-
Addressing Data Distribution Shifts in Online Machine Learning Powered Smart City Applications Using Augmented Test-Time Adaptation
Authors:
Shawqi Al-Maliki,
Faissal El Bouanani,
Mohamed Abdallah,
Junaid Qadir,
Ala Al-Fuqaha
Abstract:
Data distribution shift is a common problem in machine learning-powered smart city applications where the test data differs from the training data. Augmenting smart city applications with online machine learning models can handle this issue at test time, albeit with high cost and unreliable performance. To overcome this limitation, we propose to endow test-time adaptation with a systematic active…
▽ More
Data distribution shift is a common problem in machine learning-powered smart city applications where the test data differs from the training data. Augmenting smart city applications with online machine learning models can handle this issue at test time, albeit with high cost and unreliable performance. To overcome this limitation, we propose to endow test-time adaptation with a systematic active fine-tuning (SAF) layer that is characterized by three key aspects: a continuity aspect that adapts to ever-present data distribution shifts; intelligence aspect that recognizes the importance of fine-tuning as a distribution-shift-aware process that occurs at the appropriate time to address the recently detected data distribution shifts; and cost-effectiveness aspect that involves budgeted human-machine collaboration to make relabeling cost-effective and practical for diverse smart city applications. Our empirical results show that our proposed approach outperforms the traditional test-time adaptation by a factor of two.
△ Less
Submitted 23 May, 2023; v1 submitted 2 November, 2022;
originally announced November 2022.
-
Can Artificial Noise Boost Further the Secrecy of Dual-hop RIS-aided Networks?
Authors:
Elmehdi Illi,
Marwa K. Qaraqe,
Faissal El Bouanani,
Saif M. Al-Kuwari
Abstract:
In this paper, we quantify the physical layer security of a dual-hop regenerative relaying-based wireless communication system assisted by reconfigurable intelligent surfaces (RISs). In particular, the setup consists of a source node communicating with a destination node via a regenerative relay. In this setup, a RIS is installed in each hop to increase the source-relay and relay-destination commu…
▽ More
In this paper, we quantify the physical layer security of a dual-hop regenerative relaying-based wireless communication system assisted by reconfigurable intelligent surfaces (RISs). In particular, the setup consists of a source node communicating with a destination node via a regenerative relay. In this setup, a RIS is installed in each hop to increase the source-relay and relay-destination communications reliability, where the RISs' phase shifts are subject to quantization errors. The legitimate transmission is performed under the presence of a malicious eavesdropper attempting to compromise the legitimate transmissions by overhearing the broadcasted signal from the relay. To overcome this problem, we incorporate a jammer to increase the system's secrecy by disrupting the eavesdropper through a broadcasted jamming signal. Leveraging the well-adopted Gamma and Exponential distributions approximations, the system's secrecy level is quantified by deriving approximate and asymptotic expressions of the secrecy intercept probability (IP) metric in terms of the main network parameters. The results show that the secrecy is enhanced significantly by increasing the jamming power and/or the number of reflective elements (REs). In particular, an IP of approximately $10^{-4}$ can be reached with $40$ REs and $10$ dB of jamming power-to-noise ratio even when the legitimate links' average signal-to-noise ratios are $10$-dB less than the eavesdropper's one. We show that cooperative jamming is very helpful in strong eavesdropping scenarios with a fixed number of REs, and the number of quantization bits does not influence the secrecy when exceeding $3$ bits. All the analytical results are endorsed by Monte Carlo simulations.
△ Less
Submitted 2 August, 2022;
originally announced August 2022.
