-
On the SIR Meta Distribution in Massive MTCNetworks with Scheduling and Data Aggregation
Authors:
Nelson J. Mayedo Rodríguez,
Onel L. Alcaraz López,
Hirley Alves,
Matti Latva-aho
Abstract:
Data aggregation is an efficient approach to handle the congestion introduced by a massive number of machine type devices (MTDs). The aggregators not only collect data but also implement scheduling mechanisms to cope with scarce network resources. We use the concept of meta distribution (MD) of the signal-to-interference ratio (SIR) to gain a complete understanding of the per-link reliability and…
▽ More
Data aggregation is an efficient approach to handle the congestion introduced by a massive number of machine type devices (MTDs). The aggregators not only collect data but also implement scheduling mechanisms to cope with scarce network resources. We use the concept of meta distribution (MD) of the signal-to-interference ratio (SIR) to gain a complete understanding of the per-link reliability and describe the performance of two scheduling methods for data aggregation of machine type communication (MTC): random resource scheduling (RRS) and channel-aware resource scheduling (CRS). The results show the fraction of users in the network that achieves a target reliability, which is an important aspect to consider when designing wireless systems with stringent service requirements.
△ Less
Submitted 13 January, 2021;
originally announced January 2021.
-
Network Slicing for eMBB and mMTC with NOMA and Space Diversity Reception
Authors:
Eduardo Noboro Tominaga,
Hirley Alves,
Onel Luiz Alcaraz López,
Richard Demo Souza,
João Luiz Rebelatto,
Matti Latva-Aho
Abstract:
In this work we study the coexistence in the same Radio Access Network (RAN) of two generic services present in the Fifth Generation (5G) of wireless communication systems: enhanced Mobile BroadBand (eMBB) and massive Machine-Type Communications (mMTC). eMBB services are requested for applications that demand extremely high data rates and moderate requirements on latency and reliability, whereas m…
▽ More
In this work we study the coexistence in the same Radio Access Network (RAN) of two generic services present in the Fifth Generation (5G) of wireless communication systems: enhanced Mobile BroadBand (eMBB) and massive Machine-Type Communications (mMTC). eMBB services are requested for applications that demand extremely high data rates and moderate requirements on latency and reliability, whereas mMTC enables applications for connecting a massive number of low-power and low-complexity devices. The coexistence of both services is enabled by means of network slicing and Non-Orthogonal Multiple Access (NOMA) with Successive Interference Cancellation (SIC) decoding. Under the orthogonal slicing, the radio resources are exclusively allocated to each service, while in the non-orthogonal slicing the traffics from both services overlap in the same radio resources. We evaluate the uplink performance of both services in a scenario with a multi-antenna Base Station (BS). Our simulation results show that the performance gains obtained through multiple receive antennas are more accentuated for the non-orthogonal slicing than for the orthogonal allocation of resources, such that the non-orthogonal slicing outperforms its orthogonal counterpart in terms of achievable data rates or number of connected devices as the number of receive antennas increases.
△ Less
Submitted 13 January, 2021;
originally announced January 2021.
-
Non-Orthogonal Multiple Access and Network Slicing: Scalable Coexistence of eMBB and URLLC
Authors:
Eduardo Noboro Tominaga,
Hirley Alves,
Richard Demo Souza,
João Luiz Rebelatto,
Matti Latva-Aho
Abstract:
The 5G systems will feature three generic services: enhanced Mobile BroadBand (eMBB), massive Machine-Type Communications (mMTC) and Ultra-Reliable and Low-Latency Communications (URLLC). The diverse requirements of these services in terms of data-rates, number of connected devices, latency and reliability can lead to a sub-optimal use of the 5G network, thus network slicing is proposed as a solut…
▽ More
The 5G systems will feature three generic services: enhanced Mobile BroadBand (eMBB), massive Machine-Type Communications (mMTC) and Ultra-Reliable and Low-Latency Communications (URLLC). The diverse requirements of these services in terms of data-rates, number of connected devices, latency and reliability can lead to a sub-optimal use of the 5G network, thus network slicing is proposed as a solution that creates customized slices of the network specifically designed to meet the requirements of each service. Under the network slicing, the radio resources can be shared in orthogonal and non-orthogonal schemes. Motivated by Industrial Internet of Things (IIoT) scenarios where a large number of sensors may require connectivity with stringent requirements of latency and reliability, we propose the use of Non-Orthogonal Multiple Access (NOMA) to improve the number of URLLC users that are connected in the uplink to the same base station (BS), for both orthogonal and non-orthogonal network slicing with eMBB users. The multiple URLLC users transmit simultaneously and across multiple frequency channels. We set the reliability requirements for the two services and analyze their pair of sum rates. We show that, even with overlap** transmissions from multiple eMBB and URLLC users, the use of NOMA techniques allows us to guarantee the reliability requirements for both services.
△ Less
Submitted 12 January, 2021;
originally announced January 2021.
-
On the Optimal Deployment of Power Beacons for Massive Wireless Energy Transfer
Authors:
Osmel Martínez Rosabal,
Onel L. Alcaraz López,
Hirley Alves,
Samuel Montejo-Sánchez,
Matti Latva-aho
Abstract:
Wireless energy transfer (WET) is emerging as an enabling green technology for Internet of Things (IoT) networks. WET allows the IoT devices to wirelessly recharge their batteries with energy from external sources such as dedicated radio frequency transmitters called power beacons (PBs). In this paper, we investigate the optimal deployment of PBs that guarantees a network-wide energy outage constr…
▽ More
Wireless energy transfer (WET) is emerging as an enabling green technology for Internet of Things (IoT) networks. WET allows the IoT devices to wirelessly recharge their batteries with energy from external sources such as dedicated radio frequency transmitters called power beacons (PBs). In this paper, we investigate the optimal deployment of PBs that guarantees a network-wide energy outage constraint. Optimal positions for the PBs are determined by maximizing the average incident power for the worst location in the service area since no information about the sensor deployment is provided. Such network planning guarantees the fairest harvesting performance for all the IoT devices. Numerical simulations evidence that our proposed optimization framework improves the energy supply reliability compared to benchmark schemes. Additionally, we show that although both, the number of deployed PBs and the number of antennas per PB, introduce performance improvements, the former has a dominant role. Finally, our proposal allows to extend the coverage area while kee** the total power budget fixed, which additionally reduces the level of electromagnetic radiation in the vicinity of PBs.
△ Less
Submitted 4 March, 2021; v1 submitted 8 December, 2020;
originally announced December 2020.
-
Second layer data governance for permissioned blockchains: the privacy management challenge
Authors:
Paulo Henrique Alves,
Isabella Z. Frajhof,
Fernando A. Correia,
Clarisse de Souza,
Helio Lopes
Abstract:
Data privacy is a trending topic in the internet era. Given such importance, many challenges emerged in order to collect, manage, process, and publish data. In this sense, personal data have got attention, and many regulations emerged, such as GDPR in the European Union and LGPD in Brazil. This regulation model aims to protect users' data from misusage and leakage and allow users to request an exp…
▽ More
Data privacy is a trending topic in the internet era. Given such importance, many challenges emerged in order to collect, manage, process, and publish data. In this sense, personal data have got attention, and many regulations emerged, such as GDPR in the European Union and LGPD in Brazil. This regulation model aims to protect users' data from misusage and leakage and allow users to request an explanation from companies when needed. In pandemic situations, such as the COVID-19 and Ebola outbreak, the action related to sharing health data between different organizations is/ was crucial to develop a significant movement to avoid the massive infection and decrease the number of deaths. However, the data subject, i.e., the users, should have the right to request the purpose of data use, anonymization, and data deletion. In this sense, permissioned blockchain technology emerges to empower users to get their rights providing data ownership, transparency, and security through an immutable, unified, and distributed database ruled by smart contracts. The governance model discussed in blockchain applications is usually regarding the first layer governance, i.e., public and permissioned models. However, this discussion is too superficial, and they do not cover compliance with the data regulations. Therefore, in order to organize the relationship between data owners and the stakeholders, i.e., companies and governmental entities, we developed a second layer data governance model for permissioned blockchains based on the Governance Analytical Framework principles applied in pandemic situations preserving the users' privacy and their duties. From the law perspective, we based our model on the UE GDPR in regard to data privacy concerns.
△ Less
Submitted 22 October, 2020;
originally announced October 2020.
-
LoRa Performance Analysis with Superposed Signal Decoding
Authors:
J. M. de Souza Sant'Ana,
A. Hoeller,
R. D. Souza,
H. Alves,
S. Montejo-Sánchez
Abstract:
This paper considers the use of successive interference cancellation (SIC) to decode superposed signals in Long Range (LoRa) networks. We build over a known stochastic geometry model for LoRa networks and include the effect of recovering colliding packets through SIC. We derive closed-form expressions for the successful decoding of packets using SIC taking path loss, fading, noise, and interferenc…
▽ More
This paper considers the use of successive interference cancellation (SIC) to decode superposed signals in Long Range (LoRa) networks. We build over a known stochastic geometry model for LoRa networks and include the effect of recovering colliding packets through SIC. We derive closed-form expressions for the successful decoding of packets using SIC taking path loss, fading, noise, and interference into account, while we validate the model by means of Monte Carlo simulations. Results show that SIC-enabled LoRa networks improve worst-case reliability by up to 34%. We show that, for at least one test scenario, SIC increases by 159% the number of served users with the same worst-case reliability level.
