期刊文献+
共找到26篇文章
< 1 2 >
每页显示 20 50 100
Labeling algorithm and its fairness analysis for autonomous system
1
作者 Han Guodong Wang Hui Wu Jiangxing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第4期806-810,共5页
A kind of packet labeling algorithm for autonomous system is introduced. The fairness of the algorithm for each traffic stream in the integratedservices is analyzed. It is shown that the rate of each stream in the int... A kind of packet labeling algorithm for autonomous system is introduced. The fairness of the algorithm for each traffic stream in the integratedservices is analyzed. It is shown that the rate of each stream in the integratedservices would converge to a stable value if the transmitting or forwarding rates converge to that of the receiving exponentially. 展开更多
关键词 自治系统 标签算法 流量控制 信息包 服务质量
下载PDF
Artificial Noise Based Security Algorithm for Multi-User MIMO System
2
作者 Jian-hua Peng Kai-zhi Huang Jiang Ji 《Communications and Network》 2013年第3期194-199,共6页
The existing physical layer security algorithm, which is based on artificial noise, could affect legitimate receivers negatively when the number of users is no less than sending antennas in multi-user MIMO system. In ... The existing physical layer security algorithm, which is based on artificial noise, could affect legitimate receivers negatively when the number of users is no less than sending antennas in multi-user MIMO system. In order to improve security of multi-user MIMO system under this scenario, we propose a new multi-user MIMO system physical layer security algorithm based on joint channel state matrix. Firstly, multiple users are processed together, thus a multi-user joint channel state matrix is established. After achieving Singular Value Decomposition (SVD) of the joint channel state matrix, the minimum singular value is obtained, which can be utilized for precoding to eliminate the interference of artificial noise to legitimate receivers. Further, we also present an approach to optimize the power allocation. Simulation results show that the proposed algorithm can increase secrecy capacity by 0.1 bit/s/HZ averagely. 展开更多
关键词 MULTI-USER MIMO System JOINT CHANNEL State MATRIX SECRECY Capacity Artificial Noise PHYSICAL Layer Security
下载PDF
A Resource Allocation Algorithm of Physical-Layer Security for OFDMA System under Non-ideal Condition
3
作者 Xiao-min Ran You-quan Mo Yu-lei Chen 《Communications and Network》 2013年第3期204-210,共7页
In this paper, a resource allocation scheme based on physical layer security under non-ideal condition for OFDMA system is introduced. Firstly, the program uses the information security constructing an OFDMA system Wi... In this paper, a resource allocation scheme based on physical layer security under non-ideal condition for OFDMA system is introduced. Firstly, the program uses the information security constructing an OFDMA system Wiretap Channel Model under non-ideal condition. Based on this model, arti?cial noise is generated for secure communications combatting passive multiple eavesdroppers. In order to maximize the average secrecy outage capacity without channel state information of eavesdroppers, we use dual decomposition method to implement subcarriers and power allocation in joint optimization. Simulation results show that the average secrecy outage capacity can achieve 7.81 bit/s/Hz while secrecy outage probability is 0.05 with 50 dB mtransmitpower and 64 sub-carrier for 8 authorized users. 展开更多
关键词 OFDMA System Physical Layer Security SECRECY OUTAGE Capacity Resource ALLOCATION
下载PDF
Survivable Virtual Network Mapping Using Optimal Backup Topology in Virtualized SDN 被引量:14
4
作者 WANG Zhiming WU Jiangxing WANG Yu QI Ning LAN Julong 《China Communications》 SCIE CSCD 2014年第2期26-37,共12页
