The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents ...The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency.展开更多
The widespread use of advanced electronic devices has led to the emergence of spatial crowdsourcing,a method that taps into collective efforts to perform real-world tasks like environmental monitoring and traffic surv...The widespread use of advanced electronic devices has led to the emergence of spatial crowdsourcing,a method that taps into collective efforts to perform real-world tasks like environmental monitoring and traffic surveillance.Our research focuses on a specific type of spatial crowdsourcing that involves ongoing,collaborative efforts for continuous spatial data acquisition.However,due to limited budgets and workforce availability,the collected data often lacks completeness,posing a data deficiency problem.To address this,we propose a reciprocal framework to optimize task assignments by leveraging the mutual benefits of spatiotemporal subtask execution.We introduce an entropy-based quality metric to capture the combined effects of incomplete data acquisition and interpolation imprecision.Building on this,we explore a quality-aware task assignment method,corresponding to spatiotemporal assignment strategies.Since the assignment problem is NP-hard,we develop a polynomial-time algorithm with the guaranteed approximation ratio.Novel indexing and pruning techniques are proposed to further enhance performance.Extensive experiments conducted on datasets validate the effectiveness of our methods.展开更多
The programmable metasurface(PM)is an antenna array architecture that realizes flexible beam steering.This functionality is achieved by controlling the unit cells designed with micro components such as positive-intrin...The programmable metasurface(PM)is an antenna array architecture that realizes flexible beam steering.This functionality is achieved by controlling the unit cells designed with micro components such as positive-intrinsic-negative(PIN)diodes,which offers potential cost reductions in the next generation wireless communication systems.Although PM has been a popular topic in antenna design,its implementations in real-time systems accompanied by signal processing algorithms are challenging.In this paper,novel predictive tracking algorithms for mobile communication scenarios using a PM are created and implemented in a real-time system operating at 28 GHz.An angular speed prediction(ASP)algorithm is proposed to compute the position of user equipment(UE)based on the previously recorded beam directions.As another solution,an angle correction(AC)algorithm is proposed to further improve the prediction and tracking accuracy.As a benchmark,the comparisons to a previous PM tracking algorithm without prediction are presented.Both simulation and measurement results show that the prediction algorithms successfully improve the tracking performance,which also prove the feasibilities of PM-based systems to solve complex real-time signal processing problems.展开更多
The global system for mobile communication(GSM)is planned to meet the needs of the whole subscribers.The number of subscribers increased as the population increased due to the acceptance of GSM services by the subscri...The global system for mobile communication(GSM)is planned to meet the needs of the whole subscribers.The number of subscribers increased as the population increased due to the acceptance of GSM services by the subscribers.Thus,there should be a way to monitor base stations that will meet the increasing demand of subscribers in any area as a population surge will lead to more subscriptions.This will allow GSM network operators to serve their subscribers better and ease network congestion.This work presents a review of mobile evolution from the first generation to the fifth generation.A review of global positioning system(GPS)technology and its applications to geographic information systems(GIS)was done.The coordinates of these base stations were taken using a GPS device.These base station coordinates were then exported to QGIS for the design of the map.Thereafter,the output map was then integrated into the website.The discussions on the results followed and some useful suggestions given will go a long way to help the operators of GSM in Nigeria and in general.If the propositions given are adhered to,it will go a long way to help the operators reduce congestion on their network and thereby increase the satisfaction of the subscribers.展开更多
A remote antenna unit (RAU) selection model is presented, and two kinds of handoffs, intra-cell handoff (HO) and inter-cell HO, are defined in distributed mobile communications systems (DAS). After that, an inte...A remote antenna unit (RAU) selection model is presented, and two kinds of handoffs, intra-cell handoff (HO) and inter-cell HO, are defined in distributed mobile communications systems (DAS). After that, an inter-cell HO model is proposed, in which the average power of the active set (AS) is used to predict the position of the mobile station (MS). The total power of the AS and the handoff set (HOS) are utilized to determine whether an inter-cell HO is necessary. Furthermore, the relationship between HO parameters and performance metrics is studied in detail based on RAU selection. Simulation results show that both the intra-cell HO and the inter-cell HO can achieve oerfect performance by aoprooriate settings of HO parameters.展开更多