-
On the Physical Layer Security of a Dual-Hop UAV-based Network in the Presence of per-hop Eavesdropping and Imperfect CSI
Authors:
Elmehdi Illi,
Marwa K. Qaraqe,
F. El Bouanani,
Saif M. Al-Kuwari
Abstract:
In this paper, the physical layer security of a dual-hop unmanned aerial vehicle-based wireless network, subject to imperfect channel state information (CSI) and mobility effects, is analyzed. Specifically, a source node $(S)$ communicates with a destination node $(D)$ through a decode-and-forward relay $(R)$, in the presence of two wiretappers $\left(E_{1},E_{2}\right)$ independently trying to co…
▽ More
In this paper, the physical layer security of a dual-hop unmanned aerial vehicle-based wireless network, subject to imperfect channel state information (CSI) and mobility effects, is analyzed. Specifically, a source node $(S)$ communicates with a destination node $(D)$ through a decode-and-forward relay $(R)$, in the presence of two wiretappers $\left(E_{1},E_{2}\right)$ independently trying to compromise the two hops. Furthermore, the transmit nodes $\left(S,R\right) $ have a single transmit antenna, while the receivers $\left(R,D,E_{1},E_{2}\right) $ are equipped with multiple receive antennas. Based on the per-hop signal-to-noise ratios (SNRs) and correlated secrecy capacities' statistics, a closed-form expression for the secrecy intercept probability (IP) metric is derived, in terms of key system parameters. Additionally, asymptotic expressions are revealed for two scenarios, namely (i) mobile nodes with imperfect CSI and (ii) static nodes with perfect CSI. The results show that a zero secrecy diversity order is manifested for the first scenario, due to the presence of a ceiling value of the average SNR, while the IP drops linearly at high average SNR in the second one, where the achievable diversity order depends on the fading parameters and number of antennas of the legitimate links/nodes. Furthermore, for static nodes, the system can be castigated by a $15$ dB secrecy loss at IP$=3\times10^{-3},$ when the CSI imperfection power raises from $0$ to $10^{-3}$. Lastly, the higher the legitimate nodes' speed, carrier frequency, delay, and/or relay's decoding threshold SNR, the worse is the system's secrecy. Monte Carlo simulations endorse the derived analytical results.
△ Less
Submitted 15 May, 2022;
originally announced May 2022.
-
Interplay Between NOMA and GSSK: Detection Strategies and Performance Analysis
Authors:
Sanjeev Gurugopinath,
Sami Muhaidat,
Rajaleksmi Kishore,
Paschalis C. Sofotasios,
Faissal El Bouanani,
Halim Yanikomeroglu
Abstract:
Non-orthogonal multiple access (NOMA) is a technology enabler for the fifth generation and beyond networks, which has shown a great flexibility such that it can be readily integrated with other wireless technologies. In this paper, we investigate the interplay between NOMA and generalized space shift keying (GSSK) in a hybrid NOMA-GSSK (N-GSSK) network. Specifically, we provide a comprehensive ana…
▽ More
Non-orthogonal multiple access (NOMA) is a technology enabler for the fifth generation and beyond networks, which has shown a great flexibility such that it can be readily integrated with other wireless technologies. In this paper, we investigate the interplay between NOMA and generalized space shift keying (GSSK) in a hybrid NOMA-GSSK (N-GSSK) network. Specifically, we provide a comprehensive analytical framework and propose a novel suboptimal energy-based maximum likelihood (ML) detector for the N-GSSK scheme. The proposed ML decoder exploits the energy of the received signals in order to estimate the active antenna indices. Its performance is investigated in terms of pairwise error probability, bit error rate union bound, and achievable rate. Finally, we establish the validity of our analysis through Monte-Carlo simulations and demonstrate that N-GSSK outperforms conventional NOMA and GSSK, particularly in terms of spectral efficiency.
△ Less
Submitted 24 May, 2021;
originally announced May 2021.
-
Performance Analysis of I/Q Imbalance with Hardware Impairments over Fox's H-Fading Channels
Authors:
Yassine Mouchtak,
Faissal El Bouanani
Abstract:
Impairments baseband model in-phase and quadrature-phase Imbalance (IQI) and Residual hardware impairments (RHI) are two key factors degrading the performance of wireless communication systems (WCSs), particularly when high-frequency bands are employed, as in 5G systems and beyond. The impact of either IQI or RHI on the performance of various WCSs has been investigated exclusively in a separate wa…
▽ More
Impairments baseband model in-phase and quadrature-phase Imbalance (IQI) and Residual hardware impairments (RHI) are two key factors degrading the performance of wireless communication systems (WCSs), particularly when high-frequency bands are employed, as in 5G systems and beyond. The impact of either IQI or RHI on the performance of various WCSs has been investigated exclusively in a separate way. To fill this gap, in this paper, the joint effect of both IQI and RHI on the performance of a WCS subject to the sum of Fox's H-function fading model (SFHF) is investigated. Such a fading model generalizes most, if not all, of well-known fading and turbulence models. To this end, closed-form and asymptotic expressions for the outage probability (OP), channel capacity (CC) under constant power with optimum rate adaptation (ORA) policy, and average symbol error probability (ASEP) for both coherent and non-coherent modulation schemes. Specifically, all the analytical expressions are derived for three different scenarios: (i) ideal Tx and Rx impaired, (ii) Tx impaired and ideal Rx, and (iii) both Tx and Rx are impaired. Further, asymptotic expressions for OP, CC under ORA policy, and ASEP are obtained, based on which, insightful discussions on the IQI and RHI impacts are made. Alpha-mu and Malaga M turbulence with pointing error distribution models have been considered particular SFHF distribution cases. The analytical derivations, revealed by simulation results, demonstrate that the RF impairments' effects should be seriously taken into account in the design of next-generation wireless technologies.
