The search functionality is under construction.

IEICE TRANSACTIONS on Communications

  • Impact Factor

    0.72

  • Eigenfactor

    0.002

  • article influence

    0.1

  • Cite Score

    1.6

Advance publication (published online immediately after acceptance)

Volume E100-B No.5  (Publication Date:2017/05/01)

    Regular Section
  • A Survey of Efficient Ray-Tracing Techniques for Mobile Radio Propagation Analysis Open Access

    Tetsuro IMAI  

     
    INVITED SURVEY PAPER-Antennas and Propagation

      Pubricized:
    2016/12/01
      Page(s):
    666-679

    With the advances in computer processing that have yielded an enormous increase in performance, numerical analytical approaches based on electromagnetic theory have recently been applied to mobile radio propagation analysis. One such approach is the ray-tracing method based on geometrical optics and the uniform geometrical theory of diffraction. In this paper, ray-tracing techniques that have been proposed in order to improve computational accuracy and speed are surveyed. First, imaging and ray-launching methods are described and their extended methods are surveyed as novel fundamental ray-tracing techniques. Next, various ray-tracing acceleration techniques are surveyed and categorized into three approaches, i.e., deterministic, heuristic, and brute force. Then, hybrid methods are surveyed such as those employing Physical optics, the Effective Roughness model, and the Finite-Difference Time-Domain method that have been proposed in order to improve analysis accuracy.

  • Fast Montgomery Modular Multiplication and Squaring on Embedded Processors

    Yang LI  Jinlin WANG  Xuewen ZENG  Xiaozhou YE  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2016/12/06
      Page(s):
    680-690

    Montgomery modular multiplication is one of the most efficient algorithms for modular multiplication of large integers. On resource-constraint embedded processors, memory-access operations play an important role as arithmetic operations in the modular multiplication. To improve the efficiency of Montgomery modular multiplication on embedded processors, this paper concentrates on reducing the memory-access operations through adding a few working registers. We first revisit previous popular Montgomery modular multiplication algorithms, and then present improved algorithms for Montgomery modular multiplication and squaring for arbitrary prime fields. The algorithms adopt the general ideas of hybrid multiplication algorithm proposed by Gura and lazy doubling algorithm proposed by Lee. By careful optimization and redesign, we propose novel implementations for Montgomery multiplication and squaring called coarsely integrated product and operand hybrid scanning algorithm (CIPOHS) and coarsely integrated lazy doubling algorithm (CILD). Then, we implement the algorithms on general MIPS64 processor and OCTEON CN6645 processor equipped with specific multiply-add instructions. Experiments show that CIPOHS and CILD offer the best performance both on the general MIPS64 and OCTEON CN6645 processors. But the proposed algorithms have obvious advantages for the processors with specific multiply-add instructions such as OCTEON CN6645. When the modulus is 2048 bits, the CIPOHS and CILD outperform the CIOS algorithm by a factor of 47% and 58%, respectively.

  • A Novel Two-Stage Compression Scheme Combining Polar Coding and Linear Prediction Coding for Fronthaul Links in Cloud-RAN

    Fangliao YANG  Kai NIU  Chao DONG  Baoyu TIAN  Zhihui LIU  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2016/11/29
      Page(s):
    691-701

    The transmission on fronthaul links in the cloud radio access network has become a bottleneck with the increasing data rate. In this paper, we propose a novel two-stage compression scheme for fronthaul links. In the first stage, the commonly used techniques like cyclic prefix stripping and sampling rate adaptation are implemented. In the second stage, a structure called linear prediction coding with decision threshold (LPC-DT) is proposed to remove the redundancies of signal. Considering that the linear prediction outputs have large dynamic range, a two-piecewise quantization with optimized decision threshold is applied to enhance the quantization performance. In order to further lower the transmission rate, a multi-level successive structure of lossless polar source coding is proposed to compress the quantization output with low encoding and decoding complexity. Simulation results demonstrate that the proposed scheme with LPC-DT and LPSC offers not only significantly better compression ratios but also more flexibility in bandwidth settings compared with traditional ones.

