首页 > 最新文献

2019 26th International Conference on Telecommunications (ICT)最新文献

英文 中文
ZF equalizer and trellis demodulator receiver for SEFDM in fading channels 衰落信道中SEFDM的ZF均衡器和栅格解调接收机
Pub Date : 2019-04-01 DOI: 10.1109/ICT.2019.8798843
A. Rashich, S. Gorbunov
The paper addresses the BER performance of nonorthogonal multicarrier (SEFDM, Spectrally Efficient Frequency Division Multiplexing) signals in LTE fading channels. The one tap ZF-equalizer and equivalent OFDM presentation of SEFDM signals is used to perform channel correction. Demodulation is done using trellis based demodulator. The proposed receiver structure has relatively low computation complexity compared to SEFDM demodulators which use sphere decoder. Thus the proposed receiver is applicable to SEFDM signals with high number of subcarriers as in WiFi, LTE, DVB-T2 systems. The resulting BER performance of SEFDM in various LTE fading channels using the proposed receiver is comparable with performance of QPSK OFDM with the same number of subcarriers. The analysis is done under assumption of perfect channel knowledge.
本文研究了LTE衰落信道中非正交多载波(SEFDM)信号的误码率性能。一分路zf均衡器和等效OFDM表示的SEFDM信号被用来执行信道校正。解调是使用基于栅格的解调器完成的。与采用球面解码器的SEFDM解调器相比,该接收机结构具有较低的计算复杂度。因此,该接收机适用于WiFi、LTE、DVB-T2系统中具有大量子载波的SEFDM信号。在各种LTE衰落信道中,SEFDM的误码率性能与具有相同子载波数量的QPSK OFDM的性能相当。分析是在渠道知识完备的假设下进行的。
{"title":"ZF equalizer and trellis demodulator receiver for SEFDM in fading channels","authors":"A. Rashich, S. Gorbunov","doi":"10.1109/ICT.2019.8798843","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798843","url":null,"abstract":"The paper addresses the BER performance of nonorthogonal multicarrier (SEFDM, Spectrally Efficient Frequency Division Multiplexing) signals in LTE fading channels. The one tap ZF-equalizer and equivalent OFDM presentation of SEFDM signals is used to perform channel correction. Demodulation is done using trellis based demodulator. The proposed receiver structure has relatively low computation complexity compared to SEFDM demodulators which use sphere decoder. Thus the proposed receiver is applicable to SEFDM signals with high number of subcarriers as in WiFi, LTE, DVB-T2 systems. The resulting BER performance of SEFDM in various LTE fading channels using the proposed receiver is comparable with performance of QPSK OFDM with the same number of subcarriers. The analysis is done under assumption of perfect channel knowledge.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130062232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Instantaneous and Average Throughput Maximization for Visible Light Communications 可见光通信的瞬时和平均吞吐量最大化
Pub Date : 2019-04-01 DOI: 10.1109/ICT.2019.8798813
Ghassan Alnwaimi, H. Boujemaa
In this paper, we suggest to maximize the instantaneous and average throughput of Visible Light Communications (VLC). Two approaches are presented: The first one uses the Instantaneous Signal to Noise Ratio (ISNR) to derive the Optimal Packet Length (OPL) that maximizes the instantaneous throughput. The second approach uses the Average Signal to Noise Ratio (ASNR) to derive the OPL that maximizes the average throughput. Instantaneous throughput maximization using OPL allows up to 4.5 dB gains with respect to fixed packet length. Average throughput maximization using OPL allows up to 1.5 dB gains with respect to fixed packet length.
