-
Energy Disaggregation & Appliance Identification in a Smart Home: Transfer Learning enables Edge Computing
Authors:
M. Hashim Shahab,
Hasan Mujtaba Buttar,
Ahsan Mehmood,
Waqas Aman,
M. Mahboob Ur Rahman,
M. Wasim Nawaz,
Haris Pervaiz,
Qammer H. Abbasi
Abstract:
Non-intrusive load monitoring (NILM) or energy disaggregation aims to extract the load profiles of individual consumer electronic appliances, given an aggregate load profile of the mains of a smart home. This work proposes a novel deep-learning and edge computing approach to solve the NILM problem and a few related problems as follows. 1) We build upon the reputed seq2-point convolutional neural n…
▽ More
Non-intrusive load monitoring (NILM) or energy disaggregation aims to extract the load profiles of individual consumer electronic appliances, given an aggregate load profile of the mains of a smart home. This work proposes a novel deep-learning and edge computing approach to solve the NILM problem and a few related problems as follows. 1) We build upon the reputed seq2-point convolutional neural network (CNN) model to come up with the proposed seq2-[3]-point CNN model to solve the (home) NILM problem and site-NILM problem (basically, NILM at a smaller scale). 2) We solve the related problem of appliance identification by building upon the state-of-the-art (pre-trained) 2D-CNN models, i.e., AlexNet, ResNet-18, and DenseNet-121, which are fine-tuned two custom datasets that consist of Wavelets and short-time Fourier transform (STFT)-based 2D electrical signatures of the appliances. 3) Finally, we do some basic qualitative inference about an individual appliance's health by comparing the power consumption of the same appliance across multiple homes. Low-frequency REDD dataset is used for all problems, except site-NILM where REFIT dataset has been used. As for the results, we achieve a maximum accuracy of 94.6\% for home-NILM, 81\% for site-NILM, and 88.9\% for appliance identification (with Resnet-based model).
△ Less
Submitted 14 March, 2024; v1 submitted 8 January, 2023;
originally announced January 2023.
-
Reconfigurable Intelligent Surfaces: Potentials, Applications, and Challenges for 6G Wireless Networks
Authors:
Sarah Basharat,
Syed Ali Hassan,
Haris Pervaiz,
Aamir Mahmood,
Zhiguo Ding,
Mikael Gidlund
Abstract:
Reconfigurable intelligent surfaces (RISs), with the potential to realize a smart radio environment, have emerged as an energy-efficient and a cost-effective technology to support the services and demands foreseen for coming decades. By leveraging a large number of low-cost passive reflecting elements, RISs introduce a phase-shift in the impinging signal to create a favorable propagation channel b…
▽ More
Reconfigurable intelligent surfaces (RISs), with the potential to realize a smart radio environment, have emerged as an energy-efficient and a cost-effective technology to support the services and demands foreseen for coming decades. By leveraging a large number of low-cost passive reflecting elements, RISs introduce a phase-shift in the impinging signal to create a favorable propagation channel between the transmitter and the receiver.~\textcolor{black}{In this article, we provide a tutorial overview of RISs for sixth-generation (6G) wireless networks. Specifically, we present a comprehensive discussion on performance gains that can be achieved by integrating RISs with emerging communication technologies. We address the practical implementation of RIS-assisted networks and expose the crucial challenges, including the RIS reconfiguration, deployment and size optimization, and channel estimation. Furthermore, we explore the integration of RIS and non-orthogonal multiple access (NOMA) under imperfect channel state information (CSI). Our numerical results illustrate the importance of better channel estimation in RIS-assisted networks and indicate the various factors that impact the size of RIS. Finally, we present promising future research directions for realizing RIS-assisted networks in 6G communication.
△ Less
Submitted 12 July, 2021;
originally announced July 2021.
