Pub Date : 2023-09-01DOI: 10.23919/JCC.2023.00.102
Li Xu, Xiuhua Jiang
Image quality assessment (IQA) is constantly innovating, but there are still three types of stickers that have not been resolved: the "content sticker" — limitation of training set, the "annotation sticker" — subjective instability in opinion scores and the "distortion sticker" — disordered distortion settings. In this paper, a No-Reference Image Quality Assessment (NR IQA) approach is proposed to deal with the problems. For "content sticker", we introduce the idea of pairwise comparison and generate a largescale ranking set to pre-train the network; For "annotation sticker", the absolute noise-containing subjective scores are transformed into ranking comparison results, and we design an indirect unsupervised regression based on Eigenvalue Decomposition (EVD); For "distortion sticker", we propose a perception-based distortion classification method, which makes the distortion types clear and refined. Experiments have proved that our NR IQA approach Experiments show that the algorithm performs well and has good generalization ability. Furthermore, the proposed perception based distortion classification method would be able to provide insights on how the visual related studies may be developed and to broaden our understanding of human visual system.
{"title":"Blind image quality assessment by pairwise ranking image series","authors":"Li Xu, Xiuhua Jiang","doi":"10.23919/JCC.2023.00.102","DOIUrl":"https://doi.org/10.23919/JCC.2023.00.102","url":null,"abstract":"Image quality assessment (IQA) is constantly innovating, but there are still three types of stickers that have not been resolved: the \"content sticker\" — limitation of training set, the \"annotation sticker\" — subjective instability in opinion scores and the \"distortion sticker\" — disordered distortion settings. In this paper, a No-Reference Image Quality Assessment (NR IQA) approach is proposed to deal with the problems. For \"content sticker\", we introduce the idea of pairwise comparison and generate a largescale ranking set to pre-train the network; For \"annotation sticker\", the absolute noise-containing subjective scores are transformed into ranking comparison results, and we design an indirect unsupervised regression based on Eigenvalue Decomposition (EVD); For \"distortion sticker\", we propose a perception-based distortion classification method, which makes the distortion types clear and refined. Experiments have proved that our NR IQA approach Experiments show that the algorithm performs well and has good generalization ability. Furthermore, the proposed perception based distortion classification method would be able to provide insights on how the visual related studies may be developed and to broaden our understanding of human visual system.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"20 1","pages":"127-143"},"PeriodicalIF":4.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41598990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.23919/jcc.fa.2022-0374.202309
Ling Ouyang, Ke Song, Wenjian Zhang, Shuai Wei
Redundancy control can effectively enhance the stability and robustness of a system. Based on the conventional redundancy control switchover and majority arbitration strategy, this paper introduces the concept of heterogeneity and dynamics, constructs a dynamic heterogeneous redundancy-based microcontroller architecture DHR-MCU, and designs a fixed-leader distributed consensus algorithm that satisfies the program running state control of this architecture. The theoretical analysis and actual measurement of the prototype system prove that this architecture has good anti-attack and self-recovery capabilities under normal functions and performances and meets the general robust features in terms of safety and security.
