首页 > 最新文献

2009 43rd Annual Conference on Information Sciences and Systems最新文献

英文 中文
Design of efficient receivers for DFT-S-OFDMA systems DFT-S-OFDMA系统中高效接收机的设计
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054782
M. Jiang, N. Prasad, Xiaodong Wang
DFT-Spread-OFDMA (DFT-S-OFDMA) technique has been adopted as the uplink access scheme in emerging cellular systems such as the 3GPP long term evolution (3GPP-LTE), in order to reduce the peak-to-average-power ratio (PAPR). In this scheme, data symbols are precoded using a DFT operation at the transmitter before being sent to the OFDM modulator. Moreover, emerging cellular systems will also deploy multiple antennas at the base-station to increase the transmission reliability and/or system capacity. The design of low-complexity, low-latency and high-performance receivers for such DFT-S-OFDMA systems is an important open problem that has hitherto received little attention. In this paper, three receivers are proposed and examined for such DFT-S-OFDMA systems, which include a highly efficient group soft demodulator (referred to as the GMLSD), an enhanced iterative block decision feedback equalizer (IBDFE) and the conventional linear minimum mean square error (LMMSE) receiver. Monte Carlo simulations are performed to compare the performance of the proposed receiver algorithms. It is shown that the GMLSD receiver is ideal for the DFT-S-OFDMA based systems due to its low complexity and superior performance.
DFT-Spread-OFDMA (DFT-S-OFDMA)技术已成为3GPP长期演进(3GPP- lte)等新兴蜂窝系统的上行接入方案,以降低峰值平均功率比(PAPR)。在该方案中,在发送到OFDM调制器之前,数据符号在发送器上使用DFT操作进行预编码。此外,新兴的蜂窝系统还将在基站部署多个天线,以提高传输可靠性和/或系统容量。为这类DFT-S-OFDMA系统设计低复杂度、低延迟和高性能的接收机是一个重要的开放性问题,但迄今为止很少受到关注。本文提出并研究了用于DFT-S-OFDMA系统的三种接收机,包括高效组软解调器(GMLSD)、增强迭代块决策反馈均衡器(IBDFE)和传统线性最小均方误差(LMMSE)接收机。通过蒙特卡洛仿真来比较所提出的接收机算法的性能。结果表明,GMLSD接收机具有较低的复杂度和优越的性能,是DFT-S-OFDMA系统的理想选择。
{"title":"Design of efficient receivers for DFT-S-OFDMA systems","authors":"M. Jiang, N. Prasad, Xiaodong Wang","doi":"10.1109/CISS.2009.5054782","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054782","url":null,"abstract":"DFT-Spread-OFDMA (DFT-S-OFDMA) technique has been adopted as the uplink access scheme in emerging cellular systems such as the 3GPP long term evolution (3GPP-LTE), in order to reduce the peak-to-average-power ratio (PAPR). In this scheme, data symbols are precoded using a DFT operation at the transmitter before being sent to the OFDM modulator. Moreover, emerging cellular systems will also deploy multiple antennas at the base-station to increase the transmission reliability and/or system capacity. The design of low-complexity, low-latency and high-performance receivers for such DFT-S-OFDMA systems is an important open problem that has hitherto received little attention. In this paper, three receivers are proposed and examined for such DFT-S-OFDMA systems, which include a highly efficient group soft demodulator (referred to as the GMLSD), an enhanced iterative block decision feedback equalizer (IBDFE) and the conventional linear minimum mean square error (LMMSE) receiver. Monte Carlo simulations are performed to compare the performance of the proposed receiver algorithms. It is shown that the GMLSD receiver is ideal for the DFT-S-OFDMA based systems due to its low complexity and superior performance.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127332514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shallow underwater communication with passive phase conjugation and iterative demodulation and decoding 无源相位共轭和迭代解调译码的浅水通信
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054846
Christopher Keeser, B. Belzer, T. Fischer
We propose passive phase conjugation (PPC) with iterative demodulation and decoding for communication over the shallow underwater acoustic channel. PPC mitigates inter-symbol interference (ISI) caused by multipath in the channel. A softinput, soft-output (SISO) differential BPSK (DBPSK) demodulator and a SISO irregular repeat accumulate (IRA) channel decoder arranged in an iterative ‘turbo’ structure improve the bit error rate (BER) at higher symbol rates. A linear estimator tracks channel phase variations arising from Doppler effects and wave motion. The system was tested at Lake Pend Oreille in Idaho over a distance of 1.78 km in shallow water with BERs below 10−5 at 2,500 information bits per second.
