{"title":"Successful transmission probability analysis for cache-enabled users in mobile networks","authors":"Yinglei Teng, Qi Zhang, Mengting Liu, Mei Song","doi":"10.1109/ICCW.2017.7962852","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962852","url":null,"abstract":"Caching popular contents in the storage of users is deemed as an efficient approach to increase energy efficiency, decrease latency, as well as offload backhauls. Due to the mobility feature of use terminals in the real environment, the analysis of successful transmission is particular important in mobile networks. In this paper, the position of cache-enabled users are distributed as a Homogeneous Poisson Point Process (HPPP) and user moves following the random walk mobility (RWM) model. Then, the successful transmission probability is analyzed through the observation of the one step movement of the typical user using stochastic geometry methods. Meanwhile, in order to optimize the successful transmission probability, two methods are considered, i.e., file segmentation transmission (FST) and retransmission mechanism (RM). Simulation results show that the successful transmission probability can be improved by several network parameters, e.g., user density, transmission zone radius and caching probability, but exhibits a decline with increasing velocity or downloading time. Besides, considering segmentation cost, there is a tradeoff for the optimal segment number for the FST and RM schemes.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"26 1","pages":"1382-1387"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84687051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Admission and scheduling mechanism for electric vehicle charging with renewable energy","authors":"Yuchang Wang, J. Thompson","doi":"10.1109/ICCW.2017.7962839","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962839","url":null,"abstract":"Integrating renewable energy for Electric Vehicles (EVs) charging scheduling is more challenging than using grid power, due to the time-varying and unpredictable nature of renewable energy generation. Most of the existing works mainly focus on a deterministic setting where the scheduling problem can be solved using various congestion management approaches. In this paper, we develop a stochastic solar generation model and a performance index (the Figure of Merit) to measure the charging station's utility as well as EVs' charging requirements, taking account of the effect of solar energy prediction errors. We further propose a two-stage process (first admission control and then charging scheduling) to find the best solution to the EV charging problem. The results show that the proposed two-stage admission and scheduling mechanism outperforms the First In First Out (FIFO) scheme in terms of reducing delay time and increasing revenue, so that the charging station performs better. The proposed mechanism can also adapt well to uncertain solar generation by finding the optimal trade-off between accepting EVs and missing charging deadlines.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"8 1","pages":"1304-1309"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90671059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized asymmetric cooperation for downlink cloud radio access network under per-base station data transfer constraint","authors":"Fehmí Emre Kadan, A. O. Yılmaz","doi":"10.1109/ICCW.2017.7962646","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962646","url":null,"abstract":"Using multicell cooperation between several base stations (BSs) connected to a central processor (CP) via finite capacity digital backhaul links, the inter-cell interference, which is known to limit the standard cellular systems, can be mitigated. When all user data is sent to each BS through the CP, which is referred as the full cooperation, the interference can be perfectly eliminated, however, this may cause the capacity of backhaul links to be exceeded. In this study, it is aimed to find the optimal asymmetric cooperation strategy for downlink cloud radio access network (C-RAN) which minimizes the total transmitted power from BSs where each user's signal-to-interference-and-noise ratio (SINR) is lower bounded and the number of user data streams sent by each BS is limited. The original problem is NP-hard and requires a combinatorial search. In this paper, we propose two sub-optimal cooperation methods. The first method is based on iteratively increasing the number of users served by the BSs until all users are chosen, and the second is based on iteratively adding a user data stream to be sent to a BS. We also consider a known method, iterative link removal, which is based on iteratively removing a user data from a BS by starting the full cooperation scheme, and a modified version of this method as a comparison. The simulation results show that the proposed methods can provide better performance in comparison to other methods in the literature.