Next Issue
Volume 10, July-2
Previous Issue
Volume 10, June-2
 
 

Electronics, Volume 10, Issue 13 (July-1 2021) – 104 articles

Cover Story (view full-size image): The advancement in UAVs, along with their integration with cellular and satellite communication, provides several applications and stable services in remote locations. However, UAVs are becoming easy targets for cyber attackers due to their weak and poor security infrastructure. In this paper, we introduced a machine-learning-enabled Intrusion Detection System (IDS) security model for 5G-Connected UAV Networks. This security model is based on a popular network dataset that can harness ML to effectively detect various types of vulnerabilities and cyberattacks. The effectiveness of various types of ML algorithms used in IDS was compared, and the results were presented. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
25 pages, 935 KiB  
Article
Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif
by Ed Kamya Kiyemba Edris, Mahdi Aiash and Jonathan Loo
Electronics 2021, 10(13), 1608; https://doi.org/10.3390/electronics10131608 - 5 Jul 2021
Cited by 14 | Viewed by 5176
Abstract
Device-to-Device (D2D) communications will be used as an underlay technology in the Fifth Generation mobile network (5G), which will make network services of multiple Service Providers (SP) available anywhere. The end users will be allowed to access and share services using their User [...] Read more.
Device-to-Device (D2D) communications will be used as an underlay technology in the Fifth Generation mobile network (5G), which will make network services of multiple Service Providers (SP) available anywhere. The end users will be allowed to access and share services using their User Equipments (UEs), and thus they will require seamless and secured connectivity. At the same time, Mobile Network Operators (MNOs) will use the UE to offload traffic and push contents closer to users relying on D2D communications network. This raises security concerns at different levels of the system architecture and highlights the need for robust authentication and authorization mechanisms to provide secure services access and sharing between D2D users. Therefore, this paper proposes a D2D level security solution that comprises two security protocols, namely, the D2D Service security (DDSec) and the D2D Attributes and Capability security (DDACap) protocols, to provide security for access, caching and sharing data in network-assisted and non-network-assisted D2D communications scenarios. The proposed solution applies Identity-based Encryption (IBE), Elliptic Curve Integrated Encryption Scheme (ECIES) and access control mechanisms for authentication and authorization procedures. We formally verified the proposed protocols using ProVerif and applied pi calculus. We also conducted a security analysis of the proposed protocols. Full article
(This article belongs to the Special Issue 5G and beyond Mobile and Satellite Communications)
Show Figures

Figure 1

11 pages, 607 KiB  
Review
Review on Free-Space Optical Communications for Delay and Disruption Tolerant Networks
by Mafalda Goncalves Teixeira, Julio Ramirez Molina and Vasco N. G. J. Soares
Electronics 2021, 10(13), 1607; https://doi.org/10.3390/electronics10131607 - 5 Jul 2021
Cited by 3 | Viewed by 4580
Abstract
The increase of data-rates that are provided by free-space optical (FSO) communications is essential in our data-driven society. When used in satellite and interplanetary networks, these optical links can ensure fast connections, yet they are susceptible to atmospheric disruptions and long orbital delays. [...] Read more.
The increase of data-rates that are provided by free-space optical (FSO) communications is essential in our data-driven society. When used in satellite and interplanetary networks, these optical links can ensure fast connections, yet they are susceptible to atmospheric disruptions and long orbital delays. The Delay and Disruption Tolerant Networking (DTN) architecture ensures a reliable connection between two end nodes, without the need for a direct connection. This can be an asset when used with FSO links, providing protocols that can handle the intermittent nature of the connection. This paper provides a review on the theoretical and state-of-the-art studies on FSO and DTN. The aim of this review is to provide motivation for the research of an optical wireless satellite network, with focus on the use of the Licklider Transmission Protocol. The assessment presented establishes the viability of these networks, providing many examples to rely on, and summarizing the most recent stage of the development of the technologies addressed. Full article
(This article belongs to the Special Issue Delay Tolerant Networks and Applications)
Show Figures

Figure 1

34 pages, 2226 KiB  
Review
Android Mobile Malware Detection Using Machine Learning: A Systematic Review
by Janaka Senanayake, Harsha Kalutarage and Mhd Omar Al-Kadri
Electronics 2021, 10(13), 1606; https://doi.org/10.3390/electronics10131606 - 5 Jul 2021
Cited by 63 | Viewed by 22110
Abstract
With the increasing use of mobile devices, malware attacks are rising, especially on Android phones, which account for 72.2% of the total market share. Hackers try to attack smartphones with various methods such as credential theft, surveillance, and malicious advertising. Among numerous countermeasures, [...] Read more.
With the increasing use of mobile devices, malware attacks are rising, especially on Android phones, which account for 72.2% of the total market share. Hackers try to attack smartphones with various methods such as credential theft, surveillance, and malicious advertising. Among numerous countermeasures, machine learning (ML)-based methods have proven to be an effective means of detecting these attacks, as they are able to derive a classifier from a set of training examples, thus eliminating the need for an explicit definition of the signatures when developing malware detectors. This paper provides a systematic review of ML-based Android malware detection techniques. It critically evaluates 106 carefully selected articles and highlights their strengths and weaknesses as well as potential improvements. Finally, the ML-based methods for detecting source code vulnerabilities are discussed, because it might be more difficult to add security after the app is deployed. Therefore, this paper aims to enable researchers to acquire in-depth knowledge in the field and to identify potential future research and development directions. Full article
(This article belongs to the Special Issue High Accuracy Detection of Mobile Malware Using Machine Learning)
Show Figures

