+ All Categories
Home > Documents >  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule...

 · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule...

Date post: 27-May-2020
Category:
Upload: others
View: 9 times
Download: 0 times
Share this document with a friend
72
1 WiCOM 2015 Conference Guide Table of Contents Part I WiCOM 2015 Conference Schedule ........................................................... 2 Part II Plenary Speeches .................................................................................... 3 Plenary Speech 1: Internet+Robot Will Drive Next Generation Mobile Communication Standard ........................................................................................................... 3 Plenary Speech 2: Big Data Analytics for Wireless Networks ...................................... 3 Plenary Speech 3: Version 2020 form CMCC ........................................................... 3 Plenary Speech 4: Some Advances inWireless Networkingfor Cyber Physical Systems ... 4 Plenary Speech 5: The Introduction of Overlapped Multiplexing Principle and Its Applications ....................................................................................................... 5 Plenary Speech 6: Beyond Cyber-Physical Era: What's Next?..................................... 5 Plenary Speech 7: Time Reversal Indoor Localization System Employing Spread Spectrum Acoustics ........................................................................................................... 6 Part III Technical Sessions ................................................................................ 7 Technical Session 1: Signal Processing I ................................................................. 7 Technical Session 2: Communication Systems I ....................................................... 8 Technical Session 3: Mobile Computing Systems and Technologies........................... 10 Technical Session 4: Cognitive Radios and Networks & Signal Processing II ............... 13 Technical Session 5: Network Protocols and Performance & Communication Systems II14 Technical Session 6: Ad hoc, Sensor Network & Security ........................................ 16 Part IV Poster................................................................................................... 19 Part V Abstracts ............................................................................................... 22 Part VI Instructions for Presentations ............................................................. 70 Part VII Hotel Information ............................................................................... 71 Contact Us .......................................................................................................... 72
Transcript
Page 1:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

1 WiCOM 2015 Conference Guide

Table of Contents

Part I WiCOM 2015 Conference Schedule ........................................................... 2

Part II Plenary Speeches .................................................................................... 3

Plenary Speech 1: Internet+Robot Will Drive Next Generation Mobile Communication Standard ........................................................................................................... 3 Plenary Speech 2: Big Data Analytics for Wireless Networks ...................................... 3 Plenary Speech 3: Version 2020 form CMCC ........................................................... 3 Plenary Speech 4: Some Advances inWireless Networkingfor Cyber Physical Systems ... 4 Plenary Speech 5: The Introduction of Overlapped Multiplexing Principle and Its Applications ....................................................................................................... 5 Plenary Speech 6: Beyond Cyber-Physical Era: What's Next? ..................................... 5 Plenary Speech 7: Time Reversal Indoor Localization System Employing Spread Spectrum Acoustics ........................................................................................................... 6

Part III Technical Sessions ................................................................................ 7

Technical Session 1: Signal Processing I ................................................................. 7 Technical Session 2: Communication Systems I ....................................................... 8 Technical Session 3: Mobile Computing Systems and Technologies ........................... 10 Technical Session 4: Cognitive Radios and Networks & Signal Processing II ............... 13 Technical Session 5: Network Protocols and Performance & Communication Systems II14 Technical Session 6: Ad hoc, Sensor Network & Security ........................................ 16

Part IV Poster................................................................................................... 19

Part V Abstracts ............................................................................................... 22

Part VI Instructions for Presentations ............................................................. 70

Part VII Hotel Information ............................................................................... 71

Contact Us .......................................................................................................... 72

Page 2:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

2 WiCOM 2015 Conference Guide

Part I WiCOM 2015 Conference Schedule

Time: September 21-September 23, 2015 Location: Guangdong Hotel (Shanghai), Shanghai, China

Date Time Lobby, Guangdong Hotel (Shanghai)

Sep. 21 14:00-17:00 Registration

Date Time Yuehai Hall (粤海厅) 3rd Floor

Sep. 22

08:30-08:50

Opening Ceremony

08:50-12:00

Plenary Speeches Chair: Prof. Shengjie Zhao

Group Photo & Coffee Break: 10:10-10:30

12:00-13:30 Lunch [328 Western Restaurant (328 西餐厅), 1st Floor]

14:00-18:00

Plenary Speeches Chair: Prof. Shengjie Zhao

Group Photo & Coffee Break: 16:00-16:20

18:00-19:30 Cocktail Party and Welcome Banquet [328 Western Restaurant (328 西餐厅), 1st Floor]

Date Time Magnolia Room (白玉兰厅)

4th Floor

Sakura Room (樱花厅)

4th Floor

Lotus Room (荷花厅)

4th Floor

Sep. 23

08:30-12:00

Technical Session 1: Signal Processing I

Chair: Dr. Tong Wu

Coffee Break:

10:15-10:30

Technical Session 2: Communication Systems I

Chair: Prof. Daoben Li

Coffee Break:

10:15-10:30

Technical Session 3: Mobile Computing Systems

and Technologies

Chair: Dr. Feno Heriniaina Rabevohitra

Coffee Break:

10:15-10:30 12:00-13:30 Lunch [328 Western Restaurant (328 西餐厅), 1st Floor]

14:00-18:00

Technical Session 4: Cognitive Radios and

Networks & Signal Processing II

Chair: Dr. Cheng Jin

Coffee Break:

16:15-16:30

Technical Session 5: Network Protocols and

Performance & Communication Systems II

Chair: Dr. Xiaolin Ma

Coffee Break:

16:15-16:30

Technical Session 6: Ad hoc, Sensor Network &

Security Chair: Prof. Xueming Wang

Coffee Break:

16:00-16:15 Sep. 24 07:30-18:00 One-day Tour (at own expense)

Page 3:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

3 WiCOM 2015 Conference Guide

Part II Plenary Speeches

Plenary Speech 1: Internet+Robot Will Drive Next Generation Mobile

Communication Standard

Speaker: Prof. Xiaoqing Huang, China Mobile Research Institute, China Time: 08:50-09:30, Tuesday Morning, September 22, 2015

Location: Yuehai Hall(粤海厅), 3rd Floor, Guangdong Hotel (Shanghai) Abstract My talk will introduce the concept and architecture of cloud connected mobile robots. It is pointed out that for 5G, the key demand for is no longer for human communication,but for smart machines.

Plenary Speech 2: Big Data Analytics for Wireless Networks

Speakers: Prof. Robert Caiming Qiu, Tennessee Technological University (TTU), USA Prof. Prof. Shengjie Zhao, Tongji University, China Time: 09:30-10:10, Tuesday Morning, September 22, 2015

Location: Yuehai Hall(粤海厅), 3rd Floor, Guangdong Hotel (Shanghai)

Plenary Speech 3: Version 2020 form CMCC

Speaker: Dr. Chih-Lin I, China Mobile Research Institute GCRC, China Time: 10:30-11:10, Tuesday Morning, September 22, 2015 Location: Yuehai Hall(粤海厅), 3rd Floor, Guangdong Hotel (Shanghai) Abstract The 5G wireless communication network, which may come into life in around

Page 4:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

4 WiCOM 2015 Conference Guide

2020, is expected to accommodate the extremely diverse performance requirements of the rich applications in Mobile Internet and Internet of Thing. For lack of enough flexibility to satisfy the diverse needs due to its dedicated hardware based deployment schemes and single globally optimized air-interface protocol, the traditional mobile network is well motivated to become soft in 5G era. A “Soft 5G” concept is proposed by China Mobile, with reconfigurable and software defined network and air interface. This brings agility into implementation of each network element from core network to access network, as well as the building blocks of the air interface. This talk will share the latest development within China Mobile on the key elements of “Soft 5G” concept, i.e., SDN/NFV, C-RAN, and SDAI.

Plenary Speech 4: Some Advances inWireless Networkingfor Cyber Physical

Systems

Speaker: Prof. Tom Hou, Virginia Polytechnic Institute and State University, USA Time: 14:00-14:40, Tuesday Afternoon, September 22, 2015

Location: Yuehai Hall(粤海厅), 3rd Floor, Guangdong Hotel (Shanghai) Abstract Our world is evolving into a smart planet. The driving force in this evolution is the marriage of cyber and physical systems (or CPS). CPS is a synergy of technologies such as control, sensing, communications, networking, computation, among others. In this talk, I will focus on some new advances in wireless networking that are important to CPS. First, we consider throughput in multi-hop wireless networks – a fundamental problem in CPS. Given that MIMO is now pervasive, we study how to exploit MIMO’s capability in a multi-hop network environment. The key challenge here is to efficient use of MIMO’s degree-of-freedoms (DoFs) to cancel interference from other nodes in the network. Second, we consider energy problem in sensor networks – another fundamental problem in CPS. We present our research on wireless energy transfer, a new enabling technology to address energy problem in battery-powered wireless networks. Finally, I will describe some new frontiers in sharing radio spectrum and coexistence between primary and secondary networks beyond dynamic spectrum access. Most of these research advances areinterdisciplinary and require a synergistic exploration of knowledge basesfrom multiple technical domains.

Page 5:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

5 WiCOM 2015 Conference Guide

Plenary Speech 5: The Introduction of Overlapped Multiplexing Principle and Its

Applications

Speaker: Prof. Daoben Li, Beijing University of Posts and Telecommunications, China Time: 14:40-15:20, Tuesday Afternoon, September 22, 2015

Location: Yuehai Hall(粤海厅), 3rd Floor, Guangdong Hotel (Shanghai) Abstract The Overlapped Multiplexing Principle is a newly revealed principle in communication thathas been listed as one of the key projects of the coming 5 years plan by NNSFof China (National Nature Science Foundation). The principle points out that the overlapping between adjacent and neighboring data in any communication system is never interference but a beneficial coding constraint relationoffering benefit coding gain. The destroy fact coming outside the system is only the interference. According to it, all nowadays system seems unreasonable due to that they wasted most of their energy to combat with the beneficial“interference”. Based on such principle, a novel OVXDM (Overlapped X Domain Multiplexing)coding schemein X domainisappeared. By the shifted data weighted overlappedversion of any band-limited multiplexing transfer function, any time duration limited multiplexing impulse response functionor any other domain multiplexing function with limited duration, there appears an OVXDM with high spectral efficiency, high coding gain, no coding redundancy, relative low decoding complexity. Both theoretical analysis and testified simulations show that OVXDM is suitable for high spectral efficiency application and its capacity is only roughly linear to SNR rather than the well-known logarithm to SNR.

Plenary Speech 6: Beyond Cyber-Physical Era: What's Next?

Speaker: Prof. Sajal K. Das, Missouri University of Science and Technology, USA Time: 15:20-16:00, Tuesday Afternoon, September 22, 2015

Location: Yuehai Hall(粤海厅), 3rd Floor, Guangdong Hotel (Shanghai) Abstract We live in an era of “Internet of Things” where our physicaland personal environments are becoming increasingly smarter as they are immersed with sensing, networking, computing and communication capabilities. The availability of rich mobile devices like smartphones and wireless sensors have also empowered humans as an integral part of

Page 6:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

6 WiCOM 2015 Conference Guide

cyber-physical systems. This synergy has led to cyber-physical-social convergence exhibiting complex interactions, interdependencies and adaptations among devices, machines, systems/environments, users, human behavior, and social dynamics. In such a connected and mobile world, almost everything canacts as information source, analyzer and decision maker. This talk will highlight some of the emerging research challenges and opportunities in cyber-physical-social convergence, and then present some novel solutions to tackle them. It will also reflect on a fundamental question: “What’s Next?”

Plenary Speech 7: Time Reversal Indoor Localization System Employing Spread

Spectrum Acoustics

Speaker: Prof. Kosai Raoof, University of Maine, France Time: 16:20-17:00, Tuesday Afternoon, September 22, 2015

Location: Yuehai Hall(粤海厅), 3rd Floor, Guangdong Hotel (Shanghai) Abstract In this keynote, we present an acoustic indoor localization system that allows a simultaneous localization of sources with different location precision. We propose a new method employing time reversal technique and the code-division multiple-access modulation CDMA. The system was evaluated in simulations and experiments while varying the number of sources and that of the precision levels. The effect of the signal-to-noise ratio on system performance is also studied. With this system, we aimed to reduce the audibility of the transmitted acoustical signals. An equalization filter based on the absolute threshold of hearing was applied to the emitted signals and a matched filter was proposed at the receiver. Results showed an improvement in location precision when compared to the location system without the equalization filter. A reduction in signal audibility was also achieved.

Page 7:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

7 WiCOM 2015 Conference Guide

Part III Technical Sessions

Technical Session 1: Signal Processing I

Session Chair: Dr. Tong Wu, Natinal Space Science Center, CAS, China Magnolia Room (白玉兰厅), 4th Floor 08:30-12:00, Wednesday Morning, September 23, 2015 Paper ID Paper Title Author Affiliation

70057 Limited Feedback Precoding for Multiuser MIMO Systems Based on Array Preprocessing

Chao Li Henan University of Technology

70073 An Interference Alignment based on Joint Projector Interference Distances

Junchao Yao Harbin Engineering University

70090 An UEP Transmission Scheme Based on Distributed Rateless Codes

Chen Cui Harbin Institute of Technology

70112 The Effect of Phase Shifter Errors on The Performance of Millimeter Wave Beamforming

Junlin Tang UESTC

70115 Analysis and Implementation of an Arbitrary Variable Up-sampling Algorithm Based on Lookup Table

Junjun Liu Department of Electronics and Information Engineer

70120 A Limited Feedback-Based Bit Allocation Method For Interference Alignment

Hui Dun Harbin Engineering University

70143 Experimental Study on Wireless Interference in RFID System

Yang Fu Beijing University of Posts and Telecommunications

10:15-10:30 Coffee Break

70150 Frequency Estimation Method of Sinusoidal Frequency Signal Based on Piecewise Fft

Qu Wenxing Academy of Equipment

70152 Design of Wide Stopband Filter with Tunable Center Frequency

Zhaoqing SUN Harbin Engineering University

70169 A New Frequency Estimator of Sinusoid Based on Interpolated FFT

Lei Fan Dalian Maritime University

70192 Parallel Programming Design of Bpsk Signal Demodulation Based on Cuda

Yandu LIU Equipment Academy

Page 8:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

8 WiCOM 2015 Conference Guide

70204 Cyclic Delay Diversity with Discrete-Hartley-Fourier Transform in Ofdm System

Lingyan Li Dalian Polytechnic University

70252 High Rate Transmit Diversity Assisted Space Shift Keying Modulation over MIMO Channels

Yuanchao Han University of Electronic Science and Technology of China

70253 Slnr Based Cascaded Interference Align Precoding in Comp

Sheng Wang Zhengzhou Institute of Information Science and Technology, Zhengzhou, P.R. China

70283 Fft-Based Parallel Encoding Algorithm for Structured Ldpc Codes

Yanan Fan University of Chinese Academy of Sciences, Beijing, China

Technical Session 2: Communication Systems I

Session Chair: Prof. Daoben Li, Beijing University of Posts and Telecommunications, China Sakura Room (樱花厅), 4th Floor 8:30-12:00, Wednesday Morning, September 23, 2015 Paper ID Paper Title Author Affiliation

70043 Impact and Compensation of Sample Clock Offset in L-Cfdma Uplink

Din Dan Department of Optical and Electronic equipment

70050 Energy-efficient Dynamic Traffic Offloading in HetNets

Xun Wang UESTC

70054 A Self-similar Call Admission Control Algorithm in WiMAX

Yongdong Hu Southeast University

70059 Adaptive Multi-user Uplink Resource Allocation with Imperfect CSI

Yuanyuan Zhang

Institute of Electronics, Chinese Academy of Sciences

70076 Circularly Polarized Dual Frequency Band Quasi-annular-ring Slot Antenna for Wireless Local Area Networks (WLAN) Applications

Jianfeng Zhu Beijing University of Posts and Telecommunications

70088 A Dynamic Conformance Checking Method Based on Petri Nets for Satellite Communication System Network Control

Jun Zhu Nanjing Telecommunication Technology Research

Page 9:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

9 WiCOM 2015 Conference Guide

Protocol

Institute

70089 Cell Outage Detection Based on Improved Bp Neural Network in Lte System

Wanrong Feng Beijing University of Posts and Telecommunications

10:15-10:30 Coffee Break

70097 A New Cell Search Scheme Based on Cell-clustering for UDN

Sisi Zhang BUPT

70109 Mimo Antenna for Uwb Communications Joseph Jervase Sultan Qaboos University, Oman

70110 Heuristic Optimizing of PCI Assignment in Real-life LTE Networks

Wu Songrui Beijing University of Posts and Telecommunications

70122 Social-Aware Hierarchical Multicast In Mobile Delay Tolerant Network

Wenhua Yin Inner Mongolia University

70138 A Survey on Iot Architectures, Protocols, Applications, Security, Privacy, Real-World Implementation and Future Trends

Surapon Kraijak

King Mongkut's Institute of Technology Ladkrabang

70139 Design and Realization of A Dual Wide Band Printed Monopole Antenna for Wifi and Wimax Systems

Gerard Rushingabigwi

University of Science and Technology of China

70146 Real Cdma-Ofdm/Oqam Transmission System Based on Walsh Hadamard Spreading Code over Rayleigh Fading Channel

Ilhem Blel Innov’Com Laboratory SUPCOM

70147 Adaptive Energy-Efficient Configuration of Power Resource for Ofdma with Opportunistic Df Relaying

Li Feng UESTC

70156 Sdn-Based Energy-Saving Scheme for Fiber-Wireless Network

Shuai Li Beijing University of Posts and Telecommunications

70182 From Architecture to Implementation for IEEE 802.11s Wireless Mesh Networks

Jianming Cheng

Key Laboratory of Universal Wireless Communication, Beijing

Page 10:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

10 WiCOM 2015 Conference Guide

University of Posts and Telecommunications

70185 An Implementation of Multi-domain Software Defined Networking

Zhengxin Guo Beijing University of Posts and Telecommunications

70188 A Qos Based Data Gathering Framework for Multi-Hop Surveillance System

Chong Tan Shanghai Institute of Microsystem and Information

70201 Performance Analysis of Tikhonov Blind Multiuser Detector

Li Hu Hebei Normal University

70222 Improved DFT-Based Channel Estimation for Downlink LTE System with Adding Virtual Carrier Frequency Response

Hongyu Zhu Beijing University of Posts and Telecommunications

70011 On the Capacity for 3D LoS MIMO Channels in Short-Range Millimeter Wave Communications

Xumin Pu National Key Laboratory of Science and Technology

Technical Session 3: Mobile Computing Systems and Technologies

Session Chair: Dr. Feno Heriniaina Rabevohitra, Chongqing University, China Lotus Room (荷花厅), 4th Floor 08:30-12:00, Wednesday Morning, September 23, 2015 Paper ID Paper Title Author Affiliation

70031 The Research of Smart Campus Based on Internet of Things & Cloud Computing

Min Guo Wuhan University of Technology

70066 Multimodal Platform of Télé-medicine for Remote Consultation and Pre-diagnosis

Robert GOUTTE

University of LYON

70071 Software Attribute Trades-off and Conflicts in a Network Management System

Shahnawaz Qureshi

Blekinge institute of technology

70087 Multi-Parent Selection via Naive Bayes in P2P Layered Video-on-Demand System

Yangling Xu Tongji University

70095 Fast Depth Map Intra Prediction Algorithm Based on Edge Detection and CU Partition

Zhenyong Wang

Harbin Institute of Technology

Page 11:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

11 WiCOM 2015 Conference Guide

70123 The Design of a Cloud and Mobile Healthcare System

Shou-Chih Lo Dept. CSIE, National Dong Hwa University

70164 Fast Compressive Tracking Based on Multi-Feature Weighted Appearance Model

Bai Meijuan Taiyuan University of Science and Technology

10:15-10:30 Coffee Break

70166 A Novel Wireless Distribution Network Application to Support Further Internet of Energy

Bin Li North China Electric Power University

70175 Design of A Mobile Campus Portal in Big Data Environment

Dandan Hong Xi'an Jiaotong University

70187 Zigbee Transmission System for Wearable Ecg Device Based on Compressed Sensing

Xin Wu School of Electrical and Electronic Engineering

70198 Umcloud: A User-Oriented Security Scheme for Mobile Cloud Storage

Hui Li School of Computer Science, Beijing University of Posts and Telecommunications

70206 Joint Effect of Channel Coding and AMR Compression on Speech Quality

Minh-Quang Nguyen

Department of Wireless Network and Multimedia Service

70208 A Novel Extraction Algorithm of Video Fingerprint Based-on Sparse Coding

Jie Xu University of Electronic Science and Technology of China

70209 A Relaying Bandwidth Reservation Approach for The Data Oriented Transmission Service

Yang Yue State Grid Shenyang Electric Power Supply Company

70216 Robust Device-free Fall Detection Using Wireless PHY Layer Information

Guo Liu Wuhan University of Technology

70250 Ovqms: A Passive and Adaptive System for Over-The-Top Video Quality Monitoring

Changtong Che State Key Laboratory of Networking and Switching Technology

70272 A Linear Model on Weapon Recognition for Ct’S Security Inspectation

Haixia Pan IRIP Lab, School of Software, Beihang

Page 12:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

12 WiCOM 2015 Conference Guide

University, Beijing

70273 A New Seismic Image Enhancement Method Based on Mathematical Morphology

Haixia Pan IRIP Lab, School of Software, Beihang University, Beijing, China

70118 A Compression and Reconstruction Algorithm of Indoor Wlan Positioning Radiomap Data Based on Neural Network

Shuo Tian Harbin Institute of Technology

70153 Manifold Locally Linear Denoising for Wi-Fi Rss Based Indoor Positioning

Gang Shen Huazhong University of Science and Technology

70061 Design of Level Instrument With Four Launch Electrodes Based on Current Sensing Field

Zhi-gang Li Harbin Engineering University

70125 An Improved Image Denoising Method based on the Pulse Coupled Neural Network

Renhuan Luo Harbin Engineering University

70263 Reducing Signaling Cost of Location Management in Cellular Network Using Fuzzy Logic Controller

Shiann-Tsong Sheu

Department of Communication Engineering, National Central University

70261 Implementation of Earthquake Early Warning System Based on Support Vector Machine and Fuzzy Inference

Shiann-Tsong Sheu

National Central University

70046 On Low-power Method of Substation Wireless Temperature Monitoring

Yu-Ping Yan China Potevio Co.,Ltd.

