Archive

  • Select all
    |
    CONVERGENCE OF DIGITAL TWIN AND 6G ENABLED EDGE INTELLI GENCE: THEORIES, ALGORITHMS AND APPLICATIONS
  • CONVERGENCE OF DIGITAL TWIN AND 6G ENABLED EDGE INTELLI GENCE: THEORIES, ALGORITHMS AND APPLICATIONS
    Yun Gao, Junqi Liao, Xin Wei, Liang Zhou
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Massive content delivery will become one of the most prominent tasks of future B5G/6G communication. However, various multimedia applications possess huge differences in terms of object oriented (i.e., machine or user) and corresponding quality evaluation metric, which will significantly impact the design of encoding or decoding within content delivery strategy. To get over this dilemma, we firstly integrate the digital twin into the edge networks to accurately and timely capture Quality-of-Decision (QoD) or Quality-of-Experience (QoE) for the guidance of content delivery. Then, in terms of machine-centric communication, a QoD-driven compression mechanism is designed for video analytics via temporally lightweight frame classification and spatially uneven quality assignment, which can achieve a balance among decision-making, delivered content, and encoding latency. Finally, in terms of user-centric communication, by fully leveraging haptic physical properties and semantic correlations of heterogeneous streams, we develop a QoE-driven video enhancement scheme to supply high data fidelity. Numerical results demonstrate the remarkable performance improvement of massive content delivery.

  • CONVERGENCE OF DIGITAL TWIN AND 6G ENABLED EDGE INTELLI GENCE: THEORIES, ALGORITHMS AND APPLICATIONS
    Peng Yang, Jiawei Hou, Li Yu, Wenxiong Chen, Ye Wu
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Camera networks are essential to constructing fast and accurate mapping between virtual and physical space for digital twin. In this paper, with the aim of developing energy-efficient digital twin in 6G, we investigate real-time video analytics based on cameras mounted on mobile devices with edge coordination. This problem is challenging because 1) mobile devices are with limited battery life and lightweight computation capability, and 2) the captured video frames of mobile devices are continuous changing, which makes the corresponding tasks arrival uncertain. To achieve energy-efficient video analytics in digital twin, by taking energy consumption, analytics accuracy, and latency into consideration, we formulate a deep reinforcement learning based mobile device and edge coordination video analytics framework, which can utilized digital twin models to achieve joint offloading decision and configuration selection. The edge nodes help to collect the information on network topology and task arrival. Extensive simulation results demonstrate that our proposed framework outperforms the benchmarks on accuracy improvement and energy and latency reduction.

  • CONVERGENCE OF DIGITAL TWIN AND 6G ENABLED EDGE INTELLI GENCE: THEORIES, ALGORITHMS AND APPLICATIONS
    Xiaoxu Wang, Zeyin Huang, Songmiao Zheng, Rong Yu, Miao Pan
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Digital twin is an essential enabling technology for 6G connected vehicles. Through high-fidelity mobility simulation, digital twin is expected to make accurate prediction about the vehicle trajectory, and then support intelligent applications such as safety monitoring and self-driving for connected vehicles. However, it is observed that even if a digital twin model is perfectly derived, it might still fail to predict the trajectory due to tiny measurement noise or delay in the initial vehicle locations. This paper aims at investigating the sources of unpredictability of digital twin. Take the car-following behaviors in connected vehicles for case study. The theoretical analysis and experimental results indicate that the predictability of digital twin naturally depends on its system complexity. Once a system enters a complex pattern, its long-term states are unpredictable. Furthermore, our study discloses that the complexity is determined, on the one hand, by the intrinsic factors of the target physical system such as the driver's response sensitivity and delay, and on the other hand, by the crucial parameters of the digital twin system such as the sampling interval and twining latency.

  • CONVERGENCE OF DIGITAL TWIN AND 6G ENABLED EDGE INTELLI GENCE: THEORIES, ALGORITHMS AND APPLICATIONS
    Sunxuan Zhang, Zijia Yao, Haijun Liao, Zhenyu Zhou, Yilong Chen, Zhaoyang You
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The integration of digital twin (DT) and 6G edge intelligence provides accurate forecasting for distributed resources control in smart park. However, the adverse impact of model poisoning attacks on DT model training cannot be ignored. To address this issue, we firstly construct the models of DT model training and model poisoning attacks. An optimization problem is formulated to minimize the weighted sum of the DT loss function and DT model training delay. Then, the problem is transformed and solved by the proposed Multi-timescAle endogenouS securiTy-aware DQN-based rEsouRce management algorithm (MASTER) based on DT-assisted state information evaluation and attack detection. MASTER adopts multi-timescale deep Q-learning (DQN) networks to jointly schedule local training epochs and devices. It actively adjusts resource management strategies based on estimated attack probability to achieve endogenous security awareness. Simulation results demonstrate that MASTER has excellent performances in DT model training accuracy and delay.

