Estimation of Rayleigh fading channels using time multiplexed pilot symbols in W CDMA (FDD) is considered. Method of interpolation on a second order curve using the instantaneous channel estimation of two contiguous...Estimation of Rayleigh fading channels using time multiplexed pilot symbols in W CDMA (FDD) is considered. Method of interpolation on a second order curve using the instantaneous channel estimation of two contiguous slots based on least square method (SOLSM) is presented. It is demonstrated by computer simulations that the channel distortion on data symbols in a slot can be estimated effectively compared to the method using simple linear interpolation, and the performance of the Rake combiner is improved effectively especially in fast moving cases.展开更多
Based on the fact that the variation of tile direction of arrival (DOA) isslower than that of the channel fading, the steering vector of the desired signal is estimatedfirstly using a subspace decomposition method and...Based on the fact that the variation of tile direction of arrival (DOA) isslower than that of the channel fading, the steering vector of the desired signal is estimatedfirstly using a subspace decomposition method and then a constrained condition is configured.Traffic signals are further employed to estimate the channel vector based on the constrained leastsquares criterion. We use the iterative least squares with projection (ILSP) algorithm initializedby the pilot to get the estimation. The accuracy of channel estimation and symbol detection can beprogressively increased through the iteration procedure of the ILSP algorithm. Simulation resultsdemonstrate that the proposed algorithm improves the system performance effectively compared withthe conventional 2-D RAKE receiver.展开更多
Based on the theory of multicarrier(MC) technique and the Rake receiver, a multicarrier DS-CDMA Rake system is proposed, where a data sequence multiplied by a spreading sequence modulates multiple carriers. The receiv...Based on the theory of multicarrier(MC) technique and the Rake receiver, a multicarrier DS-CDMA Rake system is proposed, where a data sequence multiplied by a spreading sequence modulates multiple carriers. The receiver provides a Rake for each subcarrier, and the outputs of the Rakes are combined by a maximal-ratio combiner. The average probability of error of the system is derived from an uncorrelated subcarrier and frequency-selective fading channel model. The system performances are evaluated over Rayleigh fading channel with an exponential multipath intensity profile(MIP) and with a rectangular MIP, respectively, when multipath interference is present. It is found that this kind of model has larger superiority in an exponential MIP than in a rectangular MIP.展开更多
In this paper, we propose two joint transmit-receive iterative algorithms without the cooperation between different base stations based on the idea of interference alignment (IA) to improve the throughput of relay bac...In this paper, we propose two joint transmit-receive iterative algorithms without the cooperation between different base stations based on the idea of interference alignment (IA) to improve the throughput of relay backhaul links in cellular networks for the case of imperfect channel knowledge,which can be implemented with small changes to existing TD-LTE standards. Unlike the previous interference alignment algorithms' only reducing the sum interference to the other receivers at the transmitter or the sum received Multi-user interference (MUI) at the receiver, our algorithm shapes the transmission of each data stream at transmitters in order not only to minimize interference to the other users, but also to minimize the interference between different streams objected to the same user, suppressing the MUI and Multi-stream interference (MSI) at receivers. The proposed algorithm I is to maximize the SINR at receivers. But the complexity is relatively high. Algorithm II only needs linear operations and sacrifices a little performance for much lower complexity compared to the Maximize SINR iterative algorithm which needs the inversion operation of matrix. It is also proved that the algorithm converges monotonically. The simulation results show that the techniques have considerable performance gain compared with the previous algorithms. Further research about power allocation is also discussed.展开更多
Network coding (NC), which works in the network layer, is an effective technology to improve the network throughput, by allowing the relay to encode the information from different users and ensuring the destination to...Network coding (NC), which works in the network layer, is an effective technology to improve the network throughput, by allowing the relay to encode the information from different users and ensuring the destination to retrieve the desired information. Employing network coding technique in a cooperative network can improve the network performance further. In this paper, we introduce analog network coding (ANC) to a simple two-user cooperative diversity network, which adopts amplify-and-forward (AF) mode and all nodes use multiple antennas. The impact of the number of antenna on the system achievable rate is investigated. And the bit error rate (BER) performances of the traditional relay cooperative network and the cooperative network based on analog network coding under different propagation conditions are discussed. The simulation results show that the performance of the traditional cooperative network has improved significantly due to the employ of network coding.展开更多
This paper proposes a novel zero Intermediate Frequency (IF) receiver for Multi-Carrier (MC) Direct-Sequence Code-Division Multiple Access (DS-CDMA) based on multicar-rier mode of cdma2000 system. The proposed receive...This paper proposes a novel zero Intermediate Frequency (IF) receiver for Multi-Carrier (MC) Direct-Sequence Code-Division Multiple Access (DS-CDMA) based on multicar-rier mode of cdma2000 system. The proposed receiver employs direct RF-to-baseband down-conversion, sampling at a rate equal to the bandwidth of the baseband multicarrier signal and complex-valued coefficient FIR filters. This receiver avoids the need for arrays of high Q analog bandpass filters, has a much lower sampling rate half of that of conventional receiver and offers significant savings in hardware implementation. Analytic and simulation results show that the presented receiver performs well for both the AWGN channel and Rayleigh fading channel.展开更多
