Day 1 18/11/2019
Room #1

Registration 08:00 - 09:00

Welcome and Opening Addresses 09:00 - 09:30

General Chair: Jun Zheng, Southeast University, China TPC Co-Chair: Peter Chong, Auckland University of Technology, New Zealand

Keynote Speech: RFID based Vital Sign Sensing and Its Application to Driving Fatigue Detection 09:30 - 10:30

Dr. Shiwen Mao, IEEE Fellow, Auburn University, USA

Coffee Break 10:30 - 11:00

Session 1: Routing 11:00 - 12:00

Chair: Changle Li, Xidian University, China
11:00 - 11:00
EL-CRP: An Energy and Location Aware Clustering Routing Protocol in Large Scale Wireless Sensor Networks

With the development of Internet of Things (IoTs), large-scale wireless sensor networks (WSNs) are widely used in environment monitoring, industrial testing and intelligent transportation. In order to extend the lifetime of WSNs, it is necessary to reduce the energy consumption of sensors. To achieve the large-scale and flexible deployment, the wireless sensors are required to be low memory overhead. The existing WSN routing protocols are difficult to satisfy the requirements for low energy consumption and low memory overhead in those scenarios. This paper proposes an Energy and Location Aware Clustering Routing Protocol (EL-CRP) for large-scale WSN application scenarios. Using an adaptive clustering method, in which the location and energy of cluster members are considered simultaneously, the protocol reduces the energy consumption and memory overhead in the WSNs. Extensive simulations and hardware tests are conducted to evaluate the performance. Results finally verify the advantages of the protocol in large-scale network scenarios.
Authors: Yuehang Bu (Xidian University), Changle Li (Xidian University), Yao Zhang (Xidian University), Lina Zhu (Xidian University),
Hide Authors & Abstract

Show Authors & Abstract
11:00 - 11:00
LEER:Layer-Based and Energy-Efficient Routing Protocol for Underwater Sensor Networks

Abstract. Radio signals attenuate greatly when propagating in water,while optical signal has large scattering in the water. Therefore, acoustic signals are used for communication in underwater wireless sensor network.Data transmission in underwater wireless sensor network is facing challenges due to the characteristics of underwater acoustic channel. In addition, high energy consumption and long latency bring about increased challenges for the design of routing protocols in UWSN. In this paper, we propose a routing protocol called as Layer-based and Energy-efficient Routing Protocol (LEER) to solve the problems of routing void area,long end-to-end delay as well as high energy consumption. In LEER, each node extracts the layer field information from Hello packets received and updates its own layer to avoid the problems of routing void area, and all nodes forward packets to the sink node without any explicit configuration or location information.Simulation results show that LEER has some advantages in performance of delivery rate and end-to-end delay compared to DBR, which is also based on restrict flooding technology.
Authors: Jianlian ZHU (Qinghai Normal University), Xiujuan DU (Qinghai Normal University), Duoliang HAN (Qinghai Normal University), Lijuan WANG (Qinghai Normal University), Meiju Li (School of Computer Science and Technology, Qinghai Normal University, Qinghai 810008, China),
Hide Authors & Abstract

Show Authors & Abstract
11:00 - 11:00
A Routing Void Handling Protocol based on Autonomous Underwater Vehicle for Underwater Acoustic Sensor Networks

In underwater acoustic sensor networks (UASNs), efficient packet transmission is essential for monitoring new marine technologies. However, the uneven distribution of nodes and inappropriate selection of forwarding nodes lead to routing voids in adjacent nodes. Aiming at the problem, we propose a routing void handling protocol (RVHP) based on Autonomous Underwater Vehicle (AUV) for UASNs. RVHP effectively detects and avoids void nodes and trap nodes through a void avoidance mechanism, and then uses an AUV-assisted network repair mechanism to timely deal with failure routing in the communication area. AUV adopts a greedily path-finding strategy to visit void nodes, and realizes the void repair of UASNs. Simulation results show that RVHP can effectively improve the packet transmission rate and energy utilization rate.
Authors: Yuying Ding (Tianjin Chengjian University, China), Kun Hao (Tianjin Chengjian University, China), Cheng Li (Tianjin Chengjian University, China), Yonglei Liu (Tianjin Chengjian University, China), Lu Zhao (Tianjin Chengjian University, China), Shudong LIU (Tianjin Chengjian University, China),
Hide Authors & Abstract

