One of the major concerns regarding currently proposed public blockchain systems relates to the feasible transaction processing rate.It is common for such systems to limit this rate to maintain the required levels of ...One of the major concerns regarding currently proposed public blockchain systems relates to the feasible transaction processing rate.It is common for such systems to limit this rate to maintain the required levels of security and decentralisation.State channels are an approach to overcome this limitation,as they aim to decrease the required on-chain transactions for a given application and thus indirectly increase the capacity(in terms of applications)of public blockchain systems.In the present paper,we propose a state channel design that,through the use of RSA accumulators,operates on a compact state structure.This scheme is optimal for applications whose state includes large sets of elements.The novel state channel design is presented by analysing all state channel operations and how they have to be revised.The security of the design is discussed,while a practical use case scenario regarding the use of the design for an on-chain asset(e.g.,non-fungible tokens)exchange application is also analysed.展开更多
Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for ...Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed.展开更多
Wireless information and powered transfer networks(WIPT) has recently been implemented in 5th generation wireless networks. In this paper, we consider half-duplex relaying system in which the energy constrained relay ...Wireless information and powered transfer networks(WIPT) has recently been implemented in 5th generation wireless networks. In this paper, we consider half-duplex relaying system in which the energy constrained relay node collects energy via radio frequency(RF) signals from the surrounding resources. Regarding energy harvesting protocol, we propose power time switching-based relaying(PTSR) architecture for both amplify-and-forward(AF) and decode-and-forward(DF). Especially, we reveal the analytical expressions of achievable throughput, ergodic capacity and energy-efficient in case of imperfect channel state information(CSI) for both AF and DF network. Through numerical analysis, we analyse the throughput performance, energy-efficient and ergodic capacity for different parameters, including power splitting ratio and energy harvesting time. Moreover, we also depict the performance comparison between AF and DF network with perfect and imperfect CSI. The results in numerical analysis reveal that the result of AF relaying network is less significant than DF relaying network in the various scenarios.展开更多
A review of signal processing algorithms employing Wi-Fi signals for positioning and recognition of human activities is presented.The principles of how channel state information(CSI)is used and how the Wi-Fi sensing s...A review of signal processing algorithms employing Wi-Fi signals for positioning and recognition of human activities is presented.The principles of how channel state information(CSI)is used and how the Wi-Fi sensing systems operate are reviewed.It provides a brief introduction to the algorithms that perform signal processing,feature extraction and recognitions,including location,activity recognition,physiological signal detection and personal identification.Challenges and future trends of Wi-Fi sensing are also discussed in the end.展开更多
We investigate the decoy state quantum key distribution via the atmosphere channels. We consider the efficient decoy state method with one-signal state and two-decoy states. Our results show that the decoy state metho...We investigate the decoy state quantum key distribution via the atmosphere channels. We consider the efficient decoy state method with one-signal state and two-decoy states. Our results show that the decoy state method works even in the channels with fluctuating transmittance. Nevertheless, the key generation rate will be dra-matically decreased by atmosphere turbulence, which sheds more light on the characterization of atmosphere turbulence in realistic free-space based quantum key distributions.展开更多
We investigate how an optical squeezed chaotic field(SCF) evolves in an amplitude dissipation channel. We have used the integration within ordered product of operators technique to derive its evolution law. We also ...We investigate how an optical squeezed chaotic field(SCF) evolves in an amplitude dissipation channel. We have used the integration within ordered product of operators technique to derive its evolution law. We also show that the density operator of SCF can be viewed as a generating field of the squeezed number state.展开更多
The feature of finite state Markov channel probability distribution is discussed on condition that original I/O are known. The probability is called posterior condition probability. It is also proved by Bayes formula ...The feature of finite state Markov channel probability distribution is discussed on condition that original I/O are known. The probability is called posterior condition probability. It is also proved by Bayes formula that posterior condition probability forms stationary Markov sequence if channel input is independently and identically distributed. On the contrary, Markov property of posterior condition probability isn’t kept if the input isn’t independently and identically distributed and a numerical example is utilized to explain this case. The properties of posterior condition probability will aid the study of the numerical calculated recurrence formula of finite state Markov channel capacity.展开更多