  • A Continuous Query Indexing Method for Location Based Services in Broadcast Environments

    Kyoungsoo BOK  Yonghun PARK  Jaesoo YOO  

     
    PAPER-Network System

      Pubricized:
    2016/12/01
      Page(s):
    702-710

    Recently, several methods to process continuous queries for mobile objects in broadcast environments have been proposed. We propose a new indexing method for processing continuous queries that uses vector information in broadcast environments. We separate the index structure according to the velocities of the objects to avoid unnecessary accesses. The index structure consists of the index files for the slow moving objects and the fast moving objects. By avoiding unnecessary accesses, we reduce the tuning time to process a query in broadcast environments. To show the superiority of the proposed method, we evaluate its performance from various perspectives.

  • RPE: A Seamless Redundancy Protocol for Ethernet Networks

    Nguyen Xuan TIEN  Jong Myung RHEE  

     
    PAPER-Network

      Pubricized:
    2016/11/16
      Page(s):
    711-727

    High availability is crucial for industrial Ethernet networks and Ethernet-based control systems, such as automation networks and substation automation systems. Because the standard Ethernet does not support fault tolerance capability, the high availability of Ethernet networks can be increased by using redundancy protocols. Various redundancy protocols for Ethernet networks have been developed and standardized, such as rapid spanning tree protocol (RSTP), media redundancy protocol (MRP), parallel redundancy protocol (PRP), high-availability seamless redundancy (HSR), and others. RSTP and MRP provide redundancy in the network, whereas PRP and HSR provide redundancy in the end nodes. RSTP and MRP have a disadvantage in switchover delay. PRP and HSR provide zero recovery time, but PRP requires a duplicate network infrastructure, and HSR is mainly used in ring-based topologies. Additionally, PRP and HSR provide seamless redundancy in the end nodes and are applied in dedicated HSR networks with dedicated HSR nodes. In this paper, we present a novel seamless redundancy protocol for Ethernet networks, which is called the Redundancy Protocol for Ethernet (RPE). The RPE provides seamless redundancy in the network. This protocol not only provides seamless communications with zero switchover time in case of failure but also supports all topologies. The RPE is transparent and compatible with standard Ethernet nodes. These features make the RPE very useful in time-critical and mission-critical systems, such as substation automation systems, automation networks, and other industrial Ethernet networks.

  • Network Assisted Wi-Fi Direct Based on Media Independent Services Framework for Allocating Optimized Radio Resources

    Hyunho PARK  Hyeong Ho LEE  Yong-Tae LEE  

     
    PAPER-Network

      Pubricized:
    2016/11/29
      Page(s):
    728-737

    Wi-Fi Direct is a promising and available technology for device-to-device (D2D) proximity communications. To improve the performances of Wi-Fi Direct communication, optimized radio resource allocations are important. This paper proposes network assisted Wi-Fi Direct (NAWD), which operates based on the media independent services framework of IEEE 802.21 standard, for optimizing radio resource allocations. The NAWD is enhanced Wi-Fi Direct with the assistance of infrastructure networks (e.g., cellular network) and allocates radio resources (e.g., frequency channels and transmit power) to reduce radio interferences among Wi-Fi Direct devices (e.g., smart phones and set-top boxes). The NAWD includes mechanisms for gathering configuration information (e.g., location information and network connection information) of Wi-Fi Direct devices and allocating optimized radio resources (e.g., frequency channels and transmit power) to reduce radio interferences among Wi-Fi Direct devices. Simulation results show that the proposed NAWD increases significantly SINR, power efficiency, and areal capacity compared to legacy Wi-Fi Direct, where areal capacity is total traffic throughput per unit area.

  • Improving Security Level of LTE Access Procedure by Using Short-Life Shared Key