In this paper, a novel flow control mechanism in cognitive packet network (CPN) based on the improved back propagation (BP) neural network is proposed, considering the flow distribution status predicted by BP neural n...In this paper, a novel flow control mechanism in cognitive packet network (CPN) based on the improved back propagation (BP) neural network is proposed, considering the flow distribution status predicted by BP neural network when packets are routed. The objective is to increase the capacity of CPN and improve the quality of service (QoS) by achieving flow balance. Besides, considering the slow convergence speed of traditional BP algorithm and the quick change of the flow status in cognitive packet network, an improved BP algorithm with dynamic learning rate is designed in order to achieve a higher convergence speed. The mechanism, which we propose, regards the predicated traffic data as an important factor when packets are routed to implement flow control. By achieving balance, the quality of network can be improved obviously. The simulation results show that the proposed mechanism provides better average time delay and packets loss ratio.展开更多
To analyze and reduce the impact of Machine-to-Machine (M2M) Devices (MDs) on the traditional Human-to-Human (H2H) users for the blending scenario, where both M2M and H2H services coexist in the current Universal Mobi...To analyze and reduce the impact of Machine-to-Machine (M2M) Devices (MDs) on the traditional Human-to-Human (H2H) users for the blending scenario, where both M2M and H2H services coexist in the current Universal Mobile Telecommunication System (UMTS) and perform the Random Access (RA) procedure simultaneously, a comprehensive RA analysis model of RA is proposed in this paper. Further, a power ramping strategy based on the logarithm for M2M is proposed. The efficiency of both the existing and proposed scheme is assessed through a simulation across several metrics, including average target power, throughput, blocking probability, and delay statistics. Numerical results show that the proposed algorithm can ensure a minimal impact on H2H communication while maintaining the throughput of the M2M communication. Meanwhile, because of its low energy consumption, this algorithm has a significant guide value for real-world applications.展开更多
Mobile phone manufacturer TCL Communication Technology Holdings Ltd', a subsidiaryof TCL Corporation, will produce trial TD-SCDMA handsets by this October, according to a TCL Communication announcement.
The communications industrial standard YD/T 1885-2009 provides the types of headset interfaces, the performance requirements and test methods. Since the release of this standard, more and more manufacturers have adopt...The communications industrial standard YD/T 1885-2009 provides the types of headset interfaces, the performance requirements and test methods. Since the release of this standard, more and more manufacturers have adopted the concentric connector, which gives more choices to consumers and also has benefits on the environmental protection and the healthy development of the mobile terminal industry. Now, the universal headset interface has been included in the draft ITU-T recommendation P.381. lts internationalization will further enhance the universality of the mobile phone headset interlace. It is China's another great contribution to the international standardization following the standard of universal power adapter for mobile phones.展开更多
Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment f...Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment for WSNs. It is tempting to use many random and different instances of polynomial based key predistribution scheme for various parts of the WSN to enhance the efficiency of WSN key establishment protocols. This paper indicates that it is not secured in general to use many instances of Blom-Blundo et al. polynomial based key predistribution scheme in a WSN key establishment protocol. Thus the previously constructed group-based type WSN key predistribution schemes using polynomial based key predistribution scheme are insecure. We propose new generalized Bloin-Blundo et al. key predistribution schemes. These new generalized Blom-Blundo et al. key predistribution schemes can be used many times in one WSN key establishment protocol with only a small increase of cost. The application to group-based WSN key predistribution schemes is given.展开更多
Fingerprint matching is adopted by a large family of indoor localization schemes,where collecting fingerprints is inevitable but all consuming.While the increasingly popular crowdsourcing based approach provides an op...Fingerprint matching is adopted by a large family of indoor localization schemes,where collecting fingerprints is inevitable but all consuming.While the increasingly popular crowdsourcing based approach provides an opportunity to relieve the burden of fingerprints collecting,a number of formidable challenges for such an approach have yet been studied.For instance,querying in a large fingerprints database for matching process takes a lot of time and calculation;fingerprints collected by crowdsourcing lacks of robustness because of heterogeneous devices problem.Those are important challenges which impede practical deployment of the fingerprint matching indoor localization system.In this study,targeting on effectively utilizing and mining large amount fingerprint data,enhancing the robustness of fingerprints under heterogeneous devices' collection and realizing the real time localization response,we propose a crowdsourcing based fingerprints collecting mechanism for indoor localization systems.With the proposed approach,massive raw fingerprints will be divided into small clusters while diverse devices' uploaded fingerprints will be merged for overcoming device heterogeneity,both of which will contribute to reduce response time.We also build a mobile cloud testbed to verify the proposed scheme.Comprehensive real world experiment results indicate that the scheme can provide comparable localization accuracy.展开更多
文摘Estimation of Rayleigh fading channels using time multiplexed pilot symbols in W CDMA (FDD) is considered. Method of interpolation on a second order curve using the instantaneous channel estimation of two contiguous slots based on least square method (SOLSM) is presented. It is demonstrated by computer simulations that the channel distortion on data symbols in a slot can be estimated effectively compared to the method using simple linear interpolation, and the performance of the Rake combiner is improved effectively especially in fast moving cases.
