首页 > 最新文献

2021 Wireless Telecommunications Symposium (WTS)最新文献

英文 中文
Application of 915 MHz Band LoRa for Agro-Informatics 915mhz LoRa在农业信息学中的应用
Pub Date : 2021-04-21 DOI: 10.1109/WTS51064.2021.9433712
A. Gehani, Sri Harsha Shatagopam, Rahul Raghav, M. Sarkar, C. Paolini
Use of the LoRa low-power wide-area network modulation scheme with the LoRaWAN® (Long Range Wide Area Network) MAC layer is becoming popular for subterranean agro-informatics networking applications. LoRa uses chirp spread spectrum technology and is licensed by Semtech. Sensors with LoRa radios can be designed to detect and measure toxins that can leach into agricultural soils from industrial and storm water sources. Sensors can be buried with cameras that can detect and classify pathogens affecting the roots of plants. Sensor measurements and camera images can be sampled in situ and transmitted to an above-ground central LoRa concentrator (gateway) on a farm. LoRa devices can be buried at variable depth, however soil and water both attenuate the strength of a transmitted signal. In this work, we conduct experiments to measure the received signal strength indicator (RSSI) and signal-to-noise ratio (SNR) under different LoRa spreading factors, coding rates, and soil depths. Our results show LoRa transceiver burial depth should not exceed 50cm for agro-informatics applications.
使用LoRa低功耗广域网调制方案与LoRaWAN®(远程广域网)MAC层在地下农业信息学网络应用中越来越受欢迎。LoRa使用chirp扩频技术,由Semtech授权。带有LoRa无线电的传感器可以设计用于检测和测量从工业和雨水来源渗入农业土壤的毒素。传感器可以与摄像头一起埋在地下,可以检测和分类影响植物根部的病原体。传感器测量和相机图像可以在现场采样并传输到农场的地上中央LoRa集中器(网关)。LoRa设备可以埋在不同的深度,但是土壤和水都会衰减传输信号的强度。在这项工作中,我们通过实验测量了不同LoRa扩展因子、编码率和土壤深度下的接收信号强度指标(RSSI)和信噪比(SNR)。研究结果表明,LoRa收发器埋深不宜超过50cm。
{"title":"Application of 915 MHz Band LoRa for Agro-Informatics","authors":"A. Gehani, Sri Harsha Shatagopam, Rahul Raghav, M. Sarkar, C. Paolini","doi":"10.1109/WTS51064.2021.9433712","DOIUrl":"https://doi.org/10.1109/WTS51064.2021.9433712","url":null,"abstract":"Use of the LoRa low-power wide-area network modulation scheme with the LoRaWAN® (Long Range Wide Area Network) MAC layer is becoming popular for subterranean agro-informatics networking applications. LoRa uses chirp spread spectrum technology and is licensed by Semtech. Sensors with LoRa radios can be designed to detect and measure toxins that can leach into agricultural soils from industrial and storm water sources. Sensors can be buried with cameras that can detect and classify pathogens affecting the roots of plants. Sensor measurements and camera images can be sampled in situ and transmitted to an above-ground central LoRa concentrator (gateway) on a farm. LoRa devices can be buried at variable depth, however soil and water both attenuate the strength of a transmitted signal. In this work, we conduct experiments to measure the received signal strength indicator (RSSI) and signal-to-noise ratio (SNR) under different LoRa spreading factors, coding rates, and soil depths. Our results show LoRa transceiver burial depth should not exceed 50cm for agro-informatics applications.","PeriodicalId":443112,"journal":{"name":"2021 Wireless Telecommunications Symposium (WTS)","volume":"75 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130514407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
AptBLE: Adaptive PHY Mode based on K-means Algorithm in Bluetooth5 AptBLE:蓝牙5中基于K-means算法的自适应PHY模式
Pub Date : 2021-04-21 DOI: 10.1109/WTS51064.2021.9433679
Xuan Luo, Mingyuan Zang, Ying Yan, L. Dittmann
Since Bluetooth5 standard released in 2016, its usage in commercial electronic products has been increased rapidly and substantially. Comparing to BLE 4.2, Bluetooth5 supports three PHY modes, respectively 2M, 1M and Coded PHY mode, providing a higher throughput and a wider range. Whereas there is a trade-off between its throughput and coverage. When the connection is established, the PHY mode is commonly pre-configured and fixed. This rigid design limits the flexibility in offering dynamic throughput and coverage. Therefore, we propose a method termed AptBLE, that switches the PHY mode in Bluetooth5 adaptively by considering the Received Signal Strength Indicator (RSSI) level. Specifically, we optimise the RSSI threshold for different PHY modes using the K-means clustering algorithm. Moreover, based on AptBLE, we further enable the Data Length Extension (DLE) feature and term the improved method as AptBLEM. We implement AptBLE (M) on the boards and test in indoor environment. The experimental results show that, AptBLE is more flexible, robust and outperforms the original fixed PHY mode in terms of throughput and transmission range. Furthermore, AptBLEM can triple the throughput than AptBLE, with a maximum throughput value in 1035Kbps and 42m range in indoor environment.