Software-Defined Network architecture offers network virtualization through a hypervisor plane to share the same physical substrate among multiple virtual networks.However,for this hypervisor plane,how to map a virtua... Software-Defined Network architecture offers network virtualization through a hypervisor plane to share the same physical substrate among multiple virtual networks.However,for this hypervisor plane,how to map a virtual network to the physical substrate while guaranteeing the survivability in the event of failures,is extremely important.In this paper,we present an efficient virtual network mapping approach using optimal backup topology to survive a single link failure with less resource consumption.Firstly,according to whether the path splitting is supported by virtual networks,we propose the OBT-Ⅰ and OBT-Ⅱ algorithms respectively to generate an optimal backup topology which minimizes the total amount of bandwidth constraints.Secondly,we propose a Virtual Network Mapping algorithm with coordinated Primary and Backup Topology(VNM-PBT)to make the best of the substrate network resource.The simulation experiments show that our proposed approach can reduce the average resource consumption and execution time cost,while improving the request acceptance ratio of VNs. 展开更多
关键词 虚拟网络 拓扑结构 映射方法 虚拟化 备份 SDN 优化 应用
下载PDF
A Tractable Approach to Analyzing the Physical-Layer Security in K-Tier Heterogeneous Cellular Networks 被引量:6
5
作者 ZHONG Zhihao PENG Janhua +1 位作者 LUO Wenyu HUANG Kaizhi 《China Communications》 SCIE CSCD 2015年第S1期166-173,共8页
This study proposes a tractable approach to analyze the physical-layer security in the downlink of a multi-tier heterogeneous cellular network. This method is based on stochastic geometry, has low computational comple... This study proposes a tractable approach to analyze the physical-layer security in the downlink of a multi-tier heterogeneous cellular network. This method is based on stochastic geometry, has low computational complexity, and uses the two-dimensional Poisson point process to model the locations of K-tier base stations and receivers, including those of legitimate users and eavesdroppers. Then, the achievable secrecy rates for an arbitrary user are determined and the upper and lower bounds of secrecy coverage probability derived on the condition that cross-tier interference is the main contributor to aggregate interference. Finally, our analysis results reveal the innate connections between information-theoretic security and the spatial densities of legitimate and malicious nodes. 展开更多
关键词 HETEROGENEOUS cellular networks physical layer security stochastic GEOMETRY SECRECY COVERAGE PROBABILITY
下载PDF
Dual-Threshold Based Secure On-Off Transmission Scheme for Dense HCNs with Imperfect CSI 被引量:3
6
作者 Yunjia Xu Kaizhi Huang +1 位作者 Yi Zou Xin Hu 《China Communications》 SCIE CSCD 2019年第3期132-142,共11页
In this paper, we propose a dual-threshold based secure On-Off transmission scheme, where signals are transmitted only if the channel condition can guarantee secure and reliable communication. First, we present a dyna... In this paper, we propose a dual-threshold based secure On-Off transmission scheme, where signals are transmitted only if the channel condition can guarantee secure and reliable communication. First, we present a dynamic access strategy to increase access efficiency, which provides an access region for the intended user. Then, we propose an emission control policy to transmit signals according to the current channel condition, which declines the influence of channel estimation errors and guarantees qualities of communication links. Furthermore, we give a comprehensive performance analysis for the proposed scheme in terms of connection outage probability(COP) and secrecy outage probability(SOP), and present a dual-threshold optimization model to further support the performance. Numerical results verify that the secure On-Off transmission scheme can increase the system secure energy efficiency and guarantee reliable and secure communication. 展开更多
关键词 physical layer security imperfect CSI DENSE HETEROGENEOUS cellular networks ON-OFF transmission SECURE energy efficiency
下载PDF
An Approach for Network Function Combination Based on Least Busy Placement Algorithm 被引量:3
7
作者 XIE Lijun JIANG Yiming +2 位作者 WANG Binqiang XIONG Gang CHENG Guozhen 《China Communications》 SCIE CSCD 2016年第S1期167-176,共10页