The current resource allocation in 5G vehicular networks for mobile cloud communication faces several challenges,such as low user utilization,unbalanced resource allocation,and extended adaptive allocation time.We pro...The current resource allocation in 5G vehicular networks for mobile cloud communication faces several challenges,such as low user utilization,unbalanced resource allocation,and extended adaptive allocation time.We propose an adaptive allocation algorithm for mobile cloud communication resources in 5G vehicular networks to address these issues.This study analyzes the components of the 5G vehicular network architecture to determine the performance of different components.It is ascertained that the communication modes in 5G vehicular networks for mobile cloud communication include in-band and out-of-band modes.Furthermore,this study analyzes the single-hop and multi-hop modes in mobile cloud communication and calculates the resource transmission rate and bandwidth in different communication modes.The study also determines the scenario of one-way and two-way vehicle lane cloud communication network connectivity,calculates the probability of vehicle network connectivity under different mobile cloud communication radii,and determines the amount of cloud communication resources required by vehicles in different lane scenarios.Based on the communication status of users in 5G vehicular networks,this study calculates the bandwidth and transmission rate of the allocated channels using Shannon’s formula.It determines the adaptive allocation of cloud communication resources,introduces an objective function to obtain the optimal solution after allocation,and completes the adaptive allocation process.The experimental results demonstrate that,with the application of the proposed method,the maximum utilization of user communication resources reaches approximately 99%.The balance coefficient curve approaches 1,and the allocation time remains under 2 s.This indicates that the proposed method has higher adaptive allocation efficiency.展开更多
Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady perform...Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady performance of eMBB traffic while meeting the requirements of URLLC traffic with puncturing is a major challenge in some realistic scenarios. In this paper, we pay attention to the timely and energy-efficient processing for eMBB traffic in the industrial Internet of Things(IIoT), where mobile edge computing(MEC) is employed for data processing. Specifically, the performance of eMBB traffic and URLLC traffic in a MEC-based IIoT system is ensured by setting the threshold of tolerable delay and outage probability, respectively. Furthermore,considering the limited energy supply, an energy minimization problem of eMBB device is formulated under the above constraints, by jointly optimizing the resource blocks(RBs) punctured by URLLC traffic, data offloading and transmit power of eMBB device. With Markov's inequality, the problem is reformulated by transforming the probabilistic outage constraint into a deterministic constraint. Meanwhile, an iterative energy minimization algorithm(IEMA) is proposed.Simulation results demonstrate that our algorithm has a significant reduction in the energy consumption for eMBB device and achieves a better overall effect compared to several benchmarks.展开更多
Mobile communication standards have been developed into a new era of B5G and 6G.In recent years,low earth orbit(LEO)satellites and space Internet have become hot topics.The integrated satellite and terrestrial systems...Mobile communication standards have been developed into a new era of B5G and 6G.In recent years,low earth orbit(LEO)satellites and space Internet have become hot topics.The integrated satellite and terrestrial systems have been widely discussed by industries and academics,and even are expected to be applied in those huge constellations in construction.This paper points out the trends of two stages towards system integration of the terrestrial mobile communication and the satellite communications:to be compatible with 5G,and to be integrated within 6G.Based on analysis of the challenges of both stages,key technologies are thereafter analyzed in detail,covering both air interface currently discussed in 3GPP for B5G and also novel network architecture and related transmission technologies toward future 6G.展开更多
This paper considers a UAV communication system with mobile edge computing(MEC).We minimize the energy consumption of the whole system via jointly optimizing the UAV's trajectory and task assignment as well as CPU...This paper considers a UAV communication system with mobile edge computing(MEC).We minimize the energy consumption of the whole system via jointly optimizing the UAV's trajectory and task assignment as well as CPU's computational speed under the set of resource constrains.To this end,we first derive the energy consumption model of data processing,and then obtain the energy consumption model of fixed-wing UAV's flight.The optimization problem is mathematically formulated.To address the problem,we first obtain the approximate optimization problem by applying the technique of discrete linear state-space approximation,and then transform the non-convex constraints into convex by using linearization.Furthermore,a concave-convex procedure(CCCP) based algorithm is proposed in order to solve the optimization problem approximately.Numerical results show the efficacy of the proposed algorithm.展开更多
