The fifth-generation (5G) and beyond standards are being challenged by the diverse requirements of modern use cases. Multicarrier modulation techniques are one of the key components of the physical layer (PHY) design,...
详细信息
The fifth-generation (5G) and beyond standards are being challenged by the diverse requirements of modern use cases. Multicarrier modulation techniques are one of the key components of the physical layer (PHY) design, which has immense potential to improve efficiency and reliability. In current state-of-the-art wireless technologies (i.e., NR and IEEE 802.11ax) orthogonal frequency division multiplexing (OFDM) is used which has many disadvantages such as peak-to-average power ratio (PAPR), out-of-band emission (OOBE), and sensitivity to carrier frequency offset (CFO). To overcome these drawbacks several alternate multicarrier modulation techniques are being considered, such as discrete Fourier transform-spread-OFDM (DFT-s-OFDM), generalized frequency division multiplexing (GFDM), and orthogonal time-frequency space (OTFS). In this paper, we develop the physical layer abstraction (PLA) of these candidate multicarrier techniques to evaluate their performance under various use cases and scenarios. The PLA is a commonly used technique to avoid time-consuming PHY simulations in system-level simulators. To improve the accuracy of PLA in different fading conditions, we derive a fitting parameter as a function of the received signal-to-interference-plus-noise ratio (SINR) variance. The validation results show that performance can be accurately estimated through the proposed multicarrier PLA. Moreover, PLA techniques are at least thousands of times faster compared to PHY simulations.
The multi-connectivity is a key enabler for ultra-reliable low-latency communications. To evaluate its performance and suitability to various use cases system-level studies are essential, where the physical layer (PHY...
详细信息
The multi-connectivity is a key enabler for ultra-reliable low-latency communications. To evaluate its performance and suitability to various use cases system-level studies are essential, where the physical layer (PHY) plays an important role. Therefore, PHY modeling is required which is time-intensive and requires highly complex computations. For this purpose, the PHY performance is usually abstracted in terms of signal-to-interference-plus-noise ratio (SINR), also known as physical layer abstraction (PLA). However, due to fading, the symbols inside a packet could have different SINRs which require effective SINR mapping to compute an equivalent SINR. In the context of multi-connectivity, the received SINR depends on all connected links where each link experiences independent fading and on the used link combining technique. As a result, the computation of effective SINR also depends on the combining technique and fading experienced by individual links. To model PHY performance by considering all these effects, we develop PLA for multi-connectivity communications. This includes the computation of received symbols SINR for various link combining techniques and mapping them to effective SINR using enhanced exponential effective SINR mapping (eEESM). Furthermore, a new optimization method is introduced for eEESM to reduce its optimization complexity. Simulation results show that the proposed PLA accurately estimate the performance of different order of multi-connectivity communications under various fading conditions.
Due to the insensitive blocking effect on frequency equipment, the current effect evaluation model based on the third-order power series expansion is disabled to the insensitive blocking effect evaluation under multi-...
详细信息
Due to the insensitive blocking effect on frequency equipment, the current effect evaluation model based on the third-order power series expansion is disabled to the insensitive blocking effect evaluation under multi-frequency electromagnetic radiation. We adopt the fifth-order power series expansion to analyze the insensitive blocking interference effect. In addition to revealing the mechanism of the insensitive blocking effect under multi-frequency electromagnetic radiation, we also build an improved effect evaluation model in this research. It defines the effect evaluation index. Subsequently, a ranging radar and a communication radio station are employed to verify the effectiveness of the proposed effect evaluation model separately. The results show that the proposed model can be applied to the electromagnetic radiation effect evaluation, regardless of whether the multi-frequency insensitive jamming effect exists on tested equipment or not. All effect evaluation indexes of the new model are smaller than that of the previous model based on the third-order power series expansion method. The absolute value of relative errors could be less than 1 dB. Not only is the theoretical analysis result of the multi-frequency insensitive blocking effect mechanism verified, but also the problem of poor universality of the current electromagnetic radiation effect evaluation model is figured out.
In this paper, the optimal disturbance suppression problem of disturbed underwater vehicle with state delay is studied. Firstly, we establish the mathematical model of the motion of the disturbed underwater vehicle an...
