Pub Date : 2009-12-31DOI: 10.1109/WCSP.2009.5371493
Xujie Li, Lianfeng Shen, Bo Xu
In this paper, C3G-A (Combining the third generation mobile communication network and Ad hoc network) system is presented. Call Admission Control (CAC) plays an important role in radio resource management of wireless communication networks. It permits or denies the call arrival connection requests based on the certain criteria. To analyze the performance of CAC in C3G-A system, Markov chain model is presented. Then the performance formulas such as new call blocking probability and handover blocking probability are developed. Numerical results show C3G-A system outperforms conventional TD-SCDMA system with respect to new call blocking probability and handover blocking probability.
{"title":"Performance analysis on Call Admission Control in C3G-A system","authors":"Xujie Li, Lianfeng Shen, Bo Xu","doi":"10.1109/WCSP.2009.5371493","DOIUrl":"https://doi.org/10.1109/WCSP.2009.5371493","url":null,"abstract":"In this paper, C3G-A (Combining the third generation mobile communication network and Ad hoc network) system is presented. Call Admission Control (CAC) plays an important role in radio resource management of wireless communication networks. It permits or denies the call arrival connection requests based on the certain criteria. To analyze the performance of CAC in C3G-A system, Markov chain model is presented. Then the performance formulas such as new call blocking probability and handover blocking probability are developed. Numerical results show C3G-A system outperforms conventional TD-SCDMA system with respect to new call blocking probability and handover blocking probability.","PeriodicalId":244652,"journal":{"name":"2009 International Conference on Wireless Communications & Signal Processing","volume":"29 30","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113973306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/WCSP.2009.5371560
Fei Xie, K. Hua
In this work, we propose using video caching in the wireless relay networks (WRNs) for video on demand (VoD) service. We assume the relay station (RS) of the WRNs is capable of caching a small portion of the ongoing video stream. The cached video data can be used to accommodate new user requests. Previous works on video caching for VoD are in the context of overlay network, where the physical topology is a minor concern. However, in the WMNs, it is crucial for us to take the topology into consideration. Based on the topology, we could minimize the communication cost for a request to join a video multicast. In this way, efficient utilization of video caching in the targeted environment can be achieved. Simulation study verifies the efficiency of the proposed approach.
{"title":"A caching-based video-on-demand service in wireless relay networks","authors":"Fei Xie, K. Hua","doi":"10.1109/WCSP.2009.5371560","DOIUrl":"https://doi.org/10.1109/WCSP.2009.5371560","url":null,"abstract":"In this work, we propose using video caching in the wireless relay networks (WRNs) for video on demand (VoD) service. We assume the relay station (RS) of the WRNs is capable of caching a small portion of the ongoing video stream. The cached video data can be used to accommodate new user requests. Previous works on video caching for VoD are in the context of overlay network, where the physical topology is a minor concern. However, in the WMNs, it is crucial for us to take the topology into consideration. Based on the topology, we could minimize the communication cost for a request to join a video multicast. In this way, efficient utilization of video caching in the targeted environment can be achieved. Simulation study verifies the efficiency of the proposed approach.","PeriodicalId":244652,"journal":{"name":"2009 International Conference on Wireless Communications & Signal Processing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114685090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/WCSP.2009.5371757
Xiaofu Wu, Yue Song, Chunming Zhao, X. You
The reciprocal nature of wireless radio channels can be well employed to extract a secret key between two terminals. The maximum size of a key that can be shared is characterized by the mutual information between the observations of two radios. We consider a correlated fading channel and a closed form for the mutual information is derived. It is found that the secrecy capacity is largely limited by the maximum Doppler frequency.