To further promote the achievable average secrecy rate for UAV-ground communications, a UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional cooperative UAV is employed as a mobile...To further promote the achievable average secrecy rate for UAV-ground communications, a UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional cooperative UAV is employed as a mobile jammer to transmit the jamming signal to help keep the source UAV closer to the ground destination, thus establishing more favorable legitimate link and enhancing the secrecy performance. We aimed to maximize the achievable secrecy rate by jointly optimizing the trajectories and transmit power of both source UAV and jammer UAV. To solve the considered non-convex optimization problem, we presented a block coordinate descent based iterative algorithm to address a sequence of approximated convex problems for the optimized parameter block by block to find a local optimal solution. Numerical results verify that the proposed algorithm can achieve significant secrecy rate gain compared to all the benchmark schemes.展开更多
With the increasing maritime activities and the rapidly developing maritime economy, the fifth-generation(5G) mobile communication system is expected to be deployed at the ocean. New technologies need to be explored t...With the increasing maritime activities and the rapidly developing maritime economy, the fifth-generation(5G) mobile communication system is expected to be deployed at the ocean. New technologies need to be explored to meet the requirements of ultra-reliable and low latency communications(URLLC) in the maritime communication network(MCN). Mobile edge computing(MEC) can achieve high energy efficiency in MCN at the cost of suffering from high control plane latency and low reliability. In terms of this issue, the mobile edge communications, computing, and caching(MEC3) technology is proposed to sink mobile computing, network control, and storage to the edge of the network. New methods that enable resource-efficient configurations and reduce redundant data transmissions can enable the reliable implementation of computing-intension and latency-sensitive applications. The key technologies of MEC3 to enable URLLC are analyzed and optimized in MCN. The best response-based offloading algorithm(BROA) is adopted to optimize task offloading. The simulation results show that the task latency can be decreased by 26.5’ ms, and the energy consumption in terminal users can be reduced to 66.6%.展开更多
This paper is a preliminary and illustrative case study of Beijing's emergingmobile communication industrial (MCI) cluster, which helps understand the cluster by qualitativeanalysis and description. Beijing's ...This paper is a preliminary and illustrative case study of Beijing's emergingmobile communication industrial (MCI) cluster, which helps understand the cluster by qualitativeanalysis and description. Beijing's MCI cluster is emerging as far as the competence of the industryand its spatial concentration are concerned, although it is not the type of the cluster describedby PORTER due to the low competence of indigenous firms. The formation of the cluster can beexplained by means of the factor and demand conditions of Beijing. However, it is mostly determinedby the multinationals that promote the growth of the industry and the formation of the cluster, andby the government that also plays a key role in many ways. As a matter of fact, the interactionbetween the multinationals and the local government is the key to understanding the formation of thecluster. All in all, Beijing's emerging MCI cluster is a value-chain, geographically concentratedbut non-localized cluster, which is highly dominated by the multinationals and the local government.Its special characteristics bear some policy implications as to the change of the roles of thelocal government and the localization of multinationals, etc.展开更多
In the coexisted world of 3G,4G,5G and many other specialized wireless communication systems,billions of connections could be existing for various information transmission types.Unluckily,data show that the increase o...In the coexisted world of 3G,4G,5G and many other specialized wireless communication systems,billions of connections could be existing for various information transmission types.Unluckily,data show that the increase of network capacity is heavily more than the increase of the network energy efficiency in recent years,which could lead to more energy consumption per transmitted bit in the future network.As basic units in mobile communication systems,microwave/RF components and modules play key roles展开更多
With the popularization of wireless multimedia communications,the wireless traffic is predicated to be increased more than 1000time in the next decade.Some new technologies,e.g.,massive multi.input multi.output antenn...With the popularization of wireless multimedia communications,the wireless traffic is predicated to be increased more than 1000time in the next decade.Some new technologies,e.g.,massive multi.input multi.output antennas,millimeter wave and small展开更多