Show Authors & Abstract
11:00 - 11:00
Optimal Packet Size Analysis for Intra-Flow Network Coding Enabled One Hop Wireless Multicast

Network coding has received great attention for its ability to greatly improve the performance of wireless networks. However, there still lacks of study to optimize the packet size for maximizing the throughput performance of network coding enabled multicast in wireless networks. In this paper, we study network coding enabled multicast from a base station to multiple receivers using random linear network coding. We build a network throughput model and derive the optimal packet size for maximal multicast throughput. Simulation results verify the high accuracy of our analysis results.
Authors: Hao Cui (University of Chinese Academy of Sciences), Yan Yan (University of Chinese Academy of Sciences), Baoxian Zhang (University of Chinese Academy of Sciences), Cheng Li (Memorial University),
Hide Authors & Abstract

Show Authors & Abstract

Lunch Break 12:00 - 14:00

Threesixty Restaurant and Bar

Session 2: Access Control 14:00 - 15:30

Chair: Peter Chong, Auckland University of Technology, New Zealand
14:00 - 14:00
The Effect of Propagation Models on IEEE 802.11n over 2.4 GHz and 5 GHz in Noisy Channels: A Simulation Study

IEEE 802.11 wireless local area networks (also called Wi-Fi) are widely used as Internet access technologies due to its availability, high-speed, low-cost, and standardization world-wide. While the performance of Wi-Fi has been studied and reported extensively in the network literature, but the effect of radio propaga-tion models on system performance in noisy channels has not been fully explored yet. This paper, therefore, investigates the effect of propagation models (two ray ground, path loss shadowing, and overall shadowing) over 2.4 GHz and 5 GHz on the performance of a typical 802.11n network in noisy channels. A campus-wide 802.11n network simulation model is developed for the said study using the Riverbed (OPNET) Modeler 18.7. We consider both real-time (voice and video) and non-real time (FTP and Web) applications which generate traffic on the net-work. Simulation results show that FTP download and upload response times have significant effect on propagation models and 2.4- and 5 GHz. However, the effect of propagation models on VoIP delay, jitter as well as video delays is found be not significant. The findings reported in this paper provide some in-sights into Wi-Fi performance under noisy channels that can help network re-searchers/engineers to contribute further towards developing next generation Wi-Fi networks capable of operating in noisy channels.
Authors: Sonia Gul (Auckland University of Technology), Nurul Sarkar (Auckland University of Technology),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
MBA-DbMAC: A Random-Access MAC Protocol for MBAs

Ad hoc networks are infrastructureless and self-organizing networks that consist of static/mobile nodes with limited bandwidth, computing ability and energy. These networks are deployed for civilian/military applications. Having an efficient/reliable routing protocol for communication between the nodes can be critical. A current research avenue involves exploiting Multi-Beam directional Antennas (MBA) to significantly reduce the end-to-end delay in multi-hop ad hoc networks that service multiple traffic flows. To tackle such an issue at the Network level, there is a need for a suitable MAC protocol underneath. In this paper we propose MBA-DbMAC, a MAC protocol for MBAs. MBA-DbMAC is a generic MAC protocol that has the basic functionalities of a MAC protocol and renders possible the basic operation of MBA-equipped nodes in static/mobile ad hoc networks. We adopt a two-tier processing approach whereby the MAC layer is split into two artificial sub-layers: a controller sub-layer (materialized by one node-wide parent process) and a sector sub-layer (materialized by N child processes, 1 child process for each of the N sectors). Other novel aspects of this protocol are the decoupled broadcasting and the time window policy that we adopt to avoid Critical Chain Transmission/Reception. We use Opnet for the implementation/simulations. It is shown that MBA-DbMAC perfectly performs key functions such as unicasting, broadcasting, and concurrent packet transmission/reception.
Authors: Jean-Daniel Medjo Me Biomo (Carleton University), Thomas Kunz (Carleton University), Marc St-Hilaire (Carleton University),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Medium Access Control for Flying Ad Hoc Networks Using Directional Antennas: Challenges, Research Status, and Open Issues

