首页 > 最新文献

2016 IEEE International Conference on Communications (ICC)最新文献

英文 中文
A pipelined synchronization approach for satellite-based automatic identification system 基于卫星的自动识别系统的流水线同步方法
Pub Date : 2016-07-14 DOI: 10.1109/ICC.2016.7511270
Weitao Lan, Taosheng Zhang, M. Guo, Wei Huang, Lianghui Ding, Feng Yang, Liang Qian
Because of the wide field of view (FOV) to monitor vessel movements, satellite-based automatic identification system (S-AIS) has been promoted in recent years. However, synchronization is a tough work in S-AIS receiver because of the large Doppler shift and serious signal collision resulting from simultaneous transmission in the FOV of a satellite. In this paper, we propose a pipelined synchronization approach with good performance and low complexity. It consists of three parts, i.e., packet detection, windowing and timing recovery, and frequency and timing offset estimation, which can be implemented in feedforward structure with low complexity. Simulation results show that the proposed synchronization approach has significant performance gain compared with existing algorithms and provides an acceptable estimation range to cope with large Doppler shift and message collision.
近年来,基于卫星的船舶自动识别系统(S-AIS)得到了广泛的推广。然而,由于卫星视场内同步传输的多普勒频移较大,信号碰撞严重,S-AIS接收机的同步是一项艰巨的工作。本文提出了一种性能好、复杂度低的流水线同步方法。它由数据包检测、加窗和定时恢复、频率和定时偏移估计三部分组成,可以采用复杂度较低的前馈结构实现。仿真结果表明,与现有算法相比,所提同步方法具有显著的性能提升,并且在较大的多普勒频移和报文碰撞情况下提供了可接受的估计范围。
{"title":"A pipelined synchronization approach for satellite-based automatic identification system","authors":"Weitao Lan, Taosheng Zhang, M. Guo, Wei Huang, Lianghui Ding, Feng Yang, Liang Qian","doi":"10.1109/ICC.2016.7511270","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511270","url":null,"abstract":"Because of the wide field of view (FOV) to monitor vessel movements, satellite-based automatic identification system (S-AIS) has been promoted in recent years. However, synchronization is a tough work in S-AIS receiver because of the large Doppler shift and serious signal collision resulting from simultaneous transmission in the FOV of a satellite. In this paper, we propose a pipelined synchronization approach with good performance and low complexity. It consists of three parts, i.e., packet detection, windowing and timing recovery, and frequency and timing offset estimation, which can be implemented in feedforward structure with low complexity. Simulation results show that the proposed synchronization approach has significant performance gain compared with existing algorithms and provides an acceptable estimation range to cope with large Doppler shift and message collision.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133729507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Throughput analysis of the IEEE802.11p EDCA considering transmission opportunity for non-safety applications 考虑非安全应用传输机会的IEEE802.11p EDCA的吞吐量分析
Pub Date : 2016-07-14 DOI: 10.1109/ICC.2016.7511454
Mohammed Amine Togou, L. Khoukhi, A. Hafid
This paper uses two Markov chains to model IEEE 802.11p EDCA throughput over service channels. A 2-D Markov chain is constructed first to describe the backoff procedure of each access category and to infer its transmission probability. Then, a 1-D discrete Markov chain is used to describe the contention phase of an access category and to derive its collision probability. Both models consider the backoff counter freezing as well as the internal and external collisions. In addition, they both take into account the transmission opportunity (TXOP) parameter, unexploited by IEEE 802.11p, to enhance the performance of infotainment applications. Using both models, we derive an accurate model of the normalized throughput for each access category. Simulation results show that our model generates higher throughput for access categories with high priority compared to IEEE 802.11p standard.