Recently, integrating Softwaredefined networking(SDN) and network functions virtualization(NFV) are proposed to address the issue that difficulty and cost of hardwarebased and proprietary middleboxes management. Howev... Recently, integrating Softwaredefined networking(SDN) and network functions virtualization(NFV) are proposed to address the issue that difficulty and cost of hardwarebased and proprietary middleboxes management. However, it lacks of a framework that orchestrates network functions to service chain in the network cooperatively. In this paper, we propose a function combination framework that can dynamically adapt the network based on the integration NFV and SDN. There are two main contributions in this paper. First, the function combination framework based on the integration of SDN and NFV is proposed to address the function combination issue, including the architecture of Service Deliver Network, the port types representing traffic directions and the explanation of terms. Second, we formulate the issue of load balance of function combination as the model minimizing the standard deviations of all servers' loads and satisfying the demand of performance and limit of resource. The least busy placement algorithm is introduced to approach optimal solution of the problem. Finally, experimental results demonstrate that the proposed method can combine functions in an efficient and scalable way and ensure the load balance of the network. 展开更多
关键词 software-defined NETWORKING network functions VIRTUALIZATION load BALANCE least BUSY PLACEMENT ALGORITHM contribution degree
下载PDF
An Effective and Scalable VM Migration Strategy to Mitigate Cross-VM Side-Channel Attacks in Cloud 被引量:3
8
作者 Chao Yang Yunfei Guo +2 位作者 Hongchao Hu Wenyan Liu Yawen Wang 《China Communications》 SCIE CSCD 2019年第4期151-171,共21页
Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immedi... Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immediate deployment due to their requirement for modification of virtualization structure, we adopt dynamic migration, an inherent mechanism of the cloud platform, as a general defense against this kind of threats. To this end, we first set up a unified practical information leakage model which shows the factors affecting side channels and describes the way they influence the damage due to side-channel attacks. Since migration is adopted to limit the time duration of co-residency, we envision this defense as an optimization problem by setting up an Integer Linear Programming(ILP) to calculate optimal migration strategy, which is intractable due to high computational complexity. Therefore, we approximate the ILP with a baseline genetic algorithm, which is further improved for its optimality and scalability. Experimental results show that our migration-based defense can not only provide excellent security guarantees and affordable performance cost in both theoretical simulation and practical cloud environment, but also achieve better optimality and scalability than previous countermeasures. 展开更多
关键词 side-channel ATTACKS information LEAKAGE virtual machine migration GENETIC algorithm
下载PDF
Physical Layer Security of Multi-hop Aided Downlink MIMO heterogeneous Cellular Networks 被引量:3
9
作者 Xiaohui Qi Kaizhi Huang +2 位作者 Zhihao Zhong Xiaolei Kang Zhou Zhong 《China Communications》 SCIE CSCD 2016年第S2期120-130,共11页
This study investigates physical layer security in downlink multipleinput multiple-output(MIMO) multi-hop heterogeneous cellular networks(MHCNs),in which communication between mobile users and base stations(BSs) is es... This study investigates physical layer security in downlink multipleinput multiple-output(MIMO) multi-hop heterogeneous cellular networks(MHCNs),in which communication between mobile users and base stations(BSs) is established by a single or multiple hops,to address the problem of insufficient security performance of MIMO heterogeneous cellular networks.First,two-dimensional homogeneous Poisson point processes(HPPPs) are utilized to model the locations of K-tier BSs in MIMO MHCNs and receivers,including those of legitimate users and eavesdroppers.Second,based on the channel gain distribution and the statistics property of HPPP,the achievable ergodic rates of the main and eavesdropper channels in direct and ad hoc links are derived,respectively.Third,the secrecy coverage probability and the achievable ergodic secrecy throughput of downlink MIMO MHCNs are explored,and their expressions are derived.Lastly,the correctness of the theoretical derivation is verified through Monte Carlo simulations. 展开更多
关键词 multi-hop heterogeneous cellular networks secrecy coverage probability stochastic geometry secrecy throughput
下载PDF
A Dynamic Protocol Stack Structure for Diversified QoS Requirements in Ad Hoc Network 被引量:2
10