Based on the characteristics of the radio propagation in land mobile communications environment, a theoretical model for the reflecting(scattering) number of each radio path is derived firstly. This model can be used ...Based on the characteristics of the radio propagation in land mobile communications environment, a theoretical model for the reflecting(scattering) number of each radio path is derived firstly. This model can be used to predict the variation of radio path strength, which is important for practical mobile communications engineering. Using this model, a method for simulating radio path strength is developed, with numerical results presented.展开更多
The cooperative localization(CL)is affected by the communication topology among the platforms.Based on the unscented Kalman filtering,the distributed CL(DCL)oriented to the unpredicted communication topology is invest...The cooperative localization(CL)is affected by the communication topology among the platforms.Based on the unscented Kalman filtering,the distributed CL(DCL)oriented to the unpredicted communication topology is investigated.To improve the adaptability,the character of the look-up Cholesky decomposition is exploited for the covariance matrix decomposing.Then,the distributed U transformation can be dynamically implemented according to the available communication topology.In the proposed algorithm,the global information is not required for the individual,and only the available information from the neighbor is used.Each platform’s state can be estimated independently.The error covariance of the state estimates can be updated in the single platform.The algorithm is adaptive to any serial communication topologies where the measuring to the measured platform is a starting path.The applicability of the proposed algorithm to unpredicted communication topology is improved,remaining equivalent localization performance to free connection communication.展开更多
In view of the many scenes of unmanned aerial vehicle(UAV)detection,a third-party signal source is used to design a receiver to monitor the UAV.It is of great significance to understand the reflection of the signal il...In view of the many scenes of unmanned aerial vehicle(UAV)detection,a third-party signal source is used to design a receiver to monitor the UAV.It is of great significance to understand the reflection of the signal illuminating the UAV.Taking the communication base station(BS)signal as the third-party signal source,and considering the complete transmission link,reflection changes and loss fading of the communication signal,this study conducts model fitting for irregular UAV targets,simplifying complex targets into a combination of simple targets.Furthermore,the influence of the dielectric constant of the target surface and the signal irradiation angle on the signal reflection is analyzed.The analysis shows that the simulation results of this model fitting method are consistent with the results of other literature,which provides theoretical support for the detection of low and slow small targets such as UAVs.展开更多
This paper relates to an advanced open mobile communication system and method of integrating the mobile communications, wireless access systems and wired communications into one common platform architecture for China&...This paper relates to an advanced open mobile communication system and method of integrating the mobile communications, wireless access systems and wired communications into one common platform architecture for China's 4th generation mobile communications, supporting costeffective broadband voice, data and video services in wireless, mobile and wired environment with one single integrated mobile terminal device. The paper includes new architecture in the integrated mobile device and converged network access, and minimum modifi cation in the existing mobile telecommunication infrastructures. This paper introduces the long-term evolution strategy for China's TDD system platform towards China's future 4G mobile communications.展开更多
In order to forecast promising technologies in the field of next generation mobile communication, various patent indicators were analyzed such as citation per patent, patent family information, patent share, increase ...In order to forecast promising technologies in the field of next generation mobile communication, various patent indicators were analyzed such as citation per patent, patent family information, patent share, increase rate, and patent activity. These indicators were quantified into several indexes and then integrated into an evaluation score to provide promising technologies. As a result of the suggested patent analysis, four technologies out of twenty two in details classification were selected, which showed outstanding technology competitiveness, high patent share and increasing rates as well as high recent-patent-ratios and triad-patent-family-ratios. Each of the selected technologies scored more than 10 points in total, and the following four technologies were suggested as promising ones in the field of next generation mobile communication: 1) 3GPP based mobile communication, 2) beyond 4G mobile communication, 3) IEEE 802.16 based mobile communication, which are in medium classification of broadband mobile communication system, and 4) testing/certification system of mobile communication, which is in medium classification of mobile communication testing/certification system.展开更多
An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile c...An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile communication channel is generated on a computer. A test method using threshold technique is presented to verify the accuracy of the adaptive channel model.展开更多
文摘The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency.
