Pub Date : 2019-04-01DOI: 10.1109/WCNCW.2019.8902586
Mohamed Hossam Hegazy, A. El-Sherif, T. Elbatt
In this paper, we propose a novel physical layer decoding technique for Device-to-Device Network Coded Cooperation (NCC) receivers in the Two Way Relay Channel (TWRC) scenario. The proposed technique is efficiently applicable either when Channel State Information (CSI) are available at the receiver or not. It first employs XOR arithmetic analog mapping to extract a distorted version of the intended signal from the network-coded signal received from the relay. The obtained signal is then combined with the direct signal received from the source, resulting in a higher SNR version of the intended signal. Combining technique used is either Cooperative Maximum Ratio Combining (C-MRC) or Equal Gain Combining (EGC) depending on whether CSI are available or not. The proposed receiver has two advantages over the optimum Maximum Likelihood (ML) receiver. First is its applicability under CSI unavailability circumstances. Second is its lower computation complexity. The BER performance of the proposed scheme has been evaluated through exhaustive Monte-Carlo simulations. According to the obtained results, the proposed scheme is superior to the conventional Network Coding (NC) scheme in both CSI availability and unavailability scenarios. It achieves BER reduction of approximately 71.65 % and 41% in the two scenarios, respectively. Further, when CSI are available, results show that the proposed scheme achieved BER approaches that of the optimum ML (< 6% increase over ML), being noticeably superior to the conventional Cooperative Communication (CC) scheme with Maximum Ratio Combining (MRC) (achieved BER reduction ≈ 55.2%). An accurate closed form for the proposed scheme theoretical achieved BER has been derived in the CSI unavailability case, with BPSK assumed.
{"title":"Network Coded Cooperation Receiver with Analog XOR Mapping for Enhanced BER","authors":"Mohamed Hossam Hegazy, A. El-Sherif, T. Elbatt","doi":"10.1109/WCNCW.2019.8902586","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902586","url":null,"abstract":"In this paper, we propose a novel physical layer decoding technique for Device-to-Device Network Coded Cooperation (NCC) receivers in the Two Way Relay Channel (TWRC) scenario. The proposed technique is efficiently applicable either when Channel State Information (CSI) are available at the receiver or not. It first employs XOR arithmetic analog mapping to extract a distorted version of the intended signal from the network-coded signal received from the relay. The obtained signal is then combined with the direct signal received from the source, resulting in a higher SNR version of the intended signal. Combining technique used is either Cooperative Maximum Ratio Combining (C-MRC) or Equal Gain Combining (EGC) depending on whether CSI are available or not. The proposed receiver has two advantages over the optimum Maximum Likelihood (ML) receiver. First is its applicability under CSI unavailability circumstances. Second is its lower computation complexity. The BER performance of the proposed scheme has been evaluated through exhaustive Monte-Carlo simulations. According to the obtained results, the proposed scheme is superior to the conventional Network Coding (NC) scheme in both CSI availability and unavailability scenarios. It achieves BER reduction of approximately 71.65 % and 41% in the two scenarios, respectively. Further, when CSI are available, results show that the proposed scheme achieved BER approaches that of the optimum ML (< 6% increase over ML), being noticeably superior to the conventional Cooperative Communication (CC) scheme with Maximum Ratio Combining (MRC) (achieved BER reduction ≈ 55.2%). An accurate closed form for the proposed scheme theoretical achieved BER has been derived in the CSI unavailability case, with BPSK assumed.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133067365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/WCNCW.2019.8902901
Malcolm Egan
Due to massive numbers of uncoordinated devices present in wireless networks for the Internet of Things (IoT), interference is a key challenge. There is evidence both from experiments and analysis of statistical models that the uncoordinated nature of channel access leads to non-Gaussian statistics for the interference. A particularly attractive model in this scenario is the additive vector α-stable noise channel. In this paper, we study the capacity of this channel with fractional moment constraints. In particular, we establish well-posedness of the optimization problem for the capacity. We also study convergence of the capacity loss due to an additional constraint where input probability measures are concentrated on spherical shells, in addition to the fractional moment constraints.
