{"title":"Optimum Transmission Rate in Fading Channels with Markovian Sources and QoS Constraints","authors":"Fahad Qasmi, M. Shehab, H. Alves, M. Latva-aho","doi":"10.1109/ISWCS.2018.8491037","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491037","url":null,"abstract":"This paper evaluates the performance of reliability and latency in machine type communication networks, which composed of single transmitter and receiver in the presence of Rayleigh fading channel. The source's traffic arrivals are modeled as Markovian processes namely Discrete-Time Markov process, Fluid Markov process, and Markov Modulated Poisson process, and delay/buffer overflow constraints are imposed. Our approach is based on the reliability and latency outage probability, where transmitter not knowing the channel condition, therefore the transmitter would be transmitting information over the fixed rate. The fixed rate transmission is modeled as a two state Discrete time Markov process, which identifies the reliability level of wireless transmission. Using effective bandwidth and effective capacity theories, we evaluate the trade-off between reliability-latency and identify QoS requirement. The impact of different source traffic originated from MTC devices under QoS constraints on the effective transmission rate are investigated.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125704921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Màrius Caus, A. Pastore, M. Navarro, T. Ramírez, C. Mosquera, N. Noels, N. Alagha, A. Pérez-Neira
{"title":"Exploratory Analysis of Superposition Coding and Rate Splitting for Multibeam Satellite Systems","authors":"Màrius Caus, A. Pastore, M. Navarro, T. Ramírez, C. Mosquera, N. Noels, N. Alagha, A. Pérez-Neira","doi":"10.1109/ISWCS.2018.8491094","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491094","url":null,"abstract":"The adoption of aggressive frequency reuse schemes along with interference management techniques has become the leading paradigm in satellite communications to increase the spectral efficiency. In general terms, one cannot rely on precoding techniques in the absence of channel phase information. Nevertheless, the availability of channel magnitude information, makes it possible to explore power-based separation of superimposed signals. In this paper, rate splitting (RS) ideas are exploited, whereby the separation of messages into private and public parts serves to improve the performance of successive cancellation decoding (SCD). Numerical results reveal that in some pertinent system scenarios, the proposed schemes achieve a larger rate region than that of orthogonal schemes that do not exploit the interference and other strategies that either do not allow beam cooperation or do not apply RS.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117002326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficient Beamforming Design Ior Multi-Carrier Multi-user Systems with Nonlinear Amplifiers","authors":"Zijian Wang, L. Vandendorpe","doi":"10.1109/ISWCS.2018.8491083","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491083","url":null,"abstract":"Ahstract- The energy efficiency (EE) maximization problem is studied for the design of beamforming for multi-carrier multiuser systems. Nonlinear amplifier at each antenna as well as per-antenna power constraints at the transmitter are considered. The quality-of-service (QoS) of each user is guaranteed by a minimal transmission rate. Because the power allocation variables and the beamforming vectors are coupled in the original problem, which makes it difficult to handle, we split the problem into two subproblems. The first subproblem, which optimizes the power allocation, can be formulated as a geometric programming (GP) after the term related to power consumption is approximated as a monomial. The second subproblem, which optimizes the beamforming, is formulated as a second-order cone programming (SOCP). Numerical results illustrate the effect of EE maximization on rates and the effect of circuit power and amplifier efficiency on EE.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131283445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Navarro, D. Gregoratti, A. Pastore, E. Kosmatos, P. Demestichas, S. Pfletschinger
{"title":"PLNC Decoding: Enabler for Massive MTC in 5G Networks","authors":"M. Navarro, D. Gregoratti, A. Pastore, E. Kosmatos, P. Demestichas, S. Pfletschinger","doi":"10.1109/ISWCS.2018.8491212","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491212","url":null,"abstract":"This paper evaluates the implementation of Medium Access Control (MAC) protocols suitable for massive access connectivity in 5G multi-service networks. The access protocol extends multi-packet detection receivers based on Physical Layer Network Coding (PLNC) decoding and Coded Random Access protocols considering practical aspects to implement one-stage MAC protocols for short packet communications in mMTC services. Extensions to enhance data delivery phase in two-stage protocols are also proposed. The assessment of the access protocols is extended under system level simulations where a suitable link to system interface characterization has been taken into account.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128113272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Band-Split Parallel Signal Processing DPD for Nonlinear Compensation of Broadband RF Signal","authors":"T. Abe, Y. Yamao","doi":"10.1109/ISWCS.2018.8491244","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491244","url":null,"abstract":"A novel wideband digital predistortion (DPD) technique that can relax the requirement for sampling frequency is proposed. The proposed band-split parallel signal processing DPD can reduce the sampling frequency to the half of normal DPD while compensating all nonlinear terms and achieve the same compensation performance. After presenting the principle of the proposed scheme, the simulation results employing two-component carrier (2CC) LTE-A signal are presented that achieve ACLR of less than −50 dB and EVM of less than 2.5 %. The proposed DPDs with four-band and two-band splitting methods can decrease the sampling frequencies to the half and two thirds of the normal DPD, respectively.