首页 > 最新文献

2020 International Conference on UK-China Emerging Technologies (UCET)最新文献

英文 中文
Millimetre-Wave MIMO Array of a Compact Grid Antenna for 5G Wireless Networks and Beyond 5G及以后无线网络紧凑型网格天线的毫米波MIMO阵列
Pub Date : 2020-08-01 DOI: 10.1109/UCET51115.2020.9205326
S. F. Jilani, Qammer H. Abassi, A. Alomainy
This paper presents a 4-element multiple-input-multiple-output (MIMO) configuration of planar and compact two-dimensional (2D) grid antennas. The proposed grid is a 2D array of thirteen circular patches each with a radius of 0.175$lambda _{mathbf{o}}$, having a single feed point. Measured results of the single-element microstrip-fed grid-array antenna show a 6 GHz bandwidth in the range of 27-33 GHz. The realized gain is above 9 dBi in almost the whole range with a peak gain of 11.57 dBi at 29 GHz. The numerically calculated antenna efficiency is above 80%. The transmission characteristics of the 4-element MIMO array are below –27 dB that indicates low mutual coupling and high isolation. These high-performance aspects of the proposed millimetre-wave (mm-wave) MIMO antenna array validate its potential for the 5$^{mathbf{th}}$ generation (5G) cellular devices especially in indoor base-stations.
本文提出了一种平面和紧凑二维网格天线的四元多输入多输出(MIMO)结构。所提出的网格是一个由13个圆形块组成的二维数组,每个块的半径为0.175$lambda _{mathbf{o}}$,具有单个馈电点。单元件微带馈电网格阵列天线的测量结果表明,该天线在27 ~ 33 GHz的范围内有6 GHz的带宽。实现的增益几乎在整个范围内都在9 dBi以上,在29 GHz时的峰值增益为11.57 dBi。数值计算的天线效率在80%以上。4元MIMO阵列的传输特性低于-27 dB,具有低互耦性和高隔离性。所提出的毫米波(mm-wave) MIMO天线阵列的这些高性能方面验证了其在5$^{mathbf{th}}$代(5G)蜂窝设备(特别是室内基站)中的潜力。
{"title":"Millimetre-Wave MIMO Array of a Compact Grid Antenna for 5G Wireless Networks and Beyond","authors":"S. F. Jilani, Qammer H. Abassi, A. Alomainy","doi":"10.1109/UCET51115.2020.9205326","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205326","url":null,"abstract":"This paper presents a 4-element multiple-input-multiple-output (MIMO) configuration of planar and compact two-dimensional (2D) grid antennas. The proposed grid is a 2D array of thirteen circular patches each with a radius of 0.175$lambda _{mathbf{o}}$, having a single feed point. Measured results of the single-element microstrip-fed grid-array antenna show a 6 GHz bandwidth in the range of 27-33 GHz. The realized gain is above 9 dBi in almost the whole range with a peak gain of 11.57 dBi at 29 GHz. The numerically calculated antenna efficiency is above 80%. The transmission characteristics of the 4-element MIMO array are below –27 dB that indicates low mutual coupling and high isolation. These high-performance aspects of the proposed millimetre-wave (mm-wave) MIMO antenna array validate its potential for the 5$^{mathbf{th}}$ generation (5G) cellular devices especially in indoor base-stations.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116698514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Algorithm for handover decision based on TOPSIS 基于TOPSIS的切换决策算法
Pub Date : 2020-08-01 DOI: 10.1109/UCET51115.2020.9205319
S. Goutam, S. Unnikrishnan, A. Karandikar
Globally, there has been a big leap in the use of smart phones which are equipped to provide access to multiple interfaces as required in Next Generation Networks. Next Generation Networks are heterogeneous in nature, supporting various radio access technologies. In such a scenario, efficient Vertical Handover becomes a necessity to provide Ubiquitous connectivity, transparent to the user and the running applications. In this paper, we have presented VHDA based on Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS). The input parameters to VHDA are RSS, bandwidth, latency, jitter, packet loss and network coverage.
