2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)最新文献

筛选
英文 中文
Network Coded Cooperation Receiver with Analog XOR Mapping for Enhanced BER 基于模拟异或映射的网络编码合作接收机提高误码率
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902586
Mohamed Hossam Hegazy, A. El-Sherif, T. Elbatt
{"title":"Network Coded Cooperation Receiver with Analog XOR Mapping for Enhanced BER","authors":"Mohamed Hossam Hegazy, A. El-Sherif, T. Elbatt","doi":"10.1109/WCNCW.2019.8902586","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902586","url":null,"abstract":"In this paper, we propose a novel physical layer decoding technique for Device-to-Device Network Coded Cooperation (NCC) receivers in the Two Way Relay Channel (TWRC) scenario. The proposed technique is efficiently applicable either when Channel State Information (CSI) are available at the receiver or not. It first employs XOR arithmetic analog mapping to extract a distorted version of the intended signal from the network-coded signal received from the relay. The obtained signal is then combined with the direct signal received from the source, resulting in a higher SNR version of the intended signal. Combining technique used is either Cooperative Maximum Ratio Combining (C-MRC) or Equal Gain Combining (EGC) depending on whether CSI are available or not. The proposed receiver has two advantages over the optimum Maximum Likelihood (ML) receiver. First is its applicability under CSI unavailability circumstances. Second is its lower computation complexity. The BER performance of the proposed scheme has been evaluated through exhaustive Monte-Carlo simulations. According to the obtained results, the proposed scheme is superior to the conventional Network Coding (NC) scheme in both CSI availability and unavailability scenarios. It achieves BER reduction of approximately 71.65 % and 41% in the two scenarios, respectively. Further, when CSI are available, results show that the proposed scheme achieved BER approaches that of the optimum ML (< 6% increase over ML), being noticeably superior to the conventional Cooperative Communication (CC) scheme with Maximum Ratio Combining (MRC) (achieved BER reduction ≈ 55.2%). An accurate closed form for the proposed scheme theoretical achieved BER has been derived in the CSI unavailability case, with BPSK assumed.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133067365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Capacity Sensitivity in Additive Vector Symmetric α-Stable Noise Channels 加性向量对称α-稳定噪声信道的容量灵敏度
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902901
Malcolm Egan
{"title":"On Capacity Sensitivity in Additive Vector Symmetric α-Stable Noise Channels","authors":"Malcolm Egan","doi":"10.1109/WCNCW.2019.8902901","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902901","url":null,"abstract":"Due to massive numbers of uncoordinated devices present in wireless networks for the Internet of Things (IoT), interference is a key challenge. There is evidence both from experiments and analysis of statistical models that the uncoordinated nature of channel access leads to non-Gaussian statistics for the interference. A particularly attractive model in this scenario is the additive vector α-stable noise channel. In this paper, we study the capacity of this channel with fractional moment constraints. In particular, we establish well-posedness of the optimization problem for the capacity. We also study convergence of the capacity loss due to an additional constraint where input probability measures are concentrated on spherical shells, in addition to the fractional moment constraints.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133297471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Edge and Fog Computing Platform for Effective Deployment of 360 Video Applications 有效部署360视频应用的边缘和雾计算平台
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902860
G. Rigazzi, Jani-Pekka Kainulainen, C. Turyagyenda, Alain A. M. Mourad, Jaehyun Ahn
{"title":"An Edge and Fog Computing Platform for Effective Deployment of 360 Video Applications","authors":"G. Rigazzi, Jani-Pekka Kainulainen, C. Turyagyenda, Alain A. M. Mourad, Jaehyun Ahn","doi":"10.1109/WCNCW.2019.8902860","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902860","url":null,"abstract":"Immersive video applications based on 360 video streaming require high-bandwidth, high-reliability and low-latency 5G connectivity but also flexible, low-latency and cost-effective computing deployment. This paper proposes a novel solution for decomposing and distributing the end-to-end 360 video streaming service across three computing tiers, namely cloud, edge and constrained fog, in order of proximity to the end user client. The streaming service is aided with an adaptive viewport technique. The proposed solution is based on the H2020 5G-CORAL system architecture using micro-services-based design and a unified orchestration and control across all three tiers based on Fog05. Performance evaluation of the proposed solution shows noticeable reduction in bandwidth consumption, energy consumption, and deployment costs, as compared to a solution where the streaming service is all delivered out of one computing location such as the Cloud.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"43 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113973529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
EMF-reduction Uplink Resource Allocation Scheme for Non-Orthogonal Multiple Access Systems 非正交多址系统的消emf上行资源分配方案
