Pub Date : 2023-10-01DOI: 10.23919/jcc.ea.2021-0740.202302
Xiangnan Liu, Haijun Zhang, Min Sheng, Wei Li, Saba Al-Rubaye, Keping Long
With the evolution of the sixth generation (6G) mobile communication technology, ample attention has gone to the integrated terrestrial-satellite networks. This paper notes that four typical application scenarios of integrated terrestrial-satellite networks are integrated into ultra dense satellite-enabled 6G networks architecture. Then the subchannel and power allocation schemes for the downlink of the ultra dense satellite-enabled 6G heterogeneous networks are introduced. Satellite mobile edge computing (SMEC) with edge caching in three-layer heterogeneous networks serves to reduce the link traffic of networks. Furthermore, a scheme for interference management is presented, involving quality-of-service (QoS) and co-tier/cross-tier interference constraints. The simulation results show that the proposed schemes can significantly increase the total capacity of ultra dense satellite-enabled 6G heterogeneous networks.
{"title":"Ultra dense satellite-enabled 6G networks: Resource optimization and interference management","authors":"Xiangnan Liu, Haijun Zhang, Min Sheng, Wei Li, Saba Al-Rubaye, Keping Long","doi":"10.23919/jcc.ea.2021-0740.202302","DOIUrl":"https://doi.org/10.23919/jcc.ea.2021-0740.202302","url":null,"abstract":"With the evolution of the sixth generation (6G) mobile communication technology, ample attention has gone to the integrated terrestrial-satellite networks. This paper notes that four typical application scenarios of integrated terrestrial-satellite networks are integrated into ultra dense satellite-enabled 6G networks architecture. Then the subchannel and power allocation schemes for the downlink of the ultra dense satellite-enabled 6G heterogeneous networks are introduced. Satellite mobile edge computing (SMEC) with edge caching in three-layer heterogeneous networks serves to reduce the link traffic of networks. Furthermore, a scheme for interference management is presented, involving quality-of-service (QoS) and co-tier/cross-tier interference constraints. The simulation results show that the proposed schemes can significantly increase the total capacity of ultra dense satellite-enabled 6G heterogeneous networks.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136139704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.23919/jcc.ea.2020-0488.202302
Yi Zhang, M. Zhang, Yihan Gui, Yu Wang, Hongchai Zhu, Wenbin Chen, Danshi Wang
Accurate traffic pattern prediction in large-scale networks is of great importance for intelligent system management and automatic resource allocation. System-level mobile traffic forecasting has significant challenges due to the tremendous temporal and spatial dynamics introduced by diverse Internet user behaviors and frequent traffic migration. Spatial-temporal graph modeling is an efficient approach for analyzing the spatial relations and temporal trends of mobile traffic in a large system. Previous research may not reflect the optimal dependency by ignoring inter-base station dependency or pre-determining the explicit geological distance as the interrelationship of base stations. To overcome the limitations of graph structure, this study proposes an adaptive graph convolutional network (AGCN) that captures the latent spatial dependency by developing self-adaptive dependency matrices and acquires temporal dependency using recurrent neural networks. Evaluated on two mobile network datasets, the experimental results demonstrate that this method outperforms other baselines and reduces the mean absolute error by 3.7 % and 5.6 % compared to time-series based approaches.
