Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072594
Wanning Liu, Ducheng Wu, Yitao Xu, Na He, Tianyao Zhong
To solve the multi-dimensional resource allocation problem in the large-scale cache-enabled multicasting wireless networks, this paper proposes a multi-stage virtual matching game method. Specifically, the proposed method performs virtual grouping of mobile users (MUs) according to location distribution of MUs, the file request probabilities of MUs, and the coverage area of cache-enabled access points (CAPs). Moreover, by virtual grouping, the huge decision-making space has been significantly reduced. Then, we propose the multi-stage virtual matching game method, which is superior to the better response (BR) algorithm in computation of single iteration, convergence speed, and system utility function.
{"title":"Cache Placement with Virtual Matching in Large-Scale Cache-Enabled Multicasting Wireless Networks","authors":"Wanning Liu, Ducheng Wu, Yitao Xu, Na He, Tianyao Zhong","doi":"10.1109/ICCT56141.2022.10072594","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072594","url":null,"abstract":"To solve the multi-dimensional resource allocation problem in the large-scale cache-enabled multicasting wireless networks, this paper proposes a multi-stage virtual matching game method. Specifically, the proposed method performs virtual grouping of mobile users (MUs) according to location distribution of MUs, the file request probabilities of MUs, and the coverage area of cache-enabled access points (CAPs). Moreover, by virtual grouping, the huge decision-making space has been significantly reduced. Then, we propose the multi-stage virtual matching game method, which is superior to the better response (BR) algorithm in computation of single iteration, convergence speed, and system utility function.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123851053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073134
Yazi Wang, Yongli Zhao, Xiaosong Yu, Yongmei Sun, J. Zhang
Quantum entanglement enables numerous quantum applications such as secure communication. Based on entanglement-based quantum networks, long-distance entanglement establishment between two distant end nodes is vital to realize practical quantum networks. However, due to the decoherence and imperfect quantum operations such as the non-determinism of entanglement swapping, the latency of remote entanglement distribution will be increased, simultaneously, ongoing quantum operations will be cut off caused by the short coherence time of quantum memory. In this article, we propose a pre-established entanglement distribution algorithm which contains a time-guaranteed memory cells selection algorithm, aiming to choose the maximum time-matching entangled particle in each node to establish end-to-end entanglement. Simulation results show that for the different scales of grid network topologies, all success probability values are increasing with increase the size of the memory cells and the size of the time slots. Considering constructing the large scale of quantum network, it's necessary to consider employing high multi-mode capability and long lifetime quantum memory.
{"title":"Pre-established Entanglement Distribution with Time-Guaranteed Memory Cells Selection in Quantum Networks","authors":"Yazi Wang, Yongli Zhao, Xiaosong Yu, Yongmei Sun, J. Zhang","doi":"10.1109/ICCT56141.2022.10073134","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073134","url":null,"abstract":"Quantum entanglement enables numerous quantum applications such as secure communication. Based on entanglement-based quantum networks, long-distance entanglement establishment between two distant end nodes is vital to realize practical quantum networks. However, due to the decoherence and imperfect quantum operations such as the non-determinism of entanglement swapping, the latency of remote entanglement distribution will be increased, simultaneously, ongoing quantum operations will be cut off caused by the short coherence time of quantum memory. In this article, we propose a pre-established entanglement distribution algorithm which contains a time-guaranteed memory cells selection algorithm, aiming to choose the maximum time-matching entangled particle in each node to establish end-to-end entanglement. Simulation results show that for the different scales of grid network topologies, all success probability values are increasing with increase the size of the memory cells and the size of the time slots. Considering constructing the large scale of quantum network, it's necessary to consider employing high multi-mode capability and long lifetime quantum memory.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121386701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072949
Yuan-zhi He, Chensheng Ma
The terahertz frequency band has the advantages of large bandwidth, narrow beam, strong penetration, and high security, and is an important direction for the frequency expansion of the next generation of satellite communications. In this paper, according to the satellite-ground and inter-satellite terahertz communication frequency bands divided by the International Telecommunication Union, the atmospheric transmission loss model of the satellite-ground terahertz communication link is constructed and simulated, and the key components of terahertz communication in different frequency bands are analyzed based on the research status at home and abroad. At the same time, the transmission performance comparison of satellite-ground and inter-satellite terahertz communication links in different frequency bands was carried out. Finally, through a comprehensive analysis of the transmission loss, device availability and link transmission performance of different terahertz communication frequency bands, the recommendations for the selection of frequencies for satellite-ground and inter-satellite terahertz communication.