在全球范围内,智能手机的使用已经有了一个巨大的飞跃,智能手机可以提供对下一代网络所需的多个接口的访问。下一代网络本质上是异构的,支持多种无线接入技术。在这样的场景中,高效的垂直切换成为提供无处不在的连接的必要条件,对用户和正在运行的应用程序透明。本文提出了一种基于理想解相似性排序偏好技术(TOPSIS)的VHDA算法。VHDA的输入参数是RSS、带宽、延迟、抖动、丢包和网络覆盖。
{"title":"Algorithm for handover decision based on TOPSIS","authors":"S. Goutam, S. Unnikrishnan, A. Karandikar","doi":"10.1109/UCET51115.2020.9205319","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205319","url":null,"abstract":"Globally, there has been a big leap in the use of smart phones which are equipped to provide access to multiple interfaces as required in Next Generation Networks. Next Generation Networks are heterogeneous in nature, supporting various radio access technologies. In such a scenario, efficient Vertical Handover becomes a necessity to provide Ubiquitous connectivity, transparent to the user and the running applications. In this paper, we have presented VHDA based on Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS). The input parameters to VHDA are RSS, bandwidth, latency, jitter, packet loss and network coverage.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"123 37","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120818902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards Holographic Beam-Forming Metasurface Technology for Next Generation CubeSats 面向下一代立方体卫星的全息波束形成超表面技术
Pub Date : 2020-08-01 DOI: 10.1109/UCET51115.2020.9205418
O. Yurduseven, S. Podilchak, M. Khalily
We present the concept of holographic beam forming metasurface antenna for CubeSat platforms at X-band frequencies. The proposed metasurface topology exhibits a flat-panel system layout, particularly desirable for integration with CubeSat platforms without a hardware-intense deployment mechanism for launch. It is shown that appropriately interacting the guided-mode (or reference-wave) with a metasurface layer makes it possible to realize the radiation pattern of interest as an objective function - similar to an optical hologram - without the need for dedicated phase shifting circuits. The full-wave simulations of the designed metasurface layer integrated with a 1U CubeSat reveals a high-fidelity beam-control with an aperture efficiency greater than 40% at 10 GHz operating frequency.
提出了用于立方体卫星平台的x波段全息波束形成超表面天线的概念。所提出的超表面拓扑结构展示了平板系统布局,特别适合与CubeSat平台集成,而无需硬件密集的发射部署机制。结果表明,适当地将导模(或参考波)与超表面层相互作用,可以在不需要专用移相电路的情况下,将感兴趣的辐射图作为目标函数实现-类似于光学全息图。对设计的超表面层与1U CubeSat集成的全波仿真结果表明,在10ghz工作频率下,该超表面层具有高保真的波束控制,孔径效率大于40%。
{"title":"Towards Holographic Beam-Forming Metasurface Technology for Next Generation CubeSats","authors":"O. Yurduseven, S. Podilchak, M. Khalily","doi":"10.1109/UCET51115.2020.9205418","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205418","url":null,"abstract":"We present the concept of holographic beam forming metasurface antenna for CubeSat platforms at X-band frequencies. The proposed metasurface topology exhibits a flat-panel system layout, particularly desirable for integration with CubeSat platforms without a hardware-intense deployment mechanism for launch. It is shown that appropriately interacting the guided-mode (or reference-wave) with a metasurface layer makes it possible to realize the radiation pattern of interest as an objective function - similar to an optical hologram - without the need for dedicated phase shifting circuits. The full-wave simulations of the designed metasurface layer integrated with a 1U CubeSat reveals a high-fidelity beam-control with an aperture efficiency greater than 40% at 10 GHz operating frequency.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115473024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mutual Synchronization of Terahertz Emissions from Multiple Intrinsic Josephson Junction Mesas 多本征约瑟夫森结台地太赫兹发射的相互同步
Pub Date : 2020-08-01 DOI: 10.1109/UCET51115.2020.9205454
K. Hayama, S. Fujita, Y. Kuriyama, Keiichiro Maeda, M. Tsujimoto, I. Kakeya
We present a direct proof of synchronized macroscopic Josephson oscillations excited in two intrinsic Josephson junction stacks formed on a Bi 2 Sr 2 CaCu $_{2} mathrm{O}_{{8+} {delta }}$ single crystal. The strong coupling between the Josephson oscillations in the two mesas via the base crystal is detected by polarization analysis of emitted terahertz waves from individually biased mesas and simultaneously biased mesas.