自2016年蓝牙5标准发布以来,其在商业电子产品中的使用量迅速大幅增加。与BLE 4.2相比,Bluetooth5支持三种PHY模式,分别是2M、1M和Coded PHY模式,提供更高的吞吐量和更宽的范围。然而,在它的吞吐量和覆盖范围之间存在权衡。在连接建立时,PHY模式通常是预先配置和固定的。这种严格的设计限制了提供动态吞吐量和覆盖范围的灵活性。因此,我们提出了一种称为AptBLE的方法,该方法通过考虑接收信号强度指示器(RSSI)水平自适应地切换蓝牙5中的PHY模式。具体来说,我们使用K-means聚类算法优化了不同PHY模式的RSSI阈值。此外,在AptBLE的基础上,进一步启用了数据长度扩展(DLE)特性,并将改进后的方法命名为AptBLEM。我们在电路板上实现了able (M),并在室内环境中进行了测试。实验结果表明,在吞吐量和传输范围方面,aptable具有更强的灵活性和鲁棒性,优于原有的固定PHY模式。此外,AptBLEM的吞吐量是AptBLE的三倍,最大吞吐量为1035Kbps,室内环境下的传输距离为42m。
{"title":"AptBLE: Adaptive PHY Mode based on K-means Algorithm in Bluetooth5","authors":"Xuan Luo, Mingyuan Zang, Ying Yan, L. Dittmann","doi":"10.1109/WTS51064.2021.9433679","DOIUrl":"https://doi.org/10.1109/WTS51064.2021.9433679","url":null,"abstract":"Since Bluetooth5 standard released in 2016, its usage in commercial electronic products has been increased rapidly and substantially. Comparing to BLE 4.2, Bluetooth5 supports three PHY modes, respectively 2M, 1M and Coded PHY mode, providing a higher throughput and a wider range. Whereas there is a trade-off between its throughput and coverage. When the connection is established, the PHY mode is commonly pre-configured and fixed. This rigid design limits the flexibility in offering dynamic throughput and coverage. Therefore, we propose a method termed AptBLE, that switches the PHY mode in Bluetooth5 adaptively by considering the Received Signal Strength Indicator (RSSI) level. Specifically, we optimise the RSSI threshold for different PHY modes using the K-means clustering algorithm. Moreover, based on AptBLE, we further enable the Data Length Extension (DLE) feature and term the improved method as AptBLEM. We implement AptBLE (M) on the boards and test in indoor environment. The experimental results show that, AptBLE is more flexible, robust and outperforms the original fixed PHY mode in terms of throughput and transmission range. Furthermore, AptBLEM can triple the throughput than AptBLE, with a maximum throughput value in 1035Kbps and 42m range in indoor environment.","PeriodicalId":443112,"journal":{"name":"2021 Wireless Telecommunications Symposium (WTS)","volume":"655 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125968448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Caching with Finite Blocklength Coding for Secrecy over the Binary Erasure Wiretap Channel 基于有限块长度编码的二进制擦除窃听信道保密缓存研究
Pub Date : 2021-04-21 DOI: 10.1109/WTS51064.2021.9433710
Willie K. Harrison, M. Shoushtari
In this paper, we show that caching can aid in achieving secure communications by considering a wiretap scenario where the transmitter and legitimate receiver share access to a secure cache, and an eavesdropper is able to tap transmissions over a binary erasure wiretap channel during the delivery phase of a caching protocol. The scenario under consideration gives rise to a new channel model for wiretap coding that allows the transmitter to effectively choose a subset of bits to erase at the eavesdropper by caching the bits ahead of time. The eavesdropper observes the remainder of the coded bits through the wiretap channel for the general case. In the wiretap type-II scenario, the eavesdropper is able to choose a set of revealed bits only from the subset of bits not cached. We present a coding approach that allows efficient use of the cache to realize a caching gain in the network, and show how to use the cache to optimize the information theoretic security in the choice of a finite blocklength code and the choice of the cached bit set. To our knowledge, this is the first work on explicit algorithms for secrecy coding in any type of caching network.