本文使用两个马尔可夫链对业务信道上的IEEE 802.11p EDCA吞吐量进行建模。首先构造一个二维马尔可夫链来描述每个接入类别的退避过程,并推断其传输概率。然后,利用一维离散马尔可夫链描述访问范畴的争用阶段,并推导其碰撞概率。这两种模型都考虑了后退反冻结以及内部和外部碰撞。此外,它们都考虑了未被IEEE 802.11p利用的传输机会(TXOP)参数,以增强信息娱乐应用程序的性能。使用这两个模型,我们得出了每个访问类别的规范化吞吐量的精确模型。仿真结果表明,与IEEE 802.11p标准相比,我们的模型对高优先级的访问类别产生了更高的吞吐量。
{"title":"Throughput analysis of the IEEE802.11p EDCA considering transmission opportunity for non-safety applications","authors":"Mohammed Amine Togou, L. Khoukhi, A. Hafid","doi":"10.1109/ICC.2016.7511454","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511454","url":null,"abstract":"This paper uses two Markov chains to model IEEE 802.11p EDCA throughput over service channels. A 2-D Markov chain is constructed first to describe the backoff procedure of each access category and to infer its transmission probability. Then, a 1-D discrete Markov chain is used to describe the contention phase of an access category and to derive its collision probability. Both models consider the backoff counter freezing as well as the internal and external collisions. In addition, they both take into account the transmission opportunity (TXOP) parameter, unexploited by IEEE 802.11p, to enhance the performance of infotainment applications. Using both models, we derive an accurate model of the normalized throughput for each access category. Simulation results show that our model generates higher throughput for access categories with high priority compared to IEEE 802.11p standard.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116954470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis of the downlink saturation throughput of an asymmetric IEEE 802.11n-based WLAN 基于非对称IEEE 802.11n的WLAN下行链路饱和吞吐量分析
Pub Date : 2016-07-14 DOI: 10.1109/ICC.2016.7511453
M. Soleymani, B. Maham, Farid Ashtiani
Frame aggregation (FA) mechanisms improve the throughput of WLANs. In this paper, the effect of the FA mechanism on the throughput of wireless local area networks (WLANs) has been investigated. To this end, we propose an analytical model in order to analyze an IEEE 802.11n network comprised of an access point (AP) and several conventional nodes (CNs), all in the coverage area of each other. With respect to the heavier download traffic compared to the upload one, in our scenario, only the AP uses an FA mechanism and the other nodes use the basic IEEE 802.11 standard. In our proposed analytical model, the maximum downlink (DL) throughput is derived. Regarding the asymmetry among nodes, our analytical model consists of two different queueing networks: one for the AP and the other one for CNs. We verify the accuracy of our analytical results by simulations, i.e., less than 5% mismatch between the analytical and simulation results. We show that there is a tradeoff between the DL saturation throughput and performance of CNs. In other words, the FA improves the AP saturation throughput at the cost of a little degradation of the performance for CNs.
