1-15hit |
Yanyan LUO Guoping WANG Ming CAI Le ZHANG Zhaopan ZHANG
Electrical connectors are the basic components of the electric system in automobiles, aircrafts and ships to realize the current and electrical signal transmission. In the aviation electrical system, the electrical connectors are indispensable supporting devices accessories, which play important roles in connecting electrical system, monitoring and controlling equipment, and provide a guarantee for the reliable transmission of electrical signals between the aviation equipment and system. Whether aviation electrical connectors work reliably directly affects the safety and reliability of the entire aircraft aviation system. The random vibration of aircraft caused by turbulence during flight is one of the main factors affecting the contact performance of the electrical connectors. In this paper, the contacts of the circular four-slot three-pin electrical connectors were chosen as the research specimens. The theoretical model of the contact force for contacts of electrical connectors was established. The test method for contact force measurement was determined. According to the test scheme, the detecting device for the contact force and contact resistance of the electrical connectors was designed, and the turbulence test of the electrical connectors was carried out. Through the analysis of the test data, the influence rule of the turbulence degree, flight speed and flight height on the contact force and contact resistance of the aviation electrical connectors was obtained.
Chunxiao CAI Yueming CAI Weiwei YANG
Secrecy on the physical layer is receiving increased research interest due to its theoretical and practical importance. In this letter, a subcarrier allocation scheme is proposed for physical-layer security in cooperative orthogonal frequency division multiple access (OFDMA) networks that use the Amplify-and-Forward (AF) strategy. We consider the subcarrier pairing and assignment to maximize overall system rates subject to a secrecy level requirement. Monte Carlo simulations are carried out to validate our analysis.
Zhiming CAI Zhe YANG Menghan WANG
In analysis of general-purpose problems which involves many factors from different viewpoints, an important challenge is to acquire different opinions and distributed modeling templates from multiple remote experts, and to aggregate these templates. In order to deal with this problem, we developed the Distributed Cooperative Modeling System (DCMS) by integrating our achievements [1]-[5]. The paper introduces how to analyze a complex problem using DCMS, with distributed templates from multiple experts, historical templates based on statistical data, and trend templates deduced from historical data, with the example of analyzing “diversification of Macao industries”
Yida WANG Xinrong GUAN Weiwei YANG Yueming CAI
By exploiting the reciprocity and randomness properties of wireless channels, physical-layer-based key generation provides a stable secrecy channel even when the main channel suffers from a bad condition. Even though the channel variation due to the mobility of nodes in wireless channels provides an improvement of key generation rate (KGR), it decreases the key consistency probability (KCP) between the node pairs. Inspired by the received signal strength(RSS)-angle of arrival(AoA)-based geolocation research, in this work, we analyze the performance of the key extraction using the RSS and AoA. We aim to identify a way to utilize the high KGR of the AoA-based method to overcome the major drawback of having a low KGR in the most common RSS-based scheme. Specifically, we derive the KCP and KGR of the RSS-AoA-based key generation scheme. Further, we propose a new performance metric called effective key generation rate (EKGR), to evaluate the designed key generation scheme in practical scenarios. Finally, we provide numerical results to verify the accuracy of the presented theoretical analysis.
Lei WANG Yueming CAI Weiwei YANG
In this paper, we analyze the impact of channel estimation errors for both decode-and-forward (DF) and amplify-and-forward (AF) cooperative communication systems over Nakagami-m fading channels. Firstly, we derive the exact one-integral and the approximate expressions of the symbol error rate (SER) for DF and AF relay systems with different modulations. We also present expressions showing the limitations of SER under channel estimation errors. Secondly, in order to quantify the impact of channel estimation errors, the average signal-to-noise-ratio (SNR) gap ratio is investigated for the two types of cooperative communication systems. Numerical results confirm that our theoretical analysis for SER is very efficient and accurate. Comparison of the average SNR gap ratio shows that DF model is less susceptible to channel estimation errors than AF model.