在本文中,我们展示了缓存可以帮助实现安全通信,通过考虑一个窃听场景,其中发送方和合法接收方共享对安全缓存的访问,并且窃听者能够在缓存协议的交付阶段通过二进制擦除窃听通道窃听传输。所考虑的场景产生了一种新的窃听编码信道模型,该模型允许发射机通过提前缓存比特来有效地选择一个比特子集以在窃听者处擦除。对于一般情况,窃听者通过窃听通道观察剩余的编码位。在窃听类型ii场景中,窃听者只能从未缓存的比特子集中选择一组显示的比特。我们提出了一种编码方法,允许有效地利用缓存来实现网络中的缓存增益,并展示了如何使用缓存来优化信息理论安全性,以选择有限块长度的代码和选择缓存位集。据我们所知,这是在任何类型的缓存网络中对保密编码的显式算法的第一次工作。
{"title":"On Caching with Finite Blocklength Coding for Secrecy over the Binary Erasure Wiretap Channel","authors":"Willie K. Harrison, M. Shoushtari","doi":"10.1109/WTS51064.2021.9433710","DOIUrl":"https://doi.org/10.1109/WTS51064.2021.9433710","url":null,"abstract":"In this paper, we show that caching can aid in achieving secure communications by considering a wiretap scenario where the transmitter and legitimate receiver share access to a secure cache, and an eavesdropper is able to tap transmissions over a binary erasure wiretap channel during the delivery phase of a caching protocol. The scenario under consideration gives rise to a new channel model for wiretap coding that allows the transmitter to effectively choose a subset of bits to erase at the eavesdropper by caching the bits ahead of time. The eavesdropper observes the remainder of the coded bits through the wiretap channel for the general case. In the wiretap type-II scenario, the eavesdropper is able to choose a set of revealed bits only from the subset of bits not cached. We present a coding approach that allows efficient use of the cache to realize a caching gain in the network, and show how to use the cache to optimize the information theoretic security in the choice of a finite blocklength code and the choice of the cached bit set. To our knowledge, this is the first work on explicit algorithms for secrecy coding in any type of caching network.","PeriodicalId":443112,"journal":{"name":"2021 Wireless Telecommunications Symposium (WTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130733212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Wireless Cybersecurity Education: A Focus on Curriculum 无线网络安全教育:关注课程
Pub Date : 2021-04-21 DOI: 10.1109/WTS51064.2021.9433709
Edward J. Glantz, Michael R. Bartolacci, M. Nasereddin, D. Fusco, Joanne C. Peca, Devin Kachmar
Higher education is increasingly called upon to enhance cyber education, including hands-on "experiential" training. The good news is that additional tools and techniques are becoming more available, both in-house and through third parties, to provide cyber training environments and simulations at various features and price points. However, the training thus far has only focused on "traditional" Cybersecurity that lightly touches on wireless in undergraduate and master’s degree programs, and certifications. The purpose of this research is to identify and recognize nascent cyber training emphasizing a broader spectrum of wireless security and encourage curricular development that includes critical experiential training. Experiential wireless security training is important to keep pace with the growth in wireless communication mediums and associated Internet of Things (IoT) and Cyber Physical System (CPS) applications. Cyber faculty at a university offering undergraduate and master’s Cybersecurity degrees authored this paper; both degrees are offered to resident as well as online students.
越来越多的人呼吁高等教育加强网络教育,包括实践“体验”培训。好消息是,越来越多的工具和技术可用,无论是内部还是通过第三方,都可以提供各种功能和价格的网络培训环境和模拟。然而,到目前为止,培训只关注“传统的”网络安全,在本科和硕士学位课程以及认证中很少涉及无线。本研究的目的是识别和识别新兴的网络培训,强调更广泛的无线安全范围,并鼓励包括关键体验培训在内的课程开发。体验式无线安全培训对于跟上无线通信媒介和相关物联网(IoT)和网络物理系统(CPS)应用的增长非常重要。某大学网络安全专业本科和硕士学位的网络教师撰写了这篇论文;这两个学位都提供给常驻学生和在线学生。
{"title":"Wireless Cybersecurity Education: A Focus on Curriculum","authors":"Edward J. Glantz, Michael R. Bartolacci, M. Nasereddin, D. Fusco, Joanne C. Peca, Devin Kachmar","doi":"10.1109/WTS51064.2021.9433709","DOIUrl":"https://doi.org/10.1109/WTS51064.2021.9433709","url":null,"abstract":"Higher education is increasingly called upon to enhance cyber education, including hands-on \"experiential\" training. The good news is that additional tools and techniques are becoming more available, both in-house and through third parties, to provide cyber training environments and simulations at various features and price points. However, the training thus far has only focused on \"traditional\" Cybersecurity that lightly touches on wireless in undergraduate and master’s degree programs, and certifications. The purpose of this research is to identify and recognize nascent cyber training emphasizing a broader spectrum of wireless security and encourage curricular development that includes critical experiential