Digital Communications and Networks最新文献

筛选
英文 中文
Secure beamforming designs for maximizing secrecy sum rate in MISO-NOMA networks 在MISO-NOMA网络中最大化保密和速率的安全波束成形设计
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-02-01 DOI: 10.1016/j.dcan.2023.04.001
Yanbo Zhang , Zheng Yang , Jingjing Cui , Xianfu Lei , Yi Wu , Jun Zhang , Chao Fang , Zhiguo Ding
{"title":"Secure beamforming designs for maximizing secrecy sum rate in MISO-NOMA networks","authors":"Yanbo Zhang ,&nbsp;Zheng Yang ,&nbsp;Jingjing Cui ,&nbsp;Xianfu Lei ,&nbsp;Yi Wu ,&nbsp;Jun Zhang ,&nbsp;Chao Fang ,&nbsp;Zhiguo Ding","doi":"10.1016/j.dcan.2023.04.001","DOIUrl":"10.1016/j.dcan.2023.04.001","url":null,"abstract":"<div><div>In this paper, the application of Non-Orthogonal Multiple Access (NOMA) is investigated in a multiple-input single-output network consisting of multiple legitimate users and a potential eavesdropper. To support secure transmissions from legitimate users, two NOMA Secrecy Sum Rate Transmit BeamForming (NOMA-SSR-TBF) schemes are proposed to maximise the SSR of a Base Station (BS) with sufficient and insufficient transmit power. For BS with sufficient transmit power, an artificial jamming beamforming design scheme is proposed to disrupt the potential eavesdropping without impacting the legitimate transmissions. In addition, for BS with insufficient transmit power, a modified successive interference cancellation decoding sequence is used to reduce the impact of artificial jamming on legitimate transmissions. More specifically, iterative algorithm for the successive convex approximation are provided to jointly optimise the vectors of transmit beamforming and artificial jamming. Experimental results demonstrate that the proposed NOMA-SSR-TBF schemes outperforms the existing works, such as the maximized artificial jamming power scheme, the maximized artificial jamming power scheme with artificial jamming beamforming design and maximized secrecy sum rate scheme without artificial jamming beamforming design.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 1","pages":"Pages 83-91"},"PeriodicalIF":7.5,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44594948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-agent deep reinforcement learning based resource management in heterogeneous V2X networks 异构V2X网络中基于多agent深度强化学习的资源管理
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-02-01 DOI: 10.1016/j.dcan.2023.06.003
Junhui Zhao , Fajin Hu , Jiahang Li , Yiwen Nie
{"title":"Multi-agent deep reinforcement learning based resource management in heterogeneous V2X networks","authors":"Junhui Zhao ,&nbsp;Fajin Hu ,&nbsp;Jiahang Li ,&nbsp;Yiwen Nie","doi":"10.1016/j.dcan.2023.06.003","DOIUrl":"10.1016/j.dcan.2023.06.003","url":null,"abstract":"<div><div>In Heterogeneous Vehicle-to-Everything Networks (HVNs), multiple users such as vehicles and handheld devices and infrastructure can communicate with each other to obtain more advanced services. However, the increasing number of entities accessing HVNs presents a huge technical challenge to allocate the limited wireless resources. Traditional model-driven resource allocation approaches are no longer applicable because of rich data and the interference problem of multiple communication modes reusing resources in HVNs. In this paper, we investigate a wireless resource allocation scheme including power control and spectrum allocation based on the resource block reuse strategy. To meet the high capacity of cellular users and the high reliability of Vehicle-to-Vehicle (V2V) user pairs, we propose a data-driven Multi-Agent Deep Reinforcement Learning (MADRL) resource allocation scheme for the HVN. Simulation results demonstrate that compared to existing algorithms, the proposed MADRL-based scheme achieves a high sum capacity and probability of successful V2V transmission, while providing close-to-limit performance.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 1","pages":"Pages 182-190"},"PeriodicalIF":7.5,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46012679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory optimization for UAV-enabled relaying with reinforcement learning 基于强化学习的无人机中继轨迹优化
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-02-01 DOI: 10.1016/j.dcan.2023.07.006
