Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272907
S. Ahdan, H. Situmorang, N. Syambas
At this time forwarding strategy became the center of attention of researchers in area named data networking (NDN). This is because the forwarding strategy is responsible for managing every packet of interest received by the NDN router, then the characteristics of forwarding strategies will have a significant impact on NDN performance. Therefore this study aims to perform analysis using a large approach in forwarding strategy that is broadcast approach. It is expected that the results of this study can be utilized by researchers in the field of NDN to determine the direction of research. Parameter of study in this research is delay in observation time interval. A forwarding strategy using a broadcast approach is simulated in order to understand the NDN delay characteristics within the observation interval. The simulation of the research was conducted on the NDNSim simulator with several scenarios. From the simulation results obtained that cumulatively delay broadcast forwarding strategy in multi producer scenario there is no difference between fulldelay and lastdelay. However, in the single producer scenario there is a difference between fulldelay and lastdelay this can be influenced by the large number of consumers who send interest to the producer and also based on the flooding method of the interest package in order to find the nearest NDN router containing the expected content as soon as possible, So that it can overload the network performance and effects overhead.
{"title":"Effect of overhead flooding on NDN forwarding strategies based on broadcast approach","authors":"S. Ahdan, H. Situmorang, N. Syambas","doi":"10.1109/TSSA.2017.8272907","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272907","url":null,"abstract":"At this time forwarding strategy became the center of attention of researchers in area named data networking (NDN). This is because the forwarding strategy is responsible for managing every packet of interest received by the NDN router, then the characteristics of forwarding strategies will have a significant impact on NDN performance. Therefore this study aims to perform analysis using a large approach in forwarding strategy that is broadcast approach. It is expected that the results of this study can be utilized by researchers in the field of NDN to determine the direction of research. Parameter of study in this research is delay in observation time interval. A forwarding strategy using a broadcast approach is simulated in order to understand the NDN delay characteristics within the observation interval. The simulation of the research was conducted on the NDNSim simulator with several scenarios. From the simulation results obtained that cumulatively delay broadcast forwarding strategy in multi producer scenario there is no difference between fulldelay and lastdelay. However, in the single producer scenario there is a difference between fulldelay and lastdelay this can be influenced by the large number of consumers who send interest to the producer and also based on the flooding method of the interest package in order to find the nearest NDN router containing the expected content as soon as possible, So that it can overload the network performance and effects overhead.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115326758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272929
Bader Alghamdi, L. Potter, Steve Drew
Digital technologies, such as cloud computing, have transformed business activities, particularly in the public domain. In the corporate sector, where cloud computing technology has long been implemented, some organisations have succeeded, while others have been less successful. Saudi Arabia has enthusiastically supported the move to cloud computing technology; however, from a business perspective, its implementation of government cloud technology is still relatively nascent and has faced numerous challenges. The existing literature suggests that the government cloud migration depends not only on project drivers, but also on considerable barriers, which often delay successful implementation. Furthermore, many current barriers and drivers clearly involve the roles of cloud vendors, meaning that cloud vendors must be fully engaged in order to develop comprehensive solutions. Addressing this phenomenon from the lens of enterprise architecture (EA) may support the development of appropriate deployment requirements for optimal government cloud implementation. Thus, this paper is a research in progress that analyses the major barriers and drivers affecting cloud implementation in public organisations, taking into consideration the perspectives of cloud consumers and vendors. This paper also introduces a mapping conceptual model throughout The Open Group Architecture Framework (TOGAF) that supports a novel framework for tackling these barriers and their influences and enhancing drivers via a set of requirements.
{"title":"Desinge and implementation of government cloud computing requirements: TOGAF","authors":"Bader Alghamdi, L. Potter, Steve Drew","doi":"10.1109/TSSA.2017.8272929","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272929","url":null,"abstract":"Digital technologies, such as cloud computing, have transformed business activities, particularly in the public domain. In the corporate sector, where cloud computing technology has long been implemented, some organisations have succeeded, while others have been less successful. Saudi Arabia has enthusiastically supported the move to cloud computing technology; however, from a business perspective, its implementation of government cloud technology is still relatively nascent and has faced numerous challenges. The existing literature suggests that the government cloud migration depends not only on project drivers, but also on considerable barriers, which often delay successful implementation. Furthermore, many current barriers and drivers clearly involve the roles of cloud vendors, meaning that cloud vendors must be fully engaged in order to develop comprehensive solutions. Addressing this phenomenon from the lens of enterprise architecture (EA) may support the development of appropriate deployment requirements for optimal government cloud implementation. Thus, this paper is a research in progress that analyses the major barriers and drivers affecting cloud implementation in public organisations, taking into consideration the perspectives of cloud consumers and vendors. This paper also introduces a mapping conceptual model throughout The Open Group Architecture Framework (TOGAF) that supports a novel framework for tackling these barriers and their influences and enhancing drivers via a set of requirements.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116739850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272908
A. Spalvieri
Coherent optical and radio systems suffer from phase noise introduced by radio frequency oscillators or lasers used for up-conversion and down-conversion. In strong phase noise conditions, cycle slips of the recovered carrier appear, leading to error floor. Pilot symbols are known to be an effective countermeasure against cycle slips. In this paper we compare the performance of three pilot-aided demodulation schemes. The results show that the trellis based method outperforms the competitors.