Figure 1

21 pages, 2702 KiB  
Article
An Informative Path Planner for a Swarm of ASVs Based on an Enhanced PSO with Gaussian Surrogate Model Components Intended for Water Monitoring Applications
by Micaela Jara Ten Kathen, Isabel Jurado Flores and Daniel Gutiérrez Reina
Electronics 2021, 10(13), 1605; https://doi.org/10.3390/electronics10131605 - 4 Jul 2021
Cited by 13 | Viewed by 2684
Abstract
Controlling the water quality of water supplies has always been a critical challenge, and water resource monitoring has become a need in recent years. Manual monitoring is not recommended in the case of large water surfaces for a variety of reasons, including expense [...] Read more.
Controlling the water quality of water supplies has always been a critical challenge, and water resource monitoring has become a need in recent years. Manual monitoring is not recommended in the case of large water surfaces for a variety of reasons, including expense and time consumption. In the last few years, researchers have proposed the use of autonomous vehicles for monitoring tasks. Fleets or swarms of vehicles can be deployed to conduct water resource explorations by using path planning techniques to guide the movements of each vehicle. The main idea of this work is the development of a monitoring system for Ypacarai Lake, where a fleet of autonomous surface vehicles will be guided by an improved particle swarm optimization based on the Gaussian process as a surrogate model. The purpose of using the surrogate model is to model water quality parameter behavior and to guide the movements of the vehicles toward areas where samples have not yet been collected; these areas are considered areas with high uncertainty or unexplored areas and areas with high contamination levels of the lake. The results show that the proposed approach, namely the enhanced GP-based PSO, balances appropriately the exploration and exploitation of the surface of Ypacarai Lake. In addition, the proposed approach has been compared with other techniques like the original particle swarm optimization and the particle swarm optimization with Gaussian process uncertainty component in a simulated Ypacarai Lake environment. The obtained results demonstrate the superiority of the proposed enhanced GP-based PSO in terms of mean square error with respect to the other techniques. Full article
Show Figures

Figure 1

10 pages, 3226 KiB  
Article
Optical Fiber Sensor for PVC Sheet Piles Monitoring
by Mateusz Lakomski, Grzegorz Tosik and Przemyslaw Niedzielski
Electronics 2021, 10(13), 1604; https://doi.org/10.3390/electronics10131604 - 4 Jul 2021
Cited by 4 | Viewed by 2391
Abstract
This paper examined the impact of optical fiber sensor design, and its integration to PVC (polyvinyl chloride) sheet piles, on deflection and strain monitoring. Optical fiber sensors based on Brillouin light backscattering (BLS) were prepared, as they can provide accurate strain and deflection [...] Read more.
This paper examined the impact of optical fiber sensor design, and its integration to PVC (polyvinyl chloride) sheet piles, on deflection and strain monitoring. Optical fiber sensors based on Brillouin light backscattering (BLS) were prepared, as they can provide accurate strain and deflection measurement results. However, depending on the application of sheet piles systems, high deformation of PVC elements can be observed. Therefore, a fiber sensor design is not trivial. Three types of optical fiber coatings and their integration with PVC sheet piles were investigated. The effect on the value of compressive and tensile strain were analyzed. It has been experimentally proven that PVC sheet piles monitoring, based on BLS method, can be realized using optical fibers with 250 µm, 900 µm, and 3 mm coating diameter. Achieved results are in line with theory. Correction coefficient necessary for 900 µm and 3 mm coatings has been proposed and used to ensure proper strain measurement. It was found that 250 µm coating fiber based sensors can be utilized for PVC strain measurement under low deflection (>1.2 m beam length). On the other hand, sensors based on 3 mm coating fiber, due to a high level of linearity, can be applied to deflection distance measurement under high deformation. Full article
Show Figures

Figure 1

15 pages, 8517 KiB  
Article
Uniform Magnetic Field Characteristics Based UHF RFID Tag for Internet of Things Applications
by Abubakar Sharif, Yi Yan, Jun Ouyang, Hassan Tariq Chattha, Kamran Arshad, Khaled Assaleh, Abdullah Alhumaidi Alotabi, Turke Althobaiti, Naeem Ramzan, Qammer Hussain Abbasi and Muhammad Ali Imran
Electronics 2021, 10(13), 1603; https://doi.org/10.3390/electronics10131603 - 3 Jul 2021
Cited by 10 | Viewed by 3421
Abstract
This paper presents a novel inkjet-printed near-field ultra-high-frequency (UHF) radio frequency identification (RFID) tag/sensor design with uniform magnetic field characteristics. The proposed tag is designed using the theory of characteristics mode (TCM). Moreover, the uniformity of current and magnetic field performance is achieved [...] Read more.
This paper presents a novel inkjet-printed near-field ultra-high-frequency (UHF) radio frequency identification (RFID) tag/sensor design with uniform magnetic field characteristics. The proposed tag is designed using the theory of characteristics mode (TCM). Moreover, the uniformity of current and magnetic field performance is achieved by further optimizing the design using particle swarm optimization (PSO). Compared to traditional electrically small near-field tags, this tag uses the logarithmic spiral as the radiating structure. The benefit of the logarithmic spiral structure lies in its magnetic field receiving area that can be extended to reach a higher reading distance. The combination of TCM and PSO is used to get the uniform magnetic field and desired resonant frequency. Moreover, the PSO was exploited to get a uniform magnetic field in the horizontal plane of the normal phase of the UHF RFID near-field reader antenna. As compared with the frequently-used commercial near field tag (Impinj J41), our design can be readable up to a three times greater read distance. Furthermore, the proposed near-field tag design shows great potential for commercial item-level tagging of expensive jewelry products and sensing applications, such as temperature monitoring of the human body. Full article
(This article belongs to the Collection Smart Sensing RFID Tags)
Show Figures

Figure 1

15 pages, 3337 KiB  
Article
Using Flipped Classroom to Improve the Learning Effectiveness of Digital Logic Courses
by Tuan-Yung Han, Hong-Ren Chen and Hao-Chiang Koong Lin
Electronics 2021, 10(13), 1602; https://doi.org/10.3390/electronics10131602 - 3 Jul 2021
Cited by 3 | Viewed by 2875
Abstract
As a student-centered learning model, flipped classroom has been increasingly preferred among educators since it has changed the traditional teacher-centered learning model. This study conducted experiments and observations on the flipped classroom for digital logic courses for first-year students in the electrical engineering [...] Read more.
As a student-centered learning model, flipped classroom has been increasingly preferred among educators since it has changed the traditional teacher-centered learning model. This study conducted experiments and observations on the flipped classroom for digital logic courses for first-year students in the electrical engineering department of a junior college in Taiwan. Before each class, these students were required to watch the prescribed lecture video units. In class, students discussed with group members after thinking and completed the teacher’s requirements by collaboration. In addition to conducting the activities of thinking, discussion, collaboration and observation, these students also got to exercise their expression skills through interactive activities during class time. Analyzing the learning effectiveness with the Panel Data Method (PDM), this study, by comparing and statistically analyzing the data collected during the four years between 2016 and 2019, found that students reaped better learning performance with the flipped classroom model, as shown by a rise in both their average grade and the pass rate. Full article
(This article belongs to the Section Electronic Multimedia)
Show Figures

