Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 12 )

2018 ( 54 )

2017 ( 50 )

2016 ( 54 )

Custom range...

Search Results: 1 - 10 of 3278 matches for " Suzhi Bi "
All listed articles are free for downloading (OA Articles)
Page 1 /3278
Display every page Item
Wireless Power Charging Control in Multiuser Broadband Networks
Suzhi Bi,Rui Zhang
Computer Science , 2015,
Abstract: Recent advances in wireless power transfer (WPT) technology provide a cost-effective solution to charge wireless devices remotely without disruption to the use. In this paper, we propose an efficient wireless charging control method for exploiting the frequency diversity in multiuser broadband wireless networks, to reduce energy outage and keep the system operating in an efficient and sustainable state. In particular, we first analyze the impact of charging control method to the operating lifetime of a WPT-enabled broadband system. Based on the analysis, we then propose a multi-criteria charging control policy that optimizes the transmit power allocation over frequency by jointly considering the channel state information (CSI) and the battery state information (BSI) of wireless devices. For practical implementation, the proposed scheme is realized by a novel limited CSI estimation mechanism embedded with partial BSI, which significantly reduces the energy cost of CSI and BSI feedback. Simulation results show that the proposed method could significantly increase the network lifetime under stringent transmit power constraint. Reciprocally, it also consumes lower transmit power to achieve near-perpetual network operation than other single-criterion based charging control methods.
Placement Optimization of Energy and Information Access Points in Wireless Powered Communication Networks
Suzhi Bi,Rui Zhang
Computer Science , 2015,
Abstract: The applications of wireless power transfer technology to wireless communications can help build a wireless powered communication network (WPCN) with more reliable and sustainable power supply compared to the conventional battery-powered network. However, due to the fundamental differences in wireless information and power transmissions, many important aspects of conventional battery-powered wireless communication networks need to be redesigned for efficient operations of WPCNs. In this paper, we study the placement optimization of energy and information access points in WPCNs, where the wireless devices (WDs) harvest the radio frequency energy transferred by dedicated energy nodes (ENs) in the downlink, and use the harvested energy to transmit data to information access points (APs) in the uplink. In particular, we are interested in minimizing the network deployment cost with minimum number of ENs and APs by optimizing their locations, while satisfying the energy harvesting and communication performance requirements of the WDs. Specifically, we first study the minimum-cost placement problem when the ENs and APs are separately located, where an alternating optimization method is proposed to jointly optimize the locations of ENs and APs. Then, we study the placement optimization when each pair of EN and AP are co-located and integrated as a hybrid access point, and propose an efficient algorithm to solve this problem. Simulation results show that the proposed methods can effectively reduce the network deployment cost and yet guarantee the given performance requirements, which is a key consideration in the future applications of WPCNs.
Maneuvering Target Doppler-Bearing Tracking with Signal Time Delay Using Interacting Multiple Model Algorithms
Suzhi Bi;Xiao Yi Ren
PIER , 2008, DOI: 10.2528/PIER08091501
Abstract: For maneuvering target Doppler-bearing tracking with signal time delay, a novel approach called ISE-IMM is proposed in this paper. The iterative state estimation (ISE) method is designed to eliminate the negative influence of time delay effect and an interacting multiple model (IMM) filter is embedded to estimate the state according to the measurements of the delayed signal. The nonlinear filter preferred in this paper is a particle filter (PF) with an improved resampling procedure. Performance of our proposed method is evaluated in Monte Carlo simulations. Results show the effectiveness and stability of ISE-IMM-PF in combating the negative effect of signal time delay.
TDMA Achieves the Optimal Diversity Gain in Relay-Assisted Cellular Networks
Suzhi Bi,Ying Jun,Zhang
Computer Science , 2011,
