1-15hit |
Wenjun XU Xuemei ZHOU Yanda CHEN Zhihui LIU Zhiyong FENG
Cognitive orthogonal frequency-division multiplexing (OFDM) systems are spectrum-efficient yet vulnerable to intercarrier interference (ICI), especially in high-mobility scenarios. In this paper, the energy efficiency optimization problem in high-mobility cognitive OFDM system is considered. The aim is to maximize the energy efficiency by adapting subcarrier bandwidth, power allocation and sensing duration in the presence of ICI, under the constraints of the total power budget of secondary networks, the probabilistic interference limits for the protection of primary networks, and the subcarrier spacing restriction for high-mobility OFDM systems. In order to tackle the intractable non-convex optimization problem induced by ICI, an ICI-aware power allocation algorithm is proposed, by referring to noncooperative game theory. Moreover, a near-optimal subcarrier bandwidth search algorithm based on golden section methods is also presented to maximize the system energy efficiency. Simulation results show that the proposed algorithms can achieve a considerable energy efficiency improvement by up to 133% compared to the traditional static subcarrier bandwidth and power allocation schemes.
Ding XU Zhiyong FENG Ping ZHANG
Cognitive radio (CR) in spectrum sharing mode allows secondary user (SU) to share the same spectrum simultaneously with primary user (PU), as long as the former guarantees no harmful interference is caused to the latter. This letter proposes a new type of constraint to protect the PU systems that are carrying delay-sensitive applications, namely the PU effective capacity loss constraint, which sets an upper bound on the maximum effective capacity loss of the PU due to the SU transmission. In addition, the PU effective capacity loss constraint is approximately transformed to the interference temperature (power) constraint, to make it easier to be implemented. As an example, we obtain a closed form expression of the SU effective capacity under the approximated peak interference power constraint and the results of simulations validate the proposed PU protection criterion.
Yizhou JIANG Sai HUANG Yixin ZHANG Zhiyong FENG Di ZHANG Celimuge WU
This letter proposes a novel modulation classification method for overlapped sources named LRGP involving multinomial logistic regression (MLR) and multi-gene genetic programming (MGGP). MGGP based feature engineering is conducted to transform the cumulants of the received signals into highly discriminative features and a MLR based classifier is trained to identify the combination of the modulation formats of the overlapped sources instead of signal separation. Extensive simulations demonstrate that LRGP yields superior performance compared with existing methods.
Long ZHANG Zhiyong FENG Qixun ZHANG Lingwu YUAN Jia LIU
TV white space (TVWS) brings potential opportunities to relieve the growing spectrum scarcity. Therefore organizations like the FCC have suggested the co-channel deployment of cellular networks (CNs) on condition that a keep-out distance from the protected region of TV receivers is maintained. However the consequent CN interference has not been described. In addition, considering the wide range of TV coverage, it is also inefficient and wasteful not applying the vacant spectra for secondary user (SU) communication by opportunistic access inside the TV coverage zone. In this paper, we first investigate the aggregate interference from CNs outside the protected area to find out how the interference is generated, and then research the available spectrum resource distribution for SUs inside the TV coverage zone under aggregate interference constraints to utilize TVWS more efficiently. Specifically, we model CN in three aspects. A close-form interference probability distribution function (PDF) is proposed. Since the PDF is too complex to analyze, we approximate it as Gaussian and prove the accuracy of our approximation with Kolmogorov-Smirnov test. Then, available spectra maximization is formulated as an optimization problem under both TV and SU receiver outage probability constraints. We find that available spectra demonstrate a volcano-shaped geographical distribution and optimal network-status-aware SU transmit power exists to maximize the spectra. Our analysis reveals the characteristics of interference in TVWS and contributes to the utilization improvement of white space.
Yi-ze LE Yong FENG Da-jiang LIU Bao-hua QIANG
Metric learning aims to generate similarity-preserved low dimensional feature vectors from input images. Most existing supervised deep metric learning methods usually define a carefully-designed loss function to make a constraint on relative position between samples in projected lower dimensional space. In this paper, we propose a novel architecture called Naive Similarity Discriminator (NSD) to learn the distribution of easy samples and predict their probability of being similar. Our purpose lies on encouraging generator network to generate vectors in fitting positions whose similarity can be distinguished by our discriminator. Adequate comparison experiments was performed to demonstrate the ability of our proposed model on retrieval and clustering tasks, with precision within specific radius, normalized mutual information and F1 score as evaluation metrics.
