Bit Error Probability (BEP) provides a fundamental performance measure for wireless diversity systems. This paper presents two new exact BEP expressions for Maximal Ratio Combining (MRC) diversity systems. One BEP exp...Bit Error Probability (BEP) provides a fundamental performance measure for wireless diversity systems. This paper presents two new exact BEP expressions for Maximal Ratio Combining (MRC) diversity systems. One BEP expression takes a closed form, while the other is derived by treating the squared-sum of Rayleigh random variables as an Erlang variable. Due to the fact that the extant bounds are loose and could not properly characterize the error performance of MRC diversity systems, this paper presents a very tight bound. The numerical analysis shows that the new derived BEP expressions coincide with the extant expressions, and that the new approximation tightly bounds the accurate BEP.展开更多
As is known, distributed Turbo coding (DTC) performs close to the theoretic outage probability bound of a relay channel when correct decoding is assumed at the relay. However, decoding error is inevitable in practic...As is known, distributed Turbo coding (DTC) performs close to the theoretic outage probability bound of a relay channel when correct decoding is assumed at the relay. However, decoding error is inevitable in practical fading channels due to the error-prone feature of radio channels, and the decoding error propagation in DTC scheme will severely degrade the error performance of the relay system. As a result, it is necessary to evaluate the error performance of the DTC scheme in multi-hop relaying wireless systems in practical fading channels. Moreover, the theoretical method of analysis provides an effective tool for obtaining the error performance besides lengthy simulations. In this article, the concept of equivalent signal-to-noise ratio (SNR) of the two-hop relay channel and the method of computing equivalent SNR are developed, and then the upper bound on the bit error probability (BEP) of DTC relay systems is analyzed by use of Turbo code's distance spectrum, the concept of uniform interleaver, the limit-before-averaging technique, and the union bound method. Both theoretical analysis and numerical simulation are implemented for relay systems with DTC scheme over quasi-static Rayleigh fading channels. The results show that the upper bound approaches the simulation results in the medium to high SNR region.展开更多
Many communication systems use the cyclic redundancy code (CRC) technique for protecting key data fields from transmission errors by enabling both single-bit error correction and multi-bit error detection. The look-...Many communication systems use the cyclic redundancy code (CRC) technique for protecting key data fields from transmission errors by enabling both single-bit error correction and multi-bit error detection. The look-up table design is very important for the error-correction implementation. This paper presents a CRC look-up table optimization method for single-bit error correction. The optimization method minimizes the address length of the pre-designed look-up table while satisfying certain restrictions. The circuit implementation is also presented to show the feasibility of the method in the application specific integrated circuit design. An application of the optimization method in the generic framing procedure protocol is implemented using field programmable gatearrays. The result shows that the memory address length has been minimized, while keeping a very simple circuit implementation.展开更多
In this paper,average bit error probability(ABEP)bound of optimal maximum likelihood(ML)detector is first derived for ultra massive(UM)multiple-input-multiple-output(MIMO)system with generalized amplitude phase modula...In this paper,average bit error probability(ABEP)bound of optimal maximum likelihood(ML)detector is first derived for ultra massive(UM)multiple-input-multiple-output(MIMO)system with generalized amplitude phase modulation(APM),which is confirmed by simulation results.Furthermore,a minimum residual criterion(MRC)based lowcomplexity near-optimal ML detector is proposed for UM-MIMO system.Specifically,we first obtain an initial estimated signal by a conventional detector,i.e.,matched filter(MF),or minimum mean square error(MMSE)and so on.Furthermore,MRC based error correction mechanism(ECM)is proposed to correct the erroneous symbol encountered in the initial result.Simulation results are shown that the performance of the proposed MRC-ECM based detector is capable of approaching theoretical ABEP of ML,despite only imposing a slightly higher complexity than that of the initial detector.展开更多
The error patterns of a wireless channel can be represented by a binary sequence of ones(burst) and zeros(run),which is referred to as a trace.Recent surveys have shown that the run length distribution of a wireless c...The error patterns of a wireless channel can be represented by a binary sequence of ones(burst) and zeros(run),which is referred to as a trace.Recent surveys have shown that the run length distribution of a wireless channel is an intrinsically heavy-tailed distribution.Analytical models to characterize such features have to deal with the trade-off between complexity and accuracy.In this paper,we use an independent but not identically distributed(inid) stochastic process to characterize such channel behavior and show how to parameterize the inid bit error model on the basis of a trace.The proposed model has merely two parameters both having intuitive meanings and can be easily figured out from a trace.Compared with chaotic maps,the inid bit error model is simple for practical use but can still be deprived from heavy-tailed distribution in theory.Simulation results demonstrate that the inid model can match the trace,but with fewer parameters.We then propose an improvement on the inid model to capture the 'bursty' nature of channel errors,described by burst length distribution.Our theoretical analysis is supported by an experimental evaluation.展开更多