70267 A Cross-System Invocation Platform Based on Distributed Network Performance Measurement System

Zhenwen Xue Beijing University of Posts and Telecommunications

70298 Middleware for Flexible resource allocation validation

Yanhong Yang Beijing Institute of Graphic Communication

Page 13:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

13 WiCOM 2015 Conference Guide

Technical Session 4: Cognitive Radios and Networks & Signal Processing II

Session Chair: Dr. Cheng Jin, Fudan University, China Magnolia Room (白玉兰厅), 4th Floor 14:00-18:00, Wednesday Afternoon, September 23, 2015 Paper ID Paper Title Author Affiliation

70105 Research on Blanket Jamming to Beidou Navigation Signals Based on Boc Modulation

Pei Wang National Time Service Center

70227 A New Noise Mitigation Method Based on Normalization Time Frequency Peak Filtering in Broadband Power Line Communication System

Zhigang Qiu Yuncheng Power Surpply Company

70168 Interface-Aware Ldpc Codes for Millimeter Wave Communication Systems

Peipei Li Shanghai Institute of Microsystem and Information Technology

70251 A Two-Dimensional Doa Estimation Algorithm Based on Propagator for Monostatic Mimo Radar

Bobo Fu Zhengzhou Institute of Information Science and Technology, China

70006 Study on An Anti-Jamming Method of Spread-Spectrum Communication based on Lt Codes

Bo Chen Dalian University

70052 A Digital differentiator-based MSK demodulator in a zero-IF receiver for 2.4 GHz Zigbee applications

Meilin Wan Huazhong University of Science and Technology

70259 A Monolithic Sige Bicmos Power Amplifier for UHF RFID Application

Ying Ruan Shanghai University of Electric Power

70040 A Cooperative Compressive Sampling Scheme for Power Spectrum Reconstruction

Dongfeng Zhao Beijing University of Posts and Telecommun

70048 Resource Allocation in Ofdm-Based Cooperative Cognitive Radio Networks with Two-Way Amplify-and-Forward Relay

Lijie Wang Xi’an Satellite Control Center

16:15-16:30 Coffee Break

70062 Spectrum Sensing Scheme Based on Random Matrix Theory

Yin Mi Xi’an University of Posts and Telecommunications

Page 14:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

14 WiCOM 2015 Conference Guide

70124 Threshold Selection for Energy Detection in Cognitive Radio with A Non-Line-Of-Sight Environment

Yun Gao ECE Department, New York Institute of Tech. at Nanjing Campus

70158 Improved Hard-Decision Fusion Algorithm Against SSDF in Cognitive Radio Networks

Ting Peng Yunnan University of Nationalities

70159 Cooperative Sensing of Improved Energy Detector Based on Minimum Bayes Risk

YangZheng Zheng

Yunnan University of Nationalities

70178 Sparse Fourier Transform Based Millimeter Wave Wideband Spectrum Sensing

Meili Na Shanghai Institute of Microsystem and Information

70180 Power Allocation Optimization for D2D Communication Underlaying Cognitive Full Duplex Relay Networks

Long Liu Beijing University of Posts and Telecommunications

70229 Weighted Average Consensus Based Distributed Compressive Spectrum Sensing Using Prior Parameter Exchange

Jincheng Zhao Beijing university of Posts & Telecommunications

70211 A Primary User Emulation Attack with Motional Users in Cognitive Radio Networks

Kaiyuan Liu Yunnan University Of Nationalities

Technical Session 5: Network Protocols and Performance & Communication

Systems II

Session Chair: Dr. Xiaolin Ma, Wuhan University of Technology, China Sakura Room (樱花厅), 4th Floor 14:00-18:00, Wednesday Afternoon, September 23, 2015 Paper ID Paper Title Author Affiliation

70029 Rc4-Mac: An Rc4 Based Message Authentication Code Algorithm For Ultra-Low Power Device Networks

Qian Yu Dept of Computer Science, University of Regina, Canada

70258 Downlink Channel Estimation Based on Block-Structured Compress Sensing for Multi-Cell Massive Mimo Systems

Yaojiang Yu Beijing University of Posts and Telecommunications

70268 Distributed Network Topology Formation and Resource Allocation for Clustered

Xi Luan Institute of Advanced Communications, EECS,

Page 15:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

15 WiCOM 2015 Conference Guide

Machine-to-Machine Communication Networks

Peking University, China

70269 Cooperative Transmission Based on Multi-Relay Device-to-Device Communications in Cellular Networks

Xi Luan Institute of Advanced Communications, EECS, Peking University, China

70271 Pic Based Cell Search against Multi-Cell Interferences in Hetnet

Ming Liang Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory

70276 On the Impact of Power Amplifier Efficiency on The Energy Efficiency in A Massive Mimo System

Yingchu Guo University of Electronic Science and Technology of China

70264 A Step Further of Pdr-Based Jammer Localization through Dynamic Power Adaptation

Qiping Wang College of Communications Engineering, PLA University

70026 A Matlab/Simulink Development and Verification Platform for The Gnss Receiver Design

Yingtai Li Sichuan Institute of Solid-state Circuits

16:15-16:30 Coffee Break

70010 Hybrid Orthogonal Frequency Division Multiplexing (H-OFDM) for Visible Light Communication

Zhang Jun Information Science and Technology Institute

70078 A Joint Resources Allocation Approach for Hybrid Visible Light Communication and Lte System

Lu Li Beijing University of Posts and Telecommunications

70217 Interpretation and Classification of P-Series Recommendations in ITU-R

Li Wei SRRC

70037 Subcarrier Allocation Algorithm based on User Demand for SC-FDMA System

Fang Ye Harbin Engineering University

70079 Priority-Based Bandwidth Allocation in Liu Yuhan University of Electronic

Page 16:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

16 WiCOM 2015 Conference Guide

Heterogeneous Wireless Network Science and Technology of China

70058 Survey of The Issues Surrounding Network Traffic Monitoring

Adrián Pekár and Martin Chovanec

Institute of Computer Technology, TUKE

70084 Max-Degree Network Coding for Wireless Data Broadcasting

Kui Xu PLA University of Science and Technology

70091 A Modified Traffic Grooming Algorithm with High Trade-Off Efficiency for Optical Network

Mengfei Lyu Peking University

70132 Joint Channel Network Coding For Correlated Sources

Youssef Zid Sys’COM Laboratory National Engineering School of Tunis, Tunisia

70240 Capacity Analysis and Information Optimization of WSDM

Yufan Cao Department of Wireless Communications, PLA University of Science and Technology

70154 Traffic Flow Assignment with Weight for Resource Allocation on The Restorable Network

Shin-Jer Yang Dept. of Computer Science and Information Management, Soochow University, Taipei, Taiwan

70191 New Hybrid Routing Method in Military Vehicular Ad Hoc Network

Jiaqing Qu Shanghai Aerospace Bureau, Shanghai Radio Equipment Research Institute

70202 Study of Outdoor Signal Coverage and Network convergence of TD-LTE and TD-SCDMA in High-Speed Railway

Qun Hou Jianghan University

Technical Session 6: Ad hoc, Sensor Network & Security

Session Chair: Prof. Xueming Wang, Guizhou University, China Lotus Room (荷花厅), 4th Floor 14:00-18:00, Wednesday Afternoon, September 23, 2015 Paper ID Paper Title Author Affiliation

70144 A Invulnerability Assessment Based on Lu Xiangqun Beijing University of Posts and

Page 17:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

17 WiCOM 2015 Conference Guide

Importance-Degree of Node for Weighted Network Under Attack with Partial Information

Telecommunications

70213 The Routing Protocol for High Data Collection Rate in Rechargeable Wireless Sensor Networks

D.M. Gao College of Information Science and Technology, Nanjing Forestry University, Nanjing, China

70225 An Improved Scheme for Dv-Hop in Wsns Qinqin Shi School of Computer Science & Information Engineering,Shanghai Institute of Technology

70228 Improvement Research of Underwater Acoustic Sensor Network Routing Protocol Hhvbf

Chen Wang School of Computer Science and Technology,Tianjin

70014 Efficient Clustering Routing Algorithm Based on Opportunistic Routing

Kunpeng Wang Dalian University of Technology

70024 Improvement and Implementation of Rpl Routing Protocol in Wireless Sensor Networks

Shuaibing Wang

Beijing Electronic Science and Technology Institute

70056 Extended Wireless Mesh Network For Vanet With Geographical Routing Protocol

Jinwoo Nam Korea University

70172 Enhanced Cell Broadcast for Streets in Vehicular Ad-Hoc Networks

Abderezak Touzene

Sultan Qaboos University

16:15-16:30 Coffee Break

70160 Research on Localization Algorithm for Wsns Based on Improved RSSI

Yongsheng Zhao

Harbin Engineering University

70009 Performance Analysis of Intrusion Prevention System on Cyber Security for Voice over Internet Protocol (VoIP)

Auttapon pomsathit

Computer engineering Rajamangala University of Technology Rattanakosin Phutthamonthon, Nakhon Pathom

70262 DDoS Attack Detection Using Packet Size Interval

Lu Zhou School of Mathematics and Computer Science Wuhan Polytechnic University

70015 Quantum Secure Direct Communication Yin-Li Zhang Peking University

Page 18:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

18 WiCOM 2015 Conference Guide

Protocol with Quantum One-way Function

70288 An Improved Method for Available Bandwidth Estimation in Ieee 802.11 Ad Hoc Networks

Shengkai Chen Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences

70275 Using Location-Based Service and Context Information for Restaurant Recommendation

S.S. Weng Department of Information and Finance Management, National Taipei University of Technology, Taipei, Taiwan

70189 An Enhanced GHSOM for the Intrusion Detection

Hongbo Shi Tokyo Metropolitan University

70210 A Novel Video Retrieval Algorithm based on Coarse-Grained and Fine-Grained

Xu Jie Key Lab of Optical Fiber Sensing and Communications (Ministry of Education)

70278 A New Multi-objective Routing Protocol of Ad Hoc based on Routing Constrains

Xueming Wang Guizhou University

70246 Online Anomaly Detection on Electronic Commerce based on Variable-Length Behavior Sequence

Weihui Zhu National University of Defense Technology

70247 Data Fusion Mechanism based on Wavelet for Opportunistic Sensor Networks

Xuyan Luo NanChang HangKong University

70299 Transmit Pattern Synthesis for Mimo Radar Zhongrui Huang

Electronic Engineering Institute, Hefei, Anhui

Page 19:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

19 WiCOM 2015 Conference Guide

Part IV Poster

Yuehai Hall (粤海厅),3rd Floor, Guangdong Hotel Tuesday, September 22, 2015 Paper ID Paper Title Author Affiliation 70023 The Impact of Frequency on Small-Scale

Fading in Subway Tunnel Zhang Nan Shanghai University

70025 A Parameter Estimation Scheme for Multi-component BPSK Interferences

Li Jian National Univsersity of Defence Technology

70028 A New Method of Radar Signal Sorting Based on The PRI Transform and Wavelet Transform

Cheng Bolin AFEWA

70049 Pilot Contamination Reduction Based on Improved Pilot Power Control in M-MIMO Systems

Shuo Ma Chengdu University of Information Technology

70055 Ns3-Based Simulation System in Heterogeneous Wireless Network

Yunjian Zhao South China University of Technology

70067 A new equalization technique for Multi-h CPM in a telemetry multipath channel

Yang Min Xidian University

70074 Improved Amplify-and-Forward Relay Selection with Outdated Channel State Information

Fei Xu Soochow University

70093 Dynamic Mode Management in Cognitive Radio Networks with RF Energy Harvesting

Junmei Zhao Beijing University of Posts and Telecommunications

70101 Research on energy-saving dynamic spectrum aggregation scheme in cognitive relay networks

Yifei WEI Beijing University of Posts and Telecommunications

70114 A Time Synchronization Scheme for Sensor Networks Based on Ant Colony Algorithm

Wei Nuo Shandong Computer Science Center

70129 Hybrid Wireless Indoor Positioning with IBeacon and Wi-Fi

Tao Peng Tongji University

70133 A Review On Inter-Domain Routing System Vulnerabilties And Security Solutions

Yi Guo National Digital Switching System Engineering & Technological Research Center, Zhengzhou, China

Page 20:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

20 WiCOM 2015 Conference Guide

70140 A Novel Unambiguous Acquisition Scheme for Galileo Modulated Boc(N,N) Signals

Ping Li School of Information and Electronics, Beijing Institute of Technology

70226 An Initial Population Optimization-Based Particle Swarm Algorithm for Anti-Jamming Communication Decision Engines

Xianyang Hui PLA University of Science and Technology, China

70230 Capacity Improvement Via Co-Frequency Small Cells Network

Qing Zhang China Unicom Network Technology Research Institute

70243 Energy-Efficient Analysis of Cooperative Spectrum Sensing in CRN

Jingwei Liang Nanjing University of Posts and Telecommunications

70254 Robust Algorithm of Multi-signals Separation for Wideband Spectrum Sensing of Cognitive Radios

Wang Yang Information Engineering University

70282 Traffic Information Distribution Model based on Crowdsourcing UGC and User Trust Degree

Chenbo Deng Beijing University of Posts and Telecommunications, Beijing, China

70284 Differential Bd/Ils-Glideslope Integrated Approach System for Improving the Lateral Navigation Performance

Yu Geng Institute of Civil Aviation, 2Institute of Electronic and Information Engineering Shenyang Aerospace University

70287 An Intelligent Bus Dispatch System Based on Fuzzy Genetic Algorithms

Yue Ma Department of Electronic and Information Engineering, Inner Mongolia University, China

70290 Electromagnetic Wave Propagation Characteristics of Rotating Antenna in Electrical Machine

Sonia Ben Brahim

Sup'Com

70285 Virtual Network Mapping Algorithm Based on Load Balancing Multi-objective Particle Swarm Optimization

Jun Zhao Wuhan Digital Engineering Institute

70063 System performance analysis for GBT29768 RFID System

Liu Wenli China Electronics Standardization Institute

Page 21:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

21 WiCOM 2015 Conference Guide

70085 An Online Charging Model using the Signaling Procedure Optimization in Packet Switching Mobile Network

Renyuan Zhang Shandong University of Science and Technology

70270 Theoretical Analysis of Handover Failure Rate in Heterogeneous Networks under Random Shadowed Model

Zheng Huang Chongqing University of Posts and Telecommunications

70032 Study Of Vehicle Monitoring Application With Wireless Sensor Networks

Zeng Bin Department of Management Engineering, Naval Univerity

70099 A Simplifed Joint Demapping and Decoding for LDPC Coded BICM Systems

Huang Ping HoHai University

70244 Spectrum Allocation based on Clustering in Femtocell Networks

S.Y. Zhou Key Laboratory of Mobile Communication in Chongqing University of Posts and Telecommunications, Chongqing

70233 Joint Optimal Congestion Control and Power Allocation for MCMR Mesh Networks Based on Stochastic Programming

Kewei Li Wuhan Second Ship Design and Research Institute

70190 Bandwidth-Satisfied Relay-Selection Scheme For Wireless Multicast Networks with Cooperative Communications

Yi Chen Huazhong Normal University

70162 A Distributed Flow Control for Mission-Oriented Wireless

Yi Chen Huazhong Normal University

70008 Alpha Stable Distribution P Order Spectrum with its Frequency Domain Characteristics Analysis

JIANG Jinlong Jiujiang University

Page 22:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

22 WiCOM 2015 Conference Guide

Part V Abstracts

Article ID: 70006 Title: Study on An Anti-Jamming Method of Spread-Spectrum Communication based on Lt Codes Name: Bo Chen Affiliation: Dalian University E-mail: [email protected] Abstract For lots of information is missing in poor communication environment and the data receiving terminal cannot recover source data, therefore, this paper proposed a new anti-jamming method of spread-spectrum communication based on LT codes. This method uses the characteristics of information scattered encoding and non-rate transmission of LT codes, through the spectrum of the signals which is the direct sequence spread spectrum broadening coding, which makes it have a good link with anti-flash and anti-jamming capability. Simulation results show that under the strong interference environment, adopting the method of spread spectrum communication based on LT codes can improve the anti-jamming capability of communication system. Article ID: 70008 Title: Alpha Stable Distribution P Order Spectrum with its Frequency Domain Characteristics Analysis Name: JIANG Jinlong Affiliation: Jiujiang University E-mail: [email protected] Abstract Alpha stable distribution has not the usual power spectral density. The current fractional lower order spectrum definitions, such as alpha spectrum, covariation spectrum, fractional lower order covariance spectrum and geometric power spectrum, etc., all use the fractional lower order transform so that there are two order statistics for transformed signals. But the fractional lower order

transform will cause the changes of frequency spectrum. For this purpose, the first order spectrum of alpha stable distribution is defined in this paper, it is simple in calculation and does not change the frequency domain characteristics, and can be extended to p order spectrum. The frequency domain characteristics of fractional lower order transform are analyzed, introduced the frequency domain of the highest order of convergence of the p order spectrum and related characteristics. Simulation results show that the correctness of the theory. Article ID: 70009 Title: Performance Analysis of Intrusion Prevention System on Cyber Security for Voice over Internet Protocol (VoIP) Name: Auttapon pomsathit Affiliation: Computer engineering Rajamangala University of Technology Rattanakosin Phutthamonthon, Nakhon Pathom E-mail: [email protected] Abstract This research evaluated the cyber security effectiveness of the intrusion prevention system for Voice over Internet Protocol (VoIP) focusing on the defense of Denial of Service (DoS) which propose to disturb server providing VoIP services. This will give a strong impact on entrepreneurs. Intrusion prevention system (IPS) has been employed base on Snort software, this study as a preventive technique for internal and external attack. This included the analysis of effectiveness of intrusion prevention on the basic structure of VoIP. The results revealed that intrusion prevention system at TCP protocol with the attack by multicast IP address achieved the maximum performance. TCP protocol can detect and prevent the attack with the highest effective. In addition, the attack via wire network can be detected higher than that of through the wireless network. Furthermore,

Page 23:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

23 WiCOM 2015 Conference Guide

multicast attack is more effective than unicast attack. Article ID: 70010 Title: Hybrid Orthogonal Frequency Division Multiplexing (H-OFDM) for Visible Light Communication Name: Zhang Jun Affiliation: Information Science and Technology Institute E-mail: [email protected] Abstract In this paper, we present a novel hybrid orthogonal fre-quency division multiplexing (H-OFDM) for visible light communication (VLC). H-OFDM uses a combination of DC-bias optical OFDM (DCO-OFDM) and asymmetrically clipped optical OFDM (ACO-OFDM) techniques. In this hybrid technique, the absolute value of bipolar DCO-OFDM signal is used to carry amplitude information in the first block, while the ACO-OFDM signal is used to transmit the polarity information of the DCO-OFDM signal in the second block. This new technique does not need any DC bias and could achieve maximum 33.3% increase of data rate with 256-QAM in theory. Extensive simulations notice that H-OFDM results in almost 3dB performance improvement with an additive white Gaussian noise. In addition, it saves up to 2dB input electrical average power when negative clipper and power allocation are applied. Therefore, with no DC bias, data rate increment and power efficient, H-OFDM seems to be an attractive technique for VLC system using intensity modulated di-rect detection (IM/DD). Article ID: 70011 Title: On the Capacity for 3D LoS MIMO Channels in Short-Range Millimeter Wave Communications Name: Xumin Pu Affiliation: National Key Laboratory of Science and Technology E-mail: [email protected] Abstract This paper investigates the capacity of NX2 short-range

line-of-sight (LoS) multiple-input multiple-output (MIMO) channels at millimeter wave (mm-wave) frequencies in three-dimensional (3D) space. First, the channel with arbitrary antenna orientations in 3D space is modeled using the spherical-wave model (SWM). Then, the analytical expression for the corresponding capacity without channel state information (CSI) at the transmitter is obtained. Both the analytical and simulation results show that the capacity of short-range mm-wave LoS MIMO channels is completely determined by the wavelength, the number of transmit (Tx) antennas, the inter-element spacings, the transceiver distance and the orientations of the arrays. It is shown that the capacity fluctuates significantly with these parameters. Furthermore, for the shorter wavelength, the smaller inter-element spacings can be obtained for the maximum capacity with the SWM. Meanwhile, the shorter wavelength is more appropriate in short-range communications. Article ID: 70014 Title: Efficient Clustering Routing Algorithm Based on Opportunistic Routing Name: Kunpeng Wang Affiliation: Dalian University of Technology E-mail: [email protected] Abstract Based on the analysis of the existing classic clustering routing algorithm HEED, this paper proposes an efficient dynamic clustering routing algorithm ED-HEED. In the cluster selection process, in order to optimize the network topology and select more proper nodes as the cluster head, the proposed clustering algorithm considers the shortest path prediction of the node to the destination sink and the congestion situation. In the data transmission procedure, the high-efficiency CEDOR opportunistic routing algorithm is applied into the ED-HEED as the data transmission mode between cluster headers. A novel adaptive dynamic clustering mechanism is also considered into the algorithm, as well as the data redundancy and security control. Our Simulation demonstrates that the ED-HEED algorithm can reduce the energy consumption, prolong the network life and keep the security and

Page 24:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

24 WiCOM 2015 Conference Guide

availability of the network compared with the HEED algorithm. Article ID: 70015 Title: Quantum Secure Direct Communication Protocol with Quantum One-way Function Name: Yin-Li Zhang Affiliation: Peking University E-mail: [email protected] Abstract This paper describes the differences and relations of quantum key distribution (QKD) and quantum secure direct communication (QSDC) , proposed a more efficient, better security quantum secure direct communication protocol. Security of the protocol based on the characteristics of quantum one-way function,and does not require the classical channel, simplifies the communication process. Alice and Bob can achieve quantum secure direct communication.Analysis the superiority of the proposed protocol,compared with the adoption and efficient quantum key distribution protocol based on Bell states. Article ID: 70023 Title: The Impact of Frequency on Small-Scale Fading in Subway Tunnel Name: Zhang Nan Affiliation: Shanghai University E-mail: [email protected] Abstract The environments of radio propagation in subway tunnels are complex and time varying. Various factors of tunnels such as geometry, materials, obstacles and bending state may affect the electromagnetic wave propagation. This paper explores the influence of frequency on small-scale fading characteristics such as delay spread in time domain, Doppler spread in frequency domain and angle spread in spatial domain. Simulation built on ray-tracing and statistical theories is also adopted, and the results present a greater spread caused by higher frequency.

