{"title":"Cross-tier interference mitigation in a cellular system with small moving cells","authors":"Yong-Suk Byun, Hyung-Geon Kim, Yong-Hwan Lee","doi":"10.1109/PACRIM47961.2019.8985077","DOIUrl":"https://doi.org/10.1109/PACRIM47961.2019.8985077","url":null,"abstract":"In this paper, we consider the management of cross-tier interference in a HetNet cellular system employing small moving cells (SMCs). We manage the interference by using statistical channel information taking into consideration of SMC mobility. We represent the cross-tier interference channel in terms of dominant channel space and then determine the beam weight to minimize the effect of interference in the dominant channel space. Finally, the performance of the proposed scheme is verified by computer simulation.","PeriodicalId":152556,"journal":{"name":"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129246453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fixed Polarity Pascal Transforms with Symbolic Computer Algebra Applications","authors":"Kaitlin N. Smith, M. Thornton","doi":"10.1109/PACRIM47961.2019.8985082","DOIUrl":"https://doi.org/10.1109/PACRIM47961.2019.8985082","url":null,"abstract":"The fixed polarity forms of the Reed-Muller (RM) transform exist in 2n different polarities. The integer-valued Pascal transform is related to the binary-valued RM transform through the Sierpinski fractal, calculated by performing the modulo-2 operation on Pascal’s triangle, as it appears in the lower triangular portion of the positive-polarity RM transform. We generalize the relationship between the fixed-polarity forms of the RM transform and introduce associated forms of the Pascal transform that are characterized by a polarity value allowing for a family of fixed-polarity Pascal (FPP) transform matrices to be defined. We observe and prove several properties of the FPP transforms and their inverses. An application of FPP transforms in the area of symbolic computer algebra that enables very fast decomposition of real-valued polynomials as weighted sums of different binomials raised to a power as compared to manual symbolic manipulation is described. The decomposition weights can be considered to be the inverse FPP spectrum with respect to a real-valued polynomial since they are computed using one of the linear orthogonal FPP transformation matrices.","PeriodicalId":152556,"journal":{"name":"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121260971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Yuge, Yuzo Taenaka, Daiki Nobayashi, T. Ikenaga
{"title":"Conceptual experiment of geolocation-aware IoT data dissemination model","authors":"K. Yuge, Yuzo Taenaka, Daiki Nobayashi, T. Ikenaga","doi":"10.1109/PACRIM47961.2019.8985124","DOIUrl":"https://doi.org/10.1109/PACRIM47961.2019.8985124","url":null,"abstract":"IoT devices are increasingly distributed around the world and have been digitizing physical things so far. However, a current IoT service is designed to be independent; it is not intended to conduct data collaboration with other IoT services. It must be important to be able to commonly use IoT data even from IoT devices managed for different services. To promote IoT data collaboration, we proposed a cross-domain data fusion platform on the basis of geographical proximity, called geocentric information platform (GCIP). Although GCIP enabled to collect and process data generated associated with geolocation of data generation, how to disseminate them should be still discussed. We can easily assume that some data summarization is preferable when data are used far away from the location of data generation. We also assume that there must be privacy and security issues in IoT data. That is why we propose a geolocation-aware IoT data dissemination model, which summarizes data due to the different distance between the location of the data source and the location of the destination. That is, as the distance becomes longer, the data is coarser. In this paper, we particularly focus on the behavior of the model and show the conceptual behavior by conducting experiments in a real environment.","PeriodicalId":152556,"journal":{"name":"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127786058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Channel Assignment and Multicast Routing in Multi-Channel Multi-Radio Wireless Mesh Networks Based on Q-Learning","authors":"Amin Erfanian Araqi, B. Mahboobi","doi":"10.1109/PACRIM47961.2019.8985111","DOIUrl":"https://doi.org/10.1109/PACRIM47961.2019.8985111","url":null,"abstract":"Recently, importance of wireless networks increased significantly. Wireless Mesh Networks (WMNs) are receiving growing attention and offer many advantages in terms of connectivity and reliability. Multicast communication is an important technology for wireless networks in which the same content of data should be delivered to a group of receiver nodes simultaneously. So multicast routing provides efficient data distribution among a group of nodes rather than other traditional unicast routing strategies. Here we focus on the Channel Allocation (CA) scheme which efficiently utilizes multiple wireless interfaces to achieve better throughput and improving the radio interference. This kind of problem has been proved to be NP-hard. Hence, solving the multicast channel assignment problem in MCMR WMNs will be more complicated than that of traditional networks. The research in this paper is aimed at improving the network performance for efficient joint channel assignment and multicast routing problem in MCMR WMNs by using the Q-learning scheme. We also implement our proposed channel assignment algorithm, and evaluate and compare its performance with LAMR. Simulations and experimental results demonstrate that QLMR outperforms the previous works in terms of achieved average throughput, average end-to-end delay, average packet delivery ratio and so on. We will evaluate the performance of the proposed scheme.","PeriodicalId":152556,"journal":{"name":"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133722659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Trial Experiment of Deep Learning For Task Scheduling","authors":"Jumpei Kono, M. Kai","doi":"10.1109/PACRIM47961.2019.8985079","DOIUrl":"https://doi.org/10.1109/PACRIM47961.2019.8985079","url":null,"abstract":"Task scheduling is one of the methods to minimize the processing time of a program in parallel processing. However, because task scheduling problems belong to strongly NP-hard combinatorial optimization problems [1], it is hard to find an optimal solution within a practical search time. In this research, we performed an experiment for speeding up the traditional search method based on the branch and bound algorithm by conducting scheduling with the use of deep learning.","PeriodicalId":152556,"journal":{"name":"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131855583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun Gao, Luyun Gan, Fabiola Buschendorf, Liao Zhang, Hua Liu, Peixue Li, Xiaodai Dong, Tao Lu
