Kan Wang, Wenchao Ji, Junhuai Li, Huaijun Wang, Ting Cao
{"title":"Wireless Content Caching in Sliced Cellular Networks with Multicast Beamforming","authors":"Kan Wang, Wenchao Ji, Junhuai Li, Huaijun Wang, Ting Cao","doi":"10.1109/WCSP.2019.8928095","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8928095","url":null,"abstract":"In this paper, we consider the joint caching and multicast beamforming optimization in cellular networks with caching functions equipped on each base station (BS), to facilitate the network-wide utility improvement by means of content caching among multiple enhanced Mobile BroadBand (eMBB) slices. Firstly, by presenting the two-timescale setup and sample average approximation (SAA) technique, we decouple the intractable and stochastic joint clustering, caching and multicast beamforming optimization problem into two different timescales, the basic principle behind which is to iteratively solve the large- and small-timescale one on the basis of SAA and semidefinite relaxation (SDR), respectively. Then, we leverage the linear programming (LP) theory to solve the formulated joint clustering and caching problem at the large timescale. In particular, the integer linear programming (ILP)-based large-timescale problem is reformulated and relaxed as an LP one, along with a verification that its optimal solution is exactly equivalent to that of its relaxed LP counterpart. Finally, simulations are conducted to demonstrate the effectiveness of proposed algorithm, revealing that the network-wide utility could benefit from both the multicast beamforming and content sharing among multiple slices.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126291290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xingbo Lu, Weiwei Yang, Yueming Cai, Xinrong Guan, Lei Wang
{"title":"Discriminatory Channel Estimation in MIMO Relay Systems against Active Eavesdropper","authors":"Xingbo Lu, Weiwei Yang, Yueming Cai, Xinrong Guan, Lei Wang","doi":"10.1109/WCSP.2019.8927873","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8927873","url":null,"abstract":"In this paper, we propose a new discriminatory channel estimation (DCE) scheme to combat active eavesdropping in multiple-input multiple-output (MIMO) decode-and-forward (DF) relay systems. In particular, through cooperative jamming (CJ) and artificial noise (AN) insertion, the discrimination between channel state information (CSI) at the active eavesdropper (Eve) and legitimate users (LUs) can be well ensured. To characterize the performance of the proposed DCE scheme, the closed-form expressions of normalized mean squared error (NMSE) of estimation for both legitimate channel and wiretap channel have been derived. In addition, the power allocation between pilot and AN during channel estimation phase is optimized to further enlarge the CSI discrimination. Simulation results validate the effectiveness of the proposed scheme to achieve a higher secrecy performance, even with an active Eve.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126077595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qimin Ding, Ruonan Zhang, Yi Jiang, D. Zhai, Bin Li
{"title":"Regularized Training Framework for Combining Pruning and Quantization to Compress Neural Networks","authors":"Qimin Ding, Ruonan Zhang, Yi Jiang, D. Zhai, Bin Li","doi":"10.1109/WCSP.2019.8928083","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8928083","url":null,"abstract":"Many convolutional neural networks(CNNs) have been proposed to solve computer vision tasks such as image classification and image segmentation. However the CNNs usually contain a large number of parameters to determine which consumes very high computation and power resources. Thus, it is difficult to deploy the CNNs on resource-limited devices. Network pruning and network quantization are two main methods to compress the CNNs, researchers often apply these methods individually without considering the relationship between them. In this paper, we explore the coupling relationship between network pruning and quantization, as well as the limits of the current network compression training method. Then we propose a new regularized training method that can combine pruning and quantization within a simple training framework. Experiments show that by using the proposed training framework, the finetune process is not needed anymore and hence we can reduce much time for training a network. The simulation results also show that the performance of the network can over-perform the traditional methods. The proposed framework is suitable for the CNNs deployed in portable devices with limited computational resources and power supply.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121808272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yiwen Xu, Yaping Huang, Weiling Chen, Hong Xue, Tiesong Zhao
{"title":"Error Resilience of Haptic Data in Interactive Systems","authors":"Yiwen Xu, Yaping Huang, Weiling Chen, Hong Xue, Tiesong Zhao","doi":"10.1109/WCSP.2019.8927919","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8927919","url":null,"abstract":"Haptic technology has been widely applied in various fields as a new type of immersive interaction method. In a haptic interaction system, data may be lost due to the fluctuation of network environment, which obviously has negative influence on user's quality of experience. Error resilience is an effective method to solve the above problem. In this paper, we first establish a real haptic interaction system as the platform of the successive experiments. Then, a new quality metric named haptic perception metric (HPM) is proposed. Based on this metric, we design experiments to determine an optimal prediction algorithm for error resilience. Experimental results show that the prediction algorithm can effectively implement error resilience under different packet loss rates. It can also be confirmed that the proposed HPM metric can better reflect the quality of haptic interaction.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124959416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Beam Power Control for Co-Existing Multibeam GEO and LEO Satellite System","authors":"Rui Li, Pengwenlong Gu, Cunqing Hua","doi":"10.1109/WCSP.2019.8928079","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8928079","url":null,"abstract":"With the development of satellite technology, the number of space satellites, especially low earth orbit (LEO) satellites, has increased dramatically. Due to the spectrum scarcity, sharing spectrum between different satellite systems is a promising option. This paper studies the cognitive satellite system with the co-existence of geostationary earth orbit (GEO) and LEO satellites. Based on the interference analysis, an adaptive beam power control problem is formulated that attempts to maximize the throughput of the LEO satellite users subject to the quality of service constraints of the GEO satellite users. The fractional programming technique is adopted to transform this nonconvex problem into a tractable form, which can be solved efficiently. Simulation results demonstrate that the proposed beam power control scheme can not only improve the spectrum efficiency of the co-existing satellite systems, but also ensure the user fairness.