- Advanced Wireless Communication Technologies
- Cooperative Communication and Network Coding
- Advanced MIMO Systems Optimization
- Wireless Communication Security Techniques
- Full-Duplex Wireless Communications
- Advanced Wireless Communication Techniques
- Wireless Signal Modulation Classification
- Software-Defined Networks and 5G
- IoT and Edge/Fog Computing
- Cognitive Radio Networks and Spectrum Sensing
- Power Line Communications and Noise
- Energy Harvesting in Wireless Networks
- Telecommunications and Broadcasting Technologies
- Distributed Sensor Networks and Detection Algorithms
- Advanced Computational Techniques and Applications
- Advanced Antenna and Metasurface Technologies
- Advanced Queuing Theory Analysis
- melanin and skin pigmentation
- Wireless Body Area Networks
- Retinal Diseases and Treatments
- Mobile Agent-Based Network Management
- E-commerce and Technology Innovations
- Menstrual Health and Disorders
- Plant Pathogens and Fungal Diseases
- Error Correcting Code Techniques
Henan University of Technology
2020-2024
Second Xiangya Hospital of Central South University
2023
Central South University
2022-2023
Xi'an Jiaotong University
2012-2018
Shanghai Institute of Microsystem and Information Technology
2017
Guilin University of Electronic Technology
2015
Shandong Agricultural University
2015
Tianjin University
2013
Tianjin Municipal Education Commission
2013
Coordinated multi‐point (CoMP) techniques can be utilised in several wireless systems, such as LTE‐A and fifth generation. However, inter‐user interferences (IEIs) intra‐user (IAIs) may degrade the quality of service joint transmission (JT), CoMP systems. To suppress these interferences, authors design an interference mitigation scheme via alignment (IA) channel diagonalisation (IMS‐IACD), which is implemented through a local two‐step precoder‐and‐receiver process. First, IA employed to...
In power-domain nonorthogonal multiple access, passive eavesdropping may appear among the users by successive interference cancellation. Furthermore, external eavesdropper do active (i.e., plus jamming) a full-duplex technique. To combat this hybrid eavesdropping, we propose novel physical layer security scheme. The main contributions in scheme are as follows: 1) A time constellation is set up concept of timing channel, where each point contains several symbols and intervals between them,...
Non-orthogonal multiple access (NOMA) is an important mode in 5G. Nevertheless, eavesdropping may appear between the users NOMA. In this case, physical layer security schemes can be introduced to combat eavesdropping. Different from existing schemes, suppression NOMA should based on several rules: (i) successive interference cancellation (SIC) normally operated; (ii) each user not attain others' privacy information; (iii) adopted scheme had better depend spatial disparity channels (since...
Orthogonal frequency division multiplexing (OFDM) signals are widely employed in most wireless comm- unication systems, and the problem of spectrum sensing for OFDM has been extensively investigated. However, available research reports on ignore existence pilots, which usually inserted synchronization, channel estimation control information delivery. To sense weak with periodic pilots reliably cognitive radio networks, we propose two likelihood ratio test (LRT) detectors scenarios without...
We propose a novel physical layer scheme to suppress eavesdropping. Different from the existing schemes which are based on secrecy rate enhancement with Gaussian signal, our is executed actual signal point of view. In scheme, we set several structures constellations for each modulation mode, and then different utilized signals' modulations. this case, one hand, even though eavesdropper knows he#x002F;she difficult demodulate signal. On other information related constellation selection safely...
Non-orthogonal multiple access (NOMA) is important in 5G, and the users served NOMA are often paired to avoid excessive interference. However, for a two-user network, if channel condition of one user serious, this network may require other relay user's signals. In case, demands these possibly different. Specifically, want node increase spectral efficiency compensating cost relay. On hand, because privacy information be contained signals, indirect communication primarily focus on his or her...
We propose a novel physical layer scheme for improving multiple users' information security e.g., vehicle devises and mobile terminals in the next-generation communication systems. Owing to limitation of service node's antennas, not all users can be concurrently served. Therefore, node only provides services some chosen certain time. On basis this premise, our scheme, access status each user is involved. With status, transmitters increase served transmission rates decrease possibility idle...