  • CONVERGENCE OF DIGITAL TWIN AND 6G ENABLED EDGE INTELLI GENCE: THEORIES, ALGORITHMS AND APPLICATIONS
    Xiucheng Wang, Nan Cheng, Longfei Ma, Ruijin Sun, Rong Chai, Ning Lu
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In this paper, to deal with the heterogeneity in federated learning (FL) systems, a knowledge distillation (KD) driven training framework for FL is proposed, where each user can select its neural network model on demand and distill knowledge from a big teacher model using its own private dataset. To overcome the challenge of train the big teacher model in resource limited user devices, the digital twin (DT) is exploit in the way that the teacher model can be trained at DT located in the server with enough computing resources. Then, during model distillation, each user can update the parameters of its model at either the physical entity or the digital agent. The joint problem of model selection and training offloading and resource allocation for users is formulated as a mixed integer programming (MIP) problem. To solve the problem, Q-learning and optimization are jointly used, where Q-learning selects models for users and determines whether to train locally or on the server, and optimization is used to allocate resources for users based on the output of Q-learning. Simulation results show the proposed DT-assisted KD framework and joint optimization method can significantly improve the average accuracy of users while reducing the total delay.

  • CONVERGENCE OF DIGITAL TWIN AND 6G ENABLED EDGE INTELLI GENCE: THEORIES, ALGORITHMS AND APPLICATIONS
    Qian Wang, Wanwan Wu, Liping Qian, Yiming Cai, Jiang Qian, Limin Meng
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In order to improve the comprehensive defense capability of data security in digital twins (DTs), an information security interaction architecture is proposed in this paper to solve the inadequacy of data protection and transmission mechanism at present. Firstly, based on the advanced encryption standard (AES) encryption, we use the keystore to expand the traditional key, and use the digital pointer to avoid the key transmission in a wireless channel. Secondly, the identity authentication technology is adopted to ensure the data integrity, and an automatic retransmission mechanism is added for the endogenous properties of the wireless channel. Finally, the software defined radio (SDR) platform composed of universal software radio peripheral (USRP) and GNU radio is used to simulate the data interaction between the physical entity and the virtual entity. The numerical results show that the DTs architecture can guarantee the encrypted data transmitted completely and decrypted accurately with high efficiency and reliability, thus providing a basis for intelligent and secure information interaction for DTs in the future.

  • CONVERGENCE OF DIGITAL TWIN AND 6G ENABLED EDGE INTELLI GENCE: THEORIES, ALGORITHMS AND APPLICATIONS
    Kai Niu, Ping Zhang, Jincheng Dai, Zhongwei Si, Chao Dong
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    After the pursuit of seventy years, the invention of polar codes indicates that we have found the first capacity-achieving coding with low complexity construction and decoding, which is the great breakthrough of the coding theory in the past two decades. In this survey, we retrospect the history of polar codes and summarize the advancement in the past ten years. First, the primary principle of channel polarization is investigated such that the basic construction, coding method and the classic successive cancellation (SC) decoding are reviewed. Second, in order to improve the performance of the finite code length, we introduce the guiding principle and conclude five design criteria for the construction, design and implementation of the polar code in the practical communication system based on the exemplar schemes in the literature. Especially, we explain the design principle behind the concatenated coding and rate matching of polar codes in 5G wireless system. Furthermore, the improved SC decoding algorithms, such as SC list (SCL) decoding and SC stack (SCS) decoding etc., are investigated and compared. Finally, the research prospects of polar codes for the future 6G communication system are explored, including the optimization of short polar codes, coding construction in fading channels, polar coded modulation and HARQ, and the polar coded transmission, namely polar processing. Predictably, as a new coding methodology, polar codes will shine a light on communication theory and unveil a revolution in transmission technology.