training. Experiential wireless security training is important to keep pace with the growth in wireless communication mediums and associated Internet of Things (IoT) and Cyber Physical System (CPS) applications. Cyber faculty at a university offering undergraduate and master’s Cybersecurity degrees authored this paper; both degrees are offered to resident as well as online students.","PeriodicalId":443112,"journal":{"name":"2021 Wireless Telecommunications Symposium (WTS)","volume":"292 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114105575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy Efficient Resource Allocation and Mode Selection for Content Fetching in Cellular D2D Networks 蜂窝D2D网络中高效资源分配和内容获取模式选择
Pub Date : 2021-04-21 DOI: 10.1109/WTS51064.2021.9433685
Elhadj Moustapha Diallo, Rong Chai, Tazeem Ahmad
Non-orthogonal multiple access (NOMA) and orthogonal frequency division multiple access (OFDMA) are two typical access techniques which can be applied for cellular systems. A hybrid scheme leveraging the advantages of NOMA and OMA schemes has been recently proved to be a promising approach to reduce the interference among users and enhance the performance of cellular device to device (D2D) networks. In this paper, we study the problem of resource allocation and mode selection for content fetching in a cellular D2D network. In order to improve the energy efficiency of the network, we formulate the joint problem as a system energy efficiency maximization problem. As this problem is a non-linear fractional problem that cannot be solved conveniently, we transform it into power allocation subproblem and content fetching mode selection subproblem, and then using the Lagrange dual method and a heuristic algorithm solve these two subproblems, respectively. The presented numerical results demonstrate the effectiveness of the proposed algorithm.
非正交多址(NOMA)和正交频分多址(OFDMA)是应用于蜂窝系统的两种典型的接入技术。利用NOMA和OMA方案优点的混合方案最近被证明是一种很有前途的方法,可以减少用户之间的干扰,提高蜂窝设备到设备(D2D)网络的性能。本文研究了蜂窝D2D网络中内容获取的资源分配和模式选择问题。为了提高网络的能效,我们将联合问题表述为系统能效最大化问题。由于该问题是一个不易求解的非线性分数型问题,我们将其转化为功率分配子问题和内容获取模式选择子问题,然后分别使用拉格朗日对偶方法和启发式算法求解这两个子问题。给出的数值结果证明了该算法的有效性。
{"title":"Energy Efficient Resource Allocation and Mode Selection for Content Fetching in Cellular D2D Networks","authors":"Elhadj Moustapha Diallo, Rong Chai, Tazeem Ahmad","doi":"10.1109/WTS51064.2021.9433685","DOIUrl":"https://doi.org/10.1109/WTS51064.2021.9433685","url":null,"abstract":"Non-orthogonal multiple access (NOMA) and orthogonal frequency division multiple access (OFDMA) are two typical access techniques which can be applied for cellular systems. A hybrid scheme leveraging the advantages of NOMA and OMA schemes has been recently proved to be a promising approach to reduce the interference among users and enhance the performance of cellular device to device (D2D) networks. In this paper, we study the problem of resource allocation and mode selection for content fetching in a cellular D2D network. In order to improve the energy efficiency of the network, we formulate the joint problem as a system energy efficiency maximization problem. As this problem is a non-linear fractional problem that cannot be solved conveniently, we transform it into power allocation subproblem and content fetching mode selection subproblem, and then using the Lagrange dual method and a heuristic algorithm solve these two subproblems, respectively. The presented numerical results demonstrate the effectiveness of the proposed algorithm.","PeriodicalId":443112,"journal":{"name":"2021 Wireless Telecommunications Symposium (WTS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122472512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exact File Delivery Time of Bundle Protocol in Delay/disruption-Tolerant Networks 容延迟/容中断网络中束协议的精确文件传输时间
Pub Date : 2021-04-21 DOI: 10.1109/WTS51064.2021.9433675
Lei Cao, R. Viswanathan
As the data delivery protocol in the Delay/ disruption-Tolerant Networks (DTN), the Bundle Protocol (BP) has gained much interest in its performance analysis. Existing analytic results in terms of the average file delivery time (AFDT) are mainly approximations, which provide reasonably close estimates in some cases but exhibit large discrepancies in other cases. In this paper, we point out a fallacy used in existing work, and, for the first time, provide an exact mathematical solution of the AFDT of the bundle protocol. This result works for both symmetric and asymmetric channel conditions, with either unlimited or limited total number of transmission rounds. Validation via simulation is also provided.