提出了一种基于迭代解调和译码的无源相位共轭(PPC)技术,用于浅层水声信道通信。PPC减轻了信道中多径引起的码间干扰(ISI)。软输入、软输出(SISO)差分BPSK (DBPSK)解调器和SISO不规则重复累加(IRA)信道解码器排列在迭代“turbo”结构中,在更高的符号率下提高了误码率(BER)。线性估计器跟踪由多普勒效应和波动引起的信道相位变化。该系统在爱达荷州的Pend Oreille湖进行了距离1.78公里的浅水测试,ber低于10−5,每秒2500信息比特。
{"title":"Shallow underwater communication with passive phase conjugation and iterative demodulation and decoding","authors":"Christopher Keeser, B. Belzer, T. Fischer","doi":"10.1109/CISS.2009.5054846","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054846","url":null,"abstract":"We propose passive phase conjugation (PPC) with iterative demodulation and decoding for communication over the shallow underwater acoustic channel. PPC mitigates inter-symbol interference (ISI) caused by multipath in the channel. A softinput, soft-output (SISO) differential BPSK (DBPSK) demodulator and a SISO irregular repeat accumulate (IRA) channel decoder arranged in an iterative ‘turbo’ structure improve the bit error rate (BER) at higher symbol rates. A linear estimator tracks channel phase variations arising from Doppler effects and wave motion. The system was tested at Lake Pend Oreille in Idaho over a distance of 1.78 km in shallow water with BERs below 10−5 at 2,500 information bits per second.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132313206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secrecy capacity region of Gaussian broadcast channel 高斯广播信道的保密容量区域
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054708
Ghadamali Bagherikaram, A. Motahari, A. Khandani
In this paper, we first consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers, while a wire-taper also receives the transmitted signal. We assume that the signals are transmitted over additive white Gaussian noise channels. We characterize the secrecy capacity region of this channel. Our achievable coding scheme is based on superposition coding and the random binning. We refer to this scheme as Secret Superposition Coding. The converse proof combines the converse proof for the conventional Gaussian broadcast channel and the perfect secrecy constraint. This capacity region matches the capacity region of the broadcast channel without security constraint. It also matches the secrecy capacity of the wire-tap channel. Based on the rate characterization of the secure Gaussian broadcast channel, we then use a multilevel coding approach for the slowly fading wire-tap. We assume that the transmitter only knows the eavesdropper's channel. In this approach, source node sends secure layered coding and the receiver viewed as a continuum ordered users. We derive optimum power allocation for the layers which maximizes the total average rate.
在本文中,我们首先考虑这样一种场景:一个源节点希望为两个各自的接收器广播两个机密消息,而一个线锥也接收发送的信号。我们假设信号在加性高斯白噪声信道上传输。我们描述了该信道的保密容量区域。我们的可实现的编码方案是基于叠加编码和随机分组。我们把这种方案称为秘密叠加编码。反向证明结合了传统高斯广播信道的反向证明和完全保密约束。此容量区域与无安全约束的广播信道的容量区域相匹配。这也符合窃听频道的保密能力。基于安全高斯广播信道的速率特性,我们对慢衰落窃听采用了多电平编码方法。我们假设发射机只知道窃听者的频道。在这种方法中,源节点发送安全分层编码,接收端视为连续有序的用户。我们得到了使总平均速率最大化的各层的最优功率分配。
{"title":"Secrecy capacity region of Gaussian broadcast channel","authors":"Ghadamali Bagherikaram, A. Motahari, A. Khandani","doi":"10.1109/CISS.2009.5054708","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054708","url":null,"abstract":"In this paper, we first consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers, while a wire-taper also receives the transmitted signal. We assume that the signals are transmitted over additive white Gaussian noise channels. We characterize the secrecy capacity region of this channel. Our achievable coding scheme is based on superposition coding and the random binning. We refer to this scheme as Secret Superposition Coding. The converse proof combines the converse proof for the conventional Gaussian broadcast channel and the perfect secrecy constraint. This capacity region matches the capacity region of the broadcast channel without security constraint. It also matches the secrecy capacity of the wire-tap channel. Based on the rate characterization of the secure Gaussian broadcast channel, we then use a multilevel coding approach for the slowly fading wire-tap. We assume that the transmitter only knows the eavesdropper's channel. In this approach, source node sends secure layered coding and the receiver viewed as a continuum ordered users. We derive optimum power allocation for the layers which maximizes the total average rate.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127989628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Decentralized sensor selection based on sensor observations for energy efficient hypothesis testing 基于传感器观测的能量效率假设检验分散传感器选择
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054793
Rick S. Blum, Zhemin Xu, Brian M. Sadler