本文直接证明了在bi2sr2cacu $ {2} mathrm{0} {{8+} {delta}}$单晶上形成的两个本征Josephson结叠加中激发的同步宏观Josephson振荡。通过对单独偏置台地和同时偏置台地发射的太赫兹波的偏振分析,发现了两个台地中约瑟夫森振荡通过基晶体之间的强耦合。
{"title":"Mutual Synchronization of Terahertz Emissions from Multiple Intrinsic Josephson Junction Mesas","authors":"K. Hayama, S. Fujita, Y. Kuriyama, Keiichiro Maeda, M. Tsujimoto, I. Kakeya","doi":"10.1109/UCET51115.2020.9205454","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205454","url":null,"abstract":"We present a direct proof of synchronized macroscopic Josephson oscillations excited in two intrinsic Josephson junction stacks formed on a Bi 2 Sr 2 CaCu $_{2} mathrm{O}_{{8+} {delta }}$ single crystal. The strong coupling between the Josephson oscillations in the two mesas via the base crystal is detected by polarization analysis of emitted terahertz waves from individually biased mesas and simultaneously biased mesas.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122649737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sagacious Intrusion Detection Strategy in Sensor Network 传感器网络中的智能入侵检测策略
Pub Date : 2020-08-01 DOI: 10.1109/UCET51115.2020.9205412
Shahzad Ashraf, Tauqeer Ahmed
Almost all smart appliances are operated through wireless sensor networks. With the passage of time, due to various applications, the WSN becomes prone to various external attacks. Preventing such attacks, Intrusion Detection strategy (IDS) is very crucial to secure the network from the malicious attackers. The proposed IDS methodology discovers the pattern in large data corpus which works for different types of algorithms to detect four types of Denial of service (DoS) attacks, namely, Grayhole, Blackhole, Flooding, and TDMA. The state-of-the-art detection algorithms, such as KNN, Naïve Bayes, Logistic Regression, Support Vector Machine (SVM), and ANN are applied to the data corpus and analyze the performance in detecting the attacks. The analysis shows that these algorithms are applicable for the detection and prediction of unavoidable attacks and can be recommended for network experts and analysts.
几乎所有的智能家电都是通过无线传感器网络操作的。随着时间的推移,由于应用的多样化,WSN容易受到各种外部攻击。入侵检测策略(IDS)对于防止网络受到恶意攻击至关重要。本文提出的IDS方法在大数据语料库中发现适用于不同算法的模式,以检测四种类型的拒绝服务(DoS)攻击,即灰洞攻击、黑洞攻击、洪水攻击和TDMA攻击。将KNN、Naïve贝叶斯、逻辑回归、支持向量机(SVM)和神经网络等最先进的检测算法应用于数据语料库,并分析检测攻击的性能。分析表明,这些算法适用于不可避免攻击的检测和预测,可以推荐给网络专家和分析人员使用。
{"title":"Sagacious Intrusion Detection Strategy in Sensor Network","authors":"Shahzad Ashraf, Tauqeer Ahmed","doi":"10.1109/UCET51115.2020.9205412","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205412","url":null,"abstract":"Almost all smart appliances are operated through wireless sensor networks. With the passage of time, due to various applications, the WSN becomes prone to various external attacks. Preventing such attacks, Intrusion Detection strategy (IDS) is very crucial to secure the network from the malicious attackers. The proposed IDS methodology discovers the pattern in large data corpus which works for different types of algorithms to detect four types of Denial of service (DoS) attacks, namely, Grayhole, Blackhole, Flooding, and TDMA. The state-of-the-art detection algorithms, such as KNN, Naïve Bayes, Logistic Regression, Support Vector Machine (SVM), and ANN are applied to the data corpus and analyze the performance in detecting the attacks. The analysis shows that these algorithms are applicable for the detection and prediction of unavoidable attacks and can be recommended for network experts and analysts.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122974664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Searching the Adversarial Example in the Decision Boundary 决策边界中对抗性例子的搜索
Pub Date : 2020-08-01 DOI: 10.1109/UCET51115.2020.9205320
Haoyang Jiang, Qingkui Song, J. Kernec
Deep learning technology achieves state of the art result in many computer vision missions. However, some researchers point out that current widely used deep learning architectures are vulnerable to adversarial examples. Adversarial examples are inputs generated by applying small and often imperceptible perturbation to examples in the dataset, such that the perturbed examples can degrade the performance of the deep learning architecture.In the paper, we propose a novel adversarial examples generation method. Adversarial examples generated using this method can have small perturbation and have more diversity compare to adversarial examples generated by other method.
