit, and Wang, Ping
- Subjects
DYNAMIC spectrum access ,REINFORCEMENT learning ,ONLINE education ,ENERGY harvesting ,MACHINE learning ,WIRELESS communications ,RADIO frequency ,RADIO frequency allocation - Abstract
Ambient backscatter has been introduced with a wide range of applications for low power wireless communications. In this paper, we propose an optimal and low-complexity dynamic spectrum access framework for the RF-powered ambient backscatter system. In this system, the secondary transmitter not only harvests energy from ambient signals but also reflects these signals to transmit its modulated data to the receiver. Under the dynamics of the ambient signals, we first adopt the Markov decision process (MDP) framework to obtain the optimal policy for the secondary transmitter, aiming to maximize the system throughput. However, the MDP-based optimization requires complete knowledge of environment parameters, e.g., the probability of a channel to be idle and the probability of a successful packet transmission, that may not be practical to obtain. To cope with such incomplete knowledge of the environment, we develop a low-complexity online reinforcement learning algorithm that allows the secondary transmitter to “learn” from its decisions and then attain the optimal policy. Simulation results show that the proposed learning algorithm not only efficiently deals with the dynamics of the environment but also improves the average throughput up to 50% and reduces the blocking probability and delay up to 80% compared with conventional methods. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
28. Nitrogen use efficiency and drought tolerant ability of various sugarcane varieties under drought stress at early growth stage.
- Author
-
Hoang, Dinh Thai, Hiroo, Takaragawa, and Yoshinobu, Kawamitsu
- Subjects
SUGARCANE varieties ,DROUGHT tolerance ,EFFECT of nitrogen on plants ,EFFECT of stress on plants ,PLANT growth ,SUGARCANE growing - Abstract
The experiment was conducted under glasshouse conditions to evaluate nitrogen use efficiency and drought tolerant ability of the five different sugarcane varieties (including NiF3, Ni9, Ni17, Ni21 and Ni22) under early growth stage from 60 to 120 days after transplanting. The results showed drought stress reduced the photosynthetic rate, growth parameters including plant height, leaf area; partial and total dry weights; and nitrogen use efficiency (NUE) traits including photosynthetic NUE, nitrogen utilization efficiency and biomass NUE of measured sugarcane varieties. The significant differences were found among varieties in growth parameters, dry weights, NUE traits and drought tolerant index (DTI). The significant positive correlations among NUE traits and DTI suggested higher NUEs could support better a tolerant ability to drought stress at the early growth stage. Because of larger contributions, DTIs for aboveground and stalk dry weight could be used as the important DTIs to evaluate drought tolerant ability in sugarcane varieties. Abbreviations: A
max : potential photosynthetic rate; DAT: days after transplanting; DTI: drought tolerant index; NL: specific leaf nitrogen content; NUE: nitrogen use efficiency; NUEb : biomass nitrogen use efficiency; NUEt : nitrogen utilization efficiency; PNUE: photosynthetic nitrogen use efficiency; TN: total nitrogen content; TNU: total nitrogen uptake; WW: well-watered; DS: water stress. [ABSTRACT FROM AUTHOR]- Published
- 2019
- Full Text
- View/download PDF
29. Ambient Backscatter Communications: A Contemporary Survey.
- Author
-
Van Huynh, Nguyen, Hoang, Dinh Thai, Lu, Xiao, Niyato, Dusit, Wang, Ping, and Kim, Dong In
- Published
- 2018
- Full Text
- View/download PDF
30. A Dynamic Edge Caching Framework for Mobile 5G Networks.
- Author
-
Hoang, Dinh Thai, Niyato, Dusit, Nguyen, Diep N., Dutkiewicz, Eryk, Wang, Ping, and Han, Zhu
- Abstract
Mobile edge caching has emerged as a new paradigm to provide computing, networking resources, and storage for a variety of mobile applications. That helps achieve low latency, high reliability, and improve efficiency in handling a very large number of smart devices and emerging services (e.g., IoT, industry automation, virtual reality) in mobile 5G networks. Nonetheless, the development of mobile edge caching is challenged by the decentralized nature of edge nodes, their small coverage, limited computing, and storage resources. In this article, we first give an overview of mobile edge caching in 5G networks. After that, its key challenges and current approaches are discussed. We then propose a novel caching framework. Our framework allows an edge node to authorize the legitimate users and dynamically predicts and updates their content demands using the matrix factorization technique. Based on the prediction, the edge node can adopt advanced optimization methods to determine optimal content to store so as to maximize its revenue and minimize the average delay of its mobile users. Through numerical results, we demonstrate that our proposed framework provides not only an effective caching approach, but also an efficient economic solution for the mobile service provider. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
