{"title":"Securing full-duplex cognitive relay networks over Nakagami-m fading channels with partial relay selection","authors":"Ziwei Xu, Nam-Phong Nguyen","doi":"10.1109/SIGTELCOM.2018.8325786","DOIUrl":"https://doi.org/10.1109/SIGTELCOM.2018.8325786","url":null,"abstract":"In this paper, the secrecy performance of full-duplex underlay cognitive relay networks over Nakagami-m fading channel is studied. The considered system consists of a primary transmitter, multiple primary receivers, a secondary transmitter, multiple secondary full-duplex relays, a secondary destination node, and an eavesdropper. The eavesdropper attempts to over-hear the confidential information in all transmission hops, i.e., from the secondary transmitter to the relay and from the relay to the secondary destination node. In order to enhance the system's secrecy performance, the partial relay selection scheme is applied at the secondary transmitter with the assumption of its partial knowledge of the network's channel state information. Besides, to protect the primary network from the interference of the secondary network, primary network's quality-of-service based constraints for the secondary network's transmit power are established. The exact closed-form expression for the secrecy outage probability of the considered network is derived. The numerical results based on Monte-Carlo simulation are also provided to confirm the correctness of our analysis.","PeriodicalId":236488,"journal":{"name":"2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130035654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Large-scale MU-MIMO uplink channel estimation using sounding reference signal","authors":"Hai Tran, Tuan-Anh Mai, Son Dang, H. Ngo","doi":"10.1109/SIGTELCOM.2018.8325771","DOIUrl":"https://doi.org/10.1109/SIGTELCOM.2018.8325771","url":null,"abstract":"This paper proposes a practical channel estimation method for the uplink channel of Orthogonal Frequency Division Multiplexing (OFDM) Large-Scale Multi-User (MU) Multiple-Input-Multiple-Output (MIMO) systems by using user specific Sounding Reference Signal. The method is convenient for hardware implementation since it only utilizes Fast Fourier Transform (FFT), Inverse-FFT and multiplication. Given the OFDM parameters of the Long Term Evolution (LTE), this method is able to support the uplink channel estimation of up to 8 users simultaneously under the multipath channel. Additionally, we applied the raised-cosine windows for separating channel impulse responses of each user individually. The raised-cosine window reduces the Bit Error Rate (BER) for a long delay channel such as the ITU Pedestrian B compared with the rectangular windows. Experiments with 16 antennas at Base Station side, 4 users and 256QAM are conducted to validate the proposed channel estimation.","PeriodicalId":236488,"journal":{"name":"2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122979452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data sampling imbalance with steerable wavelets for abnormality detection in brain images","authors":"Dao Nam Anh","doi":"10.1109/SIGTELCOM.2018.8325782","DOIUrl":"https://doi.org/10.1109/SIGTELCOM.2018.8325782","url":null,"abstract":"A long standing goal within artificial intelligence application for medical imaging has been the ability for appropriate detecting abnormalities in MRI image of brains to support early diagnostics of cancer. This paper presents a solution relying on analysis of class imbalance in data sampling from brain image database instead of error statistics to improve accuracy of the abnormality detection. Here we use modification of training data set both for minority class and majority class to overcome under-segmentation and over-segmentation in detection of abnormality where abnormality is seen as minority class but its distribution is assumed unknown. In this approach, steerable wavelet based features are encoded with machine learning methods to allow the study of data sampling imbalance. In order to increase the detection sensitivity a set of wavelet features is selected from a number of feature sets in the learning task. The results with a benchmark medical image database show the effectiveness of the proposed method for abnormality detection in brain images.","PeriodicalId":236488,"journal":{"name":"2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131537714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exact outage probability of two-way decode-and-forward NOMA scheme with digital network coding","authors":"H. T. Phuoc, Pham Ngoc Son, M. Voznák","doi":"10.1109/SIGTELCOM.2018.8325770","DOIUrl":"https://doi.org/10.1109/SIGTELCOM.2018.8325770","url":null,"abstract":"In this paper, we propose a two-way decode and forward non-orthogonal multiple access (NOMA) scheme (called a TWNOMA protocol) in which an inter-mediate relay helps two source nodes to communicate with each other. In the proposed protocol, we implement digital network coding (DNC) to compress received data from these source nodes. We analyze and evaluate the system performance in terms of exact closed-form outage probability over Rayleigh fading channels. Simulation and analysis results discover contributions as follows. Firstly, the outage performance of the proposed protocol TWNOMA is improved when comparing with a conventional two-way scheme