{"title":"Robust Decentralized Joint Precoding using Team Deep Neural Network","authors":"Paul de Kerret, D. Gesbert","doi":"10.1109/ISWCS.2018.8491209","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491209","url":null,"abstract":"Using Deep Neural Networks (DNNs) to tackle socalled Team Decision problems where the nodes aim at maximizing an expected common utility on the basis of different individual observations without any additional communications was recently introduced in a previous work and illustrated in the simple case of decentralized scheduling. In this work11D. Gesbert and P. de Kerret are supported by the European Research Council under the European Union's Horizon 2020 research and innovation program (Agreement no. 670896)., we apply this idea to design a decentralized robust precoding scheme in a Network MIMO configuration, which appears as a more challenging setting due to the continuous decision space and the required fine granularity of the precoding, in particular at high SNR. While the application remains fundamentally decentralized due to the decentralized nature of the channel state information (CSI), the training is done jointly. This is possible thanks to the common knowledge of the statistics (or equivalently the training data set) at all cooperating TXs. The joint training is done directly with respect to the desired figure-of-merit such that there is no need to generate labels using another method, and the precoding scheme obtained from the training does not only replicate a known scheme but is able to outperform state-of-the-art methods, as illustrated by simulations.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123283555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Index Encoding for GPSM Multiuser MIMO Communication","authors":"A. Duarte, J. Cal-Braz, R. Neto","doi":"10.1109/ISWCS.2018.8491046","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491046","url":null,"abstract":"This work focuses on precoded multiuser MIMO systems with index modulated signal vectors. That means that only certain positions in the signal vectors transmitted to the users contain information symbols (Information Bearing Positions- Ibp)and the particular IBP pattern represents part of the information conveyed to each user. Here we describe systems based on two precoders: Zero Forcing (ZF) and Block Diagonalization (BD) and propose procedures to optimize the choice by the base station of the indexes of the information bearing positions in the transmitted signal vectors (IBP encoding) aiming at improving detection performance. Additional requirements for the considered ZF and BD based systems such as receiver notification and channel estimation are addressed. Numerical results illustrate the resulting bit error rate for both precoders, the influence of the system parameters on the system performance and the performance gain obtained with the proposed IBP encoding optimization procedures,","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130774407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Band-Split Parallel Signal Processing DPD for Nonlinear Compensation of Broadband RF Signal","authors":"T. Abe, Y. Yamao","doi":"10.1109/ISWCS.2018.8491244","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491244","url":null,"abstract":"A novel wideband digital predistortion (DPD) technique that can relax the requirement for sampling frequency is proposed. The proposed band-split parallel signal processing DPD can reduce the sampling frequency to the half of normal DPD while compensating all nonlinear terms and achieve the same compensation performance. After presenting the principle of the proposed scheme, the simulation results employing two-component carrier (2CC) LTE-A signal are presented that achieve ACLR of less than −50 dB and EVM of less than 2.5 %. The proposed DPDs with four-band and two-band splitting methods can decrease the sampling frequencies to the half and two thirds of the normal DPD, respectively.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128186188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Navarro, D. Gregoratti, A. Pastore, E. Kosmatos, P. Demestichas, S. Pfletschinger
{"title":"PLNC Decoding: Enabler for Massive MTC in 5G Networks","authors":"M. Navarro, D. Gregoratti, A. Pastore, E. Kosmatos, P. Demestichas, S. Pfletschinger","doi":"10.1109/ISWCS.2018.8491212","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491212","url":null,"abstract":"This paper evaluates the implementation of Medium Access Control (MAC) protocols suitable for massive access connectivity in 5G multi-service networks. The access protocol extends multi-packet detection receivers based on Physical Layer Network Coding (PLNC) decoding and Coded Random Access protocols considering practical aspects to implement one-stage MAC protocols for short packet communications in mMTC services. Extensions to enhance data delivery phase in two-stage protocols are also proposed. The assessment of the access protocols is extended under system level simulations where a suitable link to system interface characterization has been taken into account.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128113272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimum Transmission Rate in Fading Channels with Markovian Sources and QoS Constraints","authors":"Fahad Qasmi, M. Shehab, H. Alves, M. Latva-aho","doi":"10.1109/ISWCS.2018.8491037","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491037","url":null,"abstract":"This paper evaluates the performance of reliability and latency in machine type communication networks, which composed of single transmitter and receiver in the presence of Rayleigh fading channel. The source's traffic arrivals are modeled as Markovian processes namely Discrete-Time Markov process, Fluid Markov process, and Markov Modulated Poisson process, and delay/buffer overflow constraints are imposed. Our approach is based on the reliability and latency outage probability, where transmitter not knowing the channel condition, therefore the transmitter would be transmitting information over the fixed rate. The fixed rate transmission is modeled as a two state Discrete time Markov process, which identifies the reliability level of wireless transmission. Using effective bandwidth and effective capacity theories, we evaluate the trade-off between reliability-latency and identify QoS requirement. The impact of different source traffic originated from MTC devices under QoS constraints on the effective transmission rate are investigated.