Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073142
Jue Jiang, Rongheng Lin, Hua Zou
There are massive electricity data in the daily management, normalization operation, troubleshooting and other aspects of the power domain, but these professional and accurate data have not been fully mined and used. Constructing a power domain knowledge map can not only help power grid companies tap the value of these massive data and realize the integration of power knowledge, but also greatly facilitate the staff's query and acquisition of power information, and improve the work efficiency of the power industry. NER (name entity recognition) is the basis for constructing knowledge graph. This paper studies name entity recognition based on dictionaries and rules. It can standardize and accurately extract electricity from unstructured text through three methods: power entity dictionary, feature character rule matching, and part-of-speech combination rule matching. Related entities provide high-quality and high-precision entities for the construction of power domain knowledge graph.
{"title":"Power Domain Named Entity Recognition Based on Rules and Dictionaries","authors":"Jue Jiang, Rongheng Lin, Hua Zou","doi":"10.1109/ICCT56141.2022.10073142","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073142","url":null,"abstract":"There are massive electricity data in the daily management, normalization operation, troubleshooting and other aspects of the power domain, but these professional and accurate data have not been fully mined and used. Constructing a power domain knowledge map can not only help power grid companies tap the value of these massive data and realize the integration of power knowledge, but also greatly facilitate the staff's query and acquisition of power information, and improve the work efficiency of the power industry. NER (name entity recognition) is the basis for constructing knowledge graph. This paper studies name entity recognition based on dictionaries and rules. It can standardize and accurately extract electricity from unstructured text through three methods: power entity dictionary, feature character rule matching, and part-of-speech combination rule matching. Related entities provide high-quality and high-precision entities for the construction of power domain knowledge graph.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116448760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072684
Jun Tao, Huan-pin Chen, Xingxing She, Huamin Liu
VPN network is widely used at present, among which L2TP VPDN can better solve the problem of decentralized users accessing private networks, but users accessing through a variety of network types and multiple ISP will have higher time prices and occupy more bandwidth resources. Aiming at these drawbacks, a multi access L2TP VPDN network model named ILP is proposed, which has the characteristics of security and low cost. The simulation experiment of the new model is carried out, and the experimental results are analyzed by Waxman mathematical model, which shows that the results of the network simulation experiment are excellent. Finally, according to ILP model, the actual network is constructed, and all parameters operate normally.
{"title":"A Multi Access VPDN Network Model","authors":"Jun Tao, Huan-pin Chen, Xingxing She, Huamin Liu","doi":"10.1109/ICCT56141.2022.10072684","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072684","url":null,"abstract":"VPN network is widely used at present, among which L2TP VPDN can better solve the problem of decentralized users accessing private networks, but users accessing through a variety of network types and multiple ISP will have higher time prices and occupy more bandwidth resources. Aiming at these drawbacks, a multi access L2TP VPDN network model named ILP is proposed, which has the characteristics of security and low cost. The simulation experiment of the new model is carried out, and the experimental results are analyzed by Waxman mathematical model, which shows that the results of the network simulation experiment are excellent. Finally, according to ILP model, the actual network is constructed, and all parameters operate normally.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124151525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072536
Zhang Chen, Zhihu Wei, Jia-liang Zhu
In this paper, we make the sensitivity analysis on the RF-PWM signal performance metrics with respect to the delay mismatches. First, the delay mismatches in the five-level outphasing digital transmitter architecture are modeled and sorted into three categories. Then, a closed-form expression of the total delay mismatches among random outphasing outputs is proposed, in terms of the outphasing RF-PWM principle and digital delay line characteristic. Finally, numerical simulations in MATLAB were used to analyze the EVM, ACPR and harmonics elimination performances affected by delay mismatches in three different scenarios. We find the EVM and the third-harmonic are very sensitive to delay mismatches, while ACPRs even perform better. Besides, we make a brief discussion on the observed asymmetry and periodicity of the simulation results in all scenes.