{"title":"Adaptive graph convolutional recurrent neural networks for system-level mobile traffic forecasting","authors":"Yi Zhang, M. Zhang, Yihan Gui, Yu Wang, Hongchai Zhu, Wenbin Chen, Danshi Wang","doi":"10.23919/jcc.ea.2020-0488.202302","DOIUrl":"https://doi.org/10.23919/jcc.ea.2020-0488.202302","url":null,"abstract":"Accurate traffic pattern prediction in large-scale networks is of great importance for intelligent system management and automatic resource allocation. System-level mobile traffic forecasting has significant challenges due to the tremendous temporal and spatial dynamics introduced by diverse Internet user behaviors and frequent traffic migration. Spatial-temporal graph modeling is an efficient approach for analyzing the spatial relations and temporal trends of mobile traffic in a large system. Previous research may not reflect the optimal dependency by ignoring inter-base station dependency or pre-determining the explicit geological distance as the interrelationship of base stations. To overcome the limitations of graph structure, this study proposes an adaptive graph convolutional network (AGCN) that captures the latent spatial dependency by developing self-adaptive dependency matrices and acquires temporal dependency using recurrent neural networks. Evaluated on two mobile network datasets, the experimental results demonstrate that this method outperforms other baselines and reduces the mean absolute error by 3.7 % and 5.6 % compared to time-series based approaches.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"1 1","pages":"200-211"},"PeriodicalIF":4.1,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68734684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.23919/jcc.fa.2023-0143.202310
Xiaoping Jin, Peng Zhang, Chuan Wan, Dingyou Ma, Yudong Yao
Reconfigurable intelligent surface (RIS) assisted dual-function radar communications (DFRC) system is a promising integrated sensing and communication (ISAC) technology for future 6G. In this paper, we propose a scheme of RIS-assisted DFRC system based on frequency shifted chirp spread spectrum index modulation (RDFI) for secure communications. The proposed RDFI achieves the sensing and transmission of target location information in its radar and communication modes, respectively. In both modes, the frequency-shifted chirp spread spectrum index modulation (FSCSS-IM) signal is used as the baseband signal for radar and communications, so that the signal sent by the radar also carries information. This scheme implements the RIS-assisted beamforming in the communication mode through the azimuth information of the target acquired in the radar mode, so that the signal received from the eavesdropper is distorted in amplitude and phase. In addition, this paper analyzes the radar measurement accuracy and communication security of the FSCSS-IM signal using ambiguity function and secrecy rate (SR) analysis, respectively. Simulation results show that RDFI achieves both excellent bit error rate (BER) performance and physical layer security of communications.
{"title":"RIS assisted dual-function radar and secure communications based on frequency-shifted chirp spread spectrum index modulation","authors":"Xiaoping Jin, Peng Zhang, Chuan Wan, Dingyou Ma, Yudong Yao","doi":"10.23919/jcc.fa.2023-0143.202310","DOIUrl":"https://doi.org/10.23919/jcc.fa.2023-0143.202310","url":null,"abstract":"Reconfigurable intelligent surface (RIS) assisted dual-function radar communications (DFRC) system is a promising integrated sensing and communication (ISAC) technology for future 6G. In this paper, we propose a scheme of RIS-assisted DFRC system based on frequency shifted chirp spread spectrum index modulation (RDFI) for secure communications. The proposed RDFI achieves the sensing and transmission of target location information in its radar and communication modes, respectively. In both modes, the frequency-shifted chirp spread spectrum index modulation (FSCSS-IM) signal is used as the baseband signal for radar and communications, so that the signal sent by the radar also carries information. This scheme implements the RIS-assisted beamforming in the communication mode through the azimuth information of the target acquired in the radar mode, so that the signal received from the eavesdropper is distorted in amplitude and phase. In addition, this paper analyzes the radar measurement accuracy and communication security of the FSCSS-IM signal using ambiguity function and secrecy rate (SR) analysis, respectively. Simulation results show that RDFI achieves both excellent bit error rate (BER) performance and physical layer security of communications.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136200050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.23919/jcc.fa.2023-0109.202310
Han Hai, Si Wei, Xueqin Jiang, Yuyang Peng, Mohsen Guizani
In this paper, a differential scheme is proposed for reconfigurable intelligent surface (RIS) assisted spatial modulation, which is referred to as RIS-DSM, to eliminate the need for channel state information (CSI) at the receiver. The proposed scheme is an improvement over the current differential modulation scheme used in RIS-based systems, as it avoids the high-order matrix calculation and improves the spectral efficiency. A mathematical framework is developed to determine the theoretical average bit error probability (ABEP) of the system using RIS-DSM. The detection complexity of the proposed RIS-DSM scheme is extremely low through the simplification. Finally, simulations results demonstrate that the proposed RIS-DSM scheme can deliver satisfactory error performance even in low signal-to-noise ratio environments.
