This paper investigates a wireless powered and backscattering enabled sensor network based on the non-linear energy harvesting model, where the power beacon(PB) delivers energy signals to wireless sensors to enable th...This paper investigates a wireless powered and backscattering enabled sensor network based on the non-linear energy harvesting model, where the power beacon(PB) delivers energy signals to wireless sensors to enable their passive backscattering and active transmission to the access point(AP). We propose an efficient time scheduling scheme for network performance enhancement, based on which each sensor can always harvest energy from the PB over the entire block except its time slots allocated for passive and active information delivery. Considering the PB and wireless sensors are from two selfish service providers, we use the Stackelberg game to model the energy interaction among them. To address the non-convexity of the leader-level problem, we propose to decompose the original problem into two subproblems and solve them iteratively in an alternating manner. Specifically, the successive convex approximation, semi-definite relaxation(SDR) and variable substitution techniques are applied to find a nearoptimal solution. To evaluate the performance loss caused by the interaction between two providers, we further investigate the social welfare maximization problem. Numerical results demonstrate that compared to the benchmark schemes, the proposed scheme can achieve up to 35.4% and 38.7% utility gain for the leader and the follower, respectively.展开更多
The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backsca...The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backscatter communication based on user trajectory. This paper will establish an optimization problem of jointly optimizing the UAV trajectories, UAV transmission power and BD scheduling based on the large-scale channel state signals estimated in advance of the known user trajectories, taking into account the constraints of BD data and working energy consumption, to maximize the energy efficiency of the system. The problem is a non-convex optimization problem in fractional form, and there is nonlinear coupling between optimization variables.An iterative algorithm is proposed based on Dinkelbach algorithm, block coordinate descent method and continuous convex optimization technology. First, the objective function is converted into a non-fractional programming problem based on Dinkelbach method,and then the block coordinate descent method is used to decompose the original complex problem into three independent sub-problems. Finally, the successive convex approximation method is used to solve the trajectory optimization sub-problem. The simulation results show that the proposed scheme and algorithm have obvious energy efficiency gains compared with the comparison scheme.展开更多
In scenarios of real-time data collection of long-term deployed Wireless Sensor Networks (WSNs),low-latency data collection with long network lifetime becomes a key issue.In this paper,we present a data aggregation sc...In scenarios of real-time data collection of long-term deployed Wireless Sensor Networks (WSNs),low-latency data collection with long network lifetime becomes a key issue.In this paper,we present a data aggregation scheduling with guaranteed lifetime and efficient latency in WSNs.We first construct a Guaranteed Lifetime Minimum Radius Data Aggregation Tree (GLMRDAT) which is conducive to reduce scheduling latency while providing a guaranteed network lifetime,and then design a Greedy Scheduling algorithM (GSM) based on finding the maximum independent set in conflict graph to schedule the transmission of nodes in the aggregation tree.Finally,simulations show that our proposed approach not only outperforms the state-of-the-art solutions in terms of schedule latency,but also provides longer and guaranteed network lifetime.展开更多
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give...A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.展开更多
The fifth generation(5 G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways(HSR) are important applications of 5 G technologies. Existing studies about ...The fifth generation(5 G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways(HSR) are important applications of 5 G technologies. Existing studies about 5 G wireless systems on high speed railways(HSR) often utilize ideal channel parameters and are usually based on simple scenarios. In this paper, we evaluate the downlink throughput of 5 G HSR communication systems on three typical scenarios including urban, cutting and viaduct with three different channel estimators. The channel parameters of each scenario are generated with tapped delay line(TDL) models through ray-tracing simulations, which can be considered as a good match to practical situations. The channel estimators including least square(LS), linear minimum mean square error(LMMSE), and our proposed historical information based basis expansion model(Hi BEM). We analyze the performance of the Hi BEM estimator in terms of mean square error(MSE) and evaluate the system throughputs with different channel estimates over each scenario. Simulation results are then provided to corroborate our proposed studies. It is shown that our Hi BEM estimator outperforms other estimators and that the sys-展开更多
