Along with the surge of unearthed medical literature and cultural relics in recent years,a network of channels in the system of medical conduit vessels(meridians) during the early Western Han dynasty has become much c...Along with the surge of unearthed medical literature and cultural relics in recent years,a network of channels in the system of medical conduit vessels(meridians) during the early Western Han dynasty has become much clearer gradually.In it,the increasing number of channel branches,network vessels and needle insertion holes(acupoints) is an important feature of the development of channel medicine during the Western Han dynasty.This is not only a reflection of the expanding requirements of the theoretical system of the main trunk channels and other vessels,but also an inevitable result of the continuous enrichment and accumulation of clinical experience.This article integrates the information about channel branches,network vessels,inscriptions,dots and further relics on the Tianhui(天回) Lacquered Meridian Figurine to compare the unearthed literature of the channel genre with the transmitted classical literature about acupuncture.The “Heart-Regulated Channel” in Medical Manuscripts on Bamboo Slips from Tianhui(《天回医简》) serves as an example to explain the occurrence,development and changes of the channel branches and network vessels in the early system of medical channels.展开更多
Automatic segmentation of medical images provides a reliable scientific basis for disease diagnosis and analysis.Notably,most existing methods that combine the strengths of convolutional neural networks(CNNs)and Trans...Automatic segmentation of medical images provides a reliable scientific basis for disease diagnosis and analysis.Notably,most existing methods that combine the strengths of convolutional neural networks(CNNs)and Transformers have made significant progress.However,there are some limitations in the current integration of CNN and Transformer technology in two key aspects.Firstly,most methods either overlook or fail to fully incorporate the complementary nature between local and global features.Secondly,the significance of integrating the multiscale encoder features from the dual-branch network to enhance the decoding features is often disregarded in methods that combine CNN and Transformer.To address this issue,we present a groundbreaking dual-branch cross-attention fusion network(DCFNet),which efficiently combines the power of Swin Transformer and CNN to generate complementary global and local features.We then designed the Feature Cross-Fusion(FCF)module to efficiently fuse local and global features.In the FCF,the utilization of the Channel-wise Cross-fusion Transformer(CCT)serves the purpose of aggregatingmulti-scale features,and the Feature FusionModule(FFM)is employed to effectively aggregate dual-branch prominent feature regions from the spatial perspective.Furthermore,within the decoding phase of the dual-branch network,our proposed Channel Attention Block(CAB)aims to emphasize the significance of the channel features between the up-sampled features and the features generated by the FCFmodule to enhance the details of the decoding.Experimental results demonstrate that DCFNet exhibits enhanced accuracy in segmentation performance.Compared to other state-of-the-art(SOTA)methods,our segmentation framework exhibits a superior level of competitiveness.DCFNet’s accurate segmentation of medical images can greatly assist medical professionals in making crucial diagnoses of lesion areas in advance.展开更多
This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)node...This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.展开更多
In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymm...In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymmetry and node asymmetry. The decision and mapping rule for symmetric and asymmetric cases are studied. The performance in terms of bit error rate for each case will be studied and analysed by computer simulation. Analytical and simulation results show that uplink asymmetry is the worst case;intra-phase asymmetry and unreliable uplink channels will more severely affect the performance degradation, which is caused by channel asymmetry.展开更多
This paper investigates the simultaneous wireless information and powertransfer(SWIPT) for network-coded two-way relay network from an information-theoretic perspective, where two sources exchange information via an S...This paper investigates the simultaneous wireless information and powertransfer(SWIPT) for network-coded two-way relay network from an information-theoretic perspective, where two sources exchange information via an SWIPT-aware energy harvesting(EH) relay. We present a power splitting(PS)-based two-way relaying(PS-TWR) protocol by employing the PS receiver architecture. To explore the system sum rate limit with data rate fairness, an optimization problem under total power constraint is formulated. Then, some explicit solutions are derived for the problem. Numerical results show that due to the path loss effect on energy transfer, with the same total available power, PS-TWR losses some system performance compared with traditional non-EH two-way relaying, where at relatively low and relatively high signalto-noise ratio(SNR), the performance loss is relatively small. Another observation is that, in relatively high SNR regime, PS-TWR outperforms time switching-based two-way relaying(TS-TWR) while in relatively low SNR regime TS-TWR outperforms PS-TWR. It is also shown that with individual available power at the two sources, PS-TWR outperforms TS-TWR in both relatively low and high SNR regimes.展开更多
