{"title":"Efficient small cell discovery mechanism exploiting network synchronization and assistance for future radio access networks","authors":"H. Harada, Satoshi Nagata, Y. Kishiyama, H. Ishii","doi":"10.1109/ISWCS.2014.6933439","DOIUrl":"https://doi.org/10.1109/ISWCS.2014.6933439","url":null,"abstract":"In this paper, we propose an efficient small cell discovery mechanism that addresses two problems: the increases in the UE effort and corresponding battery consumption for inter-frequency small cell discovery due to an increase in the number of frequency carriers to be measured, and the severe interference among synchronization signals (SSs) and reference signals (RSs) transmitted by clustered small cells. The proposed mechanism utilizes synchronized transmission of discovery signals (DS) for the discovery of small cells. In addition, the network informs connected UEs about the transmission timing and configuration information of DSs. Therefore, the proposed mechanism based on network synchronization and assistance can achieve fast and efficient discovery of multiple small cells, if an appropriate DS is applied. To solve the interference among synchronized DSs, the DS design based on existing SS and RS with orthogonal resource configuration is also proposed. Simulation results show that the proposed mechanism with an appropriate DS design can ensure accurate discovery of multiple small cells within a short measurement time.","PeriodicalId":431852,"journal":{"name":"2014 11th International Symposium on Wireless Communications Systems (ISWCS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121475033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Clemente, A. Domenico, S. Bories, C. Delaveaud, D. Kténas
{"title":"Super directive antennas for low electromagnetic field mobile communications","authors":"A. Clemente, A. Domenico, S. Bories, C. Delaveaud, D. Kténas","doi":"10.1109/ISWCS.2014.6933372","DOIUrl":"https://doi.org/10.1109/ISWCS.2014.6933372","url":null,"abstract":"This paper investigates electromagnetic field (EMF) exposure in heterogeneous cellular networks, where clusters of small cells are deployed to create local hotspots inside the macro cell. In the past, most of the research has focused on mitigating inter-cell interference and reducing the network energy consumption. However, the expected dense deployment of small cells might increase the public concern on EMF, and urge novel management techniques and hardware solutions to mitigate the EMF exposure while satisfying the requirements of quality of service. Hence, we propose to integrate small cells equipped with directive antenna to reduce the required uplink power transmission at end users to limit the associated EMF exposure. We discuss the technical challenges and highlight the design options of this approach, and we present the FP7 LEXNET methodology to evaluate the daily exposure at mobile users. Finally, a preliminary performance evaluation quantifies the benefits of our solution.","PeriodicalId":431852,"journal":{"name":"2014 11th International Symposium on Wireless Communications Systems (ISWCS)","volume":"194 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122854084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource allocation for secret key agreement by LLR thresholding over parallel channels","authors":"A. Dall'Arche, S. Tomasin","doi":"10.1109/ISWCS.2014.6933491","DOIUrl":"https://doi.org/10.1109/ISWCS.2014.6933491","url":null,"abstract":"We consider a channel-model based secret key agreement (SKA) over parallel channels, where Alice transmits a random sequence of bits, and Bob selects those having an absolute value of log-likelihood ratio (LLR) larger than a given threshold. Distillation and reconciliation processes follow, independently on each channel. Assuming a total transmit power constraint, we aim at choosing both the LLR threshold and the transmit power on each channel, in order to maximize the secret key throughput (SKT), under a full channel state information of both legitimate and eavesdropper channels. A two-step solution is considered. First the LLR threshold is determined on a per-channel basis for a given power allocation by numerical methods. Then we fit the SKT as a function of the transmit power by an exponential function and the power allocation problem is solved in closed form. Extensive simulation results show accuracy of the fitting function and the importance of the optimization, also for practical reconciliation processes.","PeriodicalId":431852,"journal":{"name":"2014 11th International Symposium on Wireless Communications Systems (ISWCS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128292976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An