    Fawad AHMAD  Marnel PERADILLA  Akanksha SAINI  Younchan JUNG  

     
    PAPER-Network

      Pubricized:
    2016/11/21
      Page(s):
    738-748

    To ensure secure mobile communication, the communicating entities must know their mutual identities. The entities which need to be identified in a mobile communication system are mobile devices and the network. Third Generation Partnership Project (3GPP) has specified Evolved Packet System Authentication and Key Agreement (EPS AKA) procedure for the mutual authentication of user and the Long Term Evolution (LTE) network. EPS AKA certainly overcomes most of the vulnerabilities in the Global System for Mobile Communications (GSM) and Universal Mobile Telecommunication System (UMTS) access procedures. However, the LTE access procedure still has security weaknesses against some of the sophisticated security threats, such as, Denial-of-Service (DoS) attacks, Man-in-the-Middle (MitM) attacks, rogue base station attacks and fails to ensure privacy protection for some of the important parameters. This paper proposes an improved security framework for the LTE access procedure by ensuring the confidentiality protection of International Mobile Subscriber Identity (IMSI) and random-challenge RAND. Also, our proposed system is designed to reduce the impact of DoS attacks which try to overwhelm the network with useless computations. We use a one-time shared key with a short lifetime between the UE and MME to protect IMSI and RAND privacy. Finally, we explore the parameters design for the proposed system which leads to satisfy the requirements imposed on computational load and latency as well as security strength.

  • Traffic Anomaly Detection Based on Robust Principal Component Analysis Using Periodic Traffic Behavior

    Takahiro MATSUDA  Tatsuya MORITA  Takanori KUDO  Tetsuya TAKINE  

     
    PAPER-Network

      Pubricized:
    2016/11/21
      Page(s):
    749-761

    In this paper, we study robust Principal Component Analysis (PCA)-based anomaly detection techniques in network traffic, which can detect traffic anomalies by projecting measured traffic data onto a normal subspace and an anomalous subspace. In a PCA-based anomaly detection, outliers, anomalies with excessively large traffic volume, may contaminate the subspaces and degrade the performance of the detector. To solve this problem, robust PCA methods have been studied. In a robust PCA-based anomaly detection scheme, outliers can be removed from the measured traffic data before constructing the subspaces. Although the robust PCA methods are promising, they incure high computational cost to obtain the optimal location vector and scatter matrix for the subspace. We propose a novel anomaly detection scheme by extending the minimum covariance determinant (MCD) estimator, a robust PCA method. The proposed scheme utilizes the daily periodicity in traffic volume and attempts to detect anomalies for every period of measured traffic. In each period, before constructing the subspace, outliers are removed from the measured traffic data by using a location vector and a scatter matrix obtained in the preceding period. We validate the proposed scheme by applying it to measured traffic data in the Abiline network. Numerical results show that the proposed scheme provides robust anomaly detection with less computational cost.

  • Performance Comparison of Overloaded MIMO System with and without Antenna Selection

    Yasunori NIN  Hikari MATSUOKA  Yukitoshi SANADA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2016/11/29
      Page(s):
    762-770

    This paper investigates the performance of an overloaded multiple-input multiple-output (MIMO) - orthogonal frequency division multiplexing (OFDM) system with and without antenna selection. In the overloaded MIMO-OFDM system, even if only a small amount of feedback is available, performance can be improved by selecting the transmit antennas. Thus, this paper compares the performance of an overloaded MIMO system with and without antenna selection under different code rates. It is shown that the performance of the MIMO-OFDM system for six signal streams with QPSK modulation is about 2.0dB better than that for three signal streams with 16QAM modulation while it is about 5.0dB better than that of the MIMO-OFDM system for two signal streams with 64QAM modulation at a bit error rate (BER) of 10-3. However, it is also shown that the performance of the overloaded MIMO system is worse if the code rate of the repetition code increases.

  • Improving the Performance of DOA Estimation Using Virtual Antenna in Automotive Radar

    Seokhyun KANG  Seongwook LEE  Jae-Eun LEE  Seong-Cheol KIM  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2016/11/25
      Page(s):
    771-778

    In this paper, the virtual antenna technique is applied to a single input multiple output (SIMO) radar system to enhance the performance of the conventional beamforming direction of arrival (DOA) estimation method. Combining the virtual array generated by the interpolated array technique and the real array, the angular resolution of the DOA estimation algorithm is improved owing to the extended number of antennas and aperture size. Based on the proposed interpolation technique, we transform the position of the antenna elements in a uniform linear array (ULA) to the arbitrary positions to suppress the grating lobe and side lobe levels. In simulations, the pseudo spectrum of the Bartlett algorithm and the root mean square error (RMSE) of the DOA estimation with the signal-to-noise ratio (SNR) are analyzed for the real array and the proposed virtually extended array. Simulation results show that the angular resolution of the proposed array is better than that of the real array using the same aperture size of array and the number of antennas. The proposed technique is verified with the practical data from commercialized radar system.

