10 results on '"Jinhui Lu"'
Search Results
2. Sum-MSE Gain of DFT-Based Channel Estimator Over Frequency-Domain LS One in Full-Duplex OFDM Systems
- Author
-
Dushantha Nalin K. Jayakody, Hai Yu, Jun Li, Jinhui Lu, Feng Shu, Riqing Chen, and Jin Wang
- Subjects
021103 operations research ,Computer Networks and Communications ,Covariance matrix ,Orthogonal frequency-division multiplexing ,0211 other engineering and technologies ,Estimator ,02 engineering and technology ,Upper and lower bounds ,Subcarrier ,Computer Science Applications ,Cyclic prefix ,Matrix (mathematics) ,Control and Systems Engineering ,Applied mathematics ,Electrical and Electronic Engineering ,Eigenvalues and eigenvectors ,Computer Science::Information Theory ,Information Systems ,Mathematics - Abstract
In this paper, we make an investigation on the sum-mean-square-error (Sum-MSE) performance gain in full-duplex orthogonal frequency-division multiplexing (OFDM) systems in the presence of colored interference-plus-noise (IPN). This gain is defined as the ratio of Sum-MSE of frequency-domain least-square (LS) channel estimator to that of DFT-based LS one. The closed-form formula of the gain is derived. And, its simple upper and lower bounds are given using inequalities of matrix eigenvalues. The exact value of Sum-MSE gain depends heavily on the correlation factor of the IPN covariance matrix. More importantly, we also find that the Sum-MSE performance gain grows from 1 to $N/L$ as the correlation factor gradually decreases from 1 to 0, where $N$ and $L$ denote the number of total subcarrier and the length of cyclic prefix, respectively. Also, via theoretical analysis, the exact Sum-MSE gain degenerates into 1 and $N/L$ in two extreme scenarios: fully-correlated and white, respectively. The former 1 means there is no performance gain, while the latter $N/L$ corresponds to the maximum Sum-MSE performance gain achievable. Numerical simulation further validates the above results. Additionally, the derived lower bound is shown to be closer to the exact value of Sum-MSE gain compared to the upper bound.
- Published
- 2019
- Full Text
- View/download PDF
3. On Social-Aware Content Caching for D2D-Enabled Cellular Networks With Matching Theory
- Author
-
Dushantha Nalin K. Jayakody, Miao Liu, Feng Shu, Siavash Bayat, Jinhui Lu, Jun Li, and Yijin Zhang
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Distributed computing ,Matching game ,020206 networking & telecommunications ,020302 automobile design & engineering ,Social Welfare ,02 engineering and technology ,Computer Science Applications ,Upload ,0203 mechanical engineering ,Hardware and Architecture ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,business ,5G ,Blossom algorithm ,Information Systems ,Computer network - Abstract
In this paper, the problem of content caching in 5G cellular networks relying on social-aware device-to-device communications (DTD) is investigated. Our focus is on how to efficiently select important users (IUs) and how to allocate content files to the storage of these selected IUs to form a distributed caching system. We aim at proposing a novel approach for minimizing the downloading latency and maximizing the social welfare simultaneously. In particular, we first model the problem of maximizing the social welfare as a many-to-one matching game based on the social property of mobile users. We study this game by exploiting users’ social properties to generate the utility functions of the two-side players, i.e., content providers (CPs) and IUs. Then we model the problem of minimizing the downloading latency as a many-to-many matching problem. For solving these games, we design a many-to-one IU selection (MOIS) matching algorithm and a many-to-many file allocation (MMFA) matching algorithm, respectively. Simulation and analytical results show that the proposed mechanisms are stable, and are capable of offering a better performance than other benchmarks in terms of social welfare and network downloading latency.
