Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061360
A. Bondok, Wonseok Lee, Taejoon Kim
The realization of intelligent transportation systems requires the use of specific networks such as Vehicular Ad Hoc Networks (VANETs). VANETs are used to connect vehicles with each other and with fixed infrastructure Road Side Units (RSUs). In powering the RSUs, renewable energy is a great alternative to conventional electric grid. This paper proposes an efficient scheduling algorithm for serving vehicles in a green vehicular network with the aim to maximize the number of served vehicles while maintaining a sustainable energy level. We define and compute four metrics, for each vehicle, of a substantial impact on both the quality of service (QoS) and the power to be consumed. The proposed scheme outperforms other scheduler in terms of the percentage of served vehicles under different arrival rates, various values of average vehicle velocities, variable data size and varying the amount of harvested energy.
智能交通系统的实现需要使用特定的网络,如车辆自组织网络(VANETs)。vanet用于车辆之间以及与固定基础设施Road Side Units (rsu)之间的连接。在为rsu供电方面,可再生能源是传统电网的绝佳替代品。本文提出了一种高效的绿色车辆网络服务车辆调度算法,其目标是在保持可持续能量水平的同时使服务车辆数量最大化。我们为每辆车定义并计算了四个指标,这些指标对服务质量(QoS)和消耗的功率都有重大影响。该方案在不同到达率、不同平均车速值、不同数据大小和不同能量收集量下的服务车辆百分比方面优于其他调度程序。
{"title":"Efficient Scheduling for VANET Considering Renewable Energy","authors":"A. Bondok, Wonseok Lee, Taejoon Kim","doi":"10.23919/ICACT48636.2020.9061360","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061360","url":null,"abstract":"The realization of intelligent transportation systems requires the use of specific networks such as Vehicular Ad Hoc Networks (VANETs). VANETs are used to connect vehicles with each other and with fixed infrastructure Road Side Units (RSUs). In powering the RSUs, renewable energy is a great alternative to conventional electric grid. This paper proposes an efficient scheduling algorithm for serving vehicles in a green vehicular network with the aim to maximize the number of served vehicles while maintaining a sustainable energy level. We define and compute four metrics, for each vehicle, of a substantial impact on both the quality of service (QoS) and the power to be consumed. The proposed scheme outperforms other scheduler in terms of the percentage of served vehicles under different arrival rates, various values of average vehicle velocities, variable data size and varying the amount of harvested energy.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116586714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061456
Nawsheen Promy, Tashfiq Rahman, Sadman Islam, Saqlain Mahmud Khan
Question Leakage has become one of the biggest problems in the last 5–6 years in Bangladesh. Instead of taking different pragmatic steps, it has become very difficult for the exam board controller to check the leakage of question papers. This is a quotidian scenario in Bangladesh. We mainly intend to solve this problem in our proposed system. In our proposed system, there will be a IOT based smart box in which all the board questions will be carried. If anyone tries to open the box illegal to leak the questions before the exam, our proposed system will show us the location details of the box and when the culprit will open the smart box, an image will be captured. In our proposed model, the attempt of tampering the smart box can also be identified.
{"title":"Automated smart box to alleviate unfair means in public examination in the context of Bangladesh","authors":"Nawsheen Promy, Tashfiq Rahman, Sadman Islam, Saqlain Mahmud Khan","doi":"10.23919/ICACT48636.2020.9061456","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061456","url":null,"abstract":"Question Leakage has become one of the biggest problems in the last 5–6 years in Bangladesh. Instead of taking different pragmatic steps, it has become very difficult for the exam board controller to check the leakage of question papers. This is a quotidian scenario in Bangladesh. We mainly intend to solve this problem in our proposed system. In our proposed system, there will be a IOT based smart box in which all the board questions will be carried. If anyone tries to open the box illegal to leak the questions before the exam, our proposed system will show us the location details of the box and when the culprit will open the smart box, an image will be captured. In our proposed model, the attempt of tampering the smart box can also be identified.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128198602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061507
S. Shin, Jin-Won Ho, Vyacheslav Yuryevich Pak
E-government has evolved through constant interaction between technological advances and social change. The competence of each department is limited in solving social issues that are becoming more complex, and it is time to solve the problem creatively through openness and communications based on ICT. Since 2010, each country has been implementing the Digital Transformation Policy to improve national competitiveness by applying digital technology to society as a whole. A paradigm shift in public services is required and a new e-government model is proposed as an alternative. By digitizing 100% of government services, vision is about sustainable development across society and strategies are presented for platform, open data, and human resource training. Specifically, improvements are being made to infrastructure, human resources expansion, ecosystems and public services. Considering the today's infrastructure and digital capabilities of Uzbekistan, the country is expected to enter digitalization at the level of current advanced countries like Korea at present around 2030. To achieve this, government must take the lead in innovation and be exemplary. To do this, digital government should be implemented by 2025. It will be possible to optimize governance and administration, to create a transparent nation and a paperless government and to be processed anywhere without visiting the government office. Ultimately, it will be able to realize the goal of providing multi-channel public service to individuals and companies as entry into one of advanced countries and a hub of e-commerce based on digital economy.
