33 research outputs found

    Achieving full diversity in multi-antenna two-way relay networks via symbol-based physical-layer network coding

    No full text
    This paper considers physical-layer network coding (PNC) with M-ary phase-shift keying (MPSK) modulation in two-way relay channel (TWRC). A low complexity detection technique, termed symbol-based PNC (SPNC), is proposed for the relay. In particular, attributing to the outer product operation imposed on the superposed MPSK signals at the relay, SPNC obtains the network-coded symbol (NCS) straightforwardly without having to detect individual symbols separately. Unlike the optimal multi-user detector (MUD) which searches over the combinations of all users’ modulation constellations, SPNC searches over only one modulation constellation, thus simplifies the NCS detection. Despite the reduced complexity, SPNC achieves full diversity in multi-antenna relay as the optimal MUD does. Specifically, antenna selection based SPNC (AS-SPNC) scheme and signal combining based SPNC (SC-SPNC) scheme are proposed. Our analysis of these two schemes not only confirms their full diversity performance, but also implies when SPNC is applied in multi-antenna relay, TWRC can be viewed as an effective single-input multiple-output (SIMO) system, in which AS-PNC and SC-PNC are equivalent to the general AS scheme and the maximal-ratio combining (MRC) scheme. Moreover, an asymptotic analysis of symbol error rate (SER) is provided for SC-PNC considering the case that the number of relay antennas is sufficiently large

    Detecting Byzantine Attacks Without Clean Reference

    Full text link
    We consider an amplify-and-forward relay network composed of a source, two relays, and a destination. In this network, the two relays are untrusted in the sense that they may perform Byzantine attacks by forwarding altered symbols to the destination. Note that every symbol received by the destination may be altered, and hence no clean reference observation is available to the destination. For this network, we identify a large family of Byzantine attacks that can be detected in the physical layer. We further investigate how the channel conditions impact the detection against this family of attacks. In particular, we prove that all Byzantine attacks in this family can be detected with asymptotically small miss detection and false alarm probabilities by using a sufficiently large number of channel observations \emph{if and only if} the network satisfies a non-manipulability condition. No pre-shared secret or secret transmission is needed for the detection of these attacks, demonstrating the value of this physical-layer security technique for counteracting Byzantine attacks.Comment: 16 pages, 7 figures, accepted to appear on IEEE Transactions on Information Forensics and Security, July 201

    Quantum Lego and XP Stabilizer Codes

    Full text link
    We apply the recent graphical framework of ''quantum lego'' to XP stabilizer codes where the stabilizer group is generally non-abelian. We show that the idea of operator matching continues to hold for such codes and is sufficient for generating all their XP symmetries provided the resulting code is XP. We provide an efficient classical algorithm for tracking these symmetries under tensor contraction or conjoining. This constitutes a partial extension of the algorithm implied by Gottesman-Knill theorem beyond Pauli stabilizer states and Clifford operations. Because conjoining transformations generate quantum operations that are universal, the XP symmetries obtained from these algorithms do not uniquely identify the resulting tensors in general. Using this extended framework, we provide a novel XP stabilizer code with higher distance and a [[8,1,2]][[8,1,2]] code with fault-tolerant TT gate. For XP regular codes, we also construct a tensor-network-based the maximum likelihood decoder for any i.i.d. single qubit error channel.Comment: 18 pages, 6 figure

    Effect of a Jet Control Device on the Process of Missile and Internal Weapons Bay Separation

    Get PDF
    To ensure that the missile is safely separated from the internal weapons bay, the jet is used to control the process of missile separation, which is mounted on the front edge of the bay. The length-to-depth ratio of the bay was L/D=8, the diameter of the missile was d1 =0.178 m, the diameter of the jet was d2 =0.05 m . The FLUENT software was combined with our group-developed code under the platform of a user-defined function (UDF) to solve the flow field and the six-degrees-of-freedom (6DOF) of missile. The detached eddy simulation method and dynamic mesh technology were used in the numerical calculations. The boundary condition of missile, bay, and aircraft was no-slip wall condition. The boundary condition of the jet was the pressure-inlet. The pressure far-field boundary was selected as other boundaries. The constraint of the ejection device on the missile was considered. It was found that the jet control device thickens the shear layer, so the shear layer with more gradual velocity gradients, which is beneficial to the separation of missile. The distance between the internal weapons bay and the missile in the positive z-direction with the jet is 1.74 times that without the jet at t=0.5 s. In the case of the jet control device, the pitching angle of the missile ranged from 0.93° to -3.94° , the angular motion range of the missile with the jet is smaller than that without. The jet can make the characteristics of the flow field friendly, and enable the missile to separate from the bay quickly, stably, and safely

    Phase-rotation-aided relay selection in two-way decode-and-forward relay networks

    No full text
    This paper proposes a relay selection scheme that aims to improve the end-to-end symbol error rate (SER) performance of a two-way relay network (TWRN). The TWRN consists of two single-antenna sources and multiple relays employing decode-and-forward (DF) protocol. It is shown that the SER performance is determined by the minimum decision distance (DD) observed in the TWRN. However, the minimum DD is likely to be made arbitrarily small by channel fading. To tackle this problem, a phase rotation (PR) aided relay selection (RS) scheme is proposed to enlarge the minium DD, which in turn improves the SER performance. The proposed PR based scheme rotates the phases of the transmitted symbols of one source and of the selected relay according to the channel state information, aiming for increasing all DDs to be above a desired bound. The lower bound is further optimized by using a MaxMin-RS criterion associated with the channel gains. It is demonstrated that the PR aided MaxMin-RS approach achieves full diversity gain and an improved array gain. Furthermore, compared with the existing DF based schemes, the proposed scheme allows more flexible relay antenna configurations

    Artificial Intelligence-Based Semantic Internet of Things in a User-Centric Smart City

    No full text
    Smart city (SC) technologies can provide appropriate services according to citizens’ demands. One of the key enablers in a SC is the Internet of Things (IoT) technology, which enables a massive number of devices to connect with each other. However, these devices usually come from different manufacturers with different product standards, which confront interactive control problems. Moreover, these devices will produce large amounts of data, and efficiently analyzing these data for intelligent services. In this paper, we propose a novel artificial intelligence-based semantic IoT (AI-SIoT) hybrid service architecture to integrate heterogeneous IoT devices to support intelligent services. In particular, the proposed architecture is empowered by semantic and AI technologies, which enable flexible connections among heterogeneous devices. The AI technology can support very implement efficient data analysis and make accurate decisions on service provisions in various kinds. Furthermore, we also present several practical use cases of the proposed AI-SIoT architecture and the opportunities and challenges to implement the proposed AI-SIoT for future SCs are also discussed
    corecore