We consider the sensor selection problem in a wireless sensor network attempting to solve a binary hypothesis testing problem. The selection is based only on the sensor observations and the focus is on the extreme case where the position of the sensors is not exploited except through its influence on the sensor observations. Decentralized processing approaches are desired. A subset of sensors are selected to transmit their observations to a fusion center where the hypothesis testing decision will be made. We propose three new sensor selection schemes based on observed data. The first scheme, called optimum sensor selection (OSS), uses all sensor observations to compute the metric used to rank each candidate subset. The second scheme, called selection by averaging over unseen sensors (SAUS), uses only the observations of the candidate subset to compute the ranking metric. The third approach, called GSAUS, is a distributed greedy sensor selection scheme based on SAUS. The performance of each proposed scheme is evaluated by Monte Carlo simulation for a Gaussian shift-in-mean hypothesis testing problem so that a comparison between the various sensor selection schemes can be performed. The results indicate that proper distributed selection approaches can provide performance close to the optimum centralized selection approaches and significant improvement over random selection, an approach which has been suggested in the past. A particular approach called the ordered magnitude log-likelihood ratio (OLLR) approach, which was suggested previously for a different problem formulation, looks especially attractive.
我们考虑无线传感器网络中的传感器选择问题,试图解决一个二元假设检验问题。选择仅基于传感器观测值,重点放在极端情况下,即传感器的位置不被利用,除非通过其对传感器观测值的影响。需要分散的处理方法。选择传感器子集将其观测结果传输到融合中心,在那里将做出假设检验决策。我们提出了三种新的基于观测数据的传感器选择方案。第一种方案称为最优传感器选择(OSS),它使用所有传感器观测值来计算用于对每个候选子集排序的度量。第二种方案称为通过对未见传感器进行平均选择(SAUS),它只使用候选子集的观测值来计算排名度量。第三种方法称为GSAUS,是一种基于SAUS的分布式贪婪传感器选择方案。通过蒙特卡罗模拟对高斯均值偏移假设检验问题的性能进行了评估,以便对各种传感器选择方案进行比较。结果表明,适当的分布式选择方法可以提供接近最优集中选择方法的性能,并且显著优于过去提出的随机选择方法。一种被称为有序量级对数似然比(OLLR)方法的特殊方法看起来特别有吸引力,该方法之前被建议用于不同的问题表述。
{"title":"Decentralized sensor selection based on sensor observations for energy efficient hypothesis testing","authors":"Rick S. Blum, Zhemin Xu, Brian M. Sadler","doi":"10.1109/CISS.2009.5054793","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054793","url":null,"abstract":"We consider the sensor selection problem in a wireless sensor network attempting to solve a binary hypothesis testing problem. The selection is based only on the sensor observations and the focus is on the extreme case where the position of the sensors is not exploited except through its influence on the sensor observations. Decentralized processing approaches are desired. A subset of sensors are selected to transmit their observations to a fusion center where the hypothesis testing decision will be made. We propose three new sensor selection schemes based on observed data. The first scheme, called optimum sensor selection (OSS), uses all sensor observations to compute the metric used to rank each candidate subset. The second scheme, called selection by averaging over unseen sensors (SAUS), uses only the observations of the candidate subset to compute the ranking metric. The third approach, called GSAUS, is a distributed greedy sensor selection scheme based on SAUS. The performance of each proposed scheme is evaluated by Monte Carlo simulation for a Gaussian shift-in-mean hypothesis testing problem so that a comparison between the various sensor selection schemes can be performed. The results indicate that proper distributed selection approaches can provide performance close to the optimum centralized selection approaches and significant improvement over random selection, an approach which has been suggested in the past. A particular approach called the ordered magnitude log-likelihood ratio (OLLR) approach, which was suggested previously for a different problem formulation, looks especially attractive.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121403656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Finding optimal trajectory points for TDOA/FDOA geo-location sensors TDOA/FDOA地理定位传感器最优轨迹点求解
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054830
Ran Ren, M. Fowler, N. Wu
In emitter geo-location estimation systems, it is well known that the geometry between sensors and the emitter can seriously impact the accuracy of the location estimate. Here we consider a case where a set of sensors is tasked to perform a sequence of location estimates on an emitter as the sensors progress throughout their trajectories. The goal is to select the trajectories so as to optimally improve the location estimate at each step in the sequence. To build the optimal trajectories, the aircraft, at their current locations, need to know their optimal next states at the time of next estimation, under the constraint of a reachable set due to limited reachable velocity or thrust. In this paper, we propose a one-step method to tackle the optimal next state(ONS) problem using the Particle Swarm Optimization(PSO) by solving the optimal amount of applied thrust along the flying trajectories. Simulation results show that the proposed method dramatically improves the estimation accuracy along the flying trajectories, compared to the random walk and constant velocity scheme. We also show that the estimation accuracy performance is also insensitive to the problem dimensionality.
