{"title":"Value creation and coopetition in M2M ecosystem — The case of smart city","authors":"A. Ghanbari, Andres Laya, J. Markendahl","doi":"10.1109/PIMRC.2016.7794609","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794609","url":null,"abstract":"Wireless ICT as a subcategory of the ICT industry has long been serving end users as its direct customers. The value for end users, i.e. connectivity as the end product of this industry, has been created in a linear chain where two major group of actors have been cooperating with each other: Telecom Equipment Vendors (TEV) and Mobile Network Operators (MNO). By the demand of other industries for connecting devices/machines in order to enable various services, Machine to Machine (M2M) communications and Internet of Things have emerged as new concepts where Wireless ICT could serve other industries. As a result “connectivity” became an enabler (service) and not the final product. In this paper we argue that linear telecom value chains are incapable of serving this new demand, since wireless ICT requires to co-create value with other industries. This causes the formation of telecom value networks in which traditional telecom actors have to form new (different) business relationships with each other; Cooperation with competitors and Competition with cooperators.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128107613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Thompson sampling approach to channel exploration-exploitation problem in multihop cognitive radio networks","authors":"V. Toldov, L. Clavier, V. Loscrí, N. Mitton","doi":"10.1109/PIMRC.2016.7794785","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794785","url":null,"abstract":"Cognitive radio technology is a promising solution to the exponential growth in bandwidth demand sustained by increasing number of ubiquitous connected devices. The allocated spectrum is opened to the secondary users conditioned on limited interference on the primary owner of the band. A major bottleneck in cognitive radio systems is to find the best available channel quickly from a large accessible set of channels. This work formulates the channel exploration-exploitation dilemma as a multi-arm bandit problem. Existing theoretical solutions to a multi-arm bandit are adapted for cognitive radio and evaluated in an experimental test-bed. It is shown that a Thompson sampling based algorithm efficiently converges to the best channel faster than the existing algorithms and achieves higher asymptotic average throughput. We then propose a multihop extension together with an experimental proof of concept.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shulun Zhao, Zhimin Zeng, Chunyan Feng, Fangfang Liu, Yao Nie
{"title":"An adaptive polarization-QAM modulation scheme for improving the power amplifier energy efficiency in OFDM systems","authors":"Shulun Zhao, Zhimin Zeng, Chunyan Feng, Fangfang Liu, Yao Nie","doi":"10.1109/PIMRC.2016.7794638","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794638","url":null,"abstract":"To improve the energy efficiency of power amplifier in OFDM systems, an adaptive polarization-QAM modulation scheme is proposed considering the data rate requirement variation at the transmitter. Since QAM and polarization modulation have different energy efficiency performance in the linear and nonlinear region of power amplifier respectively, thus the optimal energy efficiency can be obtained by combining the two modulation schemes together and adjusting their modulation order adaptively to fulfill the varying data rate requirement. The power series model of power amplifier is used to analyze the effects of both the in-band distortions and the out-of-band emissions on OFDM signals. Based on above, the proposed scheme can be formulated as an optimization problem regarding the output back off value as well as the modulation order of polarization modulation and QAM. Simulations under the same symbol error rate threshold and data rate requirement show that, the energy efficiency of the proposed scheme is nearly twice as that of the traditional QAM scheme in OFDM systems.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115940400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the performance analysis of binary non-coherent modulations with selection combining in double rice fading channels","authors":"Rym Khedhiri, N. Hajri, N. Youssef","doi":"10.1109/PIMRC.2016.7794644","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794644","url":null,"abstract":"In this paper, we examine the bit error probability (BEP) performance of binary non-coherent modulations over L-branch selective combining (SC) diversity in frequency-flat, slowly-varying double Rice fading channels. The double Rice fading channel is constructed as the product of two independent but not identically distributed Rice processes. In addition, we assume that the double Rice processes affecting the signal received over the L branches of the diversity system are independent and identically distributed. Under these assumptions, and by using the cumulative distribution function (CDF) approach, we derive an expression for the average BEP performance of binary noncoherent frequency-shift keying (FSK) and differential phase-shift keying (DPSK) modulations. The result elaborated is generic in that it includes the propagation environments described by RayleighxRice and double Rayleigh fading models as special cases. The result is in the form of semi-infinite range integrals, that are easy to compute numerically. Additionally, for the special case of dual-branch SC diversity, i.e., L = 2, relatively simplified expressions for the BEP performance are obtained. Moreover, illustrative numerical results are presented together with corresponding simulation quantities to check the validity of the derived analytical quantities, and analyze the impact of the fading parameters on the BEP performance. The results are useful in assessing the performance of amplify-and-forward (AF) dual-hop vehicle-to-vehicle (V2V) communications with line-of-sight (LOS) paths, and where the additive noise in the relay station can be neglected.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134397522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint user scheduling and transmit direction selection in 5G TDD dense small cell networks","authors":"S. Lagén, A. Agustin, J. Vidal","doi":"10.1109/PIMRC.2016.7794817","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794817","url":null,"abstract":"This paper proposes a joint user scheduling and transmit direction selection procedure for dynamic TDD in 5G dense small cell networks, where the transmit direction (i.e. downlink (DL) or uplink (UL)) selected per small cell is dynamically optimized together with the user scheduling at every frame. We focus on the maximization of a general utility function that takes into account the DL/UL traffic asymmetries of each user and the interference conditions in the network. After relaxation of the integer variables that subsume the user scheduling and transmit direction selection, the problem is decomposed and efficiently solved in parallel at every frame. Simulation results show significant gains in DL and UL average rates for different traffic asymmetries, network densities, and user densities as compared to existing schemes for dynamic TDD.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"66 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131640041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Min Li, Lili Liang, Dong Wei, Meng Zhang, Chunwei Miao