{"title":"Microcontroller design based on dynamic heterogeneous redundancy architecture","authors":"Ling Ouyang, Ke Song, Wenjian Zhang, Shuai Wei","doi":"10.23919/jcc.fa.2022-0374.202309","DOIUrl":"https://doi.org/10.23919/jcc.fa.2022-0374.202309","url":null,"abstract":"Redundancy control can effectively enhance the stability and robustness of a system. Based on the conventional redundancy control switchover and majority arbitration strategy, this paper introduces the concept of heterogeneity and dynamics, constructs a dynamic heterogeneous redundancy-based microcontroller architecture DHR-MCU, and designs a fixed-leader distributed consensus algorithm that satisfies the program running state control of this architecture. The theoretical analysis and actual measurement of the prototype system prove that this architecture has good anti-attack and self-recovery capabilities under normal functions and performances and meets the general robust features in terms of safety and security.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135299509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Integrated sensing and communication (ISAC) is regarded as a recent advanced technology, which is expected to realize the dual functions of sensing and communication simultaneously in one system. Nevertheless, it still faces the challenges of the information security and transmission robustness caused by the openness of wireless channel, especially under antagonistic environment. Hence, this article develops a generalized framework, named cognitive joint jamming, sensing and communication (cognitive J 2 SAC), to empower the current sensing/communication/jamming system with a "brain" for realizing precise sensing, reliable communication and effective jamming under antagonistic environment. Three kinds of gains can be captured by cognitive J 2 SAC, including integrated gain, cooperative gain and cognitive gain. Moreover, we highlight the enabling mechanism among jamming, sensing, and communication, as well as illustrating several typical use cases of cognitive J 2 SAC. Furthermore, several key enabled technologies are analyzed and a typical sensing enhance integrated communication and jamming case study is discussed to verify the effectiveness of the proposed method. Last but not the least, the future directions are listed before concluding this article.
{"title":"Cognitive J<sup>2</sup>SAC: Joint jamming, sensing, and communication under antagonistic environment","authors":"Jiangchun Gu, Guoru Ding, Yizhen Yin, Haichao Wang, Yitao Xu, Yehui Song","doi":"10.23919/jcc.fa.2023-0142.202309","DOIUrl":"https://doi.org/10.23919/jcc.fa.2023-0142.202309","url":null,"abstract":"Integrated sensing and communication (ISAC) is regarded as a recent advanced technology, which is expected to realize the dual functions of sensing and communication simultaneously in one system. Nevertheless, it still faces the challenges of the information security and transmission robustness caused by the openness of wireless channel, especially under antagonistic environment. Hence, this article develops a generalized framework, named cognitive joint jamming, sensing and communication (cognitive J <sup xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup> SAC), to empower the current sensing/communication/jamming system with a \"brain\" for realizing precise sensing, reliable communication and effective jamming under antagonistic environment. Three kinds of gains can be captured by cognitive J <sup xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup> SAC, including integrated gain, cooperative gain and cognitive gain. Moreover, we highlight the enabling mechanism among jamming, sensing, and communication, as well as illustrating several typical use cases of cognitive J <sup xmlns:mml=\"http://www.w3.org/1998/Math/MathML\" xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup> SAC. Furthermore, several key enabled technologies are analyzed and a typical sensing enhance integrated communication and jamming case study is discussed to verify the effectiveness of the proposed method. Last but not the least, the future directions are listed before concluding this article.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135299508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.23919/JCC.fa.2022-0857.202308
Xiaowei Liu, Guangliang Ren
The true-time delay (TTD) units are critical for solving beam squint and frequency selective fading in Wideband Large-Scale Antenna Systems (LSASs). In this work, we propose a TTD array architecture for wideband multi-beam tracking that eliminates the beam squint phenomenon and filters out interference signals by applying a spatial filter and time delay estimations (TDEs). The paper presents a novel approach to spatial filter design by introducing a transformation matrix that can optimize the beam response in a specific direction and at a specific frequency. Using the variable fractional delay (VFD) filters, we propose a TDE algorithm with a Newton-Raphson iteration update process that corrects the arrival time delay difference between sensors. Simulations and examples have demonstrated that the proposed architecture can achieve beam tracking within 10 ms at the low signal-to-noise ratio (SNR) and demodulation loss is less than 0.5 dB in wideband multi-beam scenarios.