{"title":"On Capacity Sensitivity in Additive Vector Symmetric α-Stable Noise Channels","authors":"Malcolm Egan","doi":"10.1109/WCNCW.2019.8902901","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902901","url":null,"abstract":"Due to massive numbers of uncoordinated devices present in wireless networks for the Internet of Things (IoT), interference is a key challenge. There is evidence both from experiments and analysis of statistical models that the uncoordinated nature of channel access leads to non-Gaussian statistics for the interference. A particularly attractive model in this scenario is the additive vector α-stable noise channel. In this paper, we study the capacity of this channel with fractional moment constraints. In particular, we establish well-posedness of the optimization problem for the capacity. We also study convergence of the capacity loss due to an additional constraint where input probability measures are concentrated on spherical shells, in addition to the fractional moment constraints.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133297471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/WCNCW.2019.8902860
G. Rigazzi, Jani-Pekka Kainulainen, C. Turyagyenda, Alain A. M. Mourad, Jaehyun Ahn
Immersive video applications based on 360 video streaming require high-bandwidth, high-reliability and low-latency 5G connectivity but also flexible, low-latency and cost-effective computing deployment. This paper proposes a novel solution for decomposing and distributing the end-to-end 360 video streaming service across three computing tiers, namely cloud, edge and constrained fog, in order of proximity to the end user client. The streaming service is aided with an adaptive viewport technique. The proposed solution is based on the H2020 5G-CORAL system architecture using micro-services-based design and a unified orchestration and control across all three tiers based on Fog05. Performance evaluation of the proposed solution shows noticeable reduction in bandwidth consumption, energy consumption, and deployment costs, as compared to a solution where the streaming service is all delivered out of one computing location such as the Cloud.
{"title":"An Edge and Fog Computing Platform for Effective Deployment of 360 Video Applications","authors":"G. Rigazzi, Jani-Pekka Kainulainen, C. Turyagyenda, Alain A. M. Mourad, Jaehyun Ahn","doi":"10.1109/WCNCW.2019.8902860","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902860","url":null,"abstract":"Immersive video applications based on 360 video streaming require high-bandwidth, high-reliability and low-latency 5G connectivity but also flexible, low-latency and cost-effective computing deployment. This paper proposes a novel solution for decomposing and distributing the end-to-end 360 video streaming service across three computing tiers, namely cloud, edge and constrained fog, in order of proximity to the end user client. The streaming service is aided with an adaptive viewport technique. The proposed solution is based on the H2020 5G-CORAL system architecture using micro-services-based design and a unified orchestration and control across all three tiers based on Fog05. Performance evaluation of the proposed solution shows noticeable reduction in bandwidth consumption, energy consumption, and deployment costs, as compared to a solution where the streaming service is all delivered out of one computing location such as the Cloud.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"43 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113973529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/WCNCW.2019.8902807
M. Jamshed, O. Amjad, F. Héliot, T. Brown
The increasing number of users and the demand for higher data rate due to multimedia services, requires high capacity/bandwidth, low latency and high quality of service (QoS). In turn, some of these requirements have/will lead to the deployment of numerous new access points. Given that wireless communication systems utilize radio frequency (RF) waves to operate, more users and more access points imply more electromagnetic field (EMF) exposure. Meanwhile, the possible health consequences of EMF exposure from these systems are progressively becoming a major concern due to their ever growing ubiquity and increased transmission power. In an endeavor to reduce the EMF exposure due to wireless communication systems, we design an optimization scheme for minimizing the EMF exposure of users in the uplink of non-orthogonal multiple access (NOMA) systems, while satisfying each user with an acceptable QoS. We define EMF minimization strategy as a convex optimization problem and iteratively solve it by assigning bits to each user. Each subcarrier is strategically allocated to a group of users having minimum interference and is found by using the classic binary search algorithm. Simulation results depict that our proposed strategy provides a reduction of at least 1 order of magnitude in terms of EMF exposure, while satisfying QoS constraints, in comparison with the state-of-art techniques in the literature.
