33 research outputs found
Achieving full diversity in multi-antenna two-way relay networks via symbol-based physical-layer network coding
This paper considers physical-layer network coding (PNC) with M-ary phase-shift keying (MPSK) modulation in two-way relay channel (TWRC). A low complexity detection technique, termed symbol-based PNC (SPNC), is proposed for the relay. In particular, attributing to the outer product operation imposed on the superposed MPSK signals at the relay, SPNC obtains the network-coded symbol (NCS) straightforwardly without having to detect individual symbols separately. Unlike the optimal multi-user detector (MUD) which searches over the combinations of all users’ modulation constellations, SPNC searches over only one modulation constellation, thus simplifies the NCS detection. Despite the reduced complexity, SPNC achieves full diversity in multi-antenna relay as the optimal MUD does. Specifically, antenna selection based SPNC (AS-SPNC) scheme and signal combining based SPNC (SC-SPNC) scheme are proposed. Our analysis of these two schemes not only confirms their full diversity performance, but also implies when SPNC is applied in multi-antenna relay, TWRC can be viewed as an effective single-input multiple-output (SIMO) system, in which AS-PNC and SC-PNC are equivalent to the general AS scheme and the maximal-ratio combining (MRC) scheme. Moreover, an asymptotic analysis of symbol error rate (SER) is provided for SC-PNC considering the case that the number of relay antennas is sufficiently large
Detecting Byzantine Attacks Without Clean Reference
We consider an amplify-and-forward relay network composed of a source, two
relays, and a destination. In this network, the two relays are untrusted in the
sense that they may perform Byzantine attacks by forwarding altered symbols to
the destination. Note that every symbol received by the destination may be
altered, and hence no clean reference observation is available to the
destination. For this network, we identify a large family of Byzantine attacks
that can be detected in the physical layer. We further investigate how the
channel conditions impact the detection against this family of attacks. In
particular, we prove that all Byzantine attacks in this family can be detected
with asymptotically small miss detection and false alarm probabilities by using
a sufficiently large number of channel observations \emph{if and only if} the
network satisfies a non-manipulability condition. No pre-shared secret or
secret transmission is needed for the detection of these attacks, demonstrating
the value of this physical-layer security technique for counteracting Byzantine
attacks.Comment: 16 pages, 7 figures, accepted to appear on IEEE Transactions on
Information Forensics and Security, July 201
Quantum Lego and XP Stabilizer Codes
We apply the recent graphical framework of ''quantum lego'' to XP stabilizer
codes where the stabilizer group is generally non-abelian. We show that the
idea of operator matching continues to hold for such codes and is sufficient
for generating all their XP symmetries provided the resulting code is XP. We
provide an efficient classical algorithm for tracking these symmetries under
tensor contraction or conjoining. This constitutes a partial extension of the
algorithm implied by Gottesman-Knill theorem beyond Pauli stabilizer states and
Clifford operations. Because conjoining transformations generate quantum
operations that are universal, the XP symmetries obtained from these algorithms
do not uniquely identify the resulting tensors in general. Using this extended
framework, we provide a novel XP stabilizer code with higher distance and a
code with fault-tolerant gate. For XP regular codes, we also
construct a tensor-network-based the maximum likelihood decoder for any i.i.d.
single qubit error channel.Comment: 18 pages, 6 figure
Effect of a Jet Control Device on the Process of Missile and Internal Weapons Bay Separation
To ensure that the missile is safely separated from the internal weapons bay, the jet is used to control the process of missile separation, which is mounted on the front edge of the bay. The length-to-depth ratio of the bay was L/D=8, the diameter of the missile was d1 =0.178 m, the diameter of the jet was d2 =0.05 m . The FLUENT software was combined with our group-developed code under the platform of a user-defined function (UDF) to solve the flow field and the six-degrees-of-freedom (6DOF) of missile. The detached eddy simulation method and dynamic mesh technology were used in the numerical calculations. The boundary condition of missile, bay, and aircraft was no-slip wall condition. The boundary condition of the jet was the pressure-inlet. The pressure far-field boundary was selected as other boundaries. The constraint of the ejection device on the missile was considered. It was found that the jet control device thickens the shear layer, so the shear layer with more gradual velocity gradients, which is beneficial to the separation of missile. The distance between the internal weapons bay and the missile in the positive z-direction with the jet is 1.74 times that without the jet at t=0.5 s. In the case of the jet control device, the pitching angle of the missile ranged from 0.93° to -3.94° , the angular motion range of the missile with the jet is smaller than that without. The jet can make the characteristics of the flow field friendly, and enable the missile to separate from the bay quickly, stably, and safely
Phase-rotation-aided relay selection in two-way decode-and-forward relay networks
This paper proposes a relay selection scheme that aims to improve the end-to-end symbol error rate (SER) performance of a two-way relay network (TWRN). The TWRN consists of two single-antenna sources and multiple relays employing decode-and-forward (DF) protocol. It is shown that the SER performance is determined by the minimum decision distance (DD) observed in the TWRN. However, the minimum DD is likely to be made arbitrarily small by channel fading. To tackle this problem, a phase rotation (PR) aided relay selection (RS) scheme is proposed to enlarge the minium DD, which in turn improves the SER performance. The proposed PR based scheme rotates the phases of the transmitted symbols of one source and of the selected relay according to the channel state information, aiming for increasing all DDs to be above a desired bound. The lower bound is further optimized by using a MaxMin-RS criterion associated with the channel gains. It is demonstrated that the PR aided MaxMin-RS approach achieves full diversity gain and an improved array gain. Furthermore, compared with the existing DF based schemes, the proposed scheme allows more flexible relay antenna configurations
Artificial Intelligence-Based Semantic Internet of Things in a User-Centric Smart City
Smart city (SC) technologies can provide appropriate services according to citizens’ demands. One of the key enablers in a SC is the Internet of Things (IoT) technology, which enables a massive number of devices to connect with each other. However, these devices usually come from different manufacturers with different product standards, which confront interactive control problems. Moreover, these devices will produce large amounts of data, and efficiently analyzing these data for intelligent services. In this paper, we propose a novel artificial intelligence-based semantic IoT (AI-SIoT) hybrid service architecture to integrate heterogeneous IoT devices to support intelligent services. In particular, the proposed architecture is empowered by semantic and AI technologies, which enable flexible connections among heterogeneous devices. The AI technology can support very implement efficient data analysis and make accurate decisions on service provisions in various kinds. Furthermore, we also present several practical use cases of the proposed AI-SIoT architecture and the opportunities and challenges to implement the proposed AI-SIoT for future SCs are also discussed