Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880812
Erislandy Mozo, Arrate Alonso Gómez, Francisco Parrilla, M. Mendicute
In the last decade, different wireless technologies have been deployed in the railway infrastructure to support critical and non-critical services. Due to the tangible benefits that they have provided to both rail operators and users, different communication technologies are currently being designed or adapted to be deployed in this environment. In this sense, this paper proposes to adapt the IEEE802.11p protocol to be used in these environments, characterized by high speeds. It presents a comb-type pilot based channel estimation scheme adapted to the IEEE802.11p frame. In this proposal, the number of pilot carriers is increased (from four to six or eight) and distributed almost uniformly, without increasing the nominal bandwidth of the signal. In addition, different interpolation techniques are used to obtain the channel response for each OFDM transmitted symbol. The performance improvement is quantified through the effective bit rate and the BER (Bit Error Rate) in relation to the standard. The results show that the proposed estimation method has better performance than the standard estimation method for Doppler frequencies above 400 Hz (77 km/h). This enhancement is translated into a throughput gain in comparison to the standard, e.g 2.1 Mbps throughput gain for 600 Hz Doppler shift. Besides, its performance curves are more stable (lower fluctuation) at the increase of the Doppler shift.
{"title":"Performance Analysis of Pilot Patterns for Channel Estimation for OFDM Systems in High-Speed Trains Scenarios","authors":"Erislandy Mozo, Arrate Alonso Gómez, Francisco Parrilla, M. Mendicute","doi":"10.1109/PIMRCW.2019.8880812","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880812","url":null,"abstract":"In the last decade, different wireless technologies have been deployed in the railway infrastructure to support critical and non-critical services. Due to the tangible benefits that they have provided to both rail operators and users, different communication technologies are currently being designed or adapted to be deployed in this environment. In this sense, this paper proposes to adapt the IEEE802.11p protocol to be used in these environments, characterized by high speeds. It presents a comb-type pilot based channel estimation scheme adapted to the IEEE802.11p frame. In this proposal, the number of pilot carriers is increased (from four to six or eight) and distributed almost uniformly, without increasing the nominal bandwidth of the signal. In addition, different interpolation techniques are used to obtain the channel response for each OFDM transmitted symbol. The performance improvement is quantified through the effective bit rate and the BER (Bit Error Rate) in relation to the standard. The results show that the proposed estimation method has better performance than the standard estimation method for Doppler frequencies above 400 Hz (77 km/h). This enhancement is translated into a throughput gain in comparison to the standard, e.g 2.1 Mbps throughput gain for 600 Hz Doppler shift. Besides, its performance curves are more stable (lower fluctuation) at the increase of the Doppler shift.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132799255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880836
Shuyang Huang, Linpei Li, Qi Pan, Wei Zheng, Zhaoming Lu
The ground mobile edge computing (MEC) system has been effectively utilized to undertake the computation-intensive tasks offloaded from unmanned aerial vehicles (UAVs), which has significantly mitigated the aerial calculation pressure. However, some external factors, like environmental conditions and the distribution of MEC servers can deeply affect the performance of offloading algorithms. In this paper, an enhanced offloading algorithm is proposed to minimize the the completion time. For the sake of practice, the air-to-ground (A2G) channel model is rebuilt with the line of sight (LoS)/non-line of sight (NLoS) status considered. Furthermore, the boundary of effective offloading area with dense MEC servers is denoted by the round margin raised. Within the round margin, UAV offloads its calculation to the ground and plans its trajectory simultaneously. Outside the round margin, UAV flies along the straight path with maximum speed, which avoids inefficient operations within the sparse and deviated area. Simulation results show that the proposed scheme is validated with better performance. Moreover, the differences of offloading effectiveness under different conditions of sparsity or deviation provide potential instructions for future trade-off research between offloading and local computing.