Wireless Sensor Networks(WSN) are mainly characterized by a potentially large number of distributed sensor nodes which collectively transmit information about sensed events to the sink.In this paper,we present a Distr...Wireless Sensor Networks(WSN) are mainly characterized by a potentially large number of distributed sensor nodes which collectively transmit information about sensed events to the sink.In this paper,we present a Distributed Wavelet Basis Generation(DWBG) algorithm performing at the sink to obtain the distributed wavelet basis in WSN.And on this basis,a Wavelet Transform-based Distributed Compressed Sensing(WTDCS) algorithm is proposed to compress and reconstruct the sensed data with spatial correlation.Finally,we make a detailed analysis of relationship between reconstruction performance and WTDCS algorithm parameters such as the compression ratio,the channel Signal-to-Noise Ratio(SNR),the observation noise power and the correlation decay parameter by simulation.The simulation results show that WTDCS can achieve high performance in terms of energy and reconstruction accuracy,as compared to the conventional distributed wavelet transform algorithm.展开更多
Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences ...Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences at the network coding node in the multi-sources and multi-receivers network in order to compress the data redundancy. Theoretical analysis and computer simulation results show that this proposed scheme not only further improves the efficiency of network transmission and enhances the throughput of the network, but also reduces the energy consumption of sensor nodes and extends the network life cycle.展开更多
To cope with the arbitrariness of the network delays,a novel method,referred to as the composite particle filter approach based on variational Bayesian(VB-CPF),is proposed herein to estimate the clock skew and clock o...To cope with the arbitrariness of the network delays,a novel method,referred to as the composite particle filter approach based on variational Bayesian(VB-CPF),is proposed herein to estimate the clock skew and clock offset in wireless sensor networks.VB-CPF is an improvement of the Gaussian mixture kalman particle filter(GMKPF)algorithm.In GMKPF,Expectation-Maximization(EM)algorithm needs to determine the number of mixture components in advance,and it is easy to generate overfitting and underfitting.Variational Bayesian EM(VB-EM)algorithm is introduced in this paper to determine the number of mixture components adaptively according to the observations.Moreover,to solve the problem of data packet loss caused by unreliable links,we propose a robust time synchronization(RTS)method in this paper.RTS establishes an autoregressive model for clock skew,and calculates the clock parameters based on the established autoregressive model in case of packet loss.The final simulation results illustrate that VB-CPF yields much more accurate results relative to GMKPF when the network delays are modeled in terms of an asymmetric Gaussian distribution.Moreover,RTS shows good robustness to the continuous and random dropout of time messages.展开更多
The vector vortex beam(VVB)has attracted significant attention due to its intrinsic diversity of information and has found great applications in both classical and quantum communications.However,a VVB is unavoidably a...The vector vortex beam(VVB)has attracted significant attention due to its intrinsic diversity of information and has found great applications in both classical and quantum communications.However,a VVB is unavoidably affected by atmospheric turbulence(AT)when it propagates through the free-space optical communication environment,which results in detection errors at the receiver.In this paper,we propose a VVB classification scheme to detect VVBs with continuously changing polarization states under AT,where a diffractive deep neural network(DDNN)is designed and trained to classify the intensity distribution of the input distorted VVBs,and the horizontal direction of polarization of the input distorted beam is adopted as the feature for the classification through the DDNN.The numerical simulations and experimental results demonstrate that the proposed scheme has high accuracy in classification tasks.The energy distribution percentage remains above 95%from weak to medium AT,and the classification accuracy can remain above 95%for various strengths of turbulence.It has a faster convergence and better accuracy than that based on a convolutional neural network.展开更多
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m...Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain.展开更多
The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual co...The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual coding of video, the residual of a frame with respect to a reference frame is Wyner-Ziv encoded, which can reduces the input entropy and leads to a higher coding efficiency than directly encoding the original frame. In this paper, we propose a new approach of residual coding combined with Region Of Interest (ROI) extraction. Experimental results show that, the proposed scheme achieves better rate-distortion performance compared to conventional Wyner-Ziv coding scheme.展开更多