31. Plasticity of Root Architecture Under Mixed Culture and Tiller Regulation in Sugarcane.
- Author
-
Takaragawa, Hiroo, Watanabe, Kenta, Kobashikawa, Ryuichi, Hoang, Dinh Thai, and Kawamitsu, Yoshinobu
- Abstract
It is important for the effective use of soil resource and sustainable sugarcane production to study the root architecture and plasticity because soil resources are distributed unevenly. However, information on sugarcane root architecture and plasticity is limited because of its larger plant size and longer growth period. The mechanism of root formation is divided into internal (main stem and tillers) and inter-individual (sole and mixture) interactions. Our study attempted to reveal the effect of tiller regulation (internal interaction) and mixed cultivars (inter-individual interaction) on root formation in sugarcane. Tiller regulation decreased the total root biomass but distributed the roots in deeper soil, indicating that high-tillering characteristics may not necessarily contribute to a deeper root system and drought tolerance, at least during the early growth stages of tillers. Our results also revealed that the total shoot biomass, including the main stem and tillers, was not influenced by tiller regulation, suggesting a plasticity of shoot growth under tiller regulation. Roots under mixed cultivars grew well in the middle soil layer (20-50 cm depth) and were thoroughly distributed in each soil layer. These facts suggested that root habitat segregation of each cultivar may have occurred. Such root densification did not increase shoot biomass in the present study; however, it has the potential for improving lodging resistance and resource use efficiency under some abiotic stress conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
32. Stackelberg Game for Distributed Time Scheduling in RF-Powered Backscatter Cognitive Radio Networks.
- Author
-
Wang, Wenbo, Hoang, Dinh Thai, Niyato, Dusit, Wang, Ping, and Kim, Dong In
- Abstract
In this paper, we study the transmission strategy adaptation problem in an RF-powered cognitive radio network, in which hybrid secondary users are able to switch between the harvest-then-transmit mode and the ambient backscatter mode for their communication with the secondary gateway. In the network, a monetary incentive is introduced for managing the interference caused by the secondary transmission with imperfect channel sensing. The sensing-pricing-transmitting process of the secondary gateway and the transmitters is modeled as a single-leader-multi-follower Stackelberg game. Furthermore, the follower sub-game among the secondary transmitters is modeled as a generalized Nash equilibrium problem with shared constraints. Based on our theoretical discoveries regarding the properties of equilibria in the follower sub-game and the Stackelberg game, we propose a distributed, iterative strategy searching scheme that guarantees the convergence to the Stackelberg equilibrium. The numerical simulations show that the proposed hybrid transmission scheme always outperforms the schemes with fixed transmission modes. Furthermore, the simulations reveal that the adopted hybrid scheme is able to achieve a higher throughput than the sum of the throughput obtained from the schemes with fixed transmission modes. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
33. Applications of Economic and Pricing Models for Wireless Network Security: A Survey.
- Author
-
Luong, Nguyen Cong, Hoang, Dinh Thai, Wang, Ping, Niyato, Dusit, and Han, Zhu
- Published
- 2017
- Full Text
- View/download PDF
34. Ambient Backscatter: A New Approach to Improve Network Performance for RF-Powered Cognitive Radio Networks.
- Author
-
Hoang, Dinh Thai, Niyato, Dusit, Wang, Ping, Kim, Dong In, and Han, Zhu
- Subjects
COGNITIVE radio ,BACKSCATTERING ,RADIO frequency ,EQUIPMENT & supplies ,RADIO transmitters & transmission ,CONVEX functions ,ENERGY harvesting - Abstract
This paper introduces a new solution to improve the performance for secondary systems in radio frequency (RF) powered cognitive radio networks (CRNs). In a conventional RF-powered CRN, the secondary system works based on the harvest-then-transmit protocol. That is, the secondary transmitter (ST) harvests energy from primary signals and then uses the harvested energy to transmit data to its secondary receiver (SR). However, with this protocol, the performance of the secondary system is much dependent on the amount of harvested energy as well as the primary channel activity, e.g., idle and busy periods. Recently, ambient backscatter communication has been introduced, which enables the ST to transmit data to the SR by backscattering ambient signals. Therefore, it is potential to be adopted in the RF-powered CRN. We investigate the performance of RF-powered CRNs with ambient backscatter communication over two scenarios, i.e., overlay and underlay CRNs. For each scenario, we formulate and solve the optimization problem to maximize the overall transmission rate of the secondary system. Numerical results show that by incorporating such two techniques, the performance of the secondary system can be improved significantly compared with the case when the ST performs either harvest-then-transmit or ambient backscatter technique. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