Figure 1

16 pages, 4657 KiB  
Article
ViolenceNet: Dense Multi-Head Self-Attention with Bidirectional Convolutional LSTM for Detecting Violence
by Fernando J. Rendón-Segador, Juan A. Álvarez-García, Fernando Enríquez and Oscar Deniz
Electronics 2021, 10(13), 1601; https://doi.org/10.3390/electronics10131601 - 3 Jul 2021
Cited by 41 | Viewed by 5707
Abstract
Introducing efficient automatic violence detection in video surveillance or audiovisual content monitoring systems would greatly facilitate the work of closed-circuit television (CCTV) operators, rating agencies or those in charge of monitoring social network content. In this paper we present a new deep learning [...] Read more.
Introducing efficient automatic violence detection in video surveillance or audiovisual content monitoring systems would greatly facilitate the work of closed-circuit television (CCTV) operators, rating agencies or those in charge of monitoring social network content. In this paper we present a new deep learning architecture, using an adapted version of DenseNet for three dimensions, a multi-head self-attention layer and a bidirectional convolutional long short-term memory (LSTM) module, that allows encoding relevant spatio-temporal features, to determine whether a video is violent or not. Furthermore, an ablation study of the input frames, comparing dense optical flow and adjacent frames subtraction and the influence of the attention layer is carried out, showing that the combination of optical flow and the attention mechanism improves results up to 4.4%. The conducted experiments using four of the most widely used datasets for this problem, matching or exceeding in some cases the results of the state of the art, reducing the number of network parameters needed (4.5 millions), and increasing its efficiency in test accuracy (from 95.6% on the most complex dataset to 100% on the simplest one) and inference time (less than 0.3 s for the longest clips). Finally, to check if the generated model is able to generalize violence, a cross-dataset analysis is performed, which shows the complexity of this approach: using three datasets to train and testing on the remaining one the accuracy drops in the worst case to 70.08% and in the best case to 81.51%, which points to future work oriented towards anomaly detection in new datasets. Full article
(This article belongs to the Special Issue Computer Vision for Surveillance)
Show Figures

Figure 1

6 pages, 1317 KiB  
Article
GaN-Based PCSS with High Breakdown Fields
by Matthew Gaddy, Vladimir Kuryatkov, Nicholas Wilson, Andreas Neuber, Richard Ness and Sergey Nikishin
Electronics 2021, 10(13), 1600; https://doi.org/10.3390/electronics10131600 - 3 Jul 2021
Cited by 10 | Viewed by 3188
Abstract
The suitability of GaN PCSSs (photoconductive semiconductor switches) as high voltage switches (>50 kV) was studied using a variety of commercially available semi-insulating GaN wafers as the base material. Analysis revealed that the wafers’ physical properties were noticeably diverse, mainly depending on the [...] Read more.
The suitability of GaN PCSSs (photoconductive semiconductor switches) as high voltage switches (>50 kV) was studied using a variety of commercially available semi-insulating GaN wafers as the base material. Analysis revealed that the wafers’ physical properties were noticeably diverse, mainly depending on the producer. High Voltage PCSSs were fabricated in both vertical and lateral geometry with various contacts, ohmic (Ti/Al/Ni/Au or Ni/Au), with and without a conductive n-GaN or p-type layer grown by metal-organic chemical vapor deposition. Inductively coupled plasma (ICP) reactive ion etching (RIE) was used to form a mesa structure to reduce field enhancements allowing for a higher field to be applied before electrical breakdown. The length of the active region was also varied from a 3 mm gap spacing to a 600 µm gap spacing. The shorter gap spacing supports higher electric fields since the number of macro defects within the device’s active region is reduced. Such defects are common in hydride vapor phase epitaxy grown samples and are likely one of the chief causes for electrical breakdown at field levels below the bulk breakdown field of GaN. Finally, the switching behavior of PCSS devices was tested using a pulsed, high voltage testbed and triggered by an Nd:YAG laser. The best GaN PCSS fabricated using a 600 µm gap spacing, and a mesa structure demonstrated a breakdown field strength as high as ~260 kV/cm. Full article
Show Figures

Figure 1

23 pages, 6520 KiB  
Article
Physical Layer Latency Management Mechanisms: A Study for Millimeter-Wave Wi-Fi
by Alexander Marinšek, Daan Delabie, Lieven De Strycker and Liesbet Van der Perre
Electronics 2021, 10(13), 1599; https://doi.org/10.3390/electronics10131599 - 3 Jul 2021
Cited by 2 | Viewed by 2798
Abstract
Emerging applications in fields such as extended reality require both a high throughput and low latency. The millimeter-wave (mmWave) spectrum is considered because of the potential in the large available bandwidth. The present work studies mmWave Wi-Fi physical layer latency management mechanisms, a [...] Read more.
Emerging applications in fields such as extended reality require both a high throughput and low latency. The millimeter-wave (mmWave) spectrum is considered because of the potential in the large available bandwidth. The present work studies mmWave Wi-Fi physical layer latency management mechanisms, a key factor in providing low-latency communications for time-critical applications. We calculate physical layer latency in an ideal scenario and simulate it using a tailor-made simulation framework, based on the IEEE 802.11ad standard. Assessing data reception quality over a noisy channel yielded latency’s dependency on transmission parameters, channel noise, and digital baseband tuning. Latency in function of the modulation and coding scheme was found to span 0.28–2.71 ms in the ideal scenario, whereas simulation results also revealed its tight bond with the demapping algorithm and the number of low-density parity-check decoder iterations. The findings yielded tuning parameter combinations for reaching Pareto optimality either by constraining the bit error rate and optimizing latency or the other way around. Our assessment shows that trade-offs can and have to be made to provide sufficiently reliable low-latency communication. In good channel conditions, one may benefit from both the very high throughput and low latency; yet, in more adverse situations, lower modulation orders and additional coding overhead are a necessity. Full article
Show Figures