An improved MEW(multiplicative exponent weighting)algorithm,SLE-MEW is proposed for vertical handoff decision in heterogeneous wireless networks.It introduces the SINR(signal to interference plus noise ratio)effects,L...An improved MEW(multiplicative exponent weighting)algorithm,SLE-MEW is proposed for vertical handoff decision in heterogeneous wireless networks.It introduces the SINR(signal to interference plus noise ratio)effects,LS(least square)and information entropy method into the algorithm.An attribute matrix is constructed considering the SINR in the source network and the equivalent SINR in the target network,the required bandwidth,the traffic cost and the available bandwidth of participating access networks.Handoff decision meeting multi-attribute QoS(quality of service)requirement is made according to the traffic features.The subjective weight relation of decision elements is determined with LS method.The information entropy method is employed to derive the objective weights of the evaluation criteria,and lead to the comprehensive weight.Finally decision is made using MEW algorithm based on the attribute matrix and weight vector.Four 3GPP(the 3rd generation partnership project)defined traffic classes are considered in performance evaluation.The simulation results have shown that the proposed algorithm can provide satisfactory performance fitting to the characteristics of the traffic.展开更多
The mainstream approaches to green networking are discussed first from the view of engineering,including resource consolidation,server virtualization,selective connectedness,and proportional computing.A brief introduc...The mainstream approaches to green networking are discussed first from the view of engineering,including resource consolidation,server virtualization,selective connectedness,and proportional computing.A brief introduction to network virtualization techniques is given then and a virtual node embedding approach is provided.Finally,three kinds of enhanced green networking schemes by network virtualization are proposed,that is enhancement to sever virtualization,resource consolidation and Adaptive Link Rate(ALR).Examples are included to show the virtue of network virtualization to green networking in terms of energy efficient communications.展开更多
Massive content delivery will become one of the most prominent tasks of future B5G/6G communication.However,various multimedia applications possess huge differences in terms of object oriented(i.e.,machine or user)and...Massive content delivery will become one of the most prominent tasks of future B5G/6G communication.However,various multimedia applications possess huge differences in terms of object oriented(i.e.,machine or user)and corresponding quality evaluation metric,which will significantly impact the design of encoding or decoding within content delivery strategy.To get over this dilemma,we firstly integrate the digital twin into the edge networks to accurately and timely capture Quality-of-Decision(QoD)or Quality-of-Experience(QoE)for the guidance of content delivery.Then,in terms of machinecentric communication,a QoD-driven compression mechanism is designed for video analytics via temporally lightweight frame classification and spatially uneven quality assignment,which can achieve a balance among decision-making,delivered content,and encoding latency.Finally,in terms of user-centric communication,by fully leveraging haptic physical properties and semantic correlations of heterogeneous streams,we develop a QoE-driven video enhancement scheme to supply high data fidelity.Numerical results demonstrate the remarkable performance improvement of massive content delivery.展开更多
In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component...In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component for the next generation of communication. In this paper, we investigate a novel framework to distribute video files from some other proximity devices through users' media cloud assisted D2 D communication. The main contributions of this work lie in: 1) Providing an efficient algorithm Media Cloud Cluster Selecting Scheme(MCCSS) to achieve the reasonable cluster; 2) Distributing the optimum updating files to the cluster heads, in order to minimize the expected D2 D communication transmission hop for files; 3) Proposing a minimum the hop method, which can ensure the user obtain required file as soon as possible. Extensive simulation results have demonstrated the efficiency of the proposed scheme.展开更多
Network Coding (NC) brings correlation between the coded signals from different sources, which makes the system more vulnerable to the decode error at relay. Conventional Cyclic Redundancy Code (CRC) has been implemen...Network Coding (NC) brings correlation between the coded signals from different sources, which makes the system more vulnerable to the decode error at relay. Conventional Cyclic Redundancy Code (CRC) has been implemented for error bit detection. However, its error correction is simply ignored. To fully exploit this feature, this paper proposes a novel joint Log-Likelihood Ratio (LLR) CRC error mitigation for NC two way relay channel. Specific thresholds are designed to estimate the error number of data block and identify those which can be recovered if the number is within the error correction scope of CRC. We examine two modes of the thresholds, one based on the average Bit Error Rate (BER) of source-relay link, while the other based on that of instantaneous one. We provide the full analysis for the Pair-wise Error Probability (PEP) performance of the scheme. A variety of numerical results are presented to reveal the superiority of the proposed scheme to conventional CRC NC under independent Rayleigh fading channels. Moreover, the efficiencies of the proposed thresholds are also validated.展开更多
Error propagation seriously degenerate the diversity order of Decode-and-Forward (DF) cooperative communication. To address this problem, a novel Log Likelihood Ratio (LLR)-based Link Adaptive Relaying (LAR) is propos...Error propagation seriously degenerate the diversity order of Decode-and-Forward (DF) cooperative communication. To address this problem, a novel Log Likelihood Ratio (LLR)-based Link Adaptive Relaying (LAR) is proposed to promote adaption accuracy at relay. The instantaneous Bit Error Probability (BEP) is calculated according to the LLR of the received signals firstly, then based on it, the equivalent Signal-to-Noise Ratio (SNR) is employed to operate dynamic power scaling by relay. It is theoretically proved that the full diversity order can be attained by the scheme. Besides, the power sensitivity is also analyzed. Simulation results show that the proposed scheme outperform the conventional LAR and can achieve full diversity order. Moreover, its strong adaptation to SNR fluctuation is validated.展开更多
