{"title":"Variational message passing for joint localization and synchronization in wireless sensor networks","authors":"W. Yuan, N. Wu, Hua Wang, Bin Li, Jingming Kuang","doi":"10.1109/ICCCHINA.2014.7008317","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008317","url":null,"abstract":"We consider an asynchronous sensor network where target sensors aim to locate themselves unambiguously. Timing information is a vital requirement for time-based localization. Joint localization and synchronization estimation can improve position accuracy and reduce both communication overhead and power cost. In this paper, a novel distributed cooperative joint localization and synchronization algorithm based on factor graph and variational message passing (VMP) is proposed. We linearize the nonlinear terms in observation function in order to obtain a closed Gaussian form solution of the joint estimation problem. Simulation results show that the proposed joint localization and synchronization method performs very close to those sample based approaches with much lower complexity and communication overhead.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126301536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A random beamforming with threshold feedback scheme for multi-antenna system","authors":"Hao Hu, Hongwen Yang, Xiaoming Liu","doi":"10.1109/ICCCHINA.2014.7008323","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008323","url":null,"abstract":"Sum feedback rate can be a bottleneck for codebook-based multiple-input-multiple-output (MIMO) beamforming. So we propose a scheme using pseudorandom beamforming vectors and a threshold for feedback to address this problem. In our scheme, the base-station produces beamforming vectors in a pseudorandom way, and user calculates the angle between the beamforming vectors and its channel state information (CSI) vector, if the result meets some angle-threshold, the user feeds back its channel quality indicators (CQI). Assuming the base-station serves certain amount of users, adopting this scheme can largely reduce feedback bits with little channel capacity loss. And when the sum feedback rate of uplink channel is upper bounded by a constant, this scheme can have a better performance.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129811255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduced power centralized eICIC for LTE-advanced heterogeneous networks","authors":"Xibo Wang, Cheng Wang, Ruo Cai, Supeng Huang, Chaowei Wang, Weidong Wang","doi":"10.1109/ICCCHINA.2014.7008374","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008374","url":null,"abstract":"With heterogeneous network developing, eICIC technology is widely considered and developed. eICIC is introduced to address the problem of downlink interference in HetNet. In the traditional eICIC, some pico users are scheduled in the protected subframe (referred to as almost blank subframe ABS) in which macrocell stops scheduling users. This causes serious loss of the cell throughput which ABS is applied. In this paper, on the basis of centralized eICIC, reduced power centralized eICIC technology is put forward, which the macrocell reduces transmission power in the protected subframe. We use CRE pico user information transmission rate to calculate macrocell transmission power, then the macrocell transmits the reduced power. More macro users will be served, and cell throughput will be improved. Simulation results show that cell throughput and mean user throughput are improved by employing reduced power (RP) centralized eICIC.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acceleration of spatial channel model simulation using GPU","authors":"Qingqing Dang, Zhisong Bie","doi":"10.1109/ICCCHINA.2014.7008380","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008380","url":null,"abstract":"In traditional link level simulation, multiple-input and multiple-output (MIMO) channel model is one of the most time-consuming modules. When using more realistic geometry-based channel models, it consumes more time. In this paper, we propose an efficient simulator implementation of geometry-based spatial channel model (SCM) on graphics processing unit (GPU). We first analyze the potential parallelism of the SCM module. The SCM simulation includes generating channel coefficients, generating additive white Gaussian noise (AWGN), filtering input signals and adding noise. Secondly, we implement all those parallelizable sub-modules on GPU using the open computing language (OpenCL). Then, a lot of effective GPU accelerating approaches are employed to make all those GPU functions highly optimized. The approaches include out-of-order command queue, merging data, sharing local memory and vectorization. At last, we verify our approaches on Nvidia's mid-range GPU GTX660. The experiment result shows that our newly proposed GPU implementation achieves more than 1000 times speedup compared with the implementation on traditional central processing unit (CPU). The simulation time is close to the processing time of transmitter and receiver, which makes it possible to construct a real-time channel simulator of link level for long term evolution (LTE) or LTE-advanced system and software-defined radio. As far as we know, we are the first to accelerate the SCM model on GPU. The results of this paper should have significant application value in practice.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130159393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ajmal Sawand, S. Djahel, Zonghua Zhang, Farid Naït-Abdesselam
