首页 > 最新文献

2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)最新文献

英文 中文
Network Coded Cooperation Receiver with Analog XOR Mapping for Enhanced BER 基于模拟异或映射的网络编码合作接收机提高误码率
Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902586
Mohamed Hossam Hegazy, A. El-Sherif, T. Elbatt
In this paper, we propose a novel physical layer decoding technique for Device-to-Device Network Coded Cooperation (NCC) receivers in the Two Way Relay Channel (TWRC) scenario. The proposed technique is efficiently applicable either when Channel State Information (CSI) are available at the receiver or not. It first employs XOR arithmetic analog mapping to extract a distorted version of the intended signal from the network-coded signal received from the relay. The obtained signal is then combined with the direct signal received from the source, resulting in a higher SNR version of the intended signal. Combining technique used is either Cooperative Maximum Ratio Combining (C-MRC) or Equal Gain Combining (EGC) depending on whether CSI are available or not. The proposed receiver has two advantages over the optimum Maximum Likelihood (ML) receiver. First is its applicability under CSI unavailability circumstances. Second is its lower computation complexity. The BER performance of the proposed scheme has been evaluated through exhaustive Monte-Carlo simulations. According to the obtained results, the proposed scheme is superior to the conventional Network Coding (NC) scheme in both CSI availability and unavailability scenarios. It achieves BER reduction of approximately 71.65 % and 41% in the two scenarios, respectively. Further, when CSI are available, results show that the proposed scheme achieved BER approaches that of the optimum ML (< 6% increase over ML), being noticeably superior to the conventional Cooperative Communication (CC) scheme with Maximum Ratio Combining (MRC) (achieved BER reduction ≈ 55.2%). An accurate closed form for the proposed scheme theoretical achieved BER has been derived in the CSI unavailability case, with BPSK assumed.
在本文中,我们提出了一种新的物理层解码技术,用于双向中继信道(TWRC)场景下的设备对设备网络编码合作(NCC)接收器。无论信道状态信息(CSI)在接收端是否可用,该技术都能有效地应用。它首先采用异或算术模拟映射从从继电器接收到的网络编码信号中提取预期信号的扭曲版本。然后将获得的信号与从源接收到的直接信号相结合,产生预期信号的更高信噪比版本。根据是否有CSI,采用的组合技术可以是合作最大比组合(C-MRC)或等增益组合(EGC)。与最佳最大似然(ML)接收器相比,所提出的接收器有两个优点。首先是它在CSI不可用情况下的适用性。其次是较低的计算复杂度。通过详尽的蒙特卡罗模拟对该方案的误码率性能进行了评估。结果表明,该方案在CSI可用和不可用场景下均优于传统的网络编码方案。在两种情况下,它分别实现了大约71.65%和41%的误码率降低。此外,当CSI可用时,结果表明,该方案达到了最优ML的误码率(比ML增加< 6%),明显优于传统的最大比组合(MRC)合作通信(CC)方案(误码率降低≈55.2%)。在假设BPSK的情况下,导出了该方案理论实现误码率的精确封闭形式。
{"title":"Network Coded Cooperation Receiver with Analog XOR Mapping for Enhanced BER","authors":"Mohamed Hossam Hegazy, A. El-Sherif, T. Elbatt","doi":"10.1109/WCNCW.2019.8902586","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902586","url":null,"abstract":"In this paper, we propose a novel physical layer decoding technique for Device-to-Device Network Coded Cooperation (NCC) receivers in the Two Way Relay Channel (TWRC) scenario. The proposed technique is efficiently applicable either when Channel State Information (CSI) are available at the receiver or not. It first employs XOR arithmetic analog mapping to extract a distorted version of the intended signal from the network-coded signal received from the relay. The obtained signal is then combined with the direct signal received from the source, resulting in a higher SNR version of the intended signal. Combining technique used is either Cooperative Maximum Ratio Combining (C-MRC) or Equal Gain Combining (EGC) depending on whether CSI are available or not. The proposed receiver has two advantages over the optimum Maximum Likelihood (ML) receiver. First is its applicability under CSI unavailability circumstances. Second is its lower computation complexity. The BER performance of the proposed scheme has been evaluated through exhaustive Monte-Carlo simulations. According to the obtained results, the proposed scheme is superior to the conventional Network Coding (NC) scheme in both CSI availability and unavailability scenarios. It achieves BER reduction of approximately 71.65 % and 41% in the two scenarios, respectively. Further, when CSI are available, results show that the proposed scheme achieved BER approaches that of the optimum ML (< 6% increase over ML), being noticeably superior to the conventional Cooperative Communication (CC) scheme with Maximum Ratio Combining (MRC) (achieved BER reduction ≈ 55.2%). An accurate closed form for the proposed scheme theoretical achieved BER has been derived in the CSI unavailability case, with BPSK assumed.