Pub Date : 2015-12-03DOI: 10.1109/WCSP.2015.7341131
Li Yang, Debin Wei, Chengsheng Pan, Kangzhen Wang
Aiming at the limited resources and the high link error rate of satellite network and the situation of that traditional TCP congestion control algorithm can't distinguish between the congestion losses and the link errors, which leads to the waste of network bandwidth, the TCP-BQC algorithm which is a kind of double models control method is presented. Based on the foundation that the root cause of congesting is the demand for network resource exceeding the supply, TCP-BQC judges the state of link congestion and distinguishes the reason of packets loss by detecting the remaining bandwidth and the number of queued packet at a source port, Then, the congestion window can be adjusted based on different causes of packets loss, which improves the bandwidth utilization fully. Simulation analysis shows that TCP-BQC algorithm can fully improves the bandwidth resource utilization and achieves better performance on throughput, fairness, and astringency.
{"title":"Congestion control algorithm based on dual model control over satellite network","authors":"Li Yang, Debin Wei, Chengsheng Pan, Kangzhen Wang","doi":"10.1109/WCSP.2015.7341131","DOIUrl":"https://doi.org/10.1109/WCSP.2015.7341131","url":null,"abstract":"Aiming at the limited resources and the high link error rate of satellite network and the situation of that traditional TCP congestion control algorithm can't distinguish between the congestion losses and the link errors, which leads to the waste of network bandwidth, the TCP-BQC algorithm which is a kind of double models control method is presented. Based on the foundation that the root cause of congesting is the demand for network resource exceeding the supply, TCP-BQC judges the state of link congestion and distinguishes the reason of packets loss by detecting the remaining bandwidth and the number of queued packet at a source port, Then, the congestion window can be adjusted based on different causes of packets loss, which improves the bandwidth utilization fully. Simulation analysis shows that TCP-BQC algorithm can fully improves the bandwidth resource utilization and achieves better performance on throughput, fairness, and astringency.","PeriodicalId":164776,"journal":{"name":"2015 International Conference on Wireless Communications & Signal Processing (WCSP)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133856570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-03DOI: 10.1109/WCSP.2015.7341143
Shihao Yan, Nan Yang, Jinhong Yuan
This work reveals some fundamental properties of an on-off transmission (OOT) scheme, in which a transmitter sends signals occasionally as per the capacity of the main channel in order to achieve physical layer security. To this end, we first identify the widely used hybrid secrecy outage probability as a function of the transmission probability and the conditional secrecy outage probability of the OOT scheme. This indicates, for the first time, that the hybrid secrecy outage probability can be achieved by the OOT scheme. We then derive a lower bound on the conditional secrecy outage probability of the OOT scheme in case of transmission, which is solely determined by the average signal-to-noise ratios (SNRs) of the main channel and eavesdropper's channel. Finally, we re-investigate the OOT scheme within an absolutely completely passive eavesdropping scenario, in which even the average SNR of the eavesdropper's channel is not required. Specifically, we derive an easy-evaluated expression for the average conditional secrecy outage probability of the OOT scheme by adopting an annulus threat model.
{"title":"Fundamental properties of on-off transmission scheme for wiretap channels","authors":"Shihao Yan, Nan Yang, Jinhong Yuan","doi":"10.1109/WCSP.2015.7341143","DOIUrl":"https://doi.org/10.1109/WCSP.2015.7341143","url":null,"abstract":"This work reveals some fundamental properties of an on-off transmission (OOT) scheme, in which a transmitter sends signals occasionally as per the capacity of the main channel in order to achieve physical layer security. To this end, we first identify the widely used hybrid secrecy outage probability as a function of the transmission probability and the conditional secrecy outage probability of the OOT scheme. This indicates, for the first time, that the hybrid secrecy outage probability can be achieved by the OOT scheme. We then derive a lower bound on the conditional secrecy outage probability of the OOT scheme in case of transmission, which is solely determined by the average signal-to-noise ratios (SNRs) of the main channel and eavesdropper's channel. Finally, we re-investigate the OOT scheme within an absolutely completely passive eavesdropping scenario, in which even the average SNR of the eavesdropper's channel is not required. Specifically, we derive an easy-evaluated expression for the average conditional secrecy outage probability of the OOT scheme by adopting an annulus threat model.","PeriodicalId":164776,"journal":{"name":"2015 International Conference on Wireless Communications & Signal Processing (WCSP)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114442713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-03DOI: 10.1109/WCSP.2015.7341217
Jianfeng Shi, Li Tao, Ming Chen, Zhaohui Yang
We investigate power control problem for cooperative relaying in the device-to-device (D2D) system underlaying cellular networks. Specifically, we consider the D2D communication assisted by fixed-location relays in interference existing circumstance. Therefore, an effective power control scheme is of great importance to suppress interference between D2D and cellular communications which can improve the total system throughput and spectral efficiency. In this paper, we formulate a power control optimization problem for cellular communication and a simple on-off power control algorithm for D2D communications. We also obtain analytic expression for the coverage probability of cellular link using stochastic geometry according to proposed algorithm. Simulation results follow to show the rate of both cellular and D2D links in the various number of D2D transceivers.