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116768562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis for D2D-Enabled Cellular Networks With Mobile Edge Computing","authors":"Han Hu, Pengfei Zong, Hong Wang, Hongbo Zhu","doi":"10.1109/WCSP.2019.8928027","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8928027","url":null,"abstract":"In this paper, we propose an analysis framework for the D2D-enabled cellular networks with mobile edge computing, which is composed of two types of computing nodes, i.e., access point (AP) nodes and device-to-device nodes (DNs). The mobile users (MUs), whose locations are modeled as a Poisson Point Process (PPP) distribution, make an independent selection to offload their computation tasks to either the nearby AP or the D2D nodes according to the assumed task offloading modes. Besides, in order to alleviate the intra-tier interference both in uplink and downlink, a prioritized channel access policy (PCAP) is explored. By using the stochastic geometry and queuing theory, the performance of the proposed system model is evaluated in terms of the total successful edge computing probability, which is influenced by both the communication and computation performance of the two offloading modes. We obtain interesting tradeoffs that depend on the effects of D2D node densities and distance thresholds of the assumed offloading mode selection on the above performance metrics. When compared to the scheme without PCAP, the PCAP can contribute more to the total successful edge computing probability of a MU. The derived results could provide an useful guideline for the provisioning and planning in employing D2D-enabled cellular network with edge computing units.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sparse Active User Detection and Channel Estimation Using ADMM in Uplink C-RAN","authors":"Zhenjun Dong, Ronghua Ji, Jian Zhao","doi":"10.1109/WCSP.2019.8927903","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8927903","url":null,"abstract":"We consider active user detection (AUD) and channel estimation (CE) in the uplink of a cloud radio access network (C-RAN) with sparse active users. Since it is difficult to obtain the prior knowledge of the sparsity level and the measurement matrix will not always satisfy the restricted isometry property (RIP), it is not effective to use the conventional compressed sensing (CS) techniques directly. Due to the large number of users in the C-RAN, directly solving the active user detection problem will involve high complexity. We propose a new algorithm called D-ADMM by using the alternating direction method of multipliers (ADMM)to conduct AUD and CE, which does not need the prior knowledge of the sparsity level. Compared with the standard convex optimization algorithm (cvx), the proposed D-ADMM algorithm can reduce the processing time by a factor of 7/8 while achieving the same final results.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125212352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Superposition Modulation in Physical Layer Security","authors":"Shubo Sun, N. Li, Haowei Wang, Xiaofeng Tao","doi":"10.1109/WCSP.2019.8928058","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8928058","url":null,"abstract":"Superposition modulation(SM) separates the transmitters and the bits to be sent into two parts, respectively, and aims that the low-order symbols modulated by different bit sequences reach the legitimate receiver (Bob) synchronously. Then the receiver receives a high-order superposition symbol superimposed by the low-order symbols. Its diversity makes a great fluctuation of communicating channels, which is a great feature for the physical-layer security. So the potential security of SM is deserved to be discussed. This paper investigates the security performance of SM scheme in a wiretap system, and its symbol error rete (SER) at the eavesdropper (Eve) is much higher compared with the traditional QAM scheme. Furthermore, we discuss the effect of channel estimation errors. It shows that SM scheme is as sensitive to estimation error as traditional QAM scheme for Eve, such that SM is still have a better secrecy performance. The results show agreement with computer simulations.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128038043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-Stage Power Allocation for Cooperative NOMA in D2D Communications with Imperfect CSI","authors":"Tianqi Xing, Nan Ma, Ping Zhang","doi":"10.1109/WCSP.2019.8927904","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8927904","url":null,"abstract":"In this paper, a novel cooperative non-orthogonal multiple access (NOMA) in device-to-device (D2D) communications scheme is proposed. We investigate the two-stage power allocation problem to maximize the sum rate in this system, and considering the fairness factor simultaneously. Since perfect knowledge of channel state information (CSI) may be difficult to acquire at the base station (BS), we innovatively consider the imperfect CSI in our system. It should be noted that our formulated problem is a mixed fraction non-linear programming problem, thus we propose the convex approximation method to decouple the problem in two sub-problems: 1) power allocation for the D2D users (DUE) from BS; 2) power allocation for far DUEs from the DUE relay. And we use Lagrangian multiplier method to get the optimal power allocation coefficients for two-stage data transmission. Moreover, the theoretical analysis and simulation results are presented to evaluate our proposed scheme for the cooperative NOMA in D2D communications.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122809586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CapsHash: Deep Supervised Hashing with Capsule Network","authors":"Yang Li, Rui Zhang, Zhuang Miao, Jiabao Wang","doi":"10.1109/WCSP.2019.8927934","DOIUrl":"https://doi.org/10.1109/WCSP.2019.8927934","url":null,"abstract":"To better deal with large-scale image retrieval problem, deep hashing models based on convolutional neural network (CNN) have been widely used as effective methods, which can map similar images to compact binary hash codes with smaller hamming distance. Despite their positive results, CNN-based methods have few limitations, which are unable to understand the spatial relationship between features. To overcome this challenge, in this paper, a novel deep supervised hashing method was proposed based on capsule networks. Our method, referred to as CapsHash, can learn discriminative hash codes and capsule vectors at the same time. Moreover, we introduce a novel compound loss function that has two parts: classification hashing loss and margin loss. This compound loss function can greatly improve the discriminative ability of binary codes and further improve the image retrieval performance. Extensive experiments under different scenarios demonstrate that our CapsHash method can preserve the instance-level similarity and outperform previous state-of-the-art hashing approaches. To the best of our knowledge, CapsHash is the first method about the application of capsule networks in the deep supervised hashing domain.","PeriodicalId":108635,"journal":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131105638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}