详细信息
In this paper, the optimal disturbance suppression problem of disturbed underwater vehicle with state delay is studied. Firstly, we establish the mathematical model of the motion of the disturbed underwater vehicle and linearize it. Secondly, the mathematical model with state delay is transformed into a formal mathematical model without time-delay by using the no time-delay transformation method. Then, according to the optimal control theory, the optimal disturbance suppression control law of the disturbed underwater vehicle with state delay is designed based on the quadratic performance index. This control law can be obtained by solving the Riccati matrix equation and Sylvester matrix equation. Finally, the effectiveness of the method is verified by an AUV system simulation example.
This paper addresses the problems of both authentication and privacy in a Non-Orthogonal Multiple Access (NOMA) system by using a privacy-preserving Physical-Layer Authentication (PLA) scheme. The prior scheme has the...
详细信息
This paper addresses the problems of both authentication and privacy in a Non-Orthogonal Multiple Access (NOMA) system by using a privacy-preserving Physical-Layer Authentication (PLA) scheme. The prior scheme has the following limitations: no privacy, low authentication performance, management problem of different secret keys, and constraint to the two-user scenario. In this paper, we propose two privacy-preserving PLA schemes: the Privacy-Preserving PLA (PP-PLA) scheme and the Enhanced Privacy-Preserving PLA (EPP-PLA) scheme, which improve both the privacy and authentication performance as compared to the prior scheme. The fundamental difference between the EPP-PLA and PP-PLA schemes is how to encrypt the source message of a certain user while the other operations of the two proposed schemes keep the same. We provide the theoretical analysis of the proposed schemes in terms of robustness, compatibility, privacy, and security, and derive their closed-form expressions. Moreover, we provide the theoretical comparisons between the proposed schemes and the prior scheme. We optimize the parameters of the proposed schemes to achieve both message-rate fairness and authentication-accuracy fairness. We implement the proposed schemes and conduct extensive performance comparisons through simulations. Experimental results show that the theoretical results perfectly match the corresponding simulation results. Specifically, we take the second user, acting as an administrator for a NOMA system with three users, as an example, where SNR = 16 dB. In comparison with the prior scheme, both proposed schemes have the same compatibility, whereas they improve the robustness by 4.72%. Moreover, the EPP-PLA and PP-PLA schemes improve the security by 32.8%, whereas they improve the privacy by 3000.75% and 1000.75%, respectively.
This paper concerns the problem of improving compatibility in the tag-based Physical-Layer Authentication (PLA) without sacrificing robustness of the PLA schemes. The prior PLA schemes for improving compatibility ofte...
详细信息
This paper concerns the problem of improving compatibility in the tag-based Physical-Layer Authentication (PLA) without sacrificing robustness of the PLA schemes. The prior PLA schemes for improving compatibility often sacrifice robustness or introduce extra communication overhead and security vulnerabilities. The main objective of our approach is to reduce the modification ratio of the source message given the tag length via an encoding approach. Based on a tag-encoding function, we propose two encoded tag-based schemes for the scenario of a single block and the scenario of multiple blocks, respectively, which are named as the Encoded Tag-based PLA scheme for Single Block (ET-SB) and the Encoded Tag-based PLA scheme for Multiple Blocks (ET-MB), respectively. We theoretically analyze the performance of the proposed schemes over fading channels and derive the closed-form expressions of the performance analyses. We implement the proposed schemes and conduct extensive performance comparisons through simulations. Our simulation results show that the closed-form expressions of the theoretical results of the proposed schemes perfectly match the corresponding simulation results. When the SNR is 10 dB, the compatibility of the ET-SB and ET-MB schemes improves to 15.63% and 23.45%, respectively, compared to the prior scheme.
This study presents capacitive-type inclinometers composed of flexible polymer pillars and dome-shaped roof frames that were manufactured using the three-dimensional (3D) printing method. Polylactic acid (PLA) filamen...