{"title":"Power control for relay-assisted device-to-device communication underlaying cellular networks","authors":"Jianfeng Shi, Li Tao, Ming Chen, Zhaohui Yang","doi":"10.1109/WCSP.2015.7341217","DOIUrl":"https://doi.org/10.1109/WCSP.2015.7341217","url":null,"abstract":"We investigate power control problem for cooperative relaying in the device-to-device (D2D) system underlaying cellular networks. Specifically, we consider the D2D communication assisted by fixed-location relays in interference existing circumstance. Therefore, an effective power control scheme is of great importance to suppress interference between D2D and cellular communications which can improve the total system throughput and spectral efficiency. In this paper, we formulate a power control optimization problem for cellular communication and a simple on-off power control algorithm for D2D communications. We also obtain analytic expression for the coverage probability of cellular link using stochastic geometry according to proposed algorithm. Simulation results follow to show the rate of both cellular and D2D links in the various number of D2D transceivers.","PeriodicalId":164776,"journal":{"name":"2015 International Conference on Wireless Communications & Signal Processing (WCSP)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133460628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-03DOI: 10.1109/WCSP.2015.7341011
Qiuyan Tao, Jianing Li, Lianghao Wang, Ming Zhang
Built-in post refocus applications begin to appear in cameras of new phone models. Most of them rely on dual or even customized cameras. In this paper, we proposed a solution of post refocus using a single uncalibrated cellphone camera. The input is a short video clip with minor camera movement, which is commonly caused by nature shaking of hand. After using feature matching to find a reference plane, the parallax of multiple frames will be revised based on the transformation of reference plane and a factorization method is used to recover the relative depth map. Finally, plausible refocus images can be obtained according to the relative depth map. Our solution has no reliance on any specialized lens and can generate adjustable refocus effect, in both focal depth and the degree of out-of-focus.
{"title":"Relative depth estimation with an uncalibrated camera for image refocus","authors":"Qiuyan Tao, Jianing Li, Lianghao Wang, Ming Zhang","doi":"10.1109/WCSP.2015.7341011","DOIUrl":"https://doi.org/10.1109/WCSP.2015.7341011","url":null,"abstract":"Built-in post refocus applications begin to appear in cameras of new phone models. Most of them rely on dual or even customized cameras. In this paper, we proposed a solution of post refocus using a single uncalibrated cellphone camera. The input is a short video clip with minor camera movement, which is commonly caused by nature shaking of hand. After using feature matching to find a reference plane, the parallax of multiple frames will be revised based on the transformation of reference plane and a factorization method is used to recover the relative depth map. Finally, plausible refocus images can be obtained according to the relative depth map. Our solution has no reliance on any specialized lens and can generate adjustable refocus effect, in both focal depth and the degree of out-of-focus.","PeriodicalId":164776,"journal":{"name":"2015 International Conference on Wireless Communications & Signal Processing (WCSP)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133306127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Energy-efficiency, high data rates and secure communications are essential requirements of the future wireless networks. In this paper, we develop a framework to study the energy efficiency for enhancing physical layer security (PLS) in large-scale random cognitive radio networks (CRNs) considering the node spatial distribution, wireless propagation medium and aggregate network interference. Using stochastic geometry, we model the large-scale random secure CRN, and analyze the connection outage probability (COP) and the secrecy outage probability (SOP) of typical secondary link. Based on the results, we introduce the secrecy energy efficiency (SEE) to character the energy efficiency for enhancing the physical layer security of secondary network. Furthermore, we jointly optimizing the medium access probability (MAP) and transmit power of secondary transmitters (STs) to maximize the secrecy energy efficiency. Finally, numerical results are conducted to evaluate the SEE and examine the effect of system parameters.