35. Optimal Data Scheduling and Admission Control for Backscatter Sensor Networks.
- Author
-
Hoang, Dinh Thai, Niyato, Dusit, Wang, Ping, Kim, Dong In, and Bao Le, Long
- Subjects
BACKSCATTERING ,RADIO frequency identification systems ,WIRELESS sensor networks ,PARTIALLY observable Markov decision processes ,FREQUENCY deviation (Radio frequency modulation) - Abstract
This paper studies the data scheduling and admission control problem for a backscatter sensor network (BSN). In the network, instead of initiating their own transmissions, the sensors can send their data to the gateway just by switching their antenna impedance and reflecting the received RF signals. As such, we can reduce remarkably the complexity, the power consumption, and the implementation cost of sensor nodes. Different sensors may have different functions, and data collected from each sensor may also have a different status, e.g., urgent or normal, and thus we need to take these factors into account. Therefore, in this paper, we first introduce a system model together with a mechanism in order to address the data collection and scheduling problem in the BSN. We then propose an optimization solution using the Markov decision process framework and a reinforcement learning algorithm based on the linear function approximation method, with the aim of finding the optimal data collection policy for the gateway. Through simulation results, we not only show the efficiency of the proposed solution compared with other baseline policies, but also present the analysis for data admission control policy under different classes of sensors as well as different types of data. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
36. Cyber Insurance for Plug-In Electric Vehicle Charging in Vehicle-to-Grid Systems.
- Author
-
Niyato, Dusit, Hoang, Dinh Thai, Wang, Ping, and Han, Zhu
- Subjects
SMART power grids ,CYBERTERRORISM ,ELECTRIC vehicles ,INSURANCE ,ELECTRIC power systems ,ENERGY economics - Abstract
V2G systems bring many benefits to power systems in stabilizing energy demand and supply fluctuations as well as to PEV users in reducing energy costs. To achieve the maximum efficiency of V2G systems, data communication plays an important role. However, it is subject to cyber attack and failure, which hinder the effectiveness of V2G systems. In this article, we introduce a novel concept of using cyber insurance to "transfer" cyber risk from a user to a third party in PEV charging. We first introduce V2G systems and briefly discuss the cyber risks. Additionally, the basic concepts of cyber insurance are presented. We then introduce the use of cyber insurance to remove the risk of paying high energy costs of PEV charging due to the unavailability of data communication. We show that the PEV user can achieve the maximum benefit in deciding to charge its PEV and to buy insurance. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
37. Information service pricing competition in Internet-of-Vehicle (IoV).
- Author
-
Hoang, Dinh Thai and Niyato, Dusit
- Published
- 2016
- Full Text
- View/download PDF
38. Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey.
- Author
-
Luong, Nguyen Cong, Hoang, Dinh Thai, Wang, Ping, Niyato, Dusit, Kim, Dong In, and Han, Zhu
- Published
- 2016
- Full Text
- View/download PDF
39. Smart data pricing models for the internet of things: a bundling strategy approach.
- Author
-
Niyato, Dusit, Hoang, Dinh Thai, Luong, Nguyen Cong, Wang, Ping, Kim, Dong In, and Han, Zhu
- Subjects
INTERNET of things ,ACQUISITION of data ,COMPUTER networks ,DATA transmission systems ,INFORMATION resources management - Abstract
The Internet of Things (IoT) has emerged as a new paradigm for the future Internet. In IoT, devices are connected to the Internet and thus are a huge data source for numerous applications. In this article, we focus on addressing data management in IoT through using a smart data pricing (SDP) approach. With SDP, data can be managed flexibly and efficiently through intelligent and adaptive incentive mechanisms. Moreover, data is a major source of revenue for providers and partners. We propose a new pricing scheme for IoT service providers to determine the sensing data buying price and IoT service subscription fee offered to sensor owners and service users, respectively. Additionally, we adopt the bundling strategy that allows multiple providers to form a coalition and offer their services as a bundle, attracting more users and achieving higher revenue. Finally, we outline some important open research issues for SDP and IoT. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