In this paper, a novel robust precoder with imperfect channel state information(CSI)is proposed for multi-input multi-output(MIMO)cognitive multiuser networks equipped with relays. In the proposed model, the secondary...In this paper, a novel robust precoder with imperfect channel state information(CSI)is proposed for multi-input multi-output(MIMO)cognitive multiuser networks equipped with relays. In the proposed model, the secondary users(SUs)are allowed to share the spectrum with the primary users(PUs)when the interference temperature(IT)is below a specific threshold. The transmitting strategy of relays is amplify-and-forward(AF), and the CSI error is characterized in terms of spherical uncertainty region. A minmax problem for the transmit power of the relays is considered when the mean square error(MSE)of SUs and the IT of PU meet their corresponding thresholds, and it is transformed into a semi-definite programming(SDP)problem to search for the solution. Numerical simulations demonstrate the effectiveness of the proposed precoder.展开更多
Positioning technology based on wireless network signals in indoor environments has developed rapidly in recent years as the demand for locationbased services continues to increase.Channel state information(CSI)can be...Positioning technology based on wireless network signals in indoor environments has developed rapidly in recent years as the demand for locationbased services continues to increase.Channel state information(CSI)can be used as location feature information in fingerprint-based positioning systems because it can reflect the characteristics of the signal on multiple subcarriers.However,the random noise contained in the raw CSI information increases the likelihood of confusion when matching fingerprint data.In this paper,the Dynamic Fusion Feature(DFF)is proposed as a new fingerprint formation method to remove the noise and improve the feature resolution of the system,which combines the pre-processed amplitude and phase data.Then,the improved edit distance on real sequence(IEDR)is used as a similarity metric for fingerprint matching.Based on the above studies,we propose a new indoor fingerprint positioning method,named DFF-EDR,for improving positioning performance.During the experimental stage,data were collected and analyzed in two typical indoor environments.The results show that the proposed localization method in this paper effectively improves the feature resolution of the system in terms of both fingerprint features and similarity measures,has good anti-noise capability,and effectively reduces the localization errors.展开更多
A Gaussian channel with additive interference that is causally known to the transmitter is called a Dirty-Tape Channel(DTC).In this paper,we consider a state-dependent dirty-tape Gaussian relay channel with orthogonal...A Gaussian channel with additive interference that is causally known to the transmitter is called a Dirty-Tape Channel(DTC).In this paper,we consider a state-dependent dirty-tape Gaussian relay channel with orthogonal channels from the source to the relay and from the source and relay to the destination.The orthogonal channels are corrupted by two independent additive interferences causally known to both the source and relay.The lower and upper bounds of the channel capacity are established.The lower bound is obtained by employing superposition coding at the source,Partial Decode-and-Forward(PDF)relaying at the relay,and a strategy similar to that used by Shannon at the source and relay.The explicit capacity is characterised when the power of the relay is sufficiently large.Finally,several numerical examples are provided to illustrate the impact of additive interferences and the role of the relay in information transmission and in removing the interference.展开更多
For a 5G wireless communication system,a convolutional deep neural network(CNN)is employed to synthesize a robust channel state estimator(CSE).The proposed CSE extracts channel information from transmit-and-receive pa...For a 5G wireless communication system,a convolutional deep neural network(CNN)is employed to synthesize a robust channel state estimator(CSE).The proposed CSE extracts channel information from transmit-and-receive pairs through offline training to estimate the channel state information.Also,it utilizes pilots to offer more helpful information about the communication channel.The proposedCNN-CSE performance is compared with previously published results for Bidirectional/long short-term memory(BiLSTM/LSTM)NNs-based CSEs.The CNN-CSE achieves outstanding performance using sufficient pilots only and loses its functionality at limited pilots compared with BiLSTM and LSTM-based estimators.Using three different loss function-based classification layers and the Adam optimization algorithm,a comparative study was conducted to assess the performance of the presented DNNs-based CSEs.The BiLSTM-CSE outperforms LSTM,CNN,conventional least squares(LS),and minimum mean square error(MMSE)CSEs.In addition,the computational and learning time complexities for DNN-CSEs are provided.These estimators are promising for 5G and future communication systems because they can analyze large amounts of data,discover statistical dependencies,learn correlations between features,and generalize the gotten knowledge.展开更多
