Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798853
G. N. Iyer, P. Kong
This paper proposes a cooperative retransmission scheme B-Coop implemented at the MAC layer in wireless networks. Cooperative retransmissions can be viewed as a way to achieve virtual space-time diversity without any modification to the wireless physical layer. We model nodes in the wireless network as selfish and rational users, and apply principles of game theory to enforce cooperative retransmissions in a distributed manner. We also consider that nodes cannot always observe other nodes' actions perfectly, in order to make the decision whether to cooperate with others. Hence our scheme is based on imperfect private monitoring and it shows the existence of an efficient belief-based sequential equilibrium under certain conditions. B-Coop enforces cooperation among nodes by creating a fear of punishment and it achieves scalability by reducing an N-player game into a 2-player game, which is novel according to existing literature. Well-defined utility functions are formed to improve the throughput and energy expenditure of the nodes in the network. Through extensive simulations, we show that B-Coop achieves increased throughput with less retransmissions and less energy expenditure. We verified using simulations that our proposed B-Coop scheme achieves better throughput and energy expenditure values.
{"title":"B-Coop: A Novel Cooperation Enforcement Scheme for Wireless Networks","authors":"G. N. Iyer, P. Kong","doi":"10.1109/ICT.2019.8798853","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798853","url":null,"abstract":"This paper proposes a cooperative retransmission scheme B-Coop implemented at the MAC layer in wireless networks. Cooperative retransmissions can be viewed as a way to achieve virtual space-time diversity without any modification to the wireless physical layer. We model nodes in the wireless network as selfish and rational users, and apply principles of game theory to enforce cooperative retransmissions in a distributed manner. We also consider that nodes cannot always observe other nodes' actions perfectly, in order to make the decision whether to cooperate with others. Hence our scheme is based on imperfect private monitoring and it shows the existence of an efficient belief-based sequential equilibrium under certain conditions. B-Coop enforces cooperation among nodes by creating a fear of punishment and it achieves scalability by reducing an N-player game into a 2-player game, which is novel according to existing literature. Well-defined utility functions are formed to improve the throughput and energy expenditure of the nodes in the network. Through extensive simulations, we show that B-Coop achieves increased throughput with less retransmissions and less energy expenditure. We verified using simulations that our proposed B-Coop scheme achieves better throughput and energy expenditure values.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128470592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798808
Chatuporn Duangthong, W. Phakphisut, P. Supnithi
The multi-level-cell (MLC) NAND flash memory can typically use multiple reads for obtaining soft information for the LDPC decoder. The multiple reads give the soft information which is quantized to a certain level. The major challenge is that the read voltages must be precisely selected to provide better soft information. In the previous work, the read voltages are selected so that the soft information has the maximum mutual information (MMI). However, the error-correction capability of LDPC decoder is not considered. Therefore, in this work, we analyze the performance of LDPC decoder by density evolution whereby the soft information is quantized. Then the optimal read voltages for given LDPC codes are obtained. As a result, for a regular LDPC code with the read voltages optimized by density evolution can provide the lower BER performance compared with the MMI technique.
{"title":"Read Voltage Optimization in MLC NAND Flash Memory via the Density Evolution","authors":"Chatuporn Duangthong, W. Phakphisut, P. Supnithi","doi":"10.1109/ICT.2019.8798808","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798808","url":null,"abstract":"The multi-level-cell (MLC) NAND flash memory can typically use multiple reads for obtaining soft information for the LDPC decoder. The multiple reads give the soft information which is quantized to a certain level. The major challenge is that the read voltages must be precisely selected to provide better soft information. In the previous work, the read voltages are selected so that the soft information has the maximum mutual information (MMI). However, the error-correction capability of LDPC decoder is not considered. Therefore, in this work, we analyze the performance of LDPC decoder by density evolution whereby the soft information is quantized. Then the optimal read voltages for given LDPC codes are obtained. As a result, for a regular LDPC code with the read voltages optimized by density evolution can provide the lower BER performance compared with the MMI technique.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128575018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798835
S. Khittiwitchayakul, W. Phakphisut, P. Supnithi
Spatially coupled low-density parity-check (SC-LDPC) codes are the attractive candidates for the application requiring a practical constraint on the latency and complexity. In previous works, the turbo equalization consisting the SC-LDPC window decoder and Bahl-Cocke-Jelinek-Raviv (BCJR) detector is used to tackle the inter-symbol interferences (ISIs) in the magnetic recording systems. However, the prior works consider only the SC-LDPC codes which replace the conventional LDPC block codes. In this work, we propose the modification of turbo equalization processing whereby both the SC-LDPC decoder and BCJR detector operate using the sliding window. The results show that the proposed turbo equalization schemes used in the partial response (PR) channel can provide better bit error rate (BER) performances than the conventional turbo equalization.