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133067365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Capacity Sensitivity in Additive Vector Symmetric α-Stable Noise Channels 加性向量对称α-稳定噪声信道的容量灵敏度
Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902901
Malcolm Egan
Due to massive numbers of uncoordinated devices present in wireless networks for the Internet of Things (IoT), interference is a key challenge. There is evidence both from experiments and analysis of statistical models that the uncoordinated nature of channel access leads to non-Gaussian statistics for the interference. A particularly attractive model in this scenario is the additive vector α-stable noise channel. In this paper, we study the capacity of this channel with fractional moment constraints. In particular, we establish well-posedness of the optimization problem for the capacity. We also study convergence of the capacity loss due to an additional constraint where input probability measures are concentrated on spherical shells, in addition to the fractional moment constraints.
由于物联网(IoT)无线网络中存在大量不协调设备,干扰是一个关键挑战。来自实验和统计模型分析的证据表明,信道接入的不协调性质导致干扰的非高斯统计。在这种情况下,一个特别有吸引力的模型是加性向量α-稳定噪声信道。在本文中,我们研究了分数阶矩约束下该信道的容量。特别地,我们建立了容量优化问题的适定性。除了分数阶矩约束外,我们还研究了由于输入概率测度集中在球壳上的附加约束而导致的容量损失的收敛性。
{"title":"On Capacity Sensitivity in Additive Vector Symmetric α-Stable Noise Channels","authors":"Malcolm Egan","doi":"10.1109/WCNCW.2019.8902901","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902901","url":null,"abstract":"Due to massive numbers of uncoordinated devices present in wireless networks for the Internet of Things (IoT), interference is a key challenge. There is evidence both from experiments and analysis of statistical models that the uncoordinated nature of channel access leads to non-Gaussian statistics for the interference. A particularly attractive model in this scenario is the additive vector α-stable noise channel. In this paper, we study the capacity of this channel with fractional moment constraints. In particular, we establish well-posedness of the optimization problem for the capacity. We also study convergence of the capacity loss due to an additional constraint where input probability measures are concentrated on spherical shells, in addition to the fractional moment constraints.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133297471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Edge and Fog Computing Platform for Effective Deployment of 360 Video Applications 有效部署360视频应用的边缘和雾计算平台
Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902860
G. Rigazzi, Jani-Pekka Kainulainen, C. Turyagyenda, Alain A. M. Mourad, Jaehyun Ahn
Immersive video applications based on 360 video streaming require high-bandwidth, high-reliability and low-latency 5G connectivity but also flexible, low-latency and cost-effective computing deployment. This paper proposes a novel solution for decomposing and distributing the end-to-end 360 video streaming service across three computing tiers, namely cloud, edge and constrained fog, in order of proximity to the end user client. The streaming service is aided with an adaptive viewport technique. The proposed solution is based on the H2020 5G-CORAL system architecture using micro-services-based design and a unified orchestration and control across all three tiers based on Fog05. Performance evaluation of the proposed solution shows noticeable reduction in bandwidth consumption, energy consumption, and deployment costs, as compared to a solution where the streaming service is all delivered out of one computing location such as the Cloud.
