Wireless information and powered transfer networks(WIPT) has recently been implemented in 5th generation wireless networks. In this paper, we consider half-duplex relaying system in which the energy constrained relay ...Wireless information and powered transfer networks(WIPT) has recently been implemented in 5th generation wireless networks. In this paper, we consider half-duplex relaying system in which the energy constrained relay node collects energy via radio frequency(RF) signals from the surrounding resources. Regarding energy harvesting protocol, we propose power time switching-based relaying(PTSR) architecture for both amplify-and-forward(AF) and decode-and-forward(DF). Especially, we reveal the analytical expressions of achievable throughput, ergodic capacity and energy-efficient in case of imperfect channel state information(CSI) for both AF and DF network. Through numerical analysis, we analyse the throughput performance, energy-efficient and ergodic capacity for different parameters, including power splitting ratio and energy harvesting time. Moreover, we also depict the performance comparison between AF and DF network with perfect and imperfect CSI. The results in numerical analysis reveal that the result of AF relaying network is less significant than DF relaying network in the various scenarios.展开更多
Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for ...Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed.展开更多
针对基于RSSI和CSI的指纹定位技术易受环境干扰、定位精度较低的问题,提出了一种基于RSSI指纹和相位修正信道状态信息(phase correct based channel state information,PC-CSI)指纹的加权融合指纹定位技术。基于PC-CSI的指纹定位在传统...针对基于RSSI和CSI的指纹定位技术易受环境干扰、定位精度较低的问题,提出了一种基于RSSI指纹和相位修正信道状态信息(phase correct based channel state information,PC-CSI)指纹的加权融合指纹定位技术。基于PC-CSI的指纹定位在传统基于CSI幅值的指纹定位基础上增加相位信息对定位结果进行修正,之后对RSSI指纹和PC-CSI指纹的定位结果加权重定位。实验结果表明,提出的加权融合指纹定位算法与基于CSI的主动定位算法相比,平均定位误差(mean position error,MPE)降低了36.2%,能满足室内定位需求。展开更多
A review of signal processing algorithms employing Wi-Fi signals for positioning and recognition of human activities is presented.The principles of how channel state information(CSI)is used and how the Wi-Fi sensing s...A review of signal processing algorithms employing Wi-Fi signals for positioning and recognition of human activities is presented.The principles of how channel state information(CSI)is used and how the Wi-Fi sensing systems operate are reviewed.It provides a brief introduction to the algorithms that perform signal processing,feature extraction and recognitions,including location,activity recognition,physiological signal detection and personal identification.Challenges and future trends of Wi-Fi sensing are also discussed in the end.展开更多
Activity recognition plays a key role in health management and security.Traditional approaches are based on vision or wearables,which only work under the line of sight(LOS)or require the targets to carry dedicated dev...Activity recognition plays a key role in health management and security.Traditional approaches are based on vision or wearables,which only work under the line of sight(LOS)or require the targets to carry dedicated devices.As human bodies and their movements have influences on WiFi propagation,this paper proposes the recognition of human activities by analyzing the channel state information(CSI)from the WiFi physical layer.The method requires only the commodity:WiFi transmitters and receivers that can operate through a wall,under LOS and non-line of sight(NLOS),while the targets are not required to carry dedicated devices.After collecting CSI,the discrete wavelet transform is applied to reduce the noise,followed by outlier detection based on the local outlier factor to extract the activity segment.Activity recognition is fulfilled by using the bi-directional long short-term memory that takes the sequential features into consideration.Experiments in through-the-wall environments achieve recognition accuracy>95%for six common activities,such as standing up,squatting down,walking,running,jumping,and falling,outperforming existing work in this field.展开更多
In a real communication scenario,it is very difficult to obtain the real-time channel state infor-mation(CSI)accurately,so the non-orthogonal multiple access(NOMA)system with statistical CSI has been researched.Aiming...In a real communication scenario,it is very difficult to obtain the real-time channel state infor-mation(CSI)accurately,so the non-orthogonal multiple access(NOMA)system with statistical CSI has been researched.Aiming at the problem that the maximization of system sum rate cannot be solved directly,a step-by-step resource allocation optimization scheme based on machine learning is proposed.First,in order to achieve a trade-off between the system sum rate and user fairness,the system throughput formula is derived.Then,according to the combinatorial characteristics of the system throughput maximization problem,the original optimization problem is divided into two sub-problems,that are power allocation and user grouping.Finally,genetic algorithm is introduced to solve the sub-problem of power allocation,and hungarian algorithm is introduced to solve the sub-problem of user grouping.By comparing the ergodic data rate of NOMA users with statistical CSI and perfect CSI,the effectiveness of the statistical CSI sorting is verified.Compared with the orthogonal multiple access(OMA)scheme,the NOMA scheme with the fixed user grouping scheme and the random user grouping scheme,the system throughput performance of the proposed scheme is signifi-cantly improved.展开更多