{"title":"Sliding-Window Processing of Turbo Equalization for Partial Response Channels","authors":"S. Khittiwitchayakul, W. Phakphisut, P. Supnithi","doi":"10.1109/ICT.2019.8798835","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798835","url":null,"abstract":"Spatially coupled low-density parity-check (SC-LDPC) codes are the attractive candidates for the application requiring a practical constraint on the latency and complexity. In previous works, the turbo equalization consisting the SC-LDPC window decoder and Bahl-Cocke-Jelinek-Raviv (BCJR) detector is used to tackle the inter-symbol interferences (ISIs) in the magnetic recording systems. However, the prior works consider only the SC-LDPC codes which replace the conventional LDPC block codes. In this work, we propose the modification of turbo equalization processing whereby both the SC-LDPC decoder and BCJR detector operate using the sliding window. The results show that the proposed turbo equalization schemes used in the partial response (PR) channel can provide better bit error rate (BER) performances than the conventional turbo equalization.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114907284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798788
Mat T. Nguyen, V. Mai, Chuyen T. Nguyen
Underwater optical wireless communication (UOWC) has recently gained attention as an emerging solution to the growing demand for high-speed underwater wireless communications. However, the performance of UOWC networks could be highly affected by the multi-node interference, especially in three-dimensional (3-D) network configuration. Characterizing the light propagation through an underwater channel that includes the interference effect is crucial to performance analysis and improvement of the networks. Taking into account this effect and the 3-D UOWC network configuration, we derive in this paper an approximation of the signal-to-interference-plus-noise ratio (SINR), which is a fundamental performance metric for design of network protocols. In the numerical results, Monte Carlo simulations are performed to validate the accuracy of theoretical derivation. Also, we show the dependence of SINR on various network factors such as water types, number of nodes, communication distance and transmission power.
{"title":"SINR Performance Analysis of 3-D Underwater Optical Wireless Communication Networks","authors":"Mat T. Nguyen, V. Mai, Chuyen T. Nguyen","doi":"10.1109/ICT.2019.8798788","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798788","url":null,"abstract":"Underwater optical wireless communication (UOWC) has recently gained attention as an emerging solution to the growing demand for high-speed underwater wireless communications. However, the performance of UOWC networks could be highly affected by the multi-node interference, especially in three-dimensional (3-D) network configuration. Characterizing the light propagation through an underwater channel that includes the interference effect is crucial to performance analysis and improvement of the networks. Taking into account this effect and the 3-D UOWC network configuration, we derive in this paper an approximation of the signal-to-interference-plus-noise ratio (SINR), which is a fundamental performance metric for design of network protocols. In the numerical results, Monte Carlo simulations are performed to validate the accuracy of theoretical derivation. Also, we show the dependence of SINR on various network factors such as water types, number of nodes, communication distance and transmission power.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127791403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798803
Shuyuan Zhao, Yongzheng Zhang, Yafei Sang
Traffic classification, as a fundamental tool for network management and security, is suffering from a critical problem, namely “unknown traffic”. The unknown traffic is defined as network traffic generated by previously unknown applications (i.e., zero-day applications) in a traffic classification system. The ability to divide the mixed unknown traffic into clusters, each of which contains only one application traffic as far as possible, is the key to solve this problem. This paper reports our recent exploration of the n-gram embeddings strategy, deep neural networks and clustering algorithms for constructing an unsupervised scheme for unknown network traffic identification. Experimental results on real-world traces demonstrate that our method gains average clustering purity rate about 97.35% when we use DNS, DHCP, BitTorrent, SSH, HTTP, IMAP, MySQL, and Github to simulate unknown traffic.
{"title":"Towards Unknown Traffic Identification via Embeddings and Deep Autoencoders","authors":"Shuyuan Zhao, Yongzheng Zhang, Yafei Sang","doi":"10.1109/ICT.2019.8798803","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798803","url":null,"abstract":"Traffic classification, as a fundamental tool for network management and security, is suffering from a critical problem, namely “unknown traffic”. The unknown traffic is defined as network traffic generated by previously unknown applications (i.e., zero-day applications) in a traffic classification system. The ability to divide the mixed unknown traffic into clusters, each of which contains only one application traffic as far as possible, is the key to solve this problem. This paper reports our recent exploration of the n-gram embeddings strategy, deep neural networks and clustering algorithms for constructing an unsupervised scheme for unknown network traffic identification. Experimental results on real-world traces demonstrate that our method gains average clustering purity rate about 97.35% when we use DNS, DHCP, BitTorrent, SSH, HTTP, IMAP, MySQL, and Github to simulate unknown traffic.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116816614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798856
Huy Nguyen, Hung Ngoc Do
Sign language has always been a major tool for communication among people with disabilities. In this paper, a sign language fingerspelling alphabet identification system would be developed by using image processing technique, supervised machine learning and deep learning. In particular, 24 alphabetical symbols are presented by several combinations of static gestures (excluding 2 motion gestures J and Z). Histogram of Oriented Gradients (HOG) and Local Binary Pattern (LBP) features of each gesture will be extracted from training images. Then Multiclass Support Vector Machines (SVMs) will be applied to train these extracted data. Also, an end-to-end Convolutional Neural Network (CNN) architecture will be applied to the training dataset for comparison. After that, a further combination of CNN as feature descriptor and SVM produces an acceptable result. The Massey Dataset is implemented in the training and testing phases of the whole system.