Chiya Zhang , Xinjie Li , Chunlong He , Xingquan Li , Dongping Lin
{"title":"Trajectory optimization for UAV-enabled relaying with reinforcement learning","authors":"Chiya Zhang ,&nbsp;Xinjie Li ,&nbsp;Chunlong He ,&nbsp;Xingquan Li ,&nbsp;Dongping Lin","doi":"10.1016/j.dcan.2023.07.006","DOIUrl":"10.1016/j.dcan.2023.07.006","url":null,"abstract":"<div><div>In this paper, we investigate the application of the Unmanned Aerial Vehicle (UAV)-enabled relaying system in emergency communications, where one UAV is applied as a relay to help transmit information from ground users to a Base Station (BS). We maximize the total transmitted data from the users to the BS, by optimizing the user communication scheduling and association along with the power allocation and the trajectory of the UAV. To solve this non-convex optimization problem, we propose the traditional Convex Optimization (CO) and the Reinforcement Learning (RL)-based approaches. Specifically, we apply the block coordinate descent and successive convex approximation techniques in the CO approach, while applying the soft actor-critic algorithm in the RL approach. The simulation results show that both approaches can solve the proposed optimization problem and obtain good results. Moreover, the RL approach establishes emergency communications more rapidly than the CO approach once the training process has been completed.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 1","pages":"Pages 200-209"},"PeriodicalIF":7.5,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48410017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An integrated strategy of AEF attribute evaluation for reliable thunderstorm detection 用于可靠雷暴探测的 AEF 属性评估综合策略
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-02-01 DOI: 10.1016/j.dcan.2023.11.002
Xu Yang , Hongyan Xing , Xinyuan Ji , Xin Su , Witold Pedrycz
{"title":"An integrated strategy of AEF attribute evaluation for reliable thunderstorm detection","authors":"Xu Yang ,&nbsp;Hongyan Xing ,&nbsp;Xinyuan Ji ,&nbsp;Xin Su ,&nbsp;Witold Pedrycz","doi":"10.1016/j.dcan.2023.11.002","DOIUrl":"10.1016/j.dcan.2023.11.002","url":null,"abstract":"<div><div>Thunderstorm detection based on the Atmospheric Electric Field (AEF) has evolved from time-domain models to space-domain models. It is especially important to evaluate and determine the particularly Weather Attribute (WA), which is directly related to the detection reliability and authenticity. In this paper, a strategy is proposed to integrate three currently competitive WA's evaluation methods. First, a conventional evaluation method based on AEF statistical indicators is selected. Subsequent evaluation approaches include competing AEF-based predicted value intervals, and AEF classification based on fuzzy <em>c</em>-means. Different AEF attributes contribute to a more accurate AEF classification to different degrees. The resulting dynamic weighting applied to these attributes improves the classification accuracy. Each evaluation method is applied to evaluate the WA of a particular AEF, to obtain the corresponding evaluation score. The integration in the proposed strategy takes the form of a score accumulation. Different cumulative score levels correspond to different final WA results. Thunderstorm imaging is performed to visualize thunderstorm activities using those AEFs already evaluated to exhibit thunderstorm attributes. Empirical results confirm that the proposed strategy effectively and reliably images thunderstorms, with a 100% accuracy of WA evaluation. This is the first study to design an integrated thunderstorm detection strategy from a new perspective of WA evaluation, which provides promising solutions for a more reliable and flexible thunderstorm detection.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 1","pages":"Pages 234-245"},"PeriodicalIF":7.5,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138614164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hierarchical blockchain-enabled distributed federated learning system with model contribution based rewarding 基于模型贡献奖励的分层区块链分布式联合学习系统
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2025-02-01 DOI: 10.1016/j.dcan.2024.07.002