Guangquan XU Yuanyuan REN Yuanbin HAN Xiaohong LI Zhiyong FENG
With the rapid development of Internet of things (IoT), Radio Frequency Identification (RFID) has become one of the most significant information technologies in the 21st century. However, more and more privacy threats and security flaws have been emerging in various vital RFID systems. Traditional RFID systems only focus attention on foundational implementation, which lacks privacy protection and effective identity authentication. To solve the privacy protection problem this paper proposes a privacy protection method with a Privacy Enhancement Model for RFID (PEM4RFID). PEM4RFID utilizes a “2+2” identity authentication mechanism, which includes a Two-Factor Authentication Protocol (TFAP) based on “two-way authentication”. Our TFAP employs “hardware information + AES-ECC encryption”, while the ”“two-way authentication” is based on improved Combined Public Key (CPK). Case study shows that our proposed PEM4RFID has characteristics of untraceability and nonrepeatability of instructions, which realizes a good trade-off between privacy and security in RFID systems.
Ding XU Zhiyong FENG Ping ZHANG
In spectrum sharing cognitive radio (CR) networks, secondary user (SU) is allowed to share the same spectrum band concurrently with primary user (PU), with the condition that the SU causes no harmful interference to the PU. In this letter, the ergodic and outage capacity loss constraints are proposed to protect the PU according to its service types. We investigate the performance of the SU in terms of ergodic capacity under various power allocation policies of the PU. Specifically, three PU power allocation policies are considered, namely waterfilling, truncated channel inversion with fixed rate (TIFR) and constant power allocation. We obtain the ergodic capacities of the SU under the three PU power allocation policies. The numerical results show that the PU waterfilling and TIFR power allocation policies are superior to the PU constant power allocation in terms of the capacity of the PU. In particular, it is shown that, with respect to the ergodic capacity of the SU, the PU waterfilling power allocation is superior to the PU constant power allocation, while the PU TIFR power allocation is inferior to the PU constant power allocation.
Ting WU Yong FENG JiaXing SANG BaoHua QIANG YaNan WANG
Recommender systems (RS) exploit user ratings on items and side information to make personalized recommendations. In order to recommend the right products to users, RS must accurately model the implicit preferences of each user and the properties of each product. In reality, both user preferences and item properties are changing dynamically over time, so treating the historical decisions of a user or the received comments of an item as static is inappropriate. Besides, the review text accompanied with a rating score can help us to understand why a user likes or dislikes an item, so temporal dynamics and text information in reviews are important side information for recommender systems. Moreover, compared with the large number of available items, the number of items a user can buy is very limited, which is called the sparsity problem. In order to solve this problem, utilizing item correlation provides a promising solution. Although famous methods like TimeSVD++, TopicMF and CoFactor partially take temporal dynamics, reviews and correlation into consideration, none of them combine these information together for accurate recommendation. Therefore, in this paper we propose a novel combined model called TmRevCo which is based on matrix factorization. Our model combines the dynamic user factor of TimeSVD++ with the hidden topic of each review text mined by the topic model of TopicMF through a new transformation function. Meanwhile, to support our five-scoring datasets, we use a more appropriate item correlation measure in CoFactor and associate the item factors of CoFactor with that of matrix factorization. Our model comprehensively combines the temporal dynamics, review information and item correlation simultaneously. Experimental results on three real-world datasets show that our proposed model leads to significant improvement compared with the baseline methods.
Ding XU Zhiyong FENG Ping ZHANG
Spectrum sharing cognitive radio (CR) with maximal ratio combining (MRC) diversity under asymmetric fading is studied. Specifically, the channel on the secondary transmitter (STx) to the secondary receiver (SRx) link is Nakagami-m distributed while the channel on the STx to the primary receiver (PRx) link is Rayleigh distributed, and the channel state information (CSI) on the STx-PRx link is assumed to be outdated due to feedback delay. The outage capacity of the secondary user (SU) is derived under the average interference and peak transmit power constraints. The results supported by simulations are presented and show the effects of various system parameters on the outage capacity. Particularly, it is shown that the outdated CSI has no impact on the outage capacities in the cases of low peak transmit power constraint and zero-outage probability. It is also shown that MRC diversity can significantly improve the outage capacity especially for the zero-outage capacity and the outage capacity under low outage probability.
