Multiple Access Rateless Network Coding for Machine?to?Machine Communications

来源 :ZTE Communications | 被引量 : 0次 | 上传用户:swatsee
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Abstract
  In this paper, we propose a novel multiple access rateless network coding scheme for machine?to?machine (M2M) communications. The presented scheme is capable of increasing transmission efficiency by reducing occupied time slots yet with high decoding success rates. Unlike existing state?of?the?art distributed rateless coding schemes, the proposed rateless network coding can dynamically recode by using simple yet effective XOR operations, which is suitable for M2M erasure networks. Simulation results and analysis demonstrate that the proposed scheme outperforms the existing distributed rateless network coding schemes in the scenario of M2M multicast network with heterogeneous erasure features.
  Keywords
  rateless network coding; multiple accesss; machine?to?machine communications (M2M)
  1 Introduction
  machine?to?machine (M2M) communication system is expected to support a massive number of devices communicating with each other in a fully automated fashion with minimum or without human intervention [1]. Equipped with networked and real?time processing capabilities, these devices can implement a wide range of applications, such as intelligent transportation systems (ITS), healthcare monitoring, smart metering, energy management and smart grids.
  M2M communication system is generally characterized by a massive number of machine?type communication (MTC) devices that have no/low mobility, low computational and storage capabilities, and low power budget [2]. Moreover, most MTC devices suffer from severe congestion and access delay in an M2M system with a large number of devices [3]-[5]. Therefore, the main motivation behind this paper is to propose a coding strategy that exploits the interference in the channel to increase data rates. Our work focuses on the cooperative joint network and coding strategy for MTC devices in multicast settings. These MTC devices disseminate messages to multiple receivers simultaneously with the help of relay nodes.
  The rateless code, originally investigated in [6] for single source broadcasting in a single hop network, is deemed as a milestone for packet erasure codes. It can recover the original k information symbols from any [n=k+O(kln2(kθ))] received coded symbols with the probability 1?θ and the decoding cost of [O(kln(kθ))] of operations, where θ is the allowable failure probability to recover the original message after n coded symbols have been received. In addition, the encoding and decoding process of the rateless code is complex, including logarithmic order for Luby Transform (LT) code and linear order for Raptor code. Furthermore, both LT and Raptor codes are able to provide practical capacity?achieving solutions, if their encoding degree distributions are sophisticated designed [7], [8].   The rateless code has been widely applied in cooperative communications [9]-[13]. In [9], the complexity, delay, and memory of different state?of?the?art rateless coding algorithms are analyzed for a multi?hop network. In [10], a superimposed on?the?fly recoding scheme is performed by each transport node in a multi?hop tree network, but it is difficult to implement due to the high decoding complexity. The first distributed LT (DLT) code is proposed in [11], and a new degree distribution, named deconvolved soliton distribution (DSD) is designed. However, all the source nodes and relays are assumed to have exact information regarding the number of sources and encoding distributions to adapt relaying schemes. In [12], the authors utilized density evolution and linear programming frameworks to find an optimal combination at each relay node for any network architecture consisting of four sources. This manner can achieve the asymptotical error floor, but has intractable calculation complexity. A relaying protocol for Y?networks, namely Soliton?Like Rateless Coding (SLRC), is introduced in [13]. By enabling probabilistic forwarding and combining packets to reduce the overhead between relay and destination, the aggregate distribution at the destination can still maintain a near?ideal distribution, even if one source left the network. However, the lack of buffer utilization in SLRC relay limits the total encoding and decoding overheads.
  The destination cooperation in interference channels is another feature of M2M communication where one device can act as a relay for another device. A cooperative communication scheme for two mobile users is proposed in [4], which is potentially able to receive and decode each other’s messages based on the signal?to?interference?plus?noise ratio (SINR). In [5], The received signal at the destination can be realized as a superposition of coded symbols sent from the relay, which is capacity approaching if an appropriate successive interference cancellation (SIC) is used for decoding [14].
