首页 > 最新文献

2013 IEEE International Conference on Communications (ICC)最新文献

英文 中文
OOK/DS-CDMA bit error probability over Rayleigh fading channels 瑞利衰落信道上的OOK/DS-CDMA误码概率
Pub Date : 2013-06-09 DOI: 10.1109/ICC.2013.6655488
D. Katselis, C. Fischione, H. Hjalmarsson
A major constraint in deployments of resource-limited networks is the energy consumption related to the battery lifetime of the network nodes. To this end, power efficient digital modulation techniques such as On-Off keying (OOK) are highly attractive. In this paper, a novel complete probabilistic description of the Direct Sequence - Coded Division Multiple Access (DS-CDMA) system with random signatures employing OOK modulation is presented. The system scenario considers simultaneously transmitting nodes in Rayleigh fading conditions. Numerical simulations are provided to support the derived results.
资源有限网络部署的一个主要制约因素是与网络节点的电池寿命相关的能量消耗。为此,诸如开关键控(OOK)之类的高能效数字调制技术非常有吸引力。本文提出了一种采用OOK调制的随机签名直接序列编码多址(DS-CDMA)系统的全新完全概率描述。系统场景考虑了瑞利衰落条件下的同步传输节点。数值模拟验证了所得结果。
{"title":"OOK/DS-CDMA bit error probability over Rayleigh fading channels","authors":"D. Katselis, C. Fischione, H. Hjalmarsson","doi":"10.1109/ICC.2013.6655488","DOIUrl":"https://doi.org/10.1109/ICC.2013.6655488","url":null,"abstract":"A major constraint in deployments of resource-limited networks is the energy consumption related to the battery lifetime of the network nodes. To this end, power efficient digital modulation techniques such as On-Off keying (OOK) are highly attractive. In this paper, a novel complete probabilistic description of the Direct Sequence - Coded Division Multiple Access (DS-CDMA) system with random signatures employing OOK modulation is presented. The system scenario considers simultaneously transmitting nodes in Rayleigh fading conditions. Numerical simulations are provided to support the derived results.","PeriodicalId":6368,"journal":{"name":"2013 IEEE International Conference on Communications (ICC)","volume":"3 1","pages":"5619-5624"},"PeriodicalIF":0.0,"publicationDate":"2013-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81890743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location based routing protocol exploiting heterogeneous primary users in cognitive radio networks 认知无线网络中利用异构主用户的位置路由协议
Pub Date : 2013-06-09 DOI: 10.1109/ICC.2013.6654980
A. Vizziello, S. Kianoush, L. Favalli, P. Gamba
In cognitive radio networks (CRNs), knowledge of the primary users (PUs) position can be used to avoid harmful interference to the primary network, while at the same time be exploited to improve CR performance. In this paper, a localization algorithm is developed to calculate PUs position and a novel location based CR (LCR) routing protocol is proposed that has the following properties: (i) it considers the existence of heterogeneous PUs, (ii) exploits PUs location information, (iii) jointly selects spectrum and route, (iv) protects PUs from interference. Clusters of CRs are defined according to the spectral characteristics in a given location area, and the LCR routing protocol acts in two steps: intra-cluster and inter-cluster. Simulations are conducted in terms of CR end-to-end performance and PUs collision risk. Results reveal the importance of formulating routing protocol in terms of PU protection, which is a unique features in CR networks.