As flying ad hoc networks (FANETs) are increasingly used in mili-tary and civilian scenarios, and the utilization of directional antennas can signif-icantly increase the communication distance between UAVs and anti-interception capability of transmission, the research on media access control (MAC) protocols using directional antennas has become a new research hotspot. In this paper, we first summarize the design elements and requirements of directional MAC protocols for FANETs are summarized considering the characteristics of FANETs and the challenges brought by directional antennas. Based on the classification of channel access mechanisms, contention and scheduling based MAC protocols for FANETs with directional antennas are then reviewed. Finally, the characteristics and performance of various typical protocols are compared and analyzed. Problems that need to be further ad-dressed are summarized, expecting to provide some illumination for those re-searchers engaged in this field.
Authors: Lingjun Liu (College of Communication Engineering, Army Engineering University of PLA, Nanjing, China), Laixian Peng (College of Communication Engineering, Army Engineering University of PLA, Nanjing, China), Renhui Xu (College of Communication Engineering, Army Engineering University of PLA, Nanjing, China), Wendong Zhao (College of Communication Engineering, Army Engineering University of PLA, Nanjing, China),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Blockchain-aided Access Control for Secure Communications in Ad Hoc Networks

A novel blockchain technology aided peerto-peer connection (P2P)-based access control protocol is proposed for the distributed ad hoc networks. More specifically, the access process conceived can improve the security performance as an explicit advantage of blockchain technology, which is capable of preventing from the security threatens, e.g., being eavesdropped, being tampered, and malicious access imposed by the lack of the authentication center and the nature of the multi-hop routing mode. Meanwhile, a reasonable punishment mechanism is integrated into the access protocol that reinforces punishment upon the increase of dishonest or malicious node behaviors and hence, is particularly beneficial for the robustness of the long term systems. Furthermore, a low-complexity match scheme based on competition access (MCA) is utilized for designing the appropriate multi-hop routings, which considers the min-max delay optimization objective. Numerical results demonstrate that the blockchain aided access control protocol achieves the lower delay in comparison to the conventional first come, first serve access scheme, random access scheme, and the single-hop access scheme, while improving the security performance of access process in ad hoc networks.
Authors: Mingming Wu (University of Electronic Science and Technology of China), Yulan Gao (University of Electronic Science and Technology of China), Yue Xiao (University of Electronic Science and Technology of China),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Investigating Mobility Robustness in 5G Networks using User-Adaptive Handoff Strategies

Millimeter Wave (mmWaves) communication is a major capacity booster to fifth generation (5G) mobile networks. However, challenges of significant attenuation and high propagation losses leading to intermittent user connectivity limit their applicability in 5G mobile networks. The dual connectivity (DC) architecture with its split control and data plane functionality has proven to be more effective. DC model uses less attenuated Long Term evolution (LTE) bands to coordinate mmWave cells while they provide on demand high capacity data transmission. This guarantees prolonged network association for mmWave links with minimal to no signaling and high data plane rates. However, minimizing signaling in LTE bands considering their scarcity is vital too. To that effect, intelligent Handoff (HO) strategies that prolong mmWave link association with a minimal signaling cost are vital for a robust DC mobility support system. This paper investigates the performances of adaptive HO strategies given a highway multiuser-type mobility scenario on DC systems. Results show that adaptive HO solutions enhance link reliability in mmWaves with minimal LTE signaling cost
Authors: masoto Chiputa (AUT), Peter Han Joo Chong (Auckland University of Technology), Saeed Rehman (Auckland University of Technology), Arun Kumar (NIT),
Hide Authors & Abstract

Show Authors & Abstract

Coffee Break 15:30 - 16:00

Session 3: Resource Allocation 16:00 - 17:30

Chair: Song Xing, California State University, USA
16:00 - 16:00
Delay based Wireless Scheduling and Server Assignment for Fog Computing Systems

