2016 IEEE International Conference on Communication Systems (ICCS)最新文献

筛选
英文 中文
On minimizing retransmission times based on C-IDNC for wireless broadcasting 基于C-IDNC的无线广播重传时间最小化研究
2016 IEEE International Conference on Communication Systems (ICCS) Pub Date : 2016-12-01 DOI: 10.1109/ICCS.2016.7833611
Teng Niu, Dongmei Zhang, Kui Xu, Fei Wang
{"title":"On minimizing retransmission times based on C-IDNC for wireless broadcasting","authors":"Teng Niu, Dongmei Zhang, Kui Xu, Fei Wang","doi":"10.1109/ICCS.2016.7833611","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833611","url":null,"abstract":"We are concerned with designing feedback-based adaptive Instantly Decodable Network Coding (IDNC) schemes with the aim of minimizing retransmission times in wireless multicast and broadcast scenarios. In this paper, we first analyze the multiple factors influencing the transmission times and give the quantitative formula. Meantime, we introduce the concept of Cache-based Instantly Decodable Network Coding (C-IDNC) that the correctly received undecodable retransmission packets are waited in the cache for a future network decoding opportunity rather than delete. Then, we formulate the retransmission times minimization problem as an max-weight search problem and propose efficient algorithms for finding its optimal solution. Further, we propose a heuristic algorithms with worst case linear execution complexity based on sorting and iteration. Simulation results show that our proposed algorithms significantly reduce the IDNC retransmission times compared to previous works.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124055363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A secure routing based on social trust in opportunistic networks 机会主义网络中基于社会信任的安全路由
2016 IEEE International Conference on Communication Systems (ICCS) Pub Date : 2016-12-01 DOI: 10.1109/ICCS.2016.7833575
Li Li, Xiaoxiong Zhong, Yang Qin
{"title":"A secure routing based on social trust in opportunistic networks","authors":"Li Li, Xiaoxiong Zhong, Yang Qin","doi":"10.1109/ICCS.2016.7833575","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833575","url":null,"abstract":"Routing plays an important role in opportunistic networks (OPPNETs). Many routing schemes in OPPNETs assume that data dissemination is not attacked by misbehavior nodes. However, in practice, OPPNETs may be susceptible to various kinds of attacks due to frequent disruption in communication links. In this paper, we propose a social trust model for secure routing in OPPNETs, which exploits the contact status, forwarding ability and common attributes to evaluate social trust. And then, we propose a novel trust based routing algorithm and buffer management algorithm for the secure routing strategy, considering network coding in data dissemination. This routing strategy not only ensures data dissemination via trusted nodes but also reduces delivery cost while traversing through trusted paths. Demonstrated by simulation results in ONE, the proposed secure routing can achieve better performance in terms of delivery ratio, delivery delay and delivery cost as compared to existing solutions.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"328 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124623984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Deep learning-based automated modulation classification for cognitive radio 基于深度学习的认知无线电自动调制分类
2016 IEEE International Conference on Communication Systems (ICCS) Pub Date : 2016-12-01 DOI: 10.1109/ICCS.2016.7833571
G. Mendis, Jin Wei, A. Madanayake
{"title":"Deep learning-based automated modulation classification for cognitive radio","authors":"G. Mendis, Jin Wei, A. Madanayake","doi":"10.1109/ICCS.2016.7833571","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833571","url":null,"abstract":"Automated Modulation Classification (AMC) has been applied in various emerging areas such as cognitive radio (CR). In our paper, we propose a deep learning-based AMC method that employs Spectral Correlation Function (SCF). In our proposed method, one deep learning technology, Deep Belief Network (DBN), is applied for pattern recognition and classification. By using noise-resilient SCF signatures and DBN that is effective in learning complex patterns, we achieve high accuracy in modulation detection and classification even in the presence of environment noise. Our simulation results illustrate the efficiency of our proposed method in classifying 4FSK, 16QAM, BPSK, QPSK, and OFDM modulation techniques in various environments.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129431325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 120
A two-stage spectrum leasing optimization framework for virtual mobile network operators 面向虚拟移动网络运营商的两阶段频谱租赁优化框架
2016 IEEE International Conference on Communication Systems (ICCS) Pub Date : 2016-12-01 DOI: 10.1109/ICCS.2016.7833595
Yingxiao Zhang, Suzhi Bi, Y. Zhang