在本文中,我们建议最大限度地提高可见光通信(VLC)的瞬时和平均吞吐量。提出了两种方法:第一种方法使用瞬时信噪比(ISNR)来获得最大瞬时吞吐量的最佳数据包长度(OPL)。第二种方法使用平均信噪比(ASNR)来得出最大平均吞吐量的OPL。使用OPL实现瞬时吞吐量最大化,相对于固定的数据包长度,可获得高达4.5 dB的增益。使用OPL实现平均吞吐量最大化,相对于固定的数据包长度,可获得高达1.5 dB的增益。
{"title":"Instantaneous and Average Throughput Maximization for Visible Light Communications","authors":"Ghassan Alnwaimi, H. Boujemaa","doi":"10.1109/ICT.2019.8798813","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798813","url":null,"abstract":"In this paper, we suggest to maximize the instantaneous and average throughput of Visible Light Communications (VLC). Two approaches are presented: The first one uses the Instantaneous Signal to Noise Ratio (ISNR) to derive the Optimal Packet Length (OPL) that maximizes the instantaneous throughput. The second approach uses the Average Signal to Noise Ratio (ASNR) to derive the OPL that maximizes the average throughput. Instantaneous throughput maximization using OPL allows up to 4.5 dB gains with respect to fixed packet length. Average throughput maximization using OPL allows up to 1.5 dB gains with respect to fixed packet length.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128614670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Functions-based CFG Embedding for Malware Homology Analysis 基于函数的CFG嵌入恶意软件同源性分析
Pub Date : 2019-04-01 DOI: 10.1109/ICT.2019.8798769
Jieran Liu, Yuan Shen, Hanbing Yan
Malware homology analysis aims at detecting whether different malicious code originates from the same set of malicious code or is written by the same author or team, and whether it has intrinsic relevance and similarity. At the same time, the homology analysis of malicious code is also an important part of studying the groups behind different APT (Advanced Persistent Threat) attacks. At present, homology identification still relies on manual analysis and security experts' experience in the anti-malware industry. In addition, research on large-scale malicious code automated homology analysis is still insufficient. The method proposed in this paper is to solve the problem of large-scale malicious code homology automatic analysis, and hope to provide auxiliary information for discovering the group behind the APT attack. In this paper, we collected samples of different APT groups from public threat intelligence and proposed a novel approach to classify these samples into different APT groups to further analyze the homology of malware. We combined the CFG (Control Flow Graph) of the malicious code function and the disassembled code of the stripped malware to generate the embedding, i.e., a numeric vector, which formed a function feature database of the APT group, and presented a neural network model used for APT group classification. We have implemented our approach in a prototype system called MCrab. Our extensive evaluation showed that MCrab could produce high accuracy results, with few to no false positives. Our research also showed that deep learning can be successfully applied to malware homology analysis.
恶意软件同源性分析的目的是检测不同的恶意代码是否来自同一组恶意代码,是否由同一作者或团队编写,是否具有内在的相关性和相似性。同时,恶意代码的同源性分析也是研究不同APT(高级持续威胁)攻击背后组织的重要组成部分。目前,在反恶意软件行业,同源性识别仍然依赖于人工分析和安全专家的经验。此外,对大规模恶意代码自动同源性分析的研究仍然不足。本文提出的方法是为了解决大规模恶意代码同源性自动分析的问题,希望为发现APT攻击背后的组织提供辅助信息。在本文中,我们从公共威胁情报中收集了不同APT组的样本,并提出了一种新的方法将这些样本分类到不同的APT组中,以进一步分析恶意软件的同源性。结合恶意代码函数的CFG (Control Flow Graph)和被剥离的恶意软件的反汇编代码生成嵌入,即一个数字向量,形成APT组的函数特征库,并提出用于APT组分类的神经网络模型。我们已经在一个叫做MCrab的原型系统中实现了我们的方法。我们的广泛评估表明,MCrab可以产生高精度的结果,几乎没有假阳性。我们的研究还表明,深度学习可以成功地应用于恶意软件的同源性分析。
{"title":"Functions-based CFG Embedding for Malware Homology Analysis","authors":"Jieran Liu, Yuan Shen, Hanbing Yan","doi":"10.1109/ICT.2019.8798769","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798769","url":null,"abstract":"Malware homology analysis aims at detecting whether different malicious code originates from the same set of malicious code or is written by the same author or team, and whether it has intrinsic relevance and similarity. At the same time, the homology analysis of malicious code is also an important part of studying the groups behind different APT (Advanced Persistent Threat) attacks. At present, homology identification still relies on manual analysis and security experts' experience in the anti-malware industry. In addition, research on large-scale malicious code automated homology analysis is still insufficient. The method proposed in this paper is to solve the problem of large-scale malicious code homology automatic analysis, and hope to provide auxiliary information for discovering the group behind the APT attack. In this paper, we collected samples of different APT groups from public threat intelligence and proposed a novel approach to classify these samples into different APT groups to further analyze the homology of malware. We combined the CFG (Control Flow Graph) of the malicious code function and the disassembled code of the stripped malware to generate the embedding, i.e., a numeric vector, which formed a function feature database of the APT group, and presented a neural network model used for APT group classification. We have implemented our approach in a prototype system called MCrab. Our extensive evaluation showed that MCrab could produce high accuracy results, with few to no false positives. Our research also showed that deep learning can be successfully applied to malware homology analysis.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123587178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhanced Data Rates for Energy Harvesting Systems 能量收集系统的增强数据速率
Pub Date : 2019-04-01 DOI: 10.1109/ICT.2019.8798817
Ghassan Alnwaimi, H. Boujemaa
In this article, we suggest to optimize packet length for energy harvesting systems. The network contains three nodes A, B, and C. Node B harvests energy from electromagnetic wave transmitted by A to communicate with node C. Packet length optimization allows to increase data rates. Two adaptation protocols are studied: In the first one, the adaptation of packet and Modulation and Coding Scheme (MCS) is made with respect to Average Signal to Noise Ratio (ASNR). In the second protocol, packet length and MCS are adapted to Instantaneous SNR (ISNR). Results show that packet length optimization allow 1–2 dB gain with respected to fixed packet length.