{"title":"Multidisciplinary approaches to achieving efficient and trustworthy eHealth monitoring systems","authors":"Ajmal Sawand, S. Djahel, Zonghua Zhang, Farid Naït-Abdesselam","doi":"10.1109/ICCCHINA.2014.7008269","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008269","url":null,"abstract":"The rapid technological convergence between Internet of Things (IoT), Wireless Body Area Networks (WBANs) and cloud computing have contributed to the emergence of e-healthcare, significantly improving the quality of medical care. In particular, patient-centric health monitoring plays a vital role in e-healthcare service, involving a set of important operations ranging from medical data collection and aggregation, data transmission and segregation, to data analytics. This survey paper firstly presents an architectural framework to describe the entire monitoring life cycle and highlight the essential service components. More detailed discussions are then devoted to data collection at patient side, which we argue that it serves as fundamental basis in achieving robust, efficient, and secure health monitoring. Finally, a set of design challenges is particularly analyzed for developing high quality and secure patient-centric monitoring schemes, along with some potential solutions.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127187026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secrecy outage probability analysis of multi-user multi-eavesdropper wireless systems","authors":"Yulong Zou, Jia Zhu, Gongpu Wang, Hua Shao","doi":"10.1109/ICCChina.2014.7008292","DOIUrl":"https://doi.org/10.1109/ICCChina.2014.7008292","url":null,"abstract":"In this paper, we explore the physical-layer security of a multi-user wireless system that consists of multiple users intending to transmit to a base station (BS), while multiple eavesdroppers attempt to tap the user transmissions. We examine the employment of multi-user scheduling for improving the transmission security against eavesdropping and propose a multiuser scheduling scheme, which only requires the channel state information (CSI) of BS without the need of the passive eavesdroppers' CSI. We also consider the round-robin scheduling for comparison purposes. The closed-form secrecy outage probability expressions of the round-robin scheduling and proposed multiuser scheduling are derived over Rayleigh fading channels. Numerical results demonstrate that the proposed multi-user scheduling outperforms the round-robin scheduling in terms of the secrecy outage probability. As the number of users increases, the secrecy outage probability of round-robin scheduling keeps unchanged. By contrast, the secrecy outage performance of the proposed multi-user scheduling improves significantly with an increasing number of users.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122367808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Shao, Haibin Li, Jinwei He, Sen Bian, I. Chih-Lin
{"title":"Energy saving technologies with interference reduction enhancement in OFDMA system","authors":"Z. Shao, Haibin Li, Jinwei He, Sen Bian, I. Chih-Lin","doi":"10.1109/ICCCHINA.2014.7008369","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008369","url":null,"abstract":"As energy saving becomes a major concern in LTE, we propose a novel energy saving approach with interference reduction enhancement in LTE. Firstly, new power model is introduced in energy saving gain analysis. Then three categories of symbol level PA shutdown schemes are analyzed and their performance is also evaluated quantitatively. In the end, a comprehensive strategy is proposed, simulation results show that it can achieve 15-20% energy gain and keep throughput at a reasonable level. It can be applied in current LTE network.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122220439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Zahid, B. Dai, Yao Chen, Dong Wang, Chunxian Tao, Dawei Zhang, Xu Wang
{"title":"±π/2-Phase-shift spectral phase encoding for security improvement in the optical code based system","authors":"A. Zahid, B. Dai, Yao Chen, Dong Wang, Chunxian Tao, Dawei Zhang, Xu Wang","doi":"10.1109/ICCCHINA.2014.7008258","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008258","url":null,"abstract":"A novel spectral phase encoding scheme by using ±π/2 phase shift in the en/decoding is proposed. The scheme can submerge the code information in the encoded signals well, improving the security against code extraction from the encoded signals. Furthermore, based on the theoretical analysis, the coding performance of the proposed scheme is guaranteed.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128192610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xin Wei, Jianxin Chen, Lei Wang, Jingwu Cui, B. Zheng
{"title":"Variational learning and inference algorithms for extended Gaussian mixture model","authors":"Xin Wei, Jianxin Chen, Lei Wang, Jingwu Cui, B. Zheng","doi":"10.1109/ICCCHINA.2014.7008278","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008278","url":null,"abstract":"In this paper, in order to properly evaluate the relative importance of priors and observed data in the Bayesian framework, we propose an extended Gaussian mixture model (EGMM) and design the corresponding learning inference algorithms. First, we define the likelihood function of the EGMM and then propose the variational learning algorithm for this EGMM. Moreover, the proposed model and approach are applied to speaker recognition. Experimental results demonstrate that this new approach generalizes the traditional GMM, offering a more powerful performance.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128343216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure performance analysis of cognitive two-way relay system with an eavesdropper","authors":"Qi Gu, Gongpu Wang, Rongfei Fan, Z. Zhong","doi":"10.1109/ICCCHINA.2014.7008267","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008267","url":null,"abstract":"This paper investigates the system performance of two-way relay channel with an eavesdropper in cognitive network, where two users exchange their information via an assisting relay based on the detection results of the primary users. Specifically, when the two-way relay system detects that the primary users do not occupy the spectrum, they will perform the two-way transmission. Otherwise, they will keep silent. Besides, an eavesdropper tries its best to overhear the information from the two-way transmission. For such a system, its performance in terms of the intercept probability is derived over Rayleigh fading channels. Numerical results are provided to show the intercept performance of the system versus the system transmission power and data rate threshold.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128418817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}