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902807
M. Jamshed, O. Amjad, F. Héliot, T. Brown
{"title":"EMF-reduction Uplink Resource Allocation Scheme for Non-Orthogonal Multiple Access Systems","authors":"M. Jamshed, O. Amjad, F. Héliot, T. Brown","doi":"10.1109/WCNCW.2019.8902807","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902807","url":null,"abstract":"The increasing number of users and the demand for higher data rate due to multimedia services, requires high capacity/bandwidth, low latency and high quality of service (QoS). In turn, some of these requirements have/will lead to the deployment of numerous new access points. Given that wireless communication systems utilize radio frequency (RF) waves to operate, more users and more access points imply more electromagnetic field (EMF) exposure. Meanwhile, the possible health consequences of EMF exposure from these systems are progressively becoming a major concern due to their ever growing ubiquity and increased transmission power. In an endeavor to reduce the EMF exposure due to wireless communication systems, we design an optimization scheme for minimizing the EMF exposure of users in the uplink of non-orthogonal multiple access (NOMA) systems, while satisfying each user with an acceptable QoS. We define EMF minimization strategy as a convex optimization problem and iteratively solve it by assigning bits to each user. Each subcarrier is strategically allocated to a group of users having minimum interference and is found by using the classic binary search algorithm. Simulation results depict that our proposed strategy provides a reduction of at least 1 order of magnitude in terms of EMF exposure, while satisfying QoS constraints, in comparison with the state-of-art techniques in the literature.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"34 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121319598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy-Preservation Mechanisms for Smart Energy Metering Devices Based on Differential Privacy 基于差分隐私的智能计量设备隐私保护机制
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902683
Alaa Gohar, F. Shafik, Frank Dürr, K. Rothermel, Amr H. El Mougy
{"title":"Privacy-Preservation Mechanisms for Smart Energy Metering Devices Based on Differential Privacy","authors":"Alaa Gohar, F. Shafik, Frank Dürr, K. Rothermel, Amr H. El Mougy","doi":"10.1109/WCNCW.2019.8902683","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902683","url":null,"abstract":"This paper investigates the application of differential privacy to the Smart Grid. Due to the nature of the Smart Grid, data drawn from it can be used to predict individuals behaviours and actions inside their homes which is a huge privacy violation. We show an attack that is able to predict behaviour with up to 94.3% precision. Differential privacy masks the distinguishable features of the Smart Grid data, protecting users privacy and making their behaviour unpredictable. We propose a method which applies differential privacy without splitting the billing, and charges concurrently while keeping the cost unchanged.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Energy Minimization of Delay-Constrained Offloading in Vehicular Edge Computing Networks 车辆边缘计算网络中时延约束卸载的能量最小化
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902537
Tianyu Yang, Yao Zhu, Yulin Hu, R. Mathar
{"title":"Energy Minimization of Delay-Constrained Offloading in Vehicular Edge Computing Networks","authors":"Tianyu Yang, Yao Zhu, Yulin Hu, R. Mathar","doi":"10.1109/WCNCW.2019.8902537","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902537","url":null,"abstract":"In this work, we study the energy efficiency problem in a vehicular edge computing network with delay sensitive tasks. We aim at minimizing the total energy consumption under the given delay constraints by jointly optimizing the offloading decisions and the computational resources. The resulting mixed integer non-convex problem is intractable to solve. To address the problem, it is reformulated into an equivalent tractable form and via relaxation it is transformed into a convex problem. Via simulations, the performance and the offloading behaviour of the proposed design are evaluated under various scenarios with different setups of vehicular density and delay limits.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115167987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Deep Learning Approach to Radio Signal Denoising 无线电信号去噪的深度学习方法
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902756
Ebtesam Almazrouei, G. Gianini, Nawaf I. Almoosa, E. Damiani
{"title":"A Deep Learning Approach to Radio Signal Denoising","authors":"Ebtesam Almazrouei, G. Gianini, Nawaf I. Almoosa, E. Damiani","doi":"10.1109/WCNCW.2019.8902756","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902756","url":null,"abstract":"This paper proposes a Deep Learning approach to radio signal de-noising. This approach is data-driven, thus it allows de-noising signals, corresponding to distinct protocols, without requiring explicit use of expert knowledge, in this way granting higher flexibility. The core component of the Artificial Neural Network architecture used in this work is a Convolutional De-noising AutoEncoder. We report about the performance of the system in spectrogram-based denoising of the protocol preamble across protocols of the IEEE 802.11 family, studied using simulation data. This approach can be used within a machine learning pipeline: the denoised data can be fed to a protocol classifier. A further perspective advantage of using the AutoEncoders in such a pipeline is that they can be co-trained with the downstream classifier (protocol detector), to optimize its accuracy.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116221650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Experimental Performance Evaluation of Improved Energy Detection under Noise Uncertainty in Low SNR Regime 低信噪比噪声不确定性下改进能量检测的实验性能评价
