Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for ...Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed.展开更多
Wireless information and powered transfer networks(WIPT) has recently been implemented in 5th generation wireless networks. In this paper, we consider half-duplex relaying system in which the energy constrained relay ...Wireless information and powered transfer networks(WIPT) has recently been implemented in 5th generation wireless networks. In this paper, we consider half-duplex relaying system in which the energy constrained relay node collects energy via radio frequency(RF) signals from the surrounding resources. Regarding energy harvesting protocol, we propose power time switching-based relaying(PTSR) architecture for both amplify-and-forward(AF) and decode-and-forward(DF). Especially, we reveal the analytical expressions of achievable throughput, ergodic capacity and energy-efficient in case of imperfect channel state information(CSI) for both AF and DF network. Through numerical analysis, we analyse the throughput performance, energy-efficient and ergodic capacity for different parameters, including power splitting ratio and energy harvesting time. Moreover, we also depict the performance comparison between AF and DF network with perfect and imperfect CSI. The results in numerical analysis reveal that the result of AF relaying network is less significant than DF relaying network in the various scenarios.展开更多
A review of signal processing algorithms employing Wi-Fi signals for positioning and recognition of human activities is presented.The principles of how channel state information(CSI)is used and how the Wi-Fi sensing s...A review of signal processing algorithms employing Wi-Fi signals for positioning and recognition of human activities is presented.The principles of how channel state information(CSI)is used and how the Wi-Fi sensing systems operate are reviewed.It provides a brief introduction to the algorithms that perform signal processing,feature extraction and recognitions,including location,activity recognition,physiological signal detection and personal identification.Challenges and future trends of Wi-Fi sensing are also discussed in the end.展开更多
Positioning technology based on wireless network signals in indoor environments has developed rapidly in recent years as the demand for locationbased services continues to increase.Channel state information(CSI)can be...Positioning technology based on wireless network signals in indoor environments has developed rapidly in recent years as the demand for locationbased services continues to increase.Channel state information(CSI)can be used as location feature information in fingerprint-based positioning systems because it can reflect the characteristics of the signal on multiple subcarriers.However,the random noise contained in the raw CSI information increases the likelihood of confusion when matching fingerprint data.In this paper,the Dynamic Fusion Feature(DFF)is proposed as a new fingerprint formation method to remove the noise and improve the feature resolution of the system,which combines the pre-processed amplitude and phase data.Then,the improved edit distance on real sequence(IEDR)is used as a similarity metric for fingerprint matching.Based on the above studies,we propose a new indoor fingerprint positioning method,named DFF-EDR,for improving positioning performance.During the experimental stage,data were collected and analyzed in two typical indoor environments.The results show that the proposed localization method in this paper effectively improves the feature resolution of the system in terms of both fingerprint features and similarity measures,has good anti-noise capability,and effectively reduces the localization errors.展开更多
Activity recognition plays a key role in health management and security.Traditional approaches are based on vision or wearables,which only work under the line of sight(LOS)or require the targets to carry dedicated dev...Activity recognition plays a key role in health management and security.Traditional approaches are based on vision or wearables,which only work under the line of sight(LOS)or require the targets to carry dedicated devices.As human bodies and their movements have influences on WiFi propagation,this paper proposes the recognition of human activities by analyzing the channel state information(CSI)from the WiFi physical layer.The method requires only the commodity:WiFi transmitters and receivers that can operate through a wall,under LOS and non-line of sight(NLOS),while the targets are not required to carry dedicated devices.After collecting CSI,the discrete wavelet transform is applied to reduce the noise,followed by outlier detection based on the local outlier factor to extract the activity segment.Activity recognition is fulfilled by using the bi-directional long short-term memory that takes the sequential features into consideration.Experiments in through-the-wall environments achieve recognition accuracy>95%for six common activities,such as standing up,squatting down,walking,running,jumping,and falling,outperforming existing work in this field.展开更多