Physical-layer network coding (PNC) has the potential to significantly improve the throughput of wireless networks where the channels can be modeled as additive white Gaussian noise (AWGN) channel. As extending to...Physical-layer network coding (PNC) has the potential to significantly improve the throughput of wireless networks where the channels can be modeled as additive white Gaussian noise (AWGN) channel. As extending to mul- tiple channels, this technique requires both amplitude and phase compensation at each transmitter and will lead to inef- ficient systems yielding no diversity even with perfect channel state information (CSI). In order to avoid these limita- tions, we apply network coding with diversity (NCD) to achieve a form of selection diversity and extend NCD to coop- erative multiple access channels in this paper. However, in practical wireless communication systems, the CSI could become outdated due to the difference between the CSI used in the relay selection and data transmission phases. Hence, the selected relay may not be the best one during data transmission phase due to the dynamic change in the wireless channels. Therefore, we first explore the relation between the present and past CSIs. Exploiting this relationship, the NCD scheme with outdated CSI is investigated based on the past CSI. To evaluate the performance of this scheme, an information-theoretic metric, namely the outage capacity, is studied under this condition.展开更多
Activity recognition plays a key role in health management and security.Traditional approaches are based on vision or wearables,which only work under the line of sight(LOS)or require the targets to carry dedicated dev...Activity recognition plays a key role in health management and security.Traditional approaches are based on vision or wearables,which only work under the line of sight(LOS)or require the targets to carry dedicated devices.As human bodies and their movements have influences on WiFi propagation,this paper proposes the recognition of human activities by analyzing the channel state information(CSI)from the WiFi physical layer.The method requires only the commodity:WiFi transmitters and receivers that can operate through a wall,under LOS and non-line of sight(NLOS),while the targets are not required to carry dedicated devices.After collecting CSI,the discrete wavelet transform is applied to reduce the noise,followed by outlier detection based on the local outlier factor to extract the activity segment.Activity recognition is fulfilled by using the bi-directional long short-term memory that takes the sequential features into consideration.Experiments in through-the-wall environments achieve recognition accuracy>95%for six common activities,such as standing up,squatting down,walking,running,jumping,and falling,outperforming existing work in this field.展开更多
Given imperfect channel state information(CSI)and considering the interference from the primary transmitter,an underlay cognitive multisource multidestination relay network is proposed.A closed-form exact outage proba...Given imperfect channel state information(CSI)and considering the interference from the primary transmitter,an underlay cognitive multisource multidestination relay network is proposed.A closed-form exact outage probability and asymptotic outage probability are derived for the secondary system of the network.The results show that the outage probability is influenced by the source and destination number,the CSI imperfection as well as the interference from the primary transmitter,while the diversity order is independent of the CSI imperfection and the interference from the primary transmitter,yet it is equal to the minimum of the source and destination number.Moreover,extensive simulations are conducted with different system parameters to verify the theoretical analysis.展开更多
In a real communication scenario,it is very difficult to obtain the real-time channel state infor-mation(CSI)accurately,so the non-orthogonal multiple access(NOMA)system with statistical CSI has been researched.Aiming...In a real communication scenario,it is very difficult to obtain the real-time channel state infor-mation(CSI)accurately,so the non-orthogonal multiple access(NOMA)system with statistical CSI has been researched.Aiming at the problem that the maximization of system sum rate cannot be solved directly,a step-by-step resource allocation optimization scheme based on machine learning is proposed.First,in order to achieve a trade-off between the system sum rate and user fairness,the system throughput formula is derived.Then,according to the combinatorial characteristics of the system throughput maximization problem,the original optimization problem is divided into two sub-problems,that are power allocation and user grouping.Finally,genetic algorithm is introduced to solve the sub-problem of power allocation,and hungarian algorithm is introduced to solve the sub-problem of user grouping.By comparing the ergodic data rate of NOMA users with statistical CSI and perfect CSI,the effectiveness of the statistical CSI sorting is verified.Compared with the orthogonal multiple access(OMA)scheme,the NOMA scheme with the fixed user grouping scheme and the random user grouping scheme,the system throughput performance of the proposed scheme is signifi-cantly improved.展开更多