在发射器地理位置估计系统中,传感器与发射器之间的几何形状会严重影响位置估计的精度。在这里,我们考虑一种情况,其中一组传感器的任务是在传感器沿着其轨迹前进时对发射器执行一系列位置估计。目标是选择轨迹,以最优地改善序列中每一步的位置估计。为了构建最优轨迹,飞机在当前位置需要知道下一次估计时的最优下一状态,在可达集约束下,由于可达速度或推力有限。本文提出了一种利用粒子群算法(PSO)一步求解最优下一状态(ONS)问题的方法,该方法通过求解沿飞行轨迹施加的最优推力量来实现。仿真结果表明,与随机漫步和等速方案相比,该方法显著提高了沿飞行轨迹的估计精度。我们还表明,估计精度性能对问题维数也不敏感。
{"title":"Finding optimal trajectory points for TDOA/FDOA geo-location sensors","authors":"Ran Ren, M. Fowler, N. Wu","doi":"10.1109/CISS.2009.5054830","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054830","url":null,"abstract":"In emitter geo-location estimation systems, it is well known that the geometry between sensors and the emitter can seriously impact the accuracy of the location estimate. Here we consider a case where a set of sensors is tasked to perform a sequence of location estimates on an emitter as the sensors progress throughout their trajectories. The goal is to select the trajectories so as to optimally improve the location estimate at each step in the sequence. To build the optimal trajectories, the aircraft, at their current locations, need to know their optimal next states at the time of next estimation, under the constraint of a reachable set due to limited reachable velocity or thrust. In this paper, we propose a one-step method to tackle the optimal next state(ONS) problem using the Particle Swarm Optimization(PSO) by solving the optimal amount of applied thrust along the flying trajectories. Simulation results show that the proposed method dramatically improves the estimation accuracy along the flying trajectories, compared to the random walk and constant velocity scheme. We also show that the estimation accuracy performance is also insensitive to the problem dimensionality.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A simple model for the window size evolution of TCP coupled with MAC and PHY layers 一个简单的模型的窗口大小演变的TCP与MAC和物理层耦合
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054815
George K. Papageorgiou, J. Baras
In this paper the interaction between the AIMD algorithm of TCP and the random access channel is investigated. In particular, we examine the effects of the MAC and the physical layer of the backward channel on the window size evolution of TCP. The problem of coupling the window size evolution of TCP with a random access channel is addressed using point processes and the theory of martingales.
本文研究了TCP的AIMD算法与随机接入信道之间的相互作用。特别地,我们研究了MAC和反向通道的物理层对TCP窗口大小演变的影响。利用点过程和鞅理论解决了TCP的窗口大小演化与随机接入信道的耦合问题。
{"title":"A simple model for the window size evolution of TCP coupled with MAC and PHY layers","authors":"George K. Papageorgiou, J. Baras","doi":"10.1109/CISS.2009.5054815","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054815","url":null,"abstract":"In this paper the interaction between the AIMD algorithm of TCP and the random access channel is investigated. In particular, we examine the effects of the MAC and the physical layer of the backward channel on the window size evolution of TCP. The problem of coupling the window size evolution of TCP with a random access channel is addressed using point processes and the theory of martingales.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115766426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attack-proof collaborative spectrum sensing in cognitive radio networks 认知无线电网络中的防攻击协同频谱感知
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054704
Wenkai Wang, Husheng Li, Y. Sun, Zhu Han
Collaborative sensing in cognitive radio networks can significantly improve the probability of detecting the transmission of primary users. In current collaborative sensing schemes, all collaborative secondary users are assumed to be honest. As a consequence, the system is vulnerable to attacks in which malicious secondary users report false detection results. In this paper, we investigate how to improve the security of collaborative sensing. Particularly, we develop a malicious user detection algorithm that calculates the suspicious level of secondary users based on their past reports. Then, we calculate trust values as well as consistency values that are used to eliminate the malicious users' influence on the primary user detection results. Through simulations, we show that even a single malicious user can significantly degrade the performance of collaborative sensing. The proposed trust value indicator can effectively differentiate honest and malicious secondary users. The receiver operating characteristic (ROC) curves for the primary user detection demonstrate the improvement in the security of collaborative sensing.
