16 results on '"Shengsuo Cai"'
Search Results
2. Deep Reinforcement Learning for Flocking Motion of Multi-UAV Systems: Learn From a Digital Twin
- Author
-
Zhilin Li, Xiaojiao Liu, Shengsuo Cai, Shen Gaoqing, Pan Cao, Lei Lei, and Lijuan Zhang
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Flocking (behavior) ,Computer science ,business.industry ,Signal Processing ,Reinforcement learning ,Artificial intelligence ,business ,Motion (physics) ,Computer Science Applications ,Information Systems ,Collision rate - Abstract
Over the past decades, unmanned aerial vehicles (UAVs) have been widely used in both military and civilian fields. In these applications, flocking motion is a fundamental but crucial operation of multi-UAV systems. Traditional flocking motion methods usually designed for a specific environment. However, the real environment is mostly unknown and stochastic, which greatly reduces the practicality of these methods. In this paper, deep reinforcement learning (DRL) is used to realize the flocking motion of multi-UAV systems. Considering that the sim-to-real problem restricts the application of DRL to the flocking motion scenario, a digital twin (DT) enabled DRL training framework is proposed to solve this problem. The DRL model can learn from DT and be quickly deployed on the real-world UAV with the help of DT. Under this training framework, this paper proposes an actor-critic DRL algorithm named behavior-coupling deep deterministic policy gradient (BCDDPG) for the flocking motion problem, which is inspired by the flocking behavior of animals. Extensive simulations are conducted to evaluate the performance of BCDDPG. Simulation results show that BCDDPG achieves a higher average reward and performs better in terms of arrival rate and collision rate compared with existing methods.
- Published
- 2022
- Full Text
- View/download PDF
3. A Virtual-Potential-Field-Based Cooperative Opportunistic Routing Protocol for UAV Swarms
- Author
-
Mengfan Yan, Shengsuo Cai, Jie Wang, and Lei Lei
- Subjects
Routing protocol ,Computer science ,business.industry ,Distributed computing ,Computer Science::Networking and Internet Architecture ,Potential field ,Swarm behaviour ,Wireless ,Overhead (computing) ,Routing (electronic design automation) ,business ,Protocol (object-oriented programming) ,Energy (signal processing) - Abstract
Due to highly dynamic links and unstable wireless channels, designing reliable and efficient routing protocols for UAV swarm networks is challenging. In this paper, a modified virtual potential field method is developed to coordinate the UAV swarm and provide local topology information. Both coordination and mutual influence between UAVs are taken into consideration for virtual force calculation. Next, a new Virtual-Potential-Field-based Cooperative Opportunistic Routing (VPFCOR) protocol is proposed. VPFCOR comprehensively combines three main metrics for candidate ordering, i.e., forwarding distance, virtual force and remaining energy. With these metrics, VPFCOR can effectively adapt to different tasks, take smaller routing overhead and meet the real-time requirement. Simulation results are presented to obtain the optimal parameter settings and validate the effectiveness of our proposed protocol.
- Published
- 2021
- Full Text
- View/download PDF
4. Modeling the Instantaneous Saturation Throughput of UAV Swarm Networks
- Author
-
Shengsuo Cai, Mengfan Yan, Lei Lei, and Jie Wang
- Subjects
Transmission (telecommunications) ,Markov chain ,Computer science ,Real-time computing ,Media access control ,Process (computing) ,Swarm behaviour ,Network performance ,Collision ,Network topology - Abstract
Unmanned Aerial Vehicle (UAV) swarm has been widely applied in border surveillance, public safety, transportation management and so on. Affected by the complex mission environment and rapidly changing network topology, the network performance decreases drastically especially when an unsuitable contention window size is selected in traditional media access control (MAC) protocol. In this work, we first introduce a node-counts-based UAV swarm MAC (NCU_MAC) protocol to dynamically adjust the contention window size according to the number of neighbor nodes. Next, a four- dimensional Markov Chain model is developed to model the media access process and evaluate the performance of NCU_MAC. The expressions of the collision, transmission probability and saturation throughput are obtained theoretically. Simulation results are presented to validate the effectiveness of the proposed model and show the saturation throughput of the swarm network in the process of cooperative movement.