-
Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges
Authors:
Sukhpal Singh Gill,
Shreshth Tuli,
Minxian Xu,
Inderpreet Singh,
Karan Vijay Singh,
Dominic Lindsay,
Shikhar Tuli,
Daria Smirnova,
Manmeet Singh,
Udit Jain,
Haris Pervaiz,
Bhanu Sehgal,
Sukhwinder Singh Kaila,
Sanjay Misra,
Mohammad Sadegh Aslanpour,
Harshit Mehta,
Vlado Stankovski,
Peter Garraghan
Abstract:
Cloud computing plays a critical role in modern society and enables a range of applications from infrastructure to social media. Such system must cope with varying load and evolving usage reflecting societies interaction and dependency on automated computing systems whilst satisfying Quality of Service (QoS) guarantees. Enabling these systems are a cohort of conceptual technologies, synthesized to…
▽ More
Cloud computing plays a critical role in modern society and enables a range of applications from infrastructure to social media. Such system must cope with varying load and evolving usage reflecting societies interaction and dependency on automated computing systems whilst satisfying Quality of Service (QoS) guarantees. Enabling these systems are a cohort of conceptual technologies, synthesized to meet demand of evolving computing applications. In order to understand current and future challenges of such system, there is a need to identify key technologies enabling future applications. In this study, we aim to explore how three emerging paradigms (Blockchain, IoT and Artificial Intelligence) will influence future cloud computing systems. Further, we identify several technologies driving these paradigms and invite international experts to discuss the current status and future directions of cloud computing. Finally, we proposed a conceptual model for cloud futurology to explore the influence of emerging paradigms and technologies on evolution of cloud computing.
△ Less
Submitted 21 October, 2019;
originally announced November 2019.
-
Control over Skies: Survivability, Coverage, and Mobility Laws for Hierarchical Aerial Base Stations
Authors:
Vishal Sharma,
Navuday Sharma,
Mubashir Husain Rehmani,
Haris Pervaiz
Abstract:
Aerial Base Stations (ABSs) have gained significant importance in the next generation of wireless networks for accommodating mobile ground users and flash crowds with high convenience and quality. However, to achieve an efficient ABS network, many factors pertaining to ABS flight, governing laws and information transmissions must be studied. In this article, multi-drone communications are studied…
▽ More
Aerial Base Stations (ABSs) have gained significant importance in the next generation of wireless networks for accommodating mobile ground users and flash crowds with high convenience and quality. However, to achieve an efficient ABS network, many factors pertaining to ABS flight, governing laws and information transmissions must be studied. In this article, multi-drone communications are studied in three major aspects, survivability, coverage, and mobility laws, which optimize the multi-tier ABS network to avoid issues related to inter-cell interference, deficient energy, frequent handovers, and lifetime. The article includes simulation results of hierarchical ABS allocations for handling a set of users over a defined geographical area. Several open issues and challenges are presented to provide deep insights into the ABS network management and its utility framework.
△ Less
Submitted 16 April, 2021; v1 submitted 8 March, 2019;
originally announced March 2019.
-
Shared Secret Key Generation via Carrier Frequency Offsets
Authors:
Waqas Aman,
Aneeqa Ijaz,
M. Mahboob Ur Rahman,
Dushanta Nalin K. Jayakody,
Haris Pervaiz
Abstract:
This work presents a novel method to generate secret keys shared between a legitimate node pair (Alice and Bob) to safeguard the communication between them from an unauthorized node (Eve). To this end, we exploit the {\it reciprocal carrier frequency offset} (CFO) between the legitimate node pair to extract common randomness out of it to generate shared secret keys. The proposed key generation alg…
▽ More
This work presents a novel method to generate secret keys shared between a legitimate node pair (Alice and Bob) to safeguard the communication between them from an unauthorized node (Eve). To this end, we exploit the {\it reciprocal carrier frequency offset} (CFO) between the legitimate node pair to extract common randomness out of it to generate shared secret keys. The proposed key generation algorithm involves standard steps: the legitimate nodes exchange binary phase-shift keying (BPSK) signals to perform blind CFO estimation on the received signals, and do equi-probable quantization of the noisy CFO estimates followed by information reconciliation--to distil a shared secret key. Furthermore, guided by the Allan deviation curve, we distinguish between the two frequency-stability regimes---when the randomly time-varying CFO process i) has memory, ii) is memoryless; thereafter, we compute the key generation rate for both regimes. Simulation results show that the key disagreement rate decreases exponentially with increase in the signal to noise ratio of the link between Alice and Bob. Additionally, the decipher probability of Eve decreases as soon as either of the two links observed by the Eve becomes more degraded compared to the link between Alice and Bob.
