首页期刊导航|Eurasip Journal on Wireless Communications and Networking
期刊信息/Journal information
Eurasip Journal on Wireless Communications and Networking
Springer
Eurasip Journal on Wireless Communications and Networking

Springer

1687-1472

Eurasip Journal on Wireless Communications and Networking/Journal Eurasip Journal on Wireless Communications and NetworkingEIISTPSCI
正式出版
收录年代

    Parametric codebook design for efficient signal transmission using uniform circular arrays

    Shin JunsikSuh JunyeubPark SangchunSung Wonjin...
    18页
    查看更多>>摘要:Abstract In order to improve the quality of the received signal and system spectral efficiency, accurate beamforming using a given antenna array is essential for multiple-input multiple-output (MIMO) systems. To obtain desired MIMO transmission performance, construction of codebooks which are composed of matching beamforming vectors to the array structure is important. To effectively cover different types of mobile traffic, the base station for 5G new radio employs antenna arrays in various sizes and shapes. Nevertheless, the codebooks adopted by the 3GPP standard so far are based on the uniform linear array and the uniform planar array, necessitating design techniques for a wider class of antenna arrays. In this paper, we propose codebook construction methods for the uniform circular array with parameters to flexibly set the initial phase and step size based on the channel characteristics of the user equipment (UE). When tested over the 3GPP spatial channel model, the proposed codebooks show a substantial amount of gain over the conventional codebooks in all UE locations within the cell.

    Research on college English teaching based on data mining technology

    Duan JinhuiGao Rui
    12页
    查看更多>>摘要:Abstract To improve the efficiency and quality of college English teaching, we analyzed the feasibility and application process of data mining technology in college English teaching. The entire process of data classification mining was fully realized. A new teaching program was proposed. The object and target of data mining were determined. Online surveys were used to collect data. Data integration, data cleaning, data conversion, data reduction and other pre-processing technologies were adopted. The decision tree was generated by using the C4.5 algorithm, and the pruning was carried out. The result analysis decision tree model was completed. A detailed survey of the students' English learning in University was made in detail. The results showed that the qualified rate of students' English performance was increased from 20–30% to 50–60%. Therefore, the classification rules provide theoretical support for the school teaching decision. This method can improve the quality of English teaching.

    Scalable user selection in FDD massive MIMO

    Zhang XingSabharwal Ashutosh
    18页
    查看更多>>摘要:Abstract User subset selection requires full downlink channel state information to realize effective multi-user beamforming in frequency-division duplexing (FDD) massive multi-input multi-output (MIMO) systems. However, the channel estimation overhead scales with the number of users in FDD systems. In this paper, we propose a novel propagation domain-based user selection scheme, labeled as zero-measurement selection, for FDD massive MIMO systems with the aim of reducing the channel estimation overhead that scales with the number of users. The key idea is to infer downlink user channel norm and inter-user channel correlation from uplink channel in the propagation domain. In zero-measurement selection, the base-station performs downlink user selection before any downlink channel estimation. As a result, the downlink channel estimation overhead for both user selection and beamforming is independent of the total number of users. Then, we evaluate zero-measurement selection with both measured and simulated channels. The results show that zero-measurement selection achieves up to 92.5% weighted sum rate of genie-aided user selection on the average and scales well with both the number of base-station antennas and the number of users. We also employ simulated channels for further performance validation, and the numerical results yield similar observations as the experimental findings.