  In this paper, we propose an adaptive rateless network coding scheme in an M2M erasure network. First, an simple degree distribution is designed for rateless coding in all the source devices, and the collided devices transmit simultaneously. Then, an optimal relaying strategy is proposed to forward and combine the encoded packets with appropriate proportions, according to different erasure probabilities over the underlying edges. This is particularly suitable for M2M communications with strict power limitations, especially when the data size is small. By doing this, the total time slot of transmission is reduced obviously while the high decoding success rates are maintained. Moreover, we compared the current typical rateless coding relay schemes with our proposed scheme, with the aspects of the complexity and buffer memory. Simulation results show that the proposed rateless network coding scheme outperforms the existing distributed rateless coding schemes under various erasure probability scenarios.   2 Network Model and Rateless Code
  2.1 Network Model
  In [12] and [13], authors have introduced and optimized the applications of rateless coding in the Y?network model. We attempt to extend the Y?network model to a relay multicast model as shown in Fig. 1a. The relay R multicasts the data streams both to destination nodes D1 and D2 and guarantees the two source data to be recovered. Due to the special feature of rateless coding, the overheads at two destination nodes are apparently the same as the one in the Y?network and accordingly the DLT and SLRC algorithms are also appropriate for the network model in Fig. 1a.
  We also consider a butterfly network model (Fig. 1b), which has two sources, one relay and two destinations. Two direct edges are added to send two separate data streams form S1 and S2 respectively. The encoded packets should be processed (recoding) at R, and they can be converged at both D1 and D2 in the end. The model uses multicast from source to relay and directly from source to destination as well. This is its remarkable difference from the Y?network model. We define the edges in this model as e1 to e6. Each edge has an erasure probability εi, which is described as an independent?identical?distribution (i.i.d) Bernoulli variable. We assume that the packet size and the transmission rate of all the edges are equivalent (one time slot one packet). The rateless coding transmission scheme in this network model is described as follows.
  1) Step 1: S1 and S2 generate the encoded packets with a rateless coding degree distribution [7];
  2) Step 2: S1 multicasts the encoded stream both to R and to D1, and simultaneously, S2 multicasts its stream to R and to D2;
  3) Step 3: R generates a new encoded stream by the relaying network coding (NC) scheme with the received encoded packets and multicasts them to D1 and D2 simultaneously;
  4) Step 4: Once D1 and D2 receive enough encoded packets, they start to decode the encoded packets from the source and relay nodes to recover the two sources original packets;
  5) Step 5: After successful decoding, D1 (D2) transmits a single acknowledgment (ACK) packet indicating the termination of the session.
  2.2 Rateless Coding
  Rateless coding is a modern forward error correction (FEC) technology. It protects from packet?loss, and can reduce the feedbacks for user acknowledgement due to rarely caring about the erasure probability of the channel. In a single?hop scenario, the original packets are defined as k data symbols, and the encoded packets required by the decoder are defined as n encoded symbols. Furthermore, the overhead is defined as [n-kk] and the number of encoded symbols sent by the sender is defined as N. Therefore, the expected code rate at the sender is conveyed as [R=kN=1-εkn], where [ε] is the erasure probability of the channel. On the other hand, the encoding and decoding complexity of rateless codes is very low, which are expressed as O(ln k) for LT codes and O(k) for Raptor codes.   As an example of rateless coding, the LT code uses robust soliton distribution (RSD) to achieve the erasure channel capacity under the single hop network. The coding degree distribution is a key element for the successful recovery of data symbols. For a parameter δ and the length k RSD, μ(k) is defined as:
  [μ(i)=ρ(i)+τ(i)β, for i=1,…,k], (1)
  where
  [ρ(i)=1i, for i=11i(i-1) , for i=2,…,k], (2)
  [τ(i)=Sik, for i=1,…,kS-1Sln(Sδ)k, for i=kS0, for i=kS+1,…,k], (3)
  [β=i=1kμ(i)+τ(i)]. (4)
  S is the average number of degree?one symbols, namely ripple size, which is defined by[S=cln(kδ)k], where c>0.
  It is worth noting that the LT decoder performs the BP algorithm with the prior knowledge of the degree and associated neighbors. Given a block of encoded symbols, the decoder recursively decodes the data symbols from the bipartite graph connecting the information and encoded symbols. The BP algorithm starts from degree?one symbols, by removing their contributions from the graph in order to produce a smaller graph with another set of degree?one encoded symbols. Then, the new degree?one encoded symbols of this smaller graph are removed again, and iteratively the process continues to recover all data symbols, as described in [7] and [8].