△ Less
Submitted 28 February, 2019;
originally announced February 2019.
-
Impersonation Detection in Line-of-Sight Underwater Acoustic Sensor Networks
Authors:
Waqas Aman,
Muhammad Mahboob Ur Rahman,
Junaid Qadir,
Haris Pervaiz,
Qiang Ni
Abstract:
This work considers a line-of-sight underwater acoustic sensor network (UWASN) consisting of $M$ underwater sensor nodes randomly deployed according to uniform distribution within a vertical half-disc (the so-called trusted zone). The sensor nodes report their sensed data to a sink node on water surface on a shared underwater acoustic (UWA) reporting channel in a time-division multiple-access (TDM…
▽ More
This work considers a line-of-sight underwater acoustic sensor network (UWASN) consisting of $M$ underwater sensor nodes randomly deployed according to uniform distribution within a vertical half-disc (the so-called trusted zone). The sensor nodes report their sensed data to a sink node on water surface on a shared underwater acoustic (UWA) reporting channel in a time-division multiple-access (TDMA) fashion, while an active-yet-invisible adversary (so-called Eve) is present in the close vicinity who aims to inject malicious data into the system by impersonating some Alice node. To this end, this work first considers an additive white Gaussian noise (AWGN) UWA channel, and proposes a novel, multiple-features based, two-step method at the sink node to thwart the potential impersonation attack by Eve. Specifically, the sink node exploits the noisy estimates of the distance, the angle of arrival, and the location of the transmit node as device fingerprints to carry out a number of binary hypothesis tests (for impersonation detection) as well as a number of maximum likelihood hypothesis tests (for transmitter identification when no impersonation is detected). We provide closed-form expressions for the error probabilities (i.e., the performance) of most of the hypothesis tests. We then consider the case of a UWA with colored noise and frequency-dependent pathloss, and derive a maximum-likelihood (ML) distance estimator as well as the corresponding Cramer-Rao bound (CRB). We then invoke the proposed two-step, impersonation detection framework by utilizing distance as the sole feature. Finally, we provide detailed simulation results for both AWGN UWA channel and the UWA channel with colored noise. Simulation results verify that the proposed scheme is indeed effective for a UWA channel with colored noise and frequency-dependent pathloss.
△ Less
Submitted 7 August, 2018; v1 submitted 31 May, 2018;
originally announced May 2018.
-
Performance Analysis of Decoupled Cell Association in Multi-Tier Hybrid Networks using Real Blockage Environments
Authors:
Osama Waqar Bhatti,
Haris Suhail,
Uzair Akbar,
Syed Ali Hassan,
Haris Pervaiz,
Leila Musavian,
Qiang Ni
Abstract:
Millimeter wave (mmWave) links have the potential to offer high data rates and capacity needed in fifth generation (5G) networks, however they have very high penetration and path loss. A solution to this problem is to bring the base station closer to the end-user through heterogeneous networks (HetNets). HetNets could be designed to allow users to connect to different base stations (BSs) in the up…
▽ More
Millimeter wave (mmWave) links have the potential to offer high data rates and capacity needed in fifth generation (5G) networks, however they have very high penetration and path loss. A solution to this problem is to bring the base station closer to the end-user through heterogeneous networks (HetNets). HetNets could be designed to allow users to connect to different base stations (BSs) in the uplink and downlink. This phenomenon is known as downlink-uplink decoupling (DUDe). This paper explores the effect of DUDe in a three tier HetNet deployed in two different real-world environments. Our simulation results show that DUDe can provide improvements with regard to increasing the system coverage and data rates while the extent of improvement depends on the different environments that the system is deployed in.
△ Less
Submitted 11 May, 2017;
originally announced May 2017.