首页 > 最新文献

2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)最新文献

英文 中文
Value creation and coopetition in M2M ecosystem — The case of smart city M2M生态系统中的价值创造与合作——以智慧城市为例
A. Ghanbari, Andres Laya, J. Markendahl
Wireless ICT as a subcategory of the ICT industry has long been serving end users as its direct customers. The value for end users, i.e. connectivity as the end product of this industry, has been created in a linear chain where two major group of actors have been cooperating with each other: Telecom Equipment Vendors (TEV) and Mobile Network Operators (MNO). By the demand of other industries for connecting devices/machines in order to enable various services, Machine to Machine (M2M) communications and Internet of Things have emerged as new concepts where Wireless ICT could serve other industries. As a result “connectivity” became an enabler (service) and not the final product. In this paper we argue that linear telecom value chains are incapable of serving this new demand, since wireless ICT requires to co-create value with other industries. This causes the formation of telecom value networks in which traditional telecom actors have to form new (different) business relationships with each other; Cooperation with competitors and Competition with cooperators.
无线信息通信技术作为信息通信技术行业的一个子类,长期以来一直以终端用户为直接客户。终端用户的价值,即作为该行业最终产品的连接性,是在两大参与者相互合作的线性链中创造的:电信设备供应商(TEV)和移动网络运营商(MNO)。由于其他行业对连接设备/机器以实现各种服务的需求,机器对机器(M2M)通信和物联网已成为无线ICT服务其他行业的新概念。因此,“连接性”成为一种推动者(服务),而不是最终产品。在本文中,我们认为线性电信价值链无法满足这种新需求,因为无线ICT需要与其他行业共同创造价值。这导致了电信价值网络的形成,传统的电信行动者不得不相互之间形成新的(不同的)业务关系;与竞争者合作,与合作者竞争。
{"title":"Value creation and coopetition in M2M ecosystem — The case of smart city","authors":"A. Ghanbari, Andres Laya, J. Markendahl","doi":"10.1109/PIMRC.2016.7794609","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794609","url":null,"abstract":"Wireless ICT as a subcategory of the ICT industry has long been serving end users as its direct customers. The value for end users, i.e. connectivity as the end product of this industry, has been created in a linear chain where two major group of actors have been cooperating with each other: Telecom Equipment Vendors (TEV) and Mobile Network Operators (MNO). By the demand of other industries for connecting devices/machines in order to enable various services, Machine to Machine (M2M) communications and Internet of Things have emerged as new concepts where Wireless ICT could serve other industries. As a result “connectivity” became an enabler (service) and not the final product. In this paper we argue that linear telecom value chains are incapable of serving this new demand, since wireless ICT requires to co-create value with other industries. This causes the formation of telecom value networks in which traditional telecom actors have to form new (different) business relationships with each other; Cooperation with competitors and Competition with cooperators.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128107613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Thompson sampling approach to channel exploration-exploitation problem in multihop cognitive radio networks 多跳认知无线网络中信道探索利用问题的汤普森采样方法
V. Toldov, L. Clavier, V. Loscrí, N. Mitton
Cognitive radio technology is a promising solution to the exponential growth in bandwidth demand sustained by increasing number of ubiquitous connected devices. The allocated spectrum is opened to the secondary users conditioned on limited interference on the primary owner of the band. A major bottleneck in cognitive radio systems is to find the best available channel quickly from a large accessible set of channels. This work formulates the channel exploration-exploitation dilemma as a multi-arm bandit problem. Existing theoretical solutions to a multi-arm bandit are adapted for cognitive radio and evaluated in an experimental test-bed. It is shown that a Thompson sampling based algorithm efficiently converges to the best channel faster than the existing algorithms and achieves higher asymptotic average throughput. We then propose a multihop extension together with an experimental proof of concept.
