{"title":"Blocking performances for fixed/flexible-grid and sub-band conversion in optical networks","authors":"Yamei Gu, Xin Yuan, S. You","doi":"10.1109/ICCCHINA.2014.7008254","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008254","url":null,"abstract":"With the rapid growth of data rate, the optical network is evolving from fixed-grid to flexible-grid to provide spectrum-efficient and scalable transport of 100Gb/s services and beyond. In this paper, we analyzed the blocking performances for fixed/flexible-grid and sub-band conversion in optical networks. Flexible-grid and sub-band conversion demonstrated the good performances on traffic blocking and spectral utilization. Moreover, wavelength converter plays a key role in improving the blocking performances of fixed/flexible-grid networks.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"481 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122746702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Yuan, Ganlin Hao, N. Wu, Hua Wang, Jingming Kuang
{"title":"Passive localization with inaccurate receivers based on Gaussian belief propagation on factor graph","authors":"W. Yuan, Ganlin Hao, N. Wu, Hua Wang, Jingming Kuang","doi":"10.1109/ICCCHINA.2014.7008320","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008320","url":null,"abstract":"Location awareness is now becoming vital requirement for many practical applications. In this paper, we consider a wireless network where there is one transmitter and multiple receivers and they aim to locate a passive target. Existing studies on passive localization assume receivers' positions are perfectly known. However, receivers' positions are generally inaccurate in actual scenarios. A factor graph based message passing algorithm is proposed to locate the passive target with inaccurate receivers. The nonlinear term in likelihood function is linearized to solve the intractable integrals. Accordingly, all messages on factor graph are obtained in Gaussian closed forms which reduce the computational complexity significantly. Simulation results show the proposed algorithm can not only estimate the target's position accurately but also determine the receivers' positions simultaneously with low complexity.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"81 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131287888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel distributed power control based on game theory in cognitive wireless network","authors":"Xiaofang Deng, Weiwei Xia, Q. Guan, Shu-Yu Lin, Shengming Jiang","doi":"10.1109/ICCCHINA.2014.7008243","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008243","url":null,"abstract":"To make full use of the spectrum resources with the coexistence of primary users (PUs) and secondary users (SUs) in cognitive radio networks (CRNs), we jointly consider the signal-to-interference-plus-noise ratio (SINR) and the transmission power of SUs to build a relevant interference model in this paper. Based on non-cooperative game theory, we propose a novel power control algorithm with a new utility function to adjust the transmission power of SUs, with which each SU can choose an optimal transmission power for its best utility selfishly. We prove its convergence and the existence and uniqueness of the Nash equilibrium. Simulation results show that our proposed algorithm not only satisfies the SINR condition, but also enables SUs to have proper transmission power levels. In addition, our proposed algorithm, compared with classical algorithms, has better anti-noise effect and capacity performance.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131912289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yin Zhang, Nan Liu, Zhiwen Pan, Tianle Deng, X. You
{"title":"A fault detection model for mobile communication systems based on linear prediction","authors":"Yin Zhang, Nan Liu, Zhiwen Pan, Tianle Deng, X. You","doi":"10.1109/ICCCHINA.2014.7008366","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008366","url":null,"abstract":"With the increasing demand for self-healing techniques in mobile cellular networks, the fault detection method which is the first step of self-healing is studied. As user actions and the wireless environment greatly influence the key performance indicators (KPIs), most of the existing detection methods need to build multiple models to fit different operating scenarios of the network. In this paper, a novel detection model is presented that can automatically adapt to the normal variation of the KPIs caused by the change in environment and/or user actions, and accurately detect the abnormality caused by real system faults. The detection model is based on a linear prediction algorithm and the normalization process of the prediction deviation makes the model more simple and flexible to use. The proposed detection model has been tested in a simulated LTE environment, and the results show that the model can indeed detect real system faults while tracking the normal variations of the KPIs of the network.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting large scale BSS technique for source recovery in massive MIMO systems","authors":"Zhongqiang Luo, Lidong Zhu, Chengjie Li","doi":"10.1109/ICCCHINA.2014.7008308","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008308","url":null,"abstract":"This paper considers (Blind Source Separation) BSS-based unobserved signal recovery mechanism in large-scale multiple-input multiple-output (MIMO) communication systems, also referred to as “massive MIMO”. On account of the larger number of the observations in massive MIMO system, the separation task will be time-consuming or even failing because the conventional blind separation methods are only suited to small scale system. Therefore, we propose a fast large scale blind separation algorithm to overcome these limitations. Theoretical analysis and simulation results demonstrate that the effective performance of the massive MIMO assisted by the proposed large-scale BSS technique can be acquired.