Pub Date : 2016-07-07DOI: 10.1109/ICACT.2016.7423412
Sejun Lee, J. Jeong, Jungsoo Park
This paper proposes a DNS Name Autoconfiguration (called DNSNA) for not only the global DNS names, but also the local DNS names of Internet of Things (IoT) devices. Since there exist so many devices in the IoT environments, it is inefficient to manually configure the Domain Name System (DNS) names of such IoT devices. By this scheme, the DNS names of IoT devices can be autoconfigured with the device's category and model in IPv6-based IoT environments. This DNS name lets user easily identify each IoT device for monitoring and remote-controlling in IoT environments. In the procedure to generate and register an IoT device's DNS name, the standard protocols of Internet Engineering Task Force (IETF) are used. Since the proposed scheme resolves an IoT device's DNS name into an IPv6 address in unicast through an authoritative DNS server, it generates less traffic than Multicast DNS (mDNS), which is a legacy DNS application for the DNS name service in IoT environments. Thus, the proposed scheme is more appropriate in global IoT networks than mDNS. This paper explains the design of the proposed scheme and its service scenario, such as smart road and smart home. The results of the simulation prove that our proposal outperforms the legacy scheme in terms of energy consumption.
本文提出了一种DNS名称自动配置方法(简称DNSNA),不仅适用于全局DNS名称,也适用于物联网设备的本地DNS名称。由于物联网环境中存在大量设备,手动配置物联网设备的DNS (Domain Name System)名称效率不高。通过该方案,在基于ipv6的物联网环境中,物联网设备的DNS名称可以根据设备的类别和型号自动配置。此DNS名称可让用户轻松识别IoT环境中用于监控和远程控制的每个IoT设备。在物联网设备的DNS名称生成和注册过程中,使用的是IETF (Internet Engineering Task Force)的标准协议。由于所提出的方案通过权威DNS服务器将物联网设备的DNS名称解析为单播IPv6地址,因此它比多播DNS (mDNS)产生的流量更少,mDNS是物联网环境中用于DNS名称服务的传统DNS应用程序。因此,该方案比mDNS更适合于全球物联网网络。本文阐述了所提出方案的设计思路及其服务场景,如智能道路、智能家居等。仿真结果证明,我们的方案在能耗方面优于传统方案。
{"title":"DNSNA: DNS name autoconfiguration for Internet of Things devices","authors":"Sejun Lee, J. Jeong, Jungsoo Park","doi":"10.1109/ICACT.2016.7423412","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423412","url":null,"abstract":"This paper proposes a DNS Name Autoconfiguration (called DNSNA) for not only the global DNS names, but also the local DNS names of Internet of Things (IoT) devices. Since there exist so many devices in the IoT environments, it is inefficient to manually configure the Domain Name System (DNS) names of such IoT devices. By this scheme, the DNS names of IoT devices can be autoconfigured with the device's category and model in IPv6-based IoT environments. This DNS name lets user easily identify each IoT device for monitoring and remote-controlling in IoT environments. In the procedure to generate and register an IoT device's DNS name, the standard protocols of Internet Engineering Task Force (IETF) are used. Since the proposed scheme resolves an IoT device's DNS name into an IPv6 address in unicast through an authoritative DNS server, it generates less traffic than Multicast DNS (mDNS), which is a legacy DNS application for the DNS name service in IoT environments. Thus, the proposed scheme is more appropriate in global IoT networks than mDNS. This paper explains the design of the proposed scheme and its service scenario, such as smart road and smart home. The results of the simulation prove that our proposal outperforms the legacy scheme in terms of energy consumption.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115389993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423508
Sang Ju Lee, Hyeon Yang, Jeong sik Kim, S. Choi
In this paper, we propose a supply and demand management system based on information on the power consumption pattern analysis and the tariff for HEMS(Home Energy Management System) of KEPCO(Korea Electric Power COrporation) for cost minimization. The scheduler of a supply and demand management system decides the curtailment level for the dropped appliances based on information about the predicted power consumption amount, the predicted renewable energy generation amount, and the tariff. We get the effect of the cost minimization on power consumption for home area user using constraints to decide the optimal curtailment level.