- Published
- 2021
- Full Text
- View/download PDF
5. Modeling and Analyzing the Optimal Contention Window Size for Distributed Synchronization in Ad Hoc Networks
- Author
-
Shengsuo Cai, Xiaoqin Song, Lei Lei, and Xiaoming Chen
- Subjects
Scheme (programming language) ,Markov chain ,business.industry ,Computer science ,Wireless ad hoc network ,Distributed computing ,020208 electrical & electronic engineering ,Process (computing) ,Markov process ,020206 networking & telecommunications ,02 engineering and technology ,Mobile ad hoc network ,Synchronization ,Computer Science Applications ,symbols.namesake ,Modeling and Simulation ,Synchronization (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Data synchronization ,Electrical and Electronic Engineering ,business ,computer ,Computer network ,computer.programming_language - Abstract
Contention-based distributed synchronization (CDS) protocols, which first standardized in the IEEE 802.11 power saving mode (PSM), have been widely used in wireless ad hoc networks. The time required to complete the synchronization progress, i.e., synchronization efficiency, is obviously an important performance metrics for CDS protocols. However, few attempts have been focusing on modeling and analyzing the synchronization efficiency of the CDS protocols. In this letter, we present a 2-D Markov chain model for the CDS scheme of the IEEE 802.11 PSM. The purpose of our model is to determine the relationship between the time required to complete the synchronization process and the value of the contention parameter, i.e., the contention window size. Through modeling, we derive the optimal values of the contention window size to achieve the minimum synchronization time at different network scales. We also validate the accuracy of our model by comparing the analytical results with that obtained by means of simulations.
- Published
- 2017
- Full Text
- View/download PDF
6. Dynamic Query Tree Anti-Collision Protocol for RFID Systems
- Author
-
Zhao Nan, Lei Lei, Lijuan Zhang, and Shengsuo Cai
- Subjects
Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020208 electrical & electronic engineering ,020206 networking & telecommunications ,02 engineering and technology ,Collision ,Identification (information) ,Tree (data structure) ,Dynamic query ,0202 electrical engineering, electronic engineering, information engineering ,Radio-frequency identification ,business ,Protocol (object-oriented programming) ,Computer network - Abstract
Radio frequency identification (RFID) has been widely used in various areas, such as logistics, healthcare, manufacture and so on. However, tag collision problem greatly affects the performance of RFID systems by reducing bandwidth utilization and increasing identification delay etc. In this paper, we propose a dynamic query tree anti-collision (DQTA) protocol, which dynamically adjusts the number of subgroups of each collision slot. Based on the number of consecutive colliding bits in tag response k, DQTA splits colliding tags into 2^k subgroups. Dividing colliding tags into more appropriate subgroups, the number of collision slots and transmitted message bits are effectively reduced. Comparing with the most related state-of-art works, the proposed DQTA protocol can identify tags with less time and fewer transmitting message bits.
- Published
- 2019
- Full Text
- View/download PDF
7. Available Bandwidth Estimation for Directional CSMA/CA Ad Hoc Networks
- Author
-
Zhilin Li, Lijuan Zhang, Shengsuo Cai, Gaoqing Sheng, and Lei Lei
- Subjects
Directional antenna ,Computer science ,Wireless ad hoc network ,Node (networking) ,Real-time computing ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Network topology ,0203 mechanical engineering ,Transmission (telecommunications) ,0202 electrical engineering, electronic engineering, information engineering ,Bandwidth (computing) ,Omnidirectional antenna ,Carrier sense multiple access with collision avoidance - Abstract
Directional antennas have numerous advantages over omnidirectional antennas in CSMA/CA ad hoc networks. However, estimating the available bandwidth of a flow in the medium access process in such a network is very challenging. In this paper, we present a passive available bandwidth estimation algorithm for directional ad hoc networks, termed PABE-D. The estimation process consists of two phases, i.e., the preliminary and refined estimation phases. In the preliminary phase, the available transmission/reception duration in each beam of the node and the available bandwidth of the directional link are obtained by analyzing the available duration of both the sender and receiver. In the refined phase, we analyze the effect of the directional hidden terminal and deafness problems to further improve the estimate accuracy. The performance of our proposed PABE-D algorithm is evaluated in two typical topologies, i.e., the parallel and random grid topologies. The simulation results demonstrate that our algorithm can effectively estimate the available bandwidth in directional ad hoc networks.