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"11 1","pages":"132-137"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89759352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consistent-estimated eigenvalues based cooperative spectrum sensing for dense cognitive Small Cell Network","authors":"Meng Zhao, Caili Guo, Chunyan Feng, Shuo Chen","doi":"10.1109/ICCW.2017.7962709","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962709","url":null,"abstract":"In this paper, we consider the spectrum sensing problem of detecting a primary signal of a macro cell in a cognitive radio network by employing multiple dense small cell base stations. In consideration of the number of cooperative small cells (sample dimension) is comparable to the number of sample (sample size) due to the dense deployment of small cells, sample covariance matrix is no more a good estimator of statistical covariance matrix. A consistent-estimated eigenvalues based cooperative spectrum sensing (CEE-CSS) algorithm is proposed by utilizing consistent estimators of eigenvalues which are proven to be consistent when the sample dimension goes to infinity at the same rate as sample size. Effect of the eigenvalue splitting condition on sensing performance of the CEE-CSS is analyzed through simulations. Further simulation results present that the proposed CEE-CSS enables better sensing performance than a maximum-minimum eigenvalue detection based on oracle approximating shrinkage estimator (OAS-MME).","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"29 1","pages":"510-515"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73342827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical analysis for joint PHY and MAC perspective of Compressive Sensing Multi-User Detection with coded random access","authors":"Yalei Ji, C. Bockelmann, A. Dekorsy","doi":"10.1109/ICCW.2017.7962792","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962792","url":null,"abstract":"Massive Machine Communication (MMC) in the next generation of mobile communication (5G) systems requires new Medium Access Control (MAC) and physical (PHY) layer concepts to handle massive access with low overhead. The recently developed concept coded random access is capable of resolving collisions in massive access at MAC layer. Furthermore, Compressive Sensing Multi-User Detection (CS-MUD) achieves joint activity and data detection from the PHY layer perspective by exploiting sparsity in sporadic multi-user detection. In [1], a joint design of these two concepts was semi-analytically evaluated combining CS-MUD with coded random access under certain assumptions, which showed a promising performance for supporting MMC. In this work, a full link-level analysis of the joint protocol will be presented to verify the previous results and provide deep insights on the link-level performance. Although the joint approach on the link-level shows a small throughput loss compared to the semi-analytical evaluation, high system flexibility can be achieved by tuning MAC and PHY resources dynamically based on the numerical analysis which can be referred to in the joint MAC-/PHY-layer design.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"24 1","pages":"1018-1023"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79446195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guillermo Pocovi, B. Soret, K. Pedersen, P. Mogensen
{"title":"MAC layer enhancements for ultra-reliable low-latency communications in cellular networks","authors":"Guillermo Pocovi, B. Soret, K. Pedersen, P. Mogensen","doi":"10.1109/ICCW.2017.7962790","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962790","url":null,"abstract":"Ultra-reliable low-latency communications (URLLC) entail the transmission of sporadic and small packets, with low latency and very high reliability. Among many potential areas of optimization for URLLC, the problems of large delays during HARQ retransmissions, and inaccurate link adaptation as a consequence of the rapidly-varying interference conditions are studied. The former is addressed by reducing the TTI length and HARQ round-trip time, as compared to what is used in LTE; whereas including low-pass filtered interference information in the CQI report is also proved to have great potential. Extensive system-level simulations of the downlink performance show that the URLLC requirements, i.e. latencies below 1 ms and 99.999% reliability, are achievable at low load scenarios, whereas some performance degradation (1 – 3 ms latency) is experienced at higher loads due to the increased queuing delay and inter-cell interference.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"47 1","pages":"1005-1010"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79694761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ojo, S. Giordano, Giuseppe Portaluri, D. Adami, M. Pagano