{"title":"Differential scheme for reconfigurable intelligent surface-based spatial modulation system","authors":"Han Hai, Si Wei, Xueqin Jiang, Yuyang Peng, Mohsen Guizani","doi":"10.23919/jcc.fa.2023-0109.202310","DOIUrl":"https://doi.org/10.23919/jcc.fa.2023-0109.202310","url":null,"abstract":"In this paper, a differential scheme is proposed for reconfigurable intelligent surface (RIS) assisted spatial modulation, which is referred to as RIS-DSM, to eliminate the need for channel state information (CSI) at the receiver. The proposed scheme is an improvement over the current differential modulation scheme used in RIS-based systems, as it avoids the high-order matrix calculation and improves the spectral efficiency. A mathematical framework is developed to determine the theoretical average bit error probability (ABEP) of the system using RIS-DSM. The detection complexity of the proposed RIS-DSM scheme is extremely low through the simplification. Finally, simulations results demonstrate that the proposed RIS-DSM scheme can deliver satisfactory error performance even in low signal-to-noise ratio environments.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136200051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.23919/jcc.fa.2022-0297.202310
Yi Fang, Wang Chen, Pingping Chen, Yiwei Tao, Mohsen Guizani
This paper proposes a high-throughput short reference differential chaos shift keying cooperative communication system with the aid of code index modulation, referred to as CIM-SR-DCSK-CC system. In the proposed CIM-SR-DCSK-CC system, the source transmits information bits to both the relay and destination in the first time slot, while the relay not only forwards the source information bits but also sends new information bits to the destination in the second time slot. To be specific, the relay employs an N-order Walsh code to carry additional log 2 N information bits, which are superimposed onto the SR-DCSK signal carrying the decoded source information bits. Subsequently, the superimposed signal carrying both the source and relay information bits is transmitted to the destination. Moreover, the theoretical bit error rate (BER) expressions of the proposed CIM-SR-DCSK-CC system are derived over additive white Gaussian noise (AWGN) and multipath Rayleigh fading channels. Compared with the conventional DCSK-CC system and SR-DCSK-CC system, the proposed CIM-SR-DCSK-CC system can significantly improve the throughput without deteriorating any BER performance. As a consequence, the proposed system is very promising for the applications of the 6G-enabled low-power and high-rate communication.
{"title":"SR-DCSK cooperative communication system with code index modulation: A new design for 6G new radios","authors":"Yi Fang, Wang Chen, Pingping Chen, Yiwei Tao, Mohsen Guizani","doi":"10.23919/jcc.fa.2022-0297.202310","DOIUrl":"https://doi.org/10.23919/jcc.fa.2022-0297.202310","url":null,"abstract":"This paper proposes a high-throughput short reference differential chaos shift keying cooperative communication system with the aid of code index modulation, referred to as CIM-SR-DCSK-CC system. In the proposed CIM-SR-DCSK-CC system, the source transmits information bits to both the relay and destination in the first time slot, while the relay not only forwards the source information bits but also sends new information bits to the destination in the second time slot. To be specific, the relay employs an N-order Walsh code to carry additional log <inf xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</inf> N information bits, which are superimposed onto the SR-DCSK signal carrying the decoded source information bits. Subsequently, the superimposed signal carrying both the source and relay information bits is transmitted to the destination. Moreover, the theoretical bit error rate (BER) expressions of the proposed CIM-SR-DCSK-CC system are derived over additive white Gaussian noise (AWGN) and multipath Rayleigh fading channels. Compared with the conventional DCSK-CC system and SR-DCSK-CC system, the proposed CIM-SR-DCSK-CC system can significantly improve the throughput without deteriorating any BER performance. As a consequence, the proposed system is very promising for the applications of the 6G-enabled low-power and high-rate communication.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136200042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.23919/jcc.fa.2023-0359.202310
Xiongfei Ren, Lili Tong, Jia Zeng, Chen Zhang
The explosion of ChatGPT is considered to be a milestone in the normalization of artificial intelligence education applications. On the technical line, the cross-modal AI generation application based on human feedback system is accelerated. In the business model, the scenes to realize interactive functions are constantly enriched. This paper reviews the evolution process of AIGC, closely follows the current situation of the coexistence of business acceleration and technical worries in the application of artificial intelligence education, analyzes the application of AIGC education in 7 subdivided fields, and analyzes the optimization direction of application cases from the perspective of perception-cognition-creation technology maturity matrix. The 3 recommendations and 2 follow-up research directions will promote the scientific application of artificial intelligence education in the AIGC period.
