Optimization Methods for User Admissions and Radio Resource Allocation for Multicasting over High Altitude Platforms


Book Description

This book focuses on the issue of optimizing radio resource allocation (RRA) and user admission control (AC) for multiple multicasting sessions on a single high altitude platform (HAP) with multiple antennas on-board. HAPs are quasi-stationary aerial platforms that carry a wireless communications payload to provide wireless communications and broadband services. They are meant to be located in the stratosphere layer of the atmosphere at altitudes in the range 17-22 km and have the ability to fly on demand to temporarily or permanently serve regions with unavailable telecommunications infrastructure. An important requirement that the book focusses on is the development of an efficient and effective method for resource allocation and user admissions for HAPs, especially when it comes to multicasting. Power, frequency, space (antennas selection) and time (scheduling) are the resources considered in the problem over an orthogonal frequency division multiple access (OFDMA) HAP system.Due to the strong dependence of the total number of users that could join different multicast groups, on the possible ways we may allocate resources to these groups, it is of significant importance to consider a joint user to session assignments and RRA across the groups. From the service provider's point of view, it would be in its best interest to be able to admit as many higher priority users as possible, while satisfying their quality of service requirements. High priority users could be users subscribed in and paying higher for a service plan that gives them preference of admittance to receive more multicast transmissions, compared to those paying for a lower service plan. Also, the user who tries to join multiple multicast groups (i.e. receive more than one multicast transmission), would have preferences for which one he would favor to receive if resources are not enough to satisfy the QoS requirements.Technical topics discussed in the book include: • Overview on High Altitude Platforms, their different types and the recent works in this area Radio Resource Allocation and User Admission Control in HAPs  Multicasting in a Single HAP System: System Model and Mathematical Formulation  Optimization schemes that are designed to enhance the performance of a branch and bound technique by taking into account special mathematical structure in the problem formulation










Unmanned Aircraft Systems (Uas) in the Cyber Domain: Protecting Usa's Advanced Air Assets


Book Description

Unmanned Aircraft Systems (UAS) are an integral part of the US national critical infrastructure. They must be protected from hostile intent or use to the same level as any other military or commercial asset involved in US national security. However, from the Spratly Islands to Djibouti to heartland America, the expanding Chinese Unmanned Aircraft Systems (UAS / Drone) industry has outpaced the US technologically and numerically on all fronts: military, commercial, and recreational. Both countries found that there were large information security gaps in unmanned systems that could be exploited on the international cyber-security stage. Many of those gaps remain today and are direct threats to US advanced Air Assets if not mitigated upfront by UAS designers and manufacturers. The authors contend that US military / commercial developers of UAS hardware and software must perform cyber risk assessments and mitigations prior to delivery of UAS systems to stay internationally competitive and secure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This book will fully immerse and engage the reader in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). Topics covered include National Airspace (NAS) policy issues, information security, UAS vulnerabilities in key systems (Sense and Avoid / SCADA), collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.







Queueing Theory for Telecommunications


Book Description

Queueing theory applications can be discovered in many walks of life including; transportation, manufacturing, telecommunications, computer systems and more. However, the most prevalent applications of queueing theory are in the telecommunications field. Queueing Theory for Telecommunications: Discrete Time Modelling of a Single Node System focuses on discrete time modeling and illustrates that most queueing systems encountered in real life can be set up as a Markov chain. This feature is very unique because the models are set in such a way that matrix-analytic methods are used to analyze them. Queueing Theory for Telecommunications: Discrete Time Modelling of a Single Node System is the most relevant book available on queueing models designed for applications to telecommunications. This book presents clear concise theories behind how to model and analyze key single node queues in discrete time using special tools that were presented in the second chapter. The text also delves into the types of single node queues that are very frequently encountered in telecommunication systems modeling, and provides simple methods for analyzing them. Where appropriate, alternative analysis methods are also presented. This book is for advanced-level students and researchers concentrating on engineering, computer science and mathematics as a secondary text or reference book. Professionals who work in the related industries of telecommunications, industrial engineering and communications engineering will find this book useful as well.




Autonomous Control for a Reliable Internet of Services


Book Description

This open access book was prepared as a Final Publication of the COST Action IC1304 “Autonomous Control for a Reliable Internet of Services (ACROSS)”. The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-graduate students, educators, faculty members, researchers, engineers, and research strategists working in this field. The explosive growth of the Internet has fundamentally changed the global society. The emergence of concepts like SOA, SaaS, PaaS, IaaS, NaaS, and Cloud Computing in general has catalyzed the migration from the information-oriented Internet into an Internet of Services (IoS). This has opened up virtually unbounded possibilities for the creation of new and innovative services that facilitate business processes and improve the quality of life. However, this also calls for new approaches to ensuring the quality and reliability of these services. The objective of this book is, by applying a systematic approach, to assess the state-of-the-art and consolidate the main research results achieved in this area.




Science Abstracts


Book Description




Resource Management in Satellite Networks


Book Description

This book provides significant knowledge on innovative radio resource management schemes for satellite communication systems that exploit lower layer adaptivity and the knowledge of layer 3 IP QoS support and transport layer behavior. The book integrates competencies considering all the parts of system design: propagation aspects, radio resource management, access protocols, network protocols, transport layer protocols, and more, to cover both broadband and mobile satellite systems.




Cognitive Communications


Book Description

This book discusses in-depth the concept of distributed artificial intelligence (DAI) and its application to cognitive communications In this book, the authors present an overview of cognitive communications, encompassing both cognitive radio and cognitive networks, and also other application areas such as cognitive acoustics. The book also explains the specific rationale for the integration of different forms of distributed artificial intelligence into cognitive communications, something which is often neglected in many forms of technical contributions available today. Furthermore, the chapters are divided into four disciplines: wireless communications, distributed artificial intelligence, regulatory policy and economics and implementation. The book contains contributions from leading experts (academia and industry) in the field. Key Features: Covers the broader field of cognitive communications as a whole, addressing application to communication systems in general (e.g. cognitive acoustics and Distributed Artificial Intelligence (DAI) Illustrates how different DAI based techniques can be used to self-organise the radio spectrum Explores the regulatory, policy and economic issues of cognitive communications in the context of secondary spectrum access Discusses application and implementation of cognitive communications techniques in different application areas (e.g. Cognitive Femtocell Networks (CFN) Written by experts in the field from both academia and industry Cognitive Communications will be an invaluable guide for research community (PhD students, researchers) in the areas of wireless communications, and development engineers involved in the design and development of mobile, portable and fixed wireless systems., wireless network design engineer. Undergraduate and postgraduate students on elective courses in electronic engineering or computer science, and the research and engineering community will also find this book of interest.