Article ID: 70024 Title: Improvement and Implementation of Rpl Routing Protocol in Wireless Sensor Networks Name: Shuaibing Wang Affiliation: Beijing Electronic Science and Technology Institute E-mail: [email protected] Abstract RPL is an IPv6 routing protocol aimed at low power con-sumption lossy networks, which is very important to the development of wireless personal area network. By study-ing the discovery mechanism of RPL routing protocol in wireless sensor networks,we found that advantage rout-ing nodes may die prematurely due to excessive use in current RPL mechanisms, which can cause the entire net-work life cycle greatly shortened. To address this problem, the energy balance scheme is put forward which uses the energy consumption as a parameter of measurement to improve the objective function of the optimal path selection strategy. Finally, we implement and test the effectiveness of the improved scheme. Article ID: 70025 Title: A Parameter Estimation Scheme for Multi-component BPSK Interferences Name: Li Jian Affiliation: national univsersity of defence technology E-mail: [email protected] Abstract BPSK interference is also called the matched spectrum interference, because its wave form and frequency coverage matches that of satellite navigation signal. As efficient wideband interference, it heavily menaces the safety of Global Navigation Satellite System (GNSS) and is taken as an important target of interference monitoring. However, there are hardly any researches on signal separation and parameter estimation of non-cooperative muti-component BPSK interferences. Thus, a parameter estimation scheme for multi-component BPSK interferences based on a modified Phase Lock Loop (PLL) is put forward. Simulations show that the proposed scheme

Page 25:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

25 WiCOM 2015 Conference Guide

has equal code Bit-Error-Ratio to that of cooperative Successive Interference Cancellation (SIC). Article ID: 70026 Title: A Matlab/Simulink Development and Verification Platform for The Gnss Receiver Design Name: Yingtai Li Affiliation: Sichuan Institute of Solid-state Circuits E-mail: [email protected] Abstract The baseband signal processing algorithm development and simulation is essential to the performance of the glob-al navigation satellite system (GNSS) receivers. In this paper, a Matlab/Simulink algorithm development and verification platform for the GNSS receiver design is pre-sented. Both the Global Position System (GPS) L1 signal and the Compass B1 signal are supported. This platform is composed of the signal generator, the acquisition engine and the tracking loop. The configuration flexibility of its key parameters enables the developers to research on their effect on the acquisition and tracking performance. Both the simulated satellite signal and the real satellite signal are used to test the platform. Article ID: 70028 Title: A New Method of Radar Signal Sorting Based on The PRI Transform and Wavelet Transform Name: Cheng Bolin Affiliation: AFEWA E-mail: [email protected] Abstract Aiming at the problems in current radar signal sorting, this paper firstly analyzes the basic principle of the algorithm of the PRI transform and wavelet transform, combining the advantages and disadvantages of the two algorithms and put forward a synthetic method of radar signal sorting based on the combination of PRI transform and wavelet transform. This method firstly used PRI transform to sort the radar signal coarsely, and then wavelet transform was used to do it particularly. The simulation results show that

this method is accurate and feasible under the condition that the signal to noise ratio is not less than 10 dB. Article ID: 70029 Title: Rc4-Mac: An Rc4 Based Message Authentication Code Algorithm For Ultra-Low Power Device Networks Name: Qian Yu Affiliation: Dept of Computer Science, University of Regina, Canada E-mail: [email protected] Abstract This paper proposes a new construction called RC4-MAC, for producing cryptographic message authentication code. It is an attempt to design a cryptographic message authentication code algorithm based on the RC4 stream cipher. Moreover, RC4-MAC is suitable for ultra-low power devices, such as sensor nodes, which are normally equipped with an 8-bit processor and most other message authentication code algorithms cannot be implemented efficiently or are not applicable. RC4-MAC can run much faster compared to the existing well-known message authentication code algorithms and is exceptionally fast on 8-bit processors. Article ID: 70031 Title: The Research of Smart Campus Based on Internet of Things & Cloud Computing Name: Min Guo Affiliation: Wuhan University of Technology E-mail: [email protected] Abstract By analyzing current situation of digital construction and network development in Wuhan University of Technology, combing with the construction situation of domestic institutions, smart campus is to be built by adopting internet of things, cloud computing & virtualization technology based on existing network. Firstly, this paper will present the planning and design of smart campus construction. And then two most important parts of smart campus will be demonstrated, namely, there

Page 26:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

26 WiCOM 2015 Conference Guide

are IOT system based on ubiquitous network and construction of data center based on cloud computing. Article ID: 70032 Title: Study Of Vehicle Monitoring Application With Wireless Sensor Networks Name: Zeng Bin Affiliation: Department of Management Engineering, Naval Univerity E-mail: [email protected] Abstract Recently wireless sensor networks have received increasing attention from the research community. Many applications based on these networks will be realized in the near future. Monitoring a moving object using sensor nodes is one such important application. The focus in this paper is On-site tracking in the context of wireless sensor networks. After formally characterizing this problem for single target case, the problem for multiple targets case is generalized. The online vehicle search and tracking algorithms are based on wireless sensor networks approach. Through the extensive simulation study it can be showed that these algorithms performed well on the tracking time without compromising much on the energy expenditures. Furthermore, the performance of the algorithms has been revealed in the simulation study. Article ID: 70037 Title: Subcarrier Allocation Algorithm based on User Demand for SC-FDMA System Name: Fang Ye Affiliation: Harbin Engineering University E-mail: [email protected] Abstract This paper investigates the Dynamic Subcarrier Allocation (DSA) issue in Long Term Evaluation (LTE) uplink. Many researches pay more attention on maximizing the system throughput or improving the fairness between multi-users, however, they ignored the user actual spectrum demand. In this paper, an improved subcarrier allocation scheme has been proposed, which considers the

user demand of quality of services (QoS) especially the demand of transmission capacity. In this paper we study on how to satisfy the users’ capacity demand with also to guarantee throughput to some extent. The scheduler allocates a chunk to the user with largest capacity demand in greedy way and renews all the users’ requests before the next allocation, so that the algorithm can meet users’ demand as far as possible. By making a comparison with other existent allocation algorithms, we can see that the proposed algorithm achieves better demand satisfaction without computational complexity increase through exhaustive simulations. Article ID: 70040 Title: A Cooperative Compressive Sampling Scheme for Power Spectrum Reconstruction Name: Dongfeng Zhao Affiliation: Beijing University of Posts and Telecommun E-mail: [email protected] Abstract Compress sensing (CS) for power spectrum reconstruction (PSR) enables precise and efficient spectrum sensing in cognitive radio networks. Existing CS schemes mainly focus on reconstruction of the original signal, and thus are not appropriate for PSR reconstruction. To counteract this drawback, this letter proposed a cooperative scheme of CS for PSR named decorrelation scheme. A PSR model for cooperative CS is deduced. Simulation results verify the effectiveness of the proposed scheme. Article ID: 70043 Title: Impact and Compensation of Sample Clock Offset in L-Cfdma Uplink Name: Din Dan Affiliation: Department of Optical and Electronic equipment E-mail: [email protected] Abstract In order to solve the problem of sample clock synchronization in the localized code and frequency division multiple access (L-CFDMA) uplink, the system

Page 27:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

27 WiCOM 2015 Conference Guide

model of L-CFDMA is constructed, the disturbance on the system model caused by multi-user sample clock offset (SCO) is analyzed, and the signal time shift, phase rotation, multi-user interference (MUI) and inter-carrier interference (ICI) motivated by multi-user SCO are analyzed quantitatively. On this basis, the compensation method of multi-user SCO is proposed by modifying the relevant metric function according to the multi-user SCO, approximating the ideal performance under no SCO. The results obtained in this paper are validated by computer simulation. Article ID: 70046 Title: On Low-power Method of Substation Wireless Temperature Monitoring Name: Yu-Ping Yan Affiliation: China Potevio Co.,Ltd. E-mail: [email protected] Abstract In the temperature monitoring of key point of substation, Wireless Sensor Networks show the characteristic that overall irregular dispersion and local dense dispersion on the topology. According to the actual condition of HeJia Substation, the article proposes the backbone sensor node selection to construct dense cluster and develop a working method of area backbone nodes rotation. These ideas are based on the overall irregular dispersion and local dense dispersion characteristic. The article simulated the method and proved it can reduce the influence of energy imbalance to the network lifetime of the Wireless Sensor Networks (WSN) in the substation. Article ID: 70048 Title: Resource Allocation in Ofdm-Based Cooperative Cognitive Radio Networks with Two-Way Amplify-and-Forward Relay Name: Lijie Wang Affiliation: Xi’an Satellite Control Center E-mail: [email protected] Abstract In this paper, we investigate the subcarrier allocation and

power adjustment to maximize the sum data rate of the secondary users with limited interference to the primary users in OFDM-based cooperative cognitive networks. A fixed common relay is introduced to forward the data of the secondary users by adopting two-way amplify-and-forward (AF) relay. By categorizing the subcarriers into 2 classes, the idle subcarriers and the busy subcarriers, we analyze the resource allocation problem for them and propose a resource allocation scheme which limits the power interferences caused to primary user and maximizes the sum date rate of the secondary users. The simulation results show that the proposed scheme can significantly increase the sum data rate Article ID: 70049 Title: Pilot Contamination Reduction Based on Improved Pilot Power Control in M-MIMO Systems Name: Shuo Ma Affiliation: Chengdu University of Information Technology E-mail: [email protected] Abstract In multi-user Massive MIMO (M-MIMO) TDD systems, the performance of achievable rates in UL/DL is limited by pilot contamination with the number of BS antennas grows. On the basis of a simplified channel model which allows us to obtain the achievable rates easily, the inter-cell interference factor is defined as “orthogonality factor” for the first time in this paper. The orthogonality factor is denoted by the orthogonality of pilots from interference cells to the target cell. We propose an improved pilot power control scheme. We consider the partial pilot power control scheme with dividing the time slot of pilots into two parts and making the pilots staggered only from interference cells, while pilots from the target cell are still transmitted in the whole time slots. As a consequence, the inter-cell interference factor is always reduced to half with the proposed scheme. In addition, we also obtain an additional conclusion that the inter-cell interference factor decreases with the increase of the number of UTs. Ultimately, the pilot contamination is mitigated and the achievable sum rates are improved significantly with the proposed scheme. The numerical results demonstrate the

Page 28:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

28 WiCOM 2015 Conference Guide

proposed scheme is effective obviously. Article ID: 70050 Title: Energy-efficient Dynamic Traffic Offloading in HetNets Name: Xun Wang Affiliation: UESTC E-mail: [email protected] Abstract With the anticipated exponentially increasing traffic demand in future mobile networks, energy consumption becomes a significant challenge of the information and communication technology industry. Heterogeneous network (HetNet) is a promising infrastructure for both expenditure and energy saving for cellular operators and has attracted intensive research interest. In HetNets, offloading traffic from macro base station (BS) to Low Power Nodes (LPNs) is expected to be a promising method in improving energy efficiency of cellular networks. In this paper, we propose a dynamic traffic offloading scheme to improve energy efficiency of HetNets. We model the traffic offloading in HetNets as a dynamic programming (DP) problem, where the delay tolerance of data traffic is taken into account. We conduct simulation experiments based on the model with realistic broadband channel propagation conditions to verify the effectiveness of our proposed traffic offloading scheme. Numerical results show that compared with Reference Signal Received Power (RSRP) based offloading algorithm, our proposed algorithm can effectively improve energy efficiency (EE). Article ID: 70052 Title: A Digital differentiator-based MSK demodulator in a zero-IF receiver for 2.4 GHz Zigbee applications Name: Meilin Wan Affiliation: Huazhong University of Science and Technology E-mail: [email protected] Abstract

A new digital differentiator-based demodulator in a zero-IF receiver for 2.4 GHz Zigbee applications is proposed. It receives the In-phase (I) and Quadrature-phase (Q) signals which are oversampled and quantized by a 4-bit ADC @ 8MHz. Two one-order digital differentiators based on Taylor series, two multipliers and an adder are adopted to calculate the derivative of the signal phase. Then an Inte-grate-and-Dump Filter (IDF) is applied to obtain the phase difference in the chip time and determine its sign as the transmitted data. No complex carrier synchronization is needed and the demodulator can achieve low power con-sumption and low cost for its simple architecture. The theoretical analysis of Chip Error Rate (CER) under Addi-tive White Gaussian Noise (AWGN) environment is also presented. The simulation results show that the proposed demodulator achieves Packet Error Rate (PER) of 1% with Carrier Frequency Offset (CFO) of 200 KHz and Signal-Noise Ratio (SNR) of 9.4 dB. Article ID: 70054 Title: A Self-similar Call Admission Control Algorithm in WiMAX Name: Yongdong Hu Affiliation: Southeast University E-mail: [email protected] Abstract Modelling WiMAX network traffic based on the self-similarity character is better than the traditional model based on the Poisson process, because the former can provide more accurate calculation for effective bandwidth. In this paper we propose a WiMAX network traffic model based on M/Pareto model to describe its self-similarity character. Then we deduce the average transmission rate and the variance coefficient for the FBM traffic model by the M/Pareto model, and get the Hurst parameter of the FBM traffic model by statistical analysis method. By the FBM traffic model we get a formula for calculating the effective bandwidth. Accordingly, we propose a modified self-similar call admission control algorithm (SS-CAC). SS-CAC can avoid measuring the parameter values of FBM traffic flow to do call admission control. Simulation results show that SS-CAC greatly reduces the call

Page 29:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

29 WiCOM 2015 Conference Guide

blocking rate and improves the bandwidth utilization. Article ID: 70055 Title: Ns3-Based Simulation System in Heterogeneous Wireless Network Name: Yunjian Zhao Affiliation: South China University of Technology E-mail: [email protected] Abstract The development of wireless technologies shows a trend to heterogeneous wireless network (HWN), which attracts extensive attention on the research. Compared with a real network environment, a simulation system not only reduces cost, but also provides reliable and quantitative basis. This paper presents the design and implementation of our simulation system in HWN based on NS3 (Network Simulator 3), and two experiments we conducted in the system. Article ID: 70056 Title: Extended Wireless Mesh Network For Vanet With Geographical Routing Protocol Name: Jinwoo Nam Affiliation: Korea University E-mail: [email protected] Abstract A vehicular ad-hoc network (VANET) is a promising technology in near future. VANET allows vehicles to communicate with each other and with roadside units (RSUs). Wireless Access in Vehicular Environment (WAVE), defined by IEEE, provides the Internet con-nectivity for vehicles as well as vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communica-tion. RSUs can form a wireless mesh network (WMN) as a backbone infrastructure to enhance the perfor-mance of VANET. However, WAVE supports only one-hop communications for IP packets in VANET, and existing researches do not consider the compatibility between VANET and WMN infrastructure formed by RSUs. We propose the extended WMN (ExWMN) which has the feasibility to extend WMN to VANET domain. In

ExWMN, the vehicles can send IP packets to an access router by using the multi-hop capability of WMN. ExWMN uses the addressing scheme of WMN for the extended VANET domain and exploits geo-graphical routing protocols instead of existing routing protocols of WMN due to VANET characteristics such as mobility and dynamically changing network topolo-gies. ExWMN supports the compatibility between the extended VANET and a WMN infrastructure due to RSUs, which provide a bridging function between them. This paper presents the architecture and the detailed procedures of the ExWMN. Article ID: 70057 Title: Limited Feedback Precoding for Multiuser MIMO Systems Based on Array Preprocessing Name: Chao Li Affiliation: Henan University of Technology E-mail: [email protected] Abstract In this paper, considering the problem of performance loss due to limited feedback in multiuser MIMO downlink systems, a novel limited feedback precoding for multiuser MIMO systems based on array preprocessing is proposed. The maximum SINR criteria is used for selecting optimal codeword from the Grassmannian codebook and perturbation codeword at the receiving, and feedback the Grassmannian precoding codeword index and perturbation codeword index to the transmitter, then the array preprocessing is used at the transmitter and receiver to get optimal capacity, and compensating for the performance loss due to the limited feedback. Simulation results show that the proposed method to ensure the cost of the feedback link, the system throughput and BER performance are improved effectively. Article ID: 70058 Title: Survey of The Issues Surrounding Network Traffic Monitoring Name: Adrián Pekár and Martin Chovanec Affiliation: Institute of Computer Technology, TUKE E-mail: [email protected]

Page 30:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

30 WiCOM 2015 Conference Guide

Abstract As networks are continuously growing, their operation and management are becoming more and more complex. In consequence, current network monitoring systems generate a huge volume of measurement data which represents one of the most critical issues in the management of computer networks. This paper is dedicated to the challenges in network traffic monitoring. It provides a brief overview of several issues that arise during traffic measurements. We inspect the issues form three viewpoints: (i) the impact on the inter-networking devices, (ii) resource asymmetry and (iii) real-time data evaluation. To quantify the volume of measurement data and its cost we also performed two experiments. They were focused (i) on the estimation of the average volume of data that must be processed during monitoring along with its impact on system resources and (ii) on the cost of interpretation of the measurement data. The paper is concluded by some re-marks on the directions at which should the research and development be aimed as well as with a brief introduction of our idea for addressing the described issues. Article ID: 70059 Title: Adaptive Multi-user Uplink Resource Allocation with Imperfect CSI Name: Yuanyuan Zhang Affiliation: Institute of Electronics, Chinese Academy of Sciences E-mail: [email protected] Abstract In this paper, the effect of the imperfect channel state information (CSI) on the system performance of the radio resource management is investigated for the uplink trans-mission in multi-user CDMA systems. The imperfect CSI introduces the constellation-point dependent symbol error rate (SER), which correspondingly yields the nonconvex and nondifferentiable throughput function. Then, a bisec-tion based iteration algorithm is proposed to solve the throughput maximization problem subject to certain pow-er constraints.

Article ID: 70061 Title: Design of Level Instrument With Four Launch Electrodes Based on Current Sensing Field Name: Zhi-gang Li Affiliation: Harbin Engineering University E-mail: [email protected] Abstract Conduction current field can be widely used in the fields of underwater and underground communication, remote sensing, remote control, positioning and monitoring, and so on. In special occasions, it has incomparable advantages over other traditional communication mode. Therefore, the conduction current field spread and application technology research has important scientific value and practical significance. The mathematical model of level instrument with four launch electrodes is established, the effects of level instrument on deflection direction and deflection angle is analyzed. Article ID: 70062 Title: Spectrum Sensing Scheme Based on Random Matrix Theory Name: Yin Mi Affiliation: Xi’an University of Posts and Telecommunications E-mail: [email protected] Abstract Spectrum sensing is the key technology in enabling spectrum awareness in cognitive radio. The performance of the spectrum sensing depends on the sensing method. In this paper, by means of random matrix theory (RMT), a novel spectrum sensing scheme and a threshold decision rule are proposed based on the difference between the maximum and the minimum eigenvalue (DMM) cooperative spectrum sensing algorithm, analyzing the minimum eigenvalue limiting distribution of the covariance matrix of the received signals from multiple cognitive users(CUs). The proposed scheme can overcome the noise uncertainty and need nothing about prior knowledge of the signal transmitted from the primary user (PU). Simulation results show that the proposed scheme outperforms DMM under lower signal-to-noise ratio (SNR)

Page 31:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

31 WiCOM 2015 Conference Guide

and smaller samples. Article ID: 70063 Title: System performance analysis for GBT29768 RFID System Name: Liu Wenli Affiliation: China Electronics Standardization Institute E-mail: [email protected] Abstract GB/T 29768 is China own RFID air interface protocol at 800/900MHz,which is released in 2013 and implemented in May 2014. Many new technologies are adopted, which are different from ISO and EPC Global counterpart standards. Based on the modelling of GB/T 29768 RFID system with OPNET Modeler, its DDS-BT anti-collision algorithm is evaluated and analysed and the inventory ending mechanism is calculated. According to the simulation results, the DDS-BT anti-collision algorithm works better than that in ISO/IEC 18000-6C. Article ID: 70066 Title: Multimodal Platform of Télé-medicine for Remote Consultation and Pre-diagnosis Name: Robert GOUTTE Affiliation: University of LYON E-mail: [email protected] Abstract We propose an original project that aims to demonstrate the feasibility and clinical validation of a multimodal platform for telemedicine and also incorporates the economic and legal aspects. This platform, connected to broadband internet, brings together, in one place, all the basic equipments necessary for carrying out a consultation and the establishment of a preliminary diagnosis. It ensures, 24H / 24 in compliance with the safety instructions and the requirements of medical ethics, rapid access to care, without limitation of geographic localization. Its implementation on site , should enable the validation of the concept, the detection of problems and the establishment of a financial statement. It requires the strong contribution of general practitioners, radiologists

and technologists of instrumentation and communication. . The creation of such a platform in a disadvantaged region is justified by the development of medical deserts, which result from the current shortage of general practitioners and specialists, particularly in rural areas and specifically affecting certain disciplines. Article ID: 70067 Title: A new equalization technique for Multi-h CPM in a telemetry multipath channel Name: Yang Min Affiliation: Xidian University E-mail: [email protected] Abstract A decision-feedback equalizer(DFE) for Multi-h CPM in aeronautical telemetry is presented in this paper. This algorithm estimates the inter-symbol interference and cancels it from the samples used to make the bit decisions. The approach improves the bit estimates sequentially, thereby increasing the probability of obtaining accurate estimates. Simulation results show an 1 dB improvement in bit error rate performance than the MMSE-equalizer for Multi-h CPM in a multipath channel environment. Article ID: 70071 Title: Software Attribute Trades-off and Conflicts in a Network Management System Name: Shahnawaz Qureshi Affiliation: Blekinge institute of technology E-mail: [email protected] Abstract Software platform is an emerging field and progressively more popular in software engineering. Software platform has become an essential part in development of software. Prototyping is possibly one of the most commonly used learning paradigms in software platform. Hence, it is reasonable to accept some of the requirements that could be expressed as specific quality attributes for developing and comparative analysis of prototype. Modern software applications must provide high availability, less development cost and performance. They must also be

