P. Sofotasios, Seong Ki Yoo, Nidhi Bhargav, S. Muhaidat, S. Cotton, M. Matthaiou, M. Valkama, G. Karagiannidis
{"title":"Capacity analysis under generalized composite fading conditions","authors":"P. Sofotasios, Seong Ki Yoo, Nidhi Bhargav, S. Muhaidat, S. Cotton, M. Matthaiou, M. Valkama, G. Karagiannidis","doi":"10.1109/COMMNET.2018.8360282","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360282","url":null,"abstract":"Novel composite fading models were recently proposed based on inverse gamma distributed shadowing conditions. These models were extensively shown to provide remarkable modeling of the simultaneous occurrence of multipath fading and shadowing phenomena in emerging wireless scenarios such as cellular, off-body and vehicle-to-vehicle communications. Furthermore, the algebraic representation of these models is rather tractable, which renders them convenient to handle both analytically and numerically. The present contribution presents the major theoretical and practical characteristics of the η — μ / inverse gamma composite fading model, followed by a thorough ergodic capacity analysis. To this end, novel analytic expressions are derived, which are subsequently used in the evaluation of the corresponding system performance. In this context, the offered results are compared with respective results from cases assuming conventional fading conditions, which leads to the development of numerous insights on the effect of the multipath fading and shadowing severity on the achieved capacity levels. It is expected that these results will be useful in the design of timely and highly demanding wireless technologies, such as wearable, cellular and inter-vehicular communications as well in wireless power transfer based applications in the context of the Internet of Things.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129508334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamics of network connectivity in tactical MANETs","authors":"Younes Regragui, N. Moussa","doi":"10.1109/COMMNET.2018.8360278","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360278","url":null,"abstract":"In the future battlefields, communication between commanders and soldiers will be a decisive factor to complete an assigned mission. In such military tactical scenarios, network topology is constrained by the dynamics of dismounted soldiers in the battlefield. In the battlefield area, soldiers may be divided into a number of squads and fire teams with each one having its own mission, especially in some critical situation (e.g., a military response to an enemy attack or a sweep operation of houses). This situation may cause an unpredictable behavior in terms of wireless network topology state, thus increasing the susceptibility of network topology to decomposition in multiple components. This paper presents a Group Mobility Model simulating realistic battlefield behaviors and movement techniques. We also analyze wireless communication between dismounted soldiers and their squad leader deployed in a mobile ad hoc network (MANET) under different packet sending rate and perturbation factor modeled as a standard deviation parameter which may affect soldiers' mobility. A discussion of results follows, using several performance metrics according to network behavior (such as throughput, relaying rate of unrelated packets and path length).","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125947530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multipoint relay selection through estimated spatial relation in smart city environments","authors":"Ayoub Abdellaoui, Jamal Elmhamdi, Halim Berradi","doi":"10.1109/COMMNET.2018.8360273","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360273","url":null,"abstract":"The future Internet will be able of connecting and communicating with practically all physical and virtual objects around us to the Internet to create smart homes and cities. Thus smart things are expected to send and receive data, in particular, effective data collection is crucial for services that require a timely delivery of urgent data while reacting independently to the events with or without any human intervention and self-configuring themselves such as homeland security, city surveillance, irrigation, smart buildings & industries, ecommerce, auto vehicle systems, etc. The current challenges have led to deploy the mobile ad hoc networks (MANETs) in the Smart Cities due to their easy implementation and to be the fastest and the most efficient way to establish connection in smart environments. However, the challenge is, the environments that these communications act through, are variables and unstable. This paper proposes an original solution to integrate and exploit MANETs to allow immediate adaptation in smart city environments. This proposed is an improved algorithm based on a mobility scheme named Estimated Spatial relation by discovering both modification to MPRs selection and the routing decision in goal to decrease effects that lead to more disconnecting of the network, more delay and more lost packets due to unpredictable environment for smart city networks. Proposed design has been checked using NS3 simulator and demonstrated good results in most of the circumstances.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115544263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saad Mohamed, R. Hamila, N. Al-Dhahir, A. Gouissem, L. Ben‐Brahim, M. Gabbouj
{"title":"Maximum achievable throughput and interference mitigation for SUN in coexistence with WLAN","authors":"Saad Mohamed, R. Hamila, N. Al-Dhahir, A. Gouissem, L. Ben‐Brahim, M. Gabbouj","doi":"10.1109/COMMNET.2018.8360252","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360252","url":null,"abstract":"An optimum packet length selection scheme to maximize the throughput of a smart utility network (SUN) is introduced under wireless local area network (WLAN) interference system. The traditional and the investigated segmented packet collision models (PCM) are compared in terms of packet error rate (PER) and maximum achievable throughput. Furthermore, we quantify the impact of minimum mean square error (MMSE) interference mitigation for the SUN in the coexistence of WLAN interfering packets over multipath Rayleigh fading channel. The effect of the distance between the WLAN transmitter and the SUN receiver on the probability of error is also investigated.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131000643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A high accuracy solver for RTE in underwater optical communication path loss prediction","authors":"Elmehdi Illi, Faissal El Bouanani, F. Ayoub","doi":"10.1109/COMMNET.2018.8360253","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360253","url":null,"abstract":"In this paper, we present a new improved numerical framework to evaluate the time-dependent radiative transfer equation (RTE) for underwater optical wireless communication (UOWC) systems. The RTE predicts the optical path-loss of light in an underwater channel, as a function of the inherent optical properties (IOPs) related to the water type, namely the absorption and scattering coefficients as well as the phase scattering function (PSF). We reach the simulation performance based on an improvement of the finite difference scheme proposed in [1] as well as an enhancement of the quadrature method aiming to calculate the integral term of the RTE [2]. Additionally, we evaluate the received power at the receiver plane in three dimensions by considering a given receiver aperture and a field of view (FOV). Finally, we evaluate the UOWC system's bit error rate performance metric as a function of the propagation distance, and time.