Interference alignment(IA) is one of the promising measures for the multi-user network to manage interference. The rank constraints rank minimization means that interference spans the lowest dimensional subspace and t...Interference alignment(IA) is one of the promising measures for the multi-user network to manage interference. The rank constraints rank minimization means that interference spans the lowest dimensional subspace and the useful signal spans all available spatial dimensions. In order to improve the performance of two-way relay network, we can use rank constrained rank minimization(RCRM) to solve the IA problem. This paper proposes left reweighted nuclear norm minimization-γalgorithm and selective coupling reweighted nuclear norm minimization algorithm to implement interference alignment in two-way relay networks. The left reweighted nuclear norm minimization-γ algorithm is based on reweighted nuclear norm minimization algorithm and has a novel γ choosing rule. The selective coupling reweighted nuclear norm minimization algorithm weighting methods choose according to singular value of interference matrixes. Simulation results show that the proposed algorithms considerably improve the sum rate performance and achieve the higher average achievable multiplexing gain in two-way relay interference networks.展开更多
To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the cl...To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the classification of superimposed modulations dedicated to 5G multipleinput multiple-output(MIMO)two-way cognitive relay network in realistic channels modeled with Nakagami-m distribution.Our purpose consists of classifying pairs of users modulations from superimposed signals.To achieve this goal,we apply the higher-order statistics in conjunction with the Multi-BoostAB classifier.We use several efficiency metrics including the true positive(TP)rate,false positive(FP)rate,precision,recall,F-Measure and receiver operating characteristic(ROC)area in order to evaluate the performance of the proposed algorithm in terms of correct superimposed modulations classification.Computer simulations prove that our proposal allows obtaining a good probability of classification for ten superimposed modulations at a low signal-to-noise ratio,including the worst case(i.e.,m=0.5),where the fading distribution follows a one-sided Gaussian distribution.We also carry out a comparative study between our proposal usingMultiBoostAB classifier with the decision tree(J48)classifier.Simulation results show that the performance of MultiBoostAB on the superimposed modulations classifications outperforms the one of J48 classifier.In addition,we study the impact of the symbols number,path loss exponent and relay position on the performance of the proposed automatic classification superimposed modulations in terms of probability of correct classification.展开更多
To guarantee secure information transmission within two sources,a full-duplex(FD)relay jamming scheme for two-way energy harvesting(EH)cooperative networks is proposed,in which the relay can achieve simultaneous infor...To guarantee secure information transmission within two sources,a full-duplex(FD)relay jamming scheme for two-way energy harvesting(EH)cooperative networks is proposed,in which the relay can achieve simultaneous information reception and jamming transmission.The EH relay node scavenges energy from two source signals,and then,uses the harvested energy for information relaying and jamming transmission by the power splitting(PS)protocol.Considering multiple eavesdroppers,the nonconvex optimization for maximizing the smaller bidirectional secrecy rates is formulated by jointly optimizing the power allocation and PS factor.Furthermore,an iterative algorithm based on successive convex approximation and alternate search method is proposed to solve this non-convexity.Simulation results verify the proposed iterative algorithm and show that the proposed jamming scheme can achieve substantial performance gain than other conventional schemes.展开更多
The E-plane waveguide branch directional couplers are analyzed by a method which combines the multimode network theory with rigorous mode-matching approach. The electromagnetic field components are expanded by the sup...The E-plane waveguide branch directional couplers are analyzed by a method which combines the multimode network theory with rigorous mode-matching approach. The electromagnetic field components are expanded by the superposition of LSEx modes rather than TE and TM modes in the mode-matching procedure. Meanwhile, the electromagnetic problem is transferred into the network problem through the mode-matching treatment. It is shown that the present method has the advantages of simplicity and less computation without affecting the accuracy of the calculation.展开更多
Asymmetric tree-like branched networks are explored by geometric algorithms. Based on the network, an analysis of the thermal conductivity is presented. The relationship between effective thermal conductivity and geom...Asymmetric tree-like branched networks are explored by geometric algorithms. Based on the network, an analysis of the thermal conductivity is presented. The relationship between effective thermal conductivity and geometric structures is obtained by using the thermal-electrical analogy technique. In all studied cases, a clear behaviour is observed, where angle (δ,θ) among parent branching extended lines, branches and parameter of the geometric structures have stronger effects on the effective thermal conductivity. When the angle δ is fixed, the optical diameter ratio β+ is dependent on angle θ. Moreover, γand m are not related to β*. The longer the branch is, the smaller the effective thermal conductivity will be. It is also found that when the angle θ〈δ2, the higher the iteration m is, the lower the thermal conductivity will be and it tends to zero, otherwise, it is bigger than zero. When the diameter ratio β1 〈 0.707 and angle δ is bigger, the optimal k of the perfect ratio increases with the increase of the angle δ; when β1 〉 0.707, the optimal k decreases. In addition, the effective thermal conductivity is always less than that of single channel material. The present results also show that the effective thermal conductivity of the asymmetric tree-like branched networks does not obey Murray's law.展开更多