帧聚合(FA)机制提高了无线局域网的吞吐量。本文研究了FA机制对无线局域网(wlan)吞吐量的影响。为此,我们提出了一个分析模型来分析一个由一个接入点(AP)和几个传统节点(CNs)组成的IEEE 802.11n网络,这些节点都在彼此的覆盖范围内。与上传流量相比,下载流量更大,在我们的场景中,只有AP使用FA机制,其他节点使用基本的IEEE 802.11标准。在我们提出的分析模型中,导出了最大下行链路(DL)吞吐量。考虑到节点之间的不对称性,我们的分析模型由两个不同的排队网络组成:一个用于AP,另一个用于cnn。我们通过模拟验证了分析结果的准确性,即分析结果与模拟结果之间的不匹配小于5%。我们表明,在深度学习饱和吞吐量和cnn的性能之间存在权衡。换句话说,FA提高了AP饱和吞吐量,代价是cnn的性能下降了一点。
{"title":"Analysis of the downlink saturation throughput of an asymmetric IEEE 802.11n-based WLAN","authors":"M. Soleymani, B. Maham, Farid Ashtiani","doi":"10.1109/ICC.2016.7511453","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511453","url":null,"abstract":"Frame aggregation (FA) mechanisms improve the throughput of WLANs. In this paper, the effect of the FA mechanism on the throughput of wireless local area networks (WLANs) has been investigated. To this end, we propose an analytical model in order to analyze an IEEE 802.11n network comprised of an access point (AP) and several conventional nodes (CNs), all in the coverage area of each other. With respect to the heavier download traffic compared to the upload one, in our scenario, only the AP uses an FA mechanism and the other nodes use the basic IEEE 802.11 standard. In our proposed analytical model, the maximum downlink (DL) throughput is derived. Regarding the asymmetry among nodes, our analytical model consists of two different queueing networks: one for the AP and the other one for CNs. We verify the accuracy of our analytical results by simulations, i.e., less than 5% mismatch between the analytical and simulation results. We show that there is a tradeoff between the DL saturation throughput and performance of CNs. In other words, the FA improves the AP saturation throughput at the cost of a little degradation of the performance for CNs.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126414631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Routing mobile data couriers in smart-cities 在智能城市中路由移动数据信使
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7510868
F. Al-turjman, Mehmet Karakoc, M. Günay, A. Noureldin
In this paper, we propose a new architecture to read the smart meters which are commonly distributed nowadays in smart cities. In this architecture, public transportation vehicles are utilized as Data Collectors (DCs) that reads these smart meters. Moreover, we target the path planning problem for these DCs given that a limited number of vehicles with a specific storage capacity are able to participate in collecting readings from these meters. We optimize the number of DCs while maintaining their minimum travelling distances and satisfied traffic constraints. We propose a Genetic-based Routing (GR) approach for more optimized solutions. Extensive simulation results are performed to confirm the effectiveness of the proposed approach in comparison to other heuristic approaches.
在本文中,我们提出了一种新的架构来读取目前在智慧城市中普遍分布的智能电表。在这种架构中,公共交通工具被用作读取这些智能电表的数据收集器(dc)。此外,考虑到具有特定存储容量的有限数量的车辆能够参与收集这些仪表的读数,我们针对这些dc的路径规划问题进行了研究。我们优化了dc的数量,同时保持它们的最小行驶距离并满足交通约束。我们提出了一种基于遗传的路由(GR)方法来获得更优化的解决方案。大量的仿真结果证实了该方法与其他启发式方法的有效性。
{"title":"Routing mobile data couriers in smart-cities","authors":"F. Al-turjman, Mehmet Karakoc, M. Günay, A. Noureldin","doi":"10.1109/ICC.2016.7510868","DOIUrl":"https://doi.org/10.1109/ICC.2016.7510868","url":null,"abstract":"In this paper, we propose a new architecture to read the smart meters which are commonly distributed nowadays in smart cities. In this architecture, public transportation vehicles are utilized as Data Collectors (DCs) that reads these smart meters. Moreover, we target the path planning problem for these DCs given that a limited number of vehicles with a specific storage capacity are able to participate in collecting readings from these meters. We optimize the number of DCs while maintaining their minimum travelling distances and satisfied traffic constraints. We propose a Genetic-based Routing (GR) approach for more optimized solutions. Extensive simulation results are performed to confirm the effectiveness of the proposed approach in comparison to other heuristic approaches.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115651828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multiple traveling repairmen problem with virtual networks for post-disaster resilience 灾后恢复虚拟网络的多行修理工问题
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511247
Chen Ma, Carlos Colman Meixner, M. Tornatore, Yongli Zhao, Jie Zhang, B. Mukherjee
In network virtualization, when a disaster hits a physical network infrastructure, it is likely to break multiple virtual network connections. So, after a disaster occurs, the network operator has to schedule multiple teams of repairmen to fix the failed components, by considering that these elements may be geographically dispersed. An effective schedule is very important as different schedules may result in very different amounts of time needed to restore a failure. In this study, we introduce the multiple traveling repairmen problem (MTRP) for post-disaster resilience, i.e., to reduce the impact of a disaster. Re-provisioning of failed virtual links is also considered. We first formally state the problem, where our objective is to find an optimal schedule for multiple teams of repairmen to restore the failed components in physical network, maximizing the traffic in restored virtual network and with minimum damage cost. Then, we propose a greedy (GR) and a simulated annealing (SA) algorithm, and we measure the damage caused by a disaster in terms of disconnected virtual networks (DVN), failed virtual links (FVL), and failed physical links (FPL). Numerical result shows that both proposed algorithms can make good schedules for multiple repairmen teams, and SA leads to significantly lower damage in terms of DVN, FVL, and FPL than GR.