△ Less
Submitted 29 March, 2021;
originally announced March 2021.
-
Budgeted Online Selection of Candidate IoT Clients to Participate in Federated Learning
Authors:
Ihab Mohammed,
Shadha Tabatabai,
Ala Al-Fuqaha,
Faissal El Bouanani,
Junaid Qadir,
Basheer Qolomany,
Mohsen Guizani
Abstract:
Machine Learning (ML), and Deep Learning (DL) in particular, play a vital role in providing smart services to the industry. These techniques however suffer from privacy and security concerns since data is collected from clients and then stored and processed at a central location. Federated Learning (FL), an architecture in which model parameters are exchanged instead of client data, has been propo…
▽ More
Machine Learning (ML), and Deep Learning (DL) in particular, play a vital role in providing smart services to the industry. These techniques however suffer from privacy and security concerns since data is collected from clients and then stored and processed at a central location. Federated Learning (FL), an architecture in which model parameters are exchanged instead of client data, has been proposed as a solution to these concerns. Nevertheless, FL trains a global model by communicating with clients over communication rounds, which introduces more traffic on the network and increases the convergence time to the target accuracy. In this work, we solve the problem of optimizing accuracy in stateful FL with a budgeted number of candidate clients by selecting the best candidate clients in terms of test accuracy to participate in the training process. Next, we propose an online stateful FL heuristic to find the best candidate clients. Additionally, we propose an IoT client alarm application that utilizes the proposed heuristic in training a stateful FL global model based on IoT device type classification to alert clients about unauthorized IoT devices in their environment. To test the efficiency of the proposed online heuristic, we conduct several experiments using a real dataset and compare the results against state-of-the-art algorithms. Our results indicate that the proposed heuristic outperforms the online random algorithm with up to 27% gain in accuracy. Additionally, the performance of the proposed online heuristic is comparable to the performance of the best offline algorithm.
△ Less
Submitted 16 November, 2020;
originally announced November 2020.
-
A PHY Layer Security of a Jamming-Based Underlay Cognitive Hybrid Satellite-Terrestrial Network
Authors:
Mounia Bouabdellah,
Faissal El Bouanani
Abstract:
In this work, we investigate the physical layer security of a jamming-based underlay cognitive hybrid satellite-terrestrial network {consisting of a} radio frequency link at the first hop and an optical feeder at the second hop. Particularly, one secondary user (SU) is transmitting data {to an end-user} optical ground station {($\boldsymbol{D}$)} through the aid of a relay satellite, in the presen…
▽ More
In this work, we investigate the physical layer security of a jamming-based underlay cognitive hybrid satellite-terrestrial network {consisting of a} radio frequency link at the first hop and an optical feeder at the second hop. Particularly, one secondary user (SU) is transmitting data {to an end-user} optical ground station {($\boldsymbol{D}$)} through the aid of a relay satellite, in the presence of {an active} eavesdropper {at} each hop. {Moreover}, another SU located in the first hop is acting as a friendly jammer and continuously broadcasting an artificial noise that cannot be decoded by the wiretapper so as to impinge positively on the system's secrecy. Owing to the underlying strategy, the SUs are permanently adjusting their transmit powers in order to avoid causing harmful interference to primary users. The RF channels undergo shadowed-Rician and Rayleigh fading models, while the optical link is subject to Gamma-Gamma {turbulence with pointing error}. Closed-form and asymptotic expressions for the intercept probability (IP) are derived considering two different scenarios regardless of the channel's conditions, namely (i) absence and (ii) presence of a friendly jammer. The effect of various key parameters on IP, e.g., {sources'} transmit power, {artificial noise}, maximum tolerated interference power, and fading severity parameters are examined. Precisely, we aim to answer the following question: could a friendly jammer further enhance the security of such a system even in a low SNR regime? All the derived results are corroborated by Monte Carlo simulations and new insights into the considered system's secrecy are gained.