Abstract: In multi-access wireless networks, transmission scheduling is a key component that determines the efficiency and fairness of wireless spectrum allocation. At one extreme, greedy opportunistic scheduling that allocates airtime to the user with the largest instantaneous channel gain achieves the optimal spectrum efficiency and transmission reliability but the poorest user-level fairness. At the other extreme, fixed TDMA scheduling achieves the fairest airtime allocation but the lowest spectrum efficiency and transmission reliability. To balance the two competing objectives, extensive research efforts have been spent on designing opportunistic scheduling schemes that reach certain tradeoff points between the two extremes. In this paper and in contrast to the conventional wisdom, we find that in relay-assisted cellular networks, fixed TDMA achieves the same optimal diversity gain as greedy opportunistic scheduling. In addition, by incorporating very limited opportunism, a simple relaxed-TDMA scheme asymptotically achieves the same optimal system reliability in terms of outage probability as greedy opportunistic scheduling. This reveals a surprising fact: transmission reliability and user fairness are no longer contradicting each other in relay-assisted systems. They can be both achieved by the simple TDMA schemes. For practical implementations, we further propose a fully distributed algorithm to implement the relaxed-TDMA scheme. Our results here may find applications in the design of next-generation wireless communication systems with relay architectures such as LTE-advanced and WiMAX.
The Cost of Mitigating Power Law Delay in Random Access Networks
Suzhi Bi,Ying Jun Zhang
Computer Science , 2012,
Abstract: Exponential backoff (EB) is a widely adopted collision resolution mechanism in many popular random-access networks including Ethernet and wireless LAN (WLAN). The prominence of EB is primarily attributed to its asymptotic throughput stability, which ensures a non-zero throughput even when the number of users in the network goes to infinity. Recent studies, however, show that EB is fundamentally unsuitable for applications that are sensitive to large delay and delay jitters, as it induces divergent second- and higher-order moments of medium access delay. Essentially, the medium access delay follows a power law distribution, a subclass of heavy-tailed distribution. To understand and alleviate the issue, this paper systematically analyzes the tail delay distribution of general backoff functions, with EB being a special case. In particular, we establish a tradeoff between the tail decaying rate of medium access delay distribution and the stability of throughput. To be more specific, convergent delay moments are attainable only when the backoff functions $g(k)$ grows slower than exponential functions, i.e., when $g(k)\in o(r^k)$ for all $r>1$. On the other hand, non-zero asymptotic throughput is attainable only when backoff functions grow at least as fast as an exponential function, i.e., $g(k)\in\Omega(r^k)$ for some $r>1$. This implies that bounded delay moments and stable throughput cannot be achieved at the same time. For practical implementation, we show that polynomial backoff (PB), where $g(k)$ is a polynomial that grows slower than exponential functions, obtains finite delay moments and good throughput performance at the same time within a practical range of user population. This makes PB a better alternative than EB for multimedia applications with stringent delay requirements.
Graphical Methods for Defense Against False-data Injection Attacks on Power System State Estimation
Suzhi Bi,Ying Jun,Zhang
Computer Science , 2013,
Abstract: The normal operation of power system relies on accurate state estimation that faithfully reflects the physical aspects of the electrical power grids. However, recent research shows that carefully synthesized false-data injection attacks can bypass the security system and introduce arbitrary errors to state estimates. In this paper, we use graphical methods to study defending mechanisms against false-data injection attacks on power system state estimation. By securing carefully selected meter measurements, no false data injection attack can be launched to compromise any set of state variables. We characterize the optimal protection problem, which protects the state variables with minimum number of measurements, as a variant Steiner tree problem in a graph. Based on the graphical characterization, we propose both exact and reduced-complexity approximation algorithms. In particular, we show that the proposed tree-pruning based approximation algorithm significantly reduces computational complexity, while yielding negligible performance degradation compared with the optimal algorithms. The advantageous performance of the proposed defending mechanisms is verified in IEEE standard power system testcases.
Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation
Suzhi Bi,Ying Jun,Zhang
Computer Science , 2014,
Abstract: Accurate state estimation is of paramount importance to maintain the power system operating in a secure and efficient state. The recently identified coordinated data injection attacks to meter measurements can bypass the current security system and introduce errors to the state estimates. The conventional wisdom to mitigate such attacks is by securing meter measurements to evade malicious injections. In this paper, we provide a novel alternative to defend against false-data injection attacks using covert power network topological information. By keeping the exact reactance of a set of transmission lines from attackers, no false data injection attack can be launched to compromise any set of state variables. We first investigate from the attackers' perspective the necessary condition to perform injection attack. Based on the arguments, we characterize the optimal protection problem, which protects the state variables with minimum cost, as a well-studied Steiner tree problem in a graph. Besides, we also propose a mixed defending strategy that jointly considers the use of covert topological information and secure meter measurements when either method alone is costly or unable to achieve the protection objective. A mixed integer linear programming (MILP) formulation is introduced to obtain the optimal mixed defending strategy. To tackle the NP-hardness of the problem, a tree pruning-based heuristic is further presented to produce an approximate solution in polynomial time. The advantageous performance of the proposed defending mechanisms is verified in IEEE standard power system testcases.