using DNC (called a TWDNC protocol), two-way scheme without using DNC (called a TWNDNC protocol) and two-way scheme in amplify-and-forward relay systems (called a TWANC protocol). Finally, the theoretical analyses are validated by performing Monte Carlo simulations.","PeriodicalId":236488,"journal":{"name":"2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127808766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MAC SoC hardware implementation for fast industrial WLAN communication systems","authors":"Pham Hoai Luan, Bui Trung Thien, Lam Duc Khai","doi":"10.1109/SIGTELCOM.2018.8325793","DOIUrl":"https://doi.org/10.1109/SIGTELCOM.2018.8325793","url":null,"abstract":"This paper presents a System on a Chip (SoC) Field-Programmable Gate Array (FPGA) implementation for Media Access Control (MAC) layer of a fast industrial Wireless Local Area Network (iWLAN) protocol, which is used to control industrial robots in factory automation environments. This protocol is a potential technique for industrial wireless communication system by using the Low overhead Packet Division Multiple Access (PDMA) scheme controlled by MAC layer. In our previous research, the MAC layer hardware was implemented and tested on simulation software, but the SoC design for the MAC layer has not been implemented and real tested on the FPGA. In this paper, we have successfully implemented the SoC system for MAC layer of this high-speed wireless communication protocol on the FPGA.","PeriodicalId":236488,"journal":{"name":"2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133271232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. C. Pham, Bach Xuan Hoang, Quang Tri Chiem, L. Tran, Anh-Vu Ho
{"title":"Implementation of a short word length ternary FIR filter in both FPGA and ASIC","authors":"T. C. Pham, Bach Xuan Hoang, Quang Tri Chiem, L. Tran, Anh-Vu Ho","doi":"10.1109/SIGTELCOM.2018.8325803","DOIUrl":"https://doi.org/10.1109/SIGTELCOM.2018.8325803","url":null,"abstract":"Despite the fact that Short Word Length (SWL) technique has been demonstrated to be a new efficient approach for implementing DSP systems, its applications are somehow limited. In this paper, we present the design and implementation of a Sigma-delta modulator based SWL ternary FIR filter. From predefined specifications, the filter was first modelled and simulated in MATLAB then implemented on a commercial FPGA platform and finally synthesized using ASIC method. We created two versions of the design: pipeline and non-pipeline, their performance are compared and discussed going from the operating frequency to the hardware resource usage. Also, to examine the trade-off between hardware efficiency and performance, we also evaluated the design with four different oversampling rates (8, 16, 32, 64).","PeriodicalId":236488,"journal":{"name":"2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom)","volume":"315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123232632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On exploiting wireless sensor networks for enhancing the logistics operation efficiency in the Physical Internet","authors":"Tran Dang Hoa, Dong-Seong Kim","doi":"10.1109/SIGTELCOM.2018.8325797","DOIUrl":"https://doi.org/10.1109/SIGTELCOM.2018.8325797","url":null,"abstract":"The Physical Internet (pi) concept was developed to address the current unsustainability problem of the current logistic systems. One of the key elements in the Physical Internet is pi-containers designed to be world-standardized, smart, green and modular boxes such that they can be handled and transported throughout an open global logistic infrastructure. Logistic processes such as partial loading/unloading or composing/decomposing of pi-containers play an important role for a successful Physical Internet. However, the large variety of these physical transformation processes can introduce desynchronisation between the physical and informational flows of the supply chain management system. To overcome this problem, this paper proposes to integrate wireless sensors into pi-containers and then develop an algorithm for this wireless sensor network to monitor the pi-containers as well as the logistics operation efficiently. The proposed methodology evaluated by simulation processes shows that our proposition can be realized practically in the era of Industrial Internet of Things.","PeriodicalId":236488,"journal":{"name":"2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121598463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An spectrum efficient WO-OFDM using windowing and overlapping on the cyclic prefix and postfix","authors":"Changyoung An, Jungu Lee, H. Ryu","doi":"10.1109/SIGTELCOM.2018.8325790","DOIUrl":"https://doi.org/10.1109/SIGTELCOM.2018.8325790","url":null,"abstract":"In this paper, we like to propose an WO-OFDM (windowing and overlapping — orthogonal frequency division multiplexing) which is an improved version of conventional OFDM system. For the new radio waveform of the 5G and the beyond mobile system, the spectrum efficiency is the most important factor. Especially, OOB (out-of-band) power spectrum must be reduced to increase the spectrum efficiency and to save the frequency resources. Filtering is the one way to get the sharp OOB spectrum. But, due to the very complicated process and some difficulty to the realization of the