Journal of Communication and Information Systems <p>The Journal of Communication and Information Systems (JCIS) features high-quality, peer-reviewed technical papers in several areas of communications and information systems. The JCIS is jointly sponsored by the Brazilian Telecommunications Society (SBrT) and the IEEE Communications Society (ComSoc). As from June 2020, Prof. Rausley Adriano Amaral de Souza from National Institute of Telecommunications (Inatel) and Prof. José Cândido Silveira Santos Filho from University of Campinas (UNICAMP) are the Editors-in-Chief of the JCIS.&nbsp;</p> <p>There are no article publication or submission charges. Previous editions of the JCIS can be accessed <a href="/index.php/JCIS/issue/archive" target="_blank" rel="noopener">here</a>.</p> <p>This is an open access journal which means that all content is freely available without charge to the user or his/her institution, permanently accessible online immediately upon assignment of the DOI. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles, or use them for any other lawful purpose, without asking prior permission from the publisher or the author. This is in accordance with the BOAI definition of open access.</p> <p>ISSN: 1980-6604</p> Brazilian Telecommunications Society en-US Journal of Communication and Information Systems 1980-6604 <p><span>Authors who publish with this journal agree to the following terms:</span><br /><br /></p><ol type="a"><ol type="a"><li>Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="" target="_new">Creative Commons Attribution License</a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</li></ol></ol><p> </p><ol type="a"><ol type="a"><li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li></ol></ol><p> </p><ol type="a"><ol type="a"><li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See <a href="" target="_new">The Effect of Open Access</a>).</li></ol></ol><p>___________</p> MUSA Grant-Free Access Framework and Blind Detection Receiver <p>Recently, a non-orthogonal multiple access scheme called multi-user shared access (MUSA) was proposed to provide massive connection capability of low-complexity devices in the 5G networks. MUSA achieves higher spectral efficiency allowing independent devices to transmit data on the same physical layer time-frequency resources. Furthermore, MUSA introduces a grant-free transmission and a blind multi-user detection at the receiver, reducing the complexity on the transmit side. This approach is interesting for Internet of Things applications over mobile communication networks, where the devices have limited power and processing capacity. The references available in the literature about this multiple access scheme do not bring sufficient details about the MUSA multi-user detector. This limitation makes it difficult to evaluate the MUSA performance and to propose improvements for this new technique. The main goal of this paper is to provide a framework describing the entire communication chain using MUSA as multiple access. This paper also brings a proposal for a blind multi-user detection, where the information about the MUSA parameters and the channel state information are unknown at the receiver side. The performance of the MUSA multi-user detector is improved by a deep learning based processing that improves the quality of the channel estimation provided by a initial minimum mean square error estimator. The proposed deep neural network architecture employed to improve the channel estimation allows more users to share the same time-frequency resources for a given target block error rate, increasing the overall spectrum efficiency of the system.</p> Guilherme Pedro Aquino Tiago Cardoso Barbosa Marwa Chafii Luciano Leonel Mendes Abdul Karim Gizzini ##submission.copyrightStatement## 2021-07-12 2021-07-12 36 1 119 127 10.14209/jcis.2021.13 Transient Analysis of the Bias-Compensated LMS Algorithm <p>In most supervised adaptive filtering settings, only the additive noise of the reference signal is taken into account. However, in many practical situations the excitation data is also immersed in noise, which leads to a bias in the estimation procedure. In order to mitigate such issue, adaptive algorithms with bias compensation schemes have been proposed. This paper advances for the first time a stochastic model that predicts the average and mean-square learning behavior of the bias-compensated least mean squares algorithm in the transient region. Asymptotic predictions can also be obtained as a result of the devised analysis. Tracking capabilities and the impact of employing sub-optimal length adaptive filter are also considered, without restricting the input signal to be neither white nor Gaussian. Results indicate that the proposed analysis reveals accurate agreement with simulation results.