We consider an image semantic communication system in a time-varying fading Gaussian MIMO channel,with a finite number of channel states.A deep learning-aided broadcast approach scheme is proposed to benefit the adapt...We consider an image semantic communication system in a time-varying fading Gaussian MIMO channel,with a finite number of channel states.A deep learning-aided broadcast approach scheme is proposed to benefit the adaptive semantic transmission in terms of different channel states.We combine the classic broadcast approach with the image transformer to implement this adaptive joint source and channel coding(JSCC)scheme.Specifically,we utilize the neural network(NN)to jointly optimize the hierarchical image compression and superposition code mapping within this scheme.The learned transformers and codebooks allow recovering of the image with an adaptive quality and low error rate at the receiver side,in each channel state.The simulation results exhibit our proposed scheme can dynamically adapt the coding to the current channel state and outperform some existing intelligent schemes with the fixed coding block.展开更多
This paper investigates the effective capacity of a point-to-point ultra-reliable low latency communication(URLLC)transmission over multiple parallel sub-channels at finite blocklength(FBL)with imperfect channel state...This paper investigates the effective capacity of a point-to-point ultra-reliable low latency communication(URLLC)transmission over multiple parallel sub-channels at finite blocklength(FBL)with imperfect channel state information(CSI).Based on reasonable assumptions and approximations,we derive the effective capacity as a function of the pilot length,decoding error probability,transmit power and the sub-channel number.Then we reveal significant impact of the above parameters on the effective capacity.A closed-form lower bound of the effective capacity is derived and an alternating optimization based algorithm is proposed to find the optimal pilot length and decoding error probability.Simulation results validate our theoretical analysis and show that the closedform lower bound is very tight.In addition,through the simulations of the optimized effective capacity,insights for pilot length and decoding error probability optimization are provided to evaluate the optimal parameters in realistic systems.展开更多
We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks(WLANs)in the presence of path l...We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks(WLANs)in the presence of path loss,Rayleigh fading and log-normal shadowing.For a data packet transmission,we formulate an optimization problem,solve the problem,and propose a rate and transmission power adaptation scheme with a restriction methodology of data packet transmission for achieving the optimal energy efficiency.In the restriction methodology of data packet transmission,a user does not transmit a data packet if the instantaneous channel gain of the user is lower than a threshold.To evaluate the performance of the proposed scheme,we develop analytical models for computing the throughput and energy efficiency of WLANs under the proposed scheme considering a saturation traffic condition.We then validate the analytical models via simulation.We find that the proposed scheme provides better throughput and energy efficiency with acceptable throughput fairness if the restriction methodology of data packet transmission is included.By means of the analytical models and simulations,we demonstrate that the proposed scheme provides significantly higher throughput,energy efficiency and fairness index than a traditional non-adaptive scheme and an existing most relevant adaptive scheme.Throughput and energy efficiency gains obtained by the proposed scheme with respect to the existing adapting scheme are about 75%and 103%,respectively,for a fairness index of 0.8.We also study the effect of various system parameters on throughput and energy efficiency and provide various engineering insights.展开更多
Massive MIMO is one of tile enabling technologies tbr beyond 4G and 5G systems due to its ability to provide beamforming gain and reduce interference Dual-polarized antenna is widely adopted to accommodate a large num...Massive MIMO is one of tile enabling technologies tbr beyond 4G and 5G systems due to its ability to provide beamforming gain and reduce interference Dual-polarized antenna is widely adopted to accommodate a large number of antenna elements in limited space. However, current CSI(channel state information) feedback schemes developed in LTE for conventional MIMO systems are not efficient enough for massive MIMO systems since the overhead increases almost linearly with the number of antenna. Moreover, the codebook for massive MIMO will be huge and difficult to design with the LTE methodology. This paper proposes a novel CSI feedback scheme named layered Multi-paths Information based CSI Feedback (LMPIF), which can achieve higher spectrum efficiency for dual-polarized antenna system with low feedback overhead. The MIMO channel is decomposed into long term components (multipath directions and amplitudes) and short term components (multipath phases). The relationship between the two components and the optimal precoder is derived in closed form. To reduce the overhead, different granularities in feedback time have been applied for the long term components and short term components Link and system level simulation results prove that LMPIF can improve performance considerably with low CSI feedback overhead.展开更多