{"title":"Energy-efficient optimization for physical layer security in large-scale random CRNs","authors":"Xiaoming Xu, Yueming Cai, Weiwei Yang, Wendong Yang, Junquan Hu, Tinghui Yin","doi":"10.1109/WCSP.2015.7341314","DOIUrl":"https://doi.org/10.1109/WCSP.2015.7341314","url":null,"abstract":"Energy-efficiency, high data rates and secure communications are essential requirements of the future wireless networks. In this paper, we develop a framework to study the energy efficiency for enhancing physical layer security (PLS) in large-scale random cognitive radio networks (CRNs) considering the node spatial distribution, wireless propagation medium and aggregate network interference. Using stochastic geometry, we model the large-scale random secure CRN, and analyze the connection outage probability (COP) and the secrecy outage probability (SOP) of typical secondary link. Based on the results, we introduce the secrecy energy efficiency (SEE) to character the energy efficiency for enhancing the physical layer security of secondary network. Furthermore, we jointly optimizing the medium access probability (MAP) and transmit power of secondary transmitters (STs) to maximize the secrecy energy efficiency. Finally, numerical results are conducted to evaluate the SEE and examine the effect of system parameters.","PeriodicalId":164776,"journal":{"name":"2015 International Conference on Wireless Communications & Signal Processing (WCSP)","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117345638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-03DOI: 10.1109/WCSP.2015.7340991
Chen Zhang, Minjian Zhao, Yunlong Cai
In this paper, a novel self-calibration method is proposed for uniform rectangular arrays to estimate two-dimensional (2-D) direction of arrival (DOA) in the presence of mutual coupling. By rearranging the perturbed array response in the transform domain, the estimation of 2-D DOA is decoupled from the calibration process, and the aperture loss is avoided as well. Then resorting to the rank reduction criteria, the 2-D DOAs can be blindly estimated just through two sequential steps of one-dimensional searches. Moreover, an accurate estimation of coupling coefficients can also be acquired for array calibration. Compared to the existing method, the proposed algorithm is more numerically efficient with improved accuracy. Simulation results verify the superior performance of the proposed algorithm.1
{"title":"Joint 2-D DOA estimation and mutual coupling calibration for uniform rectangular arrays","authors":"Chen Zhang, Minjian Zhao, Yunlong Cai","doi":"10.1109/WCSP.2015.7340991","DOIUrl":"https://doi.org/10.1109/WCSP.2015.7340991","url":null,"abstract":"In this paper, a novel self-calibration method is proposed for uniform rectangular arrays to estimate two-dimensional (2-D) direction of arrival (DOA) in the presence of mutual coupling. By rearranging the perturbed array response in the transform domain, the estimation of 2-D DOA is decoupled from the calibration process, and the aperture loss is avoided as well. Then resorting to the rank reduction criteria, the 2-D DOAs can be blindly estimated just through two sequential steps of one-dimensional searches. Moreover, an accurate estimation of coupling coefficients can also be acquired for array calibration. Compared to the existing method, the proposed algorithm is more numerically efficient with improved accuracy. Simulation results verify the superior performance of the proposed algorithm.1","PeriodicalId":164776,"journal":{"name":"2015 International Conference on Wireless Communications & Signal Processing (WCSP)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114899854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-03DOI: 10.1109/WCSP.2015.7341330
Jeong Kyun Lee, Xiaohua Li
It has been a challenge to develop efficient algorithms for relay selection and relay power optimization in arbitrarily large multi-hop wireless networks. In this paper, considering Gaussian networks with half-duplex decode-and-forward relays, we develop a practical network-wide signal processing procedure with which the relay's data rate is not degraded by mutual interference. Multi-hop relaying is thus immune to mutual interference. Then, we develop an algorithm to find approximately the optimal hop count and the optimal relays for source-destination transmission rate maximization. With a quadratic complexity O(N2), where N is the network size, this algorithm is efficient for arbitrarily large wireless networks. More interestingly, this algorithm is similar to the well-known Dijkstra's algorithm of wired networks.