束传输协议(BP)作为容忍延迟/中断网络(DTN)中的数据传输协议,其性能分析备受关注。关于平均文件交付时间(AFDT)的现有分析结果主要是近似值,在某些情况下提供了相当接近的估计,但在其他情况下显示出很大的差异。本文指出了现有工作中的一个谬误,并首次给出了束协议AFDT的精确数学解。该结果适用于对称和非对称信道条件,无论传输回合总数是无限的还是有限的。还提供了仿真验证。
{"title":"Exact File Delivery Time of Bundle Protocol in Delay/disruption-Tolerant Networks","authors":"Lei Cao, R. Viswanathan","doi":"10.1109/WTS51064.2021.9433675","DOIUrl":"https://doi.org/10.1109/WTS51064.2021.9433675","url":null,"abstract":"As the data delivery protocol in the Delay/ disruption-Tolerant Networks (DTN), the Bundle Protocol (BP) has gained much interest in its performance analysis. Existing analytic results in terms of the average file delivery time (AFDT) are mainly approximations, which provide reasonably close estimates in some cases but exhibit large discrepancies in other cases. In this paper, we point out a fallacy used in existing work, and, for the first time, provide an exact mathematical solution of the AFDT of the bundle protocol. This result works for both symmetric and asymmetric channel conditions, with either unlimited or limited total number of transmission rounds. Validation via simulation is also provided.","PeriodicalId":443112,"journal":{"name":"2021 Wireless Telecommunications Symposium (WTS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123826863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of Aeronautical Broadband Service Protecting Co-Frequency Terrestrial Services in Ka-band 航空宽带业务保护ka波段同频地面业务的研究
Pub Date : 2021-04-21 DOI: 10.1109/WTS51064.2021.9433682
Sunil Panthi, P. Amodio
The aeronautical broadband services ("inflight internet") with geostationary satellites have been expanding for the last two decades. The inflight internet transformed from being a privilege for business travelers to a necessity for every passenger. The unprecedented development of terrestrial fifth-generation (5G) applications and far-reaching aeronautical broadband services need to address the growing need for capacity. The International Telecommunication Union (ITU), responsible for promoting the shared global use of the radio spectrum, adopted provisions in governing the use of 4 GHz of Ka-band spectrum to terrestrial and space applications during the World Radiocommunication Conference 2019 (WRC 19). Sharing the spectrum requires keeping each party from unacceptable interferences. While operating in uplink frequency (27.5 GHz to 29.5 GHz), aeronautical broadband service ("Aeronautical Earth Station in Motion") must ensure compliance with Power Flux Density (PFD) envelop limits on the ground as defined by ITU. We study the co-existence of space and terrestrial application, present a methodology to examining the PFD conformity, and verify the methodology with a simulation. We recommend considering this methodology for examining conformity of aeronautical earth station in motion (A-ESIM) with respect to PFD limits in 27.5 GHz to 29.5 GHz bands.
利用地球同步卫星的航空宽带服务(“空中互联网”)在过去二十年中一直在扩大。机上互联网从商务旅客的特权变成了每位乘客的必需品。地面第五代(5G)应用和影响深远的航空宽带业务的空前发展需要满足日益增长的容量需求。负责促进无线电频谱全球共享使用的国际电信联盟(ITU)在2019年世界无线电通信大会(WRC 19)期间通过了有关将4ghz ka频段频谱用于地面和空间应用的规定。共享频谱要求各方不受不可接受的干扰。航空宽带业务(“运动中的航空地球站”)在上行频率(27.5 GHz至29.5 GHz)下运行时,必须确保符合国际电联规定的地面功率通量密度(PFD)包络限制。我们研究了空间和地面应用的共存,提出了一种检验PFD一致性的方法,并通过仿真验证了该方法。我们建议在27.5 GHz至29.5 GHz频段的PFD限制方面,考虑使用这种方法来检查运动中的航空地面站(A-ESIM)的一致性。
{"title":"Study of Aeronautical Broadband Service Protecting Co-Frequency Terrestrial Services in Ka-band","authors":"Sunil Panthi, P. Amodio","doi":"10.1109/WTS51064.2021.9433682","DOIUrl":"https://doi.org/10.1109/WTS51064.2021.9433682","url":null,"abstract":"The aeronautical broadband services (\"inflight internet\") with geostationary satellites have been expanding for the last two decades. The inflight internet transformed from being a privilege for business travelers to a necessity for every passenger. The unprecedented development of terrestrial fifth-generation (5G) applications and far-reaching aeronautical broadband services need to address the growing need for capacity. The International Telecommunication Union (ITU), responsible for promoting the shared global use of the radio spectrum, adopted provisions in governing the use of 4 GHz of Ka-band spectrum to terrestrial and space applications during the World Radiocommunication Conference 2019 (WRC 19). Sharing the spectrum requires keeping each party from unacceptable interferences. While operating in uplink frequency (27.5 GHz to 29.5 GHz), aeronautical broadband service (\"Aeronautical Earth Station in Motion\") must ensure compliance with Power Flux Density (PFD) envelop limits on the ground as defined by ITU. We study the co-existence of space and terrestrial application, present a methodology to examining the PFD conformity, and verify the methodology with a simulation. We recommend considering this methodology for examining conformity of aeronautical earth station in motion (A-ESIM) with respect to PFD limits in 27.5 GHz to 29.5 GHz bands.","PeriodicalId":443112,"journal":{"name":"2021 Wireless Telecommunications Symposium (WTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131036942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive Downlink Beamforming based on SRS for Channel Estimation using Coherence Bandwidth Characteristic in sub-6GHz 5G NR 基于SRS的sub-6GHz 5G NR信道估计自适应下行波束形成
Pub Date : 2021-04-21 DOI: 10.1109/WTS51064.2021.9433714