To further reduce the delay in fog computing systems, new resource allocation algorithms are needed. Without assuming the knowledge of the statistics of user application arrival traffic, the analytical formulas of the communication delay and computing delay in fog computing systems are derived. Based on these analytical formulas, an optimization problem of delay minimization is formulated directly, and then a novel wireless scheduling and server assignment algorithm is de-signed. The delay performance of the proposed algorithm is evaluated via simula-tion experiments. Under the considered simulation parameters, the proposed algo-rithm can achieve 13.5% less total delay, as compared to the traditional algorithm. System parameters including the total number of subcarriers in the system and the average user application arrival rate have impacts on the percentage of delay re-duction. Therefore, compared with the queue length optimization based traditional resource allocation algorithms, the delay optimization based resource allocation algorithm proposed in this paper can further reduce delay.
Authors: Yuan Zhang (National Mobile Communications Research Laboratory, Southeast University), Mingyang Xie (National Mobile Communications Research Laboratory, Southeast University), Qiang Guo (National Mobile Communications Research Laboratory, Southeast University), Wei Heng (National Mobile Communications Research Laboratory, Southeast University), Peng Du (College of Automation & College of Artificial Intelligence, Nanjing University of Posts and Telecommunications),
Hide Authors & Abstract

Show Authors & Abstract
16:00 - 16:00
Fair Resource Allocation Based on Deep Reinforcement Learning in Fog Networks

As the terminal devices grow explosively, the resource in the fog network may not satisfy all the requirement of them. Thus scheduling the resource reasonably becomes a huge challenge in the future 5G network. In the paper, we propose a fair resource allocation algorithm based on deep reinforcement learning, which makes full use of the computational resource in the fog network. The goal of this algorithm is to complete processing the tasks fairly for all the user nodes (UNs). The fog nodes (FNs) are expected to assign their central processing unit (CPU) cores to process offloading tasks reasonably. We apply the Deep Q-Learning Network (DQN) to solve the problem of resource scheduling. Firstly, we establish the evaluation model of priority to set the priority for the offloading tasks, which is related to the reward in the reinforcement learning. Secondly, the model of reinforcement learning is built by taking the situation of UNs and resource allocation scheme as the state of environment and the action of agent, respectively. Subsequently, the loss function is analysed to update the parameters of deep neural network. Finally, numerical simulations demonstrate the feasibility and effectiveness of our proposed algorithm.
Authors: Huihui Xu (Wuhan University), Yijun Zu (Southeast University), Fei Shen (Chinese Academy of Sciences), Feng Yan (Southeast University), Fei Qin (University of Chinese Academy of Sciences), Lianfeng Shen (Southeast University),
Hide Authors & Abstract

Show Authors & Abstract
16:00 - 16:00
Multi-agent Reinforcement Learning for Joint Wireless and Computational Resource Allocation in Mobile Edge Computing System

Mobile edge computing (MEC) is a new paradigm to provide computing capabilities at the edge of pervasive radio access networks in close proximity to intelligent terminals. In this paper, a resource allocation strategy based on the variable learning rate multi-agent reinforcement learning (VLR-MARL) algorithm is proposed in the MEC system to maximize the long term utility of all intelligent terminals while ensuring the intelligent terminals’ quality of service requirement. The novelty of this algorithm is that each agent only needs to maintain its own action value function so that the computationally expensive issue with the large action space can be avoided. Moreover, the learning rate is changed according to the expected payoff of the current strategy to speed up convergence and get the optimal solution. Simulation results show our algorithm performs better than other reinforcement learning algorithm both on the learning speed and users’ long term utiliies.
Authors: Yawen Zhang (Southeast University), Weiwei Xia (Southeast University), Feng Yan (Southeast University), Huaqing Cheng (Southeast University), Lianfeng Shen (Southeast University),
Hide Authors & Abstract

Show Authors & Abstract
16:00 - 16:00
Cooperative Transmission with Power Control in the Hyper-Cellular Network

In response to the challenge of no difference coverage in seamless wide-area coverage scenarios, the 5G hyper-cellular network (HCN) is proposed to ensure user mobility and traffic continuity. In this network, Control Base Station (CBS) is responsible for control coverage, and the traffic base stations (TBSs) take care of high-speed data transmission. Firstly, this paper analyzes the spectral efficiency of different users by dividing the center region and edge region based on Poisson Voronoi Tessellation (PVT) model. For central users, a power control scheme is used to optimize the transmit power of TBSs. For edge users, a cooperative transmission technology and a power control scheme are employed to increase the spectral efficiency. In addition, the TBS sleeping strategy is used to further reduce inter-cell interference. Then, the analytical expressions of the spectral efficiency are derived by using random geometry. The simulation results illustrate that this scheme has a good effect on improving the spectral efficiency of the users with constant mobile velocity.
Authors: Dan Zhang (CQUPT), Xin Su (Tsinghua University), Huanxi Cui (CQUPT), Bei Liu (Tsinghua University), Lu Ge (Tsinghua University), Jie Zeng (Tsinghua University),
Hide Authors & Abstract