A Mobile Ad hoc NETwork(MANET)is a self-configuring network that is not reliant on infrastructure.This paper introduces a new multipath routing method based on the Multi-Hop Routing(MHR)technique.MHR is the consecutiv...A Mobile Ad hoc NETwork(MANET)is a self-configuring network that is not reliant on infrastructure.This paper introduces a new multipath routing method based on the Multi-Hop Routing(MHR)technique.MHR is the consecutive selection of suitable relay nodes to send information across nodes that are not within direct range of each other.Failing to ensure good MHR leads to several negative consequences,ultimately causing unsuccessful data transmission in a MANET.This research work consists of three portions.The first to attempt to propose an efficient MHR protocol is the design of Priority Based Dynamic Routing(PBDR)to adapt to the dynamic MANET environment by reducing Node Link Failures(NLF)in the network.This is achieved by dynamically considering a node’s mobility parameters like relative velocity and link duration,which enable the next-hop selection.This method works more efficiently than the traditional protocols.Then the second stage is the Improved Multi-Path Dynamic Routing(IMPDR).The enhancement is mainly focused on further improving the Quality of Service(QoS)in MANETs by introducing a QoS timer at every node to help in the QoS routing of MANETs.Since QoS is the most vital metric that assesses a protocol,its dynamic estimation has improved network performance considerably.This method uses distance,linkability,trust,and QoS as the four parameters for the next-hop selection.IMPDR is compared against traditional routing protocols.The Network Simulator-2(NS2)is used to conduct a simulation analysis of the protocols under consideration.The proposed tests are assessed for the Packet Delivery Ratio(PDR),Packet Loss Rate(PLR),End-to-End Delay(EED),and Network Throughput(NT).展开更多
Signature verification,which is a method to distinguish the authenticity of signature images,is a biometric verification technique that can effectively reduce the risk of forged signatures in financial,legal,and other...Signature verification,which is a method to distinguish the authenticity of signature images,is a biometric verification technique that can effectively reduce the risk of forged signatures in financial,legal,and other business envir-onments.However,compared with ordinary images,signature images have the following characteristics:First,the strokes are slim,i.e.,there is less effective information.Second,the signature changes slightly with the time,place,and mood of the signer,i.e.,it has high intraclass differences.These challenges lead to the low accuracy of the existing methods based on convolutional neural net-works(CNN).This study proposes an end-to-end multi-path attention inverse dis-crimination network that focuses on the signature stroke parts to extract features by reversing the foreground and background of signature images,which effectively solves the problem of little effective information.To solve the problem of high intraclass variability of signature images,we add multi-path attention modules between discriminative streams and inverse streams to enhance the discriminative features of signature images.Moreover,a multi-path discrimination loss function is proposed,which does not require the feature representation of the samples with the same class label to be infinitely close,as long as the gap between inter-class distance and the intra-class distance is bigger than the set classification threshold,which radically resolves the problem of high intra-class difference of signature images.In addition,this loss can also spur the network to explore the detailed infor-mation on the stroke parts,such as the crossing,thickness,and connection of strokes.We respectively tested on CEDAR,BHSig-Bengali,BHSig-Hindi,and GPDS Synthetic datasets with accuracies of 100%,96.24%,93.86%,and 83.72%,which are more accurate than existing signature verification methods.This is more helpful to the task of signature authentication in justice and finance.展开更多
