{"title":"Phase Noise Estimation and Compensation in 100G 4-QAM CO-OFDM system using Radial Basis Function Network","authors":"S. T. Ahmad, K. P. Kumar","doi":"10.1109/WOCN.2018.8556129","DOIUrl":"https://doi.org/10.1109/WOCN.2018.8556129","url":null,"abstract":"We propose an efficient and less complex phase estimation and compensation method using radial basis function network (RBFN). The RBFN is used to exploit the channel correlation in the frequency domain. In this paper, we provide the compensation of laser phase noise (LPN) and nonlinear phase noise in 4-QAM coherent optical orthogonal frequency division multiplexing (CO-OFDM) system. Simulation results show that the proposed RBFN algorithm efficiently estimates the LPN and trajectory matches with the actual LPN. The RBF network also reduces the computational complexity and the RBF subnetworks to a great extent compared to $K$-means based RBFNN-NLE technique. With RBFN-PE algorithm, the optimum launch power (LP) increases to 1 dBm and at this LP, Q-factor improves by 2.6 dB. Furthermore, simulation results show that at an FEC limit (Q = 8 dB), the transmission reach increases by 4 spans with the RBFN-PE algorithm. Thus, we show that the system performance improves by increase in optimum LP and transmission reach with the proposed RBFN-PE.","PeriodicalId":116005,"journal":{"name":"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125006719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A QoS-aware MAC protocol for IEEE 802.11ah-based Internet of Things","authors":"N. Ahmed, D. De, M. I. Hussain","doi":"10.1109/WOCN.2018.8556133","DOIUrl":"https://doi.org/10.1109/WOCN.2018.8556133","url":null,"abstract":"The IEEE 802.11ah standard has proven to be a scalable solution for medium range networks in Internet of Things (IoT). The Restricted Access Window (RAW)-based channel access mechanism of 802.11ah reduces collisions and improves scalability. However, the RAW mechanism creates congestion in the network having event-driven traffic generated randomly. This paper proposes a Quality of Service (QoS)-aware priority grouping and RAW scheduling algorithm for the 802.11ah-based network. The proposed protocol reduces collisions and ensures required bandwidth for rare but critical event-driven stations. Performance evaluation of the proposed scheme shows significant improvement over 802.11ah-based MAC protocol.","PeriodicalId":116005,"journal":{"name":"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128748782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some Aspects of Massive MIMO Spectrum Sharing","authors":"Aritra De, Tirthankar Datta","doi":"10.1109/WOCN.2018.8556131","DOIUrl":"https://doi.org/10.1109/WOCN.2018.8556131","url":null,"abstract":"Massive MIMO (Multiple Input Multiple Output) is a key technology for the upcoming 5G technology. In massive MIMO technology, a large number of users are considered by the network and hence the capacity is varied with these large number of users. In this paper we observed different aspects of Massive MIMO capacity by varying the number of primary user(K), the number of primary antenna (Np)and the number of secondary antenna (Ns). Here for simplicity one secondary user is considered.","PeriodicalId":116005,"journal":{"name":"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127041559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. M. Reddy, R. Dasar, R. Tanuja, S. Manjula, K. Venugopal
{"title":"Forward Secrecy in Authentic and Anonymous Cloud with Time Optimization","authors":"P. M. Reddy, R. Dasar, R. Tanuja, S. Manjula, K. Venugopal","doi":"10.1109/WOCN.2018.8556130","DOIUrl":"https://doi.org/10.1109/WOCN.2018.8556130","url":null,"abstract":"In recent days Cloud computing is a rising technique which offers data sharing with more efficient, effective and economical approaches between group members. To create an authentic and anonymous data sharing, IDentity based Ring Signature (ID-RS) is one of the promising technique between the groups. Ring signature scheme permits the manager or data owner to authenticate into the system in anonymous manner. In conventional Public Key Infrastructure (PKI) data sharing scheme contains certificate authentication process, which is a bottleneck because of its high cost. To avoid this problem, we proposed Cost Optimized Identity based Ring Signature with forward secrecy (COIRS) scheme. This scheme helps to remove the traditional certificate verification process. Only once the user needs to be verified by the manager giving his public details, then the cost and time required for this process is comparatively less than traditional public key infrastructure. If the secret key holder has been compromised, all early generated signatures remains valid (Forward Secrecy). This paper discuss about how to optimize the time and cost when sharing the files to the cloud. In general better efficiency and secrecy can be provided for group sharing by applying above approaches.","PeriodicalId":116005,"journal":{"name":"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"60 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124318010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computation of Skin Depth for MIM Surface Plasmon Structure at Higher Frequency","authors":"A. Deyasi, P. Verma","doi":"10.1109/WOCN.2018.8556123","DOIUrl":"https://doi.org/10.1109/WOCN.2018.8556123","url":null,"abstract":"Skin depth of MIM surface plasmon structure is analytically computed for different structural parameters at THz frequency range. Characteristic impedance is first calculated at region of interest considering both Faraday inductance and kinetic inductance, and also assuming presence of either symmetric or antisymmetric mode due to electron oscillation. Formation of double-sided surface plasmon is also evident due to coupling between two single-sided SP waves at some particular separation distance between the metal plates. Result is critically important for measurement of penetration depth of electromagnetic wave at SPR condition for detecting presence of sub-atomic particles and also of biological analytes.","PeriodicalId":116005,"journal":{"name":"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134316646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Compact Printed UWB MIMO Monopole Antenna with Modified Complementary Fractal for Isolation Improvement and Triple Band Notch Characteristics","authors":"Jeet