Show Authors & Abstract
16:00 - 16:00
Energy-Efficient Power Allocation for Fading Device-to-Device Channels in Downlink Resource Sharing Communication

Green wireless communications have received increasing attentions from researchers, who committed to improving energy efficiency for the ubiquity of wireless applications. This paper deals with the power allocation strategies for nearby users' high speed download services to effectively address the energy consumption of D2D communications underlying cellular systems. Energy efficiency maximization problems are analyzed with respect to ergodic sum capacity under different power constraint cases, relating to average power thresholds over all the fading stations and instantaneous power thresholds over each fading station of D2D transmission links and frequency-shared interference links. By applying the Dinkelbach method and the Lagrange duality method, the original intractable problems are decomposed into sub-dual functions that are lower complexity and solvable. Accordingly, we infer closed-form solutions of the proposed optimal problems, which resemble ``water-filling'' solutions for the parallel fading channels. Simulation results verify that the proposed strategies provide effective uses of limited energy.
Authors: Fengfeng Shi (National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China), Jiaheng Wang (National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China), Hong Shen (National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China), Chunming Zhao (National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China),
Hide Authors & Abstract

Show Authors & Abstract

Gala Dinner 18:30 - 21:00

Blue Kanu restaurant
Day 2 19/11/2019
Room #1

Section 4: Invited Talks 09:00 - 10:00

Chair: Weixiao Meng, Harbin Institute of Technology, China
09:00 - 09:00
Analyzing Sensor Network Data: A Case of Graph vs Topological Signal Processing

The purpose of this paper is to introduce two relatively new fields of research { graph signal processing and topological signal processing. By reviewing some of their current applications to signal analysis in sensor networks, their relative advantages are highlighted. While graph signal processing is more mature, topological signal processing is potentially more versatile. However, the latter presents a much steeper learning curve for engineers and researchers who are trained in conventional signal processing. But being at the early stages of development, there are a lot of avenues for further research.
Authors: Edmund Lai (Department of Information Technology & Software Engineering Auckland University of Technology, Auckland, New Zealand), Jing Ma (Department of Information Technology & Software Engineering Auckland University of Technology, Auckland, New Zealand),
Hide Authors & Abstract

Show Authors & Abstract
09:00 - 09:00
The 5G Debate in New Zealand: Government Actions and Public Perception

The Fifth Generation (5G) of mobile phone technology is gradually witnessing deployment in many parts of the world. New Zealand is also ex-pected to start 5G deployment by the end of 2019. This paper reviews the pro-gress made to date regarding the introduction of 5G specifically in New Zea-land. This paper explores several technical and non-technical issues that relate to the 5G debate that is ongoing across the country. Of particular interest are topics that are associated with government’s policy and actions towards 5G, and the perception of the general public about this upcoming technology.
Authors: Faraz Hasan (Massey University),
Hide Authors & Abstract

Show Authors & Abstract

Coffee Break 10:00 - 10:30

Session 5: Location and Tracking 10:30 - 12:00

Chair: Faraz Hasan, Massey University, New Zealand
10:30 - 10:30
High precision indoor positioning method based on UWB

In order to meet the increasing requirement of indoor positioning, a high precision positioning method based on UWB is designed and implemented. Firstly, the ranging method and its Improvement are discussed. Secondly, combining median filter and Kalman filter algorithm, the collected data are processed smooth method to get stable ranging data. Finally, the indoor real-time positioning system is realized by using weighted least square positioning algorithm. The test results show that when the refresh frequency is 10HZ, the ranging accuracy of the base station and the tag can reach 5cm.
Authors: Jianyong Yan (Jimei university), Donghai Lin (Jimei university), Kai Tang (Jimei university), Guangsong Yang (Jimei university), Qiubo Ye (Jimei university),
Hide Authors & Abstract

Show Authors & Abstract
10:30 - 10:30
Improvement of a Single Node Indoor Localization System

