Distributed radio access network (DRAN) is a novel wireless access architecture and can solve the problem of the available spectrum scarcity in wireless communications. In this paper, we investigate resource allocatio...Distributed radio access network (DRAN) is a novel wireless access architecture and can solve the problem of the available spectrum scarcity in wireless communications. In this paper, we investigate resource allocation for the downlink of OFDMA DRAN. Unlike previous exclusive criterion based algorithms that allocate each subcarrier to only one user in the system, the proposed algorithms are based on shared criterion that allow each subcarrier to be allocated to multiple users through different antennas and to only one user through same antenna. First, an adaptive resource allocation algorithm based on shared criterion is proposed to maximize total system rate under each user's minimal rate and each antenna's maximal power constraints. Then we improve the above algorithm by considering the influence of the resource allocation scheme on single user. The simulation results show that the shared criterion based algorithm provide much higher total system rate than that of the exclusive criterion based algorithm at the expense of the outage performance and the fairness, while the improved algorithm based on shared criterion can achieve a good tradeoff performance.展开更多
The joint channel and power allocation in the downlink transmission of multi-user multi-carrier code division multiple access(MC-CDMA) systems are investigated and the throughput maximization problem is considered a...The joint channel and power allocation in the downlink transmission of multi-user multi-carrier code division multiple access(MC-CDMA) systems are investigated and the throughput maximization problem is considered as a mixed integer optimization problem. For simplicity of analysis, the problem is divided into two less complex sub-problems: power allocation and channel allocation, which can be solved by a suboptimal adaptive power allocation (APA)algorithm and an optimal adaptive channel allocation (ACA) algorithm, respectively. By combining APA and ACA algorithms, an adaptive channel and power allocation scheme is proposed. The numerical results show that the proposed APA algorithm is more suitable for MC-CDMA systems than the conventional equal power allocation algorithm, and that the proposed channel and power allocation scheme can significantly improve the system throughout performance.展开更多
According to the feature of city’s apartment building in China,a kind of Multi-users Watt-hour Meter based on ATT7022B has been developed in this paper.The master-slave MCU control model and the principles of Time Sh...According to the feature of city’s apartment building in China,a kind of Multi-users Watt-hour Meter based on ATT7022B has been developed in this paper.The master-slave MCU control model and the principles of Time Sharing Multiplex are adopted in this Watt-hour Meter,its function includes the measurement of current,voltage,power,power factor and the overload protection.It supports remote reading,pre-payment,multi-rate and etc.The practice shows that this meter has high accuracy,runs stable.It has wide prospect in the future market.展开更多
In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially a...In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially applied to the joint detection of the active user and the transmitted data.However,the existing compressed sensing recovery algorithms with unknown sparsity often require noise power or signal-to-noise ratio(SNR)as the priori conditions,which greatly reduces the algorithm adaptability in multi-user detection.Therefore,an algorithm based on cross validation aided structured sparsity adaptive orthogonal matching pursuit(CVA-SSAOMP)is proposed to realize multi-user detection in dynamic change communication scenario of channel state information(CSI).The proposed algorithm transforms the structured sparsity model into a block sparse model,and without the priori conditions above,the cross validation method in the field of statistics and machine learning is used to adaptively estimate the sparsity of active user through the residual update of cross validation.The simulation results show that,compared with the traditional orthogonal matching pursuit(OMP)algorithm,subspace pursuit(SP)algorithm and cross validation aided block sparsity adaptive subspace pursuit(CVA-BSASP)algorithm,the proposed algorithm can effectively improve the accurate estimation of the sparsity of active user and the performance of system bit error ratio(BER),and has the advantage of low-complexity.展开更多
A multiple-input multiple-output interleave division multiple access (MIMO-IDMA) system with Triple Polarized Division Multiplexing (TPDM) is presented in this paper. The present methodology replaces three indepe...A multiple-input multiple-output interleave division multiple access (MIMO-IDMA) system with Triple Polarized Division Multiplexing (TPDM) is presented in this paper. The present methodology replaces three independent linearly polarized antennas with a single triple polarized antenna at both the transmitter and receiver. The users in the communication link are accommodated and separated using a user-specific interleaver combined with low rate spreading sequence. To eliminate the effects of multi-stream interference (MSI), minimum mean square error (MMSE) algorithm based on successive interference cancellation (SIC) Multi-user detection (MUD) technique is employed at the receiver. Furthermore, log-maximum a posteriori probability (MAPP) decoding algorithm is implemented at the mobile stations (MSs) to overcome the effects of multi-user interference (MUI) effects. The paper also evaluates the effects of coded MIMO-IDMA in the downlink communication by adopting the Stanford University Interim (SUI) and Long-term Evolution (LTE)channel model specifications. In comparison with the traditional uncoded system, the present solution considering turbo coded triple-polarized MIMO-IDMA system with iterative decoding algorithm provides better bit error rate (BER) with reduced signal to noise ratio (SNR). The simulation results also show that though the SNR requirement is higher for the proposed technique compared to the conventional uni-polarized antenna based MIMO-IDMA system, it gives the advantages of achieving higher data rate with reduced cost and space requirements in the context of a downlink (DL).展开更多
