{"title":"Wireless-powered distributed amplify-and-forward relaying with a large number of relays","authors":"Zeping Pang, Z. Fang, Liping Jin, Jiong Shi","doi":"10.1117/12.2287124","DOIUrl":"https://doi.org/10.1117/12.2287124","url":null,"abstract":"This paper considers a wireless-powered amplify-and-forward relay network with a large number of relays. Each relay node is equipped with a single antenna and harvests energy from its received signal with a power splitter. With the harvested power, each relay node forwards the residual received signal to the destination node with distributed beamforming. We investigate the impact of the power splitting ratio and the number of the relays on the system performance, and derive a closed-form expression for the asymptotic signal-to-noise ratio (SNR) when the number of relays goes large. Numerical results are presented to demonstrate the performance of the proposed scheme.","PeriodicalId":415022,"journal":{"name":"International Conference on Wireless and Optical Communications","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117089492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and analysis of coplanar waveguide triple-band antenna based on defected ground structure","authors":"H. Lv, Wanli Chen, X. Xia, Peng Qi, Quanling Sun","doi":"10.1117/12.2287629","DOIUrl":"https://doi.org/10.1117/12.2287629","url":null,"abstract":"A kind of coplanar waveguide triple-band antenna based on defected ground structure is proposed, which has novel structure. Three batches with different frequency band are constructed by utilizing line combination, overlapping, and symmetry method. Stop band signals among three frequency bands are effectively suppressed by slots with different structures. More satisfactory impedance matching is realized by means of changing slot structure and improving return-loss. The presented antenna can operates simultaneously in various systems such as 3G / 4G wireless communication, Bluetooth, Worldwide Interoperability for Microwave Access, Wireless LAN. Test results show that the antenna has good radiation and gain in its working frequency band, and that it has great application potentials.","PeriodicalId":415022,"journal":{"name":"International Conference on Wireless and Optical Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131826281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the performance of cognitive radio networks","authors":"Li Wang, Li Zhang, Shibing Zhang","doi":"10.1117/12.2288283","DOIUrl":"https://doi.org/10.1117/12.2288283","url":null,"abstract":"Throughput, delay and collision probability are all the important performance for cognitive radio networks. This paper proposes a state transition model and analyzes the performances of the cognitive radio networks with spectrum sensing and access operate simultaneously and conventional cognitive radio networks. The closed form expressions of the throughput, delay and collision probability in two sensing modes are derived. It is showed that the cognitive radio networks with spectrum sensing and access operate simultaneously has obvious advantage over the conventional one in the throughput, delay and collision probability. Simulation results verify the theoretical analysis.","PeriodicalId":415022,"journal":{"name":"International Conference on Wireless and Optical Communications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128768465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Locally optimal resource allocation algorithm for dense femtocells","authors":"C. R. Murthy, K. C.","doi":"10.1117/12.2287893","DOIUrl":"https://doi.org/10.1117/12.2287893","url":null,"abstract":"Femtocell is a small low power base station for maximizing the indoor coverage and capacity for cellular users. These base stations can serve users with different access policies. As the Macrocell shares its limited resource - spectrum with the underlying Femtocell, there is a need for efficient resource allocation strategy that benefits all types of users, especially when user density is more and depends on the sub-carrier availability, users‟ quality of service requirements. This paper proposes a resource allocation strategy to model different user requirements in a dense environment. The approach selects locally optimal solution based on the users‟ priority and give fair trade-off between various network parameters without degrading the overall system capacity.","PeriodicalId":415022,"journal":{"name":"International Conference on Wireless and Optical Communications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122989354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Khan, Jie Wang, Muhammad Irfan, M. Shiraz, Ali Khan
{"title":"Design and implementation of Remote Digital Energy Meter (RDEM) based on GSM technology","authors":"M. Khan, Jie Wang, Muhammad Irfan, M. Shiraz, Ali Khan","doi":"10.1117/12.2291408","DOIUrl":"https://doi.org/10.1117/12.2291408","url":null,"abstract":"Electric power is one of the basic requirement for socio economic and social prosperity of any country, which is mainly employs for domestic, industrial and agricultural sectors. The primary purpose of this research is to design and implement an energy meter which can remotely control and monitor through global system for mobile (GSM) communication technology. For this purpose, a single phase or three phase digital energy meters are used to add on different advanced modules. The energy meter can be activated and display power consumption information at the consumer premises on liquid crystal display and through a short message service (SMS) by using GSM technology. At the power sending end, an energy meter can be remotely control and monitor through GSM technology without any system disturbances. This study will lead to make the system easier, economical, reliable and efficient for the electrical department.","PeriodicalId":415022,"journal":{"name":"International Conference on Wireless and Optical Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131934505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lin Cai, Qin Wei, Zhaoxiang Yu, Ming Lu, Xiaowei Li