In a real communication scenario,it is very difficult to obtain the real-time channel state infor-mation(CSI)accurately,so the non-orthogonal multiple access(NOMA)system with statistical CSI has been researched.Aiming...In a real communication scenario,it is very difficult to obtain the real-time channel state infor-mation(CSI)accurately,so the non-orthogonal multiple access(NOMA)system with statistical CSI has been researched.Aiming at the problem that the maximization of system sum rate cannot be solved directly,a step-by-step resource allocation optimization scheme based on machine learning is proposed.First,in order to achieve a trade-off between the system sum rate and user fairness,the system throughput formula is derived.Then,according to the combinatorial characteristics of the system throughput maximization problem,the original optimization problem is divided into two sub-problems,that are power allocation and user grouping.Finally,genetic algorithm is introduced to solve the sub-problem of power allocation,and hungarian algorithm is introduced to solve the sub-problem of user grouping.By comparing the ergodic data rate of NOMA users with statistical CSI and perfect CSI,the effectiveness of the statistical CSI sorting is verified.Compared with the orthogonal multiple access(OMA)scheme,the NOMA scheme with the fixed user grouping scheme and the random user grouping scheme,the system throughput performance of the proposed scheme is signifi-cantly improved.展开更多
Physical-layer network coding (PNC) has the potential to significantly improve the throughput of wireless networks where the channels can be modeled as additive white Gaussian noise (AWGN) channel. As extending to...Physical-layer network coding (PNC) has the potential to significantly improve the throughput of wireless networks where the channels can be modeled as additive white Gaussian noise (AWGN) channel. As extending to mul- tiple channels, this technique requires both amplitude and phase compensation at each transmitter and will lead to inef- ficient systems yielding no diversity even with perfect channel state information (CSI). In order to avoid these limita- tions, we apply network coding with diversity (NCD) to achieve a form of selection diversity and extend NCD to coop- erative multiple access channels in this paper. However, in practical wireless communication systems, the CSI could become outdated due to the difference between the CSI used in the relay selection and data transmission phases. Hence, the selected relay may not be the best one during data transmission phase due to the dynamic change in the wireless channels. Therefore, we first explore the relation between the present and past CSIs. Exploiting this relationship, the NCD scheme with outdated CSI is investigated based on the past CSI. To evaluate the performance of this scheme, an information-theoretic metric, namely the outage capacity, is studied under this condition.展开更多
In long term evolution (LTE) uplink single carrier frequency division multiple access (SC-FDMA) system, the restriction that multiple resource blocks (RBs) allocated to a user should be adjacent, makes the resou...In long term evolution (LTE) uplink single carrier frequency division multiple access (SC-FDMA) system, the restriction that multiple resource blocks (RBs) allocated to a user should be adjacent, makes the resource allocation problem hard to solve. Moreover, with the practical constraint that perfect channel state information (CSI) cannot be obtained in time-varying channel, the resource allocation problem will become more difficult. In this paper, an efficient resource allocation algorithm is proposed in LTE uplink SC-FDMA system with imperfect CSI assumption. Firstly, the resource allocation problem is formulated as a mixed integer programming problem. Then an efficient algorithm based on discrete stochastic optimization is proposed to solve the problem. Finally, simulation results show that the proposed algorithm has desirable system performance.展开更多
In this paper, we investigate the outage performance of a dual-hop amplify-and-forward(AF) multipleinput multiple-output(MIMO) relay network, considering beamforming transmission with outdated channel state informatio...In this paper, we investigate the outage performance of a dual-hop amplify-and-forward(AF) multipleinput multiple-output(MIMO) relay network, considering beamforming transmission with outdated channel state information(CSI) and an arbitrary number of co-channel interferers at both the relay and the destination. The exact closed-form expression for the outage probability is derived, and the asymptotic behavior of the outage probability is also presented to provide further insights into the system performance. Our results show that the system suffers a diversity gain loss caused by the outdated CSI, and the interference only degrade the coding gain of the system. Moreover, increasing antennas can achieve more performance gains, however, the gains decrease as the delay of the CSI increases.展开更多
Underwater hostile channel conditions challenge video transmission designs. The current designs often treat video coding and transmission schemes as individual modules. In this study, we develop an adaptive transceive...Underwater hostile channel conditions challenge video transmission designs. The current designs often treat video coding and transmission schemes as individual modules. In this study, we develop an adaptive transceiver with channel state information(CSI) by taking into account the importance of video components and channel conditions. The design is more effective than the traditional ones. However, in practical systems, perfect CSI may not be available. Therefore, we compare the imperfect CSI case with existing schemes, and validate the effectiveness of our design through simulations and measured channels in terms of a better peak signal-to-noise ratio and a higher video structural similarity index.展开更多
