The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60019-9
Piecewise companding transform is a flexible and efficient way to solve the high peak-to-average power ratio (PAPR) problem for orthogonal frequency division multiplexing (OFDM) systems. A novel threshold-based piecewise companding transform is proposed in this paper. Based on the statistical characteristics of amplitudes, OFDM signals are classified into three groups (i.e., small, average and large signals). Different from conventional approaches, two dedicated designed thresholds are set to amplify the small signals and compress the large signals, respectively. Simulation results verify the improvement in PAPR reduction of the proposed scheme. Moreover, a lower bit error rate (BER) performance loss can be obtained by introducing the iterative detection with a moderate increase in complexity.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60020-5
Abstract ( 1708 ) PDF (0 KB)( 347 )
In long term evolution (LTE) uplink single carrier frequency division multiple access (SC-FDMA) system, the restriction that multiple resource blocks (RBs) allocated to a user should be adjacent, makes the resource allocation problem hard to solve. Moreover, with the practical constraint that perfect channel state information (CSI) cannot be obtained in time-varying channel, the resource allocation problem will become more difficult. In this paper, an efficient resource allocation algorithm is proposed in LTE uplink SC-FDMA system with imperfect CSI assumption. Firstly, the resource allocation problem is formulated as a mixed integer programming problem. Then an efficient algorithm based on discrete stochastic optimization is proposed to solve the problem. Finally, simulation results show that the proposed algorithm has desirable system performance.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60021-7
Abstract ( 1770 ) PDF (0 KB)( 347 )
This paper considers a frequency-division duplex (FDD) two-way channel with channel estimation error, where channel gains are independent of each other. It derives the exact closed-form outage probability expressions in the FDD system with analog network coding (ANC) by use of probability theory. To provide more insights, an approximated version for the exact outage probability is also developed in the medium-to-high signal-to-noise ratio (SNR) region. The simulation results show that the derived exact outage probabilities match the results of Monte Carlo simulations in all SNR regions, while the approximated outage probabilities also approach the simulation results when the channel condition is good. It is interesting that ANC in the FDD two-way channel is proved to outperform that of in the time-division duplex (TDD) channel by the computer simulation.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60022-9
Abstract ( 1725 ) PDF (0 KB)( 279 )
This paper studies the problem of effective resource allocation for multi-radio access technologies (Multi-RAT) nodes in heterogeneous cognitive wireless networks (HCWNs). End-to-end utility, which is defined as the delay of end-to-end communication, is taken into account in this paper. In the scenario of HCWNs, it is assumed that the cognitive radio nodes have the ability of Multi-RAT and can communicate with each other through different paths simultaneously by splitting the arrival packets. In this paper, the problem is formulated as the optimization of split ratio and power allocation of the source cognitive radio node to minimize the delay of end-to-end communication, and a low complexity step-by-step iterative algorithm is proposed. Numerical results show good performance of the proposed algorithm over two other conventional algorithms.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60023-0
Abstract ( 1687 ) PDF (0 KB)( 287 )
In this paper, the feedback load reduction problem in wireless systems based on orthogonal frequency division multiplexing (OFDM) is investigated and an opportunistic feedback scheme (OFS) is proposed. The key idea behind OFS is that only the key channel gains which can significantly affect the system throughput are fed back to the BS. Firstly, the key channel gains are proved to belong to a channel gain interval. Secondly, a statistical method is proposed to estimate the channel gain interval. Thirdly, the opportunistic feedback scheme is formulated and the feedback load of OFS is analyzed. The advantage of OFS is threefold: the first is OFS can work in both OFDM-based multicast system and OFDM-based unicast system. The second is the channel fading type of the BS-user link is not required, which is more realistic. The third is OFS can get better feedback load performance compared with other schemes, while achieving almost the same throughput performance compared with that of full feedback scheme.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60024-2
Abstract ( 1799 ) PDF (0 KB)( 295 )
The paper mainly studies the sum-rate performance of limited feedback (LFB) block-diagonalization (BD) in multi-user distributed antenna system (DAS). As the channel state information (CSI) fed back to base station (BS) is limited, multi-user interference (MUI) is caused inevitably because of the quantization error. Considering the influence of the MUI to the capacity of DAS, we propose a parameter of effective sum-rate ratio (ESRR) to denote the capacity offset under the condition of the BS can get perfect CSI and limited CSI first, then we confirm that the approximated ESRR is very close to actual ESRR got through simulations. After that, based on the approximated ESRR, an adaptive minimum bit feedback scheme which can effectively reduce the overhead of feedback channel and the complexity of the system is proposed. Simulation results show the effectiveness of the proposed scheme.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60025-4
Abstract ( 1898 ) PDF (0 KB)( 295 )