基金The National Hi-Tech Development Plan (863-317-03-01-02-04-20).
文摘Based on the fact that the variation of tile direction of arrival (DOA) isslower than that of the channel fading, the steering vector of the desired signal is estimatedfirstly using a subspace decomposition method and then a constrained condition is configured.Traffic signals are further employed to estimate the channel vector based on the constrained leastsquares criterion. We use the iterative least squares with projection (ILSP) algorithm initializedby the pilot to get the estimation. The accuracy of channel estimation and symbol detection can beprogressively increased through the iteration procedure of the ILSP algorithm. Simulation resultsdemonstrate that the proposed algorithm improves the system performance effectively compared withthe conventional 2-D RAKE receiver.
基金Natural Science Key Projects from Education Department of Hubei Province(2004D002)
文摘Based on the theory of multicarrier(MC) technique and the Rake receiver, a multicarrier DS-CDMA Rake system is proposed, where a data sequence multiplied by a spreading sequence modulates multiple carriers. The receiver provides a Rake for each subcarrier, and the outputs of the Rakes are combined by a maximal-ratio combiner. The average probability of error of the system is derived from an uncorrelated subcarrier and frequency-selective fading channel model. The system performances are evaluated over Rayleigh fading channel with an exponential multipath intensity profile(MIP) and with a rectangular MIP, respectively, when multipath interference is present. It is found that this kind of model has larger superiority in an exponential MIP than in a rectangular MIP.
基金Sponsored by the Important National Science & Technology Specific Projects of China (Grant No. 2009ZX03004-001)the Cooperation Project with Huawei Technologies Company (Grant No. YBWL2010242)
文摘In this paper, we propose two joint transmit-receive iterative algorithms without the cooperation between different base stations based on the idea of interference alignment (IA) to improve the throughput of relay backhaul links in cellular networks for the case of imperfect channel knowledge,which can be implemented with small changes to existing TD-LTE standards. Unlike the previous interference alignment algorithms' only reducing the sum interference to the other receivers at the transmitter or the sum received Multi-user interference (MUI) at the receiver, our algorithm shapes the transmission of each data stream at transmitters in order not only to minimize interference to the other users, but also to minimize the interference between different streams objected to the same user, suppressing the MUI and Multi-stream interference (MSI) at receivers. The proposed algorithm I is to maximize the SINR at receivers. But the complexity is relatively high. Algorithm II only needs linear operations and sacrifices a little performance for much lower complexity compared to the Maximize SINR iterative algorithm which needs the inversion operation of matrix. It is also proved that the algorithm converges monotonically. The simulation results show that the techniques have considerable performance gain compared with the previous algorithms. Further research about power allocation is also discussed.
基金Sponsored by the National Natural Science Foundation of China (Grant No. 60872016)
文摘Network coding (NC), which works in the network layer, is an effective technology to improve the network throughput, by allowing the relay to encode the information from different users and ensuring the destination to retrieve the desired information. Employing network coding technique in a cooperative network can improve the network performance further. In this paper, we introduce analog network coding (ANC) to a simple two-user cooperative diversity network, which adopts amplify-and-forward (AF) mode and all nodes use multiple antennas. The impact of the number of antenna on the system achievable rate is investigated. And the bit error rate (BER) performances of the traditional relay cooperative network and the cooperative network based on analog network coding under different propagation conditions are discussed. The simulation results show that the performance of the traditional cooperative network has improved significantly due to the employ of network coding.
基金Supported by the National Natural Science Founation of China(No.69725001)
文摘This paper proposes a novel zero Intermediate Frequency (IF) receiver for Multi-Carrier (MC) Direct-Sequence Code-Division Multiple Access (DS-CDMA) based on multicar-rier mode of cdma2000 system. The proposed receiver employs direct RF-to-baseband down-conversion, sampling at a rate equal to the bandwidth of the baseband multicarrier signal and complex-valued coefficient FIR filters. This receiver avoids the need for arrays of high Q analog bandpass filters, has a much lower sampling rate half of that of conventional receiver and offers significant savings in hardware implementation. Analytic and simulation results show that the presented receiver performs well for both the AWGN channel and Rayleigh fading channel.
