{"title":"Hybrid Beamforming Design with Finite Resolution Phase Shifters in Multi-User Systems","authors":"Liyuan Wen, Hua Qian, Xiliang Luo, Kai Kang","doi":"10.1109/WCSP55476.2022.10039454","DOIUrl":"https://doi.org/10.1109/WCSP55476.2022.10039454","url":null,"abstract":"Hybrid beamforming is a key technology in the next generation wireless communication. It achieves similar performance as full digital beamforming with much reduced power consumption and hardware complexity. Compared with fully-connected hybrid beamforming architecture, the partially-connected architecture is of particular interest as it further simplifies the hardware design. In this work we study the partially-connected beamforming with finite resolution phase shifters in downlink massive MIMO systems. Fairness or the quality of service (QoS) of each user is considered. In this prob-lem, partially-connected architecture and finite resolution phase shifters put additional constraints to the system. We propose an efficient penalty-based algorithm to jointly optimize the digital and analog beamforming, which yields analog beamforming in discrete values. Numerical results show that the proposed algorithm performs better than other benchmark algorithms. It achieves satisfactory performance with low resolution phase shifters.","PeriodicalId":199421,"journal":{"name":"2022 14th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"392 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114373432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lu Sun, Liang Wu, Zaichen Zhang, J. Dang, Yulong Shen, Gefeng Huang, Liliang Ding
{"title":"An Intelligent Indoor Localization System in the NLOS Environment Based on Deep Learning and CSI Images","authors":"Lu Sun, Liang Wu, Zaichen Zhang, J. Dang, Yulong Shen, Gefeng Huang, Liliang Ding","doi":"10.1109/WCSP55476.2022.10039155","DOIUrl":"https://doi.org/10.1109/WCSP55476.2022.10039155","url":null,"abstract":"With the rapid development of the smart service industry, indoor high-precision localization technology in the non-line-of-sight (NLOS) environment has attracted great interest. Fingerprint-based indoor localization has been widely employed due to its low hardware cost and high localization accuracy. In this paper, we propose an indoor intelligent localization system based on a 2-dimensional deep convolutional neural network (2D DCNN) and image fingerprints extracted from the channel state information (CSI). Simulation results show that the proposed localization system can achieve a high localization accuracy in the NLOS environment.","PeriodicalId":199421,"journal":{"name":"2022 14th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121678545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Progressive Linear Precoder Optimization for Multicast Retransmission","authors":"Jian Xiong, Zhe Zhang, M. Tao","doi":"10.1109/WCSP55476.2022.10039444","DOIUrl":"https://doi.org/10.1109/WCSP55476.2022.10039444","url":null,"abstract":"Our investigation concentrates on the linear pre-coder designed for the packet retransmission in the multicast sys-tem. To fully utilize the time diversity provided by the automatic repeat request (ARQ), we consider a sequential linear precoder optimization problem assisted with hybrid-ARQ (HARQ), which aims to maximize the minimum quality-of-service over all users under the peak power constraint of base station. To solve the non-convex problem, we propose a low-complexity high-performance algorithm based on convex-concave procedure (CCP) together with alternating direction method of multipliers (ADMM). The proposed algorithm not only guarantees a sub-optimal solution but also has closed-form update in each iteration. Numerical results show that the proposed algorithm can continuously improve the system performance under multiple retransmissions, including reducing the successful transmission time and the bit error rate.","PeriodicalId":199421,"journal":{"name":"2022 14th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124480385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IRS-Aided Secure Communications over an Untrusted AF Relay System","authors":"Ying Gao, Deli Qiao, Haifeng Qian","doi":"10.1109/WCSP55476.2022.10039128","DOIUrl":"https://doi.org/10.1109/WCSP55476.2022.10039128","url":null,"abstract":"In this paper, an intelligent reflecting surface (IRS) assisted wireless secure communication system in the presence of an untrusted relay is studied. A multi-antenna access point (AP) intends to send confidential information to a single-antenna user in the presence of an amplify-and-forward (AF) untrusted relay, which may eavesdrop the message when helping relay the signal. It is assumed that the direct link between the AP and the user is blocked by the obstacles. The achievable secrecy rate maximization problem is then formulated. To overcome the