Free space optical(FSO)communication has recently aroused great interest in academia due to its unique features,such as large transmission band,high data rates,and strong anti-electromagnetic interference.With the aim...Free space optical(FSO)communication has recently aroused great interest in academia due to its unique features,such as large transmission band,high data rates,and strong anti-electromagnetic interference.With the aim of evaluating the performance of an FSO communication system and extending the line-of-sight transmission distance,we propose an unmanned aerial vehicle(UAV)-assisted dual-hop FSO communication system equipped with amplifyand-forward protocol at the relay node.Specifically,we consider impairments of atmospheric absorption,pointing errors,atmospheric turbulence,and link interruptions due to angle-of-arrival fluctuations in the relay system.The Gamma-Gamma and Malaga distributions are used to model the influence of atmospheric turbulence on the source-to-UAV and UAVto-destination links,respectively.We derive closedform expressions of the probability density function(PDF)and cumulative distribution function(CDF)for the proposed communication system,in terms of the Meijer-G function.Based on the precise PDF and CDF,analytical expressions for the outage probability,average bit error rate,and ergodic capacity are proposed with the aid of the extended generalized bivariate Fox’s H function.Finally,we show that there is a match between the analytical results and numerical results,and we analyze the influence of the system and channel parameters on the performance.展开更多
SV/IEEE 802.15.3a model has been the standard model for Ultra-wide bandwidth (UWB) indoor non-line-of-sight (NLOS) wireless propagation,but for line-of-sight (LOS) case,it is not well defined. In this paper,a new stat...SV/IEEE 802.15.3a model has been the standard model for Ultra-wide bandwidth (UWB) indoor non-line-of-sight (NLOS) wireless propagation,but for line-of-sight (LOS) case,it is not well defined. In this paper,a new statistical distribution model exclusively used for LOS environment is proposed based on investigation of the experimental data. By reducing the number of the visible random arriving clusters,the model itself and the parameters estimating of the corresponding model are simplified in comparison with SV/IEEE 802.15.3a model. The simulation result indicates that the proposed model is more accurate in modeling small-scale LOS environment than SV/IEEE 802.15.3a model when considering cumulative distribution functions (CDFs) for the three key channel impulse response (CIR) statistics.展开更多
A site-specific model of UWB pulse propagation in indoor environment is addressed. The simula-tion utilizes the principles of geometrical optics (GO) for direct and refiected paths' tracing and the time domain tec...A site-specific model of UWB pulse propagation in indoor environment is addressed. The simula-tion utilizes the principles of geometrical optics (GO) for direct and refiected paths' tracing and the time domain technique for describing the transient electromagnetic field reected from wall, floor, ceiling, and objects. The polarization of the received waveform is determined by taking into account the radiation pattern of the transmitting and receiving antennas, as well as the polarization changes owing to every reflection. The model provides more intrinsical interpretations for UWB pulse propagation in realistic indoor environment.展开更多
This work focuses on an unmanned aerial vehicle(UAV)-enabled mobile edge computing(MEC) system based on device-to-device(D2D) communication. In this system, the UAV exhibits caching,computing and relaying capabilities...This work focuses on an unmanned aerial vehicle(UAV)-enabled mobile edge computing(MEC) system based on device-to-device(D2D) communication. In this system, the UAV exhibits caching,computing and relaying capabilities to periodically provide specific service to cellular users and D2D receiver nodes in the appointed time slot. Besides, the D2D transmitter can provide additional caching services to D2D receiver to reduce the pressure of the UAV. Note that communication between multi-type nodes is mutually restricted and different links share spectrum resources. To achieve an improved balance between different types of node, we aim to maximize the overall energy efficiency while satisfying the quality-of-service requirements of the cellular nodes.To address this problem, we propose an alternating iteration algorithm to jointly optimize the scheduling strategies of the user, transmitting power of the UAV and D2D-TX nodes, and UAV trajectory. The successive convex approximation, penalty function, and Dinkelbach method are employed to transform the original problem into a group of solvable subproblems and the convergence of the method is proved. Simulation results show that the proposed scheme performs better than other benchmark algorithms, particularly in terms of balancing the tradeoff between minimizing UAV energy consumption and maximizing throughput.展开更多