Linear transceiver designs are investigated for distributed two-way relaying networks,which aim at minimising the WeightedMean Square Error(WMSE) of data detections.The forwarding matrices at relays andequalization ma...Linear transceiver designs are investigated for distributed two-way relaying networks,which aim at minimising the WeightedMean Square Error(WMSE) of data detections.The forwarding matrices at relays andequalization matrices at destinations are jointly optimised.To overcome the challenginglimitations introduced by individual powerconstraints,a Semi-Definite Relaxation(SDR)called element-wise relaxation is proposed,which can transform the original optimizationproblem into a standard convex optimizationproblem.In this research,two-way relaying isunderstood from a pure signal processing perspective which can potentially simplify thetheoretical analysis.Finally,simulation resultsare used for assessing the performance advantage of the proposed algorithm.展开更多
In this paper, we investigate a joint beamforming and time switching(TS) design for an energy-constrained cognitive two-way relay(TWR) network. In the network, the energy-constrained secondary user(SU) relay employs T...In this paper, we investigate a joint beamforming and time switching(TS) design for an energy-constrained cognitive two-way relay(TWR) network. In the network, the energy-constrained secondary user(SU) relay employs TS protocol to harvest energy from the signals sent by the circuit-powered primary user(PU) transmitter, and then exploits the harvested energy to perform information forwarding. Our aim is to maximize the sum rate of SUs under the constraints of the data rate of PU, the energy harvesting and the transmit power of the SU relay. To determine the beamforming matrix and TS ratio, we decouple the original non-convex problem into two subproblems which can be solved by semidefinite relaxation and successive convex optimization methods. Furthermore, we derive closed form expressions of the optimal solutions for each subproblem, which facilitates the design of a suboptimal iterative algorithm to handle the original sum rate maximization problem. Simulation results are presented to illustrate the effectiveness and superior performance of the proposed joint design against other conventional schemes in the literature.展开更多
In this paper,we propose a Two-Way Cognitive Relay Network(TWCRN)where the secondary users operate on an underlay mode to access the licensed bands.In the proposed protocols,two secondary sources transmit their data t...In this paper,we propose a Two-Way Cognitive Relay Network(TWCRN)where the secondary users operate on an underlay mode to access the licensed bands.In the proposed protocols,two secondary sources transmit their data to a relay in the first time slot,and then the relay would forward the received information to both sources in the remaining time.Moreover,the relay is self-powered by harvesting energy from ambient Radio Frequency(RF)signals,using the Time Switching(TS)and the Power Switching(PS)method.This paper concentrates on eval-uating the performance of the secondary networks under the impact of hardware impairments and co-channel interference from the primary networks.In particular,based on the secondary transmitters'constraint power,we derive the closed-form expressions of the outage probability and the throughput over Rayleigh fading channels in two cases:TS and PS.We also investigate the energy efficiency issue and the locally optimal position of the relay to maximize the system throughput,which provides much information to install the relay location.Finally,our derivations are verified by Monte Carlo simulation.展开更多
In this paper, we study the problem of distributed relay beamforming for a bidirectional cognitive relay network which consists of two secondary transceivers and K cognitive relay nodes and a primary network with a tr...In this paper, we study the problem of distributed relay beamforming for a bidirectional cognitive relay network which consists of two secondary transceivers and K cognitive relay nodes and a primary network with a transmitter and receiver, using underlay model. For effective use of spectrum, we propose a Multiple Access Broadcasting (MABC) two-way relaying scheme for cognitive networks. The two transceivers transmit their data towards the relays and then relays retransmit the processed form of signal towards the receiver. Our aim is to design the beamforming coefficients to maximize quality of service (QoS) for the secondary network while satisfying tolerable interference constraint for the primary network. We show that this approach yields a closed-form solution. Our simulation results show that the maximum achievable SINR improved while the tolerable interference temperature becomes not strict for primary receiver.展开更多
