{"title":"Robust distributed two-way relay beamforming in cognitive radio networks","authors":"P. Ubaidulla, S. Aïssa","doi":"10.1109/ICTEL.2012.6221248","DOIUrl":"https://doi.org/10.1109/ICTEL.2012.6221248","url":null,"abstract":"In this paper, we present distributed beamformer designs for a cognitive radio network (CRN) consisting of a pair of cognitive (or secondary) transceiver nodes communicating with each other through a set of secondary non-regenerative two-way relays. The secondary network shares the spectrum with a licensed primary user (PU), and operates under a constraint on the maximum interference to the PU, in addition to its own resource and quality of service (QoS) constraints. We propose beamformer designs assuming that the available channel state information (CSI) is imperfect, which reflects realistic scenarios. The performance of proposed designs is robust to the CSI errors. Such robustness is critical in CRNs given the difficulty in acquiring perfect CSI due to loose cooperation between the PUs and the secondary users (SUs), and the need for strict enforcement of PU interference limit. We consider a mean-square error (MSE)-constrained beamformer that minimizes the total relay transmit power and an MSE-balancing beamformer with a constraint on the total relay transmit power. We show that the proposed designs can be reformulated as convex optimization problems that can be solved efficiently. Through numerical simulations, we illustrate the improved performance of the proposed robust designs compared to non-robust designs.","PeriodicalId":413534,"journal":{"name":"2012 19th International Conference on Telecommunications (ICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124429347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Bit Interleaved Coded Modulation module for DVB-NGH: Enhanced features for mobile reception","authors":"C. Douillard, C. A. Nour","doi":"10.1109/ICTEL.2012.6221327","DOIUrl":"https://doi.org/10.1109/ICTEL.2012.6221327","url":null,"abstract":"This paper describes the main features of the DVB-NGH Bit-Interleaved Coded Modulation (BICM) module. This latter is derived from a sub-set of DVB-T2 BICM components with additional features intended to first lower receiver complexity and power consumption and then to increase receiver robustness over mobile reception. Therefore, the long code block size was removed, a different range of coding rates was chosen, non-uniform constellations were adopted in order to provide shaping gain, and the principle of signal space diversity was extended to four-dimensional rotated constellations. Moreover the structure of the time interleaver offers the possibility to significantly increase the interleaving depth, a feature required for mobility over terrestrial and satellite links.","PeriodicalId":413534,"journal":{"name":"2012 19th International Conference on Telecommunications (ICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126342664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mostafa Dikmak, Zahraa Sabra, A. Kayssi, A. Chehab
{"title":"Optimized conditional privacy preservation in VANETs","authors":"Mostafa Dikmak, Zahraa Sabra, A. Kayssi, A. Chehab","doi":"10.1109/ICTEL.2012.6221234","DOIUrl":"https://doi.org/10.1109/ICTEL.2012.6221234","url":null,"abstract":"In this paper, we present an optimized conditional privacy preservation model for vehicle ad-hoc networks (VANETs). This model includes an ID-based cryptosystem to assure users' anonymity using pseudonyms; however the model provides a backdoor for law enforcement authorities to trace misbehaving and suspicious users. In this model, we propose a heuristic that optimizes the pseudonym update process. This heuristic permits vehicles to switch pseudonyms at different times and locations in a way that maximizes the anonymity degree.","PeriodicalId":413534,"journal":{"name":"2012 19th International Conference on Telecommunications (ICT)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133689973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secondary link adaptation in cognitive radio networks: End-to-end performance with cross-layer design","authors":"Hao Ma, Yuli Yang, S. Aïssa","doi":"10.1109/ICTEL.2012.6221251","DOIUrl":"https://doi.org/10.1109/ICTEL.2012.6221251","url":null,"abstract":"Under spectrum-sharing constraints, we consider the secondary link exploiting cross-layer combining of adaptive modulation and coding (AMC) at the physical layer with truncated automatic repeat request (T-ARQ) at the data link layer in cognitive radio networks. Both, basic