认知无线电技术是一种很有前途的解决方案,可以解决由于无处不在的连接设备数量增加而导致的带宽需求呈指数增长的问题。分配的频谱开放给二级用户,条件是对该频段的主要所有者的干扰有限。认知无线电系统的一个主要瓶颈是从大量可访问的信道中快速找到最佳可用信道。本工作将渠道探索-开发困境表述为一个多臂强盗问题。现有的理论解决方案的多臂强盗适用于认知无线电,并在实验测试台上进行了评估。结果表明,基于汤普森采样的算法比现有算法更快地收敛到最佳信道,并获得更高的渐近平均吞吐量。然后,我们提出了一个多跳扩展以及一个实验概念证明。
{"title":"A Thompson sampling approach to channel exploration-exploitation problem in multihop cognitive radio networks","authors":"V. Toldov, L. Clavier, V. Loscrí, N. Mitton","doi":"10.1109/PIMRC.2016.7794785","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794785","url":null,"abstract":"Cognitive radio technology is a promising solution to the exponential growth in bandwidth demand sustained by increasing number of ubiquitous connected devices. The allocated spectrum is opened to the secondary users conditioned on limited interference on the primary owner of the band. A major bottleneck in cognitive radio systems is to find the best available channel quickly from a large accessible set of channels. This work formulates the channel exploration-exploitation dilemma as a multi-arm bandit problem. Existing theoretical solutions to a multi-arm bandit are adapted for cognitive radio and evaluated in an experimental test-bed. It is shown that a Thompson sampling based algorithm efficiently converges to the best channel faster than the existing algorithms and achieves higher asymptotic average throughput. We then propose a multihop extension together with an experimental proof of concept.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An adaptive polarization-QAM modulation scheme for improving the power amplifier energy efficiency in OFDM systems 一种提高OFDM系统中功率放大器能量效率的自适应极化- qam调制方案
Shulun Zhao, Zhimin Zeng, Chunyan Feng, Fangfang Liu, Yao Nie
To improve the energy efficiency of power amplifier in OFDM systems, an adaptive polarization-QAM modulation scheme is proposed considering the data rate requirement variation at the transmitter. Since QAM and polarization modulation have different energy efficiency performance in the linear and nonlinear region of power amplifier respectively, thus the optimal energy efficiency can be obtained by combining the two modulation schemes together and adjusting their modulation order adaptively to fulfill the varying data rate requirement. The power series model of power amplifier is used to analyze the effects of both the in-band distortions and the out-of-band emissions on OFDM signals. Based on above, the proposed scheme can be formulated as an optimization problem regarding the output back off value as well as the modulation order of polarization modulation and QAM. Simulations under the same symbol error rate threshold and data rate requirement show that, the energy efficiency of the proposed scheme is nearly twice as that of the traditional QAM scheme in OFDM systems.
为了提高OFDM系统中功率放大器的能量利用率,考虑发射机端数据速率需求的变化,提出了一种自适应极化- qam调制方案。由于QAM和极化调制分别在功率放大器的线性和非线性区域具有不同的能效性能,因此可以将两种调制方案组合在一起,并自适应地调整调制顺序以满足不同的数据速率要求,从而获得最优的能效。利用功率放大器的功率级数模型,分析了带内畸变和带外发射对OFDM信号的影响。在此基础上,提出的方案可以归结为一个关于输出回退值以及偏振调制和QAM调制顺序的优化问题。在相同码元错误率阈值和数据速率要求下的仿真结果表明,在OFDM系统中,该方案的能量效率是传统QAM方案的近两倍。
{"title":"An adaptive polarization-QAM modulation scheme for improving the power amplifier energy efficiency in OFDM systems","authors":"Shulun Zhao, Zhimin Zeng, Chunyan Feng, Fangfang Liu, Yao Nie","doi":"10.1109/PIMRC.2016.7794638","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794638","url":null,"abstract":"To improve the energy efficiency of power amplifier in OFDM systems, an adaptive polarization-QAM modulation scheme is proposed considering the data rate requirement variation at the transmitter. Since QAM and polarization modulation have different energy efficiency performance in the linear and nonlinear region of power amplifier respectively, thus the optimal energy efficiency can be obtained by combining the two modulation schemes together and adjusting their modulation order adaptively to fulfill the varying data rate requirement. The power series model of power amplifier is used to analyze the effects of both the in-band distortions and the out-of-band emissions on OFDM signals. Based on above, the proposed scheme can be formulated as an optimization problem regarding the output back off value as well as the modulation order of polarization modulation and QAM. Simulations under the same symbol error rate threshold and data rate requirement show that, the energy efficiency of the proposed scheme is nearly twice as that of the traditional QAM scheme in OFDM systems.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115940400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the performance analysis of binary non-coherent modulations with selection combining in double rice fading channels 双稻衰落信道中选择组合二元非相干调制的性能分析
Rym Khedhiri, N. Hajri, N. Youssef