Figure 1

14 pages, 2839 KiB  
Article
Optimal Placement and Sizing of an Energy Storage System Using a Power Sensitivity Analysis in a Practical Stand-Alone Microgrid
by Dongmin Kim, Kipo Yoon, Soo Hyoung Lee and Jung-Wook Park
Electronics 2021, 10(13), 1598; https://doi.org/10.3390/electronics10131598 - 2 Jul 2021
Cited by 9 | Viewed by 3134
Abstract
The energy storage system (ESS) is developing into a very important element for the stable operation of power systems. An ESS is characterized by rapid control, free charging, and discharging. Because of these characteristics, it can efficiently respond to sudden events that affect [...] Read more.
The energy storage system (ESS) is developing into a very important element for the stable operation of power systems. An ESS is characterized by rapid control, free charging, and discharging. Because of these characteristics, it can efficiently respond to sudden events that affect the power system and can help to resolve congested lines caused by the excessive output of distributed generators (DGs) using renewable energy sources (RESs). In order to efficiently and economically install new ESSs in the power system, the following two factors must be considered: the optimal installation placements and the optimal sizes of ESSs. Many studies have explored the optimal installation placement and the sizing of ESSs by using analytical approaches, mathematical optimization techniques, and artificial intelligence. This paper presents an algorithm to determine the optimal installation placement and sizing of ESSs for a virtual multi-slack (VMS) operation based on a power sensitivity analysis in a stand-alone microgrid. Through the proposed algorithm, the optimal installation placement can be determined by a simple calculation based on a power sensitivity matrix, and the optimal sizing of the ESS for the determined placement can be obtained at the same time. The algorithm is verified through several case studies in a stand-alone microgrid based on practical power system data. The results of the proposed algorithm show that installing ESSs in the optimal placement could improve the voltage stability of the microgrid. The sizing of the newly installed ESS was also properly determined. Full article
(This article belongs to the Special Issue Energy Management Systems for Microgrids)
Show Figures

Figure 1

17 pages, 493 KiB  
Article
Towards Dynamic Reconfiguration of a Composite Web Service: An Approach Based on QoS Prediction
by Abdessalam Messiaid, Farid Mokhati, Rohallah Benaboud and Hajer Salem
Electronics 2021, 10(13), 1597; https://doi.org/10.3390/electronics10131597 - 2 Jul 2021
Cited by 4 | Viewed by 1938
Abstract
Service-oriented architecture provides the ability to combine several web services in order to fulfil a user-specific requirement. In dynamic environments, the appearance of several unforeseen events can destabilize the composite web service (CWS) and affect its quality. To deal with these issues, the [...] Read more.
Service-oriented architecture provides the ability to combine several web services in order to fulfil a user-specific requirement. In dynamic environments, the appearance of several unforeseen events can destabilize the composite web service (CWS) and affect its quality. To deal with these issues, the composite web service must be dynamically reconfigured. Dynamic reconfiguration may be enhanced by avoiding the invocation of degraded web services by predicting QoS for the candidate web service. In this paper, we propose a dynamic reconfiguration method based on HMM (Hidden Markov Model) states to predict the imminent degradation in QoS and prevent the invocation of partner web services with degraded QoS values. PSO (Particle Swarm Optimization) and SFLA (Shuffled Frog Leaping Algorithm) are used to improve the prediction efficiency of HMM. Through extensive experiments on a real-world dataset, WS-Dream, the results demonstrate that the proposed approach can achieve better prediction accuracy. Moreover, we carried out a case study where we revealed that the proposed approach outperforms several state-of-the-art methods in terms of execution time. Full article
(This article belongs to the Special Issue Pervasive Intelligence in Information Technology)
Show Figures

Figure 1

18 pages, 2153 KiB  
Article
Robust Predictive Control Scheme for Permanent-Magnet Synchronous Generators Based Modern Wind Turbines
by Mohamed Abdelrahem, Christoph Hackl and Ralph Kennel
Electronics 2021, 10(13), 1596; https://doi.org/10.3390/electronics10131596 - 2 Jul 2021
Cited by 22 | Viewed by 2000
Abstract
In this article, a deadbeat predictive control (DB-PC) strategy for permanent-magnet synchronous generators (PMSGs)-based modern wind turbines is proposed. The main advantages of the DB-PC technique are its excellent dynamics and its constant switching frequency. However, the main idea of DB-PC is obtaining [...] Read more.
In this article, a deadbeat predictive control (DB-PC) strategy for permanent-magnet synchronous generators (PMSGs)-based modern wind turbines is proposed. The main advantages of the DB-PC technique are its excellent dynamics and its constant switching frequency. However, the main idea of DB-PC is obtaining the actuation voltage for the next sample from the mathematical model of the generator. Therefore, the DB-PC is highly sensitive to mismatches in the parameters of the PMSG. In order to obviate this problem, a disturbance estimator (extended Kalman filter (EKF)) is employed in this work to enhance the robustness of the proposed DB-PC scheme by estimating the total disturbance due to parameter mismatches and adding it to the calculation of the actuation voltage. Furthermore, the same EKF observe the rotor speed and position of the PMSG, i.e., mechanical sensors are not required. Moreover, the EKF is able to reduce the harmonic distortion in the stator currents of the PMSG. The proposed DB-PC strategy is implemented in the laboratory. The experimental results proved the superiority of the proposed DB-PC strategy over the traditional DB-PC technique. Full article
Show Figures

Figure 1

16 pages, 5089 KiB  
Article
A Routing Query Algorithm Based on Time-Varying Relationship Group in Opportunistic Social Networks
by Yihan Dong, Liu Chang, Jingwen Luo and Jia Wu
Electronics 2021, 10(13), 1595; https://doi.org/10.3390/electronics10131595 - 2 Jul 2021
Cited by 14 | Viewed by 2245
Abstract
With the fast development of IoT and 5G technologies, opportunity social networks composed of portable mobile devices have become a hot research topic in recent years. However, arbitrary node movement in opportunity networks and the absence of end-to-end pathways make node communication unstable. [...] Read more.
With the fast development of IoT and 5G technologies, opportunity social networks composed of portable mobile devices have become a hot research topic in recent years. However, arbitrary node movement in opportunity networks and the absence of end-to-end pathways make node communication unstable. At the same time, the problem of ignoring human social preferences and relying on wrong message relay nodes lead to a low data transmission rate and high network overhead. Based on the above issues, we propose a time-varying relationship groups-based routing query algorithm for mobile opportunity networks (Time-varying Relationship Groups, TVRGs). Firstly, we construct the relationship groups based on the time-varying characteristics according to the intimacy between users. Secondly, we calculate the importance of nodes by their connectivity time and communication frequency. Finally, we find the suitable message relay nodes according to the similarity of node weights and their action trajectories and design the routing query algorithm accordingly. The simulation results show that the algorithm can vastly improve the message query success rate, effectively improve the data transmission efficiency, and reduce the average delay and system overhead compared with the existing routing algorithms. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