  • Massive Antenna Systems for Wireless Entrance (MAS-WE): Practical Application of Massive MIMO with Simplified Space Division Multiplexing Schemes

    Kazuki MARUTA  Atsushi OHTA  Satoshi KUROSAKI  Takuto ARAI  Masataka IIZUKA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2016/11/16
      Page(s):
    779-787

    This paper proposes a practical application of Massive MIMO technology, Massive Antenna Systems for Wireless Entrance (MAS-WE), and along with related inter-user interference cancellation (IUIC) and scheduling techniques. MAS-WE, in which the entrance base station (EBS) employs a large number of antennas, can effectively provide high capacity wireless entrance links to a large number of access points (APs) distributed over a wide coverage area. The proposed techniques are simplified to practical implementation; EBS side uses around 100 antenna elements to spatially multiplex more than 16 signal streams. SIR performance is evaluated by system level simulations that consider imperfect channel state information (CSI). The results show that MAS-WE with the proposed techniques can reliably achieve high spectral efficiency with high level space division multiplexing.

  • A Miniaturized Absorptive/Transmissive Radome with Switchable Passband and Wide Absorbing Band

    Bo YI  Peiguo LIU  Qihui ZHOU  Tengguang FAN  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2016/11/21
      Page(s):
    788-792

    In this paper, a miniaturized absorptive/transmissive radome with switchable passband and wide absorbing band is designed. Pin diodes are loaded on the radome in order to obtain switchable passband and miniaturized unit cells, while the resistor loaded double square loops are used to absorb the incident wave. The total thickness of the radome is only 4.5mm. Its transmission and absorbing properties are verified by both synthetic experiments and measurements in the anechoic chamber. Furthermore, the switchable passband of the radome is also evaluated using a waveguide simulator.

  • Analysis of Effective Material Properties of Metal Dummy Fills in a CMOS Chip

    Takuichi HIRANO  Ning LI  Kenichi OKADA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2016/11/21
      Page(s):
    793-798

    The equivalent anisotropic material parameters of metal dummy fills in a CMOS chip were extracted through an eigenmode analysis of a unit-cell of a space filled with metal dummies. The validity of the parameters was confirmed by comparing the S-parameters of a parallel-plate waveguide with the metal dummy fills and their effective material properties. The validity of the effective material properties was also confirmed by using them in a simulation of an on-chip dipole antenna.

  • Joint Optimization of Parameters for Enhanced Inter-Cell Interference Coordination (eICIC) in LTE-A HetNets

    Yanzan SUN  Zhijuan WANG  Tao WANG  Yating WU  Yong FANG  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/11/16
      Page(s):
    799-807

    LTE-Advanced heterogeneous networks (HetNets), consisting of conventional Macrocells overlaid by Picocells and forming a hierarchical cell structure, constitute an attractive way of improving the Macrocell capacity and coverage. However, the inter-tier interferences in such systems can significantly reduce the capacity and cause unacceptably high levels of control channel outage. Thus time domain Enhanced Inter-cell Interference Coordination (eICIC), such as almost blank subframe (ABS) and cell range expansion (CRE) techniques, has been proposed to mitigate the interference and improve the system capacity in HetNets. In order to acquire the benefit of eICIC technology efficiently, the three parameters, i.e. ABS ratio, ABS power and CRE bias, should be carefully configured jointly. Motivated by the above considerations, we first propose a single parameter optimization algorithm that fixes the other two parameters and then optimizes them separately. Then, a heuristic joint parameter optimization algorithm is proposed to maximize the system throughput. Extensive simulation results illustrate that the proposed algorithms clearly outperform the fixed parameter configuration, and is close to that of the traversal search algorithm even though they have lower computation complexity

  • Non-Coherent MIMO of Per Transmit Antenna Differential Mapping (PADM) Employing Asymmetric Space-Time Mapping and Channel Prediction

    Hiroshi KUBO  Takuma YAMAGISHI  Toshiki MORI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/11/16
      Page(s):
    808-817