{"title":"A true-time-delay array architecture for wideband multi-beam tracking","authors":"Xiaowei Liu, Guangliang Ren","doi":"10.23919/JCC.fa.2022-0857.202308","DOIUrl":"https://doi.org/10.23919/JCC.fa.2022-0857.202308","url":null,"abstract":"The true-time delay (TTD) units are critical for solving beam squint and frequency selective fading in Wideband Large-Scale Antenna Systems (LSASs). In this work, we propose a TTD array architecture for wideband multi-beam tracking that eliminates the beam squint phenomenon and filters out interference signals by applying a spatial filter and time delay estimations (TDEs). The paper presents a novel approach to spatial filter design by introducing a transformation matrix that can optimize the beam response in a specific direction and at a specific frequency. Using the variable fractional delay (VFD) filters, we propose a TDE algorithm with a Newton-Raphson iteration update process that corrects the arrival time delay difference between sensors. Simulations and examples have demonstrated that the proposed architecture can achieve beam tracking within 10 ms at the low signal-to-noise ratio (SNR) and demodulation loss is less than 0.5 dB in wideband multi-beam scenarios.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"20 1","pages":"65-77"},"PeriodicalIF":4.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42015931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we focus on providing data provenance auditing schemes for distributed denial of service (DDoS) defense in intelligent internet of things (IoT). To achieve effective DDoS defense, we introduce a two-layer collaborative blockchain framework to support data auditing. Specifically, using data scattered among intelligent IoT devices, switch gateways self-assemble a layer of blockchain in the local autonomous system (AS), and the main chain with controller participation can be aggregated by its associated layer of blocks once a cycle, to obtain a global security model. To optimize the processing delay of the security model, we propose a process of data pre-validation with the goal of ensuring data consistency while satisfying overhead requirements. Since the flood of identity spoofing packets, it is difficult to solve the identity consistency of data with traditional detection methods, and accountability cannot be pursued afterwards. Thus, we proposed a Packet Traceback Telemetry (PTT) scheme, based on in-band telemetry, to solve the problem. Specifically, the PTT scheme is executed on the distributed switch side, the controller to schedule and select routing policies. Moreover, a tracing probabilistic optimization is embedded into the PTT scheme to accelerate path reconstruction and save device resources. Simulation results show that the PTT scheme can reconstruct address spoofing packet forward path, reduce the resource consumption compared with existing tracing scheme. Data tracing audit method has fine-grained detection and feasible performance.
{"title":"Smart contract based DDoS attack traceability audit mechanism in intelligent IoT","authors":"Zhuohao Wang, Weiting Zhang, Runhu Wang, Y. Liu, Chenyang Xu, Chengxiao Yu","doi":"10.23919/JCC.fa.2023-0020.202308","DOIUrl":"https://doi.org/10.23919/JCC.fa.2023-0020.202308","url":null,"abstract":"In this paper, we focus on providing data provenance auditing schemes for distributed denial of service (DDoS) defense in intelligent internet of things (IoT). To achieve effective DDoS defense, we introduce a two-layer collaborative blockchain framework to support data auditing. Specifically, using data scattered among intelligent IoT devices, switch gateways self-assemble a layer of blockchain in the local autonomous system (AS), and the main chain with controller participation can be aggregated by its associated layer of blocks once a cycle, to obtain a global security model. To optimize the processing delay of the security model, we propose a process of data pre-validation with the goal of ensuring data consistency while satisfying overhead requirements. Since the flood of identity spoofing packets, it is difficult to solve the identity consistency of data with traditional detection methods, and accountability cannot be pursued afterwards. Thus, we proposed a Packet Traceback Telemetry (PTT) scheme, based on in-band telemetry, to solve the problem. Specifically, the PTT scheme is executed on the distributed switch side, the controller to schedule and select routing policies. Moreover, a tracing probabilistic optimization is embedded into the PTT scheme to accelerate path reconstruction and save device resources. Simulation results show that the PTT scheme can reconstruct address spoofing packet forward path, reduce the resource consumption compared with existing tracing scheme. Data tracing audit method has fine-grained detection and feasible performance.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"20 1","pages":"54-64"},"PeriodicalIF":4.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46868822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.23919/JCC.fa.2022-0611.202308
Cheng Hu, Hong Wang, Changxiang Li, Rong-fang Song
Non-orthogonal multiple access (NOMA) is viewed as a key technique to improve the spectrum efficiency and solve the issue of massive connectivity. However, for power domain NOMA, the required overall transmit power should be increased rapidly with the increasing number of users in order to ensure that the signal-to-interference-plus-noise ratio reaches a predefined threshold. In addition, since the successive interference cancellation (SIC) is adopted, the error propagation would become more serious as the order of SIC increases. Aiming at minimizing the total transmit power and satisfying each user's service requirement, this paper proposes a novel framework with group-based SIC for the deep integration between power domain NOMA and multi-antenna technology. Based on the proposed framework, a joint optimization of power control and equalizer design is investigated to minimize transmit power consumption for uplink multi-antenna NOMA system with error propagations. Based on the relationship between the equalizer and the transmit power coefficients, the original problem is transformed to a transmit power optimization problem, which is further addressed by a parallel iteration algorithm. It is shown by simulations that, in terms of the total power consumption, the proposed scheme outperforms the conventional OMA and the existing cluster-based NOMA schemes.