The cross-layer resource allocation problem in wireless multi-hop networks(WMHNs)has been extensively studied in the past few years.Most of these studies assume that every node has the perfect channel state informatio...The cross-layer resource allocation problem in wireless multi-hop networks(WMHNs)has been extensively studied in the past few years.Most of these studies assume that every node has the perfect channel state information(CSI)of other nodes.In practical settings,however,the networks are generally dynamic and CSI usually becomes outdated when it is used,due to the time-variant channel and feedback delay.To deal with this issue,we study the cross-layer resource allocation problem in dynamic WMHNs with outdated CSI under channel conditions where there is correlation between the outdated CSI and current CSI.Two major contributions are made in this work:(1)a closed-form expression of conditional average capacity is derived under the signal-to-interferenceplus-noise ratio(SINR)model;(2)a joint optimization problem of congestion control,power control,and channel allocation in the context of outdated CSI is formulated and solved in both centralized and distributed manners.Simulation results show that the network utility can be improved significantly using our proposed algorithm.展开更多
An iterative algorithm is proposed for jointly optimizing spectral and energy efficiency in a multipair full-duplex(FD) two-way relaying(TWR) system with imperfect channel state information(CSI). Based on Dinkelbach m...An iterative algorithm is proposed for jointly optimizing spectral and energy efficiency in a multipair full-duplex(FD) two-way relaying(TWR) system with imperfect channel state information(CSI). Based on Dinkelbach method, a Taylor expansion based approximation method and the Generalized Lagrange Multiplier Method have been applied iteratively to obtain the near optimal relay amplified matrix and power allocation,respectively. And the simulation results illustrate the effectiveness of the proposed algorithm and the algorithm can converge quickly.展开更多
Physical layer security has attracted lots of attention with the expansion of wireless devices to the edge networks in recent years.Due to limited authentication mechanisms,MAC spoofing attack,also known as the identi...Physical layer security has attracted lots of attention with the expansion of wireless devices to the edge networks in recent years.Due to limited authentication mechanisms,MAC spoofing attack,also known as the identity attack,threatens wireless systems.In this paper,we study a new type of MAC spoofing attack,the virtual MAC spoofing attack,in a tight environment with strong spatial similarities,which can create multiple counterfeits entities powered by the virtualization technologies to interrupt regular services.We develop a system to effectively detect such virtual MAC spoofing attacks via the deep learning method as a countermeasure.A deep convolutional neural network is constructed to analyze signal level information extracted from Channel State Information(CSI)between the communication peers to provide additional authentication protection at the physical layer.A significant merit of the proposed detection system is that this system can distinguish two different devices even at the same location,which was not well addressed by the existing approaches.Our extensive experimental results demonstrate the effectiveness of the system with an average detection accuracy of 95%,even when devices are co-located.展开更多
EDITOR'S NOTE: The National Human Rights Action Plan of China (2009-2010) has won favorable comments in China and abroad since its publication by the Information Office of the State Council on April 13, 2009. Here...EDITOR'S NOTE: The National Human Rights Action Plan of China (2009-2010) has won favorable comments in China and abroad since its publication by the Information Office of the State Council on April 13, 2009. Here is a transcript of an interview given to our reporters by Wang Chen, director of the Office, on the Action Plan, which we hope will help our readers gain a better understanding of China's human rights cause and its development.展开更多
Integrated data and energy transfer(IDET)is capable of simultaneously delivering on-demand data and energy to low-power Internet of Everything(Io E)devices.We propose a multi-carrier IDET transceiver relying on superp...Integrated data and energy transfer(IDET)is capable of simultaneously delivering on-demand data and energy to low-power Internet of Everything(Io E)devices.We propose a multi-carrier IDET transceiver relying on superposition waveforms consisting of multi-sinusoidal signals for wireless energy transfer(WET)and orthogonal-frequency-divisionmultiplexing(OFDM)signals for wireless data transfer(WDT).The outdated channel state information(CSI)in aging channels is employed by the transmitter to shape IDET waveforms.With the constraints of transmission power and WDT requirement,the amplitudes and phases of the IDET waveform at the transmitter and the power splitter at the receiver are jointly optimised for maximising the average directcurrent(DC)among a limited number of transmission frames with the existence of carrier-frequencyoffset(CFO).For the amplitude optimisation,the original non-convex problem can be transformed into a reversed geometric programming problem,then it can be effectively solved with existing tools.As for the phase optimisation,the artificial bee colony(ABC)algorithm is invoked in order to deal with the nonconvexity.Iteration between the amplitude optimisation and phase optimisation yields our joint design.Numerical results demonstrate the advantage of our joint design for the IDET waveform shaping with the existence of the CFO and the outdated CSI.展开更多