{"title":"LSTM for SCADA Intrusion Detection","authors":"Jun Gao, Luyun Gan, Fabiola Buschendorf, Liao Zhang, Hua Liu, Peixue Li, Xiaodai Dong, Tao Lu","doi":"10.1109/PACRIM47961.2019.8985116","DOIUrl":"https://doi.org/10.1109/PACRIM47961.2019.8985116","url":null,"abstract":"We present recurrent neural networks (RNN) for supervisory control and data acquisition (SCADA) Intrusion Detection System (IDS). Using long short term memory (LSTM) with many-to-many (MTM) and a novel many-to-one (MTO) architectures, both IDSs display excellent performance in detecting temporal uncorrelated attacks while MTO showing superior performance on temporal correlated attacks.","PeriodicalId":152556,"journal":{"name":"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"4 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133219582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SDN/NFV-based M-CORD for Achieving Scalability in Deploying NB-IoT Gateways","authors":"Do Sinh, Luong-Vy Le, B. Lin, Li-Ping Tung","doi":"10.1109/PACRIM47961.2019.8985066","DOIUrl":"https://doi.org/10.1109/PACRIM47961.2019.8985066","url":null,"abstract":"The deployment of IoT (Internet of Things) gateways opens new challenges for 5G networks to meet the rapid increase in IoT devices, services, and protocols at a high scalability level. To deal with those challenges, recently, NB- Narrow Band IoT (NB-IoT) gateway and M-CORD (Central Office Re-architected as a Datacenter for mobile networks) have been considered as key technologies for developing 5G architectures. In this study, we first propose a comprehensive architecture integrated NB-IoT gateways and M-CORD to meet diversified requirements of 5G and IoT services. Next, Software Defined Network (SDN) and Network Function Virtualization (NFV) are applied to build various virtual network functions (VNFs) on M-CORD Mobile Edges. And then, based on these functions, we perform offloading functions of an NB-IoT gateway to an M-CORD Mobile Edge. After that, a network QoS control application is deployed to perform on demand QoS control for multi-tenancy IoT services with different requirements. Finally, several experiments are implemented on a real NB-IoT gateway and our testbed environment, and the results are also presented.","PeriodicalId":152556,"journal":{"name":"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114278829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fake News Detection on Social Media: A Systematic Survey","authors":"Mohamed K. Elhadad, K. F. Li, F. Gebali","doi":"10.1109/PACRIM47961.2019.8985062","DOIUrl":"https://doi.org/10.1109/PACRIM47961.2019.8985062","url":null,"abstract":"These days there are instabilities in many societies in the world, either because of political, economic, and other societal issues. The advance in mobile technology has enabled social media to play a vital role in organizing activities in favour or against certain parties or countries. Many researchers see the need to develop automated systems that are capable of detecting and tracking fake news on social media. In this paper, we introduce a systematic survey on the process of fake news detection on social media. The types of data and the categories of features used in the detection model, as well as benchmark datasets are discussed.","PeriodicalId":152556,"journal":{"name":"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121931624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting External Interference for Clock Synchronization","authors":"Aidan D. Bush, Nicholas M. Boers, Jakob Bowering","doi":"10.1109/PACRIM47961.2019.8985055","DOIUrl":"https://doi.org/10.1109/PACRIM47961.2019.8985055","url":null,"abstract":"Many wireless sensor network (WSN) applications require the synchronization of the network’s independent node clocks. That synchronization is a challenging problem that often requires energy-constrained devices to exchange many messages.This paper introduces the Interference-based Clock Synchronization (ICS) protocol, an approach suitable for dense WSNs located in urban environments. ICS uses external interference to synchronize the network’s nodes to either a network-local internal or global (e.g., UTC) external time. All of the network’s nodes observe interference at roughly the same time, and the node possessing the common time transmits its observed pattern to the network. The network nodes then compare and align the received and locally-observed patterns, and subsequently, they update their clocks to the common time.The protocol is evaluated using both a simulator and hardware. Using this approach, the number of transmitted messages scales linearly with the network size. In the simulator, ICS-synchronized clocks had a mean time difference of 0.3635 ms when compared with the common time. Using hardware, the difference was larger at 4.9388 ms, but much of that difference can likely be attributed to the experimental setup.","PeriodicalId":152556,"journal":{"name":"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123471870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High Performance Implementation of Nested Array Beamformer for Wideband Radar Applications","authors":"Mohammed Shoukry, F. Gebali, P. Agathoklis","doi":"10.1109/PACRIM47961.2019.8985054","DOIUrl":"https://doi.org/10.1109/PACRIM47961.2019.8985054","url":null,"abstract":"Beamformer is an important part of the wideband radar systems. An approach to achieve the high sampling rate required in such systems is to use efficient hardware implementations. This paper presents a speed optimized systolic arrays for implementation of the wideband beamformer using nested arrays, 2-D filters, and multirate techniques. The implementation structures of the beamformer basic building blocks are designed based on systematic methodology and implemented using the field programmable gate array (FPGA) platform targeting Basys- 3 development board’s Xilinx Artix-7 (XC7A100T) FPGA chip. A single channel of the beamformer was chosen for the implementation to confirm the correct functionality of the FPGA architecture. The implementation performance is tested in terms of effect of errors due to finite word-length arithmetic.","PeriodicalId":152556,"journal":{"name":"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124665921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}