△ Less
Submitted 19 October, 2020;
originally announced October 2020.
-
A Predictive Interference Management Algorithm for URLLC in Beyond 5G Networks
Authors:
Nurul Huda Mahmood,
Onel Alcaraz Lopez,
Hirley Alves,
Matti Latva-aho
Abstract:
Interference mitigation is a major design challenge in wireless systems,especially in the context of ultra-reliable low-latency communication (URLLC) services. Conventional average-based interference management schemes are not suitable for URLLC as they do not accurately capture the tail information of the interference distribution. This letter proposes a novel interference prediction algorithm th…
▽ More
Interference mitigation is a major design challenge in wireless systems,especially in the context of ultra-reliable low-latency communication (URLLC) services. Conventional average-based interference management schemes are not suitable for URLLC as they do not accurately capture the tail information of the interference distribution. This letter proposes a novel interference prediction algorithm that considers the entire interference distribution instead of only the mean. The key idea is to model the interference variation as a discrete state space discrete-time Markov chain. The state transition probability matrix is then used to estimate the state evolution in time, and allocate radio resources accordingly. The proposed scheme is found to meet the target reliability requirements in a low-latency single-shot transmission system considering realistic system assumptions, while requiring only ~25% more resources than the optimum case with perfect interference knowledge.
△ Less
Submitted 21 September, 2020;
originally announced September 2020.
-
Ultra-low Latency, Low Energy and Massiveness in the 6G Era via Efficient CSIT-limited Schemes
Authors:
Onel L. A. López,
Nurul H. Mahmood,
Hirley Alves,
Carlos M. Lima,
Matti Latva-aho
Abstract:
Channel state information (CSI) has been a key component in traditional wireless communication systems. This might no longer hold in future networks supporting services with stringent quality of service constraints such as extremely low-latency, low-energy and/or large number of simultaneously connected devices, where acquiring CSI would become extremely costly or even impractical. We overview the…
▽ More
Channel state information (CSI) has been a key component in traditional wireless communication systems. This might no longer hold in future networks supporting services with stringent quality of service constraints such as extremely low-latency, low-energy and/or large number of simultaneously connected devices, where acquiring CSI would become extremely costly or even impractical. We overview the main limitations of CSI at transmitter side (CSIT)-based designs toward the 6G era, assess how to design and use efficient CSIT-limited schemes that allow meeting the new and stringent requirements, and highlight some key research directions. We delve into the ideas of efficiently allocating pilot sequences, relying on statistical CSIT and/or using location-based strategies, and demonstrate viability via a selected use case.
△ Less
Submitted 14 September, 2020;
originally announced September 2020.
-
A Low-Complexity Beamforming Design for Multiuser Wireless Energy Transfer
Authors:
Onel L. A. López,
Francisco A. Monteiro,
Hirley Alves,
Rui Zhang,
Matti Latva-aho
Abstract:
Wireless energy transfer (WET) is a green enabler of low-power Internet of Things (IoT). Therein, traditional optimization schemes relying on full channel state information (CSI) are often too costly to implement due to excessive energy consumption and high processing complexity. This letter proposes a simple, yet effective, energy beamforming scheme that allows a multi-antenna power beacon (PB) t…
▽ More
Wireless energy transfer (WET) is a green enabler of low-power Internet of Things (IoT). Therein, traditional optimization schemes relying on full channel state information (CSI) are often too costly to implement due to excessive energy consumption and high processing complexity. This letter proposes a simple, yet effective, energy beamforming scheme that allows a multi-antenna power beacon (PB) to fairly power a set of IoT devices by only relying on the first-order statistics of the channels. In addition to low complexity, the proposed scheme performs favorably as compared to benchmarking schemes and its performance improves as the number of PB's antennas increases. Finally, it is shown that further performance improvement can be achieved through proper angular rotations of the PB.
△ Less
Submitted 28 August, 2020;
originally announced August 2020.
-
Traffic Prediction Based Fast Uplink Grant for Massive IoT
Authors:
Mohammad Shehab,
Alexander K. Hagelskjær,
Anders E. Kalør,
Petar Popovski,
Hirley Alves
Abstract:
This paper presents a novel framework for traffic prediction of IoT devices activated by binary Markovian events. First, we consider a massive set of IoT devices whose activation events are modeled by an On-Off Markov process with known transition probabilities. Next, we exploit the temporal correlation of the traffic events and apply the forward algorithm in the context of hidden Markov models (H…
▽ More
This paper presents a novel framework for traffic prediction of IoT devices activated by binary Markovian events. First, we consider a massive set of IoT devices whose activation events are modeled by an On-Off Markov process with known transition probabilities. Next, we exploit the temporal correlation of the traffic events and apply the forward algorithm in the context of hidden Markov models (HMM) in order to predict the activation likelihood of each IoT device. Finally, we apply the fast uplink grant scheme in order to allocate resources to the IoT devices that have the maximal likelihood for transmission. In order to evaluate the performance of the proposed scheme, we define the regret metric as the number of missed resource allocation opportunities. The proposed fast uplink scheme based on traffic prediction outperforms both conventional random access and time division duplex in terms of regret and efficiency of system usage, while it maintains its superiority over random access in terms of average age of information for massive deployments.
△ Less
Submitted 5 August, 2020;
originally announced August 2020.
-
CSI-free vs CSI-based multi-antenna WET for massive low-power Internet of Things
Authors:
Onel L. A. López,
Nurul Huda Mahmood,
Hirley Alves,
Matti Latva-aho
Abstract:
Wireless Energy Transfer (WET) is a promising solution for powering massive Internet of Things deployments. An important question is whether the costly Channel State Information (CSI) acquisition procedure is necessary for optimum performance. In this paper, we shed some light into this matter by evaluating CSI-based and CSI-free multi-antenna WET schemes in a setup with WET in the downlink, and p…
▽ More
Wireless Energy Transfer (WET) is a promising solution for powering massive Internet of Things deployments. An important question is whether the costly Channel State Information (CSI) acquisition procedure is necessary for optimum performance. In this paper, we shed some light into this matter by evaluating CSI-based and CSI-free multi-antenna WET schemes in a setup with WET in the downlink, and periodic or Poisson-traffic Wireless Information Transfer (WIT) in the uplink. When CSI is available, we show that a maximum ratio transmission beamformer is close to optimum whenever the farthest node experiences at least 3 dB of power attenuation more than the remaining devices. On the other hand, although the adopted CSI-free mechanism is not capable of providing average harvesting gains, it does provide greater WET/WIT diversity with lower energy requirements when compared with the CSI-based scheme. Our numerical results evidence that the CSI-free scheme performs favorably under periodic traffic conditions, but it may be deficient in case of Poisson traffic, specially if the setup is not optimally configured. Finally, we show the prominent performance results when the uplink transmissions are periodic, while highlighting the need of a minimum mean square error equalizer rather than zero-forcing for information decoding.
△ Less
Submitted 22 December, 2020; v1 submitted 29 May, 2020;
originally announced June 2020.
-
Optimizing Neural Architecture Search using Limited GPU Time in a Dynamic Search Space: A Gene Expression Programming Approach
Authors:
Jeovane Honorio Alves,
Lucas Ferrari de Oliveira
Abstract:
Efficient identification of people and objects, segmentation of regions of interest and extraction of relevant data in images, texts, audios and videos are evolving considerably in these past years, which deep learning methods, combined with recent improvements in computational resources, contributed greatly for this achievement. Although its outstanding potential, development of efficient archite…
▽ More
Efficient identification of people and objects, segmentation of regions of interest and extraction of relevant data in images, texts, audios and videos are evolving considerably in these past years, which deep learning methods, combined with recent improvements in computational resources, contributed greatly for this achievement. Although its outstanding potential, development of efficient architectures and modules requires expert knowledge and amount of resource time available. In this paper, we propose an evolutionary-based neural architecture search approach for efficient discovery of convolutional models in a dynamic search space, within only 24 GPU hours. With its efficient search environment and phenotype representation, Gene Expression Programming is adapted for network's cell generation. Despite having limited GPU resource time and broad search space, our proposal achieved similar state-of-the-art to manually-designed convolutional networks and also NAS-generated ones, even beating similar constrained evolutionary-based NAS works. The best cells in different runs achieved stable results, with a mean error of 2.82% in CIFAR-10 dataset (which the best model achieved an error of 2.67%) and 18.83% for CIFAR-100 (best model with 18.16%). For ImageNet in the mobile setting, our best model achieved top-1 and top-5 errors of 29.51% and 10.37%, respectively. Although evolutionary-based NAS works were reported to require a considerable amount of GPU time for architecture search, our approach obtained promising results in little time, encouraging further experiments in evolutionary-based NAS, for search and network representation improvements.
△ Less
Submitted 15 May, 2020;
originally announced May 2020.