  3 Analysis of Relaying Schemes
  As the rateless code is used in multi?source relay network, the erasure probability of different paths (multicast and unicast) may influence the relaying strategy and the corresponding performance with NC. Specifically, the relay R may receive no packet from S1 or S2 in a time slot due to packet loss in multi?source relay network. Hence, it is an interesting and significant topic to select proper rateless coding algorithms based on NC and relaying strategy for efficient transmissions on lossy network. In this section, we try to consider the conventional methods in Y?networks and butterfly networks, and compare their decoding performance at the destination nodes. Moreover, we propose a new optimized ?NC scheme to trade off the decoding performance by selecting proper forwarding and combining probabilities.
  3.1 Comparison of Typical Relaying Schemes
  We assume that the number of original packets is k and the number of encoded packets generated is N at both the source nodes. In two fixed time slots, the destination nodes D1/D2 of butterfly network can receive one encoded packet from S1/S2 in the first slot, and then receive one from the relay R in the second slot. It is a limited condition that D1 and D2 only receive the maximum 2N packets when N encoded packets are sent from the source, if and only if all the edges are lossless. D1 and D2 use the BP decoding algorithm to decode the compilations of two encoded streams after 2N slots to recover 2k original packets, respectively. There are the following four typical relaying schemes in this butterfly network model:   1) Store?and?Forward (SF)
  The relay R immediately forwards the packets to the next hop as soon as it receives packets. If two packets arrive simultaneously, R randomly forwards one of them and stores another into the buffer. If the relay R receives no packet, it waits for the next slot. Due to the uncertain storage of packets, this scheme may easily make congestion on R.
  2) DLT
  With S1 (S2) using DSD, R performs random decision protocol in [11] to combine and forward two received packets. Once the erasure event occurs at one of the edges between sources and relay, R directly forwards another received packet. If no packets arrive, the relay waits for the next slot. These waiting slots at relay lead to low efficiency due to a serious waste of sources. By using considerable low?degree encoded packets, this scheme could scarcely cover all the original packets of two sources, despite of its simple encoding complexity.
  3) SLRC
  With S1 (S2) using RSD, R uses the SLRC relaying scheme to operate the two encoded packets. It forwards most of the low degree packets (degree?one or degree?two) directly and combines other high degree packets, in order to assure the aggregate distribution at destination nodes to be soliton?like. With the SLRC, the transmission time slot is not wasted if the packet on e1 or e2 is dropped, by R’s choosing two packets from the buffers to combine and forward. Compared with the DLT scheme, this SLRC scheme obtains more gains.
  4) eXclusive?OR (XOR)
  This scheme is based on the simple eXclusive?OR (XOR) operation of classic NC in the butterfly model. The relay R combines the two received packets into one new packet. If only one packet arrives, the relay R sends the received packet directly, and if no packet arrives, R waits for the next time slot.
  Since the relay carries the two received packets by forwarding and combining operations, the recoding complexity comes almost from XOR operation which depends mainly on the erasure probability of the edges. In addition, the relay requires two buffers to store the packets from different sources. Therefore, we compare the four schemes (Table 1). We can find that SF has the least recoding complexity, and the complexity of SLRC and DLT depends significantly on their forwarding probability. On the other hand, DLT and XOR need the smallest buffer size of only one packet for each source, while SLRC must store all the packets not forwarded for the next operation.   3.2 Analysis of Decoding Matrix
  In this section, we make an intuitive analysis on recovery performance at the destination nodes by the BP decoding matrix, in which the BP decoding algorithm could be described as one unitization process, with the columns denoting the encoded symbols and the rows denoting the original data symbols.
  We define A and B as the encoding matrix at S1 and S2 respectively, and denote the dimension of the matrix as the subscripts. The decoding matrices at D1 and D2 are the aggregation of the forwarding and combining sub?matrices A and B, with 2k rows due to the number of data symbols from two sources. Since the lost packets have been removed from the matrix, the number of columns reveals the received encoded symbols by destination nodes exactly.