{"title":"Fine-Grained Task Offloading for UAV via MEC-Enabled Networks","authors":"Shuyang Huang, Linpei Li, Qi Pan, Wei Zheng, Zhaoming Lu","doi":"10.1109/PIMRCW.2019.8880836","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880836","url":null,"abstract":"The ground mobile edge computing (MEC) system has been effectively utilized to undertake the computation-intensive tasks offloaded from unmanned aerial vehicles (UAVs), which has significantly mitigated the aerial calculation pressure. However, some external factors, like environmental conditions and the distribution of MEC servers can deeply affect the performance of offloading algorithms. In this paper, an enhanced offloading algorithm is proposed to minimize the the completion time. For the sake of practice, the air-to-ground (A2G) channel model is rebuilt with the line of sight (LoS)/non-line of sight (NLoS) status considered. Furthermore, the boundary of effective offloading area with dense MEC servers is denoted by the round margin raised. Within the round margin, UAV offloads its calculation to the ground and plans its trajectory simultaneously. Outside the round margin, UAV flies along the straight path with maximum speed, which avoids inefficient operations within the sparse and deviated area. Simulation results show that the proposed scheme is validated with better performance. Moreover, the differences of offloading effectiveness under different conditions of sparsity or deviation provide potential instructions for future trade-off research between offloading and local computing.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115489037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880849
Z. Bakhshi, A. Balador
Fog computing is an emerging computing paradigm that extends cloud services to the edge of the network by moving computation tasks from cloud to network edges to reduce response latency in a wireless network. Fog computing inherits the principle of peer-to-peer networking, decentralization, and geographical distribution from clouds. Hence, fog computing becomes an ideal platform for readily supporting vehicular applications due to its dynamic support for mobility of client-devices and low latent heterogeneous communication capabilities. Despite many advantages, a multitude of security and privacy issues affects the platforms and renders it as a target for unknown adversaries. This has significant implication in the development of safety critical applications, such as vehicular cloud and intelligent transportation system. This paper presents, an overview of existing security and privacy vulnerabilities in fog computing, particularly in vehicular networks. Moreover, state-of-the-art security and privacy solutions for fog based vehicular networks are analyzed. In conclusion, open challenges and future research directions are discussed.
{"title":"An Overview on Security and Privacy Challenges and Their Solutions in Fog-Based Vehicular Application","authors":"Z. Bakhshi, A. Balador","doi":"10.1109/PIMRCW.2019.8880849","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880849","url":null,"abstract":"Fog computing is an emerging computing paradigm that extends cloud services to the edge of the network by moving computation tasks from cloud to network edges to reduce response latency in a wireless network. Fog computing inherits the principle of peer-to-peer networking, decentralization, and geographical distribution from clouds. Hence, fog computing becomes an ideal platform for readily supporting vehicular applications due to its dynamic support for mobility of client-devices and low latent heterogeneous communication capabilities. Despite many advantages, a multitude of security and privacy issues affects the platforms and renders it as a target for unknown adversaries. This has significant implication in the development of safety critical applications, such as vehicular cloud and intelligent transportation system. This paper presents, an overview of existing security and privacy vulnerabilities in fog computing, particularly in vehicular networks. Moreover, state-of-the-art security and privacy solutions for fog based vehicular networks are analyzed. In conclusion, open challenges and future research directions are discussed.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116322992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880842
Yangyang Wang, X. Wen, Yawen Chen, Wenpeng Jing, Qi Pan
Owing to its excellent flexibility, unmanned aerial vehicles (UAV) have been widely adopted as aerial access points to provide data collection services for the Internet of Things (IoT) devices. Moreover, Millimeter-Wave (MmWave) aided UAV communications to achieve extremely high data rate has also become the hot issue in recent research. Codebook designing and beam training are the enabling technologies of MmWave communications. However, the existing solutions for communication systems cannot be directly applied in the UAV Mmwave communications, because of the increased complexity in moving and 3D UAV scenarios. Therefore, this paper focuses on joint codebook design and beam training. Firstly, a 3D codebook is designed which can provide flexible access for IoT devices and achieve the optimal system throughput. Then, based on the designed codebook, a Angle Forecast based Fast Beam Alignment (AFFBA) mechanism is proposed. This mechanism infers the potential angle range of ideal AoD from the beam adopted by the current serving UAV. Combing the angle range and the trajectory model of UAV, the optimal beam is forecasted. The proposed joint 3D codebook design and beam training significantly reduce the dimension of beam sweeping space. Simulation results demonstrate the superior performance of the proposed mechanism, and show that the proposed mechanism significantly reduce the beam sweeping space and effectively improve the normalized spectral efficiency (NSE) compared to existing exhaustive training mechanism.
