2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)最新文献

筛选
英文 中文
MF-SIC detector for massive MIMO with QPSK modulation QPSK调制大规模MIMO的MF-SIC探测器
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961595
Fangwei Dong, Yue Xiao, Lixia Xiao, Xia Lei, Shaoqian Li, Xiaojie Wen
{"title":"MF-SIC detector for massive MIMO with QPSK modulation","authors":"Fangwei Dong, Yue Xiao, Lixia Xiao, Xia Lei, Shaoqian Li, Xiaojie Wen","doi":"10.1109/ICCChinaW.2015.7961595","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961595","url":null,"abstract":"Massive multiple-input multiple-output (MIMO) is one of the key transmission techniques in 5G wireless communications. However, the complexity of massive MIMO detector is extremely high. Traditional matched filter (MF) detector is attractive in its low complexity but with severe performance degradation. In this paper, for massive MIMO with QPSK modulation, we propose an improved MF detection scheme by combining MF and successive interference cancellation (SIC). Simulation results show that the proposed MF-SIC detection scheme outperforms conventional MF, achieves better performance than traditional ZF detector and similar performance of MMSE detector at low SNR regions with much lower complexity.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132686640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless-powered relay-aided networks with co-channel interference 具有同信道干扰的无线供电中继辅助网络
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961599
Yawei Chen, Chao Zhang
{"title":"Wireless-powered relay-aided networks with co-channel interference","authors":"Yawei Chen, Chao Zhang","doi":"10.1109/ICCChinaW.2015.7961599","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961599","url":null,"abstract":"In this paper, we study a wireless powered communication network (WPCN) subject to the co-channel interference. In the down-link (DL), the hybrid access point (H-AP) broadcasts the wireless energy offered by the radio frequency (RF) signal to the user and relay. In the up-link (UL), the user and relay nodes transmit information to the H-AP through time-division-multiple-access (TDMA). In contrast to conventional WPCN, the interference can be considered as additional energy, not just as a threat for the data transmissions. Through the manner of curve fitting, we obtain the closed-form expression for the system outage probability and the throughput. Furthermore, the optimal time allocation to maximize the average system throughput is obtained. Finally it is shown that the theoretical results fit the simulation results closely and the proposed optimal scheme achieves the best performances.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115581193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterization of the on-body received signal strength indication considering different propagation environment 考虑不同传播环境的车载接收信号强度表征
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961579
A. Ren, Dongjian Cao, Fu Zhou, Tianqiao Zhu, Fangming Hu, Zhiya Zhang, Xiaodong Yang, M. Rehman, Wei Zhao, Q. Abbasi
{"title":"Characterization of the on-body received signal strength indication considering different propagation environment","authors":"A. Ren, Dongjian Cao, Fu Zhou, Tianqiao Zhu, Fangming Hu, Zhiya Zhang, Xiaodong Yang, M. Rehman, Wei Zhao, Q. Abbasi","doi":"10.1109/ICCChinaW.2015.7961579","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961579","url":null,"abstract":"A method based on the received signal strength indicator (RSSI) for the characterization of wireless communication between on-body sensors in different propagation environments is presented in this paper [1]. The CC2431 sensors are employed to do the experimentation in indoor and outdoor environments in this study. These sensors are being used typically in ubiquitous sensor networks (USN) providing PHY layer functions for IEEE802.15.4 standard. They use a radio frequency (RF) transceiver for wireless communication at the 2.4GHz Industry Science Medical (ISM) band. Six on-body receivers and one transmitter replicating a typical body centric wireless network are used for the measurement campaign and impact of the varying environment on the RSSI value is analyzed.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126570670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Incident Localization and Assistance System: A case study of a Cyber-Physical Human System 事件定位与协助系统:一个资讯-实体人类系统的个案研究
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961580
C. Scheuermann, B. Brügge, J. Folmer, S. Verclas
{"title":"Incident Localization and Assistance System: A case study of a Cyber-Physical Human System","authors":"C. Scheuermann, B. Brügge, J. Folmer, S. Verclas","doi":"10.1109/ICCChinaW.2015.7961580","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961580","url":null,"abstract":"One goal of the Industry 4.0 initiative is to improve horizontal and vertical knowledge sharing among industries. Horizontal sharing allows companies to exchange knowledge across different sites whereas vertical sharing allows the exchange of knowledge across hierarchical structures within a site. Sharing knowledge especially about incidents results in better products, reduces down-times and improves efficiency in industries. Horizontal and vertical knowledge sharing is a great challenge in the domain of manufacturing. We describe a case study where we replace handwritten incident