Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,S...Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)interactions.Tapping into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart home.The Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger system.The work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the system.The simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a time.This is done to measure the system's consistency across a variety of device capabilities.The experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times.展开更多
Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,becaus...Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,because the MCvD is unreliable and there exists molecular noise and inter symbol interference(ISI),cooperative nano-relays can acquire the reliability for drug delivery to targeted diseased cells,especially if the separation distance between the nano transmitter and nano receiver is increased.In this work,we propose an approach for optimizing the performance of the nano system using cooperative molecular communications with a nano relay scheme,while accounting for blood flow effects in terms of drift velocity.The fractions of the molecular drug that should be allocated to the nano transmitter and nano relay positioning are computed using a collaborative optimization problem solved by theModified Central Force Optimization(MCFO)algorithm.Unlike the previous work,the probability of bit error is expressed in a closed-form expression.It is used as an objective function to determine the optimal velocity of the drug molecules and the detection threshold at the nano receiver.The simulation results show that the probability of bit error can be dramatically reduced by optimizing the drift velocity,detection threshold,location of the nano-relay in the proposed nano system,and molecular drug budget.展开更多
Maize(Zea mays L.)-soybean(Glycine max L.Merr.)relay intercropping provides a way to enhance land productivity.However,the late-planted soybean suffers from shading by the maize.After maize harvest,how the recovery gr...Maize(Zea mays L.)-soybean(Glycine max L.Merr.)relay intercropping provides a way to enhance land productivity.However,the late-planted soybean suffers from shading by the maize.After maize harvest,how the recovery growth influences the leaf and nodule traits remains unclear.A three-year field experiment was conducted to evaluate the effects of genotypes,i.e.,supernodulating(nts1007),Nandou 12(ND12),and Guixia 3(GX3),and crop configurations,i.e.,the interspecific row spacing of 45(I45),60(I60),75 cm(I75),and sole soybean(SS),on soybean recovery growth and N fixation.The results showed that intercropping reduced the soybean total leaf area(LA)by reducing both the leaf number(LN)and unit leaflet area(LUA),and it reduced the nodule dry weight(NW)by reducing both the nodule number(NN)and nodule diameter(ND)compared with the SS.The correlation and principal component analysis(PCA)indicated a co-variability of the leaf and nodule traits in response to the genotype and crop configuration interactions.During the recovery growth stages,the compensatory growth promoted soybean growth to reduce the gaps of leaf and nodule traits between intercropping and SS.The relative growth rates of ureide(RGR_U)and nitrogen(RGR_N)accumulation were higher in intercropping than in SS.Intercropping achieved more significant sucrose and starch contents compared with SS.ND12 and GX3 showed more robust compensatory growth than nts1007 in intercropping.Although the recovery growth of relay intercropping soybean improved biomass and nitrogen accumulation,ND12 gained a more significant partial land equivalent ratio(pLER)than GX3.The I60 treatment achieved more robust compensation effects on biomass and N accumulation than the other configurations.Meanwhile,I60 showed a higher nodule sucrose content and greater shoot ureide and N accumulation than SS.Finally,intercropping ND12 with maize using an interspecific row spacing of 60 cm was optimal for both yield advantage and N accumulation.展开更多
In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we p...In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user.展开更多
To improve the connectivity of device-to-device(D2D)communication between delay-assisted vehicles,a multi-hop D2D relay selection strategy based on outage probability is proposed.The algorithm firstly clusters the rel...To improve the connectivity of device-to-device(D2D)communication between delay-assisted vehicles,a multi-hop D2D relay selection strategy based on outage probability is proposed.The algorithm firstly clusters the relay users based on the distance of D2D users,and determines the number of one-hop relay nodes through the outage probability threshold.Two-hop relay nodes directly select the same number of relays as one-hop relay nodes according to the descending order of signal noise ratio(SNR)to establish a square matrix.The Hungarian algorithm is used to assign the relay nodes of two clusters to complete the inter relay communication.Finally,the information is sent to the D2D receiver by combining technology.The simulation results show that this algorithm can reduce the cost of relay probing process and the outage probability of system in multi-hop D2D relay communication.展开更多
Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-e...Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings.展开更多