In this paper, we examine the bit error probability (BEP) performance of binary non-coherent modulations over L-branch selective combining (SC) diversity in frequency-flat, slowly-varying double Rice fading channels. The double Rice fading channel is constructed as the product of two independent but not identically distributed Rice processes. In addition, we assume that the double Rice processes affecting the signal received over the L branches of the diversity system are independent and identically distributed. Under these assumptions, and by using the cumulative distribution function (CDF) approach, we derive an expression for the average BEP performance of binary noncoherent frequency-shift keying (FSK) and differential phase-shift keying (DPSK) modulations. The result elaborated is generic in that it includes the propagation environments described by RayleighxRice and double Rayleigh fading models as special cases. The result is in the form of semi-infinite range integrals, that are easy to compute numerically. Additionally, for the special case of dual-branch SC diversity, i.e., L = 2, relatively simplified expressions for the BEP performance are obtained. Moreover, illustrative numerical results are presented together with corresponding simulation quantities to check the validity of the derived analytical quantities, and analyze the impact of the fading parameters on the BEP performance. The results are useful in assessing the performance of amplify-and-forward (AF) dual-hop vehicle-to-vehicle (V2V) communications with line-of-sight (LOS) paths, and where the additive noise in the relay station can be neglected.
在本文中,我们研究了在频率平坦、缓慢变化的双Rice衰落信道中,二进制非相干调制在l支选择性组合(SC)分集上的误码率(BEP)性能。双Rice衰落信道是两个独立但不相同分布的Rice过程的产物。此外,我们假设影响分集系统L支路接收信号的双Rice过程是独立且同分布的。在这些假设下,利用累积分布函数(CDF)方法,我们推导了二元非相干移频键控(FSK)和微分移相键控(DPSK)调制的平均BEP性能表达式。所阐述的结果是通用的,因为它包括了瑞利-赖斯模型和双瑞利衰落模型所描述的传播环境作为特例。结果是半无穷范围积分的形式,易于数值计算。此外,对于双支路SC分集的特殊情况,即L = 2,得到了相对简化的BEP性能表达式。给出了数值结果和相应的仿真量,验证了推导的解析量的有效性,并分析了衰落参数对BEP性能的影响。该结果可用于评估具有视距(LOS)路径的放大前向(AF)双跳车对车(V2V)通信的性能,并且可以忽略中继站中的附加噪声。
{"title":"On the performance analysis of binary non-coherent modulations with selection combining in double rice fading channels","authors":"Rym Khedhiri, N. Hajri, N. Youssef","doi":"10.1109/PIMRC.2016.7794644","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794644","url":null,"abstract":"In this paper, we examine the bit error probability (BEP) performance of binary non-coherent modulations over L-branch selective combining (SC) diversity in frequency-flat, slowly-varying double Rice fading channels. The double Rice fading channel is constructed as the product of two independent but not identically distributed Rice processes. In addition, we assume that the double Rice processes affecting the signal received over the L branches of the diversity system are independent and identically distributed. Under these assumptions, and by using the cumulative distribution function (CDF) approach, we derive an expression for the average BEP performance of binary noncoherent frequency-shift keying (FSK) and differential phase-shift keying (DPSK) modulations. The result elaborated is generic in that it includes the propagation environments described by RayleighxRice and double Rayleigh fading models as special cases. The result is in the form of semi-infinite range integrals, that are easy to compute numerically. Additionally, for the special case of dual-branch SC diversity, i.e., L = 2, relatively simplified expressions for the BEP performance are obtained. Moreover, illustrative numerical results are presented together with corresponding simulation quantities to check the validity of the derived analytical quantities, and analyze the impact of the fading parameters on the BEP performance. The results are useful in assessing the performance of amplify-and-forward (AF) dual-hop vehicle-to-vehicle (V2V) communications with line-of-sight (LOS) paths, and where the additive noise in the relay station can be neglected.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134397522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Joint user scheduling and transmit direction selection in 5G TDD dense small cell networks 5G TDD密集小蜂窝网络中的联合用户调度和发射方向选择
S. Lagén, A. Agustin, J. Vidal
This paper proposes a joint user scheduling and transmit direction selection procedure for dynamic TDD in 5G dense small cell networks, where the transmit direction (i.e. downlink (DL) or uplink (UL)) selected per small cell is dynamically optimized together with the user scheduling at every frame. We focus on the maximization of a general utility function that takes into account the DL/UL traffic asymmetries of each user and the interference conditions in the network. After relaxation of the integer variables that subsume the user scheduling and transmit direction selection, the problem is decomposed and efficiently solved in parallel at every frame. Simulation results show significant gains in DL and UL average rates for different traffic asymmetries, network densities, and user densities as compared to existing schemes for dynamic TDD.