This paper shows how increased entropy values from an initially low big bang level can be measured experimentally by counting relic gravitons. Furthermore the physical mechanism of this entropy increase is explained v...This paper shows how increased entropy values from an initially low big bang level can be measured experimentally by counting relic gravitons. Furthermore the physical mechanism of this entropy increase is explained via analogies with early-universe phase transitions. The role of Ng’s revised infinite quantum statistics in the physics of gravitational wave detection is acknowledged. Ng’s infinite quantum statistics can be used to show that is a starting point to the increasing net universe cosmological entropy. Finally, in a nod to similarities with zero point energy (ZPE) analysis, it is important to note that the resulting in fact is much lower, allowing for evaluating initial graviton production as an emergent field phenomena, which may be similar to how ZPE states can be used to extract energy from a vacuum if entropy is not maximized. The rapid increase in entropy so alluded to without near sudden increases to 10<sup>88</sup> may be enough to allow successful modeling of relic graviton production for entropy in a manner similar to zero point energy (ZPE) energy extraction from a vacuum state. This entropy count is akin to quantum information models used to tell how much “information” may be stored in initial conditions, and transferred from a prior to the present展开更多
In this paper,we propose a contact-free wheat moisture monitoring system,termed Wi-Wheatþ,to address the several limitations of the existing grain moisture detection technologies,such as time-consuming process,ex...In this paper,we propose a contact-free wheat moisture monitoring system,termed Wi-Wheatþ,to address the several limitations of the existing grain moisture detection technologies,such as time-consuming process,expensive equipment,low accuracy,and difficulty in real-time monitoring.The proposed system is based on Commodity WiFi and is easy to deploy.Leveraging WiFi CSI data,this paper proposes a feature extraction method based on multi-scale and multi-channel entropy.The feasibility and stability of the system are validated through experiments in both Line-Of-Sight(LOS)and Non-Line-Of-Sight(NLOS)scenarios,where ten types of wheat moisture content are tested using multi-class Support Vector Machine(SVM).Compared with the Wi-Wheat system proposed in our prior work,Wi-Wheatþhas higher efficiency,requiring only a simple training process,and can sense more wheat moisture content levels.展开更多
The lack of communication infrastructure in the ocean inevitably leads to coverage blind zones.In addition to high-throughput marine satellites,unmanned aerial vehicles(UAVs)can be used to provide coverage for these b...The lack of communication infrastructure in the ocean inevitably leads to coverage blind zones.In addition to high-throughput marine satellites,unmanned aerial vehicles(UAVs)can be used to provide coverage for these blind zones along with onshore base stations.In this paper,we consider the use of UAV for maritime coverage enhancement.Particularly,to serve more ships on the vast oceanic area with limited spectrum resources,we employ non-orthogonal multiple access(NOMA).A joint power and transmission duration allocation problem is formulated to maximize the minimum ship throughput,with the constraints on onboard communication energy.Different from previous works,we only assume the slowly time-varying large-scale channel state information(CSI)to reduce the system cost,as the large-scale CSI is locationdependent and can be obtained according to a priori radio map.To solve the non-convex problem,we decompose it into two subproblems and solve them in an iterative way.Simulation results show the effectiveness of the proposed solution.展开更多
The 5th generation mobile communications aims at connecting everything and future Internet of Things(IoT)will get everything smartly connected.To realize it,there exist many challenges.One key challenge is the battery...The 5th generation mobile communications aims at connecting everything and future Internet of Things(IoT)will get everything smartly connected.To realize it,there exist many challenges.One key challenge is the battery problem for small devices,such as sensors or tags.Batteryless backscatter,also referred to as or battery-free backscatter,is a new potential technology to address this problem.One early and typical type of batteryless backscatter is ambient backscatter.Generally,batteryless backscatter utilizes environmental wireless signals to enable battery-free devices to communicate with each other.These devices first harvest energy from ambient wireless signals and then backscatter these signals so as to transmit their own information.This paper reviews the current studies about batteryless backscatter,including various backscatter schemes and theoretical works,and then introduces open problems for future research.展开更多
文摘Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed.