在认知无线网络(crn)中,主用户(pu)的位置信息可以用来避免对主网络的有害干扰,同时也可以用来提高crn的性能。本文开发了一种定位算法来计算pu位置,并提出了一种新的基于位置的CR (LCR)路由协议,该协议具有以下特性:(1)考虑异构pu的存在,(2)利用pu的位置信息,(3)共同选择频谱和路由,(4)保护pu免受干扰。根据给定位置区域的频谱特征定义LCR簇,LCR路由协议分簇内和簇间两步进行。从CR端到端性能和pu碰撞风险两方面进行了仿真。研究结果揭示了制定路由协议对PU保护的重要性,这是CR网络的一个独特特点。
{"title":"Location based routing protocol exploiting heterogeneous primary users in cognitive radio networks","authors":"A. Vizziello, S. Kianoush, L. Favalli, P. Gamba","doi":"10.1109/ICC.2013.6654980","DOIUrl":"https://doi.org/10.1109/ICC.2013.6654980","url":null,"abstract":"In cognitive radio networks (CRNs), knowledge of the primary users (PUs) position can be used to avoid harmful interference to the primary network, while at the same time be exploited to improve CR performance. In this paper, a localization algorithm is developed to calculate PUs position and a novel location based CR (LCR) routing protocol is proposed that has the following properties: (i) it considers the existence of heterogeneous PUs, (ii) exploits PUs location information, (iii) jointly selects spectrum and route, (iv) protects PUs from interference. Clusters of CRs are defined according to the spectral characteristics in a given location area, and the LCR routing protocol acts in two steps: intra-cluster and inter-cluster. Simulations are conducted in terms of CR end-to-end performance and PUs collision risk. Results reveal the importance of formulating routing protocol in terms of PU protection, which is a unique features in CR networks.","PeriodicalId":6368,"journal":{"name":"2013 IEEE International Conference on Communications (ICC)","volume":"12 1","pages":"2890-2894"},"PeriodicalIF":0.0,"publicationDate":"2013-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81897242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Detect and identify blocker tags in tree-based RFID systems 在基于树的RFID系统中检测和识别拦截标签
Pub Date : 2013-06-09 DOI: 10.1109/ICC.2013.6654842
Fei Wang, Bin Xiao, Kai Bu, Jinshu Su
Blocker tags are initially introduced to protect regular tags in certain ID ranges, called blocking ranges, from unwanted scanning in RFID systems. But if misused, blocker tags can cause blocking attacks that corrupt the communication between interfered regular tags and readers. Previous approaches can only detect blocking behavior. However, they cannot distinguish malicious blocking from legitimate blocking that can be perfectly allowed to protect customer's privacy. To solve the problem, we carry out the first attempt in the paper to detect real blocking attacks by identifying malicious blocking ranges from authorized ones in a system. We present two pioneer probe-based protocols that can accurately identify malicious blocking ranges in popular tree-based RFID systems, and get rid of their impact before performing RFID applications. We validate the efficacy of the two protocols through theoretical analysis and simulation experiments. The results show that our protocols can identify blocking ranges very fast even when the blocker tag percentage is very low, for example, dozens of blocker tags among tens of thousands of regular tags. Our protocols deliver also a faster blocker tag detection than previous detection methods; our best protocol reduces detection time by over 90% compared with the state-of-the-art detection method.
拦截标签最初是为了保护特定ID范围内的常规标签(称为拦截范围)免受RFID系统中不必要的扫描。但是,如果使用不当,拦截器标签会导致阻塞攻击,破坏受干扰的常规标签和读取器之间的通信。以前的方法只能检测阻塞行为。然而,他们无法区分恶意屏蔽和合法屏蔽,而合法屏蔽可以完全保护客户的隐私。为了解决这一问题,本文首次尝试通过识别系统中授权的恶意拦截范围来检测真正的拦截攻击。我们提出了两个先锋的基于探针的协议,可以准确地识别流行的基于树的RFID系统中的恶意阻塞范围,并在执行RFID应用之前消除其影响。通过理论分析和仿真实验验证了两种方案的有效性。结果表明,即使拦截器标签百分比很低,例如在数万个常规标签中只有几十个拦截器标签,我们的协议也能快速识别出拦截范围。我们的协议还提供了一个更快的拦截标签检测比以前的检测方法;与最先进的检测方法相比,我们最好的协议减少了90%以上的检测时间。
{"title":"Detect and identify blocker tags in tree-based RFID systems","authors":"Fei Wang, Bin Xiao, Kai Bu, Jinshu Su","doi":"10.1109/ICC.2013.6654842","DOIUrl":"https://doi.org/10.1109/ICC.2013.6654842","url":null,"abstract":"Blocker tags are initially introduced to protect regular tags in certain ID ranges, called blocking ranges, from unwanted scanning in RFID systems. But if misused, blocker tags can cause blocking attacks that corrupt the communication between interfered regular tags and readers. Previous approaches can only detect blocking behavior. However, they cannot distinguish malicious blocking from legitimate blocking that can be perfectly allowed to protect customer's privacy. To solve the problem, we carry out the first attempt in the paper to detect real blocking attacks by identifying malicious blocking ranges from authorized ones in a system. We