Standard automatic dependent surveillance broadcast (ADS-B) reception algorithms offer considerable performance at high signal-to-noise ratios (SNRs). However, the performance of ADS-B algorithms in applications can b...Standard automatic dependent surveillance broadcast (ADS-B) reception algorithms offer considerable performance at high signal-to-noise ratios (SNRs). However, the performance of ADS-B algorithms in applications can be problematic at low SNRs and in high interference situations, as detecting and decoding techniques may not perform correctly in such circumstances. In addition, conventional error correction algorithms have limitations in their ability to correct errors in ADS-B messages, as the bit and confidence values may be declared inaccurately in the event of low SNRs and high interference. The principal goal of this paper is to deploy a Long Short-Term Memory (LSTM) recurrent neural network model for error correction in conjunction with a conventional algorithm. The data of various flights are collected and cleaned in an initial stage. The clean data is divided randomly into training and test sets. Next, the LSTM model is trained based on the training dataset, and then the model is evaluated based on the test dataset. The proposed model not only improves the ADS-B In packet error correction rate (PECR), but it also enhances the ADS-B In terms of sensitivity. The performance evaluation results reveal that the proposed scheme is achievable and efficient for the avionics industry. It is worth noting that the proposed algorithm is not dependent on conventional algorithms’ prerequisites.展开更多
An error tolerant hardware efficient verylarge scale integration (VLSI) architecture for bitparallel systolic multiplication over dual base, which canbe pipelined, is presented. Since this architecture has thefeatur...An error tolerant hardware efficient verylarge scale integration (VLSI) architecture for bitparallel systolic multiplication over dual base, which canbe pipelined, is presented. Since this architecture has thefeatures of regularity, modularity and unidirectionaldata flow, this structure is well suited to VLSIimplementations. The length of the largest delay pathand area of this architecture are less compared to the bitparallel systolic multiplication architectures reportedearlier. The architecture is implemented using Austria Micro System's 0.35 μm CMOS (complementary metaloxide semiconductor) technology. This architecture canalso operate over both the dual-base and polynomialbase.展开更多
The theoretical lower bounds on mean squared channel estimation errors for typical fading channels are presented by the infinite-length and non-causal Wiener filter and the exact closed-form expressions of the lower b...The theoretical lower bounds on mean squared channel estimation errors for typical fading channels are presented by the infinite-length and non-causal Wiener filter and the exact closed-form expressions of the lower bounds for different channel Doppler spectra are derived. Based on the obtained lower bounds on mean squared channel estimation errors, the limits on bit error rate (BER) for maximal ratio combining (MRC) with Gaussian distributed weighting errors on independent and identically distributed (i. i. d) fading channels are presented. Numerical results show that the BER performances of ideal MRC are the lower bounds on the BER performances of non-ideal MRC and deteriorate as the maximum Doppler frequency increases or the SNR of channel estimate decreases.展开更多
Directional modulation(DM)is one of the most promising secure communication techniques.However,when the eavesdropper is co-located with the legitimate receiver,the conventional DM has the disadvantages of weak anti-sc...Directional modulation(DM)is one of the most promising secure communication techniques.However,when the eavesdropper is co-located with the legitimate receiver,the conventional DM has the disadvantages of weak anti-scanning capability,anti-deciphering capability,and low secrecy rate.In response to these problems,we propose a twodimensional multi-term weighted fractional Fourier transform aided DM scheme,in which the legitimate receiver and the transmitter use different transform terms and transform orders to encrypt and decrypt the confidential information.In order to further lower the probability of being deciphered by an eavesdropper,we use the subblock partition method to convert the one-dimensional modulated signal vector into a twodimensional signal matrix,increasing the confusion of the useful information.Numerical results demonstrate that the proposed DM scheme not only provides stronger anti-deciphering and anti-scanning capabilities but also improves the secrecy rate performance of the system.展开更多
With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. ...With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. In QSM, the traditional signal detection methods sometimes are unable to meet the actual requirement of low complexity of the system. Therefore, this paper proposes a signal detection scheme for QSM systems using deep learning to solve the complexity problem. Results from the simulations show that the bit error rate performance of the proposed deep learning-based detector is better than that of the zero-forcing(ZF) and minimum mean square error(MMSE) detectors, and similar to the maximum likelihood(ML) detector. Moreover, the proposed method requires less processing time than ZF, MMSE,and ML.展开更多
基金Supported by the National Natural Science Foundation of China (No.60572059)Foundation of Guangdong Province for Ph.D. (No. 5300707).