    This paper proposes performance improvement schemes for non-coherent multiple-input multiple-output (MIMO) communication systems employing per transmit antenna differential mapping (PADM). PADM is one form of differential space-time coding (DSTC), which generates an independent differentially encoded sequence for each of the multiple transmit antennas by means of space-time coding and mapping. The features of the proposed schemes are as follows: 1) it employs an asymmetric space-time mapping instead of the conventional symmetric space-time mapping in order to lower the required signal to noise power ratio (SNR) for maintaining the bit error rate (BER) performance; 2) it employs an analytically derived branch metric criterion based on channel prediction for per-survivor processing (PSP) in order to track fast time-varying channels. Finally, computer simulation results confirm that the proposed schemes improve the required SNR by around 1dB and can track at the maximum Doppler frequency normalized by symbol rate of 5%.

  • Resource Sharing Strategy for D2D Communication Underlaying Multichannel Cellular Networks

    Yingjing QIAN  Ni ZHOU  Dajiang HE  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/11/21
      Page(s):
    818-825

    Device-to-device (D2D) communication enables two local users to communicate with each other directly instead of relaying through a third party, e.g., base station. In this paper, we study a subchannel sharing strategy underlaying multichannel cellular network for D2D pairs and existing cellular users (CUs). In the investigated scenario, we try to improve the spectrum efficiency of D2D pairs, but inevitably brings cross interference between two user groups. To combat interference, we attempt to assign each D2D pair with appropriate subchannels, which may belong to different CUs, and manipulate transmission power of all users so as to maximize the sum rate of all D2D pairs, while assuring each CU with a minimum data rate on its subchannel set. The formulated problem is a nonconvex problem and thus, obtaining its optimal solution is a tough task. However, we can find optimal power and subchannel assignment for a special case by setting an independent data rate constraint on each subchannel. Then we find an efficient method to calculate a gradient for our original problem. Finally, we propose a gradient-based search method to address the problem with coupled minimum data rate constraint. The performance of our proposed subchannel sharing strategy is illustrated via extensive simulation results.

  • Asymmetric Transmission Game for Interference Coordination in Wireless Ad-Hoc Relay Networks

    Woong-Hee LEE  Jeongsik CHOI  Won-Tae YU  Jong-Ho LEE  Seong-Cheol KIM  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/11/21
      Page(s):
    826-836

    In this paper, we introduce the new concept of temporal diversity utilization based on asymmetric transmission to minimize network interference in wireless ad-hoc networks with a two-hop half-duplex relaying (HDR) protocol. Asymmetric transmission is an interference-aware backoff technique, in which each communication session (source-relay-destination link) adaptively chooses a certain subset of spectrally-orthogonal data streaming which should be delayed by the duration of one time-slot (i.e., half of one subframe). We design the problem in the HDR scenario by applying the concept of asymmetric transmission, and evaluate the game-theoretical algorithm, called asymmetric transmission game (ATG), to derive the suboptimal solution. We show that ATG is an exact potential game, and derive its convergence and optimality properties. Furthermore, we develop an approximated version of ATG (termed A-ATG) in order to reduce signaling and computational complexity. Numerical results verify that two algorithms proposed show significant synergistic effects when collaborating with the conventional methods in terms of interference coordination. Ultimately, the energy consumption to satisfy the rate requirement is reduced by up to 17.4% compared to the conventional schemes alone.

  • Upper Bound on the Cross-Correlation between Two Decimated Sequences

    Chang-Min CHO  Wijik LEE  Jong-Seon NO  Young-Sik KIM  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/11/28
      Page(s):
    837-842

    In this paper, for an odd prime p, two positive integers n, m with n=2m, and pm≡1 (mod 4), we derive an upper bound on the magnitude of the cross-correlation function between two decimated sequences of a p-ary m-sequence. The two decimation factors are 2 and 2(pm+1), and the upper bound is derived as $ rac{3}{2}p^m + rac{1}{2}$. In fact, those two sequences correspond to the p-ary sequences used for the construction of Kasami sequences decimated by 2. This result is also used to obtain an upper bound on the cross-correlation magnitude between a p-ary m-sequence and its decimated sequence with the decimation factor $d= rac{(p^m +1)^2}{2}$.