To solve the problems of high memory occupation,low connectivity and poor resiliency against node capture,which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor ...To solve the problems of high memory occupation,low connectivity and poor resiliency against node capture,which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor Networks(WSNs),an Identity-Based Key Agreement Scheme(IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman(ECDH).IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption.Theoretical analysis indicates that comparing to the random key pre-distribution techniques,IBKAS achieves significant improvement in key connectivity,communication overhead,memory occupation,and security strength,and also enables efficient secure rekeying and network expansion.Furthermore,we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes,and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensor networks.展开更多
To exploit the effect of modulation schemes on the best relay selection,a novel Jointing Modulation schemes max-min criterion(JM-max-min) is proposed firstly for Two-Way De-Noise-and-Forward(DNF) Opportunistic Relayin...To exploit the effect of modulation schemes on the best relay selection,a novel Jointing Modulation schemes max-min criterion(JM-max-min) is proposed firstly for Two-Way De-Noise-and-Forward(DNF) Opportunistic Relaying systems(TW-DNF-OR) by aiming at minimizing the Pairwise Error Probability(PEP) of Multi-Access(MA) phase which dominates the error per-formance of TW-DNF-OR due to the presence of MA interference.The proposed JM-max-min criterion integrates perfectly the minimum distances of constellations and the relay links gains.Then,with the proposed JM-max-min criterion,we analyze the Symbol Error Probabilities(SEPs) of MA phase and BroadCast(BC) phase by using the approximated mathematics analysis,and present the corresponding closed-form expressions to SEPs.The numerical analysis shows,for a given modulations combination at both sources,the TW-DNF-OR systems with the proposed JM-max-min criterion outperform the one with the conventional max-min criterion.展开更多
基金supported by National Natural Science Foundation of China(No.61901229 and No.62071242)the Project of Jiangsu Engineering Research Center of Novel Optical Fiber Technology and Communication Network(No.SDGC2234)+1 种基金the Open Research Project of Jiangsu Provincial Key Laboratory of Photonic and Electronic Materials Sciences and Technology(No.NJUZDS2022-008)the Post-Doctoral Research Supporting Program of Jiangsu Province(No.SBH20).
文摘This paper investigates a wireless powered and backscattering enabled sensor network based on the non-linear energy harvesting model, where the power beacon(PB) delivers energy signals to wireless sensors to enable their passive backscattering and active transmission to the access point(AP). We propose an efficient time scheduling scheme for network performance enhancement, based on which each sensor can always harvest energy from the PB over the entire block except its time slots allocated for passive and active information delivery. Considering the PB and wireless sensors are from two selfish service providers, we use the Stackelberg game to model the energy interaction among them. To address the non-convexity of the leader-level problem, we propose to decompose the original problem into two subproblems and solve them iteratively in an alternating manner. Specifically, the successive convex approximation, semi-definite relaxation(SDR) and variable substitution techniques are applied to find a nearoptimal solution. To evaluate the performance loss caused by the interaction between two providers, we further investigate the social welfare maximization problem. Numerical results demonstrate that compared to the benchmark schemes, the proposed scheme can achieve up to 35.4% and 38.7% utility gain for the leader and the follower, respectively.
文摘The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backscatter communication based on user trajectory. This paper will establish an optimization problem of jointly optimizing the UAV trajectories, UAV transmission power and BD scheduling based on the large-scale channel state signals estimated in advance of the known user trajectories, taking into account the constraints of BD data and working energy consumption, to maximize the energy efficiency of the system. The problem is a non-convex optimization problem in fractional form, and there is nonlinear coupling between optimization variables.An iterative algorithm is proposed based on Dinkelbach algorithm, block coordinate descent method and continuous convex optimization technology. First, the objective function is converted into a non-fractional programming problem based on Dinkelbach method,and then the block coordinate descent method is used to decompose the original complex problem into three independent sub-problems. Finally, the successive convex approximation method is used to solve the trajectory optimization sub-problem. The simulation results show that the proposed scheme and algorithm have obvious energy efficiency gains compared with the comparison scheme.
