Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880814
Farzaneh Azimian, Fathiyeh Faghih, M. Kargahi, S. M. Mirdehghan
A major requirement for portable battery-operated (IoT-related) devices is energy conservation. This concern has not been well noticed by the application developers, while many energy problems in such devices are due to programming errors. Energy testing to find energy bugs and hotspots has gained attention in the last few years, where a major challenge to do so is designing an effective test oracle. In this paper, we use the idea of metamorphic testing to tackle this problem. In metamorphic testing, the output of different scenarios are compared against each other to detect a test failure, whereas in traditional oracles, the output of each scenario is compared with an “expected” value. Applying our proposed metamorphic relations to test a number of Android applications, we found the effectiveness of our proposed approach in detection of the considered bugs and hotspots.
{"title":"Energy Metamorphic Testing for Android Applications","authors":"Farzaneh Azimian, Fathiyeh Faghih, M. Kargahi, S. M. Mirdehghan","doi":"10.1109/PIMRCW.2019.8880814","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880814","url":null,"abstract":"A major requirement for portable battery-operated (IoT-related) devices is energy conservation. This concern has not been well noticed by the application developers, while many energy problems in such devices are due to programming errors. Energy testing to find energy bugs and hotspots has gained attention in the last few years, where a major challenge to do so is designing an effective test oracle. In this paper, we use the idea of metamorphic testing to tackle this problem. In metamorphic testing, the output of different scenarios are compared against each other to detect a test failure, whereas in traditional oracles, the output of each scenario is compared with an “expected” value. Applying our proposed metamorphic relations to test a number of Android applications, we found the effectiveness of our proposed approach in detection of the considered bugs and hotspots.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114758805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880818
Donghyun Lee, Byung-Wook Min
This paper presents experimental results of self-interference cancellation of a 2×2 MIMO in-band full-duplex radio front-end. The proposed RF front-end consists of two rat race coupler and four antennas network, where passive suppression is done, and four self-interference reference generator, where active cancellation is done by making identical signal with residual self-interference signal, then subtracting it from received signal. As every antenna, followed by two rat race couplers, is used for transmitting and receiving simultaneously, MIMO antenna network can be constructed maintaining its own passive suppression. Also, a new type of time delay circuit, having high dynamic range of variable time and wideband performance, is used to be fit to arbitrary residual self-interference, after the passive suppression, and achieve wideband self-interference cancellation. Experimental results show 50-dB self-interference cancellation over 90-MHz, centered at 2.53 GHz.
{"title":"Analysis of Self-Interference Cancellation and Experimental Results of 2×2 MIMO In-Band Full-Duplex Radio Front-End","authors":"Donghyun Lee, Byung-Wook Min","doi":"10.1109/PIMRCW.2019.8880818","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880818","url":null,"abstract":"This paper presents experimental results of self-interference cancellation of a 2×2 MIMO in-band full-duplex radio front-end. The proposed RF front-end consists of two rat race coupler and four antennas network, where passive suppression is done, and four self-interference reference generator, where active cancellation is done by making identical signal with residual self-interference signal, then subtracting it from received signal. As every antenna, followed by two rat race couplers, is used for transmitting and receiving simultaneously, MIMO antenna network can be constructed maintaining its own passive suppression. Also, a new type of time delay circuit, having high dynamic range of variable time and wideband performance, is used to be fit to arbitrary residual self-interference, after the passive suppression, and achieve wideband self-interference cancellation. Experimental results show 50-dB self-interference cancellation over 90-MHz, centered at 2.53 GHz.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122657860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880839
Lai Wei, Meng Ma, Zhiheng Guo, Yongqiang Fei, B. Jiao
Flexible duplex is a promising technique, which provides access to flexible resource allocation and asymmetric traffic configuration. Inter-cell interference (ICI) is one of the key problems in flexible duplex cellular system. In this paper, a hybrid beamforming scheme is proposed to deal with the ICI problem. In particular, in designing the analog beamforming weights, a coordinate transformation method is introduced to transform the nonconvex optimization problem into a convex one. Moreover, an iterative algorithm is proposed to find the global optimal weights of the analog beamformer with lower computational complexity. Simulation and hardware experimental results demonstrate that significant ICI suppression can be achieved by using the proposed scheme.