△ Less
Submitted 29 September, 2020;
originally announced September 2020.
-
New Accurate Approximation for Average Error Probability Under $κ-μ$ Shadowed Fading Channel
Authors:
Yassine Mouchtak,
Faissal El Bouanani
Abstract:
This paper proposes new accurate approximations for average error probability (AEP) of a communication system employing either $M$-phase-shift keying (PSK) or differential quaternary PSK with Gray coding (GC-DQPSK) modulation schemes over $κ-μ$ shadowed fading channel. Firstly, new accurate approximations of error probability (EP) of both modulation schemes are derived over additive white Gaussian…
▽ More
This paper proposes new accurate approximations for average error probability (AEP) of a communication system employing either $M$-phase-shift keying (PSK) or differential quaternary PSK with Gray coding (GC-DQPSK) modulation schemes over $κ-μ$ shadowed fading channel. Firstly, new accurate approximations of error probability (EP) of both modulation schemes are derived over additive white Gaussian noise (AWGN) channel. Leveraging the trapezoidal integral method, a tight approximate expression of symbol error probability for $M$-PSK modulation is presented, while new upper and lower bounds for Marcum $Q$-function of the first order (MQF), and subsequently those for bit error probability (BER) under DQPSK scheme, are proposed. Next, these bounds are linearly combined to propose a highly refined and accurate BER's approximation. The key idea manifested in the decrease property of modified Bessel function $I_{v}$, strongly related to MQF, with its argument $v$. Finally, theses approximations are used to tackle AEP's approximation under $κ-μ$ shadowed fading. Numerical results show the accuracy of the presented approximations compared to the exact ones.
△ Less
Submitted 28 September, 2020;
originally announced September 2020.
-
On the Distribution of the Sum of Málaga-$\mathcal{M}$ Random Variables and Applications
Authors:
Elmehdi Illi,
Faissal El Bouanani,
Fouad Ayoub
Abstract:
In this paper, a very accurate approximation method for the statistics of the sum of Málaga-$\mathcal{M}$ random variates with pointing error (MRVs) is proposed. In particular, the probability density function of MRV is approximated by a Fox's $H$-function through the moment-based approach. Then, the respective moment-generating function of the sum of $N$ MRVs is provided, based on which the avera…
▽ More
In this paper, a very accurate approximation method for the statistics of the sum of Málaga-$\mathcal{M}$ random variates with pointing error (MRVs) is proposed. In particular, the probability density function of MRV is approximated by a Fox's $H$-function through the moment-based approach. Then, the respective moment-generating function of the sum of $N$ MRVs is provided, based on which the average symbol error rate is evaluated for an $N $-branch maximal-ratio combining (MRC) receiver. The retrieved results show that the proposed approximate results match accurately with the exact simulated ones. Additionally, the results show that the achievable diversity order increases as a function of the number of MRC diversity branches.
△ Less
Submitted 7 August, 2020;
originally announced August 2020.
-
Large Intelligent Surface Assisted Non-Orthogonal Multiple Access: Performance Analysis
Authors:
Lina Bariah,
Sami Muhaidat,
Paschalis C. Sofotasios,
Faissal El Bouanani,
Octavia A. Dobre,
Walaa Hamouda
Abstract:
Large intelligent surface (LIS) has recently emerged as a potential enabling technology for 6G networks, offering extended coverage and enhanced energy and spectral efficiency. In this work, motivated by its promising potentials, we investigate the error rate performance of LIS-assisted non-orthogonal multiple access (NOMA) networks. Specifically, we consider a downlink NOMA system, in which data…
▽ More
Large intelligent surface (LIS) has recently emerged as a potential enabling technology for 6G networks, offering extended coverage and enhanced energy and spectral efficiency. In this work, motivated by its promising potentials, we investigate the error rate performance of LIS-assisted non-orthogonal multiple access (NOMA) networks. Specifically, we consider a downlink NOMA system, in which data transmission between a base station (BS) and $L$ NOMA users is assisted by an LIS comprising $M$ reflective elements. First, we derive the probability density function of the end-to-end wireless fading channels between the BS and NOMA users. Then, by leveraging the obtained results, we derive an approximate expression for the pairwise error probability (PEP) of NOMA users under the assumption of imperfect successive interference cancellation. Furthermore, accurate expressions for the PEP for $M = 1$ and large $M$ values ($M > 10$) are presented in closed-form. To gain further insights into the system performance, an asymptotic expression for the PEP in high signal-to-noise ratio regime, the achievable diversity order, and a tight union bound on the bit error rate are provided. Finally, numerical and simulation results are presented to validate the derived mathematical results.