{"title":"EMF-reduction Uplink Resource Allocation Scheme for Non-Orthogonal Multiple Access Systems","authors":"M. Jamshed, O. Amjad, F. Héliot, T. Brown","doi":"10.1109/WCNCW.2019.8902807","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902807","url":null,"abstract":"The increasing number of users and the demand for higher data rate due to multimedia services, requires high capacity/bandwidth, low latency and high quality of service (QoS). In turn, some of these requirements have/will lead to the deployment of numerous new access points. Given that wireless communication systems utilize radio frequency (RF) waves to operate, more users and more access points imply more electromagnetic field (EMF) exposure. Meanwhile, the possible health consequences of EMF exposure from these systems are progressively becoming a major concern due to their ever growing ubiquity and increased transmission power. In an endeavor to reduce the EMF exposure due to wireless communication systems, we design an optimization scheme for minimizing the EMF exposure of users in the uplink of non-orthogonal multiple access (NOMA) systems, while satisfying each user with an acceptable QoS. We define EMF minimization strategy as a convex optimization problem and iteratively solve it by assigning bits to each user. Each subcarrier is strategically allocated to a group of users having minimum interference and is found by using the classic binary search algorithm. Simulation results depict that our proposed strategy provides a reduction of at least 1 order of magnitude in terms of EMF exposure, while satisfying QoS constraints, in comparison with the state-of-art techniques in the literature.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"34 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121319598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/WCNCW.2019.8902683
Alaa Gohar, F. Shafik, Frank Dürr, K. Rothermel, Amr H. El Mougy
This paper investigates the application of differential privacy to the Smart Grid. Due to the nature of the Smart Grid, data drawn from it can be used to predict individuals behaviours and actions inside their homes which is a huge privacy violation. We show an attack that is able to predict behaviour with up to 94.3% precision. Differential privacy masks the distinguishable features of the Smart Grid data, protecting users privacy and making their behaviour unpredictable. We propose a method which applies differential privacy without splitting the billing, and charges concurrently while keeping the cost unchanged.
{"title":"Privacy-Preservation Mechanisms for Smart Energy Metering Devices Based on Differential Privacy","authors":"Alaa Gohar, F. Shafik, Frank Dürr, K. Rothermel, Amr H. El Mougy","doi":"10.1109/WCNCW.2019.8902683","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902683","url":null,"abstract":"This paper investigates the application of differential privacy to the Smart Grid. Due to the nature of the Smart Grid, data drawn from it can be used to predict individuals behaviours and actions inside their homes which is a huge privacy violation. We show an attack that is able to predict behaviour with up to 94.3% precision. Differential privacy masks the distinguishable features of the Smart Grid data, protecting users privacy and making their behaviour unpredictable. We propose a method which applies differential privacy without splitting the billing, and charges concurrently while keeping the cost unchanged.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/WCNCW.2019.8902537
Tianyu Yang, Yao Zhu, Yulin Hu, R. Mathar
In this work, we study the energy efficiency problem in a vehicular edge computing network with delay sensitive tasks. We aim at minimizing the total energy consumption under the given delay constraints by jointly optimizing the offloading decisions and the computational resources. The resulting mixed integer non-convex problem is intractable to solve. To address the problem, it is reformulated into an equivalent tractable form and via relaxation it is transformed into a convex problem. Via simulations, the performance and the offloading behaviour of the proposed design are evaluated under various scenarios with different setups of vehicular density and delay limits.
{"title":"Energy Minimization of Delay-Constrained Offloading in Vehicular Edge Computing Networks","authors":"Tianyu Yang, Yao Zhu, Yulin Hu, R. Mathar","doi":"10.1109/WCNCW.2019.8902537","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902537","url":null,"abstract":"In this work, we study the energy efficiency problem in a vehicular edge computing network with delay sensitive tasks. We aim at minimizing the total energy consumption under the given delay constraints by jointly optimizing the offloading decisions and the computational resources. The resulting mixed integer non-convex problem is intractable to solve. To address the problem, it is reformulated into an equivalent tractable form and via relaxation it is transformed into a convex problem. Via simulations, the performance and the offloading behaviour of the proposed design are evaluated under various scenarios with different setups of vehicular density and delay limits.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115167987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/WCNCW.2019.8902756
Ebtesam Almazrouei, G. Gianini, Nawaf I. Almoosa, E. Damiani
This paper proposes a Deep Learning approach to radio signal de-noising. This approach is data-driven, thus it allows de-noising signals, corresponding to distinct protocols, without requiring explicit use of expert knowledge, in this way granting higher flexibility. The core component of the Artificial Neural Network architecture used in this work is a Convolutional De-noising AutoEncoder. We report about the performance of the system in spectrogram-based denoising of the protocol preamble across protocols of the IEEE 802.11 family, studied using simulation data. This approach can be used within a machine learning pipeline: the denoised data can be fed to a protocol classifier. A further perspective advantage of using the AutoEncoders in such a pipeline is that they can be co-trained with the downstream classifier (protocol detector), to optimize its accuracy.