基金This paper was supported by the National Basic Research Pro- gram of China (973 Program) under Crant No. 2011CB302903 the National Natural Science Foundation of China under Crants No. 60873231, No.61272084+3 种基金 the Natural Science Foundation of Jiangsu Province under Ca-ant No. BK2009426 the Innovation Project for Postgraduate Cultivation of Jiangsu Province under Crants No. CXZZ11_0402, No. CX10B195Z, No. CXLX11_0415, No. CXLXll 0416 the Natural Science Research Project of Jiangsu Education Department under Grant No. 09KJD510008 the Natural Science Foundation of the Jiangsu Higher Educa-tion Institutions of China under Grant No. 11KJA520002.
文摘In scenarios of real-time data collection of long-term deployed Wireless Sensor Networks (WSNs),low-latency data collection with long network lifetime becomes a key issue.In this paper,we present a data aggregation scheduling with guaranteed lifetime and efficient latency in WSNs.We first construct a Guaranteed Lifetime Minimum Radius Data Aggregation Tree (GLMRDAT) which is conducive to reduce scheduling latency while providing a guaranteed network lifetime,and then design a Greedy Scheduling algorithM (GSM) based on finding the maximum independent set in conflict graph to schedule the transmission of nodes in the aggregation tree.Finally,simulations show that our proposed approach not only outperforms the state-of-the-art solutions in terms of schedule latency,but also provides longer and guaranteed network lifetime.
基金Sponsored by the National Natural Science Foundation of China (No. 60973139, 61170065, 61171053, 61003039,61003236)the Natural Science Foundation of Jiangsu Province (BK2011755, BK2012436)+3 种基金Scientific & Technological Support Project of Jiangsu Province (BE2011844,BE2011189)Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions(12KJB520009)Science & Technology Innovation Fundfor Higher Education Institutions of Jiangsu Province(CXZZ11-0405)the Peak of Six Major Talent inJiangsu Province (2010DZXX026)
文摘A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.
基金supported by the National Natural Science Foundation of China(Grant Nos.61522109,61671253,61571037and 91738201)the Fundamental Research Funds for the Central Universities(No.2016JBZ006)+1 种基金the Natural Science Foundation of Jiangsu Province(Grant Nos.BK20150040and BK20171446)the Key Project of Natural Science Research of Higher Education Institutions of Jiangsu Province(No.15KJA510003)
文摘The fifth generation(5 G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways(HSR) are important applications of 5 G technologies. Existing studies about 5 G wireless systems on high speed railways(HSR) often utilize ideal channel parameters and are usually based on simple scenarios. In this paper, we evaluate the downlink throughput of 5 G HSR communication systems on three typical scenarios including urban, cutting and viaduct with three different channel estimators. The channel parameters of each scenario are generated with tapped delay line(TDL) models through ray-tracing simulations, which can be considered as a good match to practical situations. The channel estimators including least square(LS), linear minimum mean square error(LMMSE), and our proposed historical information based basis expansion model(Hi BEM). We analyze the performance of the Hi BEM estimator in terms of mean square error(MSE) and evaluate the system throughputs with different channel estimates over each scenario. Simulation results are then provided to corroborate our proposed studies. It is shown that our Hi BEM estimator outperforms other estimators and that the sys-
基金the National Basic Research Program of China,the National Natural Science Foundation of China,the open research fund of National Mobile Communications Research Laboratory,Southeast University,the Postdoctoral Science Foundation of Jiangsu Province,the University Natural Science Research Program of Jiangsu Province,the Basic Research Program of Jiangsu Province (Natural Science Foundation)
文摘Wireless Sensor Networks(WSN) are mainly characterized by a potentially large number of distributed sensor nodes which collectively transmit information about sensed events to the sink.In this paper,we present a Distributed Wavelet Basis Generation(DWBG) algorithm performing at the sink to obtain the distributed wavelet basis in WSN.And on this basis,a Wavelet Transform-based Distributed Compressed Sensing(WTDCS) algorithm is proposed to compress and reconstruct the sensed data with spatial correlation.Finally,we make a detailed analysis of relationship between reconstruction performance and WTDCS algorithm parameters such as the compression ratio,the channel Signal-to-Noise Ratio(SNR),the observation noise power and the correlation decay parameter by simulation.The simulation results show that WTDCS can achieve high performance in terms of energy and reconstruction accuracy,as compared to the conventional distributed wavelet transform algorithm.