  For the SF scheme, the decoding matrices at D1 and D2 are defined as:
  [FD12k×(1-ε5)N+(1-ε1)+(1-ε2)(1-ε3)N2=AS1k×(1-ε5)NAS1k×(1-ε1)(1-ε3)N2000BS2k×(1-ε2)(1-ε3)N2], (5)
  [FD22k×(1-ε6)N+(1-ε1)+(1-ε2)(1-ε4)N2=0AS1k×(1-ε1)(1-ε4)N20BS2k×(1-ε6)N0BS2k×(1-ε2)(1-ε4)N2]. (6)
  From the matrices [FD1] and [FD2]in (5) and (6), we know that the SF scheme is only appropriate for unicast like source to destination, since the dimensions of sub?matrices for A and B are extremely unequal. The lack of combination operations makes the destination nodes unable to recover the whole data symbols. Therefore, this scheme is inefficient for multicast in the butterfly network model.
  For the SLRC scheme, as an optimized DLT, we only present its decoding matrices that are defined as:
  [HD12k×1-ε5+1-ε3N=AS1k×(1-ε5)NAS1k×ν1(1-ε3)N0AS1k×(1-i=12νi)(1-ε3)N00BS2k×ν2(1-ε3)NBS2k×(1-i=12νi)(1-ε3)N], (7)
  [HD22k×1-ε6+1-ε4N=0AS1k×ν1(1-ε4)N0AS1k×(1-i=12νi)(1-ε4)NBS2k×(1-ε6)N0BS2k×ν2(1-ε4)NBS2k×(1-i=12νi)(1-ε4)N], (8)
  where νi (i=1, 2) is the probability distribution of the relay forwarding packets from S1 and S2, while [νi=1-νi]is the distribution of the packets into the buffer.
  For the XOR Scheme, the decoding matrices are defined as:
  [GD12k×(1-ε5)+Max(1-ε1), (1-ε2)(1-ε3)N=AS1k×(1-ε5)NAS1k×(1-ε1)(1-ε3)N0BS2k×(1-ε2)(1-ε3)N], (9)
  [GD22k×(1-ε6)+Max(1-ε1), (1-ε2)(1-ε4)N=0AS1k×(1-ε1)(1-ε4)NBS2k×(1-ε6)NBS2k×(1-ε2)(1-ε4)N]. (10)
  In (9) and (10), G can be segmented into four sub?matrices: the two parts in the left are the forwarding matrix A or B, and the two right parts are the combined matrices. Since the combined symbols of this scheme may be lack of degree?one and degree?two packets, it needs enough columns of single sub?matrices A or B on the edge e5 or e6 in Fig. 1 to start the BP decoder. In the decoding process, only if all the data symbols of A have been recovered, B can begin to decode.   By comparing these decoding matrices, we can find that the forwarding matrix A or B has occupied such numerous columns in H, as [AS1k×ν1(1-ε3)N] or [BS2k×ν2(1-ε3)N]. The combination part of encoded symbols as A and B [AS1k×(1-i=12νi)(1-ε3)NBS2k×(1-i=12νi)(1-ε3)N]in the SLRC scheme has much less columns than that of [AS1k×(1-ε1)(1-ε3)NBS2k×(1-ε2)(1-ε3)N] in the XOR scheme. SLRC can still recode new packets in the relay to transmit, even if no packets received due to enough large ε1 and ε2. However, it has not fully utilized the packets directly from D1 and D2 on e5 and e6. Note that, only N encoded packets at most could be sent by the sources and relay, which constrains the required time slots to be only 2N in the network model, given one packet at each time slot. It renders that the decoding matrix H has many single forwarding columns in A or B which obviously reduces the relevance of encoded symbols from S1 and S2. As a result, the large proportion of forwarding packets by the relay cannot give much help to improve the BP decoding performance, especially on the condition of the relatively small erasure probability ε5 and ε6.
  On the other hand, when ε5 and ε6 become larger, the decoding performance is mostly decided by the proportion of forwarding the single packets and XOR combination of two sources’ packets in the relay. In the XOR scheme, the number of recovery data symbols would decline very fast due to the lack of low degree encoded symbols for BP decoding. Besides, the XOR operations would be blocked and degraded since two separate packets from two sources could hardly arrive at the relay simultaneously in the large ε5 and ε6.