AMC and aggressive AMC, are adopted to optimize the overall average spectral efficiency, subject to the interference constraints imposed by the primary user of the shared spectrum band and a target packet loss rate. We achieve the optimal boundary points in closed form to choose the AMC transmission modes by taking into account the channel state information from the secondary transmitter to both the primary receiver and the secondary receiver. Moreover, numerical results substantiate that, without any cost in the transmitter/receiver design nor the end-to-end delay, the scheme with aggressive AMC outperforms that with conventional AMC. The main reason is that, with aggressive AMC, different transmission modes utilized in the initial packet transmission and the following retransmissions match the time-varying channel conditions better than the basic pattern.","PeriodicalId":413534,"journal":{"name":"2012 19th International Conference on Telecommunications (ICT)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115664822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The capacity of average power constrained additive non-Gaussian noise channels","authors":"J. Fahs, Nizar Ajeeb, I. Abou-Faycal","doi":"10.1109/ICTEL.2012.6221320","DOIUrl":"https://doi.org/10.1109/ICTEL.2012.6221320","url":null,"abstract":"It is well known that a Gaussian input achieves the capacity of the linear additive white Gaussian noise channel under the average power constraint. While the continuity of an optimal input of a continuous channel might be expected, the Gaussian noise presents the only such scenario. In fact, we study in this paper the capacity-achieving inputs for the linear additive noise channel where the noise is not necessarily Gaussian. We impose an average power constraint on the input and prove that, except for a Gaussian channel, the optimal input is of a discrete nature.","PeriodicalId":413534,"journal":{"name":"2012 19th International Conference on Telecommunications (ICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124129943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maya Kallas, C. Francis, P. Honeine, H. Amoud, C. Richard
{"title":"Modeling electrocardiogram using Yule-Walker equations and kernel machines","authors":"Maya Kallas, C. Francis, P. Honeine, H. Amoud, C. Richard","doi":"10.1109/ICTEL.2012.6221217","DOIUrl":"https://doi.org/10.1109/ICTEL.2012.6221217","url":null,"abstract":"One may monitor the heart normal activity by analyzing the electrocardiogram. We propose in this paper to combine the principle of kernel machines, that maps data into a high dimensional feature space, with the autoregressive (AR) technique defined using the Yule-Walker equations, which predicts future samples using a combination of some previous samples. A pre-image technique is applied in order to get back to the original space in order to interpret the predicted sample. The relevance of the proposed method is illustrated on real electrocardiogram from the MIT benchmark.","PeriodicalId":413534,"journal":{"name":"2012 19th International Conference on Telecommunications (ICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114763765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A privacy-preserving cache management system for MANETs","authors":"Kassem Fawaz, Noor Abbani, H. Artail","doi":"10.1109/ICTEL.2012.6221309","DOIUrl":"https://doi.org/10.1109/ICTEL.2012.6221309","url":null,"abstract":"Mobile Ad hoc Networks (MANETs) have become increasingly popular with the rapid emergence of hand-held devices and advanced communication technologies. As a result, several MANET applications have been proposed one of which is the data access application. To enhance the performance of this application cache management systems have been suggested; however, they have been designed regardless of the privacy concerns they raise. We study the cache management system COACS (a COoperative and Adaptive Caching System for MANETs) and its weaknesses in terms of privacy to propose a privacy-preserving protocol to render such a caching system well protected against all kind of internal or external privacy breaches. We also provide a mathematical analysis to measure the system's degree of anonymity.","PeriodicalId":413534,"journal":{"name":"2012 19th International Conference on Telecommunications (ICT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126102610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Ali, Mohamad Jomaa, Bashar Romanous, Mageda Sharafeddine, M. Saghir, Haitham Akkary, H. Artail, M. Awad, Hazem M. Hajj