Haibo Wang , Hongwei Gao , Teng Ma , Chong Li , Tao Jing
{"title":"A hierarchical blockchain-enabled distributed federated learning system with model contribution based rewarding","authors":"Haibo Wang ,&nbsp;Hongwei Gao ,&nbsp;Teng Ma ,&nbsp;Chong Li ,&nbsp;Tao Jing","doi":"10.1016/j.dcan.2024.07.002","DOIUrl":"10.1016/j.dcan.2024.07.002","url":null,"abstract":"<div><div>Distributed Federated Learning (DFL) technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets, making it a desirable solution for decentralized and privacy-preserving Web3 scenarios. However, DFL faces incentive and security challenges in the decentralized framework. To address these issues, this paper presents a Hierarchical Blockchain-enabled DFL (HBDFL) system, which provides a generic solution framework for the DFL-related applications. The proposed system consists of four major components, including a model contribution-based reward mechanism, a Proof of Elapsed Time and Accuracy (PoETA) consensus algorithm, a Distributed Reputation-based Verification Mechanism (DRTM) and an Accuracy-Dependent Throughput Management (ADTM) mechanism. The model contribution-based rewarding mechanism incentivizes network nodes to train models with their local datasets, while the PoETA consensus algorithm optimizes the tradeoff between the shared model accuracy and system throughput. The DRTM improves the system efficiency in consensus, and the ADTM mechanism guarantees that the throughput performance remains within a predefined range while improving the shared model accuracy. The performance of the proposed HBDFL system is evaluated by numerical simulations, with the results showing that the system improves the accuracy of the shared model while maintaining high throughput and ensuring security.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 1","pages":"Pages 35-42"},"PeriodicalIF":7.5,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141716872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new technology perspective of the Metaverse: Its essence, framework and challenges 虚拟世界的新技术视角:其本质、框架和挑战
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-12-01 DOI: 10.1016/j.dcan.2023.02.017
Feifei Shi , Huansheng Ning , Xiaohong Zhang , Rongyang Li , Qiaohui Tian , Shiming Zhang , Yuanyuan Zheng , Yudong Guo , Mahmoud Daneshmand
{"title":"A new technology perspective of the Metaverse: Its essence, framework and challenges","authors":"Feifei Shi ,&nbsp;Huansheng Ning ,&nbsp;Xiaohong Zhang ,&nbsp;Rongyang Li ,&nbsp;Qiaohui Tian ,&nbsp;Shiming Zhang ,&nbsp;Yuanyuan Zheng ,&nbsp;Yudong Guo ,&nbsp;Mahmoud Daneshmand","doi":"10.1016/j.dcan.2023.02.017","DOIUrl":"10.1016/j.dcan.2023.02.017","url":null,"abstract":"<div><div>The Metaverse depicts a parallel digitalized world where virtuality and reality are fused. It has economic and social systems like those in the real world and provides intelligent services and applications. In this paper, we introduce the Metaverse from a new technology perspective, including its essence, corresponding technical framework, and potential technical challenges. Specifically, we analyze the essence of the Metaverse from its etymology and point out breakthroughs promising to be made in time, space, and contents of the Metaverse by citing Maslow's Hierarchy of Needs. Subsequently, we conclude four pillars of the Metaverse, named ubiquitous connections, space convergence, virtuality and reality interaction, and human-centered communication, and establish a corresponding technical framework. Additionally, we envision open issues and challenges of the Metaverse in the technical aspect. The work proposes a new technology perspective of the Metaverse and will provide further guidance for its technology development in the future.</div><div>© 2022 Published by Elsevier Ltd.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 6","pages":"Pages 1653-1665"},"PeriodicalIF":7.5,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135544248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decomposition-based learning in drone-assisted wireless-powered mobile edge computing networks 无人机辅助无线移动边缘计算网络中基于分解的学习
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-12-01 DOI: 10.1016/j.dcan.2023.11.010