Kyungchun Lee, Yeon-Ju Song, Jae-Seon Jang
The precise channel estimation is a prerequisite to acquire beamforming performance that the massive multi-input and multi-output (MIMO) system guarantees. There is pre-coding matrix indicator (PMI) based downlink beamforming as the beamforming method using downlink channel estimation. The PMI based downlink beamforming uses grid of beam (GoB) based on codebook. That is why it is challenging to track down the exact location of a mobile station and to obtain the maximum beamforming gain. The sounding reference signal (SRS) based downlink beamforming using uplink channel estimation gets the correlation coefficient between SRSs received from each receiver of a base station and obtains the maximum beamforming gain by tracking down the location of a mobile station accurately. However, as the SRS based downlink beamforming is required to be detected at each receiver of a base station, it has coverage limitation at the cell edge compared to the PMI based downlink beamforming using the combined feedback at a base station. This paper proposes that system obtains the maximum beamforming gain by using the SRS based downlink beamforming at the cell center and supplements coverage limitation by switching it to the PMI based downlink beamforming at the cell edge and using coherence bandwidth.
精确的信道估计是保证大规模多输入多输出(MIMO)系统波束形成性能的前提。基于预编码矩阵指示器(PMI)的下行波束形成方法是利用下行信道估计的波束形成方法。基于PMI的下行波束形成采用基于码本的波束网格(GoB)。这就是为什么追踪移动电台的确切位置并获得最大波束形成增益具有挑战性的原因。基于探测参考信号(SRS)的下行波束形成采用上行信道估计,通过准确跟踪移动基站的位置,得到基站各接收机接收到的SRS之间的相关系数,从而获得最大波束形成增益。然而,由于基于SRS的下行波束形成需要在基站的每个接收器上检测到,因此与使用基站组合反馈的基于PMI的下行波束形成相比,它在小区边缘有覆盖限制。本文提出系统在小区中心使用基于SRS的下行波束形成获得最大波束形成增益,在小区边缘切换到基于PMI的下行波束形成并利用相干带宽来补充覆盖限制。
{"title":"Adaptive Downlink Beamforming based on SRS for Channel Estimation using Coherence Bandwidth Characteristic in sub-6GHz 5G NR","authors":"Kyungchun Lee, Yeon-Ju Song, Jae-Seon Jang","doi":"10.1109/WTS51064.2021.9433714","DOIUrl":"https://doi.org/10.1109/WTS51064.2021.9433714","url":null,"abstract":"The precise channel estimation is a prerequisite to acquire beamforming performance that the massive multi-input and multi-output (MIMO) system guarantees. There is pre-coding matrix indicator (PMI) based downlink beamforming as the beamforming method using downlink channel estimation. The PMI based downlink beamforming uses grid of beam (GoB) based on codebook. That is why it is challenging to track down the exact location of a mobile station and to obtain the maximum beamforming gain. The sounding reference signal (SRS) based downlink beamforming using uplink channel estimation gets the correlation coefficient between SRSs received from each receiver of a base station and obtains the maximum beamforming gain by tracking down the location of a mobile station accurately. However, as the SRS based downlink beamforming is required to be detected at each receiver of a base station, it has coverage limitation at the cell edge compared to the PMI based downlink beamforming using the combined feedback at a base station. This paper proposes that system obtains the maximum beamforming gain by using the SRS based downlink beamforming at the cell center and supplements coverage limitation by switching it to the PMI based downlink beamforming at the cell edge and using coherence bandwidth.","PeriodicalId":443112,"journal":{"name":"2021 Wireless Telecommunications Symposium (WTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129845545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Novel Unsupervised Feature Extraction Protocol using Autoencoders for Connected Speech: Application in Parkinson's Disease Classification 基于自编码器的新型无监督特征提取协议:在帕金森病分类中的应用
Pub Date : 2021-04-21 DOI: 10.1109/WTS51064.2021.9433683
Sai Bharadwaj Appakaya, R. Sankar, E. Sheybani
Speech processing has generated substantial research interest for telemonitoring and classification applications in healthcare due to the ease of acquisition and availability of established research protocols. This growing research interest has shown significant progress in processing Parkinsonian speech for monitoring and classification applications. A considerable portion of the studies in this research area focuses on developing automatic telemonitoring protocols with passive data collection using wearable or mobile devices. Most of these studies focus on using sustained vowel phonations and handcrafted features for training classifiers. Though some researchers suggest better suitability of connected/running speech for this application, fewer studies focus on it predominantly because of the processing complexity. This study focuses on using connected speech with pitch synchronous segmentation and convolutional Autoencoders for feature extraction from regular and advanced spectrograms. The spectrograms were created using pitch synchronous and block processing segmentations have been evaluated in this study. This methodology also aims to bypass data availability issues by using standardized TIMIT dataset for training Autoencoders. With Logistic regression and Linear SVM, we achieved 85% classification accuracy using the features from Autoencoders. Mean accuracy of 84% was obtained under leave one subject out (LOSO) classification indicating the performance reliability for entirely new data.