文摘Wireless information and powered transfer networks(WIPT) has recently been implemented in 5th generation wireless networks. In this paper, we consider half-duplex relaying system in which the energy constrained relay node collects energy via radio frequency(RF) signals from the surrounding resources. Regarding energy harvesting protocol, we propose power time switching-based relaying(PTSR) architecture for both amplify-and-forward(AF) and decode-and-forward(DF). Especially, we reveal the analytical expressions of achievable throughput, ergodic capacity and energy-efficient in case of imperfect channel state information(CSI) for both AF and DF network. Through numerical analysis, we analyse the throughput performance, energy-efficient and ergodic capacity for different parameters, including power splitting ratio and energy harvesting time. Moreover, we also depict the performance comparison between AF and DF network with perfect and imperfect CSI. The results in numerical analysis reveal that the result of AF relaying network is less significant than DF relaying network in the various scenarios.
基金National Natural Science Foundation of China(NSFC)under Grant No.61401100Natural Science Foundation of Fuji⁃an Province under Grant No.2018J01805+1 种基金Youth Research Project of Fujian Provincial Department of Education under Grant No.JAT190011and Fuzhou University Scientific Research Fund Project under Grant No.GXRC-18074.
文摘A review of signal processing algorithms employing Wi-Fi signals for positioning and recognition of human activities is presented.The principles of how channel state information(CSI)is used and how the Wi-Fi sensing systems operate are reviewed.It provides a brief introduction to the algorithms that perform signal processing,feature extraction and recognitions,including location,activity recognition,physiological signal detection and personal identification.Challenges and future trends of Wi-Fi sensing are also discussed in the end.
基金This work was financially supported by the National Key Research&Development Program of China under Grant No.2020YFC1511702the Beijing Municipal Natural Science Foundation under Grant No.L191003.
文摘Positioning technology based on wireless network signals in indoor environments has developed rapidly in recent years as the demand for locationbased services continues to increase.Channel state information(CSI)can be used as location feature information in fingerprint-based positioning systems because it can reflect the characteristics of the signal on multiple subcarriers.However,the random noise contained in the raw CSI information increases the likelihood of confusion when matching fingerprint data.In this paper,the Dynamic Fusion Feature(DFF)is proposed as a new fingerprint formation method to remove the noise and improve the feature resolution of the system,which combines the pre-processed amplitude and phase data.Then,the improved edit distance on real sequence(IEDR)is used as a similarity metric for fingerprint matching.Based on the above studies,we propose a new indoor fingerprint positioning method,named DFF-EDR,for improving positioning performance.During the experimental stage,data were collected and analyzed in two typical indoor environments.The results show that the proposed localization method in this paper effectively improves the feature resolution of the system in terms of both fingerprint features and similarity measures,has good anti-noise capability,and effectively reduces the localization errors.
基金the Key Research and Development Projects of Sichuan Science and Technology Department under Grant No.2018GZ0464the UESTC-ZHIXIAOJING Joint Research Center of Smart Home under Grant No.H04W210180.
文摘Activity recognition plays a key role in health management and security.Traditional approaches are based on vision or wearables,which only work under the line of sight(LOS)or require the targets to carry dedicated devices.As human bodies and their movements have influences on WiFi propagation,this paper proposes the recognition of human activities by analyzing the channel state information(CSI)from the WiFi physical layer.The method requires only the commodity:WiFi transmitters and receivers that can operate through a wall,under LOS and non-line of sight(NLOS),while the targets are not required to carry dedicated devices.After collecting CSI,the discrete wavelet transform is applied to reduce the noise,followed by outlier detection based on the local outlier factor to extract the activity segment.Activity recognition is fulfilled by using the bi-directional long short-term memory that takes the sequential features into consideration.Experiments in through-the-wall environments achieve recognition accuracy>95%for six common activities,such as standing up,squatting down,walking,running,jumping,and falling,outperforming existing work in this field.
基金Supported by the National Natural Science Foundation of China(No.62001001).