{"title":"Digital Transformation through e-Government Innovation in Uzbekistan","authors":"S. Shin, Jin-Won Ho, Vyacheslav Yuryevich Pak","doi":"10.23919/ICACT48636.2020.9061507","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061507","url":null,"abstract":"E-government has evolved through constant interaction between technological advances and social change. The competence of each department is limited in solving social issues that are becoming more complex, and it is time to solve the problem creatively through openness and communications based on ICT. Since 2010, each country has been implementing the Digital Transformation Policy to improve national competitiveness by applying digital technology to society as a whole. A paradigm shift in public services is required and a new e-government model is proposed as an alternative. By digitizing 100% of government services, vision is about sustainable development across society and strategies are presented for platform, open data, and human resource training. Specifically, improvements are being made to infrastructure, human resources expansion, ecosystems and public services. Considering the today's infrastructure and digital capabilities of Uzbekistan, the country is expected to enter digitalization at the level of current advanced countries like Korea at present around 2030. To achieve this, government must take the lead in innovation and be exemplary. To do this, digital government should be implemented by 2025. It will be possible to optimize governance and administration, to create a transparent nation and a paperless government and to be processed anywhere without visiting the government office. Ultimately, it will be able to realize the goal of providing multi-channel public service to individuals and companies as entry into one of advanced countries and a hub of e-commerce based on digital economy.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128442845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061472
Md. Moklesur Rahman, Md. Shafiqul Islam, Mir Kanon Ara Jannat, Md. Hafizur Rahman, Md. Arifuzzaman, R. Sassi, M. Aktaruzzaman
The classification of eye states (open or closed) has numerous potential applications such as fatigue detection, psychological state analysis, smart home devices controlling, etc. Due to its importance, there are a number of works already reported in the literature using traditional shallow neural networks or support vector machines, which have reported good accuracy (about 96%). However, there is still enough space to improve the accuracy of existing systems using proper classification methods. The major problem with traditional classifiers is that they depend on manual selection of features and that is very challenging to select meaningful features for such classifiers. Convolutional neural networks (CNNs) have become popular for computer vision and pattern recognition problems with better performance than traditional methods. In this study, we proposed a model of CNN (EyeNet) for eye states classification and tested it on three datasets (CEW, ZJU, and MRL Eye). The quality (or diversity) of a recently proposed larger dataset (MRL Eye) has been compared with two other existing datasets with respect to the sufficient training of the model. The model shows very high performance (about 99% accuracy for classification of eye states on the test set of data when it is trained by the training samples of the same dataset. The proposed model improves the accuracy of the best existing method by about 3%. The performance of the model for classification of samples coming from different datasets is reduced when it is trained with the MRL Eye dataset. This concludes that even though, the MRL Eye has a large number of samples compared to other datasets, but diversity still lacks in the MRL Eye samples to sufficiently train the model.