  • THEORIES & SYSTEMS
  • THEORIES & SYSTEMS
    Shuai Ma, Ruixin Yang, Guanjie Zhang, Hang Li, Wen Cao, Linqiong Jia, Yanyu Zhang, Shiyin Li
    Abstract ( )   Knowledge map   Save
    In this paper, the channel capacity of the multiple-input multiple-output (MIMO) visible light communication (VLC) system is investigated under the peak, average optical and electrical power constraints. Finding the channel capacity of MIMO VLC is shown to be a mixed integer programming problem. To address this open problem, we propose an inexact gradient projection method to find the channel capacity-achieving discrete input distribution and the channel capacity of MIMO VLC. Also we derive both upper and lower bounds of the capacity of MIMO VLC with the closed-form expressions. Furthermore, by considering practical discrete constellation inputs, we develop the optimal power allocation scheme to maximize transmission rate of MIMO VLC system. Simulation results show that more discrete points are needed to achieve the channel capacity as SNR increases. Both the upper and lower bounds of channel capacity are tight at low SNR region. In addition, comparing the equal power allocation, the proposed power allocation scheme can significantly increase the rate for the low-order modulation inputs.
  • THEORIES & SYSTEMS
    Junchang Sun, Rongyan Gu, Shiyin Li, Shuai Ma, Hongmei Wang, Zongyan Li, Weizhou Feng
    Abstract ( )   Knowledge map   Save
    High-precision localization technology is attracting widespread attention in harsh indoor environments. In this paper, we present a fingerprint localization and tracking system to estimate the locations of the tag based on a deep belief network (DBN). In this system, we propose using coefficients as fingerprints to combine the ultra-wideband (UWB) and inertial measurement unit (IMU) estimation linearly, termed as a HUID system. In particular, the fingerprints are trained by a DBN and estimated by a radial basis function (RBF). However, UWB-based estimation via a trilateral method is severely affected by the non-line-of-sight (NLoS) problem, which limits the localization precision. To tackle this problem, we adopt the random forest classifier to identify line-of-sight (LoS) and NLoS conditions. Then, we adopt the random forest regressor to mitigate ranging errors based on the identification results for improving UWB localization precision. The experimental results show that the mean square error (MSE) of the localization error for the proposed HUID system reduces by $\bf{12.96 \%}$, $\bf{50.16 \%}$, and $\bf{64.92 \%}$ compared with that of the existing extended Kalman filter (EKF), single UWB, and single IMU estimation methods, respectively.
  • THEORIES & SYSTEMS
    Wei Gao, Yan Shi, Shanzhi Chen
    Abstract ( )   Knowledge map   Save
    Nowadays urban traffic congestion becomes a major issue due to the increase in vehicles that lead to more commuting time, accidents, traffic violations, and high fuel consumption. Platooning is a good way to solve traffic congestion because it drives with a smaller inter-vehicle distance than human-driving. This paper proposes proactive platooning based on C-V2X (cellular vehicle-to-everything) to relieve congestion. Proactive platooning reduces the inter-vehicle distance and increases the throughput of signalized intersections through integrating the networked control platooning and computation-centralized platooning. Model and simulation experiments of proactive platooning were conducted to verify the impact of inter-vehicle distance on platooning latency, platooning safety, and traffic throughput. Simulation results show that the optimal inter-vehicle distance under proactive platooning is less than half of human-driving at a signalized intersection.
  • THEORIES & SYSTEMS
    Lei Zhang, Kewei Zhu, Yong Cui, Yong Jiang
    Abstract ( )   Knowledge map   Save
    In emerging applications such as industrial control and autonomous driving, end-to-end deterministic quality of service (QoS) transmission guarantee has become an urgent problem to be solved. Internet congestion control algorithms are essential to the performance of applications. However, existing congestion control schemes follow the best-effort principle of data transmission without the perception of application QoS requirements. To enable data delivery within application QoS constraints, we leverage an online learning mechanism to design Crimson, a novel congestion control algorithm in which each sender continuously observes the gap between current performance and pre-defined QoS. Crimson can change rates adaptively that satisfy application QoS requirements as a result. Across many emulation environments and real-world experiments, our proposed scheme can efficiently balance the different trade-offs between throughput, delay and loss rate. Crimson also achieves consistent performance over a wide range of QoS constraints under diverse network scenarios.