To meet the high-performance requirements of fifth-generation(5G)and sixth-generation(6G)wireless networks,in particular,ultra-reliable and low-latency communication(URLLC)is considered to be one of the most important...To meet the high-performance requirements of fifth-generation(5G)and sixth-generation(6G)wireless networks,in particular,ultra-reliable and low-latency communication(URLLC)is considered to be one of the most important communication scenarios in a wireless network.In this paper,we consider the effects of the Rician fading channel on the performance of cooperative device-to-device(D2D)communication with URLLC.For better performance,we maximize and examine the system’s minimal rate of D2D communication.Due to the interference in D2D communication,the problem of maximizing the minimum rate becomes non-convex and difficult to solve.To solve this problem,a learning-to-optimize-based algorithm is proposed to find the optimal power allocation.The conventional branch and bound(BB)algorithm are used to learn the optimal pruning policy with supervised learning.Ensemble learning is used to train the multiple classifiers.To address the imbalanced problem,we used the supervised undersampling technique.Comparisons are made with the conventional BB algorithm and the heuristic algorithm.The outcome of the simulation demonstrates a notable performance improvement in power consumption.The proposed algorithm has significantly low computational complexity and runs faster as compared to the conventional BB algorithm and a heuristic algorithm.展开更多
The additional diversity gain provided by the relays improves the secrecy capacity of communications system significantly. The multiple hops in the relaying system is an important technique to improve this diversity g...The additional diversity gain provided by the relays improves the secrecy capacity of communications system significantly. The multiple hops in the relaying system is an important technique to improve this diversity gain. The development of an analytical mathematical model of ensuring security in multicasting through fading channels incorporating this benefit of multi-hop relaying is still an open problem. Motivated by this issue, this paper considers a secure wireless multicasting scenario employing multi-hop relaying technique over frequency selective Nakagami-m fading channel and develops an analytical mathematical model to ensure the security against multiple eavesdroppers. This mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to ensure the security in the presence of multiple eavesdroppers. Moreover, the effects of the fading parameter of multicast channel, the number of hops and eavesdropper are investigated. The results show that the security in multicasting through Nakagami-m fading channel with multi-hop relaying system is more sensitive to the number of hops and eavesdroppers. The fading of multicast channel helps to improve the secrecy multicast capacity and is not the enemy of security in multicasting.展开更多
基金supported in part by the National Key R&D Project of China under Grant 2020YFA0712300National Natural Science Foundation of China under Grant NSFC-62231022,12031011supported in part by the NSF of China under Grant 62125108。
文摘We consider an image semantic communication system in a time-varying fading Gaussian MIMO channel,with a finite number of channel states.A deep learning-aided broadcast approach scheme is proposed to benefit the adaptive semantic transmission in terms of different channel states.We combine the classic broadcast approach with the image transformer to implement this adaptive joint source and channel coding(JSCC)scheme.Specifically,we utilize the neural network(NN)to jointly optimize the hierarchical image compression and superposition code mapping within this scheme.The learned transformers and codebooks allow recovering of the image with an adaptive quality and low error rate at the receiver side,in each channel state.The simulation results exhibit our proposed scheme can dynamically adapt the coding to the current channel state and outperform some existing intelligent schemes with the fixed coding block.
基金supported by the National Natural Science Foundation of China under grant 61941106。
文摘This paper investigates the effective capacity of a point-to-point ultra-reliable low latency communication(URLLC)transmission over multiple parallel sub-channels at finite blocklength(FBL)with imperfect channel state information(CSI).Based on reasonable assumptions and approximations,we derive the effective capacity as a function of the pilot length,decoding error probability,transmit power and the sub-channel number.Then we reveal significant impact of the above parameters on the effective capacity.A closed-form lower bound of the effective capacity is derived and an alternating optimization based algorithm is proposed to find the optimal pilot length and decoding error probability.Simulation results validate our theoretical analysis and show that the closedform lower bound is very tight.In addition,through the simulations of the optimized effective capacity,insights for pilot length and decoding error probability optimization are provided to evaluate the optimal parameters in realistic systems.