{"title":"Hybrid Beamforming Design and Implementation for Mitigating Inter-cell Interference in Flexible Duplex Cellular System","authors":"Lai Wei, Meng Ma, Zhiheng Guo, Yongqiang Fei, B. Jiao","doi":"10.1109/PIMRCW.2019.8880839","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880839","url":null,"abstract":"Flexible duplex is a promising technique, which provides access to flexible resource allocation and asymmetric traffic configuration. Inter-cell interference (ICI) is one of the key problems in flexible duplex cellular system. In this paper, a hybrid beamforming scheme is proposed to deal with the ICI problem. In particular, in designing the analog beamforming weights, a coordinate transformation method is introduced to transform the nonconvex optimization problem into a convex one. Moreover, an iterative algorithm is proposed to find the global optimal weights of the analog beamformer with lower computational complexity. Simulation and hardware experimental results demonstrate that significant ICI suppression can be achieved by using the proposed scheme.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121250296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880821
N. S. Erdem, Cem Ersoy, Can Tunca
Monitoring gait characteristics is an important tool used in many areas including orthopedics, sports, rehabilitation and neurology. Current methods applied to analyze the gait need clinical settings and equipments for measuring gait parameters. In this study, we propose an unobtrusive and comfortable system to perform gait analysis using smartwatches. Accelerometer and gyroscope sensors of the smartwatch are used to extract three main parameters of gait: step length, swing time and stance time. This study is one of the first smartwatch based gait analysis studies focusing on extracting these spatio-temporal gait parameters. Data is collected from 26 healthy participants in clinical settings. The data is preprocessed and step features are extracted. Gait parameters are estimated using various regression models and compared with the ground truth data coming from the clinician using the golden standard instrumented walkway.
{"title":"Gait Analysis Using Smartwatches","authors":"N. S. Erdem, Cem Ersoy, Can Tunca","doi":"10.1109/PIMRCW.2019.8880821","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880821","url":null,"abstract":"Monitoring gait characteristics is an important tool used in many areas including orthopedics, sports, rehabilitation and neurology. Current methods applied to analyze the gait need clinical settings and equipments for measuring gait parameters. In this study, we propose an unobtrusive and comfortable system to perform gait analysis using smartwatches. Accelerometer and gyroscope sensors of the smartwatch are used to extract three main parameters of gait: step length, swing time and stance time. This study is one of the first smartwatch based gait analysis studies focusing on extracting these spatio-temporal gait parameters. Data is collected from 26 healthy participants in clinical settings. The data is preprocessed and step features are extracted. Gait parameters are estimated using various regression models and compared with the ground truth data coming from the clinician using the golden standard instrumented walkway.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115871526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880840
Sercan Türker, Ahmet Burak Can
As the popularity of Android mobile operating system grows, the number of malicious software have increased extensively. Therefore, many research efforts have been done on Android malware analysis. Besides detection of malicious Android applications, recognizing families of malwares is also an important task in malware analysis. In this paper, we propose a machine learning-based classification framework that classifies Android malware samples into their families. The framework extracts requested permissions and API calls from Android malware samples and uses them as features to train a large set of machine learning classifiers. To validate the performance of our proposed approach, we use three different malware datasets. Our experimental results show that all of the tested models classify malwares efficiently. We also make a study of detecting unknown malwares that never seen before and we notice that our framework detects these malwares with a high accuracy.
{"title":"AndMFC: Android Malware Family Classification Framework","authors":"Sercan Türker, Ahmet Burak Can","doi":"10.1109/PIMRCW.2019.8880840","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880840","url":null,"abstract":"As the popularity of Android mobile operating system grows, the number of malicious software have increased extensively. Therefore, many research efforts have been done on Android malware analysis. Besides detection of malicious Android applications, recognizing families of malwares is also an important task in malware analysis. In this paper, we propose a machine learning-based classification framework that classifies Android malware samples into their families. The framework extracts requested permissions and API calls from Android malware samples and uses them as features to train a large set of machine learning classifiers. To validate the performance of our proposed approach, we use three different malware datasets. Our experimental results show that all of the tested models classify malwares efficiently. We also make a study of detecting unknown malwares that never seen before and we notice that our framework detects these malwares with a high accuracy.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124421784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880833
Guangda Li, N. Li, Meng Li, Xiaofeng Tao
This paper studies the physical layer authentication problem in a multi-hop network assisted by a full-duplex relay. Since the self-interference channel is a unique physical layer feature of the full-duplex device, we incorporate the characteristics of self-interference channel into the authentication process for the first time. By judging the estimators of channels and the statistical properties of the received signal, two kinds of authentication methods are proposed. Then we turn the authentication problem into a simple hypothesis test problem. Two one-bit quantizers are used to develop the test statistic in our two-dimensions authentication scheme. False alarm rate and probability of detection are defined for performance analysis. After Monte Carlo simulations, numeral results show that our proposed two-dimensional authentication scheme can achieve a high probability of detection along with a low false alarm rate whether the spoofing behavior occurs at the source or the relay.