深度学习技术在许多计算机视觉任务中实现了最先进的结果。然而,一些研究人员指出,目前广泛使用的深度学习架构很容易受到对抗性示例的影响。对抗性示例是通过对数据集中的示例应用微小且通常难以察觉的扰动而生成的输入,这样被扰动的示例可以降低深度学习架构的性能。本文提出了一种新的对抗样例生成方法。与其他方法生成的对抗样例相比,该方法生成的对抗样例具有较小的扰动和更大的多样性。
{"title":"Searching the Adversarial Example in the Decision Boundary","authors":"Haoyang Jiang, Qingkui Song, J. Kernec","doi":"10.1109/UCET51115.2020.9205320","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205320","url":null,"abstract":"Deep learning technology achieves state of the art result in many computer vision missions. However, some researchers point out that current widely used deep learning architectures are vulnerable to adversarial examples. Adversarial examples are inputs generated by applying small and often imperceptible perturbation to examples in the dataset, such that the perturbed examples can degrade the performance of the deep learning architecture.In the paper, we propose a novel adversarial examples generation method. Adversarial examples generated using this method can have small perturbation and have more diversity compare to adversarial examples generated by other method.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129196098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating Machine Learning Techniques on Human Activity Recognition Using Accelerometer Data 利用加速度计数据评估机器学习技术在人类活动识别中的应用
Pub Date : 2020-08-01 DOI: 10.1109/UCET51115.2020.9205376
R. Khan, M. Abbas, Rubia Anjum, Fatima Waheed, Sheeraz Ahmed, F. Bangash
Human activity recognition is gaining increasing importance because of its implication in remote monitoring application including security, health and fitness apps. This paper provides an analysis of different machine learning techniques for recognizing human activity. Firstly, all the recent work related to human activity recognition using accelerometer data is analyzed and presented in the paper. In this study the accelerometer used in smartphones as well as those embedded in wearable devices are compared and recognition methodologies applied on both the devices are presented. The dataset used in this project is a transformed version of "Activity Recognition using Cell Phone Accelerometers," by the Wireless Sensor Data Mining WSDM. Some important features were extracted from the data and based on it different models were assessed using Matlab Classification Learner App. Four distinct machine learning techniques were applied on the dataset, namely, linear regression, logistic regression, support vector machine and neural network. For the purposed of applying classifier Weka tool is used. The results of these algorithms are compared and presented in the form of tables and graphs and Bagged Tree is identified to be the best algorithm based on accuracy results.
由于人体活动识别在安全、健康和健身应用等远程监控应用中具有重要意义,因此它变得越来越重要。本文分析了用于识别人类活动的不同机器学习技术。本文首先对近年来利用加速度计数据进行人体活动识别的相关工作进行了分析和介绍。在本研究中,比较了智能手机中使用的加速度计以及嵌入可穿戴设备中的加速度计,并介绍了两种设备上应用的识别方法。本项目中使用的数据集是由无线传感器数据挖掘WSDM提供的“使用手机加速度计的活动识别”的转换版本。从数据中提取一些重要特征,并在此基础上使用Matlab Classification Learner App评估不同的模型。在数据集上应用了四种不同的机器学习技术,即线性回归、逻辑回归、支持向量机和神经网络。为了应用分类器,使用了Weka工具。将这些算法的结果以表格和图表的形式进行比较,并根据准确率结果确定Bagged Tree是最佳算法。
{"title":"Evaluating Machine Learning Techniques on Human Activity Recognition Using Accelerometer Data","authors":"R. Khan, M. Abbas, Rubia Anjum, Fatima Waheed, Sheeraz Ahmed, F. Bangash","doi":"10.1109/UCET51115.2020.9205376","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205376","url":null,"abstract":"Human activity recognition is gaining increasing importance because of its implication in remote monitoring application including security, health and fitness apps. This paper provides an analysis of different machine learning techniques for recognizing human activity. Firstly, all the recent work related to human activity recognition using accelerometer data is analyzed and presented in the paper. In this study the accelerometer used in smartphones as well as those embedded in wearable devices are compared and recognition methodologies applied on both the devices are presented. The dataset used in this project is a transformed version of \"Activity Recognition using Cell Phone Accelerometers,\" by the Wireless Sensor Data Mining WSDM. Some important features were extracted from the data and based on it different models were assessed using Matlab Classification Learner App. Four distinct machine learning techniques were applied on the dataset, namely, linear regression, logistic regression, support vector machine and neural network. For the purposed of applying classifier Weka tool is used. The results of these algorithms are compared and presented in the form of tables and graphs and Bagged Tree is identified to be the best algorithm based on accuracy results.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123530836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A subspace based channel mismatch estimator for time-interleaved ADC systems 基于子空间的时间交错ADC系统信道失配估计
Pub Date : 2020-08-01 DOI: 10.1109/UCET51115.2020.9205451
Lun Ma
Time-interleaved (TI) architecture with several slow but accurate sub-ADCs in parallel is a promising approach to implement high speed sampling rate and high quantization precision simultaneously. A major bottleneck in realizing a TIADC is mismatches such as offset and gain mismatches among channel ADCs as well as timing skew of the clocks distributed to them, which may reduce the achievable linearity and significantly degrade the sampling performance. The fundamental challenge of existing mismatches estimator is getting rid of the interaction between the gain and timing mismatch effects. In this paper, two frequency bins are jointly considered, corresponding to which the linear phased vectors, generated by TI architecture, are studied in terms of their rotational relationships. The timing errors can be directly estimated without the impact of gain mismatch by making use of the fact that the rotational matrix only depends on the timing skew and the frequency spacing between these two frequency bins. Moreover, the presented method is robust to residual offset errors and system noise. The effectiveness of the proposed approach will be verified by the simulated radar echo data.