</p> Rodrigo Marendaz Silva Pimenta Newton Norat Siqueira Mariane Rembold Petraglia Diego Barreto Haddad ##submission.copyrightStatement## 2021-06-07 2021-06-07 36 1 114 118 10.14209/jcis.2021.12 Lightweight and Secure Publish-Subscribe System for Cloud-Connected Ultra Low Power IoT Devices <p>The Internet of Things (IoT) enables the development of innovative applications in various domains such as healthcare, transportation, and Industry 4.0. The integration of the cloud platform's large processing and storage capacity with the ubiquitous sensing and actuation provided by the devices creates an IoT architecture that provides vast raw data. The IoT devices send the data to the cloud platform with the developed IoT applications, which can use publish-subscribe systems. However, messages with sensitive content require end-to-end security. Besides that, IoT devices may present processing, memory, payload, and energy restrictions. In this sense, messages in an IoT architecture need to achieve both energy-efficiency and secure message delivery. Thus, this article's main contribution refers to a system that standardizes the publish-subscribe topic and payload used by the cloud platform and the IoT devices. Our system also provides end-to-end security while surpassing the energy-efficiency to send data than the main related works in the literature regarding the use of publish-subscribe systems in IoT.</p> Norisvaldo Ferraz Junior Anderson A. A. Silva Adilson E. Guelfi Marcelo Teixeira de Azevedo Sergio Takeo Kofuji ##submission.copyrightStatement## 2021-05-27 2021-05-27 36 1 100 113 10.14209/jcis.2021.11 Cascade of Linear Predictors for Deconvolution of Non-Stationary Channels in Sparse and Antisparse Scenarios <p>This work deals with adaptive predictive deconvolution of non-stationary channels. In particular, we investigate the use of a cascade of linear predictors in the recovering of sparse and antisparse original signals. To do so, we first discuss the behavior of the Lp Prediction Error Filter (PEF), with p different of 2, showing that it has a superior ability to deal with non-minimum phase channels in comparison with the classical L2 PEF, although it still presents intrinsic limitations due to its direct linear structure. The cascade structure emerges as a possible solution to circumvent this issue. We apply the proposed cascade structure in the deconvolution of non-stationary channels, with minimum-, maximum- , mixed- and variable-phase response, and also noise scenarios. From the simulation results we observed that, besides the duality relation between the Lp norms, they present different algorithmic behavior: the L1 norm attains a fast convergence, enhancing the cascade tracking capacity, but is more sensible to noise. The L4 norm, on the other hand, is more robust to noise, but presents slower convergence and tracking capability.</p> Renan Brotto Kenji Nose-Filho Romis Attux João Marcos Travassos Romano ##submission.copyrightStatement## 2021-05-10 2021-05-10 36 1 90 99 10.14209/jcis.2021.10 A Semi-Distributed Approach for Uplink Max-Min Energy Efficiency Optimization with Minimum User Satisfaction and Adjacency Constraints <p>Maximizing energy efficiency is one of the pillars of modern networks. In this context, we consider in this letter a nonlinear max-min energy efficiency problem in the uplink of wireless networks. Due to the problem nonlinearity we resort to epigraph form so as to obtain an integer linear problem and to propose a centralized optimal solution for it using a branch-and-bound algorithm. Also because distributed solutions are useful to deal with high computational processing and scalability problems, we propose a low-complexity semi-distributed solution for the problem using a specific signaling scheme. Simulations show that the proposed semi-distributed solution performs closely to the centralized optimal scheme and outperforms state-of-the-art algorithms in terms of energy efficiency and outage rate.</p> Iran Mesquita Braga Jr. Francisco Rafael Marques Lima Tarcisio Ferreira Maciel Victor Farias Monteiro ##submission.copyrightStatement## 2021-04-14 2021-04-14 36 1 85 89 10.14209/jcis.2021.9 Coupling Impact Between a Radial Antenna and Guided Modes on Twisted-Pair Systems Operating in Millimeter-Wave <p>Recent research points out that transmission at terabits per second (Tbps) is feasible over copper cables if they were used as millimeter waveguides. The challenge is how to efficiently couple signals to the higher-order modes of twisted-pairs. This paper investigates the effectiveness of radial antennas on the coupling of near-terahertz signals to twisted-pairs. For that, the scattering parameter of the proposed antenna and the intensity of the electric field around the pairs are evaluated from numerical simulations. We also present the attenuation coefficients of four guided modes in a twisted-pair with typical constructive parameters and evaluate aggregate data rate results through Shannon's capacity. The results indicate the coupling efficiency may reach up to 71.62%, yielding an aggregate data rate over copper cables up to 0.17 Tbps at 10 m.