本文提出了一种面向5G密集小蜂窝网络动态TDD的联合用户调度和发送方向选择方法,该方法将每个小蜂窝选择的发送方向(即下行链路(DL)或上行链路(UL))与每帧用户调度一起进行动态优化。我们关注的是考虑到每个用户的DL/UL流量不对称和网络中的干扰条件的一般效用函数的最大化。将包含用户调度和传输方向选择的整数变量松弛后,对问题进行分解,并在每帧并行有效地求解。仿真结果表明,与现有的动态TDD方案相比,在不同的流量不对称、网络密度和用户密度下,DL和UL平均速率显著提高。
{"title":"Joint user scheduling and transmit direction selection in 5G TDD dense small cell networks","authors":"S. Lagén, A. Agustin, J. Vidal","doi":"10.1109/PIMRC.2016.7794817","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794817","url":null,"abstract":"This paper proposes a joint user scheduling and transmit direction selection procedure for dynamic TDD in 5G dense small cell networks, where the transmit direction (i.e. downlink (DL) or uplink (UL)) selected per small cell is dynamically optimized together with the user scheduling at every frame. We focus on the maximization of a general utility function that takes into account the DL/UL traffic asymmetries of each user and the interference conditions in the network. After relaxation of the integer variables that subsume the user scheduling and transmit direction selection, the problem is decomposed and efficiently solved in parallel at every frame. Simulation results show significant gains in DL and UL average rates for different traffic asymmetries, network densities, and user densities as compared to existing schemes for dynamic TDD.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"66 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131640041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modulation recognition of PSK and QAM signals based on envelope spectrum analysis 基于包络谱分析的PSK和QAM信号调制识别
Min Li, Lili Liang, Dong Wei, Meng Zhang, Chunwei Miao
Modulation recognition has been an essential part in non-cooperative communications. Without knowing any prior knowledge of the transmitted data, the received signals may be affected by intersymbol interference (ISI), carrier frequency offset, phase offset and timing delay. ISI and these unknown parameters would degrade the performance of many recognition methods. There have been many robust estimators of carrier frequency offset, phase offset and timing delay. However, the robust recognition methods combating ISI have not been well designed. Most blind channel equalization methods, which are designed to overcome the effects of ISI, have poor robustness to noise and carrier frequency offset. In this paper, a robust recognition scheme is proposed to recognize phase-shift keying (PSK) and quadrature amplitude modulation (QAM) signals in non-cooperative communication with ISI environment. The envelope spectrum of PSK and QAM signals are analyzed. Then the recognition scheme based on the ratio of spectral peak to spectral centroid (RSPSC) of envelope spectrum is presented. Such scheme achieves a good recognition performance in the presence of ISI. Spectral centroid is utilized to enhance the robustness to noises. By extracting the envelope spectrum, in addition, the method avoids being affected by carrier frequency offset, phase offset and timing delay. The feasibility of the proposed method has been proved in the respects of theory and simulations.