{"title":"An operating system for a Reconfigurable Active SSD processing node","authors":"Ali Ali, Mohamad Jomaa, Bashar Romanous, Mageda Sharafeddine, M. Saghir, Haitham Akkary, H. Artail, M. Awad, Hazem M. Hajj","doi":"10.1109/ICTEL.2012.6221296","DOIUrl":"https://doi.org/10.1109/ICTEL.2012.6221296","url":null,"abstract":"We have recently proposed a Distributed Reconfigurable Active SSD computation platform (RASSD) for processing data-intensive applications at the storage node itself, without having to move data over slow networks. In this paper, we present the design of an operating system (OS) for the RASSD node. RASSD OS is a multitasking real-time operating system that runs on the 32-bit MicroBlaze® soft processor core available for Xilinx® FPGA's. We discuss in this paper our OS design features which include initializing the node and configuring the different components of the RASSD node, monitoring the node's activities, and processing middleware requests. RASSD OS provides a set of services to the middleware through which it hides the low-level details of the node's hardware architecture. We describe the functions essential for the data-intensive processing within the RASSD node using examples that capture the common states of the node and various possible requests.","PeriodicalId":413534,"journal":{"name":"2012 19th International Conference on Telecommunications (ICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128446496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-binary LDPC Coded Orthogonal Modulation with Non-coherent Detection","authors":"Haiyang Hu, Yukui Pei, Jiaqi Zhang, N. Ge","doi":"10.1109/ICTEL.2012.6221216","DOIUrl":"https://doi.org/10.1109/ICTEL.2012.6221216","url":null,"abstract":"A symbol-level iterative decoding scheme of non-binary LDPC coded orthogonal modulation with non-coherent demodulation is presented. Compared to the conventionally used bit interleaved coded modulation with iterative decoding (BICM-ID), the proposed scheme directly combine LDPC codes over GF(q) (q>;2) with M-ary orthogonal modulation together. The soft input and soft output demodulation with non-coherent detection is discussed to obtain the symbol level soft decision information to initialized the iterative decoding process of non-binary LDPC codes. Simulation-oriented method is employed to find optimal LDPC codes of a certain kind. Results indicate our proposed scheme owns a better performance than BICM-ID and lower computational complexity to achieve a soft input and soft output demodulation.","PeriodicalId":413534,"journal":{"name":"2012 19th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128289826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A surrounding-adaptive QoE adjustment approach for optimization of capacity and quality of air interface","authors":"Bingjun Han, Xin Zhang, Yifei Qi, Yuehong Gao, Yitong Liu, Dacheng Yang","doi":"10.1109/ICTEL.2012.6221310","DOIUrl":"https://doi.org/10.1109/ICTEL.2012.6221310","url":null,"abstract":"Recently, the evaluation on quality of the air interface in a wireless network has shifted from emphasis on QoS (quality of service) only to incorporation of QoE (quality of experience). However, it seems that QoE metrics have not been related to the surroundings of the served users so far, which may have a great influence on users' expected QoE. For instance, with a high level of QoS, a user's expectation of QoE could still be terrible because of the serious interference from the surroundings such as noise, ambient light or shaking of terminals due to mobility. From another perspective, it means that in such a case a high level of QoS may be helpless to enhance users' QoE and the requirement could be relaxed accordingly. In this paper, an approach called surrounding-adaptive QoE adjustment (SAQA) is proposed to optimize the capacity and the quality of air interface with voice service as an example. The basic idea of the approach is that user equipment (UE) detects the surroundings interference which may impact users' QoE and then adjusts QoS according to the detected results: a lower level of QoS is chosen in a bad environment to enhance the capacity, while a higher level of QoS is selected to guarantee the users' QoE in a better circumstance. Simulation results show that this method can remarkably enhance the voice capacity of the communication systems as well as guarantee users' QoE.","PeriodicalId":413534,"journal":{"name":"2012 19th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129629221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}