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu...With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.展开更多
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n...A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures.展开更多
The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upo...The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upon blockchain have been explored recently for Internet of Things(IoTs).However,the access from a legitimate user may be denied without the pre-defined policy and data update on the blockchain could be costly to the owners.In this paper,we first address these issues by incorporating the Accountable Subgroup Multi-Signature(ASM)algorithm into the Attribute-based Access Control(ABAC)method with Policy Smart Contract,to provide a finegrained and flexible solution.Next,we propose a policy-based Chameleon Hash algorithm that allows the data to be updated in a reliable and convenient way by the authorized users.Finally,we evaluate our work by comparing its performance with the benchmarks.The results demonstrate significant improvement on the effectiveness and efficiency.展开更多
Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have differen...Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have different Quality of Service(QoS)requirements.Hence,we study the power allocation in the downlink NCMA system in this paper,and propose a downlink Network-Coded Multiple Access with Diverse Power(NCMA-DP),wherein different amounts of power are allocated to different users.In terms of the Bit Error Rate(BER)of the multi-user decoder,and the number of packets required to correctly decode the message,the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA(NCMA-C).Meanwhile,the performance of the user with less allocated power is still much better than NCMA-C.Furthermore,the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C.The simulation results demonstrate the remarkable performance of the proposed NCMA-DP.展开更多
文摘Distributed radio access network (DRAN) is a novel wireless access architecture and can solve the problem of the available spectrum scarcity in wireless communications. In this paper, we investigate resource allocation for the downlink of OFDMA DRAN. Unlike previous exclusive criterion based algorithms that allocate each subcarrier to only one user in the system, the proposed algorithms are based on shared criterion that allow each subcarrier to be allocated to multiple users through different antennas and to only one user through same antenna. First, an adaptive resource allocation algorithm based on shared criterion is proposed to maximize total system rate under each user's minimal rate and each antenna's maximal power constraints. Then we improve the above algorithm by considering the influence of the resource allocation scheme on single user. The simulation results show that the shared criterion based algorithm provide much higher total system rate than that of the exclusive criterion based algorithm at the expense of the outage performance and the fairness, while the improved algorithm based on shared criterion can achieve a good tradeoff performance.
基金Major Project of the National Natural Science Founda-tion of China(No.60496311)the National High Technology Research and Development Program of China(863Program)(No.2007AA01Z207)the Program for New Century Excellent Talents in University
文摘The joint channel and power allocation in the downlink transmission of multi-user multi-carrier code division multiple access(MC-CDMA) systems are investigated and the throughput maximization problem is considered as a mixed integer optimization problem. For simplicity of analysis, the problem is divided into two less complex sub-problems: power allocation and channel allocation, which can be solved by a suboptimal adaptive power allocation (APA)algorithm and an optimal adaptive channel allocation (ACA) algorithm, respectively. By combining APA and ACA algorithms, an adaptive channel and power allocation scheme is proposed. The numerical results show that the proposed APA algorithm is more suitable for MC-CDMA systems than the conventional equal power allocation algorithm, and that the proposed channel and power allocation scheme can significantly improve the system throughout performance.
文摘According to the feature of city’s apartment building in China,a kind of Multi-users Watt-hour Meter based on ATT7022B has been developed in this paper.The master-slave MCU control model and the principles of Time Sharing Multiplex are adopted in this Watt-hour Meter,its function includes the measurement of current,voltage,power,power factor and the overload protection.It supports remote reading,pre-payment,multi-rate and etc.The practice shows that this meter has high accuracy,runs stable.It has wide prospect in the future market.