调制识别一直是非合作通信的重要组成部分。在不知道传输数据的任何先验知识的情况下,接收信号可能受到码间干扰(ISI)、载波频率偏移、相位偏移和时序延迟的影响。ISI和这些未知参数会降低许多识别方法的性能。目前已有许多可靠的载波频偏、相位偏和时延估计方法。然而,对抗ISI的鲁棒识别方法还没有得到很好的设计。大多数盲信道均衡方法都是为了克服ISI的影响而设计的,但对噪声和载波频偏的鲁棒性较差。本文提出了一种鲁棒识别方案,用于识别ISI环境下非合作通信中的相移键控(PSK)和正交调幅(QAM)信号。分析了PSK和QAM信号的包络谱。在此基础上,提出了基于包络谱峰质心比(RSPSC)的识别方案。该方案在ISI存在的情况下取得了较好的识别性能。利用谱质心增强对噪声的鲁棒性。此外,该方法通过提取包络谱,避免了载波频偏、相位偏移和时序延迟的影响。从理论和仿真两方面验证了该方法的可行性。
{"title":"Modulation recognition of PSK and QAM signals based on envelope spectrum analysis","authors":"Min Li, Lili Liang, Dong Wei, Meng Zhang, Chunwei Miao","doi":"10.1109/PIMRC.2016.7794698","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794698","url":null,"abstract":"Modulation recognition has been an essential part in non-cooperative communications. Without knowing any prior knowledge of the transmitted data, the received signals may be affected by intersymbol interference (ISI), carrier frequency offset, phase offset and timing delay. ISI and these unknown parameters would degrade the performance of many recognition methods. There have been many robust estimators of carrier frequency offset, phase offset and timing delay. However, the robust recognition methods combating ISI have not been well designed. Most blind channel equalization methods, which are designed to overcome the effects of ISI, have poor robustness to noise and carrier frequency offset. In this paper, a robust recognition scheme is proposed to recognize phase-shift keying (PSK) and quadrature amplitude modulation (QAM) signals in non-cooperative communication with ISI environment. The envelope spectrum of PSK and QAM signals are analyzed. Then the recognition scheme based on the ratio of spectral peak to spectral centroid (RSPSC) of envelope spectrum is presented. Such scheme achieves a good recognition performance in the presence of ISI. Spectral centroid is utilized to enhance the robustness to noises. By extracting the envelope spectrum, in addition, the method avoids being affected by carrier frequency offset, phase offset and timing delay. The feasibility of the proposed method has been proved in the respects of theory and simulations.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129391897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BALCON: BAckward loss concealment mechanism for scalable video dissemination in opportunistic networks BALCON:机会网络中可扩展视频传播的反向损失隐藏机制
Merza Klaghstan, David Coquil, N. Bennani, H. Kosch, L. Brunie
Opportunistic networks suffer some coarse characteristics as frequent disruptions, high loss ratios and uncertain data delivery. The transmission of video content even worsens the delivery problem because of the large size and continuous nature of the medium. Therefore, loss concealment is inducted as a part of the solution, alongside other delivery enhancement mechanisms. Loss concealment techniques are usually used Forwards, where the source must spend extra processing and transmission volume to enable the receiver to recover lost data parts. These techniques are not only associated with prolonged latencies and video encoding manipulations, but they are also sensitive to the loss pattern, which might leave the receiver in passive suspension if a key part for recovery was missing. In this work, we propose a Backward loss concealment mechanism, which allows the receiver to react to a certain amount of loss. Missing parts of the scalable video stream are compensated by a composite solution that encloses 1) video frame loss error concealment, and 2) network demands, which are initiated and cast in search for missing parts from other nodes in the network. Simulation-driven experiments prove the applicability of the backward mechanism, with a limited capability depending on the target application requirements.