This paper proposes a tree-based backoff (TBB) protocol that reduces the number of iterations implemented in the procedure of tag collision arbitration in radio frequency identification (RFID) systems. This is achieved by employing the following mechanisms: one is send the request command iteratively to all tags in the interrogation zone until a single tag is identified. The other is backward to the parent node instead of root node to obtain the request parameters and send the request command again until all tags are identified. Compared with the traditional tree-based protocol, on average, simulated results show that the TBB protocol reduces the number of the iterations by 72.3% and the identification delay by 58.6% and achieves the goal of fast tag identification.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60026-6
Abstract ( 1613 ) PDF (0 KB)( 308 )
This paper studies the power control problem in femtocell system based on Nash non-cooperative game theory. It designs an utility function taking fem stations’ transmit power as variable and relates it to the requirements of macro users’ and fem users’ signal to interference plus noise ratio (SINR). The utility also takes the impact of fem stations’ location into account and improves the fairness of non-cooperative game. On this basis, this paper proposes a distributed power control algorithm and proves the existence and uniqueness of Pareto optimal point. The simulation results show that the algorithm improves the convergence speed and system performance through improving users’ SINR.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60027-8
Abstract ( 1709 ) PDF (0 KB)( 306 )
Array gain would be well exploited to improve power coverage if some powerful multipath components from different radio links can coherently combine at the receiver (Rx). Thus, in this paper, an algorithm is proposed for transmission in simulcast system, where partial channel state information (CSI) is needed. Based on measured multipath channel, performance of the proposed algorithm is evaluated. According to simulation results, the proposed algorithm outperforms the direction summation (DS) scheme and multipath antenna diversity (MAD) algorithm, with 2~4 dB advantage over the latters. Especially in line of sight (LOS) scenario, the advantage is more obvious. Besides, the proposed algorithm brings more gain with increasing number of transmit antennas without additional power. Finally, robustness of the proposed algorithm is examined with imperfect CSI.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60028-X
Abstract ( 1655 ) PDF (0 KB)( 280 )
With the objective of taking full use of channel resource, we proposed two utility based dynamic subcarrier allocation (DSA) algorithms for the single carrier frequency division multiple access (SC-FDMA) system, which are the proportional fair frugality constrained (PF-FC) algorithm and the weighted proportional fair frugality constrained (WPF-FC) algorithm. The two proposed algorithms are designed under the frugality constraint (FC) control consideration so as to avoid service rate waste and improve the spectrum efficiency. Moreover, the queuing buffer model in this paper is established on a finite size structure rather than the traditional infinite queuing manner, which is more consistent with the practical transmission condition. Simulation results indicate that the two proposed algorithms can both achieve significantly better system rate-sum capacity and quality of service (QoS) performance than their primary algorithms, and are more applicable for the heterogeneous traffic.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60029-1
Abstract ( 1850 ) PDF (0 KB)( 292 )
Due to the openness of the cognitive radio network, spectrum sensing data falsification (SSDF) can attack the spectrum sensing easily, while there is no effective algorithm proposed in current research work, so this paper introduces the malicious users removing to the weight sequential probability radio test (WSPRT). The terminals’ weight is weighted by the accuracy of their spectrum sensing information, which can also be used to detect the malicious user. If one terminal owns a low weight, it can be treated as malicious user, and should be removed from the aggregation center. Simulation results show that the improved WSPRT can achieve higher performance compared with the other two conventional sequential detection methods under different number of malicious users.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60030-8
Abstract ( 1636 ) PDF (0 KB)( 297 )
Ethernet link aggregation, which provides an easy and cost-effective way to increase both bandwidth and link availability between a pair of devices, is well suited for data center networks. However, all the traffic splitting algorithms used in existing Ethernet link aggregation are flow-level which do not work well owing to the traffic characteristics of data centers. Though frame-level traffic splitting can achieve optimal load balance and the maximum benefits from aggregated capacity, it is generally deprecated in most cases because of frame disordering which can disrupt the operation of many Internet protocols, most notably transmission control protocol (TCP). To address this issue, we first investigate the causes of frame disordering in link aggregation and find that all of them either are no longer true or can be prevented in data centers. Then we present a byte-counter frame-level traffic splitting algorithm which achieves optimal performance while causes no frame disordering. The only requirement is that frames in a flow are the same size which can be easily met in data centers. Simulation results show that the proposed frame-level traffic splitting method could achieve higher throughput and optimal load balance. The average completion time of different sized flows is reduced by 24% on average and by up to 46%.