With the development of wireless communication technologies and the Internet, the application scenarios of positioning technologies are becoming more and more abundant. Therefore, the demand for location-based services is increasing greatly. Moreover, due to the widespread deployment of commercial WIFI devices, a WIFI-based localization system is very promising. This paper focuses on the localization algorithms utilizing Channel State Information (CSI) based on a conventional MUSIC algorithm in a single-node indoor localization system. However, the conventional MUSIC algorithm searches all the peaks in spatial spectrum. It requires enormous computation and thus is unsuitable for accurate positioning applications. This paper is intended to improve the algorithm in terms of positioning accuracy and computational complexity. Numerical results show that the proposed algorithm can improve the positioning accuracy and reduce computational complexity.
Authors: Yang Li (Harbin Institute of Technology), weixiao meng (Harbin Institute of Technology), yingbo zhao (Harbin Institute of Technology), Shuai Han (Harbin Institute of Technology),
Hide Authors & Abstract

Show Authors & Abstract
10:30 - 10:30
Design and Mobile Tracking Performance of a Retro-Directive Array (RDA) Antenna System

Beamforming is one of the most important technologies for wireless communication systems. A beamforming antenna system can control the radiation beam pattern and thus can reduce power consumption, compared with an omni-direction antenna system. In general, the digital beamforming technology requires a complex control system. However, a digital RDA (retro-directive array) antenna system has very small calculation load and its configuration is quite simple as it transmits to a receiving direction without prior information, and simply needs to estimate the phase from an incident. Thus, a RDA antenna system can reduce the system complexity and power consumption, and improve system performance. In this paper, we describe the structure of a digital RDA system and investigate the beam tracking performance of a digital RDA system. It is shown through simulation results that a digital RDA system can effectively improve the beam tracking performance when a target receiver is moving. The mean beam tracking error can reach 1.9° when the SNR is 10dB and 0.6° when the SNR is 20dB.
Authors: Myunggi Kim (Chungbuk National University), Taebum Gu (Chungbuk National University), Heung-Gyoon Ryu (Chungbuk National University),
Hide Authors & Abstract

Show Authors & Abstract

Lunch Break 12:00 - 14:00

Threesixty Restaurant and Bar

Session 6: Miscellaneous Topics in Wireless Networks (I) 14:00 - 15:30

Chair: Saeed Rehman, Auckland University of Technology, New Zealand
14:00 - 14:00
An Efficient Approach for Rigid Body Localization via Single Base Station Using Direction of Arrive Measurement

Rigid bodies are objects whose profile will not change after moving or being forced. A framework of rigid body localization (RBL) is to estimate the position and the orientation of a rigid object. In the wireless node network (WSN) based RBL approach, a few wireless nodes are mounted on the surface of the rigid target. Even though the position of the rigid body is unknown, we know how the nodes are distributed, which means that the topology of the nodes is known. Recently, a novel RBL scheme is studied, in which the rigid target is localized with just one single base station (BS) by measuring the angles between the BS and the positions of wireless nodes in the current frame, i.e. direction of arrival (DOA). However, the DOA-based RBL model is highly nonlinear and existing heuristic algorithms are generally time-consuming. In this paper, we intend to find the optimal solution of the 3-D positions of wireless nodes by fusing the topology information and DOA measurements with Newton’s Iteration algorithm (NIA). And then, the rotation matrix and the translation vector can be obtained by the unit quaternion (UQ) method with the 3-D positions of wireless nodes, which completes the RBL task. Finally, we evaluated the proposed NIA-based RBL performance in terms of the root mean squared error (RMSE), as well as the computation costs.
Authors: Shenglan Wu (IoT Engineering School, Jiangnan University, Wuxi 214122, China), Lingyu Ai (IoT Engineering School, Jiangnan University, Wuxi 214122, China), Jichao Zhan (IoT Engineering School, Jiangnan University, Wuxi 214122, China), Le Yang (Department of Electrical and Computer Engineering), Qiong Wu (IoT Engineering School, Jiangnan University, Wuxi 214122, China), Biao Zhou (Jiangnan University),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
The Effects of Non-Line of Sight (NLOS) Channels on a Highly Mobile User Device