- Published
- 2019
- Full Text
- View/download PDF
8. Intelligent Selection: A Neural Network-Based MAC Protocol-Selection Mechanism for Wireless Ad hoc Networks
- Author
-
Shen Gaoqing, Shengsuo Cai, Kou Kecan, Lijuan Zhang, and Lei Lei
- Subjects
Artificial neural network ,business.industry ,Computer science ,Wireless ad hoc network ,Mechanism (biology) ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Construct (python library) ,Set (abstract data type) ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,business ,Protocol (object-oriented programming) ,Selection (genetic algorithm) ,Computer network - Abstract
In wireless ad hoc networks, a suitable MAC protocol can provide better QoS (Quality of Service) guarantees. However, in modern warfare environment, the combat missions change rapidly. A fixed MAC protocol may be not suitable for the highly changeable environments and combat missions. To solve this problem, we propose a neural network-based MAC protocol-selection mechanism to select the optimal MAC protocol for new missions based on the real-time environment information of the battlefield, i.e., the intelligent selection (IS) algorithm. In IS, we prepare the empirical data set with massive mission data, and construct the learning model through making use of the neural network. Experimental results demonstrate that the prediction accuracy of the proposed IS algorithm is over 0.93.
- Published
- 2019
- Full Text
- View/download PDF
9. Medium Access Control Based on Two Dimentional Random Backoff of Power Level and Sensing Time for Ad Hoc Networks
- Author
-
Zhongzheng Wang, Shengsuo Cai, and Gaoqing Shen
- Subjects
Markov chain ,business.industry ,Computer science ,Network packet ,Wireless ad hoc network ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,Markov process ,050801 communication & media studies ,020206 networking & telecommunications ,Throughput ,02 engineering and technology ,symbols.namesake ,0508 media and communications ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,business ,Protocol (object-oriented programming) ,Efficient energy use ,Computer network - Abstract
This paper analyzes the limitation of IEEE 802.11 protocol using a single power for node communication. On the basis of IEEE 802.11protocol and the basic power backoff protocol which introduces the idea of power backoff, a CSMATPB protocol with time and space backoff is proposed. The protocol increases the time competition window, while making the power backoff reduce the interference between nodes. Then, the three dimensional Markov chain model is established for this protocol. Through the results of numerical calculation and simulation analysis, it is proved that the protocol mechanism can effectively solve the problem that the lower space reuse rate of IEEE 802.11 protocol and the problem that the basic power backoff protocol discards the packet prematurely. So CSMA-TPB protocol can effectively improve the saturation throughput and energy utilization of the network.
- Published
- 2017
- Full Text
- View/download PDF
10. A dynamic TDMA-based MAC protocol with QoS guarantees for fully connected ad hoc networks
- Author
-
Jinhua Zhou, Cheng Luo, Shengsuo Cai, Lei Lei, and Weiling Cai
- Subjects
Computer science ,business.industry ,Wireless ad hoc network ,Node (networking) ,Quality of service ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Frame (networking) ,Time division multiple access ,Frame synchronization ,Scalability ,Synchronization (computer science) ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
This paper presents DT-MAC, a dynamic TDMA based medium access control (MAC) protocol designed to offer collision-free transmissions while providing QoS guarantees for different services in scalable fully connected ad hoc networks. In DT-MAC, a new time frame structure which consists of synchronization, request, assignment and data slots is put forward. In each frame, the number of slots and their lengths are adaptively adjusted according to the number of nodes and their services in the network. Meanwhile, a distributed frame synchronization method is proposed to provide synchronization guarantee for the nodes and generate a manager node for each frame to dynamically allocate the slots according to the QoS requirements of different services. Besides, by introducing request slot, DT-MAC can make nodes join or leave the network without conflicts. Simulation results show that DT-MAC performs better in providing QoS guarantees and accommodating the change of network scale compared with conventional TDMA-based MAC protocols.