Due to the proliferation of mobile internet access, the cellu-lar traffic is envisaged to experience a 1000-fold growth inthe second decade of the 21 st century. To meet such a hugetraffic demand, the Fifth Generation...Due to the proliferation of mobile internet access, the cellu-lar traffic is envisaged to experience a 1000-fold growth inthe second decade of the 21 st century. To meet such a hugetraffic demand, the Fifth Generation(5G) network have toadopt new techniques to substantially increase spectral effi-ciency and reliability. At the base station side, available re-sources(power supply, equipment size, processing capability,etc.) are far more sufficient than that of the terminal side,which imposes a high challenge on the uplink transmission.The concept of cooperative communications opens a possibili-ty of using multiple terminals to cooperatively achieve spa-tial diversity that is typically obtained by means of multipleantennas in the base station. The application of Device-to-Device(D2D) communications in the 3GPP LTE system fur-ther pushes the collaboration of terminals from the theory tothe practice. The utilization of D2D-based cooperative relay-ing is promising in the era of 5G. In this paper, we compara-tively study several cooperative multi-relay schemes, includ-ing the proposed opportunistic space-time coding, in thepresence of imperfect channel state information. The numeri-cal results reveal that the proposed scheme is the best coop-erative solution until now from the perspective of multiplex-ing-diversity tradeoff.展开更多
In this article we propose to facilitate local peer-to-peer communication by a Device-to-Device (D2D) radio that operates as an underlay network to an IMT-Advanced cellular network. It is expected that local services ...In this article we propose to facilitate local peer-to-peer communication by a Device-to-Device (D2D) radio that operates as an underlay network to an IMT-Advanced cellular network. It is expected that local services may utilize mobile peer-to-peer communication instead of central server based communication for rich mul-timedia services. The main challenge of the underlay radio in a multi-cell environment is to limit the inter-ference to the cellular network while achieving a reasonable link budget for the D2D radio. We propose a novel power control mechanism for D2D connections that share cellular uplink resources. The mechanism limits the maximum D2D transmit power utilizing cellular power control information of the devices in D2D communication. Thereby it enables underlaying D2D communication even in interference-limited networks with full load and without degrading the performance of the cellular network. Secondly, we study a single cell scenario consisting of a device communicating with the base station and two devices that communicate with each other. The results demonstrate that the D2D radio, sharing the same resources as the cellular net-work, can provide higher capacity (sum rate) compared to pure cellular communication where all the data is transmitted through the base station.展开更多
The network performance and the unmanned aerial vehicle(UAV)number are important objectives when UAVs are placed as communication relays to enhance the multi-agent information exchange.The problem is a non-determinist...The network performance and the unmanned aerial vehicle(UAV)number are important objectives when UAVs are placed as communication relays to enhance the multi-agent information exchange.The problem is a non-deterministic polynomial hard(NP-hard)multi-objective optimization problem,instead of generating a Pareto solution,this work focuses on considering both objectives at the same level so as to achieve a balanced solution between them.Based on the property that agents connected to the same UAV are a cluster,two clustering-based algorithms,M-K-means(MKM)and modified fast search and find density of peaks(MFSFDP)methods,are first proposed.Since the former algorithm requires too much computational time and the latter one requires too many relays,an algorithm for the balanced network performance and relay number(BPN)is proposed by discretizing the area to avoid missing the optimal relay positions and defining a new local density function to reflect the network performance metric.Simulation results demonstrate that the proposed algorithms are feasible and effective.Comparisons between these algorithms show that the BPN algorithm uses fewer relay UAVs than the MFSFDP and classic set-covering based algorithm,and its computational time is far less than the MKM algorithm.展开更多
The existence of remnant particles, which significantly reduce the reliability of relays, is a serious problem for aerospace relays. The traditional method for detecting remnant particles-particle impact noise detecti...The existence of remnant particles, which significantly reduce the reliability of relays, is a serious problem for aerospace relays. The traditional method for detecting remnant particles-particle impact noise detection (PIND)-can be used merely to detect the existence of the particle; it is not able to provide any information about the particles' material. However, information on the material of the particles is very helpful for analyzing the causes of remnants. By analyzing the output acoustic signals from a PIND tester, this paper proposes three feature extraction methods: unit energy average pulse durative time, shape parameter of signal power spectral density (PSD), and pulse linear predictive coding coefficient sequence. These methods allow identified remnants to be classified into four categories based on their material. Furthermore, we prove the validity of this new method by processing P1ND signals from actual tests.展开更多
In device-to-device(D2D)underlay cellular networks with downlink spectrum sharing,massive MIMO seems promising as the large number of antennas at the base station(BS) can be utilized to suppress interference.However,t...In device-to-device(D2D)underlay cellular networks with downlink spectrum sharing,massive MIMO seems promising as the large number of antennas at the base station(BS) can be utilized to suppress interference.However,the channel state information(CSI) from the BS to D2D receivers is required to obtain this advantage.In this paper,we first propose a novel time division duplex(TDD) scheme for D2D users to acquire this CSI,without additional pilot overhead.Moreover,we propose an interference-aware MMSE precoder utilizing the acquired CSI from the BS to not only cellular users but also D2D users to suppress the cellular-to-D2D interference.Simulation results show that our proposed TDD scheme and precoder can significantly improve the achievable sum spectral efficiency(SE) and D2D SE,compared to the classical MMSE precoder.Compared with the interferenceaware ZF precoder,whose performance severely degrades for large user numbers,our proposed interference-aware MMSE precoder can always guarantees a high and stable performance in terms of achievable SE.展开更多