Recently, there has been a growing interest in visible light communications (VLC) for indoor communication to meet the ever-increasing data demands. Most of the studies have considered the line-of-sight (LOS) channel for VLC communication. However, the LOS gain is constrained as the user moves away from the transmitter (Tx) or his device experiences orientation changes. It is observed in practice, the gain from reflections along the defused/NLOS channels can also contribute to optical gain. This research work, therefore, analytical model the NLOS channels and user¡¯s device orientation and analyze its effect on the user¡¯s SNR. For simulations, analytical models are integrated into ns3. Our results show that SNR slightly improves, which can be utilized to keep the communication alive during the high mobility scenario that could arise due to device orientation.
Authors: Shakir Ullah (Department of Electrical and Electronics Engineering, Auckland University of Technologies, Auckland, New Zealand), Dr Saeed Rehman (Department of Electrical and Electronics Engineering, Auckland University of Technologies, Auckland, New Zealand), Prof. Dr. Peter Chong (Department of Electrical and Electronics Engineering, Auckland University of Technologies, Auckland, New Zealand),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
Multiobjective collaborative beamforming for a distributed satellite cluster via NSGA-II

In this paper, a distributed satellite cooperative beamforming algorithm is proposed for the satellite cluster formed by multiple distributed formation flying satellites in the space information network. The average pattern function of distributed formation satellites is derived based on random antenna array theory. On this basis, a multiobjective optimization is formulated to enhance the transmit signal in the desired direction while suppress the interference in the undesired direction via nondominated sorting genetic algorithm II (NSGA-II). The simulation results show that the proposed method extends the distributed and cooperative beamforming technology to the research field of space information network and enhances the electromagnetic wave transceiver capability of resource-constrained satellite systems.
Authors: Bo Xi (Nanjing University of Posts and Telecommunications), Tao Hong (Nanjing University of Posts and Telecommunications), Gengxin Zhang (Nanjing University of Posts and Telecommunications),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:00
AMP inspired Antenna Activity and Signal Detection Algorithm for Generalized Spatial Modulated NOMA

The non-orthogonal multiple access technology has been considered as one of potential technologies for the next generation wireless network. Spatial modulation, which improves both spectral and energy efficiencies at the same time, has found its potentials in NOMA system. Spatial modulation, together with multiple-input multiple-output technique, could maintain massive connections and provide low latency at the same time. But it also puts forward challenges for multi-user and signal detection. By exploiting the sparsity nature of generalized spatial modulation system, we formulate the active antenna and user signal detection into a general sparse linear-inverse problem. Then an approximate message passing based algorithm is proposed to detect the antenna activity and transmitted signal simultaneously in the uplink grant-free NOMA system. Expect maximum algorithm is utilized to learn the parameters of activity level and noise variance. Simulation results show that proposed scheme outperform the CS based schemes over a wide range of SNR and sparsity level. Moreover, proposed algorithm achieves convergency in 15 iterations which makes it very practical.
Authors: Xiang Li (Southeast University), Yang Huang (Southeast University), Wei Heng (Southeast University), Jing Wu (Southeast University), Ke Wang (Southeast University), Gang Wang (Southeast University), Yuan Zhang (Southeast University),
Hide Authors & Abstract

Show Authors & Abstract

Coffee Break 15:30 - 16:00

Session 7: Miscellaneous Topics in Wireless Networks (II) 16:00 - 17:30

Chair: Cheng Li, Memorial University, Canada
16:00 - 16:00
A Homology Based Coverage Optimization Algorithm for Wireless Sensor Networks

Simplicial complex provides a precise and tractable representation of the topology of wireless sensor networks. In this paper, a coverage optimization algorithm based on Rips complex is given for the purpose of energy conservation of wireless sensor networks. Considering an area of interest which is covered by sensor nodes completely and even superfluously, our algorithm is performed to turn off redundant sensor nodes effectively in the network while maintaining the coverage consistently. Simulation results show that this distributed algorithm can remove more than 70% internal sensor nodes, and complexity analysis for our algorithm is given.
Authors: Lei Xiang (National Mobile Communications Research Laboratory, Southeast University, Nanjing, China), Feng Yan (National Mobile Communications Research Laboratory, Southeast University, Nanjing, China), Yaping Zhu (National Mobile Communications Research Laboratory, Southeast University, Nanjing, China), Weiwei Xia (National Mobile Communications Research Laboratory, Southeast University, Nanjing, China), Fei Shen (Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, China), Song Xing (Department of Information Systems, California State University, Los Angeles, CA 90032, USA), Yi Wu (Key Laboratory of OptoElectronic Science and Technology for Medicine of Ministry of Edu-cation, Fujian Provincial Key Laboratory of Photonics Technology, Fujian Normal University, Fuzhou, China), Lianfeng Shen (National Mobile Communications Research Laboratory, Southeast University, Nanjing, China),
Hide Authors & Abstract