{"title":"Group-based successive interference cancellation for multi-antenna NOMA system with error propagation","authors":"Cheng Hu, Hong Wang, Changxiang Li, Rong-fang Song","doi":"10.23919/JCC.fa.2022-0611.202308","DOIUrl":"https://doi.org/10.23919/JCC.fa.2022-0611.202308","url":null,"abstract":"Non-orthogonal multiple access (NOMA) is viewed as a key technique to improve the spectrum efficiency and solve the issue of massive connectivity. However, for power domain NOMA, the required overall transmit power should be increased rapidly with the increasing number of users in order to ensure that the signal-to-interference-plus-noise ratio reaches a predefined threshold. In addition, since the successive interference cancellation (SIC) is adopted, the error propagation would become more serious as the order of SIC increases. Aiming at minimizing the total transmit power and satisfying each user's service requirement, this paper proposes a novel framework with group-based SIC for the deep integration between power domain NOMA and multi-antenna technology. Based on the proposed framework, a joint optimization of power control and equalizer design is investigated to minimize transmit power consumption for uplink multi-antenna NOMA system with error propagations. Based on the relationship between the equalizer and the transmit power coefficients, the original problem is transformed to a transmit power optimization problem, which is further addressed by a parallel iteration algorithm. It is shown by simulations that, in terms of the total power consumption, the proposed scheme outperforms the conventional OMA and the existing cluster-based NOMA schemes.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"20 1","pages":"276-287"},"PeriodicalIF":4.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46384455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.23919/JCC.fa.2022-0240.202308
Asad Saleem, Yejun He, G. Zheng, Zhining Chen
The high reliability of the communication system is critical in metro and mining applications for personal safety, channel optimization, and improving operational performance. This paper surveys the progress of wireless communication systems in underground environments such as tunnels and mines from 1920 to 2022, including the evolution of primitive technology, advancements in channel modelling, and realization of various wireless propagation channels. In addition, the existing and advanced channel modeling strategies, which include the evolution of different technologies and their applications; mathematical, analytical, and experimental techniques for radio propagation; and significance of the radiation characteristics, antenna placement, and physical environment of multiple-input multiple-output (MIMO) communication systems, are analyzed. The given study introduces leaky coaxial cable (LCX) and distributed antenna system (DAS) designs for improving narrowband and wideband channel capacity. The paper concludes by figuring out open research areas for the future technologies.
