Utilizing unmanned aerial vehicle (UAV) as the relay is an effective technical solution for the wireless communication between ground terminals faraway or obstructed. In this letter, the problems of ...UAV node placement and communication resource allocation are investigated jointly for a UAV relaying system for the first time. Multiple communication pairs on the ground, with one rotary-wing UAV serving as relay, are considered. Transmission power, bandwidth, transmission rate, and UAV's position are optimized jointly to maximize the system throughput. An optimization problem is formulated, which is non-convex. The global optimal solution is achieved by transforming the formulated problem to be a monotonic optimization problem.
Object detection in point cloud data is one of the key components in computer vision systems, especially for autonomous driving applications. In this work, we present Voxel-Feature Pyramid Network, a ...novel one-stage 3D object detector that utilizes raw data from LIDAR sensors only. The core framework consists of an encoder network and a corresponding decoder followed by a region proposal network. Encoder extracts and fuses multi-scale voxel information in a bottom-up manner, whereas decoder fuses multiple feature maps from various scales by Feature Pyramid Network in a top-down way. Extensive experiments show that the proposed method has better performance on extracting features from point data and demonstrates its superiority over some baselines on the challenging KITTI-3D benchmark, obtaining good performance on both speed and accuracy in real-world scenarios.
Full text
Available for:
IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
Determining the location of a source from its emissions has gained considerable interest over the past few years. In this paper, by utilizing the time difference of arrival (TDOA) of a signal ...received at spatially separated sensors, a novel algorithm for source location is proposed. The algorithm is based on the constrained total least-squares (CTLS) technique, and an iterative technique based on Newton's method is utilized to give a numerical solution. By using a perturbation analysis, the bias and covariance of the proposed CTLS algorithm are also derived. Simulation results show that the proposed CTLS algorithm gives sufficient accuracy with lower computational cost, and more importantly, it is more robust to large measurement noise than the compared algorithms.
Device-free localization (DFL) based on received signal strength (RSS) measurements functions by measuring RSS variation due to the presence of the target. The accuracy of a certain localization ...method closely depends on the accuracy of the measurement model itself. Existing models have been found not accurate enough under certain circumstances as they cannot explain some phenomena observed in DFL practices. In light of this, we propose a new model to characterize the RSS variation, which invokes diffraction theory and regards the target as a cylinder instead of a point mass. It is observed that the proposed model agrees well with experimental measurements, particularly when the target crosses the link or is in the vicinity of the link. Since the proposed measurement model is highly nonlinear, a particle filter-based tracking method is used to generate the approximate Bayesian estimate of the target position. As a performance benchmark, we have also derived the posterior Cramér-Rao lower bound of DFL for a diffraction model. A field test has shown that the proposed diffraction model may improve the tracking accuracy at least by 45% in a single-target case and by 27% in a double-target case.
We propose and design a practical modulation-coded (MC) physical-layer network coding (PNC) scheme to approach the capacity limits of Gaussian and fading two-way relay channels (TWRCs). In the ...proposed scheme, an irregular repeat-accumulate (IRA) MC over GF(q) with the same random coset is employed at two users, which directly maps the message sequences into coded PAM or QAM symbol sequences. The relay chooses appropriate network coding coefficients and computes the associated finite-field linear combinations of the two users' message sequences using an iterative belief propagation algorithm. For a symmetric Gaussian TWRC, we show that, by introducing the same random coset vector at the two users and a time-varying accumulator in the IRA code, the MC-PNC scheme exhibits symmetry and permutation-invariant properties for the soft information distribution of the network-coded message sequence (NCMS). We explore these properties in analyzing the convergence behavior of the scheme and optimizing the MC to approach the capacity limit of a TWRC. For a block fading TWRC, we present a new MC linear PNC scheme and an algorithm used at the relay for computing the NCMS. We demonstrate that our developed schemes achieve near-capacity performance in both Gaussian and Rayleigh fading TWRCs. For example, our designed codes over GF(7) and GF(3) with a code rate of 3/4 are within 1 and 1.2 dB of the TWRC capacity, respectively. Our method can be regarded as a practical embodiment of the notion of compute-and-forward with a good nested lattice code, and it can be applied to a wide range of network configurations.