Xiao Du,LIU Yuan-an, LIU Kai-ming, TANG Bi-hua, CHEN Xing
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60031-X
Abstract ( 1758 ) PDF (0 KB)( 300 )
Opportunistic routing explicitly takes advantage of the broadcast nature of wireless communications by using a set of forwarders to opportunistically perform packet forwarding. A key issue in the design of opportunistic routing protocols is the forwarder list selection problem. This paper proposes a novel routing metric which shows the end-to-end throughput and a corresponding throughput oriented opportunistic routing forwarder-selecting algorithm throughput oriented forwarders selection (TOFS) through analyzing forwarding characteristics of forwarders. The algorithm puts forward a constraint mechanism that controls the number of forwarders by constraint of throughput for forwarders selection, achieving a better balance between number of forwarders and effective link stability by introducing the factor of transmission time. Simulation results show that the algorithm can improve the network end-to-end throughput effectively over existing methods.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60032-1
Abstract ( 1764 ) PDF (0 KB)( 308 )
In this paper, we investigate the cooperative strategy with total power constraint in decode-and-forward (DF) relaying scenario, in the presence of an eavesdropper. Due to the difference of channel for each source-relay link, not all relay nodes have constructive impacts on the achievable secrecy rate. Besides, the final achieved secrecy rate depends on both source-relay and relay-destination links in DF relaying scenario. Therefore, the principal question here is how to select cooperative strategy among relays with proper power allocation to maximize the secrecy rate. Three strategies are considered in this paper. First, we investigate the cooperative jamming (CJ) strategy, where one relay with achieved target transmission rate is selected as a conventional relay forwarding signal, and remaining relays generate artificial noise via CJ strategy to disrupt the eavesdropper. Two CJ schemes with closed-form solutions, optimal cooperative jamming (OCJ) and null space cooperative jamming (NSCJ), are proposed. With these solutions, the corresponding power allocation is formulated as a geometric programming (GP) problem and solved efficiently by convex programming technique. Then, to exploit the cooperative diversity, we investigate the cooperative relaying (CR) strategy. An iterative algorithm using semi-definite programming (SDP) and GP together with bisection search method is proposed to optimize the cooperative relaying weight and power allocated to the source and relays. Furthermore, to exploit the advantages of both CR and CJ, we propose an adaptive strategy to enhance the security. Simulation results demonstrate that the efficiency of the proposed cooperative strategies in terms of secrecy rate.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60033-3
Abstract ( 1735 ) PDF (0 KB)( 313 )
This paper presents a novel interference management strategy, to adaptively choose the best fractional frequency reuse (FFR) scheme for macro and femto networks. The strategy aims to maximize the system throughput taking into account a number of system constraints. Here, the system constrains consist of the outage constraints of two-tier users and macrocell spectral efficiency requirement. The detailed procedures of our proposed strategy are: 1) A reference signal received power (RSRP) based selection algorithm is presented to adaptively select the optional FFR schemes satisfying the outage constraints. 2) Considering the macrocell spectral efficiency, the optimal FFR scheme is selected from the optional FFR schemes at MeNB side, to achieve the maximum system throughput in two-tier femtocell networks. We study the efficacy of the proposed strategy using an long term evolution advanced (LTE-A) system level simulator. Simulation results show that our proposed interference management strategy can select the best FFR scheme to maximize the system throughput, and the FFR schemes derived by using RSRP-based selection algorithm can be the effective solutions to deploy femtocells in macrocells.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60034-5
Abstract ( 1751 ) PDF (0 KB)( 291 )
Serial RapidIO (SRIO) is an emerging high-performance interconnection technology for embedded systems. Protections for SRIO packets are provided by the cyclic redundancy check (CRC). In this paper, an improved CRC receiving controller with 64-bit internal data width is proposed. Equivalent judgment logics are adopted in the aims of reducing the number of CRC generators. The resource consumption and power dissipation can be saved meanwhile the frequency requirement can still be met. By comparison to conventional structures, the proposed scheme can achieve better performances. Therefore, this improved receiving controller is considered applicable in high-performance SRIO interconnections.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60035-7
Abstract ( 1662 ) PDF (0 KB)( 285 )