Page 32:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

32 WiCOM 2015 Conference Guide

maintainable in order to reduce the maintenance cost. In this paper, we investigate the significance of quality attributes for different software platforms. Three prototypes were built by deploying different software platforms such as PHP, JSP and Perl. Each of these prototypes were evaluated with respect to maintainability, performance and implementation cost. We have shown the possibility to achieve better quality attributes given to a certain network management system. We also shown that there is trade-off, the best implementation alternative depends on how important the different quality attributes are in a certain situation. Article ID: 70073 Title: An Interference Alignment based on Joint Projector Interference Distances Name: Junchao Yao Affiliation: Harbin Engineering University E-mail: [email protected] Abstract Interference alignment (IA) effectively improves the ca-pacity of interference channel by overlapping the interfer-ence and eliminating at the receivers. At present, most algorithms of the distributed interference alignments de-sign precoder and receiver filter at both transmitters and receivers which causes overhead. This paper presents an improved interference alignment based on minimizing projector interference distances, introduces joint distance and optimizes the subspace projector distances between interference and desired signals to achieve interference alignment by steepest descent algorithm based on complex Grassmann manifold. The proposed algorithm alleviates the overhead for designing precoding matrixes at one side. Simulation results suggest that the proposed approach obtains higher sum rate compared with the previous algorithms and faster rate of convergence compared with the old approach only based on the projector interference distances. Article ID: 70074 Title: Improved Amplify-and-Forward Relay Selection with Outdated Channel State Information

Name: Fei Xu Affiliation: Soochow University E-mail: [email protected] Abstract Feedback delay often exists in actual communication systems. Relay selection with feedback delay was based on outdated channel state information, which would seriously deteriorate the performance of cooperative communication system. In cooperative system, the best relay is selected to participate in process of information transmission, which can save system power and reduce costs. In this paper, we propose a method to optimizing relay selection to select the appropriate relay node. Simulation results show that the optimization opportunistic relay selection scheme reduces the average bit error rate and improves the channel capacity of the system, which optimizes the performance of the system Article ID: 70076 Title: Circularly Polarized Dual Frequency Band Quasi-annular-ring Slot Antenna for Wireless Local Area Networks (WLAN) Applications Name: Jianfeng Zhu Affiliation: Beijing University of Posts and Telecommunications E-mail: [email protected] Abstract A novel circularly polarized dual frequency band quasi-annular-ring slot antenna is proposed and investigated. The dual frequency bands are obtained by a series microstrip-line-feed configuration electromagnetically coupling to the asymmetric quasi-annular ring slot and the asymmetry is introduced by adding dented structure at the corner of the ring slot. The proposed dual-band CP antenna easily achieves 10 dB impedance bandwidth of 620/440 MHz and 3-dB axial-ratio bandwidth approximating 160/90 MHz at 2.4/5.5 GHz,respectively, indicating the antenna could be used for WLAN applications. Article ID: 70078

Page 33:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

33 WiCOM 2015 Conference Guide

Title: A Joint Resources Allocation Approach for Hybrid Visible Light Communication and Lte System Name: Lu Li Affiliation: Beijing University of Posts and Telecommunications E-mail: [email protected] Abstract Visible light communication (VLC) is regarded as an emerging wireless access technology that has tremendous potential for 5G. However, the link of VLC is vulnerable to blockage of moving objects within the room. Moreover, the link data rate of VLC falls sharply with link distance increasing. Therefore, VLC needs to constitute networks with other wireless technologies, such as WiFi, WiMAX, 2G/3G and LTE, etc. Considering an indoor scenario, this paper proposes a heterogeneous network model of a hybrid VLC and LTE system. On this basis, a joint resources management strategy water-filling-iteration-ex- tremum (WFIE) is developed by thinking over characteristics of VLC physical layer. WFIE firstly selects the best network by detecting channel condition in heterogeneous network. Then WFIE uses water-filling algorithms to allocate power and takes extremal method to allocate frequency. Simulation proves that our scheme improves the throughput of system compared with conventional method, besides taking into account the quality of service and fairness. Article ID: 70079 Title: Priority-Based Bandwidth Allocation in Heterogeneous Wireless Network Name: Liu Yuhan Affiliation: University of Electronic Science and Technology of China E-mail: [email protected] Abstract In this paper, a priority-based bandwidth allocation in the context of heterogeneous wireless network is studied. By utilizing the mobile terminals with multi-homing capability, that simultaneously accessing bandwidth from different wireless network, a novel utility-based bandwidth allocation approach is introduced. An essential

factor is the priority mechanism considering the services priority classification, which means the higher-priority service request can be guaranteed on bandwidth allocation prior to the lower-priority service request. The utility function is used to distinguish both the service priority and the network subscribers compared to other users. The bandwidth allocation problem is formulated as an optimi-zation problem and solved by Lagrangian duality. Numerical results reveal that the optimal bandwidth allocation algorithm can differentiates the priority–based service and utilize all available resources within the network capacity. Article ID: 70084 Title: Max-Degree Network Coding for Wireless Data Broadcasting Name: Kui Xu Affiliation: PLA University of Science and Technology E-mail: [email protected] Abstract Wireless broadcasting systems employ multiple retransmissions to guarantee the correct reception of each packet. Traditional hybrid automatic retransmission request (HARQ) protocol retransmits one packet per slot. Hence, a large amount of retransmissions is required to correctly receive all the packets, which leads to low spectrum efficiency. In this paper, we propose a Max-Degree Network Coding (MDNC) based Wireless BroadCasting (WBC) protocol. Specifically, to reduce the overall number of retransmissions, lost packets of different user equipments (UEs) are network coding (NC) combined at the access node (AN) by utilizing MDNC strategy. At each UE, the lost packet can be recovered by using the proposed joint network recursive systematic convolution (RSC) decoder (JNRD). Theoretical analyses and simulation results show that the average number of transmissions performance of the proposed MDNC based WBC protocol outperforms that of the traditional index NC based WBC protocol. Article ID: 70085 Title: An Online Charging Model using the Signaling

Page 34:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

34 WiCOM 2015 Conference Guide

Procedure Optimization in Packet Switching Mobile Network Name: Renyuan Zhang Affiliation: Shandong University of Science and Technology E-mail: [email protected] Abstract An online charging signaling procedure in packet switching system is analysed. Appropriate parameters can be selected in order to reduce the number of account operation and amount of signaling by omitting some credit re-authorization process. An online charging model is proposed by using the signaling procedure optimization. In the model, session based charging function is divided into six closely linked modules. Before responding to the re-authorization request caused by the change of Quality of Service, the session based charging function extracts the useful information from the request information, and then looks-up a table to calculate and select the optimal charging method. Article ID: 70087 Title: Multi-Parent Selection via Naive Bayes in P2P Layered Video-on-Demand System Name: Yangling Xu Affiliation: Tongji University E-mail: [email protected] Abstract With the increasing network speed, online video-on-demand system (like YouTube, PPS) is becoming more and more popular. Thus many researches are about VoD system. We notice that among all the system proposed, there are more or less space to make improvements. For example, seldom systems break the rule that one peer only transfer data with one single parent in the streaming service. As for the parent selection, most paper focus on the optimization on network topology, such as building a subset based on either content relevance or geographical features. In this paper, we gather the history information of each peer and rate each peer with the statistics, in order to select most reliable peers to play as parent peers. After the parent peer is chosen, the playing

peer downloads the necessary video data from all the parent peers simultaneously to speed up the caching process. In this way, not only the server load is reduced, the playing peer gets better quality service as well. Article ID: 70088 Title: A Dynamic Conformance Checking Method Based on Petri Nets for Satellite Communication System Network Control Protocol Name: Jun Zhu Affiliation: Nanjing Telecommunication Technology Research Institute E-mail: [email protected] Abstract For the existence of malice or abnormal nodes and the influence of unreliable satellite network environment, some violations may probably happen in network control protocol execution process, which lead to the inconformance between protocol specification and actual protocol execution states. It reflects the robustness problems in relevant protocol design issue. Meanwhile, it is difficult to assure that the interaction behaviors of protocol nodes conform to the expectation of protocol specification. To tackle the inconformance problem, this paper proposes a colored Petri nets based conformance checking method. A satellite network control protocol signaling dynamic conformance verification framework, which is used to capture runtime protocol signaling from protocol execution environment, is presented. Then, it puts forward a signaling dynamic conformance checking algorithm that centers on the protocol interaction behaviors. At last, performance and overhead evaluations are performed to demonstrate the usability and availability of this conformance checking method. Article ID: 70089 Title: Cell Outage Detection Based on Improved Bp Neural Network in Lte System Name: Wanrong Feng Affiliation: Beijing University of Posts and Telecommunications E-mail: [email protected]

Page 35:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

35 WiCOM 2015 Conference Guide

Abstract With the development and evolution of the LTE system, the operators are experiencing huge challenges on opera-tions and service maintenance, which sets off a wave of SON (Self-organizing Network) research. As one of the crucial component of SON, the cell outage detection is an effective way to automatically detect outage cells resulted from hardware or software problems. Our work in this paper aims to introduce a cell outage detection mecha-nism to timely and accurately detect outage cells. After classifying the cell into four states, namely the healthy, degraded, damaged and outage state, we present a cell outage detection mechanism based on BP network. In order to enhance the training speed of traditional BP, the Differential Evolution (DE) algorithm is adopted as the training algorithm. We have simulated the proposed mechanism in the matlab environment and get a better performance of high detection accuracy by comparing it with the standard BP algorithm. Article ID: 70090 Title: An UEP Transmission Scheme Based on Distributed Rateless Codes Name: Chen Cui Affiliation: Harbin Institute of Technology E-mail: [email protected] Abstract In this paper a new coding scheme is proposed to accomplish unequal error protection (UEP) for distributed rateless codes. This coding scheme can be applied when multi-sources symbols share a single relay and the relay has no knowledge about their importance levels. We design this coding scheme by encoding the symbols with a second LT process at the relay. UEP property is provided via several equal error protection (EEP) LT processes. Asymptotical analyses have been made on how the encoding parameters affect the error performances. Experimental results show that the second LT process at the relay significantly improve the error performances of the symbols. Asymptotic analysis and experimental results prove this coding scheme viable.

Article ID: 70091 Title: A Modified Traffic Grooming Algorithm with High Trade-Off Efficiency for Optical Network Name: Mengfei Lyu Affiliation: Peking University E-mail: [email protected] Abstract As the energy consumption of network has become an increasingly important issue, traffic grooming on Internet protocol over wavelength division multiplexing (IP-WDM) networks has been widely used for energy-efficient optical network. Traffic grooming can reduced the number of installed light paths and corresponding IP router line cards at the cost of traffic processing overhead. However, traditional traffic grooming algorithm tends to prefer longer paths, which are responsible for longer transmission hop distance. Although there are studies that focus on reducing hop distance, the energy consumption increases accordingly. In this way, the trade-off between energy consumption and hop distance is a problem worth discussing. This paper proposes a modified heuristic traffic grooming algorithm which can improve the trade-off efficiency by about 20%, compared with the earlier algorithms. Article ID: 70093 Title: Dynamic Mode Management in Cognitive Radio Networks with RF Energy Harvesting Name: Junmei Zhao Affiliation: Beijing University of Posts and Telecommunications E-mail: [email protected] Abstract In order to realize green communication, we consider a cognitive radio network where the secondary user (SU) is equipped with RF energy harvesting capability. The three-state Markov chain is used to model the primary user (PU) channel, which considers both the channel occupation information of the primary network and the channel quality information. We assume that the SU cannot execute RF energy harvesting and packet transmission at the same time. Consequently, at the

Page 36:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

36 WiCOM 2015 Conference Guide

beginning of each time slot, the SU should make the decision to harvest RF energy or to transmit a packet. The mode decision depends on the channel state and the available energy in the energy queue. We formulate the mode management problem of the SU as a Markov decision process (MDP) problem that can be solved using dynamic programming. The objective of the proposed strategy is to maximize the expected number of packets successfully transmitted. Simulation results are presented to demonstrate the effectiveness of the proposed strategy. Article ID: 70095 Title: Fast Depth Map Intra Prediction Algorithm Based on Edge Detection and CU Partition Name: Zhenyong Wang Affiliation: Harbin Institute of Technology E-mail: [email protected] Abstract This paper proposed a new fast intra prediction algorithm based on fast edge detection and CU partition for depth map to reduce the coding complexity of Multiview Video Plus Depth (MVD) coding in HEVC. The latest video coding standard HEVC greatly improves the coding complexity of intra prediction because of complex coding unit (CU) partition and lots of prediction modes. Depth maps always have smooth regions separated by sharp edges. Smooth regions can help to speed up the CU partition and reduce the time of intra mode decision, and sharp edges must be protected to ensure the quality of synthetic viewpoints. In the new algorithm, an equation and a threshold T are used to detect whether there are edges in current CU. To different kinds of CU, different intra mode decision methods are taken. After simulation, the experimental results show that the proposed algorithm significantly reduces the coding times, while maintains high bitrate and PSNR performance in comparison with original HEVC algorithm. Article ID: 70097 Title: A New Cell Search Scheme Based on Cell-clustering for UDN Name: Sisi Zhang

Affiliation: BUPT E-mail: [email protected] Abstract Since user equipment (UE) has to obtain the cell identification (cell ID) and timing information to start the communication with base station, cell search is the initial step in cellular systems. The research of 5G has started to improve the performance of wireless communication. A new scenario named ultra-dense network (UDN) has been introduced and there will be more access nodes per unit area. However, with the distribution of small cells gets more complicated and the interference is stronger, cell search will be a big challenge. In Long Term Evolution (LTE) of 4G, two signals named primary synchronization signal (PSS) and secondary synchronization signal (SSS) are designed for cell search. Correct detection of synchronization signals makes UE be able to get the frame boundary and Cell ID. However, the detection accuracy will be poor when the cell density grows. Focusing on UDN scenario, we give a definition of cell cluster and design new synchronization signals. Moreover, a new cell search scheme based on the redesigned signals is presented. Simulation is conducted to evaluate the detection accuracy of the new scheme. The result presents that the performance of the new scheme is much better than the existing scheme in LTE. Article ID: 70099 Title: A Simplifed Joint Demapping and Decoding for LDPC Coded BICM Systems Name: Huang Ping Affiliation: HoHai University E-mail: [email protected] Abstract Make full use of the characteristics of LDPC decoding, Stephan ten Brink had proposed a joint iterative demapping and decoding algorithm for LDPC coded BICM systems. Based on Brink proposed algorithm, we propose a modified joint iterative scheme to further reduce the computation complex. Different from the algorithm presented by Brink, in the process of iterative demapping and decoding, the proposed method simplifies the update

Page 37:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

37 WiCOM 2015 Conference Guide

calculation of the LDPC parity check nodes by adopting the UMP-BP. More importantly, to compensate for the performance degradation brought by UMP-BP, LLRs optimization based on certain optimality criterion is employed for the proposed method. Numerical analysis shows that the complexity of the proposed method is less than traditional joint iterative algorithm. Simulation results also show that by LLRs optimization the proposed method achieves noticeable performance improvement compared with the BICM-ID and the joint iterative algorithm. Article ID: 70101 Title: Research on energy-saving dynamic spectrum aggregation scheme in cognitive relay networks Name: Yifei WEI Affiliation: Beijing University of Posts and Telecommunications E-mail: [email protected] Abstract With the development of LTE-A technology, spectrum aggregation, relay and other technologies have been applied to the next generation of wireless communication network. However, current research is mostly focus on only one kind of technology, when these technologies coming together, a lot of prereq-uisites often have been destroyed, and it becomes difficult to achieve. In this paper, we take spectrum aggregation and collaboration relay technology together, and proposed a dynamic spectrum aggregation scheme based on energy-saving in cog-nitive relay network. Besides, through the simulation, we analysed the network performance and energy efficiency of the proposed algorithm. Article ID: 70105 Title: Research on Blanket Jamming to Beidou Navigation Signals Based on Boc Modulation Name: Pei Wang Affiliation: National Time Service Center E-mail: [email protected] Abstract Aiming at the issue of influence of blanket jamming on

performances of Beidou navigation signals, through study-ing Beidou signals based on the BOC modulation technol-ogy, establishing a blanket jamming mathematical model, and performing modeling and simulation on multiple jamming technologies, to attain the jamming curves of time domains and frequency domains of Beidou signals, and the correlation curve of the signal-to-jamming rate and the bit error rate under blanket jamming, and thus realizing evaluation on the jamming performance. Article ID: 70109 Title: Mimo Antenna for Uwb Communications Name: Joseph Jervase Affiliation: Sultan Qaboos University, Oman E-mail: [email protected] Abstract Design of ultra-wideband antennas is challenging in the stringent requirements that are often conflicting to achieve a wide impedance bandwidth while maintaining high radiation efficiency, uniform gain and compact size. A Multiple-Input Multiple-Output (MIMO) antenna system can enhance the overall antenna performance but at having to overcome new challenges such as reducing the mutual coupling and the correlation between the elements. A printed circular disc compact planar antenna is selected in this work due to its UWB performance and compact size for the MIMO antenna system. A parametric analysis is carried out to achieve an optimal design. The system developed consists of two elements with an overall size of 59×27 mm. The designed antenna system operates over the whole of the UWB bandwidth from 3.1 to 10.6 with radiation efficiency up to 85% and reflection coefficients less that –10 dB. The envelope correlation is less than –60 dB throughout the UWB band while the diversity gain approaches 10 throughout the entire UWB bandwidth and Total Active Reflection Coefficient (TARC) between the antenna elements is less –11. Thus the proposed MIMO antenna outperforms similar antenna systems reported in the literature. Article ID: 70110 Title: Heuristic Optimizing of PCI Assignment in

Page 38:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

38 WiCOM 2015 Conference Guide

Real-life LTE Networks Name: Wu Songrui Affiliation: Beijing University of Posts and Telecommunications E-mail: [email protected] Abstract Assignment of Physical Cell Identity (PCI) is an important work in TD-LTE network optimization, and the reasonable PCI allocation helps to eliminate the interference and improve the quality of service of networks. In the practical large-scale TD-LTE networks, how to properly reuse PCIs among a large number of cells is challenging. In this paper, we propose a multiobjective optimization model for PCI allocation. This model aims to minimize both the interference and the number of the cell pairs violating soft constraints while maintaining the hard constraints being satisfied. We present a heuristic solution to this optimization model. This heuristic scheme uses the maximum spanning tree to determine the eNodeB order, and then following this order, assigns the available PCIs to each eNodeB’s cells in a step-by-step manner. We applied the heuristic scheme to adjust the PCI configuration of 1233 cells in the real-life TD-LTE network in Zhuhai city, Guangdong Province, China. From the interference and constraint viewpoints, the optimized PCI configuration is evaluated and compared with the original configuration. The evaluation results demonstrate that the proposed heuristic scheme considers several constraints and is an efficient approach to PCI optimization in large-scale and real-life TD-LTE networks. Article ID: 70112 Title: The Effect of Phase Shifter Errors on The Performance of Millimeter Wave Beamforming Name: Junlin Tang Affiliation: UESTC E-mail: [email protected] Abstract Due to the cost and power supply, RF beamforming using low precision phase shifter is always used in milli-meter wave instead of baseband beamforming. In IEEE 802.11.ad, beamforming is based on a codebook by 2 bits

phase shifter, which degrades the link performance. This paper analyses the performance loss due to the limited precision of phase shifter and simulation is performed to validate the result of analysis. At the same time several conclusions are obtained: (1) with the increase of the accuracy of the phase shifter, the performance of beamforming is improved which is reflected in the side lobe suppression and main lobe improvement; (2) The gain loss brought by the low pre-cision phase shifter is limited, a 3bits phase shifter can get a close performance to the ideal one. So precision of the phase shifter is not the key factor that affect the performance of millimeter wave beamforming. More attention should be focused on other aspect, such as the channel estimation, acquisition of optimal beamforming weights, etc. Article ID: 70114 Title: A Time Synchronization Scheme for Sensor Networks Based on Ant Colony Algorithm Name: Wei Nuo Affiliation: Shandong Computer Science Center E-mail: [email protected] Abstract Time synchronization has received a great attention as its crucial parts in wireless sensor networks. To minimize the number of transmission packets and achieve energy efficiency, a time synchronization scheme based on ant colony algorithm (TSAC) is presented in this paper. By exploiting the principle of ant colony algorithm adjusting the pheromone dynamically and automatically, an optimum pair selection theme is designed to select the nodes synchronized by performing the pairwise synchronization, and all the other nodes could be synchronized by listening. The simulation results show that TSAC needs less message exchanges and provides more accuracy than other time synchronization algorithms. Article ID: 70115 Title: Analysis and Implementation of an Arbitrary Variable Up-sampling Algorithm Based on Lookup Table Name: Junjun Liu

Page 39:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

39 WiCOM 2015 Conference Guide

Affiliation: Department of Electronics and Information Engineer E-mail: [email protected] Abstract In digital signal processing, it is difficult to achieve flexible arbitrary sampling rate conversion. As for this problem, a new algorithm is proposed to realize arbitrary variable up-sampling based on lookup table. The algorithm firstly constructs an original filter whose coefficients are stored in ROMs. Then the target filter is decimated from lookup table by mapping sampling rate as address. Arbitrary variable up-sampling can be achieved when input signal passes through the target filter after zero-insertion. The paper describes principles of the algorithm and constructs the model, then proves the validity of the scheme, and analyzes the performance as well as the effects of errors. The results show that the proposed algorithm has better performance than conventional algorithm and the effect of errors is negligible. It can implement arbitrary variable up-sampling speedily and conveniently within a certain range. Article ID: 70118 Title: A Compression and Reconstruction Algorithm of Indoor Wlan Positioning Radiomap Data Based on Neural Network Name: Shuo Tian Affiliation: Harbin Institute of Technology E-mail: [email protected] Abstract This paper aims at the problem of large amount of real-time data transmission in indoor WLAN positioning. We proposes a method that we use the BP network to com-press at the sending end, and then save the weight. The method reconstructs data in the terminal, which greatly reduces the amount of data in real-time transmission to ensure the fast and effective of real-time positioning. The used simulation environment is in the 27 AP in the floor for data acquisition and real-time simulation application. The applied algorithm is a universal KNN algorithm. The core data compression

method is the improved BP neural network. Finally, focusing on the data in the input end of BP network, the paper makes the real-time Radiomap be normalized and presets the simulation parameters. The simulation results show that in the case of choosing ap-propriate parameters to simulate, compared to the RAR compression it can compress the whole Radiomap in to 1/2 or even 1/3 of data size, it can maintain high stability in a certain degree of compression, and it can guarantee the reconstructed and compressed data has lossy compression within the allowable range of positioning accuracy. Article ID: 70120 Title: A Limited Feedback-Based Bit Allocation Method For Interference Alignment Name: Hui Dun Affiliation: Harbin Engineering University E-mail: [email protected] Abstract While distract interference alignment needs ideal channel state information (CSI), this is difficult to achieve in real communication system. But reality communication system possesses feedback link. Based on this, interference alignment (IA) with limited feedback was proposed. Channel coefficient matrices is quantified at receivers, and then the precoding matrix will be designed with the quantified channel coefficient got in feedback scheme at transmitters. Then interference alignment can be achieved when perfect channel state information is not available. Consider the rate loss of the system caused by limited feedback, and the rate loss under the method of bit average allocation for interference alignment with limited feedback isn’t minimum, a new bit allocation method is proposed. The proposed scheme can improve the rate performance due to the rate loss is reduced. The simulation results showed that when the condition of interference alignment is satisfied, the proposed method can improve the sum rate of the system compared with the traditional interference alignment with limited feedback method. Article ID: 70122 Title: Social-Aware Hierarchical Multicast In Mobile