{"title":"Deep Learning for American Sign Language Fingerspelling Recognition System","authors":"Huy Nguyen, Hung Ngoc Do","doi":"10.1109/ICT.2019.8798856","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798856","url":null,"abstract":"Sign language has always been a major tool for communication among people with disabilities. In this paper, a sign language fingerspelling alphabet identification system would be developed by using image processing technique, supervised machine learning and deep learning. In particular, 24 alphabetical symbols are presented by several combinations of static gestures (excluding 2 motion gestures J and Z). Histogram of Oriented Gradients (HOG) and Local Binary Pattern (LBP) features of each gesture will be extracted from training images. Then Multiclass Support Vector Machines (SVMs) will be applied to train these extracted data. Also, an end-to-end Convolutional Neural Network (CNN) architecture will be applied to the training dataset for comparison. After that, a further combination of CNN as feature descriptor and SVM produces an acceptable result. The Massey Dataset is implemented in the training and testing phases of the whole system.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122326496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798792
Haolong Zhang, Amit Nayak, Haoye Lu
It is essential for many research fields to find the period of a data set. Many algorithms have been derived for solving related problems. Recently, scholars have reported that deep neural networks can achieve a performance similar to a human on image classification. In this paper, we report a period classification algorithm based on the convolutional neural networks (CNNs). We test its performance on the randomly-generated periodic time series data sets (PTSDs) that consist of periodic and polynomial components. Our results show that the algorithm can achieve 100% out-of-sample accuracy when the polynomial component of a PTSD does not dominate.
{"title":"Periodic Time Series Data Classification By Deep Neural Network","authors":"Haolong Zhang, Amit Nayak, Haoye Lu","doi":"10.1109/ICT.2019.8798792","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798792","url":null,"abstract":"It is essential for many research fields to find the period of a data set. Many algorithms have been derived for solving related problems. Recently, scholars have reported that deep neural networks can achieve a performance similar to a human on image classification. In this paper, we report a period classification algorithm based on the convolutional neural networks (CNNs). We test its performance on the randomly-generated periodic time series data sets (PTSDs) that consist of periodic and polynomial components. Our results show that the algorithm can achieve 100% out-of-sample accuracy when the polynomial component of a PTSD does not dominate.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116065606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798832
Caiyun Huang, Peng Zhang, Yong Sun, Yujia Zhu, Yang Liu
With the rapid growth of the Internet, concerns about the security of Domain Name System (DNS) have become prominent. DNS Hijacking is a typical threat which manipulates DNS resource records (RRs) to make users obtain wrong website server IPs through Cache Poisoning or Man-in-the-middle attack. In this paper, we propose a Self-Feedback Detection System (SFDS) deployed at Local Area Network (LAN) Gateway to protect users from visiting the wrong websites. SFDS: (i)finds the incorrect (Domain, IP) tuples in real-time to provide a correct (Domain, IP) tuple list for users, (ii)utilizes a multi-protocol cross validation method to verify suspicious (Domain, IP) tuples, (iii) applies self-feedback mechanism to calculate the correctness probabilities of (Domain, IP) tuples iteratively. We show that in real circumstance for two weeks, SFDS can find almost 1300 correct (Domain, IP) tuples for one domain on average in one day. And SFDS is effective with accuracy approximately 100% by our experiments.