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128186188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Puncturing Based on Polarization for Polar Codes in 5G Networks","authors":"Robert M. Oliveira, R. D. Lamare","doi":"10.1109/ISWCS.2018.8491049","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491049","url":null,"abstract":"This paper presents a puncturing technique based on the channel polarization index for the design of rate-compatible polar codes in fifth generation (5G) wireless systems. The proposed strategy consists of two steps: we first generate the codeword message; then reduce the length of the codeword based on the channel polarization index, where channels with the smallest polarization indexes are punctured. We consider the proposed punctured polar codes with successive cancellation (SC) decoder and with Cyclic Redundancy Check (CRC) aided SC list (CA-SCL) decoder. Punctured bits are known to both encoder and decoder. The Polar Spectrum (PS) is then used for performance analysis of the puncturing technique. Simulations for 5G scenarios show that the proposed polar codes perform comparably to Low-Density Parity-Check (LDPC) codes.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131651007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of a System with Bursty Traffic and Adjustable Transmission Times","authors":"N. Pappas","doi":"10.1109/ISWCS.2018.8491231","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491231","url":null,"abstract":"In this work, we consider the case where a source with bursty traffic can adjust the transmission duration in order to increase the reliability. The source is equipped with a queue in order to store the arriving packets. We model the system with a discrete time Markov Chain, and we characterize the performance in terms of service probability and average delay per packet. The accuracy of the theoretical results is validated through simulations. This work serves as an initial step in order to provide a framework for systems with arbitrary arrivals and variable transmission durations and it can be utilized for the derivation of the delay distribution and the delay violation probability.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127846968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Estimation in V2X Networks with Injection and Packet Drop Attacks","authors":"Arpan Chattopadhyay, U. Mitra, E. Ström","doi":"10.1109/ISWCS.2018.8491221","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491221","url":null,"abstract":"Vehicle-to-anything (V2X) communications are essential for facilitating cooperative intelligent transport system (C- ITS) components such as traffic safety and traffic efficiency applications. Integral to proper functioning of C- ITS systems is sensing and telemetery. To this end, this paper examines how to ensure security in sensing systems for V2X networks. In particular, secure remote estimation of a Gauss-Markov process based on measurements done by a set of vehicles is considered. The measurements are collected by the individual vehicles and are communicated via wireless links to the central fusion center. The system is attacked by malicious or compromised vehicles with the goal of increasing the estimation error. The attack is achieved by two mechanisms: false data injection (FDI) and garbage packet injection. This paper extends a previously proposed adaptive filtering algorithm for tackling FDI to accommodate both FDI and garbage packet injection, by filtering out malicious observations and thus enabling secure estimates. The efficacy of the proposed filter is demonstrated numerically.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117268328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Franciscone L. A. Junior, R. L. Rosa, D. Z. Rodríguez
{"title":"Voice Quality Assessment in Communication Services using Deep Learning","authors":"Franciscone L. A. Junior, R. L. Rosa, D. Z. Rodríguez","doi":"10.1109/ISWCS.2018.8491055","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491055","url":null,"abstract":"IP networks have provided many services, such as telephone communications. However, the Packet Loss Rate (PLR) can occur on IP networks and it can affect the users Quality of Experience (QoE). In this case, it is important to perform the assessment of the speech quality and to implement a methodology to predict speech quality. Thus, this paper presents a nonintrusive speech quality model based on Hybrid Discriminative Restricted Boltzmann Machines (HDRBM), in order to identify speech quality classes. A speech database with different PLRs was built and a quality index was found for each file. The experimental results of the performance assessment showed that the proposed model based on HDRBM overcame the ITU-T recommendation P.563. Subjective tests presented 97.11% of precision using the proposed Speech Quality Classifier performed by the HDRBM approach.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115702788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of Lempel-Ziv Compressed and Encrypted Text: The Statistics of Compression","authors":"Parker Boyce, Willie K. Harrison","doi":"10.1109/ISWCS.2018.8491196","DOIUrl":"https://doi.org/10.1109/ISWCS.2018.8491196","url":null,"abstract":"Modern secure communication systems typically follow a pattern at the transmitter of first compression encoding followed by encryption, and then additional encoders to mitigate the effects of channel noise, etc. One of the purposes of the compression algorithm is to remove statistical information about the plaintext, so as to render the ciphertext impervious to statistical attacks. It is well known, however, that in practice there is no such thing as a universal compression algorithm; thus, some statistical information about the plaintext tends to survive the compression process. In this paper, we consider Lempel-Ziv Welch compression and analyze its effectiveness in removing statistical information from English plaintext. Specifically, we present several techniques for exploiting the structure of the compression algorithm to launch a successful statistical attack on compressed and encrypted data. All attacks are ciphertext only, and one of them relies on linear programming. Although our attacks indicate that an eavesdropper may require additional ciphertext to carry out a successful attack if compression is used, the specific adaptive nature of the Lempel-Ziv compression technique leaves its own statistics on the message, which can be exploited by an attacker.","PeriodicalId":272951,"journal":{"name":"2018 15th International Symposium on Wireless Communication Systems (ISWCS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115171343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}