△ Less
Submitted 19 July, 2020;
originally announced July 2020.
-
Analysis of Asymmetric Dual-Hop Energy Harvesting-Based Wireless Communication Systems in Mixed Fading Environments
Authors:
Elmehdi Illi,
Faissal El Bouanani,
Paschalis C. Sofotasios,
Sami Muhaidat,
Daniel Benevides da Costa,
Fouad Ayoub,
Ala Al-Fuqaha
Abstract:
In this paper, the performance of a dual-hop energy harvesting-based fixed-gain amplify-and-forward (AF) relaying communication system, subject to fading impairments, is investigated. We consider a source node ($S$) communicating with a destination node ($D$) through a fixed distant relay ($R$), which harvests energy from its received signals and uses it to amplify and forward the received signals…
▽ More
In this paper, the performance of a dual-hop energy harvesting-based fixed-gain amplify-and-forward (AF) relaying communication system, subject to fading impairments, is investigated. We consider a source node ($S$) communicating with a destination node ($D$) through a fixed distant relay ($R$), which harvests energy from its received signals and uses it to amplify and forward the received signals to $D$. Power-splitting (PS) and time-switching (TS) schemes are considered in the analysis for energy harvesting. The $S$-$R$ and $R$-$D$ hops are modeled by the Nakagami-$m$ and $α$-$μ$ fading models, respectively. Closed-form expressions for the statistical properties of the end-to-end signal-to-noise ratio (SNR) are derived, based on which novel closed-form expressions for the average symbol error rate (ASER) as well as average channel capacity (ACC) considering four adaptive transmission policies are derived. The derived expressions are validated through Monte-Carlo simulations.
△ Less
Submitted 5 April, 2020;
originally announced April 2020.
-
A PHY Layer Security Analysis of a Hybrid High Throughput Satellite with an Optical Feeder Link
Authors:
Elmehdi Illi,
Faissal El Bouanani,
Fouad Ayoub,
Mohamed-Slim Alouini
Abstract:
Hybrid terrestrial-satellite (HTS) communication systems have gained a tremendous amount of interest recently due to the high demand for global high data rates. Conventional satellite communications operate in the conventional Ku (12 GHz) and Ka (26.5-40 GHz) radio-frequency bands for assessing the feeder link, between the ground gateway and the satellite. Nevertheless, with the aim to provide hun…
▽ More
Hybrid terrestrial-satellite (HTS) communication systems have gained a tremendous amount of interest recently due to the high demand for global high data rates. Conventional satellite communications operate in the conventional Ku (12 GHz) and Ka (26.5-40 GHz) radio-frequency bands for assessing the feeder link, between the ground gateway and the satellite. Nevertheless, with the aim to provide hundreds of Mbps of throughput per each user, free-space optical (FSO) feeder links have been proposed to fulfill these high data rates requirements. In this paper, we investigate the physical layer security performance for a hybrid very high throughput satellite communication system with an FSO feeder link. In particular, the satellite receives the incoming optical wave from an appropriate optical ground station, carrying the data symbols of $N$ users through various optical apertures and combines them using the selection combining technique. Henceforth, the decoded and regenerated information signals of the $N$ users are zero-forcing (ZF) precoded in order to cancel the interbeam interference at the end-users. The communication is performed under the presence of malicious eavesdroppers nodes at both hops. Statistical properties of the signal-to-noise ratio of the legitimate and wiretap links at each hop are derived, based on which the intercept probability metric is evaluated. The derived results show that above a certain number of optical apertures, the secrecy level is not improved further. Also, the system's secrecy is improved using ZF precoding compared to the no-precoding scenario for some specific nodes' positions. All the derived analytical expressions are validated through Monte Carlo simulations.