-
White Paper on Critical and Massive Machine Type Communication Towards 6G
Authors:
Nurul Huda Mahmood,
Stefan Böcker,
Andrea Munari,
Federico Clazzer,
Ingrid Moerman,
Konstantin Mikhaylov,
Onel Lopez,
Ok-Sun Park,
Eric Mercier,
Hannes Bartz,
Riku Jäntti,
Ravikumar Pragada,
Yihua Ma,
Elina Annanperä,
Christian Wietfeld,
Martin Andraud,
Gianluigi Liva,
Yan Chen,
Eduardo Garro,
Frank Burkhardt,
Hirley Alves,
Chen-Feng Liu,
Yalcin Sadi,
Jean-Baptiste Dore,
Eunah Kim
, et al. (6 additional authors not shown)
Abstract:
The society as a whole, and many vertical sectors in particular, is becoming increasingly digitalized. Machine Type Communication (MTC), encompassing its massive and critical aspects, and ubiquitous wireless connectivity are among the main enablers of such digitization at large. The recently introduced 5G New Radio is natively designed to support both aspects of MTC to promote the digital transfor…
▽ More
The society as a whole, and many vertical sectors in particular, is becoming increasingly digitalized. Machine Type Communication (MTC), encompassing its massive and critical aspects, and ubiquitous wireless connectivity are among the main enablers of such digitization at large. The recently introduced 5G New Radio is natively designed to support both aspects of MTC to promote the digital transformation of the society. However, it is evident that some of the more demanding requirements cannot be fully supported by 5G networks. Alongside, further development of the society towards 2030 will give rise to new and more stringent requirements on wireless connectivity in general, and MTC in particular. Driven by the societal trends towards 2030, the next generation (6G) will be an agile and efficient convergent network serving a set of diverse service classes and a wide range of key performance indicators (KPI). This white paper explores the main drivers and requirements of an MTC-optimized 6G network, and discusses the following six key research questions:
- Will the main KPIs of 5G continue to be the dominant KPIs in 6G; or will there emerge new key metrics?
- How to deliver different E2E service mandates with different KPI requirements considering joint-optimization at the physical up to the application layer?
- What are the key enablers towards designing ultra-low power receivers and highly efficient sleep modes?
- How to tackle a disruptive rather than incremental joint design of a massively scalable waveform and medium access policy for global MTC connectivity?
- How to support new service classes characterizing mission-critical and dependable MTC in 6G?
- What are the potential enablers of long term, lightweight and flexible privacy and security schemes considering MTC device requirements?
△ Less
Submitted 4 May, 2020; v1 submitted 29 April, 2020;
originally announced April 2020.
-
Three-layer Approach to Detect Anomalies in Industrial Environments based on Machine Learning
Authors:
Daniel Gutierrez-Rojas,
Mehar Ullah,
Ioannis T. Christou,
Gustavo Almeida,
Pedro H. J. Nardelli,
Dick Carrillo,
Jean M. Sant'Ana,
Hirley Alves,
Merim Dzaferagic,
Alessandro Chiumento,
Charalampos Kalalas
Abstract:
This paper introduces a general approach to design a tailored solution to detect rare events in different industrial applications based on Internet of Things (IoT) networks and machine learning algorithms. We propose a general framework based on three layers (physical, data and decision) that defines the possible designing options so that the rare events/anomalies can be detected ultra-reliably. T…
▽ More
This paper introduces a general approach to design a tailored solution to detect rare events in different industrial applications based on Internet of Things (IoT) networks and machine learning algorithms. We propose a general framework based on three layers (physical, data and decision) that defines the possible designing options so that the rare events/anomalies can be detected ultra-reliably. This general framework is then applied in a well-known benchmark scenario, namely Tennessee Eastman Process. We then analyze this benchmark under three threads related to data processes: acquisition, fusion and analytics. Our numerical results indicate that: (i) event-driven data acquisition can significantly decrease the number of samples while filtering measurement noise, (ii) mutual information data fusion method can significantly decrease the variable spaces and (iii) quantitative association rule mining method for data analytics is effective for the rare event detection, identification and diagnosis. These results indicates the benefits of an integrated solution that jointly considers the different levels of data processing following the proposed general three layer framework, including details of the communication network and computing platform to be employed.
△ Less
Submitted 20 April, 2020;
originally announced April 2020.
-
Enabling URLLC for Low-Cost IoT Devices via Diversity Combining Schemes
Authors:
Onel L. Alcaraz López,
Nurul Huda Mahmood,
Hirley Alves
Abstract:
Supporting Ultra-Reliable Low-Latency Communication (URLLC) in the Internet of Things (IoT) era is challenging due to stringent constraints on latency and reliability combined with the simple circuitry of IoT nodes. Diversity is usually required for sustaining the reliability levels of URLLC, but there is an additional delay associated to auxiliary procedures to be considered, specially when commu…
▽ More
Supporting Ultra-Reliable Low-Latency Communication (URLLC) in the Internet of Things (IoT) era is challenging due to stringent constraints on latency and reliability combined with the simple circuitry of IoT nodes. Diversity is usually required for sustaining the reliability levels of URLLC, but there is an additional delay associated to auxiliary procedures to be considered, specially when communication includes low-cost IoT devices. Herein, we analyze Selection Combining (SC) and Switch and Stay Combining (SSC) diversity schemes as plausible solutions for enabling ultra-reliable low-latency downlink communications to low-cost IoT devices. We demonstrate the necessity of considering the time spent in auxiliary procedures, which has not been traditionally taken into account, while we show its impact on the reliability performance. We show there is an optimum number of receive antennas, which suggests that under certain conditions it might be required to turn off some of them, specially under the SC operation. We highlight the superiority of SSC with respect to SC as long the associated Signal-to-Noise Ratio threshold is properly selected. We propose using a fixed threshold relying only on long-term channel fading statistics, which leads to near-optimum results.
△ Less
Submitted 4 March, 2020;
originally announced March 2020.
-
Ultra Reliable Communication via Optimum Power Allocation for HARQ Retransmission Schemes
Authors:
Endrit Dosti,
Mohammad Shehab,
Hirley Alves,
Matti Latva-aho
Abstract:
In this work, we develop low complexity, optimal power allocation algorithms that would allow ultra reliable operation at any outage probability target with minimum power consumption in the finite blocklength regime by utilizing Karush-Kuhn-Tucker (KKT) conditions. In our setup, we assume that the transmitter does not know the channel state information (CSI). First, we show that achieving a very l…
▽ More
In this work, we develop low complexity, optimal power allocation algorithms that would allow ultra reliable operation at any outage probability target with minimum power consumption in the finite blocklength regime by utilizing Karush-Kuhn-Tucker (KKT) conditions. In our setup, we assume that the transmitter does not know the channel state information (CSI). First, we show that achieving a very low packet outage probability by using an open loop setup requires extremely high power consumption. Thus, we resort to retransmission schemes as a solution, namely Automatic Repeat Request (ARQ), Chase Combining Hybrid ARQ (CC-HARQ) and Incremental Redundancy (IR) HARQ. Countrary to classical approaches, where it is optimal to allocate equal power with each transmission, we show that for operation in the ultra reliable regime (URR), the optimal strategy suggests transmission with incremental power in each round. Numerically, we evaluate the power gains of the proposed protocol. We show that the best power saving is given by IR-HARQ protocol. Further, we show that when compared to the one shot transmission, these protocols enable large average and maximum power gains. Finally, we show that the larger the number of transmissions is, the larger power gains will be attained.
△ Less
Submitted 25 February, 2020;
originally announced February 2020.
-
Beyond 5G Low-Power Wide-Area Networks: A LoRaWAN Suitability Study
Authors:
Arliones Hoeller,
Jean Sant'Ana,
Juho Markkula,
Konstantin Mikhaylov,
Richard Souza,
Hirley Alves
Abstract:
In this paper, we deliver a discussion regarding the role of Low-Power Wide-Area Networks (LPWAN) in the cellular Internet-of-Things (IoT) infrastructure to support massive Machine-Type Communications (mMTC) in next-generation wireless systems beyond 5G. We commence by presenting a performance analysis of current LPWAN systems, specifically LoRaWAN, in terms of coverage and throughput. The results…
▽ More
In this paper, we deliver a discussion regarding the role of Low-Power Wide-Area Networks (LPWAN) in the cellular Internet-of-Things (IoT) infrastructure to support massive Machine-Type Communications (mMTC) in next-generation wireless systems beyond 5G. We commence by presenting a performance analysis of current LPWAN systems, specifically LoRaWAN, in terms of coverage and throughput. The results obtained using analytic methods and network simulations are combined in the paper for getting a more comprehensive vision. Next, we identify possible performance bottlenecks, speculate on the characteristics of coming IoT applications, and seek to identify potential enhancements to the current technologies that may overcome the identified shortcomings.
△ Less
Submitted 19 February, 2020;
originally announced February 2020.
-
Performance Analysis of Single-Cell Adaptive Data Rate-Enabled LoRaWAN
Authors:
Arliones Hoeller,
Richard Demo Souza,
Samuel Montejo-Sánchez,
Hirley Alves
Abstract:
LoRaWAN enables massive connectivity for Internet-of-Things applications. Many published works employ stochastic geometry to derive outage models of LoRaWAN over fading channels assuming fixed transmit power and distance-based spreading factor (SF) allocation. However, in practice, LoRaWAN employs the Adaptive Data Rate (ADR) mechanism, which dynamically adjusts SF and transmit power of nodes base…
▽ More
LoRaWAN enables massive connectivity for Internet-of-Things applications. Many published works employ stochastic geometry to derive outage models of LoRaWAN over fading channels assuming fixed transmit power and distance-based spreading factor (SF) allocation. However, in practice, LoRaWAN employs the Adaptive Data Rate (ADR) mechanism, which dynamically adjusts SF and transmit power of nodes based on channel state. The community addressed the performance of ADR using simulations, but analytical models have not been introduced. In this letter, we seek to close this gap. We build over an analytical LoRaWAN model to consider the performance of steady-state ADR-enabled LoRaWAN. We derive outage expressions and an optimization procedure to maximize the number of users under reliability constraints. Results show that power allocation reduces interference and improves network capacity while reducing average power.