{"title":"SFDS: A Self-Feedback Detection System for DNS Hijacking Based on Multi-Protocol Cross Validation","authors":"Caiyun Huang, Peng Zhang, Yong Sun, Yujia Zhu, Yang Liu","doi":"10.1109/ICT.2019.8798832","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798832","url":null,"abstract":"With the rapid growth of the Internet, concerns about the security of Domain Name System (DNS) have become prominent. DNS Hijacking is a typical threat which manipulates DNS resource records (RRs) to make users obtain wrong website server IPs through Cache Poisoning or Man-in-the-middle attack. In this paper, we propose a Self-Feedback Detection System (SFDS) deployed at Local Area Network (LAN) Gateway to protect users from visiting the wrong websites. SFDS: (i)finds the incorrect (Domain, IP) tuples in real-time to provide a correct (Domain, IP) tuple list for users, (ii)utilizes a multi-protocol cross validation method to verify suspicious (Domain, IP) tuples, (iii) applies self-feedback mechanism to calculate the correctness probabilities of (Domain, IP) tuples iteratively. We show that in real circumstance for two weeks, SFDS can find almost 1300 correct (Domain, IP) tuples for one domain on average in one day. And SFDS is effective with accuracy approximately 100% by our experiments.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116102571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798774
Trong-Hieu Le, L. Nguyen, Binh‐Duong Tran, X. Zhu
This paper presents two compact high performance bandpass filters using high quality $boldsymbol{Q}$-factor hybrid microstrip - coaxial resonator. In design, the hybrid resonator of proposed filters is composed of a microstrip line and a short-circuit coaxial line, which utilizes great use of space in the shielding box. Additionally, the unloaded quality factor of the proposed resonator is larger than 500, shows that a high value in comparison to the conventional microstrip resonator. Furthermore, by employing source-load coupling and mixed electromagnetic coupling scheme, two transmission zeros are generated to enhance the selectivity and the out-of-band rejection simultaneously. Finally, two second-order filters show the advantages such as small in size, high $boldsymbol{Q}$-factor and good rejection level as well as easy to integrate with other printed circuits, are designed, fabricated, and measured. The measured results are in good agreement with theory and simulations.
{"title":"Highly-selective and Compact Bandpass Filters Using Microstrip — Coaxial Resonator","authors":"Trong-Hieu Le, L. Nguyen, Binh‐Duong Tran, X. Zhu","doi":"10.1109/ICT.2019.8798774","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798774","url":null,"abstract":"This paper presents two compact high performance bandpass filters using high quality $boldsymbol{Q}$-factor hybrid microstrip - coaxial resonator. In design, the hybrid resonator of proposed filters is composed of a microstrip line and a short-circuit coaxial line, which utilizes great use of space in the shielding box. Additionally, the unloaded quality factor of the proposed resonator is larger than 500, shows that a high value in comparison to the conventional microstrip resonator. Furthermore, by employing source-load coupling and mixed electromagnetic coupling scheme, two transmission zeros are generated to enhance the selectivity and the out-of-band rejection simultaneously. Finally, two second-order filters show the advantages such as small in size, high $boldsymbol{Q}$-factor and good rejection level as well as easy to integrate with other printed circuits, are designed, fabricated, and measured. The measured results are in good agreement with theory and simulations.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125868596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-08DOI: 10.1109/ICT.2019.8798773
D. Nguyen, N. Karmakar, Mohammad Zomorrodi
A wide range of applications has been motivated by the development of millimeter wave (mm.wave) technology. Recently mm.wave spatial chipless RFID has been developed as an alternative method to conventional Chipless RFID technologies. In a spatial based chipless RFID system, the most critical requirement is the resolution of the surface tag which encodes the data. Narrow antenna beam-width is expected to obtain the high resolution. MIMO imaging has been proved as a high-resolution imaging method with a few number of antennas. In this paper, a new spatial chipless RFID reader based on mm.wave technology and MIMO technique is proposed to achieve a high-resolution image, compact design, and fast sensing. The proposed reader could achieve 5-mm resolution image of a 17-bit chipless tag which is the best resolution of a spatial chipless RFID system declared in the literature.
{"title":"Millimeter-wave Phased MIMO Reader for Spatial Chipless RFID System","authors":"D. Nguyen, N. Karmakar, Mohammad Zomorrodi","doi":"10.1109/ICT.2019.8798773","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798773","url":null,"abstract":"A wide range of applications has been motivated by the development of millimeter wave (mm.wave) technology. Recently mm.wave spatial chipless RFID has been developed as an alternative method to conventional Chipless RFID technologies. In a spatial based chipless RFID system, the most critical requirement is the resolution of the surface tag which encodes the data. Narrow antenna beam-width is expected to obtain the high resolution. MIMO imaging has been proved as a high-resolution imaging method with a few number of antennas. In this paper, a new spatial chipless RFID reader based on mm.wave technology and MIMO technique is proposed to achieve a high-resolution image, compact design, and fast sensing. The proposed reader could achieve 5-mm resolution image of a 17-bit chipless tag which is the best resolution of a spatial chipless RFID system declared in the literature.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125876208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}