文摘In a real communication scenario,it is very difficult to obtain the real-time channel state infor-mation(CSI)accurately,so the non-orthogonal multiple access(NOMA)system with statistical CSI has been researched.Aiming at the problem that the maximization of system sum rate cannot be solved directly,a step-by-step resource allocation optimization scheme based on machine learning is proposed.First,in order to achieve a trade-off between the system sum rate and user fairness,the system throughput formula is derived.Then,according to the combinatorial characteristics of the system throughput maximization problem,the original optimization problem is divided into two sub-problems,that are power allocation and user grouping.Finally,genetic algorithm is introduced to solve the sub-problem of power allocation,and hungarian algorithm is introduced to solve the sub-problem of user grouping.By comparing the ergodic data rate of NOMA users with statistical CSI and perfect CSI,the effectiveness of the statistical CSI sorting is verified.Compared with the orthogonal multiple access(OMA)scheme,the NOMA scheme with the fixed user grouping scheme and the random user grouping scheme,the system throughput performance of the proposed scheme is signifi-cantly improved.
基金funded by the EPSRC of UK under Grant EP/I037423/1
文摘Physical-layer network coding (PNC) has the potential to significantly improve the throughput of wireless networks where the channels can be modeled as additive white Gaussian noise (AWGN) channel. As extending to mul- tiple channels, this technique requires both amplitude and phase compensation at each transmitter and will lead to inef- ficient systems yielding no diversity even with perfect channel state information (CSI). In order to avoid these limita- tions, we apply network coding with diversity (NCD) to achieve a form of selection diversity and extend NCD to coop- erative multiple access channels in this paper. However, in practical wireless communication systems, the CSI could become outdated due to the difference between the CSI used in the relay selection and data transmission phases. Hence, the selected relay may not be the best one during data transmission phase due to the dynamic change in the wireless channels. Therefore, we first explore the relation between the present and past CSIs. Exploiting this relationship, the NCD scheme with outdated CSI is investigated based on the past CSI. To evaluate the performance of this scheme, an information-theoretic metric, namely the outage capacity, is studied under this condition.
基金supported by Ministry of Industry and Information Technology of the People's Republic of China(2011ZX03001-007-03)the National Natural Science Foundation of China(61271182)the National Natural Science Funds of China for Young Scholar(61001115)
文摘In long term evolution (LTE) uplink single carrier frequency division multiple access (SC-FDMA) system, the restriction that multiple resource blocks (RBs) allocated to a user should be adjacent, makes the resource allocation problem hard to solve. Moreover, with the practical constraint that perfect channel state information (CSI) cannot be obtained in time-varying channel, the resource allocation problem will become more difficult. In this paper, an efficient resource allocation algorithm is proposed in LTE uplink SC-FDMA system with imperfect CSI assumption. Firstly, the resource allocation problem is formulated as a mixed integer programming problem. Then an efficient algorithm based on discrete stochastic optimization is proposed to solve the problem. Finally, simulation results show that the proposed algorithm has desirable system performance.
基金the National High Technology Research and Development Program(863)of China(No.2014AA01A704)the National Natural Science Foundation of China(Nos.91438113+2 种基金6117206761371086 and 61401180)the Natural Science Fund of the Jiangsu Higher Education Institutions(No.13KJB510007)
文摘In this paper, we investigate the outage performance of a dual-hop amplify-and-forward(AF) multipleinput multiple-output(MIMO) relay network, considering beamforming transmission with outdated channel state information(CSI) and an arbitrary number of co-channel interferers at both the relay and the destination. The exact closed-form expression for the outage probability is derived, and the asymptotic behavior of the outage probability is also presented to provide further insights into the system performance. Our results show that the system suffers a diversity gain loss caused by the outdated CSI, and the interference only degrade the coding gain of the system. Moreover, increasing antennas can achieve more performance gains, however, the gains decrease as the delay of the CSI increases.
基金Project supported by the National Natural Science Foundation of China(Nos.61571377,61471308,and 61771412)the Fundamental Research Funds for the Central Universities,China(No.20720180068)the Research Fund for the Visiting Scholar Program by the Scholarship Council of China(Nos.201506310080 and 201506315026)
文摘Underwater hostile channel conditions challenge video transmission designs. The current designs often treat video coding and transmission schemes as individual modules. In this study, we develop an adaptive transceiver with channel state information(CSI) by taking into account the importance of video components and channel conditions. The design is more effective than the traditional ones. However, in practical systems, perfect CSI may not be available. Therefore, we compare the imperfect CSI case with existing schemes, and validate the effectiveness of our design through simulations and measured channels in terms of a better peak signal-to-noise ratio and a higher video structural similarity index.