△ Less
Submitted 19 February, 2020;
originally announced February 2020.
-
On CSI-free Multi-Antenna Schemes for Massive RF Wireless Energy Transfer
Authors:
Onel L. A. López,
Samuel Montejo-Sánchez,
Richard D. Souza,
Hirley Alves,
Constantinos B. Papadias
Abstract:
Wireless Energy Transfer (WET) is emerging as a potential green enabler for massive Internet of Things (IoT). Herein, we analyze Channel State Information (CSI)-free multi-antenna strategies for powering wirelessly a large set of single-antenna IoT devices. The CSI-free schemes are AA-SS (AA-IS), where all antennas transmit the same (independent) signal(s), and SA, where just one antenna transmits…
▽ More
Wireless Energy Transfer (WET) is emerging as a potential green enabler for massive Internet of Things (IoT). Herein, we analyze Channel State Information (CSI)-free multi-antenna strategies for powering wirelessly a large set of single-antenna IoT devices. The CSI-free schemes are AA-SS (AA-IS), where all antennas transmit the same (independent) signal(s), and SA, where just one antenna transmits at a time such that all antennas are utilized during the coherence block. We characterize the distribution of the provided energy under correlated Rician fading for each scheme and find out that while AA-IS and SA cannot take advantage of the multiple antennas to improve the average provided energy, its dispersion can be significantly reduced. Meanwhile, AA-SS provides the greatest average energy, but also the greatest energy dispersion, and the gains depend critically on the mean phase shifts between the antenna elements. We find that consecutive antennas must be $π$ phase-shifted for optimum average energy performance under AA-SS. Our numerical results evidenced that correlation is beneficial under AA-SS, while a greater line of sight (LOS) and/or number of antennas is not always beneficial under such scheme. Meanwhile, both AA-IS and SA schemes benefit from small correlation, large LOS and/or large number of antennas.
△ Less
Submitted 15 June, 2020; v1 submitted 6 February, 2020;
originally announced February 2020.
-
Hybrid Coded Replication in LoRa Networks
Authors:
Jean Michel de Souza Sant'Ana,
Arliones Hoeller,
Richard Demo Souza,
Samuel Montejo-Sánchez,
Hirley Alves,
Mario de Noronha Neto
Abstract:
Low Power Wide Area Networks (LPWAN) are wireless connectivity solutions for Internet-of-Things (IoT) applications, including industrial automation. Among the several LPWAN technologies, LoRaWAN has been extensively addressed by the research community and the industry. However, the reliability and scalability of LoRaWAN are still uncertain. One of the techniques to increase the reliability of LoRa…
▽ More
Low Power Wide Area Networks (LPWAN) are wireless connectivity solutions for Internet-of-Things (IoT) applications, including industrial automation. Among the several LPWAN technologies, LoRaWAN has been extensively addressed by the research community and the industry. However, the reliability and scalability of LoRaWAN are still uncertain. One of the techniques to increase the reliability of LoRaWAN is message replication, which exploits time diversity. This paper proposes a novel hybrid coded message replication scheme that interleaves simple repetition and a recently proposed coded replication method. We analyze the optimization of the proposed scheme under minimum reliability requirements and show that it enhances the network performance without requiring additional transmit power compared to the competing replication techniques.
△ Less
Submitted 9 January, 2020;
originally announced January 2020.
-
Iterative Bayesian-based Localization Mechanism for Industry Verticals
Authors:
Henrique Hilleshein,
Carlos H. M. de Lima,
Hirley Alves,
Matti Latva-aho
Abstract:
We propose and evaluate an iterative localization mechanism employing Bayesian inference to estimate the position of a target using received signal strength measurements. The probability density functions of the target's coordinates are estimated through a Bayesian network. Herein, we consider an iterative procedure whereby our predictor (posterior distribution) is updated in a sequential order wh…
▽ More
We propose and evaluate an iterative localization mechanism employing Bayesian inference to estimate the position of a target using received signal strength measurements. The probability density functions of the target's coordinates are estimated through a Bayesian network. Herein, we consider an iterative procedure whereby our predictor (posterior distribution) is updated in a sequential order whenever new measurements are made available. The performance of the mechanism is assessed in terms of the respective root mean square error and kernel density estimation of the target coordinates. Our numerical results showed the proposed iterative mechanism achieves increasingly better estimation of the target node position each updating round of the Bayesian network with new input measurements.
△ Less
Submitted 4 March, 2020; v1 submitted 14 January, 2020;
originally announced January 2020.
-
Massive Wireless Energy Transfer: Enabling Sustainable IoT Towards 6G Era
Authors:
Onel L. Alcaraz López,
Hirley Alves,
Richard Demo Souza,
Samuel Montejo-Sánchez,
Evelio M. García Fernández,
Matti Latva-aho
Abstract:
Recent advances on wireless energy transfer (WET) make it a promising solution for powering future Internet of Things (IoT) devices enabled by the upcoming sixth generation (6G) era. The main architectures, challenges and techniques for efficient and scalable wireless powering are overviewed in this paper. Candidates enablers such as energy beamforming (EB), distributed antenna systems (DAS), adva…
▽ More
Recent advances on wireless energy transfer (WET) make it a promising solution for powering future Internet of Things (IoT) devices enabled by the upcoming sixth generation (6G) era. The main architectures, challenges and techniques for efficient and scalable wireless powering are overviewed in this paper. Candidates enablers such as energy beamforming (EB), distributed antenna systems (DAS), advances on devices' hardware and programmable medium, new spectrum opportunities, resource scheduling and distributed ledger technology are outlined. Special emphasis is placed on discussing the suitability of channel state information (CSI)-limited/free strategies when powering simultaneously a massive number of devices. The benefits from combining DAS and EB, and from using average CSI whenever available, are numerically illustrated. The pros and cons of the state-of-the-art CSI-free WET techniques in ultra-low power setups are thoroughly revised, and some possible future enhancements are outlined. Finally, key research directions towards realizing WET-enabled massive IoT networks in the 6G era are identified and discussed in detail.
△ Less
Submitted 2 January, 2021; v1 submitted 11 December, 2019;
originally announced December 2019.
-
On the Secrecy Performance and Power Allocation in Relaying Networks with Untrusted Relay in the Partial Secrecy Regime
Authors:
Diana P. M. Osorio,
Hirley Alves,
Edgar E. B. Olivo
Abstract:
Recently, three useful secrecy metrics based on the partial secrecy regime were proposed to analyze secure transmissions on wireless systems over quasi-static fading channels, namely: generalized secrecy outage probability, average fractional equivocation, and average information leakage. These metrics were devised from the concept of fractional equivocation, which is related to the decoding error…
▽ More
Recently, three useful secrecy metrics based on the partial secrecy regime were proposed to analyze secure transmissions on wireless systems over quasi-static fading channels, namely: generalized secrecy outage probability, average fractional equivocation, and average information leakage. These metrics were devised from the concept of fractional equivocation, which is related to the decoding error probability at the eavesdropper, so as to provide a comprehensive insight on the practical implementation of wireless systems with different levels of secrecy requirements. Considering the partial secrecy regime, in this paper we examine the secrecy performance of an amplify-and-forward relaying network with an untrusted relay node, where a destination-based jamming is employed to enable secure transmissions. In this regard, a closed-form approximation is derived for the generalized secrecy outage probability, and integral-form expressions are obtained for the average fractional equivocation and the average information leakage rate. Additionally, equal and optimal power allocation schemes are investigated and compared for the three metrics. From this analysis, we show that different power allocation approaches lead to different system design criteria. The obtained expressions are validated via Monte Carlo simulations.
△ Less
Submitted 8 December, 2019;
originally announced December 2019.
-
Dynamic Multi-Connectivity Activation for Ultra-Reliable and Low-Latency Communication
Authors:
Nurul Huda Mahmood,
Hirley Alves
Abstract:
Multi-connectivity (MC) with packet duplication, where the same data packet is duplicated and transmitted from multiple transmitters, is proposed in 5G New Radio as a reliability enhancement feature. However, it is found to be resource inefficient, since radio resources from more than one transmitters are required to serve a single user. Improving the performance enhancement vs. resource utilizati…
▽ More
Multi-connectivity (MC) with packet duplication, where the same data packet is duplicated and transmitted from multiple transmitters, is proposed in 5G New Radio as a reliability enhancement feature. However, it is found to be resource inefficient, since radio resources from more than one transmitters are required to serve a single user. Improving the performance enhancement vs. resource utilization tradeoff with MC is therefore a key design challenge. This work proposes a heuristic resource efficient latency-aware dynamic MC algorithm which activates MC selectively such that its benefits are harnessed for critical users, while minimizing the corresponding resource usage. Numerical results indicate that the proposed algorithm can deliver the outage performance gains of legacy MC schemes while requiring up to 45% less resources.
△ Less
Submitted 22 November, 2019;
originally announced November 2019.