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic markedly.Over the past few decades,network traffic identific...The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic markedly.Over the past few decades,network traffic identification has been a research hotspot in the field of network management and security mon-itoring.However,as more network services use encryption technology,network traffic identification faces many challenges.Although classic machine learning methods can solve many problems that cannot be solved by port-and payload-based methods,manually extract features that are frequently updated is time-consuming and labor-intensive.Deep learning has good automatic feature learning capabilities and is an ideal method for network traffic identification,particularly encrypted traffic identification;Existing recognition methods based on deep learning primarily use supervised learning methods and rely on many labeled samples.However,in real scenarios,labeled samples are often difficult to obtain.This paper adjusts the structure of the auxiliary classification generation adversarial network(ACGAN)so that it can use unlabeled samples for training,and use the wasserstein distance instead of the original cross entropy as the loss function to achieve semisupervised learning.Experimental results show that the identification accuracy of ISCX and USTC data sets using the proposed method yields markedly better performance when the number of labeled samples is small compared to that of convolutional neural network(CNN)based classifier.展开更多
Impulse systems do not undergo the multi-path destructive interference that manifests itself as Rayleigh fading prevalent in continuous wave systems, but rather show up as delayed replications of the direct impulse. I...Impulse systems do not undergo the multi-path destructive interference that manifests itself as Rayleigh fading prevalent in continuous wave systems, but rather show up as delayed replications of the direct impulse. In this paper, the model for impulse signals propagation over a plane earth is proposed. The condition for direct pulse and its replication overlapping each other was investigated. The model described here also takes into account the polarization of the transmission signals and the reflection coefficient of the plane, which was always neglected by previous approaches. The simulation result shows that the path loss can be characterized as 3 zones with different path loss exponents as the distance between transmitter and receiver (T-R) increasing.展开更多
Terahertz(THz)technologies have become a focus of research in recent years due to their prominent role in envisioned future communication and sensing systems.One of the key challenges facing the field is the need for ...Terahertz(THz)technologies have become a focus of research in recent years due to their prominent role in envisioned future communication and sensing systems.One of the key challenges facing the field is the need for tools to enable agile engineering of THz wave fronts.Here,we describe a reconfigurable metasurface based on GaN technology with an array-of-subarrays architecture.This subwavelength-spaced array,under the control of a 1-bit digital coding sequence,can switch between an enormous range of possible configurations,providing facile access to nearly arbitrary wave front control for signals near 0.34 THz.We demonstrate wide-angle beam scanning with 1°of angular precision over 70 GHz of bandwidth,as well as the generation of multi-beam and diffuse wave fronts,with a switching speed up to 100 MHz.This device,offering the ability to rapidly reconfigure a propagating wave front for beam-forming or diffusively scattered wide-angle coverage of a scene,will open new realms of possibilities in sensing,imaging,and networking.展开更多
This paper describes how to apply polar codes in high-throughput space communications.The high throughput space communications can enable terabit data rate capacity wideband wireless transmissions,and offer service av...This paper describes how to apply polar codes in high-throughput space communications.The high throughput space communications can enable terabit data rate capacity wideband wireless transmissions,and offer service availability of anywhere and anytime.The paper investigates the channel characteristics in space communications.The channels are lossy,time-varying,intermittent,long-latency,and with imperfect channel state information(CSI).In order to make the polar codes suitable for the space channel,some improvements and designs on the polar codes are provided in this paper.The encoding and decoding methods of polar codes are discussed,which are the key to determine the performance.We describe some rateless polar coding schemes that can guide the construction of suitable codes for time-varying channels with no-CSI in long-haul transmissions.Then,a high-rate parallel concatenation scheme of polar codes is introduced,which can improve the anti-interrupt ability of polar codes.Moreover,in order to support the massive connectivity requirements of future space communication networks,polar-coded sparse-code-multiple-access(SCMA)schemes are investigated.展开更多