{"title":"Research on Frequency Selection Method for Spatial Terahertz Communication under Multiple Constraints","authors":"Yuan-zhi He, Chensheng Ma","doi":"10.1109/ICCT56141.2022.10072949","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072949","url":null,"abstract":"The terahertz frequency band has the advantages of large bandwidth, narrow beam, strong penetration, and high security, and is an important direction for the frequency expansion of the next generation of satellite communications. In this paper, according to the satellite-ground and inter-satellite terahertz communication frequency bands divided by the International Telecommunication Union, the atmospheric transmission loss model of the satellite-ground terahertz communication link is constructed and simulated, and the key components of terahertz communication in different frequency bands are analyzed based on the research status at home and abroad. At the same time, the transmission performance comparison of satellite-ground and inter-satellite terahertz communication links in different frequency bands was carried out. Finally, through a comprehensive analysis of the transmission loss, device availability and link transmission performance of different terahertz communication frequency bands, the recommendations for the selection of frequencies for satellite-ground and inter-satellite terahertz communication.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114235074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073044
Yang Li, Yan Wang, Yuan Wang, Jiaheng Wang
Enhanced Machine-Type Communication (eMTC) is a bandwidth-reduced low-complexity technology introduced by the 3rd Generation Partnership Project (3GPP). Repetition is employed in eMTC to improve network coverage. For different repetition levels, the choice of the Modulation and Coding Scheme (MCS) and the resource block (RB) allocation have to be carefully designed to meet the performance requirements. Furthermore, the existing eMTC systems do not support space division multiplex (SDM) and multiple-input multiple-output (MIMO). To sufficiently exploit the space dimension resources, we consider MIMO for uplink eMTC systems, which allows multiple users to share the same resource block. In this work, we focus on the joint resource allocation for uplink eMTC taking into account MIMO and the repetition feature. We first introduce the uplink eMTC features and extension with MIMO. Next, we optimize the resource allocation in two steps. In the first step, we propose an algorithm to jointly select the optimal repetition level, MCS and the required number of physical resource blocks. In the second step, we propose an efficient physical resource block scheduling algorithm for eMTC with MIMO. Simulation results show that the proposed algorithms can allocate appropriate resources for users and significantly improve the system performance.
增强型机器类型通信(eMTC)是第三代合作伙伴计划(3GPP)推出的一种带宽降低、复杂度低的技术。eMTC 采用重复技术来改善网络覆盖。对于不同的重复级别,必须精心设计调制和编码方案(MCS)的选择以及资源块(RB)的分配,以满足性能要求。此外,现有的 eMTC 系统不支持空分复用(SDM)和多输入多输出(MIMO)。为了充分利用空间维度资源,我们考虑在上行 eMTC 系统中采用 MIMO,允许多个用户共享同一资源块。在这项工作中,我们重点研究上行 eMTC 的联合资源分配,同时考虑 MIMO 和重复特性。我们首先介绍了上行链路 eMTC 的特点以及与 MIMO 的扩展。接下来,我们分两步优化资源分配。第一步,我们提出了一种算法,用于共同选择最佳重复级别、MCS 和所需物理资源块的数量。第二步,我们为具有多输入多输出的 eMTC 提出了一种高效的物理资源块调度算法。仿真结果表明,所提出的算法可以为用户分配适当的资源,并显著提高系统性能。
{"title":"Joint Resource Allocation for Enhanced Machine-Type Communication","authors":"Yang Li, Yan Wang, Yuan Wang, Jiaheng Wang","doi":"10.1109/ICCT56141.2022.10073044","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073044","url":null,"abstract":"Enhanced Machine-Type Communication (eMTC) is a bandwidth-reduced low-complexity technology introduced by the 3rd Generation Partnership Project (3GPP). Repetition is employed in eMTC to improve network coverage. For different repetition levels, the choice of the Modulation and Coding Scheme (MCS) and the resource block (RB) allocation have to be carefully designed to meet the performance requirements. Furthermore, the existing eMTC systems do not support space division multiplex (SDM) and multiple-input multiple-output (MIMO). To sufficiently exploit the space dimension resources, we consider MIMO for uplink eMTC systems, which