文摘The widespread use of advanced electronic devices has led to the emergence of spatial crowdsourcing,a method that taps into collective efforts to perform real-world tasks like environmental monitoring and traffic surveillance.Our research focuses on a specific type of spatial crowdsourcing that involves ongoing,collaborative efforts for continuous spatial data acquisition.However,due to limited budgets and workforce availability,the collected data often lacks completeness,posing a data deficiency problem.To address this,we propose a reciprocal framework to optimize task assignments by leveraging the mutual benefits of spatiotemporal subtask execution.We introduce an entropy-based quality metric to capture the combined effects of incomplete data acquisition and interpolation imprecision.Building on this,we explore a quality-aware task assignment method,corresponding to spatiotemporal assignment strategies.Since the assignment problem is NP-hard,we develop a polynomial-time algorithm with the guaranteed approximation ratio.Novel indexing and pruning techniques are proposed to further enhance performance.Extensive experiments conducted on datasets validate the effectiveness of our methods.
文摘The programmable metasurface(PM)is an antenna array architecture that realizes flexible beam steering.This functionality is achieved by controlling the unit cells designed with micro components such as positive-intrinsic-negative(PIN)diodes,which offers potential cost reductions in the next generation wireless communication systems.Although PM has been a popular topic in antenna design,its implementations in real-time systems accompanied by signal processing algorithms are challenging.In this paper,novel predictive tracking algorithms for mobile communication scenarios using a PM are created and implemented in a real-time system operating at 28 GHz.An angular speed prediction(ASP)algorithm is proposed to compute the position of user equipment(UE)based on the previously recorded beam directions.As another solution,an angle correction(AC)algorithm is proposed to further improve the prediction and tracking accuracy.As a benchmark,the comparisons to a previous PM tracking algorithm without prediction are presented.Both simulation and measurement results show that the prediction algorithms successfully improve the tracking performance,which also prove the feasibilities of PM-based systems to solve complex real-time signal processing problems.
文摘The global system for mobile communication(GSM)is planned to meet the needs of the whole subscribers.The number of subscribers increased as the population increased due to the acceptance of GSM services by the subscribers.Thus,there should be a way to monitor base stations that will meet the increasing demand of subscribers in any area as a population surge will lead to more subscriptions.This will allow GSM network operators to serve their subscribers better and ease network congestion.This work presents a review of mobile evolution from the first generation to the fifth generation.A review of global positioning system(GPS)technology and its applications to geographic information systems(GIS)was done.The coordinates of these base stations were taken using a GPS device.These base station coordinates were then exported to QGIS for the design of the map.Thereafter,the output map was then integrated into the website.The discussions on the results followed and some useful suggestions given will go a long way to help the operators of GSM in Nigeria and in general.If the propositions given are adhered to,it will go a long way to help the operators reduce congestion on their network and thereby increase the satisfaction of the subscribers.