由于易于获取和获得已建立的研究协议,语音处理已经对医疗保健中的远程监控和分类应用产生了实质性的研究兴趣。这一日益增长的研究兴趣在处理帕金森言语监测和分类应用方面取得了重大进展。该研究领域的相当一部分研究侧重于开发使用可穿戴或移动设备进行被动数据收集的自动远程监控协议。这些研究大多集中在使用持续元音发音和手工制作的特征来训练分类器。尽管一些研究人员认为连接/运行语音更适合此应用程序,但主要由于处理复杂性,研究较少关注它。本研究的重点是使用连接语音与音高同步分割和卷积自编码器从常规和高级频谱图中提取特征。谱图是用基音同步和块处理创建的,在本研究中对分割进行了评估。该方法还旨在通过使用标准化的TIMIT数据集来训练自动编码器,从而绕过数据可用性问题。使用逻辑回归和线性支持向量机,我们利用自编码器的特征实现了85%的分类准确率。在遗漏一个受试者(LOSO)分类下获得的平均准确率为84%,表明对全新数据的性能可靠性。
{"title":"Novel Unsupervised Feature Extraction Protocol using Autoencoders for Connected Speech: Application in Parkinson's Disease Classification","authors":"Sai Bharadwaj Appakaya, R. Sankar, E. Sheybani","doi":"10.1109/WTS51064.2021.9433683","DOIUrl":"https://doi.org/10.1109/WTS51064.2021.9433683","url":null,"abstract":"Speech processing has generated substantial research interest for telemonitoring and classification applications in healthcare due to the ease of acquisition and availability of established research protocols. This growing research interest has shown significant progress in processing Parkinsonian speech for monitoring and classification applications. A considerable portion of the studies in this research area focuses on developing automatic telemonitoring protocols with passive data collection using wearable or mobile devices. Most of these studies focus on using sustained vowel phonations and handcrafted features for training classifiers. Though some researchers suggest better suitability of connected/running speech for this application, fewer studies focus on it predominantly because of the processing complexity. This study focuses on using connected speech with pitch synchronous segmentation and convolutional Autoencoders for feature extraction from regular and advanced spectrograms. The spectrograms were created using pitch synchronous and block processing segmentations have been evaluated in this study. This methodology also aims to bypass data availability issues by using standardized TIMIT dataset for training Autoencoders. With Logistic regression and Linear SVM, we achieved 85% classification accuracy using the features from Autoencoders. Mean accuracy of 84% was obtained under leave one subject out (LOSO) classification indicating the performance reliability for entirely new data.","PeriodicalId":443112,"journal":{"name":"2021 Wireless Telecommunications Symposium (WTS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Blockchain-Based Trust Management Scheme for Vehicular Networks 一种新的基于区块链的车辆网络信任管理方案
Pub Date : 2021-04-21 DOI: 10.1109/WTS51064.2021.9433711
Cong Pu
Recent advancements in embedded sensing system, wireless communication technologies, big data, and artificial intelligence have fueled the development of Internet of Vehicles (IoV), where vehicles, road side unit (RSUs), and smart devices seamlessly interact with each other to enable the gathering and sharing of information on vehicles, roads, and their surrounds. As a fundamental component of IoV, vehicular networks (VANETs) are playing a critical role in processing, computing, and sharing travel-related information, which can help vehicles timely be aware of traffic situation and finally improve road safety and travel experience. However, due to the unique characteristics of vehicles, such as high mobility and sparse deployment making neighbor vehicles unacquainted and unknown to each other, VANETs are facing the challenge of evaluating the credibility of road safety messages. In this paper, we propose a blockchain-based trust management system using multi-criteria decision-making model, also referred to as $Trust_{MCDM}^{Block}$, in VANETs. In the $Trust_{MCDM}^{Block}$, each vehicle evaluates the credibility of received road safety message and generates the trust value of message originator. Due to the limited storage capacity, each vehicle periodically uploads the trust value to a nearby RSU. After receiving various trust values from vehicles, the RSU calculates the reputation value of message originator of road safety message using multi-criteria decision-making model, packs the reputation value into a block, and competes to add the block into blockchain. We evaluate the proposed $Trust_{MCDM}^{Block}$ approach through simulation experiments using OMNeT++ and compare its performance with prior blockchain-based decentralized trust management approach. The simulation results indicate that the proposed $Trust_{MCDM}^{Block}$ approach can not only improve fictitious message detection rate and malicious vehicle detection rate, but also can increase the number of dropped fictitious messages.
