Brahim Bakkas, Hassan Silkhi, Idriss Chana, H. Ben-Azza
{"title":"Enhancing PAPR in OFDM System Using Polar Codes and μ-Law Companding with Adaptive Modulation and Coding Rates","authors":"Brahim Bakkas, Hassan Silkhi, Idriss Chana, H. Ben-Azza","doi":"10.1109/CommNet60167.2023.10365278","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365278","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is a widely used modulation technique, but it has a high Peak-to-Average Power Ratio (PAPR), which can cause problems for power amplifiers. To address this challenge, a new algorithm is proposed that incorporates Polar codes and μ-law companding. The algorithm is shown to significantly reduce PAPR and Bit Error Rate (BER) with Quadrature Amplitude Modulation (QAM) and two coding rates, 1/2 and 5/6. The proposed method is also flexible and adaptive, allowing for changes in modulation schemes, coding rates, and μ-law values. Further research will explore the use of an Auto Encoder (AE) network system to optimize these parameters.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"68 2","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum codes over Fq from α+βu+γv+δuv+ηu2+θv2+λu2v+μuv2+νu2v2- constacyclic codes","authors":"M. Sabiri, Bassou Aouijil","doi":"10.1109/CommNet60167.2023.10365257","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365257","url":null,"abstract":"The goal of this work is the construction of quantum codes over $mathbb{F}_{q}$ by using $alpha+beta u+gamma v+delta u v+eta u^{2}+theta v^{2}+lambda u^{2} v+$ $mu u v^{2}+nu u^{2} v^{2}$-constacyclic codes over the ring $R=mathbb{F}_{q}+mathbb{F}_{q} u+$ $mathbb{F}_{q} v+mathbb{F}_{q} u v+mathbb{F}_{q} u^{2}+mathbb{F}_{q} v^{2}+mathbb{F}_{q} u^{2} v+mathbb{F}_{q} u v^{2}+mathbb{F}_{q} u^{2} v^{2}$. We give the structure of $alpha+beta u+gamma v+delta u v+eta u^{2}+theta v^{2}+lambda u^{2} v+mu u v^{2}+nu u^{2} v^{2}$. constacyclic and obtain self-orthogonal codes. We decompose a constacyclic code over $mathbb{F}_{q}+mathbb{F}_{q} u+mathbb{F}_{q} v+mathbb{F}_{q} u v+mathbb{F}_{q} u^{2}+mathbb{F}_{q} v^{2}+$ $mathbb{F}_{q} u^{2} v+mathbb{F}_{q} u v^{2}+mathbb{F}_{q} u^{2} v^{2}$ into constacyclic codes over $mathbb{F}_{q}$. This decomposition makes it possible to give the parameters of the corresponding quantum code.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"38 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Routing Protocol for IoT Sensors Utilizing Clustering Techniques and Optimization Methods","authors":"Khalid A. Darabkh, Muna Al-Akhras","doi":"10.1109/CommNet60167.2023.10365309","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365309","url":null,"abstract":"In the realm of the Internet of Things (IoT), there is a growing urgency to enhance network longevity and minimize energy consumption. This urgency is driven by the fact that energy-limited Sensor Nodes (SNs) present an impressive challenge in IoT, which not only shortens the lifetime of SNs but also consumes more energy. In view of that, this research paper presents a novel protocol titled Innovative Clustering Energy Efficient Equilibrium Optimizer-based Protocol (ICEE-EO-P). In this approach, the rectangular network area is subdivided into equally-sized hexagonal clusters, each of which selects its own Cluster Head (CH) using the EO algorithm, which takes into account three decisive metrics, including the distance of SNs from the sink, their remaining energy, and the average intra-cluster distance, to calculate the fitness function. ICEE-EO-P is a batch-based clustering protocol that ends when the energy of any of the CH dips below a certain threshold. The simulation results of ICEE-EO-P are highly encouraging, demonstrating that our proposed protocol surpasses comparable protocols with regard to enhancing network longevity and remaining energy.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"289 2","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fahad Rahman, C. Titouna, Farid Naït-Abdesselam, Ahmed Serhrouchni
{"title":"Scalable Blockchain Through Prioritised Sharding","authors":"Fahad Rahman, C. Titouna, Farid Naït-Abdesselam, Ahmed Serhrouchni","doi":"10.1109/CommNet60167.2023.10365307","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365307","url":null,"abstract":"Blockchain Technology (BCT) relies on trust assumptions within distributed computing, involving independent nodes. Addressing scalability issues in Blockchain remains a continuous endeavor for researchers. In this research paper, authors introduced Prioritised Sharding (P-Sharding), a novel approach that enhances the scalability of Blockchain systems by prioritizing nodes based on their performance. We accomplish this through the use of advanced algorithms and real-time analytics. Our empirical findings demonstrate marked enhancements in aspects such as response times to queries, the accessibility of data, and the total throughput of the system. Moreover, our approach successfully diminishes the common bottlenecks imputed to the conventional sharding methods. This research significantly adds to the discussion regarding tactics for scalable data management, offering practical solutions for extensive, data-centric enterprises.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"9 4","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rayyan Al-Khatab, S. Althunibat, A. Alhasanat, Khalid A. Qaraqe