present two pioneer probe-based protocols that can accurately identify malicious blocking ranges in popular tree-based RFID systems, and get rid of their impact before performing RFID applications. We validate the efficacy of the two protocols through theoretical analysis and simulation experiments. The results show that our protocols can identify blocking ranges very fast even when the blocker tag percentage is very low, for example, dozens of blocker tags among tens of thousands of regular tags. Our protocols deliver also a faster blocker tag detection than previous detection methods; our best protocol reduces detection time by over 90% compared with the state-of-the-art detection method.","PeriodicalId":6368,"journal":{"name":"2013 IEEE International Conference on Communications (ICC)","volume":"9 1","pages":"2133-2137"},"PeriodicalIF":0.0,"publicationDate":"2013-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84276446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
MAC finite buffer impact on the performance of cluster-tree based WSNs MAC有限缓冲区对基于簇树的wsn性能的影响
Pub Date : 2013-06-09 DOI: 10.1109/ICC.2013.6654722
I. Al-Anbagi, M. Khanafer, H. Mouftah
Certain Wireless Sensor Network (WSN) applications such as patient monitoring, smart grid, and equipment condition monitoring require accurate estimation of specific WSN parameters such as end-to-end delay, reliability and power consumption. The estimation of these parameters calls for an accurate and lightweight WSN model that is suitable for the low processing capabilities of sensor nodes. In this paper, we present a Markov-based model for WSNs that considers the impact of inserting a MAC-level finite buffer on the performance of WSNs. We perform a comprehensive performance analysis of the end-to-end delay, reliability and power consumption using different traffic and network conditions in star and cluster-tree WSN topologies. Furthermore, we test the accuracy of our model by conducting extensive simulations in environments that are consistent with the analytical model.
某些无线传感器网络(WSN)应用,如患者监测、智能电网和设备状态监测,需要准确估计特定的WSN参数,如端到端延迟、可靠性和功耗。这些参数的估计需要一个精确和轻量级的WSN模型,以适应传感器节点的低处理能力。在本文中,我们提出了一个基于马尔可夫的WSNs模型,该模型考虑了插入mac级有限缓冲区对WSNs性能的影响。我们对星型和簇树型WSN拓扑中不同流量和网络条件下的端到端延迟、可靠性和功耗进行了全面的性能分析。此外,我们通过在与分析模型一致的环境中进行广泛的模拟来测试我们模型的准确性。
{"title":"MAC finite buffer impact on the performance of cluster-tree based WSNs","authors":"I. Al-Anbagi, M. Khanafer, H. Mouftah","doi":"10.1109/ICC.2013.6654722","DOIUrl":"https://doi.org/10.1109/ICC.2013.6654722","url":null,"abstract":"Certain Wireless Sensor Network (WSN) applications such as patient monitoring, smart grid, and equipment condition monitoring require accurate estimation of specific WSN parameters such as end-to-end delay, reliability and power consumption. The estimation of these parameters calls for an accurate and lightweight WSN model that is suitable for the low processing capabilities of sensor nodes. In this paper, we present a Markov-based model for WSNs that considers the impact of inserting a MAC-level finite buffer on the performance of WSNs. We perform a comprehensive performance analysis of the end-to-end delay, reliability and power consumption using different traffic and network conditions in star and cluster-tree WSN topologies. Furthermore, we test the accuracy of our model by conducting extensive simulations in environments that are consistent with the analytical model.","PeriodicalId":6368,"journal":{"name":"2013 IEEE International Conference on Communications (ICC)","volume":"15 1","pages":"1485-1490"},"PeriodicalIF":0.0,"publicationDate":"2013-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84317394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Channel selection for heterogeneous nodes in cognitive networks 认知网络中异构节点的通道选择
Pub Date : 2013-06-09 DOI: 10.1109/ICC.2013.6655548
Amiotosh Ghosh, W. Hamouda
We propose algorithms to address the channel allocation and fairness issues of multi band multiuser cognitive ad-hoc networks. Nodes in the network have unequal channel access probability and have no prior information about the offered bandwidth or number of users in the multiple access system. In that nodes use reinforcement learning algorithm to predict future channel selection probability from the past experience and reach an equilibrium state. Proof of convergence of this multi party stochastic game is provided. Furthermore, analytical throughput for such system is determined. Finally, numerical results are presented for performance evaluation of the proposed channel allocation algorithms.