Xiaoyi Zhou , Liang Huang , Tong Ye , Weiqiang Sun
{"title":"Decomposition-based learning in drone-assisted wireless-powered mobile edge computing networks","authors":"Xiaoyi Zhou ,&nbsp;Liang Huang ,&nbsp;Tong Ye ,&nbsp;Weiqiang Sun","doi":"10.1016/j.dcan.2023.11.010","DOIUrl":"10.1016/j.dcan.2023.11.010","url":null,"abstract":"<div><div>This paper investigates the multi-Unmanned Aerial Vehicle (UAV)-assisted wireless-powered Mobile Edge Computing (MEC) system, where UAVs provide computation and powering services to mobile terminals. We aim to maximize the number of completed computation tasks by jointly optimizing the offloading decisions of all terminals and the trajectory planning of all UAVs. The action space of the system is extremely large and grows exponentially with the number of UAVs. In this case, single-agent learning will require an overlarge neural network, resulting in insufficient exploration. However, the offloading decisions and trajectory planning are two subproblems performed by different executants, providing an opportunity for problem-solving. We thus adopt the idea of decomposition and propose a 2-Tiered Multi-agent Soft Actor-Critic (2T-MSAC) algorithm, decomposing a single neural network into multiple small-scale networks. In the first tier, a single agent is used for offloading decisions, and an online pretrained model based on imitation learning is specially designed to accelerate the training process of this agent. In the second tier, UAVs utilize multiple agents to plan their trajectories. Each agent exerts its influence on the parameter update of other agents through actions and rewards, thereby achieving joint optimization. Simulation results demonstrate that the proposed algorithm can be applied to scenarios with various location distributions of terminals, outperforming existing benchmarks that perform well only in specific scenarios. In particular, 2T-MSAC increases the number of completed tasks by 45.5% in the scenario with uneven terminal distributions. Moreover, the pretrained model based on imitation learning reduces the convergence time of 2T-MSAC by 58.2%.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 6","pages":"Pages 1769-1781"},"PeriodicalIF":7.5,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139294734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward edge-computing-enabled collision-free scheduling management for autonomous vehicles at unsignalized intersections 在无信号交叉路口为自动驾驶车辆提供边缘计算支持的无碰撞调度管理
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-12-01 DOI: 10.1016/j.dcan.2024.03.001
Ziyi Lu , Tianxiong Wu , Jinshan Su , Yunting Xu , Bo Qian , Tianqi Zhang , Haibo Zhou
{"title":"Toward edge-computing-enabled collision-free scheduling management for autonomous vehicles at unsignalized intersections","authors":"Ziyi Lu ,&nbsp;Tianxiong Wu ,&nbsp;Jinshan Su ,&nbsp;Yunting Xu ,&nbsp;Bo Qian ,&nbsp;Tianqi Zhang ,&nbsp;Haibo Zhou","doi":"10.1016/j.dcan.2024.03.001","DOIUrl":"10.1016/j.dcan.2024.03.001","url":null,"abstract":"<div><div>With the support of Vehicle-to-Everything (V2X) technology and computing power networks, the existing intersection traffic order is expected to benefit from efficiency improvements and energy savings by new schemes such as de-signalization. How to effectively manage autonomous vehicles for traffic control with high throughput at unsignalized intersections while ensuring safety has been a research hotspot. This paper proposes a collision-free autonomous vehicle scheduling framework based on edge-cloud computing power networks for unsignalized intersections where the lanes entering the intersections are undirectional, and designs an efficient communication system and protocol. First, by analyzing the collision point occupation time, this paper formulates an absolute value programming problem. Second, this problem is solved with low complexity by the Edge Intelligence Optimal Entry Time (EI-OET) algorithm based on edge-cloud computing power support. Then, the communication system and protocol are designed for the proposed scheduling scheme to realize efficient and low-latency vehicular communications. Finally, simulation experiments compare the proposed scheduling framework with directional and traditional traffic light scheduling mechanisms, and the experimental results demonstrate its high efficiency, low latency, and low complexity.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 6","pages":"Pages 1600-1610"},"PeriodicalIF":7.5,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140091607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chaotic moving video quality enhancement based on deep in-loop filtering 基于深度环内滤波的混沌运动视频质量增强