We investigate a quantum communication protocol, of so-called approximate quantum state sharing (AQSS), that protocol is basically based on pair of private quantum channels. In this paper, we prove that the scheme is ...We investigate a quantum communication protocol, of so-called approximate quantum state sharing (AQSS), that protocol is basically based on pair of private quantum channels. In this paper, we prove that the scheme is secure against any external and internal attacks of wiretapping in principle. Although the protocol leaks small amount of information corresponding to a security parameter , the scheme still preserves its information-theoretic security.展开更多
Considering that perfect channel state information(CSI) is difficult to obtain in practice,energy efficiency(EE) for distributed antenna systems(DAS) based on imperfect CSI and antennas selection is investigated in Ra...Considering that perfect channel state information(CSI) is difficult to obtain in practice,energy efficiency(EE) for distributed antenna systems(DAS) based on imperfect CSI and antennas selection is investigated in Rayleigh fading channel.A novel EE that is defined as the average transmission rate divided by the total consumed power is introduced.In accordance with this definition,an adaptive power allocation(PA) scheme for DAS is proposed to maximize the EE under the maximum transmit power constraint.The solution of PA in the constrained EE optimization does exist and is unique.A practical iterative algorithm with Newton method is presented to obtain the solution of PA.The proposed scheme includes the one under perfect CSI as a special case,and it only needs large scale and statistical information.As a result,the scheme has low overhead and good robustness.The theoretical EE is also derived for performance evaluation,and simulation result shows the validity of the theoretical analysis.Moreover,EE can be enhanced by decreasing the estimation error and/or path loss exponents.展开更多
Under amplitude damping channel, the dependence of the entanglement on the initial states and , which reduce to four orthogonal Bell states if we take the parameter of states are investigated. We find that the entangl...Under amplitude damping channel, the dependence of the entanglement on the initial states and , which reduce to four orthogonal Bell states if we take the parameter of states are investigated. We find that the entanglements for different initial states will decay along different curves even with the same acceleration and parame-ter of the states. We note that, in an inertial frame, the sudden death of the entanglement for will occur if , while it will not take place for for any α. We also show that the possible range of the sudden death of the entanglement for is larger than that for . There exist two groups of Bell state here we can’t distinguish only by concurrence.展开更多
We propose a new optical field and show that such an optical field can be generated as an output of a displaced Fock state in an amplitude dissipative channel. We derive new generating function formulas and binomial f...We propose a new optical field and show that such an optical field can be generated as an output of a displaced Fock state in an amplitude dissipative channel. We derive new generating function formulas and binomial formula involving twovariable Hermite polynomials to reach this result. The photon number average in this new optical field is m+|α|^2e^-2κt,which indicates that controlling the photon number can be realized by adjusting the value of m or |α|2 or κ. The time evolution law of displaced Fock state in a thermo reservoir is thus revealed.展开更多
We design proposals to generate a remote Greenberger-Horne-Zeilinger(GHZ) state and a W state of nitrogenvacancy(NV) centers coupled to microtoroidal resonators(MTRs) through noisy channels by utilizing time-bin...We design proposals to generate a remote Greenberger-Horne-Zeilinger(GHZ) state and a W state of nitrogenvacancy(NV) centers coupled to microtoroidal resonators(MTRs) through noisy channels by utilizing time-bin encoding processes and fast-optical-switch-based polarization rotation operations.The polarization and phase noise induced by noisy channels generally affect the time of state generation but not its success probability and fidelity.Besides,the above proposals can be generalized to n-qubit between two or among n remote nodes with success probability unity under ideal conditions.Furthennore,the proposals are robust for regular noise-changeable channels for the n-node case.This method is also useful in other remote quantum information processing tasks through noisy channels.展开更多
文摘One of the major concerns regarding currently proposed public blockchain systems relates to the feasible transaction processing rate.It is common for such systems to limit this rate to maintain the required levels of security and decentralisation.State channels are an approach to overcome this limitation,as they aim to decrease the required on-chain transactions for a given application and thus indirectly increase the capacity(in terms of applications)of public blockchain systems.In the present paper,we propose a state channel design that,through the use of RSA accumulators,operates on a compact state structure.This scheme is optimal for applications whose state includes large sets of elements.The novel state channel design is presented by analysing all state channel operations and how they have to be revised.The security of the design is discussed,while a practical use case scenario regarding the use of the design for an on-chain asset(e.g.,non-fungible tokens)exchange application is also analysed.