non-convexity of the formulated problem, an alternating iteration algorithm is proposed to jointly optimize the active and passive beamforming. Specifically, the transmit beamforming vector at the AP, the phase shift matrix at the IRS, and the relay beamforming matrix are jointly optimized to maximize the secrecy rate. Moreover, the asymptotic expressions for the maximum secrecy rates of the proposed scheme in the high and low signal-to-noise ratio (SNR) regimes of the AP-relay and relay-user links are derived as well. Finally, numerical evaluations demonstrate the superiority of the proposed scheme compared with other benchmark schemes, and validate the theoretical analysis. Some useful insights are also obtained, including the number of antennas at the AP, the scale selection and the phase shift settings at the IRS, and the potential cooperation gain of the untrusted relay.","PeriodicalId":199421,"journal":{"name":"2022 14th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127918267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dongdong Li, Zhutian Yang, Nan Zhao, Zhilu Wu, Yonghui Li, D. Niyato
{"title":"Joint Precoding and Jamming Design for Secure Transmission in NOMA-ISAC Networks","authors":"Dongdong Li, Zhutian Yang, Nan Zhao, Zhilu Wu, Yonghui Li, D. Niyato","doi":"10.1109/WCSP55476.2022.10039359","DOIUrl":"https://doi.org/10.1109/WCSP55476.2022.10039359","url":null,"abstract":"Integrated sensing and communication (ISAC) is an up-and-coming technique for future 6G networks. However, the communication message carried by the detection waveform will face the risk of being eavesdropped, which leads to the challenge of wireless security for ISAC networks. In this paper, we leverage non-orthogonal multiple access (NOMA) to support more users for the ISAC network, with the precoding well designed to guarantee the security. Specifically, we formulate a joint precoding optimization problem to maximize the sum secrecy rate for multiple users via artificial jamming, where the superimposed signal for NOMA users can be concurrently employed for the target detection. Since the optimization problem is non-convex, it is transformed into a convex one based on successive convex approximation (SCA). Then, we propose an iterative algorithm, through which the original optimization problem can be solved effectively. Simulation results show that the proposed secure NOMA-ISAC scheme can guarantee the secure transmission while ensuring the sensing performance.","PeriodicalId":199421,"journal":{"name":"2022 14th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115945164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting Spectral Resource Allocation Scheme for TDOA-Based Multiple Source Localization","authors":"Lanlan Huang, Yue Zhao, Zan Li, Chao Wang, B. Hao","doi":"10.1109/WCSP55476.2022.10039376","DOIUrl":"https://doi.org/10.1109/WCSP55476.2022.10039376","url":null,"abstract":"In the field of spectrum monitoring, the common visibility of sensors to the radio frequency (RF) source is the basic condition for passive localization and has an important influence on the real-time localization rate (RTLR). This paper presents the structure of cognitive wireless localization network (CWLN), which aims to maximize the RTLR by adjusting the spectral resource allocation strategy of sensors. We first present the definition of the RTLR and then regard it as the objective to formulate an optimization problem, where the decision variables are the sensors' real-time central frequencies (RTCFs). Since the problem is highly nonlinear, genetic algorithm (GA) is introduced to solve the problem effectively, and the time complexity is acceptable for practical application. Simulation results show that the optimization of sensors' RTCFs is helpful to improve the RTLRs of CWLN with respect to the RF sources. Simulations also prove the superiority of the proposed algorithm over the other three baseline algorithms.","PeriodicalId":199421,"journal":{"name":"2022 14th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115953146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel Charting-Based Pilot Assignment over Spatially Correlated Channels","authors":"Yamei Xu, Ming Zhao, Sihai Zhang, Gaoning He","doi":"10.1109/WCSP55476.2022.10039367","DOIUrl":"https://doi.org/10.1109/WCSP55476.2022.10039367","url":null,"abstract":"Massive multiple-input multiple-output (MIMO) is a promising technology to improve spectral efficiency (SE). However, because of limited pilot resources for channel estimation, pilot reuse among a large number of users is inevitable. It causes pilot contamination and will limit the system's performance. This paper proposes a channel charting (CC)-based pilot assignment (PA) method that assigns orthogonal pilot sequences to adjacent users on CC greedily to alleviate pilot interference with spatially correlated