基于360视频流的沉浸式视频应用不仅需要高带宽、高可靠性和低延迟的5G连接,还需要灵活、低延迟和经济高效的计算部署。本文提出了一种新的解决方案,将端到端360视频流服务按接近终端用户客户端的顺序,在云、边缘和约束雾三个计算层进行分解和分发。流媒体服务是辅助自适应视口技术。提出的解决方案基于H2020 5G-CORAL系统架构,采用基于微服务的设计和基于Fog05的三层统一编排和控制。与所有流媒体服务都从一个计算位置(如云)交付的解决方案相比,所提议的解决方案的性能评估显示,在带宽消耗、能源消耗和部署成本方面明显减少。
{"title":"An Edge and Fog Computing Platform for Effective Deployment of 360 Video Applications","authors":"G. Rigazzi, Jani-Pekka Kainulainen, C. Turyagyenda, Alain A. M. Mourad, Jaehyun Ahn","doi":"10.1109/WCNCW.2019.8902860","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902860","url":null,"abstract":"Immersive video applications based on 360 video streaming require high-bandwidth, high-reliability and low-latency 5G connectivity but also flexible, low-latency and cost-effective computing deployment. This paper proposes a novel solution for decomposing and distributing the end-to-end 360 video streaming service across three computing tiers, namely cloud, edge and constrained fog, in order of proximity to the end user client. The streaming service is aided with an adaptive viewport technique. The proposed solution is based on the H2020 5G-CORAL system architecture using micro-services-based design and a unified orchestration and control across all three tiers based on Fog05. Performance evaluation of the proposed solution shows noticeable reduction in bandwidth consumption, energy consumption, and deployment costs, as compared to a solution where the streaming service is all delivered out of one computing location such as the Cloud.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"43 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113973529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
EMF-reduction Uplink Resource Allocation Scheme for Non-Orthogonal Multiple Access Systems 非正交多址系统的消emf上行资源分配方案
Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902807
M. Jamshed, O. Amjad, F. Héliot, T. Brown
The increasing number of users and the demand for higher data rate due to multimedia services, requires high capacity/bandwidth, low latency and high quality of service (QoS). In turn, some of these requirements have/will lead to the deployment of numerous new access points. Given that wireless communication systems utilize radio frequency (RF) waves to operate, more users and more access points imply more electromagnetic field (EMF) exposure. Meanwhile, the possible health consequences of EMF exposure from these systems are progressively becoming a major concern due to their ever growing ubiquity and increased transmission power. In an endeavor to reduce the EMF exposure due to wireless communication systems, we design an optimization scheme for minimizing the EMF exposure of users in the uplink of non-orthogonal multiple access (NOMA) systems, while satisfying each user with an acceptable QoS. We define EMF minimization strategy as a convex optimization problem and iteratively solve it by assigning bits to each user. Each subcarrier is strategically allocated to a group of users having minimum interference and is found by using the classic binary search algorithm. Simulation results depict that our proposed strategy provides a reduction of at least 1 order of magnitude in terms of EMF exposure, while satisfying QoS constraints, in comparison with the state-of-art techniques in the literature.
随着用户数量的增加和多媒体业务对数据速率的要求越来越高,对高容量/带宽、低延迟和高服务质量(QoS)提出了更高的要求。反过来,其中一些需求已经/将导致部署许多新的接入点。鉴于无线通信系统利用射频(RF)波来运行,更多的用户和更多的接入点意味着更多的电磁场(EMF)暴露。与此同时,由于这些系统的日益普及和传输功率的增加,接触电磁场可能造成的健康后果正逐渐成为一个主要问题。为了减少无线通信系统的EMF暴露,我们设计了一种优化方案,以最大限度地减少非正交多址(NOMA)系统上行链路中用户的EMF暴露,同时满足每个用户可接受的QoS。我们将EMF最小化策略定义为一个凸优化问题,并通过为每个用户分配比特来迭代求解。每个子载波被策略地分配给干扰最小的用户组,并使用经典的二叉搜索算法找到子载波。仿真结果表明,与文献中最先进的技术相比,我们提出的策略在满足QoS约束的同时,在EMF暴露方面至少降低了1个数量级。
