In order to make full use of wireless spectrum resources,the behavior of cognitive radio(CR)for dynamic spectrum allocation is analyzed based on the game theoretic framework.The traditional spectrum allocation schemes...In order to make full use of wireless spectrum resources,the behavior of cognitive radio(CR)for dynamic spectrum allocation is analyzed based on the game theoretic framework.The traditional spectrum allocation schemes consider the spectrum allocation among independent frequency bands only,without taking into account mutually overlapped frequency bands.For this reason,an optimal allocation etiquette is defined to promote the cross characteristic of the frequency bands in a dynamic spectrum allocation model.New interference operator and interference temperature constraints are introduced in order to realize calculation of the interference,and the corresponding spectrum allocation scenario can be further formulated as a potential game.Based on the characteristic of dynamic selection using the game theory and the interference avoidance rule of interference temperature,the robustness of CR networks is increased and the scenario is more suitable for the dynamic changing of actual wireless communication and energy saving communication systems.Simulation results show that the signal to interference and noise ratio(SINR) level can be significantly improved through the optimal allocation of any available spectrum.The utilization rate of spectrum and throughput of overall CR networks are increased by fully utilizing the spectrum resources in the dynamic spectrum allocation model.展开更多
To fulfill the explosive growth of network capacity, fifth generation(5G) standard has captured the attention and imagination of researchers and engineers around the world. In particular, heterogeneous cloud radio acc...To fulfill the explosive growth of network capacity, fifth generation(5G) standard has captured the attention and imagination of researchers and engineers around the world. In particular, heterogeneous cloud radio access network(H-CRAN), as a promising network paradigm in 5G system, is a hot research topic in recent years. However, the densely deployment of RRHs in H-CRAN leads to downlink/uplink traffic asymmetry and severe inter-cell interference which could seriously impair the network throughput and resource utilization. To simultaneously solve these two problems, we proposed a dynamic resource allocation(DRA) scheme for H-CRAN in TDD mode. Firstly, we design a clustering algorithm to group the RRHs into different sets. Secondly, we adopt coordinated multipoint technology to eliminate the interference in each set. Finally, we formulate the joint frame structure, power and subcarrier selection problem as a mixed strategy noncooperative game. The simulation results are presented to validate the effectiveness of our proposed algorithm by compared with the existing work.展开更多
A new hybrid technique is presented, which combines the Mode Matching (MM) method with the Method of Lines (MoL) to analyze a coaxial fed monopole antenna. The monopole antenna is dealt with using the MoL, while the M...A new hybrid technique is presented, which combines the Mode Matching (MM) method with the Method of Lines (MoL) to analyze a coaxial fed monopole antenna. The monopole antenna is dealt with using the MoL, while the MM method is used to analyze the coaxial feed system. Then, the two sub-problems are combined by enforcing point matching at the common regional interfaces. The input impedance is computed and compared with the measured data reported in literature, and the excellent agreement is observed.展开更多
An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, b...An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model.展开更多
基金Supported by National Natural Science Foundation of China(No.61371091,61301288)Specialized Research Fund for the Doctoral Programof Higher Education(No.20132125110006)the Fundamental Research Funds for the Central Universities(No.3132013334)
文摘In order to make full use of wireless spectrum resources,the behavior of cognitive radio(CR)for dynamic spectrum allocation is analyzed based on the game theoretic framework.The traditional spectrum allocation schemes consider the spectrum allocation among independent frequency bands only,without taking into account mutually overlapped frequency bands.For this reason,an optimal allocation etiquette is defined to promote the cross characteristic of the frequency bands in a dynamic spectrum allocation model.New interference operator and interference temperature constraints are introduced in order to realize calculation of the interference,and the corresponding spectrum allocation scenario can be further formulated as a potential game.Based on the characteristic of dynamic selection using the game theory and the interference avoidance rule of interference temperature,the robustness of CR networks is increased and the scenario is more suitable for the dynamic changing of actual wireless communication and energy saving communication systems.Simulation results show that the signal to interference and noise ratio(SINR) level can be significantly improved through the optimal allocation of any available spectrum.The utilization rate of spectrum and throughput of overall CR networks are increased by fully utilizing the spectrum resources in the dynamic spectrum allocation model.
基金jointly supported by Project 61501052 and 61302080 of the National Natural Science Foundation of China
文摘To fulfill the explosive growth of network capacity, fifth generation(5G) standard has captured the attention and imagination of researchers and engineers around the world. In particular, heterogeneous cloud radio access network(H-CRAN), as a promising network paradigm in 5G system, is a hot research topic in recent years. However, the densely deployment of RRHs in H-CRAN leads to downlink/uplink traffic asymmetry and severe inter-cell interference which could seriously impair the network throughput and resource utilization. To simultaneously solve these two problems, we proposed a dynamic resource allocation(DRA) scheme for H-CRAN in TDD mode. Firstly, we design a clustering algorithm to group the RRHs into different sets. Secondly, we adopt coordinated multipoint technology to eliminate the interference in each set. Finally, we formulate the joint frame structure, power and subcarrier selection problem as a mixed strategy noncooperative game. The simulation results are presented to validate the effectiveness of our proposed algorithm by compared with the existing work.
文摘A new hybrid technique is presented, which combines the Mode Matching (MM) method with the Method of Lines (MoL) to analyze a coaxial fed monopole antenna. The monopole antenna is dealt with using the MoL, while the MM method is used to analyze the coaxial feed system. Then, the two sub-problems are combined by enforcing point matching at the common regional interfaces. The input impedance is computed and compared with the measured data reported in literature, and the excellent agreement is observed.
基金The National Hi-Tech Research and Development Program (863) of China (No. 2005AA145110)The Pudong New Area Technology Innovation Public Service Platform of China (No. PDP2005-04)
文摘An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model.