文摘Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed.
文摘Wireless information and powered transfer networks(WIPT) has recently been implemented in 5th generation wireless networks. In this paper, we consider half-duplex relaying system in which the energy constrained relay node collects energy via radio frequency(RF) signals from the surrounding resources. Regarding energy harvesting protocol, we propose power time switching-based relaying(PTSR) architecture for both amplify-and-forward(AF) and decode-and-forward(DF). Especially, we reveal the analytical expressions of achievable throughput, ergodic capacity and energy-efficient in case of imperfect channel state information(CSI) for both AF and DF network. Through numerical analysis, we analyse the throughput performance, energy-efficient and ergodic capacity for different parameters, including power splitting ratio and energy harvesting time. Moreover, we also depict the performance comparison between AF and DF network with perfect and imperfect CSI. The results in numerical analysis reveal that the result of AF relaying network is less significant than DF relaying network in the various scenarios.
基金National Natural Science Foundation of China(NSFC)under Grant No.61401100Natural Science Foundation of Fuji⁃an Province under Grant No.2018J01805+1 种基金Youth Research Project of Fujian Provincial Department of Education under Grant No.JAT190011and Fuzhou University Scientific Research Fund Project under Grant No.GXRC-18074.
文摘A review of signal processing algorithms employing Wi-Fi signals for positioning and recognition of human activities is presented.The principles of how channel state information(CSI)is used and how the Wi-Fi sensing systems operate are reviewed.It provides a brief introduction to the algorithms that perform signal processing,feature extraction and recognitions,including location,activity recognition,physiological signal detection and personal identification.Challenges and future trends of Wi-Fi sensing are also discussed in the end.
基金Supported by the National Natural Science Foundation of China under Grant Nos 11574400,U1304613,11204197,11204379 and 11074244the National Basic Research Program of China under Grant No 2011CBA00200the Doctor Foundation of the Ministry of Education of China under Grant No 20113402110059
文摘We investigate the decoy state quantum key distribution via the atmosphere channels. We consider the efficient decoy state method with one-signal state and two-decoy states. Our results show that the decoy state method works even in the channels with fluctuating transmittance. Nevertheless, the key generation rate will be dra-matically decreased by atmosphere turbulence, which sheds more light on the characterization of atmosphere turbulence in realistic free-space based quantum key distributions.
基金Project supported by the National Natural Science Foundation of China(Grant No.10574647)the Natural Science Foundation of Shandong Province,China(Grant No.Y2008A16)the University Experimental Technology Foundation of Shandong Province of China(Grant No.S04W138)
文摘We investigate how an optical squeezed chaotic field(SCF) evolves in an amplitude dissipation channel. We have used the integration within ordered product of operators technique to derive its evolution law. We also show that the density operator of SCF can be viewed as a generating field of the squeezed number state.
文摘The feature of finite state Markov channel probability distribution is discussed on condition that original I/O are known. The probability is called posterior condition probability. It is also proved by Bayes formula that posterior condition probability forms stationary Markov sequence if channel input is independently and identically distributed. On the contrary, Markov property of posterior condition probability isn’t kept if the input isn’t independently and identically distributed and a numerical example is utilized to explain this case. The properties of posterior condition probability will aid the study of the numerical calculated recurrence formula of finite state Markov channel capacity.