Two-way relay networks have received lots of attention, thanks to its ability to overcome the loss in the spectral efficiency due to half-duplex transmission. Asymptotic performance analysis can provide valuable insig...Two-way relay networks have received lots of attention, thanks to its ability to overcome the loss in the spectral efficiency due to half-duplex transmission. Asymptotic performance analysis can provide valuable insights in- to practical system designs. However, this is a gap in two-way relay network. In this paper, the asymptotic performance is studied for multi-branch dual-hop two-way amplify-and-forward (AF) relaying networks in independently but not necessarily identically distributed (i.n.i.d.) Nakagami-m fading channels, with arbitrary m 〉 5. The approximate prob- ability density function (PDF) of the instantaneous dual-hop link power at high SNR region is derived. Then we present the asymptotic outage probability expression, and analyze the diversity order and coding gain. Simulations are per- formed to verify the tightness of the presented analysis at medium and high SNR regions.展开更多
In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is ...In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is proposed. Specifically, the proposed scheme selects a best relay that maximize the sum mutual information among the sources to forward the sources’ signals using an amplify-and-forward protocol, and the remaining relays transmit interference signals to confuse the eavesdropper via distributed beam forming. It can be found that the proposed scheme with relay chatting does not require the knowledge of the eavesdropper’s channel, and outperforms the joint relay and jammer selection scheme, which introduces the interference into the sources. Numerical results show that the secrecy outage probability of the proposed scheme converges to zero as the transmit power increases.展开更多
In this paper, we present an analytical model to determine the network connectivity probability of a linear vehicular ad hoc network (VANET) formed by communication equipped vehicles on a two-way street scenario. We c...In this paper, we present an analytical model to determine the network connectivity probability of a linear vehicular ad hoc network (VANET) formed by communication equipped vehicles on a two-way street scenario. We consider the highway to be consisting of two lanes with vehicles moving in both directions on these lanes and focus on the probability of being able to convey messages from a source vehicle to a destination vehicle, which may be multiple hops away. Closed form analytical expression is obtained for the network connectivity probability in the presence of Nakagami fading channel. In our model, the transmission range of each vehicle is modeled as a random variable due to channel fading. The analytical results are validated by extensive simulations.展开更多
In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy...In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis.展开更多
The matrix D describing relations of the loops to the nodes in the graph and also the setsof branches based on the independent loops and their matrix Q are defined.The theorem in whichthe product of the loop-node matr...The matrix D describing relations of the loops to the nodes in the graph and also the setsof branches based on the independent loops and their matrix Q are defined.The theorem in whichthe product of the loop-node matrix D multiplied by the incidence matrix A<sub>a</sub> is equal to matrix Qis put forward and proved.The admittance matrix Y<sub>lc</sub> of the sets of the branches is defined and it isassumed that the vector V<sub>lc</sub> of voltage of the sets of branches to be a calculative quantity.The equa-tion of the sets of branches is derived and the analysis method of the sets of branches based on theindependent loops in the electric network is presented.展开更多
A CAD tool based on a group of efficient algorithms to verify,design,and optimize power/ground networks for standard cell model is presented.Nonlinear programming techniques,branch and bound algorithms and incomplete ...A CAD tool based on a group of efficient algorithms to verify,design,and optimize power/ground networks for standard cell model is presented.Nonlinear programming techniques,branch and bound algorithms and incomplete Cholesky decomposition conjugate gradient method (ICCG) are the three main parts of our work.Users can choose nonlinear programming method or branch and bound algorithm to satisfy their different requirements of precision and speed.The experimental results prove that the algorithms can run very fast with lower wiring resources consumption.As a result,the CAD tool based on these algorithms is able to cope with large-scale circuits.展开更多
基金one of the stage results of the Science and Technology Innovation Project (CI2021A00413) of the China Academy of Traditional Chinese Medicine。
文摘Along with the surge of unearthed medical literature and cultural relics in recent years,a network of channels in the system of medical conduit vessels(meridians) during the early Western Han dynasty has become much clearer gradually.In it,the increasing number of channel branches,network vessels and needle insertion holes(acupoints) is an important feature of the development of channel medicine during the Western Han dynasty.This is not only a reflection of the expanding requirements of the theoretical system of the main trunk channels and other vessels,but also an inevitable result of the continuous enrichment and accumulation of clinical experience.This article integrates the information about channel branches,network vessels,inscriptions,dots and further relics on the Tianhui(天回) Lacquered Meridian Figurine to compare the unearthed literature of the channel genre with the transmitted classical literature about acupuncture.The “Heart-Regulated Channel” in Medical Manuscripts on Bamboo Slips from Tianhui(《天回医简》) serves as an example to explain the occurrence,development and changes of the channel branches and network vessels in the early system of medical channels.