{"title":"A two-stage spectrum leasing optimization framework for virtual mobile network operators","authors":"Yingxiao Zhang, Suzhi Bi, Y. Zhang","doi":"10.1109/ICCS.2016.7833595","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833595","url":null,"abstract":"Wireless network visualization (WNV) allows mobile network operators (MNOs) to lease its network infrastructure or licensed spectrum to virtual mobile network operators (VMNOs). A VMNO in WNV pays the MNOs for leasing wireless resources and receives payments from its mobile subscribers (MSs) based on the qualities of communication services. In this paper, we propose a novel two-stage spectrum leasing framework to maximize the average profit of a VMNO. Specifically, a VMNO can first make long-term spectrum lease based on the prediction of the average user traffic intensity over a long time period. Besides, the VMNO can flexibly make additional short-term leases based on the actual realizations of MS locations. We adopt a general alpha-fairness utility function to evaluate the qualities of downlink services to MSs. Within the proposed framework, we derive a closed-form expression for the optimal short-term leasing strategy for the VMNO, based on which we then propose an efficient algorithm to calculate the optimal long-term lease strategy. Simulation results show that the proposed two-stage spectrum leasing strategies can effectively increase the profit of VMNOs.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132023305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Robust power allocation in two-tier spectrum-sharing femtocell networks 两层频谱共享飞蜂窝网络的鲁棒功率分配
2016 IEEE International Conference on Communication Systems (ICCS) Pub Date : 2016-12-01 DOI: 10.1109/ICCS.2016.7833555
Mengli Wang, Xiaoyu Wan, Zheng-qiang Wang, Zi-fu Fan
{"title":"Robust power allocation in two-tier spectrum-sharing femtocell networks","authors":"Mengli Wang, Xiaoyu Wan, Zheng-qiang Wang, Zi-fu Fan","doi":"10.1109/ICCS.2016.7833555","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833555","url":null,"abstract":"This paper investigates the robust power allocation problem in spectrum-sharing femtocell networks, where there is one central macrocell and multiple femtocells. The problem aims to maximize the sum-rate of femtocell user equipments (FUEs) while guaranteeing the quality of service (QoS) of the macrocell user equipment (MUE) in the sparsely deployed scenario and densely deployed scenario of two-tier femtocell networks. Based on ellipsoid sets to describe channel uncertainties, we transform the formulated problem into a deterministic convex optimization problem adopting the worst-case optimization. We give the closed-form optimal robust power allocation of each FUE in the sparsely deployed scenario. In the densely deployed scenario, we obtain the lower bound on the sum-rate of FUEs. Simulation results demonstrate the effectiveness of the proposed robust power allocation algorithm.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128798018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A unified beamforming structure for wireless multicasting and power transfer in MIMO systems 一种用于MIMO系统无线多播和功率传输的统一波束形成结构
2016 IEEE International Conference on Communication Systems (ICCS) Pub Date : 2016-12-01 DOI: 10.1109/ICCS.2016.7833600
Jie Chen, Ying-Chang Liang, Gang Yang
{"title":"A unified beamforming structure for wireless multicasting and power transfer in MIMO systems","authors":"Jie Chen, Ying-Chang Liang, Gang Yang","doi":"10.1109/ICCS.2016.7833600","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833600","url":null,"abstract":"This paper studies the downlink beamforming design problem in multi-user multi-input-multi-output (MIMO) systems. Specifically, two related scenarios are considered: max-min signal-to-noise ratios (SNR) in wireless multicasting and max-min power in wireless power transfer (WPT). The conventional approach recasts the original nonconvex problems into convex semidefinite programming (SDP) by applying semidefinite relaxation (SDR) technique. This approach directly optimizes the transmit beamforming vector, thus suffers from high computational complexity when the number of transmit antennas at the base station (BS) is large. In this paper, we propose a unified and optimal beamforming structure which is expressed as a linear combination of the channel vectors of all users. With this proposed structure, the problem of beamforming design is thus simplified to optimize the combining weight vector, the dimension of which equals the number of users. This indirect optimization can significantly reduce the computational complexity of the transmit beamforming design, especially for massive MIMO systems. Numerical results show that by using the proposed beamforming structure, the complexity of indirect optimization is significantly reduced without suffering performance degradation, compared to the conventional direct optimization.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"56 90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128840189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Max-min fair robust beamforming design for multi-user MISO SWIPT systems 多用户MISO SWIPT系统的最大最小公平稳健波束形成设计
2016 IEEE International Conference on Communication Systems (ICCS) Pub Date : 2016-12-01 DOI: 10.1109/ICCS.2016.7833634
Sha Zhang, H. Zhang, Luxi Yang
{"title":"Max-min fair robust beamforming design for multi-user MISO SWIPT systems","authors":"Sha Zhang, H. Zhang, Luxi Yang","doi":"10.1109/ICCS.2016.7833634","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833634","url":null,"abstract":"This paper proposes a robust transmission design for simultaneous wireless information and power transfer (SWIPT) in a multiuser multiple-input single-output (MISO) broadcast system, under the assumption of imperfect channel state information (CSI) at the transmitter. Our design objective is to maximize the minimum harvested energy of all the receivers by jointly optimizing the transmit beamforming vectors and the power splitting ratios while guaranteeing the signal-to-interference-and-noise ratio (SINR) and total transmit power constraints. The aforementioned max-min problem is non-convex due to the existing of infinite number of constraints, and thus it is difficult to solve. To tackle it, we first convert it into an easier non-convex problem with finite constraints by using some certain transformation techniques. Then, with the aid of the semidefinite relaxation (SDR) technique, we further obtain a relaxed semidefinite programming (SDP) problem, which is convex and thus can be solved efficiently by using interior point methods. Finally, simulation results are provided to validate the robustness and effectiveness of the proposed scheme.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126671878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance improvement study and an asynchronous transmission WDMA protocol for various size internet packets MANs 性能改进研究和异步传输WDMA协议的各种大小的互联网分组城域网