我们提出了一种算法来解决多频段多用户认知自组织网络的信道分配和公平性问题。网络中的节点具有不相等的信道访问概率,并且没有关于多址系统中提供的带宽或用户数量的先验信息。其中节点利用强化学习算法从过去的经验中预测未来的信道选择概率,达到均衡状态。给出了该多方随机对策的收敛性证明。此外,还确定了该系统的分析通量。最后,对所提出的信道分配算法进行了性能评价。
{"title":"Channel selection for heterogeneous nodes in cognitive networks","authors":"Amiotosh Ghosh, W. Hamouda","doi":"10.1109/ICC.2013.6655548","DOIUrl":"https://doi.org/10.1109/ICC.2013.6655548","url":null,"abstract":"We propose algorithms to address the channel allocation and fairness issues of multi band multiuser cognitive ad-hoc networks. Nodes in the network have unequal channel access probability and have no prior information about the offered bandwidth or number of users in the multiple access system. In that nodes use reinforcement learning algorithm to predict future channel selection probability from the past experience and reach an equilibrium state. Proof of convergence of this multi party stochastic game is provided. Furthermore, analytical throughput for such system is determined. Finally, numerical results are presented for performance evaluation of the proposed channel allocation algorithms.","PeriodicalId":6368,"journal":{"name":"2013 IEEE International Conference on Communications (ICC)","volume":"14 1","pages":"5939-5943"},"PeriodicalIF":0.0,"publicationDate":"2013-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84357199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sensing of wireless microphones in IEEE 802.22: A system level performance evaluation IEEE 802.22无线麦克风的传感:系统级性能评估
Pub Date : 2013-06-09 DOI: 10.1109/ICC.2013.6654904
Pål Grønsund, P. Pawełczak, Jihoon Park, D. Cabric
We present results on the system level performance of the IEEE 802.22 standard with sensing functionality, using a highly detailed implementation of the IEEE 802.22 protocol stack in the NS-2 simulator. Our attention is focused on the effect of spatio-temporal wireless microphone (WM) activity on the performance of the IEEE 802.22 network with spectrum sensing considered. In general we find that the frequency of WM appearance and activity duration should be quite high in all channels not used by TV broadcasters to reduce IEEE 802.22 throughput, for example about 50% WM occupancy in each of total of four channels. Impact on WM performance is found to be low in general using the two-stage spectrum sensing strategy with frequent sensing stages.