基金The National Natural Science Foundation of China(No60496311)
文摘A remote antenna unit (RAU) selection model is presented, and two kinds of handoffs, intra-cell handoff (HO) and inter-cell HO, are defined in distributed mobile communications systems (DAS). After that, an inter-cell HO model is proposed, in which the average power of the active set (AS) is used to predict the position of the mobile station (MS). The total power of the AS and the handoff set (HOS) are utilized to determine whether an inter-cell HO is necessary. Furthermore, the relationship between HO parameters and performance metrics is studied in detail based on RAU selection. Simulation results show that both the intra-cell HO and the inter-cell HO can achieve oerfect performance by aoprooriate settings of HO parameters.
基金This research was supported by Science and Technology Research Project of Education Department of Jiangxi Province,China(Nos.GJJ2206701,GJJ2206717).
文摘The current resource allocation in 5G vehicular networks for mobile cloud communication faces several challenges,such as low user utilization,unbalanced resource allocation,and extended adaptive allocation time.We propose an adaptive allocation algorithm for mobile cloud communication resources in 5G vehicular networks to address these issues.This study analyzes the components of the 5G vehicular network architecture to determine the performance of different components.It is ascertained that the communication modes in 5G vehicular networks for mobile cloud communication include in-band and out-of-band modes.Furthermore,this study analyzes the single-hop and multi-hop modes in mobile cloud communication and calculates the resource transmission rate and bandwidth in different communication modes.The study also determines the scenario of one-way and two-way vehicle lane cloud communication network connectivity,calculates the probability of vehicle network connectivity under different mobile cloud communication radii,and determines the amount of cloud communication resources required by vehicles in different lane scenarios.Based on the communication status of users in 5G vehicular networks,this study calculates the bandwidth and transmission rate of the allocated channels using Shannon’s formula.It determines the adaptive allocation of cloud communication resources,introduces an objective function to obtain the optimal solution after allocation,and completes the adaptive allocation process.The experimental results demonstrate that,with the application of the proposed method,the maximum utilization of user communication resources reaches approximately 99%.The balance coefficient curve approaches 1,and the allocation time remains under 2 s.This indicates that the proposed method has higher adaptive allocation efficiency.
基金supported by the Natural Science Foundation of China (No.62171051)。
文摘Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady performance of eMBB traffic while meeting the requirements of URLLC traffic with puncturing is a major challenge in some realistic scenarios. In this paper, we pay attention to the timely and energy-efficient processing for eMBB traffic in the industrial Internet of Things(IIoT), where mobile edge computing(MEC) is employed for data processing. Specifically, the performance of eMBB traffic and URLLC traffic in a MEC-based IIoT system is ensured by setting the threshold of tolerable delay and outage probability, respectively. Furthermore,considering the limited energy supply, an energy minimization problem of eMBB device is formulated under the above constraints, by jointly optimizing the resource blocks(RBs) punctured by URLLC traffic, data offloading and transmit power of eMBB device. With Markov's inequality, the problem is reformulated by transforming the probabilistic outage constraint into a deterministic constraint. Meanwhile, an iterative energy minimization algorithm(IEMA) is proposed.Simulation results demonstrate that our algorithm has a significant reduction in the energy consumption for eMBB device and achieves a better overall effect compared to several benchmarks.
基金This work was supported in part by the National Science Fund for Distinguished Young Scholars in China under grant 61425012the National Science Foundation Project in China under grant 61931005 and 61731017.
文摘Mobile communication standards have been developed into a new era of B5G and 6G.In recent years,low earth orbit(LEO)satellites and space Internet have become hot topics.The integrated satellite and terrestrial systems have been widely discussed by industries and academics,and even are expected to be applied in those huge constellations in construction.This paper points out the trends of two stages towards system integration of the terrestrial mobile communication and the satellite communications:to be compatible with 5G,and to be integrated within 6G.Based on analysis of the challenges of both stages,key technologies are thereafter analyzed in detail,covering both air interface currently discussed in 3GPP for B5G and also novel network architecture and related transmission technologies toward future 6G.