- Published
- 2019
- Full Text
- View/download PDF
4. A Robust Secure Hybrid Analog and Digital Receive Beamforming Scheme for Efficient Interference Reduction
- Author
-
Jiangzhou Wang, Qin Yaolu, Zhihong Zhuang, Feng Shu, Linlin Sun, Jinhui Lu, Yijin Zhang, and Riqing Chen
- Subjects
Scheme (programming language) ,Beamforming ,General Computer Science ,Computer science ,interference reduction ,02 engineering and technology ,Domain (software engineering) ,robust ,Antenna array ,secure ,hybrid structure ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Projection (set theory) ,analog-and-digital beamforming ,computer.programming_language ,Interference reduction ,General Engineering ,020206 networking & telecommunications ,020302 automobile design & engineering ,Key (cryptography) ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,lcsh:TK1-9971 ,computer ,Algorithm - Abstract
Medium-scale or large-scale receive antenna array with digital beamforming can be employed at receiver to make a significant interference reduction but leads to expensive cost and high complexity of the RF-chain circuit. To deal with this issue, classic analog-and-digital beamforming (ADB) structure was proposed in the literature for greatly reducing the number of RF-chains. Based on the ADB structure, in this paper, we propose a robust hybrid ADB scheme to resist directions of arrival (DOAs) estimation errors. The key idea of our scheme is to employ null space projection (NSP) in the analog beamforming domain and diagonal loading (DL) method in digital beamforming domain. The simulation results show that the proposed scheme performs more robustly, and moreover, it has a significant improvement on the receive signal-to-interference-plus-noise ratio compared to NSP ADB scheme and DL method.
- Published
- 2019
- Full Text
- View/download PDF
5. On Impact of Earth Constraint on TDOA-Based Localization Performance in Passive Multisatellite Localization Systems
- Author
-
Feng Shu, Jun Li, Jinhui Lu, and Shuping Yang
- Subjects
Mathematical optimization ,021103 operations research ,Computer simulation ,Computer Networks and Communications ,0211 other engineering and technologies ,020206 networking & telecommunications ,02 engineering and technology ,Multilateration ,Upper and lower bounds ,Computer Science Applications ,Constraint (information theory) ,Variable (computer science) ,Control and Systems Engineering ,Problem of time ,0202 electrical engineering, electronic engineering, information engineering ,Convex combination ,Quadratic programming ,Electrical and Electronic Engineering ,Information Systems ,Mathematics - Abstract
In a passive multisatellite location system with Earth constraint (EC), the localization problem of time differences of arrival (TDOAs) is formulated as a quadratic optimization (QO) problem with two equality constraints: EC and variable constraint (VC). Which constraint is more important? To evaluate the importance of the two constraints, the original QO problem with both EC and VC is relaxed into two individual QO problems with only one equality constraint EC or VC being kept. A convex combination operation is performed on the two optimal solutions associated with the two relaxed QO problems to form a new weighted solution. Numerical simulation results show that the new weighted coefficient can achieve the Cramer–Rao lower bound with EC as the weighted factor of the solution exploiting only VC tends to zero, and increasing the value of this weighted coefficient will gradually degrade the overall localization performance. Thus, we conclude that the EC plays an extremely important role in improving the performance of TDOA-based localization.
- Published
- 2018
- Full Text
- View/download PDF
6. Robust Secure Transmission of Using Main-Lobe-Integration-Based Leakage Beamforming in Directional Modulation MU-MIMO Systems
- Author
-
Jinhui Lu, Feng Shu, Xiangwei Zhou, Jun Li, and Wei Zhu
- Subjects
FOS: Computer and information sciences ,Beamforming ,Engineering ,Computer Networks and Communications ,Main lobe ,Computer Science - Information Theory ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,0203 mechanical engineering ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Electrical and Electronic Engineering ,Secure transmission ,business.industry ,Information Theory (cs.IT) ,Transmitter ,020206 networking & telecommunications ,020302 automobile design & engineering ,Multi-user MIMO ,Computer Science Applications ,Control and Systems Engineering ,Bit error rate ,Artificial noise ,business ,Information Systems - Abstract
In this paper, we make an investigation of robust beamforming for secure directional modulation in the multiuser multiple-input and multiple-output systems in the presence of direction angle measurement errors. When statistical knowledge of direction angle measurement errors is unavailable, a novel robust beamforming scheme of combining main-lobe-integration and leakage is proposed to simultaneously transmit multiple different independent parallel confidential message streams to the associated multiple distinct desired users. The proposed scheme includes two steps: designing the beamforming vectors of the useful confidential messages and constructing artificial noise (AN) projection matrix. Here, in its first step, the beamforming vectors for the useful confidential messages of desired user $k$ are given by minimizing the useful signal power leakage from the main-lobe of desired user $k$ to the sum of main-lobes of the remaining desired directions plus main-lobes of all eavesdropper directions. In its second step, the AN projection matrix is constructed by simultaneously maximizing the AN power leakage to all eavesdropper directions such that all eavesdroppers are disrupted seriously, where AN is viewed by the transmitter as a useful signal for eavesdroppers. Due to independent beamforming vectors for different desired users, a more secure transmission is achieved. Compared with conventional nonrobust methods, the proposed method can provide a significant improvement in bit error rate along the desired directions and secrecy-sum-rate toward multiple desired users without needing the statistical property or distribution of angle measurement errors.