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"57 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133008725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New ant colony optimization for searching the minimum distance for linear codes","authors":"Hicham Bouzkraoui, Ahmed Azouaoui, Youssef Hadi","doi":"10.1109/COMMNET.2018.8360246","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360246","url":null,"abstract":"In coding theory, finding minimum distance remains one of the most open problems, actually it was proven to be an NP-hard type. Therefore classical algorithms become impracticable for large codes. Metaheuristic approaches come out to tackle this kind of problems by producing “good” solutions but eventually not the best at reasonable computational cost. In this paper we will attack this problem using Ant Colony Optimization (ACO), one of the successful swarm intelligence metaheuristic methods, derived from nature, especially the collective behavior of ants to find the best path to food, our implementation tested on linear codes then compared with previous works. The obtained results show an improvement in solution accuracy and computational cost.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124125192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mean squared error analysis for OFDMA signals under joint Tx/Rx IQ imbalance","authors":"L. Samara, R. Hamila, T. Khattab, Ö. Özdemir","doi":"10.1109/COMMNET.2018.8360250","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360250","url":null,"abstract":"In this paper, a normalized mean squared error (NMSE) expression is derived for an orthogonal frequency division multiple access link under the effects of joint transmitter (Tx) and receiver (Rx) in-phase/quadrature imbalance (IQI). Two special cases of Tx-only and Rx-only IQI are also studied. The considered type of IQI is frequency independent. Additionally, asymptotic analysis under the assumption of high signal-to-noise ratio (SNR) is performed where in some cases, the NMSE metric increases as the SNR increases. To rectify this behavior, we propose a regularization parameter that can be added to the minimum mean square error channel equalizer to force the NMSE metric to converge as the SNR increases.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121186436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware implementation of space modulation techniques using Simulink RF Blockset","authors":"Omar Hiari, R. Mesleh","doi":"10.1109/COMMNET.2018.8360248","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360248","url":null,"abstract":"Some recent research has paved the path for hardware realizations of space modulation techniques (SMTs) utilizing RF hardware components. This would attract the need to introduce approaches that study the hardware system behavior ahead of realizing actual physical implementations. Without such studies, direct physical implementations can consume a significant amount of time and money. Mathworks has recently introduced a library of RF hardware components within RF Blockset to model hardware system implementations. This would enable in depth studies of the impact of different hardware components on SMTs at a faster pace. In this paper we introduce the foundational base-band models needed to study SMT hardware implementations. BER simulations are conducted for the different models to verify the accuracy of the developed models. In addition, the impact of different hardware components on BER is addressed. This paper also discusses how the models introduced can be expanded further for baseband and passband implementations to include the needed hardware components and their imperfections.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"15 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116671243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy increase on telecommunication processes","authors":"Siham Arfaoui, A. Belmekki, Abdellatif Mezrioui","doi":"10.1109/COMMNET.2018.8360266","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360266","url":null,"abstract":"The telecommunication is the corner stone in the current global economic context, which requires an opening in all areas and an interaction using different communication media. To satisfy this need, several telecommunication service providers have focused on modernizing their platforms and technologies (from 2G to 5G) to support different medias such as voice, video, and data services. In such context, personal data are massively collected, stored and processed for different aims. When this huge quantity of data is not correctly protected, it became an important issue for privacy, which is considered as a human right and is protected by the law. This paper focus on the weakness in telecommunication process related to the management of personnel data. It shows how data are exposed and propose an approach to manage personnel data to preserve privacy and in the same time take benefit from the presence of this data treasure.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133639584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Neila Mekki, Mohamed Hamdi, T. Aguili, Tai-hoon Kim
{"title":"A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system","authors":"Neila Mekki, Mohamed Hamdi, T. Aguili, Tai-hoon Kim","doi":"10.1109/COMMNET.2018.8360271","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360271","url":null,"abstract":"Video surveillance is becoming more and more popular in our life. It is widely deployed in many kinds of monitoring application such as healthcare and industrial environment. However, there are many security requirements such as privacy, authentication, and confidentiality. To tackle this issue, we address chaotic systems, which have been suggested as a good promising direction with desired properties in a real-time application. Furthermore, our major contributions are two-fold. First, we discuss the properties of chaotic systems in order to encrypt multimedia data. Second, we propose a secure surveillance framework for healthcare application by intelligent integration of the efficient chaotic map to extract data in the monitored scene using a visual sensor (camera). We show that our proposed framework fulfills the security requirements for surveillance applications.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134139760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}