- Published
- 2014
- Full Text
- View/download PDF
11. Link availability estimation based reliable routing for aeronautical ad hoc networks
- Author
-
Liang Zhou, Shengsuo Cai, Dan Wang, Lei Lei, and Chen Xiaoming
- Subjects
Routing protocol ,Mobility model ,Adaptive quality of service multi-hop routing ,Computer Networks and Communications ,Computer science ,Wireless ad hoc network ,business.industry ,Distributed computing ,Wireless Routing Protocol ,Ad hoc wireless distribution service ,Network topology ,Optimized Link State Routing Protocol ,Hardware and Architecture ,Destination-Sequenced Distance Vector routing ,business ,Software ,Computer network - Abstract
The aeronautical ad hoc network (AANET) is an application of the mobile ad hoc networking technology to aeronautical communications. As the airliners move at a very high speed, one critical issue for improving the performance of AANET is to select reliable route that can address the frequent link breakage problem induced by the unpredicted network topology changes. In this paper, we focus on developing a link availability estimation based reliable routing protocol which considers the unpredicted network topology change problem to improve the performance of AANET. The link availability indicates the probability that a link will be continuously available for a given period of time. We first propose a novel Semi-Markov Smooth mobility model to mimic the behavior of the airliners in the sky. On the basis of the mobility model, we obtain the probability density function of the relative speed of two nodes, and further derive the expectation of the link lifetime. The accuracy of our analysis is validated by comparing the analytical results with that obtained by means of simulations. Moreover, we define the link availability factor and use it as the path selection metric to design a reliable routing protocol for AANET. Simulation results show that a gain in performance can be obtained by our protocol compared with the traditional routing strategy.
- Published
- 2014
- Full Text
- View/download PDF
12. A weighted fairness guarantee scheme based on node cooperation for multimedia WLAN mesh networks
- Author
-
Lei Lei, Jinhua Zhou, Shengsuo Cai, and Libin Tao
- Subjects
Handshake ,Multimedia ,Computer science ,business.industry ,Quality of service ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mesh networking ,computer.software_genre ,Interference (wave propagation) ,Fairness measure ,Electrical and Electronic Engineering ,business ,computer ,Computer network ,Communication channel ,Power control - Abstract
In this paper, we focus on weighted fairness in multimedia WLAN mesh networks. Based on the analysis of the fairness problem of IEEE 802.11e Enhanced Distributed Channel Access (EDCA) scheme in WLAN mesh networks, we propose a weighted fairness guarantee scheme (WFGS), which provides weighted fairness for multimedia flows with different QoS requirements through node cooperation. WFGS piggybacks extra field in RTS/CTS frames to declare the channel occupation ratio of each flow. Accordingly, the transmitters can get the neighboring flows' channel occupation ratio via overhearing the RTS/CTS frames from its neighbors, and cooperatively adjust the contention window size to achieve weighted fairness among the flows. Also, to reliably reserve transmissions, an adaptive power control based RTS/CTS handshake mechanism is introduced. Simulation results show that compared with EDCA scheme, WFGS can effectively resolve the collisions induced by the carrier interference and thereby guarantee both the short-term and long-term weighted fairness among multimedia flows.
- Published
- 2013
- Full Text
- View/download PDF
13. Saturation throughput analysis of IEEE 802.11 DCF with heterogeneous node transmit powers and capture effect
- Author
-
Lei Lei, Xiaoqin Song, Ting Zhang, Liang Zhou, and Shengsuo Cai
- Subjects
Markov chain ,business.industry ,Computer science ,Network packet ,Computer Networks and Communications ,Node (networking) ,Real-time computing ,Capture effect ,Transmitter power output ,Power (physics) ,Computer Science::Performance ,IEEE 802.11 ,Hardware and Architecture ,Computer Science::Networking and Internet Architecture ,Wireless ,business ,Software ,Computer network - Abstract
The transmit power control schemes allow the wireless nodes to select a minimum required transmit power from all available power levels to access the medium. In this paper, we focus on analysing the saturation throughput performance of IEEE 802.11 DCF networks with heterogeneous node transmit power levels and the capture effect. We first analyse the capture effect among packets sent at different power levels and derive the analytical expression of the capture probability. Then, we propose a three-dimensional Markov chain to model the backoff procedure performed by a tagged sending node under the condition of heterogeneous transmit power levels, and compute the total saturation throughput of the network with the previously derived capture probability. Finally, we validate the accuracy of our model by comparing the analytical results with the simulation results, and analyse the impact of the capture effect on the saturation throughput performance of IEEE 802.11 DCF networks.