experimental system for SON verification","authors":"T. Tsvetkov, H. Sanneck, G. Carle","doi":"10.1109/ISWCS.2014.6933374","DOIUrl":"https://doi.org/10.1109/ISWCS.2014.6933374","url":null,"abstract":"In a mobile Self-Organizing Network (SON) the usage of a SON coordinator is necessary to preclude the execution of conflicting SON function instances. Typically, such a coordinator is accountable for conflict prevention and resolution and does not take into consideration that the activity of function instances may induce an undesired network behavior. In this paper, we propose an experimental system for the verification of Configuration Management (CM) changes induced by the activity of SON function instances. The main part of this system is the SON verification function which is triggered when CM change requests get acknowledged by the SON coordinator. It analyses the resulting Performance Management (PM) data and in case it detects an undesired network behavior it sends a request to the coordinator to undo the responsible changes.","PeriodicalId":431852,"journal":{"name":"2014 11th International Symposium on Wireless Communications Systems (ISWCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121563355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discrete-event simulation of coordinated multi-point joint transmission in LTE-Advanced with constrained backhaul","authors":"M. Artuso, H. Christiansen","doi":"10.1109/ISWCS.2014.6933329","DOIUrl":"https://doi.org/10.1109/ISWCS.2014.6933329","url":null,"abstract":"Inter-cell interference in LTE-Advanced can be mitigated using coordinated multi-point (CoMP) techniques with joint transmission of user data. However, this requires tight coordination of the eNodeBs, using the X2 interface. In this paper we use discrete-event simulation to evaluate the latency requirements for the X2 interface and investigate the consequences of a constrained backhaul. Our simulation results show a gain of the system throughput of up to 120% compared to the case without CoMP for low-latency backhaul. With X2 latencies above 5 ms CoMP is no longer a benefit to the network.","PeriodicalId":431852,"journal":{"name":"2014 11th International Symposium on Wireless Communications Systems (ISWCS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127080280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient decentralized dynamic spectrum learning and access policy for multi-standard multi-user cognitive radio networks","authors":"S. Darak, Honggang Zhang, J. Palicot, C. Moy","doi":"10.1109/ISWCS.2014.6933360","DOIUrl":"https://doi.org/10.1109/ISWCS.2014.6933360","url":null,"abstract":"In this paper, the problem of an efficient decentralized dynamic spectrum leaning and access (DSLA) for multi-standard multi-user cognitive radio networks (CRNs) is considered. Existing Multi-armed Bandit based decentralized DSLA policies allocate M secondary users to the M orthogonal optimum subbands without any explicit information exchanges or prior agreements among them and have shown to outperform conventional random selection based policies. However, total subband switching cost (SWC) of existing DSLA policies is very high. Also, it is assumed that the desired vacant bandwidth of all secondary users are fixed and equal to the smallest primary channel bandwidth. This assumption is not valid in multistandard CRNs such as 5G where the desired vacant bandwidth of each secondary user needs to be tunable depending on the availability of vacant subbands as well as underlining services such as voice, video, data, Internet etc and hence, a generalized decentralized tunable DSLA policy is desired. The proposed tunable DSLA policy improves the performance as well as SWC by allocating M secondary users to the larger subset of orthogonal optimum subbands, the size of which is tunable compared to a fixed subset size of M in existing DSLA policies. Also, when the desired vacant bandwidth is wider than the smallest primary channel bandwidth, a new approach to quickly and accurately identify the subset of orthogonal optimum subbands is presented. The detailed simulation results validate the superiority of the proposed policy over existing policies.","PeriodicalId":431852,"journal":{"name":"2014 11th International Symposium on Wireless Communications Systems (ISWCS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128085810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complexity-reduced optimal power allocation in passive distributed radar systems","authors":"Omid Taghizadeh, G. Alirezaei, R. Mathar","doi":"10.1109/ISWCS.2014.6933410","DOIUrl":"https://doi.org/10.1109/ISWCS.2014.6933410","url":null,"abstract":"In this paper, we