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-12-01 DOI: 10.1016/j.dcan.2023.09.001
Tong Tang , Yi Yang , Dapeng Wu , Ruyan Wang , Zhidu Li
{"title":"Chaotic moving video quality enhancement based on deep in-loop filtering","authors":"Tong Tang ,&nbsp;Yi Yang ,&nbsp;Dapeng Wu ,&nbsp;Ruyan Wang ,&nbsp;Zhidu Li","doi":"10.1016/j.dcan.2023.09.001","DOIUrl":"10.1016/j.dcan.2023.09.001","url":null,"abstract":"<div><div>The Joint Video Experts Team (JVET) has announced the latest generation of the Versatile Video Coding (VVC, H.266) standard. The in-loop filter in VVC inherits the De-Blocking Filter (DBF) and Sample Adaptive Offset (SAO) of High Efficiency Video Coding (HEVC, H.265), and adds the Adaptive Loop Filter (ALF) to minimize the error between the original sample and the decoded sample. However, for chaotic moving video encoding with low bitrates, serious blocking artifacts still remain after in-loop filtering due to the severe quantization distortion of texture details. To tackle this problem, this paper proposes a Convolutional Neural Network (CNN) based VVC in-loop filter for chaotic moving video encoding with low bitrates. First, a blur-aware attention network is designed to perceive the blurring effect and to restore texture details. Then, a deep in-loop filtering method is proposed based on the blur-aware network to replace the VVC in-loop filter. Finally, experimental results show that the proposed method could averagely save 8.3% of bit consumption at similar subjective quality. Meanwhile, under close bit rate consumption, the proposed method could reconstruct more texture information, thereby significantly reducing the blocking artifacts and improving the visual quality.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 6","pages":"Pages 1708-1715"},"PeriodicalIF":7.5,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134914816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical frequency-hopping MIMO joint radar communications: Design and experiment
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-12-01 DOI: 10.1016/j.dcan.2023.12.008
Jiangtao Liu , Kai Wu , Tao Su , J. Andrew Zhang
{"title":"Practical frequency-hopping MIMO joint radar communications: Design and experiment","authors":"Jiangtao Liu ,&nbsp;Kai Wu ,&nbsp;Tao Su ,&nbsp;J. Andrew Zhang","doi":"10.1016/j.dcan.2023.12.008","DOIUrl":"10.1016/j.dcan.2023.12.008","url":null,"abstract":"<div><div>Joint Radar and Communications (JRC) can implement two Radio Frequency (RF) functions using a single of resources, providing significant hardware, power and spectrum savings for wireless systems requiring both functions. Frequency-Hopping (FH) MIMO radar is a popular candidate for JRC because the achieved communication symbol rate can greatly exceed the radar pulse repetition frequency. However, practical transceiver imperfections can cause many existing theoretical designs to fail. In this work, we reveal for the first time the non-trivial impact of hardware imperfections on FH-MIMO JRC and model the impact analytically. We also design new waveforms and correspondingly develop a low-complexity algorithm to jointly estimate the hardware imperfections of unsynchronized receiver. In addition, using low-cost software-defined radios and Commercial Off-The-Shelf (COTS) products, we build the first FH-MIMO JRC experimental platform with simultaneous over-the-air radar and communication validation. Confirmed by simulation and experimental results, the proposed designs achieve high performance for both radar and communications.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 6","pages":"Pages 1904-1914"},"PeriodicalIF":7.5,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143355348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信