    An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels

    Lei LeiKaddoum GeorgesChatzinotas SymeonOttersten Bj?rn...
    21页
    查看更多>>摘要:Abstract Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security exploits the characteristics of wireless channels, e.g., fading, noise, interference, etc., to enhance wireless security. It is proved that secure transmission can benefit from fading channels. Accordingly, numerous researchers have explored what fading can offer for physical layer security, especially the investigation of physical layer security over wiretap fading channels. Therefore, this paper aims at reviewing the existing and ongoing research works on this topic. More specifically, we present a classification of research works in terms of the four categories of fading models: (i) small-scale, (ii) large-scale, (iii) composite, and (iv) cascaded. To elaborate these fading models with a generic and flexible tool, three promising candidates, including the mixture gamma (MG), mixture of Gaussian (MoG), and Fox’s H-function distributions, are comprehensively examined and compared. Their advantages and limitations are further demonstrated via security performance metrics, which are designed as vivid indicators to measure how perfect secrecy is ensured. Two clusters of secrecy metrics, namely (i) secrecy outage probability (SOP), and the lower bound of SOP; and (ii) the probability of nonzero secrecy capacity (PNZ), the intercept probability, average secrecy capacity (ASC), and ergodic secrecy capacity, are displayed and, respectively, deployed in passive and active eavesdropping scenarios. Apart from those, revisiting the secrecy enhancement techniques based on Wyner’s wiretap model, the on-off transmission scheme, jamming approach, antenna selection, and security region are discussed.

    Beyond private 5G networks: applications, architectures, operator models and technological enablers

    Maman MickaelCalvanese-Strinati EmilioDinh Lam NgocHaustein Thomas...
    46页
    查看更多>>摘要:Abstract Private networks will play a key role in 5G and beyond to enable smart factories with the required better deployment, operation and flexible usage of available resource and infrastructure. 5G private networks will offer a lean and agile solution to effectively deploy and operate services with stringent and heterogeneous constraints in terms of reliability, latency, re-configurability and re-deployment of resources as well as issues related to governance and ownership of 5G components, and elements. In this paper, we present a novel approach to operator models, specifically targeting 5G and beyond private networks. We apply the proposed operator models to different network architecture options and to a selection of relevant use cases offering mixed private–public network operator governance and ownership. Moreover, several key enabling technologies have been identified for 5G private networks. Before the deployment, stakeholders should consider spectrum allocation and on-site channel measurements in order to fully understand the propagation characteristic of a given environment and to set up end-to-end system parameters. During the deployment, a monitoring tools will support to validate the deployment and to make sure that the end-to-end system meet the target KPI. Finally, some optimization can be made individually for service placement, network slicing and orchestration or jointly at radio access, multi-access edge computing or core network level.

    Mobility-aware personalized service recommendation in mobile edge computing

    Zhang HongxiaDong YanhuiYang Yongjin
    19页
    查看更多>>摘要:Abstract With the proliferation of smartphones and an increasing number of services provisioned by clouds, mobile edge computing (MEC) is emerging as a complementary technology of cloud computing. It could provide cloud resources and services by local mobile edge servers, which are normally nearby users. However, a significant challenge is aroused in MEC because of the mobility of users. User trajectory prediction technologies could be used to cope with this issue, which has already played important roles in service recommendation systems with MEC. Unfortunately, little attention and work have been given in service recommendation systems considering users mobility. Thus, in this paper, we propose a mobility-aware personalized service recommendation (MPSR) approach based on user trajectory and quality of service (QoS) predictions. In the proposed method, users trajectory is firstly discovered by a hybrid long-short memory network. Then, given users trajectories, service QoS is predicted, considering the similarity of different users and different edge servers. Finally, services are recommended by a center trajectory strategy through MPSR. Experimental results on a real dataset show that our proposed approach can outperform the traditional recommendation approaches in terms of accuracy in mobile edge computing.

    Shape?adaptive IRS?based SAG IoT network

    Qi FeiLi WenjingYu PengFeng Lei...
    16页
    查看更多>>摘要:Abstract 6G technology connects physical and digital, and ubiquitous 6G services will provide convenience to users around the world. The concept of the world-earth integrated network is to seamlessly integrate these three subnets to better adapt to future development. This article introduces the world-earth integrated network and shape-adaptive IRS antenna technology. The shape-adaptive IRS antenna described in this article is made of flexible materials, and the physical shape of the antenna can be changed according to different situations, and specific radiation beams can be generated according to functional requirements. And the effectiveness of the shape-adaptive IRS antenna technology has been proven in the simulation results.