provide an alternative derivation of the optimal power allocation for distributed passive radar systems in closed-form. Our approach provides new insights to the nature of the power allocation problem and extracts some optimality conditions which are in turn used to achieve a new algorithm with reduced complexity for a reliable sensor selection. Finally, we show the computational complexity and the run-time of the proposed algorithm against the previously available one by analytic and simulative comparisons.","PeriodicalId":431852,"journal":{"name":"2014 11th International Symposium on Wireless Communications Systems (ISWCS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125506342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative study of in-sensor processing vs. raw data transmission using ZigBee, BLE and Wi-Fi for data intensive monitoring applications","authors":"K. Shahzad, B. Oelmann","doi":"10.1109/ISWCS.2014.6933409","DOIUrl":"https://doi.org/10.1109/ISWCS.2014.6933409","url":null,"abstract":"Wireless sensor nodes, as typically realized using IEEE 802.15.4 compatible low-power radio transceivers that offer limited throughput, are generally applicable to low-data rate intermittent monitoring applications. In order to realize high sample rate monitoring applications, it requires either transmitting raw data using a high-throughput radio transceiver or performing computation within the sensor node and then transmitting a small amount of information. In relation to a energy constrained wireless sensing node, a quantitative evaluation of raw data transmission using different short range wireless technologies and in-sensor processing is conducted in this paper. The results, associated with the energy consumption of two data intensive monitoring applications, suggest that in-sensor processing resulting in a small amount of data to be transmitted consumes less energy as compared to that of raw data transmission, even under ideal channel conditions.","PeriodicalId":431852,"journal":{"name":"2014 11th International Symposium on Wireless Communications Systems (ISWCS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127811842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alfonso Martinez, J. Scarlett, M. Dalai, A. G. Fàbregas
{"title":"A complex-integration approach to the saddlepoint approximation for random-coding bounds","authors":"Alfonso Martinez, J. Scarlett, M. Dalai, A. G. Fàbregas","doi":"10.1109/ISWCS.2014.6933428","DOIUrl":"https://doi.org/10.1109/ISWCS.2014.6933428","url":null,"abstract":"This paper derives a saddlepoint approximation for the random-coding bound to the error probability of channel coding by using complex-integration techniques. The approximation is given by a sum of two terms: one with Gallager's exponent, and a second one with Arimoto's strong converse exponent (above capacity) or the sphere-packing exponent (below the critical rate).","PeriodicalId":431852,"journal":{"name":"2014 11th International Symposium on Wireless Communications Systems (ISWCS)","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133175895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alejandro Moraleda-Soler, B. Coll-Perales, J. Gozálvez
{"title":"Link-aware opportunistic D2D communications: Open source test-bed and experimental insights into their energy, capacity and QoS benefits","authors":"Alejandro Moraleda-Soler, B. Coll-Perales, J. Gozálvez","doi":"10.1109/ISWCS.2014.6933425","DOIUrl":"https://doi.org/10.1109/ISWCS.2014.6933425","url":null,"abstract":"Device-to-Device (D2D) communications can efficiently support the growth in mobile data traffic by offloading part of the traffic from the cellular infrastructure. D2D communications are influenced by the propagation conditions between mobile devices that depend on the antenna heights, presence of obstacles, and mobility of devices. Analytical and simulation studies have shown that link-aware opportunistic transmission schemes can improve the reliability and efficiency of D2D communications. This paper goes a step further and experimentally demonstrates the energy, capacity and Quality of Service (QoS) benefits of link-aware opportunistic D2D communications. This is done through a novel test-bed that is here presented and released open source to the community. The developed test-bed modifies the Linux kernel so that it is independent of the particular hardware being used and can be utilized with Commercial Off-The-Shelf (COTS) equipment.","PeriodicalId":431852,"journal":{"name":"2014 11th International Symposium on Wireless Communications Systems (ISWCS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131820906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}