{"title":"Interference immune multi-hop relaying and efficient relay selection algorithm for arbitrarily large half-duplex Gaussian wireless networks","authors":"Jeong Kyun Lee, Xiaohua Li","doi":"10.1109/WCSP.2015.7341330","DOIUrl":"https://doi.org/10.1109/WCSP.2015.7341330","url":null,"abstract":"It has been a challenge to develop efficient algorithms for relay selection and relay power optimization in arbitrarily large multi-hop wireless networks. In this paper, considering Gaussian networks with half-duplex decode-and-forward relays, we develop a practical network-wide signal processing procedure with which the relay's data rate is not degraded by mutual interference. Multi-hop relaying is thus immune to mutual interference. Then, we develop an algorithm to find approximately the optimal hop count and the optimal relays for source-destination transmission rate maximization. With a quadratic complexity O(N2), where N is the network size, this algorithm is efficient for arbitrarily large wireless networks. More interestingly, this algorithm is similar to the well-known Dijkstra's algorithm of wired networks.","PeriodicalId":164776,"journal":{"name":"2015 International Conference on Wireless Communications & Signal Processing (WCSP)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115615446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-03DOI: 10.1109/WCSP.2015.7341079
Jincheng Zhao, Wenjin Wang, Xiqi Gao
One of the biggest challenges of 5G comes from sporadic traffic generated by millions of devices in highly fragmented spectrum, especially for uplink transmission. Current physical layer based on synchronism and orthogonality become low-efficient and inflexible because of the sophisticated algorithms it used to maintain synchronism. Asynchronous waveform with ultra-low side lobe seems promising, and Fast-Convolution Multicarrier (FCMC) is among the most competitive waveforms. In this paper, we investigate transceiver design for FCMC scheme in multipath fading channels. Firstly, we derive the signal model of FCMC transceiver. Based on the signal model, we develop the low-complexity one-tap minimum mean square error (MMSE) frequency-domain equalizer exploiting the asymptotic behavior of Toeplitz matrices and the nature of fast-convolution. The new proposed FCMC transceiver can be applied in single-carrier frequency-division multiple access transmission. The resulting scheme features low Peak-to-Average-Power-Ratio (PAPR), flexible user bandwidth, and allowing asynchronous transmission. Simulation results confirm the advantages of the proposed scheme.
{"title":"Transceiver design for fast-convolution multicarrier systems in multipath fading channels","authors":"Jincheng Zhao, Wenjin Wang, Xiqi Gao","doi":"10.1109/WCSP.2015.7341079","DOIUrl":"https://doi.org/10.1109/WCSP.2015.7341079","url":null,"abstract":"One of the biggest challenges of 5G comes from sporadic traffic generated by millions of devices in highly fragmented spectrum, especially for uplink transmission. Current physical layer based on synchronism and orthogonality become low-efficient and inflexible because of the sophisticated algorithms it used to maintain synchronism. Asynchronous waveform with ultra-low side lobe seems promising, and Fast-Convolution Multicarrier (FCMC) is among the most competitive waveforms. In this paper, we investigate transceiver design for FCMC scheme in multipath fading channels. Firstly, we derive the signal model of FCMC transceiver. Based on the signal model, we develop the low-complexity one-tap minimum mean square error (MMSE) frequency-domain equalizer exploiting the asymptotic behavior of Toeplitz matrices and the nature of fast-convolution. The new proposed FCMC transceiver can be applied in single-carrier frequency-division multiple access transmission. The resulting scheme features low Peak-to-Average-Power-Ratio (PAPR), flexible user bandwidth, and allowing asynchronous transmission. Simulation results confirm the advantages of the proposed scheme.","PeriodicalId":164776,"journal":{"name":"2015 International Conference on Wireless Communications & Signal Processing (WCSP)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123513191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-03DOI: 10.1109/WCSP.2015.7341278
Yang Cui, C. Fu, Hong Hong, Yijin Zhang, F. Shu
In order to monitor the time varying heart rate (HR) of human in exercise effectively, a noncontact detection method based on video camera is realized in this paper. Based on the principle of Photoplethysmography (PPG), the camera records the regular changes of the skin surface in human face due to their blood volume pulse (BVP). After a series of preprocessing including facial recognition, band-pass filter, trend removal, and reconstruction of source signal, the BVP waveform was retrieved from the video signal. In this way, the extraction of HR could be re-formulated as the problem of extracting the frequency of the BVP signal, which is in a traditional digital signal form. In this paper, five classical frequency extraction methods are compared to find the most proper one. The simulation results show that the frequency extracted from the BVP signal could match the time varying heart rate detected by professional equipment and the approach of calculating the mean value of interbeat intervals (IBI) has the best performance in frequency extraction, especially in the stage of postexercise.