{"title":"Modulation recognition of PSK and QAM signals based on envelope spectrum analysis","authors":"Min Li, Lili Liang, Dong Wei, Meng Zhang, Chunwei Miao","doi":"10.1109/PIMRC.2016.7794698","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794698","url":null,"abstract":"Modulation recognition has been an essential part in non-cooperative communications. Without knowing any prior knowledge of the transmitted data, the received signals may be affected by intersymbol interference (ISI), carrier frequency offset, phase offset and timing delay. ISI and these unknown parameters would degrade the performance of many recognition methods. There have been many robust estimators of carrier frequency offset, phase offset and timing delay. However, the robust recognition methods combating ISI have not been well designed. Most blind channel equalization methods, which are designed to overcome the effects of ISI, have poor robustness to noise and carrier frequency offset. In this paper, a robust recognition scheme is proposed to recognize phase-shift keying (PSK) and quadrature amplitude modulation (QAM) signals in non-cooperative communication with ISI environment. The envelope spectrum of PSK and QAM signals are analyzed. Then the recognition scheme based on the ratio of spectral peak to spectral centroid (RSPSC) of envelope spectrum is presented. Such scheme achieves a good recognition performance in the presence of ISI. Spectral centroid is utilized to enhance the robustness to noises. By extracting the envelope spectrum, in addition, the method avoids being affected by carrier frequency offset, phase offset and timing delay. The feasibility of the proposed method has been proved in the respects of theory and simulations.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129391897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Merza Klaghstan, David Coquil, N. Bennani, H. Kosch, L. Brunie
{"title":"BALCON: BAckward loss concealment mechanism for scalable video dissemination in opportunistic networks","authors":"Merza Klaghstan, David Coquil, N. Bennani, H. Kosch, L. Brunie","doi":"10.1109/PIMRC.2016.7794850","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794850","url":null,"abstract":"Opportunistic networks suffer some coarse characteristics as frequent disruptions, high loss ratios and uncertain data delivery. The transmission of video content even worsens the delivery problem because of the large size and continuous nature of the medium. Therefore, loss concealment is inducted as a part of the solution, alongside other delivery enhancement mechanisms. Loss concealment techniques are usually used Forwards, where the source must spend extra processing and transmission volume to enable the receiver to recover lost data parts. These techniques are not only associated with prolonged latencies and video encoding manipulations, but they are also sensitive to the loss pattern, which might leave the receiver in passive suspension if a key part for recovery was missing. In this work, we propose a Backward loss concealment mechanism, which allows the receiver to react to a certain amount of loss. Missing parts of the scalable video stream are compensated by a composite solution that encloses 1) video frame loss error concealment, and 2) network demands, which are initiated and cast in search for missing parts from other nodes in the network. Simulation-driven experiments prove the applicability of the backward mechanism, with a limited capability depending on the target application requirements.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130903596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bartlomiej Siniarski, C. Olariu, Philip Perry, T. Parsons, John Murphy
{"title":"Real-time monitoring of SDN networks using non-invasive cloud-based logging platforms","authors":"Bartlomiej Siniarski, C. Olariu, Philip Perry, T. Parsons, John Murphy","doi":"10.1109/PIMRC.2016.7794973","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794973","url":null,"abstract":"The Software Defined Networking (SDN) paradigm enables quick deployment of software controlled network infrastructures, however new approaches to system monitoring are required to provide network administrators with instant feedback on a network's health. This paper details the deployment of an SDN system architecture featuring the integration of a cloud-based, real-time log-analysis platform. The proposed architecture uses log data collected from host machines, OpenFlow switches and the SDN controllers in a non-invasive style. This work uses a commercially available correlation platform to provide network administrators with a real-time view of the network status and the approach is validated under two scenarios: — network overload and a security attack.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131137145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid channel estimation strategy against pilot spoofing attack in MISO system","authors":"Fengyi Bai, Pinyi Ren, Qinghe Du, Li Sun","doi":"10.1109/PIMRC.2016.7794707","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794707","url":null,"abstract":"Pilot spoofing attack can deteriorate the transmission performance of the legitimate system and facilitate eavesdropping concurrently. Some detection methods of pilot attack have been proposed, while we consider the problem of channel estimation under pilot spoofing attack. In this paper, a hybrid channel estimation strategy using random Binary Phase Shift Keying (BPSK) is proposed. Specifically, a random BPSK sequence is transmitted by the legal user once the attack is detected. In this manner, the base station detects the sequence and re-estimates the legal channel with both contaminated pilot and assistant sequence. We evaluate the estimation performance in three cases according to different responses of the malicious user. Simulation results demonstrate that the proposed strategy can effectively estimate the legitimate channel against pilot attack.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131219174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahdi Haghifam, Behrooz Makki, M. Nasiri-Kenari, T. Svensson
{"title":"On joint energy and information transfer in relay networks with an imperfect power amplifier","authors":"Mahdi Haghifam, Behrooz Makki, M. Nasiri-Kenari, T. Svensson","doi":"10.1109/PIMRC.2016.7794872","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794872","url":null,"abstract":"This paper investigates the outage probability and the throughput of relay networks with joint information and energy transfer where the relay harvests energy from transmitted radio-frequency (RF) signal of the source. Considering different power consumption models, we derive the outage probability of the systems for both adaptive and non-adaptive power allocations at the relay. With a total energy consumption constraint at the source, we provide closed-form expressions for the optimal time sharing and power allocation between the source energy and information transfer signals. The analytical and simulation results demonstrate the efficiency of joint energy and information transfer systems in different conditions.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}