基金Supported by Major Projects of the National Science and Technology (2010ZX03003-003-02) National 973 Key Project (2011CB302903)
文摘Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences at the network coding node in the multi-sources and multi-receivers network in order to compress the data redundancy. Theoretical analysis and computer simulation results show that this proposed scheme not only further improves the efficiency of network transmission and enhances the throughput of the network, but also reduces the energy consumption of sensor nodes and extends the network life cycle.
基金This work was supported by the National Natural Science Foundation of China(No.61672299)the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province of China(No.18KJB520035)+2 种基金the Youth Foundation of Nanjing University of Finance and Economics(No.L-JXL18002)the Youth Foundation of Nanjing University of Posts and Telecommunications(No.NY218142)the Natural Science Foundation of Jiangsu Province(No.BK20160913).
文摘To cope with the arbitrariness of the network delays,a novel method,referred to as the composite particle filter approach based on variational Bayesian(VB-CPF),is proposed herein to estimate the clock skew and clock offset in wireless sensor networks.VB-CPF is an improvement of the Gaussian mixture kalman particle filter(GMKPF)algorithm.In GMKPF,Expectation-Maximization(EM)algorithm needs to determine the number of mixture components in advance,and it is easy to generate overfitting and underfitting.Variational Bayesian EM(VB-EM)algorithm is introduced in this paper to determine the number of mixture components adaptively according to the observations.Moreover,to solve the problem of data packet loss caused by unreliable links,we propose a robust time synchronization(RTS)method in this paper.RTS establishes an autoregressive model for clock skew,and calculates the clock parameters based on the established autoregressive model in case of packet loss.The final simulation results illustrate that VB-CPF yields much more accurate results relative to GMKPF when the network delays are modeled in terms of an asymmetric Gaussian distribution.Moreover,RTS shows good robustness to the continuous and random dropout of time messages.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62375140 and 62001249)the Open Research Fund of National Laboratory of Solid State Microstructures(Grant No.M36055).
文摘The vector vortex beam(VVB)has attracted significant attention due to its intrinsic diversity of information and has found great applications in both classical and quantum communications.However,a VVB is unavoidably affected by atmospheric turbulence(AT)when it propagates through the free-space optical communication environment,which results in detection errors at the receiver.In this paper,we propose a VVB classification scheme to detect VVBs with continuously changing polarization states under AT,where a diffractive deep neural network(DDNN)is designed and trained to classify the intensity distribution of the input distorted VVBs,and the horizontal direction of polarization of the input distorted beam is adopted as the feature for the classification through the DDNN.The numerical simulations and experimental results demonstrate that the proposed scheme has high accuracy in classification tasks.The energy distribution percentage remains above 95%from weak to medium AT,and the classification accuracy can remain above 95%for various strengths of turbulence.It has a faster convergence and better accuracy than that based on a convolutional neural network.
基金supported by the open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications),Ministry of Education(No.JZNY202114)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.KYCX210734).
文摘Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain.
基金Supported by the National Natural Science Foundation of China (No.61003236, 61171053, 61170065)the Doctoral Fund of Ministry of Education of China (No.20113223110002)the Natural Science Major Program for Colleges and Universities in Jiangsu Province(No.11KJA520001)
文摘The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual coding of video, the residual of a frame with respect to a reference frame is Wyner-Ziv encoded, which can reduces the input entropy and leads to a higher coding efficiency than directly encoding the original frame. In this paper, we propose a new approach of residual coding combined with Region Of Interest (ROI) extraction. Experimental results show that, the proposed scheme achieves better rate-distortion performance compared to conventional Wyner-Ziv coding scheme.
基金Supported by the National Natural Science Foundation of China (No. 60872018), the Natural Science Foundation of Education Committee of Jiangsu Province ( No. 11KJB510014) and Scientific Research Foundation of NUPT ( No. NY210004).