{"title":"A survey on channel measurements and models for underground MIMO communication systems","authors":"Asad Saleem, Yejun He, G. Zheng, Zhining Chen","doi":"10.23919/JCC.fa.2022-0240.202308","DOIUrl":"https://doi.org/10.23919/JCC.fa.2022-0240.202308","url":null,"abstract":"The high reliability of the communication system is critical in metro and mining applications for personal safety, channel optimization, and improving operational performance. This paper surveys the progress of wireless communication systems in underground environments such as tunnels and mines from 1920 to 2022, including the evolution of primitive technology, advancements in channel modelling, and realization of various wireless propagation channels. In addition, the existing and advanced channel modeling strategies, which include the evolution of different technologies and their applications; mathematical, analytical, and experimental techniques for radio propagation; and significance of the radiation characteristics, antenna placement, and physical environment of multiple-input multiple-output (MIMO) communication systems, are analyzed. The given study introduces leaky coaxial cable (LCX) and distributed antenna system (DAS) designs for improving narrowband and wideband channel capacity. The paper concludes by figuring out open research areas for the future technologies.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"20 1","pages":"103-119"},"PeriodicalIF":4.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42106182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.23919/JCC.fa.2021-0179.202308
Di Guan, K. Niu, Chao Dong
In this paper, we propose an arbitrary decode-forward single-relay scheme for finite block-length polar codes, which can be applied to the general symmetric discrete memoryless relay channel with orthogonal receiver components. The relay node decodes the received message. The relay node selectively re-encodes the message and transmits it to the destination node. Furthermore, in order to minimize the upper-bound of the block error probability, we propose a selection strategy to decide the proper re-encoded bit set by the relay. Simulation results are presented to illustrate the improvement in decoding performance of the proposed scheme compared to conventional relay schemes in both additive white Gaussian noise (AWGN) channel and Rayleigh fading channel (RFC).
{"title":"Arbitrary decode-forward relaying with re-encoded bits selection strategy for polar codes","authors":"Di Guan, K. Niu, Chao Dong","doi":"10.23919/JCC.fa.2021-0179.202308","DOIUrl":"https://doi.org/10.23919/JCC.fa.2021-0179.202308","url":null,"abstract":"In this paper, we propose an arbitrary decode-forward single-relay scheme for finite block-length polar codes, which can be applied to the general symmetric discrete memoryless relay channel with orthogonal receiver components. The relay node decodes the received message. The relay node selectively re-encodes the message and transmits it to the destination node. Furthermore, in order to minimize the upper-bound of the block error probability, we propose a selection strategy to decide the proper re-encoded bit set by the relay. Simulation results are presented to illustrate the improvement in decoding performance of the proposed scheme compared to conventional relay schemes in both additive white Gaussian noise (AWGN) channel and Rayleigh fading channel (RFC).","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"20 1","pages":"153-162"},"PeriodicalIF":4.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43605020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.23919/JCC.fa.2023-0202.202308
Mancong Kang, Xi Li, Hong Ji, Heli Zhang
Digital twins for wide-areas (DT-WA) can model and predict the physical world with high fidelity by incorporating an artificial intelligence (AI) model. However, the AI model requires an energy-consuming updating process to keep pace with the dynamic environment, where studies are still in infancy. To reduce the updating energy, this paper proposes a distributed edge cooperation and data collection scheme. The AI model is partitioned into multiple sub-models deployed on different edge servers (ESs) co-located with access points across wide-area, to update distributively using local sensor data. To reduce the updating energy, ESs can choose to become either updating helpers or recipients of their neighboring ESs, based on sensor quantities and basic updating convergencies. Helpers would share their updated sub-model parameters with neighboring recipients, so as to reduce the latter updating workload. To minimize system energy under updating convergency and latency constraints, we further propose an algorithm to let ESs distributively optimize their cooperation identities, collect sensor data, and allocate wireless and computing resources. It comprises several constraint-release approaches, where two child optimization problems are solved, and designs a large-scale multi-agent deep reinforcement learning algorithm. Simulation shows that the proposed scheme can efficiently reduce updating energy compared with the baselines.