27 pages, 3738 KiB  
Article
A Unified and Open LTSPICE Memristor Model Library
by Valeri Mladenov
Electronics 2021, 10(13), 1594; https://doi.org/10.3390/electronics10131594 - 2 Jul 2021
Cited by 37 | Viewed by 9403
Abstract
In this paper, a unified and open linear technology simulation program with integrated circuit emphasis (LTSPICE) memristor library is proposed. It is suitable for the analysis, design, and comparison of the basic memristors and memristor-based circuits. The library could be freely used and [...] Read more.
In this paper, a unified and open linear technology simulation program with integrated circuit emphasis (LTSPICE) memristor library is proposed. It is suitable for the analysis, design, and comparison of the basic memristors and memristor-based circuits. The library could be freely used and expanded with new LTSPICE memristor models. The main existing standard memristor models and several enhanced and modified models based on transition metal oxides such as titanium dioxide, hafnium dioxide, and tantalum oxide are included in the library. LTSPICE is one of the best software for analysis and design of electronic schemes. It is an easy to use, widespread, and free product with very good convergence. Memristors have been under intensive analysis in recent years due to their nano-dimensions, low power consumption, high switching speed, and good compatibility with traditional complementary metal oxide semiconductor (CMOS) technology. In this work, their behavior and potential applications in artificial neural networks, reconfigurable schemes, and memory crossbars are investigated using the considered memristor models in the proposed LTSPICE library. Furthermore, a detailed comparison of the presented LTSPICE memristor model library is conducted and related to specific criteria, such as switching speed, operating frequencies, nonlinear ionic drift representation, boundary effects, switching modes, and others. Full article
(This article belongs to the Section Microelectronics)
Show Figures

Figure 1

20 pages, 88029 KiB  
Article
Battery Durability and Reliability under Electric Utility Grid Operations: Analysis of On-Site Reference Tests
by Matthieu Dubarry, Moe Tun, George Baure, Marc Matsuura and Richard E. Rocheleau
Electronics 2021, 10(13), 1593; https://doi.org/10.3390/electronics10131593 - 2 Jul 2021
Cited by 12 | Viewed by 3624
Abstract
Grid-tied energy storage will play a key role in the reduction of carbon emissions. Systems based on Li-ion batteries could be good candidates for the task, especially those using lithium titanate negative electrodes. In this work, we will present the study of seven [...] Read more.
Grid-tied energy storage will play a key role in the reduction of carbon emissions. Systems based on Li-ion batteries could be good candidates for the task, especially those using lithium titanate negative electrodes. In this work, we will present the study of seven years of usage of a lithium titanate-based battery energy storage system on an isolated island grid. We will show that, even after seven years, the modules’ capacity loss is below 10% and that overall the battery is still performing within specifications. From our results, we established a forecast based on the internal degradation mechanisms of the hottest and coldest modules to show that the battery full lifetime on the grid should easily exceed 15 years. We also identified some inaccuracies in the online capacity estimation methodology which complicates the monitoring of the system. Full article
Show Figures

Figure 1

17 pages, 98514 KiB  
Article
CNN Algorithm for Roof Detection and Material Classification in Satellite Images
by Jonguk Kim, Hyansu Bae, Hyunwoo Kang and Suk Gyu Lee
Electronics 2021, 10(13), 1592; https://doi.org/10.3390/electronics10131592 - 1 Jul 2021
Cited by 12 | Viewed by 7468
Abstract
This paper suggests an algorithm for extracting the location of a building from satellite imagery and using that information to modify the roof content. The materials are determined by measuring the conditions where the building is located and detecting the position of a [...] Read more.
This paper suggests an algorithm for extracting the location of a building from satellite imagery and using that information to modify the roof content. The materials are determined by measuring the conditions where the building is located and detecting the position of a building in broad satellite images. Depending on the incomplete roof or material, there is a greater possibility of great damage caused by disaster situations or external shocks. To address these problems, we propose an algorithm to detect roofs and classify materials in satellite images. Satellite imaging locates areas where buildings are likely to exist based on roads. Using images of the detected buildings, we classify the material of the roof using a proposed convolutional neural network (CNN) model algorithm consisting of 43 layers. In this paper, we propose a CNN structure to detect areas with buildings in large images and classify roof materials in the detected areas. Full article
(This article belongs to the Special Issue Convolutional Neural Networks and Vision Applications)
Show Figures

Figure 1

23 pages, 8520 KiB  
Article
Optimal Distribution Coefficients of Energy Resources in Frequency Stability of Hybrid Microgrids Connected to the Power System
by Mohsen Arzani, Ahmadreza Abazari, Arman Oshnoei, Mohsen Ghafouri and S. M. Muyeen
Electronics 2021, 10(13), 1591; https://doi.org/10.3390/electronics10131591 - 1 Jul 2021
Cited by 11 | Viewed by 3213
Abstract
The continuous stability of hybrid microgrids (MGs) has been recently proposed as a critical topic, due to the ever-increasing growth of renewable energy sources (RESs) in low-inertia power systems. However, the stochastic and intermittent nature of RESs poses serious challenges for the stability [...] Read more.
The continuous stability of hybrid microgrids (MGs) has been recently proposed as a critical topic, due to the ever-increasing growth of renewable energy sources (RESs) in low-inertia power systems. However, the stochastic and intermittent nature of RESs poses serious challenges for the stability and frequency regulation of MGs. In this regard, frequency control ancillary services (FCAS) can be introduced to alleviate the transient effects during substantial variations in the operating point and the separation from main power grids. In this paper, an efficient scheme is introduced to create a coordination among distributed energy resources (DERs), including combined heat and power, diesel engine generator, wind turbine generators, and photovoltaic panels. In this scheme, the frequency regulation signal is assigned to DERs based on several distribution coefficients, which are calculated through conducting a multi-objective optimization problem in the MATLAB environment. A meta-heuristic approach, known as the artificial bee colony algorithm, is deployed to determine optimal solutions. To prove the efficiency of the proposed scheme, the design is implemented on a hybrid MG. Various operational conditions which render the system prone to experience frequency fluctuation, including switching operation, load disturbance, and reduction in the total inertia of hybrid microgrids, are studied in PSCAD software. Simulation results demonstrate that this optimal control scheme can yield a more satisfactory performance in the presence of grid-following and grid-forming resources during different operational conditions. Full article
(This article belongs to the Section Industrial Electronics)
Show Figures