{"title":"Secrecy extraction from correlated fading channels: An upper bound","authors":"Xiaofu Wu, Yue Song, Chunming Zhao, X. You","doi":"10.1109/WCSP.2009.5371757","DOIUrl":"https://doi.org/10.1109/WCSP.2009.5371757","url":null,"abstract":"The reciprocal nature of wireless radio channels can be well employed to extract a secret key between two terminals. The maximum size of a key that can be shared is characterized by the mutual information between the observations of two radios. We consider a correlated fading channel and a closed form for the mutual information is derived. It is found that the secrecy capacity is largely limited by the maximum Doppler frequency.","PeriodicalId":244652,"journal":{"name":"2009 International Conference on Wireless Communications & Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114736848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/WCSP.2009.5371665
Yao-Jen Chang, C. Ho
A self-organizing fuzzy neural network (SOFNN)-based equalization is presented for time-variant environments. A rival penalized controlled competitive learning (RPCCL) is adopted to locate global minimum for mean vectors of fuzzy rules and organize the ideal structure of the fuzzy neural network (FNN) simultaneously. Then a supervised learning by means of the backpropagation (BP) algorithm is used for adjusting all parameters of the FNN. Results show that the performance of the newly designed strategy is much improved for adaptive filters with conventional FNN or least mean square (LMS) scheme.
{"title":"SOFNN-based equalization using rival penalized controlled competitive learning for time-varying environments","authors":"Yao-Jen Chang, C. Ho","doi":"10.1109/WCSP.2009.5371665","DOIUrl":"https://doi.org/10.1109/WCSP.2009.5371665","url":null,"abstract":"A self-organizing fuzzy neural network (SOFNN)-based equalization is presented for time-variant environments. A rival penalized controlled competitive learning (RPCCL) is adopted to locate global minimum for mean vectors of fuzzy rules and organize the ideal structure of the fuzzy neural network (FNN) simultaneously. Then a supervised learning by means of the backpropagation (BP) algorithm is used for adjusting all parameters of the FNN. Results show that the performance of the newly designed strategy is much improved for adaptive filters with conventional FNN or least mean square (LMS) scheme.","PeriodicalId":244652,"journal":{"name":"2009 International Conference on Wireless Communications & Signal Processing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122265632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/WCSP.2009.5371734
Yuan Cheng, Yuan Zhang, Xiqi Gao
The performance of WiMAX in a multi-traffic scenario is studied, including system throughput, access delay and packet dropping rate. The effects of frame structure, minimum contention window size and delay constraint on the performance are investigated for different prioritized applications. Simulation results show that, increased system throughput, reduced access delay and lower packet dropping rate can be achieved by selecting the optimum frame structure and accessing parameters for applications with different quality of service (QoS) requirements.
{"title":"Performance study of multi-traffic access in WiMAX","authors":"Yuan Cheng, Yuan Zhang, Xiqi Gao","doi":"10.1109/WCSP.2009.5371734","DOIUrl":"https://doi.org/10.1109/WCSP.2009.5371734","url":null,"abstract":"The performance of WiMAX in a multi-traffic scenario is studied, including system throughput, access delay and packet dropping rate. The effects of frame structure, minimum contention window size and delay constraint on the performance are investigated for different prioritized applications. Simulation results show that, increased system throughput, reduced access delay and lower packet dropping rate can be achieved by selecting the optimum frame structure and accessing parameters for applications with different quality of service (QoS) requirements.","PeriodicalId":244652,"journal":{"name":"2009 International Conference on Wireless Communications & Signal Processing","volume":"380 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115915698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/WCSP.2009.5371511
T. Lun, Hung-Chuan Lin, Wang Huan, Qian Chen
A cognitive radio network (CRN) is formed by allowing the secondary user (SU) to opportunistically access the frequency bands originally allocated to primary user (PU) as long as its interference does not degrade the quality of service (QoS) of PU to an unacceptable level. Specially, by using a suboptimal scheme, we analyze the ergodic capacity under three types of constraints which satisfy primary QoS requirements for delay-insensitive, delay-sensitive and mixed applications, respectively. In particular, considering different fading channel models, we further provide the closed-form expressions for ergodic capacity of SU subject to corresponding constraints. Numerical simulation results corroborating our theoretical analysis were also provided.