{"title":"Comparison between three methods of pilot-aided demodulation","authors":"A. Spalvieri","doi":"10.1109/TSSA.2017.8272908","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272908","url":null,"abstract":"Coherent optical and radio systems suffer from phase noise introduced by radio frequency oscillators or lasers used for up-conversion and down-conversion. In strong phase noise conditions, cycle slips of the recovered carrier appear, leading to error floor. Pilot symbols are known to be an effective countermeasure against cycle slips. In this paper we compare the performance of three pilot-aided demodulation schemes. The results show that the trellis based method outperforms the competitors.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115389362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272925
Y. S. S. Risqi, Susila Windarta
In this paper, a comparison of three Pseudo Random Number Generator (PRNG) based on SIMON-64, SPECK-64 and SIMECK-64 using PGV-5 scheme is presented. We use NIST randomness test suites sts-2.1.1 which consists of 15 statistical tests. According to the test results, SIMON-64-PGV-5 and SIMECK-64-PGV-5 PRNG pass all tests but SPECK-64-PGV-5 PRNG does not pass Random Excursions test. SIMON-64-PGV-5 and SIMECK-64-PGV-5 PRNG have good randomness properties.
{"title":"Statistical test on lightweight block cipher-based PRNG","authors":"Y. S. S. Risqi, Susila Windarta","doi":"10.1109/TSSA.2017.8272925","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272925","url":null,"abstract":"In this paper, a comparison of three Pseudo Random Number Generator (PRNG) based on SIMON-64, SPECK-64 and SIMECK-64 using PGV-5 scheme is presented. We use NIST randomness test suites sts-2.1.1 which consists of 15 statistical tests. According to the test results, SIMON-64-PGV-5 and SIMECK-64-PGV-5 PRNG pass all tests but SPECK-64-PGV-5 PRNG does not pass Random Excursions test. SIMON-64-PGV-5 and SIMECK-64-PGV-5 PRNG have good randomness properties.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122806786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272898
A. Kusyanti, Rakhmadhany Primananda, A. Bhawiyuga, Ajeng Nurrohmah
Internet of Things (IoT) is an interconnection among devices or “things” that exchange data between them. A man-in-the-middle can be performed when two IoT devices are communicating, therefore secure data transmission between IoT devices has emerged as a challenging task. There are numbers of existing cryptography algorithms that offers protection. However, their utilization in IoT is questionable since the hardware is not suitable for inexpensive yet efficient encryption process. This paper proposed implementation of Grain as the winner for eSTREAM project and compare all version of Grain, i.e Grain v0, Grain v1 and Grain 128 in Arduino Mega 2560 as it used as a single board computer for IoT. The result shows that there is no significant difference in encryption-decryption processing time. While, in generating keystream, Grain 128 will take more time when implemented in Arduino Mega 2560.
物联网(IoT)是设备或“事物”之间的互连,它们之间交换数据。当两个物联网设备通信时,可以执行中间人操作,因此物联网设备之间的安全数据传输已成为一项具有挑战性的任务。有许多现有的加密算法提供保护。然而,它们在物联网中的应用是有问题的,因为硬件不适合廉价但高效的加密过程。本文提出将Grain作为eSTREAM项目的赢家实现,并在Arduino Mega 2560中比较了所有版本的Grain,即Grain v0, Grain v1和Grain 128,因为它用作物联网的单板计算机。结果表明,两者在加解密处理时间上没有显著差异。而在生成密钥流时,在Arduino Mega 2560中实现时,Grain 128将花费更多时间。
{"title":"Statistical comparison of grain algorithm for IoT device security","authors":"A. Kusyanti, Rakhmadhany Primananda, A. Bhawiyuga, Ajeng Nurrohmah","doi":"10.1109/TSSA.2017.8272898","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272898","url":null,"abstract":"Internet of Things (IoT) is an interconnection among devices or “things” that exchange data between them. A man-in-the-middle can be performed when two IoT devices are communicating, therefore secure data transmission between IoT devices has emerged as a challenging task. There are numbers of existing cryptography algorithms that offers protection. However, their utilization in IoT is questionable since the hardware is not suitable for inexpensive yet efficient encryption process. This paper proposed implementation of Grain as the winner for eSTREAM project and compare all version of Grain, i.e Grain v0, Grain v1 and Grain 128 in Arduino Mega 2560 as it used as a single board computer for IoT. The result shows that there is no significant difference in encryption-decryption processing time. While, in generating keystream, Grain 128 will take more time when implemented in Arduino Mega 2560.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121147448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272905
Giva Andriana Mutiara, A. Agung, Rini Handayani
Finding a parking space in a large parking area becomes a problem for a driver these days. This paper presents a design and implementation for a low cost, wireless parking module, which contains of a parking sensor to detect a vehicle, and an LED display available parking space. This module uses a PING ultrasonic sensor and a NodeMCU as a microcontroller. The module connected wirelessly to the main server via a router. The module should cost less than average retail prices of similar module available on the market. A better approach for the vehicle detection scenario is also presented as a result.