基金supported by the National Key R&D Program of China(2018AAA0102100)the National Natural Science Foundation of China(No.62376287)+3 种基金the International Science and Technology Innovation Joint Base of Machine Vision and Medical Image Processing in Hunan Province(2021CB1013)the Key Research and Development Program of Hunan Province(2022SK2054)the Natural Science Foundation of Hunan Province(No.2022JJ30762,2023JJ70016)the 111 Project under Grant(No.B18059).
文摘Automatic segmentation of medical images provides a reliable scientific basis for disease diagnosis and analysis.Notably,most existing methods that combine the strengths of convolutional neural networks(CNNs)and Transformers have made significant progress.However,there are some limitations in the current integration of CNN and Transformer technology in two key aspects.Firstly,most methods either overlook or fail to fully incorporate the complementary nature between local and global features.Secondly,the significance of integrating the multiscale encoder features from the dual-branch network to enhance the decoding features is often disregarded in methods that combine CNN and Transformer.To address this issue,we present a groundbreaking dual-branch cross-attention fusion network(DCFNet),which efficiently combines the power of Swin Transformer and CNN to generate complementary global and local features.We then designed the Feature Cross-Fusion(FCF)module to efficiently fuse local and global features.In the FCF,the utilization of the Channel-wise Cross-fusion Transformer(CCT)serves the purpose of aggregatingmulti-scale features,and the Feature FusionModule(FFM)is employed to effectively aggregate dual-branch prominent feature regions from the spatial perspective.Furthermore,within the decoding phase of the dual-branch network,our proposed Channel Attention Block(CAB)aims to emphasize the significance of the channel features between the up-sampled features and the features generated by the FCFmodule to enhance the details of the decoding.Experimental results demonstrate that DCFNet exhibits enhanced accuracy in segmentation performance.Compared to other state-of-the-art(SOTA)methods,our segmentation framework exhibits a superior level of competitiveness.DCFNet’s accurate segmentation of medical images can greatly assist medical professionals in making crucial diagnoses of lesion areas in advance.
基金supported in part by the National Natural Science Foundation of China under Grant 61971450in part by the Hunan Provincial Science and Technology Project Foundation under Grant 2018TP1018+1 种基金in part by the Natural Science Foundation of Hunan Province under Grant 2018JJ2533in part by Hunan Province College Students Research Learning and Innovative Experiment Project under Grant S202110542056。
文摘This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.
基金supported by the National Natural Science Foundation of China under Grant No.61101248the Equipment Advance Research Projectof"Twelfth Five-Year"Plan under Grant No.51306040202And this work has been performed in the Project"Advanced Communication Research Program(ACRP)"supported by the Directorate of Research and Development,Defense Science and Technology Agency,Singapore under Grant No.DSOCL04020
文摘In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymmetry and node asymmetry. The decision and mapping rule for symmetric and asymmetric cases are studied. The performance in terms of bit error rate for each case will be studied and analysed by computer simulation. Analytical and simulation results show that uplink asymmetry is the worst case;intra-phase asymmetry and unreliable uplink channels will more severely affect the performance degradation, which is caused by channel asymmetry.
