Abstract: The layered decoding algorithm has been widely used in the implementation of Low Density Parity Check (LDPC) decoders, due to its high convergence speed. However, the pipeline operation of the layered dec...Abstract: The layered decoding algorithm has been widely used in the implementation of Low Density Parity Check (LDPC) decoders, due to its high convergence speed. However, the pipeline operation of the layered decoder may introduce memory access conflicts, which heavily deteriorates the decoder throughput. To essentially deal with the issue of memory access conflicts,展开更多
Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast e...Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast exposes the physical layer vulnerable to the threat of illegal eavesdropping. Quantum noise stream cipher(QNSC) is a classic physical layer encryption method and well compatible with the OFDM-PON. Meanwhile, it is indispensable to exploit forward error correction(FEC) to control errors in data transmission. However, when QNSC and FEC are jointly coded, the redundant information becomes heavier and thus the code rate of the transmitted signal will be largely reduced. In this work, we propose a physical layer encryption scheme based on polar-code-assisted QNSC. In order to improve the code rate and security of the transmitted signal, we exploit chaotic sequences to yield the redundant bits and utilize the redundant information of the polar code to generate the higher-order encrypted signal in the QNSC scheme with the operation of the interleaver.We experimentally demonstrate the encrypted 16/64-QAM, 16/256-QAM, 16/1024-QAM, 16/4096-QAM QNSC signals transmitted over 30-km standard single mode fiber. For the transmitted 16/4096-QAM QNSC signal, compared with the conventional QNSC method, the proposed method increases the code rate from 0.1 to 0.32 with enhanced security.展开更多
Vertical layered space-time codes have demonstrated the enormous potential to accommodate rapid flow data. Thus far, vertical layered space-time codes assumed that perfect estimates of current channel fading condition...Vertical layered space-time codes have demonstrated the enormous potential to accommodate rapid flow data. Thus far, vertical layered space-time codes assumed that perfect estimates of current channel fading conditions are available at the receiver. However, increasing the number of transmit antennas increases the required training interval and reduces the available time in which data may be transmitted before the fading coefficients change. In this paper, a vertical layered space-time code is proposed. By applying the subspace method to the layered space-time code, the symbols can be detected without training symbols and channel estimates at the transmitter or the receiver. Monte Carlo simulations show that performance can approach that of the detection method with the knowledge of the channel.展开更多
In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w...In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93.展开更多
To maximize the aggregate throughput achieved in heterogeneous networks, this paper investigates inter-session network coding for the distribution of layered source data. We define inter-layer hierarchical random line...To maximize the aggregate throughput achieved in heterogeneous networks, this paper investigates inter-session network coding for the distribution of layered source data. We define inter-layer hierarchical random linear network codes (IHRLNC), which not only take the flexibility of intersession network coding for layer mixing but also consider the strict priority inherent in the layered source data. Furthermore, we propose the inter-layer hierarchical multicast (IHM), which performs IHRLNC in the network such that each sink can recover some source layers according to its individu- al capacity. To determine the optimal type of IHRLNC that should be performed on each edge in IHM, we formulate an optimization problem based on 0-1 integer linear programming, and propose a heuristic approach to approximate the optimal solution in polynomial time. Simulation results show that the proposed IHM can achieve throughput gains over the layered muhicast schemes.展开更多
In this paper, for physical-layer security(PLS), a novel scheme of polar coding encryption is introduced in the wiretap channel(WTC) model. To decrease transmission overhead of the shared secret information and enhanc...In this paper, for physical-layer security(PLS), a novel scheme of polar coding encryption is introduced in the wiretap channel(WTC) model. To decrease transmission overhead of the shared secret information and enhance the security performance against an attacker, we have employed the two following encryption technologies: Firstly, randomization of output bits is not dependent on the traditional randomized bit-channels but they are directly flipped through the random bit sequence. Secondly, for employing Advanced Encryption Standard(AES), we utilize the secret seed to extend an initial secret key of AES cryptosystem, which it appears a good avalanche performance. Result analyses demonstrate that the proposed scheme is strongly resistant against conventional attacks.展开更多
The secrecy rates of the existing practical secrecy coding methods are relative low to satisfy the security requirement of 5 G communications.We propose an artificial noise(AN) aided polar coding algorithm to improve ...The secrecy rates of the existing practical secrecy coding methods are relative low to satisfy the security requirement of 5 G communications.We propose an artificial noise(AN) aided polar coding algorithm to improve the secrecy rate.Firstly,a secrecy coding model based on AN is presented,where the confidential bits of last transmission code block are adopted as AN to inject into the current codeword.In this way,the AN can only be eliminated from the jammed codeword by the legitimate users.Since the AN is shorter than the codeword,we then develop a suboptimal jamming positions selecting algorithm with the goal of maximizing the bit error rate of the eavesdropper.Theoretical and simulation results demonstrate that the proposed algorithm outperforms the random selection method and the method without AN.展开更多