基金supported by the National Natural Science Foundation of China(No.61340035)
文摘The cross-layer resource allocation problem in wireless multi-hop networks(WMHNs)has been extensively studied in the past few years.Most of these studies assume that every node has the perfect channel state information(CSI)of other nodes.In practical settings,however,the networks are generally dynamic and CSI usually becomes outdated when it is used,due to the time-variant channel and feedback delay.To deal with this issue,we study the cross-layer resource allocation problem in dynamic WMHNs with outdated CSI under channel conditions where there is correlation between the outdated CSI and current CSI.Two major contributions are made in this work:(1)a closed-form expression of conditional average capacity is derived under the signal-to-interferenceplus-noise ratio(SINR)model;(2)a joint optimization problem of congestion control,power control,and channel allocation in the context of outdated CSI is formulated and solved in both centralized and distributed manners.Simulation results show that the network utility can be improved significantly using our proposed algorithm.
基金the National Science and Technology Major Project“TD-LTE/FDD-LTE/TDSCDMA/WCDMA/GSM Multi-mode Baseband Commercial Chip Development”(No.2013ZX03001007-004)
文摘An iterative algorithm is proposed for jointly optimizing spectral and energy efficiency in a multipair full-duplex(FD) two-way relaying(TWR) system with imperfect channel state information(CSI). Based on Dinkelbach method, a Taylor expansion based approximation method and the Generalized Lagrange Multiplier Method have been applied iteratively to obtain the near optimal relay amplified matrix and power allocation,respectively. And the simulation results illustrate the effectiveness of the proposed algorithm and the algorithm can converge quickly.
文摘Physical layer security has attracted lots of attention with the expansion of wireless devices to the edge networks in recent years.Due to limited authentication mechanisms,MAC spoofing attack,also known as the identity attack,threatens wireless systems.In this paper,we study a new type of MAC spoofing attack,the virtual MAC spoofing attack,in a tight environment with strong spatial similarities,which can create multiple counterfeits entities powered by the virtualization technologies to interrupt regular services.We develop a system to effectively detect such virtual MAC spoofing attacks via the deep learning method as a countermeasure.A deep convolutional neural network is constructed to analyze signal level information extracted from Channel State Information(CSI)between the communication peers to provide additional authentication protection at the physical layer.A significant merit of the proposed detection system is that this system can distinguish two different devices even at the same location,which was not well addressed by the existing approaches.Our extensive experimental results demonstrate the effectiveness of the system with an average detection accuracy of 95%,even when devices are co-located.
文摘EDITOR'S NOTE: The National Human Rights Action Plan of China (2009-2010) has won favorable comments in China and abroad since its publication by the Information Office of the State Council on April 13, 2009. Here is a transcript of an interview given to our reporters by Wang Chen, director of the Office, on the Action Plan, which we hope will help our readers gain a better understanding of China's human rights cause and its development.
基金financial support of Natural Science Foundation of China(No.61971102,62132004)MOST Major Research and Development Project(No.2021YFB2900204)+1 种基金Sichuan Science and Technology Program(No.2022YFH0022)Key Research and Development Program of Zhejiang Province(No.2022C01093)。
文摘Integrated data and energy transfer(IDET)is capable of simultaneously delivering on-demand data and energy to low-power Internet of Everything(Io E)devices.We propose a multi-carrier IDET transceiver relying on superposition waveforms consisting of multi-sinusoidal signals for wireless energy transfer(WET)and orthogonal-frequency-divisionmultiplexing(OFDM)signals for wireless data transfer(WDT).The outdated channel state information(CSI)in aging channels is employed by the transmitter to shape IDET waveforms.With the constraints of transmission power and WDT requirement,the amplitudes and phases of the IDET waveform at the transmitter and the power splitter at the receiver are jointly optimised for maximising the average directcurrent(DC)among a limited number of transmission frames with the existence of carrier-frequencyoffset(CFO).For the amplitude optimisation,the original non-convex problem can be transformed into a reversed geometric programming problem,then it can be effectively solved with existing tools.As for the phase optimisation,the artificial bee colony(ABC)algorithm is invoked in order to deal with the nonconvexity.Iteration between the amplitude optimisation and phase optimisation yields our joint design.Numerical results demonstrate the advantage of our joint design for the IDET waveform shaping with the existence of the CFO and the outdated CSI.