  • Performance Analysis of Distributed OSTBC-MIMO Systems Using Adaptive M-QAM Transmission over i.n.i.d. Generalized-K Fading Channels

    Jie HE  Kun XIAO  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/12/06
      Page(s):
    843-851

    In this paper, the performance of orthogonal space-time block codes (OSTBC) for distributed multiple-input multiple-output (MIMO) systems employing adaptive M-QAM transmission is investigated over independent but not necessarily identically distributed (i.n.i.d.) generalized-K fading channels with arbitrary positive integer-valued k(inversely reflects the shadowing severity) and m (inversely reflects the fading severity). Before this, i.n.i.d. generalized-K fading channel has never been considered for distributed OSTBC-MIMO systems. Especially, the effects of the shape parameter k on the distributed OSTBC-MIMO system performance are unknown. Thus, we investigate mainly the significance of the shape parameter k on the distributed OSTBC-MIMO system performance, in terms of the average symbol error probability (SEP), outage probability, and spectral efficiency (SE). By establishing the system model, the approximated probability density function (PDF) of the equivalent signal to noise ratio (SNR) is derived and thereafter the approximated closed-form expressions of the above performance metrics are obtained successively. Finally, the derived expressions are validated via a set of Monte-Carlo simulations and the implications of the shape parameter k on the overall performance are highlighted.

  • Joint Source and Relay Beamformer Design for General MIMO Relaying Broadcast Channel with Imperfect Channel State Information

    Yun LI  Haibin WAN  Wen CHEN  Tohru ASAMI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2016/12/01
      Page(s):
    852-864

    Effective communication strategies with a properly designed source precoding matrix (PM) and a properly designed relay beamforming matrix (BM) can significantly improve the spectral efficiency of multiple-input multiple-output (MIMO) relaying broadcast channels (RBCs). In the present paper, we first propose a general communication scheme with non-regenerative relay that can overcome the half-duplex relay constraint of the general MIMO-RBC. Based on the proposed scheme, the robust source PM and relay BM are designed for imperfect channel state information at the transmitter (CSIT). In contrast to the conventional non-regenerative relaying communication scheme for the MIMO-RBC, in the proposed scheme, the source can send information continuously to the relay and users during two phases. Furthermore, in conjunction with the advanced precoding strategy, the proposed scheme can achieve a full-degree-of-freedom (DoF) MIMO-RBC with that each entry in the related channel matrix is considered to an i.i.d. complex Gaussian variable. The robust source PM and relay BM designs were investigated based on both throughput and fairness criteria with imperfect CSIT. However, solving the problems associated with throughput and fairness criteria for the robust source PM and relay BM designs is computationally intractable because these criteria are non-linear and non-convex. In order to address these difficulties, we first set up equivalent optimization problems based on a tight lower bound of the achievable rate. We then decompose the equivalent throughput problem into several decoupled subproblems with tractable solutions. Finally, we obtain the suboptimal solution for the throughput problem by an alternating optimization approach. We solve the fairness problem by introducing an adjusted algorithm according to the throughput problem. Finally, we demonstrate that, in both cases of throughput and fairness criteria, the proposed relaying communication scheme with precoding algorithms outperforms existing methods.

  • Null-Space Expansion for Multiuser Massive MIMO Inter-User Interference Suppression in Time Varying Channels Open Access

    Tatsuhiko IWAKUNI  Kazuki MARUTA  Atsushi OHTA  Yushi SHIRATO  Takuto ARAI  Masataka IIZUKA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2016/11/21
      Page(s):
    865-873

    This paper proposes a null-space expansion scheme for multiuser massive MIMO transmission in order to suppress inter-user interference (IUI) triggered by the temporal variation of the channel. The downlink multiuser MIMO channel capacity of time varying channels is severely degraded since IUI must be suppressed at the transmitter side by using past estimated channel state information at the transmitter side (CSIT). Massive MIMO has emerged as one of the most promising technologies for further capacity enhancement by increasing the number of base station (BS) antenna elements. Exploiting the excess degrees of freedom (DoFs) inherent in massive MIMO, a BS with the proposed IUI suppression scheme performs multiple null-steering for each UE (User Equipment) antenna element, which expands the null-space dimension. Computer simulations show that the proposed scheme has superior IUI suppression performance to the existing channel prediction scheme in time varying channels.