2016 IEEE International Conference on Communication Systems (ICCS) Pub Date : 2016-12-01 DOI: 10.1109/ICCS.2016.7833584
P. Baziana
{"title":"Performance improvement study and an asynchronous transmission WDMA protocol for various size internet packets MANs","authors":"P. Baziana","doi":"10.1109/ICCS.2016.7833584","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833584","url":null,"abstract":"The nature of the asynchronous transmission of variable size IP packets in a wavelength division multiplexing (WDM) ring MAN is studied in this paper. Especially, we introduce an asynchronous transmission WDMA protocol that takes provision to avoid both the data channels and the receiver collisions employing an effective transmission strategy at each node in a decentralized way. In this way, the proposed protocol achieves optimal fiber bandwidth exploitation, especially under high load conditions. The proposed network architecture uses all wavelengths for both transmission and reception, since each node is equipped with a tunable transmitter and a set of fixed tuned receivers. The strong advantage of the proposed WDMA protocol is that it achieves almost 290% throughput improvement as compared with another relative one. Finally, the performance measures evaluation is based on the simulation results of a Poisson traffic model that was properly developed.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"34 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120967799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards fake sources for source location privacy in wireless sensor networks with multiple sources 多源无线传感器网络中源位置隐私的伪源研究
2016 IEEE International Conference on Communication Systems (ICCS) Pub Date : 2016-12-01 DOI: 10.1109/ICCS.2016.7833572
Joanna F. Laikin, M. Bradbury, Chen Gu, Matthew Leeke
{"title":"Towards fake sources for source location privacy in wireless sensor networks with multiple sources","authors":"Joanna F. Laikin, M. Bradbury, Chen Gu, Matthew Leeke","doi":"10.1109/ICCS.2016.7833572","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833572","url":null,"abstract":"Wireless sensor networks (WSNs) are regularly used in asset monitoring applications, where the location of an asset or assets must be kept private. Providing location privacy for such an asset is tantamount to protecting the location of a source node from an attacker who is attempting to locate it. Although no solution exists to provide source location privacy over an extended period, it has been shown that attackers can be sufficiently inhibited by prominent approaches that use either a phantom node, via which protocol messages are routed, or nodes assigned to be fake sources, each of which then broadcast fake messages. However, the applicability of fake source approaches to networks where location privacy must be maintained for multiple sources has yet to be considered. This paper addresses this issue by analysing a representative fake source algorithm in the context of multiple sources, presenting simulation results that demonstrate the shortcomings of the approach and identifying the underlying limitations to pave the way for the development of algorithms capable of accounting for multiple sources.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123030245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Low-complexity DGT-based GFDM receivers in broadband channels 宽带信道中基于dgm的低复杂度GFDM接收机
2016 IEEE International Conference on Communication Systems (ICCS) Pub Date : 2016-12-01 DOI: 10.1109/ICCS.2016.7833550
Peng Wei, X. Xia, Yue Xiao, Shaoqian Li
{"title":"Low-complexity DGT-based GFDM receivers in broadband channels","authors":"Peng Wei, X. Xia, Yue Xiao, Shaoqian Li","doi":"10.1109/ICCS.2016.7833550","DOIUrl":"https://doi.org/10.1109/ICCS.2016.7833550","url":null,"abstract":"Recently, generalized frequency division multiplexing (GFDM) is a multicarrier 5G waveform candidate for flexibility of its pulse shaping filters. However, the flexible pulse shaping filters may result in inter carrier interference (ICI) and inter symbol interference (ISI), which become more severe in a broadband channel. In this paper, for the elimination of the ISI and ICI, based on discrete Gabor transform (DGT), a transmit GFDM signal is first treated as an inverse DGT (IDGT), and then a frequency-domain DGT is proposed to recover the GFDM signal at the receiver. Furthermore, for the complexity reduction, a suboptimal frequency-domain DGT called local DGT (LDGT) is developed. Theoretical analyses and simulation results show that the proposed DGT can obtain promising bit-to-error rate (BER) performance with low complexity.","PeriodicalId":282352,"journal":{"name":"2016 IEEE International Conference on Communication Systems (ICCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133943506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信