{"title":"Joint 3D Codebook Design and Beam Training for UAV Millimeter-Wave Communications","authors":"Yangyang Wang, X. Wen, Yawen Chen, Wenpeng Jing, Qi Pan","doi":"10.1109/PIMRCW.2019.8880842","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880842","url":null,"abstract":"Owing to its excellent flexibility, unmanned aerial vehicles (UAV) have been widely adopted as aerial access points to provide data collection services for the Internet of Things (IoT) devices. Moreover, Millimeter-Wave (MmWave) aided UAV communications to achieve extremely high data rate has also become the hot issue in recent research. Codebook designing and beam training are the enabling technologies of MmWave communications. However, the existing solutions for communication systems cannot be directly applied in the UAV Mmwave communications, because of the increased complexity in moving and 3D UAV scenarios. Therefore, this paper focuses on joint codebook design and beam training. Firstly, a 3D codebook is designed which can provide flexible access for IoT devices and achieve the optimal system throughput. Then, based on the designed codebook, a Angle Forecast based Fast Beam Alignment (AFFBA) mechanism is proposed. This mechanism infers the potential angle range of ideal AoD from the beam adopted by the current serving UAV. Combing the angle range and the trajectory model of UAV, the optimal beam is forecasted. The proposed joint 3D codebook design and beam training significantly reduce the dimension of beam sweeping space. Simulation results demonstrate the superior performance of the proposed mechanism, and show that the proposed mechanism significantly reduce the beam sweeping space and effectively improve the normalized spectral efficiency (NSE) compared to existing exhaustive training mechanism.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126055895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/PIMRCW.2019.8880844
Ming Gan, Yuchen Guo, G. Tsodik, Yan Xin, Xun Yang, E. Au, O. Aboul-Magd
Next generation of 802.11 Wireless Local Network (WLAN) demands higher throughput and lower latency. Full duplex (FD) technology is a promising solution to meet those requirements. This paper presents FD-based data transmission protocol for WLAN applications. Collision detection is considered to allow FD-capable STAs to listen to the media while transmitting, thus parallel transmissions can be potentially recognized in order to improve system efficiency. System level simulation results are provided to evaluate system throughput, latency and collision rates of FD-based WLAN.
{"title":"Full Duplex for Next Generation of 802.11","authors":"Ming Gan, Yuchen Guo, G. Tsodik, Yan Xin, Xun Yang, E. Au, O. Aboul-Magd","doi":"10.1109/PIMRCW.2019.8880844","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880844","url":null,"abstract":"Next generation of 802.11 Wireless Local Network (WLAN) demands higher throughput and lower latency. Full duplex (FD) technology is a promising solution to meet those requirements. This paper presents FD-based data transmission protocol for WLAN applications. Collision detection is considered to allow FD-capable STAs to listen to the media while transmitting, thus parallel transmissions can be potentially recognized in order to improve system efficiency. System level simulation results are provided to evaluate system throughput, latency and collision rates of FD-based WLAN.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115077857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-31DOI: 10.1109/PIMRCW.2019.8880819
G. Gougeon, Y. Corre, Mohammed Zahid Aslam
Future wireless communications systems will require large network capacities beyond the capabilities of present and upcoming 5G technology. The trend of considering higher frequencies for their large bandwidths continues today into the sub-THz domain. The BRAVE project considers the frequencies in the 90–200 GHz spectrum, which have been considered in this paper. The challenges of channel modelling at sub-THz frequencies are described along with extensions made to a ray-based deterministic tool. The geographical and physical accuracies inherent to the ray-based tool are exploited to simulate two different scenarios. The first scenario is an indoor office scenario and the second is an outdoor in-street scenario. The application of the updated channel modelling properties of the ray-based tool provides interesting perspectives into the sub-THz channel modelling. This permits the development of realistic models for the evaluation, characterization and eventual deployment of such systems.
{"title":"Ray-based Deterministic Channel Modelling for sub-THz Band","authors":"G. Gougeon, Y. Corre, Mohammed Zahid Aslam","doi":"10.1109/PIMRCW.2019.8880819","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880819","url":null,"abstract":"Future wireless communications systems will require large network capacities beyond the capabilities of present and upcoming 5G technology. The trend of considering higher frequencies for their large bandwidths continues today into the sub-THz domain. The BRAVE project considers the frequencies in the 90–200 GHz spectrum, which have been considered in this paper. The challenges of channel modelling at sub-THz frequencies are described along with extensions made to a ray-based deterministic tool. The geographical and physical accuracies inherent to the ray-based tool are exploited to simulate two different scenarios. The first scenario is an indoor office scenario and the second is an outdoor in-street scenario. The application of the updated channel modelling properties of the ray-based tool provides interesting perspectives into the sub-THz channel modelling. This permits the development of realistic models for the evaluation, characterization and eventual deployment of such systems.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128447524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-17DOI: 10.1109/PIMRCW.2019.8880834
Orhun Kara, Ebru Küçükkubas
Due to the rapid evolution and usage of IoT devices in the world, the need for lightweight cryptography for resource-constrained devices gained a great importance. Although it has been common in the cryptology community that stream ciphers are supposed to be more efficient in speed and area than block ciphers, it has been seen in the last 10–15 years that most of ciphers designed for resource-constrained devices to take up less area and less energy on hardware-based platforms, such as ASIC or FPGA, are lightweight block ciphers. On the other hand, the design and analysis of stream ciphers using keyed internal update function is put forward against this belief and it has become one of the popular study subjects in the literature in the last few years. Plantlet, proposed in 2017, and its predecessor Sprout, proposed in 2015, are famous algorithms as examples of stream ciphers using keyed internal update function. Sprout was broken after a short time by many researchers but Plantlet hasn't been succesfully broken yet. Traditionally, key stream generators of stream ciphers update their internal states only by using their current internal state. Since the use of the key in the internal update is a new approach, the security analysis of this approach is not fully understood. In this study, the security analysis of the key stream generators with keyed update function has been studied. A new attack algorithm for internal state recovery and key recovery has been developed and mounted on Plantlet algorithm as an instance of stream ciphers with keyed update function.