基金Supported by the Beijing Key Laboratory of Work Safety Intelligent Monitoring(Beijing University of Posts and Telecommunications)
文摘In this paper, a novel robust precoder with imperfect channel state information(CSI)is proposed for multi-input multi-output(MIMO)cognitive multiuser networks equipped with relays. In the proposed model, the secondary users(SUs)are allowed to share the spectrum with the primary users(PUs)when the interference temperature(IT)is below a specific threshold. The transmitting strategy of relays is amplify-and-forward(AF), and the CSI error is characterized in terms of spherical uncertainty region. A minmax problem for the transmit power of the relays is considered when the mean square error(MSE)of SUs and the IT of PU meet their corresponding thresholds, and it is transformed into a semi-definite programming(SDP)problem to search for the solution. Numerical simulations demonstrate the effectiveness of the proposed precoder.
基金This work was financially supported by the National Key Research&Development Program of China under Grant No.2020YFC1511702the Beijing Municipal Natural Science Foundation under Grant No.L191003.
文摘Positioning technology based on wireless network signals in indoor environments has developed rapidly in recent years as the demand for locationbased services continues to increase.Channel state information(CSI)can be used as location feature information in fingerprint-based positioning systems because it can reflect the characteristics of the signal on multiple subcarriers.However,the random noise contained in the raw CSI information increases the likelihood of confusion when matching fingerprint data.In this paper,the Dynamic Fusion Feature(DFF)is proposed as a new fingerprint formation method to remove the noise and improve the feature resolution of the system,which combines the pre-processed amplitude and phase data.Then,the improved edit distance on real sequence(IEDR)is used as a similarity metric for fingerprint matching.Based on the above studies,we propose a new indoor fingerprint positioning method,named DFF-EDR,for improving positioning performance.During the experimental stage,data were collected and analyzed in two typical indoor environments.The results show that the proposed localization method in this paper effectively improves the feature resolution of the system in terms of both fingerprint features and similarity measures,has good anti-noise capability,and effectively reduces the localization errors.
基金supported by the Fundamental Research Funds for the Central Universities under Grants No.2013B08214,No2009B32114the National Natural Science Foundation of China under Grants No.61271232,No.60972045,No.61071089+1 种基金the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University under Grant No.2012D05the University Postgraduate Research and Innovation Project in Jiangsu Province under Grant No.CXZZ11_0395
文摘A Gaussian channel with additive interference that is causally known to the transmitter is called a Dirty-Tape Channel(DTC).In this paper,we consider a state-dependent dirty-tape Gaussian relay channel with orthogonal channels from the source to the relay and from the source and relay to the destination.The orthogonal channels are corrupted by two independent additive interferences causally known to both the source and relay.The lower and upper bounds of the channel capacity are established.The lower bound is obtained by employing superposition coding at the source,Partial Decode-and-Forward(PDF)relaying at the relay,and a strategy similar to that used by Shannon at the source and relay.The explicit capacity is characterised when the power of the relay is sufficiently large.Finally,several numerical examples are provided to illustrate the impact of additive interferences and the role of the relay in information transmission and in removing the interference.
基金funded by Taif University Researchers Supporting Project No.(TURSP-2020/214),Taif University,Taif,Saudi Arabia。
文摘For a 5G wireless communication system,a convolutional deep neural network(CNN)is employed to synthesize a robust channel state estimator(CSE).The proposed CSE extracts channel information from transmit-and-receive pairs through offline training to estimate the channel state information.Also,it utilizes pilots to offer more helpful information about the communication channel.The proposedCNN-CSE performance is compared with previously published results for Bidirectional/long short-term memory(BiLSTM/LSTM)NNs-based CSEs.The CNN-CSE achieves outstanding performance using sufficient pilots only and loses its functionality at limited pilots compared with BiLSTM and LSTM-based estimators.Using three different loss function-based classification layers and the Adam optimization algorithm,a comparative study was conducted to assess the performance of the presented DNNs-based CSEs.The BiLSTM-CSE outperforms LSTM,CNN,conventional least squares(LS),and minimum mean square error(MMSE)CSEs.In addition,the computational and learning time complexities for DNN-CSEs are provided.These estimators are promising for 5G and future communication systems because they can analyze large amounts of data,discover statistical dependencies,learn correlations between features,and generalize the gotten knowledge.