-
Rate Control for Wireless-Powered Communication Network with Reliability and Delay Constraints
Authors:
Onel L. Alcaraz López,
Hirley Alves,
Richard Demo Souza,
Samuel Montejo-Sánchez,
Evelio M. García Fernández
Abstract:
We consider a two-phase Wireless-Powered Communication Network under Nakagami-m fading, where a wireless energy transfer process first powers a sensor node that then uses such energy to transmit its data in the wireless information transmission phase. We explore a fixed transmit rate scheme designed to cope with the reliability and delay constraints of the system while attaining closed-form approx…
▽ More
We consider a two-phase Wireless-Powered Communication Network under Nakagami-m fading, where a wireless energy transfer process first powers a sensor node that then uses such energy to transmit its data in the wireless information transmission phase. We explore a fixed transmit rate scheme designed to cope with the reliability and delay constraints of the system while attaining closed-form approximations for the optimum wireless energy transfer and wireless information transmission blocklength. Then, a more-elaborate rate control strategy exploiting the readily available battery charge information is proposed and the results evidence its outstanding performance when compared with the fixed transmit rate, for which no battery charge information is available. It even reaches an average rate performance close to that of an ideal scheme requiring full Channel State Information at transmitter side. Numerical results show the positive impact of a greater number of antennas at the destination, and evidence that the greater the reliability constraints, the smaller the message sizes on average, and the smaller the optimum information blocklengths. Finally, we corroborate the appropriateness of using the asymptotic blocklength formulation as an approximation of the non-asymptotic finite blocklength results.
△ Less
Submitted 30 August, 2019;
originally announced September 2019.
-
Distributed Rate Control in Downlink NOMA Networks with Reliability Constraints
Authors:
Onel L. A. López,
Hirley Alves,
Matti Latva-aho
Abstract:
Non-orthogonal multiple access (NOMA) has been identified as a promising technology for future wireless systems due to its performance gains in spectral efficiency when compared to conventional orthogonal schemes (OMA). This gain can be easily translated to an increasing number of served users, but imposes a challenge in the system reliability which is of vital importance for new services and appl…
▽ More
Non-orthogonal multiple access (NOMA) has been identified as a promising technology for future wireless systems due to its performance gains in spectral efficiency when compared to conventional orthogonal schemes (OMA). This gain can be easily translated to an increasing number of served users, but imposes a challenge in the system reliability which is of vital importance for new services and applications of coming cellular systems. To cope with these issues we propose a NOMA rate control strategy that makes use only of topological characteristics of the scenario and the reliability constraint. We attain the necessary conditions so that NOMA overcomes the OMA alternative, while we discuss the optimum allocation strategies for the 2-user NOMA setup when operating with equal rate or maximum sum-rate goals. In such scenario we show that the user with the largest target error probability times the ratio between the average receive signal power and the average interference power, should be scheduled to be decoded first for optimum performance. We compare numerically the performance of our allocation scheme with its ideal counterpart requiring full CSI at the BSs and infinitely long blocklength, and show how the gap increases as the reliability constraint becomes more stringent. Results also evidence the benefits of NOMA when the co-interference can be efficiently canceled, specially when the goal is to maximize the sum-rate.
△ Less
Submitted 15 August, 2019;
originally announced August 2019.
-
Progress during the NOPP Wave Model Improvement Program
Authors:
Donald T. Resio,
Charles L. Vincent,
Hendrik L. Tolman,
Arun Chawla,
W. Erick Rogers,
Fabrice Ardhuin,
Alexander Babanin,
Michael L. Banner,
James M. Kaihatu,
Alexander Sheremet,
William Perrie,
J. Henrique Alves,
Russel P. Morison,
Tim T. Janssen,
Pieter Smidt,
Jeff Hanson,
Vladimir E. Zakharov,
Andre Pushkarev
Abstract:
This paper reviews the research activities that were carried out under the auspices of the National Ocean Partnership Program (NOPP) to advance research in wind wave modeling and transfer maturing technologies into operational community models. Primary focus of research activities that were funded under this program was to improve the source terms associated with deep water wind waves with a secon…
▽ More
This paper reviews the research activities that were carried out under the auspices of the National Ocean Partnership Program (NOPP) to advance research in wind wave modeling and transfer maturing technologies into operational community models. Primary focus of research activities that were funded under this program was to improve the source terms associated with deep water wind waves with a secondary focus on shallow water processes. While the focus has been on develo** capabilities for stochastic phase averaged models, some of the research work reported here also touches on phase resolved models as well as updates that are needed to the classical stochastic equations to be applicable in shallow water conditions. The primary focus is on the development of new source terms to account for wave generation, dissipation and nonlinear wave-wave interactions. A direct result of this program has been the development of new physics packages in operational wave models that have improved forecast skill from 30 to 50 percent. Since this is an overview paper summarizing all the activities that were undertaken under this program, only the major results are presented here. The readers are directed to other publications for more details. The paper ends with a discussion of the remaining major challenges in wind wave modeling, from the larger open ocean scales to the smaller coastal domains.
△ Less
Submitted 9 August, 2019;
originally announced August 2019.
-
Achieving Ultra-Reliable Communication via CRAN-Enabled Diversity Schemes
Authors:
Binod Kharel,
Onel L. Alcaraz López,
Hirley Alves,
Matti Latva-aho
Abstract:
Internet of things is in progress to build a smart society, and wireless networks are critical enablers for many of its use cases. In this paper, we present a multi-coordinated transmission scheme to achieve ultra-reliability for critical machine-type wireless communication networks. We take advantage of diversity, which is fundamental for dealing with fading channel impairments, and for achieving…
▽ More
Internet of things is in progress to build a smart society, and wireless networks are critical enablers for many of its use cases. In this paper, we present a multi-coordinated transmission scheme to achieve ultra-reliability for critical machine-type wireless communication networks. We take advantage of diversity, which is fundamental for dealing with fading channel impairments, and for achieving ultra-reliable region of operation in order of five 9's as defined by 3GPP standardization bodies. We evaluate an interference-limited network composed of multiple remote radio heads that are allowed to cooperate, by kee** silence thus reducing interference, or by performing more elaborated strategies such as maximal ratio transmission, in order to serve a user equipment with ultra-reliability. We provide extensive numerical analysis and discuss the gains of cooperation by the centralized radio access network.
△ Less
Submitted 17 July, 2019;
originally announced July 2019.
-
Fixed Rate Statistical QoS Provisioning for Markovian Sources in Machine Type Communication
Authors:
Fahad Qasmi,
Mohammad Shehab,
Hirley Alves,
Matti Latva-aho
Abstract:
In this paper, we study the trade-off between reliability and latency in machine type communication (MTC), which consists of single transmitter and receiver in the presence of Rayleigh fading channel. We assume that the transmitter does not know the channel conditions, therefore it would be transmitting information over a fixed rate. The fixed rate transmission is modeled as a two-state continuous…
▽ More
In this paper, we study the trade-off between reliability and latency in machine type communication (MTC), which consists of single transmitter and receiver in the presence of Rayleigh fading channel. We assume that the transmitter does not know the channel conditions, therefore it would be transmitting information over a fixed rate. The fixed rate transmission is modeled as a two-state continuous-time Markov process, where the optimum transmission rate is obtained. Moreover, we conduct a performance analysis for different arrival traffic originated from MTC device via effective rate transmission. We consider that the arrival traffic is modeled as a Markovian process namely Discrete-Time Markov process, Fluid Markov process, and Markov Modulated Poisson process, under delay violation constraints. Using effective bandwidth and effective capacity theories, we evaluate the trade-off between reliability-latency and identify QoS (Quality of Service) requirement, and derive lower and upper bounds for the effective capacity subject to channel memory decay rate limits.
△ Less
Submitted 26 June, 2019;
originally announced June 2019.
-
Hybrid Resource Scheduling for Aggregation in Massive Machine-type Communication Networks
Authors:
Onel L. Alcaraz López,
Hirley Alves,
Pedro H. J. Nardelli,
Matti Latva-aho
Abstract:
Data aggregation is a promising approach to enable massive machine-type communication (mMTC). Here, we first characterize the aggregation phase where a massive number of machine-type devices transmits to their respective aggregator. By using non-orthogonal multiple access (NOMA), we present a hybrid access scheme where several machine-type devices (MTDs) share the same orthogonal channel. Then, we…
▽ More
Data aggregation is a promising approach to enable massive machine-type communication (mMTC). Here, we first characterize the aggregation phase where a massive number of machine-type devices transmits to their respective aggregator. By using non-orthogonal multiple access (NOMA), we present a hybrid access scheme where several machine-type devices (MTDs) share the same orthogonal channel. Then, we assess the relaying phase where the aggregatted data is forwarded to the base station. The system performance is investigated in terms of average number of MTDs that are simultaneously served under imperfect successive interference cancellation (SIC) at the aggregator for two scheduling schemes, namely random resource scheduling (RRS) and channel-dependent resource scheduling (CRS), which is then used to assess the performance of data forwarding phase.
△ Less
Submitted 25 June, 2019;
originally announced June 2019.