在本文中,我们建议优化能量收集系统的数据包长度。网络包含A、B、c三个节点。节点B从节点A传输的电磁波中获取能量,与节点c通信。数据包长度优化可以提高数据速率。研究了两种自适应协议:第一种协议是根据平均信噪比(ASNR)对分组和调制编码方案(MCS)进行自适应。在第二种协议中,数据包长度和MCS适应瞬时信噪比(ISNR)。结果表明,在固定包长度的情况下,优化包长度可获得1-2 dB增益。
{"title":"Enhanced Data Rates for Energy Harvesting Systems","authors":"Ghassan Alnwaimi, H. Boujemaa","doi":"10.1109/ICT.2019.8798817","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798817","url":null,"abstract":"In this article, we suggest to optimize packet length for energy harvesting systems. The network contains three nodes A, B, and C. Node B harvests energy from electromagnetic wave transmitted by A to communicate with node C. Packet length optimization allows to increase data rates. Two adaptation protocols are studied: In the first one, the adaptation of packet and Modulation and Coding Scheme (MCS) is made with respect to Average Signal to Noise Ratio (ASNR). In the second protocol, packet length and MCS are adapted to Instantaneous SNR (ISNR). Results show that packet length optimization allow 1–2 dB gain with respected to fixed packet length.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124140786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Performance of Regenerative Relaying for SWIPT in NOMA Systems NOMA系统中SWIPT再生中继性能研究
Pub Date : 2019-04-01 DOI: 10.1109/ICT.2019.8798786
H. Q. Tran, C. Phan, Quoc-Tuan Vien
As a potential access strategy in 5G mobile communication systems, non-orthogonal multiple access (NOMA) has been proposed as a supplement to the traditional orthogonal multiple access (OMA). This paper investigates simultaneous wireless information and power transfer (SWIPT) in a NOMA relaying system. The data is transferred from a source to two end terminals among which the one close to the source acts as a relay employing decode-and-forward protocol to assist the far-end one. In order to simultaneously harvest the energy and information processing at relay node, power-splitting relaying (PSR) and time switching-based relaying (TSR) protocols are sequentially considered. Outage probability and ergodic rate of both protocols are firstly analyzed to realize the impacts of various parameters including energy harvesting time, power splitting ratio, energy harvesting efficiency, source data rate, and the distance between the source and the relay node. Numerical results are then provided to validate the analytical findings. It is shown that the PSR outperforms the TSR at normal SNR regime in terms of throughput and ergodic rate.