{"title":"Non-contact time varying heart rate monitoring in exercise by video camera","authors":"Yang Cui, C. Fu, Hong Hong, Yijin Zhang, F. Shu","doi":"10.1109/WCSP.2015.7341278","DOIUrl":"https://doi.org/10.1109/WCSP.2015.7341278","url":null,"abstract":"In order to monitor the time varying heart rate (HR) of human in exercise effectively, a noncontact detection method based on video camera is realized in this paper. Based on the principle of Photoplethysmography (PPG), the camera records the regular changes of the skin surface in human face due to their blood volume pulse (BVP). After a series of preprocessing including facial recognition, band-pass filter, trend removal, and reconstruction of source signal, the BVP waveform was retrieved from the video signal. In this way, the extraction of HR could be re-formulated as the problem of extracting the frequency of the BVP signal, which is in a traditional digital signal form. In this paper, five classical frequency extraction methods are compared to find the most proper one. The simulation results show that the frequency extracted from the BVP signal could match the time varying heart rate detected by professional equipment and the approach of calculating the mean value of interbeat intervals (IBI) has the best performance in frequency extraction, especially in the stage of postexercise.","PeriodicalId":164776,"journal":{"name":"2015 International Conference on Wireless Communications & Signal Processing (WCSP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124927418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-03DOI: 10.1109/WCSP.2015.7341039
Teng Niu, Dongmei Zhang, Yu Jiang, Kui Xu
Buffer-aided network coding (NC) has been proposed as an effective method to improve retransmission efficiency. In this way, the correctly received undecodable NC combined retransmission packets are waited in the buffer for a future network decoding opportunity rather than delete. However, existing buffer-aided approaches fail to consider the buffer status and the latest feedback in the next round of network encoding and therefore are unable to achieve the optimal performance. In this paper, a buffer-aided and weight-based non-orthogonal network coding scheme for wireless broadcasting (BWNNC) has been proposed, wherein the sender makes full use of all the known information to conduct non-orthogonal network coding retransmissions. Simulation results show that our proposed algorithm indeed outperforms previous works in reducing the retransmission times.
{"title":"Buffer-aided and weight-based non-orthogonal network coding for wireless broadcasting","authors":"Teng Niu, Dongmei Zhang, Yu Jiang, Kui Xu","doi":"10.1109/WCSP.2015.7341039","DOIUrl":"https://doi.org/10.1109/WCSP.2015.7341039","url":null,"abstract":"Buffer-aided network coding (NC) has been proposed as an effective method to improve retransmission efficiency. In this way, the correctly received undecodable NC combined retransmission packets are waited in the buffer for a future network decoding opportunity rather than delete. However, existing buffer-aided approaches fail to consider the buffer status and the latest feedback in the next round of network encoding and therefore are unable to achieve the optimal performance. In this paper, a buffer-aided and weight-based non-orthogonal network coding scheme for wireless broadcasting (BWNNC) has been proposed, wherein the sender makes full use of all the known information to conduct non-orthogonal network coding retransmissions. Simulation results show that our proposed algorithm indeed outperforms previous works in reducing the retransmission times.","PeriodicalId":164776,"journal":{"name":"2015 International Conference on Wireless Communications & Signal Processing (WCSP)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123945765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}