With the proliferation of smart grid research,the Advanced Metering Infrastructure(AMI) has become the first ubiquitous and fixed computing platform. However,due to the unique characteristics of AMI,such as complex ne...With the proliferation of smart grid research,the Advanced Metering Infrastructure(AMI) has become the first ubiquitous and fixed computing platform. However,due to the unique characteristics of AMI,such as complex network structure,resource-constrained smart meter,and privacy-sensitive data,it is an especially challenging issue to make AMI secure. Energy theft is one of the most important concerns related to the smart grid implementation. It is estimated that utility companies lose more than $25 billion every year due to energy theft around the world. To address this challenge,in this paper,we discuss the background of AMI and identify major security requirements that AMI should meet. Specifically,an attack tree based threat model is first presented to illustrate the energy-theft behaviors in AMI. Then,we summarize the current AMI energy-theft detection schemes into three categories,i.e.,classification-based,state estimation-based,and game theory-based ones,and make extensive comparisons and discussions on them. In order to provide a deep understanding of security vulnerabilities and solutions in AMI and shed light on future research directions,we also explore some open challenges and potential solutions for energy-theft detection.展开更多
We employ nondestructive evaluation involving AC field measurement in detecting and identifying metal barcode labels,providing a reference for design.Using the magnetic scalar potential boundary condition at notches i...We employ nondestructive evaluation involving AC field measurement in detecting and identifying metal barcode labels,providing a reference for design.Using the magnetic scalar potential boundary condition at notches in thin-skin field theory and 2D Fourier transform,we introduce an analytical model for the magnetic scalar potential induced by the interaction of a high-frequency inducer with a metal barcode label containing multiple narrow saw-cut notches,and then calculate the magnetic field in the free space above the metal barcode label.With the simulations of the magnetic field,qualitative analysis is given for the effects on detecting and identifying metal barcode labels,which are caused by metal material,notch characteristics,exciting inducer properties,and other factors that can be used in metal barcode label design as reference.Simulation results are in good accordance with experiment results.展开更多
文摘Free space optical(FSO)communication has recently aroused great interest in academia due to its unique features,such as large transmission band,high data rates,and strong anti-electromagnetic interference.With the aim of evaluating the performance of an FSO communication system and extending the line-of-sight transmission distance,we propose an unmanned aerial vehicle(UAV)-assisted dual-hop FSO communication system equipped with amplifyand-forward protocol at the relay node.Specifically,we consider impairments of atmospheric absorption,pointing errors,atmospheric turbulence,and link interruptions due to angle-of-arrival fluctuations in the relay system.The Gamma-Gamma and Malaga distributions are used to model the influence of atmospheric turbulence on the source-to-UAV and UAVto-destination links,respectively.We derive closedform expressions of the probability density function(PDF)and cumulative distribution function(CDF)for the proposed communication system,in terms of the Meijer-G function.Based on the precise PDF and CDF,analytical expressions for the outage probability,average bit error rate,and ergodic capacity are proposed with the aid of the extended generalized bivariate Fox’s H function.Finally,we show that there is a match between the analytical results and numerical results,and we analyze the influence of the system and channel parameters on the performance.
基金the Key Program of National Natural Science Foundation of China(Grant No.60432040).
文摘SV/IEEE 802.15.3a model has been the standard model for Ultra-wide bandwidth (UWB) indoor non-line-of-sight (NLOS) wireless propagation,but for line-of-sight (LOS) case,it is not well defined. In this paper,a new statistical distribution model exclusively used for LOS environment is proposed based on investigation of the experimental data. By reducing the number of the visible random arriving clusters,the model itself and the parameters estimating of the corresponding model are simplified in comparison with SV/IEEE 802.15.3a model. The simulation result indicates that the proposed model is more accurate in modeling small-scale LOS environment than SV/IEEE 802.15.3a model when considering cumulative distribution functions (CDFs) for the three key channel impulse response (CIR) statistics.