{"title":"Supply and demand management system based on consumption pattern analysis and tariff for cost minimization","authors":"Sang Ju Lee, Hyeon Yang, Jeong sik Kim, S. Choi","doi":"10.1109/ICACT.2016.7423508","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423508","url":null,"abstract":"In this paper, we propose a supply and demand management system based on information on the power consumption pattern analysis and the tariff for HEMS(Home Energy Management System) of KEPCO(Korea Electric Power COrporation) for cost minimization. The scheduler of a supply and demand management system decides the curtailment level for the dropped appliances based on information about the predicted power consumption amount, the predicted renewable energy generation amount, and the tariff. We get the effect of the cost minimization on power consumption for home area user using constraints to decide the optimal curtailment level.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115402013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423597
S. Moon, G. Gweon, Ho-Jin Choi, Jeong Heo
Paraphrase evaluation is used to determine whether two input sentences share a same meaning. The automatic analysis for paraphrase evaluation technology has a potential use in the area of information retrieval technology since correctly paraphrased sentences can be used as alternative input sentences in the retrieval process. In this paper, we suggest an automatic paraphrase evaluation method using morphological analysis (APEM), which is suitable for the Korean language. Using APEM and its variations, we present preliminary results on how our automatic evaluation scores compare to the existing method of bilingual evaluation understudy (BLEU).
{"title":"APEM: Automatic paraphrase evaluation using morphological analysis for the Korean language","authors":"S. Moon, G. Gweon, Ho-Jin Choi, Jeong Heo","doi":"10.1109/ICACT.2016.7423597","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423597","url":null,"abstract":"Paraphrase evaluation is used to determine whether two input sentences share a same meaning. The automatic analysis for paraphrase evaluation technology has a potential use in the area of information retrieval technology since correctly paraphrased sentences can be used as alternative input sentences in the retrieval process. In this paper, we suggest an automatic paraphrase evaluation method using morphological analysis (APEM), which is suitable for the Korean language. Using APEM and its variations, we present preliminary results on how our automatic evaluation scores compare to the existing method of bilingual evaluation understudy (BLEU).","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122250722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423318
W. Ding, ZhiMin Gu
Recently, research community has advanced in type reconstruction technology for reverse engineering. However, emerging with obfuscated technology, data type reconstruction grows more and more difficult, and obfuscated code is easier to be monitored and analyzed by attacker or hacker. Therefore, it's essential to develop a novel approach to reverse engineering obfuscated array type based on refined CFG. We take split array for example and analyze feature in CFG and take advantage of compiler algorithm to identify obfuscated array.
{"title":"A reverse engineering approach of obfuscated array","authors":"W. Ding, ZhiMin Gu","doi":"10.1109/ICACT.2016.7423318","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423318","url":null,"abstract":"Recently, research community has advanced in type reconstruction technology for reverse engineering. However, emerging with obfuscated technology, data type reconstruction grows more and more difficult, and obfuscated code is easier to be monitored and analyzed by attacker or hacker. Therefore, it's essential to develop a novel approach to reverse engineering obfuscated array type based on refined CFG. We take split array for example and analyze feature in CFG and take advantage of compiler algorithm to identify obfuscated array.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128959679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423296
Raja Jabir, S. Khanji, Liza Ahmad, O. Alfandi, Huwida E. Said
Business enterprises are competing to get their applications up and running faster with improved manageability and less maintenance by reassigning the ability to IT specialists to adjust resources in order to meet business fluctuating needs. This can be achieved through utilizing the Cloud Computing Model which is distinguished by `pay as you go' model. The model offers solutions of storage, convenient and on-demand access to a shared pool of configurable computing resources. As with any novel technology, Cloud Computing is subject to security threats and vulnerabilities including network threats, information threats and underlying infrastructure threats. In this paper, we present a framework by which penetration testing is conducted to highlight possible vulnerabilities within our private Cloud Computing infrastructure, simulate attacks to exploit discovered vulnerabilities such as Denial of Service (DoS) and Man-in-the-Cloud attacks, apply countermeasures to prevent such attacks, and then to exemplify a recommended best practice protection mechanism which will contribute to the Cloud Computing security.
{"title":"Analysis of cloud computing attacks and countermeasures","authors":"Raja Jabir, S. Khanji, Liza Ahmad, O. Alfandi, Huwida E. Said","doi":"10.1109/ICACT.2016.7423296","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423296","url":null,"abstract":"Business enterprises are competing to get their applications up and running faster with improved manageability and less maintenance by reassigning the ability to IT specialists to adjust resources in order to meet business fluctuating needs. This can be achieved through utilizing the Cloud Computing Model which is distinguished by `pay as you go' model. The model offers solutions of storage, convenient and on-demand access to a shared pool of configurable computing resources. As with any novel technology, Cloud Computing is subject to security threats and vulnerabilities including network threats, information threats and underlying infrastructure threats. In this paper, we present a framework by which penetration testing is conducted to highlight possible vulnerabilities within our private Cloud Computing infrastructure, simulate attacks to exploit discovered vulnerabilities such as Denial of Service (DoS) and Man-in-the-Cloud attacks, apply countermeasures to prevent such attacks, and then to exemplify a recommended best practice protection mechanism which will contribute to the Cloud Computing security.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129735378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423324
Gui-lin Cai, Baosheng Wang, Yuebin Luo, Sudan Li, Xiaofeng Wang
Moving Target Defense (MTD) has been proposed as a game-changing theme to increase the work effort to attack as well as the security of target system. There has been proposed a multitude of MTD mechanisms. Generally, these mechanisms follow some fundamental running patterns which determine their functionalities. In this paper, we introduce three main schools of thought on MTD mechanisms systematically and categorize the related works according to them. Then we identify and define three fundamental running patterns exhibited by these MTD mechanisms. Thereafter, we use five MTD mechanisms, which belong to the three schools of thought, as cases to confirm the patterns presented. This work can help the novices of this field to understand the running behaviours of MTDs better and easier, and can also give developers design guidance of new MTD system by providing insights of the running patterns.