Page 40:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

40 WiCOM 2015 Conference Guide

Delay Tolerant Network Name: Wenhua Yin Affiliation: Inner Mongolia University E-mail: [email protected] Abstract With the popularization of portable devices equipped with wireless communication capability, Mobile Delay Toler-ant Network (MDTN) gets extensive attention of scholars. Infrastructureless networking with portable devices has become a typical scenario in MDTN. With regard to the infrastructureless MDTN scenario composed by portable devices, we propose a social-aware hierarchical multicast distribution algorithm (SAHM) which is suitable for this scenario. SAHM algorithm regards community detection, centrality computation and the prediction of contact rate. The community structure in the network is identified by K-Clique algorithm. On the basis of communities, we de-termine whether the meeting node can act as a relay node based on the C-Window centrality and the contact predictability. Intercommunity SAHM selects relays among those nodes whose contact rate is higher and higher than Pthresh. Intracommunity SAHM selects relays among those nodes whose C-Window centrality is high. In order to verify the performance of SAHM algorithm, we implement SAHM algorithm on the ONE simulation platform and compare whose performance with the existing classical algorithm on two real data sets (Infocom06 and Cambridge). Simulation results show that our proposed algorithm has similar data delivery ratio with the existing algorithms or higher than them, but significantly reduces data forwarding cost, making data more quickly and efficiently forward to the nodes which need data. Article ID: 70123 Title: The Design of a Cloud and Mobile Healthcare System Name: Shou-Chih Lo Affiliation: Dept. CSIE, National Dong Hwa University E-mail: [email protected] Abstract The aging society will become a serious problem for most

countries in the world. Under the constraint of limited medical resource, the self-health management becomes important. In this paper, a mobile healthcare system is implemented. One can easily monitor his/her physiological data through the using of a smartphone that is wirelessly connected to different medical detec-tion devices. A cloud database is established for stor-ing and analysing these physiological data. The guid-ance of suitable physical exercises to individuals is then given in the system. This paper shows the details of the system implementation. Article ID: 70124 Title: Threshold Selection for Energy Detection in Cognitive Radio with A Non-Line-Of-Sight Environment Name: Yun Gao Affiliation: ECE Department, New York Institute of Tech. at Nanjing Campus E-mail: [email protected] Abstract This paper selects a reasonable threshold for energy detection in cognitive radio, where a non-line-of-sight (NLOS) environment is considered. The secondary user (SU) uses this threshold to detect whether the spectrum is occupied by the primary user (PU) or not. Three specific NLOS scenarios are depicted and analyzed in this paper. In order to improve the existing threshold value in energy detection for a LOS environment, we need to consider the specific path loss through different obstacles. Different path loss exponents are considered to represent different obstacles and used to calculate the path loss. The improved threshold value is then obtained based on the updated path loss. Computer simulations demonstrate our proposed method. Article ID: 70125 Title: An Improved Image Denoising Method based on the Pulse Coupled Neural Network Name: Renhuan Luo Affiliation: Harbin Engineering University E-mail: [email protected]

Page 41:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

41 WiCOM 2015 Conference Guide

Abstract In this paper, we proposed an image denoising filtering method based on PCNN(pulse coupled neural network) for images polluted by the pulse noise. The method firstly determined the position of pixels polluted by noise ac-cording to the fire capture features of PCNN. Then, a sim-ilar median filtering step was applied on the processing of noised pixels. Finally, the iterations and the sizes of filter window were chosen according to the noise intensity, which realized the adaptive-filtering of images. The main result states that, compared to mean filtering, median filtering and adapted-median filtering, the method we proposed was not only effective in denoising and keeping details of images, but also showing good performances in different SNR conditions. Article ID: 70129 Title: Hybrid Wireless Indoor Positioning with IBeacon and Wi-Fi Name: Tao Peng Affiliation: Tongji University E-mail: [email protected] Abstract The fingerprint of location can reach high precision and high accuracy with the assistance of complex positioning algorithms. However, the indoor environment is complex so that the accuracy of indoor positioning is easily and seriously affected by several kinds of signal interference. In this paper, we use iBeacon as anchor method to help Wi-Fi positioning algorithms. In the hybrid algorithms, iBeacon divides the space into different parts, with the combined iBeacon and Wi-Fi offline fingerprint data, then it locates partly. Compared to the single Wi-Fi indoor positioning algorithms, it can significantly reduce the amount of calculation and the error of positioning. Article ID: 70132 Title: Joint Channel Network Coding For Correlated Sources Name: Youssef Zid Affiliation: Sys’COM Laboratory National Engineering School of Tunis, Tunisia

E-mail: [email protected] Abstract In this paper, we consider a Generalized Joint Channel Network Coding (GJCNC) applied to Physical Layer Network Coding (PLNC) for Two Way Relay Channel (TWRC). For this purpose, two correlated sources A and B desire to exchange information with each other by the help of a relay R. PLNC allows the relay to decode the combined information of both sources from the superim-posed information. A Low Density Parity Check (LDPC) code is used as a channel code. A new design of GJCNC is developed by exploiting the correlation between nodes. Since the relay doesn’t know in advance the correlation between sources, an estimation of this quantity must be applied. Simulation results show that the Bit Error Rate (BER) can be significantly decreased by exploiting this correlation. In addition, a lower number of iterations is necessary to achieve a desired BER in comparison with a classical scheme which doesn’t exploit the correlation between sources. Article ID: 70133 Title: A Review On Inter-Domain Routing System Vulnerabilties And Security Solutions Name: Yi GUO Affiliation: National Digital Switching System Engineering & Technological Research Center, Zhengzhou, China E-mail: [email protected] Abstract The BGP-based inter-domain routing system plays an important role in the Internet. Not only the performance of data forwarding, but also the topology, robustness, and security of the Internet severely rely on inter-domain routing system. However, the BGP has design flaws, which result in many serious security issues for inter-domain routing system. This paper analyzes the vulnerabilities and security threats of inter-domain routing system, and introduces some typical solutions which address to improve the security of inter-domain routing system.

Page 42:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

42 WiCOM 2015 Conference Guide

Article ID: 70138 Title: A Survey on Iot Architectures, Protocols, Applications, Security, Privacy, Real-World Implementation and Future Trends Name: Surapon Kraijak Affiliation: King Mongkut's Institute of Technology Ladkrabang E-mail: [email protected] Abstract The Internet is dramatically evolving and creating various connectivity methodologies. The Internet of Things (IoT) is one of those methodologies which transforms current Internet communication to Machine-to-Machine (M2M) basis. Hence, IoT can seamlessly connect the real world and cyberspace via physical objects that embed with vari-ous types of intelligent sensors. A large number of Inter-net-connected machines will generate and exchange an enormous amount of data that make daily life more con-venient, help making a tough decision and provide benefi-cial services. This paper not only describes about the evo-lution and how important of IoT in daily life, the generic architecture, its most widely used protocols, numerous possible applications but also concern over security and privacy issues in IoT, real-world implementation of IoT system by using Arduino and its future trends. The IoT probably becomes one of the most popular networking concepts that has the potential to bring out many benefits. Article ID: 70139 Title: Design and Realization of A Dual Wide Band Printed Monopole Antenna for Wifi and Wimax Systems Name: Gerard Rushingabigwi Affiliation: University of Science and Technology of China E-mail: [email protected] Abstract A Printed monopole antenna was designed and manufactured with the wideband performances in two frequency bands. The antenna is compatible with WiMAX and WiFi standards. After reviewing a couple of literatures,

the antenna was designed, analyzed and proven for two central frequencies, 2.5GHz and 5.6GHz, with much improved bandwidths. Finally, the antenna was manufactured with the overall size of 4cm×4.4cm on Rogers (RO4003) substrate. The antenna is made into three L-shaped radiators. A 50Ω microstrip feed line connects the port to the two L-shaped radiators of different lengths, thus providing two frequency bands. An inverted L-shaped radiator is printed on the less radiation upped side, to tune the antenna for wide band performances. The raised problem was solved with the integral equation solver of the Ansoft high frequency simulator structure (HFSS-IE). Optimal results are presented in this article: the simulation results in comparison with measured results. This antenna prototype’s overall dimensions would be readjusted according to any in-dustrial and manufacturing requests. Article ID: 70140 Title: A Novel Unambiguous Acquisition Scheme for Galileo Modulated Boc(N,N) Signals Name: Ping Li Affiliation: School of Information and Electronics, Beijing Institute of Technology, Beijing China E-mail: [email protected] Abstract Binary offset carrier (BOC) modulation signals have been widely adopted in global navigation satellite systems (GNSSs) such as Galileo and modernized global positioning system [1, 2]. Although this kind of modulation offers excellent performances, a main drawback of BOC modulation is that ambiguous acquisition and biased tracking for its multi-peak autocorrelation function (ACF). This article presents herein a novel acquisition technique allows removal of side peaks thoroughly and acquire better acquisition performance. This scheme is applicable to BOC(n,n) modulation signals. Theoretical analysis and system simulation demonstrate the algorithm proposed has better performance in acquisition aspect compared with other typical algorithms under the influence of additive white Gaussian noise.

Page 43:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

43 WiCOM 2015 Conference Guide

Article ID: 70143 Title: Experimental Study on Wireless Interference in RFID System Name: Yang Fu Affiliation: Beijing University of Posts and Telecommunications E-mail: [email protected] Abstract The objective of the proposed work is to find the effects on the reading performance of 900 MHz radio frequency identification system (RFID) under the wireless interference. Experiments were carried out in full anechoic chamber avoiding the influence of wireless signal produced by the reflection. In order to simplify the analysis of the process of performance, single tone signal was selected as the source of wireless interference. The performance was measured in terms of change in the successful reading rate of tags and the interrogation range of the reader. Typically the performance of the RFID will decline due to the wireless interference. However in our experiment it was found that the unwanted signal can significantly improve the performance of RFID system when its power reach a certain range. To explain this phenomenon, we analyze the tag circuit as well as the back-scatter link, and the ratio m was defined to characterize the degradation of reading performance. It was concluded that the results we calculate using the method we proposed was matched with the experimental results. Article ID: 70144 Title: A Invulnerability Assessment Based on Importance-Degree of Node for Weighted Network Under Attack with Partial Information Name: Lu Xiangqun Affiliation: Beijing University of Posts and Telecommunications E-mail: [email protected] Abstract We study invulnerability of complex networks subject to attacks on nodes and links. For the purpose of precisely assessing invulnerability of complex networks, in this

paper we proposed a invulnerability assessment on the basis of importance-degree and partial attack information by measuring two metrics of network invulnerability, robustness and efficiency. We defined the term of importance-degree to describe importance of different nodes in the networks. We form a probability model to describe the process of acquiring information under three types of attacks, random attacks, partial information attacks and intentional attacks, and simulate the process of acquiring partial information by sampling nodes in accordance with the probability model. The simulation results contain that weighted networks hold strong invulnerability to random attacks, whereas they are extremely fragile when suffering those intentional attacks; more information is exposed, less invulnerability networks display, especially complete information attacks which are the same with intentional attacks that all information of nodes or links would be acquired by assailants; the more important information is acquired, the more quickly network invulnerability decreases. This conclusion can guide people to implement corresponding protection strategy of hiding important information based on the importance-degree of nodes. Article ID: 70146 Title: Real Cdma-Ofdm/Oqam Transmission System Based on Walsh Hadamard Spreading Code over Rayleigh Fading Channel Name: Ilhem Blel Affiliation: Innov’Com Laboratory SUPCOM E-mail: [email protected] Abstract In this paper, we investigate the combination of Orthogo-nal Frequency Division Multiplexing with Offset Quadra-ture Amplitude Modulation (OFDM/OQAM) with spread spectrum Code Division Multiple Access (CDMA) trans-mission scheme as an alternative to classical Multicarrier-CDMA (MC-CDMA) system over multipath fading chan-nel. The performance of real CDMA-OFDM/OQAM transmission system with Walsh Hadamard spreading code is directly linked to the performance of OFDM/OQAM system. OFDM/OQAM performs better than CP-OFDM and

Page 44:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

44 WiCOM 2015 Conference Guide

CDMA-OFDM/OQAM outperforms conventional MC-CDMA thanks to the no use of the Cy-clic Prefix and the good choice of the prototype filter. We present the simulation results of the performance of OFDM/OQAM system with Isotropic Orthogonal Trans-form Algorithm (IOTA) prototype filter compared to con-ventional CP-OFDM system and the performance of the combination CDMA-OFDM/OQAM compared to MC-CDMA. The performance is derived by computing the Bit Error Rate (BER) as a function of the transmit signal-to-noise ratio (SNR). Article ID: 70147 Title: Adaptive Energy-Efficient Configuration of Power Resource for Ofdma with Opportunistic Df Relaying Name: Li Feng Affiliation: UESTC E-mail: [email protected] Abstract In this paper, adaptive power allocation (PA) on the source and relay is investigated to maximize energy effi-ciency (EE) for OFDMA opportunistic DF links (O2RL). We derive EE function from O2RL model by appropriate definition of variables to represent source/relay PA, sub-carrier transmission mode selection (STMS) elegantly. Theoretical analysis demonstrates that EE function for O2RL is strictly quasi-concave with respect to the overall transmit power. Exploiting the quasi-concavity property of the EE function, an EE-oriented optimal PA iterative method for O2RL is proposed which used the bisection method to speed up the search of the optimum. Simulation results demonstrate that the O2RL is more energy-efficient than traditional cooperative relaying strategies (TCRS), and the proposed method as compared to the sum throughput maximization PA method (STMPA) is able to significantly improve performance in terms of system EE. Article ID: 70150 Title: Frequency Estimation Method of Sinusoidal Frequency Signal Based on Piecewise Fft Name: Qu Wenxing

Affiliation: Academy of Equipment E-mail: [email protected] Abstract The micro-Doppler effect on a flying spinning target, in-troduced by the rotation, would modulate the receiving signal with SFM (Sinusoidal Frequency Modulation), that we usually use some TF (Time-Frequency) analysis meth-ods with complex calculation to estimate the frequency. As to the issue of the complexity of the classic TF method, a method based on the piecewise FFT was proposed in this paper. With the analysis of the local stable properties of SFM signal, the selection of the segments M and its influence on the performance of frequency estimation was discussed. Then we divided the signal into M seg-ments with FFT, and corrected the frequency offset caused by the fence effect. And the calculated amounts of this algorithm was analysed. Finally the piecewise FFT was verified to be less calculated amounts and easy to implement with a better SNR which could be applicable to the processing of cooperative target by simulation. Article ID: 70152 Title: Design of Wide Stopband Filter with Tunable Center Frequency Name: Zhaoqing SUN Affiliation: Harbin Engineering University E-mail: [email protected] Abstract A dual passbands filter with the function of varactor tuned is proposed in this paper, which has a wide stopband. Stepped impedance resonators (SIRS) is used at the filter. The varactor is loaded on the T-shaped resonators, while changing the bias voltage across the varactor, The second passband frequency is tuned from 1.56GHz to 2.25GHz; the first passband’s center frequency is fixed at 1.02GHz and maintained though out the simulation. The first passband bandwidth is 14.7%, the insertion loss value is 0.2dB and the value of the return loss is 19dB. The second passband is tuned between 1.56 GHz and 2.25GHz where the tuning range is maintained at 36.2%, relative bandwidth remains unchanged. The insertion loss changes from 0.2dB to 0.8dB while the return loss shift from 16dB

Page 45:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

45 WiCOM 2015 Conference Guide

to 30dB. The propose filter achieves a great harmonic suppression characteristic of -20dB up to 5GHz. The designed filter has two advantages, one is that to depress stopband, the filter network is incorporate in the output input coupling line, the other advantage is that the performance of the filter is optimize by adding spur lines (spurlines) at the input and output coupling line which is useful to increase zero between the two passbands. The proposed filter is compact in size, has low insertion loss, wider rang harmonic suppression and is efficient compared to other filters. Simulations show that the filter proposed is valid and has a good performance. Article ID: 70153 Title: Manifold Locally Linear Denoising for Wi-Fi Rss Based Indoor Positioning Name: Gang Shen Affiliation: Huazhong University of Science and Technology E-mail: [email protected] Abstract In this paper, we investigate the problem of locating the indoor objects with the help of the received Wi-Fi signal strength fingerprints. Many Wi-Fi RSS based positioning techniques have been developed recently for indoor posi-tioning purposes, but the positioning accuracy faces many challenges, including the high noise to signal ratio. In this paper, we consider two remarkable elements affecting the positioning performance: the slow attenuation of the sig-nal strength, and the large measurement noise. We pro-pose a novel approach to locating a target object in a given area by introducing a denoising algorithm based on the local linearity of the signal-location manifolds. This is implemented with a fixed set of linearization weights de-termined not by the signal values but by the relationships of the locations of the fingerprint samples. We also ex-plore the relations between the prediction error and the manifold curvature, the number of APs used for position-ing, and the signal noise level, characterizing the quality of the nearest point estimation with the signal measurement errors. A simple algorithm is presented to locate the target using the k-nearest neighbors in the signal space. Simulations in

various settings demonstrate the effective-ness of the proposed approach. Article ID: 70154 Title: Traffic Flow Assignment with Weight for Resource Allocation on The Restorable Network Name: Shin-Jer Yang Affiliation: Dept. of Computer Science and Information Management, Soochow University, Taipei, Taiwan E-mail: [email protected] Abstract Let G(N, L) be a network with n nodes and m links such that each node u has a weight w(u) and each link e has a flow upper bound fu(e) and a flow lower bound fl(e). Consider the situation where many source-destination s-d routing paths exist over the network G. If some link e has failed, then the routing path through e must be rerouted accordingly. The rerouting and recovery will be performed by one of the two owners of the path and the network G must be restorable from the link failure quickly. We propose an efficient and heuristic FARN algorithm for solving this problem and alleviating congestion control on the TCP/IP-based networks. Then, we can utilize the FARN with Greedy Heuristics algorithm to effectively tune and adjust the flow assignments of each link. Also, we make performance simulations to obtain better performance on the IP-based MANET. Meanwhile, we can employ our pro-posed FARN scheme to real-time system and solve QoS issues of links between clients and servers on the Cloud computing. Article ID: 70156 Title: Sdn-Based Energy-Saving Scheme for Fiber-Wireless Network Name: Shuai Li Affiliation: Beijing University of Posts and Telecommunications E-mail: [email protected] Abstract With the development of science technology and information technology, the network scale has been

Page 46:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

46 WiCOM 2015 Conference Guide

growing rapidly and the energy consumption is too huge to be ignored. Current estimates indicate that Information and Communication Technology (ICT) is responsible for a fraction of the word energy consumption ranging between 1% and 2%,among which, the consumption in access network is a major component. Currently Fiber-Wireless (FiWi) access network ,combining the flexibility, ubiquity and mobility of wireless access network with ro-bustness and high capacity support of the optical access network, is one of the research hotpots. In this paper, combining with the OpenFlow technology in Software Define Network (SDN), we propose a SDN-based energy-saving scheme for FiWi access network, which imple-ments the energy-saving from the global perspective. Si-mulation results have showed that the proposed energy-saving scheme can gain more effective energy-saving, which proves its validity and offer a reference for research and implementation of future integrated networks. Article ID: 70158 Title: Improved Hard-Decision Fusion Algorithm Against SSDF in Cognitive Radio Networks Name: Ting Peng Affiliation: Yunnan University of Nationalities E-mail: [email protected] Abstract In the existing cooperative spectrum sensing, fusion centers (FC) fuses these data received from cognitive users (CUs) without screening, which provides more opportunities for malicious users (MUs) hiding in the legal users to launch spectrum sensing data falsification (SSDF) attacks, SSDF easily mislead the FC to make incorrect decisions, resulting in reducing accuracy of spectrum detection. So, in order to deal with SSDF, an improved hard-decision fusion algorithm was proposed, which adopts the mechanism that FC just fuses parts of results reported by CUs preferentially and the remaining users take supplement for decision in order to reduce the opportunities for MUs to take participate in the cooperation. Besides, through comparing the CUs’ reputations updated according to their history behaviors, FC selects reliable users’ data to fuse with the object of ensuring the reliability of the data. Simulation also verified

the effectiveness of the improved algorithm proposed on defending against SSDF attacks. Article ID: 70159 Title: Cooperative Sensing of Improved Energy Detector Based on Minimum Bayes Risk Name: YangZheng Zheng Affiliation: Yunnan University of Nationalities E-mail: [email protected] Abstract In cognitive radio networks, the improved energy detector is a very useful detector for the random signals corrupted by Gauss noise. In the single node sensing, we research the change of p values which has impacted on system performance under certain signal to noise ratio and obtain the optimal p values making the Bayes risk minimum. In the cooperative spectrum sensing, we use "K-out-of-N" rule and when the rule of K is a certain value, research the change of p values impact on the system performance, as well as the effect of system performance by changing K values. Theoretical analysis and simulation results show that the optimal K value, and p value are existed in cooperative spectrum sensing networks, contrast to the conventional energy detector improved energy detectors make system performance optimized. Article ID: 70160 Title: Research on Localization Algorithm for Wsns Based on Improved RSSI Name: Yongsheng Zhao Affiliation: Harbin Engineering University E-mail: [email protected] Abstract It is particularly important that the location information of sensor network node is accurately obtained with the widely application of Wireless Sensor Network. In this paper, the process of determining the location of the nodes is divided into three stages which are initialization, localization and optimization. In stage of initialization, considering the location method simulation of distance