  3.3 Proposed Optimized NC Scheme
  On the basis of above analysis, we have found that the relaying schemes should forward the low?degree packets for starting BP decoder, by taking into consideration the erasure probabilities of the direct edges e1 and e2. On the other side, the relay also needs to remain the enough proportion of combinations of the packets in the buffers, in order to prevent from no received packets from S1 and S2 simultaneously. Accordingly, we propose a novel NC scheme with a self?adjusted forwarding probability associated with the variations of ε5 and ε6. The basic rule of the proposed scheme is as follows: if ε1 and ε2 increase, the relay immediately forwards more low?degree packets; if ε5 and ε6 decrease, the relay combines more packets.
  The proposed algorithm, named Opt?NC scheme, has the comparable complexity and buffer requirements with the SLRC scheme. We denote the forwarding probabilities λ and θ for encoded packets from S1 and S2, which are predetermined to be equivalent to the erasure probabilities ε5 and ε6, respectively. Algorithm 1 shows the steps of Opt?NC algorithm.   Algorithm 1: Opt?NC Scheme (at one time slot)
  p1: received encoded packets from S1;
  p2: received encoded packets from S2;
  d1: degree of p1;
  d2: degree of p2;
  λ: forwarding probability of the low degree packets from S1;
  θ: forwarding probability of the low degree packets from S2;
  a=rand();
  b=rand();
  if d1=1?2 and d2=1?2 and a<λ and b <θ
  forward p1 or p2 with equal probability;
  put another packet into the buffer of another source;
  else if d1=1?2 and a <λ
  forward p1 and put p2 into the buffer of S2;
  else if d2=1?2 and b <θ
  forward p2 and put p1 into the buffer of S1;
  else
  put the packets received into the buffers respectively;
  pb1: random choose one packet in the buffer of S1;
  pb2: random choose one packet in the buffer of S2;
  pXOR = pb1XOR pb2;
  forward pXOR;
  end if
  * ? means logical operator of OR
  4 Simulation Results and Discussion
  We analyze the performance of the above five algorithms in a butterfly network coding system as Fig. 1b. The encoding degree distribution is selected to be RSD with parameters δ=0.05, c=0.03. The number of data symbols k=100, and the number of encoded symbols from S1 and S2 is indicated to be the same as N. We emulate the encoding and decoding procedure using Monte Carlo experiments with 10,000 times. The ratio between the statistics of decoding failure times and total experiment times is defined as decoding failure rate (DFR). In this work, the lowest displayable DFR in our simulation is 10?4. Given the time slots and erasure probabilities of edges, the lower DFR of relaying schemes means outstanding decoding performance. We give the unicast performance and multicast performance respectively to discuss the influences between the single source and double sources.
  Fig. 2 gives the performance of five schemes in the erasure free network model. We can find that the Opt?NC scheme approaches the unicast and multicast curves of the XOR scheme, which obtain the lowest DFR of 10?4 at 400 time slots. The other schemes need at least 600 time slots to recover two sources’ data, due to their inefficiency of buffer utilization at the relay. This simulation result proves that the Opt?NC scheme can apply as a typical NC scheme to get the remarkable multicast throughput gains in lossless network data transmission.