{"title":"AIGC scenario analysis and research on technology roadmap of Internet industry application","authors":"Xiongfei Ren, Lili Tong, Jia Zeng, Chen Zhang","doi":"10.23919/jcc.fa.2023-0359.202310","DOIUrl":"https://doi.org/10.23919/jcc.fa.2023-0359.202310","url":null,"abstract":"The explosion of ChatGPT is considered to be a milestone in the normalization of artificial intelligence education applications. On the technical line, the cross-modal AI generation application based on human feedback system is accelerated. In the business model, the scenes to realize interactive functions are constantly enriched. This paper reviews the evolution process of AIGC, closely follows the current situation of the coexistence of business acceleration and technical worries in the application of artificial intelligence education, analyzes the application of AIGC education in 7 subdivided fields, and analyzes the optimization direction of application cases from the perspective of perception-cognition-creation technology maturity matrix. The 3 recommendations and 2 follow-up research directions will promote the scientific application of artificial intelligence education in the AIGC period.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136200055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.23919/jcc.ea.2021-0856.202302
Enyu Du, Yang Gao, Wenjun Wu, Zhaoxin Yang, Yufeng Yin, Pengbo Si
To ensure the security of resource and intelligence sharing in 6G, blockchain has been widely adopted in wireless communications and applications. Although blockchain can ensure the traceability and non-tamperability of data in the concatenated blocks, it cannot guarantee the honest behaviors of users in the application before the generation of transactions. Thus, additional technologies are required to ensure that the source of blockchain data is reliable. In this paper, the detailed procedure is designed for the application-oriented task validation in the blockchain-enhanced computing resource sharing and transactions in ultra dense networks (UDN). The corresponding queuing model is built and analyzed with the consideration of the wireless re-transmission and the probability of malicious deception by users. Based on the analysis results, the UDN deployment is optimized to save network cost while ensuring latency performance. Numerical results verify our analysis, and the optimized system deployment including the number and service capacities of both base stations and mobile edge computing (MEC) servers are also given with various system settings.
{"title":"Analysis and optimization of validation procedure in blockchain-enhanced wireless resource sharing and transactions","authors":"Enyu Du, Yang Gao, Wenjun Wu, Zhaoxin Yang, Yufeng Yin, Pengbo Si","doi":"10.23919/jcc.ea.2021-0856.202302","DOIUrl":"https://doi.org/10.23919/jcc.ea.2021-0856.202302","url":null,"abstract":"To ensure the security of resource and intelligence sharing in 6G, blockchain has been widely adopted in wireless communications and applications. Although blockchain can ensure the traceability and non-tamperability of data in the concatenated blocks, it cannot guarantee the honest behaviors of users in the application before the generation of transactions. Thus, additional technologies are required to ensure that the source of blockchain data is reliable. In this paper, the detailed procedure is designed for the application-oriented task validation in the blockchain-enhanced computing resource sharing and transactions in ultra dense networks (UDN). The corresponding queuing model is built and analyzed with the consideration of the wireless re-transmission and the probability of malicious deception by users. Based on the analysis results, the UDN deployment is optimized to save network cost while ensuring latency performance. Numerical results verify our analysis, and the optimized system deployment including the number and service capacities of both base stations and mobile edge computing (MEC) servers are also given with various system settings.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136139702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.23919/jcc.fa.2021-0430.202310
Huici Wu, Yang Wen, Xiaofeng Tao, Jin Xu