  • MAC Protocol for Improving Throughput and Balancing Uplink/Downlink Throughput for Wireless Local Area Networks with Long Propagation Delays

    Takayuki NISHIO  Kaito FUNABIKI  Masahiro MORIKURA  Koji YAMAMOTO  Daisuke MURAYAMA  Katsuya NAKAHIRA  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2016/11/25
      Page(s):
    874-883

    Long-distance wireless local area networks (WLANs) are the key enablers of wide-area and low-cost access networks in rural areas. In a WLAN, the long propagation delay between an access point (AP) and stations (STAs) significantly degrades the throughput and creates a throughput imbalance because the delay causes unexpected frame collisions. This paper summarizes the problems caused in the medium access control (MAC) mechanism of the WLAN by a long propagation delay. We propose a MAC protocol for solving the delay-induced throughput degradation and the throughput imbalance between the uplink and the downlink in WLANs to address these problems. In the protocol, the AP extends NAV duration of CTS frame to protect an ACK frame and transmits its data frame to avoid delay induced frame collisions by piggybacking on the ACK frame transmission. We also provide a throughput model for the proposed protocol based on the Bianchi model. A numerical analysis using the proposed throughput model and simulation evaluation demonstrate that the proposed protocol increases the system throughput by 150% compared with that obtained using the conventional method, and the uplink throughput can be increased to the same level as the downlink throughput.

  • Optimizing Sensing Scheduling for Cooperative Spectrum Sensing in Cognitive Radio Networks

    Tran-Nhut-Khai HOAN  Vu-Van HIEP  Insoo KOO  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2016/12/01
      Page(s):
    884-892

    In this paper, we consider optimal sensing scheduling for sequential cooperative spectrum sensing (SCSS) technique in cognitive radio networks (CRNs). Activities of primary users (PU) on a primary channel are captured by using a two states discrete time Markov chain process and a soft combination is considered at the FC. Based on the theory of optimal stopping, we propose an algorithm to optimize the cooperative sensing process in which the FC sequentially asks each CU to report its sensing result until the stopping condition that provides the maximum expected throughput for the CRN is satisfied. Simulation result shows that the performance of the proposed scheme can be improved by further shortening the reporting overhead and reducing the probability of false alarm in comparison to other schemes in literature. In addition, the collision ratio on the primary channel is also investigated.

  • A Method for FDOA Estimation with Expansion of RMS Integration Time

    Shangyu ZHANG  Zhen HUANG  Zhenqiang LI  Xinlong XIAO  Dexiu HU  

     
    PAPER-Sensing

      Pubricized:
    2016/11/29
      Page(s):
    893-900

    The measurement accuracy of frequency difference of arrival (FDOA) is usually determinant for emitters location system using rapidly moving receivers. The classic technique of expanding the integration time of the cross ambiguity function (CAF) to achieve better performance of FDOA is likely to incur a significant computational burden especially for wideband signals. In this paper, a nonconsecutive short-time CAF's methods is proposed with expansion of root mean square (RMS) integration time, instead of the integration time, and a factor of estimation precision improvement is given which is relative to the general consecutive method. Furthermore, by analyzing the characteristic of coherent CAF and the influence of FDOA rate, an upper bound of the precision improvement factor is derived. Simulation results are provided to confirm the effectiveness of the proposed method.

  • Seamless Mobile Video Streaming over HTTP/2 with Gradual Quality Transitions

    Hung T. LE  Thang VU  Nam PHAM NGOC  Anh T. PHAM  Truong Cong THANG  

     
    PAPER-Multimedia Systems for Communications

      Pubricized:
    2016/11/16
      Page(s):
    901-909

    HTTP Adaptive Streaming (HAS) has become a popular solution for media delivery over the mobile Internet. However, existing HAS systems are based on the pull-based HTTP/1.1 protocol, leading to high overheads (e.g., in terms of energy, processing, bandwidth) for clients, servers, as well as network nodes. The new HTTP/2 protocol provides a server push feature, which allows the client to receive more than one video segment for each request in order to reduce request-related overheads. In this study, we propose an adaptation method to leverage the push feature of HTTP/2. Our method takes into account not only the request-related overhead but also buffer stability and gradual transitions. The experimental results show that our proposed method performs well under strong throughput variations of mobile networks.