{"title":"EyeNet: An Improved Eye States Classification System using Convolutional Neural Network","authors":"Md. Moklesur Rahman, Md. Shafiqul Islam, Mir Kanon Ara Jannat, Md. Hafizur Rahman, Md. Arifuzzaman, R. Sassi, M. Aktaruzzaman","doi":"10.23919/ICACT48636.2020.9061472","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061472","url":null,"abstract":"The classification of eye states (open or closed) has numerous potential applications such as fatigue detection, psychological state analysis, smart home devices controlling, etc. Due to its importance, there are a number of works already reported in the literature using traditional shallow neural networks or support vector machines, which have reported good accuracy (about 96%). However, there is still enough space to improve the accuracy of existing systems using proper classification methods. The major problem with traditional classifiers is that they depend on manual selection of features and that is very challenging to select meaningful features for such classifiers. Convolutional neural networks (CNNs) have become popular for computer vision and pattern recognition problems with better performance than traditional methods. In this study, we proposed a model of CNN (EyeNet) for eye states classification and tested it on three datasets (CEW, ZJU, and MRL Eye). The quality (or diversity) of a recently proposed larger dataset (MRL Eye) has been compared with two other existing datasets with respect to the sufficient training of the model. The model shows very high performance (about 99% accuracy for classification of eye states on the test set of data when it is trained by the training samples of the same dataset. The proposed model improves the accuracy of the best existing method by about 3%. The performance of the model for classification of samples coming from different datasets is reduced when it is trained with the MRL Eye dataset. This concludes that even though, the MRL Eye has a large number of samples compared to other datasets, but diversity still lacks in the MRL Eye samples to sufficiently train the model.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123181735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061429
R. Khiati, Muhammed Hanif, Choonhwa Lee
With the increase in population, there is an increasing number of patients. Subsequently, we also see an increase in the amount of patient data that needs to be processed, further emphasizing the need for new systems and developments that can handle such large quantities of big data. To this end, this paper proposed a potential solution to this problem in the form of a system that can analyze a patient's data in real-time, providing doctors and other intended healthcare personnel with an immediate report of a patient's situation, allowing for a quicker response time, better treatment, and the first step towards a grand realized smart hospital system in the long-term. This system, aided by the rapid analysis of Apache Flink, produces the requested data to the doctor as intended, enabling for a swift response time to patient issues, thus highlighting a unique approach to the field, a contrast to other previous research in this field where there is a lack of said provisions.
{"title":"Adapting distributed stream processing technologies for the automation of modern health care systems","authors":"R. Khiati, Muhammed Hanif, Choonhwa Lee","doi":"10.23919/ICACT48636.2020.9061429","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061429","url":null,"abstract":"With the increase in population, there is an increasing number of patients. Subsequently, we also see an increase in the amount of patient data that needs to be processed, further emphasizing the need for new systems and developments that can handle such large quantities of big data. To this end, this paper proposed a potential solution to this problem in the form of a system that can analyze a patient's data in real-time, providing doctors and other intended healthcare personnel with an immediate report of a patient's situation, allowing for a quicker response time, better treatment, and the first step towards a grand realized smart hospital system in the long-term. This system, aided by the rapid analysis of Apache Flink, produces the requested data to the doctor as intended, enabling for a swift response time to patient issues, thus highlighting a unique approach to the field, a contrast to other previous research in this field where there is a lack of said provisions.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126210481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061266
Ju Jinquan, M. Al-Absi, A. Al-Absi, Hoon-Jae Lee
With the rapid development of information technology, the influence of network on human way of life is greatly enhanced, and network technology is rapidly popularized in all fields of society, which makes the security of computer network become an urgent problem to be solved. How to ensure the rapid and healthy development of the network has become the focus of attention of scholars, and has a very prominent realistic background and extremely important theoretical significance. In this paper, the research background of computer network security, the significance of this paper, the related research status at home and abroad and the research methods used in this paper are summarized. Then the theory of network security technology is advanced. This paper summarizes the connotation of network security, the research content of network security, the framework of network security information and the dynamic model of network security. In the third part, the problems of computer network security are analyzed, and the network security problems are studied from four aspects: network hardware, network software, network managers and network users, and the possible network security problems and their causes are analyzed. In the fourth part, the network security protection measures are put forward, and the security measures of hardware system, system security loophole, application software and manager are put forward respectively.