非正交多址(NOMA)作为传统正交多址(OMA)的补充,被提出作为5G移动通信系统中一种潜在的接入策略。本文研究了NOMA中继系统中的同步无线信息与功率传输(SWIPT)。数据从源传输到两个终端,其中靠近源的终端作为采用解码转发协议的中继来辅助远端终端。为了同时获取中继节点的能量和信息处理,先后考虑了功率分割中继(PSR)和基于时间切换的中继(TSR)协议。首先分析了两种协议的中断概率和遍历率,实现了能量收集时间、功率分割比、能量收集效率、源数据速率以及源与中继节点之间的距离等参数的影响。然后提供数值结果来验证分析结果。结果表明,在正常信噪比下,PSR在吞吐量和遍历率方面优于TSR。
{"title":"On the Performance of Regenerative Relaying for SWIPT in NOMA Systems","authors":"H. Q. Tran, C. Phan, Quoc-Tuan Vien","doi":"10.1109/ICT.2019.8798786","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798786","url":null,"abstract":"As a potential access strategy in 5G mobile communication systems, non-orthogonal multiple access (NOMA) has been proposed as a supplement to the traditional orthogonal multiple access (OMA). This paper investigates simultaneous wireless information and power transfer (SWIPT) in a NOMA relaying system. The data is transferred from a source to two end terminals among which the one close to the source acts as a relay employing decode-and-forward protocol to assist the far-end one. In order to simultaneously harvest the energy and information processing at relay node, power-splitting relaying (PSR) and time switching-based relaying (TSR) protocols are sequentially considered. Outage probability and ergodic rate of both protocols are firstly analyzed to realize the impacts of various parameters including energy harvesting time, power splitting ratio, energy harvesting efficiency, source data rate, and the distance between the source and the relay node. Numerical results are then provided to validate the analytical findings. It is shown that the PSR outperforms the TSR at normal SNR regime in terms of throughput and ergodic rate.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126545867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Low Complexity Max-Min Uplink Power Control in Massive MIMO System with Experiment on Testbed 大规模MIMO系统的低复杂度最大最小上行功率控制与试验台实验
Pub Date : 2019-04-01 DOI: 10.1109/ICT.2019.8798805
Hiep Nguyen
In this paper, we propose a simple max-min power control scheme for Multi-User MIMO (MU-MIMO) in massive MIMO systems. We model and formulate the issue as a max-min fairness power control problem, which needs to be considered in order to provide good experienced service for users in the system. By exploiting the special properties of the solution, we are able to propose a very simple power control algorithm with complexity $mathcal{O}(M(N+M))$ where $M$ and $N$ are the number of users and base station antennas respectively. In addition, only the estimated channel response and maximum transmit power of each user are required as input information. We implement the proposed algorithm on a record-playback massive MIMO testbed to verify the performance in real environment. The result show that the received signal quality of the worst user is much more improved, and all users experience roughly the same level of quality of service. In addition, simulation is carried out to confirm the advantage of the proposed scheme in term of minimum spectral efficiency.
在本文中,我们提出了一种简单的多用户MIMO (MU-MIMO)的最大最小功率控制方案。我们将此问题建模为最大最小公平功率控制问题,并将其考虑为系统中的用户提供良好的体验服务。通过利用该解决方案的特殊性质,我们能够提出一个非常简单的功率控制算法,其复杂度为$mathcal{O}(M(N+M))$,其中$M$和$N$分别为用户和基站天线的数量。此外,只需要每个用户的信道响应估计和最大发射功率作为输入信息。为了验证该算法在真实环境下的性能,我们在一个记录回放的大规模MIMO测试平台上实现了该算法。结果表明,最差用户的接收信号质量得到了较大的改善,所有用户的服务质量水平大致相同。此外,通过仿真验证了该方案在最小频谱效率方面的优势。
{"title":"Low Complexity Max-Min Uplink Power Control in Massive MIMO System with Experiment on Testbed","authors":"Hiep Nguyen","doi":"10.1109/ICT.2019.8798805","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798805","url":null,"abstract":"In this paper, we propose a simple max-min power control scheme for Multi-User MIMO (MU-MIMO) in massive MIMO systems. We model and formulate the issue as a max-min fairness power control problem, which needs to be considered in order to provide good experienced service for users in the system. By exploiting the special properties of the solution, we are able to propose a very simple power control algorithm with complexity $mathcal{O}(M(N+M))$ where $M$ and $N$ are the number of users and base station antennas respectively. In addition, only the estimated channel response and maximum transmit power of each user are required as input information. We implement the proposed algorithm on a record-playback massive MIMO testbed to verify the performance in real environment. The result show that the received signal quality of the worst user is much more improved, and all users experience roughly the same level of quality of service. In addition, simulation is carried out to confirm the advantage of the proposed scheme in term of minimum spectral efficiency.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An access control scheme with fine-grained time constrained attributes based on smart contract and trapdoor 一种基于智能合约和活板门的细粒度时间约束访问控制方案
Pub Date : 2019-04-01 DOI: 10.1109/ICT.2019.8798859
Xuanmei Qin, Yongfeng Huang, Zhen Yang, Xing Li
Attribute-based encryption describes the access policy with the attribute information of users. In practice, attributes usually have a certain lifespan. The existing time-based access control methods directly relate attribute keys to time. Thus, under the constraint of fine-grained time, when the attribute expires, the update of key and policy adds a large additional burden to the data user and owner. In this paper, we propose a dynamic attribute-based access control scheme to set a fine-grained valid time period for each attribute, which not only facilitates dynamic data sharing, but also enables flexible attribute revocation. We use smart contract to set valid time period for attributes. It provides smart management on users' attributes and avoids the waiting time of CSP caused by manual operations. We also introduce trapdoor that are indirectly related to time and proxy decryption method to reduce computational cost on data owners and users. Extensive security and performance analysis shows the security strength and effectiveness of the proposed scheme.
