{"title":"Genetic-based randomized network coding for dynamic satellite multicast","authors":"Zhang Tao, Qiaoyu Li, Hongyong An","doi":"10.1109/ICCCHINAW.2013.6670575","DOIUrl":"https://doi.org/10.1109/ICCCHINAW.2013.6670575","url":null,"abstract":"The multicast rate of satellite communication networks (SCN) can be maximized by using randomized network coding (RNC). To optimize the RNC-based multicast for SCN, the number of coding links should be minimized to reduce the computational complexity on satellite, while the dynamic topology needs to be considered. To this end, in this paper, we propose an improved genetic algorithm (IGA) to minimize the number of coding links and provide successful multicast for dynamic network topology. In order to support dynamic multicast, the erasure protection (EP) is carried out with the IGA in fitness test process to select child generations with a better-fitness. It shows that the IGA method provides good performance for RNC-based multicast in dynamic SCN scenarios, where the number of coding links is minimized to reduce the complexity. Through simulation results, we can confirm that our proposed method outperforms the existing ones, where dynamic multicast is not considered.","PeriodicalId":121230,"journal":{"name":"2013 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121509816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved routing metric based on link states for vehicular ad hoc networks","authors":"Liran Wang, Changle Li, Chunchun Zhao, Hang Lin","doi":"10.1109/ICCCHINAW.2013.6670584","DOIUrl":"https://doi.org/10.1109/ICCCHINAW.2013.6670584","url":null,"abstract":"Greedy forwarding is widely adopted in geographic routing protocols for VANETs since it selects the neighbor that is geographically closer to the destination as the next hop and is considered efficient. Because of the highly dynamic network topology and various impairment of radio signal, the link chosen according to the greedy algorithm regardless of the link state is unstable to a large extent, and frequent retransmissions lead to a waste of the network bandwidth and longer end to end delay. To address the issue, the paper proposed a new routing metric called expected one-transmission advance (EOA) to select the next hop to construct the route. The EOA of a certain node means the expected advance that a packet can make towards the destination through one transmission if choose the node as the next hop. The node with largest EOA is chosen as the intermediate node. The EOA metric balances the efficiency and reliability of the routing. We evaluate the performance of EOA by simulation and the result demonstrates significant reductions of end to end delay and increases of throughput compared to the traditional geographic routing protocol using greedy forwarding.","PeriodicalId":121230,"journal":{"name":"2013 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122628829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongliang Zhang, Tianyu Wang, Lingyang Song, Zhu Han
{"title":"Graph-based resource allocation for D2D communications underlaying cellular networks","authors":"Hongliang Zhang, Tianyu Wang, Lingyang Song, Zhu Han","doi":"10.1109/ICCCHINAW.2013.6670591","DOIUrl":"https://doi.org/10.1109/ICCCHINAW.2013.6670591","url":null,"abstract":"Device-to-Device (D2D) communications underlying cellular networks have been regarded as a promising way to satisfy the growing requirement for data traffic. However, the D2D pairs may bring significant interference to cellular networks when they share the channel with the cellular user equipments (UEs). In this paper, we consider the scenario in which the D2D pairs share the uplink channel with the cellular UEs, and propose a channel sharing scheme based on graph theory to increase the total capacity of the cellular UEs and the D2D pairs. Simulation results show that we can obtain significant gains by using the proposed channel sharing scheme in the assumed scenario.","PeriodicalId":121230,"journal":{"name":"2013 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114157414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fengyi Yang, Chengli Mei, Yingqi Li, Min Zhang, Haining Wang