40. Applications of Repeated Games in Wireless Networks: A Survey.
- Author
-
Hoang, Dinh Thai, Lu, Xiao, Niyato, Dusit, Wang, Ping, Kim, Dong In, and Han, Zhu
- Published
- 2015
- Full Text
- View/download PDF
41. Performance Optimization for Cooperative Multiuser Cognitive Radio Networks with RF Energy Harvesting Capability.
- Author
-
Hoang, Dinh Thai, Niyato, Dusit, Wang, Ping, and Kim, Dong In
- Abstract
We study the performance optimization problem for a cognitive radio network with radio frequency (RF) energy harvesting capability for secondary users. In such networks, the secondary users are able to not only transmit packets on a channel licensed to a primary user when the channel is idle, but also harvest RF energy from the primary users' transmissions when the channel is busy. Specifically, we propose a system model where the secondary users are able to cooperate to maximize the overall network throughput through sensing a set of common channels. We first consider the case where the secondary users cooperate in a TDMA fashion and propose a novel solution based on a learning algorithm to find optimal channel access policies for the secondary users. Then, we examine the case where the secondary users cooperate in a decentralized manner and we formulate the cooperative decentralized optimization problem as a decentralized partially observable Markov decision process (DEC-POMDP). To solve the cooperative decentralized stochastic optimization problem, we apply a decentralized learning algorithm based on the policy gradient and the Lagrange multiplier method to obtain optimal channel access policies. Extensive performance evaluation is conducted and it shows the efficiency and the convergence of the learning algorithms. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
42. Markov Decision Processes With Applications in Wireless Sensor Networks: A Survey.
- Author
-
Abu Alsheikh, Mohammad, Hoang, Dinh Thai, Niyato, Dusit, Tan, Hwee-Pink, and Lin, Shaowei
- Published
- 2015
- Full Text
- View/download PDF
43. Simulation-based optimization for admission control of mobile cloudlets.
- Author
-
Hoang, Dinh Thai, Niyato, Dusit, and Le, Long Bao
- Published
- 2014
- Full Text
- View/download PDF
44. Optimal decentralized control policy for wireless communication systems with wireless energy transfer capability.
- Author
-
Hoang, Dinh Thai, Niyato, Dusit, Wang, Ping, and Kim, Dong In
- Published
- 2014
- Full Text
- View/download PDF
45. Cooperative bidding of data transmission and wireless energy transfer.
- Author
-
Hoang, Dinh Thai, Niyato, Dusit, and Kim, Dong In
- Published
- 2014
- Full Text
- View/download PDF
46. Optimal admission control policy for mobile cloud computing hotspot with cloudlet.
- Author
-
Hoang, Dinh Thai, Niyato, Dusit, and Wang, Ping
- Abstract
We consider an admission control problem and adaptive resource allocation for running mobile applications on a cloudlet. We formulate an optimization problem for dynamic resource sharing of mobile users in mobile cloud computing (MCC) hotspot with a cloudlet as a semi-Markov decision process (SMDP). SMDP is transformed into a linear programming (LP) model and it is solved to obtain an optimal solution. In the optimization model, the quality of service (QoS) for different classes of mobile user is taken into account under resource constraints (i.e., bandwidth and server). The numerical results are presented to illustrate that the proposed admission control scheme can achieve a desirable performance and improve throughput of an MCC hotspot significantly. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
47. Joint load balancing and admission control in OFDMA-based femtocell networks.
- Author
-
Le, Long Bao, Hoang, Dinh Thai, Niyato, Dusit, Hossain, Ekram, and Kim, Dong In
- Abstract
In this paper, we consider the admission control problem for hybrid access in OFDMA-based femtocell networks. We assume that Macrocell User Equipments (MUEs) can establish connections with Femtocell Base Stations (FBSs) to improve their QoSs. Both MUEs and Femtocell User Equipments (FUEs) have minimum rate requirements, which depend on their geographical locations and maybe their running applications. In addition, blocking probability constraints are imposed on each FUE so that connections from MUEs only result in controllable performance degradation for FUEs. We show how to formulate the admission control problem as a Semi-Markov Decision Process (SMDP) and present a Linear Programming (LP) based solution approach. Moreover, we develop a novel femtocell power adaptation algorithm, which can be implemented in a distributed manner jointly with the proposed admission control scheme. This power adaptation algorithm enables to achieve better cell throughput and more energy-efficient operation of the femtocell network considering the heterogeneity of traffic load in the network. Finally, numerical results are presented to illustrate the desirable performance of the optimal admission control solution and the significant throughput and power saving gains of the proposed cross-layer solution. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