在网络虚拟化中,当灾难袭击物理网络基础设施时,可能会中断多个虚拟网络连接。因此,在灾难发生后,考虑到这些组件可能在地理上分散,网络运营商必须安排多个维修团队来修复故障组件。有效的计划非常重要,因为不同的计划可能导致恢复故障所需的时间非常不同。在本研究中,我们引入多重旅行修理工问题(MTRP)用于灾后复原,即减少灾害的影响。还考虑了故障虚拟链路的重新配置。我们首先正式陈述问题,我们的目标是为多个维修团队找到一个最优的时间表,以恢复物理网络中的故障组件,使恢复后的虚拟网络中的流量最大化,并以最小的损坏成本。然后,我们提出了一种贪婪(GR)算法和一种模拟退火(SA)算法,并从断开虚拟网络(DVN)、断开虚拟链路(FVL)和断开物理链路(FPL)三个方面衡量灾难造成的损害。数值计算结果表明,两种算法都能较好地安排多个修理团队,并且在DVN、FVL和FPL方面,SA的损伤明显低于GR。
{"title":"Multiple traveling repairmen problem with virtual networks for post-disaster resilience","authors":"Chen Ma, Carlos Colman Meixner, M. Tornatore, Yongli Zhao, Jie Zhang, B. Mukherjee","doi":"10.1109/ICC.2016.7511247","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511247","url":null,"abstract":"In network virtualization, when a disaster hits a physical network infrastructure, it is likely to break multiple virtual network connections. So, after a disaster occurs, the network operator has to schedule multiple teams of repairmen to fix the failed components, by considering that these elements may be geographically dispersed. An effective schedule is very important as different schedules may result in very different amounts of time needed to restore a failure. In this study, we introduce the multiple traveling repairmen problem (MTRP) for post-disaster resilience, i.e., to reduce the impact of a disaster. Re-provisioning of failed virtual links is also considered. We first formally state the problem, where our objective is to find an optimal schedule for multiple teams of repairmen to restore the failed components in physical network, maximizing the traffic in restored virtual network and with minimum damage cost. Then, we propose a greedy (GR) and a simulated annealing (SA) algorithm, and we measure the damage caused by a disaster in terms of disconnected virtual networks (DVN), failed virtual links (FVL), and failed physical links (FPL). Numerical result shows that both proposed algorithms can make good schedules for multiple repairmen teams, and SA leads to significantly lower damage in terms of DVN, FVL, and FPL than GR.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115702916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Spreading and repetitions in satellite MAC protocols 卫星MAC协议中的扩展和重复
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511260
Alessandro Biason, Andrea Dittadi, M. Zorzi
In satellite networks, the design of MAC schemes which achieve high performance is an important and widely studied problem. Random access is recognized as an appealing solution for these scenarios. In the literature so far, two main research lines have been followed: diversity slotted Aloha-like protocols and spread spectrum Aloha schemes. The goal of this work is to analyze the performance of these two paradigms and introduce a hybrid algorithm which combines both packet replicas and code division to further enhance the probability of successfully decoding a packet.