{"title":"Full-Duplex Relay based Physical Layer Security Authentication","authors":"Guangda Li, N. Li, Meng Li, Xiaofeng Tao","doi":"10.1109/PIMRCW.2019.8880833","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880833","url":null,"abstract":"This paper studies the physical layer authentication problem in a multi-hop network assisted by a full-duplex relay. Since the self-interference channel is a unique physical layer feature of the full-duplex device, we incorporate the characteristics of self-interference channel into the authentication process for the first time. By judging the estimators of channels and the statistical properties of the received signal, two kinds of authentication methods are proposed. Then we turn the authentication problem into a simple hypothesis test problem. Two one-bit quantizers are used to develop the test statistic in our two-dimensions authentication scheme. False alarm rate and probability of detection are defined for performance analysis. After Monte Carlo simulations, numeral results show that our proposed two-dimensional authentication scheme can achieve a high probability of detection along with a low false alarm rate whether the spoofing behavior occurs at the source or the relay.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129883875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880831
Y. Varabei, I. Kabin, Z. Dyka, D. Klann, P. Langendörfer
Machine learning approaches have a high potential for improving the success rate of side channel analysis attacks. In this paper we present horizontal side channel analysis attacks against three crypto-implementations suffering from different levels of leakage using a single power and a single electromagnetic trace. We show the effectivity of attacks using $k-means$ as analysis tool. In addition we introduce a new approach that we call intelligent clustering that enables attackers to select the start centroids in such a way that the ability of $k-means$ to extract the key bits is increased up to 38.56 % compared to $k-means$ starting the farthest neighbors centroids and up to 66.66 % compared to the mean correctness for $k-means$ starting with random centroids.
{"title":"Intelligent Clustering as a Means to Improve K-means Based Horizontal Attacks","authors":"Y. Varabei, I. Kabin, Z. Dyka, D. Klann, P. Langendörfer","doi":"10.1109/PIMRCW.2019.8880831","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880831","url":null,"abstract":"Machine learning approaches have a high potential for improving the success rate of side channel analysis attacks. In this paper we present horizontal side channel analysis attacks against three crypto-implementations suffering from different levels of leakage using a single power and a single electromagnetic trace. We show the effectivity of attacks using $k-means$ as analysis tool. In addition we introduce a new approach that we call intelligent clustering that enables attackers to select the start centroids in such a way that the ability of $k-means$ to extract the key bits is increased up to 38.56 % compared to $k-means$ starting the farthest neighbors centroids and up to 66.66 % compared to the mean correctness for $k-means$ starting with random centroids.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115818085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880825
M. Zareei, C. V. Rosales, Rafaela Villalpando Hernandez, L. Azpilicueta
The rapid expansion of wireless sensor technology triggers several interesting applications. Given the small power capacity of a sensor, energy harvesting is an inevitable approach to extend the lifetime of the sensor nodes. In this paper, a distributed transmission power control mechanism for the energy harvesting cognitive radio sensor network (EH-CRSN) is proposed. The main concept is to adjust the transmission power of the nodes dynamically based on the network condition to maintain network connectivity. Each node decides to increase or decrease its transmission power dynamically based on several parameters such as its available power and neighboring nodes available power. This dynamic transmission power adjustment transforms the network logical topology to adjust with the power condition of network better. The transmission power control is tested in two scenarios; flat network and clustered network. Extensive simulation results show that by using of the proposed transmission power control method we can improve network end-to-end performance.
{"title":"Efficient Transmission Power Control for Energy-harvesting Cognitive Radio Sensor Network","authors":"M. Zareei, C. V. Rosales, Rafaela Villalpando Hernandez, L. Azpilicueta","doi":"10.1109/PIMRCW.2019.8880825","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880825","url":null,"abstract":"The rapid expansion of wireless sensor technology triggers several interesting applications. Given the small power capacity of a sensor, energy harvesting is an inevitable approach to extend the lifetime of the sensor nodes. In this paper, a distributed transmission power control mechanism for the energy harvesting cognitive radio sensor network (EH-CRSN) is proposed. The main concept is to adjust the transmission power of the nodes dynamically based on the network condition to maintain network connectivity. Each node decides to increase or decrease its transmission power dynamically based on several parameters such as its available power and neighboring nodes available power. This dynamic transmission power adjustment transforms the network logical topology to adjust with the power condition of network better. The transmission power control is tested in two scenarios; flat network and clustered network. Extensive simulation results show that by using of the proposed transmission power control method we can improve network end-to-end performance.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122534456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880838
Hung V. Vu, T. Le-Ngoc
In this paper, we provide an analytical performance characterization of underlaid device-to-device (D2D) cellular networks where D2D users operate in full-duplex (FD) mode under the presence of residual self-interference. In considered networks, the base-stations (BSs) are distributed according to a hexagonal grid, while the locations of cellular and D2D users follow Poisson point processes (PPPs). Based on stochastic-geometry approach, we develop the approximations of key performance metrics including coverage probabilities and ergodic sum-rates of both cellular and D2D links in order to investigate the benefits of integrating underlaid D2D communications in cellular networks in terms of spectral efficiency. The achieved approximations also allow to characterize the sum-rate behaviors under the effects of various system parameters. We show that underlaid D2D communications in cellular network can offer a significant spectral efficiency gain as compared to pure cellular transmission. With a sufficiently low self-interference cancellation level, FD D2D can offer substantial spectral efficiency improvement over the HD counterpart.