我们在NS-2模拟器中使用IEEE 802.22协议栈的非常详细的实现,展示了具有传感功能的IEEE 802.22标准的系统级性能结果。本文主要研究了时空无线麦克风(WM)活动对考虑频谱感知的IEEE 802.22网络性能的影响。一般来说,我们发现在电视广播公司未使用的所有信道中,WM出现的频率和活动持续时间应该相当高,以减少IEEE 802.22吞吐量,例如,在总共四个信道中,每个信道中约有50%的WM占用。采用两阶段频谱感知策略对WM性能的影响一般较低。
{"title":"Sensing of wireless microphones in IEEE 802.22: A system level performance evaluation","authors":"Pål Grønsund, P. Pawełczak, Jihoon Park, D. Cabric","doi":"10.1109/ICC.2013.6654904","DOIUrl":"https://doi.org/10.1109/ICC.2013.6654904","url":null,"abstract":"We present results on the system level performance of the IEEE 802.22 standard with sensing functionality, using a highly detailed implementation of the IEEE 802.22 protocol stack in the NS-2 simulator. Our attention is focused on the effect of spatio-temporal wireless microphone (WM) activity on the performance of the IEEE 802.22 network with spectrum sensing considered. In general we find that the frequency of WM appearance and activity duration should be quite high in all channels not used by TV broadcasters to reduce IEEE 802.22 throughput, for example about 50% WM occupancy in each of total of four channels. Impact on WM performance is found to be low in general using the two-stage spectrum sensing strategy with frequent sensing stages.","PeriodicalId":6368,"journal":{"name":"2013 IEEE International Conference on Communications (ICC)","volume":"35 1","pages":"2475-2479"},"PeriodicalIF":0.0,"publicationDate":"2013-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84471680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Compress-and-forward on a multiaccess relay channel with computation at the receiver 在接收端进行计算的多址中继信道上的压缩转发
Pub Date : 2013-06-09 DOI: 10.1109/ICC.2013.6655436
Mohieddine El Soussi, A. Zaidi, L. Vandendorpe
We study a system in which two sources communicate with a destination with the help of a half-duplex relay. We consider a decoding strategy, based on the compute-and-forward strategy, in which the destination decodes two integer-valued linear combinations that relate the transmitted codewords. In this strategy, the relay compresses its observation using Wyner-Ziv compression and then forwards it to the destination. The destination appropriately combines what it gets from the direct transmission and the relay. Then, using this combination, it computes two integer-valued linear combinations. We discuss the encoding/decoding strategy, and evaluate the achievable sum-rate. Next, we consider the problem of allocating the powers and selecting the integer-valued coefficients of the recovered linear combinations in order to maximize the sum-rate. For the model under consideration, the optimization problem is NP hard. We propose an iterative algorithm to solve this problem using coordinate descent method. The results are illustrated through some numerical examples.
我们研究了一个系统,其中两个源在半双工中继的帮助下与一个目标通信。我们考虑了一种基于计算转发策略的解码策略,其中目的端解码与传输码字相关的两个整数值线性组合。在该策略中,中继使用Wyner-Ziv压缩对其观察结果进行压缩,然后将其转发到目的地。目的地适当地结合了它从直接传输和中继获得的信息。然后,使用这个组合,计算两个整数值线性组合。我们讨论了编码/解码策略,并评估了可实现的和速率。其次,我们考虑了恢复线性组合的幂分配和整值系数的选择问题,以使求和速率最大化。对于所考虑的模型,优化问题是NP困难的。我们提出了一种用坐标下降法求解这一问题的迭代算法。通过一些数值算例对结果进行了说明。
{"title":"Compress-and-forward on a multiaccess relay channel with computation at the receiver","authors":"Mohieddine El Soussi, A. Zaidi, L. Vandendorpe","doi":"10.1109/ICC.2013.6655436","DOIUrl":"https://doi.org/10.1109/ICC.2013.6655436","url":null,"abstract":"We study a system in which two sources communicate with a destination with the help of a half-duplex relay. We consider a decoding strategy, based on the compute-and-forward strategy, in which the destination decodes two integer-valued linear combinations that relate the transmitted codewords. In this strategy, the relay compresses its observation using Wyner-Ziv compression and then forwards it to the destination. The destination appropriately combines what it gets from the direct transmission and the relay. Then, using this combination, it computes two integer-valued linear combinations. We discuss the encoding/decoding strategy, and evaluate the achievable sum-rate. Next, we consider the problem of allocating the powers and selecting the integer-valued coefficients of the recovered linear combinations in order to maximize the sum-rate. For the model under consideration, the optimization problem is NP hard. We propose an iterative algorithm to solve this problem using coordinate descent method. The results are illustrated through some numerical examples.","PeriodicalId":6368,"journal":{"name":"2013 IEEE International Conference on Communications (ICC)","volume":"146 1","pages":"5339-5344"},"PeriodicalIF":0.0,"publicationDate":"2013-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84929034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Blind symbol rate estimation using autocorrelation and zero crossing detection 利用自相关和过零检测进行盲码率估计
Pub Date : 2013-06-09 DOI: 10.1109/ICC.2013.6655324
M. Elgenedy, A. Elezabi
In this paper we introduce a new and simple method to estimate the symbol rate for single carrier systems of unknown modulation. The introduced technique detects the symbol rate from a continuous range of symbol rates, i.e. it does not assume a finite set of candidate symbol rates. The method does not require any knowledge about system parameters and is therefore totally blind. The method belongs to the family of autocorrelation-based symbol rate estimators, yet, unlike many such schemes, its performance is insensitive to the value of the roll-off factor. We then propose a simple method for frequency offset compensation also based on the autocorrelation function. The proposed estimator is implemented as part of a complete DVB-C [1] receiver and is verified using simulations and results in robust performance even at low SNR and high frequency offsets.