  With vary erasure probabilities from 0 to 0.8 of all edges among ε1 to ε6, and the code length N=360, the decoding performance of five schemes is shown in Fig. 3 . The unicast results of the schemes reveal the better performance than the multicast results, since the erasure probabilities of ε1, ε2, ε3, ε4 make the combination operations at the relay inappropriate. It is noted that the SLRC, XOR and Opt?NC schemes have similar multicast decoding performance, with the DFR lower than 10?4 and the erasure probability of 0.2. The simulation results indicate that our adaptive Opt?NC scheme integrates the advantages of SLRC and XOR, which also reveals outstanding decoding performance in lossy network.   Fig. 4 shows the DFRs of five schemes with the encoded packets of N=250, ε1 to ε4 null, and ε5 and ε6 from 0.2 to 0.9. Since the multicasts of the SF and DLT are both restricted by the limited number of encoded packets from source, their decoding performance maintains at an inferior level in spite of ε5 and ε6 increasing. On the other side, the multicast DFR performance of XOR and that of Opt?NC are almost consistency with their unicasts. If the erasure probabilities of e5 and e6 are lower than 0.25, the Opt?NC scheme can get the similar DFR with that of the XOR scheme. If ε5 and ε6 increase from 0.25 to 0.9, the Opt?NC scheme outperforms the XOR scheme by its dynamic property. In addition, compared to the SLRC, the Opt?NC scheme also has a better performance as ε5 and ε6 are both lower than 0.45. However, the SLRC gives a lower decoding failure rate as the ε5 and ε6 are both in a range of 0.45 to 0.8. Once the erasure probability increases higher than 0.8 (the edges e5 and e6 are almost interrupted), the Opt?NC scheme approaches SLRC?multicast with a higher efficiency. In a word, the proposed relaying scheme is an adaptive method to compromise the decoding performance of XOR and SLRC.
  5 Conclusions
  In this paper, we have studied rateless network coding applied in machine?to?machine communications for multiple access applications. A novel dynamic relaying scheme Opt?NC was proposed that exploits the forwarding and combining operations to obtain an enhanced decoding performance of the decoder at the destination nodes. The Opt?NC scheme has adaptive capability of responding to the vary erasure probability of direct edges. The simulation results show that the proposed relay scheme performs close to the optimal XOR scheme in lossless and lossy network, respectively. Furthermore, the Opt?NC scheme can be used in the physical layer by incorporating the XOR operation and superposition practical modulations.
  References
  [1] M. Shirvanimoghaddam, Y. Li, and M. Dohler, “Probabilistic rateless multiple access for machine?to?machine communication,” IEEE Transactions on Wireless Communications, vol. 14, no. 6815-6826, Dec. 2015.
  [2] K. Zheng, S. Ou, J. Alonso?Zarate, et al., “Challenges of massive access in highly dense LTE?Advanced networks with machine?to?machine communications,” IEEE Wireless Communications Magazine, vol. 21, no. 3, pp. 12-18, Jun. 2014.
  [3] G. Durisi, T. Koch, and P. Popovski. (2015). “Towards massive, ultra?reliable, and low?latency wireless communication with short packets,” CoRR [Online]. Available: https://arxiv.org/abs/1504. 06526   [4] B. W. Khoueiry and M. R. Soleymani, “A novel destination cooperation scheme in interference channels”, in Proc. IEEE 80th Vehicular Technology Conference (VTC 2014?Fall), Vancouver, Canada, Sept., 2014. doi: 10.1109/VTCFall.2014.6965826.
  [5] M. Shirvanimoghaddam, M. Dohler, and S. J. Johnson. (2016). “Massive multiple access based on superposition raptor codes for M2M communications,” CoRR [Online]. Available: https://arxiv.org/abs/1602.05671
  [6] J. Byers, M. Luby, M. Mitzenmacher, and A. Rege, “A digital fountain approach to reliable distribution of bulk data,” in Proc. ACM SIGCOMM’98, Vancouver, Canada, Jan. 1998, pp. 56-67. doi:10.1145/285237.285258.
  [7] M. Luby, “LT Codes,” in Proc. IEEE Symposium on the Foundations of Computer Science (STOC), Vancouver, Canada, 2002, pp. 271-280.
  [8] A. Shokrollahi, “Raptor Codes,” IEEE Transactions on Information Theory, vol. 52, no. 6, pp. 2551-2567, Jun. 2006. doi: 10.1109/TIT.2006.874390.
  [9] P. Pakzad, C. Fragouli, and A. Shokrollahi, “Coding schemes for line networks,” in Proc. ISIT, Adelaide, Germany, 2005, pp. 1853-1857.
  [10] R. Gummadi and R. S. Sreenivas, “Relaying a fountain code across multiple nodes,” in Proc. SIGCOMM’08, Seattle, USA, 2008, pp. 483-484.
  [11] S. Puducheri, J. Kliewer, and T. E. Fuja, “The design and performance of distributed LT codes,” IEEE Transactions on Information Theory, vol. 53, no. 10, pp. 3740-3754, Oct. 2007.