Given imperfect channel state information(CSI)and considering the interference from the primary transmitter,an underlay cognitive multisource multidestination relay network is proposed.A closed-form exact outage proba...Given imperfect channel state information(CSI)and considering the interference from the primary transmitter,an underlay cognitive multisource multidestination relay network is proposed.A closed-form exact outage probability and asymptotic outage probability are derived for the secondary system of the network.The results show that the outage probability is influenced by the source and destination number,the CSI imperfection as well as the interference from the primary transmitter,while the diversity order is independent of the CSI imperfection and the interference from the primary transmitter,yet it is equal to the minimum of the source and destination number.Moreover,extensive simulations are conducted with different system parameters to verify the theoretical analysis.展开更多
Physical-layer network coding (PNC) has the potential to significantly improve the throughput of wireless networks where the channels can be modeled as additive white Gaussian noise (AWGN) channel. As extending to...Physical-layer network coding (PNC) has the potential to significantly improve the throughput of wireless networks where the channels can be modeled as additive white Gaussian noise (AWGN) channel. As extending to mul- tiple channels, this technique requires both amplitude and phase compensation at each transmitter and will lead to inef- ficient systems yielding no diversity even with perfect channel state information (CSI). In order to avoid these limita- tions, we apply network coding with diversity (NCD) to achieve a form of selection diversity and extend NCD to coop- erative multiple access channels in this paper. However, in practical wireless communication systems, the CSI could become outdated due to the difference between the CSI used in the relay selection and data transmission phases. Hence, the selected relay may not be the best one during data transmission phase due to the dynamic change in the wireless channels. Therefore, we first explore the relation between the present and past CSIs. Exploiting this relationship, the NCD scheme with outdated CSI is investigated based on the past CSI. To evaluate the performance of this scheme, an information-theoretic metric, namely the outage capacity, is studied under this condition.展开更多
文摘Wireless information and powered transfer networks(WIPT) has recently been implemented in 5th generation wireless networks. In this paper, we consider half-duplex relaying system in which the energy constrained relay node collects energy via radio frequency(RF) signals from the surrounding resources. Regarding energy harvesting protocol, we propose power time switching-based relaying(PTSR) architecture for both amplify-and-forward(AF) and decode-and-forward(DF). Especially, we reveal the analytical expressions of achievable throughput, ergodic capacity and energy-efficient in case of imperfect channel state information(CSI) for both AF and DF network. Through numerical analysis, we analyse the throughput performance, energy-efficient and ergodic capacity for different parameters, including power splitting ratio and energy harvesting time. Moreover, we also depict the performance comparison between AF and DF network with perfect and imperfect CSI. The results in numerical analysis reveal that the result of AF relaying network is less significant than DF relaying network in the various scenarios.
文摘Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed.
文摘针对基于RSSI和CSI的指纹定位技术易受环境干扰、定位精度较低的问题,提出了一种基于RSSI指纹和相位修正信道状态信息(phase correct based channel state information,PC-CSI)指纹的加权融合指纹定位技术。基于PC-CSI的指纹定位在传统基于CSI幅值的指纹定位基础上增加相位信息对定位结果进行修正,之后对RSSI指纹和PC-CSI指纹的定位结果加权重定位。实验结果表明,提出的加权融合指纹定位算法与基于CSI的主动定位算法相比,平均定位误差(mean position error,MPE)降低了36.2%,能满足室内定位需求。
基金National Natural Science Foundation of China(NSFC)under Grant No.61401100Natural Science Foundation of Fuji⁃an Province under Grant No.2018J01805+1 种基金Youth Research Project of Fujian Provincial Department of Education under Grant No.JAT190011and Fuzhou University Scientific Research Fund Project under Grant No.GXRC-18074.