属性加密描述了使用用户属性信息的访问策略。在实践中,属性通常有一定的生命周期。现有的基于时间的访问控制方法直接将属性键与时间关联起来。因此,在细粒度时间的约束下,当属性到期时,键和策略的更新给数据用户和所有者增加了很大的额外负担。本文提出了一种基于动态属性的访问控制方案,为每个属性设置细粒度的有效时间段,既方便了动态数据共享,又实现了灵活的属性撤销。我们使用智能合约来设置属性的有效时间段。对用户属性进行智能管理,避免人工操作导致CSP等待时间。我们还引入了与时间间接相关的陷阱门和代理解密方法,以减少数据所有者和用户的计算成本。广泛的安全性和性能分析表明了该方案的安全性和有效性。
{"title":"An access control scheme with fine-grained time constrained attributes based on smart contract and trapdoor","authors":"Xuanmei Qin, Yongfeng Huang, Zhen Yang, Xing Li","doi":"10.1109/ICT.2019.8798859","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798859","url":null,"abstract":"Attribute-based encryption describes the access policy with the attribute information of users. In practice, attributes usually have a certain lifespan. The existing time-based access control methods directly relate attribute keys to time. Thus, under the constraint of fine-grained time, when the attribute expires, the update of key and policy adds a large additional burden to the data user and owner. In this paper, we propose a dynamic attribute-based access control scheme to set a fine-grained valid time period for each attribute, which not only facilitates dynamic data sharing, but also enables flexible attribute revocation. We use smart contract to set valid time period for attributes. It provides smart management on users' attributes and avoids the waiting time of CSP caused by manual operations. We also introduce trapdoor that are indirectly related to time and proxy decryption method to reduce computational cost on data owners and users. Extensive security and performance analysis shows the security strength and effectiveness of the proposed scheme.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115541608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance of Narrow-Band Internet of Things (NB-IoT) Based on Repetition of Downlink Physical Channel 基于下行物理信道重复的窄带物联网性能研究
Pub Date : 2019-04-01 DOI: 10.1109/ICT.2019.8798776
N. A. Ahmad, Nur Idora Abdul Razak
Narrow-Band Internet of Things (NB-IoT) offers low power and wide coverage for IoT services which reuse existing Long Term Evolution (LTE) technology. Coverage enhancement at weak signal area may be achieved by channel repetition to improve signal quality. In this paper, the performance of NB-IoT is evaluated for three different modes of deployments by repeating the downlink physical channel. It is proved that the increase in the number of repetitions will give better performance of NB-IoT system. It also shows that the standalone and guard band modes perform better compared to in-band mode.
窄带物联网(NB-IoT)为重复使用现有长期演进(LTE)技术的物联网服务提供低功耗和广覆盖。微弱信号区域的覆盖增强可以通过信道重复来实现,以提高信号质量。在本文中,通过重复下行物理信道,评估了三种不同部署模式下NB-IoT的性能。实验证明,增加重复次数可以提高NB-IoT系统的性能。它还表明,与带内模式相比,独立和保护带模式性能更好。
{"title":"Performance of Narrow-Band Internet of Things (NB-IoT) Based on Repetition of Downlink Physical Channel","authors":"N. A. Ahmad, Nur Idora Abdul Razak","doi":"10.1109/ICT.2019.8798776","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798776","url":null,"abstract":"Narrow-Band Internet of Things (NB-IoT) offers low power and wide coverage for IoT services which reuse existing Long Term Evolution (LTE) technology. Coverage enhancement at weak signal area may be achieved by channel repetition to improve signal quality. In this paper, the performance of NB-IoT is evaluated for three different modes of deployments by repeating the downlink physical channel. It is proved that the increase in the number of repetitions will give better performance of NB-IoT system. It also shows that the standalone and guard band modes perform better compared to in-band mode.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131396317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Experimental Study of Depolarization and Antenna Correlation in Tunnels in the 1.3 GHz Band 1.3 GHz频段隧道去极化与天线相关实验研究
Pub Date : 2019-04-01 DOI: 10.1109/ICT.2019.8798860
F. Challita, P. Laly, M. Liénard, D. Gaillot, P. Degauque, W. Joseph
Measurements have been carried out in a low-traffic road tunnel to investigate the influence of the polarization of the transmitting and receiving antennas on the channel characteristics. A real-time channel sounder working in a frequency band around 1.3 GHz has been used, the elements of the transmitting and receiving arrays being dual-polarized patch antennas. Special emphasis is made on cross-polarization discrimination factor and on the spatial correlation between array elements which has a great influence on the performances of transmit/receive diversity schemes. Various polarizations both at the transmitter and the receiver have been tested to minimize this spatial correlation while keeping the size of the array as small as possible.