基金supported by the National Natural Science Foundation of China ( No . 61602034 )the Beijing Natural Science Foundation (No. 4162049)+2 种基金the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University (No. 2014D03)the Fundamental Research Funds for the Central Universities Beijing Jiaotong University (No. 2016JBM015)the NationalHigh Technology Research and Development Program of China (863 Program) (No. 2015AA015702)
文摘This paper investigates the simultaneous wireless information and powertransfer(SWIPT) for network-coded two-way relay network from an information-theoretic perspective, where two sources exchange information via an SWIPT-aware energy harvesting(EH) relay. We present a power splitting(PS)-based two-way relaying(PS-TWR) protocol by employing the PS receiver architecture. To explore the system sum rate limit with data rate fairness, an optimization problem under total power constraint is formulated. Then, some explicit solutions are derived for the problem. Numerical results show that due to the path loss effect on energy transfer, with the same total available power, PS-TWR losses some system performance compared with traditional non-EH two-way relaying, where at relatively low and relatively high signalto-noise ratio(SNR), the performance loss is relatively small. Another observation is that, in relatively high SNR regime, PS-TWR outperforms time switching-based two-way relaying(TS-TWR) while in relatively low SNR regime TS-TWR outperforms PS-TWR. It is also shown that with individual available power at the two sources, PS-TWR outperforms TS-TWR in both relatively low and high SNR regimes.
基金supported by the National Science Foundation of China (NO.61271240, 61671253)
文摘Interference alignment(IA) is one of the promising measures for the multi-user network to manage interference. The rank constraints rank minimization means that interference spans the lowest dimensional subspace and the useful signal spans all available spatial dimensions. In order to improve the performance of two-way relay network, we can use rank constrained rank minimization(RCRM) to solve the IA problem. This paper proposes left reweighted nuclear norm minimization-γalgorithm and selective coupling reweighted nuclear norm minimization algorithm to implement interference alignment in two-way relay networks. The left reweighted nuclear norm minimization-γ algorithm is based on reweighted nuclear norm minimization algorithm and has a novel γ choosing rule. The selective coupling reweighted nuclear norm minimization algorithm weighting methods choose according to singular value of interference matrixes. Simulation results show that the proposed algorithms considerably improve the sum rate performance and achieve the higher average achievable multiplexing gain in two-way relay interference networks.
文摘To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the classification of superimposed modulations dedicated to 5G multipleinput multiple-output(MIMO)two-way cognitive relay network in realistic channels modeled with Nakagami-m distribution.Our purpose consists of classifying pairs of users modulations from superimposed signals.To achieve this goal,we apply the higher-order statistics in conjunction with the Multi-BoostAB classifier.We use several efficiency metrics including the true positive(TP)rate,false positive(FP)rate,precision,recall,F-Measure and receiver operating characteristic(ROC)area in order to evaluate the performance of the proposed algorithm in terms of correct superimposed modulations classification.Computer simulations prove that our proposal allows obtaining a good probability of classification for ten superimposed modulations at a low signal-to-noise ratio,including the worst case(i.e.,m=0.5),where the fading distribution follows a one-sided Gaussian distribution.We also carry out a comparative study between our proposal usingMultiBoostAB classifier with the decision tree(J48)classifier.Simulation results show that the performance of MultiBoostAB on the superimposed modulations classifications outperforms the one of J48 classifier.In addition,we study the impact of the symbols number,path loss exponent and relay position on the performance of the proposed automatic classification superimposed modulations in terms of probability of correct classification.
基金supported in part by the National Nature Science Foundation of China under Grant 61473066 and Grant 61601109the Fundamental Research Funds for the Central Universities under Grant No.N152305001the Natural Science Foundation of Hebei Province under Grant F2017501039.
文摘To guarantee secure information transmission within two sources,a full-duplex(FD)relay jamming scheme for two-way energy harvesting(EH)cooperative networks is proposed,in which the relay can achieve simultaneous information reception and jamming transmission.The EH relay node scavenges energy from two source signals,and then,uses the harvested energy for information relaying and jamming transmission by the power splitting(PS)protocol.Considering multiple eavesdroppers,the nonconvex optimization for maximizing the smaller bidirectional secrecy rates is formulated by jointly optimizing the power allocation and PS factor.Furthermore,an iterative algorithm based on successive convex approximation and alternate search method is proposed to solve this non-convexity.Simulation results verify the proposed iterative algorithm and show that the proposed jamming scheme can achieve substantial performance gain than other conventional schemes.
文摘The E-plane waveguide branch directional couplers are analyzed by a method which combines the multimode network theory with rigorous mode-matching approach. The electromagnetic field components are expanded by the superposition of LSEx modes rather than TE and TM modes in the mode-matching procedure. Meanwhile, the electromagnetic problem is transferred into the network problem through the mode-matching treatment. It is shown that the present method has the advantages of simplicity and less computation without affecting the accuracy of the calculation.