filtering method, windowing method has been enlightened more. WOLA-OFDM (weighted overlap and add — orthogonal frequency division multiplexing) system is the most representative windowing method. However, the WOLA-OFDM system has some serious problem. The first problem is the time loss because of the copy and extensions in the right and left part in the conventional CP-OFDM (cyclic prefix — orthogonal frequency division multiplexing). There must be the extension in the right and left ends of the CP-OFDM even though there are overlapped in the consecutive symbols. This is the obvious loss problem of the time resource. The second problem is that when the consecutive symbols are overlapped keeping the same CP-OFDM period in order not to lose the time resource, the sharpened OOB spectrum of single WOLA-OFDM symbol cannot exist any longer because of the waveform change due to the overlapping of the consecutives symbols. The last is the data collision, which is very serious problem even before the transmission. Due to the overlap of the 2 extensions of copy and addition processes, the left part of the copied and added parts invades into the right part of the previous OFDM symbol. So, in this paper, to improve the WOLA-OFDM system and to avoid these problems of WOLA-OFDM, we like to propose an WO-OFDM. In this WO-OFDM system there are WO1-OFDM system and WO2-OFDM system, whether the overlapping between the consecutive OFDM symbols is allowed or not. Compared with the conventional WOLA-OFDM system, the proposed WO-OFDM system is an simple and solve the problems. Simulations results show that the proposed WO-OFDM system has comparable OOB spectrum reduction characteristics and can be designed by simple some modification from the conventional OFDM system.","PeriodicalId":236488,"journal":{"name":"2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124123222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sankhadeep Chatterjee, B. Datta, S. Sen, N. Dey, N. Debnath
{"title":"Rainfall prediction using hybrid neural network approach","authors":"Sankhadeep Chatterjee, B. Datta, S. Sen, N. Dey, N. Debnath","doi":"10.1109/SIGTELCOM.2018.8325807","DOIUrl":"https://doi.org/10.1109/SIGTELCOM.2018.8325807","url":null,"abstract":"A novel rainfall prediction method has been proposed. In the present work rainfall prediction in Southern part of West Bengal (India) has been conducted. A two-step method has been employed. Greedy forward selection algorithm is used to reduce the feature set and to find the most promising features for rainfall prediction. First, in the training phase the data is clustered by applying k-means algorithm, then for each cluster a separate Neural Network (NN) is trained. The proposed two step prediction model (Hybrid Neural Network or HNN) has been compared with MLP-FFN classifier in terms of several statistical performance measuring metrics. The data for experimental purpose is collected by Dumdum meteorological station (West Bengal, India) over the period from 1989 to 1995. The experimental results have suggested a reasonable improvement over traditional methods in predicting rainfall. The proposed HNN model outperformed the compared models by achieving 84.26% accuracy without feature selection and 89.54% accuracy with feature selection.","PeriodicalId":236488,"journal":{"name":"2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120998507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giridhar Maji, Sharmistha Mandal, S. Sen, N. Debnath
{"title":"Dual image based LSB steganography","authors":"Giridhar Maji, Sharmistha Mandal, S. Sen, N. Debnath","doi":"10.1109/SIGTELCOM.2018.8325806","DOIUrl":"https://doi.org/10.1109/SIGTELCOM.2018.8325806","url":null,"abstract":"A new steganographic model using dual image has been proposed to increase the obscurity of the secret as well as to make it more secure. It uses two different images namely reference image and cover image along with a secret embed key (stego key). Reference image is divided into blocks with assigned block-codes. Total number of blocks and other embedding parameters (block traversing direction, starting block etc.) are stored in the embed key. Secret message converted to binary and bit pairs are made. Bit pairs of secret message are encoded using the bit pairs of different blocks of reference image and sometimes updating a few LSB bits in the reference image. As an optional capacity enhancement module for text only secret messages dictionary word indexing based encoding is applied. Finally encoded bit stream is embedded into the cover image using any standard LSB technique with its own merits and demerits. LSB changes in the reference image are almost negligible. Embedding key is encrypted using public key of the receiver hence even if someone gets the encoded message it is not possible to get the secret message. As this model can use any existing LSB replacement scheme to embed encoded message into the cover image the state of the art security and other quality features are by default available to it. This is made more secure by using different dictionary word indexing scheme every time based on a random secret key that is appended in the embed key.","PeriodicalId":236488,"journal":{"name":"2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130730030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}