基金supported in part by National Natural Science Foundation of China(Grant No.61702149,U1709220)
文摘This paper considers a UAV communication system with mobile edge computing(MEC).We minimize the energy consumption of the whole system via jointly optimizing the UAV's trajectory and task assignment as well as CPU's computational speed under the set of resource constrains.To this end,we first derive the energy consumption model of data processing,and then obtain the energy consumption model of fixed-wing UAV's flight.The optimization problem is mathematically formulated.To address the problem,we first obtain the approximate optimization problem by applying the technique of discrete linear state-space approximation,and then transform the non-convex constraints into convex by using linearization.Furthermore,a concave-convex procedure(CCCP) based algorithm is proposed in order to solve the optimization problem approximately.Numerical results show the efficacy of the proposed algorithm.
基金partly supported by National Natural Science Foundation of China (No. 41504026, 61362009)Natural Science Foundation of Jiangxi (No.20152ACB21003)Foundation for Distinguished Young Talents Training Programme of Jiangxi (No.20171BCB23006)
文摘To further promote the achievable average secrecy rate for UAV-ground communications, a UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional cooperative UAV is employed as a mobile jammer to transmit the jamming signal to help keep the source UAV closer to the ground destination, thus establishing more favorable legitimate link and enhancing the secrecy performance. We aimed to maximize the achievable secrecy rate by jointly optimizing the trajectories and transmit power of both source UAV and jammer UAV. To solve the considered non-convex optimization problem, we presented a block coordinate descent based iterative algorithm to address a sequence of approximated convex problems for the optimized parameter block by block to find a local optimal solution. Numerical results verify that the proposed algorithm can achieve significant secrecy rate gain compared to all the benchmark schemes.
基金the National S&T Major Project (No. 2018ZX03001011)the National Key R&D Program(No.2018YFB1801102)+1 种基金the National Natural Science Foundation of China (No. 61671072)the Beijing Natural Science Foundation (No. L192025)
文摘With the increasing maritime activities and the rapidly developing maritime economy, the fifth-generation(5G) mobile communication system is expected to be deployed at the ocean. New technologies need to be explored to meet the requirements of ultra-reliable and low latency communications(URLLC) in the maritime communication network(MCN). Mobile edge computing(MEC) can achieve high energy efficiency in MCN at the cost of suffering from high control plane latency and low reliability. In terms of this issue, the mobile edge communications, computing, and caching(MEC3) technology is proposed to sink mobile computing, network control, and storage to the edge of the network. New methods that enable resource-efficient configurations and reduce redundant data transmissions can enable the reliable implementation of computing-intension and latency-sensitive applications. The key technologies of MEC3 to enable URLLC are analyzed and optimized in MCN. The best response-based offloading algorithm(BROA) is adopted to optimize task offloading. The simulation results show that the task latency can be decreased by 26.5’ ms, and the energy consumption in terminal users can be reduced to 66.6%.
文摘This paper is a preliminary and illustrative case study of Beijing's emergingmobile communication industrial (MCI) cluster, which helps understand the cluster by qualitativeanalysis and description. Beijing's MCI cluster is emerging as far as the competence of the industryand its spatial concentration are concerned, although it is not the type of the cluster describedby PORTER due to the low competence of indigenous firms. The formation of the cluster can beexplained by means of the factor and demand conditions of Beijing. However, it is mostly determinedby the multinationals that promote the growth of the industry and the formation of the cluster, andby the government that also plays a key role in many ways. As a matter of fact, the interactionbetween the multinationals and the local government is the key to understanding the formation of thecluster. All in all, Beijing's emerging MCI cluster is a value-chain, geographically concentratedbut non-localized cluster, which is highly dominated by the multinationals and the local government.Its special characteristics bear some policy implications as to the change of the roles of thelocal government and the localization of multinationals, etc.