{"title":"Outage Analysis of Dual-hop UAV-Assisted Links Considering Orientation Fluctuations","authors":"Rayyan Al-Khatab, S. Althunibat, A. Alhasanat, Khalid A. Qaraqe","doi":"10.1109/CommNet60167.2023.10365295","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365295","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) have been widely proposed as an efficient solution to maintain wireless connectivity in emergency scenarios in which ground infrastructure is partially or fully damaged. To this end, a dual-hop UAV-assisted system is addressed in this work where the source, relay and destination can be either a ground-based or a UAV, which leads to eight different system setups. A mathematical framework is followed to obtain the cumulative distribution functions (CDF) of the overall signal-to-noise ratio (SNR) in the different setups, which are utilized to characterize the outage probability in closed form expressions of the eight different system setups. Monte Carlo simulations are obtained to validate the analytical formulas, which show exact matching over the whole SNR range in all system setups considered. Moreover, the impact of other operational parameters including antenna elements, fluctuation parameters and path loss parameters on the outage rate are in detail investigated.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"435 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gerhard Wunder, Axel Flinth, Daniel Becker, Benedikt Groß
{"title":"Mimicking DH Key Exchange Over a Full Duplex Wireless Channel via Bisparse Blind Deconvolution","authors":"Gerhard Wunder, Axel Flinth, Daniel Becker, Benedikt Groß","doi":"10.1109/CommNet60167.2023.10365262","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365262","url":null,"abstract":"Secret key generation between authenticated devices is a pivotal task for secure communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In this paper, we shall invent and analyze a new security primitive that is specifically designed for WPAN. For WPAN, wireless channel-based secret key generation has been proposed but was not widely deployed due to its critical dependence on the channel’s entropy which is uncontrollable. We formulate a different approach: We still exploit channel properties but mainly hinge on the reciprocity of the wireless channel and not on the channel’s entropy. The radio advantage comes from the use of full duplex communication. We show that in this situation both legitimate parties can agree on a common secret key even without ever probing the channel. At the core is a new bisparse blind deconvolution scheme for which we prove correctness and information-theoretic, i.e. perfect, security. We show that, ultimately, a secret key can be extracted and give a lower bound for the number of secret key bits which is then verified by experiments. We also notice a remote correspondence of the scheme to DH key exchange.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"34 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RRI Adaptive: A Standards Compliant Approach for Equitable and Stable Congestion Control in C-V2X Networks","authors":"Brian McCarthy, Aisling O'Driscoll","doi":"10.1109/CommNet60167.2023.10365283","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365283","url":null,"abstract":"A key topic of interest in all vehicular networking technologies is their ability to deal with dense radio environments as widespread deployment becomes a reality. This requires congestion control mechanisms to maintain adequate communication performance. The current Cellular Vehicle-to-Everything (C-V2X) and its successor New Radio V2X (NR-V2X) standardised congestion control approach is table-based, utilising packet dropping. As shown in past works by the authors of this paper, these approaches exhibit congestion instability and require extensive configuration. To overcome this, algorithmic approaches were standardised, namely ETSI’s DCC Adaptive. Although this can be effective for wireless vehicular communications, it cannot be applied directly to NR-V2X/C-V2X due to incompatibility with the underlying radio scheduling approach, Sensing-Based Semi-Persistent Scheduling (SB-SPS). In previous work, the authors of this paper investigated in detail why this is the case and proposed an algorithmic approach that was compatible with the SB-SPS scheduler, namely RRIAdaptive. This paper provides an in-depth evaluation of RRIAdaptive. Importantly, its efficacy is evaluated not simply from the perspective of maintaining a desired channel load, but also from the perspective of maintaining effective application quality of service. This paper also describes the first study of fairness and stability in the context of C-V2X/NR-V2X congestion control. These are of increased importance, given dynamic channel conditions in vehicular scenarios, and reduced awareness due to degraded quality of service or vehicles starved of radio resources, may increase the likelihood of collisions.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"238 3","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139184004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Konstantinos Tsachrelias, Chrysostomos-Athanasios Katsigiannis, V. Kokkinos, A. Gkamas, Christos Bouras, P. Pouyioutas