作者 DONG Fang Li Ou +1 位作者 RAN Xiaomin JIN Feicai 《China Communications》 SCIE CSCD 2016年第S1期43-53,共11页
A dynamic protocol stack(DPS) for ad hoc networks, together with a protocol stack construction scheme that is modeled as a multiconstrained knapsack problem is proposed. Compared to the traditional static protocol sta... A dynamic protocol stack(DPS) for ad hoc networks, together with a protocol stack construction scheme that is modeled as a multiconstrained knapsack problem is proposed. Compared to the traditional static protocol stack, DPS operates in a dynamic and adaptive manner and is scalable to network condition changes. In addition, a protocol construction algorithm is proposed to dynamically construct of the protocol stack each network node. Simulation results show that, the processing and forwarding performance of our scheme is close to 1 Gb/s, and the performance of our algorithm is close to that of the classical algorithms with much lower complexity. 展开更多
关键词 ad HOC network QoS GUARANTEE DYNAMIC PROTOCOL STACK PROTOCOL construction algorithm
下载PDF
Providing Customized Security Based on Network Function Composition and Reconfiguration 被引量:2
11
作者 HU Yuxiang LI Yufeng +1 位作者 XING Chiqiang LIAO Jianxin 《China Communications》 SCIE CSCD 2016年第S1期177-189,共13页
Real-time multimedia sharing in Consumer-centric Multimedia Network(CMN) requires usability anywhere, anytime and from any device. However, CMNs are usually located or implemented on application layer, which makes CMN... Real-time multimedia sharing in Consumer-centric Multimedia Network(CMN) requires usability anywhere, anytime and from any device. However, CMNs are usually located or implemented on application layer, which makes CMNs subjected to their fixed substrate security framework. A fundamental diversifying attribute for the customized security experiences of CMNs is pressing. This paper proposes a programmable network structure which is named Service Processing Chain(SPC) based on network function combination. The SPC is established by the ordinal combination of network functions in substrate switches dynamically, and therefore constructs a special channel for each CMN with required security. The construction and reconfiguration algorithms of SPC are also discussed in this paper. Evaluations and implementation show that above approaches are effective in providing multilevel security with flexibility and expansibility. It is believed that the SPC could provide customized security service and drive participative real-time multimedia sharing for CMNs. 展开更多
关键词 consumer-centric MULTIMEDIA NETWORK customized SECURITY NETWORK function combination service processing CHAIN
下载PDF
Clustering of Virtual Network Function Instances Oriented to Compatibility in 5G Network 被引量:2
12
作者 Xiaolei Wang Lijun Xie +1 位作者 Zhiqiang Qin Yunjie Chen 《China Communications》 SCIE CSCD 2017年第12期111-119,共9页
Network functions virtualization(NFV) increases network flexibility and scalability by virtualizing network functions running on the general servers and opens the network innovations by outsourcing VNF instances in 5G... Network functions virtualization(NFV) increases network flexibility and scalability by virtualizing network functions running on the general servers and opens the network innovations by outsourcing VNF instances in 5G networks.However,it leads to the incompatibility issue among different VNF instances,which makes operators difficult to determine which VNF instances to select for Service Function Chains(SFCs).In this paper,we divide VNF instances with high compatibility into clusters used for combining VNF instances in 5G networks.Firstly,we define compatibility among different VNF instances.Secondly,aiming to maximize compatibility of each cluster,we propose a novel hypergraph clustering model that divides the VNF instances into multiple clusters.Then,the hypergraph clustering model is transformed to an evolutionary game.Thus,the cluster establishing is transformed to the game equilibrium searching.Furthermore,we propose a discrete time high order replicator dynamic algorithm to find the game equilibrium.Finally,the simulation results show that the proposed approach can improve the quality of SFCs. 展开更多
关键词 5G wireless communication VNFinstances compatibility HYPERGRAPH cluster-ing EVOLUTIONARY GAME
下载PDF
Secure Transmission Scheme Based on Dual-Thresholds for Simultaneous Wireless Information and Power Transfer 被引量:1