and maintenance documentation. The main problems associated with handwritten documentation are bad readability and non-shareability. In this paper we describe our Incident Localization and Assistance System (ILAS), an incident documentation and maintenance system. ILAS transfers process oriented incident management knowledge from IT Service Management (ITSM) to the domain of manufacturing. ILAS offers real-time monitoring using wearables, incident analysis support and knowledge sharing for incidents within and among different production sites. We implemented ILAS as a Cyber-Physical Human System. Additionally, we conducted a survey about the potential of wearables within Industry 4.0. We found out that wearables in enterprises are still in their infancy but have great potential especially for this use case.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122213492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An insight into cloud-enabled Complex Industrial Applications 深入了解支持云的复杂工业应用程序
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961601
Zhaogang Shu, J. Wan
{"title":"An insight into cloud-enabled Complex Industrial Applications","authors":"Zhaogang Shu, J. Wan","doi":"10.1109/ICCChinaW.2015.7961601","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961601","url":null,"abstract":"The cloud-based systems can provide massive storage resources and low-cost computing as well as the flexibility of customizing the operating environment to Complex Industrial Applications (CIA). Also the Cloud-integrated CPS (CCPS) will bring hope to allow previously unachievable application scenarios to be built, deployed, managed and controlled effectively. In this paper, we propose a cloud-integrated CPS architecture and outline the enabling technologies for CIA. Then, we dissect three potential challenges and solutions from the perspective of CIA, including the virtualized resource management techniques, the scheduling of cloud resources, and life cycle management. We hope this paper can provide the insight and the roadmap for future research efforts in the emerging field of CCPS.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121482389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A system level evaluation of vertical sectorization for active antenna system 有源天线系统垂直扇形的系统级评价
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961593
F. Zhang, Shaohui Sun, Qiubin Gao, Runhua Chen, Hui Li, Rakesh Tamrakar, Wenhong Chen
{"title":"A system level evaluation of vertical sectorization for active antenna system","authors":"F. Zhang, Shaohui Sun, Qiubin Gao, Runhua Chen, Hui Li, Rakesh Tamrakar, Wenhong Chen","doi":"10.1109/ICCChinaW.2015.7961593","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961593","url":null,"abstract":"Active antenna system (AAS) is a system with features the ability of advanced beam-forming techniques to take full advantage of spatial freedom in cellular network deployment, which enables improvement in network capacity and coverage. One of recent applications for AAS is vertical sectorization where the conventional sector is split into two vertical sector, i.e. inner sector and outer sector. The user equipment (UE) connects to the better serving sector based on the level of received power. In this paper, the performance of massive multi-input multi-output (MIMO) system for vertical sectorization in terms of different inner sector downtilt and the ratio of the power transmitted by outer sector to power transmitted by inner sector are presented, the results have shown that when the difference of between downtilt of inner beam and downtilt of outer beam is varied to a fixed angle, the performance achieves a maximum level, and the power ratio of inner sector to outer sector is also crucial factor that impact on vertical sectorization system performance, simulation results demonstrate that the best performance can be achieved when the power ratio equal to 1.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134465502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Combining MIMO beamforming with security codes to achieve unconditional communication security 将MIMO波束形成与安全码相结合,实现无条件通信安全
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961589
Jie Tang, H. Wen, Huan-huan Song, Fei Pan
{"title":"Combining MIMO beamforming with security codes to achieve unconditional communication security","authors":"Jie Tang, H. Wen, Huan-huan Song, Fei Pan","doi":"10.1109/ICCChinaW.2015.7961589","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961589","url":null,"abstract":"This paper investigated unconditional secure communications in a passive eavesdropping (PE)wireless environment via a two-step method under Wyner's model. Firstly, with MIMO transmit beamforming, one can utilize the spatial degree of freedom (DoF) to cripple eavesdroppers' interceptions even though the eavesdropper's CSI is unknown. Consequently, note that the legitimate receivers will still continue to enjoy an advantage channel over eavesdroppers when they share similar conditions (background noise power, channel gains), we approach Eve's optimal bit error rate bound as a bridge to unit the beamforming end with the security codes. Followed by such effective security code, the proposed system could achieve almost error-free transmissions for the main channel while zero information obtained by the eavesdroppers and the unconditional security system was built. We launched extensive experiments to verify the proposed security systems and demonstrated its feasibility and implement ability.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131115382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Angle fingerprint: A database-driven method for indoor localization 角度指纹:一种基于数据库的室内定位方法