{"title":"Bandwidth Optimization Techniques in Heterogeneous 5G Networks Using DUDe","authors":"Konstantinos Tsachrelias, Chrysostomos-Athanasios Katsigiannis, V. Kokkinos, A. Gkamas, Christos Bouras, P. Pouyioutas","doi":"10.1109/CommNet60167.2023.10365269","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365269","url":null,"abstract":"The deployment of 5G networks has led to a significant increase in demand for high-speed data rates and improved overall network performance. HetNets are a promising solution for providing coverage and capacity enhancements for 5G networks. However, one of the key challenges in HetNets is the optimization of bandwidth allocation. Traditional resource allocation techniques are limited in their ability to provide efficient and effective solutions for 5G networks. To address this challenge, a novel technology called DUDe (Downlink/Uplink Decoupling) has been proposed. DUDe optimizes bandwidth allocation in HetNets by dynamically adjusting the allocation of network resources to user demand and network conditions. The motivation of this paper is to highlight the importance of DUDe technology in macro cell offloading in 5G HetNets. The paper evaluates the performance of DUDe in comparison to traditional resource allocation techniques and provides insights into the key factors that influence its effectiveness. Moreover, this paper presents a detailed analysis of simulations results and provides recommendations for future research. The findings of this study will be useful for network operators and researchers in developing more efficient and effective resource allocation strategies for 5G networks.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"192 3","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139184100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Brain Tumor Classification on Resource-Constrained Devices Using Stacking Ensemble and RadImageNet Pretrained Models","authors":"Nihal Remzan, Karim Tahiry, A. Farchi","doi":"10.1109/CommNet60167.2023.10365271","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365271","url":null,"abstract":"The classification of brain Tumors relies to a large extent on the knowledge and skills of experts. The introduction of a Tumor Classification System is essential to help radiologists and physicians identify tumors. It is essential to improve the accuracy of the systems in order to guarantee possible therapeutic approaches. In this study, we provide a portable system for classifying Magnetic Resonance (MR) brain images into normal and tumor categories using a Raspberry Pi 4 Model B. We employ a stacking ensemble to construct an ensemble classifier, with logistic regression acting as the meta-learner. Our approach utilizes a pre-trained Convolutional Neural Network (CNN) model on RadImageNet, specifically Inception-V3, as the feature extractor, while SVM, k-NN, and RF serve as base learners. The dataset used in this study comprises 3000 Tl-weighted MR brain images. Our method improves accuracy while addressing resource constraints. The practical implementation of the Raspberry Pi 4 Model B emphasizes real-world applicability. With a 98.5% accuracy, this approach contributes to brain tumor detection, assisting in correct diagnosis and viable therapy solutions.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"20 4","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Assessment of Intelligent Reflective Surfaces-aided Network with Residual Hardware Impairments","authors":"Elmehdi Illi, Marwa Qaraqe","doi":"10.1109/CommNet60167.2023.10365264","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365264","url":null,"abstract":"In this paper, we analyze the outage probability (OP)performance of a wireless communication network assisted by an intelligent, reflective surface (IRS) in the presence of residual hardware impairments (RHI). The setup consists of a transmitter aiming to communicate with a receiver, whereas an IRS array aims at maximizing the system’s reliability by boosting the received signal-to-noise ratio (SNR) at the legitimate receiver’s side to decrease the system’s OP. The receiver’s hardware has imperfections that make a portion of the received signal, impaired by the wireless channel, contribute to the receiver noise. In addition to this, we consider that the IRS induces phase quantization errors due to the finite bit resolution. A closed-form formula for the system’s OP is provided in terms of the main system parameters. Numerical results indicate the sensitivity of RIS-aided schemes to the level of RHI at the receiver, while the OP is not enhanced significantly when we exceed 3 bits of phase shift resolution.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"197 3","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}