Figure 1

17 pages, 10295 KiB  
Article
Modeling, Verification, and Signal Integrity Analysis of High-Speed Signaling Channel with Tabbed Routing in High Performance Computing Server Board
by Kyunghwan Song, Jongwook Kim, Hyunwoong Kim, Seonghi Lee, Jangyong Ahn, Andres Brito, Hyunsik Kim, Minho Park and Seungyoung Ahn
Electronics 2021, 10(13), 1590; https://doi.org/10.3390/electronics10131590 - 1 Jul 2021
Cited by 7 | Viewed by 4039
Abstract
It is necessary to reduce the crosstalk noise in high-speed signaling channels. In the channel routing area, the tabbed routing pattern is used to mitigate far-end crosstalk (FEXT), and the electrical length is controlled with a time domain reflectometer (TDR) and time domain [...] Read more.
It is necessary to reduce the crosstalk noise in high-speed signaling channels. In the channel routing area, the tabbed routing pattern is used to mitigate far-end crosstalk (FEXT), and the electrical length is controlled with a time domain reflectometer (TDR) and time domain transmission (TDT). However, unlike traditional channels having uniform width and space, the width and space of tabbed routing changes by segment, and the capacitance and inductance values of tabbed routing also change. In this paper, we propose a tabbed routing equivalent circuit modeling method using the segmentation approach. The proposed model was verified using 3D EM simulation and measurement results in the frequency domain. Based on the calculated inductance and capacitance parameters, we analyzed the insertion loss, FEXT, and self-impedance in the frequency domain, and TDT and FEXT in the time domain, by comparing the values of these metrics with and without tabbed routing. Using the proposed tabbed routing model, we analyzed tabbed routing with variations of design parameters based on self- and mutual-capacitance and inductance. Full article
Show Figures

Figure 1

19 pages, 1310 KiB  
Article
Context-Aware Neural Machine Translation for Korean Honorific Expressions
by Yongkeun Hwang, Yanghoon Kim and Kyomin Jung
Electronics 2021, 10(13), 1589; https://doi.org/10.3390/electronics10131589 - 30 Jun 2021
Cited by 4 | Viewed by 4487
Abstract
Neural machine translation (NMT) is one of the text generation tasks which has achieved significant improvement with the rise of deep neural networks. However, language-specific problems such as handling the translation of honorifics received little attention. In this paper, we propose a context-aware [...] Read more.
Neural machine translation (NMT) is one of the text generation tasks which has achieved significant improvement with the rise of deep neural networks. However, language-specific problems such as handling the translation of honorifics received little attention. In this paper, we propose a context-aware NMT to promote translation improvements of Korean honorifics. By exploiting the information such as the relationship between speakers from the surrounding sentences, our proposed model effectively manages the use of honorific expressions. Specifically, we utilize a novel encoder architecture that can represent the contextual information of the given input sentences. Furthermore, a context-aware post-editing (CAPE) technique is adopted to refine a set of inconsistent sentence-level honorific translations. To demonstrate the efficacy of the proposed method, honorific-labeled test data is required. Thus, we also design a heuristic that labels Korean sentences to distinguish between honorific and non-honorific styles. Experimental results show that our proposed method outperforms sentence-level NMT baselines both in overall translation quality and honorific translations. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

36 pages, 49774 KiB  
Review
Estimation of Lithium-Ion Batteries State-Condition in Electric Vehicle Applications: Issues and State of the Art
by Khaled Laadjal and Antonio J. Marques Cardoso
Electronics 2021, 10(13), 1588; https://doi.org/10.3390/electronics10131588 - 30 Jun 2021
Cited by 57 | Viewed by 10441
Abstract
Lithium-ion batteries are the most used these days for charging electric vehicles (EV). It is important to study the aging of batteries because the deterioration of their characteristics largely determines the cost, efficiency, and environmental impact of electric vehicles, especially full-electric ones. The [...] Read more.
Lithium-ion batteries are the most used these days for charging electric vehicles (EV). It is important to study the aging of batteries because the deterioration of their characteristics largely determines the cost, efficiency, and environmental impact of electric vehicles, especially full-electric ones. The estimation of batteries’ state-condition is also very important for improving energy efficiency, lengthening the life cycle, minimizing costs and ensuring safe implementation of batteries in electric vehicles. However, batteries with large temporal variables and non-linear characteristics are often affected by random factors affecting the equivalent internal resistance (EIR), battery state of charge (SoC), and state of health (SoH) in EV applications. The estimation of batteries’ parameters is a complex process, due to its dependence on various factors such as batteries age and ambient temperature, among others. A good estimate of SoC and internal resistance leads to long battery life and disaster prevention in the event of a battery failure. The classification of estimation methodologies for internal parameters and the charging status of batteries will be very helpful in choosing the appropriate method for the development of a reliable and secure battery management system (BMS) and an energy management strategy for electric vehicles. Full article
(This article belongs to the Section Power Electronics)
Show Figures

Figure 1

11 pages, 3190 KiB  
Article
Low-Process–Voltage–Temperature-Sensitivity Multi-Stage Timing Monitor for System-on-Chip Applications
by Duo Sheng, Hsueh-Ru Lin and Li Tai
Electronics 2021, 10(13), 1587; https://doi.org/10.3390/electronics10131587 - 30 Jun 2021
Viewed by 2225
Abstract
High performance and complex system-on-chip (SoC) design require a throughput and stable timing monitor to reduce the impacts of uncertain timing and implement the dynamic voltage and frequency scaling (DVFS) scheme for overall power reduction. This paper presents a multi-stage timing monitor, combining [...] Read more.
High performance and complex system-on-chip (SoC) design require a throughput and stable timing monitor to reduce the impacts of uncertain timing and implement the dynamic voltage and frequency scaling (DVFS) scheme for overall power reduction. This paper presents a multi-stage timing monitor, combining three timing-monitoring stages to achieve a high timing-monitoring resolution and a wide timing-monitoring range simultaneously. Additionally, because the proposed timing monitor has high immunity to the process–voltage–temperature (PVT) variation, it provides a more stable time-monitoring results. The time-monitoring resolution and range of the proposed timing monitor are 47 ps and 2.2 µs, respectively, and the maximum measurement error is 0.06%. Therefore, the proposed multi-stage timing monitor provides not only the timing information of the specified signals to maintain the functionality and performance of the SoC, but also makes the operation of the DVFS scheme more efficient and accurate in SoC design. Full article
(This article belongs to the Special Issue Advances in System-on-Chip Design)
Show Figures

