An Introduction of Real-time Embedded Optimisation Programming for UAV Systems under Disaster Communication
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2018, Vol 5, Issue 17
Abstract
For disaster communications, it is very challenging for the contemporary wireless technology and infrastructure to meet the demands for connectivity. Modern wireless networks should be developed to satisfy the increasing demand of quality-of-service (QoS) in mission-critical communications for disaster management which are currently faced with the challenges of limited spectrum, expensive resources, reliable and green communication. There is a tremendous need for optimisation techniques in the study and design of the key functionalities of wireless systems. Until now, almost current optimisation scenarios are often carried out on large timescales (e.g., minutes or hours) without strict time constraints for solving the problems. With the improvement of computational speed, eļ¬cient algorithms and advanced coding approaches, a framwork of real-time optimisation programming, which plays a major role in the trend of modern engineering such as mission-critical communications, is introduced for the first time in this paper in the context of natural disaster. In particular, we propose an introduction of embedded convex optimisation programming for unmanned ariel vehicles (UAVs) communications in disaster networks with the strict supervision of executive time in real-time scenarios.
Authors and Affiliations
Long D. Nguyen, Ayse Kortun, Trung Q. Duong
SMC-I with Approach Angle Method for Slip Suppression of Electric Vehicles
This study presents SMC-I (sliding mode control with integral action) with approach angle method applied to slip suppression problem of electric vehicles (EVs). In SMC, chattering phenomenon always occurs through high fr...
An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems
Anomaly detection is an important aspect of data mining, where the main objective is to identify anomalous or unusual data from a given dataset. However, there is no formal categorization of application-specific anomaly...
Security and Privacy in Online Social Networks: A Survey
The Online Social Networks (OSN) open a new vista serving millions of users and have reshaped the way people interacts. Unfortunately these networks are an emerging platform for cybercrimes such as sending malicious URLs...
Phase and Time Synchronization for 5G C-RAN: Requirements, Design Challenges and Recent Advances in Standardization
Cloud-RAN is one of the key enablers for 5G. In this paper we present the importance of network synchronization for the fronthaul architectures. The term network synchronization refers to the distribution of time and fre...
Outage Performance of Cooperative Cognitive Radio Networks under Joint Constraints of Co-Channel Interference, Intercept Probability and Hardware Imperfection
This paper evaluates outage probability (OP) of a cooperative underlay cognitive radio network in the presence of a passive secondary eavesdropper under joint impacts of limited interference from a primary network and ha...