IEEE802.11 Wireless Local Area Networks (WLANs) are becoming more and more pervasive due to their simple channel access mechanism, Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), but this mechanism provides all nodes including Access Point and other Stations with the same channel access probability. This characteristic does not suit the infrastructure mode which has so many downlink flows to be transmitted at the Access Point that congestion at the Access Point is more likely to occur. To resolve this asymmetry traffic problem, we develop an Optimal Contention Window Adjustment method assuming the condition of erroneous channels over WLANs. This method can be easily implemented and is compatible with the original CSMA/CA mechanism. It holds the ratio of downlink and uplink flows and at the same time achieves the maximum saturation throughput in the WLANs. We use the Markov Chain analytical model to analyze its performance and validate it through the simulations.
Meng Ting XIONG Yong FENG Ting WU Jia Xing SHANG Bao Hua QIANG Ya Nan WANG
The traditional recommendation system (RS) can learn the potential personal preferences of users and potential attribute characteristics of items through the rating records between users and items to make recommendations.However, for the new items with no historical rating records,the traditional RS usually suffers from the typical cold start problem. Additional auxiliary information has usually been used in the item cold start recommendation,we further bring temporal dynamics,text and relevance in our models to release item cold start.Two new cold start recommendation models TmTx(Time,Text) and TmTI(Time,Text,Item correlation) proposed to solve the item cold start problem for different cold start scenarios.While well-known methods like TimeSVD++ and CoFactor partially take temporal dynamics,comments,and item correlations into consideration to solve the cold start problem but none of them combines these information together.Two models proposed in this paper fused features such as time,text,and relevance can effectively improve the performance under item cold start.We select the convolutional neural network (CNN) to extract features from item description text which provides the model the ability to deal with cold start items.Both proposed models can effectively improve the performance with item cold start.Experimental results on three real-world data set show that our proposed models lead to significant improvement compared with the baseline methods.
Yong FENG Qingyu XIONG Weiren SHI
Speaker verification is the task of determining whether two utterances represent the same person. After representing the utterances in the i-vector space, the crucial problem is only how to compute the similarity of two i-vectors. Metric learning has provided a viable solution to this problem. Until now, many metric learning algorithms have been proposed, but they are usually limited to learning a linear transformation. In this paper, we propose a nonlinear metric learning method, which learns an explicit mapping from the original space to an optimal subspace using deep Restricted Boltzmann Machine network. The proposed method is evaluated on the NIST SRE 2008 dataset. Since the proposed method has a deep learning architecture, the evaluation results show superior performance than some state-of-the-art methods.
Ding XU Zhiyong FENG Yizhe LI Ping ZHANG
In this letter, we study the power control of a cognitive radio (CR) network, where the secondary user (SU) is allowed to share the spectrum with the primary user (PU) only if the signal to interference plus noise ratio (SINR) at the PU is higher than a predetermined level. Both PU fixed power control and PU adaptive power control are considered. Specifically, for the PU adaptive power control, the PU will cooperate with the SU by transmitting with adaptive power. The optimal power control schemes for the SU to maximize the SU throughput under the PU SINR constraint are derived. It is shown that the SU throughput achieved by the optimal power control with the PU adaptive power control is a significant improvement over the optimal power control with the PU fixed power control, especially under high power constraint and low SINR constraint.
Yuanbin HAN Shizhan CHEN Zhiyong FENG
This paper presents a novel topic modeling (TM) approach for discovering meaningful topics for Web APIs, which is a potential dimensionality reduction way for efficient and effective classification, retrieval, organization, and management of numerous APIs. We exploit the possibility of conducting TM on multi-labeled APIs by combining a supervised TM (known as Labeled LDA) with ontology. Experiments conducting on real-world API data set show that the proposed method outperforms standard Labeled LDA with an average gain of 7.0% in measuring quality of the generated topics. In addition, we also evaluate the similarity matching between topics generated by our method and standard Labeled LDA, which demonstrates the significance of incorporating ontology.
Ying ZHU Jia LIU Zhiyong FENG Ping ZHANG
This paper investigates power allocation and outage performance for the MIMO full duplex relaying (MFDR) based on orthogonal space-time block Codes (OSTBC) in cognitive radio systems. OSTBC transmission is used as a simple way to obtain multi-antenna diversity gain. Cognitive MFDR systems offer the advantage not only of increasing spectral efficiency by spectrum sharing but also of extending the coverage through the use of relays. In cognitive MFDR systems, the primary user experiences interference from the secondary source and relay simultaneously due to the full duplexing. What is therefore needed is a way to optimize the transmission powers at the secondary source and relay. Therefore, we propose an optimal power allocation (OPA) scheme based on minimizing the outage probability in cognitive MFDR systems. We then analyze the outage probability of the secondary user in the noise-limited and interference-limited environments under Nakagami-m fading channels. Simulation results show that the proposed schemes achieve performance improvement in terms of outage probability.