基金funded by the EPSRC of UK under Grant EP/I037423/1
文摘Physical-layer network coding (PNC) has the potential to significantly improve the throughput of wireless networks where the channels can be modeled as additive white Gaussian noise (AWGN) channel. As extending to mul- tiple channels, this technique requires both amplitude and phase compensation at each transmitter and will lead to inef- ficient systems yielding no diversity even with perfect channel state information (CSI). In order to avoid these limita- tions, we apply network coding with diversity (NCD) to achieve a form of selection diversity and extend NCD to coop- erative multiple access channels in this paper. However, in practical wireless communication systems, the CSI could become outdated due to the difference between the CSI used in the relay selection and data transmission phases. Hence, the selected relay may not be the best one during data transmission phase due to the dynamic change in the wireless channels. Therefore, we first explore the relation between the present and past CSIs. Exploiting this relationship, the NCD scheme with outdated CSI is investigated based on the past CSI. To evaluate the performance of this scheme, an information-theoretic metric, namely the outage capacity, is studied under this condition.
基金the Key Research and Development Projects of Sichuan Science and Technology Department under Grant No.2018GZ0464the UESTC-ZHIXIAOJING Joint Research Center of Smart Home under Grant No.H04W210180.
文摘Activity recognition plays a key role in health management and security.Traditional approaches are based on vision or wearables,which only work under the line of sight(LOS)or require the targets to carry dedicated devices.As human bodies and their movements have influences on WiFi propagation,this paper proposes the recognition of human activities by analyzing the channel state information(CSI)from the WiFi physical layer.The method requires only the commodity:WiFi transmitters and receivers that can operate through a wall,under LOS and non-line of sight(NLOS),while the targets are not required to carry dedicated devices.After collecting CSI,the discrete wavelet transform is applied to reduce the noise,followed by outlier detection based on the local outlier factor to extract the activity segment.Activity recognition is fulfilled by using the bi-directional long short-term memory that takes the sequential features into consideration.Experiments in through-the-wall environments achieve recognition accuracy>95%for six common activities,such as standing up,squatting down,walking,running,jumping,and falling,outperforming existing work in this field.
基金Supported by the National Natural Science Foundation of China(No.61301170,61571340)the Fundamental Research Funds for the Central Universities(No.JB150109)the 111 Project(No.B08038)
文摘Given imperfect channel state information(CSI)and considering the interference from the primary transmitter,an underlay cognitive multisource multidestination relay network is proposed.A closed-form exact outage probability and asymptotic outage probability are derived for the secondary system of the network.The results show that the outage probability is influenced by the source and destination number,the CSI imperfection as well as the interference from the primary transmitter,while the diversity order is independent of the CSI imperfection and the interference from the primary transmitter,yet it is equal to the minimum of the source and destination number.Moreover,extensive simulations are conducted with different system parameters to verify the theoretical analysis.
基金Supported by the National Natural Science Foundation of China(No.62001001).
文摘In a real communication scenario,it is very difficult to obtain the real-time channel state infor-mation(CSI)accurately,so the non-orthogonal multiple access(NOMA)system with statistical CSI has been researched.Aiming at the problem that the maximization of system sum rate cannot be solved directly,a step-by-step resource allocation optimization scheme based on machine learning is proposed.First,in order to achieve a trade-off between the system sum rate and user fairness,the system throughput formula is derived.Then,according to the combinatorial characteristics of the system throughput maximization problem,the original optimization problem is divided into two sub-problems,that are power allocation and user grouping.Finally,genetic algorithm is introduced to solve the sub-problem of power allocation,and hungarian algorithm is introduced to solve the sub-problem of user grouping.By comparing the ergodic data rate of NOMA users with statistical CSI and perfect CSI,the effectiveness of the statistical CSI sorting is verified.Compared with the orthogonal multiple access(OMA)scheme,the NOMA scheme with the fixed user grouping scheme and the random user grouping scheme,the system throughput performance of the proposed scheme is signifi-cantly improved.