{"title":"EMF-reduction Uplink Resource Allocation Scheme for Non-Orthogonal Multiple Access Systems","authors":"M. Jamshed, O. Amjad, F. Héliot, T. Brown","doi":"10.1109/WCNCW.2019.8902807","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902807","url":null,"abstract":"The increasing number of users and the demand for higher data rate due to multimedia services, requires high capacity/bandwidth, low latency and high quality of service (QoS). In turn, some of these requirements have/will lead to the deployment of numerous new access points. Given that wireless communication systems utilize radio frequency (RF) waves to operate, more users and more access points imply more electromagnetic field (EMF) exposure. Meanwhile, the possible health consequences of EMF exposure from these systems are progressively becoming a major concern due to their ever growing ubiquity and increased transmission power. In an endeavor to reduce the EMF exposure due to wireless communication systems, we design an optimization scheme for minimizing the EMF exposure of users in the uplink of non-orthogonal multiple access (NOMA) systems, while satisfying each user with an acceptable QoS. We define EMF minimization strategy as a convex optimization problem and iteratively solve it by assigning bits to each user. Each subcarrier is strategically allocated to a group of users having minimum interference and is found by using the classic binary search algorithm. Simulation results depict that our proposed strategy provides a reduction of at least 1 order of magnitude in terms of EMF exposure, while satisfying QoS constraints, in comparison with the state-of-art techniques in the literature.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"34 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121319598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy-Preservation Mechanisms for Smart Energy Metering Devices Based on Differential Privacy 基于差分隐私的智能计量设备隐私保护机制
Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902683
Alaa Gohar, F. Shafik, Frank Dürr, K. Rothermel, Amr H. El Mougy
This paper investigates the application of differential privacy to the Smart Grid. Due to the nature of the Smart Grid, data drawn from it can be used to predict individuals behaviours and actions inside their homes which is a huge privacy violation. We show an attack that is able to predict behaviour with up to 94.3% precision. Differential privacy masks the distinguishable features of the Smart Grid data, protecting users privacy and making their behaviour unpredictable. We propose a method which applies differential privacy without splitting the billing, and charges concurrently while keeping the cost unchanged.
本文研究了差分隐私在智能电网中的应用。由于智能电网的性质,从中提取的数据可用于预测个人在家中的行为和行动,这是对隐私的巨大侵犯。我们展示了一种能够以高达94.3%的精度预测行为的攻击。差异隐私掩盖了智能电网数据的可区分特征,保护了用户隐私并使他们的行为不可预测。我们提出了一种在不分割计费的情况下应用差异隐私,并在保持成本不变的情况下同时收费的方法。
{"title":"Privacy-Preservation Mechanisms for Smart Energy Metering Devices Based on Differential Privacy","authors":"Alaa Gohar, F. Shafik, Frank Dürr, K. Rothermel, Amr H. El Mougy","doi":"10.1109/WCNCW.2019.8902683","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902683","url":null,"abstract":"This paper investigates the application of differential privacy to the Smart Grid. Due to the nature of the Smart Grid, data drawn from it can be used to predict individuals behaviours and actions inside their homes which is a huge privacy violation. We show an attack that is able to predict behaviour with up to 94.3% precision. Differential privacy masks the distinguishable features of the Smart Grid data, protecting users privacy and making their behaviour unpredictable. We propose a method which applies differential privacy without splitting the billing, and charges concurrently while keeping the cost unchanged.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Energy Minimization of Delay-Constrained Offloading in Vehicular Edge Computing Networks 车辆边缘计算网络中时延约束卸载的能量最小化
Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902537
Tianyu Yang, Yao Zhu, Yulin Hu, R. Mathar
In this work, we study the energy efficiency problem in a vehicular edge computing network with delay sensitive tasks. We aim at minimizing the total energy consumption under the given delay constraints by jointly optimizing the offloading decisions and the computational resources. The resulting mixed integer non-convex problem is intractable to solve. To address the problem, it is reformulated into an equivalent tractable form and via relaxation it is transformed into a convex problem. Via simulations, the performance and the offloading behaviour of the proposed design are evaluated under various scenarios with different setups of vehicular density and delay limits.