Banerjee, A. Karmakar, R. Ghatak","doi":"10.1109/WOCN.2018.8556127","DOIUrl":"https://doi.org/10.1109/WOCN.2018.8556127","url":null,"abstract":"In this communication a compact printed CPW-fed dual band-notched Ultra Wideband (UWB) Multiple Input Multiple Output (MIMO) antenna is exhibited. The UWB MIMO antenna consists of two printed planar identical monopoles PA and PB respectively and a novel modified Minkowski complementary fractal structure is introduced in the ground plane for reinforcing the isolation of the MIMO system. Notch bands encompassing 3.3-3.8 GHz Wi-MAX, 3.7-4.2 GHz C-Band, 5.15-5.85 GHz WLAN are acquired by etching a rectangular slot on the common ground structure and etching rotated C-shaped slots on the planar monopoles respectively. The antenna's Ultra wide bandwidth ranges from 3.16 GHz to 12 GHz (VSWR $leq 2)$. The radiator and ground plane of the antenna are etched with an overall size of 26.75 mm $times$ 37.96 mm. The agreement between the various simulation results advocates that the intended antenna can be a worthy candidate for various UWB communication systems. All the simulated results depict that the proposed UWB MIMO antenna is an exceptional candidate for portable UWB as well as UWB MIMO systems.","PeriodicalId":116005,"journal":{"name":"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115678051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bingxuan Zhao, K. Kitagawa, T. Fujimoto, K. Yunoki, R. Kataoka, H. Shinbo
{"title":"Reduction Scheme of SS for D2D Relay-Path Selection to Achieve Guaranteed Throughput for 5G systems","authors":"Bingxuan Zhao, K. Kitagawa, T. Fujimoto, K. Yunoki, R. Kataoka, H. Shinbo","doi":"10.1109/WOCN.2018.8556137","DOIUrl":"https://doi.org/10.1109/WOCN.2018.8556137","url":null,"abstract":"In the fifth generation (5G) systems, millimeter wave (mmW) small cells are deployed in order to increase the system capacity. In order to extend the limited coverage of the mmW small cells, network-assisted relay involving device-to-device (D2D) communication is one of the key promising techniques. However, in the crowded area, which is a typical deployment scenario of 5G systems, conventional relay-path selection schemes are not applicable due to intense collisions of D2D synchronization signals (SSs). In addition, when selecting the relay-path, conventional schemes do not consider the backhaul quality to connect the Internet, which is necessary to guarantee end-to-end throughput for some Guaranteed Bit Rate (GBR) type services like conversational video. To solve these problems, the proposed scheme reduces the number of candidate relay users transmitting D2D SSs by applying several constraints such as requested throughput to exclude the relay users unable to satisfy the constraint. As an example of simulation results, it is observed that the proposed scheme reduces the number of D2D SSs by 96%, comparing with conventional schemes, in the case that a requested throughput from a remote user is set to 13.6 Mbps.","PeriodicalId":116005,"journal":{"name":"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124888454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Savitha Mathapati, S. ShreelekhaB., R. Tanuja, S. Manjula, K. Venugopal
{"title":"Co-extraction of Opinion Targets and Opinion Words from Online Reviews Based on Opinion and Semantic Relations","authors":"Savitha Mathapati, S. ShreelekhaB., R. Tanuja, S. Manjula, K. Venugopal","doi":"10.1109/WOCN.2018.8556134","DOIUrl":"https://doi.org/10.1109/WOCN.2018.8556134","url":null,"abstract":"Mining opinions from online reviews is a fundamental step in obtaining the overall sentiment of a product. Detection of opinion relations among the words play an important role in the opinion target (OT) and opinion word (OW) extraction. In this paper, Partially Supervised Word Alignment Model is used to find opinion relations among words. Graph based co-ranking algorithm is used in estimating the confidence of each OT and OW. Candidates having confidence value higher than the threshold are extracted as final OT and OW. We propose a hybrid method that considers semantic relations along with opinion relations that results in fine grained opinion target (OT) and opinion word (OW) extraction. This semantic relations and opinion relations affects the confidence calculation of the OT and OW and improves the precision of extraction.","PeriodicalId":116005,"journal":{"name":"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127235466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Semanti Chakraborty, Tanusree Das, R. Dutta, Subhankar Sen, Irin Shabnam, K. Palodhi
{"title":"Analysis of illumination properties of LED sources used in Li-Fi communication","authors":"Semanti Chakraborty, Tanusree Das, R. Dutta, Subhankar Sen, Irin Shabnam, K. Palodhi","doi":"10.1109/WOCN.2018.8556126","DOIUrl":"https://doi.org/10.1109/WOCN.2018.8556126","url":null,"abstract":"In this proceeding, sources used in Li-fi communication systems, generally, LEDs are analysed in terms of illumination parameters. This is an important area of research since apart from communication aspect the sources and detector characteristics will ensure seamless communication between the transmitter and receiver. Simulations are provided for proposed Li-fi communication system and results are analysed in terms of suitable detectors.","PeriodicalId":116005,"journal":{"name":"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126082228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Architecture for Secured Data Transmission in OCDMA System with Designed Modified Walsh Code","authors":"M. Sarkar, Somali Sikder, Shila Ghosh","doi":"10.1109/WOCN.2018.8556136","DOIUrl":"https://doi.org/10.1109/WOCN.2018.8556136","url":null,"abstract":"This paper illustrates the secured data transmission process of MWC for OCDMA system. To transmit the data with a higher degree of security through a optical network, some smart and reconfigurable security processes are being introduced over a SAC-OCDMA scheme. This security process is mainly developed to embarrass the eavesdroppers by hiding the actual code signature of the users. Dynamic Central Control (DCC) process is used here to reconfigure the signature key dynamically during the data transmission through optical channel. Threshold algorithm has been used to decode the original data.","PeriodicalId":116005,"journal":{"name":"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116577189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}