文摘We investigate a quantum communication protocol, of so-called approximate quantum state sharing (AQSS), that protocol is basically based on pair of private quantum channels. In this paper, we prove that the scheme is secure against any external and internal attacks of wiretapping in principle. Although the protocol leaks small amount of information corresponding to a security parameter , the scheme still preserves its information-theoretic security.
基金partially supported by the National Natural Science Foundation of China(61571225,61271255,61232016,U1405254)the Open Foundation of Jiangsu Engineering Center of Network Monitoring(Nanjing University of Information Science and Technology)(Grant No.KJR1509)+2 种基金the PAPD fundthe CICAEET fundShenzhen Strategic Emerging Industry Development Funds(JSGG20150331160845693)
文摘Considering that perfect channel state information(CSI) is difficult to obtain in practice,energy efficiency(EE) for distributed antenna systems(DAS) based on imperfect CSI and antennas selection is investigated in Rayleigh fading channel.A novel EE that is defined as the average transmission rate divided by the total consumed power is introduced.In accordance with this definition,an adaptive power allocation(PA) scheme for DAS is proposed to maximize the EE under the maximum transmit power constraint.The solution of PA in the constrained EE optimization does exist and is unique.A practical iterative algorithm with Newton method is presented to obtain the solution of PA.The proposed scheme includes the one under perfect CSI as a special case,and it only needs large scale and statistical information.As a result,the scheme has low overhead and good robustness.The theoretical EE is also derived for performance evaluation,and simulation result shows the validity of the theoretical analysis.Moreover,EE can be enhanced by decreasing the estimation error and/or path loss exponents.
文摘Under amplitude damping channel, the dependence of the entanglement on the initial states and , which reduce to four orthogonal Bell states if we take the parameter of states are investigated. We find that the entanglements for different initial states will decay along different curves even with the same acceleration and parame-ter of the states. We note that, in an inertial frame, the sudden death of the entanglement for will occur if , while it will not take place for for any α. We also show that the possible range of the sudden death of the entanglement for is larger than that for . There exist two groups of Bell state here we can’t distinguish only by concurrence.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.11174114 and 11175113)the Natural Science Foundation of Wuxi Institute of Technology of China(Grant No.4013012931)
文摘We propose a new optical field and show that such an optical field can be generated as an output of a displaced Fock state in an amplitude dissipative channel. We derive new generating function formulas and binomial formula involving twovariable Hermite polynomials to reach this result. The photon number average in this new optical field is m+|α|^2e^-2κt,which indicates that controlling the photon number can be realized by adjusting the value of m or |α|2 or κ. The time evolution law of displaced Fock state in a thermo reservoir is thus revealed.
基金supported by the National Natural Science Foundation of China(Grant Nos.11264042,61465013,11465020,and 11165015)the Program for Chun Miao Excellent Talents of Jilin Provincial Department of Education(Grant No.201316)the Talent Program of Yanbian University of China(Grant No.950010001)
文摘We design proposals to generate a remote Greenberger-Horne-Zeilinger(GHZ) state and a W state of nitrogenvacancy(NV) centers coupled to microtoroidal resonators(MTRs) through noisy channels by utilizing time-bin encoding processes and fast-optical-switch-based polarization rotation operations.The polarization and phase noise induced by noisy channels generally affect the time of state generation but not its success probability and fidelity.Besides,the above proposals can be generalized to n-qubit between two or among n remote nodes with success probability unity under ideal conditions.Furthennore,the proposals are robust for regular noise-changeable channels for the n-node case.This method is also useful in other remote quantum information processing tasks through noisy channels.