在这项工作中,我们研究了具有延迟敏感任务的车辆边缘计算网络的能效问题。通过联合优化卸载决策和计算资源,以在给定的延迟约束下使总能耗最小为目标。由此产生的混合整数非凸问题是难以解决的。为了解决这个问题,将其重新表述为等效的可处理形式,并通过松弛将其转化为凸问题。通过仿真,在不同的车辆密度和延迟限制设置下,评估了所提出设计的性能和卸载行为。
{"title":"Energy Minimization of Delay-Constrained Offloading in Vehicular Edge Computing Networks","authors":"Tianyu Yang, Yao Zhu, Yulin Hu, R. Mathar","doi":"10.1109/WCNCW.2019.8902537","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902537","url":null,"abstract":"In this work, we study the energy efficiency problem in a vehicular edge computing network with delay sensitive tasks. We aim at minimizing the total energy consumption under the given delay constraints by jointly optimizing the offloading decisions and the computational resources. The resulting mixed integer non-convex problem is intractable to solve. To address the problem, it is reformulated into an equivalent tractable form and via relaxation it is transformed into a convex problem. Via simulations, the performance and the offloading behaviour of the proposed design are evaluated under various scenarios with different setups of vehicular density and delay limits.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115167987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Deep Learning Approach to Radio Signal Denoising 无线电信号去噪的深度学习方法
Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902756
Ebtesam Almazrouei, G. Gianini, Nawaf I. Almoosa, E. Damiani
This paper proposes a Deep Learning approach to radio signal de-noising. This approach is data-driven, thus it allows de-noising signals, corresponding to distinct protocols, without requiring explicit use of expert knowledge, in this way granting higher flexibility. The core component of the Artificial Neural Network architecture used in this work is a Convolutional De-noising AutoEncoder. We report about the performance of the system in spectrogram-based denoising of the protocol preamble across protocols of the IEEE 802.11 family, studied using simulation data. This approach can be used within a machine learning pipeline: the denoised data can be fed to a protocol classifier. A further perspective advantage of using the AutoEncoders in such a pipeline is that they can be co-trained with the downstream classifier (protocol detector), to optimize its accuracy.
本文提出了一种无线电信号去噪的深度学习方法。这种方法是数据驱动的,因此它允许去噪信号,对应于不同的协议,而不需要明确使用专家知识,以这种方式提供更高的灵活性。本工作中使用的人工神经网络架构的核心组件是卷积去噪自动编码器。我们报告了该系统在IEEE 802.11系列协议中基于频谱图的协议序言去噪的性能,并使用仿真数据进行了研究。这种方法可以在机器学习管道中使用:去噪的数据可以馈送到协议分类器。在这种管道中使用autoencoder的另一个优势是,它们可以与下游分类器(协议检测器)共同训练,以优化其准确性。
{"title":"A Deep Learning Approach to Radio Signal Denoising","authors":"Ebtesam Almazrouei, G. Gianini, Nawaf I. Almoosa, E. Damiani","doi":"10.1109/WCNCW.2019.8902756","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902756","url":null,"abstract":"This paper proposes a Deep Learning approach to radio signal de-noising. This approach is data-driven, thus it allows de-noising signals, corresponding to distinct protocols, without requiring explicit use of expert knowledge, in this way granting higher flexibility. The core component of the Artificial Neural Network architecture used in this work is a Convolutional De-noising AutoEncoder. We report about the performance of the system in spectrogram-based denoising of the protocol preamble across protocols of the IEEE 802.11 family, studied using simulation data. This approach can be used within a machine learning pipeline: the denoised data can be fed to a protocol classifier. A further perspective advantage of using the AutoEncoders in such a pipeline is that they can be co-trained with the downstream classifier (protocol detector), to optimize its accuracy.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116221650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Experimental Performance Evaluation of Improved Energy Detection under Noise Uncertainty in Low SNR Regime 低信噪比噪声不确定性下改进能量检测的实验性能评价
Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902613
Bansi Gajera, Dhaval K. Patel, Brijesh Soni, M. López-Benítez
Improved energy detection (IED) outperforms classical energy detection (CED) as it takes into consideration the statistics of past samples. However, imperfect knowledge of the noise referred to as noise uncertainty (NU) imposes fundamental limitation on the performance of the sensing scheme. NU is prone to degrade the detection performance particularly in the low signal to noise ratio (SNR) regime. In this paper, the analysis of IED under noise power uncertainty in low SNR regime is carried out validated based on the empirical spectrum data of the radio technologies captured using the experimental setup. Obtained results demonstrate that IED outperforms CED in presence of NU, at the cost of nominal increase in the computational time. A gain of 23.2% in the detection performance is observed while using IED over CED at 1 dB NU, 14.13% at 2 dB NU and 16.67% at 3 dB NU.
