S. C. Tokgoz, Noha Anous, Serhan Yarkan, D. Khalil, K. Qaraqe
{"title":"Performance Improvement of White LED-Based VLC Systems Using Blue and Flattening Filters","authors":"S. C. Tokgoz, Noha Anous, Serhan Yarkan, D. Khalil, K. Qaraqe","doi":"10.1109/COMMNET.2019.8742364","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742364","url":null,"abstract":"This paper proposes a means to maximize the data rate supported by a visible light communication (VLC) system. The investigated VLC system uses phosphor-coated white light emitting diodes (LEDs), which are common in existing illumination systems but are also known to limit the communication system's data rate. In this paper, we propose a remedy to such a limitation by adding a response-flattening filter at the receiver's end to mitigate the effect of the slow yellow phosphor spectral component. An experimental study is conducted to evaluate the validity of the proposed remedy. The resulting performance is compared with an existing remedy that involves adding a blue filter at the receiver. Off-the-shelf commercial filters are used in the experiment. Enhanced bit-error-rates (BERs) and signal-to-noise ratios (SNRs) at high data rates are observed. Specifically, our experimental work demonstrates that BER is enhanced by 40% and 15% for data rates up to 12 Mbps when responseflattenina filter and blue filter are adopted, respectively.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130667407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maggie Shammaa, Hendrik Vogt, A. El-Mahdy, A. Sezgin
{"title":"Adaptive Self-Interference Cancellation for Full Duplex Systems with Auxiliary Receiver","authors":"Maggie Shammaa, Hendrik Vogt, A. El-Mahdy, A. Sezgin","doi":"10.1109/COMMNET.2019.8742358","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742358","url":null,"abstract":"Full-duplex communication promises to double the spectral efficiency over half-duplex communication. The main obstacle in the use of full-duplex in signal transmission is the self-interference. In this paper, we propose a system model where a copy of the transmitted signal is obtained by an auxiliary receiver and afterwards subtracted from the signal at the ordinary receiver in the same User Equipment. This requires the knowledge of the correlation in between the channels of the two receivers. We propose to use a Kalman filter for channel estimation, which is derived to estimate the correlated channels of both receivers in the presence of two types of noise. The first one is the additive Gaussian noise, while the second one is the transceiver noise which results from impurities of the transmitter and receiver components. This scenario allows for a more comprehensive analysis of self-interference cancellation. We utilize the bit error rate of the transmission to study its performance in the cases of perfect channel state information, Kalman filter channel estimation and Least Square Estimation (LSE). It is shown that, the bit error rate when using Kalman filter is lower than when using LSE. The combination of using a Kalman filter as the channel estimator together with an auxiliary receiver also enhances the data rate.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133292811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical Layer Security of an Amplify-and-Forward Energy Harvesting-Based Mixed RF/UOW System","authors":"Elmehdi Illi, Faissal El Bouanani, F. Ayoub","doi":"10.1109/COMMNET.2019.8742387","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742387","url":null,"abstract":"This paper investigates the secrecy outage performance of an energy harvesting-based dual-hop amplify-and-forward (AF) mixed radio-frequency/underwater optical wireless communication (RF/UOWC) system. A single-antenna source node (S) is considered, communicating with one legitimate destination node (D) with the aid of a multi-antenna AF relay (R) device. In this setup, the relay node receives the incoming signal from S via an RF link, which is subject to Nakagami-m fading, then performs maximal-ratio-combining (MRC) followed by a fixed-gain amplification, before transmitting it to the destination via a UOWC link, subject to mixture Exponential-Gamma fading. Assuming the presence of a malicious eavesdropper attempting to intercept the S-$R$ hop, a tight approximate expression for the secrecy outage probability is retrieved. The derived results provide useful insights into the influence of key system parameters on the secrecy outage performance. Our analytical results are corroborated through computer simulations, which verifies their validity.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124362375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modulation Schemes for Visible Light Communications","authors":"Amna Aliaberi, P. Sofotasios, S. Muhaidat","doi":"10.1109/COMMNET.2019.8742376","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742376","url":null,"abstract":"Visible light communication (VLC) is one of the most recent technological breakthroughs in wireless communications and it is expected to contribute significantly on future generations of mobile communications. The fundamental feature of VLC is the use of visible light spectrum to transmit data along with the traditional use for illumination. However, this requires, among others, rather fast modulation schemes of optical light sources with dimming support. In this review, we analyze the most important modulation schemes used in VLC systems and provide useful insights on their characteristics. To this end, we also investigate the data rate capabilities of each scheme along with a detailed evaluation of their pros followed by discussions and suggestions for compensating for the latter. In addition, flickering and dimming solutions based on each modulation scheme are thoroughly discussed, while new modulation techniques, such as the Asymmetric Optical Modulation, are analyzed in context with alternative highly efficient modulations schemes, such as generalized space shift keying.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126761959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"International Conference on Advanced Communication Technologies and Networking (CommNet'19) [Title page]","authors":"","doi":"10.1109/commnet.2019.8742353","DOIUrl":"https://doi.org/10.1109/commnet.2019.8742353","url":null,"abstract":"","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132274583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Sofotasios, Seong Ki Yoo, S. Muhaidat, S. Cotton, F. J. López-Martínez, J. M. Romero-Jerez, K. Mezher, G. Karagiannidis