时间交错(TI)结构是一种有希望同时实现高速采样率和高量化精度的方法。实现TIADC的主要瓶颈是通道adc之间的失调和增益不匹配以及分配给它们的时钟的时序倾斜,这可能会降低可实现的线性度并显着降低采样性能。现有失配估计方法面临的根本挑战是如何消除增益和时序失配效应之间的相互作用。本文将两个频率箱联合考虑,研究了TI体系结构产生的线性相矢量的旋转关系。利用旋转矩阵只依赖于时序倾斜和两个频率箱之间的频率间隔这一事实,可以在不受增益失配影响的情况下直接估计时序误差。此外,该方法对残差误差和系统噪声具有较强的鲁棒性。仿真雷达回波数据验证了该方法的有效性。
{"title":"A subspace based channel mismatch estimator for time-interleaved ADC systems","authors":"Lun Ma","doi":"10.1109/UCET51115.2020.9205451","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205451","url":null,"abstract":"Time-interleaved (TI) architecture with several slow but accurate sub-ADCs in parallel is a promising approach to implement high speed sampling rate and high quantization precision simultaneously. A major bottleneck in realizing a TIADC is mismatches such as offset and gain mismatches among channel ADCs as well as timing skew of the clocks distributed to them, which may reduce the achievable linearity and significantly degrade the sampling performance. The fundamental challenge of existing mismatches estimator is getting rid of the interaction between the gain and timing mismatch effects. In this paper, two frequency bins are jointly considered, corresponding to which the linear phased vectors, generated by TI architecture, are studied in terms of their rotational relationships. The timing errors can be directly estimated without the impact of gain mismatch by making use of the fact that the rotational matrix only depends on the timing skew and the frequency spacing between these two frequency bins. Moreover, the presented method is robust to residual offset errors and system noise. The effectiveness of the proposed approach will be verified by the simulated radar echo data.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121329829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Small-Scale NOMA Communication Technique Using Auxiliary Signal Superposition 基于辅助信号叠加的小型NOMA通信新技术
Pub Date : 2020-08-01 DOI: 10.1109/UCET51115.2020.9205475
Lemayian Joel Poncha, Jehad M. Hamamreh
In this work, an advanced novel small-scale non-orthogonal multiple access (NOMA) utilizing physical layer security (PLS) techniques used for enhancing communication security and reliability for two users is proposed. This work is motivated by current challenges faced by the conventional NOMA techniques. For instance, the recent exclusion of power-domain NOMA (PD-NOMA) from 3GPP release 17 due to its performance degradation. The efficiency and novelty of the proposed system are presented via mathematical analysis and validated by Monte Carlo simulations. Results indicate that the proposed model achieves secure and efficient communication, suitable for low power consumption and limited processing applications.