</p> Brenda Sousa Daynara Dias Souza Gilvan Borges Roberto Rodrigues André Cavalcante João Costa ##submission.copyrightStatement## 2021-03-08 2021-03-08 36 1 75 84 10.14209/jcis.2021.8 Empirical Path Loss Model in City-forest Environment for Mobile Communications <div class="page" title="Page 1"> <div class="layoutArea"> <div class="column"> <p>The feasible choice of a propagation model for a given wireless system depends on environment type among other factors. Thus, it is a crucial decision on radio network planning. This current proposal is a new methodology applied for LTE systems that includes: to find optimal parameters of a propagation model that minimizes RMS error and maximizes grey relation grade and mean absolute percentage error, (GRG- MAPE) in a city-forest environment through the use of meta- heuristic optimization such as Cuckoo Search (CS). The results, quantitatively analysed by RMS error and GRG-MAPE, shows a better accuracy of optimized model in comparison with the original version and even with SUI model.</p> </div> </div> </div> Andre Augusto Pacheco de Carvalho Iury Batalha Miercio Alcantara Bruno Castro Fabricio Barros Jasmine Araujo Gervasio Cavalcante ##submission.copyrightStatement## 2021-03-05 2021-03-05 36 1 70 74 10.14209/jcis.2021.7 Conversion of Scattering Parameters to Time-Domain for Imaging Applications: Rules and Examples <p>This article discusses the conversion of scattering parameters from an antenna input port to time domain for imaging applications. Frequency-domain measurements offer some advantages to time-domain methods, and the complex data encoded in the scattering matrix convey target geometric and material information which can be later used to reproduce the scene image illuminated by the antenna. Three different examples using the inverse discrete Fourier transform are discussed. Trade-offs in the data acquisition, bandwidth, sampling and topics related to the antennas used as probes are covered.</p> marcelo bender perotoni Claudio Jose Bordin Jr. Kenedy Marconi Geraldo dos Santos ##submission.copyrightStatement## 2021-03-02 2021-03-02 36 1 62 69 10.14209/jcis.2021.6 Performance Evaluation of MGfast Systems Over Coaxial Cables <p>A trend for the 5th generation fixed broadband access networks is to provide data rates as high as 10 Gbps to the subscribers. Since fiber-to-the-home (FTTH) connectivity is still expensive, the use of alternative architectures is attractive in some scenarios. In this context, the International Telecommunication Union (ITU) is standardizing the MGfast access technology to provide multi-gigabit transmission over copper media. This paper evaluates the performance of MGfast systems adopting RG-59, RG-6 and RG-11 coaxial cables as interface between the distribution point units (DPUs) and the customer premises equipment (CPE). The operation mode of MGfast is assumed to be synchronized time division duplexing (STDD) and a simple loading method for power allocation is employed. Simulation results show that, for loop lengths less than 100 m, data rate as high as 11 Gbps can be achieved using a transmission profile that goes up to 848 MHz. Assuming a profile that goes up to 1696 MHz, the data rates can be as high as 23 Gbps.</p> Marx Freitas Aline Ohashi Diogo Acatauassu João Weyl Costa Eduardo Medeiros Miguel Berg Igor Almeida André Cavalcante ##submission.copyrightStatement## 2021-03-01 2021-03-01 36 1 52 61 10.14209/jcis.2021.5 The Effective Secrecy Throughput for the Hybrid Wiretap Channel <p>This study discusses an augmented investigation of the hybrid wiretap channel, which represents a PLC system with its data security threatened by a malicious and passive wireless device at the physical layer level, by focusing on the evaluation and analysis of wiretap code rates. The wiretap code rates are obtained through effective secrecy throughput. In this sense, numerical analyses based on real data set composed of channel estimates and measured additive noises are provided. This data set was collected from a measurement campaign carried out in several Brazilian houses. From the perspective of the physical layer security, the attained results show wiretap code rates for overcoming the malicious presence of a passive wireless device located in the vicinity of broadband PLC systems under practical scenarios.</p> Ândrei Camponogara Moisés Vidal Ribeiro ##submission.copyrightStatement## 2021-02-23 2021-02-23 36 1 44 51 10.14209/jcis.2021.4