In this work, we consider device-to-device (D2D) direct communication underlaying a 3GPP LTE-A network. D2D communication enables new service opportunities, provides high throughput and reliable communication while re...In this work, we consider device-to-device (D2D) direct communication underlaying a 3GPP LTE-A network. D2D communication enables new service opportunities, provides high throughput and reliable communication while reducing the base station load. For better total performance, D2D links and cellular links share the same radio resource and the management of interference becomes a crucial task. We propose a radio resource allocation for D2D links based on interference avoidance approach. For system with multiple transmit antennas, we apply beamforming technique based on signal to leakage criterion to reduce the co-channel interference. The results show that, D2D transmission with the resource allocation and beamforming technique provides significant gain compared to that of the regular cellular network.展开更多
This letter investigates a delay optimization problem in device-to-device(D2D)networks where users have pre-downloaded subfiles following a coded caching rule.Due to acquiring rest subfiles,users may suffer both recei...This letter investigates a delay optimization problem in device-to-device(D2D)networks where users have pre-downloaded subfiles following a coded caching rule.Due to acquiring rest subfiles,users may suffer both receiving and transmitting delays.To achieve the delay minimization,we first propose a delay-aware mode-selection strategy to adaptively choose multicast or D2D communications mode to reduce the receiving-caused delay.By matching these transmit modes with distinct subfile sizes,we further formulate a min-max optimization problem to minimize the delivery delay.Finally,numerical results prove that the proposed scheme outperforms existing ones in terms of both receiving and transmitting delays.展开更多
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ...5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances.展开更多
In this paper, we study D2D (Device-to-Device) communication underlying LTE-Advanced uplink system. Since D2D communication reuses uplink resources with cellular communication in this scenario, it’s hard to avoid the...In this paper, we study D2D (Device-to-Device) communication underlying LTE-Advanced uplink system. Since D2D communication reuses uplink resources with cellular communication in this scenario, it’s hard to avoid the inference between D2D users and cellular users. If there is no restriction for D2D communication on using the whole uplink frequency band, it will have a strong negative impact on cellular communication. In order to overcome this shortage, we propose a resource allocation method that D2D users and cellular users use orthogonal frequency resources. This method will effectively reduce the inference between both kinds of communication. However, an obvious disadvantage of this method is no effective use of uplink resources. Based on this, we propose an optimized resource allocation method that a specific cellular user will be chosen to reuse the RBs (Resource Block) of D2D users. These ideas will be taken into system-level simulation, and from the results of simulation we can see that the optimized method has the ability to improve overall system performance and limit inference for cell-edge users.展开更多
In this paper,we investigate the feasibility and performance of the covert communication with a spectrum sharing relay in the finite blocklength regime.Specifically,the relay opportunistically forwards the source'...In this paper,we investigate the feasibility and performance of the covert communication with a spectrum sharing relay in the finite blocklength regime.Specifically,the relay opportunistically forwards the source's messages to the primary receiver or conveys the covert messages to its own receiver via the sharing spectrum,while the warden attempts to detect the transmission.First,we derive a lower bound on the covertness constraint,and the analytical expressions of both the primary average effective covert throughput(AECT)and sum AECT are presented by considering the overall decoding error performance.Then,we formulate two optimization problems to maximize the primary and sum AECT respectively by optimizing the blocklength and the transmit power at the source and the relay.Our examinations show that there exists an optimal blocklength to maximize the primary and sum AECT.Besides,it is revealed that,to maximize the primary AECT,the optimal transmit power of each hop increases as its channel quality deteriorates.Furthermore,in the optimization for maximizing the sum AECT,the optimal transmit power at the source equals to zero when the channel quality from relay to the secondary receiver is not weaker than that from relay to the primary receiver.展开更多
文摘Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)interactions.Tapping into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart home.The Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger system.The work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the system.The simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a time.This is done to measure the system's consistency across a variety of device capabilities.The experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times.