Show Authors & Abstract
16:00 - 16:00
Rail Vehicle Fire Warning System Based on Gas Vapor Sensor Network

Fire accidents in rail vehicles often cause unpredictable catastrophic losses due to high population density and closed environment. At pre-sent, existing smart fire prevention schemes are mostly based on the emergency treatments after the fire. Since it takes time for firefighters arriving at the fire, the fire may already become disastrous at that time. This paper proposes a detection framework as well as detailed sensing and data processing technologies to detect volatile flammable liquid in closed spaces like rail vehicle carriages based on gas vapor sensor net-work to eliminate potential fire disaster. Experiment results shows the proposed surveillant system can detect gasoline vapor components in small space with high sensitivity while maintaining very low false detec-tion rates to external interferences.
Authors: Min Ai (China Railway Signal & Communication Shanghai Engineering Bureau Group Co., Ltd), rui tian (Beijing Engineering Research Center for IoT Software and Systems, Information Department, Beijing University of Technology),
Hide Authors & Abstract

Show Authors & Abstract
16:00 - 16:00
Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes

A novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes' intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae, multichannel transmis-sion, end-to-end encrypted packets, any single-path source routing protocol, and any number of selfish nodes; this makes it a valuable alternative to existing misbehavior detection schemes. GIFTED relies on approximate decomposition of a path equation system arising from successive performance reports from source nodes. The ability to near-perfectly guess IFT in the presence of various perturbations is demonstrated through Monte Carlo and time-true simulations, and compared with an existing weighted path trust scheme.
Authors: Jerzy Konorski (Gdansk University of Technology, Poland), Karol Rydzewski (Gdansk University of Technology, Poland),
Hide Authors & Abstract

Show Authors & Abstract
16:00 - 16:00
Machine Learning Based Smart IoT Gateway on Edge

Network delay, bandwidth and heterogeneous data are the leading challenges for standard internet of things (IoT) architecture. This contribute enormous new net-work infrastructures and massive heterogeneous data preprocessing design schemes to IoT landscape. To overcome these milestones, we present a scalable multitasking Internet of Things Gateway (IoTGW) for the era of IoT, this place reliance on new entity “Data loading and storing” module (DLSM). The provided DLSM module combine with orchestrator, flexibility of bridging front end grid (FEG), back end grid (BEG) and fast formatted data trade between sensing do-main and application domain enables managed, high dynamic distributed frame-work. Specifically, we add Adaboost-Multilayer Perceptron (AMLP) hybrid data classifier module to the proposed work to enhance service provision of IoT gate-way towards various IoT application services and protocols to facilitate IoT de-mands such as multitasking, interoperability, classification, and fast data delivery between different modules. IoTGW is implemented and tested using real data streaming network. Obtained results confirms the superiority of proposed work in terms scalability to serve novel application and facilitate broad scope of IoT.
Authors: Muhammad Diyan (School of Computer Science and Engineering Kyungpook National University Daegu, Korea), Murad Khan (Department of Computer Science, Sarhad University of Science and Information Technology), Bhagya Nathali Silva (School of Computer Science and Engineering, Kyungpook National University, Daegu, Korea), Jihun Han (School of Computer Science and Engineering, Kyungpook National University, Daegu, Korea), Yongtak Yoon (School of Computer Science and Engineering, Kyungpook National University, Daegu, Korea), Kyuchang Lee (School of Computer Science and Engineering, Kyungpook National University, Daegu, Korea), Zhenbo Cao (School of Computer Science and Engineering, Kyungpook National University, Daegu, Korea), Ki Jun Han (School of Computer Science and Engineering, Kyungpook National University, Daegu, Korea),
Hide Authors & Abstract

Show Authors & Abstract