{"title":"Distributed edge cooperation and data collection for digital twins of wide-areas","authors":"Mancong Kang, Xi Li, Hong Ji, Heli Zhang","doi":"10.23919/JCC.fa.2023-0202.202308","DOIUrl":"https://doi.org/10.23919/JCC.fa.2023-0202.202308","url":null,"abstract":"Digital twins for wide-areas (DT-WA) can model and predict the physical world with high fidelity by incorporating an artificial intelligence (AI) model. However, the AI model requires an energy-consuming updating process to keep pace with the dynamic environment, where studies are still in infancy. To reduce the updating energy, this paper proposes a distributed edge cooperation and data collection scheme. The AI model is partitioned into multiple sub-models deployed on different edge servers (ESs) co-located with access points across wide-area, to update distributively using local sensor data. To reduce the updating energy, ESs can choose to become either updating helpers or recipients of their neighboring ESs, based on sensor quantities and basic updating convergencies. Helpers would share their updated sub-model parameters with neighboring recipients, so as to reduce the latter updating workload. To minimize system energy under updating convergency and latency constraints, we further propose an algorithm to let ESs distributively optimize their cooperation identities, collect sensor data, and allocate wireless and computing resources. It comprises several constraint-release approaches, where two child optimization problems are solved, and designs a large-scale multi-agent deep reinforcement learning algorithm. Simulation shows that the proposed scheme can efficiently reduce updating energy compared with the baselines.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"27 3","pages":"177-197"},"PeriodicalIF":4.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41244059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.23919/JCC.fa.2021-0563.202308
Lingyi Kong, Yulong Zou, Yuhan Jiang, Jia Zhu
In this paper, we investigate the system performance of a heterogeneous cellular network consisting of a macro cell and a small cell, where each cell has one user and one base station with multiple antennas. The macro base station (MBS) and the small base station (SBS) transmit their confidential messages to the macro user (MU) and the small user (SU) over their shared spectrum respectively. To enhance the system sum rate (SSR) of MBS-MU and SBS-SU transmission, we propose joint antenna selection combined with optimal power allocation (JAS-OPA) scheme and independent antenna selection combined with optimal power allocation (IAS-OPA) scheme. The JAS-OPA scheme requires to know the channel state information (CSI) of transmission channels and interference channels, while the IAS-OPA scheme only needs to know the CSI of transmission channels. In addition, we carry out the analysis for conventional round-robin antenna selection combined with optimal power allocation (RR-OPA) as a benchmark scheme. We formulate the SSR maximization problem through the power allocation between MBS and SBS and propose iterative OPA algorithms for JAS-OPA, IAS-OPA and RR-OPA schemes, respectively. The results show that the OPA schemes outperform the equal power allocation in terms of SSR. Moreover, we provide the closed-form expression of the system outage probability (SOP) for IAS scheme and RR scheme, it shows the SOP performance can be significantly improved by our proposed IAS scheme compared with RR scheme.
{"title":"Power allocation and antenna selection for heterogeneous cellular networks","authors":"Lingyi Kong, Yulong Zou, Yuhan Jiang, Jia Zhu","doi":"10.23919/JCC.fa.2021-0563.202308","DOIUrl":"https://doi.org/10.23919/JCC.fa.2021-0563.202308","url":null,"abstract":"In this paper, we investigate the system performance of a heterogeneous cellular network consisting of a macro cell and a small cell, where each cell has one user and one base station with multiple antennas. The macro base station (MBS) and the small base station (SBS) transmit their confidential messages to the macro user (MU) and the small user (SU) over their shared spectrum respectively. To enhance the system sum rate (SSR) of MBS-MU and SBS-SU transmission, we propose joint antenna selection combined with optimal power allocation (JAS-OPA) scheme and independent antenna selection combined with optimal power allocation (IAS-OPA) scheme. The JAS-OPA scheme requires to know the channel state information (CSI) of transmission channels and interference channels, while the IAS-OPA scheme only needs to know the CSI of transmission channels. In addition, we carry out the analysis for conventional round-robin antenna selection combined with optimal power allocation (RR-OPA) as a benchmark scheme. We formulate the SSR maximization problem through the power allocation between MBS and SBS and propose iterative OPA algorithms for JAS-OPA, IAS-OPA and RR-OPA schemes, respectively. The results show that the OPA schemes outperform the equal power allocation in terms of SSR. Moreover, we provide the closed-form expression of the system outage probability (SOP) for IAS scheme and RR scheme, it shows the SOP performance can be significantly improved by our proposed IAS scheme compared with RR scheme.","PeriodicalId":9814,"journal":{"name":"China Communications","volume":"571 1","pages":"220-233"},"PeriodicalIF":4.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68734886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}