认知无线网络(cognitive radio network, CRN)是一种允许从用户(SU)偶然地访问原分配给主用户(PU)的频段的网络,只要它的干扰不会使主用户的服务质量(QoS)降低到不可接受的水平。特别地,我们利用次优方案,分别分析了满足延迟不敏感、延迟敏感和混合应用的主要QoS要求的三种约束下的遍历容量。特别是,考虑到不同的衰落信道模型,我们进一步给出了受相应约束的SU遍历容量的封闭表达式。数值模拟结果也证实了我们的理论分析。
{"title":"Power allocation based on Convex Optimization Theory for fading channels in OFDM-based cognitive radio networks","authors":"T. Lun, Hung-Chuan Lin, Wang Huan, Qian Chen","doi":"10.1109/WCSP.2009.5371511","DOIUrl":"https://doi.org/10.1109/WCSP.2009.5371511","url":null,"abstract":"A cognitive radio network (CRN) is formed by allowing the secondary user (SU) to opportunistically access the frequency bands originally allocated to primary user (PU) as long as its interference does not degrade the quality of service (QoS) of PU to an unacceptable level. Specially, by using a suboptimal scheme, we analyze the ergodic capacity under three types of constraints which satisfy primary QoS requirements for delay-insensitive, delay-sensitive and mixed applications, respectively. In particular, considering different fading channel models, we further provide the closed-form expressions for ergodic capacity of SU subject to corresponding constraints. Numerical simulation results corroborating our theoretical analysis were also provided.","PeriodicalId":244652,"journal":{"name":"2009 International Conference on Wireless Communications & Signal Processing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132070771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/WCSP.2009.5371463
W. Yuhang, Huang Cenyu, L. Xiaoying, Wang Zhigong
As one of the basic concepts of the Chinese medicine, the theory of Meridians and Collaterals is lack of scientific demonstration so far. In order to verify the existence of Meridians and Collaterals, a method based on the electric technique and information theory is suggested, A specialized electrode array has been designed and an experimental scheme of signal stimulating and detecting was introduced. The response signals at different points on skin surface were analyzed. A difference between the signal amplitudes along a Meridian and on its sides was found. The study on Meridian based on the electric technique and information theory is one of the important fields of bioelectronics.
{"title":"Primary study on the electric signal transmission characteristics of human Meridians on skin surface","authors":"W. Yuhang, Huang Cenyu, L. Xiaoying, Wang Zhigong","doi":"10.1109/WCSP.2009.5371463","DOIUrl":"https://doi.org/10.1109/WCSP.2009.5371463","url":null,"abstract":"As one of the basic concepts of the Chinese medicine, the theory of Meridians and Collaterals is lack of scientific demonstration so far. In order to verify the existence of Meridians and Collaterals, a method based on the electric technique and information theory is suggested, A specialized electrode array has been designed and an experimental scheme of signal stimulating and detecting was introduced. The response signals at different points on skin surface were analyzed. A difference between the signal amplitudes along a Meridian and on its sides was found. The study on Meridian based on the electric technique and information theory is one of the important fields of bioelectronics.","PeriodicalId":244652,"journal":{"name":"2009 International Conference on Wireless Communications & Signal Processing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132119518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/WCSP.2009.5371674
Dan Wu, Yueming Cai
In the paper, we consider the interference as a detriment to the performance of the relay enhanced cellular system. Then we build up the interference channel model based on amplify-and-forward protocol and decode-and-forward protocol, respectively. The interference comes not only from the adjacent cells, but also from the inner of the same cell. Moreover, proper power allocation can obtain a good tradeoff between the performance and the interference. Power allocation in interference relay channels based on non-cooperative game theory is proposed. Concretely, two stages constitute the game model, namely power allocation among the source nodes and among the relay nodes. The two utility functions are different from the different stations of the source nodes and relay nodes. But the two utility functions are designed to guarantee the target SINR. For the two-stage game, we prove the existence and uniqueness of Nash equilibriums, and the proposed distributed algorithm always converges to the unique Nash equilibrium from an arbitrary starting point. Meanwhile, simulation results show our allocation scheme has good convergence.
