Simon Armour
YOU?
Author Swipe
View article: Robust and Ubiquitous Connectivity Enabled by Unified Integrated and Secure NTN
Robust and Ubiquitous Connectivity Enabled by Unified Integrated and Secure NTN Open
View article: Hardware-in-the-Loop Evaluation of Goodness of Fit (GoF) Testing for Dynamic Spectrum Sharing
Hardware-in-the-Loop Evaluation of Goodness of Fit (GoF) Testing for Dynamic Spectrum Sharing Open
In contrast to parametric spectrum sensing, non-parametric spectrum sensing can effectively detect the primary user's presence or absence without prior information about the primary user. Particularly, non-parametric spectrum sensing can b…
View article: IoT Firmware Version Identification Using Transfer Learning with Twin Neural Networks
IoT Firmware Version Identification Using Transfer Learning with Twin Neural Networks Open
As the Internet of Things (IoT) becomes more embedded within our daily lives, there is growing concern about the risk `smart' devices pose to network security. To address this, one avenue of research has focused on automated IoT device ide…
View article: Unified Performance Analysis of Wireless Systems Under Mobility and Generalized Fading: Applications to Diversity Reception, UAV-to-UAV Links, and IRS-Enabled Systems
Unified Performance Analysis of Wireless Systems Under Mobility and Generalized Fading: Applications to Diversity Reception, UAV-to-UAV Links, and IRS-Enabled Systems Open
This paper introduces a comprehensive framework for assessing the performance of wireless communication systems under mobility conditions. Receiver mobility is modeled using the Random Waypoint (RWP) mobility model. The proposed analysis i…
View article: IoT Device Identification Techniques: A Comparative Analysis for Security Practitioners
IoT Device Identification Techniques: A Comparative Analysis for Security Practitioners Open
As the Internet of Things (IoT) continues to grow, networks are increasingly at risk from vulnerable devices that allow access to attackers. Two particular threats are posed by rogue devices (i.e. devices present on a network that should n…
View article: Granular IoT Device Identification Using TF-IDF and Cosine Similarity
Granular IoT Device Identification Using TF-IDF and Cosine Similarity Open
Internet of things (IoT) devices are becoming more prevalent in home environments and are shown to be generally insecure. There have been many previous studies looking to identify unknown IoT devices on networks. To truly secure a network …
View article: Table of Contents
Table of Contents Open
View article: Towards Multi-Criteria Heuristic Optimization for Computational Offloading in Multi-Access Edge Computing
Towards Multi-Criteria Heuristic Optimization for Computational Offloading in Multi-Access Edge Computing Open
In recent years, there has been considerable interest in computational offloading algorithms. The interest is mainly driven by the potential savings that offloading offers in task completion time and mobile device energy consumption. This …
View article: Identification of the Key Parameters for Computational Offloading in Multi-Access Edge Computing
Identification of the Key Parameters for Computational Offloading in Multi-Access Edge Computing Open
Computational offloading is a strategy by which mobile device (MD) users can access the superior processing power of a Multi-Access Edge Computing (MEC) server network. This paper investigates the impact of CPU workloads (on both the user …
View article: The Advantage of Computation Offloading in Multi-Access Edge Computing
The Advantage of Computation Offloading in Multi-Access Edge Computing Open
Computation offloading plays a critical role in reducing task completion time for mobile devices. The advantages of computation offloading to cloud resources in Mobile Cloud Computing have been widely considered. In this paper, we have inv…
View article: Employing Ray-Tracing and Least-Squares Support Vector Machines for Localisation
Employing Ray-Tracing and Least-Squares Support Vector Machines for Localisation Open
This article evaluates the use of least-squares support vector machines, with ray-traced data, to solve the problem of localisation in multipath environments. The schemes discussed concern 2-D localisation, but could easily be extended to …
View article: Achievable Rates and Training Overheads for a Measured LOS Massive MIMO Channel
Achievable Rates and Training Overheads for a Measured LOS Massive MIMO Channel Open