基金Supported by the National Natural Science Foundation of China(No.62001001)。
文摘In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially applied to the joint detection of the active user and the transmitted data.However,the existing compressed sensing recovery algorithms with unknown sparsity often require noise power or signal-to-noise ratio(SNR)as the priori conditions,which greatly reduces the algorithm adaptability in multi-user detection.Therefore,an algorithm based on cross validation aided structured sparsity adaptive orthogonal matching pursuit(CVA-SSAOMP)is proposed to realize multi-user detection in dynamic change communication scenario of channel state information(CSI).The proposed algorithm transforms the structured sparsity model into a block sparse model,and without the priori conditions above,the cross validation method in the field of statistics and machine learning is used to adaptively estimate the sparsity of active user through the residual update of cross validation.The simulation results show that,compared with the traditional orthogonal matching pursuit(OMP)algorithm,subspace pursuit(SP)algorithm and cross validation aided block sparsity adaptive subspace pursuit(CVA-BSASP)algorithm,the proposed algorithm can effectively improve the accurate estimation of the sparsity of active user and the performance of system bit error ratio(BER),and has the advantage of low-complexity.
文摘A multiple-input multiple-output interleave division multiple access (MIMO-IDMA) system with Triple Polarized Division Multiplexing (TPDM) is presented in this paper. The present methodology replaces three independent linearly polarized antennas with a single triple polarized antenna at both the transmitter and receiver. The users in the communication link are accommodated and separated using a user-specific interleaver combined with low rate spreading sequence. To eliminate the effects of multi-stream interference (MSI), minimum mean square error (MMSE) algorithm based on successive interference cancellation (SIC) Multi-user detection (MUD) technique is employed at the receiver. Furthermore, log-maximum a posteriori probability (MAPP) decoding algorithm is implemented at the mobile stations (MSs) to overcome the effects of multi-user interference (MUI) effects. The paper also evaluates the effects of coded MIMO-IDMA in the downlink communication by adopting the Stanford University Interim (SUI) and Long-term Evolution (LTE)channel model specifications. In comparison with the traditional uncoded system, the present solution considering turbo coded triple-polarized MIMO-IDMA system with iterative decoding algorithm provides better bit error rate (BER) with reduced signal to noise ratio (SNR). The simulation results also show that though the SNR requirement is higher for the proposed technique compared to the conventional uni-polarized antenna based MIMO-IDMA system, it gives the advantages of achieving higher data rate with reduced cost and space requirements in the context of a downlink (DL).
基金financially supported by the National Natural Science Foundation of China(No.61303216,No.61272457,No.U1401251,and No.61373172)the National High Technology Research and Development Program of China(863 Program)(No.2012AA013102)National 111 Program of China B16037 and B08038
文摘With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.
基金Supported bythe National Basic Research Programof China(973 Program G1999035805)
文摘A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures.
基金supported by the National Natural Science Foundation of China under Grant 61972148。
文摘The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upon blockchain have been explored recently for Internet of Things(IoTs).However,the access from a legitimate user may be denied without the pre-defined policy and data update on the blockchain could be costly to the owners.In this paper,we first address these issues by incorporating the Accountable Subgroup Multi-Signature(ASM)algorithm into the Attribute-based Access Control(ABAC)method with Policy Smart Contract,to provide a finegrained and flexible solution.Next,we propose a policy-based Chameleon Hash algorithm that allows the data to be updated in a reliable and convenient way by the authorized users.Finally,we evaluate our work by comparing its performance with the benchmarks.The results demonstrate significant improvement on the effectiveness and efficiency.
文摘Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have different Quality of Service(QoS)requirements.Hence,we study the power allocation in the downlink NCMA system in this paper,and propose a downlink Network-Coded Multiple Access with Diverse Power(NCMA-DP),wherein different amounts of power are allocated to different users.In terms of the Bit Error Rate(BER)of the multi-user decoder,and the number of packets required to correctly decode the message,the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA(NCMA-C).Meanwhile,the performance of the user with less allocated power is still much better than NCMA-C.Furthermore,the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C.The simulation results demonstrate the remarkable performance of the proposed NCMA-DP.