Figure 1

16 pages, 1808 KiB  
Article
Light-Weight Self-Attention Augmented Generative Adversarial Networks for Speech Enhancement
by Lujun Li, Zhenxing Lu, Tobias Watzel, Ludwig Kürzinger and Gerhard Rigoll
Electronics 2021, 10(13), 1586; https://doi.org/10.3390/electronics10131586 - 30 Jun 2021
Cited by 8 | Viewed by 4313
Abstract
Generative adversarial networks (GANs) have shown their superiority for speech enhancement. Nevertheless, most previous attempts had convolutional layers as the backbone, which may obscure long-range dependencies across an input sequence due to the convolution operator’s local receptive field. One popular solution is substituting [...] Read more.
Generative adversarial networks (GANs) have shown their superiority for speech enhancement. Nevertheless, most previous attempts had convolutional layers as the backbone, which may obscure long-range dependencies across an input sequence due to the convolution operator’s local receptive field. One popular solution is substituting recurrent neural networks (RNNs) for convolutional neural networks, but RNNs are computationally inefficient, caused by the unparallelization of their temporal iterations. To circumvent this limitation, we propose an end-to-end system for speech enhancement by applying the self-attention mechanism to GANs. We aim to achieve a system that is flexible in modeling both long-range and local interactions and can be computationally efficient at the same time. Our work is implemented in three phases: firstly, we apply the stand-alone self-attention layer in speech enhancement GANs. Secondly, we employ locality modeling on the stand-alone self-attention layer. Lastly, we investigate the functionality of the self-attention augmented convolutional speech enhancement GANs. Systematic experiment results indicate that equipped with the stand-alone self-attention layer, the system outperforms baseline systems across classic evaluation criteria with up to 95% fewer parameters. Moreover, locality modeling can be a parameter-free approach for further performance improvement, and self-attention augmentation also overtakes all baseline systems with acceptably increased parameters. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

10 pages, 2829 KiB  
Article
Simulation of FDSOI-ISFET with Tunable Sensitivity by Temperature and Dual-Gate Structure
by Hanbin Wang, Jinshun Bi, Mengxin Liu and Tingting Han
Electronics 2021, 10(13), 1585; https://doi.org/10.3390/electronics10131585 - 30 Jun 2021
Cited by 1 | Viewed by 2281
Abstract
This work investigates the different sensitivities of an ion-sensitive field-effect transistor (ISFET) based on fully depleted silicon-on-insulator (FDSOI). Using computer-aided design (TCAD) tools, the sensitivity of a single-gate FDSOI based ISFET (FDSOI-ISFET) at different temperatures and the effects of the planar dual-gate structure [...] Read more.
This work investigates the different sensitivities of an ion-sensitive field-effect transistor (ISFET) based on fully depleted silicon-on-insulator (FDSOI). Using computer-aided design (TCAD) tools, the sensitivity of a single-gate FDSOI based ISFET (FDSOI-ISFET) at different temperatures and the effects of the planar dual-gate structure on the sensitivity are determined. It is found that the sensitivity increases linearly with increasing temperature, reaching 890 mV/pH at 75 °C. By using a dual-gate structure and adjusting the control gate voltage, the sensitivity can be reduced from 750 mV/pH at 0 V control gate voltage to 540 mV/pH at 1 V control gate voltage. The above sensitivity changes are produced because the Nernst limit changes with temperature or the electric field generated by different control gate voltages causes changes in the carrier movement. It is proved that a single FDSOI-ISFET can have adjustable sensitivity by adjusting the operating temperature or the control gate voltage of the dual-gate device. Full article
(This article belongs to the Section Microelectronics)
Show Figures

Figure 1

13 pages, 402 KiB  
Article
Blockchain-Based Pseudonym Management Scheme for Vehicular Communication
by Sonia Alice George, Steffie Maria Stephen and Arunita Jaekel
Electronics 2021, 10(13), 1584; https://doi.org/10.3390/electronics10131584 - 30 Jun 2021
Cited by 8 | Viewed by 2559
Abstract
A vehicular ad hoc network (VANET) consists of vehicles, roadside units, and other infrastructures that communicate with each other with the goal of improving road safety, reducing accidents, and alleviating traffic congestion. For safe and secure operation of critical applications in VANET, it [...] Read more.
A vehicular ad hoc network (VANET) consists of vehicles, roadside units, and other infrastructures that communicate with each other with the goal of improving road safety, reducing accidents, and alleviating traffic congestion. For safe and secure operation of critical applications in VANET, it is essential to ensure that only authenticated vehicles can participate in the network. Another important requirement for VANET communication is that the privacy of vehicles and their users must be protected. Privacy can be improved by using pseudonyms instead of actual vehicle identities during communication. However, it is also necessary to ensure that these pseudonyms can be linked to the real vehicle identities if needed, in order to maintain accountability. In this paper, we propose a new blockchain-based decentralized pseudonym management scheme for VANET. This allows the vehicles to maintain conditional anonymity in the network. The blockchain is used to maintain a record of each vehicle and all of its pseudo-IDs. The information in the blockchain can only be accessed by authorized entities and is not available to all vehicles. The proposed distributed framework maintains an immutable record of the vehicle data, which is not vulnerable to a single point of failure. We compared the performance of the proposed approach with a traditional PKI scheme and shown that it significantly reduces the authentication delay. Full article
(This article belongs to the Special Issue The Technologies That Disappear: 30 Years after Mark Weiser's Vision)
Show Figures

Figure 1

16 pages, 4428 KiB  
Article
Analysis of Hybrid Meander Structures with Additional Shields
by Diana Belova-Plonienė, Audrius Krukonis and Andrius Katkevičius
Electronics 2021, 10(13), 1583; https://doi.org/10.3390/electronics10131583 - 30 Jun 2021
Cited by 4 | Viewed by 2286
Abstract
Models of hybrid meander structures with additional shields are presented in this paper. The influence of additional shields and their grounding positions on the electromagnetic characteristics of the hybrid meander structures was investigated. Three-dimensional models were created and analyzed using the method of [...] Read more.
Models of hybrid meander structures with additional shields are presented in this paper. The influence of additional shields and their grounding positions on the electromagnetic characteristics of the hybrid meander structures was investigated. Three-dimensional models were created and analyzed using the method of moments (MoM) in the Sonnet® and finite-difference time-domain (FDTD) method in CST Microwave Studio® commercial software packages. The computer-based modeling was verified by physical experiment. The analysis showed that it is possible to control the delay time characteristic using different values of lumped inductive elements without the need to change the overall size of the hybrid meander structure. The delay time varied by 1.2 ns in the range of 1.3 ns to 2.5 ns when the inductivity changed from 1 nH to 10 nH in our investigation. On the other hand, the passband decreased from 2.384 GHz to 0.508 GHz. The additional shields and their grounding positions allowed for increasing the passband by up to 1.6%. Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