基金the Key Program of National Natural Science Foundation of China (60432040)ChinaPostdoctors Science Foundation (20060390792).
文摘A site-specific model of UWB pulse propagation in indoor environment is addressed. The simula-tion utilizes the principles of geometrical optics (GO) for direct and refiected paths' tracing and the time domain technique for describing the transient electromagnetic field reected from wall, floor, ceiling, and objects. The polarization of the received waveform is determined by taking into account the radiation pattern of the transmitting and receiving antennas, as well as the polarization changes owing to every reflection. The model provides more intrinsical interpretations for UWB pulse propagation in realistic indoor environment.
基金the supports from the National Natural Science Foundation of China (61571156)Basic Research Project of Shenzhen (JCYJ20170413110004682 and JCYJ20150403161923521)。
文摘This work focuses on an unmanned aerial vehicle(UAV)-enabled mobile edge computing(MEC) system based on device-to-device(D2D) communication. In this system, the UAV exhibits caching,computing and relaying capabilities to periodically provide specific service to cellular users and D2D receiver nodes in the appointed time slot. Besides, the D2D transmitter can provide additional caching services to D2D receiver to reduce the pressure of the UAV. Note that communication between multi-type nodes is mutually restricted and different links share spectrum resources. To achieve an improved balance between different types of node, we aim to maximize the overall energy efficiency while satisfying the quality-of-service requirements of the cellular nodes.To address this problem, we propose an alternating iteration algorithm to jointly optimize the scheduling strategies of the user, transmitting power of the UAV and D2D-TX nodes, and UAV trajectory. The successive convex approximation, penalty function, and Dinkelbach method are employed to transform the original problem into a group of solvable subproblems and the convergence of the method is proved. Simulation results show that the proposed scheme performs better than other benchmark algorithms, particularly in terms of balancing the tradeoff between minimizing UAV energy consumption and maximizing throughput.
基金This work is supported by the Science and Technology Project of State Grid Jiangsu Electric Power Co.,Ltd.under Grant No.J2020068.
文摘The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic markedly.Over the past few decades,network traffic identification has been a research hotspot in the field of network management and security mon-itoring.However,as more network services use encryption technology,network traffic identification faces many challenges.Although classic machine learning methods can solve many problems that cannot be solved by port-and payload-based methods,manually extract features that are frequently updated is time-consuming and labor-intensive.Deep learning has good automatic feature learning capabilities and is an ideal method for network traffic identification,particularly encrypted traffic identification;Existing recognition methods based on deep learning primarily use supervised learning methods and rely on many labeled samples.However,in real scenarios,labeled samples are often difficult to obtain.This paper adjusts the structure of the auxiliary classification generation adversarial network(ACGAN)so that it can use unlabeled samples for training,and use the wasserstein distance instead of the original cross entropy as the loss function to achieve semisupervised learning.Experimental results show that the identification accuracy of ISCX and USTC data sets using the proposed method yields markedly better performance when the number of labeled samples is small compared to that of convolutional neural network(CNN)based classifier.
基金Sponsored by the Key Program of National Natural Science Foundation of China(Grant No60432040)
文摘Impulse systems do not undergo the multi-path destructive interference that manifests itself as Rayleigh fading prevalent in continuous wave systems, but rather show up as delayed replications of the direct impulse. In this paper, the model for impulse signals propagation over a plane earth is proposed. The condition for direct pulse and its replication overlapping each other was investigated. The model described here also takes into account the polarization of the transmission signals and the reflection coefficient of the plane, which was always neglected by previous approaches. The simulation result shows that the path loss can be characterized as 3 zones with different path loss exponents as the distance between transmitter and receiver (T-R) increasing.
基金This work was financially supported by National Key Research and Development Program of China(2021YFA1401000)National Natural Science Foundation of China(U20A20212,61931006,62131007,61921002,62101111 and 61901093)+2 种基金Fundamental Research Funds for the Central Universities(ZYGX2020ZB011)China Postdoctoral Science Foundation(2020M683285)the US National Science Foundation grant(1923782,1954780 and 2211616).