Dechuan CHEN Weiwei YANG Jianwei HU Yueming CAI Xin LIU
In this paper, we identify the tradeoff between security and reliability in the amplify-and-forward (AF) distributed beamforming (DBF) cooperative network with K untrusted relays. In particular, we derive the closed-form expressions for the connection outage probability (COP), the secrecy outage probability (SOP), the tradeoff relationship, and the secrecy throughput. Analytical and simulation results demonstrate that increasing K leads to the enhancement of the reliability performance, but the degradation of the security performance. This tradeoff also means that there exists an optimal K maximizing the secrecy throughput.
Weitao JIAN Ming CAI Wei HUANG Shichang LI
Mobility as a Service (MaaS) is a smart mobility model that integrates mobility services to deliver transportation needs through a single interface, offering users flexible and personalizd mobility. This paper presents a structural approach for developing a MaaS system architecture under Autonomous Transportation Systems (ATS), which is a new transition from the Intelligent Transportation Systems (ITS) with emerging technologies. Five primary components, including system elements, user needs, services, functions, and technologies, are defined to represent the system architecture. Based on the components, we introduce three architecture elements: functional architecture, logical architecture and physical architecture. Furthermore, this paper presents an evaluation process, links the architecture elements during the process and develops a three-layer structure for system performance evaluation. The proposed MaaS system architecture design can help the administration make services planning and implement planned services in an organized way, and support further technical deployment of mobility services.
Kuo CAO Yueming CAI Yongpeng WU Weiwei YANG
This letter studies secure transmission design with finite alphabet input for cooperative jamming network under individual power constraint. By adopting the zero-force scheme, where the jamming signal is fully laid in the null space of the relay-destination channel, the problem of enhancing the achievable secrecy rate is decomposed into two independent subproblems: relay weights design and power control. We reveal that the problem of relay weights design is identical to the problem of minimizing the maximal equivalent source-eavesdropper channel gain, which can be transformed into a semi-definite programming (SDP) problem and thus is tackled using interior point method. Besides, the problem of power control is solved with the fundamental relation between mutual information and minimum mean square error (MMSE). Numerical results show that the proposed scheme achieves significant performance gains compared to the conventional Gaussian design.
Lei WANG Yueming CAI Weiwei YANG
For amplify-and-forward (AF) relaying with imperfect channel estimation, we present the average symbol error rate (SER) and the diversity and multiplexing tradeoff (DMT) analysis for both opportunistic relaying (OPR) and all-participate relaying (APR) schemes. SER comparisons show that when the channel estimation quality order is no larger than 1, OPR will perform worse than APR in high SNR region. Moreover, small channel estimation quality orders will also lead to significant DMT loss.
Dechuan CHEN Yunpeng CHENG Weiwei YANG Jianwei HU Yueming CAI Junquan HU Meng WANG
In this letter, we investigate the physical layer security in multi-user multi-relay networks, where each relay is not merely a traditional helper, but at the same time, can become a potential eavesdropper. We first propose an efficient low-complexity user and relay selection scheme to significantly reduce the amount of channel estimation as well as the amount of potential links for comparison. For the proposed scheme, we derive the closed-form expression for the lower bound of ergodic secrecy rate (ESR) to evaluate the system secrecy performance. Simulation results are provided to verify the validity of our expressions and demonstrate how the ESR scales with the number of users and relays.
Xuanxuan TANG Wendong YANG Yueming CAI Weiwei YANG Yuyang ZHANG Xiaoli SUN Yufeng QIAN
This paper studies the secrecy throughput performance of the three-node wireless-powered networks and proposes two secure transmission schemes, namely the half-duplex maximal ratio combining (HD&MRC) scheme and the full-duplex jamming scheme based on time switching simultaneous wireless information and power transfer (FDJ&TS-SWIPT). The closed-form expressions of the secrecy throughput are derived, and intuitive comparison of the two schemes is provided. It is illustrated that the HD&MRC scheme only applies to the low and medium signal-to-noise ratio (SNR) regime. On the contrary, the suitable SNR regime of the FDJ&TS-SWIPT is much wider. It is depicted that FDJ&TS-SWIPT combing with current passive self-interference cancellation (SIC) algorithm outperforms HD&MRC significantly, especially when a medium or high transmit SNR is provided. Numerical simulations are conducted for verifying the validity of the analysis.