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961583
Ze Zheng, Guoru Ding
{"title":"Angle fingerprint: A database-driven method for indoor localization","authors":"Ze Zheng, Guoru Ding","doi":"10.1109/ICCChinaW.2015.7961583","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961583","url":null,"abstract":"The main purpose of this paper is to propose a different fingerprint method for indoor localization, which we named angle fingerprint. Received Signal Strength Indicator (RSSI) is always used for traditional fingerprint method, which is often inaccurate resulting from human behavior, such as human presence and movement. However, Received Signal Strength (RSS) fading and attenuation will almost not affect angle measurement utilizing multi-antenna. In this paper, firstly we introduce the idea of angle fingerprint. Then, we discuss the border distortion appearing in angle fingerprint, which may introduce inaccuracy if utilizing traditional minimum Euclidean distance method (MED). An improved localization scheme, grid lock (GL), is proposed in the following part. Related simulation shows that the accuracy of GL improves about 20% compared to traditional MED.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115587146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint cooperative jamming and beamforming for secure transmission in two-cell networks 双蜂窝网络中安全传输的联合协同干扰和波束形成
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961590
Lin Hu, H. Wen, Jie Tang, Zhen-Qing He, Jian-Hao Su
{"title":"Joint cooperative jamming and beamforming for secure transmission in two-cell networks","authors":"Lin Hu, H. Wen, Jie Tang, Zhen-Qing He, Jian-Hao Su","doi":"10.1109/ICCChinaW.2015.7961590","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961590","url":null,"abstract":"In this paper, we consider secure downlink transmission in two-cell networks where the one base station (Alice) provides secure wireless services to its legitimate receiver (Bob) in the presence of a passive eavesdropper (Eve). For multi-cell networks, the inter-cell interference to Bob and Eve has a great impact on the security performance. In order to improve the confidentiality of information transfer from Alice to Bob, it is crucial to properly design the transmit strategies. With the results of conventional cooperative jamming (CJ) scheme, we propose a modified CJ scheme for cooperative base station (CBS) to further degrade the quality of signal reception at Eve, and therefore the secrecy rate can be increased. Both theoretical analysis and numerical results show that the modified CJ scheme outperforms the conventional CJ scheme by achieving a higher secrecy rate. Additionally, by taking the energy efficiency into account, we formulate an adaptive cooperation, in which the CBS is allowed to provide services to its desired receiver. We design a cooperative beamforming for CBS to satisfy the rate requirement while maximizing the secrecy rate of legitimate channel. Numerical results validate the effectiveness of the proposed cooperation scheme.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114935190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Energy-efficient radio resource management in a HetNet downlink system with JT CoMP 基于JT CoMP的HetNet下行系统的节能无线电资源管理
2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC) Pub Date : 2015-11-01 DOI: 10.1109/ICCChinaW.2015.7961596
Jia Yu, Guanghui Yu, Ye Wang, Qinyu Zhang
{"title":"Energy-efficient radio resource management in a HetNet downlink system with JT CoMP","authors":"Jia Yu, Guanghui Yu, Ye Wang, Qinyu Zhang","doi":"10.1109/ICCChinaW.2015.7961596","DOIUrl":"https://doi.org/10.1109/ICCChinaW.2015.7961596","url":null,"abstract":"With the booming data traffic in mobile networks, the energy consumption caused by the information and communications technology (ICT) industry has dramatically increased in the last decade. Therefore, design of energy-efficient technologies for communication systems has become a big issue. In this paper, we discuss the energy efficiency of a heterogeneous network (HetNet) downlink system. Joint transmission coordinated multipoint (CoMP) scheme is considered to combat with intercell interference. We propose a formulation to model a radio resource allocation (RRM) problem for the purpose of improving system energy efficiency. Under a comprehensive consideration, the RRM problem is constrained by transmit power of each antenna, capacity of backhaul links and a given QoS requirement. Since it is NP hard, the problem is simplified into an individual scheduling problem with known power allocation, combined with a power allocation problem with the obtained scheduling result. For the scheduling problem, we propose a heuristic algorithm based on the cross entropy (CE) method, and for the power allocation, we use a KKT-based method to approach the solution. Extensive simulation are conducted to validate the effectiveness and the efficiency of proposed algorithms.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127432588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信