  • THEORIES & SYSTEMS
    Long Cheng, Peng Zhao, Dacheng Wei, Yan Wang
    Abstract ( )   Knowledge map   Save
    Wireless sensor network (WSN) positioning has a good effect on indoor positioning, so it has received extensive attention in the field of positioning. Non-line-of sight (NLOS) is a primary challenge in indoor complex environment. In this paper, a robust localization algorithm based on Gaussian mixture model and fitting polynomial is proposed to solve the problem of NLOS error. Firstly, fitting polynomials are used to predict the measured values. The residuals of predicted and measured values are clustered by Gaussian mixture model (GMM). The LOS probability and NLOS probability are calculated according to the clustering centers. The measured values are filtered by Kalman filter (KF), variable parameter unscented Kalman filter (VPUKF) and variable parameter particle filter (VPPF) in turn. The distance value processed by KF and VPUKF and the distance value processed by KF, VPUKF and VPPF are combined according to probability. Finally, the maximum likelihood method is used to calculate the position coordinate estimation. Through simulation comparison, the proposed algorithm has better positioning accuracy than several comparison algorithms in this paper. And it shows strong robustness in strong NLOS environment.
  • THEORIES & SYSTEMS
    Abolfazl Dadgarnia, Mohammad Taghi Sadeghi
    Abstract ( )   Knowledge map   Save
    A modified DBSCAN algorithm is presented for deinterleaving of radar pulses in modern EW environments. A main characteristic of the proposed method is that using only time of arrival of pulses, the method can sort the pulses efficiently. Other PDW information such as rise time, carrier frequency, pulse width, modulation on pulse, fall time and direction of arrival are not required. To identify the valid PRIs in a set of interleaved pulses, an innovative modification of the DBSCAN algorithm is introduced which is accurate and easy to implement. The proposed method determines valid PRIs more accurately and neglects the spurious ones more efficiently as compared to the classical histogram based algorithms such as SDIF. Furthermore, without specifying any input parameter, the proposed method can deinterleave radar pulses while up to 30% jitter is present in the associated PRI. The accuracy and efficiency of the proposed method are verified by computer simulations and real data results. Experimental simulations are based on different real and operational scenarios where the presence of missing and spurious pulses are also considered. So, the simulation results can be of practical significance.
  • SIGNALING PROCESSING
  • SIGNALING PROCESSING
    Wangbin Cao, Hui Kang, Xiaolin Liang, Zhiyuan Xie, Xiongwen Zhao
    Abstract ( )   Knowledge map   Save
    MIMO technique can provide higher information throughput and transmission reliability for the PLC system. However, the MIMO-PLC system based on three-conductor cable has a high correlation among its sub-channels. Spatial multiplexing technology will be affected by the spatial correlation between MIMO-PLC sub-channels. To reduce the system bit error rate caused by MIMO-PLC correlation among sub-channels, this paper proposed a phase rotation precoding scheme for the $2\times2$ closed-loop MIMO-PLC system. According to the channel transfer function of high correlation MIMO-PLC system, the phase rotation precoding matrix $\bf{F}$ is calculated, and the transmission signal matrix $\bf{S}$ is modulated with the $\bf{F}$ , the code distance at the receiving point with smallest code distance is increased by phase rotation. Simulation results show that the scheme can effectively reduce the bit error rate of the $2\times2$ MIMO-PLC system based on ML detection, and significantly improve the system performance.
  • SIGNALING PROCESSING
    Pengxin Guan, Yiru Wang, Hongkang Yu, Yuping Zhao
    Abstract ( )   Knowledge map   Save
    Oscillator phase noise is one of the bottlenecks that limits the self-interference (SI) cancellation capability of full-duplex systems. In this paper, we propose a method for the suppression of common phase error (CPE) and intercarrier interference (ICI) induced by the phase noise in full-duplex orthogonal frequency division multiplexing (OFDM) systems. First, we regard the effect of CPE as a portion of the SI channel and perform estimation, reconstruction and elimination in the time domain. Then, the ICI signal is estimated and suppressed in the frequency domain. Additionally, by analysing the performance of proposed algorithm, we further develop an iterative mechanism to reduce the parameter estimation error and improve SI cancellation capability. Simulation results show that the proposed method has a significant SI cancellation capability improvement over the traditional SI cancellation schemes.