48. IMS IPTV: An Experimental Approach.
- Author
-
Hung, Nguyen Tai, Thanh, Nguyen Huu, Nam, Nguyen Giang, Lan, Tran Ngoc, and Hoang, Dinh Thai
- Abstract
IMS has been widely recognized as the control and signaling framework for delivering of the rich communication & multimedia services to broadband users. Amongst others, it΄s deploying as the service (middleware) platform for interactive and personalized IPTV services. The goal of this paper is to provide a short description and analysis of the (IPTV) use cases that have been selected for design and implementation at Hanoi University of Technology (HUT) in scope of its initiatives for NGN researching program. Major use cases, or we called intelligent features, are the advanced electronic service guide, video on demand (VoD), (IPTV) session continuity, and parental control. Development results for each of the use case are depicted. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
49. Opportunistic Channel Access and RF Energy Harvesting in Cognitive Radio Networks.
- Author
-
Hoang, Dinh Thai, Niyato, Dusit, Wang, Ping, and Kim, Dong In
- Subjects
RADIO frequency ,WIRELESS communications ,COGNITIVE radio ,PACKET radio transmission ,MACHINE learning ,ENERGY harvesting - Abstract
Radio frequency (RF) energy harvesting is a promising technique to sustain operations of wireless networks. In a cognitive radio network, a secondary user can be equipped with RF energy harvesting capability. In this paper, we consider such a network where the secondary user can perform channel access to transmit a packet or to harvest RF energy when the selected channel is idle or occupied by the primary user, respectively. We present an optimization formulation to obtain the channel access policy for the secondary user to maximize its throughput. Both the case that the secondary user knows the current state of the channels and the case that the secondary knows the idle channel probabilities of channels in advance are considered. However, the optimization requires model parameters (e.g., the probability of successful packet transmission, the probability of successful RF energy harvesting, and the probability of channel to be idle) to obtain the policy. To obviate such a requirement, we apply an online learning algorithm that can observe the environment and adapt the channel access action accordingly without any a prior knowledge about the model parameters. We evaluate both the efficiency and convergence of the learning algorithm. The numerical results show that the policy obtained from the learning algorithm can achieve the performance in terms of throughput close to that obtained from the optimization. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
50. QoS-Aware and Energy-Efficient Resource Management in OFDMA Femtocells.
- Author
-
Le, Long Bao, Niyato, Dusit, Hossain, Ekram, Kim, Dong In, and Hoang, Dinh Thai
- Abstract
We consider the joint resource allocation and admission control problem for Orthogonal Frequency-Division Multiple Access (OFDMA)-based femtocell networks. We assume that Macrocell User Equipments (MUEs) can establish connections with Femtocell Base Stations (FBSs) to mitigate the excessive cross-tier interference and achieve better throughput. A cross-layer design model is considered where multiband opportunistic scheduling at the Medium Access Control (MAC) layer and admission control at the network layer working at different time-scales are assumed. We assume that both MUEs and Femtocell User Equipments (FUEs) have minimum average rate constraints, which depend on their geographical locations and their application requirements. In addition, blocking probability constraints are imposed on each FUE so that the connections from MUEs only result in controllable performance degradation for FUEs. We present an optimal design for the admission control problem by using the theory of Semi-Markov Decision Process (SMDP). Moreover, we devise a novel distributed femtocell power adaptation algorithm, which converges to the Nash equilibrium of a corresponding power adaptation game. This power adaptation algorithm reduces energy consumption for femtocells while still maintaining individual cell throughput by adapting the FBS power to the traffic load in the network. Finally, numerical results are presented to demonstrate the desirable operation of the optimal admission control solution, the significant performance gain of the proposed hybrid access strategy with respect to the closed access counterpart, and the great power saving gain achieved by the proposed power adaptation algorithm. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.