Pub Date : 2017-10-01DOI: 10.1109/UEMCON.2017.8249035
T. Moazzeni
In this paper, a novel spectrum efficient orthogonal signal multiplexing system based on trigonometric transform is presented. In this system, one half of the complex data is multiplexed using orthogonal real subcarrier signals (i.e., cosw1t, cosw2t,…, sinw1t, sinw2t,…) and transmitted on one carrier signal (i.e., coswct) and similarly the other half is multiplexed and transmitted on another carrier (i.e., sinwct). In this way, the number of subcarriers will be reduced by half of the conventional OFDM systems and as a consequent; (i): the occupied bandwidth will be reduced by about half, (ii): the maximum value of the peak to average power ratio of transmitted signal will be also reduced by half, and it is more robust against the Doppler effect. Also, it is shown that the proposed signaling scheme has cyclic convolutional property such that the channel equalization in a multipath fading channel can be accomplished as simple as in OFDM systems by pointwise multiplication.
{"title":"A novel bandwidth efficient orthogonal frequency division multiplexing scheme","authors":"T. Moazzeni","doi":"10.1109/UEMCON.2017.8249035","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249035","url":null,"abstract":"In this paper, a novel spectrum efficient orthogonal signal multiplexing system based on trigonometric transform is presented. In this system, one half of the complex data is multiplexed using orthogonal real subcarrier signals (i.e., cosw1t, cosw2t,…, sinw1t, sinw2t,…) and transmitted on one carrier signal (i.e., coswct) and similarly the other half is multiplexed and transmitted on another carrier (i.e., sinwct). In this way, the number of subcarriers will be reduced by half of the conventional OFDM systems and as a consequent; (i): the occupied bandwidth will be reduced by about half, (ii): the maximum value of the peak to average power ratio of transmitted signal will be also reduced by half, and it is more robust against the Doppler effect. Also, it is shown that the proposed signaling scheme has cyclic convolutional property such that the channel equalization in a multipath fading channel can be accomplished as simple as in OFDM systems by pointwise multiplication.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115292461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/UEMCON.2017.8249044
T. Rehman, M. I. Baig, Armaghan Ahmad
With the advancements made in the field of telecommunication, the quality of service is increasing day by day whilst the user load is simultaneously increasing on the service providers. In order to keep up with the tougher standards, a fairly large amount of money is spend on resource allocation, majority of which often ends up unused and as a result end up being wasted. In this paper we used LTE data obtained on hourly basis for a period of 60 days from a Telecommunication company and carried out its quantitative analysis using deep neural nets. The results have shown stark difference in utilization of resources across rural and urban areas. Also we were able to obtain a handful of key features, which play major role in determining the quality of data transmission, and emphasis on theses could ensure better quality at lesser cost.
{"title":"LTE downlink throughput modeling using neural networks","authors":"T. Rehman, M. I. Baig, Armaghan Ahmad","doi":"10.1109/UEMCON.2017.8249044","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249044","url":null,"abstract":"With the advancements made in the field of telecommunication, the quality of service is increasing day by day whilst the user load is simultaneously increasing on the service providers. In order to keep up with the tougher standards, a fairly large amount of money is spend on resource allocation, majority of which often ends up unused and as a result end up being wasted. In this paper we used LTE data obtained on hourly basis for a period of 60 days from a Telecommunication company and carried out its quantitative analysis using deep neural nets. The results have shown stark difference in utilization of resources across rural and urban areas. Also we were able to obtain a handful of key features, which play major role in determining the quality of data transmission, and emphasis on theses could ensure better quality at lesser cost.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115476154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/UEMCON.2017.8249099
J. Gope, B. Kar, S. Koly, R. Shome, S. Bhadra, A. Bhattacharyya, R. Banerjee
The electronic device industry is an age old industry. Several new electronic ICs evolved day by day with more and more components being cramped into smaller and smaller spaces. Presently, advanced VLSI and ULSI devices are made commercially available to the consumers. On the other hand, the micro-electronics industry suffers from physical limitation as well as from technological limitation. Thereby, the search for new device principle cannot be avoided. In this regard Spintronics technology is vividly significant as it employs spin degree of freedom in quantum dot. Since the last decade Spintronics ushered numerous scope in device vicinity. Even though the hands of researchers are tied as there is no simulator for simulating Spintronics circuits and spin based logic devices. The authors now propose a MATLAB based tool which can be incorporated in SIMULINK for simulation of single spin logic devices. Here, GUI based approach is made to create spin environment to design dynamic part of simulation.
{"title":"MATLAB-GUI based simulation framework for spintronics","authors":"J. Gope, B. Kar, S. Koly, R. Shome, S. Bhadra, A. Bhattacharyya, R. Banerjee","doi":"10.1109/UEMCON.2017.8249099","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249099","url":null,"abstract":"The electronic device industry is an age old industry. Several new electronic ICs evolved day by day with more and more components being cramped into smaller and smaller spaces. Presently, advanced VLSI and ULSI devices are made commercially available to the consumers. On the other hand, the micro-electronics industry suffers from physical limitation as well as from technological limitation. Thereby, the search for new device principle cannot be avoided. In this regard Spintronics technology is vividly significant as it employs spin degree of freedom in quantum dot. Since the last decade Spintronics ushered numerous scope in device vicinity. Even though the hands of researchers are tied as there is no simulator for simulating Spintronics circuits and spin based logic devices. The authors now propose a MATLAB based tool which can be incorporated in SIMULINK for simulation of single spin logic devices. Here, GUI based approach is made to create spin environment to design dynamic part of simulation.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116505187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/UEMCON.2017.8249083
Shakre Elmane, M. Silaghi
In Free and Open-Source Software (FOSS) world, newer is not always better! Automatically updating to the latest version of FOSS applications involves real risks. The newer version could be missing some features, that are essential to some users, but are dropped by the developers. Another possible scenario, with even more serious consequences, is a project taken over by malicious developers who target users' sensitive data, or do other types of damage to their systems. In this research, we improve on the existing FOSS Updates Meta-Recommendations framework, which is shown (in [2], [3]) to increase resistance to certain attacks. We study how to handle more efficiently the situations where reviewers join and/or leave the P2P network, without a significant impact on the accuracy of recommendations or the performance of the system. We investigate some approaches: self-announcement by reviewer, the use of Zero/negative trust weights, introducing Drop/remove messages, and Message Aging. We also introduce some improvements on the message exchanging mechanism utilized by the current framework, to accommodate the newly added functionalities.
{"title":"Handling changes of update reviewers in distributed free and open-source software meta-recommendations","authors":"Shakre Elmane, M. Silaghi","doi":"10.1109/UEMCON.2017.8249083","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249083","url":null,"abstract":"In Free and Open-Source Software (FOSS) world, newer is not always better! Automatically updating to the latest version of FOSS applications involves real risks. The newer version could be missing some features, that are essential to some users, but are dropped by the developers. Another possible scenario, with even more serious consequences, is a project taken over by malicious developers who target users' sensitive data, or do other types of damage to their systems. In this research, we improve on the existing FOSS Updates Meta-Recommendations framework, which is shown (in [2], [3]) to increase resistance to certain attacks. We study how to handle more efficiently the situations where reviewers join and/or leave the P2P network, without a significant impact on the accuracy of recommendations or the performance of the system. We investigate some approaches: self-announcement by reviewer, the use of Zero/negative trust weights, introducing Drop/remove messages, and Message Aging. We also introduce some improvements on the message exchanging mechanism utilized by the current framework, to accommodate the newly added functionalities.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114931583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/UEMCON.2017.8249009
Fariborz Farahmand, Joshua Ripple, M. Atallah, R. Dillon-Merrill
Most research today in electronic communications focuses on developing new technologies and “best practices” to enhance security and privacy. However, these technologies and best-practice codes are all too often not used, and in this failure the users are often their own worst enemies. It is thus important to develop an enhanced understanding of why users indicate concern about security and privacy, but when given the opportunity act contrary to their stated intention. We collect data from 435 participants about 24 electronic activities with a survey and a mixed effects model. We find a significant inverse relationship between their assessed risk and benefit (recognizing that the particular technology matters where some technologies are inherently perceived as more risky than others). This significant inverse relationship represents a departure from decision theories that assume purely cognitive information processing, and the separation of the probabilities and the utilities. We shed light on the role of affect, which commonly competes with cognition, and works as an orienting mechanism in security and privacy behaviors, and discuss business and policy implications of our findings.
{"title":"Security and privacy risks in electronic communications: A user's assessment","authors":"Fariborz Farahmand, Joshua Ripple, M. Atallah, R. Dillon-Merrill","doi":"10.1109/UEMCON.2017.8249009","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249009","url":null,"abstract":"Most research today in electronic communications focuses on developing new technologies and “best practices” to enhance security and privacy. However, these technologies and best-practice codes are all too often not used, and in this failure the users are often their own worst enemies. It is thus important to develop an enhanced understanding of why users indicate concern about security and privacy, but when given the opportunity act contrary to their stated intention. We collect data from 435 participants about 24 electronic activities with a survey and a mixed effects model. We find a significant inverse relationship between their assessed risk and benefit (recognizing that the particular technology matters where some technologies are inherently perceived as more risky than others). This significant inverse relationship represents a departure from decision theories that assume purely cognitive information processing, and the separation of the probabilities and the utilities. We shed light on the role of affect, which commonly competes with cognition, and works as an orienting mechanism in security and privacy behaviors, and discuss business and policy implications of our findings.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130283708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/UEMCON.2017.8249056
A. Nafchi, E. Hamke, Ramiro Jordan, Balu Santhanam
This paper investigates the performance of Orthogonal Frequency Division Multiplex (OFDM) system by integrating the Discrete Fractional Fourier Transform (DFrFT). Here the total number of OFDM subcarriers are 64 where 48 of them are data carriers, and bandwidth allocated to OFDM is 20 MHz. The transmitted signals are assumed to travel through an Additive White Gaussian Noise (AWGN) channel. Simulations are conducted to investigate the Bit Error Rate (BER) performance of OFDM system as a function of energy per bit to noise power spectral density ratio Eb/N0 for both cases of conventional OFDM (FFT-OFDM) and proposed OFDM in this paper based on DFrFT (Fr-OFDM). Simulations confirm the proposed Fr-OFDM performance.
{"title":"Bit Error Rate (BER) analysis of Discrete Fractional Fourier Transform (DFrFT) based OFDM systems","authors":"A. Nafchi, E. Hamke, Ramiro Jordan, Balu Santhanam","doi":"10.1109/UEMCON.2017.8249056","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249056","url":null,"abstract":"This paper investigates the performance of Orthogonal Frequency Division Multiplex (OFDM) system by integrating the Discrete Fractional Fourier Transform (DFrFT). Here the total number of OFDM subcarriers are 64 where 48 of them are data carriers, and bandwidth allocated to OFDM is 20 MHz. The transmitted signals are assumed to travel through an Additive White Gaussian Noise (AWGN) channel. Simulations are conducted to investigate the Bit Error Rate (BER) performance of OFDM system as a function of energy per bit to noise power spectral density ratio Eb/N0 for both cases of conventional OFDM (FFT-OFDM) and proposed OFDM in this paper based on DFrFT (Fr-OFDM). Simulations confirm the proposed Fr-OFDM performance.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"2005 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128769000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/UEMCON.2017.8248985
Brian Krupp, Dan Jesenseky, Amanda Szampias
Mobile applications have grown from knowing basic personal information to knowing intimate details of consumer's lives. The explosion of knowledge that applications contain and share can be contributed to many factors. Mobile devices are equipped with advanced sensors including GPS and cameras, while storing large amounts of personal information including photos and contacts. With millions of applications available to install, personal data is at constant risk of being misused. While mobile operating systems provide basic security and privacy controls, they are insufficient, leaving the consumer unaware of how applications are using permissions that were granted. In this paper, we propose a solution that aims to provide consumers awareness of applications misusing data and policies that can protect their data. From this investigation we present SPEProxy. SPEProxy utilizes a knowledge based approach to provide consumer's an ability to understand how applications are using permissions beyond their stated intent. Additionally, SPEProxy provides an awareness of fine grained policies that would allow the user to protect their data. SPEProxy is device and mobile operating system agnostic, meaning it does not require a specific device or operating system nor modification to the operating system or applications. This approach allows consumers to utilize the solution without requiring a high degree of technical expertise. We evaluated SPEProxy across 817 of the most popular applications in the iOS App Store and Google Play. In our evaluation, SPEProxy was highly effective across 86.55% applications where several well known applications exhibited misusing granted permissions.
{"title":"SPEProxy: Enforcing fine grained security and privacy controls on unmodified mobile devices","authors":"Brian Krupp, Dan Jesenseky, Amanda Szampias","doi":"10.1109/UEMCON.2017.8248985","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248985","url":null,"abstract":"Mobile applications have grown from knowing basic personal information to knowing intimate details of consumer's lives. The explosion of knowledge that applications contain and share can be contributed to many factors. Mobile devices are equipped with advanced sensors including GPS and cameras, while storing large amounts of personal information including photos and contacts. With millions of applications available to install, personal data is at constant risk of being misused. While mobile operating systems provide basic security and privacy controls, they are insufficient, leaving the consumer unaware of how applications are using permissions that were granted. In this paper, we propose a solution that aims to provide consumers awareness of applications misusing data and policies that can protect their data. From this investigation we present SPEProxy. SPEProxy utilizes a knowledge based approach to provide consumer's an ability to understand how applications are using permissions beyond their stated intent. Additionally, SPEProxy provides an awareness of fine grained policies that would allow the user to protect their data. SPEProxy is device and mobile operating system agnostic, meaning it does not require a specific device or operating system nor modification to the operating system or applications. This approach allows consumers to utilize the solution without requiring a high degree of technical expertise. We evaluated SPEProxy across 817 of the most popular applications in the iOS App Store and Google Play. In our evaluation, SPEProxy was highly effective across 86.55% applications where several well known applications exhibited misusing granted permissions.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129388844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/UEMCON.2017.8248980
B. Ahmed, K. Aganah, M. Ndoye, Md Arifin Arif, Cristopher Luciano, G. Murphy
A new single-phase cascaded multilevel inverter topology using an H-bridge inverter is proposed to reduce the number of active components and improve power quality. The topology is comprised of two or more cascaded H-bridges to increase the number of voltage levels and power handling capability. The basic unit of the proposed inverter is comprised of a voltage-level generator (VLG) connected to the input of the classical H-bridge. The main advantage of this setup is a significant reduction in the number of switches and voltage sources required to generate the desired number of voltage levels. As a result, the output power quality, cost and size are significantly improved. To verify the benefits of this topology, in a more complete way, both the symmetric and asymmetric configurations are investigated. MATLAB/Simulink models for symmetric 9-level and asymmetric 31-level cascaded multilevel inverter configurations are used to validate the performance of the proposed topology, and satisfactory results are reported.
{"title":"Single-phase cascaded multilevel inverter topology for distributed DC sources","authors":"B. Ahmed, K. Aganah, M. Ndoye, Md Arifin Arif, Cristopher Luciano, G. Murphy","doi":"10.1109/UEMCON.2017.8248980","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248980","url":null,"abstract":"A new single-phase cascaded multilevel inverter topology using an H-bridge inverter is proposed to reduce the number of active components and improve power quality. The topology is comprised of two or more cascaded H-bridges to increase the number of voltage levels and power handling capability. The basic unit of the proposed inverter is comprised of a voltage-level generator (VLG) connected to the input of the classical H-bridge. The main advantage of this setup is a significant reduction in the number of switches and voltage sources required to generate the desired number of voltage levels. As a result, the output power quality, cost and size are significantly improved. To verify the benefits of this topology, in a more complete way, both the symmetric and asymmetric configurations are investigated. MATLAB/Simulink models for symmetric 9-level and asymmetric 31-level cascaded multilevel inverter configurations are used to validate the performance of the proposed topology, and satisfactory results are reported.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129686784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/UEMCON.2017.8249105
Muhammad Ajmal Khan, R. Rao, Xianbin Wang
Two-way cooperative relay network links two source terminals using bidirectional connection to exchange information with the help of a relay. The conventional two-way cooperative network with a decode-and-forward (DF) relay takes six time slots to transfer four symbols due to half-duplex transmission. If signal space diversity is integrated into a conventional two-way cooperative network, the resultant system transfers four symbols in three time slots, which is referred to as two-way signal space cooperative network (2W-SSD-DF). In this paper, 2W-SSD-DF system is investigated for its outage performance and system optimization. Closed-form expression of the outage probability of 2W-SSD-DF system over Rayleigh fading channel is derived and its asymptotic expression is also obtained to study the influence of various system parameters. In addition, system optimization of the system is examined and a framework to allocate optimal power to the transmitting nodes is developed in order to enhance the outage performance of the system. Finally, the analytical work is validated through Monte Carlo simulations.
{"title":"Two-way signal space cooperative network with a DF relay — Outage and optimization","authors":"Muhammad Ajmal Khan, R. Rao, Xianbin Wang","doi":"10.1109/UEMCON.2017.8249105","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249105","url":null,"abstract":"Two-way cooperative relay network links two source terminals using bidirectional connection to exchange information with the help of a relay. The conventional two-way cooperative network with a decode-and-forward (DF) relay takes six time slots to transfer four symbols due to half-duplex transmission. If signal space diversity is integrated into a conventional two-way cooperative network, the resultant system transfers four symbols in three time slots, which is referred to as two-way signal space cooperative network (2W-SSD-DF). In this paper, 2W-SSD-DF system is investigated for its outage performance and system optimization. Closed-form expression of the outage probability of 2W-SSD-DF system over Rayleigh fading channel is derived and its asymptotic expression is also obtained to study the influence of various system parameters. In addition, system optimization of the system is examined and a framework to allocate optimal power to the transmitting nodes is developed in order to enhance the outage performance of the system. Finally, the analytical work is validated through Monte Carlo simulations.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125884950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/UEMCON.2017.8249078
Nahid Mirzaie, Ahmed Alzahmi, Chung-Ching Lin, Gyung-Su Byun
A low-power and high-performance three-dimensional (3D) baseband point-to-point (P2P) memory interface is presented. To improve both signal integrity and power efficiency, an optimization approach is utilized on the entire 3D architecture, including through-silicon via (TSV), and I/O interface channel in a 65 nm CMOS technology. The 3D TSV and μbump channels are modeled to generate S-parameters using a 3D EM solver tool (HFSS). The system performance is demonstrated after the optimization process. The results reveal that the whole structure achieves an energy efficiency of 1.52 pJ/b 2.3 Gb/s data rate.
{"title":"A performance-aware I/O interface for 3D stacked memory systems","authors":"Nahid Mirzaie, Ahmed Alzahmi, Chung-Ching Lin, Gyung-Su Byun","doi":"10.1109/UEMCON.2017.8249078","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249078","url":null,"abstract":"A low-power and high-performance three-dimensional (3D) baseband point-to-point (P2P) memory interface is presented. To improve both signal integrity and power efficiency, an optimization approach is utilized on the entire 3D architecture, including through-silicon via (TSV), and I/O interface channel in a 65 nm CMOS technology. The 3D TSV and μbump channels are modeled to generate S-parameters using a 3D EM solver tool (HFSS). The system performance is demonstrated after the optimization process. The results reveal that the whole structure achieves an energy efficiency of 1.52 pJ/b 2.3 Gb/s data rate.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123512075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}