13
作者 Xin Hu Kaizhi Huang +2 位作者 Yajun Chen Liang Jin Yunjia Xu 《China Communications》 SCIE CSCD 2017年第12期25-44,共20页
This paper studies a simultaneous wireless information and power transfer system with multiple external eavesdroppers and internal curious users.We model the random network by Poisson cluster process in consideration ... This paper studies a simultaneous wireless information and power transfer system with multiple external eavesdroppers and internal curious users.We model the random network by Poisson cluster process in consideration of the case where eavesdroppers hide around certain targets.Focusing on the users that work in harvesting-transmitting mode with time switching receivers,we establish communication model via time division multiple access.On this basis,we propose a lightweight secure transmission scheme based on dual-thresholds for physical-layer security enhancement,which consists of two protocols applied to the downlink(DL) and uplink(UL) transmission respectively.In the DL,we design a dynamic information-power switching transmission protocol based on signal-to-noise ratio threshold,which provides an opportunistic approach to reform the fixed period allocation of information and power transfer;in the UL,an energy threshold is proposed for users to control the transmission,which is called a user-led on-off transmission protocol.Furthermore,we give a comprehensive performance analysis for the proposed scheme in terms of delay,reliability,security and secrecy throughput.Based on the analysis results,we optimize the two thresholds and the DL-UL allocationcoefficient to maximize the secrecy throughput.Simulation results show the proposed scheme can bring about a substantial secrecy gain. 展开更多
关键词 physical layer security simultane-ous WIRELESS INFORMATION and power transfer OPPORTUNISTIC approach on-offtransmission
下载PDF
A modified interval subdividing based geometric calibration method for interior tomography
14
作者 张峰 闫镔 +2 位作者 李磊 席晓琦 江桦 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第9期571-577,共7页
The interior tomography is commonly met in practice, whereas the self-calibration method for geometric parameters remains far from explored. To determine the geometry of interior tomography, a modified interval subdiv... The interior tomography is commonly met in practice, whereas the self-calibration method for geometric parameters remains far from explored. To determine the geometry of interior tomography, a modified interval subdividing based method, which was originally developed by Tan et al.,[11]was presented in this paper. For the self-calibration method, it is necessary to obtain the reconstructed image with only geometric artifacts. Therefore, truncation artifacts reduction is a key problem for the self-calibration method of an interior tomography. In the method, an interior reconstruction algorithm instead of the Feldkamp–Davis–Kress(FDK) algorithm was employed for truncation artifact reduction. Moreover, the concept of a minimum interval was defined as the stop criterion of subdividing to ensure the geometric parameters are determined nicely. The results of numerical simulation demonstrated that our method could provide a solution to the selfcalibration for interior tomography while the original interval subdividing based method could not. Furthermore, real data experiment results showed that our method could significantly suppress geometric artifacts and obtain high quality images for interior tomography with less imaging cost and faster speed compared with the traditional geometric calibration method with a dedicated calibration phantom. 展开更多
关键词 几何参数 断层扫描 校正方法 细分 区间 校准方法 重建算法 时间间隔
原文传递
Derivative-Hilbert-Backprojection based image reconstruction from truncated projections in helical cone-beam CT
15
作者 张峰 闫镔 +5 位作者 李磊 席晓琦 江桦 魏星 张翔 崔进鲜 《Nuclear Science and Techniques》 SCIE CAS CSCD 2015年第2期45-53,共9页