基金the Researchers Supporting Project Number(RSP2023R 102)King Saud University,Riyadh,Saudi Arabia.
文摘Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,because the MCvD is unreliable and there exists molecular noise and inter symbol interference(ISI),cooperative nano-relays can acquire the reliability for drug delivery to targeted diseased cells,especially if the separation distance between the nano transmitter and nano receiver is increased.In this work,we propose an approach for optimizing the performance of the nano system using cooperative molecular communications with a nano relay scheme,while accounting for blood flow effects in terms of drift velocity.The fractions of the molecular drug that should be allocated to the nano transmitter and nano relay positioning are computed using a collaborative optimization problem solved by theModified Central Force Optimization(MCFO)algorithm.Unlike the previous work,the probability of bit error is expressed in a closed-form expression.It is used as an objective function to determine the optimal velocity of the drug molecules and the detection threshold at the nano receiver.The simulation results show that the probability of bit error can be dramatically reduced by optimizing the drift velocity,detection threshold,location of the nano-relay in the proposed nano system,and molecular drug budget.
基金supported by the China Agriculture Research System of MOF and MARA(Soybean,CARS04-PS20)the National Natural Science Foundation of China(3187101212 and 31671625).
文摘Maize(Zea mays L.)-soybean(Glycine max L.Merr.)relay intercropping provides a way to enhance land productivity.However,the late-planted soybean suffers from shading by the maize.After maize harvest,how the recovery growth influences the leaf and nodule traits remains unclear.A three-year field experiment was conducted to evaluate the effects of genotypes,i.e.,supernodulating(nts1007),Nandou 12(ND12),and Guixia 3(GX3),and crop configurations,i.e.,the interspecific row spacing of 45(I45),60(I60),75 cm(I75),and sole soybean(SS),on soybean recovery growth and N fixation.The results showed that intercropping reduced the soybean total leaf area(LA)by reducing both the leaf number(LN)and unit leaflet area(LUA),and it reduced the nodule dry weight(NW)by reducing both the nodule number(NN)and nodule diameter(ND)compared with the SS.The correlation and principal component analysis(PCA)indicated a co-variability of the leaf and nodule traits in response to the genotype and crop configuration interactions.During the recovery growth stages,the compensatory growth promoted soybean growth to reduce the gaps of leaf and nodule traits between intercropping and SS.The relative growth rates of ureide(RGR_U)and nitrogen(RGR_N)accumulation were higher in intercropping than in SS.Intercropping achieved more significant sucrose and starch contents compared with SS.ND12 and GX3 showed more robust compensatory growth than nts1007 in intercropping.Although the recovery growth of relay intercropping soybean improved biomass and nitrogen accumulation,ND12 gained a more significant partial land equivalent ratio(pLER)than GX3.The I60 treatment achieved more robust compensation effects on biomass and N accumulation than the other configurations.Meanwhile,I60 showed a higher nodule sucrose content and greater shoot ureide and N accumulation than SS.Finally,intercropping ND12 with maize using an interspecific row spacing of 60 cm was optimal for both yield advantage and N accumulation.
基金supported in part by the National Natural Science Foundation of China under Grant 62271268,Grant 62071253,and Grant 62371252in part by the Jiangsu Provincial Key Research and Development Program under Grant BE2022800in part by the Jiangsu Provincial 333 Talent Project。
文摘In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user.
基金National Natural Science Foundation of China(No.61801106)。
文摘To improve the connectivity of device-to-device(D2D)communication between delay-assisted vehicles,a multi-hop D2D relay selection strategy based on outage probability is proposed.The algorithm firstly clusters the relay users based on the distance of D2D users,and determines the number of one-hop relay nodes through the outage probability threshold.Two-hop relay nodes directly select the same number of relays as one-hop relay nodes according to the descending order of signal noise ratio(SNR)to establish a square matrix.The Hungarian algorithm is used to assign the relay nodes of two clusters to complete the inter relay communication.Finally,the information is sent to the D2D receiver by combining technology.The simulation results show that this algorithm can reduce the cost of relay probing process and the outage probability of system in multi-hop D2D relay communication.