{"title":"Delay Mismatches Analysis for Multi-level Outphasing Digital Transmitters","authors":"Zhang Chen, Zhihu Wei, Jia-liang Zhu","doi":"10.1109/ICCT56141.2022.10072536","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072536","url":null,"abstract":"In this paper, we make the sensitivity analysis on the RF-PWM signal performance metrics with respect to the delay mismatches. First, the delay mismatches in the five-level outphasing digital transmitter architecture are modeled and sorted into three categories. Then, a closed-form expression of the total delay mismatches among random outphasing outputs is proposed, in terms of the outphasing RF-PWM principle and digital delay line characteristic. Finally, numerical simulations in MATLAB were used to analyze the EVM, ACPR and harmonics elimination performances affected by delay mismatches in three different scenarios. We find the EVM and the third-harmonic are very sensitive to delay mismatches, while ACPRs even perform better. Besides, we make a brief discussion on the observed asymmetry and periodicity of the simulation results in all scenes.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126477768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072716
P. Miao, Hui Peng, Yu Yao, Peng Chen, Darming Tian
Inspired by the model-solving procedure of Volterra equalizer, an efficient nonlinear post equalization (NPE) is proposed to mitigate the channel nonlinearity in visible light communications (VLCs). Our insight is to employ the Volterra feature as spatial input, and then deploy the convolutional neural network to extract the ambiguity and implicit of nonlinearity feature. After that, we use the long-short term memory network for predicting the original transmitted signal from the received ones. Simulation results show that the proposed NPE can converge to the desired target loss with a comforting speed at the training phase and can provide the well-compensation for the overall nonlinearity at the testing phase. Moreover, compared with the conventional equalizer, the proposed one can achieve an excellent recovery accuracy and bit error rate performance, showing the validity for channel nonlinearity compensation in VLC system.
{"title":"Performance Study of Model-Driven Based Neural Network for VLC Channel Impairments Compensation","authors":"P. Miao, Hui Peng, Yu Yao, Peng Chen, Darming Tian","doi":"10.1109/ICCT56141.2022.10072716","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072716","url":null,"abstract":"Inspired by the model-solving procedure of Volterra equalizer, an efficient nonlinear post equalization (NPE) is proposed to mitigate the channel nonlinearity in visible light communications (VLCs). Our insight is to employ the Volterra feature as spatial input, and then deploy the convolutional neural network to extract the ambiguity and implicit of nonlinearity feature. After that, we use the long-short term memory network for predicting the original transmitted signal from the received ones. Simulation results show that the proposed NPE can converge to the desired target loss with a comforting speed at the training phase and can provide the well-compensation for the overall nonlinearity at the testing phase. Moreover, compared with the conventional equalizer, the proposed one can achieve an excellent recovery accuracy and bit error rate performance, showing the validity for channel nonlinearity compensation in VLC system.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127887466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072685
Yinzhu Yu, Xiaoyan Huang, Ke Zhang, Fan Wu, S. Leng
In Vehicular Ad Hoc Networks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside unit communications. Most of traditional protocols do not consider the impact of vehicular safety on authentication efficiency, thus implementing the same authentication process for all vehicles, which leads to large overhead and inflexible authentication. In this paper, we propose a differentiated identity authentication protocol based on vehicular safety level to reduce the authentication overhead and increase flexibility. In the proposed protocol, Roadside Unit (RSU) can choose appropriate authentication method for vehicle according to its safety level, which is evaluated by hardware safety and behavior safety. In addition, anonymous mutual authentication with key agreement is enabled by exploiting the trapdoor collision property of chameleon hash functions, thus the proposed protocol can effectively avoid the communication overhead caused by the transmission of certificates, and there is no key escrow problem. At the same time, combined with Physical Unclonable Functions (PUFs) technology, the proposed protocol can resist physical attacks. Simulation results demonstrate that the proposed protocol can not only effectively improve the flexibility of vehicular authentication, but also have advantages in reducing computation delay and communication overhead.