{"title":"Analysis and Protection of Computer Network Security Issues","authors":"Ju Jinquan, M. Al-Absi, A. Al-Absi, Hoon-Jae Lee","doi":"10.23919/ICACT48636.2020.9061266","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061266","url":null,"abstract":"With the rapid development of information technology, the influence of network on human way of life is greatly enhanced, and network technology is rapidly popularized in all fields of society, which makes the security of computer network become an urgent problem to be solved. How to ensure the rapid and healthy development of the network has become the focus of attention of scholars, and has a very prominent realistic background and extremely important theoretical significance. In this paper, the research background of computer network security, the significance of this paper, the related research status at home and abroad and the research methods used in this paper are summarized. Then the theory of network security technology is advanced. This paper summarizes the connotation of network security, the research content of network security, the framework of network security information and the dynamic model of network security. In the third part, the problems of computer network security are analyzed, and the network security problems are studied from four aspects: network hardware, network software, network managers and network users, and the possible network security problems and their causes are analyzed. In the fourth part, the network security protection measures are put forward, and the security measures of hardware system, system security loophole, application software and manager are put forward respectively.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114216778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/icact48636.2020.9061372
{"title":"Copyright","authors":"","doi":"10.23919/icact48636.2020.9061372","DOIUrl":"https://doi.org/10.23919/icact48636.2020.9061372","url":null,"abstract":"","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129310638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061234
Pakizah Saqib, Usman Qamar, Reda Ayesha Khan, Andleeb Aslam
DNA Microarray technology is a valuable advancement in medical field but it gives birth to many challenges like curse of dimensionality, storage and computational requirements. In this paper we have proposed, a multiple filters and GA wrapper based hybrid approach (MF-GARF) that incorporates Random forest as fitness evaluator of features. The proposed hybrid approach MF-GARF is comprised of three phases relevancy block; containing information theory based filters Information Gain, Gain Ratio and Gini Index, responsible for ensuring relevancy and removal of irrelevant and noisy features. Second phase is Redundancy block; incorporating Pearson Correlation statistics to remove redundancy among features, and then final phase Optimization Block; containing Genetic Algorithm wrapper with Random Forest as fitness evaluator, responsible for generating an optimal feature subset with high predictive power. Random Forest with 10-fold cross validation is used to calculate the classification accuracy of selected feature subset. Experiments are carried out on 7 publically available benchmark Microarray cancer datasets and the proposed algorithm has achieved good accuracy with minimal selected features for all datasets. The comparison with other state of the art hybrid techniques validates the effectiveness of our proposed approach.
{"title":"MF-GARF: Hybridizing Multiple Filters and GA Wrapper for Feature Selection of Microarray Cancer Datasets","authors":"Pakizah Saqib, Usman Qamar, Reda Ayesha Khan, Andleeb Aslam","doi":"10.23919/ICACT48636.2020.9061234","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061234","url":null,"abstract":"DNA Microarray technology is a valuable advancement in medical field but it gives birth to many challenges like curse of dimensionality, storage and computational requirements. In this paper we have proposed, a multiple filters and GA wrapper based hybrid approach (MF-GARF) that incorporates Random forest as fitness evaluator of features. The proposed hybrid approach MF-GARF is comprised of three phases relevancy block; containing information theory based filters Information Gain, Gain Ratio and Gini Index, responsible for ensuring relevancy and removal of irrelevant and noisy features. Second phase is Redundancy block; incorporating Pearson Correlation statistics to remove redundancy among features, and then final phase Optimization Block; containing Genetic Algorithm wrapper with Random Forest as fitness evaluator, responsible for generating an optimal feature subset with high predictive power. Random Forest with 10-fold cross validation is used to calculate the classification accuracy of selected feature subset. Experiments are carried out on 7 publically available benchmark Microarray cancer datasets and the proposed algorithm has achieved good accuracy with minimal selected features for all datasets. The comparison with other state of the art hybrid techniques validates the effectiveness of our proposed approach.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061215
Moon-Il Joo, J. Sim, Tae-Gyu Lee
This paper proposes an wireless disconnected transfer method which realizes the continuous data transfer of wireless digital patches in wireless bioinformation sensing networks. It describes a bioinformation sensing system and a bioinformation sensing method using mobile patches. It is a research on wireless sensing system and wireless gathering method based on information gathering interface using mobile patch. The unguided wireless channel generally shows link disconnections and propagation delays due to their low signal connectivity. Conventional wireless sensing network protocols did not consider any fault models about physical wireless link faults. Consequently, they have shown data transfer inefficiency for both data link control and physical wireless link control. To overcome these wireless digital patch environmental problems, this paper suggests a new wireless smart agent system, which provides wireless or mobile patches with previous transfer layer protocols compensated.