嵌入式传感系统、无线通信技术、大数据和人工智能的最新进展推动了车联网(IoV)的发展,在车联网中,车辆、路侧单元(rsu)和智能设备可以无缝地相互交互,从而收集和共享有关车辆、道路及其周围环境的信息。作为车联网的基础组成部分,车联网在处理、计算和共享出行相关信息方面发挥着至关重要的作用,可以帮助车辆及时了解交通状况,最终改善道路安全和出行体验。然而,由于车辆的独特性,如高机动性和稀疏部署使得相邻车辆彼此不熟悉和未知,vanet面临着评估道路安全信息可信度的挑战。在本文中,我们提出了一种基于区块链的信任管理系统,使用多标准决策模型,在VANETs中也称为$Trust_{MCDM}^{Block}$。在$Trust_{MCDM}^{Block}$中,每辆车评估接收到的道路安全消息的可信度,生成消息发起者的信任值。由于存储容量有限,每辆车定期将信任值上传到附近的RSU。RSU接收到车辆的各种信任值后,使用多准则决策模型计算道路安全消息发起者的信誉值,将信誉值打包成块,并竞争将该块添加到区块链中。我们通过使用omnet++进行仿真实验,评估了提出的$Trust_{MCDM}^{Block}$方法,并将其性能与先前基于区块链的去中心化信任管理方法进行了比较。仿真结果表明,提出的$Trust_{MCDM}^{Block}$方法不仅可以提高虚假消息的检测率和恶意车辆的检测率,而且可以增加虚假消息的丢弃数量。
{"title":"A Novel Blockchain-Based Trust Management Scheme for Vehicular Networks","authors":"Cong Pu","doi":"10.1109/WTS51064.2021.9433711","DOIUrl":"https://doi.org/10.1109/WTS51064.2021.9433711","url":null,"abstract":"Recent advancements in embedded sensing system, wireless communication technologies, big data, and artificial intelligence have fueled the development of Internet of Vehicles (IoV), where vehicles, road side unit (RSUs), and smart devices seamlessly interact with each other to enable the gathering and sharing of information on vehicles, roads, and their surrounds. As a fundamental component of IoV, vehicular networks (VANETs) are playing a critical role in processing, computing, and sharing travel-related information, which can help vehicles timely be aware of traffic situation and finally improve road safety and travel experience. However, due to the unique characteristics of vehicles, such as high mobility and sparse deployment making neighbor vehicles unacquainted and unknown to each other, VANETs are facing the challenge of evaluating the credibility of road safety messages. In this paper, we propose a blockchain-based trust management system using multi-criteria decision-making model, also referred to as $Trust_{MCDM}^{Block}$, in VANETs. In the $Trust_{MCDM}^{Block}$, each vehicle evaluates the credibility of received road safety message and generates the trust value of message originator. Due to the limited storage capacity, each vehicle periodically uploads the trust value to a nearby RSU. After receiving various trust values from vehicles, the RSU calculates the reputation value of message originator of road safety message using multi-criteria decision-making model, packs the reputation value into a block, and competes to add the block into blockchain. We evaluate the proposed $Trust_{MCDM}^{Block}$ approach through simulation experiments using OMNeT++ and compare its performance with prior blockchain-based decentralized trust management approach. The simulation results indicate that the proposed $Trust_{MCDM}^{Block}$ approach can not only improve fictitious message detection rate and malicious vehicle detection rate, but also can increase the number of dropped fictitious messages.","PeriodicalId":443112,"journal":{"name":"2021 Wireless Telecommunications Symposium (WTS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122575178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2021 Wireless Telecommunications Symposium (WTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1