20 pages, 5565 KiB  
Article
Application of Nonlinear Adaptive Control in Temperature of Chinese Solar Greenhouses
by Yonggang Wang, Yujin Lu and Ruimin Xiao
Electronics 2021, 10(13), 1582; https://doi.org/10.3390/electronics10131582 - 30 Jun 2021
Cited by 12 | Viewed by 2134
Abstract
The system of a greenhouse is required to ensure a suitable environment for crops growth. In China, the Chinese solar greenhouse plays a crucial role in maintaining a proper microclimate environment. However, the greenhouse system is described with complex dynamic characteristics, such as [...] Read more.
The system of a greenhouse is required to ensure a suitable environment for crops growth. In China, the Chinese solar greenhouse plays a crucial role in maintaining a proper microclimate environment. However, the greenhouse system is described with complex dynamic characteristics, such as multi-disturbance, parameter uncertainty, and strong nonlinearity. It is difficult for the conventional control method to deal with the above problems. To address these problems, a dynamic model of Chinese solar greenhouses was developed based on energy conservation laws, and a nonlinear adaptive control strategy combined with a Radial Basis Function neural network was presented to deal with temperature control. In this approach, nonlinear adaptive controller parameters were determined through the generalized minimum variance laws, while unmodeled dynamics were estimated by a Radial Basis Function neural network. The control strategy consisted of a linear adaptive controller, a neural network nonlinear adaptive controller, and a switching mechanism. The research results show that the mean errors were 0.8460 and 0.2967, corresponding to a conventional PID method and the presented nonlinear adaptive scheme, respectively. The standard errors of the conventional PID method and the nonlinear adaptive control strategy were 1.8480 and 1.3342, respectively. The experimental results fully prove that the presented control scheme achieves better control performance, which meets the actual requirements. Full article
Show Figures

Figure 1

17 pages, 10679 KiB  
Article
A Dual-Attention Autoencoder Network for Efficient Recommendation System
by Chao Duan, Jianwen Sun, Kaiqi Li and Qing Li
Electronics 2021, 10(13), 1581; https://doi.org/10.3390/electronics10131581 - 30 Jun 2021
Cited by 5 | Viewed by 2491
Abstract
Accelerated development of mobile networks and applications leads to the exponential expansion of resources, which causes problems such as trek and overload of information. One of the practical approaches to ease these problems is recommendation systems (RSs) that can provide individualized service. Video [...] Read more.
Accelerated development of mobile networks and applications leads to the exponential expansion of resources, which causes problems such as trek and overload of information. One of the practical approaches to ease these problems is recommendation systems (RSs) that can provide individualized service. Video recommendation is one of the most critical recommendation services. However, achieving satisfactory recommendation service on the sparse data is difficult for video recommendation service. Moreover, the cold start problem further exacerbates the research challenge. Recent state-of-the-art works attempted to solve this problem by utilizing the user and item information from some other perspective. However, the significance of user and item information changes under different applications. This paper proposes an autoencoder model to improve recommendation efficiency by utilizing attribute information and implementing the proposed algorithm for video recommendation. In the proposed model, we first extract the user features and the video features by combining the user attribute and the video category information simultaneously. Then, we integrate the attention mechanism into the extracted features to generate the vital features. Finally, we incorporate the user and item potential factor to generate the probability matrix and defines the user-item rating matrix using the factorized probability matrix. Experimental results on two shared datasets demonstrates that the proposed model can effectively ameliorate video recommendation quality compared with the state-of-the-art methods. Full article
(This article belongs to the Special Issue Recommender Systems: Approaches, Challenges and Applications)
Show Figures

Figure 1

21 pages, 342 KiB  
Article
Optimization of Decision Trees with Hypotheses for Knowledge Representation
by Mohammad Azad, Igor Chikalov, Shahid Hussain and Mikhail Moshkov
Electronics 2021, 10(13), 1580; https://doi.org/10.3390/electronics10131580 - 30 Jun 2021
Cited by 6 | Viewed by 2252
Abstract
In this paper, we consider decision trees that use two types of queries: queries based on one attribute each and queries based on hypotheses about values of all attributes. Such decision trees are similar to the ones studied in exact learning, where membership [...] Read more.
In this paper, we consider decision trees that use two types of queries: queries based on one attribute each and queries based on hypotheses about values of all attributes. Such decision trees are similar to the ones studied in exact learning, where membership and equivalence queries are allowed. We present dynamic programming algorithms for minimization of the depth and number of nodes of above decision trees and discuss results of computer experiments on various data sets and randomly generated Boolean functions. Decision trees with hypotheses generally have less complexity, i.e., they are more understandable and more suitable as a means for knowledge representation. Full article
(This article belongs to the Special Issue AI-Based Knowledge Management)
Show Figures

Figure 1

23 pages, 4094 KiB  
Article
Reliable Multicast Based on Congestion-Aware Cache in ICN
by Yingjie Duan, Hong Ni and Xiaoyong Zhu
Electronics 2021, 10(13), 1579; https://doi.org/10.3390/electronics10131579 - 30 Jun 2021
Cited by 4 | Viewed by 2314
Abstract
Reliable multicast distribution is essential for some applications such as Internet of Things (IoT) alarm information and important file distribution. Traditional IP reliable multicast usually relies on multicast source retransmission for recovery losses, causing huge recovery delay and redundancy. Moreover, feedback implosion tends [...] Read more.
Reliable multicast distribution is essential for some applications such as Internet of Things (IoT) alarm information and important file distribution. Traditional IP reliable multicast usually relies on multicast source retransmission for recovery losses, causing huge recovery delay and redundancy. Moreover, feedback implosion tends to occur towards multicast source as the number of receivers grows. Information-Centric Networking (ICN) is an emerging network architecture that is efficient in content distribution by supporting multicast and in-network caching. Although ubiquitous in-network caching provides nearby retransmission, the design of cache strategy greatly affects the performance of loss recovery. Therefore, how to recover losses efficiently and quickly is an urgent problem to be solved in ICN reliable multicast. In this paper, we first propose an overview architecture of ICN-based reliable multicast and formulate a problem using recovery delay as the optimization target. Based on the architecture, we present a Congestion-Aware Probabilistic Cache (CAPC) strategy to reduce recovery delay by caching recently transmitted chunks during multicast transmission. Then, we propose NACK feedback aggregation and recovery isolation scheme to decrease recovery overhead. Finally, experimental results show that our proposal can achieve fully reliable multicast and outperforms other approaches in recovery delay, cache hit ratio, transmission completion time, and overhead. Full article
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop