首页 > 最新文献

2019 International Conference on Advanced Technologies for Communications (ATC)最新文献

英文 中文
A Novel CQI Feedback Channel for Cellular UAV System 一种新型蜂窝式无人机系统CQI反馈通道
Pub Date : 2019-10-01 DOI: 10.1109/ATC.2019.8924562
Kwonyeol Park, J. Rhee, Min-Ho Shin, Woonhaing Hur
The utilization of Unmanned Aerial Vehicles (UAVs) is rapidly growing in a wide range of application due to their ease of deployment, low maintenance cost and high mobility. In particular, these advantages are used more effectively by the UAV when interacting with cellular networks such as 5G and beyond 5G. This system is defined as a cellular-UAV system [1]. In order to implement this system, reliable communication between base station and UAV is required. That is, well-designed CQI feedback mechanism is one of the essential technologies to be equipped. In traditional cellular network, the base station requires Channel Quality Indicator (CQI) feedback from users in order to determine a reasonable Modulation and Coding Scheme (MCS) in multicast system. However, traditional techniques also increase essential feedback as the group size increases and cause more signal overhead. This crucial problem can be equally applied to the cellular-UAV system. To cope with this problem, this paper proposes a new type of CQI feedback mechanism. The proposed schemes are expected not only to reduce signalling overhead but also to increase spectral efficiency, which is further demonstrated by the simulation results.
由于其易于部署、维护成本低和机动性高,无人机的应用范围正在迅速扩大。特别是,无人机在与诸如5G和5G以上的蜂窝网络交互时,可以更有效地利用这些优势。该系统被定义为蜂窝式无人机系统[1]。为了实现该系统,需要基站与无人机之间的可靠通信。也就是说,设计良好的CQI反馈机制是必须配备的关键技术之一。在传统蜂窝网络中,基站需要用户反馈信道质量指标(CQI)来确定合理的多播系统调制编码方案(MCS)。然而,传统技术也会随着群体规模的增加而增加必要的反馈,从而导致更多的信号开销。这一关键问题同样适用于蜂窝无人机系统。针对这一问题,本文提出了一种新型的CQI反馈机制。仿真结果进一步证明了所提出的方案不仅可以减少信令开销,而且可以提高频谱效率。
{"title":"A Novel CQI Feedback Channel for Cellular UAV System","authors":"Kwonyeol Park, J. Rhee, Min-Ho Shin, Woonhaing Hur","doi":"10.1109/ATC.2019.8924562","DOIUrl":"https://doi.org/10.1109/ATC.2019.8924562","url":null,"abstract":"The utilization of Unmanned Aerial Vehicles (UAVs) is rapidly growing in a wide range of application due to their ease of deployment, low maintenance cost and high mobility. In particular, these advantages are used more effectively by the UAV when interacting with cellular networks such as 5G and beyond 5G. This system is defined as a cellular-UAV system [1]. In order to implement this system, reliable communication between base station and UAV is required. That is, well-designed CQI feedback mechanism is one of the essential technologies to be equipped. In traditional cellular network, the base station requires Channel Quality Indicator (CQI) feedback from users in order to determine a reasonable Modulation and Coding Scheme (MCS) in multicast system. However, traditional techniques also increase essential feedback as the group size increases and cause more signal overhead. This crucial problem can be equally applied to the cellular-UAV system. To cope with this problem, this paper proposes a new type of CQI feedback mechanism. The proposed schemes are expected not only to reduce signalling overhead but also to increase spectral efficiency, which is further demonstrated by the simulation results.","PeriodicalId":409591,"journal":{"name":"2019 International Conference on Advanced Technologies for Communications (ATC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133830143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A proposed preamble detection algorithm for 5G-PRACH 一种5G-PRACH的前置检测算法
Pub Date : 2019-10-01 DOI: 10.1109/ATC.2019.8924502
T. Pham, Bang Thanh Le
Similar to previous mobile communication systems, random access (RA) procedure in fifth generation of mobile communication (5G) is used to achieve the uplink synchronization between user equipment (UE) and next generation Node B (gNB) based on the detection of preambles in Physical Random Access Channel (PRACH). A method for detecting preamble in PRACH at 5G base station (gNB) is proposed in this paper. The proposed method uses an enhanced algorithm with multi-detection steps to reject effectively false alarm peaks due to noise and channel condition as multipath fading, Doppler shift, frequency offset and timing offset. Simulation results show that the proposed method with optimized detection thresholds satisfies the requirements of system about detection probability and false alarm probability under a certain SNR level and propagation condition.
与以往的移动通信系统类似,第五代移动通信(5G)中的RA (random access)过程是基于对PRACH (Physical random access Channel)前导的检测,实现用户设备(UE)与下一代Node B (gNB)之间的上行同步。提出了一种5G基站(gNB)中PRACH前导信号的检测方法。该方法采用一种增强的多步检测算法,有效地抑制了由噪声和信道条件引起的多径衰落、多普勒频移、频率偏移和时序偏移等虚警峰。仿真结果表明,在一定信噪比水平和传播条件下,优化检测阈值的方法满足系统对检测概率和虚警概率的要求。
{"title":"A proposed preamble detection algorithm for 5G-PRACH","authors":"T. Pham, Bang Thanh Le","doi":"10.1109/ATC.2019.8924502","DOIUrl":"https://doi.org/10.1109/ATC.2019.8924502","url":null,"abstract":"Similar to previous mobile communication systems, random access (RA) procedure in fifth generation of mobile communication (5G) is used to achieve the uplink synchronization between user equipment (UE) and next generation Node B (gNB) based on the detection of preambles in Physical Random Access Channel (PRACH). A method for detecting preamble in PRACH at 5G base station (gNB) is proposed in this paper. The proposed method uses an enhanced algorithm with multi-detection steps to reject effectively false alarm peaks due to noise and channel condition as multipath fading, Doppler shift, frequency offset and timing offset. Simulation results show that the proposed method with optimized detection thresholds satisfies the requirements of system about detection probability and false alarm probability under a certain SNR level and propagation condition.","PeriodicalId":409591,"journal":{"name":"2019 International Conference on Advanced Technologies for Communications (ATC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124579930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Reliability-Security Analysis for Harvest-to-Jam based Multi-hop LEACH Networks under Impact of Hardware Noises 硬件噪声影响下基于收获-阻塞的多跳LEACH网络可靠性-安全性分析
Pub Date : 2019-10-01 DOI: 10.1109/ATC.2019.8924531
Ngo The Anh, Ha Duy Hung, Tran Trung Duy, Hoang Dang Hai, Nguyen Canh Minh
This paper evaluates trade-off between reliable and secure communication for multi-hop low-energy adaptive clustering hierarchy (LEACH) networks under impact of hardware imperfection. In the proposed scheme, a source communicates with a destination via a multi-hop transmission, where the source, destination and intermediate relay nodes are cluster heads (CHs). To protect the data at each hop, harvest-to-jam and randomize-and-forward methods are employed by CHs and cooperative jammers, respectively. Each jammer which is randomly selected at each cluster harvests energy from the previous CHs to transmit noises to an eavesdropper. We derive closed-form expressions of the end-to-end outage probability (OP) and intercept probability (IP) for the proposed scheme over Rayleigh fading channels. Then, the theoretical derivations are verified by Monte-Carlo simulations.
研究了在硬件不完善的情况下,多跳低能自适应聚类网络(LEACH)通信的可靠性和安全性。在该方案中,源端与目的端通过多跳传输进行通信,其中源端、目的端和中间中继节点为簇头(CHs)。为了保护每一跳的数据,CHs和合作干扰器分别采用了收获-干扰和随机-转发方法。在每个集群中随机选择的每个干扰器从之前的CHs中获取能量,将噪声传输给窃听者。我们推导了该方案在瑞利衰落信道上的端到端中断概率(OP)和截获概率(IP)的封闭表达式。然后,通过蒙特卡罗仿真验证了理论推导。
{"title":"Reliability-Security Analysis for Harvest-to-Jam based Multi-hop LEACH Networks under Impact of Hardware Noises","authors":"Ngo The Anh, Ha Duy Hung, Tran Trung Duy, Hoang Dang Hai, Nguyen Canh Minh","doi":"10.1109/ATC.2019.8924531","DOIUrl":"https://doi.org/10.1109/ATC.2019.8924531","url":null,"abstract":"This paper evaluates trade-off between reliable and secure communication for multi-hop low-energy adaptive clustering hierarchy (LEACH) networks under impact of hardware imperfection. In the proposed scheme, a source communicates with a destination via a multi-hop transmission, where the source, destination and intermediate relay nodes are cluster heads (CHs). To protect the data at each hop, harvest-to-jam and randomize-and-forward methods are employed by CHs and cooperative jammers, respectively. Each jammer which is randomly selected at each cluster harvests energy from the previous CHs to transmit noises to an eavesdropper. We derive closed-form expressions of the end-to-end outage probability (OP) and intercept probability (IP) for the proposed scheme over Rayleigh fading channels. Then, the theoretical derivations are verified by Monte-Carlo simulations.","PeriodicalId":409591,"journal":{"name":"2019 International Conference on Advanced Technologies for Communications (ATC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129208266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Throughput Improvement of Systematic Polar Coded MIMO-OFDM by Puncturing 通过穿刺提高系统极性编码MIMO-OFDM的吞吐量
Pub Date : 2019-10-01 DOI: 10.1109/ATC.2019.8924491
Ryo Marumo, Naoya Tanuma, K. Maruta, C. Ahn
This paper proposes an improved puncturing scheme exploiting the feature of systematic polar codes and verifies its effectiveness in MIMO-OFDM transmission. Puncturing is the process of removing part of the encoded bits and can realize various coding rates to adopt to the channel condition. However, the puncturing deteriorates BER performance because the removed bits are generally unknown at the receiving side. Systematic polar coding can generate the codeword that has the same value of information bits. Using this characteristic, the transmitting side punctures known bits shared between transmitter and receiver in the codeword. The receiving side then decodes the received signal by setting punctured bits to the known value to assist the decoding capability. Computer simulation presents that the achievable throughput can be improved while maintaining BER performance.
本文利用系统极化码的特点,提出了一种改进的穿刺方案,并验证了其在MIMO-OFDM传输中的有效性。穿刺是去除部分编码位的过程,可以实现不同的编码速率以适应信道条件。然而,穿刺会降低误码率,因为在接收端移除的比特通常是未知的。系统极化编码可以生成具有相同信息位值的码字。利用这一特性,发射端在码字中击穿发射器和接收器之间共享的已知位。然后,接收端通过将穿孔位设置为已知值来解码接收信号,以辅助解码能力。计算机仿真表明,在保持误码率的同时,可以提高可实现的吞吐量。
{"title":"Throughput Improvement of Systematic Polar Coded MIMO-OFDM by Puncturing","authors":"Ryo Marumo, Naoya Tanuma, K. Maruta, C. Ahn","doi":"10.1109/ATC.2019.8924491","DOIUrl":"https://doi.org/10.1109/ATC.2019.8924491","url":null,"abstract":"This paper proposes an improved puncturing scheme exploiting the feature of systematic polar codes and verifies its effectiveness in MIMO-OFDM transmission. Puncturing is the process of removing part of the encoded bits and can realize various coding rates to adopt to the channel condition. However, the puncturing deteriorates BER performance because the removed bits are generally unknown at the receiving side. Systematic polar coding can generate the codeword that has the same value of information bits. Using this characteristic, the transmitting side punctures known bits shared between transmitter and receiver in the codeword. The receiving side then decodes the received signal by setting punctured bits to the known value to assist the decoding capability. Computer simulation presents that the achievable throughput can be improved while maintaining BER performance.","PeriodicalId":409591,"journal":{"name":"2019 International Conference on Advanced Technologies for Communications (ATC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128767130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of Bat Algorithm on the Design of a Linear Microstrip Antenna Array for Pattern Nulling Bat算法在线性微带天线阵方向图消去设计中的应用
Pub Date : 2019-10-01 DOI: 10.1109/ATC.2019.8924498
L. X. Truong, Truong Vu Bang Giang, T. M. Tuan
this paper presents an application of Bat optimization algorithm on the pattern nulling technique for imposing single null at side lobes. A linear microstrip antenna array has been proposed to deploy the theory from Bat algorithm. The proposed array consists of 10 printed vertical antenna elements based on RO4003C substrate with the size of 160 x 450 x 1.524 mm3. When the array is fed by an ideal source, the simulated radiation pattern meets the requirement in term of null placement. A full design of the array for imposing a single null at the first side lobe has been proposed and investigated. Amplitude excitation weights are divided by a series feeding network. To improve the gain, a back reflector constructed on Fr-4 substrate with the size of 213 x 503 x 1.6 mm3has been used. The simulation results show that the first side lobe level can be suppressed to -40 dB at the frequency of 3.5 GHz while the maximum gain is 17.7 dBi. The simulated and measured reflection coefficients indicate that S1,1is equal -10 dB in the frequency range of 3.26-3.78 GHz. With these characteristics, the proposed antenna array is a good candidate for wireless systems in the C band.
本文介绍了Bat优化算法在侧瓣施加单零的模式去零技术中的应用。提出了一种线性微带天线阵列来应用Bat算法的理论。该阵列由10个基于RO4003C衬底的印刷垂直天线元件组成,尺寸为160 x 450 x 1.524 mm3。当阵列由理想源馈电时,模拟的辐射方向图在零点位置方面满足要求。提出并研究了在第一副瓣处施加单零的阵列的完整设计。振幅激励权由串联馈电网络划分。为了提高增益,采用了尺寸为213 x 503 x 1.6 mm3的Fr-4基板背反射器。仿真结果表明,在3.5 GHz频率下,第一副瓣电平可被抑制至-40 dB,最大增益为17.7 dBi。模拟和实测的反射系数表明,在3.26 ~ 3.78 GHz频率范围内,S1,1 = -10 dB。由于这些特点,该天线阵列是C波段无线系统的理想选择。
{"title":"Application of Bat Algorithm on the Design of a Linear Microstrip Antenna Array for Pattern Nulling","authors":"L. X. Truong, Truong Vu Bang Giang, T. M. Tuan","doi":"10.1109/ATC.2019.8924498","DOIUrl":"https://doi.org/10.1109/ATC.2019.8924498","url":null,"abstract":"this paper presents an application of Bat optimization algorithm on the pattern nulling technique for imposing single null at side lobes. A linear microstrip antenna array has been proposed to deploy the theory from Bat algorithm. The proposed array consists of 10 printed vertical antenna elements based on RO4003C substrate with the size of 160 x 450 x 1.524 mm3. When the array is fed by an ideal source, the simulated radiation pattern meets the requirement in term of null placement. A full design of the array for imposing a single null at the first side lobe has been proposed and investigated. Amplitude excitation weights are divided by a series feeding network. To improve the gain, a back reflector constructed on Fr-4 substrate with the size of 213 x 503 x 1.6 mm3has been used. The simulation results show that the first side lobe level can be suppressed to -40 dB at the frequency of 3.5 GHz while the maximum gain is 17.7 dBi. The simulated and measured reflection coefficients indicate that S1,1is equal -10 dB in the frequency range of 3.26-3.78 GHz. With these characteristics, the proposed antenna array is a good candidate for wireless systems in the C band.","PeriodicalId":409591,"journal":{"name":"2019 International Conference on Advanced Technologies for Communications (ATC)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126922650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Investigation of Adaptive Digital Beamforming Antenna for gNodeB 5G gndeb 5G自适应数字波束形成天线研究
Pub Date : 2019-10-01 DOI: 10.1109/ATC.2019.8924509
Hong Son Vu, K. Truong, L. T. Bang, V. Y. Vu, M. Le
Beamforming and the direction of arrival (DOA) estimation for the massive multi-input multi-output (MIMO) play a significant role in the fifth-generation (5G) cellular networks. Several existing DOA and beamforming algorithms are validated for the MIMO antenna system in 5G gNodeB. The proposed non-blind adaptive beamforming algorithm using Recursive least squares Dolph Chebyshev (RLS-DC) with Uniformly spaced Linear Array (ULA) of 32 elements is presented in this paper. The sidelobe level is suppressed from -14 dB to -30 dB while steering area from -60º to +60º is obtained.
大规模多输入多输出(MIMO)的波束形成和到达方向(DOA)估计在第五代(5G)蜂窝网络中起着重要作用。针对5G gndeb中的MIMO天线系统,对几种现有的DOA和波束形成算法进行了验证。提出了一种基于32元等间距线性阵列的递推最小二乘多尔夫切比雪夫(RLS-DC)非盲自适应波束形成算法。副瓣电平从-14 dB抑制到-30 dB,同时获得从-60º到+60º的转向区域。
{"title":"An Investigation of Adaptive Digital Beamforming Antenna for gNodeB 5G","authors":"Hong Son Vu, K. Truong, L. T. Bang, V. Y. Vu, M. Le","doi":"10.1109/ATC.2019.8924509","DOIUrl":"https://doi.org/10.1109/ATC.2019.8924509","url":null,"abstract":"Beamforming and the direction of arrival (DOA) estimation for the massive multi-input multi-output (MIMO) play a significant role in the fifth-generation (5G) cellular networks. Several existing DOA and beamforming algorithms are validated for the MIMO antenna system in 5G gNodeB. The proposed non-blind adaptive beamforming algorithm using Recursive least squares Dolph Chebyshev (RLS-DC) with Uniformly spaced Linear Array (ULA) of 32 elements is presented in this paper. The sidelobe level is suppressed from -14 dB to -30 dB while steering area from -60º to +60º is obtained.","PeriodicalId":409591,"journal":{"name":"2019 International Conference on Advanced Technologies for Communications (ATC)","volume":"14 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124279509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Enhancement in NOMA Cooperative Network with a Proactive Attack Scheme 基于主动攻击方案的NOMA合作网络安全增强
Pub Date : 2019-10-01 DOI: 10.1109/ATC.2019.8924516
Chi Yen Nguyen, H. Tran, Tam Thanh Thi Ninh, Truong Quach Xuan, Q. Pham
A cooperative non-orthogonal multiple access (NOMA) communication is a promising solution to improve both the reliability and the capacity of the NOMA system. However, a relay can be exploited by a cooperative attack, this leads to a degradation of performance and secure of the NOMA system. Therefore, we propose a proactive protection scheme to mitigate the effect of the cooperative attack on the NOMA system. We consider the secrecy outage probability (SOP) of the cooperative NOMA in two cases: (1) the NOMA system has no protected scheme; (2) the NOMA system implements the protected scheme using the proactive attack technique. The results demonstrate that using proposed proactive attack scheme improve the secrecy performance of the system. Monte-clalo simulations are provided to examine our proposed scheme.
协作式非正交多址(NOMA)通信是提高NOMA系统可靠性和容量的一种很有前途的解决方案。然而,中继可能被合作攻击所利用,这导致了NOMA系统性能和安全性的下降。因此,我们提出了一种主动保护方案,以减轻协同攻击对NOMA系统的影响。我们考虑了两种情况下合作NOMA的保密中断概率(SOP):(1) NOMA系统没有保护方案;(2) NOMA系统采用主动攻击技术实现保护方案。结果表明,采用主动攻击方案可以提高系统的保密性能。Monte-clalo模拟验证了我们提出的方案。
{"title":"Security Enhancement in NOMA Cooperative Network with a Proactive Attack Scheme","authors":"Chi Yen Nguyen, H. Tran, Tam Thanh Thi Ninh, Truong Quach Xuan, Q. Pham","doi":"10.1109/ATC.2019.8924516","DOIUrl":"https://doi.org/10.1109/ATC.2019.8924516","url":null,"abstract":"A cooperative non-orthogonal multiple access (NOMA) communication is a promising solution to improve both the reliability and the capacity of the NOMA system. However, a relay can be exploited by a cooperative attack, this leads to a degradation of performance and secure of the NOMA system. Therefore, we propose a proactive protection scheme to mitigate the effect of the cooperative attack on the NOMA system. We consider the secrecy outage probability (SOP) of the cooperative NOMA in two cases: (1) the NOMA system has no protected scheme; (2) the NOMA system implements the protected scheme using the proactive attack technique. The results demonstrate that using proposed proactive attack scheme improve the secrecy performance of the system. Monte-clalo simulations are provided to examine our proposed scheme.","PeriodicalId":409591,"journal":{"name":"2019 International Conference on Advanced Technologies for Communications (ATC)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123717139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast 1D Direction Finding Method In Multipath Environment 多路径环境下的快速一维测向方法
Pub Date : 2019-10-01 DOI: 10.1109/ATC.2019.8924559
Thanh-Hai Le, T. Nguyen, H. Phan
This paper introduces a method of determining quickly the direction of incoming signal from a radio radiation source in multi-path environment. In this environment, the signals arriving at the antenna array may come from one or many independent radio sources. Therefore, these signals may be uncorrelated or at high correlation level. To circumvent the signal correlation, the proposed method reconstructs the data vector received by the ULA antenna array into the Hermitian Toeplitz matrix form to expand the size of the noise space. Therefore, the signal space and noise can be evaluated more accurately. MUSIC algorithm is employed to determine the signal power spectrum. Since no forward-backward spatial smoothing technique is used, the computational complexity has been reduced. This proposed method can be applied in real-time applications because there needs to use only one signal pattern. The simulation results demonstrate that the proposed method results in better quality than those using ESPRIT and Matrix Pencil algorithms.
介绍了一种在多径环境下快速确定射电辐射源输入信号方向的方法。在这种环境下,到达天线阵列的信号可能来自一个或多个独立的无线电源。因此,这些信号可能是不相关的,也可能是高度相关的。为了避免信号相关,该方法将ULA天线阵列接收到的数据向量重构为厄米特托普利兹矩阵形式,扩大噪声空间的大小。因此,可以更准确地评估信号空间和噪声。采用MUSIC算法确定信号功率谱。由于没有使用前后向空间平滑技术,降低了计算复杂度。由于该方法只需要使用一种信号模式,因此可以应用于实时应用。仿真结果表明,该方法比使用ESPRIT和Matrix Pencil算法得到的图像质量更好。
{"title":"Fast 1D Direction Finding Method In Multipath Environment","authors":"Thanh-Hai Le, T. Nguyen, H. Phan","doi":"10.1109/ATC.2019.8924559","DOIUrl":"https://doi.org/10.1109/ATC.2019.8924559","url":null,"abstract":"This paper introduces a method of determining quickly the direction of incoming signal from a radio radiation source in multi-path environment. In this environment, the signals arriving at the antenna array may come from one or many independent radio sources. Therefore, these signals may be uncorrelated or at high correlation level. To circumvent the signal correlation, the proposed method reconstructs the data vector received by the ULA antenna array into the Hermitian Toeplitz matrix form to expand the size of the noise space. Therefore, the signal space and noise can be evaluated more accurately. MUSIC algorithm is employed to determine the signal power spectrum. Since no forward-backward spatial smoothing technique is used, the computational complexity has been reduced. This proposed method can be applied in real-time applications because there needs to use only one signal pattern. The simulation results demonstrate that the proposed method results in better quality than those using ESPRIT and Matrix Pencil algorithms.","PeriodicalId":409591,"journal":{"name":"2019 International Conference on Advanced Technologies for Communications (ATC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124993972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preserving Spatial Information to Enhance Performance of Image Forgery Classification 保留空间信息提高图像伪造分类性能
Pub Date : 2019-10-01 DOI: 10.1109/ATC.2019.8924504
Hanh Phan-Xuan, T. Le-Tien, Thuy Nguyen-Chinh, Thien Do-Tieu, Qui Nguyen-Van, Tuan Nguyen-Thanh
As there are a huge range of powerful tools to edit images now, the need for verifying the authentication of images is more urgent than ever. While forgery methods are increasingly more subtle that even human vision seems hard to recognize these manipulations, conventional algorithms, which try to detect tampering traces, often pre-define assumptions that limit the scope of problem. Therefore, such methods are unable to encounter forgery methods in general applications. In this paper, we propose a framework that utilizes Deep Learning techniques to detect tampered images. Concretely, the MobileNetV2 network in [21] is modified so that it can be consistent to the task of image forgery detection. We argue that by remaining spatial dimension of early layers, the model is likely to learn rich features in these layers, and then following layers are to abstract these rich features for making a decision whether an image is forged. Besides, we also conduct a comprehensive experiment to prove those arguments. Experimental results show that the architecture-modified network achieves a remarkable accuracy of 95.15%, which surpasses others relying on the original architecture by a large margin up to 12.09%.
由于现在有大量功能强大的工具来编辑图像,因此对图像身份验证的需求比以往任何时候都更加迫切。虽然伪造方法越来越微妙,甚至人类的视觉似乎也很难识别这些操作,但传统的算法,试图检测篡改痕迹,往往预先定义假设,限制了问题的范围。因此,这种方法在一般应用中无法遇到伪造方法。在本文中,我们提出了一个利用深度学习技术检测篡改图像的框架。具体而言,对[21]中的MobileNetV2网络进行了修改,使其能够与图像伪造检测任务相一致。我们认为,通过保留早期层的空间维度,模型很可能学习到这些层中的丰富特征,然后接下来的层将抽象这些丰富的特征,以决定图像是否伪造。此外,我们还进行了全面的实验来证明这些论点。实验结果表明,改进后的网络准确率达到了95.15%,大大超过了其他依赖原始架构的网络,准确率高达12.09%。
{"title":"Preserving Spatial Information to Enhance Performance of Image Forgery Classification","authors":"Hanh Phan-Xuan, T. Le-Tien, Thuy Nguyen-Chinh, Thien Do-Tieu, Qui Nguyen-Van, Tuan Nguyen-Thanh","doi":"10.1109/ATC.2019.8924504","DOIUrl":"https://doi.org/10.1109/ATC.2019.8924504","url":null,"abstract":"As there are a huge range of powerful tools to edit images now, the need for verifying the authentication of images is more urgent than ever. While forgery methods are increasingly more subtle that even human vision seems hard to recognize these manipulations, conventional algorithms, which try to detect tampering traces, often pre-define assumptions that limit the scope of problem. Therefore, such methods are unable to encounter forgery methods in general applications. In this paper, we propose a framework that utilizes Deep Learning techniques to detect tampered images. Concretely, the MobileNetV2 network in [21] is modified so that it can be consistent to the task of image forgery detection. We argue that by remaining spatial dimension of early layers, the model is likely to learn rich features in these layers, and then following layers are to abstract these rich features for making a decision whether an image is forged. Besides, we also conduct a comprehensive experiment to prove those arguments. Experimental results show that the architecture-modified network achieves a remarkable accuracy of 95.15%, which surpasses others relying on the original architecture by a large margin up to 12.09%.","PeriodicalId":409591,"journal":{"name":"2019 International Conference on Advanced Technologies for Communications (ATC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132184313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Measurement Techniques for Determining the Polarization Division Multiplexing Tolerance Field 偏振分复用容差场的测量技术
Pub Date : 2019-10-01 DOI: 10.1109/ATC.2019.8924560
M. Kyselak, F. Dvořak, C. Vlcek
Polarization Division Multiplexing is a promising technique for effectively increasing the capacity of optical routes. Its basic advantage is the possibility of being deployed on existing optical routes without the need to replace existing fibres or cables. The use of two optical fibre polarization axes allows the use of two independent transmission channels in a single optical fibre. The deployment options of Polarization Division Multiplexing can be evaluated using a tolerance field that can be obtained by measuring at the end of the optical path. This article discusses special measurement techniques and a new way of illustrating the Poincaré sphere's tolerance field., which allows evaluating the success of a Polarization Division Multiplexing technology at a glance. A detailed analysis of the tolerance field should simplify the idea of the activity of this type of multiplex and., for its clarity., it is also very suitable for study purposes. Unlike the transmission rate measurement., the measurement of the polarization multiplex tolerance field is a beneficial measurement showing the properties of the entire transmission system.
极化分复用技术是一种很有前途的提高光路容量的技术。它的基本优点是可以部署在现有的光线路上,而不需要更换现有的光纤或电缆。两个光纤偏振轴的使用允许在一根光纤中使用两个独立的传输通道。偏振分复用的部署选项可以通过在光路末端测量得到的容差场来评估。本文讨论了一种特殊的测量技术,并提出了一种新的方法来说明庞卡勒球的公差场。,这使得评估极化分复用技术的成功一目了然。对公差场的详细分析应简化这类多工活动的思想。,因为它的清晰。,它也非常适合学习目的。不像传输速率测量。偏振复用容差场的测量是反映整个传输系统性能的一种有益的测量方法。
{"title":"Measurement Techniques for Determining the Polarization Division Multiplexing Tolerance Field","authors":"M. Kyselak, F. Dvořak, C. Vlcek","doi":"10.1109/ATC.2019.8924560","DOIUrl":"https://doi.org/10.1109/ATC.2019.8924560","url":null,"abstract":"Polarization Division Multiplexing is a promising technique for effectively increasing the capacity of optical routes. Its basic advantage is the possibility of being deployed on existing optical routes without the need to replace existing fibres or cables. The use of two optical fibre polarization axes allows the use of two independent transmission channels in a single optical fibre. The deployment options of Polarization Division Multiplexing can be evaluated using a tolerance field that can be obtained by measuring at the end of the optical path. This article discusses special measurement techniques and a new way of illustrating the Poincaré sphere's tolerance field., which allows evaluating the success of a Polarization Division Multiplexing technology at a glance. A detailed analysis of the tolerance field should simplify the idea of the activity of this type of multiplex and., for its clarity., it is also very suitable for study purposes. Unlike the transmission rate measurement., the measurement of the polarization multiplex tolerance field is a beneficial measurement showing the properties of the entire transmission system.","PeriodicalId":409591,"journal":{"name":"2019 International Conference on Advanced Technologies for Communications (ATC)","volume":"59 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114048191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 International Conference on Advanced Technologies for Communications (ATC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1