{"title":"Disconnected operation method for recovering bioinformation in a digital patch system","authors":"Moon-Il Joo, J. Sim, Tae-Gyu Lee","doi":"10.23919/ICACT48636.2020.9061215","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061215","url":null,"abstract":"This paper proposes an wireless disconnected transfer method which realizes the continuous data transfer of wireless digital patches in wireless bioinformation sensing networks. It describes a bioinformation sensing system and a bioinformation sensing method using mobile patches. It is a research on wireless sensing system and wireless gathering method based on information gathering interface using mobile patch. The unguided wireless channel generally shows link disconnections and propagation delays due to their low signal connectivity. Conventional wireless sensing network protocols did not consider any fault models about physical wireless link faults. Consequently, they have shown data transfer inefficiency for both data link control and physical wireless link control. To overcome these wireless digital patch environmental problems, this paper suggests a new wireless smart agent system, which provides wireless or mobile patches with previous transfer layer protocols compensated.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128467833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061254
Ditthawat Songratthaset, S. Pattaramalai
In this paper, an orthogonal polynomial based complex Gaussian process of nonlinear power amplifier for the filter bank multicarrier modulation (FBMC) systems is proposed. One of the most challenging problems for the FBMC systems is a non-linear distortion caused by a high power amplifier (HPA). Due to the signals for the FBMC communication scenario are modeled as a complex-Gaussian distribution, an analytical expression of the HPA characteristic based on an orthogonal polynomial method by using an upper triangle solution for complex-Gaussian process is derived in this paper. To ensure the robustness of the proposed orthogonal polynomials, the different input distribution such as an exponential and Rayleigh distribution is investigated. In the simulation, a normalized mean squared error (NMSE) and the probability of error performances (BER) in the additive white Gaussian noise (AWGN) channel and the frequency-selective Rayleigh fading channel of the proposed orthogonal polynomial method is determined. Simulation results show that the proposed orthogonal polynomial method significantly outperforms the conventional polynomial method. Furthermore, the proposed orthogonal polynomial based complex-Gaussian input distribution is superior to the exponential, and Rayleigh input distribution in terms of both NMSE and BER performance.
{"title":"Orthogonal Polynomials Based Complex Gaussian Processes of Nonlinear Power Amplifier for 5G Wireless Communication Systems","authors":"Ditthawat Songratthaset, S. Pattaramalai","doi":"10.23919/ICACT48636.2020.9061254","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061254","url":null,"abstract":"In this paper, an orthogonal polynomial based complex Gaussian process of nonlinear power amplifier for the filter bank multicarrier modulation (FBMC) systems is proposed. One of the most challenging problems for the FBMC systems is a non-linear distortion caused by a high power amplifier (HPA). Due to the signals for the FBMC communication scenario are modeled as a complex-Gaussian distribution, an analytical expression of the HPA characteristic based on an orthogonal polynomial method by using an upper triangle solution for complex-Gaussian process is derived in this paper. To ensure the robustness of the proposed orthogonal polynomials, the different input distribution such as an exponential and Rayleigh distribution is investigated. In the simulation, a normalized mean squared error (NMSE) and the probability of error performances (BER) in the additive white Gaussian noise (AWGN) channel and the frequency-selective Rayleigh fading channel of the proposed orthogonal polynomial method is determined. Simulation results show that the proposed orthogonal polynomial method significantly outperforms the conventional polynomial method. Furthermore, the proposed orthogonal polynomial based complex-Gaussian input distribution is superior to the exponential, and Rayleigh input distribution in terms of both NMSE and BER performance.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116944884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}