Page 47:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

47 WiCOM 2015 Conference Guide

measurement based on Received Signal Strength Indication(RSSI), the paper presents the line deviate rates judging criterion and the three-nodes mobility model solution to extend network coverage on the existing problems of large location deviation and unable to locate. In stage of localization, to improve the network location accuracy, the local search algorithm is adopted to select the optimal combination of the known nodes, and use the least square principle to calculate the unknown nodes’ localization. In stage of optimization, weighted centroid algorithm is adopted to estimate the unknown node location in which weights come from multiple sets of Geometric Dilution of Precision(GDOP). Simulation results verifies that the presented method can significantly improve the network coverage and location accuracy. Article ID: 70162 Title: A Distributed Flow Control for Mission-Oriented Wireless Multimedia Networks Using Cooperative Communications Name: Yi Chen Affiliation: Huazhong Normal University E-mail: [email protected] Abstract This paper proposes a novel and efficient distributed flow control for wireless multimedia networks using coopera-tive communications, based on the Proportional Integral (PI) controllers. The control parameters can be designed to ensure the stability of the control loop in terms of source rate. The distributed explicit rate controller is located at the wireless multimedia sensor source to regulate the transmission rate for mission. We further analyse the theoretical aspects of the proposed algorithm. Simulation results demonstrate the efficiency of the proposed scheme in terms of system stability, fast response, and high efficiency for mission-oriented multimedia systems. Simulation results show that the performance of our scheme is improved more than 10% when compared with other method. Article ID: 70164 Title: Fast Compressive Tracking Based on

Multi-Feature Weighted Appearance Model Name: Bai Meijuan Affiliation: Taiyuan University of Science and Technology E-mail: [email protected] Abstract Visual tracking is a hot but challenging research direction in computer vision field. The appearance of target changes continuously over space and time, which makes it difficult to develop a robust and efficient tracking algorithm. Most existing tracking algorithms describe the target with single feature which may make the tracker easily influenced by various intrinsic and extrinsic changes and even lead to trace failure. In this paper, in order to describe the complex changes of the target and background in real scene more accurately and to improve the flexibility of statistical model, an effective and efficient tracking algorithm is proposed based on an appearance model of weighted multiple features extracted from blocked images in the compressed domain. Two complementary matrices are generated to measure multi-dimension intensity and texture features. Mahalanobis distance is employed as the weights of the various features. Then a naive Bayesian classifier is utilized to make a binary classification for the candidates. A coarse-to-fine search strategy is adopted to reduce the computational complexity. Experimental results demon-strated that the robustness and accuracy of our algorithm are greatly improved compared with several state-of-the-art tracking algorithms. Article ID: 70166 Title: A Novel Wireless Distribution Network Application to Support Further Internet of Energy Name: Bin Li Affiliation: North China Electric Power University E-mail: [email protected] Abstract A wireless distribution implementation of smart distribu-tion network is presented in this paper, and this is com-monly thought as one of the key technologies of Internet of Energy. Several communication technologies that ap-plied in the power distribution are analyzed, and

Page 48:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

48 WiCOM 2015 Conference Guide

the wire-less distribution network (WDN) is designed with the software defined network concept, the control plane is used as a common network manager for the distributed network devices. The architecture of SDN platform that integrate wireless communication device is presented un-der multi-agent approach. The public and private wireless network for distribution network are discussed and com-pared, and the experimental results of both direct access and WDN with different diversity are illustrated. Article ID: 70168 Title: Interface-Aware Ldpc Codes for Millimeter Wave Communication Systems Name: Peipei Li Affiliation: Shanghai Institute of Microsystem and Information E-mail: [email protected] Abstract Millimeter wave communication is a main solution for the high speed backhaul and ultra-high speed access trans-mission. This paper presented the interface-aware LDPC codes in the millimeter-wave system to support high-speed Ethernet interfaces and reduce the conversion delay. Con-sidering constraints of the encoded codeword length of 1G to 100G Ethernet physical layer, LDPC(196, 120), LDPC(588, 528), LDPC(1197, 1089) codes on the basis of 1G, 10G and 100G Ethernet interface were designed to reach low latency in the channel coding process. The sim-ulation results claimed that the interface-aware LDPC codes have an excellent performance and the minimum processing delay in the system, taking encoding delay and decoding delay into consideration. The encoding delay of 0.58~1.17us and the decoding delay of 3.20~4.26us could meet the code rate for the different channels in Ethernet interfaces. Article ID: 70169 Title: A New Frequency Estimator of Sinusoid Based on Interpolated FFT Name: Lei Fan Affiliation: Dalian Maritime University E-mail: [email protected]

Abstract A new frequency estimator of sinusoid based on interpo-lated FFT amplitudes is proposed. Firstly, zeros of length N are padded to the sinusoid sampled data of length N in the time domain. Next, 2N-point FFT is performed and the coarse estimation is made by searching the location of the spectrum line with maximum amplitude. Finally, the fine estimation is made by utilizing the amplitudes of the spectrum line with maximum amplitude and its two neighbors. Simulation results show that the root mean square error of frequency estimation of proposed estimator is close to the Cramer-Rao Lower Bound when the signal frequency locates anywhere between two neighboring FFT spectral lines. The proposed method has low computation complexity and outperforms the existing estimators. Article ID: 70172 Title: Enhanced Cell Broadcast for Streets in Vehicular Ad-Hoc Networks Name: Abderezak Touzene Affiliation: Sultan Qaboos University E-mail: [email protected] Abstract Vehicular Ad-hoc Network (VANET) is an emerging technology which allows vehicles on the roads to communicate and exchange information with each other. Broadcast in VANET is have gained a lot of attention because it is used extensively in many VANET applications. Recently, Cell Broadcast for streets (CB-S) [1], a cell based algorithm has been proposed and compared favorably to different class of broadcast in VANET. This paper proposes an enhanced version of CB-S called ECB-S which addresses CB-S limitations in selecting rebroadcast nodes only within any other cell and enhance it to include also any node reachable within the transmission range. Simulation study shows that ECB-S outperform considerably the original CB-S in terms of end-to-end delay under different traffic, density, and mobility conditions. Article ID: 70175

Page 49:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

49 WiCOM 2015 Conference Guide

Title: Design of A Mobile Campus Portal in Big Data Environment Name: Dandan Hong Affiliation: Xi'an Jiaotong University E-mail: [email protected] Abstract In order to fulfill the requirements of mobile computing and big data environments, we design a mobile campus portal (MCP) providing mobile information services for users in both browser/server and client/server modes. We present the topological structure of MCP, system infra-structure, application architecture and the data manage-ment (such as data integration, data format translation, data security control and so on) of our mobile campus portal in this paper. After online running in the past two years, our MCP has received good feedbacks from mobile users. In the future, we will focus on the research of data-mining technologies in our big data environment. Article ID: 70178 Title: Sparse Fourier Transform Based Millimeter Wave Wideband Spectrum Sensing Name: Meili Na Affiliation: Shanghai Institute of Microsystem and Information E-mail: [email protected] Abstract This paper presents a wideband spectrum sensing methods based on the sparse fast Fourier transform applying for E-band, which can capture spectrum in real-time without sampling the signal at the Nyquist rate. Our approach builds on recent advances in the area of sparse Fourier transform. At first, we convert the signal of E-band to the baseband, and then sample the wide baseband signal at a low sampling rate, obtaining a small subset of the original signal samples. Finally the spectrum of the wideband signal is recovered using the sparse Fourier transform. The required sampling rate can be reduced to about 10% of the conventional FFT methods required. Meanwhile, it improves operational efficiency, and makes it possible to sense in real-time. MATLAB is used to demonstrate the

feasibility of this design. This algorithm has an extremely low rate of false negatives when the spectrum occupancy is sparse and proposes solutions even in scenarios where the spectrum is not sparse. Article ID: 70180 Title: Power Allocation Optimization for D2D Communication Underlaying Cognitive Full Duplex Relay Networks Name: Long Liu Affiliation: Beijing University of Posts and Telecommunications E-mail: [email protected] Abstract This paper investigates the joint use of full-duplex relay (FDR) and Device-to-Device (D2D) communication in cognitive wireless networks (CWNs). FDR not only in-creases the time-frequency efficiency by the time-frequency reuse compared to half-duplex relay (HDR), but also expands the network coverage by the use of the relay. In addition, D2D can enhance the wireless resource efficiency and achieve high data rates and network throughput. In the paper, we use jointly D2D and FDR to propose a new CWN model, in which the D2D link under-lays the FDR link in secondary networks and D2D trans-mitter is arranged as a FDR node to assist the transmission between secondary users. Then we optimize the rates of the D2D link, namely improve the secondary network throughput by the transmission powers allocation of the secondary transmitter and the FDR node in the case that the good FDR link communication situation in secondary networks is guaranteed and the secondary network doesn't interfere the primary network. The simulation re-sults demonstrate that the proposed D2D communication underlaying cognitive full-duplex relay network outper-forms the traditional CWNs and ones applying HDR and D2D in the secondary network throughput. Article ID: 70182 Title: From Architecture to Implementation for IEEE 802.11s Wireless Mesh Networks

Page 50:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

50 WiCOM 2015 Conference Guide

Name: Jianming Cheng Affiliation: Beijing University of Posts and Telecommunications E-mail: [email protected] Abstract In this paper, an optional architecture of wireless mesh networks based on the IEEE 802.11s draft is proposed and implemented which aims at providing a low-cost, secure and wide-range wireless WLAN-mesh network in the real life. In order to validate the security and practicality of the new architecture, a testbed is deployed which consists of six mesh access points (MAPs) and one mesh portal point (MPP). Every single node is designed on cortex-A8 E210COREV2 core-board. Linux Operation System (OS) is chosen as the operation platform in which some software for mesh networking such as dynamic host configuration protocol (DHCP) and network address translation (NAT) are migrated after modifying and tailoring the source codes. Test data traffic is analyzed to make sure the security of two-factor authentication. Besides, test results also demonstrate that the throughput of the deployed testbed approaches 4Mbps and the accessing rate can reach up to 10Mbps in the central part. And above all, the proposed WMN can provide a last-mile access and the cost of each node is only $90. Article ID: 70185 Title: An Implementation of Multi-domain Software Defined Networking Name: Zhengxin Guo Affiliation: Beijing University of Posts and Telecommunications E-mail: [email protected] Abstract Software Defined Network (SDN) is an emerging archi-tecture which can simplify network management and enable innovation through network programmability by decoupling the control plan and the data plan of the network. However, traditional SDN architecture is not suitable for all cases, a single controller may become a performance bottleneck in a wide area network. While current multiple controller solutions always make the

network more complex and harder to be managed than traditional SDN network. In this paper, we proposed a new architecture for multi-domain software defined networks, which divided the control platform into two layer vertically. The bottom layer consists of local con-trollers, which only has the knowledge of the local do-main it controls. And the top layer is coordinating con-troller controlling all local controllers. The communi-cations between local controllers and coordinating controller use a standard NBI as communication proto-col which is also the protocol used when controllers (both local controllers and coordinate controllers) communicate with applications. We implemented the architecture and our evaluations show the feasibility of it. Article ID: 70187 Title: Zigbee Transmission System for Wearable Ecg Device Based on Compressed Sensing Name: Xin Wu Affiliation: School of Electrical and Electronic Engineering E-mail: [email protected] Abstract Electrocardiogram (ECG) measurement is an important part of wearable medical devices due to steady time of ECG signal acquisition and transmission through wireless system, therefore, reduce the amount of data transmission is very necessary. In this paper,The wearable medical devices ECG data processing based on compressive sensing theory is discussed. Based on the characteristics of ECG signal itself, the related operations with standard signal is proposed, so that the data can be compressed efficiently. The simulation results confirm the effectiveness of the algorithm. Article ID: 70188 Title: A Qos Based Data Gathering Framework for Multi-Hop Surveillance System Name: Chong Tan Affiliation: Shanghai Institute of Microsystem and Information E-mail: [email protected]

Page 51:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

51 WiCOM 2015 Conference Guide

Abstract Nowadays, multi-hop communication systems are often applied in power transmission system to transmit surveillance information to control center. In order to transmit surveillance data more efficiently, it is required to design the communication system with low latency and high reliability. This paper provides a novel data transmission framework along with a QoS provisioning multi-hop routing scheme for in smart grid. During normal data transmission period, all the nodes along the power line are divided into two groups. At one time slot, a group of nodes is considered as the sender and the other nodes are considered as the receiver. At the next time slot, we exchange the roles between these two groups of nodes. To avoid the wireless interference, we allocate the spectrum among these sensors and minimize the number of sub-channel. When urgency occurred, node with the emergency information can select a relay node within its maximum transmission range according to the delay requirement. The simulation results are given to show the efficiency of our data gather framework. Article ID: 70189 Title: An Enhanced GHSOM for the Intrusion Detection Name: Hongbo Shi Affiliation: Tokyo Metropolitan University E-mail: [email protected] Abstract According to the improvement of data mining technologies, big data now is a hot topic in various areas, such as Internet, finance, healthcare etc. As well as known, big data is collected and accumulated across a wide variety of fields fast and in real time. It is very important to find the structure from big data. In this paper, we focus on the neural network algorithm, Growing Hierarchical Self-Organizing Maps (GHSOM). GHSOM is considered that it can provide structured clustering. However, the hierarchical growing mechanism of GHSOM is faulty. This paper proposes a new enhanced GHSOM, called sGHSOM. sGHSOM solves the issue of the growing mechanism in GHSOM. We use the KDD Cup 1999 Data as the benchmark for estimating the performance of

sGHSOM. The experiment results show that sGHSOM has a higher precision than GHSOM on classification. Furthermore, this paper uses actual measured DNS queries to show that sGHSOM can visualize the structure of DNS queries in time series exactly for detecting infected computers comparing with GHSOM. Article ID: 70190 Title: Bandwidth-Satisfied Relay-Selection Scheme For Wireless Multicast Networks with Cooperative Communications Name: Yi Chen Affiliation: Huazhong Normal University E-mail: [email protected] Abstract Cooperative communication is an efficient technology to achieve high bandwidth demands and wide error-prone client coverage. However, the previous cooperative mul-ticast protocols suffer from bandwidth-violation problem while selecting relay nodes, namely, the cooperative hid-den route problem (CHRP) by distributed protocols in wireless multicast networks. In this paper, a novel relay selection algorithm that can avoid the CHRP is proposed, and a bandwidth-satisfied multicast cooperative relay selection scheme is constructed. Moreover, to optimize the cooperative performance, we provide theory analysis for selecting a relay. Simulations results show that the pro-posed algorithm can efficiently mitigate multicast trans-mission errors and improve network throughput in a dis-tributed wireless environment by more than 10%. Article ID: 70191 Title: New Hybrid Routing Method in Military Vehicular Ad Hoc Network Name: Jiaqing Qu Affiliation: Shanghai Aerospace Bureau, Shanghai Radio Equipment Research Institute E-mail: [email protected] Abstract A military Vehicular Ad Hoc network (VANET) is a

Page 52:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

52 WiCOM 2015 Conference Guide

temporary autonomous communication system that consists of a group of vehicles which can routing and forwarding packets, in which there are no central vehicles or fixed communication infrastructures. All the vehicles in the network communicate with each other by two kinds of link, which is cable link and wireless link. We first summarize the research status of routing protocol for VANET, then we analyze the requirements that must be met for the military VANET routing protocols in the battle field environment, such as topology dynamic change, two kinds of link, bandwidth restriction of wireless channel, node mobility pattern, and etc. The connected matrix is used to describe cable and wireless link between vehicles, which is interacted in each round. After the node get connection topology of total network, the link weights is assigned by different kinds of link. Dijkstra algorithm is use to find the shortest paths between source and destination. The simulation result shows that our scheme can improve the efficiency and stability of military VANET. Article ID: 70192 Title: Parallel Programming Design of Bpsk Signal Demodulation Based on Cuda Name: Yandu LIU Affiliation: Equipment Academy E-mail: [email protected] Abstract Realizing digital signal demodulation on the general com-puter is an important research direction in the field of sig-nal processing in recent years. In this paper, the algorithm of BPSK signal demodulation which has high real-time requirements is researched on the general computer. Ac-cording to the characteristics of "CPU + GPU" heteroge-neous computing, the parallel computation model of digi-tal communication is put forward, and BPSK signal de-modulation is realized on CUDA platform. Test results show that the computing time ratio of 1:1.7, when Eb/N0=9.6dB the bit error rate can be achieved 10e-5 . Article ID: 70198 Title: Umcloud: A User-Oriented Security Scheme for

Mobile Cloud Storage Name: Hui Li Affiliation: School of Computer Science, Beijing University of Posts and Telecommunications E-mail: [email protected] Abstract In order to avoid data loss when user’s mobile device is stolen or lost, users are encouraged to use mobile cloud storage to transfer and store the data from mobile termi-nals to the cloud as a means of data backup. Although various encryption mechanisms have been proposed to protect the security in cloud side by cloud service provid-ers, the traditional cloud systems still cannot persuade the users that the data are securely protected if the secure mechanisms are not implemented by the user side. To prevent cloud service providers from leaking personal information, a security scheme implemented in the client side for mobile cloud storage with the name of UMCloud is proposed, the proposed scheme adopts a comprehensive mixture cryptosystem to provide protection of confidentiality and integrity for the storage of data in the cloud while supporting the sharing of the encrypted data among authorized users. Article ID: 70201 Title: Performance Analysis of Tikhonov Blind Multiuser Detector Name: Li Hu Affiliation: Hebei Normal University E-mail: [email protected] Abstract Blind multiuser detector can efficiently suppress multiple access interference (MAI) in code-division multiple-access (CDMA) system, with prior knowledge of only the signature sequence and timing of the desired user. For the Tikhonov blind multiuser detector, theoretical performance analysis has not been given, which is more convincing. We gave analytical performance in this paper, with the output signal-to-interference-plus-noise ratio (SINR) as the performance measure. At last, we gave some examples to show the effect of some parameters on the SINR performance.

Page 53:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

53 WiCOM 2015 Conference Guide

Article ID: 70202 Title: Study of Outdoor Signal Coverage and Network convergence of TD-LTE and TD-SCDMA in High-Speed Railway Name: Qun Hou Affiliation: Jianghan University E-mail: [email protected] Abstract This paper mainly introduces some related problems about special mobile communication signal based on TD-LTE and TD-SCDMA in high-speed railway, summaries the main difficulty of TD-LTE coverage in high-speed railway and analyses TD&LTE wireless network coverage characteristics and key technologies under the environment of high-speed railway. First, we make a contrast of the coverage range of TD&LTE uplink and downlink in ordinary situations. Then we calculate the 2G/3G/4G overlapping coverage lengths. Finally, we consider effective cover radius, the distance and grazing angle between stations and railway in 2G/3G/4G networks, calculate different distance between stations. The result shows that distance between stations is limited by LTE on sharing station address. Using single RRH with two antennas, the antenna height is 30m, and the speed of the train is 250KM/h, the RRH distance among different cells can be 1177m, and the RRH distance among same cells can be 1311m. As the reference of network planning, construction and optimizing, the coverage radius and station spacing in different standards calculated by this article will improve user perception and promote the brand value of China Mobile network. Article ID: 70204 Title: Cyclic Delay Diversity with Discrete-Hartley-Fourier Transform in Ofdm System Name: Lingyan Li Affiliation: Dalian Polytechnic University E-mail: [email protected] Abstract Cyclic Delay Diversity (CDD) is a simple approach to provide spatial diversity for Orthogonal Frequency Divi-sion Multiplexing (OFDM) system. CDD provides

not only the multipath diversity without channel coding but also a sample receiver structure. Discrete Hartley transform (DHT) as a linear precoding based OFDM outperforms the OFDM based on discrete Fourier transform (DFT) for it intrinsic frequency diversity. In this paper a simple scheme that DHFT-OFDM system with spatial multipath diversity by using CDD technique in the frequency selective fading channel is proposed. Simulation results are provided to validate the advantages of the proposed scheme that combining CDD with DHFT-OFDM system. Article ID: 70206 Title: Joint Effect of Channel Coding and AMR Compression on Speech Quality Name: Minh-Quang Nguyen Affiliation: Department of Wireless Network and Multimedia Service E-mail: [email protected] Abstract In this paper, we estimate the effect of joint Adaptive Multirate (AMR) compression and channel coding on quality of speech data. In our simulation, speech data is transferred over AWGN channel after performing 8 AMR codec modes (corresponding to 8 different compression rates) and 12 convolution code rates. The joint effect is estimated in the receiver by analyzing quality of received speech data by Mean Opinion Score. Our result shows that conventional scheme performing source coding and channel coding separately and sequentially does not guarantee obtaining the optimal solutions for speech data. Article ID: 70208 Title: A Novel Extraction Algorithm of Video Fingerprint Based-on Sparse Coding Name: Jie XU Affiliation: University of Electronic Science and Technology of China E-mail: [email protected] Abstract By learning property of human fingerprint in

Page 54:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

54 WiCOM 2015 Conference Guide

bioinfor-matics, we used SURF to extract frames’ features and handle them by visual vocabulary and word frequency analysis. Videos can be represented uniquely in this way. Based-on the theory of image sparse coding in mammal’s visual system, we used standard library to train sparse dictionary which can encode SURF features of frames. By dealing with nonzero value only, we found that the cost of storage and computation was reduced. The experiment and simulation showed that optimized result could maintain the robust of original features and has a good discrimination and accuracy. Article ID: 70209 Title: A Relaying Bandwidth Reservation Approach for The Data Oriented Transmission Service Name: Yang Yue Affiliation: State Grid Shenyang Electric Power Supply Company E-mail: [email protected] Abstract In this paper, a novel wireless relay algorithm is pro-posed to support newly appeared data flow. The relay node is integrated with new data forwarding capability. The most widely applied wireless sensor network is intro-duced with IEEE 802.15.4 which is a common lower layer of WIA and ZigBee. The bandwidth is reserved through the broadcasting beacon and direct diffusion approach. All the data flow is sent with low power mode, the advantage of proposed approach is not obvious compared with traditional approach. However, the reserved bandwidth ratio of can be modified to improve the performance. It is verified in the simulation platform and can be applied in the future network. Article ID: 70210 Title: A Novel Video Retrieval Algorithm based on Coarse-Grained and Fine-Grained Name: Xu Jie Affiliation: Key Lab of Optical Fiber Sensing and Communications (Ministry of Education) E-mail: [email protected]

Abstract In order to solve the balance problems between efficiency and accuracy encountered in content-based video retrieval, in this paper, we propose firstly a video retrieval scheme based on coarse granularity. To achieve the coarse-grained video retrieval, we use inverted index. Further, we expose an improved BLAST algorithm to realize fine-grained retrieval of video fingerprint. Finally, simulation results show the good efficiency and accuracy of the algorithm we proposed. Therefore, this algorithm provides effective technical support for the security regulation and quick retrieval of Internet video. Article ID: 70211 Title: A Primary User Emulation Attack with Motional Users in Cognitive Radio Networks Name: Kaiyuan Liu Affiliation: Yunnan University Of Nationalities E-mail: [email protected] Abstract In cognitive radio networks, malicious user (MU) sends a signal which is similar to the primary user’s (PU) signal, leading to the secondary user (SU) can’t access to the spectrum of communication networks, which is named primary user emulation attack (PUEA). In this paper, we first propose a cognitive radio networks model with motional users, while MU and SUs are made up of an approximation centralized cooperative sensing networks. The motional users include two SUs and a MU. When MU and SUs move in the certain range, MU could attack SUs heavily by adjusting its transmission power real-time. According to the proposed model , a PUEA scheme with motional users will be verified based on different HDF (Hard Decision Fusion). The simulation results show that the proposed PUEA with motional users is intelligent and stable. Article ID: 70213 Title: The Routing Protocol for High Data Collection Rate in Rechargeable Wireless Sensor Networks Name: D.M. Gao Affiliation: College of Information Science and

Page 55:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

55 WiCOM 2015 Conference Guide

Technology, Nanjing Forestry University, Nanjing, China E-mail: [email protected] Abstract In Rechargeable Wireless Sensor Networks(R-WSNs), it is critical for higher data collection rate because sensors have to operate in a very low duty cycle owing to sporadic availability of energy. Therefore, surplus energy of a node can be utilized for strengthening packet delivery efficiency and improving data collection rate for all sensors. In this work, we propose a distributed algorithm to compute the optimal data generation rate for maximizing the network throughput, which is formulated as a linear programming problem. Through extensive simulation and experiments, we demonstrate our algorithm is efficient to maximize data collection rate in rechargeable wireless sensor net-works. Article ID: 70216 Title: Robust Device-free Fall Detection Using Wireless PHY Layer Information Name: Guo Liu Affiliation: Wuhan University of Technology E-mail: [email protected] Abstract Fall is one of the main threats to the safety of the elderly living alone. However, the traditional fall detection systems, such as video-based or wearable-device based systems, are either intrusive to their daily life, or fragile to the ambient environment. Recent systems leveraging wireless Channel State Information (CSI) can avoid such drawbacks; however, most of them have not fully taken the dynamic environment factors into account, which makes them un-robust and hinders them from being applied in practice. In this work, we propose a robust and unobtrusive fall detection system using off-the-shelf Wi-Fi devices which gather fluctuant wireless signals as indicators of human actions. Specifically, we adopt a lightweight classifier to eliminate the "bad antennas" in CSI so that we can extract features from the best CSI stream; by which, the negative effects aroused by the dynamic surroundings can be removed. We also design a novel method to intercept the valid segment of signal of fall action by utilizing wavelet analysis and dynamic time window.