{"title":"An energy efficient centralized scheduling scheme in TSCH networks","authors":"M. Ojo, S. Giordano, Giuseppe Portaluri, D. Adami, M. Pagano","doi":"10.1109/ICCW.2017.7962719","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962719","url":null,"abstract":"IEEE 802.15.4-2015 is the third revision of IEEE 802.15.4 Standard for Low-Rate Wireless Networks. The standard presents Time Slotted Channel Hopping (TSCH) Medium Access Control (MAC) protocol, which provides high reliability and low power consumption to various industrial applications. Despite the effectiveness and the importance of the TSCH protocol, the standard leaves out of its scope in defining how the schedule is built and maintained. In this work, we focus on scheduling in IEEE 802.15.4-2015 TSCH networks from the energy efficiency perspective in a centralized manner where the gateway makes frequency allocations and time slot assignments. At first, we derive an energy consumption model of a TSCH node to determine the network lifetime. Afterwards, we formulate the scheduling problem as an energy efficiency maximization problem, which is a nonlinear integer programming. Motivated by the high computational complexity of the problem, we propose a low-complexity Energy Efficient Scheduler (EES) and Vogel's Approximation Method Heuristic Scheduling Algorithm (VAM-HSA). We make a comparison with the Round Robin Scheduler (RRS) and analyse the schedulers in terms of success probability and energy efficiency. Performance evaluation indicates that EES and VAM-HSA perform better in terms of energy efficiency, while at the same time yielding a good throughput.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"28 1","pages":"570-575"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84111607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced LMMSE channel estimation under high speed railway scenarios","authors":"Qing Tang, H. Long, Haojun Yang, Yuli Li","doi":"10.1109/ICCW.2017.7962789","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962789","url":null,"abstract":"With the rapid deployment of the high speed railway (HSR), the wireless communication in HSR has been one of the indispensable scenarios in the fifth generation (5G) communications. In order to improve the performance of the orthogonal frequency division multiplexing (OFDM) system in the HSR scenarios, we propose an enhanced linear minimum mean square error channel estimation scheme based on multi-path Doppler frequency offset (DFO) estimation in this paper. The proposed scheme can estimate DFO of each path, and generate the frequency and time channel correlation more accurately, which can improve the accuracy of channel estimation in the HSR scenarios. Simulation results show that the proposed scheme can reduce the channel estimation error and achieve attractive gain in the HSR scenarios.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"1 1","pages":"999-1004"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83090505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MIMO-OFDM for small cell backhaul in the presence of synchronization errors and phase noise","authors":"Xiaoming Chen, A. Wolfgang, Ali A. Zaidi","doi":"10.1109/ICCW.2017.7962825","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962825","url":null,"abstract":"In this paper, we present a multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) based backhaul link in the presence of hardware impairments, such as phase noise (PN), residual carrier frequency offset (RCFO), and sampling frequency offset (SFO). Focusing on these adverse hardware effects on the MIMO-OFDM system, we propose corresponding signal processing algorithms for compensating these impairments. The effectiveness of the proposed schemes is demonstrated via simulations using a PN model of a phase-locked loop (PLL) based oscillator and a geometry-based stochastic channel model at millimeter wave (mmWave) frequencies.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"1 1","pages":"1221-1226"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76352690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure and reliable coding scheme over wireless links in cyber-physical systems","authors":"Zecheng Zhang, Wei Peng, Song Liu","doi":"10.1109/ICCW.2017.7962802","DOIUrl":"https://doi.org/10.1109/ICCW.2017.7962802","url":null,"abstract":"Cyber-physical systems connect the physical world and the information world by sensors and actuators. These sensors are usually small embedded systems which have many limitations on wireless communication, computing and storage. This paper proposes a lightweight coding method for secure and reliable transmission over a wireless communication links in cyber-physical systems. The reliability of transmission is provided by forward error correction. And to ensure the confidentiality, we utilize different encryption matrices at each time of coding which are generated by the sequence number of packets. So replay attacks and other cyber threats can be resisted simultaneously. The issues of the prior reliable transmission protocols and secure communication protocols in wireless networks of a cyber-physical system are reduced, such as large protocol overhead, high interaction delay and large computation cost.","PeriodicalId":6656,"journal":{"name":"2017 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"9 1","pages":"1079-1085"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89575980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}