{"title":"Power allocation in interference relay channels based on non-cooperative game theory","authors":"Dan Wu, Yueming Cai","doi":"10.1109/WCSP.2009.5371674","DOIUrl":"https://doi.org/10.1109/WCSP.2009.5371674","url":null,"abstract":"In the paper, we consider the interference as a detriment to the performance of the relay enhanced cellular system. Then we build up the interference channel model based on amplify-and-forward protocol and decode-and-forward protocol, respectively. The interference comes not only from the adjacent cells, but also from the inner of the same cell. Moreover, proper power allocation can obtain a good tradeoff between the performance and the interference. Power allocation in interference relay channels based on non-cooperative game theory is proposed. Concretely, two stages constitute the game model, namely power allocation among the source nodes and among the relay nodes. The two utility functions are different from the different stations of the source nodes and relay nodes. But the two utility functions are designed to guarantee the target SINR. For the two-stage game, we prove the existence and uniqueness of Nash equilibriums, and the proposed distributed algorithm always converges to the unique Nash equilibrium from an arbitrary starting point. Meanwhile, simulation results show our allocation scheme has good convergence.","PeriodicalId":244652,"journal":{"name":"2009 International Conference on Wireless Communications & Signal Processing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132228832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/WCSP.2009.5371754
W. Jo, Ju-wook Jang
The frame structure design is more challenging in the new mobile multi-hop relay based (MMR) network architecture, as numerous dimensions of design constraints and challenges have been introduced. Tao et al. propose a simple yet flexible multi-zone framework based upon the current 802.16e OFDMA frame structure design, which enables multi-hop operation while still maintaining the backward compatibility with the legacy mobile stations. However, RS in each tier has different time of receiving data from BS. This time gap is wide and enlarges the ratio of relay zone in frame structure, which decreases system throughput. In addition, this scheme is not considering frequency reuse. In this paper, we propose a MMR frame structure which improves performance while maintaining the backward compatibility. We design the frame structure with frequency reuse. We divide relay zone into several sub relay zones and BS transmits the data starting from the last tier RS to the first tier RS. As a result, we minimize the average time gap of receiving data for RSs. With our proposed frame structure, our simulation shows improvement of MAC efficiency by 30% compared with the scheme by Tao et al.
{"title":"Reduction of latency in mobile multi-hop relay(MMR) networks","authors":"W. Jo, Ju-wook Jang","doi":"10.1109/WCSP.2009.5371754","DOIUrl":"https://doi.org/10.1109/WCSP.2009.5371754","url":null,"abstract":"The frame structure design is more challenging in the new mobile multi-hop relay based (MMR) network architecture, as numerous dimensions of design constraints and challenges have been introduced. Tao et al. propose a simple yet flexible multi-zone framework based upon the current 802.16e OFDMA frame structure design, which enables multi-hop operation while still maintaining the backward compatibility with the legacy mobile stations. However, RS in each tier has different time of receiving data from BS. This time gap is wide and enlarges the ratio of relay zone in frame structure, which decreases system throughput. In addition, this scheme is not considering frequency reuse. In this paper, we propose a MMR frame structure which improves performance while maintaining the backward compatibility. We design the frame structure with frequency reuse. We divide relay zone into several sub relay zones and BS transmits the data starting from the last tier RS to the first tier RS. As a result, we minimize the average time gap of receiving data for RSs. With our proposed frame structure, our simulation shows improvement of MAC efficiency by 30% compared with the scheme by Tao et al.","PeriodicalId":244652,"journal":{"name":"2009 International Conference on Wireless Communications & Signal Processing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130023195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-31DOI: 10.1109/WCSP.2009.5371527
Li Gang, Li Guangxia, Lv Jing, Chang Jiang, Jie Xiao
The paper presents a novel method to detect multipath in code phase measurement. The method is based on wavelet transform modulus maxima. The detected maxima are the singular points of the code correlation peak and can be used to detect the number and corresponding delays of multipath signals. The simulation result demonstrates that it is an effective method to detect multipath signals.
{"title":"A method of multipath detection in navigation receiver","authors":"Li Gang, Li Guangxia, Lv Jing, Chang Jiang, Jie Xiao","doi":"10.1109/WCSP.2009.5371527","DOIUrl":"https://doi.org/10.1109/WCSP.2009.5371527","url":null,"abstract":"The paper presents a novel method to detect multipath in code phase measurement. The method is based on wavelet transform modulus maxima. The detected maxima are the singular points of the code correlation peak and can be used to detect the number and corresponding delays of multipath signals. The simulation result demonstrates that it is an effective method to detect multipath signals.","PeriodicalId":244652,"journal":{"name":"2009 International Conference on Wireless Communications & Signal Processing","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134232853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}