{"title":"Traffic analysis and policy control considerations in EV-DO system","authors":"Fengyi Yang, Chengli Mei, Yingqi Li, Min Zhang, Haining Wang","doi":"10.1109/ICCCHINAW.2013.6670571","DOIUrl":"https://doi.org/10.1109/ICCCHINAW.2013.6670571","url":null,"abstract":"Mobile Internet traffic keeps a fasting-growth globally. This paper is to shed light on the traffic analysis and policy control in EV-DO systems. Large-scale datasets collected from an urban area are studied for characterizing the application/subscriber usage and downlink-uplink imbalance. Our observations show that HTTP and P2P contribute over 80% traffic, due to the prevalence of video applications. We also noticed that the traffic volume distribution of subscriber fits the Zipf law with Zipf (.38) and Zipf (1.06), and the downlink-uplink ratio of the whole dataset is 4.37, while HTTP and P2P are 11.8 and 2.41 respectively. With these numerical analysis results, we formulate a traffic control scenario, and present its optimization solution. Finally, several policy control considerations are discussed from the perspective of network operator.","PeriodicalId":121230,"journal":{"name":"2013 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128211007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chengbiao Li, Wei Liu, Jiandong Li, Qin Liu, Chuan Li
{"title":"Aggregation based spectrum allocation in cognitive radio networks","authors":"Chengbiao Li, Wei Liu, Jiandong Li, Qin Liu, Chuan Li","doi":"10.1109/ICCCHINAW.2013.6670566","DOIUrl":"https://doi.org/10.1109/ICCCHINAW.2013.6670566","url":null,"abstract":"In cognitive radio networks, the available vacant frequency bands, referred to as spectrum holes, are usually discontinuous. Hence, it is hard to exploit these vacant frequency bands since the bandwidth of single one may not be able to meet the wide bandwidth requirement of secondary users (SUs). Spectrum aggregation (SA) enables SUs to access several discontinuous spectrum holes simultaneously to satisfy the wide bandwidth requirement of SUs, which greatly improves the utilization of spectrum resources. In this paper, we firstly propose an aggregation based spectrum allocation scheme based on Knapsack Problems by considering both hardware constraints and different bandwidth requirement of SUs. Then, a novel spectrum allocation algorithm called Aggregation Spectrum Allocation Algorithm (ASAA) is given. ASAA is evaluated in terms of the total bandwidth SUs can access and the spectrum utilization efficiency. Numerical results show that the proposed algorithm can achieve better performances compared to the existing algorithms.","PeriodicalId":121230,"journal":{"name":"2013 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"79 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131106080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tianyu Chen, Q. Guan, Shengming Jiang, Hongjiang Wang
{"title":"User-motivated topology formation for green communication networks","authors":"Tianyu Chen, Q. Guan, Shengming Jiang, Hongjiang Wang","doi":"10.1109/ICCCHINAW.2013.6670558","DOIUrl":"https://doi.org/10.1109/ICCCHINAW.2013.6670558","url":null,"abstract":"The energy consumption in communication networks has attracted increasing attentions. However, the survey shows that the network is still idle at some time due to the redundant deployment of networks and varying traffic requirements. Sleeping in the network is an efficient way to save energy since the network in idle state consumes almost 90% of that in busy state. Considering that a centralized sleeping scheduling in communication networks is complicated for implementation, we propose a user-motivated topology formation scheme for green communication networks. Furthermore, we model and analyze our proposal using a potential game. The equilibrium topology formation is proved to exist and the performance of our proposal in terms of price of stability are discussed in the paper. Simulations are also conducted to show the performance of the equilibrium solution, comparing with the optimal sleeping scheduling solution.","PeriodicalId":121230,"journal":{"name":"2013 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utility-related-capacity of interference networks: A cooperative game view","authors":"Chungang Yang","doi":"10.1109/ICCCHINAW.2013.6670567","DOIUrl":"https://doi.org/10.1109/ICCCHINAW.2013.6670567","url":null,"abstract":"A bargaining power β-dependent utility-related-capacity (uc) concept is defined to characterize dynamic behaviors and strategic interactions of multiple users in interference networks, where a metric called degree of bargaining (DoB) is presented to measure the efficiency of presented uc. General uc-region of interference networks is formulated and analyzed by an Nash bargaining cooperative approach. Both the inner and outer bounds of the DoB are presented for the individually rational player/user with bargaining power β = 1. Furthermore, we conclude that the summation of DoB of all players approaches one in the interference networks. Finally, we give the general closed-form of optimal solution with Nash bargaining solution (NBS) and Kalai-Smorodinsky bargaining (KSBS) as the special cases. Meanwhile, we give