Joint Power Control and Fronthaul Rate Allocation for Throughput Maximization in OFDMA-based Cloud Radio Access Network
Liu Liang,Suzhi Bi,Rui Zhang
Mathematics , 2014,
Abstract: The performance of cloud radio access network (C-RAN) is constrained by the limited fronthaul link capacity under future heavy data traffic. To tackle this problem, extensive efforts have been devoted to design efficient signal quantization/compression techniques in the fronthaul to maximize the network throughput. However, most of the previous results are based on information-theoretical quantization methods, which are hard to implement due to the extremely high complexity. In this paper, we consider using practical uniform scalar quantization in the uplink communication of an orthogonal frequency division multiple access (OFDMA) based C-RAN system, where the mobile users are assigned with orthogonal sub-carriers for multiple access. In particular, we consider joint wireless power control and fronthaul quantization design over the sub-carriers to maximize the system end-to-end throughput. Efficient algorithms are proposed to solve the joint optimization problem when either information-theoretical or practical fronthaul quantization method is applied. Interestingly, we find that the fronthaul capacity constraints have significant impact to the optimal wireless power control policy. As a result, the joint optimization shows significant performance gain compared with either optimizing wireless power control or fronthaul quantization alone. Besides, we also show that the proposed simple uniform quantization scheme performs very close to the throughput performance upper bound, and in fact overlaps with the upper bound when the fronthaul capacity is sufficiently large. Overall, our results would help reveal practically achievable throughput performance of C-RAN, and lead to more efficient deployment of C-RAN in the next-generation wireless communication systems.
Multiuser MIMO Wireless Energy Transfer With Coexisting Opportunistic Communication
Jie Xu,Suzhi Bi,Rui Zhang
Mathematics , 2015,
Abstract: This letter considers spectrum sharing between a primary multiuser multiple-input multiple-output (MIMO) wireless energy transfer (WET) system and a coexisting secondary point-to-point MIMO wireless information transmission (WIT) system, where WET generates interference to WIT and degrades its throughput performance. We show that due to the interference, the WIT system suffers from a loss of the degrees of freedom (DoF) proportional to the number of energy beams sent by the energy transmitter (ET), which, in general, needs to be larger than one in order to optimize the multiuser WET with user fairness consideration. To minimize the DoF loss in WIT, we further propose a new single-beam energy transmission scheme based on the principle of time sharing, where the ET transmits one of the optimal energy beams at each time. This new scheme achieves the same optimal performance for the WET system, and minimizes the impact of its interference to the WIT system.
Pragmatic Physical Layer Encryption for Achieving Perfect Secrecy
Suzhi Bi,Xiaojun Yuan,Ying Jun,Zhang
Computer Science , 2012,
Abstract: Conventionally, secrecy is achieved using cryptographic techniques beyond the physical layer. Recent studies raise the interest of performing encryption within the physical layer by exploiting some unique features of the physical wireless channel. Following this spirit, we present a novel physical layer encryption (PLE) scheme that randomizes the radio signal using a secret key extracted from the wireless channel under the assumption of channel reciprocity. Specifically, we propose to jointly design the encryption function and the secret-key generation method. On one hand, we establish a sufficient and necessary condition for the encryption function to achieve perfect secrecy. Based on that, several candidate encryption functions are proposed and compared. We show that, given the secret key available to the legitimate users, perfect secrecy can be achieved without compromising the capability of the communication channel. On the other hand, we study the practical design of the secret-key generation method based on the channel reciprocity. We show that, by introducing marginal system overhead, the key agreement between the legitimate users can be done with a high success probability. The performance advantages of the proposed PLE method is verified through comparisons against other existing PLE methods.
Page 1 /3278
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.