Lei WANG Xinrong GUAN Yueming CAI Weiwei YANG Wendong YANG
This work investigates the physical layer security for three cooperative automatic-repeat-request (CARQ) protocols, including the decode-and-forward (DF) CARQ, opportunistic DF (ODF) CARQ, and the distributed space-time code (DSTC) CARQ. Assuming that there is no instantaneous channel state information (CSI) of legitimate users' channel and eavesdropper's channel at the transmitter, the connection outage performance and secrecy outage performance are derived to evaluate the reliability and security of each CARQ protocol. Then, we redefine the concept of the secrecy throughput to evaluate the overall efficiency of the system in terms of maintaining both reliable and secure transmission. Furthermore, through an asymptotic analysis in the high signal-to-noise ratio (SNR) regime, the direct relationship between reliability and security is established via the reliability-security tradeoff (RST). Numerical results verify the analysis and show the efficiency of the CARQ protocols in terms of the improvement on the secrecy throughput. More interestingly, increasing the transmit SNR and the maximum number of transmissions of the ARQ protocols may not achieve a security performance gain. In addition, the RST results underline the importance of determining how to balance the reliability vs. security, and show the superiority of ODF CARQ in terms of RST.
Weijie CHEN Ming CAI Xiaojun TAN Bo WEI
Accurate estimation of the state-of-charge is a crucial need for the battery, which is the most important power source in electric vehicles. To achieve better estimation result, an accurate battery model with optimum parameters is required. In this paper, a gradient-free optimization technique, namely tree seed algorithm (TSA), is utilized to identify specific parameters of the battery model. In order to strengthen the search ability of TSA and obtain more quality results, the original algorithm is improved. On one hand, the DE/rand/2/bin mechanism is employed to maintain the colony diversity, by generating mutant individuals in each time step. On the other hand, the control parameter in the algorithm is adaptively updated during the searching process, to achieve a better balance between the exploitation and exploration capabilities. The battery state-of-charge can be estimated simultaneously by regarding it as one of the parameters. Experiments under different dynamic profiles show that the proposed method can provide reliable and accurate estimation results. The performance of conventional algorithms, such as genetic algorithm and extended Kalman filter, are also compared to demonstrate the superiority of the proposed method in terms of accuracy and robustness.
Weiwei YANG Yueming CAI Lei WANG
In this letter, we analyze the outage performance of decode-and-forward relay systems with imperfect MRC receiver at the destination. Unlike the conventional perfect MRC, the weight of each branch of the imperfect MRC receiver is only the conjugate of the channel impulse response, not being normalized by the noise variance. We derive an exact closed-form expression for the outage probability over dissimilar Nakagami-m fading channels. Various numerical examples confirm the proposed analysis.
Chengkang PAN Yueming CAI Youyun XU
This paper addresses the downlink transmission strategies with dynamic resource allocation for multiuser MIMO-OFDM systems. The ultimate objective is to maximize the sum rate capacity subject to average power constraints. Considering that the performance of conventional Orthogonal Frequency Division Multiple Access (OFDMA) is limited by users' exclusive use to subcarrier, while Dirty Paper Coding (DPC) is capable of supporting multiple users, we propose joint subcarrier and power allocation and precoding schemes based on OFDMA combined with DPC, which is called DPC-OFDMA. The analysis is considered in two stages with channel state information (CSI) at transmitter. The first stage applies water-filling method to address subcarriers allocation, in which users are allowable to share subcarriers. The second stage employs DPC combined with precoding to deal with simultaneous transmissions of the users sharing the same subcarriers. An efficient algorithm to choose the best possible ordering of users for DPC and the optimal precoding design of each user are also involved. To reduce the complexity for practice, two simplified strategies are proposed. One is called suboptimal DPC-OFDMA, where the number of users using the same subcarrier is restricted. Another employs beamforming (BF) at every subcarrier referred as BF-DPC-OFDMA. Simulation results show that the proposed simplified strategies can approach the optimal performance for most cases, and have higher spectral efficiency than conventional time-sharing OFDMA.