2019
DOI: 10.1109/tmc.2018.2840692
|View full text |Cite
|
Sign up to set email alerts
|

Traffic-Aware Sensor Grouping for IEEE 802.11ah Networks: Regression Based Analysis and Design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(23 citation statements)
references
References 27 publications
0
23
0
Order By: Relevance
“…The regression models can also be employed for solving both estimation and detection problems in the upper layers of the seven-layer OSI model. For example, Chang et al derived a regression-based analytical model for the sake of estimating the contention success probability considering heterogeneous sensor-traffic demands, which beneficially improved the channel's exploitation in IoT [199]. Moreover, in [200], Chen et al employed a regression model for reconstructing the radio map with the aid of signal strength models for the path planning and UAV-location design in UAV-assisted wireless networks.…”
Section: N We Are Capable Of Estimating the Regression Coefficienmentioning
confidence: 99%
See 1 more Smart Citation
“…The regression models can also be employed for solving both estimation and detection problems in the upper layers of the seven-layer OSI model. For example, Chang et al derived a regression-based analytical model for the sake of estimating the contention success probability considering heterogeneous sensor-traffic demands, which beneficially improved the channel's exploitation in IoT [199]. Moreover, in [200], Chen et al employed a regression model for reconstructing the radio map with the aid of signal strength models for the path planning and UAV-location design in UAV-assisted wireless networks.…”
Section: N We Are Capable Of Estimating the Regression Coefficienmentioning
confidence: 99%
“…Fortunately, there are a range of efficient heuristic algorithms, which converge quickly to a local optimum. [195] interference estimate regression strike a trade-off between the overhead and accuracy of interference measurement [196] spectrum sensing regression reduce the number of parameters and maintain a high detection accuracy [197] wireless coexistence regression estimate the likelihood of the wireless coexistence of Wi-Fi and ZigBee [198] PHY authentication regression do not need the assumption on the accurate known channel model [199] traffic estimation regression estimate the contention success probability considering sensors' heterogeneous traffic demands [200] map reconstruction regression reconstruct the wireless radio map for UAV path planning and location design [201] wireless localization regression logistic regression classifier for counteracting the negative influence relying on fingerprint signals [203] traffic prediction KNN explore both the temporal and spatial characteristics of radio resources [204] anomaly detection KNN rely on the hypergrid intuition in the context of WSN applications [206] missing data estimation KNN rely on the temporal and spatial correlation feature of sensor data [207] modulation classification KNN combine the genetic programming and KNN for improving the modulation classification accuracy [208] interference elimination KNN extract environmental interference from Wi-Fi signal and reduce computational complexity [221] data estimation SVM provide an efficient estimation procedure in a distributed manner [222] localization estimation SVM yield fast convergence performance and efficiently use the communication resources [223] user location SVM without knowledge about base station location and environmental propagation characteristics [224] data prediction SVM provide location-specific interface configuration for HetNets [225] behavior learning SVM combine both the superior accuracy of SVM and fast convergence speed of FDA [226] signal classification SVM classify acoustic signals emitted by vehicles rely on feature extraction [227] channel selection SVM propose a control channel selection mechanism for a cognitive radio network [228] attacker counting SVM develop a cluster-based SVM mechanism for determining the number of attackers [232] antenna selection Bayes enhance the physical layer security relying on Bayes-based optimal antenna selection [233] network association Bayes schedul...…”
Section: A K-means Clustering and Its Applications 1)mentioning
confidence: 99%
“…In addition, the two categorising algorithms are computational complex. Grouping based on STAs' traffic, Chang et al [14] propose a traffic-aware grouping scheme to improve channel utilisation. STAs are grouped based on their greedy need to access the channel.…”
Section: Related Workmentioning
confidence: 99%
“…Chang et al [14] only consider UL traffic in grouping STAs, and its model is solely analysed in terms of channel utilisation. In the aspect of the grouping scheme, the geographical grouping proposed in this paper is different from [13,14] in terms of simplicity. AP obtains the physical location of STAs through their requests during the authentication/association process.…”
Section: Related Workmentioning
confidence: 99%
“…However, their utility is limited for real-time station grouping under dynamic and realistic traffic conditions. Chang et al went a step further to support more diverse traffic demands [21]. They used the results of two extreme cases (i.e., with infinite traffic and with only a single packet) to extrapolate a regression-based analytical model that can accurately fit the contention success probability of any traffic patterns.…”
Section: Related Work On Ieee 80211ah Rawmentioning
confidence: 99%