  [12] D. Sejdinovic, R. Piechocki, and A. Doufexi, “AND?OR tree analysis of distributed LT codes,” in Proc. ITW, Volos, Greece, 2009, pp. 261-265.
  [13] A. Liau, S. Yousefi, and I. Kim, “Binary soliton?like rateless coding for the Y?network,” IEEE Transactions on Communications, vol. 59, no. 12, pp. 3217-3222, Dec. 2011.
  [14] R. Abbas, M. Shirvanimoghaddam, Y. Li, and B. Vucetic, “On SINR?based random multiple access using codes on graph,” in IEEE Global Communications Conference (GLOBECOM), San Diego, USA, 2015. doi: 10.1109/GLOCOM.2015.7417013.
  Manuscritp received: 2016?07?14
  Biographies
  JIAO Jian (jiaojian@hitsz.edu.cn) received his PhD degree in communication engineering from Harbin Institute of Technology (HIT) in 2011. He received his BS degree in electrical engineering from Harbin Engineering University in 2005, and his MASc degree in information and communication engineering from HIT Shenzhen Graduate School in 2007. He is an assistant research fellow in the Department of Electrical and Information Engineering of HIT Shenzhen Graduate School. His current interests include deep space communications, networking and channel coding.   Rana Abbas (rana.abbas@sydney.edu.au) is currently a PhD student at the Centre of Excellence in Telecommunications, School of Electrical And Information Engineering, The University Sydney, Australia, where she is a recipient of the Australian Postgraduate Awards scholarship and the Norman 1 Price scholarship. She received her bachelor’s degree in electrical engineering from The University of Balamand, Lebanon in 2012 and her master’s degree in electrical engineering from The University of Sydney, Australia in 2013. Her research interests include error control codes, machine?to?machine communications, random multiple access, and cooperative networks.
  LI Yonghui (yonghui.li@sydney.edu.au) received his PhD degree in 2002 from Beijing University of Aeronautics and Astronautics. From 1999 to 2003 he was affiliated with Linkair Communication Inc., where he held the position of project manager with responsibility for the design of physical layer solutions for LAS?CDMA system. Since 2003 he has been with the Centre of Excellence in Telecommunications, the University of Sydney, Australia. He is now an associate professor at the School of Electrical and Information Engineering, University of Sydney. He is the recipient of the Australian Queen Elizabeth II Fellowship in 2008 and the Australian Future Fellowship in 2012. His current research interests are in the area of wireless communications, with a particular focus on MIMO, cooperative communications, coding techniques, and wireless sensor networks. He holds a number of patents granted and pending in these fields. He is an executive editor for European Transactions on Telecommunications (ETT). He received best paper awards at the IEEE International Conference on Communications (ICC) 2014 and the IEEE Wireless Days Conferences (WD) 2014.
  ZHANG Qinyu (zqy@hit.edu.cn) received his bachelor’s degree in communication engineering from Harbin Institute of Technology (HIT) in 1994, and PhD degree in biomedical and electrical engineering from the University of Tokushima, Japan, in 2003. From 1999 to 2003, he was an assistant professor with the University of Tokushima. From 2003 to 2005, he was an associate professor with the Shenzhen Graduate School, HIT, and was the founding director of the Communication Engineering Research Center with the School of Electronic and Information Engineering. Since 2005, he has been a full professor, and serves as the dean of the EIE School. He is on the Editorial Board of some academic journals, such as The Journal on Communications, KSII Transactions on Internet and Information Systems, and Science China: Information Sciences. He was the TPC Co?Chair of the IEEE/CIC ICCC’15, the Symposium Co?Chair of the IEEE VTC’16 Spring, an Associate Chair for Finance of ICMMT’12, and the Symposium Co?Chair of CHINACOM’11. He has been a TPC Member for INFOCOM, ICC, GLOBECOM, WCNC, and other flagship conferences in communications. He was the Founding Chair of the IEEE Communications Society Shenzhen Chapter. He has received the National Science Fund for Distinguished Young Scholars, the Young and Middle?Aged Leading Scientist of China, and the Chinese New Century Excellent Talents in University, and obtained three scientific and technological awards from governments. His research interests include aerospace communications and networks, wireless communications and networks, cognitive radios, signal processing, and biomedical engineering.