-
Optimum LoRaWAN Configuration Under Wi-SUN Interference
Authors:
Arliones Hoeller-Jr.,
Richard Demo Souza,
Hirley Alves,
Onel L. Alcaraz López,
Samuel Montejo-Sánchez,
Marcelo Eduardo Pellenz
Abstract:
Smart Utility Networks (SUN) rely on the Wireless-SUN (Wi-SUN) specification for years. Recently practitioners and researchers have considered Low-Power Wide-Area Networks (LPWAN) like LoRaWAN for SUN applications. With distinct technologies deployed in the same area and sharing unlicensed bands, one can expect these networks to interfere with one another. This paper builds over a LoRaWAN model to…
▽ More
Smart Utility Networks (SUN) rely on the Wireless-SUN (Wi-SUN) specification for years. Recently practitioners and researchers have considered Low-Power Wide-Area Networks (LPWAN) like LoRaWAN for SUN applications. With distinct technologies deployed in the same area and sharing unlicensed bands, one can expect these networks to interfere with one another. This paper builds over a LoRaWAN model to optimize network parameters while accounting for inter-technology interference. Our analytic model accounts for the interference LoRaWAN receives from IEEE 802.15.4g networks, which forms the bottom layers of Wi-SUN systems. We derive closed-form equations for the expected reliability of LoRaWAN in such scenarios. We set the model parameters with data from real measurements of the interplay among the technologies. Finally, we propose two optimization algorithms to determine the best LoRaWAN configurations, given a targeted minimum reliability level. The algorithms maximize either communication range or the number of users given constraints on the minimum number of users, minimum communication range, and minimum reliability. We validate the models and algorithms through numerical analysis and simulations. The proposed methods are useful tools for planning interference-limited networks with requirements of minimum reliability.
△ Less
Submitted 11 December, 2019; v1 submitted 11 June, 2019;
originally announced June 2019.
-
Joint Power Control and Rate Allocation enabling Ultra-Reliability and Energy Efficiency in SIMO Wireless Networks
Authors:
Onel L. Alcaraz López,
Hirley Alves,
Matti Latva-aho
Abstract:
Coming cellular systems are envisioned to open up to new services with stringent reliability and energy efficiency requirements. In this paper we focus on the joint power control and rate allocation problem in Single-Input Multiple-Output (SIMO) wireless systems with Rayleigh fading and stringent reliability constraints. We propose an allocation scheme that maximizes the energy efficiency of the s…
▽ More
Coming cellular systems are envisioned to open up to new services with stringent reliability and energy efficiency requirements. In this paper we focus on the joint power control and rate allocation problem in Single-Input Multiple-Output (SIMO) wireless systems with Rayleigh fading and stringent reliability constraints. We propose an allocation scheme that maximizes the energy efficiency of the system while making use only of average statistics of the signal and interference, and the number of antennas $M$ that are available at the receiver side. We show the superiority of the Maximum Ratio Combining (MRC) scheme over Selection Combining (SC) in terms of energy efficiency, and prove that the gap between the optimum allocated resources converges to $(M!)^(1/(2M))$ as the reliability constraint becomes more stringent. Meanwhile, in most cases MRC was also shown to be more energy efficient than Switch and Stay Combining (SSC) scheme, although this does not hold only when operating with extremely large $M$, extremely high/small average signal/interference power and/or highly power consuming receiving circuitry. Numerical results show the feasibility of the ultra-reliable operation when $M$ increases, while greater the fixed power consumption and/or drain efficiency of the transmit amplifier is, the greater the optimum transmit power and rate.
△ Less
Submitted 14 May, 2019;
originally announced May 2019.
-
A Throughput and Energy Efficiency Scheme for Unlicensed Massive Machine Type Communications
Authors:
Iran Ramezanipour,
Hirley Alves,
Pedro J. H. Nardelli,
Ari Pouttu
Abstract:
In this paper the throughput and energy efficiency of an unlicensed machine type communications network is studied. If an outage event happens in the network, there is a possibility for packet retransmissions in order to obtain a lower error probability. The model consist of a network with two types of users, Licensed and unlicensed users. The licensed users allocated uplink channel is also used b…
▽ More
In this paper the throughput and energy efficiency of an unlicensed machine type communications network is studied. If an outage event happens in the network, there is a possibility for packet retransmissions in order to obtain a lower error probability. The model consist of a network with two types of users, Licensed and unlicensed users. The licensed users allocated uplink channel is also used by the unlicensed users. However, it is done in a way that no harm is done to the licensed users' transmission from sharing the same channel with the unlicensed users. However, licensed users' transmission causes interference on the unlicensed network. Poisson point process is used here to model the location of the nodes and the effect of interference on the network. We study how different factors such as number of retransmissions, SIR threshold and outage can effect the throughput and energy efficiency of the network. Throughput and energy efficiency are also both studied in constrained optimization problems where the constraints are the SIR threshold and number of retransmission attempts. We also show why it is important to use limited transmissions and what are the benefits.
△ Less
Submitted 4 May, 2019;
originally announced May 2019.
-
Six Key Enablers for Machine Type Communication in 6G
Authors:
Nurul Huda Mahmood,
Hirley Alves,
Onel Alcaraz López,
Mohammad Shehab,
Diana P. Moya Osorio,
Matti Latva-aho
Abstract:
While 5G is being rolled out in different parts of the globe, few research groups around the world $-$ such as the Finnish 6G Flagship program $-$ have already started posing the question: \textit{What will 6G be?} The 6G vision is a data-driven society, enabled by near instant unlimited wireless connectivity. Driven by impetus to provide vertical-specific wireless network solutions, machine type…
▽ More
While 5G is being rolled out in different parts of the globe, few research groups around the world $-$ such as the Finnish 6G Flagship program $-$ have already started posing the question: \textit{What will 6G be?} The 6G vision is a data-driven society, enabled by near instant unlimited wireless connectivity. Driven by impetus to provide vertical-specific wireless network solutions, machine type communication encompassing both its mission critical and massive connectivity aspects is foreseen to be an important cornerstone of 6G development. This article presents an over-arching vision for machine type communication in 6G. In this regard, some relevant performance indicators are first anticipated, followed by a presentation of six key enabling technologies.
△ Less
Submitted 13 March, 2019;
originally announced March 2019.
-
In-Band Pilot Overhead in Ultra-Reliable Low Latency Decode and Forward Relaying
Authors:
Parisa Nouri,
Hirley Alves,
Richard Demo Souza,
Matti Latva-aho
Abstract:
In URLLC the performance of short message communications highly depends on the training sequence length due to the stringent latency and reliability requirements. In this paper, we study the performance of cooperative and non-cooperative transmissions under imperfect channel estimation and Rayleigh fading for URLLC. We assume a peak power constraint on pilot symbols in addition to the average powe…
▽ More
In URLLC the performance of short message communications highly depends on the training sequence length due to the stringent latency and reliability requirements. In this paper, we study the performance of cooperative and non-cooperative transmissions under imperfect channel estimation and Rayleigh fading for URLLC. We assume a peak power constraint on pilot symbols in addition to the average power constraint which is used for comparison purposes. We obtain the optimal training length as a function of blocklength and power constraint factor to meet the URLLC requirements. Moreover, the simulation results show the impact of pilot overhead on reliability, latency, and goodput of cooperative communications compared to pointto-point transmission
△ Less
Submitted 6 March, 2019;
originally announced March 2019.
-
Performance of Non-orthogonal Multiple Access under Finite Blocklength
Authors:
Endrit Dosit,
Mohammad Shehab,
Hirley Alves,
Matti Latva-aho
Abstract:
In this paper, we present a finite-block-length comparison between the orthogonal multiple access (OMA) scheme and the non-orthogonal multiple access (NOMA) for the uplink channel. First, we consider the Gaussian channel, and derive the closed form expressions for the rate and outage probability. Then, we extend our results to the quasi-static Rayleigh fading channel. Our analysis is based on the…
▽ More
In this paper, we present a finite-block-length comparison between the orthogonal multiple access (OMA) scheme and the non-orthogonal multiple access (NOMA) for the uplink channel. First, we consider the Gaussian channel, and derive the closed form expressions for the rate and outage probability. Then, we extend our results to the quasi-static Rayleigh fading channel. Our analysis is based on the recent results on the characterization of the maximum coding rate at finite block-length and finite block-error probability. The overall system throughput is evaluated as a function of the number of information bits, channel uses and power. We find what would be the respective values of these different parameters that would enable throughput maximization. Furthermore, we analyze the system performance in terms of reliability and throughput when applying the type-I ARQ protocol with limited number of retransmissions. The throughput and outage probability are evaluated for different blocklengths and number of information bits. Our analysis reveals that there is a trade-off between reliability and throughput in the ARQ. While increasing the number of retransmissions boosts reliability by minimizing the probability of reception error, it results in more delay which decreases the throughput. Nevertheless, the results show that NOMA always outperforms OMA in terms of throughput, reliability and latency regardless of the users priority or the number of retransmissions in both Gaussian and fading channels.
△ Less
Submitted 26 February, 2019;
originally announced February 2019.
-
On the Statistics of the Ratio of Non-Constrained Arbitrary α-μ Random Variables: a General Framework and Applications
Authors:
J. D. Vega Sánchez,
D. P. Moya Osorio,
E. E. Benitez Olivo,
H. Alves,
M. C. P. Paredes,
L. Urquiza-Aguiar
Abstract:
In this paper, we derive closed-form exact expressions for the main statistics of the ratio of squared alpha-mu random variables, which are of interest in many scenarios for future wireless networks where generalized distributions are more suitable to fit with field data. Importantly, different from previous proposals, our expressions are general in the sense that are valid for non constrained arb…
▽ More
In this paper, we derive closed-form exact expressions for the main statistics of the ratio of squared alpha-mu random variables, which are of interest in many scenarios for future wireless networks where generalized distributions are more suitable to fit with field data. Importantly, different from previous proposals, our expressions are general in the sense that are valid for non constrained arbitrary values of the parameters of the alpha-mu distribution. Thus, the probability density function, cumulative distribution function, moment generating function, and higher order moments are given in terms of both (i) theFox H-function for which we provide a portable and efficient Wolfram Mathematica code and (ii) easily computable series expansions. Our expressions can be used straightforwardly in the performance analysis of a number of wireless communication systems, including either interference-limited scenarios, spectrum sharing, full-duplex or physical-layer security networks, for which we present the application of the proposed framework. Moreover, closed-form expressions for some classical distributions, derived as special cases from the alpha-mu distribution, are provided as byproducts. The validity of the proposed expressions is confirmed via Monte Carlo simulations.