文摘Bit Error Probability (BEP) provides a fundamental performance measure for wireless diversity systems. This paper presents two new exact BEP expressions for Maximal Ratio Combining (MRC) diversity systems. One BEP expression takes a closed form, while the other is derived by treating the squared-sum of Rayleigh random variables as an Erlang variable. Due to the fact that the extant bounds are loose and could not properly characterize the error performance of MRC diversity systems, this paper presents a very tight bound. The numerical analysis shows that the new derived BEP expressions coincide with the extant expressions, and that the new approximation tightly bounds the accurate BEP.
基金supported by the National Key Technology R&D Program of China (2009ZX03005-003-00)the National Science Foundation of China (60802082)Fundamental Research Funds for Central Universities (2009RC0102)
文摘As is known, distributed Turbo coding (DTC) performs close to the theoretic outage probability bound of a relay channel when correct decoding is assumed at the relay. However, decoding error is inevitable in practical fading channels due to the error-prone feature of radio channels, and the decoding error propagation in DTC scheme will severely degrade the error performance of the relay system. As a result, it is necessary to evaluate the error performance of the DTC scheme in multi-hop relaying wireless systems in practical fading channels. Moreover, the theoretical method of analysis provides an effective tool for obtaining the error performance besides lengthy simulations. In this article, the concept of equivalent signal-to-noise ratio (SNR) of the two-hop relay channel and the method of computing equivalent SNR are developed, and then the upper bound on the bit error probability (BEP) of DTC relay systems is analyzed by use of Turbo code's distance spectrum, the concept of uniform interleaver, the limit-before-averaging technique, and the union bound method. Both theoretical analysis and numerical simulation are implemented for relay systems with DTC scheme over quasi-static Rayleigh fading channels. The results show that the upper bound approaches the simulation results in the medium to high SNR region.
文摘Many communication systems use the cyclic redundancy code (CRC) technique for protecting key data fields from transmission errors by enabling both single-bit error correction and multi-bit error detection. The look-up table design is very important for the error-correction implementation. This paper presents a CRC look-up table optimization method for single-bit error correction. The optimization method minimizes the address length of the pre-designed look-up table while satisfying certain restrictions. The circuit implementation is also presented to show the feasibility of the method in the application specific integrated circuit design. An application of the optimization method in the generic framing procedure protocol is implemented using field programmable gatearrays. The result shows that the memory address length has been minimized, while keeping a very simple circuit implementation.
基金supported in part by the National Key Research and Development Program of China under Grant 2019YFB1803400in part by the National Science Foundation of China under Grant 62001179in part by the Fundamental Research Funds for the Central Universities under Grant 2020kfyXJJS111.
文摘In this paper,average bit error probability(ABEP)bound of optimal maximum likelihood(ML)detector is first derived for ultra massive(UM)multiple-input-multiple-output(MIMO)system with generalized amplitude phase modulation(APM),which is confirmed by simulation results.Furthermore,a minimum residual criterion(MRC)based lowcomplexity near-optimal ML detector is proposed for UM-MIMO system.Specifically,we first obtain an initial estimated signal by a conventional detector,i.e.,matched filter(MF),or minimum mean square error(MMSE)and so on.Furthermore,MRC based error correction mechanism(ECM)is proposed to correct the erroneous symbol encountered in the initial result.Simulation results are shown that the performance of the proposed MRC-ECM based detector is capable of approaching theoretical ABEP of ML,despite only imposing a slightly higher complexity than that of the initial detector.
基金Project supported by the National Natural Science Foundationof China (Nos. 61103010,61103190,and 60803100)the National Basic Research Program (973) of China (No. 2012CB933500)the High-Tech R&D Program (863) of China (No.2012AA011001)
文摘The error patterns of a wireless channel can be represented by a binary sequence of ones(burst) and zeros(run),which is referred to as a trace.Recent surveys have shown that the run length distribution of a wireless channel is an intrinsically heavy-tailed distribution.Analytical models to characterize such features have to deal with the trade-off between complexity and accuracy.In this paper,we use an independent but not identically distributed(inid) stochastic process to characterize such channel behavior and show how to parameterize the inid bit error model on the basis of a trace.The proposed model has merely two parameters both having intuitive meanings and can be easily figured out from a trace.Compared with chaotic maps,the inid bit error model is simple for practical use but can still be deprived from heavy-tailed distribution in theory.Simulation results demonstrate that the inid model can match the trace,but with fewer parameters.We then propose an improvement on the inid model to capture the 'bursty' nature of channel errors,described by burst length distribution.Our theoretical analysis is supported by an experimental evaluation.