文摘In the coexisted world of 3G,4G,5G and many other specialized wireless communication systems,billions of connections could be existing for various information transmission types.Unluckily,data show that the increase of network capacity is heavily more than the increase of the network energy efficiency in recent years,which could lead to more energy consumption per transmitted bit in the future network.As basic units in mobile communication systems,microwave/RF components and modules play key roles
文摘With the popularization of wireless multimedia communications,the wireless traffic is predicated to be increased more than 1000time in the next decade.Some new technologies,e.g.,massive multi.input multi.output antennas,millimeter wave and small
文摘Based on the characteristics of the radio propagation in land mobile communications environment, a theoretical model for the reflecting(scattering) number of each radio path is derived firstly. This model can be used to predict the variation of radio path strength, which is important for practical mobile communications engineering. Using this model, a method for simulating radio path strength is developed, with numerical results presented.
文摘The cooperative localization(CL)is affected by the communication topology among the platforms.Based on the unscented Kalman filtering,the distributed CL(DCL)oriented to the unpredicted communication topology is investigated.To improve the adaptability,the character of the look-up Cholesky decomposition is exploited for the covariance matrix decomposing.Then,the distributed U transformation can be dynamically implemented according to the available communication topology.In the proposed algorithm,the global information is not required for the individual,and only the available information from the neighbor is used.Each platform’s state can be estimated independently.The error covariance of the state estimates can be updated in the single platform.The algorithm is adaptive to any serial communication topologies where the measuring to the measured platform is a starting path.The applicability of the proposed algorithm to unpredicted communication topology is improved,remaining equivalent localization performance to free connection communication.
基金supported by the State Major Research and Development Project(2018YFB1802004)the State Key Laboratory of Air Traffic Management System and Technology(SKLATM201807)。
文摘In view of the many scenes of unmanned aerial vehicle(UAV)detection,a third-party signal source is used to design a receiver to monitor the UAV.It is of great significance to understand the reflection of the signal illuminating the UAV.Taking the communication base station(BS)signal as the third-party signal source,and considering the complete transmission link,reflection changes and loss fading of the communication signal,this study conducts model fitting for irregular UAV targets,simplifying complex targets into a combination of simple targets.Furthermore,the influence of the dielectric constant of the target surface and the signal irradiation angle on the signal reflection is analyzed.The analysis shows that the simulation results of this model fitting method are consistent with the results of other literature,which provides theoretical support for the detection of low and slow small targets such as UAVs.
文摘This paper relates to an advanced open mobile communication system and method of integrating the mobile communications, wireless access systems and wired communications into one common platform architecture for China's 4th generation mobile communications, supporting costeffective broadband voice, data and video services in wireless, mobile and wired environment with one single integrated mobile terminal device. The paper includes new architecture in the integrated mobile device and converged network access, and minimum modifi cation in the existing mobile telecommunication infrastructures. This paper introduces the long-term evolution strategy for China's TDD system platform towards China's future 4G mobile communications.
文摘In order to forecast promising technologies in the field of next generation mobile communication, various patent indicators were analyzed such as citation per patent, patent family information, patent share, increase rate, and patent activity. These indicators were quantified into several indexes and then integrated into an evaluation score to provide promising technologies. As a result of the suggested patent analysis, four technologies out of twenty two in details classification were selected, which showed outstanding technology competitiveness, high patent share and increasing rates as well as high recent-patent-ratios and triad-patent-family-ratios. Each of the selected technologies scored more than 10 points in total, and the following four technologies were suggested as promising ones in the field of next generation mobile communication: 1) 3GPP based mobile communication, 2) beyond 4G mobile communication, 3) IEEE 802.16 based mobile communication, which are in medium classification of broadband mobile communication system, and 4) testing/certification system of mobile communication, which is in medium classification of mobile communication testing/certification system.
基金National Natural Science Foundation of China(No.69372004)
文摘An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile communication channel is generated on a computer. A test method using threshold technique is presented to verify the accuracy of the adaptive channel model.