This paper presents achievable uplink (UL) sumrate predictions for a measured line-of-sight (LOS) massive multiple-input, multiple-output (MIMO) (MMIMO) scenario and illustrates the trade-off between spatial multiplexing performance and ch…
View article: Millimeter wave channel measurements in a railway depot
Millimeter wave channel measurements in a railway depot Open
Millimeter wave (mmWave) communication is a key enabling technology with the potential to deliver high capacity, high peak data rate communications for future railway services. Knowledge of the radio characteristics is of paramount importa…
View article: Performance Characterization of a Real-Time Massive MIMO System With LOS Mobile Channels
Performance Characterization of a Real-Time Massive MIMO System With LOS Mobile Channels Open
The first measured results for massive MIMO performance in a line-of-sight\n(LOS) scenario with moderate mobility are presented, with 8 users served in\nreal-time using a 100-antenna base Station (BS) at 3.7 GHz. When such a large\nnumber …
View article: Temporal Analysis of Measured LOS Massive MIMO Channels with Mobility
Temporal Analysis of Measured LOS Massive MIMO Channels with Mobility Open
The first measured results for massive multiple-input, multiple-output (MIMO) performance in a line-of-sight (LOS) scenario with moderate mobility are presented, with 8 users served by a 100 antenna base Station (BS) at 3.7 GHz. When such …
View article: NLOS Identification and Mitigation for Geolocation Using Least-Squares Support Vector Machines
NLOS Identification and Mitigation for Geolocation Using Least-Squares Support Vector Machines Open
This paper examines the problem of non-line-of- sight (NLOS) identification and mitigation for geolocation signals in mobile networks. A ray tracing tool is used to simulate a mobile radio network with fixed base stations and thousands of …
View article: Serving 22 Users in Real-Time with a 128-Antenna Massive MIMO Testbed
Serving 22 Users in Real-Time with a 128-Antenna Massive MIMO Testbed Open
This paper presents preliminary results for a novel 128-antenna massive Multiple-Input, Multiple-Output (MIMO) testbed developed through Bristol Is Open in collaboration with National Instruments and Lund University. We believe that the re…
View article: Impact of Smart Metering Data Aggregation on Distribution System State Estimation
Impact of Smart Metering Data Aggregation on Distribution System State Estimation Open
Pseudo medium/low voltage (MV/LV) transformer loads are usually used as partial inputs to the distribution system state estimation (DSSE) in MV systems. Such pseudo load can be represented by the aggregation of smart metering (SM) data. Th…
View article: Mitigating inter-cluster interference on the uplink for a three-cell clustered cooperative network
Mitigating inter-cluster interference on the uplink for a three-cell clustered cooperative network Open
In this paper, we propose a practical and scalable solution to mitigating interference on the uplink through static clustering and adaptive fractional frequency reuse (CFFR). The focus is on a three-cell clustered network due to its low co…
View article: An efficient beam training technique for mmWave communication under NLoS channel conditions
An efficient beam training technique for mmWave communication under NLoS channel conditions Open
An efficient codebook-based beam training technique is proposed for mmWave communication systems operating under non-line-of-sight (NLoS) channel conditions. Using convex optimization theory, this technique formulates the beam training pro…
View article: Physical-Layer Network Coding in Two-Way Heterogeneous Cellular Networks With Power Imbalance
Physical-Layer Network Coding in Two-Way Heterogeneous Cellular Networks With Power Imbalance Open
The growing demand for high-speed data, quality of service (QoS) assurance and energy efficiency has triggered the evolution of 4G LTE-A networks to 5G and beyond. Interference is still a major performance bottleneck. This paper studies th…
View article: Rule Induction-Based Knowledge Discovery for Energy Efficiency
Rule Induction-Based Knowledge Discovery for Energy Efficiency Open
Rule induction is a practical approach to knowledge discovery. Provided that a problem is developed, rule induction is able to return the knowledge that addresses the goal of this problem as if-then rules. The primary goals of knowledge di…
View article: Near-Optimal Resource Allocation in Cooperative Cellular Networks Using Genetic Algorithms
Near-Optimal Resource Allocation in Cooperative Cellular Networks Using Genetic Algorithms Open