{"title":"Characterizing the running patterns of moving target defense mechanisms","authors":"Gui-lin Cai, Baosheng Wang, Yuebin Luo, Sudan Li, Xiaofeng Wang","doi":"10.1109/ICACT.2016.7423324","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423324","url":null,"abstract":"Moving Target Defense (MTD) has been proposed as a game-changing theme to increase the work effort to attack as well as the security of target system. There has been proposed a multitude of MTD mechanisms. Generally, these mechanisms follow some fundamental running patterns which determine their functionalities. In this paper, we introduce three main schools of thought on MTD mechanisms systematically and categorize the related works according to them. Then we identify and define three fundamental running patterns exhibited by these MTD mechanisms. Thereafter, we use five MTD mechanisms, which belong to the three schools of thought, as cases to confirm the patterns presented. This work can help the novices of this field to understand the running behaviours of MTDs better and easier, and can also give developers design guidance of new MTD system by providing insights of the running patterns.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134136905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423559
Karandeep Singh, M. Sajjad, Euihyun Paik, Chang-Won Ahn
Many countries of the world have seen fertility rate declines. Sincere efforts have been made by the governments to change this trend. But still, countries like Korea & Japan are facing the problem of fertility rates well below the replacement fertility rates. Modeling and simulation offer a good way of understanding the dynamics of population. Of late, agent based modeling (ABM) has gained quite a lot of popularity in the field of simulation. We propose an actual population data fed agent based model whereby the agents in the simulation would take as input the actual census data and simulate the population fertility dynamics. Fertility rates are the main measures of population change. We will try and understand how fertility evolves by taking into various factors such as age, income, expenditure, social benefits; from the micro to macro level. The decisions of the agents, such as to get married and then have certain number of children, would be based on these factors. The fertility is predicted by accessing number of children a couple would have in the child bearing age. We hope to analyze and understand the effect of factors such as social benefits by this model.
{"title":"Simulating demography — Dynamics of fertility using a multi agent model","authors":"Karandeep Singh, M. Sajjad, Euihyun Paik, Chang-Won Ahn","doi":"10.1109/ICACT.2016.7423559","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423559","url":null,"abstract":"Many countries of the world have seen fertility rate declines. Sincere efforts have been made by the governments to change this trend. But still, countries like Korea & Japan are facing the problem of fertility rates well below the replacement fertility rates. Modeling and simulation offer a good way of understanding the dynamics of population. Of late, agent based modeling (ABM) has gained quite a lot of popularity in the field of simulation. We propose an actual population data fed agent based model whereby the agents in the simulation would take as input the actual census data and simulate the population fertility dynamics. Fertility rates are the main measures of population change. We will try and understand how fertility evolves by taking into various factors such as age, income, expenditure, social benefits; from the micro to macro level. The decisions of the agents, such as to get married and then have certain number of children, would be based on these factors. The fertility is predicted by accessing number of children a couple would have in the child bearing age. We hope to analyze and understand the effect of factors such as social benefits by this model.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130901085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423282
Wen-Kuei Hsieh, W. Hsieh, Jiann-Liang Chen, Chun-Yi Lin
The rapid development of wireless communication technology facilitates the realization of the Internet of Things (IOT). Self-configuration and smart connection system have become relative important issue in accordance with extensive applications of IOT, and the energy saving concepts. Therefore, this work presents the integration of `Self-configuration and Wisdom Connection System' with Wireless Sensor Networks (WSN), IOT and ZigBee technology, to actualize self-configuration based on a received signal strength indicator Received Signal Strength Indicator (RSSI), lighting auto-configuration area, regional allocation, and sub-areas. The proposed `Self-configuration and Wisdom Connection System' automatically configures different lightings to the same position within in the range -3dBm when the RSSI value varies only slightly. The system is configured to the same lighting site within the experimental environment when the sub-area range set -3dBm. This study presents a significant contribution to new configuration of objects in IOT, context awareness control, and optimization of network control platform.