基金Sponsored by the National Natural Science Funds of China for Young Scholar (Grant No. 61001115)the Beijing Natural Science Foundation of China(Grant No. 4102044)the Foundamental Research Funds for the Central Universities of China(Grant No.2012RC0126)
文摘In this paper, a novel flow control mechanism in cognitive packet network (CPN) based on the improved back propagation (BP) neural network is proposed, considering the flow distribution status predicted by BP neural network when packets are routed. The objective is to increase the capacity of CPN and improve the quality of service (QoS) by achieving flow balance. Besides, considering the slow convergence speed of traditional BP algorithm and the quick change of the flow status in cognitive packet network, an improved BP algorithm with dynamic learning rate is designed in order to achieve a higher convergence speed. The mechanism, which we propose, regards the predicated traffic data as an important factor when packets are routed to implement flow control. By achieving balance, the quality of network can be improved obviously. The simulation results show that the proposed mechanism provides better average time delay and packets loss ratio.
基金supported in part by the National Natural Science Foundation of Chinaunder Grants No.60971125, No.61121001Major National S&T Project under Grant No. 2012ZX03005010 the project under Grant No.201105
文摘To analyze and reduce the impact of Machine-to-Machine (M2M) Devices (MDs) on the traditional Human-to-Human (H2H) users for the blending scenario, where both M2M and H2H services coexist in the current Universal Mobile Telecommunication System (UMTS) and perform the Random Access (RA) procedure simultaneously, a comprehensive RA analysis model of RA is proposed in this paper. Further, a power ramping strategy based on the logarithm for M2M is proposed. The efficiency of both the existing and proposed scheme is assessed through a simulation across several metrics, including average target power, throughput, blocking probability, and delay statistics. Numerical results show that the proposed algorithm can ensure a minimal impact on H2H communication while maintaining the throughput of the M2M communication. Meanwhile, because of its low energy consumption, this algorithm has a significant guide value for real-world applications.
文摘Mobile phone manufacturer TCL Communication Technology Holdings Ltd', a subsidiaryof TCL Corporation, will produce trial TD-SCDMA handsets by this October, according to a TCL Communication announcement.
文摘The communications industrial standard YD/T 1885-2009 provides the types of headset interfaces, the performance requirements and test methods. Since the release of this standard, more and more manufacturers have adopted the concentric connector, which gives more choices to consumers and also has benefits on the environmental protection and the healthy development of the mobile terminal industry. Now, the universal headset interface has been included in the draft ITU-T recommendation P.381. lts internationalization will further enhance the universality of the mobile phone headset interlace. It is China's another great contribution to the international standardization following the standard of universal power adapter for mobile phones.
基金the NSFC Danish National Research Foundation and National Science Foundation of China Joint Grant (No. 11061130539)the National Natural Science Foundation of China (No. 61021004)
文摘Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment for WSNs. It is tempting to use many random and different instances of polynomial based key predistribution scheme for various parts of the WSN to enhance the efficiency of WSN key establishment protocols. This paper indicates that it is not secured in general to use many instances of Blom-Blundo et al. polynomial based key predistribution scheme in a WSN key establishment protocol. Thus the previously constructed group-based type WSN key predistribution schemes using polynomial based key predistribution scheme are insecure. We propose new generalized Bloin-Blundo et al. key predistribution schemes. These new generalized Blom-Blundo et al. key predistribution schemes can be used many times in one WSN key establishment protocol with only a small increase of cost. The application to group-based WSN key predistribution schemes is given.
基金the National Science and Technology Major Project of China(No.2013ZX03001007-004)the Shanghai Basic Research Key Project(No.11DZ1500206)
文摘Fingerprint matching is adopted by a large family of indoor localization schemes,where collecting fingerprints is inevitable but all consuming.While the increasingly popular crowdsourcing based approach provides an opportunity to relieve the burden of fingerprints collecting,a number of formidable challenges for such an approach have yet been studied.For instance,querying in a large fingerprints database for matching process takes a lot of time and calculation;fingerprints collected by crowdsourcing lacks of robustness because of heterogeneous devices problem.Those are important challenges which impede practical deployment of the fingerprint matching indoor localization system.In this study,targeting on effectively utilizing and mining large amount fingerprint data,enhancing the robustness of fingerprints under heterogeneous devices' collection and realizing the real time localization response,we propose a crowdsourcing based fingerprints collecting mechanism for indoor localization systems.With the proposed approach,massive raw fingerprints will be divided into small clusters while diverse devices' uploaded fingerprints will be merged for overcoming device heterogeneity,both of which will contribute to reduce response time.We also build a mobile cloud testbed to verify the proposed scheme.Comprehensive real world experiment results indicate that the scheme can provide comparable localization accuracy.