认知无线网络中的协同感知可以显著提高检测主用户传输的概率。在当前的协同感知方案中,所有协同辅助用户都假定为诚实用户。因此,系统容易受到恶意二次用户报告错误检测结果的攻击。本文主要研究如何提高协同感知的安全性。特别是,我们开发了一种恶意用户检测算法,该算法根据二级用户过去的报告计算其可疑级别。然后,我们计算信任值和一致性值,用于消除恶意用户对主用户检测结果的影响。通过仿真,我们发现即使是单个恶意用户也会显著降低协同感知的性能。所提出的信任值指标可以有效区分诚实用户和恶意用户。主用户检测的接收机工作特征(ROC)曲线表明协同感知的安全性有所提高。
{"title":"Attack-proof collaborative spectrum sensing in cognitive radio networks","authors":"Wenkai Wang, Husheng Li, Y. Sun, Zhu Han","doi":"10.1109/CISS.2009.5054704","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054704","url":null,"abstract":"Collaborative sensing in cognitive radio networks can significantly improve the probability of detecting the transmission of primary users. In current collaborative sensing schemes, all collaborative secondary users are assumed to be honest. As a consequence, the system is vulnerable to attacks in which malicious secondary users report false detection results. In this paper, we investigate how to improve the security of collaborative sensing. Particularly, we develop a malicious user detection algorithm that calculates the suspicious level of secondary users based on their past reports. Then, we calculate trust values as well as consistency values that are used to eliminate the malicious users' influence on the primary user detection results. Through simulations, we show that even a single malicious user can significantly degrade the performance of collaborative sensing. The proposed trust value indicator can effectively differentiate honest and malicious secondary users. The receiver operating characteristic (ROC) curves for the primary user detection demonstrate the improvement in the security of collaborative sensing.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114356513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 170
On spectrum sharing in narrowband cellular wireless networks 窄带蜂窝无线网络频谱共享研究
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054753
Ashraf Al Daoud, M. Alanyali
We study secondary spectrum sharing in narrowband cellular networks in which calls in neighboring cells need to be assigned different channels. Analysis of such networks are in general difficult due to large state spaces and lack of closed form expressions. Here we consider linear topologies and show that they lend themselves to exact analysis. We analyze four sharing policies where equilibrium distribution of cell occupancies is a Markov random field. For each policy we derive closed form expressions for the equilibrium distributions in the form of a product of certain stochastic matrices. This characterization leads to tractable computation of equilibrium distributions and blocking probabilities. We use the obtained results to compare the policies in terms of (i) maximum revenue, and (ii) secondary price-demand pairs that lead to positive profit for the network service provider.