This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground (A2G) communication networks considering the impact of body jitter of unmanned aerial vehicle (UAV). A full-duplex (FD) active ground eavesdropper launches jamming attack while eavesdropping to stimulate the legitimate transmitter (i.e., UAV) to increase its transmission power. The legitimate transmitter's objective is to against the simultaneous wiretapping and jamming with a robust and power-efficient transmission scheme. The active eavesdropper aims to minimize the system secrecy rate. To study the interaction between the legitimate transmitter and the active eavesdropper, a non-cooperative game framework is formulated. Detailed, considering the impact of UAV jitter on antenna array response and secrecy performance, we first investigate the UAV's transmission power minimization problem for the worst scenario with minimum legitimate data rate and maximum eavesdropping data rate under UAV jitter. Then, the active eavesdropper's secrecy rate minimization problem with the worst scenario is investigated by optimizing its jamming strategy. Nash equilibrium is proved to be existed and obtained with the proposed iterative algorithm. Finally, extensive numerical results are provided to evaluate the system secrecy performance and to show the secrecy performance gains of the proposed method.
{"title":"Anti-jamming and anti-eavesdropping in A2G communication system with jittering UAV","authors":"Huici Wu, Yang Wen, Xiaofeng Tao, Jin Xu","doi":"10.23919/jcc.fa.2021-0430.202310","DOIUrl":"https://doi.org/10.23919/jcc.fa.2021-0430.202310","url":null,"abstract":"This paper focuses on anti-jamming and anti-eavesdropping problem in air-to-ground (A2G) communication networks considering the impact of body jitter of unmanned aerial vehicle (UAV). A full-duplex (FD) active ground eavesdropper launches jamming attack while eavesdropping to stimulate the legitimate transmitter (i.e., UAV) to increase its transmission power. The legitimate transmitter's objective is to against the simultaneous wiretapping and jamming with a robust and power-efficient transmission scheme. The active eavesdropper aims to minimize the system secrecy rate. To study the interaction between the legitimate transmitter and the active eavesdropper, a non-cooperative game framework is formulated. Detailed, considering the impact of UAV jitter on antenna array response and secrecy performance, we first investigate the UAV's transmission power minimization problem for the worst scenario with minimum legitimate data rate and maximum eavesdropping data rate under UAV jitter. Then, the active eavesdropper's secrecy rate minimization problem with the worst scenario is investigated by optimizing its jamming strategy. Nash equilibrium is proved to be existed and obtained with the proposed iterative algorithm. Finally, extensive numerical results are provided to evaluate the system secrecy performance and to show the secrecy performance gains of the proposed method.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136200044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a powerful model-driven deep learning framework is exploited to overcome the challenge of multi-domain signal detection in spacedomain index modulation (SDIM) based multiple input multiple output (MIMO) systems. Specifically, we use orthogonal approximate message passing (OAMP) technique to develop OAMPNet, which is a novel signal recovery mechanism in the field of compressed sensing that effectively uses the sparse property from the training SDIM samples. For OAMPNet, the prior probability of the transmit signal has a significant impact on the obtainable performance. For this reason, in our design, we first derive the prior probability of transmitting signals on each antenna for SDIM-MIMO systems, which is different from the conventional massive MIMO systems. Then, for massive MIMO scenarios, we propose two novel algorithms to avoid pre-storing all active antenna combinations, thus considerably improving the memory efficiency and reducing the related overhead. Our simulation results show that the proposed framework outperforms the conventional optimization-driven based detection algorithms and has strong robustness under different antenna scales.
