語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
On Applications of Optimization Techniques in UAV Communication, Resource Allocation, And Adversarial Attacks.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
On Applications of Optimization Techniques in UAV Communication, Resource Allocation, And Adversarial Attacks./
作者:
Rahmati, Ali.
面頁冊數:
1 online resource (186 pages)
附註:
Source: Dissertations Abstracts International, Volume: 83-05, Section: B.
Contained By:
Dissertations Abstracts International83-05B.
標題:
Wireless networks. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28747733click for full text (PQDT)
ISBN:
9798494448453
On Applications of Optimization Techniques in UAV Communication, Resource Allocation, And Adversarial Attacks.
Rahmati, Ali.
On Applications of Optimization Techniques in UAV Communication, Resource Allocation, And Adversarial Attacks.
- 1 online resource (186 pages)
Source: Dissertations Abstracts International, Volume: 83-05, Section: B.
Thesis (Ph.D.)--North Carolina State University, 2021.
Includes bibliographical references
The explosive development of modern technologies leads to emergence of various interesting trade-offs among different aspects of each system design problem. In this dissertation, we deploy optimization techniques to address some important problems in three emerging areas: UAV-assisted networks, millimeter-wave (mmWave) multiple access UAV networks, and neural networks.In the first part of this dissertation, we focus on UAV-assisted networks in the presence of interference. UAV is a promising solution for public safety as it can be deployed in coexistence with cellular networks to form a temporary communication network. However, the interference from the primary cellular network may severely degrade the performance of an UAV network. With this consideration, in Chapter 2, an adaptive dynamic interference avoidance scheme is proposed for UAVs coexisting with a primary network. In the proposed scheme, the mobile UAVs can reconfigure their locations to mitigate the interference from the primary network, so as to better relay the data from the designated source(s) to destination(s). To this end, the single/multi-commodity flow problems are formulated and the weighted Cheeger constant is adopted as a criterion to improve the maximum flow of the UAV network. We utilize convex optimization techniques to optimize the transmission powers. We also approach the problem from the intentional interferer's perspective where smart jammers chase the UAVs to effectively degrade the data flow.In the second part of this thesis, we study the energy efficiency of the UAVs in communication networks with realistic channel models in Chapter 3. Since UAVs are power-limited, energy and spectral efficient communication is of paramount importance. To that end, multiple access (MA) schemes can play an important role in achieving high energy efficiency and spectral efficiency. In this part, we introduce rate-splitting MA (RSMA) and non-orthogonal MA (NOMA) schemes in a cellular-connected UAV network. In particular, we investigate the energy efficiency of the RSMA and NOMA schemes in a mmWave downlink transmission scenario. Furthermore, we optimize precoding vectors of both schemes by explicitly taking into account the 3GPP antenna propagation patterns. Moreover, we consider the uplink mmWave transmission between a set of UAVs and a base station (BS), where the UAVs deploy uplink NOMA in multiple clusters. Considering the limited energy budget of UAVs, we formulate an energy efficiency (EE) problem, and propose a solution aided by the Dinkelbach's algorithm and successive convex approximation (SCA). Using realistic air-to-ground (A2G) and terrestrial channel models, we assess the performance of the proposed algorithm under various circumstances (maximum transmit power for UAVs, quality-of-service (QoS) constraint for the desired UE, etc.), and identify the best use cases.In the last part, we investigate the generation of adversarial examples for neural networks in Chapter 4 and Chapter 5. Adversarial examples are known as carefully perturbed data samples fooling deep neural network classifiers. We propose a geometric framework to generate adversarial examples in one of the most challenging black-box settings where the adversary can only generate a small number of queries, and each one is responded with the top-1 label of the classifier.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2023
Mode of access: World Wide Web
ISBN: 9798494448453Subjects--Topical Terms:
1531264
Wireless networks.
Index Terms--Genre/Form:
542853
Electronic books.
On Applications of Optimization Techniques in UAV Communication, Resource Allocation, And Adversarial Attacks.
LDR
:04720nmm a2200373K 4500
001
2354059
005
20230324111147.5
006
m o d
007
cr mn ---uuuuu
008
241011s2021 xx obm 000 0 eng d
020
$a
9798494448453
035
$a
(MiAaPQ)AAI28747733
035
$a
(MiAaPQ)NCState_Univ18402038981
035
$a
AAI28747733
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Rahmati, Ali.