Finally, we implement a full robust device-free fall detection system based on the proposed novel methods. Experimental results show that our system is robust to the complex indoor radio frequency environments and achieves good performance. Article ID: 70217 Title: Interpretation and Classification of P-Series Recommendations in ITU-R Name: Li Wei Affiliation: SRRC E-mail: [email protected] Abstract As ITU-R Recommendations is widely implemented for countries all over the world, the role and status of ITU-R Recommendations are increasingly prominent in the field of radio engineering. ITU and ITU-R Study Groups are summarized. Furthermore, the operating mode of the third study group, and the input documents are interpreted in detail. Lastly, from both wireless system design and electromagnetic compatibility analysis perspective, all of 79 P-series Recommendations are analyzed and classified, and the main contents of each Recommendation summarized. The above research promote P-series Recommendations widely used in China. Article ID: 70222 Title: Improved DFT-Based Channel Estimation for Downlink LTE System with Adding Virtual Carrier Frequency Response Name: Hongyu Zhu Affiliation: Beijing University of Posts and Telecommunications E-mail: [email protected] Abstract In Long Term Evolution (LTE) systems, some subcarriers at the borders of the allocated bandwidth are known as virtual subcarriers which are not used for data transmission. Conventional DFT-based channel estimation methods encounter performance degradation due to low SNR and the edge effect caused by virtual subcarriers. Adding

Page 56:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

56 WiCOM 2015 Conference Guide

virtual carrier frequency responses (VCFR) properly at receivers is proved to be able to effectively mitigate edge effect. The proposed method adopts the VCFR addition method into practical downlink LTE systems to alleviate edge effect. A novel noise eliminating strategy based on energy detection is demonstrated in the proposed method to improve the overall performance especially in low SNR scenario. Compared with existing DFT-based channel estimation methods, simulation results of the proposed channel estimation method showed a relatively lower Mean Square Error (MSE) and raw Bit Error Rate (BER) under several kinds of standard channel models within wide SNR range. The proposed method is also proved to have roughly the same level of complexity as conventional DFT-based channel estimation method. Article ID: 70225 Title: An Improved Scheme for Dv-Hop in Wsns Name: Qinqin Shi Affiliation: School of Computer Science & Information Engineering, Shanghai Institute of Technology, Shanghai, China E-mail: [email protected] Abstract The node localization process of the traditional DV-Hop scheme is sensitive to the heterogeneity of network topology, and the robustness of the scheme is poor while the network topology is diversiform due to random node deployment. Aiming at such a problem, an improvement strategy is put forward, and different treatment algorithms are introduced in the distance estimation step and the position calculation step respectively, in order to improve the range accuracy of the whole network and then the node localization accuracy. Simulation shows that the improvement can obtain higher range accuracy than the original method in the first step, and then, it can improve the robustness of the original method to range error in the second step. On the whole, the improvement can obtain higher localization accuracy than the original method while the network topology and beacon proportion are variational.

Article ID: 70226 Title: An Initial Population Optimization-Based Particle Swarm Algorithm for Anti-Jamming Communication Decision Engines Name: Xianyang Hui Affiliation: PLA University of Science and Technology, China E-mail: [email protected] Abstract To improve the real-time performance of anti-jamming decision making, this paper proposes an initial population optimization particle swarm algorithm (IPO-PSO).This algorithm utilizes a portion of the solution from the previous decision as the initial population in the current decision; thus optimizing the adaptive quality of the initial population used for the current decision. The simulation results show that the proposed method can increase the convergence rate of the particle swarm optimization algorithm without increasing the complexity. Thus, this method provides impressive real-time performance and is ideally suited for demanding applications such as in military anti-jamming communications systems. Article ID: 70227 Title: A New Noise Mitigation Method Based on Normalization Time Frequency Peak Filtering in Broadband Power Line Communication System Name: Zhigang Qiu Affiliation: Yuncheng Power Surpply Company E-mail: [email protected] Abstract In the power line communication system(PLC), due to the commercial PLC modems feature low power transmission and the large amount of noise, the communication system has a very low signal to noise ratio(SNR) which seriously affects the reliability of the signal transmission. Considering the situation of low SNR, this paper presents a noise mitigation method based on normalization time-frequency peak filtering(NTFPF). NTFPF is a signal enhancement method based on the principle of instantaneous frequency estimation and signal normalization. In NTFPF, the observed noisy signal is

Page 57:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

57 WiCOM 2015 Conference Guide

firstly normalized and transformed to be processed into instantaneous frequency (IF) of the analysis signal by frequency modulation, and then the peak of time-frequency distribution of analysis signal is taken as the estimation of IF for the concentration of time frequency distribution of analysis signal along with IF. Numerical experiments have shown that the NTFPF method has a good performance in PLC system at low SNR. Article ID: 70228 Title: Improvement Research of Underwater Acoustic Sensor Network Routing Protocol Hhvbf Name: Chen Wang Affiliation: School of Computer Science and Technology,Tianjin E-mail: [email protected] Abstract This paper studies HHVBF routing protocol which based on the location information, proposed a Reliable HHVBF (RHHVBF) routing protocol. RHHVBF ensures the reliability of the entire link by ensuring the transmission reliability of each hop among the path from the source node to the destination node. We proposes Node by Node Channel Evaluation Model (NNCEM) to evaluation the link between nodes, based on which presents the Channel Status Evaluation Model (CSEM). We reference the cross-layer protocol designing principles, RHHVBF will consider the energy balance when selecting the next hop, which make the energy consumption of the network averagely and prolong the network lifetime. The paper realized the RHHVBF protocol in Aqua-Sim based on the NS2 simula-tion tools, then compared the RHHVBF with HHVBF on data transmission and energy efficiency. The simulation results show that the performance of RHHVBF has a significantly improvement in the above aspects than HHVBF. Article ID: 70229 Title: Weighted Average Consensus Based Distributed Compressive Spectrum Sensing Using Prior Parameter Exchange

Name: Jincheng Zhao Affiliation: Beijing university of Posts & Telecommunications E-mail: [email protected] Abstract In the existing distributed cooperative spectrum sensing schemes, cooperation based on consensus algorithms is a research hotspot. However,the existing methods haven’t embody the reliability difference among cognitive radio users, so there is an enormous scope to improve the accuracy. In this paper,we propose a weighted average consensus-based distributed compressive spectrum sensing (PE-WDCS) using prior parameter exchange. In this scheme, every secondary user (SU) recovers its local wideband signal with bayesian compressive sensing method,and then conducts information fusion with proposed weighted average consensus algorithm and finally obtains the wideband signal. Simulation results show that proposed algorithm has significant improvement compared with the existing approaches in the accuracy of wideband spectrum sensing. Article ID: 70230 Title: Capacity Improvement Via Co-Frequency Small Cells Network Name: Qing Zhang Affiliation: China Unicom Network Technology Research Institute E-mail: [email protected] Abstract Due to the situation that the mobile data traffic grows rapidly and users continue to improve the quality of ser-vice requirements, the operators that lack of part of the spectrum resources make a weak response. While precise deployment with the same frequency small cell in the macro cell is a better solution. In this paper, the network analysis and verification result was shown which is in use of the system-level simulation and LTE network has been in commercial use. Although the macro and micro de-ployment in the same frequency increase the network interference, it’s still able to obtain substantial capacity gains. Additionally, this paper analysed the necessity for

Page 58:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

58 WiCOM 2015 Conference Guide

operators to deploy small cell in the same frequency, and offered the specific suggestion of implement from the operators’ view. Article ID: 70233 Title: Joint Optimal Congestion Control and Power Allocation for MCMR Mesh Networks Based on Stochastic Programming Name: Kewei Li Affiliation: Wuhan Second Ship Design and Research Institute E-mail: [email protected] Abstract A stochastic model for joint optimal congestion control and power allocation in multi-radio multi-channel wireless mesh networks is proposed. The design problem characterizes the stochastic traffic of the network data flows and the capacity of radio channels in multi-channel multi-radio wireless mesh networks as some random variables. The corresponding design problem is formulated as the stochastic network utility maximi- zation problem subject to some stochastic constrains, which is a chance constrained programming. The genetic algorithm is used to solve this stochastic maximization problem. The simulation is conducted in the Hyacinth network, and the result shows the quantitative relationship between the network performance and the confidence level. Article ID: 70240 Title: Capacity Analysis and Information Optimization of WSDM Name: Yufan Cao Affiliation: Department of Wireless Communications, PLA University of Science and Technology E-mail: [email protected] Abstract Wireless statistic division multiplexing (WSDM) is a multiplexing scheme that transmits multiple signals simultaneously in the same frequency band over wireless channels. Based on the Shannon capacity of band-limited waveform AWGN channel with input power constraint, we

obtain channel capacity of WSDM. Compared to time division multiplexing (TDM), frequency division multiplexing (FDM), and code division multiplexing (CDM), WSDM is more effective in raising spectrum efficiency. What’s more, we propose information optimization method to separate time-frequency mixed signals. Computer simulations also verify the proposed method is feasible and perform better than traditional algorithms. Article ID: 70243 Title: Energy-Efficient Analysis of Cooperative Spectrum Sensing in CRN Name: Jingwei Liang Affiliation: Nanjing University of Posts and Telecommunications E-mail: [email protected] Abstract Cognitive radio is a promising technology to solve the shortage of spectrum resource. As sensing nodes of the network, secondary users are usually battery powered. Making full use of the energy should also be considered while designing the network. In this paper, we consider the overall throughput of the system and energy consumption. We propose a model of throughput and energy consump-tion to discuss the influences of sensing time and number of secondary users, and analyze the existence of an opti-mal point that get the maximum value of energy efficien-cy. Simulation results show that there always have the optimal point in different fusion rules. Cognitive radio network design based on energy efficiency consideration is feasible. Article ID: 70244 Title: Spectrum Allocation based on Clustering in Femtocell Networks Name: S.Y. Zhou Affiliation: Key Laboratory of Mobile Communication in Chongqing University of Posts and Telecommunications, Chongqing E-mail: [email protected]

Page 59:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

59 WiCOM 2015 Conference Guide

Abstract Aiming at allocating resources to eliminate inter-femtocell collision interference, a spectrum allocation strategy SAC (spectrum allocation based on clustering) for OFDMA (orthogonal frequency division multiple access) downlink femtocell networks was proposed. In SAC, a cluster was taken as the unit for frequency reuse among femtocells and the FGW (femto gateway) was responsible for clustering and resource allocation. At first, the FGW constructed an interference graph by mapping femtocells onto vertices and interference collision relationship between femtocells onto edges in the graph; then, according to the degree and saturation degree of vertices, femtocells connected in the graph were divided into different clusters; finally, the FGW assigned different available spectrum to each cluster. Simulation results show that compared to UFR (universal frequency reuse), SAC provides higher average user spectral efficiency and lower network outage probability. The increment of FBS (femto base station) number leads to the reduction of network per-formance but it has less impact on SAC than UFR. Article ID: 70246 Title: Online Anomaly Detection on Electronic Commerce based on Variable-Length Behavior Sequence Name: Weihui Zhu Affiliation: National University of Defense Technology E-mail: [email protected] Abstract User behavior-based anomaly detection is currently one of the major concerns of system security research. For e-commerce, this paper proposes an online anomaly detection method, based on variable-length sequences of user behavior. The algorithm includes a training stage and a detection stage. In the training stage, we mainly use the variable-length sequences to represent the correlation be-tween the contiguous operations, and also the correlation between the related items. It makes the representation ability of our model stronger. In the detection stage, in consideration of the legitimate user’s behavior patterns likely having a deviation from normal behavior patterns and the illegitimate user’s behavior

patterns likely being consistent with normal behavior patterns in short time, we use a windowed smooth approach to avoid such problems affecting the result when the decision value is calculated. Meanwhile, we calculate the IDF-value of every pattern in the normal user behavior pattern database, and then the pattern whose IDF-value is below the threshold would be ignored in the detection stage (The lower the IDF-value, the lower the degree of recognition). Experimental results show that our algorithm can detect anomaly in real time effectively, and could meet the needs of real-time process both in accuracy and speed. Article ID: 70247 Title: Data Fusion Mechanism based on Wavelet for Opportunistic Sensor Networks Name: Xuyan Luo Affiliation: NanChang HangKong University E-mail: [email protected] Abstract As the energy of the node is limited, and the high data redundancy during collecting CM(Connectivity Parameters). To reduce the redundancy and save the network resources, this paper proposed DFMW(Data Fusion Mechanism Based On Wavelet For Opportunistic Sensor Networks). DFMW, compresses the parameters by HFCSA(High Frequency Coefficients Selected Algorithm), which excludes the unnecessary high frequency coefficients generated from the wavelet decomposes the discrete CM sequences. DFMW uses the MSE(Mean Square Error) to control the accuracy of reconstruction, and the result shows it can lower the error of reconstruction. Article ID: 70250 Title: Ovqms: A Passive and Adaptive System for Over-The-Top Video Quality Monitoring Name: Changtong Che Affiliation: State Key Laboratory of Networking and Switching Technology E-mail: [email protected] Abstract

Page 60:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

60 WiCOM 2015 Conference Guide

In recent years, due to the huge demand for over-the-top (OTT) video, operators are aware of the importance of improving the quality of experience (QoE). In this paper, we present anOver-the-top Video Quality Monitoringsystem(OVQMS)formeasuringOTT videotransmission and playback quality. Indicators (e.g. buffering ratio,rate of buffering) are calculated by analyzing the HTTP stream and the attributes of the video itself(e.g. bitrate, framerate), which is superiorto traditional tools. Besides, a passive packet capturemechanism is providedto minimize user perception.Meanwhile, adaptivesystem architecture isdesigned to identify various video operators,matchingdifferent HTTP content. Experimentsdemonstrate that OVQMS measuresOTT video indicators objectively and efficiently. Article ID: 70251 Title: A Two-Dimensional Doa Estimation Algorithm Based on Propagator for Monostatic Mimo Radar Name: Bobo Fu Affiliation: Zhengzhou Institute of Information Science and Technology, China E-mail: [email protected] Abstract In Multiple input multiple output(MIMO)radar, for the practical degradation performance of traditional method for 2-D direction of Arrival(DOA) estimation in the low signal to noise ratio(SNR) or in small number of snapshots environment, a 2-D DOA estimation algorithm based on propagator is proposed in this paper. The conjugate data reconstruction thought is applied to estimate the propagation operator and the rotation invariance of the propagator is used in direction matrix estimation, and then the 2-D angles information is obtained by the direction matrix, with the matrix change and structure feature, elevation and azimuth angles are automatically matched. The algorithm performs well in low SNR and limited snapshot situation. Effectiveness of the proposed algorithm is demonstrated by simulation experiment results.

Article ID: 70252 Title: High Rate Transmit Diversity Assisted Space Shift Keying Modulation over MIMO Channels Name: Yuanchao Han Affiliation: University of Electronic Science and Technology of China E-mail: [email protected] Abstract Abstract—Space shift keying (SSK) modulation is a newly emerging transmission technology for multiple-input multipleoutput (MIMO) wireless systems. In this paper, we propose a novel high rate transmit diversity assisted space shift keying (HT-SSK) modulation scheme to achieve the transmit diversity gain over SSK system with high spectrum efficiency. We first apply antenna shift method at each time slot to achieve transmit diversity with L time slots. Then, we use the different transmit signal combinations of L time slots to convey the additional n log2 cL information bits, where c is the number of transmit symbols in total. Thus, the proposed HT-SSK modulation scheme achieves higher spectrum efficiency than conventional transmit diversity assisted space shift keying modulation scheme, while achieves the same transmit diversity gain with small performance loss. Simulation results show that the proposed HT-SSK scheme provides significant performance gain than SSK modulation scheme with the same spectrum efficiency. It also outperforms the conventional spatial modulation (SM) scheme. Article ID: 70253 Title: Slnr Based Cascaded Interference Align Precoding in Comp Name: Sheng Wang Affiliation: Zhengzhou Institute of Information Science and Technology, Zhengzhou, P.R. China E-mail: [email protected] Abstract In this paper, an SLNR based cascaded interference align precoding algorithm is proposed according to the study on interference suppression in downlink coordinated multi-point transmission system. In this algorithm,

Page 61:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

61 WiCOM 2015 Conference Guide

cascaded precoding is adopted rather than delivering channel state information (CSI) among cells to deal with inter and inner cell interference stage by stage. In the first stage, interferences from different cells are aligned to the orthogonal space of receiving matrix of the expected cell, so that interference to the expected cell can be avoided. In the second stage, SLNR precoding is adopted to suppress the interferences among users within a cell. Simulation results indicate that the proposed algorithm improves the system capacity, reduces the bit error rate, and overcomes the limitation that the amount of online users within a cell. Article ID: 70254 Title: Robust Algorithm of Multi-signals Separation for Wideband Spectrum Sensing of Cognitive Radios Name: Wang Yang Affiliation: Information Engineering University E-mail: [email protected] Abstract An analysis for wideband spectrum sensing of many primary users active in cognitive radios has been presented. The spectrum holes occur while all the signals in wide band are detected and separated. This paper focuses on the multi-signals separation problem while the signal number is uncertain and the noise floor spectrum is non-flat. The wideband spectrum is recursivelydivided into smaller scale spectrums until all the signals in wide band is detected and separated. A FSM is built with six states from the energy characteristic of signal spectrum sharp to detect and separate a single signal, and detection processing is transitions of the state. The signal can be detected and separated by FSM. At last, the simulations and experiments validate the study. Article ID: 70258 Title: Downlink Channel Estimation Based on Block-Structured Compress Sensing for Multi-Cell Massive Mimo Systems Name: Yaojiang Yu Affiliation: Key Laboratory of Universal Wireless Communications, Beijing University of Posts and Telecommunications

E-mail: [email protected] Abstract This paper addresses the problem of channel estimation in multi-cell massive MIMO systems. The channels as observed different antennas in the same cell have approximately sparsity and common support, and the sparsity and common support properties draw more and more attentions when it comes to the efficient estimation of large number of channels in massive MIMO systems. The short channel coherence times limits the upper length of the pilot sequence used for channel estimation. So it is impossible to allocate the unique pilot sequence for the different users in all the cells and the pilot sequence is reused in different cells which results in pilot contamination. To avoid the pilot contamination in multi-cell, we use the hadamard matrix to orthogonalize the pilot in adjacent cell. The coordinated approach improves channel estimation and eliminates the pilot contamination in adjacent cell. Extensive simulation results are provided to demonstrate the performance of the proposed algorithms. Article ID: 70259 Title: A Monolithic Sige Bicmos Power Amplifier for UHF RFID Application Name: Ying Ruan Affiliation: Shanghai University of Electric Power E-mail: [email protected] Abstract A monolithic power amplifier (PA) is designed and implemented for UHF RFID Reader. The presented PA is based on 0.18um SiGe BiCMOS process and its working band is between 860MHz and 960MHz.It is a linear class AB type with two stages and all the biasing, the power and the matching circuits are on a single chip which area is 1.1mm×0.9mm.The on-chip test results show that small signal-gain is above 23dB,the input return loss and the output return loss is less than -21dB and -15dB, respectively. Also the test result indicate the pro-posed PA has an output 1dB compression point of 23.3dBm, a PAE of 27% and a power gain of above 23dB.