allows multiple users to share the same resource block. In this work, we focus on the joint resource allocation for uplink eMTC taking into account MIMO and the repetition feature. We first introduce the uplink eMTC features and extension with MIMO. Next, we optimize the resource allocation in two steps. In the first step, we propose an algorithm to jointly select the optimal repetition level, MCS and the required number of physical resource blocks. In the second step, we propose an efficient physical resource block scheduling algorithm for eMTC with MIMO. Simulation results show that the proposed algorithms can allocate appropriate resources for users and significantly improve the system performance.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127875582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073133
Yuqi Lan, Danyang Liu, Jianxiong Zhou, Ruidong Wang
In the near field of multiple-input multiple-output (MIMO) array, the spatial phase that targets relative to MIMO array does not satisfy a linear relationship, so imaging algorithm based on fast Fourier transform (FFT) can result in high side lobes in the directional diagram. In this paper, a near-field imaging algorithm with the aid of reference points is proposed to solve this problem, and the principle of the algorithm and its applicable extent are given. Within the applicable extent, the spatial phase can be regarded to be linear approximately. A single reference point is suitable for near-field imaging in interested local area. For the need of global near-field imaging, a selection method of multiple reference points and the imaging steps are given. Simulated and measured show that this algorithm is able to suppress the high side lobes, and global near-field imaging can be achieved through a reasonable choice of reference points.
{"title":"Near-Field Imaging Algorithm of MIMO Radar with the Aid of Reference Points","authors":"Yuqi Lan, Danyang Liu, Jianxiong Zhou, Ruidong Wang","doi":"10.1109/ICCT56141.2022.10073133","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073133","url":null,"abstract":"In the near field of multiple-input multiple-output (MIMO) array, the spatial phase that targets relative to MIMO array does not satisfy a linear relationship, so imaging algorithm based on fast Fourier transform (FFT) can result in high side lobes in the directional diagram. In this paper, a near-field imaging algorithm with the aid of reference points is proposed to solve this problem, and the principle of the algorithm and its applicable extent are given. Within the applicable extent, the spatial phase can be regarded to be linear approximately. A single reference point is suitable for near-field imaging in interested local area. For the need of global near-field imaging, a selection method of multiple reference points and the imaging steps are given. Simulated and measured show that this algorithm is able to suppress the high side lobes, and global near-field imaging can be achieved through a reasonable choice of reference points.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126303459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073432
Y. Wang, Bo Gao, Bo Niu
The AUTOSAR (Automotive Open System Architecture) standard includes a set of specifications that describe software architecture, application programming interfaces and methods, in which the layered software architecture enables the development of software components to be carried out independently. The article focuses on the communication in the AUTOSAR architecture, including three buses: the LIN, the J1939 and the FlexRay. Firstly, it introduces the characteristics of these three bus protocols, and then the application of the LIN, the implementation of the J1939 and the key points in the realization of the FlexRay are studied and analyzed in depth. Through its application and software implementation, these three types of bus structures are comprehensively analyzed, which makes the application and implementation of communication in the AUTOSAR architecture more accurate. Especially through the implementation part of this paper, the implementation of communication in this architecture is easier to grasp.