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902613
Bansi Gajera, Dhaval K. Patel, Brijesh Soni, M. López-Benítez
{"title":"Experimental Performance Evaluation of Improved Energy Detection under Noise Uncertainty in Low SNR Regime","authors":"Bansi Gajera, Dhaval K. Patel, Brijesh Soni, M. López-Benítez","doi":"10.1109/WCNCW.2019.8902613","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902613","url":null,"abstract":"Improved energy detection (IED) outperforms classical energy detection (CED) as it takes into consideration the statistics of past samples. However, imperfect knowledge of the noise referred to as noise uncertainty (NU) imposes fundamental limitation on the performance of the sensing scheme. NU is prone to degrade the detection performance particularly in the low signal to noise ratio (SNR) regime. In this paper, the analysis of IED under noise power uncertainty in low SNR regime is carried out validated based on the empirical spectrum data of the radio technologies captured using the experimental setup. Obtained results demonstrate that IED outperforms CED in presence of NU, at the cost of nominal increase in the computational time. A gain of 23.2% in the detection performance is observed while using IED over CED at 1 dB NU, 14.13% at 2 dB NU and 16.67% at 3 dB NU.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114892745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Conspiracy communication reconstitution from distributed instant messages timeline 基于分布式即时消息时间线的阴谋通信重构
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902574
L. Nassif
{"title":"Conspiracy communication reconstitution from distributed instant messages timeline","authors":"L. Nassif","doi":"10.1109/WCNCW.2019.8902574","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902574","url":null,"abstract":"In a cyber attack, several kinds of evidence must be verified to find the responsible. Seizing cell phones became a usual procedure in investigations and digital forensics may be demanded to verify conspiracies about the committed crime. The accelerated growth of cell phones as an indispensable accessory nowadays, followed by a massive adherence to Instant Messaging (IM) applications, has changed the way mankind is interacting virtually. Although IM applications provide several benefits for real-time contact and knowledge sharing, they are also used in private communications for illicit arrangements. When several cell phones are seized in a police operation, many communications using IM may be used as evidence of the committed crime. An investigator spends many hours trying to rearrange this conversation or reading repeated information. This work presents a solution to this problem, retrieving all conversations sequentially from a set of cell phones that participate in the same WhatsApp group. The solution is illustrated with a case study that validates the model and algorithm developed for this purpose. First results pointed to 52% decreasing of investigation effort in some situations.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127217913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Open 5G NFV Platform for Smart City Applications Using Network Softwarization 基于网络软件的开放式5G NFV智慧城市应用平台
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902853
A. P. Silva, Monchai Bunyakitanon, R. Vassallo, R. Nejabati, D. Simeonidou
{"title":"An Open 5G NFV Platform for Smart City Applications Using Network Softwarization","authors":"A. P. Silva, Monchai Bunyakitanon, R. Vassallo, R. Nejabati, D. Simeonidou","doi":"10.1109/WCNCW.2019.8902853","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902853","url":null,"abstract":"Advanced wireless communication network testbeds are now widely being deployed around European and cross-continental. This represents an interesting opportunity for vertical industry and academia to perform experimentation and validation before a real deployment. In this paper, we present 5GinFIRE as a suitably flexible platform towards open 5G (Network Function Virtualization (NFV) ecosystem and playground. On top of this platform, we designed and deployed a smart city safety system as a vertical use case, exploring 5G capabilities through a combination of NFV and machine learning to provide end-to-end communication and low latency smart city service. This safety system helps detecting criminals along the city and sending a notification to the security center. A Virtual Network Function (VNF) has been developed to enable video transcoding, face detection and recognition at the cloud or the edge of the network. The validation of the overall system is performed through the deployment of the use case indoor (Smart Internet Lab) and outdoor (Millennium Square Bristol). We show the VNF specification and present a quantitative analysis in terms of bandwidth, response time, processing time and transmission speed in terms of Quality of Experience (QoE).","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127444461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信