In the 5G system, different units probably do cooperation to satisfy communication requirements. However, when network configuration is limited, these may be difficult adopt globally cooperative style. this case, local considered. This study focuses on cooperation, and mainly aims at interference mitigation between receiving performance improvement for each unit. Generally, a two‐step scheme proposed. First, channel decomposition acted through design of first‐step transmitters receivers....
In the hybrid communication scenario of Heterogeneous Cloud Radio Access Network and Device-to-Device in 5G, spectrum efficiency promotion interference controlling caused by reuse are still challenges. this article, a novel resource management method, consisting power channel allocation, is proposed to solve problem. An optimization model maximum system throughput system, which constrained Signal Interference plus Noise Ratio requirements all users diverse layers, established. To non-convex...
Joint transmission (JT) allows multiple base stations (BSs) to serve users (UEs) in the same time and frequency resources, which will causes inter-user interference (IUI). Moreover, different signals from BSs can't be executed coherent combination directly non-coherent JT. In this paper, a two-step precoding scheme (TSPS) is proposed solve these problems. Firstly, an alternating minimization algorithm over precoders at subspace matrixes UEs based on alignment (IA) applied, can force each UE...
As the Internet of Things(IoT) and its intelligent applications continue to proliferate, forthcoming 6G networks will confront dual challenge heightened communication computing capacity demands. To address this, D2D collaborative is being explored. However, current ignores integrity communication. For a single-task device, offloading operations intertwine communication, internal coupling causes due parallel executed between local offloading. In addition, external arises among devices...
Summary The coexistence of a macrocell and number femtocells often leads to two‐tier heterogeneous network, where the co‐tier interference (CotIN) cross‐tier (CrotIN) both degrade users' quality service. In order suppress these interferences, we propose precoding scheme in network with cooperative femtocells, called CotIN elimination CrotIN suppression criterion selection (ESPS) scheme. this scheme, first eliminate CotINs each user by applying QR decomposition channel matrix. Then CrotINs...
Joint transmission (JT) allows base stations (BSs) to serve multiple users (UEs) in the same time and frequency resources, wherefore inter-user interference (IUI) will arise. To solve this problem, an suppressed precoding (IUISP) scheme is proposed paper. IUISP contains two steps: firstly, we utilize system degree of freedom suppress generated by signal any UE leaking all others at each BS independently with sharing linear combination matrixes designed UEs before precoding; secondly, based...
Eavesdropping in wireless communication environment should be suppressed. However, most existing schemes ordinarily focus on secrecy rate enhancement, which may not achieved with the non-Gaussian signals. Therefore, we consider this security problem from actual signal point of view. On basis premise, a novel scheme is proposed. In our scheme, each original one constellation converted as transmitted another constellation, and principle variation can safely told to user without being learned...
Through interacting with wireless environments continuously, continuous spectrum sensing (CSS) had been proposed in the literature to alleviate problems introduced by quiet periods cognitive radio systems. However, conventional bandwidth-fixed CSS (BF-CSS) schemes, precious and finite time-frequency resources are not sufficiently utilized. In this article, we design a bandwidth-adaptive (BA-CSS) scheme improve resource utilization, analyze its performance terms of average delay, transmission...
Inter-user interferences (IEIs) and intra-user (IAIs) may degrade the quality-of- service in JT (joint transmission)-CoMP (coordinated multi-point) systems. Interference alignment (IA) with prefect channel state information (CSI) can efficiently mitigate these interferences. However, realistic systems, effect of IA is obviously decreased via uncertainty estimation quantization errors. In this case, we propose a novelly robust precoder-and-receiver design scheme (NRIA) for interference...
The coexistence of a macrocell and number femtocells often leads to two-tier heterogeneous network, where the co-tier interference (CotIN) cross-tier (CrotIN) both degrade users' quality service. In order mitigate two types interferences, we propose precoding scheme for cooperative femtocells, called CotIN elimination CrotIN suppression (CECRS) precoding. this scheme, first eliminate CotINs each user by applying QR decomposition channel matrix. Then, CrotINs MUs FUs are suppressed base...
In view of the blowout growth Internet Things(IoT) devices and intelligent applications, network will face demand ofboth large-scale links high-intensive computing in future. How to reduce burden mobile edge andcommunication is an urgent problem be solved environment with limited resources. Considering coupling relationshipbetween communication resources, a D2D offload scheme under spectrum reuse proposed, who jointlyoptimizes task scheduling, policy resource allocation execution costs. The...