在窄带蜂窝网络中,相邻小区的呼叫需要分配不同的信道。由于大的状态空间和缺乏封闭的形式表达式,这种网络的分析通常是困难的。在这里,我们考虑线性拓扑,并表明它们适合于精确的分析。我们分析了四种单元占有率均衡分布为马尔科夫随机场的共享策略。对于每一个策略,我们都以随机矩阵积的形式导出了均衡分布的封闭表达式。这种特性导致平衡分布和阻塞概率的易于计算。我们使用获得的结果来比较(i)最大收入和(ii)导致网络服务提供商正利润的二级价格-需求对的政策。
{"title":"On spectrum sharing in narrowband cellular wireless networks","authors":"Ashraf Al Daoud, M. Alanyali","doi":"10.1109/CISS.2009.5054753","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054753","url":null,"abstract":"We study secondary spectrum sharing in narrowband cellular networks in which calls in neighboring cells need to be assigned different channels. Analysis of such networks are in general difficult due to large state spaces and lack of closed form expressions. Here we consider linear topologies and show that they lend themselves to exact analysis. We analyze four sharing policies where equilibrium distribution of cell occupancies is a Markov random field. For each policy we derive closed form expressions for the equilibrium distributions in the form of a product of certain stochastic matrices. This characterization leads to tractable computation of equilibrium distributions and blocking probabilities. We use the obtained results to compare the policies in terms of (i) maximum revenue, and (ii) secondary price-demand pairs that lead to positive profit for the network service provider.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127389732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Peer-to-peer file sharing game using correlated equilibrium 基于相关均衡的点对点文件共享博弈
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054814
Beibei Wang, Zhu Han, K. Liu
Peer-to-peer (P2P) systems have become more and more popular in nowadays by providing decentralized, self-organizing and fault tolerant file sharing services. As the selfish users do not benefit from providing free service, they tend to download files from other users and yet not to upload for the others, resulting in low system efficiency. In this paper, we propose a correlated equilibrium-based file sharing game to enhance users' performance. We first characterize users' utility with their expected delay. Then, using the correlated equilibrium concept, instead of optimizing their own benefits alone, the users are aware of the best response for them to jointly optimize their strategies together and achieve the correlated equilibrium. Simulation results are presented to demonstrate the efficiency of the proposed scheme.
P2P系统通过提供分散的、自组织的、容错的文件共享服务而得到越来越广泛的应用。由于自私的用户没有从提供免费服务中获益,他们倾向于从其他用户那里下载文件,而不为其他用户上传文件,导致系统效率低下。本文提出了一种基于相关均衡的文件共享博弈,以提高用户的性能。我们首先用用户的预期延迟来描述用户的效用。然后,利用相关均衡的概念,用户不是单独优化自己的利益,而是意识到自己的最佳对策,共同优化策略,实现相关均衡。仿真结果验证了该方案的有效性。
{"title":"Peer-to-peer file sharing game using correlated equilibrium","authors":"Beibei Wang, Zhu Han, K. Liu","doi":"10.1109/CISS.2009.5054814","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054814","url":null,"abstract":"Peer-to-peer (P2P) systems have become more and more popular in nowadays by providing decentralized, self-organizing and fault tolerant file sharing services. As the selfish users do not benefit from providing free service, they tend to download files from other users and yet not to upload for the others, resulting in low system efficiency. In this paper, we propose a correlated equilibrium-based file sharing game to enhance users' performance. We first characterize users' utility with their expected delay. Then, using the correlated equilibrium concept, instead of optimizing their own benefits alone, the users are aware of the best response for them to jointly optimize their strategies together and achieve the correlated equilibrium. Simulation results are presented to demonstrate the efficiency of the proposed scheme.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126246736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Throughput analysis of type-I HARQ strategies in Two-Way Relay Channels 双向中继信道中i型HARQ策略的吞吐量分析
Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054779
F. Iannello, O. Simeone
A Two-Way Relay Channels (TWRC) is studied over quasi-static fading channels by focusing on the throughput of Type-I HARQ strategies. An upper bound is evaluated, along with a number of achievable results obtained by proposing different protocols combining Type-I HARQ with standard amplify or decode-and-forward techniques or more sophisticated lattice code-based strategies. Performance comparison among the different protocols shows a trade-off between the achievable throughput and the system overhead required to obtain partial channel state information at the nodes.
研究了准静态衰落信道下的双向中继信道(TWRC),重点研究了i型HARQ策略的吞吐量。通过提出将Type-I HARQ与标准放大或解码转发技术或更复杂的基于点阵码的策略相结合的不同协议,评估了上界以及许多可实现的结果。不同协议之间的性能比较显示了在可实现的吞吐量和获取节点上部分通道状态信息所需的系统开销之间的权衡。
{"title":"Throughput analysis of type-I HARQ strategies in Two-Way Relay Channels","authors":"F. Iannello, O. Simeone","doi":"10.1109/CISS.2009.5054779","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054779","url":null,"abstract":"A Two-Way Relay Channels (TWRC) is studied over quasi-static fading channels by focusing on the throughput of Type-I HARQ strategies. An upper bound is evaluated, along with a number of achievable results obtained by proposing different protocols combining Type-I HARQ with standard amplify or decode-and-forward techniques or more sophisticated lattice code-based strategies. Performance comparison among the different protocols shows a trade-off between the achievable throughput and the system overhead required to obtain partial channel state information at the nodes.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123810634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2009 43rd Annual Conference on Information Sciences and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1