本文介绍了一种新的、简单的估计未知调制单载波系统符号率的方法。所介绍的技术从一个连续的符号速率范围检测符号速率,即它不假设一个有限的候选符号速率集。该方法不需要任何关于系统参数的知识,因此是完全盲的。该方法属于基于自相关的符号率估计方法,然而,与许多此类方案不同的是,它的性能对滚转因子的值不敏感。然后,我们提出了一种简单的基于自相关函数的频率偏移补偿方法。所提出的估计器作为完整DVB-C[1]接收机的一部分实现,并通过仿真验证,即使在低信噪比和高频率偏移下也具有稳健的性能。
{"title":"Blind symbol rate estimation using autocorrelation and zero crossing detection","authors":"M. Elgenedy, A. Elezabi","doi":"10.1109/ICC.2013.6655324","DOIUrl":"https://doi.org/10.1109/ICC.2013.6655324","url":null,"abstract":"In this paper we introduce a new and simple method to estimate the symbol rate for single carrier systems of unknown modulation. The introduced technique detects the symbol rate from a continuous range of symbol rates, i.e. it does not assume a finite set of candidate symbol rates. The method does not require any knowledge about system parameters and is therefore totally blind. The method belongs to the family of autocorrelation-based symbol rate estimators, yet, unlike many such schemes, its performance is insensitive to the value of the roll-off factor. We then propose a simple method for frequency offset compensation also based on the autocorrelation function. The proposed estimator is implemented as part of a complete DVB-C [1] receiver and is verified using simulations and results in robust performance even at low SNR and high frequency offsets.","PeriodicalId":6368,"journal":{"name":"2013 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"4750-4755"},"PeriodicalIF":0.0,"publicationDate":"2013-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85079427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Adaptive beamforming designs for MIMO AF relaying systems with direct link 直接链路MIMO AF中继系统的自适应波束形成设计
Pub Date : 2013-06-09 DOI: 10.1109/ICC.2013.6655428
Hanbae Kong, Changick Song, Haewook Park, Inkyu Lee
In this paper, we propose a new beamforming technique for signal-to-noise ratio maximization in nonregenerative multiple-input multiple-output cooperative relaying systems where a non-negligible direct link between the source and the destination exists. Instead of conventional optimal schemes resorting to an iterative method such as a gradient ascent algorithm, we provide a simple closed form solution for source-relay joint beamformer designs. To this end, we apply the error decomposition property which allows us to separate the problem into two phases. Then, we propose a new beamforming scheme which adaptively aligns the transmit signal to each phase depending on the channel condition. From simulation results, we confirm that the proposed technique obtains the near-optimal performance.