在低流量隧道中进行了测量,研究了发射天线和接收天线极化对信道特性的影响。实时信道测深仪工作在1.3 GHz左右的频段,发射和接收阵列的元件是双极化贴片天线。重点讨论了对发射/接收分集方案性能影响较大的交叉极化判别因子和阵列元素间的空间相关性。在发射机和接收机上的各种极化都经过了测试,以尽量减少这种空间相关性,同时保持阵列的尺寸尽可能小。
{"title":"Experimental Study of Depolarization and Antenna Correlation in Tunnels in the 1.3 GHz Band","authors":"F. Challita, P. Laly, M. Liénard, D. Gaillot, P. Degauque, W. Joseph","doi":"10.1109/ICT.2019.8798860","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798860","url":null,"abstract":"Measurements have been carried out in a low-traffic road tunnel to investigate the influence of the polarization of the transmitting and receiving antennas on the channel characteristics. A real-time channel sounder working in a frequency band around 1.3 GHz has been used, the elements of the transmitting and receiving arrays being dual-polarized patch antennas. Special emphasis is made on cross-polarization discrimination factor and on the spatial correlation between array elements which has a great influence on the performances of transmit/receive diversity schemes. Various polarizations both at the transmitter and the receiver have been tested to minimize this spatial correlation while keeping the size of the array as small as possible.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133899407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Efficiency of MIMO Transmission with Channel State Information Feedback 信道状态信息反馈的MIMO传输效率研究
Pub Date : 2019-04-01 DOI: 10.1109/ICT.2019.8798642
Hung Lee Vei, Ivan Ku, Ayman A. El-Saleh, T. Le
A channel state information (CSI) feedback algorithm based on scalar quantization is proposed for a multiple-input multiple-output (MIMO) transmission. The performance of the proposed algorithm is evaluated using the effective transmission rate, which incorporates the effect of the CSI feedback overhead on transmission time. Besides that, the power consumed due to the computational complexity of the CSI feedback algorithm is taken into account together with the transmit power when evaluating the energy efficiency. We compare our proposed algorithm to other typical CSI feedback algorithms under correlated channel conditions. Simulation results show that the proposed algorithm enables practical MIMO transmission to achieve an relative transmission rate at 95% of the ideal rate.
针对多输入多输出(MIMO)传输,提出了一种基于标量量化的信道状态信息反馈算法。利用有效传输速率评估了算法的性能,有效传输速率考虑了CSI反馈开销对传输时间的影响。此外,在评估能量效率时,还考虑了CSI反馈算法由于计算复杂度所消耗的功率和发射功率。在相关信道条件下,将本文提出的算法与其他典型的CSI反馈算法进行了比较。仿真结果表明,该算法能使实际MIMO传输的相对传输速率达到理想速率的95%。
{"title":"On the Efficiency of MIMO Transmission with Channel State Information Feedback","authors":"Hung Lee Vei, Ivan Ku, Ayman A. El-Saleh, T. Le","doi":"10.1109/ICT.2019.8798642","DOIUrl":"https://doi.org/10.1109/ICT.2019.8798642","url":null,"abstract":"A channel state information (CSI) feedback algorithm based on scalar quantization is proposed for a multiple-input multiple-output (MIMO) transmission. The performance of the proposed algorithm is evaluated using the effective transmission rate, which incorporates the effect of the CSI feedback overhead on transmission time. Besides that, the power consumed due to the computational complexity of the CSI feedback algorithm is taken into account together with the transmit power when evaluating the energy efficiency. We compare our proposed algorithm to other typical CSI feedback algorithms under correlated channel conditions. Simulation results show that the proposed algorithm enables practical MIMO transmission to achieve an relative transmission rate at 95% of the ideal rate.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134464722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 26th International Conference on Telecommunications (ICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1