  • SIGNALING PROCESSING
    Liyuan Song, Shuyan Yu, Qin Huang
    Abstract ( )   Knowledge map   Save
    Low-density parity-check (LDPC) codes are not only capacity-approaching, but also greatly suitable for high-throughput implementation. Thus, they are the most popular codes for high-speed data transmission in the past two decades. Thanks to the low-density property of their parity-check matrices, the optimal maximum a posteriori probability decoding of LDPC codes can be approximated by message-passing decoding with linear complexity and highly parallel nature. Then, it reveals that the approximation has to carry on Tanner graphs without short cycles and small trapping sets. Last, it demonstrates that well-designed LDPC codes with the aid of computer simulation and asymptotic analysis tools are able to approach the channel capacity. Moreover, quasi-cyclic (QC) structure is introduced to significantly facilitate their high-throughput implementation. In fact, compared to the other capacity-approaching codes, QC-LDPC codes can provide better area-efficiency and energy-efficiency. As a result, they are widely applied in numerous communication systems, e.g., Landsat satellites, Chang'e Chinese Lunar mission, 5G mobile communications and so on. What's more, its extension to non-binary Galois fields has been adopted as the channel coding scheme for BeiDou navigation satellite system.
  • NETWORKS & EMERGING TECHNOLOGIES
  • NETWORKS & EMERGING TECHNOLOGIES
    Nannan Dong, Hao Yin, Baoquan Ren, Hongjun Li, Xiangwu Gong, Xudong Zhong, Junmei Han, Jiazheng Lyu
    Abstract ( )   Knowledge map   Save
    Intellectualization has been an inevitable trend in the information network, allowing the network to achieve the capabilities of self-learning, self-optimization, and self-evolution in the dynamic environment. Due to the strong adaptability to the environment, the cognitive theory methods from psychology gradually become an excellent approach to construct the intelligent information network (IIN), making the traditional definition of the intelligent information network no longer appropriate. Moreover, the thinking capability of existing IINs is always limited. This paper redefines the intelligent information network and illustrates the required properties of the architecture, core theory, and critical technologies by analyzing the existing intelligent information network. Besides, we innovatively propose a novel network cognition model with the network knowledge to implement the intelligent information network. The proposed model can perceive the overall environment data of the network and extract the knowledge from the data. As the model's core, the knowledge guides the model to generate the optimal decisions adapting to the environmental changes. At last, we present the critical technologies needed to accomplish the proposed network cognition model.
  • NETWORKS & EMERGING TECHNOLOGIES
    Hongwen Hui, Zhengxia Gong, Jianwei An, Jianzhong Qi
    Abstract ( )   Knowledge map   Save
    Dispersed computing is a new resource-centric computing paradigm. Due to its high degree of openness and decentralization, it is vulnerable to attacks, and security issues have become an important challenge hindering its development. The trust evaluation technology is of great significance to the reliable operation and security assurance of dispersed computing networks. In this paper, a dynamic Bayesian-based comprehensive trust evaluation model is proposed for dispersed computing environment. Specifically, in the calculation of direct trust, a logarithmic decay function and a sliding window are introduced to improve the timeliness. In the calculation of indirect trust, a random screening method based on sine function is designed, which excludes malicious nodes providing false reports and multiple malicious nodes colluding attacks. Finally, the comprehensive trust value is dynamically updated based on historical interactions, current interactions and momentary changes. Simulation experiments are introduced to verify the performance of the model. Compared with existing model, the proposed trust evaluation model performs better in terms of the detection rate of malicious nodes, the interaction success rate, and the computational cost.
  • NETWORKS & EMERGING TECHNOLOGIES
    Saleemullah Memon, Xiuping Li, Kamran Ali Memon, Yuhan Huang, Junaid Ahmed Uqaili, Muhammad Ishfaq
    Abstract ( )   Knowledge map   Save
    Orbital angular momentum (OAM) technology, refers to Laguerre-Gaussian (LG) beams, twisted beams, vector/vortex beams, acoustic vortex beams and fractional vortex beams. It is an emerging and promising technology to improve the communication capacity, spectral efficiency, and anti-jamming capability due to its helical phase fronts and infinite orthogonal states. Although the OAM research began in the 1990s, the developing trends, current status, issues and characteristics through a systematic observation have not yet been performed. This paper presents a knowledge-based evolution of OAM research published in the Web of Science (WoS) from 2011 to 2021 using bibliometric analysis in Citepspace. The results demonstrate that the bandwidth, efficiency, gain, divergence, phase quantization, bulky and complex feeding structures, misalignment, distortion, interferences atmospheric turbulence and diffraction were the key issues found in the OAM technology. The main research hotspots and categories, influential authors, leading journals, best institutions of OAM show a strong bias in favor of their functions and technology developments. The research on OAM was mainly performed by the counties that have developed the 5G and now moving towards 6G communications like China, USA and South Korea. This study would serve as an inclusive guide on the future research trends and status especially for the OAM researchers.