本文提出了一种新的波束形成技术,用于在非再生多输入多输出合作中继系统中实现信噪比最大化,其中源和目标之间存在不可忽略的直接链路。我们为源中继联合波束形成器设计提供了一个简单的封闭形式解决方案,而不是采用迭代方法(如梯度上升算法)的传统优化方案。为此,我们应用了误差分解特性,它允许我们将问题分成两个阶段。然后,我们提出了一种新的波束形成方案,该方案根据信道条件自适应地将发射信号对齐到每个相位。仿真结果表明,该方法获得了接近最优的性能。
{"title":"Adaptive beamforming designs for MIMO AF relaying systems with direct link","authors":"Hanbae Kong, Changick Song, Haewook Park, Inkyu Lee","doi":"10.1109/ICC.2013.6655428","DOIUrl":"https://doi.org/10.1109/ICC.2013.6655428","url":null,"abstract":"In this paper, we propose a new beamforming technique for signal-to-noise ratio maximization in nonregenerative multiple-input multiple-output cooperative relaying systems where a non-negligible direct link between the source and the destination exists. Instead of conventional optimal schemes resorting to an iterative method such as a gradient ascent algorithm, we provide a simple closed form solution for source-relay joint beamformer designs. To this end, we apply the error decomposition property which allows us to separate the problem into two phases. Then, we propose a new beamforming scheme which adaptively aligns the transmit signal to each phase depending on the channel condition. From simulation results, we confirm that the proposed technique obtains the near-optimal performance.","PeriodicalId":6368,"journal":{"name":"2013 IEEE International Conference on Communications (ICC)","volume":"10 1","pages":"5296-5300"},"PeriodicalIF":0.0,"publicationDate":"2013-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85144040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resource allocation for two-way relaying with network coding 带网络编码的双向中继的资源分配
Pub Date : 2013-06-09 DOI: 10.1109/ICC.2013.6655544
S. Huang, R. Cheng
A two-way relay (TWR) channel is considered where two users exchange their messages with the help of a single relay. With the assumption of separate relay power budget and user power budget, we maximize the sum-rate of the TWR channel using physical-layer network coding (PNC) with flexible time fraction. We propose an optimal power allocation scheme between users and find that in high signal-to-noise ratio (SNR) regime, the user power should be allocated inversely proportional to the channel gains. Moreover, the bidirectional streams of the PNC-TWR enjoy full diversity gain. The analysis of the equal time fraction case and the numerical results of the flexible time fraction case both imply that the PNC relaying performs better than the decode-and-forward based TWR (DF-TWR) if the channel gains are similar, while the DF relaying performs better if the channel gains are quite different.
考虑双向中继(TWR)通道,其中两个用户在单个中继的帮助下交换消息。在中继功率预算和用户功率预算分离的假设下,采用具有柔性时间分数的物理层网络编码(PNC)实现TWR信道的和速率最大化。我们提出了一种最优的用户间功率分配方案,并发现在高信噪比(SNR)条件下,用户功率分配应与信道增益成反比。此外,PNC-TWR的双向流具有充分的分集增益。等时间分数情况的分析和柔性时间分数情况的数值结果都表明,当信道增益相似时,PNC继电比基于译码转发的TWR (DF-TWR)继电性能更好,而当信道增益相差较大时,DF继电性能更好。
{"title":"Resource allocation for two-way relaying with network coding","authors":"S. Huang, R. Cheng","doi":"10.1109/ICC.2013.6655544","DOIUrl":"https://doi.org/10.1109/ICC.2013.6655544","url":null,"abstract":"A two-way relay (TWR) channel is considered where two users exchange their messages with the help of a single relay. With the assumption of separate relay power budget and user power budget, we maximize the sum-rate of the TWR channel using physical-layer network coding (PNC) with flexible time fraction. We propose an optimal power allocation scheme between users and find that in high signal-to-noise ratio (SNR) regime, the user power should be allocated inversely proportional to the channel gains. Moreover, the bidirectional streams of the PNC-TWR enjoy full diversity gain. The analysis of the equal time fraction case and the numerical results of the flexible time fraction case both imply that the PNC relaying performs better than the decode-and-forward based TWR (DF-TWR) if the channel gains are similar, while the DF relaying performs better if the channel gains are quite different.","PeriodicalId":6368,"journal":{"name":"2013 IEEE International Conference on Communications (ICC)","volume":"95 1","pages":"5919-5923"},"PeriodicalIF":0.0,"publicationDate":"2013-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85727199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1