文摘We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks(WLANs)in the presence of path loss,Rayleigh fading and log-normal shadowing.For a data packet transmission,we formulate an optimization problem,solve the problem,and propose a rate and transmission power adaptation scheme with a restriction methodology of data packet transmission for achieving the optimal energy efficiency.In the restriction methodology of data packet transmission,a user does not transmit a data packet if the instantaneous channel gain of the user is lower than a threshold.To evaluate the performance of the proposed scheme,we develop analytical models for computing the throughput and energy efficiency of WLANs under the proposed scheme considering a saturation traffic condition.We then validate the analytical models via simulation.We find that the proposed scheme provides better throughput and energy efficiency with acceptable throughput fairness if the restriction methodology of data packet transmission is included.By means of the analytical models and simulations,we demonstrate that the proposed scheme provides significantly higher throughput,energy efficiency and fairness index than a traditional non-adaptive scheme and an existing most relevant adaptive scheme.Throughput and energy efficiency gains obtained by the proposed scheme with respect to the existing adapting scheme are about 75%and 103%,respectively,for a fairness index of 0.8.We also study the effect of various system parameters on throughput and energy efficiency and provide various engineering insights.
基金supported by the National High-Tech R&D Program(863 Program 2015AA01A705)
文摘Massive MIMO is one of tile enabling technologies tbr beyond 4G and 5G systems due to its ability to provide beamforming gain and reduce interference Dual-polarized antenna is widely adopted to accommodate a large number of antenna elements in limited space. However, current CSI(channel state information) feedback schemes developed in LTE for conventional MIMO systems are not efficient enough for massive MIMO systems since the overhead increases almost linearly with the number of antenna. Moreover, the codebook for massive MIMO will be huge and difficult to design with the LTE methodology. This paper proposes a novel CSI feedback scheme named layered Multi-paths Information based CSI Feedback (LMPIF), which can achieve higher spectrum efficiency for dual-polarized antenna system with low feedback overhead. The MIMO channel is decomposed into long term components (multipath directions and amplitudes) and short term components (multipath phases). The relationship between the two components and the optimal precoder is derived in closed form. To reduce the overhead, different granularities in feedback time have been applied for the long term components and short term components Link and system level simulation results prove that LMPIF can improve performance considerably with low CSI feedback overhead.
基金supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R195),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘A Mobile Ad hoc NETwork(MANET)is a self-configuring network that is not reliant on infrastructure.This paper introduces a new multipath routing method based on the Multi-Hop Routing(MHR)technique.MHR is the consecutive selection of suitable relay nodes to send information across nodes that are not within direct range of each other.Failing to ensure good MHR leads to several negative consequences,ultimately causing unsuccessful data transmission in a MANET.This research work consists of three portions.The first to attempt to propose an efficient MHR protocol is the design of Priority Based Dynamic Routing(PBDR)to adapt to the dynamic MANET environment by reducing Node Link Failures(NLF)in the network.This is achieved by dynamically considering a node’s mobility parameters like relative velocity and link duration,which enable the next-hop selection.This method works more efficiently than the traditional protocols.Then the second stage is the Improved Multi-Path Dynamic Routing(IMPDR).The enhancement is mainly focused on further improving the Quality of Service(QoS)in MANETs by introducing a QoS timer at every node to help in the QoS routing of MANETs.Since QoS is the most vital metric that assesses a protocol,its dynamic estimation has improved network performance considerably.This method uses distance,linkability,trust,and QoS as the four parameters for the next-hop selection.IMPDR is compared against traditional routing protocols.The Network Simulator-2(NS2)is used to conduct a simulation analysis of the protocols under consideration.The proposed tests are assessed for the Packet Delivery Ratio(PDR),Packet Loss Rate(PLR),End-to-End Delay(EED),and Network Throughput(NT).