{"title":"Research and Application of Three Protocols Based on AUTOSAR","authors":"Y. Wang, Bo Gao, Bo Niu","doi":"10.1109/ICCT56141.2022.10073432","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073432","url":null,"abstract":"The AUTOSAR (Automotive Open System Architecture) standard includes a set of specifications that describe software architecture, application programming interfaces and methods, in which the layered software architecture enables the development of software components to be carried out independently. The article focuses on the communication in the AUTOSAR architecture, including three buses: the LIN, the J1939 and the FlexRay. Firstly, it introduces the characteristics of these three bus protocols, and then the application of the LIN, the implementation of the J1939 and the key points in the realization of the FlexRay are studied and analyzed in depth. Through its application and software implementation, these three types of bus structures are comprehensively analyzed, which makes the application and implementation of communication in the AUTOSAR architecture more accurate. Especially through the implementation part of this paper, the implementation of communication in this architecture is easier to grasp.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"32 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126233053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073253
B. Ng, C. Lam
We consider the joint construction of polar codes and power allocation based on rotated QPSK constellation in the two-user downlink non-orthogonal multiple access (NOMA) system. Our work is suitable for IoT-like networks where lightweight devices employ simple constellations with low data rate traffic, and the traditional coding performance analysis assuming Gaussian inputs and infinite blocklength may become less accurate. With the goal of achieving fairness and minimizing the maximum block-error-rate (BLER) among the NOMA users, the construction of polar codes, which takes into consideration the BLER estimated by the Gaussian-approximation-based density evolution (GA-DE) method, is jointly determined with the constellation-rotation angle and the power allocation over the NOMA users. Simulations verify that the proposed approach yields generally comparable BLER performance as the LDPC codes over the range of SNR considered while having shorter blocklength.
{"title":"On the Construction of Polar Codes in Two-User Downlink NOMA with Power Allocation and Constellation-Rotation","authors":"B. Ng, C. Lam","doi":"10.1109/ICCT56141.2022.10073253","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073253","url":null,"abstract":"We consider the joint construction of polar codes and power allocation based on rotated QPSK constellation in the two-user downlink non-orthogonal multiple access (NOMA) system. Our work is suitable for IoT-like networks where lightweight devices employ simple constellations with low data rate traffic, and the traditional coding performance analysis assuming Gaussian inputs and infinite blocklength may become less accurate. With the goal of achieving fairness and minimizing the maximum block-error-rate (BLER) among the NOMA users, the construction of polar codes, which takes into consideration the BLER estimated by the Gaussian-approximation-based density evolution (GA-DE) method, is jointly determined with the constellation-rotation angle and the power allocation over the NOMA users. Simulations verify that the proposed approach yields generally comparable BLER performance as the LDPC codes over the range of SNR considered while having shorter blocklength.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"11 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126543640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072994
Ru Zhao, Junrui Liu, Xiaorong Zhao, Deqiang Wang
In this paper, we propose a behavioral biometric authentication method based on accelerometer and gyroscope. The novelty of the proposed lies in feature extraction and similarity calculation. For feature extraction, a newly designed ConvBiGru-FCN network is employed to extract walking features from the multi-dimensional time-series acquired by the accelerometer and gyroscope. For similarity calculation, Tanimoto coefficient is used instead of conventional measures to calculate the distance between feature vectors. A dataset of 50 users has been collected in a realistic test ground for use in model training and testing. Extensive experiments have been carried out to evaluate the performance of the proposed scheme. Numerical results show that the proposed scheme with typical settings achieves an identity authentication accuracy of 93.10%.