{"title":"A Differentiated Identity Authentication Protocol for VANETs Based on Safety Level","authors":"Yinzhu Yu, Xiaoyan Huang, Ke Zhang, Fan Wu, S. Leng","doi":"10.1109/ICCT56141.2022.10072685","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072685","url":null,"abstract":"In Vehicular Ad Hoc Networks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside unit communications. Most of traditional protocols do not consider the impact of vehicular safety on authentication efficiency, thus implementing the same authentication process for all vehicles, which leads to large overhead and inflexible authentication. In this paper, we propose a differentiated identity authentication protocol based on vehicular safety level to reduce the authentication overhead and increase flexibility. In the proposed protocol, Roadside Unit (RSU) can choose appropriate authentication method for vehicle according to its safety level, which is evaluated by hardware safety and behavior safety. In addition, anonymous mutual authentication with key agreement is enabled by exploiting the trapdoor collision property of chameleon hash functions, thus the proposed protocol can effectively avoid the communication overhead caused by the transmission of certificates, and there is no key escrow problem. At the same time, combined with Physical Unclonable Functions (PUFs) technology, the proposed protocol can resist physical attacks. Simulation results demonstrate that the proposed protocol can not only effectively improve the flexibility of vehicular authentication, but also have advantages in reducing computation delay and communication overhead.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117231039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073280
G. Wang, Jie Wu, Yuxian Sun, LiXiang Ren, Zhennan Liang, Quanhua Liu
This paper proposes a new digital compensation method for wideband phased array radar using nonlinear frequency modulated signal, which not only reduces the sampling rate of the echo but also obtains the low sidelobe without tapering and high-resolution range profile of the target. At the same time, the time delay differences caused by different array element positions are compensated. Computational results demonstrate both the compensation accuracy and the time-sampling efficiency of the proposed method.
{"title":"Digital Compensation Technique for Wideband Phased Array Radar Using Nonlinear Frequency Modulation","authors":"G. Wang, Jie Wu, Yuxian Sun, LiXiang Ren, Zhennan Liang, Quanhua Liu","doi":"10.1109/ICCT56141.2022.10073280","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073280","url":null,"abstract":"This paper proposes a new digital compensation method for wideband phased array radar using nonlinear frequency modulated signal, which not only reduces the sampling rate of the echo but also obtains the low sidelobe without tapering and high-resolution range profile of the target. At the same time, the time delay differences caused by different array element positions are compensated. Computational results demonstrate both the compensation accuracy and the time-sampling efficiency of the proposed method.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117282658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072811
Qian-Yu Wang, C. Li, Peng Qin, Zhongshan Deng
In this study, a flexible and foldable frequency-reconfigurable antenna of liquid metal with cube structure is proposed. Based on the origami theory, the operating frequency of the antenna can be changed by folding the designed antenna to make it into a cube structure. The designed antenna does not have a rigid connection structure and has two modes: planer and folded modes. The re-flection coefficient of the antenna is 8.51-8.66 GHz (resonated at 8.59 GHz) and 12.54-12.83 GHz (resonated at 12.69 GHz) in the range below -10dB in the planer state and the 90° folded state, respectively. The antenna of this design has the characteristics of omnidirectional radiation, and the peak gain is 6.53 dBi. This work solves the problem of strain caused by traditional rigid materials and provides a liquid metal reconfigurable antenna that can be easily folded and used repeatedly.
{"title":"A Flexible and Foldable Frequency-Reconfigurable Antenna Based on Liquid Metal","authors":"Qian-Yu Wang, C. Li, Peng Qin, Zhongshan Deng","doi":"10.1109/ICCT56141.2022.10072811","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072811","url":null,"abstract":"In this study, a flexible and foldable frequency-reconfigurable antenna of liquid metal with cube structure is proposed. Based on the origami theory, the operating frequency of the antenna can be changed by folding the designed antenna to make it into a cube structure. The designed antenna does not have a rigid connection structure and has two modes: planer and folded modes. The re-flection coefficient of the antenna is 8.51-8.66 GHz (resonated at 8.59 GHz) and 12.54-12.83 GHz (resonated at 12.69 GHz) in the range below -10dB in the planer state and the 90° folded state, respectively. The antenna of this design has the characteristics of omnidirectional radiation, and the peak gain is 6.53 dBi. This work solves the problem of strain caused by traditional rigid materials and provides a liquid metal reconfigurable antenna that can be easily folded and used repeatedly.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132559594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073084
Yindong Xiao, Bo Peng, Ke Liu, Zaiming Fu, Cong Hu
Digital noise signal synthesis methods have good scalability and flexibility, and can be divided into table look-up and transform methods depending on the implementation method. The accuracy of noise distribution synthesized by the look-up table method is limited by the storage depth, on the other hand, the maximum synthesis speed of the transform method is limited by the hardware computation speed. In this paper, we propose a new implementation method for digital noise signal synthesis, which divides the noise output into high probability intervals and low probability intervals by probability. The high probability interval noise generation is based on the look-up table method, and the low probability interval noise generation is based on the transformation method for real-time computation. The method is validated experimentally in terms of distribution accuracy, storage space occupation and output speed. The results show that the method has higher output accuracy than the look-up table method and faster output speed compared to the transformation method.