{"title":"Parametric Guess and Determine Attack on Stream Ciphers","authors":"Orhun Kara, Ebru Küçükkubas","doi":"10.1109/PIMRCW.2019.8880834","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880834","url":null,"abstract":"Due to the rapid evolution and usage of IoT devices in the world, the need for lightweight cryptography for resource-constrained devices gained a great importance. Although it has been common in the cryptology community that stream ciphers are supposed to be more efficient in speed and area than block ciphers, it has been seen in the last 10–15 years that most of ciphers designed for resource-constrained devices to take up less area and less energy on hardware-based platforms, such as ASIC or FPGA, are lightweight block ciphers. On the other hand, the design and analysis of stream ciphers using keyed internal update function is put forward against this belief and it has become one of the popular study subjects in the literature in the last few years. Plantlet, proposed in 2017, and its predecessor Sprout, proposed in 2015, are famous algorithms as examples of stream ciphers using keyed internal update function. Sprout was broken after a short time by many researchers but Plantlet hasn't been succesfully broken yet. Traditionally, key stream generators of stream ciphers update their internal states only by using their current internal state. Since the use of the key in the internal update is a new approach, the security analysis of this approach is not fully understood. In this study, the security analysis of the key stream generators with keyed update function has been studied. A new attack algorithm for internal state recovery and key recovery has been developed and mounted on Plantlet algorithm as an instance of stream ciphers with keyed update function.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115467537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-22DOI: 10.1109/PIMRCW.2019.8880848
Shahram Shahsavari, Farhad Shirani, M. Khojastepour, E. Erkip
In-band full-duplex (FD) communications - enabled by recent advances in antenna and RF circuit design - has emerged as one of the promising techniques to improve data rates in wireless systems. One of the major roadblocks in enabling high data rates in FD systems is the inter-user interference (IUI) due to activating pairs of uplink and downlink users at the same time-frequency resource block. Opportunistic user scheduling has been proposed as a means to manage IUI and fully exploit the multiplexing gains in FD systems. In this paper, scheduling under long-term and short-term temporal fairness for single-cell FD wireless networks is considered. Temporal fair scheduling is of interest in delay-sensitive applications, and leads to predictable latency and power consumption. The feasible region of user temporal demand vectors is derived, and a scheduling strategy maximizing the system utility while satisfying long-term temporal fairness is proposed. Furthermore, a short-term temporal fair scheduling strategy is devised which satisfies user temporal demands over a finite window-length. It is shown that the strategy achieves optimal average system utility as the window-length is increased asymptotically. Subsequently, practical construction algorithms for long-term and shortterm temporal fair scheduling are introduced. Simulations are provided to verify the derivations and investigate the multiplexing gains. It is observed that using successive interference cancellation at downlink users improves FD gains significantly in the presence of strong IUI.
{"title":"Opportunistic Temporal Fair Mode Selection and User Scheduling for Full-duplex Systems","authors":"Shahram Shahsavari, Farhad Shirani, M. Khojastepour, E. Erkip","doi":"10.1109/PIMRCW.2019.8880848","DOIUrl":"https://doi.org/10.1109/PIMRCW.2019.8880848","url":null,"abstract":"In-band full-duplex (FD) communications - enabled by recent advances in antenna and RF circuit design - has emerged as one of the promising techniques to improve data rates in wireless systems. One of the major roadblocks in enabling high data rates in FD systems is the inter-user interference (IUI) due to activating pairs of uplink and downlink users at the same time-frequency resource block. Opportunistic user scheduling has been proposed as a means to manage IUI and fully exploit the multiplexing gains in FD systems. In this paper, scheduling under long-term and short-term temporal fairness for single-cell FD wireless networks is considered. Temporal fair scheduling is of interest in delay-sensitive applications, and leads to predictable latency and power consumption. The feasible region of user temporal demand vectors is derived, and a scheduling strategy maximizing the system utility while satisfying long-term temporal fairness is proposed. Furthermore, a short-term temporal fair scheduling strategy is devised which satisfies user temporal demands over a finite window-length. It is shown that the strategy achieves optimal average system utility as the window-length is increased asymptotically. Subsequently, practical construction algorithms for long-term and shortterm temporal fair scheduling are introduced. Simulations are provided to verify the derivations and investigate the multiplexing gains. It is observed that using successive interference cancellation at downlink users improves FD gains significantly in the presence of strong IUI.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125306841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}