其他文献
第一重境界:和一个自己所爱的人结婚。   第二重境界:和一个自己所爱的人及他(她)的习惯结婚。   第三重境界:和一个自己所爱的人及他(她)的习惯,还有他(她)的背景结婚。   在这个世界上,那些白头偕老的人,一生基本上都“结三次婚”。   第一次是在饭店里,在亲朋好友的恭喜和祝福中,与一个自己所爱的人结婚。   第二次是在家里,两人经过几年磨合,互与对方的习惯结婚。   第三次是在家
期刊
时间犹如白驹过隙,曾抢先于我的鼠兄终于让位,十二生肖轮流坐庄,今年轮到我当庄主。尽管我都不记得当了多少次庄主,但我依然精神抖擞,犹如初登大位一样新鲜。   说起我,大家都很熟悉,犹如我熟悉大家一样。熟悉未必深知,熟悉未必知根知底。   我本来在大自然中吃了睡,睡了吃,过着非常自然的生活,无忧无虑。谁知你们人类看着我老实,对我进行驯化,现在被称为人类离不开的动物,你们将我看成是朋友,我感觉你们对
期刊
汤姆·汉克斯主演的电影《萨利机长》,讲一个在危急时刻拯救航班的机长,事后遭到了质询。   因为调查显示,危机发生之前,其实还有更简单稳妥的应对方案,萨利机长并没有采取。也就是说,这场危机可以看成他的“人为失误”。   萨利机长不否认,确实有更完美的方案,但那是从“事后诸葛亮”的角度看到的。   他的反击是:你们所谓的完美方案都是依靠电脑模拟,模拟操作的飞行员对即将发生的一切已经做好心理准备。
期刊
我的手机里不少于上百个微信群,每天常看的群,大约十个,其中有四五个是置顶的:包括一个编辑作者工作群,一个小家庭群,一个好友群,还有一个评论员群,虽然说话都比较少,但基本每天都在潜水浏览,想知道大家都在聊什么。   这样的几个群,基本就勾勒出一名中年自由职业者的画像。不知道年轻人通常会有什么样的群,反正据我所知,许多中年人的“群生活”基本如此。也不是没有置顶区空降过来的群,那往往是外出活动时临时拉
期刊
记得我当年在一個寺院里挂单,每逢要做挑柴、担米等粗重的工作,大家就会异口同声地说:“星云比较有力气,让他去担柴、挑米!”那一段日子,我总是在晨曦未出时,拉着板车到十里外的市镇上拉油盐柴米回来,以供寺院使用。   有时候,遇到上坡路段,我也只能一个人推着载了几百斤柴米油盐的板车,等到推上坡的时候,往往累倒在一旁呕吐,整个人感到阵阵天旋地转,头晕虚脱。我常想,做这些粗重的工作,是因为我力气大,但是有
期刊
“形象”的多元与危害  小到一件商品,大到民族、国家,形象都很重要。但形象代替不了本质,因为形象多元,且有真、假之分。就工程而言,有“需要”和“条件”的限制。如果,某项建筑的设计、实施,离开实际需要,或根本不实用,就算设计超群、质量再好,也是“猴拿虱子——瞎掰”。遗憾的是,我们有些负责人只讲所谓“政绩”,不惜劳民伤财,只圖个人升迁,结果闹出许多笑话。现在,“造形象”已如传染病,到处泛滥。特别是大小
期刊
乾坤未定,你我皆是黑马!让自己变得珍贵的方法,是懂得拒绝。两年学说话,一生学闭嘴!人前多用情商,人后多用智商。大喜大悲看清自己,大起大落看清朋友。我們都擅长口是心非,却渴望对方明察秋毫。
期刊
期刊
Abstract  Filter?bank multicarrier (FBMC) with offset quadrature amplitude modulation (OQAM) is a candidate waveform for future wireless communications due to its advantages over orthogonal frequency
期刊
Abstract  Multiple access scheme is one of the key techniques in wireless communication systems. Each generation of wireless communication is featured by a new multiple access scheme from 1G to 4G. In
期刊