{"title":"Low cost wireless parking module design and implementation","authors":"Giva Andriana Mutiara, A. Agung, Rini Handayani","doi":"10.1109/TSSA.2017.8272905","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272905","url":null,"abstract":"Finding a parking space in a large parking area becomes a problem for a driver these days. This paper presents a design and implementation for a low cost, wireless parking module, which contains of a parking sensor to detect a vehicle, and an LED display available parking space. This module uses a PING ultrasonic sensor and a NodeMCU as a microcontroller. The module connected wirelessly to the main server via a router. The module should cost less than average retail prices of similar module available on the market. A better approach for the vehicle detection scenario is also presented as a result.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121281460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272951
Christophorus Ivan Samuels, N. Syambas, Hendrawan, I.Y.M. Edward, Iskandar, W. Shalannanda
As an archipelago country, Indonesia still has many islands which do not have proper infrastructure. This situation creates a huge digital divide which made rural areas often are lagging behind from the cities in terms of economy and public health. To bridge this gap, a government organization initiated a program to provide internet access in rural areas, which then joined by many ISPs. Problem arose when initial method to calculate service level, which based on Ping sensor downtime, cannot be implemented. While the method can detect a failure, it cannot identify a failure which caused by power failure or by transmission (link) failure, so the service level will be significantly lower than it should be. Whereas, the service contract clearly says that the failure which caused by power cannot be charged to ISPs (tolerance factor). To accommodate the contract, a new method to calculate service level shall be made. This paper proposes a new method based on Uptime sensor downtime, which can be collected from Network Management System (NMS). The new method observes the duration of a device's uptime over time and gives different and unique visualization for each type of failure, transmission or power failure. This allow us to calculate service level objectively and effectively. The method gives remarkably improvement in terms of service level percentage. As a comparison, in a simulation test a new method gave 97,5% service level while the old method which based on Ping downtime gave 56% of service level. The huge difference is attributed to many power failures which cannot be identified by the old method and eventually cannot be emitted from the service level calculation.
{"title":"Service level measurement based on Uptime data monitoring for rural internet access services in Indonesia","authors":"Christophorus Ivan Samuels, N. Syambas, Hendrawan, I.Y.M. Edward, Iskandar, W. Shalannanda","doi":"10.1109/TSSA.2017.8272951","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272951","url":null,"abstract":"As an archipelago country, Indonesia still has many islands which do not have proper infrastructure. This situation creates a huge digital divide which made rural areas often are lagging behind from the cities in terms of economy and public health. To bridge this gap, a government organization initiated a program to provide internet access in rural areas, which then joined by many ISPs. Problem arose when initial method to calculate service level, which based on Ping sensor downtime, cannot be implemented. While the method can detect a failure, it cannot identify a failure which caused by power failure or by transmission (link) failure, so the service level will be significantly lower than it should be. Whereas, the service contract clearly says that the failure which caused by power cannot be charged to ISPs (tolerance factor). To accommodate the contract, a new method to calculate service level shall be made. This paper proposes a new method based on Uptime sensor downtime, which can be collected from Network Management System (NMS). The new method observes the duration of a device's uptime over time and gives different and unique visualization for each type of failure, transmission or power failure. This allow us to calculate service level objectively and effectively. The method gives remarkably improvement in terms of service level percentage. As a comparison, in a simulation test a new method gave 97,5% service level while the old method which based on Ping downtime gave 56% of service level. The huge difference is attributed to many power failures which cannot be identified by the old method and eventually cannot be emitted from the service level calculation.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131090215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272894
M. R. Hidayat, A. D. Setiawan, Sofyan Basuki, A. Munir
In this paper, a study on artificial dielectric material and its implementation for a TE10 mode waveguide filter are proposed numerically and experimentally. The use of artificial dielectric material for waveguide filter implementation is intended to produce lower frequency response of filter without enlarging the dimension of waveguide. The filter is designed using a rectangular waveguide which has the width of 72.4 mm and the height of 34 mm with the TE10 cut-off frequency of 2.08GHz. Two identical resonators are inserted into the waveguide and separated in a specific distance. Each resonator is composed of three parts where the left and right parts are made of FR4 epoxy substrate with the same percentage of dimension. Meanwhile, the middle part is made of dielectric material with modified permittivity value using artificial dielectric material of Split Ring Resonator (SRR). The parametric studies are carried out through simulation by changing the distance between resonators and the thickness of resonators. From the measurement, it shows that the frequency response of filter were shifted lower at 1.74GHz with the values of S11 and S21 are −15dB and −3dB, respectively.