- Published
- 2017
- Full Text
- View/download PDF
14. An Adaptive Collision Avoidance Scheme for Improving MACA-P Performance in Multi-hop Ad Hoc Networks
- Author
-
Weikang Liu, Xianzhi Jiang, Shengsuo Cai, and Lei Lei
- Subjects
Optimized Link State Routing Protocol ,Computer science ,business.industry ,Wireless ad hoc network ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Energy consumption ,Collision ,Distributed coordination function ,business ,Lower energy ,Computer network ,Hop (networking) - Abstract
In this paper, we focus on improving MACA-P performance in multi-hop ad hoc networks. Based on the analysis of the collision problems of the distributed coordination function (DCF) and MACA-P in multi-hop ad hoc networks, we propose an adaptive collision avoidance scheme (ACAS). ACAS mainly improves MACA-P by adaptively adjusting the control gap of the master transmission based on the conditions of the master transmission. Also, a new hybrid confirmation mechanism is presented, which, together with the adjustment of the control gap, decreases the energy consumption of the nodes. Simulation results show that our scheme can obtain higher overall throughput and lower energy consumption in comparison with the DCF and MACA-P protocols.
- Published
- 2012
- Full Text
- View/download PDF
15. TIE-MAC: tolerable interference estimation-based concurrent medium access control for WLAN mesh networks
- Author
-
Xinxin Feng, Xiaoming Chen, Shengsuo Cai, Liang Zhou, and Lei Lei
- Subjects
Schedule ,Computer Networks and Communications ,business.industry ,Computer science ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,Mesh networking ,Local area network ,Throughput ,Energy consumption ,Interference (wave propagation) ,law.invention ,Transmission (telecommunications) ,Hardware and Architecture ,law ,Wireless lan ,Wi-Fi ,business ,Software ,Computer network - Abstract
This paper proposes TIE-MAC, tolerable interference estimation-based concurrent medium access control protocol for wireless local area network WLAN mesh networks. The goal is to increase spatial reuse, achieve high throughput and reduce average energy consumption through exploiting concurrent transmissions among neighbouring nodes. TIE-MAC confirms that the tolerable interference of the receiver plays a key role in determining the efficiency of concurrent transmission scheduling, and puts forward a novel tolerable interference estimation mechanism, enabling the receivers to precisely estimate their tolerable interference. Meanwhile, a concurrent transmission gap CTG is inserted between the transmission of the RTS/CTS and data packets to offer the nodes in the vicinity of the receiver the chance to schedule possible overlapping transmissions. The size of the CTG is optimised using an exponential smoothing model-based adjustment algorithm. Moreover, sequenced acknowledgements ACKs are introduced in TIE-MAC and used in combination with the tolerable interference estimation mechanism to avoid possible collisions among different concurrent transmissions. Simulation results show that TIE-MAC gains better throughput and energy consumption performance in comparison with existing concurrent transmission protocols as well as the active WLAN mesh standard.
- Published
- 2015
- Full Text
- View/download PDF
16. Modelling and analysing medium access delay for differentiated services in IEEE 802.11s wireless mesh networks
- Author
-
Jinhua Zhou, Xiao-min Chen, L. Qi, Lei Lei, and Shengsuo Cai
- Subjects
Control and Optimization ,Wireless mesh network ,Computer Networks and Communications ,Computer science ,business.industry ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mesh networking ,Management Science and Operations Research ,Differentiated service ,law.invention ,law ,Media access control ,Wi-Fi ,IEEE 802.11e-2005 ,business ,IEEE 802.11s ,Computer network - Abstract
Wireless mesh networks (WMNs) has been actively explored for a few years, and the IEEE 802.11 Task Group “s” has recently approved the active 802.11s standard for Wireless local area network (WLAN) mesh networking. To provide differentiated channel access and quality of service (QoS) guarantees for multimedia flows, IEEE 802.11s standard employs enhanced distributed channel access (EDCA) as the basic medium access control (MAC) protocol. In this study, the authors focus on modelling and analysing the medium access delay differentiation of EDCA under saturation condition in multi-hop WMNs. The authors develop a three-dimensional Markov chain model to evaluate the medium access delay differentiation of EDCA. In this model, the authors fully consider the performance impact of Request to Send (RTS) frame collisions and data frame collisions and then put forward the pseudo states to distinguish the different back-off procedures induced by these collisions. Using this analytical model, the authors derive the average medium access delay for the flows with different priorities. Comparisons with the simulation results show that the analytical model is extremely accurate.
- Published
- 2012
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.