机会网络具有频繁中断、高损失率和不确定数据传输等粗糙特征。视频内容的传输甚至因为媒体的大尺寸和连续性而恶化了交付问题。因此,引入损失隐藏作为解决方案的一部分,以及其他交付增强机制。丢失隐藏技术通常使用forward,其中源必须花费额外的处理和传输量才能使接收方恢复丢失的数据部分。这些技术不仅与延长延迟和视频编码操作有关,而且对丢失模式也很敏感,如果丢失了恢复的关键部分,可能会使接收器处于被动悬架状态。在这项工作中,我们提出了一种向后损失隐藏机制,该机制允许接收方对一定数量的损失做出反应。可扩展视频流的缺失部分由一个复合解决方案补偿,该解决方案包含1)视频帧丢失错误隐藏和2)网络需求,这些需求是在网络中的其他节点中搜索缺失部分时发起和投射的。仿真实验证明了该后向机制的适用性,并根据目标应用需求提供了有限的能力。
{"title":"BALCON: BAckward loss concealment mechanism for scalable video dissemination in opportunistic networks","authors":"Merza Klaghstan, David Coquil, N. Bennani, H. Kosch, L. Brunie","doi":"10.1109/PIMRC.2016.7794850","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794850","url":null,"abstract":"Opportunistic networks suffer some coarse characteristics as frequent disruptions, high loss ratios and uncertain data delivery. The transmission of video content even worsens the delivery problem because of the large size and continuous nature of the medium. Therefore, loss concealment is inducted as a part of the solution, alongside other delivery enhancement mechanisms. Loss concealment techniques are usually used Forwards, where the source must spend extra processing and transmission volume to enable the receiver to recover lost data parts. These techniques are not only associated with prolonged latencies and video encoding manipulations, but they are also sensitive to the loss pattern, which might leave the receiver in passive suspension if a key part for recovery was missing. In this work, we propose a Backward loss concealment mechanism, which allows the receiver to react to a certain amount of loss. Missing parts of the scalable video stream are compensated by a composite solution that encloses 1) video frame loss error concealment, and 2) network demands, which are initiated and cast in search for missing parts from other nodes in the network. Simulation-driven experiments prove the applicability of the backward mechanism, with a limited capability depending on the target application requirements.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130903596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-time monitoring of SDN networks using non-invasive cloud-based logging platforms 利用无创云日志平台对SDN网络进行实时监控
Bartlomiej Siniarski, C. Olariu, Philip Perry, T. Parsons, John Murphy
The Software Defined Networking (SDN) paradigm enables quick deployment of software controlled network infrastructures, however new approaches to system monitoring are required to provide network administrators with instant feedback on a network's health. This paper details the deployment of an SDN system architecture featuring the integration of a cloud-based, real-time log-analysis platform. The proposed architecture uses log data collected from host machines, OpenFlow switches and the SDN controllers in a non-invasive style. This work uses a commercially available correlation platform to provide network administrators with a real-time view of the network status and the approach is validated under two scenarios: — network overload and a security attack.
软件定义网络(SDN)范例支持软件控制的网络基础设施的快速部署,但是需要新的系统监控方法来向网络管理员提供关于网络运行状况的即时反馈。本文详细介绍了集成基于云的实时日志分析平台的SDN系统架构的部署。所提出的架构以非侵入式的方式使用从主机、OpenFlow交换机和SDN控制器收集的日志数据。这项工作使用商业上可用的相关平台为网络管理员提供网络状态的实时视图,该方法在两种情况下进行了验证:网络过载和安全攻击。
{"title":"Real-time monitoring of SDN networks using non-invasive cloud-based logging platforms","authors":"Bartlomiej Siniarski, C. Olariu, Philip Perry, T. Parsons, John Murphy","doi":"10.1109/PIMRC.2016.7794973","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794973","url":null,"abstract":"The Software Defined Networking (SDN) paradigm enables quick deployment of software controlled network infrastructures, however new approaches to system monitoring are required to provide network administrators with instant feedback on a network's health. This paper details the deployment of an SDN system architecture featuring the integration of a cloud-based, real-time log-analysis platform. The proposed architecture uses log data collected from host machines, OpenFlow switches and the SDN controllers in a non-invasive style. This work uses a commercially available correlation platform to provide network administrators with a real-time view of the network status and the approach is validated under two scenarios: — network overload and a security attack.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131137145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A hybrid channel estimation strategy against pilot spoofing attack in MISO system MISO系统中抗导频欺骗攻击的混合信道估计策略
Fengyi Bai, Pinyi Ren, Qinghe Du, Li Sun
Pilot spoofing attack can deteriorate the transmission performance of the legitimate system and facilitate eavesdropping concurrently. Some detection methods of pilot attack have been proposed, while we consider the problem of channel estimation under pilot spoofing attack. In this paper, a hybrid channel estimation strategy using random Binary Phase Shift Keying (BPSK) is proposed. Specifically, a random BPSK sequence is transmitted by the legal user once the attack is detected. In this manner, the base station detects the sequence and re-estimates the legal channel with both contaminated pilot and assistant sequence. We evaluate the estimation performance in three cases according to different responses of the malicious user. Simulation results demonstrate that the proposed strategy can effectively estimate the legitimate channel against pilot attack.