{"title":"Experimental research on crack detection in pipes based on Fiber Bragg grating","authors":"Lin Cai, Qin Wei, Zhaoxiang Yu, Ming Lu, Xiaowei Li","doi":"10.1117/12.2287712","DOIUrl":"https://doi.org/10.1117/12.2287712","url":null,"abstract":"Crack is one of the primary faults in pipes, and its detection is a significant measure to ensure the safety of pipes. The feasibility of circumferential crack detection in pipes on the basis of fiber Bragg grating (FBG) detection technology is discussed through experimental research. Crack is formed on the surface of a metal pipe, the circumferential length of crack is one index of the damage degree. In the experiments, both electronic vibration sensor and FBG strain sensors are used to collect response signals of impulse excitation in different damage degrees. Furthermore, the characteristics of damage detection are analysed in both frequency domain and time domain. First, the natural frequencies are compared between practical and simulated results in different damage degrees of pipes; second, the multi-fractal detrended fluctuation analysis (MFDFA) is applied to acquire the singular values α as the characteristic parameter. The experimental results indicate that FBG strain sensors can perceive the impulse response of the pipe and change in different damage degrees effectively, like the vibration sensor. And both the natural frequency and the singular value are sensitive to increasing length of crack, they are able to distinguish different degrees of crack on the pipe.","PeriodicalId":415022,"journal":{"name":"International Conference on Wireless and Optical Communications","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128113480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource selection matching algorithm in underlay cognitive radio networks","authors":"Jiangjingxian Chen, Zhipei Zhu, Shibing Zhang","doi":"10.1117/12.2288323","DOIUrl":"https://doi.org/10.1117/12.2288323","url":null,"abstract":"In this paper, the resource allocation in an underlay cognitive radio network is considered, in which the SUs can operate on the same spectrum band with the primary users simultaneously. In order to maximize the total throughput of SUs, an optimal selection matching (OSM) algorithm is proposed to allocate the resource in the underlay cognitive radio network. It makes every SU find the satisfied spectrum resource, and meanwhile the interference from SUs is induced. Simulation results show that the proposed algorithm has the significant improvement in total throughput compared with others.","PeriodicalId":415022,"journal":{"name":"International Conference on Wireless and Optical Communications","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134255532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A range-based predictive localization algorithm for WSID networks","authors":"Yuan Liu, Junjie Chen, Gang Li","doi":"10.1117/12.2288849","DOIUrl":"https://doi.org/10.1117/12.2288849","url":null,"abstract":"Most studies on localization algorithms are conducted on the sensor networks with densely distributed nodes. However, the non-localizable problems are prone to occur in the network with sparsely distributed sensor nodes. To solve this problem, a range-based predictive localization algorithm (RPLA) is proposed in this paper for the wireless sensor networks syncretizing the RFID (WSID) networks. The Gaussian mixture model is established to predict the trajectory of a mobile target. Then, the received signal strength indication is used to reduce the residence area of the target location based on the approximate point-in-triangulation test algorithm. In addition, collaborative localization schemes are introduced to locate the target in the non-localizable situations. Simulation results verify that the RPLA achieves accurate localization for the network with sparsely distributed sensor nodes. The localization accuracy of the RPLA is 48.7% higher than that of the APIT algorithm, 16.8% higher than that of the single Gaussian model-based algorithm and 10.5% higher than that of the Kalman filtering-based algorithm.","PeriodicalId":415022,"journal":{"name":"International Conference on Wireless and Optical Communications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122864256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiband phase-modulated radio over IsOWC link with balanced coherent homodyne detection","authors":"K. Zong, Jiang Zhu","doi":"10.1117/12.2288133","DOIUrl":"https://doi.org/10.1117/12.2288133","url":null,"abstract":"In this paper, we present a multiband phase-modulated radio over intersatellite optical wireless communication (IsOWC) link with balanced coherent homodyne detection. The proposed system can provide high linearity for transparent transport of multiband radio frequency (RF) signals and better receiver sensitivity than intensity modulated with direct detection (IM/DD) system. The exact analytical expression of signal to noise and distortion ratio (SNDR) is derived considering the third-order intermodulation product and amplifier spontaneous emission (ASE) noise. Numerical results of SNDR with various number of subchannels and modulation index are given. Results indicate that the optimal modulation index exists to maximize the SNDR. With the same system parameters, the value of the optimal modulation index will decrease with the increase of number of subchannels.","PeriodicalId":415022,"journal":{"name":"International Conference on Wireless and Optical Communications","volume":"20 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128265846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Filtering methods for broadcast authentication against PKC-based denial of service in WSN: a survey","authors":"Farah Afianti, Iwan Wirawan, T. Suryani","doi":"10.1117/12.2291341","DOIUrl":"https://doi.org/10.1117/12.2291341","url":null,"abstract":"Broadcast authentication is used to determine legitimate packet from authorized user. The received packet can be forwarded or used for the further purpose. The use of digital signature is one of the compromising methods but it is followed by high complexity especially in the verification process. That phenomenon is used by the adversary to force the user to verify a lot of false packet data. Kind of Denial of Service (DoS) which attacks the main signature can be mitigated by using pre-authentication methods as the first layer to filter false packet data. The objective of the filter is not replacing the main signature but as an addition to actual verification in the sensor node. This paper contributes in comparing the cost of computation, storage, and communication among several filters. The result shows Pre- Authenticator and Dos Attack-Resistant scheme have the lower overhead than the others. Thus followed by needing powerful sender. Moreover, the key chain is promising methods because of efficiency and effectiveness.","PeriodicalId":415022,"journal":{"name":"International Conference on Wireless and Optical Communications","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134345266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}