基金National Natural Science Foundation of China (No.60872018 No.60902015)+1 种基金Natural Science Foundation of Education Committee of Jiangsu Province(No.11KJB510014)Scientific Research Foundation of NUPT (No.NY210004)
文摘An improved MEW(multiplicative exponent weighting)algorithm,SLE-MEW is proposed for vertical handoff decision in heterogeneous wireless networks.It introduces the SINR(signal to interference plus noise ratio)effects,LS(least square)and information entropy method into the algorithm.An attribute matrix is constructed considering the SINR in the source network and the equivalent SINR in the target network,the required bandwidth,the traffic cost and the available bandwidth of participating access networks.Handoff decision meeting multi-attribute QoS(quality of service)requirement is made according to the traffic features.The subjective weight relation of decision elements is determined with LS method.The information entropy method is employed to derive the objective weights of the evaluation criteria,and lead to the comprehensive weight.Finally decision is made using MEW algorithm based on the attribute matrix and weight vector.Four 3GPP(the 3rd generation partnership project)defined traffic classes are considered in performance evaluation.The simulation results have shown that the proposed algorithm can provide satisfactory performance fitting to the characteristics of the traffic.
基金the National Natural Science Foundation of China,the PAPD Project of Jiangsu Higher Education Institutions,the National S&T Dedicated Mega-Project,the Qing Lan Project of Jiangsu Province of China,the open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications),Ministry of Education
文摘The mainstream approaches to green networking are discussed first from the view of engineering,including resource consolidation,server virtualization,selective connectedness,and proportional computing.A brief introduction to network virtualization techniques is given then and a virtual node embedding approach is provided.Finally,three kinds of enhanced green networking schemes by network virtualization are proposed,that is enhancement to sever virtualization,resource consolidation and Adaptive Link Rate(ALR).Examples are included to show the virtue of network virtualization to green networking in terms of energy efficient communications.
基金partly supported by the National Natural Science Foundation of China (Grants No.62231017 and No.62071254)the Priority Academic Program Development of Jiangsu Higher Education Institutions。
文摘Massive content delivery will become one of the most prominent tasks of future B5G/6G communication.However,various multimedia applications possess huge differences in terms of object oriented(i.e.,machine or user)and corresponding quality evaluation metric,which will significantly impact the design of encoding or decoding within content delivery strategy.To get over this dilemma,we firstly integrate the digital twin into the edge networks to accurately and timely capture Quality-of-Decision(QoD)or Quality-of-Experience(QoE)for the guidance of content delivery.Then,in terms of machinecentric communication,a QoD-driven compression mechanism is designed for video analytics via temporally lightweight frame classification and spatially uneven quality assignment,which can achieve a balance among decision-making,delivered content,and encoding latency.Finally,in terms of user-centric communication,by fully leveraging haptic physical properties and semantic correlations of heterogeneous streams,we develop a QoE-driven video enhancement scheme to supply high data fidelity.Numerical results demonstrate the remarkable performance improvement of massive content delivery.
基金supported by the National Natural Science Foundation of China(Grant No.61322104,61571240)the State Key Development Program of Basic Research of China(2013CB329005)+3 种基金the Priority Academic Program Development of Jiangsu Higher Education Institutionsthe University Natural Science Research Foundation of Anhui Province(No.KJ2015A105,No.KJ2015A092)The open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications),Ministry of Education(NYKL201509)The open research fund of the State Key Laboratory of Integrated Services Networks,Xidian University(ISN17-04)
文摘In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component for the next generation of communication. In this paper, we investigate a novel framework to distribute video files from some other proximity devices through users' media cloud assisted D2 D communication. The main contributions of this work lie in: 1) Providing an efficient algorithm Media Cloud Cluster Selecting Scheme(MCCSS) to achieve the reasonable cluster; 2) Distributing the optimum updating files to the cluster heads, in order to minimize the expected D2 D communication transmission hop for files; 3) Proposing a minimum the hop method, which can ensure the user obtain required file as soon as possible. Extensive simulation results have demonstrated the efficiency of the proposed scheme.