在卫星网络中,设计高性能的MAC协议是一个重要而广泛研究的问题。对于这些场景,随机访问被认为是一种很有吸引力的解决方案。在目前的文献中,主要有两个研究方向:分集开槽Aloha-like协议和扩频Aloha方案。本工作的目标是分析这两种范式的性能,并引入一种结合数据包副本和代码划分的混合算法,以进一步提高数据包成功解码的概率。
{"title":"Spreading and repetitions in satellite MAC protocols","authors":"Alessandro Biason, Andrea Dittadi, M. Zorzi","doi":"10.1109/ICC.2016.7511260","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511260","url":null,"abstract":"In satellite networks, the design of MAC schemes which achieve high performance is an important and widely studied problem. Random access is recognized as an appealing solution for these scenarios. In the literature so far, two main research lines have been followed: diversity slotted Aloha-like protocols and spread spectrum Aloha schemes. The goal of this work is to analyze the performance of these two paradigms and introduce a hybrid algorithm which combines both packet replicas and code division to further enhance the probability of successfully decoding a packet.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121822552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantization for distributed binary detection under secrecy constraints 保密约束下分布式二进制检测的量化
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7510905
M. Mhanna, P. Duhamel, P. Piantanida
The design of scalar quantization for distributed binary decision in presence of an eavesdropper (Eve) is investigated. An encoder/quantizer (Alice) observes a memoryless source and communicate via a public noiseless rate-limited channel with the detector (Bob) who has also access to a correlated analog source. Bob can take advantage of both informations to perform a binary decision on the joint probability law of these observations. Eve is further assumed to have access to a different correlated analog source and perfectly observe the information bits sent by Alice. This paper evaluates the various tradeoffs between the probabilities of error (on the decision) depending on the amount of information leakage from Alice to Eve. The Bhattacharyya distance; one of the distances measuring the difference between two probability distributions; is taken as a criterion to optimize the scalar quantizer subject to a tolerable constraint on the information leakage at the level of Eve. Numerical results for memoryless Gaussian sources demonstrate the performance of the proposed quantization method.
研究了存在窃听者的分布式二进制决策的标量量化设计。编码器/量化器(Alice)观察无记忆源,并通过公共无噪声速率限制通道与检测器(Bob)通信,后者也可以访问相关模拟源。Bob可以利用这两个信息对这些观测的联合概率律执行二元决策。进一步假设Eve可以访问不同的相关模拟源,并完美地观察到Alice发送的信息位。本文评估了错误概率(决策)之间的各种权衡,这取决于从Alice到Eve的信息泄漏量。巴塔查里亚距离;距离:测量两个概率分布之差的距离之一;作为优化标量量化器的准则,同时要在Eve级别上对信息泄漏有一个可容忍的约束。对无记忆高斯源的数值结果证明了所提出的量化方法的有效性。
{"title":"Quantization for distributed binary detection under secrecy constraints","authors":"M. Mhanna, P. Duhamel, P. Piantanida","doi":"10.1109/ICC.2016.7510905","DOIUrl":"https://doi.org/10.1109/ICC.2016.7510905","url":null,"abstract":"The design of scalar quantization for distributed binary decision in presence of an eavesdropper (Eve) is investigated. An encoder/quantizer (Alice) observes a memoryless source and communicate via a public noiseless rate-limited channel with the detector (Bob) who has also access to a correlated analog source. Bob can take advantage of both informations to perform a binary decision on the joint probability law of these observations. Eve is further assumed to have access to a different correlated analog source and perfectly observe the information bits sent by Alice. This paper evaluates the various tradeoffs between the probabilities of error (on the decision) depending on the amount of information leakage from Alice to Eve. The Bhattacharyya distance; one of the distances measuring the difference between two probability distributions; is taken as a criterion to optimize the scalar quantizer subject to a tolerable constraint on the information leakage at the level of Eve. Numerical results for memoryless Gaussian sources demonstrate the performance of the proposed quantization method.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120974410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Decentralized heuristic access policy design for two cognitive secondary users under a primary Type-I HARQ process 基于i型HARQ进程的两个认知辅助用户的分散启发式访问策略设计
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511002
Roghayeh Joda, M. Zorzi
In this paper, decentralized heuristic access policies are designed for two secondary users (SUs) in an underlay cognitive radio network in which the PU employs Type-I Hybrid ARQ. Exploiting the redundancy in PU retransmissions, each SU receiver applies interference cancellation (IC) to remove a successfully decoded PU message in the subsequent PU retransmissions. There is no central control unit and we consider two different scenarios. In the first scenario, each SU transmitter only knows the PU message knowledge state of its corresponding SU receiver. In the second scenario, the SU transmitters are unaware of any PU message knowledge states at the SU receivers. We design access policies in both offline and online modes, where in an online mode each SU can learn from its own local information. Using heuristic approaches for the considered scenarios, decentralized access policies are proposed to maximize the average sum throughput of SUs under a PU throughput degradation constraint. The results also show that heuristic access policies using the online mode have a performance gain close to that obtained using the offline mode, while providing increased robustness and flexibility.