基金Project supported by the State Key Development Program for Basic Research of China (Grant No 2006CB708612)the National Natural Science Foundation of China (Grant No 10572130)the Natural Science Foundation of Zhejiang Province, China (Grant No Y607425)
文摘Asymmetric tree-like branched networks are explored by geometric algorithms. Based on the network, an analysis of the thermal conductivity is presented. The relationship between effective thermal conductivity and geometric structures is obtained by using the thermal-electrical analogy technique. In all studied cases, a clear behaviour is observed, where angle (δ,θ) among parent branching extended lines, branches and parameter of the geometric structures have stronger effects on the effective thermal conductivity. When the angle δ is fixed, the optical diameter ratio β+ is dependent on angle θ. Moreover, γand m are not related to β*. The longer the branch is, the smaller the effective thermal conductivity will be. It is also found that when the angle θ〈δ2, the higher the iteration m is, the lower the thermal conductivity will be and it tends to zero, otherwise, it is bigger than zero. When the diameter ratio β1 〈 0.707 and angle δ is bigger, the optimal k of the perfect ratio increases with the increase of the angle δ; when β1 〉 0.707, the optimal k decreases. In addition, the effective thermal conductivity is always less than that of single channel material. The present results also show that the effective thermal conductivity of the asymmetric tree-like branched networks does not obey Murray's law.
基金supported in part by EricssonNational Science and Technology Major Project under Grant No.2010ZX03003-003-03+2 种基金Sino-Swedish IMT-Advanced and Beyond Cooperative Program under Grant No.2008DFA11780National Natural Science Foundation of China under Grant No.61101130the Excellent Young Scholar Research Funding of Beijing Institute of Technology under Grant No.2013CX04038
文摘Linear transceiver designs are investigated for distributed two-way relaying networks,which aim at minimising the WeightedMean Square Error(WMSE) of data detections.The forwarding matrices at relays andequalization matrices at destinations are jointly optimised.To overcome the challenginglimitations introduced by individual powerconstraints,a Semi-Definite Relaxation(SDR)called element-wise relaxation is proposed,which can transform the original optimizationproblem into a standard convex optimizationproblem.In this research,two-way relaying isunderstood from a pure signal processing perspective which can potentially simplify thetheoretical analysis.Finally,simulation resultsare used for assessing the performance advantage of the proposed algorithm.
基金National Natural Science Foundation of China (61871241, 61771263)Postgraduate Research and Practice Innovation Program of Jiangsu Province (KYCX18-2422)+3 种基金Six Categories Talent Peak of Jiangsu Province (KTHY-039)Science and Technology Program of Nantong (JC2018127, JC2018129, GY22017013)Stereoscopic Coverage Communication Network Verification Platform for China Sea (PCL2018KP002)Open Research Fund of Nantong University-Nantong Joint Research Center for Intelligent Information Technology (KFKT2017A05, KFKT2017B02)
文摘In this paper, we investigate a joint beamforming and time switching(TS) design for an energy-constrained cognitive two-way relay(TWR) network. In the network, the energy-constrained secondary user(SU) relay employs TS protocol to harvest energy from the signals sent by the circuit-powered primary user(PU) transmitter, and then exploits the harvested energy to perform information forwarding. Our aim is to maximize the sum rate of SUs under the constraints of the data rate of PU, the energy harvesting and the transmit power of the SU relay. To determine the beamforming matrix and TS ratio, we decouple the original non-convex problem into two subproblems which can be solved by semidefinite relaxation and successive convex optimization methods. Furthermore, we derive closed form expressions of the optimal solutions for each subproblem, which facilitates the design of a suboptimal iterative algorithm to handle the original sum rate maximization problem. Simulation results are presented to illustrate the effectiveness and superior performance of the proposed joint design against other conventional schemes in the literature.
基金This research is funded by the Industrial University of Ho Chi Minh City under code 20/1.6 DT01.
文摘In this paper,we propose a Two-Way Cognitive Relay Network(TWCRN)where the secondary users operate on an underlay mode to access the licensed bands.In the proposed protocols,two secondary sources transmit their data to a relay in the first time slot,and then the relay would forward the received information to both sources in the remaining time.Moreover,the relay is self-powered by harvesting energy from ambient Radio Frequency(RF)signals,using the Time Switching(TS)and the Power Switching(PS)method.This paper concentrates on eval-uating the performance of the secondary networks under the impact of hardware impairments and co-channel interference from the primary networks.In particular,based on the secondary transmitters'constraint power,we derive the closed-form expressions of the outage probability and the throughput over Rayleigh fading channels in two cases:TS and PS.We also investigate the energy efficiency issue and the locally optimal position of the relay to maximize the system throughput,which provides much information to install the relay location.Finally,our derivations are verified by Monte Carlo simulation.