改进的能量检测(IED)由于考虑了过去样本的统计量而优于经典的能量检测(CED)。然而,对噪声的不完全了解(即噪声不确定性)对传感方案的性能造成了根本性的限制。在低信噪比条件下,NU容易降低检测性能。本文基于实验装置捕获的无线电技术的经验频谱数据,对低信噪比条件下IED的噪声功率不确定性分析进行了验证。得到的结果表明,在NU存在的情况下,IED优于CED,但代价是计算时间的名义增加。在1 dB NU、2 dB NU和3 dB NU下,使用IED在CED上的检测性能分别提高23.2%、14.13%和16.67%。
{"title":"Experimental Performance Evaluation of Improved Energy Detection under Noise Uncertainty in Low SNR Regime","authors":"Bansi Gajera, Dhaval K. Patel, Brijesh Soni, M. López-Benítez","doi":"10.1109/WCNCW.2019.8902613","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902613","url":null,"abstract":"Improved energy detection (IED) outperforms classical energy detection (CED) as it takes into consideration the statistics of past samples. However, imperfect knowledge of the noise referred to as noise uncertainty (NU) imposes fundamental limitation on the performance of the sensing scheme. NU is prone to degrade the detection performance particularly in the low signal to noise ratio (SNR) regime. In this paper, the analysis of IED under noise power uncertainty in low SNR regime is carried out validated based on the empirical spectrum data of the radio technologies captured using the experimental setup. Obtained results demonstrate that IED outperforms CED in presence of NU, at the cost of nominal increase in the computational time. A gain of 23.2% in the detection performance is observed while using IED over CED at 1 dB NU, 14.13% at 2 dB NU and 16.67% at 3 dB NU.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114892745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Conspiracy communication reconstitution from distributed instant messages timeline 基于分布式即时消息时间线的阴谋通信重构
Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902574
L. Nassif
In a cyber attack, several kinds of evidence must be verified to find the responsible. Seizing cell phones became a usual procedure in investigations and digital forensics may be demanded to verify conspiracies about the committed crime. The accelerated growth of cell phones as an indispensable accessory nowadays, followed by a massive adherence to Instant Messaging (IM) applications, has changed the way mankind is interacting virtually. Although IM applications provide several benefits for real-time contact and knowledge sharing, they are also used in private communications for illicit arrangements. When several cell phones are seized in a police operation, many communications using IM may be used as evidence of the committed crime. An investigator spends many hours trying to rearrange this conversation or reading repeated information. This work presents a solution to this problem, retrieving all conversations sequentially from a set of cell phones that participate in the same WhatsApp group. The solution is illustrated with a case study that validates the model and algorithm developed for this purpose. First results pointed to 52% decreasing of investigation effort in some situations.
在网络攻击中,必须核实几种证据才能找到责任人。在调查中,没收手机成为一种常见的程序,可能需要数字取证来核实犯罪的阴谋。如今,手机作为一种不可或缺的配件加速增长,随之而来的是对即时通讯(IM)应用程序的大规模坚持,改变了人类虚拟互动的方式。尽管即时通讯应用程序为实时联系和知识共享提供了一些好处,但它们也被用于非法安排的私人通信。当警方在一次行动中缴获几部手机时,许多使用即时通讯工具的通信可能被用作犯罪的证据。调查人员花很多时间试图重新安排这段对话或阅读重复的信息。这项工作为这个问题提供了一个解决方案,从一组参与同一WhatsApp组的手机中按顺序检索所有对话。通过一个案例研究说明了解决方案,该案例研究验证了为此目的开发的模型和算法。第一个结果指出,在某些情况下,调查工作量减少了52%。
{"title":"Conspiracy communication reconstitution from distributed instant messages timeline","authors":"L. Nassif","doi":"10.1109/WCNCW.2019.8902574","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902574","url":null,"abstract":"In a cyber attack, several kinds of evidence must be verified to find the responsible. Seizing cell phones became a usual procedure in investigations and digital forensics may be demanded to verify conspiracies about the committed crime. The accelerated growth of cell phones as an indispensable accessory nowadays, followed by a massive adherence to Instant Messaging (IM) applications, has changed the way mankind is interacting virtually. Although IM applications provide several benefits for real-time contact and knowledge sharing, they are also used in private communications for illicit arrangements. When several cell phones are seized in a police operation, many