In helical cone-beam computed tomography(CT), Feldkamp-Davis-Kress(FDK) based image reconstruction algorithms are by far the most popular. However, artifacts are commonly met in the presence of lateral projection trun... In helical cone-beam computed tomography(CT), Feldkamp-Davis-Kress(FDK) based image reconstruction algorithms are by far the most popular. However, artifacts are commonly met in the presence of lateral projection truncation. The reason is that the ramp filter is global. To restrain the truncation artifacts, an approximate reconstruction formula is proposed based on the Derivative-Hilbert-Backprojection(DHB) framework. In the method, the first order derivative filter is followed by the Hilbert transform. Since the filtered projection values are almost zero by the first order derivative filter, the following Hilbert transform has little influence on the projection values, even though the projections are laterally truncated. The proposed method has two main advantages. First, it has comparable computational efficiency and image quality as well as the conventional helical FDK algorithm for non-truncated projections. The second advantage is that images can be reconstructed with acceptable quality and much lower computational cost in comparison to the Laplace operator based algorithm in cases with truncated projections. To point out the advantages of our method, simulations on the computer and real data experiments on our laboratory industrial cone-beam CT are conducted. The simulated and experimental results demonstrate that the method is feasible for image reconstruction in the case of projection truncation. 展开更多
关键词 图像重建算法 希尔伯特变换 锥束CT 反投影 衍生物 截短 螺旋 锥形
下载PDF
A Self-Adaptive Programming Mechanism for Reconfigurable Parsing and Processing
16
作者 DUAN Tong SHEN Juan +1 位作者 WANG Peng LIU Shiran 《China Communications》 SCIE CSCD 2016年第S1期87-97,共11页
In this paper, we present a self-adaptive programming mechanism(SAP) that targets programming hardware devices of reconfigurable parsing and processing. The SAP programming system locates in software of network data p... In this paper, we present a self-adaptive programming mechanism(SAP) that targets programming hardware devices of reconfigurable parsing and processing. The SAP programming system locates in software of network data plane and has three features:(1) programmable packet parsing: the packet header format can be customized and new header type can be added;(2) reconfigurable packet processing: the match fields to be handled in each match table can be specified;(3) function-adaptive control: any function control systems can determine the packet processing flow independently without the need of knowing the specifics of the underlying hardware. Finally, we implement a prototype on NetF PGA-10 G together with two representative function control systems(router and Open Flow switch) to demonstrate how SAP works. We believe the data plane of reconfigurable parsing and processing will lead to future switches that provide greater flexibility, and unlock the potential of network function innovation. 展开更多
关键词 PROGRAMMING MECHANISM selfadaptive RECONFIGURABLE network data PLANE Net FPGA
下载PDF
A Summary of the Large-Scale Access Convergence Network Structure
17
作者 LAN Julong ZHANG Xiaohui +5 位作者 SHEN Juan HU Yuxiang WANG Xiang MAO Zhenshan WANG Lingqiang LIANG Dong 《China Communications》 SCIE CSCD 2016年第S1期1-5,共5页
Under the requirement of everything over IP, network service shows the following characteristics:(1) network service increases its richness;(2) broadband streaming media becomes the mainstream. To achieve unified mult... Under the requirement of everything over IP, network service shows the following characteristics:(1) network service increases its richness;(2) broadband streaming media becomes the mainstream. To achieve unified multi-service bearing in the IP network, the largescale access convergence network architecture is proposed. This flat access convergence structure with ultra-small hops, which shortens the service transmission path, reduces the complexity of the edge of the network, and achieves IP strong waist model with the integration of computation, storage and transmission. The key technologies are also introduced in this paper, including endto-end performance guarantee for real time interactive services, fog storing mechanism, and built-in safety transmission with integration of aggregation and control. 展开更多
关键词 network architecture LARGE-SCALE ACCESS CONVERGENCE flat structure ultra-small HOPS
下载PDF
Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines
18
作者 Chao YANG Yun-fei GUO +3 位作者 Hong-chao HU Ya-wen WANG Qing TONG Ling-shu LI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第5期731-748,共18页