{"title":"Self-configuration and smart binding control on IOT applications","authors":"Wen-Kuei Hsieh, W. Hsieh, Jiann-Liang Chen, Chun-Yi Lin","doi":"10.1109/ICACT.2016.7423282","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423282","url":null,"abstract":"The rapid development of wireless communication technology facilitates the realization of the Internet of Things (IOT). Self-configuration and smart connection system have become relative important issue in accordance with extensive applications of IOT, and the energy saving concepts. Therefore, this work presents the integration of `Self-configuration and Wisdom Connection System' with Wireless Sensor Networks (WSN), IOT and ZigBee technology, to actualize self-configuration based on a received signal strength indicator Received Signal Strength Indicator (RSSI), lighting auto-configuration area, regional allocation, and sub-areas. The proposed `Self-configuration and Wisdom Connection System' automatically configures different lightings to the same position within in the range -3dBm when the RSSI value varies only slightly. The system is configured to the same lighting site within the experimental environment when the sub-area range set -3dBm. This study presents a significant contribution to new configuration of objects in IOT, context awareness control, and optimization of network control platform.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129574245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423299
Fan Yang, Xin Wang
In this paper, semi-orthogonal frequency multiplexing (SOFDM) is proposed, which has doubled spectral efficiency over OFDM by halving the subcarrier spacing. SOFDM is orthogonal in real field but non-orthogonal in complex field. To cancel the inter carrier interference caused by non-orthogonality, linear equalization algorithms are introduced based on inter carrier cross-correlation matrix. However SOFDM still suffer a performance loss due to the white noise power amplification effect of linear equalization. To further improve the performance, by use of the special property of inter carrier cross-correlation matrix, complementary SOFDM is provided, which is orthogonal in both real and complex field. It has identical spectral efficiency with OFDM but obtain a diversity gain in fading channel. And a HARQ-style flexible complementary SOFDM is introduced, which can obtain not only performance gain but also spectral efficiency gain.
{"title":"A novel multi-carrier waveform with high spectral efficiency: Semi-orthogonal frequency division multiplexing","authors":"Fan Yang, Xin Wang","doi":"10.1109/ICACT.2016.7423299","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423299","url":null,"abstract":"In this paper, semi-orthogonal frequency multiplexing (SOFDM) is proposed, which has doubled spectral efficiency over OFDM by halving the subcarrier spacing. SOFDM is orthogonal in real field but non-orthogonal in complex field. To cancel the inter carrier interference caused by non-orthogonality, linear equalization algorithms are introduced based on inter carrier cross-correlation matrix. However SOFDM still suffer a performance loss due to the white noise power amplification effect of linear equalization. To further improve the performance, by use of the special property of inter carrier cross-correlation matrix, complementary SOFDM is provided, which is orthogonal in both real and complex field. It has identical spectral efficiency with OFDM but obtain a diversity gain in fading channel. And a HARQ-style flexible complementary SOFDM is introduced, which can obtain not only performance gain but also spectral efficiency gain.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICACT.2016.7423499
B. Hui, Junhyeong Kim, H. Chung, I. Kim, Hoon Lee
Since the high-speed rail (HSR) communications are suffering from the huge Doppler shift, an efficient Doppler mitigation method is proposed in this paper. The proposed method mainly concerns about the mitigation of Doppler shift in OFDM based systems, especially for the case of employing mmWave with very high mobility. The proposed method can be used for both downlink and uplink of the system and it is quite robust to the time-varying mobility. Furthermore, the pilot-aided channel estimation for Doppler compensation is not necessary in most of the cases, which indicates the pilot density in time-domain can be reduced. Simulation results show that by using the proposed method, the residual Doppler shift can be compressed to 0 Hz with the probability of 90%.
{"title":"Efficient Doppler mitigation for high-speed rail communications","authors":"B. Hui, Junhyeong Kim, H. Chung, I. Kim, Hoon Lee","doi":"10.1109/ICACT.2016.7423499","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423499","url":null,"abstract":"Since the high-speed rail (HSR) communications are suffering from the huge Doppler shift, an efficient Doppler mitigation method is proposed in this paper. The proposed method mainly concerns about the mitigation of Doppler shift in OFDM based systems, especially for the case of employing mmWave with very high mobility. The proposed method can be used for both downlink and uplink of the system and it is quite robust to the time-varying mobility. Furthermore, the pilot-aided channel estimation for Doppler compensation is not necessary in most of the cases, which indicates the pilot density in time-domain can be reduced. Simulation results show that by using the proposed method, the residual Doppler shift can be compressed to 0 Hz with the probability of 90%.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115063961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}