Space-air-ground Internet of Vehicle networks is a promising network paradigm to support diverse vehicular services. Exploiting the unique advantages of spatial, aerial, and terrestrial network ...segments, the Quality of Service (QoS) of different services can be met by smart access network selection. However, the integrated network inevitably has to face many challenges, such as dynamic network topology, heterogeneous resources, and long propagation latency, which can seriously degrade the QoS performance. In order to provide QoS guarantee to vehicles, we propose a novel architecture, called QoS-guaranteed access assistance (QA2) serve vehicles with access assistance. To be specific, a virtualized layer is established in the network, which contains the logical resources of ground network infrastructures. Using that layer, Access Assistants are flexibly deployed at a dynamic set of ground infrastructures, and then help vehicles to acquire network services with satisfied QoS requirements. Furthermore, to accommodate temporal-spatial-varying network demands of vehicles, QA2 adopts a cost-effective deployment scheme, which updates the locations of Assistants based on the real-time traffic flow with the minimum operation cost. The evaluation results demonstrate the effectiveness of QA2, which increases request success rate by more than 50%. The results also prove that the cost-effective deployment scheme can efficiently adapt to the change of traffic flow and achieve a good balance between QoS guarantee and cost saving. The operation cost is saved by more than 25% and the QoS performance is improved by more than 22%.
For distributed satellite constellations, detection performance can be equivalently regarded as a single large satellite by the cooperative operation of multiple small satellites, which is a ...promising research topic of the Next-Generation Radar (NGR) system. However, dense grating lobes inevitably occur in the synthetic transmit pattern due to its distributed configuration, as a result of which the detection performance of dynamic coherent radar is seriously weakened. In this paper, a novel transmit beampattern optimization method for dynamic coherent radar based on a distributed satellite constellation is presented. Firstly, the effective coherent detection range interval is determined by several influence factors, i.e., coherent detection, far-field, and system link constraints. Then, we discuss the quantitative evaluation method for coherent integration in terms of synchronization error, beam pointing error, and high-speed motion characteristics and we allocate the corresponding terms in a reasonable way from the perspective of engineering. Finally, the space–time–frequency degrees of freedom (DOFs), which can be collected from satellite spacing, carrier frequencies, and platform motion characteristics, are utilized to realize a robust transmit beampattern with low sidelobe by invoking a genetic algorithm (GA). Simulation results validate the effectiveness of our theoretic analysis, and unambiguous coherent transmit beamforming with a satellite constellation of limited scale is accomplished.
Full text
Available for:
IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
Abstract
Earthquakes, forest fires, mudslides and other natural disasters occur frequently in recent years. They usually occur in the mountainous and dense forests, where local communication ...facilities do not exist or have been destroyed by the disasters. Adverse geographical environment poses a huge challenge to emergency communications and rescue. This paper presents comparative studies on multi-carrier transmission schemes in the mountainous and dense forest environment. The comprehensive communication performance for various multi-carrier waveform schemes, has been extensively analyzed by using the Stanford University Interim channel model. Simulation results show that the pruned discrete Fourier transform spread filter bank multi-carrier scheme exhibits generally the best performance in terms of transmission rate and distance for most operation modes.
Full text
Available for:
IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
We propose a new linear physical-layer network coding (LPNC) and information combining scheme for the K-user fading multiple-access relay network (MARN), which consists of K users, one relay, and one ...destination. The relay and the destination are connected by a rate-constraint wired or wireless backhaul. In the proposed scheme, the K users transmit signals simultaneously. The relay and the destination receive the superimposed signals distorted by fading and noise. The relay reconstructs L linear combinations of the K users' messages, referred to as L network-coded (NC) messages, and forwards them to the destination. The destination then attempts to recover all K users' messages by combining its received signals and the NC messages obtained from the relay. We develop an explicit expression on the selection of the coefficients of the NC messages at the relay that minimizes the end-to-end error probability at a high signal-to-noise ratio. We develop a channel-coded LPNC scheme by using an irregular repeat-accumulate modulation code over GF(q). An iterative belief-propagation algorithm is employed to compute the NC messages at the relay, while a new algorithm is proposed for the information combining decoding at the destination. We demonstrate that our proposed scheme outperforms benchmark schemes significantly in both un-channel-coded and channel-coded MARNs.
Training design for general multiple-input multiple-output (MIMO) systems is investigated in this paper. Unlike prior designs that are applicable only for centralized MIMO systems with total power ...constraints, general power constraints are considered here. They cover total power constraints, individual power constraints, and mixed individual and per-user sum-power constraints as special cases. By writing the MIMO received signals in matrix and vector forms, respectively, and using Kronecker structured channel and noise statistics, three channel estimation schemes, i.e., right estimation, left estimation, and right-left estimation, are discussed. Their corresponding training designs are considered individually with the general power constraints. Under each channel estimation scheme, optimal training sequences to maximize the mutual information between the true channel and its estimated counterpart, and to minimize the mean square error (MSE) of the channel estimate are, respectively, proposed in semiclosed forms. The relationship between the two design criteria, i.e., the mutual information maximization and the MSE minimization, is clearly revealed. The optimal training designs under the three estimation schemes are also compared in depth. It is demonstrated that right estimation exploits less statistical information about the channel and noise, and provides worse performance than the left estimation but with lower computational complexity. On the other hand, right-left estimation performs in between the other two and provides a good compromise between complexity and performance. Finally, the optimality and effectiveness of the proposed training designs are verified by extensive simulations.