{"title":"Underlaid Full-Duplex D2D Cellular Networks: Modeling and Analysis","authors":"Hung V. Vu, T. Le-Ngoc","doi":"10.1109/PIMRCW.2019.8880838","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880838","url":null,"abstract":"In this paper, we provide an analytical performance characterization of underlaid device-to-device (D2D) cellular networks where D2D users operate in full-duplex (FD) mode under the presence of residual self-interference. In considered networks, the base-stations (BSs) are distributed according to a hexagonal grid, while the locations of cellular and D2D users follow Poisson point processes (PPPs). Based on stochastic-geometry approach, we develop the approximations of key performance metrics including coverage probabilities and ergodic sum-rates of both cellular and D2D links in order to investigate the benefits of integrating underlaid D2D communications in cellular networks in terms of spectral efficiency. The achieved approximations also allow to characterize the sum-rate behaviors under the effects of various system parameters. We show that underlaid D2D communications in cellular network can offer a significant spectral efficiency gain as compared to pure cellular transmission. With a sufficiently low self-interference cancellation level, FD D2D can offer substantial spectral efficiency improvement over the HD counterpart.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131186468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880815
Altug Sural, E. Sezer, Yigit Ertugrul, O. Arikan, E. Arıkan
By using Majority Logic (MJL) aided Successive Cancellation (SC) decoding algorithm, an architecture and a specific implementation for high throughput polar coding are proposed. SC-MJL algorithm exploits the low complexity nature of SC decoding and the low latency property of MJL. In order to reduce the complexity of SC-MJL decoding, an adaptive quantization scheme is developed within 1–5 bits range of internal log-likelihood ratios (LLRs). The bit allocation is based on maximizing the mutual information between the input and output LLRs of the quantizer. This scheme causes a negligible $(0.1 < mathbf{dB})$ performance loss when the code block length is $N= 1024$ and the number of information bits is $K = 854$. The decoder is implemented on 45nm ASIC technology using deeply-pipelined, unrolled hardware architecture with register balancing. The pipeline depth is kept at 40 clock cycles in ASIC by merging consecutive decoding stages implemented as combinational logic. The ASIC synthesis results show that SC-MJL decoder has 427 Gb/s throughput at 45nm technology. When we scale the implementation results to 7nm technology node, the throughput reaches 1 Tb/s with under 10 mm2 chip area and 0.37 W power dissipation.
{"title":"Terabits-per-Second Throughput for Polar Codes","authors":"Altug Sural, E. Sezer, Yigit Ertugrul, O. Arikan, E. Arıkan","doi":"10.1109/PIMRCW.2019.8880815","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880815","url":null,"abstract":"By using Majority Logic (MJL) aided Successive Cancellation (SC) decoding algorithm, an architecture and a specific implementation for high throughput polar coding are proposed. SC-MJL algorithm exploits the low complexity nature of SC decoding and the low latency property of MJL. In order to reduce the complexity of SC-MJL decoding, an adaptive quantization scheme is developed within 1–5 bits range of internal log-likelihood ratios (LLRs). The bit allocation is based on maximizing the mutual information between the input and output LLRs of the quantizer. This scheme causes a negligible $(0.1 < mathbf{dB})$ performance loss when the code block length is $N= 1024$ and the number of information bits is $K = 854$. The decoder is implemented on 45nm ASIC technology using deeply-pipelined, unrolled hardware architecture with register balancing. The pipeline depth is kept at 40 clock cycles in ASIC by merging consecutive decoding stages implemented as combinational logic. The ASIC synthesis results show that SC-MJL decoder has 427 Gb/s throughput at 45nm technology. When we scale the implementation results to 7nm technology node, the throughput reaches 1 Tb/s with under 10 mm2 chip area and 0.37 W power dissipation.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128811523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}