导频欺骗攻击会降低合法系统的传输性能,同时也便于窃听。提出了几种导频攻击的检测方法,同时考虑了导频欺骗攻击下的信道估计问题。提出了一种基于随机二值相移键控(BPSK)的混合信道估计策略。当检测到攻击时,合法用户会发送一个随机的BPSK序列。通过这种方式,基站检测序列并重新估计受污染的导频和辅助频带的合法信道。根据恶意用户的不同响应,对三种情况下的估计性能进行了评估。仿真结果表明,该策略能够有效地估计出导频攻击下的合法信道。
{"title":"A hybrid channel estimation strategy against pilot spoofing attack in MISO system","authors":"Fengyi Bai, Pinyi Ren, Qinghe Du, Li Sun","doi":"10.1109/PIMRC.2016.7794707","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794707","url":null,"abstract":"Pilot spoofing attack can deteriorate the transmission performance of the legitimate system and facilitate eavesdropping concurrently. Some detection methods of pilot attack have been proposed, while we consider the problem of channel estimation under pilot spoofing attack. In this paper, a hybrid channel estimation strategy using random Binary Phase Shift Keying (BPSK) is proposed. Specifically, a random BPSK sequence is transmitted by the legal user once the attack is detected. In this manner, the base station detects the sequence and re-estimates the legal channel with both contaminated pilot and assistant sequence. We evaluate the estimation performance in three cases according to different responses of the malicious user. Simulation results demonstrate that the proposed strategy can effectively estimate the legitimate channel against pilot attack.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131219174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On joint energy and information transfer in relay networks with an imperfect power amplifier 功率放大器不完善中继网络中能量与信息的联合传输
Mahdi Haghifam, Behrooz Makki, M. Nasiri-Kenari, T. Svensson
This paper investigates the outage probability and the throughput of relay networks with joint information and energy transfer where the relay harvests energy from transmitted radio-frequency (RF) signal of the source. Considering different power consumption models, we derive the outage probability of the systems for both adaptive and non-adaptive power allocations at the relay. With a total energy consumption constraint at the source, we provide closed-form expressions for the optimal time sharing and power allocation between the source energy and information transfer signals. The analytical and simulation results demonstrate the efficiency of joint energy and information transfer systems in different conditions.
本文研究了具有信息和能量联合传输的中继网络的中断概率和吞吐量,其中中继从源的发射射频信号中获取能量。考虑不同的功率消耗模型,分别推导了自适应功率分配和非自适应功率分配时系统的停电概率。在源端总能耗约束下,给出了源端能量与信息传递信号之间的最佳分时和功率分配的封闭表达式。分析和仿真结果表明,在不同条件下,联合能量和信息传递系统是有效的。
{"title":"On joint energy and information transfer in relay networks with an imperfect power amplifier","authors":"Mahdi Haghifam, Behrooz Makki, M. Nasiri-Kenari, T. Svensson","doi":"10.1109/PIMRC.2016.7794872","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794872","url":null,"abstract":"This paper investigates the outage probability and the throughput of relay networks with joint information and energy transfer where the relay harvests energy from transmitted radio-frequency (RF) signal of the source. Considering different power consumption models, we derive the outage probability of the systems for both adaptive and non-adaptive power allocations at the relay. With a total energy consumption constraint at the source, we provide closed-form expressions for the optimal time sharing and power allocation between the source energy and information transfer signals. The analytical and simulation results demonstrate the efficiency of joint energy and information transfer systems in different conditions.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1