基金This work was supported,in part,by the National Nature Science Foundation of China under grant numbers 62272236in part,by the Natural Science Foundation of Jiangsu Province under grant numbers BK20201136,BK20191401in part,by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fund.
文摘Signature verification,which is a method to distinguish the authenticity of signature images,is a biometric verification technique that can effectively reduce the risk of forged signatures in financial,legal,and other business envir-onments.However,compared with ordinary images,signature images have the following characteristics:First,the strokes are slim,i.e.,there is less effective information.Second,the signature changes slightly with the time,place,and mood of the signer,i.e.,it has high intraclass differences.These challenges lead to the low accuracy of the existing methods based on convolutional neural net-works(CNN).This study proposes an end-to-end multi-path attention inverse dis-crimination network that focuses on the signature stroke parts to extract features by reversing the foreground and background of signature images,which effectively solves the problem of little effective information.To solve the problem of high intraclass variability of signature images,we add multi-path attention modules between discriminative streams and inverse streams to enhance the discriminative features of signature images.Moreover,a multi-path discrimination loss function is proposed,which does not require the feature representation of the samples with the same class label to be infinitely close,as long as the gap between inter-class distance and the intra-class distance is bigger than the set classification threshold,which radically resolves the problem of high intra-class difference of signature images.In addition,this loss can also spur the network to explore the detailed infor-mation on the stroke parts,such as the crossing,thickness,and connection of strokes.We respectively tested on CEDAR,BHSig-Bengali,BHSig-Hindi,and GPDS Synthetic datasets with accuracies of 100%,96.24%,93.86%,and 83.72%,which are more accurate than existing signature verification methods.This is more helpful to the task of signature authentication in justice and finance.
基金supported in part by the National Natural Science Foundation of China under Grant 61771410in part by the Sichuan Science and Technology Program 2023NSFSC1373in part by Postgraduate Innovation Fund Project of SWUST 23zx7101.
文摘To meet the high-performance requirements of fifth-generation(5G)and sixth-generation(6G)wireless networks,in particular,ultra-reliable and low-latency communication(URLLC)is considered to be one of the most important communication scenarios in a wireless network.In this paper,we consider the effects of the Rician fading channel on the performance of cooperative device-to-device(D2D)communication with URLLC.For better performance,we maximize and examine the system’s minimal rate of D2D communication.Due to the interference in D2D communication,the problem of maximizing the minimum rate becomes non-convex and difficult to solve.To solve this problem,a learning-to-optimize-based algorithm is proposed to find the optimal power allocation.The conventional branch and bound(BB)algorithm are used to learn the optimal pruning policy with supervised learning.Ensemble learning is used to train the multiple classifiers.To address the imbalanced problem,we used the supervised undersampling technique.Comparisons are made with the conventional BB algorithm and the heuristic algorithm.The outcome of the simulation demonstrates a notable performance improvement in power consumption.The proposed algorithm has significantly low computational complexity and runs faster as compared to the conventional BB algorithm and a heuristic algorithm.
文摘The additional diversity gain provided by the relays improves the secrecy capacity of communications system significantly. The multiple hops in the relaying system is an important technique to improve this diversity gain. The development of an analytical mathematical model of ensuring security in multicasting through fading channels incorporating this benefit of multi-hop relaying is still an open problem. Motivated by this issue, this paper considers a secure wireless multicasting scenario employing multi-hop relaying technique over frequency selective Nakagami-m fading channel and develops an analytical mathematical model to ensure the security against multiple eavesdroppers. This mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to ensure the security in the presence of multiple eavesdroppers. Moreover, the effects of the fading parameter of multicast channel, the number of hops and eavesdropper are investigated. The results show that the security in multicasting through Nakagami-m fading channel with multi-hop relaying system is more sensitive to the number of hops and eavesdroppers. The fading of multicast channel helps to improve the secrecy multicast capacity and is not the enemy of security in multicasting.