文摘In this paper, we study the problem of distributed relay beamforming for a bidirectional cognitive relay network which consists of two secondary transceivers and K cognitive relay nodes and a primary network with a transmitter and receiver, using underlay model. For effective use of spectrum, we propose a Multiple Access Broadcasting (MABC) two-way relaying scheme for cognitive networks. The two transceivers transmit their data towards the relays and then relays retransmit the processed form of signal towards the receiver. Our aim is to design the beamforming coefficients to maximize quality of service (QoS) for the secondary network while satisfying tolerable interference constraint for the primary network. We show that this approach yields a closed-form solution. Our simulation results show that the maximum achievable SINR improved while the tolerable interference temperature becomes not strict for primary receiver.
基金supported by the Major State Basic Research Development Program of China(973 Program No.2012CB316100)the National Natural Science Foundation of China(No.61032002)the Fundamental Research Funds for the Central Universities(No.2010XS21)
文摘Two-way relay networks have received lots of attention, thanks to its ability to overcome the loss in the spectral efficiency due to half-duplex transmission. Asymptotic performance analysis can provide valuable insights in- to practical system designs. However, this is a gap in two-way relay network. In this paper, the asymptotic performance is studied for multi-branch dual-hop two-way amplify-and-forward (AF) relaying networks in independently but not necessarily identically distributed (i.n.i.d.) Nakagami-m fading channels, with arbitrary m 〉 5. The approximate prob- ability density function (PDF) of the instantaneous dual-hop link power at high SNR region is derived. Then we present the asymptotic outage probability expression, and analyze the diversity order and coding gain. Simulations are per- formed to verify the tightness of the presented analysis at medium and high SNR regions.
文摘In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is proposed. Specifically, the proposed scheme selects a best relay that maximize the sum mutual information among the sources to forward the sources’ signals using an amplify-and-forward protocol, and the remaining relays transmit interference signals to confuse the eavesdropper via distributed beam forming. It can be found that the proposed scheme with relay chatting does not require the knowledge of the eavesdropper’s channel, and outperforms the joint relay and jammer selection scheme, which introduces the interference into the sources. Numerical results show that the secrecy outage probability of the proposed scheme converges to zero as the transmit power increases.
文摘In this paper, we present an analytical model to determine the network connectivity probability of a linear vehicular ad hoc network (VANET) formed by communication equipped vehicles on a two-way street scenario. We consider the highway to be consisting of two lanes with vehicles moving in both directions on these lanes and focus on the probability of being able to convey messages from a source vehicle to a destination vehicle, which may be multiple hops away. Closed form analytical expression is obtained for the network connectivity probability in the presence of Nakagami fading channel. In our model, the transmission range of each vehicle is modeled as a random variable due to channel fading. The analytical results are validated by extensive simulations.
基金supported by the Natural Science Foundation of China under Grant No.62001517.
文摘In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis.
文摘The matrix D describing relations of the loops to the nodes in the graph and also the setsof branches based on the independent loops and their matrix Q are defined.The theorem in whichthe product of the loop-node matrix D multiplied by the incidence matrix A<sub>a</sub> is equal to matrix Qis put forward and proved.The admittance matrix Y<sub>lc</sub> of the sets of the branches is defined and it isassumed that the vector V<sub>lc</sub> of voltage of the sets of branches to be a calculative quantity.The equa-tion of the sets of branches is derived and the analysis method of the sets of branches based on theindependent loops in the electric network is presented.
文摘A CAD tool based on a group of efficient algorithms to verify,design,and optimize power/ground networks for standard cell model is presented.Nonlinear programming techniques,branch and bound algorithms and incomplete Cholesky decomposition conjugate gradient method (ICCG) are the three main parts of our work.Users can choose nonlinear programming method or branch and bound algorithm to satisfy their different requirements of precision and speed.The experimental results prove that the algorithms can run very fast with lower wiring resources consumption.As a result,the CAD tool based on these algorithms is able to cope with large-scale circuits.