{"title":"An Identity Authentication Method Based on Accelerometer and Gyroscope","authors":"Ru Zhao, Junrui Liu, Xiaorong Zhao, Deqiang Wang","doi":"10.1109/ICCT56141.2022.10072994","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072994","url":null,"abstract":"In this paper, we propose a behavioral biometric authentication method based on accelerometer and gyroscope. The novelty of the proposed lies in feature extraction and similarity calculation. For feature extraction, a newly designed ConvBiGru-FCN network is employed to extract walking features from the multi-dimensional time-series acquired by the accelerometer and gyroscope. For similarity calculation, Tanimoto coefficient is used instead of conventional measures to calculate the distance between feature vectors. A dataset of 50 users has been collected in a realistic test ground for use in model training and testing. Extensive experiments have been carried out to evaluate the performance of the proposed scheme. Numerical results show that the proposed scheme with typical settings achieves an identity authentication accuracy of 93.10%.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125612312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073405
Kehan Zhang, Bingcheng Zhu, Zaichen Zhang
Visible light communication and positioning (VLCP) systems have been rarely researched to sense and model the obstacles. However, the accumulating database containing the signal amplitudes and receiver positions can be exploited to detect and reconstruct the positions and shapes of the obstacles. In this work, we propose an algorithm to model the obstacles in a VLCP system, where several light-emitting diodes (LEDs) are set at known positions, and the users equipped with photodiodes (PDs) randomly move to receive the LEDs' signals at different positions. Based on the received signals, the blocked links between the users and LEDs can be distinguished, and thus we can reconstruct the obstacle information. Simulation and analytical results show that the algorithm can estimate the positions and shapes of obstacles. Such an algorithm expand the services of the VLCP systems, and can sense the three-dimensional (3D) information of the environment through the light channel coefficients so as to circumvent the expensive devices, such as laser radars. The proposed algorithm can also support navigation and prediction of wireless channel fading.
{"title":"A Novel Application of Optical Wireless Communication and Positioning Systems: Low-Cost Obstacle Detection","authors":"Kehan Zhang, Bingcheng Zhu, Zaichen Zhang","doi":"10.1109/ICCT56141.2022.10073405","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073405","url":null,"abstract":"Visible light communication and positioning (VLCP) systems have been rarely researched to sense and model the obstacles. However, the accumulating database containing the signal amplitudes and receiver positions can be exploited to detect and reconstruct the positions and shapes of the obstacles. In this work, we propose an algorithm to model the obstacles in a VLCP system, where several light-emitting diodes (LEDs) are set at known positions, and the users equipped with photodiodes (PDs) randomly move to receive the LEDs' signals at different positions. Based on the received signals, the blocked links between the users and LEDs can be distinguished, and thus we can reconstruct the obstacle information. Simulation and analytical results show that the algorithm can estimate the positions and shapes of obstacles. Such an algorithm expand the services of the VLCP systems, and can sense the three-dimensional (3D) information of the environment through the light channel coefficients so as to circumvent the expensive devices, such as laser radars. The proposed algorithm can also support navigation and prediction of wireless channel fading.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125616663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matrix information geometry (MIG) detector, which converts sample data to Hermitian positive definite (HPD) matrices located on HPD matrix manifold, provides an innovative scheme for target detection. In this paper, a subband MIG detector is proposed to detect target submerged into heterogeneous clutter background with short pulses. More precisely, subband filtering is firstly performed to suppress strong clutter by designing a discrete Fourier transform modulated filter bank. Then, a set of HPD matrices are modeled by the filtered data and a HPD matrix manifold is formed. In each subband, the detection from geometric consideration on the manifold is derived. Thus, a subband MIG detector is formulated and information divergence is utilized to measure the dissimilarity of the observed data and the clutter. Finally, numerical experiments based on simulated data and real sea clutter data show that the proposed method can achieve better detection performance compared with the traditional methods.
{"title":"Subband Matrix Information Geometry Detector in Heterogeneous Clutter","authors":"Zheng Yang, Yongqiang Cheng, Hao Wu, Xiaoqiang Hua, Xiang Li, Hongqiang Wang","doi":"10.1109/ICCT56141.2022.10073176","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073176","url":null,"abstract":"Matrix information geometry (MIG) detector, which converts sample data to Hermitian positive definite (HPD) matrices located on HPD matrix manifold, provides an innovative scheme for target detection. In this paper, a subband MIG detector is proposed to detect target submerged into heterogeneous clutter background with short pulses. More precisely, subband filtering is firstly performed to suppress strong clutter by designing a discrete Fourier transform modulated filter bank. Then, a set of HPD matrices are modeled by the filtered data and a HPD matrix manifold is formed. In each subband, the detection from geometric consideration on the manifold is derived. Thus, a subband MIG detector is formulated and information divergence is utilized to measure the dissimilarity of the observed data and the clutter. Finally, numerical experiments based on simulated data and real sea clutter data show that the proposed method can achieve better detection performance compared with the traditional methods.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}