{"title":"Model-driven deep learning for massive space-domain index modulation MIMO detection","authors":"Ping Yang, Qin Yi, Yiqian Huang, Jialiang Fu, Yue Xiao, Wanbin Tang","doi":"10.23919/jcc.fa.2023-0157.202310","DOIUrl":"https://doi.org/10.23919/jcc.fa.2023-0157.202310","url":null,"abstract":"In this paper, a powerful model-driven deep learning framework is exploited to overcome the challenge of multi-domain signal detection in spacedomain index modulation (SDIM) based multiple input multiple output (MIMO) systems. Specifically, we use orthogonal approximate message passing (OAMP) technique to develop OAMPNet, which is a novel signal recovery mechanism in the field of compressed sensing that effectively uses the sparse property from the training SDIM samples. For OAMPNet, the prior probability of the transmit signal has a significant impact on the obtainable performance. For this reason, in our design, we first derive the prior probability of transmitting signals on each antenna for SDIM-MIMO systems, which is different from the conventional massive MIMO systems. Then, for massive MIMO scenarios, we propose two novel algorithms to avoid pre-storing all active antenna combinations, thus considerably improving the memory efficiency and reducing the related overhead. Our simulation results show that the proposed framework outperforms the conventional optimization-driven based detection algorithms and has strong robustness under different antenna scales.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136200053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-01DOI: 10.23919/jcc.ea.2021-0184.202302
Guangyue Lu, Zhipeng Liu, Yinghui Ye, Xiaoli Chu
This paper investigates the system outage performance of a simultaneous wireless information and power transfer (SWIPT) based two-way decode-and-forward (DF) relay network, where potential hardware impairments (HIs) in all transceivers are considered. After harvesting energy and decoding messages simultaneously via a power splitting scheme, the energy-limited relay node forwards the decoded information to both terminals. Each terminal combines the signals from the direct and relaying links via selection combining. We derive the system outage probability under independent but non-identically distributed Nakagami-m fading channels. It reveals an overall system ceiling (OSC) effect, i.e., the system falls in outage if the target rate exceeds an OSC threshold that is determined by the levels of HIs. Furthermore, we derive the diversity gain of the considered network. The result reveals that when the transmission rate is below the OSC threshold, the achieved diversity gain equals the sum of the shape parameter of the direct link and the smaller shape parameter of the terminal-to-relay links; otherwise, the diversity gain is zero. This is different from the amplify-and-forward (AF) strategy, under which the relaying links have no contribution to the diversity gain. Simulation results validate the analytical results and reveal that compared with the AF strategy, the SWIPT based two-way relaying links under the DF strategy are more robust to HIs and achieve a lower system outage probability.
{"title":"System outage probability and diversity analysis of a SWIPT based two-way DF relay network under transceiver hardware impairments","authors":"Guangyue Lu, Zhipeng Liu, Yinghui Ye, Xiaoli Chu","doi":"10.23919/jcc.ea.2021-0184.202302","DOIUrl":"https://doi.org/10.23919/jcc.ea.2021-0184.202302","url":null,"abstract":"This paper investigates the system outage performance of a simultaneous wireless information and power transfer (SWIPT) based two-way decode-and-forward (DF) relay network, where potential hardware impairments (HIs) in all transceivers are considered. After harvesting energy and decoding messages simultaneously via a power splitting scheme, the energy-limited relay node forwards the decoded information to both terminals. Each terminal combines the signals from the direct and relaying links via selection combining. We derive the system outage probability under independent but non-identically distributed Nakagami-m fading channels. It reveals an overall system ceiling (OSC) effect, i.e., the system falls in outage if the target rate exceeds an OSC threshold that is determined by the levels of HIs. Furthermore, we derive the diversity gain of the considered network. The result reveals that when the transmission rate is below the OSC threshold, the achieved diversity gain equals the sum of the shape parameter of the direct link and the smaller shape parameter of the terminal-to-relay links; otherwise, the diversity gain is zero. This is different from the amplify-and-forward (AF) strategy, under which the relaying links have no contribution to the diversity gain. Simulation results validate the analytical results and reveal that compared with the AF strategy, the SWIPT based two-way relaying links under the DF strategy are more robust to HIs and achieve a lower system outage probability.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135996511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}