本文针对底层认知无线网络中的两个辅助用户(su)设计了分散启发式访问策略,其中PU采用i型混合ARQ。利用PU重传中的冗余,每个SU接收器在随后的PU重传中应用干扰消除(IC)来删除成功解码的PU消息。没有中央控制单元,我们考虑两种不同的情况。在第一种场景中,每个SU发送方只知道其对应SU接收方的PU消息知识状态。在第二个场景中,SU发射器不知道SU接收器上的任何PU消息知识状态。我们设计了离线和在线模式下的访问策略,在在线模式下,每个SU可以从自己的本地信息中学习。针对所考虑的场景,采用启发式方法,提出了分散访问策略,以在PU吞吐量下降约束下最大化su的平均总吞吐量。结果还表明,使用在线模式的启发式访问策略的性能增益接近使用离线模式获得的性能增益,同时提供了更高的鲁棒性和灵活性。
{"title":"Decentralized heuristic access policy design for two cognitive secondary users under a primary Type-I HARQ process","authors":"Roghayeh Joda, M. Zorzi","doi":"10.1109/ICC.2016.7511002","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511002","url":null,"abstract":"In this paper, decentralized heuristic access policies are designed for two secondary users (SUs) in an underlay cognitive radio network in which the PU employs Type-I Hybrid ARQ. Exploiting the redundancy in PU retransmissions, each SU receiver applies interference cancellation (IC) to remove a successfully decoded PU message in the subsequent PU retransmissions. There is no central control unit and we consider two different scenarios. In the first scenario, each SU transmitter only knows the PU message knowledge state of its corresponding SU receiver. In the second scenario, the SU transmitters are unaware of any PU message knowledge states at the SU receivers. We design access policies in both offline and online modes, where in an online mode each SU can learn from its own local information. Using heuristic approaches for the considered scenarios, decentralized access policies are proposed to maximize the average sum throughput of SUs under a PU throughput degradation constraint. The results also show that heuristic access policies using the online mode have a performance gain close to that obtained using the offline mode, while providing increased robustness and flexibility.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120981385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secrecy multiuser diversity for distributed antenna systems from the perspective of user-scaling law 基于用户扩展律的分布式天线系统保密多用户分集
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511621
I. Bang, S. Kim, D. Sung
In this paper, we introduce the notions of a user-scaling function and a user-scaling exponent and multiuser diversity (UEMD) pair. Our notions for the UEMD pair could be utilized as a basic tool for analyzing user-scaling laws. We derive a secure user-scaling law in terms of SNR, the number of eavesdroppers, the number of distributed antennas in distributed antenna systems, and design parameter λ. Through analytical and numerical results, we characterize the effect of the number of distributed antennas on the user-scaling behavior in terms of achievable secrecy rate. Compared with the conventional results based on a single antenna system, our results indicate that installing a small number of distributed antennas could provide a significant performance gain in terms of the achievable secrecy rate.