△ Less
Submitted 20 February, 2019;
originally announced February 2019.
-
Effective Capacity and Power Allocation for Machine-Type Communication
Authors:
Mohammad Shehab,
Hirley Alves,
Matti Latva-aho
Abstract:
Effective capacity (EC) determines the maximum communication rate subject to a particular delay constraint. In this work, we analyze the EC of ultra reliable Machine Type Communication (MTC) networks operating in the finite blocklength (FB) regime. First, we present a closed form approximation for EC in quasi-static Rayleigh fading channels. Our analysis determines the upper bounds for EC and dela…
▽ More
Effective capacity (EC) determines the maximum communication rate subject to a particular delay constraint. In this work, we analyze the EC of ultra reliable Machine Type Communication (MTC) networks operating in the finite blocklength (FB) regime. First, we present a closed form approximation for EC in quasi-static Rayleigh fading channels. Our analysis determines the upper bounds for EC and delay constraint when varying transmission power. Finally, we characterize the power-delay trade-off for fixed EC and propose an optimum power allocation scheme which exploits the asymptotic behavior of EC in the high SNR regime. The results illustrate that the proposed scheme provides significant power saving with a negligible loss in EC.
△ Less
Submitted 19 February, 2019;
originally announced February 2019.
-
Statistical Analysis of Multiple Antenna Strategies for Wireless Energy Transfer
Authors:
Onel L. Alcaraz López,
Hirley Alves,
Richard Demo Souza,
Samuel Montejo-Sánchez
Abstract:
Wireless Energy Transfer (WET) is emerging as a potential solution for powering small energy-efficient devices. We propose strategies that use multiple antennas at a power station, which wirelessly charges a large set of single-antenna devices. Proposed strategies operate without Channel State Information (CSI) and we attain the distribution and main statistics of the harvested energy under Rician…
▽ More
Wireless Energy Transfer (WET) is emerging as a potential solution for powering small energy-efficient devices. We propose strategies that use multiple antennas at a power station, which wirelessly charges a large set of single-antenna devices. Proposed strategies operate without Channel State Information (CSI) and we attain the distribution and main statistics of the harvested energy under Rician fading channels with sensitivity and saturation energy harvesting (EH) impairments. A switching antenna strategy, where a single antenna with full power transmits at a time, provides the most predictable energy source, and it is particularly suitable for powering sensor nodes with highly sensitive EH hardware operating under non-LOS (NLOS) conditions; while other WET schemes perform alike or better in terms of the average harvested energy. Under NLOS switching antennas is the best, while when LOS increases transmitting simultaneously with equal power in all antennas is the most beneficial. Moreover, spatial correlation is not beneficial unless the power station transmits simultaneously through all antennas, raising a trade-off between average and variance of the harvested energy since both metrics increase with the spatial correlation. Moreover, the performance gap between CSI-free and CSI-based strategies decreases quickly as the number of devices increases.
△ Less
Submitted 9 July, 2019; v1 submitted 26 November, 2018;
originally announced November 2018.
-
Performance Analysis of Ultra-Reliable Short Message Decode and Forward Relaying Protocols
Authors:
Parisa Nouri,
Hirley Alves,
Matti Latva-aho
Abstract:
Machine-Type Communication (MTC) is a rapidly growing technology which covers a broad range of automated applications and propels the world into a fully connected society. Two new use cases of MTC are mMTC and URLLC, where mMTC support a large number of devices with high reliability and low rate connectivity while URLLC refers to excessively low outage probability under very stringent latency cons…
▽ More
Machine-Type Communication (MTC) is a rapidly growing technology which covers a broad range of automated applications and propels the world into a fully connected society. Two new use cases of MTC are mMTC and URLLC, where mMTC support a large number of devices with high reliability and low rate connectivity while URLLC refers to excessively low outage probability under very stringent latency constraint. Herein, we examine the URLLC through three cooperative schemes, namely dual-hop DF, SC and MRC, and compare to direct transmission under Rayleigh fading. We compare the performance of studied cooperative protocols under two distinct power constraints with respect to latency and energy efficiency. Moreover, we illustrate the impact of coding rate on the probability of successful transmission in ultra-reliable region in addition to the effect of power allocation on the outage probability. We also provide the performance analysis of cooperative schemes in terms of energy efficiency and latency requirements.
△ Less
Submitted 24 August, 2018;
originally announced August 2018.
-
Statistical QoS provisioning for MTC Networks under Finite Blocklength
Authors:
Mohammad Shehab,
Endrit Dosti,
Hirley Alves,
Matti Latva-aho
Abstract:
This paper analyzes the effective capacity of delay constrained machine type communication (MTC) networks operating in the finite blocklength regime. First, we derive a closed-form mathematical approximation for the effective capacity in quasi-static Rayleigh fading channels. We characterize the optimum error probability to maximize the concave effective capacity function with reliability constrai…
▽ More
This paper analyzes the effective capacity of delay constrained machine type communication (MTC) networks operating in the finite blocklength regime. First, we derive a closed-form mathematical approximation for the effective capacity in quasi-static Rayleigh fading channels. We characterize the optimum error probability to maximize the concave effective capacity function with reliability constraint and study the effect of signal-to-interference-plus-noise ratio (SINR) variations for different delay constraints. The trade off between reliability and effective capacity maximization reveals that we can achieve higher reliability with limited sacrifice in effective capacity specially when the number of machines is small. Our analysis reveals that SINR variations have less impact on effective capacity for strict delay constrained networks. We present an exemplary scenario for massive MTC access to analyze the interference effect proposing three methods to restore the effective capacity for a certain node which are power control, graceful degradation of delay constraint and joint compensation. Joint compensation combines both power control and graceful degradation of delay constraint, where we perform maximization of an objective function whose parameters are determined according to delay and SINR priorities. Our results show that networks with stringent delay constraints favor power controlled compensation and compensation is generally performed at higher costs for shorter packets.
△ Less
Submitted 21 August, 2018;
originally announced August 2018.
-
Optimum Transmission Rate in Fading Channels with Markovian Sources and QoS Constraints
Authors:
Fahad Qasmi,
Mohammad Shehab,
Hirley Alves,
Matti Latva-aho
Abstract:
This paper evaluates the performance of reliability and latency in machine type communication networks, which composed of single transmitter and receiver in the presence of Rayleigh fading channel. The source's traffic arrivals are modeled as Markovian processes namely Discrete-Time Markov process, Fluid Markov process, and Markov Modulated Poisson process, and delay/buffer overflow constraints ar…
▽ More
This paper evaluates the performance of reliability and latency in machine type communication networks, which composed of single transmitter and receiver in the presence of Rayleigh fading channel. The source's traffic arrivals are modeled as Markovian processes namely Discrete-Time Markov process, Fluid Markov process, and Markov Modulated Poisson process, and delay/buffer overflow constraints are imposed. Our approach is based on the reliability and latency outage probability, where transmitter not knowing the channel condition, therefore the transmitter would be transmitting information over the fixed rate. The fixed rate transmission is modeled as a two state Discrete time Markov process, which identifies the reliability level of wireless transmission. Using effective bandwidth and effective capacity theories, we evaluate the trade-off between reliability-latency and identify QoS requirement. The impact of different source traffic originated from MTC devices under QoS constraints on the effective transmission rate are investigated.
△ Less
Submitted 21 August, 2018;
originally announced August 2018.
-
Rate Control under Finite Blocklength for Downlink Cellular Networks with Reliability Constraints
Authors:
Onel L. Alcaraz Lopez,
Hirley Alves,
Matti Latva-aho
Abstract:
Coming cellular systems are envisioned to open up to new services and applications with high reliability and low latency requirements. In this paper we focus on the rate allocation problem in downlink cellular networks with Rayleigh fading and stringent reliability constraints. We propose a rate control strategy to cope with those requirements making use only of topological characteristics of the…
▽ More
Coming cellular systems are envisioned to open up to new services and applications with high reliability and low latency requirements. In this paper we focus on the rate allocation problem in downlink cellular networks with Rayleigh fading and stringent reliability constraints. We propose a rate control strategy to cope with those requirements making use only of topological characteristics of the scenario, the reliability constraint and the number of antennas that are available at the receiver side. Numerical results show the feasibility of the ultra-reliable operation when the number of antennas increases, and also that our results remain valid even when operating at short blocklength as far as the amount of information to be transmitted is not too small.
△ Less
Submitted 12 June, 2018;
originally announced June 2018.