{"title":"A Digital Noise Signal Synthesis Method Based on a Combination of Table Look-up and Transformation","authors":"Yindong Xiao, Bo Peng, Ke Liu, Zaiming Fu, Cong Hu","doi":"10.1109/ICCT56141.2022.10073084","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073084","url":null,"abstract":"Digital noise signal synthesis methods have good scalability and flexibility, and can be divided into table look-up and transform methods depending on the implementation method. The accuracy of noise distribution synthesized by the look-up table method is limited by the storage depth, on the other hand, the maximum synthesis speed of the transform method is limited by the hardware computation speed. In this paper, we propose a new implementation method for digital noise signal synthesis, which divides the noise output into high probability intervals and low probability intervals by probability. The high probability interval noise generation is based on the look-up table method, and the low probability interval noise generation is based on the transformation method for real-time computation. The method is validated experimentally in terms of distribution accuracy, storage space occupation and output speed. The results show that the method has higher output accuracy than the look-up table method and faster output speed compared to the transformation method.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128088614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073030
Siyue Qiu, M. Yao, Zhiqiang Liu
In this paper, a high speed and low power double-edge triggered D flip-flop based on conditional discharge technique is proposed. By applying a scheme in the conditional discharge path, which takes the voltage difference between the internal node and the output node as the conduction condition, the circuit not only improves the circuit structure, but also reduces the power dissipation and the total power delay product. The simulation results show that the proposed D flip-flop has the correct logic function and is superior to other literatures in terms of power dissipation, delay and cost at the working frequency of 250MHz.
{"title":"Low-Power Double-Edge Triggered D Flip-Flop Based on the Conditional Discharge Technique","authors":"Siyue Qiu, M. Yao, Zhiqiang Liu","doi":"10.1109/ICCT56141.2022.10073030","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073030","url":null,"abstract":"In this paper, a high speed and low power double-edge triggered D flip-flop based on conditional discharge technique is proposed. By applying a scheme in the conditional discharge path, which takes the voltage difference between the internal node and the output node as the conduction condition, the circuit not only improves the circuit structure, but also reduces the power dissipation and the total power delay product. The simulation results show that the proposed D flip-flop has the correct logic function and is superior to other literatures in terms of power dissipation, delay and cost at the working frequency of 250MHz.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133245872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073379
P. Zhao, Jia-kuo Zuo, Chenchi Wen
This paper proposes a network of simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) assisted simultaneous wireless information and power transfer (SWIPT) system, where time switching (TS) protocol is applied. The objective is to maximize the sum rate of all information decoding receivers (IDRs) via jointly optimizing the power allocation of IDRs, beamforming vectors at the STAR-RIS while taking into account the power of the IDRs and the received energy of energy harvesting receivers (EHRs). To solve the formulated non-convex problem, we first convert the problem into a standard semidefinite programming (SDP) problem, and then solve it by applying Gaussian Randomization algorithm and successive convex approximation (SCA) algorithm. Simulation results prove that the two algorithms can improve the performance of STAR-RIS.
{"title":"Power Allocation and Beamforming Vectors Optimization in STAR-RIS Assisted SWIPT","authors":"P. Zhao, Jia-kuo Zuo, Chenchi Wen","doi":"10.1109/ICCT56141.2022.10073379","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073379","url":null,"abstract":"This paper proposes a network of simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) assisted simultaneous wireless information and power transfer (SWIPT) system, where time switching (TS) protocol is applied. The objective is to maximize the sum rate of all information decoding receivers (IDRs) via jointly optimizing the power allocation of IDRs, beamforming vectors at the STAR-RIS while taking into account the power of the IDRs and the received energy of energy harvesting receivers (EHRs). To solve the formulated non-convex problem, we first convert the problem into a standard semidefinite programming (SDP) problem, and then solve it by applying Gaussian Randomization algorithm and successive convex approximation (SCA) algorithm. Simulation results prove that the two algorithms can improve the performance of STAR-RIS.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"95 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114060420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}