本文引入了用户缩放函数、用户缩放指数和多用户分集(UEMD)对的概念。我们关于UEMD对的概念可以用作分析用户扩展定律的基本工具。我们根据信噪比、窃听者数量、分布式天线系统中的分布式天线数量和设计参数λ推导了一个安全的用户缩放律。通过分析和数值结果,我们从可实现的保密率方面描述了分布式天线数量对用户扩展行为的影响。与基于单一天线系统的传统结果相比,我们的研究结果表明,安装少量分布式天线可以在可实现的保密率方面提供显着的性能增益。
{"title":"Secrecy multiuser diversity for distributed antenna systems from the perspective of user-scaling law","authors":"I. Bang, S. Kim, D. Sung","doi":"10.1109/ICC.2016.7511621","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511621","url":null,"abstract":"In this paper, we introduce the notions of a user-scaling function and a user-scaling exponent and multiuser diversity (UEMD) pair. Our notions for the UEMD pair could be utilized as a basic tool for analyzing user-scaling laws. We derive a secure user-scaling law in terms of SNR, the number of eavesdroppers, the number of distributed antennas in distributed antenna systems, and design parameter λ. Through analytical and numerical results, we characterize the effect of the number of distributed antennas on the user-scaling behavior in terms of achievable secrecy rate. Compared with the conventional results based on a single antenna system, our results indicate that installing a small number of distributed antennas could provide a significant performance gain in terms of the achievable secrecy rate.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121072998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Locating user equipments and access points using RSSI fingerprints: A Gaussian process approach 使用RSSI指纹定位用户设备和接入点:高斯过程方法
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511152
S. Yiu, M. Dashti, H. Claussen, F. Pérez-Cruz
Location fingerprinting (LF) is an attractive localization technique which relies on existing infrastructures. The major drawback of LF is the requirement of having an updated fingerprint database. Gaussian Process (GP) is a non-parametric modeling technique which can be used to model the received signal strength indicator (RSSI) and create the fingerprint database based on few training data. In this paper we use a parametric pathloss model for the GP mean and a flexible non-parametric covariance function, so we can get reliable estimates with low fingerprinting effort. In our experiment, we show that with 23 fingerprint locations we perform as well as traditional fingerprinting with over 230 fingerprinted locations for an office space of 2500m2.
位置指纹(LF)是一种有吸引力的定位技术,它依赖于现有的基础设施。LF的主要缺点是需要更新指纹数据库。高斯过程(GP)是一种非参数化建模技术,可以对接收信号强度指标(RSSI)进行建模,并在少量训练数据的基础上建立指纹数据库。在本文中,我们使用了一个参数路径损失模型和一个灵活的非参数协方差函数作为GP均值,因此我们可以用较少的指纹识别工作量获得可靠的估计。在我们的实验中,我们证明了在2500平方米的办公空间中,使用23个指纹点,我们的表现与使用230多个指纹点的传统指纹识别一样好。
{"title":"Locating user equipments and access points using RSSI fingerprints: A Gaussian process approach","authors":"S. Yiu, M. Dashti, H. Claussen, F. Pérez-Cruz","doi":"10.1109/ICC.2016.7511152","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511152","url":null,"abstract":"Location fingerprinting (LF) is an attractive localization technique which relies on existing infrastructures. The major drawback of LF is the requirement of having an updated fingerprint database. Gaussian Process (GP) is a non-parametric modeling technique which can be used to model the received signal strength indicator (RSSI) and create the fingerprint database based on few training data. In this paper we use a parametric pathloss model for the GP mean and a flexible non-parametric covariance function, so we can get reliable estimates with low fingerprinting effort. In our experiment, we show that with 23 fingerprint locations we perform as well as traditional fingerprinting with over 230 fingerprinted locations for an office space of 2500m2.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2016 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1