Page 62:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

62 WiCOM 2015 Conference Guide

Article ID: 70261 Title: Implementation of Earthquake Early Warning System Based on Support Vector Machine and Fuzzy Inference Name: Shiann-Tsong Sheu, Wei-Hung Wang Affiliation: National Central University E-mail: [email protected], [email protected] Abstract Taiwan is located in a seismically active zone and faces the problem of a large number of earthquakes. Many disastrous earthquakes usually cause the loss of lives and properties over the years. Therefore, how to design a series of preventative measures and reduce the risk of damages caused by earthquakes is an important issue. So far we still do not have a better way to get earthquake warning immediately. In this paper, we review the earthquake ear-ly warning system (EEWS) from the new vision, and pro-pose a new algorithm and architecture of the EEWS named as the EQ-system. The EQ-system is divided into hardware part and software part. The hardware part is a G-sensor for detection. Software part is a library of earth-quake early warning called LibEQ. LibEQ combines sev-eral theories such as Support Vector Machine, Fuzzy In-ference and so on. We can build a biggest earthquake detection network with low cost. People can get earth-quake alarm by APP. Consequently, for earthquake early warning, EQ-system can produce the best possible results. Article ID: 70262 Title: DDoS Attack Detection Using Packet Size Interval Name: Lu Zhou Affiliation: School of Mathematics and Computer Science Wuhan Polytechnic University E-mail: [email protected] Abstract Distributed Denial-of-Service (DDoS) attacks are a great threat to the Internet. Enabling accurately detection of Distribute Denial-of-Service attacks is important because it is the foundation of defense against the attacks. In this

paper, we focus on the distribution difference of the packet size between normal traffic flows and attack traffic flows and propose an entropy-based detection measurement. The measurement can highlights the characteristics of attack traffic. The experimental results show that the proposed measurement can effectively and clearly distinguish attack flows from normal flows in both low and high packet rate. Article ID: 70263 Title: Reducing Signaling Cost of Location Management in Cellular Network Using Fuzzy Logic Controller Name: Shiann-Tsong Sheu Affiliation: Department of Communication Engineering, National Central University E-mail: [email protected] Abstract The aim of mobility management is to track the location of user equipment (UE). Many location management methods have been proposed and they could be classified into several categories: the distance based method, time based method, and movement based method.These methods only consider the mobility of UEs. When the telephonic traffic increases, the performance of these methods may decrease significantly. In this paper, we propose an efficient schemewhich treats user's telephonic traffic as an essential factor to allocate a proper tracking area(TA) code for a specific UE. Using parameter estimation to estimate telephonic traffic and fuzzy logic controller decide size of tracking area. With these methods we can find a TA allocation strategy to minimize the signaling cost of paging and TAU (Tracking Area Update). Article ID: 70264 Title: A Step Further of Pdr-Based Jammer Localization through Dynamic Power Adaptation Name: Qiping Wang Affiliation: College of Communications Engineering, PLA University E-mail: [email protected] Abstract

Page 63:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

63 WiCOM 2015 Conference Guide

To apply further anti-jamming methods efficiently, re-searchers have proposed many jammer localization schemes in recent years. Among them, Packet Delivery Ratio (PDR)-based jammer localization is a promising scheme which locates jammer by successive forwarding of PDR measurements to neighbours in a distributed manner without any modifications to hardware. Since strong jamming signal corrupts the communication of jammed nodes, the PDR value of such nodes drops to zero. As a result, the PDR gradient descent process couldn’t go forward on the jammed nodes, causing a certain location error. In this paper, we put forward a method to enhance the performance of PDR-based jammer localization through dynamic power adaptation. By increasing the transmission power of the consideration node, its communication ability can be reconstructed to exchange message. After message delivering and sharing among jammed nodes, the node with largest Received Jamming Signal Strength (RJSS) value can be found and is taken as the estimation of jammer. Simulation experiments are conducted to evaluate the correctness and effectiveness of the proposed algorithm. Experimental results verify that, the improved localization scheme has a better performance than current PDR-based method. Article ID: 70267 Title: A Cross-System Invocation Platform Based on Distributed Network Performance Measurement System Name: Zhenwen Xue Affiliation: Beijing University of Posts and Telecommunications E-mail: [email protected] Abstract The Distributed Network Performance Measurement System provides functions to derive performance indices of networks and services, which are significant for Network Management System. To make these two systems cooperate, we realize this cross-system invocation platform, using Web Service, a mechanism which allows two systems to exchange data over the internet through publishing interfaces. There are several mature Web Service frameworks, Apache Axis2, Apache CXF etc. In

this pa-per we choose Apache Axis2 to achieve the objective that the Network Management System can invocate the network performance measurement functions via the Web Services. Article ID: 70268 Title: Distributed Network Topology Formation and Resource Allocation for Clustered Machine-to-Machine Communication Networks Name: Xi Luan Affiliation: Institute of Advanced Communications, EECS, Peking University, China E-mail: [email protected] Abstract In Machine-to-Machine (M2M) communication networks, the signalling congest and complexity for resource allocation is becoming one of the most important problems that should be dealt with the increasing of network scale. In this context, a clustering transmission strategy for the large-scale M2M networks has been proposed in this paper. To make the scheme can be carried out in distributed way, a joint network topology formation and resource allocation scheme based on coalition formation game has been proposed. Simulation results show that the proposed scheme can obtain a flexible tradeoff between communication QoS and network scheduling performance. Article ID: 70269 Title: Cooperative Transmission Based on Multi-Relay Device-to-Device Communications in Cellular Networks Name: Xi Luan Affiliation: Institute of Advanced Communications, EECS, Peking University, China E-mail: [email protected] Abstract In the frequency-limited cellular networks, the underlaying Device-to-Device (D2D) communications is an efficient way to enhance the user access probability and network capacity performance. To satisfy the

Page 64:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

64 WiCOM 2015 Conference Guide

communication requirements for users in different network sizes, a cooperative transmission strategy based on multi-relay D2D communications are proposed. Specifically, To increase the serving users simultaneously and meanwhile maintain the QoS of them, a joint admission control and cooperative nodes selection scheme is proposed, and then the power control and resource allocation scheme is provided correspondingly. Simulation results shows that the proposed strategy can enhance the user access probability efficiently in frequency-limited cellular networks. Article ID: 70270 Title: Theoretical Analysis of Handover Failure Rate in Heterogeneous Networks under Random Shadowed Model Name: Zheng Huang Affiliation: Key Laboratory of Mobile Communication Technology, Chongqing University of Posts and Telecommunications, Chongqing, P.R. China E-mail: [email protected] Abstract Heterogenous networks (HetNets) consisting of bothmacrocells and small cells are capable of improving systemcapacity and user throughput significantly. However, the deployment of various small cells may result in frequent handoverbetween the macrocell and small cells, and between small cells,and the possible handover failure (HoF) may severely affectsystem performance and user quality of service (QoS) guarantee.In this paper, we consider aHetNet consisting of one macroeNodeB (MeNB) and one picoeNodeB (PeNB), the user equipment(UE) moves along the coverage area of the two eNodeBs. Theprobability of HoF of the UE is examined under the shadowedfading channel model and the analytical expression of theprobability of HoF is derived as a function of user velocity,the threshold of reference signal receivingpower (RSRP), the duration of time-to-trigger (TTT) timer andthe characteristics of the random shadowing effects. Article ID: 70271

Title: Pic Based Cell Search against Multi-Cell Interferences in Hetnet Name: Ming Liang Affiliation: Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory E-mail: [email protected] Abstract The explosive growth of the data traffic demands in cellular network has present more challenges. As the link efficiency is approaching its fundamental limitation, we can only increase the node deploy density to achieve satisfying network capacity. 3GPP focus on Pico-cell overlaid HetNet, in which small cell base stations (pico eNB: pico evolved Node-B) with low transmit power are deployed at the hot spot within a macro cell. However, in today’s already dense deployments, the UE of small cell base station may suffer severe inter-cell interference from the neighboring macro cells. For this, we proposed a par-allel interference cancellation scheme to accomplish the cell search procedure for the low power node in HetNet. PIC scheme can cancel all neighboring cells’ interfering in parallel comparing to the existing SIC scheme. By identifying, reconstruction and cancellation of both the target and interfering signals, we will achieve better cell search performance in HetNet. Article ID: 70272 Title: A Linear Model on Weapon Recognition for Ct’S Security Inspectation Name: Haixia Pan Affiliation: IRIP Lab, School of Software, Beihang University, Beijing E-mail: [email protected] Abstract This paper proposes a novel weapon recognition approach based on the mixture of Support Vector Machine(SVM) and Bayes classifiers, thus presenting a robust way to assemble different approaches of recognition. Two kinds of features are used separately. The first kind of features is Sift feature which is dealt by SVM classifier. The second kind of features is obtained by calculating each image’s

Page 65:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

65 WiCOM 2015 Conference Guide

color histogram. Due to the independence of each color feature, we use normal Bayes classifier to generate image’s probability of containing a gun. To mix these two features, we assume two weights for the results probabilities of these two classifiers and exploit logistic regression analysis to build a linear model. Weights is valued by ROC curve. Experimental results show that the proposed approach maintains high recognition rate with a relatively low wrong- recognition rate. Article ID: 70273 Title: A New Seismic Image Enhancement Method Based on Mathematical Morphology Name: Haixia Pan Affiliation: IRIP Lab, School of Software, Beihang University, Beijing, China E-mail: [email protected] Abstract Seismic images are collected by seismic sensors. Containing the geological information of geological structures such as strata and crater, these images are of high significance. However, due to the complexity of their backgrounds, edges of structures to be studied appear blurry. This paper proposes a method to enhance the strata and crater structures using morphology. Opening and closing operations are used to enhance crater and multiscale morphological gradient is employed to show the strata. Experiment’s result shows this method performs well in both efficiency and effectiveness. Article ID: 70275 Title: Using Location-Based Service and Context Information for Restaurant Recommendation Name: S.S. Weng Affiliation: Department of Information and Finance Management, National Taipei University of Technology, Taipei, Taiwan E-mail: [email protected] Abstract Due to the increasing of the smartphones users, it be-comes more convenient for people to surf on the net. In

the meanwhile, more conveniences are found by com-bining Context-Awareness and the sensors which are equipped in the mobile phones. The sensors can catch user’s context data. After filtering and computing, it shows the users their contextual information. Context-Awareness can not only extract the context data, but also adjust users’ using environment, e.g. adjusting the background color automatically with the light sensor. In addition, since recommendation systems must face the increasing amounts of data, through the recom-mendation mechanism, we will find out the information need easier. The study stands on three concepts, context aware, location based service, and recommendation system. A mobile App of restaurant recommendation first collects users’ recommend request, users’ context (users’ coordinates, time, weather, speed and directions) and their rating of restaurant. Then, the server, therefore, contain the collection of users’ Place-of-Interest (finding the similar community of Place-of-Interest), rec-ommending items (recommended restaurant) and the contextual classification (recommendation which matches users’ context). As a result, this system can assist users by providing their personalized Place-of-Interest and current context. Also, it finally, enhances the result of the restaurant recommendation. Article ID: 70276 Title: On the Impact of Power Amplifier Efficiency on The Energy Efficiency in A Massive Mimo System Name: Yingchu Guo Affiliation: National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China E-mail: [email protected] Abstract It is a practical challenge for wireless communication system designs to achieve both high spectral efficiency and energy efficiency because of the nonlinear effect and inefficiency of power amplifier. In previous work, the power amplifier efficiency is always considered as a constant, but it changes with the output power in reality. In this paper, we talk about the impact of variable power amplifier efficiency, propose an energy efficiency model

Page 66:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

66 WiCOM 2015 Conference Guide

considering power amplifier efficiency as a variable, and investigate a power allocation scheme based on zero-forcing precoding so that we can guarantee the spectral efficiency and energy efficiency at the same time. Simulation result shows the trade-off between energy efficiency and spectral efficiency, and implies that relatively higher transmit power will be more ener-gy efficient. Article ID: 70278 Title: A New Multi-objective Routing Protocol of Ad Hoc based on Routing Constrains Name: Xueming Wang Affiliation: Guizhou University E-mail: [email protected] Abstract For the most existing MAODV protocol is only improved by a single performance, there is a problem that the comprehensive performance of the protocol cannot be improved as well. By uses of the routing selection mechanism with the constraints of bandwidth, delay and packet loss rate of the original protocol, a new multi-objective routing protocol RCQ-MAODV of mobile ad hoc network is put forward. Simulations are conducted to MAODV protocol and RCQ-MAODV by NS2, the simulation results show that RCQ-MAODV routing performance has greatly improved than MAODV, its transmission rate, delivery rate is increased and the network cost is greatly reduced. This shows that the RCQ-MAODV protocol can provide more comprehensive quality assurance for mobile ad hoc networks. Article ID: 70282 Title: Traffic Information Distribution Model based on Crowdsourcing UGC and User Trust Degree Name: Chenbo Deng Affiliation: School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China E-mail: [email protected] Abstract

In this paper, we at first analyzed the real-time traffic information and crowdsourcing UGC (User Generated Content) mechanism in today’s in-vehicle network. We then proposed an effective traffic information distribution model based on the crowdsourcing UGC and its production-user trust degree. The model combines the crowdsourcing UGC quality-control strategy, the Shapley power index and the principle of the proportion dynamic balance distribution to output the relatively reliable and real-time traffic information. Next, some of the conceptions have been introduced respectively in detail for the better understanding of this model. Finally, the performance analysis is provided to evaluating the proposed scheme and the simulation results showed that the proposed model have a good performance in the pervasive computing environments. Article ID: 70283 Title: Fft-Based Parallel Encoding Algorithm for Structured Ldpc Codes Name: Yanan Fan Affiliation: University of Chinese Academy of Sciences, Beijing, China E-mail: [email protected] Abstract Structured LDPC, such as RA, IRA, ARA, QC-LDPC etc., are some important LDPC codes, these codes usually have very good performance and facilitate the implementation of encoding and decoding for the structural features they have. A new method for the encoding of the structured LDPC codes has been presented, namely FFT-based parallel encoding algorithm, which uses FFT to realize the parallel encoding of LDPC codes by achieving the circular convolution in the frequency domain. The study shows that the proposed algorithm has lower computational complexity than the previously proposed encoding algorithm. Although transforming to the frequency domain requires complex operations in real domain which increasing the number of the quantization points, the throughput of the encoder has greatly improved because of the increase of the degree of parallelism. The simulation results show that the computational complexity of the FFT-based encoding algorithm has an approximately

Page 67:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

67 WiCOM 2015 Conference Guide

linear relationship with the size of sub-circulate matrix, and when this size goes larger, the newly proposed algorithm will possess a lower computational complexity and a higher throughput compared with the previously proposed algorithms. Article ID: 70284 Title: Differential Bd/Ils-Glideslope Integrated Approach System for Improving the Lateral Navigation Performance Name: Yu Geng Affiliation: Institute of Civil Aviation, 2Institute of Electronic and Information Engineering Shenyang Aerospace University, Shenyang E-mail: [email protected] Abstract This paper mainly gives a research about safety landing in the bad flight conditions, to make the full use of China’s Beidou Navigation Satellite System which was autonomously controlled by our country to help the most national airports without updating the ground-based radio navigation equipment from Instrument Landing System (ILS) Category I to Category II of the same on analogous the operational standards. It introduces the model of differential BD and ILS-Glideslope integrated approach system. Kalman filtering is employed to combine the location data of differential DB with ILS. Matlab is used to simulate the approach track of plane, And the result shows that this system can effectively improve the aircraft’s lateral navigation accuracy, and the criterion is improved from CAT I to CAT II through this system. Article ID: 70285 Title: Virtual Network Mapping Algorithm Based on Load Balancing Multi-objective Particle Swarm Optimization Name: Jun Zhao Affiliation: Wuhan Digital Engineering Institute E-mail: [email protected] Abstract Existing virtual network mapping algorithm does not

consider resource consumption of intermediate node on communication path usually. Minimum resource consumption or shortest path of physical network is regarded as objective, thereby leading to bottleneck due to insufficient resource of intermediate node on communication path, and affecting performance of the whole physical network and subsequent success rate of virtual network. A virtual network mapping algorithm based on load balancing multi-objective particle swarm optimization is proposed in the paper aiming at the problem. Resource consumption of intermediate node is sufficiently considered in the algorithm, double balance of node load and link load is regarded as objective. Meanwhile, the optimal path of particle swarm optimization algorithm is adopted. Experiments show that the algorithm proposed in the paper not only can realize double balance of node load and link load, but also can effectively improve request receiving success rate, overall resource load balance and long-term operation income. Article ID: 70287 Title: An Intelligent Bus Dispatch System Based on Fuzzy Genetic Algorithms Name: Yue Ma Affiliation: Department of Electronic and Information Engineering, Inner Mongolia University, China E-mail: [email protected] Abstract Under the background of intelligent public transport, the paper proposes an intelligent bus dispatch system, which consists two parts. In the first part, using the real-time feedback site traffic and the historical passenger flow data as the inputs of the least squares support vector machines, forecasts the short term traffic through. For another part, we improved the genetic algorithm through fuzzy control, to compute the most optimal dynamic departure intervals, which considering passenger waiting time and vehicle load factors at the same time. Article ID: 70288 Title: An Improved Method for Available Bandwidth Estimation in Ieee 802.11 Ad Hoc Networks Name: Shengkai Chen Affiliation: Shanghai Institute of Microsystem and

Page 68:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

68 WiCOM 2015 Conference Guide

Information Technology, Chinese Academy of Sciences, Shanghai, China E-mail: [email protected] Abstract Obtaining the accurate estimation of available bandwidth is precondition of QoS-guaranteed. In this paper, we proposed a novel available bandwidth estimation mechanism in 802.11 RTS/CTS by correct measurements of i) a new coefficient, called channel utilization ratio, which considering the QoS of realtime multimedia, ii) overhead by the control messaging. Simulation result shows that taking the channel utilization ratio into consideration ensures the existing traffic in the network will not be affected by the new coming traffic after the estimation results are used. And the the proposed scheme performs more accurately compared with ABE. Article ID: 70290 Title: Electromagnetic Wave Propagation Characteristics of Rotating Antenna in Electrical Machine Name: Sonia Ben Brahim Affiliation: Sup'Com E-mail: [email protected] Abstract Nowadays wireless communication for rotating electrical machines is interesting for both real time monitoring and diagnosis purposes. However, the application of this technology can lead to some problems. In fact, in our paper, the experimental results of radio monitoring system are illustrated to prove that one of the major problems of these type of application is the big received power variation range and fast fading wireless channel compared with stationary transmitter. Thus, our work aims to analyze the ElectroMagnetic Wave Propagation (EMWP) characteristics in rotating environments in order to provide a strong theoretical support for developing high-performance radio monitoring system. In particular, the Doppler frequency shift and the electromagnetic wave polarization characteristics in rotating movement will be analyzed.

Article ID: 70298 Title: Middleware for Flexible resource allocation validation Name: Yanhong Yang Affiliation: Beijing Institute of Graphic Communication E-mail: [email protected] Abstract The heterogeneity of the available protocols and hardware platforms makes validation in resource allocation a time consuming and complex work. It needs to involve the hardware platforms, link layer and network layer to verify algorithms. To minimize the unnecessary and repetitive implementation of similar functionalities for different platforms, we present our resource allocation validation (RAV) middleware which supports the discovery of sensor networks and provides flexible resource allocation. RAV enables user to specify XML-based deployment descriptor which can easily modify from link layer to network layer and customize configuration of sensors. In demonstration, three different resource allocation algorithms are tested to deploy network, to dynamically reconfigure and to monitor the changes. Article ID: 70299 Title: Transmit Pattern Synthesis for Mimo Radar Name: Zhongrui, Huang Affiliation: Electronic Engineering Institute, Hefei, Anhui E-mail: [email protected] Abstract This correspondence provides a new method for the op-timal design of transmit pattern synthesis of MIMO radar using independent mainlobe and sidelobe constraints. Given fixed pattern mainlobe errors, we apply quadratic inequality constraint to sidelobe level. In order to enable the resulting covariance matrix to fulfill the practical uni-form elemental power constraint, a basis set is constructed which converts the solution of the covariance matrix into the optimization of the coefficients of the basis matrices set. It can not only reduce the computing complexity of the original optimal model, but also can be

Page 69:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

69 WiCOM 2015 Conference Guide

solved effec-tively by the convex optimization. In addition, the scale factor of the desired beam is set as the unite variable so as to reduce the matching error of the MIMO

radar pattern further. Simulations are presented to illustrate the superior performance of the transmit pattern via the proposed method.

Page 70:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

70 WiCOM 2015 Conference Guide

Part VI Instructions for Presentations

Oral Presentation

Devices Provided by the Conference Organizing Committee:

Laptops (with MS-office & Adobe Reader)

Projectors & Screen

Laser Sticks

Materials Provided by the Presenters:

PowerPoint or PDF files

Duration of each Presentation:

Regular Oral Session: 10 Minutes of Presentation, Q & A included

Plenary Speech: 40 Minutes of Presentation, Q & A included Poster Presentation

Materials Provided by the Conference Organizing Committee:

X Racks & Base Fabric Canvases (60cm×160cm, see the figure below)

Adhesive Tapes or Clamps

Materials Provided by the Presenters:

Home-made Posters

Requirement for the Posters:

Material: not limited, can be posted on the Canvases

Size: smaller than 60cm×160cm

Content: for demonstration of the presenter’s paper

Page 71:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

71 WiCOM 2015 Conference Guide

Part VII Hotel Information

About Hotel

Guangdong Hotel (Shanghai) is located on Yi Xian Road, DaBaiShu industry & trading center in Shanghai, adjacent to the prestigious universities, such as Fudan, Tongji and Shanghai international studies university. DaBaiShu area is one of the 12 commercial zones in Shanghai, where conveniently linked by track line 3 and inner elevated ring road. Its 15 minutes ride to the Bund and Downtown area.

Address: 328 Yixian Road, Hongkou District, Shanghai Contact Number: 86-21-55589888 Fax Number: 86-21-55512808 Webiste: http://www.shgdh.com/en For non-Chinese author, please show the following info to the driver if you take a taxi: 请送我到:中国上海市虹口区逸仙路328号 上海楚天粤海大酒店

Page 72:  · 1WiCOM 2015 Conference Guide Table of Contents . Part I WiCOM 2015 Conference Schedule ...........................................................2 Part II Plenary ...

72 WiCOM 2015 Conference Guide

Contact Us

Organizing Committee

Secretary: Ms. Judy

Telephone: +86 132 6470 2250

E-mail: [email protected]


Recommended