$3
3694401
245
1 0
$a
On Applications of Optimization Techniques in UAV Communication, Resource Allocation, And Adversarial Attacks.
264
0
$c
2021
300
$a
1 online resource (186 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertations Abstracts International, Volume: 83-05, Section: B.
500
$a
Advisor: Dai, Huaiyu; Guvenc, Ismail.
502
$a
Thesis (Ph.D.)--North Carolina State University, 2021.
504
$a
Includes bibliographical references
520
$a
The explosive development of modern technologies leads to emergence of various interesting trade-offs among different aspects of each system design problem. In this dissertation, we deploy optimization techniques to address some important problems in three emerging areas: UAV-assisted networks, millimeter-wave (mmWave) multiple access UAV networks, and neural networks.In the first part of this dissertation, we focus on UAV-assisted networks in the presence of interference. UAV is a promising solution for public safety as it can be deployed in coexistence with cellular networks to form a temporary communication network. However, the interference from the primary cellular network may severely degrade the performance of an UAV network. With this consideration, in Chapter 2, an adaptive dynamic interference avoidance scheme is proposed for UAVs coexisting with a primary network. In the proposed scheme, the mobile UAVs can reconfigure their locations to mitigate the interference from the primary network, so as to better relay the data from the designated source(s) to destination(s). To this end, the single/multi-commodity flow problems are formulated and the weighted Cheeger constant is adopted as a criterion to improve the maximum flow of the UAV network. We utilize convex optimization techniques to optimize the transmission powers. We also approach the problem from the intentional interferer's perspective where smart jammers chase the UAVs to effectively degrade the data flow.In the second part of this thesis, we study the energy efficiency of the UAVs in communication networks with realistic channel models in Chapter 3. Since UAVs are power-limited, energy and spectral efficient communication is of paramount importance. To that end, multiple access (MA) schemes can play an important role in achieving high energy efficiency and spectral efficiency. In this part, we introduce rate-splitting MA (RSMA) and non-orthogonal MA (NOMA) schemes in a cellular-connected UAV network. In particular, we investigate the energy efficiency of the RSMA and NOMA schemes in a mmWave downlink transmission scenario. Furthermore, we optimize precoding vectors of both schemes by explicitly taking into account the 3GPP antenna propagation patterns. Moreover, we consider the uplink mmWave transmission between a set of UAVs and a base station (BS), where the UAVs deploy uplink NOMA in multiple clusters. Considering the limited energy budget of UAVs, we formulate an energy efficiency (EE) problem, and propose a solution aided by the Dinkelbach's algorithm and successive convex approximation (SCA). Using realistic air-to-ground (A2G) and terrestrial channel models, we assess the performance of the proposed algorithm under various circumstances (maximum transmit power for UAVs, quality-of-service (QoS) constraint for the desired UE, etc.), and identify the best use cases.In the last part, we investigate the generation of adversarial examples for neural networks in Chapter 4 and Chapter 5. Adversarial examples are known as carefully perturbed data samples fooling deep neural network classifiers. We propose a geometric framework to generate adversarial examples in one of the most challenging black-box settings where the adversary can only generate a small number of queries, and each one is responded with the top-1 label of the classifier.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2023
538
$a
Mode of access: World Wide Web
650
4
$a
Wireless networks.
$3
1531264
650
4
$a
Energy efficiency.
$3
3555643
650
4
$a
Algorithms.
$3
536374
650
4
$a
Communication.
$3
524709
650
4
$a
Optimization techniques.
$3
3681622
650
4
$a
Graph representations.
$3
3560730
650
4
$a
Computer science.
$3
523869
650
4
$a
Electrical engineering.
$3
649834
650
4
$a
Energy.
$3
876794
650
4
$a
Engineering.
$3
586835
655
7
$a
Electronic books.
$2
lcsh
$3
542853
690
$a
0459
690
$a
0984
690
$a
0544
690
$a
0791
690
$a
0537
710
2
$a
ProQuest Information and Learning Co.
$3
783688
710
2
$a
North Carolina State University.
$3
1018772
773
0
$t
Dissertations Abstracts International
$g
83-05B.
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28747733
$z
click for full text (PQDT)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9476415
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入