Threaded Algebraic Space Time (TAST) codes developed by Gamal et al. is a powerful class of space time codes in which different layers are combined and separated by appropriate Diophantine number . In this paper we in...Threaded Algebraic Space Time (TAST) codes developed by Gamal et al. is a powerful class of space time codes in which different layers are combined and separated by appropriate Diophantine number . In this paper we introduce a technique of block layering in TAST codes, in which a series of layers (we call it Block layers) has more than one transmit antenna at the same time instant. As a result we use fewer layers (Diophantine numbers) for the four transmit antennas scheme, which enhances the coding gain of our proposed scheme. In each block layer we incorporate Alamouti’s transmit diversity scheme which decreases the decoding complexity. The proposed code achieves a normalized rate of 2 symbol/s. Simulation result shows that this type of codes outperforms TAST codes in certain scenarios.展开更多
A successful simulation still requires the user to have good simulation knowledge and well developed modeling skills despite a large number of simulation software products available to users. This paper presents the d...A successful simulation still requires the user to have good simulation knowledge and well developed modeling skills despite a large number of simulation software products available to users. This paper presents the design principles and implementation of a layered modeling system known as General-Purpose user-defined Modeling System (GPMS) which provides the user with multiple accesses to build a simulation model at three different levels of knowledge and skills. It does this by purpose-designed GPMS simulation language, which is briefly described in this paper.展开更多
A new combinational technology is proposed,which is feasible to apply physical-layer network coding(PNC) to wireless fading channels by employing the harmful interference strategically.The key step of PNC is that so...A new combinational technology is proposed,which is feasible to apply physical-layer network coding(PNC) to wireless fading channels by employing the harmful interference strategically.The key step of PNC is that sources broadcast signals simultaneously without orthogonal scheduling.Naturally,the signals overlap in the free space at the receivers.Since the signals from different sources are mutual independent,rooted on this rational assumption,an enhanced joint diagonalization separation named altering row diagonalization(ARD) algorithm is exploited to separate these signals by maximizing the cost function measuring independence among them.This ARD PNC(APNC) methodology provides an innovative way to implement signal-level network coding at the presence of interference and without any priori information about channels in fading environments.In conclusions,the proposed APNC performs well with higher bandwidth utility and lower error rate.展开更多
This paper extends the work on cross-layer design which combines adaptive modulation and coding at the physical layer and hybrid automatic repeat request protocol at the data link layer. By contrast with previous work...This paper extends the work on cross-layer design which combines adaptive modulation and coding at the physical layer and hybrid automatic repeat request protocol at the data link layer. By contrast with previous works on this topic, the present development and the performance analysis as well, is based on rate compatible punctured turbo codes. Rate compatibility provides incremental redundancy in transmission of parity bits for error correction at the data link layer. Turbo coding and iterative decoding gives lower packet error rate values in low signal-to-noise ratio regions of the adaptive modulation and coding (AMC) schemes. Thus, the applied cross-layer design results in AMC schemes can achieve better spectral efficiency than convolutional one while it retains the QoS requirements at the application layer. Numerical results in terms of spectral efficiency for both turbo and convolutional rate compatible punctured codes are presented. For a more comprehensive presentation, the performance of rate compatible LDPC is contrasted with turbo case as well as the performance complexity is discussed for each of the above codes.展开更多
A cross-layer design(CLD)scheme with combination of power allocation,adaptive modulation(AM)and automatic repeat request(ARQ)is presented for space-time coded MIMO system under imperfect feedback,and the corresponding...A cross-layer design(CLD)scheme with combination of power allocation,adaptive modulation(AM)and automatic repeat request(ARQ)is presented for space-time coded MIMO system under imperfect feedback,and the corresponding system performance is investigated in a Rayleigh fading channel.Based on imperfect feedback information,a suboptimal power allocation(PA)scheme is derived to maximize the average spectral efficiency(SE)of the system.The scheme is based on a so-called compressed SNR criterion,and has a closed-form expression for positive power allocation,thus being computationally efficient.Moreover,it can improve SE of the presented CLD.Besides,due to better approximation,it obtains the performance close to the existing optimal approach which requires numerical search.Simulation results show that the proposed CLD with PA can achieve higher SE than the conventional CLD with equal power allocation scheme,and has almost the same performance as CLD with optimal PA.However,it has lower calculation complexity.展开更多
基金the National Natural Science Foundation of China,the National Key Basic Research Program of China,The authors would like to thank all project partners for their valuable contributions and feedbacks
文摘Abstract: The layered decoding algorithm has been widely used in the implementation of Low Density Parity Check (LDPC) decoders, due to its high convergence speed. However, the pipeline operation of the layered decoder may introduce memory access conflicts, which heavily deteriorates the decoder throughput. To essentially deal with the issue of memory access conflicts,
基金supported in part by the National Natural Science Foundation of China Project under Grant 62075147the Suzhou Industry Technological Innovation Projects under Grant SYG202348.