基金Supported by the National 973 Programs (2013CB329104)the National Natural Science Foundations of China (No. 61071090, No. 61171093)+3 种基金the Postgraduate Innovation Programs of Scientific Research of Jiangsu Province (CXZZ11_0388)Jiangsu Province Natural Science Foundation Key Projects (11KJA510001)National Science and Technology Key Projects (2011ZX03005-004-003)Jiangsu 973 Projects (BK2011027)
文摘Network Coding (NC) brings correlation between the coded signals from different sources, which makes the system more vulnerable to the decode error at relay. Conventional Cyclic Redundancy Code (CRC) has been implemented for error bit detection. However, its error correction is simply ignored. To fully exploit this feature, this paper proposes a novel joint Log-Likelihood Ratio (LLR) CRC error mitigation for NC two way relay channel. Specific thresholds are designed to estimate the error number of data block and identify those which can be recovered if the number is within the error correction scope of CRC. We examine two modes of the thresholds, one based on the average Bit Error Rate (BER) of source-relay link, while the other based on that of instantaneous one. We provide the full analysis for the Pair-wise Error Probability (PEP) performance of the scheme. A variety of numerical results are presented to reveal the superiority of the proposed scheme to conventional CRC NC under independent Rayleigh fading channels. Moreover, the efficiencies of the proposed thresholds are also validated.
基金Supported by the National Natural Science Foundationsof China(No.61071090,No.61171093)the Postgraduate Innovation Programs of Scientific Research of Jiangsu Province(CXZZ11_0388,CXLX11_0404)+2 种基金Jiangsu Province Natural Science Foundation Key Projects(11-KJA510001)National Science and Technology KeyProjects(2011ZX03005-004-003)Jiangsu 973 Projects(BK2011027)
文摘Error propagation seriously degenerate the diversity order of Decode-and-Forward (DF) cooperative communication. To address this problem, a novel Log Likelihood Ratio (LLR)-based Link Adaptive Relaying (LAR) is proposed to promote adaption accuracy at relay. The instantaneous Bit Error Probability (BEP) is calculated according to the LLR of the received signals firstly, then based on it, the equivalent Signal-to-Noise Ratio (SNR) is employed to operate dynamic power scaling by relay. It is theoretically proved that the full diversity order can be attained by the scheme. Besides, the power sensitivity is also analyzed. Simulation results show that the proposed scheme outperform the conventional LAR and can achieve full diversity order. Moreover, its strong adaptation to SNR fluctuation is validated.
基金Supported by the National Basic Research Program of China(973 Program)(No.2011CB302903)the National Natural Science Foundation of China(No.61100213)+3 种基金the Key Program of Natural Science for Universities of Jiangsu Province(No.10KJA510035)the Specialized Research Fund for the Doctoral Program of Higher Education(20113223120007)the Science and Technology Program of Nanjing(201103003)the Postgraduate Innovation Project Foundation of Jiangsu Province(No.CXLX11_0411)
文摘To solve the problems of high memory occupation,low connectivity and poor resiliency against node capture,which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor Networks(WSNs),an Identity-Based Key Agreement Scheme(IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman(ECDH).IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption.Theoretical analysis indicates that comparing to the random key pre-distribution techniques,IBKAS achieves significant improvement in key connectivity,communication overhead,memory occupation,and security strength,and also enables efficient secure rekeying and network expansion.Furthermore,we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes,and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensor networks.
基金Supported by the National Natural Science Foundations of China (No. 61071090,No. 61171093)the Postgraduate Innovation Programs of Scientific Research of Jiangsu Province (CX10B-184Z,CXZZ11_0388)the Project 11KJA510001 and PAPD
文摘To exploit the effect of modulation schemes on the best relay selection,a novel Jointing Modulation schemes max-min criterion(JM-max-min) is proposed firstly for Two-Way De-Noise-and-Forward(DNF) Opportunistic Relaying systems(TW-DNF-OR) by aiming at minimizing the Pairwise Error Probability(PEP) of Multi-Access(MA) phase which dominates the error per-formance of TW-DNF-OR due to the presence of MA interference.The proposed JM-max-min criterion integrates perfectly the minimum distances of constellations and the relay links gains.Then,with the proposed JM-max-min criterion,we analyze the Symbol Error Probabilities(SEPs) of MA phase and BroadCast(BC) phase by using the approximated mathematics analysis,and present the corresponding closed-form expressions to SEPs.The numerical analysis shows,for a given modulations combination at both sources,the TW-DNF-OR systems with the proposed JM-max-min criterion outperform the one with the conventional max-min criterion.