{"title":"A Deep Learning Approach to Radio Signal Denoising","authors":"Ebtesam Almazrouei, G. Gianini, Nawaf I. Almoosa, E. Damiani","doi":"10.1109/WCNCW.2019.8902756","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902756","url":null,"abstract":"This paper proposes a Deep Learning approach to radio signal de-noising. This approach is data-driven, thus it allows de-noising signals, corresponding to distinct protocols, without requiring explicit use of expert knowledge, in this way granting higher flexibility. The core component of the Artificial Neural Network architecture used in this work is a Convolutional De-noising AutoEncoder. We report about the performance of the system in spectrogram-based denoising of the protocol preamble across protocols of the IEEE 802.11 family, studied using simulation data. This approach can be used within a machine learning pipeline: the denoised data can be fed to a protocol classifier. A further perspective advantage of using the AutoEncoders in such a pipeline is that they can be co-trained with the downstream classifier (protocol detector), to optimize its accuracy.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116221650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/WCNCW.2019.8902613
Bansi Gajera, Dhaval K. Patel, Brijesh Soni, M. López-Benítez
Improved energy detection (IED) outperforms classical energy detection (CED) as it takes into consideration the statistics of past samples. However, imperfect knowledge of the noise referred to as noise uncertainty (NU) imposes fundamental limitation on the performance of the sensing scheme. NU is prone to degrade the detection performance particularly in the low signal to noise ratio (SNR) regime. In this paper, the analysis of IED under noise power uncertainty in low SNR regime is carried out validated based on the empirical spectrum data of the radio technologies captured using the experimental setup. Obtained results demonstrate that IED outperforms CED in presence of NU, at the cost of nominal increase in the computational time. A gain of 23.2% in the detection performance is observed while using IED over CED at 1 dB NU, 14.13% at 2 dB NU and 16.67% at 3 dB NU.
改进的能量检测(IED)由于考虑了过去样本的统计量而优于经典的能量检测(CED)。然而,对噪声的不完全了解(即噪声不确定性)对传感方案的性能造成了根本性的限制。在低信噪比条件下,NU容易降低检测性能。本文基于实验装置捕获的无线电技术的经验频谱数据,对低信噪比条件下IED的噪声功率不确定性分析进行了验证。得到的结果表明,在NU存在的情况下,IED优于CED,但代价是计算时间的名义增加。在1 dB NU、2 dB NU和3 dB NU下,使用IED在CED上的检测性能分别提高23.2%、14.13%和16.67%。
{"title":"Experimental Performance Evaluation of Improved Energy Detection under Noise Uncertainty in Low SNR Regime","authors":"Bansi Gajera, Dhaval K. Patel, Brijesh Soni, M. López-Benítez","doi":"10.1109/WCNCW.2019.8902613","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902613","url":null,"abstract":"Improved energy detection (IED) outperforms classical energy detection (CED) as it takes into consideration the statistics of past samples. However, imperfect knowledge of the noise referred to as noise uncertainty (NU) imposes fundamental limitation on the performance of the sensing scheme. NU is prone to degrade the detection performance particularly in the low signal to noise ratio (SNR) regime. In this paper, the analysis of IED under noise power uncertainty in low SNR regime is carried out validated based on the empirical spectrum data of the radio technologies captured using the experimental setup. Obtained results demonstrate that IED outperforms CED in presence of NU, at the cost of nominal increase in the computational time. A gain of 23.2% in the detection performance is observed while using IED over CED at 1 dB NU, 14.13% at 2 dB NU and 16.67% at 3 dB NU.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114892745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/WCNCW.2019.8902574
L. Nassif
In a cyber attack, several kinds of evidence must be verified to find the responsible. Seizing cell phones became a usual procedure in investigations and digital forensics may be demanded to verify conspiracies about the committed crime. The accelerated growth of cell phones as an indispensable accessory nowadays, followed by a massive adherence to Instant Messaging (IM) applications, has changed the way mankind is interacting virtually. Although IM applications provide several benefits for real-time contact and knowledge sharing, they are also used in private communications for illicit arrangements. When several cell phones are seized in a police operation, many communications using IM may be used as evidence of the committed crime. An investigator spends many hours trying to rearrange this conversation or reading repeated information. This work presents a solution to this problem, retrieving all conversations sequentially from a set of cell phones that participate in the same WhatsApp group. The solution is illustrated with a case study that validates the model and algorithm developed for this purpose. First results pointed to 52% decreasing of investigation effort in some situations.