详细信息
This study presents capacitive-type inclinometers composed of flexible polymer pillars and dome-shaped roof frames that were manufactured using the three-dimensional (3D) printing method. Polylactic acid (PLA) filaments and acrylonitrile butadiene styrene (ABS) filaments were printed by the fused deposition modeling type 3D printer to fabricate the dome-shaped roof frames and the polymer curing molds, respectively. The operating principle of the inclinometer was to detect the change in capacitance between the helix-shaped electrode coiled around the polymer pillar and the built-in electrode in the roof frame. When the inclinometer was tilted, the polymer pillar was bent, and the physical distance between each electrode was changed with respect to the tilt angle and direction. Therefore, the tilt angles and directions were simultaneously estimated by distinguishing the capacitance and peak capacitance, respectively. The results of the experiments revealed that the inclinometer using the polymer pillar that was electrically connected to a standard weight and the roof frame with a roof angle of 45 degrees exhibited a higher sensitivity (1.391 pF at a tilt angle of 40 degrees) compared to those using roof angles of 90 degrees and 135 degrees. This study supports the use of 3D printing technology for the facile manufacturing of inclinometers that can detect tilt angles and directions simultaneously, which is not achievable with conventional inclinometers.
Software engineering uses models throughout most phases of the development process. Models are defined using modelling languages. To make these languages applicable to a wider set of scenarios and customizable to spec...
详细信息
Software engineering uses models throughout most phases of the development process. Models are defined using modelling languages. To make these languages applicable to a wider set of scenarios and customizable to specific needs, researchers have proposed using product lines to specify modelling language variants. However, there is currently a lack of efficient techniques for ensuring correctness with respect to properties of the models accepted by a set of language variants. This may prevent detecting problematic combinations of language variants that produce undesired effects at the model level. To attack this problem, we first present a classification of instantiability properties for language product lines. Then, we propose a novel approach to lifting the satisfiability checking of model properties of individual language variants, to the product line level. Finally, we report on an implementation of our proposal in the Merlin tool, and demonstrate the efficiency gains of our lifted analysis method compared to an enumerative analysis of each individual language variant.
Counterfeit drugs are rife across developing nations, production, and trade of these substandard and fake drugs for monetary benefit imperils thousands of innocent lives and puts extra stress on the already struggling...
详细信息
Counterfeit drugs are rife across developing nations, production, and trade of these substandard and fake drugs for monetary benefit imperils thousands of innocent lives and puts extra stress on the already struggling health-care system of populous countries. Methods like printing of anti-counterfeit labels with holograms and QR codes partially solve the issue by tracking and eliminating forged packagings. However, ingredient-based testing is inevitable for quality checks, especially when the contents and their respective concentrations are to be analyzed. Ingredient analysis mostly includes techniques like infrared and Raman spectroscopy, isotope characterization, and mass spectrometry. We used microwave cavity perturbation with 3-D printed sample holders for instant detection of counterfeits in a variety of drugs. The method is based on the screening of samples through dielectric measurements. The applicability of the proposed method was tested and verified on the genuine and counterfeited samples of capsulated oral drugs, tablets, gel-based antibiotics, and pain relief tubes.
GEA-1 and its successor GEA-2 are two stream ciphers, designed to protect against eavesdropping General Packet Radio Service (GPRS) between the phone and the base station. They were widely used for GPRS encryption in ...
详细信息
GEA-1 and its successor GEA-2 are two stream ciphers, designed to protect against eavesdropping General Packet Radio Service (GPRS) between the phone and the base station. They were widely used for GPRS encryption in the late 1990s and during the 2000s, and are surprisingly still supported in a range of current mobile phones. In this paper, new key recovery attacks on GEA-1 and GEA-2 are proposed by combining with the time-memory trade-off technique. The new attacks significantly reduce the time and memory costs of the previous attacks on GEA-1, and show that GEA-1 only offers 32-bit (out of 64) security. Furthermore, the slide properties of GEA-1 and GEA-2 are first found and used to explore practical related key attacks. The results show that GEA-1 and GEA-2 can be broken on a common PC within about 0.81 and 6.2 seconds in the multiple related key setting, respectively. Finally, an improved variant of GEA-2 called GEA-2a is proposed. The reasons for making the changes from GEA-2 are explained in detail, which indicates that GEA-2a has significantly better resistance than GEA-2 against all known attacks and can offer 64-bit security.
暂无评论