基金the National Natural Science Foundation of China under Grants 62001517 and 61971474the Beijing Nova Program under Grant Z201100006820121.
文摘Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings.
文摘Due to the proliferation of mobile internet access, the cellu-lar traffic is envisaged to experience a 1000-fold growth inthe second decade of the 21 st century. To meet such a hugetraffic demand, the Fifth Generation(5G) network have toadopt new techniques to substantially increase spectral effi-ciency and reliability. At the base station side, available re-sources(power supply, equipment size, processing capability,etc.) are far more sufficient than that of the terminal side,which imposes a high challenge on the uplink transmission.The concept of cooperative communications opens a possibili-ty of using multiple terminals to cooperatively achieve spa-tial diversity that is typically obtained by means of multipleantennas in the base station. The application of Device-to-Device(D2D) communications in the 3GPP LTE system fur-ther pushes the collaboration of terminals from the theory tothe practice. The utilization of D2D-based cooperative relay-ing is promising in the era of 5G. In this paper, we compara-tively study several cooperative multi-relay schemes, includ-ing the proposed opportunistic space-time coding, in thepresence of imperfect channel state information. The numeri-cal results reveal that the proposed scheme is the best coop-erative solution until now from the perspective of multiplex-ing-diversity tradeoff.
文摘In this article we propose to facilitate local peer-to-peer communication by a Device-to-Device (D2D) radio that operates as an underlay network to an IMT-Advanced cellular network. It is expected that local services may utilize mobile peer-to-peer communication instead of central server based communication for rich mul-timedia services. The main challenge of the underlay radio in a multi-cell environment is to limit the inter-ference to the cellular network while achieving a reasonable link budget for the D2D radio. We propose a novel power control mechanism for D2D connections that share cellular uplink resources. The mechanism limits the maximum D2D transmit power utilizing cellular power control information of the devices in D2D communication. Thereby it enables underlaying D2D communication even in interference-limited networks with full load and without degrading the performance of the cellular network. Secondly, we study a single cell scenario consisting of a device communicating with the base station and two devices that communicate with each other. The results demonstrate that the D2D radio, sharing the same resources as the cellular net-work, can provide higher capacity (sum rate) compared to pure cellular communication where all the data is transmitted through the base station.
基金the National Natural Science Foundation of China(61573285)。
文摘The network performance and the unmanned aerial vehicle(UAV)number are important objectives when UAVs are placed as communication relays to enhance the multi-agent information exchange.The problem is a non-deterministic polynomial hard(NP-hard)multi-objective optimization problem,instead of generating a Pareto solution,this work focuses on considering both objectives at the same level so as to achieve a balanced solution between them.Based on the property that agents connected to the same UAV are a cluster,two clustering-based algorithms,M-K-means(MKM)and modified fast search and find density of peaks(MFSFDP)methods,are first proposed.Since the former algorithm requires too much computational time and the latter one requires too many relays,an algorithm for the balanced network performance and relay number(BPN)is proposed by discretizing the area to avoid missing the optimal relay positions and defining a new local density function to reflect the network performance metric.Simulation results demonstrate that the proposed algorithms are feasible and effective.Comparisons between these algorithms show that the BPN algorithm uses fewer relay UAVs than the MFSFDP and classic set-covering based algorithm,and its computational time is far less than the MKM algorithm.
基金China Science Technology and Industry Foundation for National Defense (FEBG 27100001)
文摘The existence of remnant particles, which significantly reduce the reliability of relays, is a serious problem for aerospace relays. The traditional method for detecting remnant particles-particle impact noise detection (PIND)-can be used merely to detect the existence of the particle; it is not able to provide any information about the particles' material. However, information on the material of the particles is very helpful for analyzing the causes of remnants. By analyzing the output acoustic signals from a PIND tester, this paper proposes three feature extraction methods: unit energy average pulse durative time, shape parameter of signal power spectral density (PSD), and pulse linear predictive coding coefficient sequence. These methods allow identified remnants to be classified into four categories based on their material. Furthermore, we prove the validity of this new method by processing P1ND signals from actual tests.