{"title":"Artificial dielectric material and its implementation for TEio mode waveguide filter","authors":"M. R. Hidayat, A. D. Setiawan, Sofyan Basuki, A. Munir","doi":"10.1109/TSSA.2017.8272894","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272894","url":null,"abstract":"In this paper, a study on artificial dielectric material and its implementation for a TE10 mode waveguide filter are proposed numerically and experimentally. The use of artificial dielectric material for waveguide filter implementation is intended to produce lower frequency response of filter without enlarging the dimension of waveguide. The filter is designed using a rectangular waveguide which has the width of 72.4 mm and the height of 34 mm with the TE10 cut-off frequency of 2.08GHz. Two identical resonators are inserted into the waveguide and separated in a specific distance. Each resonator is composed of three parts where the left and right parts are made of FR4 epoxy substrate with the same percentage of dimension. Meanwhile, the middle part is made of dielectric material with modified permittivity value using artificial dielectric material of Split Ring Resonator (SRR). The parametric studies are carried out through simulation by changing the distance between resonators and the thickness of resonators. From the measurement, it shows that the frequency response of filter were shifted lower at 1.74GHz with the values of S11 and S21 are −15dB and −3dB, respectively.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117315783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272952
I. Zakia, Asep Hikman Fatahillah, N. Syambas, Asih Setiawati, Housny Mubarok
The culture in an organization influence the intention of employees to give useful information or report any unethical and illegal behaviors performed by their colleagues or leaders in the organization. This limits the freedom of the employees in expressing their opinions which can further affect the performance of the organization. It is required to have a whistleblower system where the employees can express their opinions efficiently, effectively, and anonymously. In this paper, we study existing whistleblower systems that are already used in several organizations. We further identify which system is most suited to our organization in School of Electrical Engineering and Informatics (SEEI), Institut Teknologi Bandung (ITB). We develop the standard operating procedure (SOP) for accomodating aspiration and complaint from the SEEI civitas. Based on this SOP, we adopt the Globaleaks whistleblower system as the Aspiration and Complaint System (ACS) in SEEI ITB.
{"title":"Aspiration and complaint system: From literature survey to implementation","authors":"I. Zakia, Asep Hikman Fatahillah, N. Syambas, Asih Setiawati, Housny Mubarok","doi":"10.1109/TSSA.2017.8272952","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272952","url":null,"abstract":"The culture in an organization influence the intention of employees to give useful information or report any unethical and illegal behaviors performed by their colleagues or leaders in the organization. This limits the freedom of the employees in expressing their opinions which can further affect the performance of the organization. It is required to have a whistleblower system where the employees can express their opinions efficiently, effectively, and anonymously. In this paper, we study existing whistleblower systems that are already used in several organizations. We further identify which system is most suited to our organization in School of Electrical Engineering and Informatics (SEEI), Institut Teknologi Bandung (ITB). We develop the standard operating procedure (SOP) for accomodating aspiration and complaint from the SEEI civitas. Based on this SOP, we adopt the Globaleaks whistleblower system as the Aspiration and Complaint System (ACS) in SEEI ITB.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121710765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272915
A. Spalvieri
Radio transmission on V and H polarizations is a well known technique to double channel capacity in point-to-point microwave radio systems. Due to non-ideal separation between the two polarizations, co-channel interference arises and must be dealt with at the receive side. Here we report the results of a FPGA-based coded modulation system that employs interference cancellation. The results show that the performance of the implemented system is close to the computed one and meets ETSI specifications with large margin.
{"title":"Performance and implementation of a FPGA-based cross polar interference canceller","authors":"A. Spalvieri","doi":"10.1109/TSSA.2017.8272915","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272915","url":null,"abstract":"Radio transmission on V and H polarizations is a well known technique to double channel capacity in point-to-point microwave radio systems. Due to non-ideal separation between the two polarizations, co-channel interference arises and must be dealt with at the receive side. Here we report the results of a FPGA-based coded modulation system that employs interference cancellation. The results show that the performance of the implemented system is close to the computed one and meets ETSI specifications with large margin.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130797790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}