文摘Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast exposes the physical layer vulnerable to the threat of illegal eavesdropping. Quantum noise stream cipher(QNSC) is a classic physical layer encryption method and well compatible with the OFDM-PON. Meanwhile, it is indispensable to exploit forward error correction(FEC) to control errors in data transmission. However, when QNSC and FEC are jointly coded, the redundant information becomes heavier and thus the code rate of the transmitted signal will be largely reduced. In this work, we propose a physical layer encryption scheme based on polar-code-assisted QNSC. In order to improve the code rate and security of the transmitted signal, we exploit chaotic sequences to yield the redundant bits and utilize the redundant information of the polar code to generate the higher-order encrypted signal in the QNSC scheme with the operation of the interleaver.We experimentally demonstrate the encrypted 16/64-QAM, 16/256-QAM, 16/1024-QAM, 16/4096-QAM QNSC signals transmitted over 30-km standard single mode fiber. For the transmitted 16/4096-QAM QNSC signal, compared with the conventional QNSC method, the proposed method increases the code rate from 0.1 to 0.32 with enhanced security.
基金Partially supported by the National Natural Sciences Foundation (No.69872029) and the Research Fund for Doctoral Program of Higher Education (No.1999069808) of China
文摘Vertical layered space-time codes have demonstrated the enormous potential to accommodate rapid flow data. Thus far, vertical layered space-time codes assumed that perfect estimates of current channel fading conditions are available at the receiver. However, increasing the number of transmit antennas increases the required training interval and reduces the available time in which data may be transmitted before the fading coefficients change. In this paper, a vertical layered space-time code is proposed. By applying the subspace method to the layered space-time code, the symbols can be detected without training symbols and channel estimates at the transmitter or the receiver. Monte Carlo simulations show that performance can approach that of the detection method with the knowledge of the channel.
基金the National Natural Science Foundation of China under Grant 61502411Natural Science Foundation of Jiangsu Province under Grant BK20150432 and BK20151299+7 种基金Natural Science Research Project for Universities of Jiangsu Province under Grant 15KJB520034China Postdoctoral Science Foundation under Grant 2015M581843Jiangsu Provincial Qinglan ProjectTeachers Overseas Study Program of Yancheng Institute of TechnologyJiangsu Provincial Government Scholarship for Overseas StudiesTalents Project of Yancheng Institute of Technology under Grant KJC2014038“2311”Talent Project of Yancheng Institute of TechnologyOpen Fund of Modern Agricultural Resources Intelligent Management and Application Laboratory of Huzhou Normal University.
文摘In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93.
基金Supported by the National Natural Science Foundation of China ( No. 60832001 ).
文摘To maximize the aggregate throughput achieved in heterogeneous networks, this paper investigates inter-session network coding for the distribution of layered source data. We define inter-layer hierarchical random linear network codes (IHRLNC), which not only take the flexibility of intersession network coding for layer mixing but also consider the strict priority inherent in the layered source data. Furthermore, we propose the inter-layer hierarchical multicast (IHM), which performs IHRLNC in the network such that each sink can recover some source layers according to its individu- al capacity. To determine the optimal type of IHRLNC that should be performed on each edge in IHM, we formulate an optimization problem based on 0-1 integer linear programming, and propose a heuristic approach to approximate the optimal solution in polynomial time. Simulation results show that the proposed IHM can achieve throughput gains over the layered muhicast schemes.
基金supported in part by the National Natural Science Foundation of China (Grant No. 61871009)
文摘In this paper, for physical-layer security(PLS), a novel scheme of polar coding encryption is introduced in the wiretap channel(WTC) model. To decrease transmission overhead of the shared secret information and enhance the security performance against an attacker, we have employed the two following encryption technologies: Firstly, randomization of output bits is not dependent on the traditional randomized bit-channels but they are directly flipped through the random bit sequence. Secondly, for employing Advanced Encryption Standard(AES), we utilize the secret seed to extend an initial secret key of AES cryptosystem, which it appears a good avalanche performance. Result analyses demonstrate that the proposed scheme is strongly resistant against conventional attacks.