文摘A review of signal processing algorithms employing Wi-Fi signals for positioning and recognition of human activities is presented.The principles of how channel state information(CSI)is used and how the Wi-Fi sensing systems operate are reviewed.It provides a brief introduction to the algorithms that perform signal processing,feature extraction and recognitions,including location,activity recognition,physiological signal detection and personal identification.Challenges and future trends of Wi-Fi sensing are also discussed in the end.
基金the Key Research and Development Projects of Sichuan Science and Technology Department under Grant No.2018GZ0464the UESTC-ZHIXIAOJING Joint Research Center of Smart Home under Grant No.H04W210180.
文摘Activity recognition plays a key role in health management and security.Traditional approaches are based on vision or wearables,which only work under the line of sight(LOS)or require the targets to carry dedicated devices.As human bodies and their movements have influences on WiFi propagation,this paper proposes the recognition of human activities by analyzing the channel state information(CSI)from the WiFi physical layer.The method requires only the commodity:WiFi transmitters and receivers that can operate through a wall,under LOS and non-line of sight(NLOS),while the targets are not required to carry dedicated devices.After collecting CSI,the discrete wavelet transform is applied to reduce the noise,followed by outlier detection based on the local outlier factor to extract the activity segment.Activity recognition is fulfilled by using the bi-directional long short-term memory that takes the sequential features into consideration.Experiments in through-the-wall environments achieve recognition accuracy>95%for six common activities,such as standing up,squatting down,walking,running,jumping,and falling,outperforming existing work in this field.
基金Supported by the National Natural Science Foundation of China(No.62001001).
文摘In a real communication scenario,it is very difficult to obtain the real-time channel state infor-mation(CSI)accurately,so the non-orthogonal multiple access(NOMA)system with statistical CSI has been researched.Aiming at the problem that the maximization of system sum rate cannot be solved directly,a step-by-step resource allocation optimization scheme based on machine learning is proposed.First,in order to achieve a trade-off between the system sum rate and user fairness,the system throughput formula is derived.Then,according to the combinatorial characteristics of the system throughput maximization problem,the original optimization problem is divided into two sub-problems,that are power allocation and user grouping.Finally,genetic algorithm is introduced to solve the sub-problem of power allocation,and hungarian algorithm is introduced to solve the sub-problem of user grouping.By comparing the ergodic data rate of NOMA users with statistical CSI and perfect CSI,the effectiveness of the statistical CSI sorting is verified.Compared with the orthogonal multiple access(OMA)scheme,the NOMA scheme with the fixed user grouping scheme and the random user grouping scheme,the system throughput performance of the proposed scheme is signifi-cantly improved.
基金Supported by the National Natural Science Foundation of China(No.61301170,61571340)the Fundamental Research Funds for the Central Universities(No.JB150109)the 111 Project(No.B08038)
文摘Given imperfect channel state information(CSI)and considering the interference from the primary transmitter,an underlay cognitive multisource multidestination relay network is proposed.A closed-form exact outage probability and asymptotic outage probability are derived for the secondary system of the network.The results show that the outage probability is influenced by the source and destination number,the CSI imperfection as well as the interference from the primary transmitter,while the diversity order is independent of the CSI imperfection and the interference from the primary transmitter,yet it is equal to the minimum of the source and destination number.Moreover,extensive simulations are conducted with different system parameters to verify the theoretical analysis.
基金funded by the EPSRC of UK under Grant EP/I037423/1
文摘Physical-layer network coding (PNC) has the potential to significantly improve the throughput of wireless networks where the channels can be modeled as additive white Gaussian noise (AWGN) channel. As extending to mul- tiple channels, this technique requires both amplitude and phase compensation at each transmitter and will lead to inef- ficient systems yielding no diversity even with perfect channel state information (CSI). In order to avoid these limita- tions, we apply network coding with diversity (NCD) to achieve a form of selection diversity and extend NCD to coop- erative multiple access channels in this paper. However, in practical wireless communication systems, the CSI could become outdated due to the difference between the CSI used in the relay selection and data transmission phases. Hence, the selected relay may not be the best one during data transmission phase due to the dynamic change in the wireless channels. Therefore, we first explore the relation between the present and past CSIs. Exploiting this relationship, the NCD scheme with outdated CSI is investigated based on the past CSI. To evaluate the performance of this scheme, an information-theoretic metric, namely the outage capacity, is studied under this condition.