△ Less
Submitted 27 March, 2020;
originally announced March 2020.
-
A PHY Layer Security Analysis of Uplink Cooperative Jamming-Based Underlay CRNs with Multi-Eavesdroppers
Authors:
Mounia Bouabdellah,
Faissal El Bouanani,
Mohamed-Slim Alouini
Abstract:
In this paper, the physical layer security of a dual-hop underlay uplink cognitive radio network is investigated over Nakagami-m fading channels. Specifically, multiple secondary sources are taking turns in accessing the licensed spectrum of the primary users and communicating with a multiantenna secondary base station D through the aid of a multiantenna relay R in the presence of M eavesdroppers…
▽ More
In this paper, the physical layer security of a dual-hop underlay uplink cognitive radio network is investigated over Nakagami-m fading channels. Specifically, multiple secondary sources are taking turns in accessing the licensed spectrum of the primary users and communicating with a multiantenna secondary base station D through the aid of a multiantenna relay R in the presence of M eavesdroppers that are also equipped with multiple antennas. Among the remaining nodes, one jammer is randomly selected to transmit an artificial noise to disrupt all the eavesdroppers that are attempting to intercept the communication of the legitimate links i.e., S-R and R-D. The received signals at each node are combined using maximal-ratio combining. Secrecy analysis is provided by deriving closed-form and asymptotic expressions for the secrecy outage probability. The impact of several key parameters on the system's secrecy e.g., transmit power of the sources, number of eavesdroppers, maximum tolerated interference power, and the number of diversity branches is investigated. Importantly, by considering two scenarios, namely (i) absence and (ii) presence of a friendly jammer, new insights are obtained for the considered communication system. Especially, we tend to answer to the following question: Can better secrecy be achieved without jamming by considering a single antenna at eavesdroppers and multiple-ones at the legitimate users (i.e., relay and end-user) rather than sending permanently an artificial noise and considering that both the relay and the destination are equipped with a single antenna, while multiple antennas are used by the eavesdroppers? The obtained results are corroborated through Monte Carlo simulation and show that the system's security can be enhanced by adjusting the aforementioned parameters.
△ Less
Submitted 28 November, 2019;
originally announced November 2019.
-
An Improved Accurate Solver for the Time-Dependent RTE in Underwater Optical Wireless Communications
Authors:
Elmehdi Illi,
Faissal El Bouanani,
Ki-Hong Park,
Fouad Ayoub,
Mohamed-Slim Alouini
Abstract:
In this paper, an improved numerical solver to evaluate the time-dependent radiative transfer equation (RTE) for underwater optical wireless communications (UOWC) is investigated. The RTE evaluates the optical path-loss of light wave in an underwater channel in terms of the inherent optical properties related to the environments, namely the absorption and scattering coefficients as well as the pha…
▽ More
In this paper, an improved numerical solver to evaluate the time-dependent radiative transfer equation (RTE) for underwater optical wireless communications (UOWC) is investigated. The RTE evaluates the optical path-loss of light wave in an underwater channel in terms of the inherent optical properties related to the environments, namely the absorption and scattering coefficients as well as the phase scattering function (PSF). The proposed numerical algorithm was improved based on the ones proposed in [1]-[4], by modifying the finite difference scheme proposed in [1] as well as an enhancement of the quadrature method proposed in [2] by involving a more accurate 7-points quadrature scheme in order to calculate the quadrature weight coefficients corresponding to the integral term of the RTE. Furthermore, the scattering angular discretization algorithm used in [3] and [4] was modified, based on which the receiver's field of view discretization was adapted correspondingly. Interestingly, the RTE solver has been applied to three volume scattering functions, namely: the single-term HG phase function, the two-term HG phase function [5], and the Fournier-Forand phase function [6], over Harbor-I and Harbor-II water types. Based on the normalized received power evaluated through the proposed algorithm, the bit error rate performance of the UOWC system is investigated in terms of system and channel parameters. The enhanced algorithm gives a tightly close performance to its Monte Carlo counterpart improved based on the simulations provided in [7], by adjusting the numerical cumulative distribution function computation method as well as optimizing the number of scattering angles. Matlab codes for the proposed RTE solver are presented in [8].
△ Less
Submitted 4 May, 2019;
originally announced May 2019.