- Published
- 2018
- Full Text
- View/download PDF
7. On the Auction-Based Resource Trading for a Small-Cell Caching System
- Author
-
Feiran You, Feng Shu, Jinhui Lu, and Jun Li
- Subjects
Computer science ,business.industry ,Distributed computing ,Mobile computing ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Numerical models ,Network service provider ,Computer Science Applications ,Base station ,Upload ,0203 mechanical engineering ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Resource allocation ,Wireless ,Resource management ,Mobile telephony ,Electrical and Electronic Engineering ,business - Abstract
In this letter, we propose an auction-based resource trading scheme between a network service provider (NSP) and multiple content providers (CPs). The NSP is in charge of a number of small-cell base stations (SBSs), while each CP provides content downloading services to its affiliated mobile users (MUs). By treating the SBSs as a kind of resources, the NSP leases SBSs to the CPs for caching their popular contents, thereby reducing the downloading latency of the MUs. We first establish the utility functions of the NSP and CPs. Then, we maximize the utilities of both sides by formulating an iterative auction problem, in which the NSP (auctioneer) communicates with the CPs (bidders) in an iterative manner for achieving optimal price and resource allocations. Furthermore, to avoid being cheated from the CPs, we adopt an ascending-bid auction mechanism such that the CPs do not have motivations to cheat the NSP for a lower price. Numerical results show that our proposed scheme can effectively allocate SBSs to the CPs and prevent each CP from cheating the NSP for gaining a higher profit.
- Published
- 2017
- Full Text
- View/download PDF
8. Comments on 'L-Shape 2-Dimensional Arrival Angle Estimation With Propagator Method
- Author
-
Jinhui Lu, Ting Shu, and Xingzhao Liu
- Subjects
Estimation theory ,business.industry ,Mathematical analysis ,Elevation ,Propagator ,Pair matching ,Azimuth ,Antenna array ,Signal-to-noise ratio ,Optics ,Phase noise ,Electrical and Electronic Engineering ,business ,Mathematics - Abstract
For original paper see N. Tayem et al., ibid., vol.53, no.5, p.1622-30, (2005). We indicate that the two-dimensional (2-D) direction-of-arrival (DOA) estimation method proposed by N. Tayem has an error in the pair matching between the azimuth and elevation angle estimates. A feasible solution for pair matching is proposed.
- Published
- 2008
- Full Text
- View/download PDF
9. An Efficient Power Allocation Scheme for Leakage-Based Precoding in Multi-Cell Multiuser MIMO Downlink
- Author
-
Feng, Shu, primary, Wang, Michael Mao, additional, Yaxi, Wang, additional, Haiqiang, Fan, additional, and Jinhui, Lu, additional
- Published
- 2011
- Full Text
- View/download PDF
10. PIC-based iterative SDR detector for OFDM systems in doubly-selective fading channels
- Author
-
Feng, Shu, primary, Minn, Hlaing, additional, Yan, Liang, additional, and Jinhui, Lu, additional
- Published
- 2010
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.