channels, where adjacent users on CC have stronger angular correlation. Moreover, a feature is explored from the second-order channel statistics for CC to extract more effective angular correlation among users. Pilot contamination is further mitigated by choosing the first assigned user which is prone to interference. Simulation results show that the proposed method has superiority over other PA methods, especially under the scenario that a large number of users need to be served.","PeriodicalId":199421,"journal":{"name":"2022 14th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132244690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MixerNet: Deep Learning for Eigenvector-Based CSI Feedback","authors":"Hongrui Shen, Long Zhao, Fei Wang, Yuhua Cao","doi":"10.1109/WCSP55476.2022.10039349","DOIUrl":"https://doi.org/10.1109/WCSP55476.2022.10039349","url":null,"abstract":"Deep learning (DL) methods have been widely used for channel state information (CSI) feedback to reduce the feedback overhead. CSI feedback mainly includes full CSI feedback and the eigenvector-based CSI feedback. This paper focuses on the eigenvector-based CSI feedback and designs a DL-based approach, referred to as MixerNet, where the joint eigenvector composed of multiple subbands is first compressed by an encoder at the transmitter and then recovered by a decoder at the receiver. On the other hand, the compressed information should be quantized before being transmitted to the decoder, therefore uniform quantization (UQ) and vector quantization (VQ) are respectively studied to improve the system performance. Experiment results indicate that the designed MixerNet could recover CSI with high reconstruction quality, however has fewer trainable parameters and lower computation complexity compared with existing DL-based methods. Moreover, VQ method in the MixerNet outperforms UQ method in terms of CSI reconstruction quality.","PeriodicalId":199421,"journal":{"name":"2022 14th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133956228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lei Wang, Haizhou Wang, Xue Jiang, Jingwu Cui, B. Zheng
{"title":"Multi-Access Edge Computing using Mode Division Multiple Access","authors":"Lei Wang, Haizhou Wang, Xue Jiang, Jingwu Cui, B. Zheng","doi":"10.1109/WCSP55476.2022.10039371","DOIUrl":"https://doi.org/10.1109/WCSP55476.2022.10039371","url":null,"abstract":"In order to meet the demand for bigger data and lower time of processing data in future industry and daily life, the paper proposes a scheme combining multi-access edge computing (MEC) and mode division multiple access (MDMA). To greatly reduce the MEC system transmission and data processing time of a scenario where multiple devices offload the large amount of data onto the MEC server within the coverage area of base station, modes are used as new communication resources with frequency to form resources blocks which will be allocated. Because the model of MEC system using MDMA contains continuous and boolean variables and the exclusive constraints about using resources blocks, the paper proposes an algorithm combining modified differential evolution (DE), tournament selection (TS) and logical operation, which has a great performance.","PeriodicalId":199421,"journal":{"name":"2022 14th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131781446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Scalable Source Coding Problem with Side Information Privacy","authors":"Jian Lu, Yinfei Xu, Zhenchao Zhu","doi":"10.1109/WCSP55476.2022.10039343","DOIUrl":"https://doi.org/10.1109/WCSP55476.2022.10039343","url":null,"abstract":"The rate-distortion-equivocation region has been derived recently for the Heegard-Berger problem, in which only one of the decoders has access to the correlated side information, under the constraint of the side information privacy which is desired to keep the side information private from the uninformed decoder. In this paper, this result is extended to two special cases of the scalable source coding problem, in which the encoder sends a two-layer description to two decoders such that the first layer can be received by both two decoders, while the second is only for one of two decoders. For the first case when the second-layer description is only available at the informed decoder, the set of all feasible rate-distortion-equivocation is characterized under the constraint of the side information privacy. For the other case when the second-layer description is only at the uninformed decoder, the inner bound and the outer bound of the rate-distortion-equivocation region are provided under the constraint of the side information privacy.","PeriodicalId":199421,"journal":{"name":"2022 14th International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133524567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}