{"title":"Achievable Fixed Rate Capacity in Emerging Wireless Systems (Invited Paper)","authors":"P. Sofotasios, Seong Ki Yoo, S. Muhaidat, S. Cotton, F. J. López-Martínez, J. M. Romero-Jerez, K. Mezher, G. Karagiannidis","doi":"10.1109/COMMNET.2019.8742381","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742381","url":null,"abstract":"The $F$ composite fading model was recently proposed as an accurate and tractable statistical model for the characterization of the simultaneous occurrence of multipath fading and shadowing conditions encountered in realistic wireless communication scenarios. In the present contribution we capitalize on the distinct properties of this composite model to derive the achievable capacity over $F$ composite fading channels assuming fixed rate quality of service requirements. To this end, novel exact and tractable analytic expressions are derived for both the exact and the truncated channel inversion strategies. This also enables the derivation of additional simplified approximate and asymptotic expressions for these cases, which provide meaningful insights on the effect of fading conditions on the overall system performance. This is particularly useful in the context of numerous emerging wireless applications of interest that exhibit stringent fixed rate requirements such as vehicular communications, body area networks and telemedicine, among others.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134252148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Double-Layer Image Security Scheme with Aggregated Mathematical Sequences","authors":"M. Elkandoz, Wassim Alexan, Hisham H. Hussein","doi":"10.1109/COMMNET.2019.8742370","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742370","url":null,"abstract":"Information security has been a major concern since the evolution of technology. Nowadays, internet users' are increasing and their information is being shared almost every second. Two possible information security techniques are cryptography and steganography. This paper proposes a hybrid use of both of these techniques. As a first security layer, one of the following cryptography techniques is used: AES-128, AES-192, AES-256, Blowfish or a Logistic Map, to encrypt the secret message. The second layer is steganographic, employing a number of complex mathematical sequences that determine the color in which the enciphered bits would be embedded in. Visual representation of the stego and the cover images after embedding is presented and the performance of the proposed scheme is measured in terms of the mean squared error (MSE), peak signal to noise ratio (PSNR), structural similarity index metric (SSIM), image fidelity, embedding capacity, $R$ measurement, and entropy values of the cover and stego images.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127429807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Tahat, T. Edwan, Dana Mbaideen, Nada Murrar, Ola Al-Qutob, Leen Ayman
{"title":"Optimal Decision on Placement of an Auxiliary Aerial Wireless Base Station Using the Artificial Bee Colony Algorithm","authors":"A. Tahat, T. Edwan, Dana Mbaideen, Nada Murrar, Ola Al-Qutob, Leen Ayman","doi":"10.1109/COMMNET.2019.8742386","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742386","url":null,"abstract":"With the continuous growth and dependence on technology, new approaches are introduced to augment a cellular network coverage of users when they are not completely fulfilled by terrestrial base stations in scenarios of disasters, unpredictable surge in service demands, or in case of a malfunction in the terrestrial infrastructure. Solutions for backing the network via an auxiliary Unmanned Aerial Vehicle Base Station (UAV-BS) have been proposed in the literature that will provide additional wireless service resources to the affected area. Although UAVs provide a quick fix and are a great alternative in several cases and scenarios; their effective and efficient placement is considered to be one of the fundamental challenges because the problem is non-convex in general. That is due to the relatively complex procedure in selecting the optimal three dimensional position of the UAV that guarantees the maximum number of covered users, which can reflect in certain scenarios into maximum revenue. To that end, we start by reviewing the properties and formulation of a selection procedure of the three dimensional (3D) position of the UAV, which has the form of a constrained optimization problem. Then, we use the Artificial Bee Colony (ABC) algorithm to find the optimal solution for this 3D placement problem of the UAV-BS. Simulations results verify the validity of our solution approach and that the ABC algorithm delivers a consistent global optimal solution for this optimization problem.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124324108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of a Smart Street Lighting Application Using LoRa Wan","authors":"Yayé Sarr, B. Gueye, Cheikh Sarr","doi":"10.1109/COMMNET.2019.8742356","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742356","url":null,"abstract":"Internet of things has allowed the development of a set of services and applications such as Smart Cities and Smart Homes. This paper proposes a realistic implementation of a large-scale smart Street Lighting Control System which allows solar lampposts to dynamically manage the street lighting. The application is simulated for the district of HLM route de Mbour in Thies, Senegal. It is a fully remote-controlled city of lampposts based on Long Range (LoRa) technology. Lamps are equipped with sensors that sense and send information to a network server for management. Simulation results show a high packet loss rate when only one gateway is deployed due to collisions. We then increase the number of gateways and study the performances of the network. Results show that multiple gateways deployment in large scale LoRa network achieves better packet delivery ratio and lower energy consumption.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129033656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximal Codes for Finite Chain Rings","authors":"M. Sabiri","doi":"10.1109/COMMNET.2019.8742351","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742351","url":null,"abstract":"Coding theory is one of the bases of the information theory, this behind has experienced a spectacular evolution exploiting what has been achieved in the codes by the use of the concept of algebra. So to ensure a good transfer of information, it is better to use good codes by using a few aspects which represents an advantage. In this work, we will talk about the maximal codes on finite rings and exactly we will give the form of these codes for finite chain rings, this notion of maximality allows to show that all codes form classes what can server in decoding.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130914512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}