Co-residency of different tenants’ virtual machines(VMs) in cloud provides a good chance for side-channel attacks, which results in information leakage. However, most of current defense suffers from the generality or... Co-residency of different tenants’ virtual machines(VMs) in cloud provides a good chance for side-channel attacks, which results in information leakage. However, most of current defense suffers from the generality or compatibility problem, thus failing in immediate real-world deployment. VM migration, an inherit mechanism of cloud systems, envisions a promising countermeasure, which limits co-residency by moving VMs between servers. Therefore, we first set up a unified practical adversary model, where the attacker focuses on effective side channels. Then we propose Driftor, a new cloud system that contains VMs of a multi-executor structure where only one executor is active to provide service through a proxy, thus reducing possible information leakage. Active state is periodically switched between executors to simulate defensive effect of VM migration. To enhance the defense, real VM migration is enabled at the same time. Instead of solving the migration satisfiability problem with intractable CIRCUIT-SAT, a greedy-like heuristic algorithm is proposed to search for a viable solution by gradually expanding an initial has-to-migrate set of VMs. Experimental results show that Driftor can not only defend against practical fast side-channel attack, but also bring about reasonable impacts on real-world cloud applications. 展开更多
关键词 Cloud computing Side-channel attack Information LEAKAGE Multi-executor structure VIRTUAL MACHINE switch VIRTUAL MACHINE migration
原文传递
Sub-channel shared resource allocation for multi-user distributed MIMO-OFDM systems
19
作者 Na-e ZHENG You ZHOU +1 位作者 Han-ying HU Sheng WANG 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2014年第11期1048-1057,共10页
Well-controlled resource allocation is crucial for promoting the performance of multiple input multiple output orthogonal frequency division multiplexing(MIMO-OFDM) systems. Recent studies have focused primarily on tr... Well-controlled resource allocation is crucial for promoting the performance of multiple input multiple output orthogonal frequency division multiplexing(MIMO-OFDM) systems. Recent studies have focused primarily on traditional centralized systems or distributed antenna systems(DASs), and usually assumed that one sub-carrier or sub-channel is exclusively occupied by one user. To promote system performance, we propose a sub-channel shared resource allocation algorithm for multiuser distributed MIMO-OFDM systems. Each sub-channel can be shared by multiple users in the algorithm, which is different from previous algorithms. The algorithm assumes that each user communicates with only two best ports in the system. On each sub-carrier, it allocates a sub-channel in descending order, which means one sub-channel that can minimize signal to leakage plus noise ratio(SLNR) loss is deleted until the number of remaining sub-channels is equal to that of receiving antennas. If there are still sub-channels after all users are processed, these sub-channels will be allocated to users who can maximize the SLNR gain. Simulations show that compared to other algorithms, our proposed algorithm has better capacity performance and enables the system to provide service to more users under the same capacity constraints. 展开更多
关键词 MIMO-OFDM MULTI-USER Resource allocation Sub-channel shared Signal to leakage plus noise ratio(SLNR)
原文传递
A performance analysis of multi-satellite joint geolocation 被引量:7
20
作者 Ding WANG Shuai WEI Ying WU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第12期1360-1387,共28页
为利用卫星束确定地球表面目标的位置信息具有很多重要应用,例如导航,监控,遥感等。然而,在实际条件下,会有很多因素影响卫星定位系统的精度,比如说信号参数的测量误差,卫星位置误差以及校正源的位置误差。本文基于时差观测量系统分析... 为利用卫星束确定地球表面目标的位置信息具有很多重要应用,例如导航,监控,遥感等。然而,在实际条件下,会有很多因素影响卫星定位系统的精度,比如说信号参数的测量误差,卫星位置误差以及校正源的位置误差。本文基于时差观测量系统分析了多星联合定位的理论性能。首先在基于目标高程约束和高斯误差的假设下,推导四种定位场景下目标位置估计方差的克拉美罗界。第一种场景仅考虑时差观测量误差,并且假设卫星位置精确已知;第二种场景同时考虑时差观测量误差和卫星位置误差;第三种场景假设存在若干位置信息精确已知的校正源,其用于消除卫星位置的影响;第四种场景则假设校正源位置也存在测量误差。此外,文中基于一阶扰动分析和拉格朗日方法推导了两种情形下的定位均方根误差的表达式。第一种情形是假设卫星位置精确已知但实际上却含有误差;第二种情形则是假设校正源位置精确已知但实际上却含有误差。仿真结果验证了文中理论分析的有效性。 展开更多
关键词 卫星定位 时差 克拉美罗界 校正源 性能分析
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部