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125704921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-Interference Cancellation for Full-Duplex in Spatial-Polarized Domain","authors":"Xinyi Wang, Fangfang Liu, Chunyan Feng","doi":"10.1109/ISWCS.2018.8491041","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491041","url":null,"abstract":"Self-interference cancellation is critical in full duplex networks and its mitigation capability is limited mainly due to the phase noise caused by imperfect local oscillators. In this paper, a novel self-interference cancellation scheme in spatial-polarized domain is analyzed for full duplex systems. In spatial-polarized domain, spatially isolated polarized antennas are used to transport signals based on the polarized system and signal models. Then the SI is cancelled by polarization processing with the rebuilt SI signal. Theoretical analysis and simulation show that the proposed scheme can mitigate the effect of phase noise on SI cancellation, and improve data rate comparing with that in polarized domain.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127148389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of a System with Bursty Traffic and Adjustable Transmission Times","authors":"N. Pappas","doi":"10.1109/ISWCS.2018.8491231","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491231","url":null,"abstract":"In this work, we consider the case where a source with bursty traffic can adjust the transmission duration in order to increase the reliability. The source is equipped with a queue in order to store the arriving packets. We model the system with a discrete time Markov Chain, and we characterize the performance in terms of service probability and average delay per packet. The accuracy of the theoretical results is validated through simulations. This work serves as an initial step in order to provide a framework for systems with arbitrary arrivals and variable transmission durations and it can be utilized for the derivation of the delay distribution and the delay violation probability.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127846968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Estimation in V2X Networks with Injection and Packet Drop Attacks","authors":"Arpan Chattopadhyay, U. Mitra, E. Ström","doi":"10.1109/ISWCS.2018.8491221","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491221","url":null,"abstract":"Vehicle-to-anything (V2X) communications are essential for facilitating cooperative intelligent transport system (C- ITS) components such as traffic safety and traffic efficiency applications. Integral to proper functioning of C- ITS systems is sensing and telemetery. To this end, this paper examines how to ensure security in sensing systems for V2X networks. In particular, secure remote estimation of a Gauss-Markov process based on measurements done by a set of vehicles is considered. The measurements are collected by the individual vehicles and are communicated via wireless links to the central fusion center. The system is attacked by malicious or compromised vehicles with the goal of increasing the estimation error. The attack is achieved by two mechanisms: false data injection (FDI) and garbage packet injection. This paper extends a previously proposed adaptive filtering algorithm for tackling FDI to accommodate both FDI and garbage packet injection, by filtering out malicious observations and thus enabling secure estimates. The efficacy of the proposed filter is demonstrated numerically.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117268328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Franciscone L. A. Junior, R. L. Rosa, D. Z. Rodríguez
{"title":"Voice Quality Assessment in Communication Services using Deep Learning","authors":"Franciscone L. A. Junior, R. L. Rosa, D. Z. Rodríguez","doi":"10.1109/ISWCS.2018.8491055","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491055","url":null,"abstract":"IP networks have provided many services, such as telephone communications. However, the Packet Loss Rate (PLR) can occur on IP networks and it can affect the users Quality of Experience (QoE). In this case, it is important to perform the assessment of the speech quality and to implement a methodology to predict speech quality. Thus, this paper presents a nonintrusive speech quality model based on Hybrid Discriminative Restricted Boltzmann Machines (HDRBM), in order to identify speech quality classes. A speech database with different PLRs was built and a quality index was found for each file. The experimental results of the performance assessment showed that the proposed model based on HDRBM overcame the ITU-T recommendation P.563. Subjective tests presented 97.11% of precision using the proposed Speech Quality Classifier performed by the HDRBM approach.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115702788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of Lempel-Ziv Compressed and Encrypted Text: The Statistics of Compression","authors":"Parker Boyce, Willie K. Harrison","doi":"10.1109/ISWCS.2018.8491196","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491196","url":null,"abstract":"Modern secure communication systems typically follow a pattern at the transmitter of first compression encoding followed by encryption, and then additional encoders to mitigate the effects of channel noise, etc. One of the purposes of the compression algorithm is to remove statistical information about the plaintext, so as to render the ciphertext impervious to statistical attacks. It is well known, however, that in practice there is no such thing as a universal compression algorithm; thus, some statistical information about the plaintext tends to survive the compression process. In this paper, we consider Lempel-Ziv Welch compression and analyze its effectiveness in removing statistical information from English plaintext. Specifically, we present several techniques for exploiting the structure of the compression algorithm to launch a successful statistical attack on compressed and encrypted data. All attacks are ciphertext only, and one of them relies on linear programming. Although our attacks indicate that an eavesdropper may require additional ciphertext to carry out a successful attack if compression is used, the specific adaptive nature of the Lempel-Ziv compression technique leaves its own statistics on the message, which can be exploited by an attacker.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115171343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}