communications using IM may be used as evidence of the committed crime. An investigator spends many hours trying to rearrange this conversation or reading repeated information. This work presents a solution to this problem, retrieving all conversations sequentially from a set of cell phones that participate in the same WhatsApp group. The solution is illustrated with a case study that validates the model and algorithm developed for this purpose. First results pointed to 52% decreasing of investigation effort in some situations.","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127217913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Open 5G NFV Platform for Smart City Applications Using Network Softwarization 基于网络软件的开放式5G NFV智慧城市应用平台
Pub Date : 2019-04-01 DOI: 10.1109/WCNCW.2019.8902853
A. P. Silva, Monchai Bunyakitanon, R. Vassallo, R. Nejabati, D. Simeonidou
Advanced wireless communication network testbeds are now widely being deployed around European and cross-continental. This represents an interesting opportunity for vertical industry and academia to perform experimentation and validation before a real deployment. In this paper, we present 5GinFIRE as a suitably flexible platform towards open 5G (Network Function Virtualization (NFV) ecosystem and playground. On top of this platform, we designed and deployed a smart city safety system as a vertical use case, exploring 5G capabilities through a combination of NFV and machine learning to provide end-to-end communication and low latency smart city service. This safety system helps detecting criminals along the city and sending a notification to the security center. A Virtual Network Function (VNF) has been developed to enable video transcoding, face detection and recognition at the cloud or the edge of the network. The validation of the overall system is performed through the deployment of the use case indoor (Smart Internet Lab) and outdoor (Millennium Square Bristol). We show the VNF specification and present a quantitative analysis in terms of bandwidth, response time, processing time and transmission speed in terms of Quality of Experience (QoE).
先进的无线通信网络试验台现已广泛部署在欧洲和跨大陆。这为垂直行业和学术界提供了一个有趣的机会,可以在真正部署之前进行实验和验证。在本文中,我们提出了5GinFIRE作为开放5G(网络功能虚拟化(NFV)生态系统和游乐场的适当灵活的平台。在此平台之上,我们设计并部署了一个智慧城市安全系统作为垂直用例,通过NFV和机器学习的结合探索5G功能,提供端到端通信和低延迟的智慧城市服务。这个安全系统可以帮助侦测城市中的罪犯,并向安全中心发送通知。一种虚拟网络功能(VNF)已经被开发出来,可以在云端或网络边缘实现视频转码、人脸检测和识别。整个系统的验证通过室内(智能互联网实验室)和室外(布里斯托尔千禧广场)的用例部署来执行。我们展示了VNF规范,并根据体验质量(QoE)对带宽、响应时间、处理时间和传输速度进行了定量分析。
{"title":"An Open 5G NFV Platform for Smart City Applications Using Network Softwarization","authors":"A. P. Silva, Monchai Bunyakitanon, R. Vassallo, R. Nejabati, D. Simeonidou","doi":"10.1109/WCNCW.2019.8902853","DOIUrl":"https://doi.org/10.1109/WCNCW.2019.8902853","url":null,"abstract":"Advanced wireless communication network testbeds are now widely being deployed around European and cross-continental. This represents an interesting opportunity for vertical industry and academia to perform experimentation and validation before a real deployment. In this paper, we present 5GinFIRE as a suitably flexible platform towards open 5G (Network Function Virtualization (NFV) ecosystem and playground. On top of this platform, we designed and deployed a smart city safety system as a vertical use case, exploring 5G capabilities through a combination of NFV and machine learning to provide end-to-end communication and low latency smart city service. This safety system helps detecting criminals along the city and sending a notification to the security center. A Virtual Network Function (VNF) has been developed to enable video transcoding, face detection and recognition at the cloud or the edge of the network. The validation of the overall system is performed through the deployment of the use case indoor (Smart Internet Lab) and outdoor (Millennium Square Bristol). We show the VNF specification and present a quantitative analysis in terms of bandwidth, response time, processing time and transmission speed in terms of Quality of Experience (QoE).","PeriodicalId":121352,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127444461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1