-
Finite Blocklength Communications in Smart Grids for Dynamic Spectrum Access and Locally Licensed Scenarios
Authors:
Iran Ramezanipour,
Parisa Nouri,
Hirley Alves,
Pedro J. H. Nardelli,
Richard Demo Souza,
Ari Pouttu
Abstract:
This work focuses on the performance analysis of short blocklength communication with application in smart grids. We use stochastic geometry to compute in closed form the success probability of a typical message transmission as a function of its size (i.e. blocklength), the number of information bits and the density of interferers. Two different scenarios are investigated: (i) dynamic spectrum acc…
▽ More
This work focuses on the performance analysis of short blocklength communication with application in smart grids. We use stochastic geometry to compute in closed form the success probability of a typical message transmission as a function of its size (i.e. blocklength), the number of information bits and the density of interferers. Two different scenarios are investigated: (i) dynamic spectrum access where the licensed and unlicensed users, share the uplink channel frequency band and (ii) local licensing approach using the so called micro operator, which holds an exclusive license of its own. Approximated outage probability expression is derived for the dynamic spectrum access scenario, while a closed-form solution is attained for the micro-operator. The analysis also incorporates the use of retransmissions when messages are detected in error. Our numerical results show how reliability and delay are related in either scenarios.
△ Less
Submitted 24 May, 2018;
originally announced May 2018.
-
An Automatic Patch-based Approach for HER-2 Scoring in Immunohistochemical Breast Cancer Images Using Color Features
Authors:
Caroline Q. Cordeiro,
Sergio O. Ioshii,
Jeovane H. Alves,
Lucas F. Oliveira
Abstract:
Breast cancer (BC) is the most common cancer among women world-wide, approximately 20-25% of BCs are HER-2 positive. Analysis of HER-2 is fundamental to defining the appropriate therapy for patients with breast cancer. Inter-pathologist variability in the test results can affect diagnostic accuracy. The present study intends to propose an automatic scoring HER-2 algorithm. Based on color features,…
▽ More
Breast cancer (BC) is the most common cancer among women world-wide, approximately 20-25% of BCs are HER-2 positive. Analysis of HER-2 is fundamental to defining the appropriate therapy for patients with breast cancer. Inter-pathologist variability in the test results can affect diagnostic accuracy. The present study intends to propose an automatic scoring HER-2 algorithm. Based on color features, the technique is fully-automated and avoids segmentation, showing a concordance higher than 90% with a pathologist in the experiments realized.
△ Less
Submitted 14 May, 2018;
originally announced May 2018.
-
Extracting Lungs from CT Images using Fully Convolutional Networks
Authors:
Jeovane Honório Alves,
Pedro Martins Moreira Neto,
Lucas Ferrari de Oliveira
Abstract:
Analysis of cancer and other pathological diseases, like the interstitial lung diseases (ILDs), is usually possible through Computed Tomography (CT) scans. To aid this, a preprocessing step of segmentation is performed to reduce the area to be analyzed, segmenting the lungs and removing unimportant regions. Generally, complex methods are developed to extract the lung region, also using hand-made f…
▽ More
Analysis of cancer and other pathological diseases, like the interstitial lung diseases (ILDs), is usually possible through Computed Tomography (CT) scans. To aid this, a preprocessing step of segmentation is performed to reduce the area to be analyzed, segmenting the lungs and removing unimportant regions. Generally, complex methods are developed to extract the lung region, also using hand-made feature extractors to enhance segmentation. With the popularity of deep learning techniques and its automated feature learning, we propose a lung segmentation approach using fully convolutional networks (FCNs) combined with fully connected conditional random fields (CRF), employed in many state-of-the-art segmentation works. Aiming to develop a generalized approach, the publicly available datasets from University Hospitals of Geneva (HUG) and VESSEL12 challenge were studied, including many healthy and pathological CT scans for evaluation. Experiments using the dataset individually, its trained model on the other dataset and a combination of both datasets were employed. Dice scores of $98.67\%\pm0.94\%$ for the HUG-ILD dataset and $99.19\%\pm0.37\%$ for the VESSEL12 dataset were achieved, outperforming works in the former and obtaining similar state-of-the-art results in the latter dataset, showing the capability in using deep learning approaches.
△ Less
Submitted 27 April, 2018;
originally announced April 2018.
-
Energy Internet via Packetized Management: Enabling Technologies and Deployment Challenges
Authors:
Pedro H. J. Nardelli,
Hirley Alves,
Antti Pinomaa,
Sohail Wahid,
Mauricio C. Tomé,
Antti Kosonen,
Florian Kühnlenz,
Ari Pouttu,
Dick Carrillo
Abstract:
This paper investigates the possibility of building the Energy Internet via a packetized management of non-industrial loads. The proposed solution is based on the cyber-physical implementation of energy packets where flexible loads send use requests to an energy server. Based on the existing literature, we explain how and why this approach could scale up to interconnected micro-grids, also pointin…
▽ More
This paper investigates the possibility of building the Energy Internet via a packetized management of non-industrial loads. The proposed solution is based on the cyber-physical implementation of energy packets where flexible loads send use requests to an energy server. Based on the existing literature, we explain how and why this approach could scale up to interconnected micro-grids, also pointing out the challenges involved in relation to the physical deployment of electricity network. We then assess how machine-type wireless communications, as part of 5G and beyond systems, will achieve the low latency and ultra reliability needed by the micro-grid protection while providing the massive coverage needed by the packetized management. This more distributed grid organization also requires localized governance models. We cite few existing examples as local markets, energy communities and micro-operator that support such novel arrangements. We close the paper by providing an overview of ongoing activities that support the proposed vision and possible ways to move forward.
△ Less
Submitted 20 January, 2019; v1 submitted 25 April, 2018;
originally announced April 2018.
-
Energy Efficiency of an Unlicensed Wireless Network in the Presence of Retransmissions
Authors:
Iran Ramezanipour,
Hirley Alves,
Pedro Nardelli,
Ari Pouttu
Abstract:
This paper analysis the energy efficiency of an unlicensed wireless network in which retransmission is possible if the transmitted message is decoded in outage. A wireless sensor network is considered in which the sensor nodes are unlicensed users of a wireless network which transmit its data in the uplink channel used by the licensed users. Poisson point process is used to model the distributions…
▽ More
This paper analysis the energy efficiency of an unlicensed wireless network in which retransmission is possible if the transmitted message is decoded in outage. A wireless sensor network is considered in which the sensor nodes are unlicensed users of a wireless network which transmit its data in the uplink channel used by the licensed users. Poisson point process is used to model the distributions of the nodes and the interference caused by the licensed users for the sensor nodes. After finding the optimal throughput in the presence of retransmissions, we focus on analyzing the total power consumption and energy efficiency of the network and how retransmissions, network density and outage threshold affects the energy efficiency of the network.
△ Less
Submitted 7 March, 2018;
originally announced March 2018.
-
Hybrid Wired-Wireless Backhaul Solutions for Heterogeneous Ultra-Dense Networks
Authors:
Onel L. A. López,
Hirley Alves,
Richard Demo Souza,
Matti Latva-aho
Abstract:
Wireless networks are becoming extremely pervasive while traffic demand is ever increasing. In order to cope with the forecast increase in traffic volume for the upcoming years, as well as the number of connected devices, new technologies, practices and spectrum rearrangements are required. In this context, a key question arises: how to provide extensive backhaul connectivity and capacity for perv…
▽ More
Wireless networks are becoming extremely pervasive while traffic demand is ever increasing. In order to cope with the forecast increase in traffic volume for the upcoming years, as well as the number of connected devices, new technologies, practices and spectrum rearrangements are required. In this context, a key question arises: how to provide extensive backhaul connectivity and capacity for pervasive ultra dense networks? The answer is rather complex, if feasible. To shed some light into this issue we overview potential technologies, either wired or wireless, and identify technical challenges. Moreover, we evaluate an illustrative scenario of a ultra-dense network that operates with hybrid wired-wireless backhaul. We assume multiple radio access technologies at small and macro base stations (BSs), and we discuss optimal traffic splitting and routing solutions for different topologies and traffic profiles.
△ Less
Submitted 6 March, 2018;
originally announced March 2018.
-
Event-based Electricity Metering: An Autonomous Method to Determine Transmission Thresholds
Authors:
Mauricio de Castro Tomé,
Pedro. H. J. Nardelli,
Hirley Alves
Abstract:
This paper provides an in-depth analysis of the event-based metering strategy proposed by Simonov et al. This strategy is an alternative to the traditional periodic (time-based) metering where the power demand is averaged in fixed time periods (e.g. every 15 minutes). The event-based approach considers two thresholds that trigger an event, one related to the (instantaneous) power demanded, other t…
▽ More
This paper provides an in-depth analysis of the event-based metering strategy proposed by Simonov et al. This strategy is an alternative to the traditional periodic (time-based) metering where the power demand is averaged in fixed time periods (e.g. every 15 minutes). The event-based approach considers two thresholds that trigger an event, one related to the (instantaneous) power demanded, other to the accumulated energy consumed. The original work assumed these thresholds fixed for the measurements. Our present contribution relaxes this assumption by proposing a method to set the thresholds from the percentage of the peak power consumption over the period under analysis. This approach, in contrast to the time-based and the fixed thresholds, better captures the actual power demanded when different households with diverse power demand profiles are studied. In this sense, our method provides a more efficient way to store electricity demand data while maintaining the estimation error (in relation to the real-time power demand) under acceptable values. Numerical examples are presented to illustrate the advantage and possible drawbacks of the proposed method.
△ Less
Submitted 6 March, 2018;
originally announced March 2018.