基金supported by National Basic Research Program of China under Grants No. 2013CB329002Science Fund for Creative Research Groups of NSFC under Grants No.61321061+3 种基金China's 863 Project under Grants No.2015AA01A706National Major Project under Grants No.2016ZX03001023-003Program for New Century Excellent Talents in University under Grants No.NCET-130321Tsinghua-Qualcomm Joint Research Program,and Tsinghua University Initiative Scientific Research Program under Grants No. 2011THZ02-2
文摘In device-to-device(D2D)underlay cellular networks with downlink spectrum sharing,massive MIMO seems promising as the large number of antennas at the base station(BS) can be utilized to suppress interference.However,the channel state information(CSI) from the BS to D2D receivers is required to obtain this advantage.In this paper,we first propose a novel time division duplex(TDD) scheme for D2D users to acquire this CSI,without additional pilot overhead.Moreover,we propose an interference-aware MMSE precoder utilizing the acquired CSI from the BS to not only cellular users but also D2D users to suppress the cellular-to-D2D interference.Simulation results show that our proposed TDD scheme and precoder can significantly improve the achievable sum spectral efficiency(SE) and D2D SE,compared to the classical MMSE precoder.Compared with the interferenceaware ZF precoder,whose performance severely degrades for large user numbers,our proposed interference-aware MMSE precoder can always guarantees a high and stable performance in terms of achievable SE.
文摘In this work, we consider device-to-device (D2D) direct communication underlaying a 3GPP LTE-A network. D2D communication enables new service opportunities, provides high throughput and reliable communication while reducing the base station load. For better total performance, D2D links and cellular links share the same radio resource and the management of interference becomes a crucial task. We propose a radio resource allocation for D2D links based on interference avoidance approach. For system with multiple transmit antennas, we apply beamforming technique based on signal to leakage criterion to reduce the co-channel interference. The results show that, D2D transmission with the resource allocation and beamforming technique provides significant gain compared to that of the regular cellular network.
基金partly supported by the National Natural Science Foundation of China (No.61601334,61601509)
文摘This letter investigates a delay optimization problem in device-to-device(D2D)networks where users have pre-downloaded subfiles following a coded caching rule.Due to acquiring rest subfiles,users may suffer both receiving and transmitting delays.To achieve the delay minimization,we first propose a delay-aware mode-selection strategy to adaptively choose multicast or D2D communications mode to reduce the receiving-caused delay.By matching these transmit modes with distinct subfile sizes,we further formulate a min-max optimization problem to minimize the delivery delay.Finally,numerical results prove that the proposed scheme outperforms existing ones in terms of both receiving and transmitting delays.
文摘5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances.
文摘In this paper, we study D2D (Device-to-Device) communication underlying LTE-Advanced uplink system. Since D2D communication reuses uplink resources with cellular communication in this scenario, it’s hard to avoid the inference between D2D users and cellular users. If there is no restriction for D2D communication on using the whole uplink frequency band, it will have a strong negative impact on cellular communication. In order to overcome this shortage, we propose a resource allocation method that D2D users and cellular users use orthogonal frequency resources. This method will effectively reduce the inference between both kinds of communication. However, an obvious disadvantage of this method is no effective use of uplink resources. Based on this, we propose an optimized resource allocation method that a specific cellular user will be chosen to reuse the RBs (Resource Block) of D2D users. These ideas will be taken into system-level simulation, and from the results of simulation we can see that the optimized method has the ability to improve overall system performance and limit inference for cell-edge users.
基金supported by National Natural Science Foundation of China(No.62071486)Natural Science Foundation on Frontier Leading Technology Basic Research Project of Jiangsu Province,China(BK20212001)Key Research and Development Program of Jiangsu Province Key Project and Topics,China(2019B010157001)。
文摘In this paper,we investigate the feasibility and performance of the covert communication with a spectrum sharing relay in the finite blocklength regime.Specifically,the relay opportunistically forwards the source's messages to the primary receiver or conveys the covert messages to its own receiver via the sharing spectrum,while the warden attempts to detect the transmission.First,we derive a lower bound on the covertness constraint,and the analytical expressions of both the primary average effective covert throughput(AECT)and sum AECT are presented by considering the overall decoding error performance.Then,we formulate two optimization problems to maximize the primary and sum AECT respectively by optimizing the blocklength and the transmit power at the source and the relay.Our examinations show that there exists an optimal blocklength to maximize the primary and sum AECT.Besides,it is revealed that,to maximize the primary AECT,the optimal transmit power of each hop increases as its channel quality deteriorates.Furthermore,in the optimization for maximizing the sum AECT,the optimal transmit power at the source equals to zero when the channel quality from relay to the secondary receiver is not weaker than that from relay to the primary receiver.