Information-centric networking (ICN) proposes a content-centric paradigm which has some attractive advantages, such as network load reduction, low dissemination latency, and energy efficiency. In this paper, based on the analytical model of ICN with receiver-driven transport protocol employing least-recently used (LRU) replacement policy, we derive expressions to compute the average content delivery time of the requests’ arrival sequence of a single cache, and then we extend the expressions to a cascade of caches’ scenario. From the expressions, we know the quantitative relationship among the delivery time, cache size and bandwidth. Our results, analyzing the trade-offs between performance and resources in ICN, can be used as a guide to design ICN and to evaluation its performance.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60036-9
Abstract ( 1773 ) PDF (0 KB)( 285 )
There are two types of base stations in the long term evolution (LTE) wireless networks, home eNodeB (HeNB) and eNodeB (eNB). It is critical to achieve seamless handovers between the HeNB and the eNB in order to support mobility in the LTE networks. A handover from an eNB/HeNB to a new eNB/HeNB, suggested by the third generation partnership project (3GPP), requires distinct procedures for different mobility scenarios, which will increase the system complexity. Besides, the existing handover schemes for other wireless networks are not suitable for the mobility scenarios in the LTE networks due to their inherent vulnerabilities. In this paper, we propose a fast and secure handover authentication scheme, which is to fit in with most of the mobility scenarios in the LTE networks. Compared with other handover schemes, our scheme cannot only achieve a simple authentication process with desirable efficiency, but also provide several security features including perfect forward/backward secrecy (PFS/PBS), which have never been achieved by the previous works. The experiment results and formal verification by using the automated validation of internet security protocols and applications (AVISPA) tool show that the proposed scheme is efficient and secure against various malicious attacks.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60037-0
Abstract ( 1962 ) PDF (0 KB)( 285 )
There are two main problems in the threshold denoising method based on wavelet transform. One is the difficulty of threshold selection, and the other is the inconsistence of the dip and curved events in the low signal-to-noise ratio (SNR) seismic data after denoising. In image denoising, multistage median filtering can preserve the details of the signal. So we proposed a denoising algorithm in wavelet transform domain based on multistage median filtering. Using this method the flat region and the edge region are differentiated by the difference between the maximum mid-value and the minimum mid-value, which preserves the details, thus improves the denoising effect. The simulation data and the real data processing results reveal that this method has stronger ability in separating signal from noise than that of the threshold denoising method.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60038-2
Abstract ( 1743 ) PDF (0 KB)( 314 )
In order to recognize facial expression accurately, the paper proposed a hybrid method of principal component analysis (PCA) and local binary pattern (LBP). Firstly, the method of eight eyes segmentation was introduced to extract the effective area of facial expression image, which can reduce some useless information to subsequent feature extraction. Then PCA extracted the global grayscale feature of the whole facial expression image and reduced the data size at the same time. And LBP extracted local neighbor texture feature of the mouth area, which contributes most to facial expression recognition. Fusing the global and local feature will be more effective for facial expression recognition. Finally, support vector machine (SVM) used the fusion feature to complete facial expression recognition. Experiment results show that, the method proposed in this paper can classify different expressions more effectively and can get higher recognition rate than the traditional recognition methods.
The Journal of China Universities of Posts and Telecommunications, 2013, 20 (2). doi： 10.1016/S1005-8885(13)60039-4
Abstract ( 2528 ) PDF (0 KB)( 294 )
A design of 13 Gbit/s vertical cavity surface emitting laser (VCSEL) driver using 0.18 μm complementary metal oxide semiconductor (CMOS) technology is presented in this paper. The core unit of the driver consists of pre-amplify stage and output stage circuit. Techniques of three stages differential amplifier with low impedance load and active feedback are employed in pre-amplify stage, and technique of C3A is adopted in output stage to acquire low power consumption and high speed. The experimental results show that the circuit can work at the data rate of 10 Gbit/s and maximum of 13.2 Gbit/s. The output modulation current is up to 12.5 mA and the power dissipation is only 68 mW with a 1.8 V power supply.