文摘Standard automatic dependent surveillance broadcast (ADS-B) reception algorithms offer considerable performance at high signal-to-noise ratios (SNRs). However, the performance of ADS-B algorithms in applications can be problematic at low SNRs and in high interference situations, as detecting and decoding techniques may not perform correctly in such circumstances. In addition, conventional error correction algorithms have limitations in their ability to correct errors in ADS-B messages, as the bit and confidence values may be declared inaccurately in the event of low SNRs and high interference. The principal goal of this paper is to deploy a Long Short-Term Memory (LSTM) recurrent neural network model for error correction in conjunction with a conventional algorithm. The data of various flights are collected and cleaned in an initial stage. The clean data is divided randomly into training and test sets. Next, the LSTM model is trained based on the training dataset, and then the model is evaluated based on the test dataset. The proposed model not only improves the ADS-B In packet error correction rate (PECR), but it also enhances the ADS-B In terms of sensitivity. The performance evaluation results reveal that the proposed scheme is achievable and efficient for the avionics industry. It is worth noting that the proposed algorithm is not dependent on conventional algorithms’ prerequisites.
文摘An error tolerant hardware efficient verylarge scale integration (VLSI) architecture for bitparallel systolic multiplication over dual base, which canbe pipelined, is presented. Since this architecture has thefeatures of regularity, modularity and unidirectionaldata flow, this structure is well suited to VLSIimplementations. The length of the largest delay pathand area of this architecture are less compared to the bitparallel systolic multiplication architectures reportedearlier. The architecture is implemented using Austria Micro System's 0.35 μm CMOS (complementary metaloxide semiconductor) technology. This architecture canalso operate over both the dual-base and polynomialbase.
文摘The theoretical lower bounds on mean squared channel estimation errors for typical fading channels are presented by the infinite-length and non-causal Wiener filter and the exact closed-form expressions of the lower bounds for different channel Doppler spectra are derived. Based on the obtained lower bounds on mean squared channel estimation errors, the limits on bit error rate (BER) for maximal ratio combining (MRC) with Gaussian distributed weighting errors on independent and identically distributed (i. i. d) fading channels are presented. Numerical results show that the BER performances of ideal MRC are the lower bounds on the BER performances of non-ideal MRC and deteriorate as the maximum Doppler frequency increases or the SNR of channel estimate decreases.
基金supported by National Natural Science Foundation of China(No.62171445)。
文摘Directional modulation(DM)is one of the most promising secure communication techniques.However,when the eavesdropper is co-located with the legitimate receiver,the conventional DM has the disadvantages of weak anti-scanning capability,anti-deciphering capability,and low secrecy rate.In response to these problems,we propose a twodimensional multi-term weighted fractional Fourier transform aided DM scheme,in which the legitimate receiver and the transmitter use different transform terms and transform orders to encrypt and decrypt the confidential information.In order to further lower the probability of being deciphered by an eavesdropper,we use the subblock partition method to convert the one-dimensional modulated signal vector into a twodimensional signal matrix,increasing the confusion of the useful information.Numerical results demonstrate that the proposed DM scheme not only provides stronger anti-deciphering and anti-scanning capabilities but also improves the secrecy rate performance of the system.
基金supported in part by The Science and Technology Development Fund, Macao SAR, China (0108/2020/A3)in part by The Science and Technology Development Fund, Macao SAR, China (0005/2021/ITP)the Deanship of Scientific Research at Taif University for funding this work。
文摘With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. In QSM, the traditional signal detection methods sometimes are unable to meet the actual requirement of low complexity of the system. Therefore, this paper proposes a signal detection scheme for QSM systems using deep learning to solve the complexity problem. Results from the simulations show that the bit error rate performance of the proposed deep learning-based detector is better than that of the zero-forcing(ZF) and minimum mean square error(MMSE) detectors, and similar to the maximum likelihood(ML) detector. Moreover, the proposed method requires less processing time than ZF, MMSE,and ML.