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"43 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133784248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust joint beamforming and artificial noise design for secure AF relay networks","authors":"Chao Wang, Huiming Wang","doi":"10.1109/ICCCHINA.2014.7008310","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008310","url":null,"abstract":"This letter studies the secure cooperative transmission for an amplify-and-forward (AF) relay network in the presence of multiple multi-antenna eavesdroppers. Since the perfect channel state information (CSI) of the eavesdroppers are not available, we propose a robust joint distributed beamforming and artificial noise scheme to maximize the worst-case secrecy rate of the network, under the total power constraint of all the relay nodes. With the semidefinite relaxation (SDR) technique, the design can be solved by a one-dimension search which involves a sequence of semidefinite programming (SDP). Simulation results demonstrate the validity of the proposed strategy.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129724406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defending jamming attacks in wireless sensor networks using stackelberg monitoring strategies","authors":"E. Karapistoli, A. Economides","doi":"10.1109/ICCCHINA.2014.7008264","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008264","url":null,"abstract":"Due to their unattended and broadcast nature wireless sensor networks (WSNs) are vulnerable to various types of attacks, among which a particularly harmful form of attack, the jamming attack. Game theory provides robust tools to model and investigate such attacks. In this paper, we study a class of such jamming games played at the physical layer among a set of monitor nodes and the jammer. We formulate the problem using a Bayesian Stackelberg game. The derived Stackelberg equilibrium strategies define the expected performance of the defender under jamming attacks, and motivate a security-aware protocol design for this type of wireless networks. Different network scenarios are studied to illustrate that the proposed game theoretic approach significantly reduces the ability of the attacker to jam the network.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133856877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Licai Fang, Lu Xu, Qinghua Guo, D. Huang, S. Nordholm
{"title":"A hybrid iterative MIMO detection algorithm: Partial Gaussian approach with integer programming","authors":"Licai Fang, Lu Xu, Qinghua Guo, D. Huang, S. Nordholm","doi":"10.1109/ICCChina.2014.7008322","DOIUrl":"https://doi.org/10.1109/ICCChina.2014.7008322","url":null,"abstract":"In this paper, after showing MMSE-SIC suffers from performance loss when the channel is spatially correlated for Massive MIMO, we propose an effective hybrid iterative detection algorithm named partial Gaussian approach with integer programming (PGA-IP) to handle correlated channels. In PGA-IP, a partial gaussian approach is first employed to reduce the massive MIMO detection (with large dimension Nt ×Nr MIMO channel) to a problem of marginalizing M (M is a parameter and M≪ Nt, Nr) discrete valued symbols over an M-degree quadratic function. Then we employ integer programming which is a tree based branch-and-bound search algorithm to further reduce the complexity of the M-dimensional marginalization. Simulation results show that the proposed PGA-IP outperforms MMSE-SIC by about 5dB under heavily correlated channel with only several times of increased computational complexity. At the same time, with about 5% of the complexity of the exact PGA algorithm, the proposed PGA-IP only suffers marginal performance penalty.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134242074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal transmission policy for energy-harvesting powered MIMO multi-access channels","authors":"Wenming Li, Zheng Nan, Xin Wang, Xiaolin Zhou","doi":"10.1109/ICCCHINA.2014.7008288","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008288","url":null,"abstract":"This paper develops a novel approach to obtaining the optimal scheduling strategy in a multi-input multi-output (MIMO) multi-access channel (MAC), where each transmitter is powered by harvesting energy from the environmental sources. Relying on the convex optimization tools, the proposed approach provides a low-complexity iterative block coordinate ascent algorithm to obtain the optimal transmission policy that maximizes the weighted sum-throughput for MIMO MAC. The proposed approach provides optimal benchmarks for all practical schemes in energy-harvesting powered MIMO MAC transmissions.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133033658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trillions of nodes for 5G!?","authors":"I. Chih-Lin, Shuangfeng Han, Yami Chen, Gang Li","doi":"10.1109/ICCCHINA.2014.7008280","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008280","url":null,"abstract":"With the rapid development of internet of things (IoT) with various low-cost machine type communications (MTC) devices, intelligent wearable devices, vehicular sensors and environmental sensors etc, it's anticipated that trillions of wireless nodes in IoT with diversified applications and services may come to life in the fifth generation wireless communication system (5G). These devices, however, may not be handled efficiently by the current wireless communication networks, which were not designed for frequent small data packets and simultaneous massive accesses. In this paper, a novel aggregator based MTC communication architecture is proposed, where the aggregators function as MTC gateways towards the cellular network, combining connections of masive devices into single connection. Correspondingly, based on the aggregated packet characteristics and data relay modes, the aggregators will request for aggregator specific radio resource control (RRC) mechanism. Simply put, always available connectivity is desired for contiguous packets with low latency, while coordinated transmission among multiple aggregators are preferred for packets with larger delay tolerance. Through various analysis and numerical results, MTC communication with aggregators are expected to bring much improved signaling efficiency, thus handling the gigantic pressure on 5G network design from the potential trillions of MTC devices.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134541821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}