在这项工作中,提出了一种先进的新型小规模非正交多址(NOMA),利用物理层安全(PLS)技术来提高两个用户的通信安全性和可靠性。这项工作的动机是当前面临的挑战,传统的NOMA技术。例如,由于功率域NOMA (PD-NOMA)的性能下降,最近从3GPP版本17中排除了它。通过数学分析和蒙特卡罗仿真验证了该系统的有效性和新颖性。结果表明,该模型实现了安全高效的通信,适合低功耗和有限处理应用。
{"title":"Novel Small-Scale NOMA Communication Technique Using Auxiliary Signal Superposition","authors":"Lemayian Joel Poncha, Jehad M. Hamamreh","doi":"10.1109/UCET51115.2020.9205475","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205475","url":null,"abstract":"In this work, an advanced novel small-scale non-orthogonal multiple access (NOMA) utilizing physical layer security (PLS) techniques used for enhancing communication security and reliability for two users is proposed. This work is motivated by current challenges faced by the conventional NOMA techniques. For instance, the recent exclusion of power-domain NOMA (PD-NOMA) from 3GPP release 17 due to its performance degradation. The efficiency and novelty of the proposed system are presented via mathematical analysis and validated by Monte Carlo simulations. Results indicate that the proposed model achieves secure and efficient communication, suitable for low power consumption and limited processing applications.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131350125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Preventing Identity Attacks in RFID Backscatter Communication Systems: A Physical-layer Approach RFID反向散射通信系统中身份攻击的预防:一种物理层方法
Pub Date : 2020-08-01 DOI: 10.1109/UCET51115.2020.9205427
Ahsan Mehmood, Waqas Aman, Muhammad Mahboob Ur Rahman, M. Imran, Q. Abbasi
This work considers identity attack on a radio-frequency identification (RFID)-based backscatter communication system. Specifically, we consider a singlereader, single-tag RFID system whereby the reader and the tag undergo two-way signaling which enables the reader to extract the tag ID in order to authenticate the legitimate tag (L-tag). We then consider a scenario whereby a malicious tag (M-tag)—having the same ID as the Ltag programmed in its memory by a wizard—attempts to deceive the reader by pretending to be the L-tag. To this end, we counter the identity attack by exploiting the non-reciprocity of the end-to-end channel (i.e., the residual channel) between the reader and the tag as the fingerprint of the tag. The passive nature of the tag(s) (and thus, lack of any computational platform at the tag) implies that the proposed light-weight physical-layer authentication method is implemented at the reader. To be concrete, in our proposed scheme, the reader acquires the raw data via two-way (challenge-response) message exchange mechanism, does least-squares estimation to extract the fingerprint, and does binary hypothesis testing to do authentication. We also provide closed-form expressions for the two error probabilities of interest (i.e., false alarm and missed detection). Simulation results attest to the efficacy of the proposed method.
本文研究了基于射频识别(RFID)的反向散射通信系统中的身份攻击问题。具体来说,我们考虑一个单阅读器、单标签RFID系统,其中阅读器和标签接受双向信号,使阅读器能够提取标签ID,以验证合法标签(l -标签)。然后,我们考虑这样一种场景:恶意标签(m标签)——与向导在其内存中编程的Ltag具有相同的ID——试图通过假装是l标签来欺骗读取器。为此,我们通过利用读取器和标签之间端到端通道(即剩余通道)的非互易性作为标签的指纹来对抗身份攻击。标签的被动特性(因此,标签上缺乏任何计算平台)意味着所建议的轻量级物理层身份验证方法是在阅读器上实现的。具体来说,在我们提出的方案中,读者通过双向(挑战-响应)消息交换机制获取原始数据,进行最小二乘估计提取指纹,并进行二元假设检验进行身份验证。我们还提供了两种感兴趣的错误概率(即误报和漏检)的封闭形式表达式。仿真结果验证了该方法的有效性。
{"title":"Preventing Identity Attacks in RFID Backscatter Communication Systems: A Physical-layer Approach","authors":"Ahsan Mehmood, Waqas Aman, Muhammad Mahboob Ur Rahman, M. Imran, Q. Abbasi","doi":"10.1109/UCET51115.2020.9205427","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205427","url":null,"abstract":"This work considers identity attack on a radio-frequency identification (RFID)-based backscatter communication system. Specifically, we consider a singlereader, single-tag RFID system whereby the reader and the tag undergo two-way signaling which enables the reader to extract the tag ID in order to authenticate the legitimate tag (L-tag). We then consider a scenario whereby a malicious tag (M-tag)—having the same ID as the Ltag programmed in its memory by a wizard—attempts to deceive the reader by pretending to be the L-tag. To this end, we counter the identity attack by exploiting the non-reciprocity of the end-to-end channel (i.e., the residual channel) between the reader and the tag as the fingerprint of the tag. The passive nature of the tag(s) (and thus, lack of any computational platform at the tag) implies that the proposed light-weight physical-layer authentication method is implemented at the reader. To be concrete, in our proposed scheme, the reader acquires the raw data via two-way (challenge-response) message exchange mechanism, does least-squares estimation to extract the fingerprint, and does binary hypothesis testing to do authentication. We also provide closed-form expressions for the two error probabilities of interest (i.e., false alarm and missed detection). Simulation results attest to the efficacy of the proposed method.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132421640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2020 International Conference on UK-China Emerging Technologies (UCET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1