    Effective capacity analysis of reconfigurable intelligent surfaces aided NOMA network

    Li GengLiu HuilingHuang GaojianLi Xingwang...
    16页
    查看更多>>摘要:Abstract The future sixth generation (6G) is going to face the significant challenges of massive connections and green communication. Recently, reconfigurable intelligent surfaces (RIS) and non-orthogonal multiple access (NOMA) have been proposed as two key technologies to solve the above problems. Motivated by this fact, we consider a downlink RIS-aided NOMA system, where the source aims to communicate with the two NOMA users via RIS. Considering future network supporting real-time service, we investigate the system performance with the view of effective capacity (EC), which is an important evaluation metric of delay sensitive systems. Specifically, we derive the analytical expressions of the EC of the near and far users. To obtain more useful insights, we deduce the analytical approximation expressions of the EC in the low signal-to-noise-ratio approximation by utilizing Taylor expansion. Moreover, we provide the results of orthogonal multiple access (OMA) for the purpose of comparison. It is found that (1) The number of RIS components and the transmission power of the source have important effects on the performance of the considered system; (2) Compared with OMA, NOMA system has higher EC due to the short transmission time.

    Optimum energy harvesting model for bidirectional cognitive radio networks

    Hasan Mohammad KamrulChowdhury Md. Monwar J.Ahmed ShakilSabuj Saifur R....
    23页
    查看更多>>摘要:Abstract Wireless devices’ energy efficiency and spectrum shortage problem has become a key concern worldwide as the number of wireless devices increases at an unparalleled speed. Wireless energy harvesting technique from traditional radio frequency signals is suitable for extending mobile devices’ battery life. This paper investigates a cognitive radio network model where primary users have their specific licensed band, and secondary users equipped with necessary hardware required for energy harvesting can use the licensed band of the primary user by smart sensing capability. Analytical expressions for considered network metrics, namely data rate, outage probability, and energy efficiency, are derived for uplink and downlink scenarios. In addition, optimal transmission power and energy harvesting power are derived for maximum energy efficiency in downlink and uplink scenarios. Numerical results show that outage probability improves high transmission power in the downlink scenario and high harvested power in the uplink scenario. Finally, the result shows that energy efficiency improves using optimum transmission power and energy harvesting power for downlink and uplink scenarios.

    Using machine learning to find the hidden relationship between RTT and TCP throughput in WiFi

    Chaudhry Aizaz U.
    18页
    查看更多>>摘要:Abstract Is it possible to find hidden relationships among variables in WiFi network using machine learning (ML)? Can we use ML to find a variable that significantly affects the TCP throughput in WiFi? In this work, we employ a publicly available WiFi dataset to investigate these questions. We use ML techniques, including principal component analysis?(PCA), linear regression (LR), and random forest (RF), to study the effect of link speed, received signal strength, round-trip time (RTT), and number of available access points on TCP throughput in WiFi. More specifically, we are interested in employing ML to find the variable that most accurately predicts and thereby most significantly affects the throughput. Simple correlation analysis indicates that a combination of multiple variables is more likely to act as a reasonable predictor of the throughput, whereas a single variable, such as RTT, alone is not likely to predict the throughput with reasonable accuracy. From PCA, the first principal component (PC1) is seen as highly correlated to RTT. During predictive analysis, it is observed that the LR model is unable to find any hidden relationship between throughput and other variables. However, the RF model discovers that RTT explains the variation in throughput more closely and as such it predicts the throughput more accurately compared to other variables. PC1 captures nearly all of the variation in throughput with the RF model and predicts throughput with very high accuracy, which indirectly confirms RTT as the variable that most significantly affects the TCP throughput in WiFi. Consequently, we discover a very close relationship between RTT and TCP throughput using appropriate ML techniques, and these results can be helpful in developing a better understanding of the relationship between latency and throughput for designing future low-latency networks.