the mild condition of guaranteeing KSBS more efficient than NBS.","PeriodicalId":121230,"journal":{"name":"2013 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of hybrid MMSE/Max-log-MAP MIMO detector","authors":"Rizwan Ghaffar, K. Shehzad, P. Ho","doi":"10.1109/ICCCHINAW.2013.6670563","DOIUrl":"https://doi.org/10.1109/ICCCHINAW.2013.6670563","url":null,"abstract":"Ever increasing demand of higher data rates is pushing Multiple-Input Multiple-Output (MIMO) systems into the ongoing standardization of future wireless systems, where this added spatial dimension will be predominantly employed for spatially multiplexed transmission. In order to make these systems practically realizable, low complexity efficient detection algorithms are eagerly sought, both by the industry and the academia. In this paper, we propose a two-stage hybrid detector based on the classical performance-complexity trade off of the MIMO systems. This detector is characterized by the lower complexity of linear detection and superior performance of maximum likelihood (ML) detection. The first stage is a linear filter that adapts the system dimension in accordance with the processing capability of the second stage, which is a non-linear low complexity ML detector. We consider the pragmatic ranges of MIMO systems (2×2, 3×3, 4×4 and 5×5) and look at the effect of the distribution of streams amongst the two stages. Adaptability of the system in the form of stream allocation to the two stages allows having a trade off between the complexity and the performance of detection. This is dictated by the alteration in the diversity order of the system as we vary number of streams between the two stages. Performance of the proposed hybrid detector improves as the number of streams to be suppressed in the first stage decreases but it is coupled with the increase in the cost of complexity. The observations made through this analysis can facilitate the design of the future systems in accordance with the limitations imposed by the hardware constraints.","PeriodicalId":121230,"journal":{"name":"2013 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121344899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative spectrum sharing in cognitive radio networks with proactive primary system","authors":"Qionghua Zhu, Yuan Wu, D. Tsang, Hong Peng","doi":"10.1109/ICCCHINAW.2013.6670572","DOIUrl":"https://doi.org/10.1109/ICCCHINAW.2013.6670572","url":null,"abstract":"In this paper we investigate the cooperative spectrum sharing in cognitive radio networks with proactive primary system. In our scheme, Primary User (PU) is rewarded for sharing its licensed spectrum with Secondary Users (SUs) by charging their total throughput directly. The PU performs as the leader and chooses its interference-cap and transmit-power jointly to maximize its reward from spectrum-sharing with SUs. Meanwhile, the SUs perform as the followers and adapt their transmit-power according to the PU's decisions to maximize their net-utilities. We first explore the intrinsic property of this PU-SUs sharing problem and then utilize an efficient Simulated Annealing algorithm for the optimal solution. Our numerical results show that both the PU and the SUs gain from this spectrum-sharing cooperation and thus achieve a win-win situation. In addition, as its own transmission requirement increases, the PU limits the sharing of its channels gradually to maintain its own target quality of service. Correspondingly, both the net-profit of PU and the net-utility value of SUs decrease1.","PeriodicalId":121230,"journal":{"name":"2013 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124988579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pei Zhang, H. E, Bo Li, Guili He, Xiang Zhang, Junde Song
{"title":"Security module analysis and implementation in TD-LTE/TD-SCDMA conformance test system","authors":"Pei Zhang, H. E, Bo Li, Guili He, Xiang Zhang, Junde Song","doi":"10.1109/ICCCHINAW.2013.6670564","DOIUrl":"https://doi.org/10.1109/ICCCHINAW.2013.6670564","url":null,"abstract":"This paper is based on the TTCN-3 terminal conformance test structure defined by ETSI (European Telecommunication Standards Institute). And a security module is provided for TD-LTE/TD-SCDMA inter-RAT test system which uses the test structure. The proposed security module realization mechanism can be applied to conformance test system implementation directly, consequently, this paper possesses quite significant sense in both theory and realism. What is more important, the security module realization of TD-SCDMA system fills a gap in the TTCN-3 test structure.","PeriodicalId":121230,"journal":{"name":"2013 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}