{"title":"Conspiracy communication reconstitution from distributed instant messages timeline","authors":"L. Nassif","doi":"10.1109/WCNCW.2019.8902574","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902574","url":null,"abstract":"In a cyber attack, several kinds of evidence must be verified to find the responsible. Seizing cell phones became a usual procedure in investigations and digital forensics may be demanded to verify conspiracies about the committed crime. The accelerated growth of cell phones as an indispensable accessory nowadays, followed by a massive adherence to Instant Messaging (IM) applications, has changed the way mankind is interacting virtually. Although IM applications provide several benefits for real-time contact and knowledge sharing, they are also used in private communications for illicit arrangements. When several cell phones are seized in a police operation, many communications using IM may be used as evidence of the committed crime. An investigator spends many hours trying to rearrange this conversation or reading repeated information. This work presents a solution to this problem, retrieving all conversations sequentially from a set of cell phones that participate in the same WhatsApp group. The solution is illustrated with a case study that validates the model and algorithm developed for this purpose. First results pointed to 52% decreasing of investigation effort in some situations.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127217913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/WCNCW.2019.8902853
A. P. Silva, Monchai Bunyakitanon, R. Vassallo, R. Nejabati, D. Simeonidou
Advanced wireless communication network testbeds are now widely being deployed around European and cross-continental. This represents an interesting opportunity for vertical industry and academia to perform experimentation and validation before a real deployment. In this paper, we present 5GinFIRE as a suitably flexible platform towards open 5G (Network Function Virtualization (NFV) ecosystem and playground. On top of this platform, we designed and deployed a smart city safety system as a vertical use case, exploring 5G capabilities through a combination of NFV and machine learning to provide end-to-end communication and low latency smart city service. This safety system helps detecting criminals along the city and sending a notification to the security center. A Virtual Network Function (VNF) has been developed to enable video transcoding, face detection and recognition at the cloud or the edge of the network. The validation of the overall system is performed through the deployment of the use case indoor (Smart Internet Lab) and outdoor (Millennium Square Bristol). We show the VNF specification and present a quantitative analysis in terms of bandwidth, response time, processing time and transmission speed in terms of Quality of Experience (QoE).
{"title":"An Open 5G NFV Platform for Smart City Applications Using Network Softwarization","authors":"A. P. Silva, Monchai Bunyakitanon, R. Vassallo, R. Nejabati, D. Simeonidou","doi":"10.1109/WCNCW.2019.8902853","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902853","url":null,"abstract":"Advanced wireless communication network testbeds are now widely being deployed around European and cross-continental. This represents an interesting opportunity for vertical industry and academia to perform experimentation and validation before a real deployment. In this paper, we present 5GinFIRE as a suitably flexible platform towards open 5G (Network Function Virtualization (NFV) ecosystem and playground. On top of this platform, we designed and deployed a smart city safety system as a vertical use case, exploring 5G capabilities through a combination of NFV and machine learning to provide end-to-end communication and low latency smart city service. This safety system helps detecting criminals along the city and sending a notification to the security center. A Virtual Network Function (VNF) has been developed to enable video transcoding, face detection and recognition at the cloud or the edge of the network. The validation of the overall system is performed through the deployment of the use case indoor (Smart Internet Lab) and outdoor (Millennium Square Bristol). We show the VNF specification and present a quantitative analysis in terms of bandwidth, response time, processing time and transmission speed in terms of Quality of Experience (QoE).","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127444461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}