文摘This paper shows how increased entropy values from an initially low big bang level can be measured experimentally by counting relic gravitons. Furthermore the physical mechanism of this entropy increase is explained via analogies with early-universe phase transitions. The role of Ng’s revised infinite quantum statistics in the physics of gravitational wave detection is acknowledged. Ng’s infinite quantum statistics can be used to show that is a starting point to the increasing net universe cosmological entropy. Finally, in a nod to similarities with zero point energy (ZPE) analysis, it is important to note that the resulting in fact is much lower, allowing for evaluating initial graviton production as an emergent field phenomena, which may be similar to how ZPE states can be used to extract energy from a vacuum if entropy is not maximized. The rapid increase in entropy so alluded to without near sudden increases to 10<sup>88</sup> may be enough to allow successful modeling of relic graviton production for entropy in a manner similar to zero point energy (ZPE) energy extraction from a vacuum state. This entropy count is akin to quantum information models used to tell how much “information” may be stored in initial conditions, and transferred from a prior to the present
基金supported in part by the Program for Science&Technology Innovation Talents in Universities of Henan Province(19HASTIT027)National Natural Science Foundation of China(62172141)+4 种基金Zhengzhou Major Scientific and Technological Innovation Project(2019CXZX0086)Youth Innovative Talents Cultivation Fund Project of Kaifeng University in 2020(KDQN-2020-GK002)the National Key Research and Development Program of China(2017YFD0401001)the NSFC(61741107),the NSF(CNS-2105416)by the Wireless Engineering Research and Education Center at Auburn University.
文摘In this paper,we propose a contact-free wheat moisture monitoring system,termed Wi-Wheatþ,to address the several limitations of the existing grain moisture detection technologies,such as time-consuming process,expensive equipment,low accuracy,and difficulty in real-time monitoring.The proposed system is based on Commodity WiFi and is easy to deploy.Leveraging WiFi CSI data,this paper proposes a feature extraction method based on multi-scale and multi-channel entropy.The feasibility and stability of the system are validated through experiments in both Line-Of-Sight(LOS)and Non-Line-Of-Sight(NLOS)scenarios,where ten types of wheat moisture content are tested using multi-class Support Vector Machine(SVM).Compared with the Wi-Wheat system proposed in our prior work,Wi-Wheatþhas higher efficiency,requiring only a simple training process,and can sense more wheat moisture content levels.
基金supported in part by National Natural Science Foundation of China(No.61922049,61771286,61941104)the National Key R&D Program of China(2020YFA0711301)+2 种基金the Beijing National Research Center for Information Science and Technology project(BNR2020RC01016)the Nantong Technology Program(JC2019115)the Beijing Innovation Center for Future Chip。
文摘The lack of communication infrastructure in the ocean inevitably leads to coverage blind zones.In addition to high-throughput marine satellites,unmanned aerial vehicles(UAVs)can be used to provide coverage for these blind zones along with onshore base stations.In this paper,we consider the use of UAV for maritime coverage enhancement.Particularly,to serve more ships on the vast oceanic area with limited spectrum resources,we employ non-orthogonal multiple access(NOMA).A joint power and transmission duration allocation problem is formulated to maximize the minimum ship throughput,with the constraints on onboard communication energy.Different from previous works,we only assume the slowly time-varying large-scale channel state information(CSI)to reduce the system cost,as the large-scale CSI is locationdependent and can be obtained according to a priori radio map.To solve the non-convex problem,we decompose it into two subproblems and solve them in an iterative way.Simulation results show the effectiveness of the proposed solution.
基金This paper is funded by Scientific Research Program of Beijing Municipal Commission of Education No.KM201910853003.
文摘The 5th generation mobile communications aims at connecting everything and future Internet of Things(IoT)will get everything smartly connected.To realize it,there exist many challenges.One key challenge is the battery problem for small devices,such as sensors or tags.Batteryless backscatter,also referred to as or battery-free backscatter,is a new potential technology to address this problem.One early and typical type of batteryless backscatter is ambient backscatter.Generally,batteryless backscatter utilizes environmental wireless signals to enable battery-free devices to communicate with each other.These devices first harvest energy from ambient wireless signals and then backscatter these signals so as to transmit their own information.This paper reviews the current studies about batteryless backscatter,including various backscatter schemes and theoretical works,and then introduces open problems for future research.