基金supported in part by China’s High-Tech Research and Development Program(863 Program) under Grant No.2015AA01A708National Science Foundation for Young Scientists of China under Grant No.61501516
文摘The secrecy rates of the existing practical secrecy coding methods are relative low to satisfy the security requirement of 5 G communications.We propose an artificial noise(AN) aided polar coding algorithm to improve the secrecy rate.Firstly,a secrecy coding model based on AN is presented,where the confidential bits of last transmission code block are adopted as AN to inject into the current codeword.In this way,the AN can only be eliminated from the jammed codeword by the legitimate users.Since the AN is shorter than the codeword,we then develop a suboptimal jamming positions selecting algorithm with the goal of maximizing the bit error rate of the eavesdropper.Theoretical and simulation results demonstrate that the proposed algorithm outperforms the random selection method and the method without AN.
文摘Threaded Algebraic Space Time (TAST) codes developed by Gamal et al. is a powerful class of space time codes in which different layers are combined and separated by appropriate Diophantine number . In this paper we introduce a technique of block layering in TAST codes, in which a series of layers (we call it Block layers) has more than one transmit antenna at the same time instant. As a result we use fewer layers (Diophantine numbers) for the four transmit antennas scheme, which enhances the coding gain of our proposed scheme. In each block layer we incorporate Alamouti’s transmit diversity scheme which decreases the decoding complexity. The proposed code achieves a normalized rate of 2 symbol/s. Simulation result shows that this type of codes outperforms TAST codes in certain scenarios.
文摘A successful simulation still requires the user to have good simulation knowledge and well developed modeling skills despite a large number of simulation software products available to users. This paper presents the design principles and implementation of a layered modeling system known as General-Purpose user-defined Modeling System (GPMS) which provides the user with multiple accesses to build a simulation model at three different levels of knowledge and skills. It does this by purpose-designed GPMS simulation language, which is briefly described in this paper.
基金supported by the National Natural Science Foundation of China(6120118361132002)
文摘A new combinational technology is proposed,which is feasible to apply physical-layer network coding(PNC) to wireless fading channels by employing the harmful interference strategically.The key step of PNC is that sources broadcast signals simultaneously without orthogonal scheduling.Naturally,the signals overlap in the free space at the receivers.Since the signals from different sources are mutual independent,rooted on this rational assumption,an enhanced joint diagonalization separation named altering row diagonalization(ARD) algorithm is exploited to separate these signals by maximizing the cost function measuring independence among them.This ARD PNC(APNC) methodology provides an innovative way to implement signal-level network coding at the presence of interference and without any priori information about channels in fading environments.In conclusions,the proposed APNC performs well with higher bandwidth utility and lower error rate.
文摘This paper extends the work on cross-layer design which combines adaptive modulation and coding at the physical layer and hybrid automatic repeat request protocol at the data link layer. By contrast with previous works on this topic, the present development and the performance analysis as well, is based on rate compatible punctured turbo codes. Rate compatibility provides incremental redundancy in transmission of parity bits for error correction at the data link layer. Turbo coding and iterative decoding gives lower packet error rate values in low signal-to-noise ratio regions of the adaptive modulation and coding (AMC) schemes. Thus, the applied cross-layer design results in AMC schemes can achieve better spectral efficiency than convolutional one while it retains the QoS requirements at the application layer. Numerical results in terms of spectral efficiency for both turbo and convolutional rate compatible punctured codes are presented. For a more comprehensive presentation, the performance of rate compatible LDPC is contrasted with turbo case as well as the performance complexity is discussed for each of the above codes.
基金Supported by the Foundation of Huaian Industrial Projects(HAG2013064)the Foundation of Huaiyin Institute of Technology(HGB1202)the Doctoral Fund of Ministry of Education of China(20093218120021)
文摘A cross-layer design(CLD)scheme with combination of power allocation,adaptive modulation(AM)and automatic repeat request(ARQ)is presented for space-time coded MIMO system under imperfect feedback,and the corresponding system performance is investigated in a Rayleigh fading channel.Based on imperfect feedback information,a suboptimal power allocation(PA)scheme is derived to maximize the average spectral efficiency(SE)of the system.The scheme is based on a so-called compressed SNR criterion,and has a closed-form expression for positive power allocation,thus being computationally efficient.Moreover,it can improve SE of the presented CLD.Besides,due to better approximation,it obtains the performance close to the existing optimal approach which requires numerical search.Simulation results show that the proposed CLD with PA can achieve higher SE than the conventional CLD with equal power allocation scheme,and has almost the same performance as CLD with optimal PA.However,it has lower calculation complexity.