文摘Terahertz(THz)technologies have become a focus of research in recent years due to their prominent role in envisioned future communication and sensing systems.One of the key challenges facing the field is the need for tools to enable agile engineering of THz wave fronts.Here,we describe a reconfigurable metasurface based on GaN technology with an array-of-subarrays architecture.This subwavelength-spaced array,under the control of a 1-bit digital coding sequence,can switch between an enormous range of possible configurations,providing facile access to nearly arbitrary wave front control for signals near 0.34 THz.We demonstrate wide-angle beam scanning with 1°of angular precision over 70 GHz of bandwidth,as well as the generation of multi-beam and diffuse wave fronts,with a switching speed up to 100 MHz.This device,offering the ability to rapidly reconfigure a propagating wave front for beam-forming or diffusively scattered wide-angle coverage of a scene,will open new realms of possibilities in sensing,imaging,and networking.
基金supported by the National Natural Science Foundation of China(Grant Nos.61831008 and 61525103)the Shenzhen Basic Research Program(Grant No.ZDSYS201707280903305)the Guangdong Science and Technology Planning Project(Grant No.2018B030322004)。
文摘This paper describes how to apply polar codes in high-throughput space communications.The high throughput space communications can enable terabit data rate capacity wideband wireless transmissions,and offer service availability of anywhere and anytime.The paper investigates the channel characteristics in space communications.The channels are lossy,time-varying,intermittent,long-latency,and with imperfect channel state information(CSI).In order to make the polar codes suitable for the space channel,some improvements and designs on the polar codes are provided in this paper.The encoding and decoding methods of polar codes are discussed,which are the key to determine the performance.We describe some rateless polar coding schemes that can guide the construction of suitable codes for time-varying channels with no-CSI in long-haul transmissions.Then,a high-rate parallel concatenation scheme of polar codes is introduced,which can improve the anti-interrupt ability of polar codes.Moreover,in order to support the massive connectivity requirements of future space communication networks,polar-coded sparse-code-multiple-access(SCMA)schemes are investigated.
基金supported by China Scholarship Councilthe National Natural Science Foundation of China (Nos. 61170261 and 61202369)NSERC,Canada
文摘With the proliferation of smart grid research,the Advanced Metering Infrastructure(AMI) has become the first ubiquitous and fixed computing platform. However,due to the unique characteristics of AMI,such as complex network structure,resource-constrained smart meter,and privacy-sensitive data,it is an especially challenging issue to make AMI secure. Energy theft is one of the most important concerns related to the smart grid implementation. It is estimated that utility companies lose more than $25 billion every year due to energy theft around the world. To address this challenge,in this paper,we discuss the background of AMI and identify major security requirements that AMI should meet. Specifically,an attack tree based threat model is first presented to illustrate the energy-theft behaviors in AMI. Then,we summarize the current AMI energy-theft detection schemes into three categories,i.e.,classification-based,state estimation-based,and game theory-based ones,and make extensive comparisons and discussions on them. In order to provide a deep understanding of security vulnerabilities and solutions in AMI and shed light on future research directions,we also explore some open challenges and potential solutions for energy-theft detection.
基金supported by the National Natural Science Foundation of China(No.61271247)
文摘We employ nondestructive evaluation involving AC field measurement in detecting and identifying metal barcode labels,providing a reference for design.Using the magnetic scalar potential boundary condition at notches in thin-skin field theory and 2D Fourier transform,we introduce an analytical model for the magnetic scalar potential induced by the interaction of a high-frequency inducer with a metal barcode label containing multiple narrow saw-cut notches,and then calculate the magnetic field in the free space above the metal barcode label.With the simulations of the magnetic field,qualitative analysis is given for the effects on detecting and identifying metal barcode labels,which are caused by metal material,notch characteristics,exciting inducer properties,and other factors that can be used in metal barcode label design as reference.Simulation results are in good accordance with experiment results.