999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

An Efficient Scheme for Interference Mitigation in 6G-IoT Wireless Networks

2021-12-15 07:10:16FahdAlWesabiImranKhanNadhemNemriMohammedAlHageryHudaIskanderQuangNgocNguyenBabarShahandKiIlKim
Computers Materials&Continua 2021年12期

Fahd N.Al-Wesabi,Imran Khan,Nadhem Nemri,Mohammed A.Al-Hagery,Huda G.Iskander,Quang Ngoc Nguyen,Babar Shah and Ki-Il Kim

1Department of Computer Science,King Khalid University,Muhayel Aseer,KSA

2Department of Electrical Engineering,University of Engineering and Technology,Peshawar,Pakistan

3Department of Information Systems,King Khalid University,Mayahel Aseer,KSA

4Department of Computer Science,College of Computer,Qassim University,Saudi Arabia

5Faculty of Computer and IT,Sana’a University,Sana’a,Yemen

6Department of Communications and Computer Engineering,Faculty of Science and Engineering,Waseda University,Shinjuku-ku,Tokyo,169-0051,Japan

7College of Technological Innovation,Zayed University,Abu Dhabi,UAE

8Department of Computer Science and Engineering,Chungnam National University,Daejeon,34134,Korea

Abstract:The Internet of Things(IoT)is the fourth technological revolution in the global information industry after computers,the Internet, and mobile communication networks.It combines radio-frequency identification devices,infrared sensors, global positioning systems, and various other technologies.Information sensing equipment is connected via the Internet, thus forming a vast network.When these physical devices are connected to the Internet,the user terminal can be extended and expanded to exchange information,communicate with anything,and carry out identification,positioning,tracking, monitoring, and triggering of corresponding events on each device in the network.In real life, the IoT has a wide range of applications, covering many fields,such as smart homes,smart logistics,fine agriculture and animal husbandry,national defense,and military.One of the most significant factors in wireless channels is interference, which degrades the system performance.Although the existing QR decomposition-based signal detection method is an emerging topic because of its low complexity, it does not solve the problem of poor detection performance.Therefore, this study proposes a maximumlikelihood-based QR decomposition algorithm.The main idea is to estimate the initial level of detection using the maximum likelihood principle,and then the other layer is detected using a reliable decision.The optimal candidate is selected from the feedback by deploying the candidate points in an unreliable scenario.Simulation results show that the proposed algorithm effectively reduces the interference and propagation error compared with the algorithms reported in the literature.

Keywords: 6G networks; internet of things; resource allocation; optimization

1 Introduction

The sixth generation (6G) aims to provide a 1000× factor of transmission capacity increase,at least 100 billion Internet-of-Things (IoT) device connections, a transmission rate of up to 10 Gbit/s, and an ultra-low latency user experience in the range of ms [1–5].In addition to human-to-human communication, the next-generation mobile Internet will establish zero-distance connections between humans and machines, and between machines and machines.Wireless technology will promote future economic and social development in a new way.Therefore, ultra-low latency transmission is regarded as one of the main technical features of 6G systems [6–8].Its goal is to achieve an end-to-end transmission delay below 1 ms, thereby supporting human-to-machine and machine-to-machine real-time communication and remote control applications.In addition to addressing higher requirements in terms of transmission delay, reliability, and throughput,6G has also been developed to introduce major changes in the next-generation mobile Internet architecture.Software-defined networking and network function virtualization (NFV) technologies,as emerging technologies from the 5G/B5G network architecture, enable the infrastructure network to be divided into several logical networks, allowing multiple differentiated applications to share the same physical network and resources; this is the so-called network slicing technology [9–12].Each independent slice can call a virtual network function running on the public network infrastructure, and configure and adjust its communication and computing resources as needed to meet the specific business needs of specific network slice applications [13,14].For instance, a notable recent study proposed an integrated content delivery service using information-centric networking and content delivery network slices employing NFV technology; their design and testbed implementation results were reported in [15,16].In addition, each tenant usually signs a service level agreement with the infrastructure provider.Therefore, through custom slicing applications and functions, and dynamic allocation of resources of custom slicing, public mobile networks can support specific emergency IoT slicing and ensure the coexistence and safe isolation of slicing and another mobile network slicing [17].

In IoT communications, anti-interference of the wireless channel is still affected by various factors [18,19].Multi-antenna systems have been widely used for improving the quality of wireless channels in recent years.In practical applications, owing to the high complexity of the maximumlikelihood detection algorithm, when the number of antennas increases, the complexity grows exponentially.Therefore, the application of multiple-antenna systems is difficult to achieve [20];consequently, the application of wireless communication for the Internet is impacted.To solve this practical application problem, researchers from various countries have made many achievements in recent years [21].The QR decomposition detection algorithm has attracted the attention of researchers owing to its low complexity and the use of serial interference cancellation characteristics.The authors in [22] introduced an improved SQRD algorithm that maximizes the diversity gain based on the serial interference cancellation SQRD, ensuring that the signal power of the first detection layer is the largest in each detection; thus, the maximum detection layer can be obtained.Diversity gain, while using serial interference cancellation, reduces the complexity of the algorithm, but improving the performance is not ensured.The authors in [23] introduced a detection algorithm based on MMSE-SQRD, using a sort-free QRD-M algorithm to avoid the delay caused by sorting the detection phase, reduce the sorting complexity of the path search process, and improve the system performance.The researchers also found that the accuracy of the first detection layer of the QR algorithm is critical.The authors in [24] introduced a simplified QRM-MLD algorithm that uses QR decomposition with the M algorithm to reduce the system complexity while maintaining the system performance.It was proposed to use the estimated noise variance threshold method to reduce the complexity of the QRM-MLD.It can be concluded from the simulation results that, in contrast with adding MLD, the proposed method achieved a 10× reduction in the complexity.The authors in [25] introduced an adaptive candidate scheme in the QRM-MLD algorithm for multi-antenna detection.QRM-MLD is a near-ML detection algorithm that can achieve a trade-off between BER performance and computational complexity in a multi-antenna system.Using adaptive candidate schemes to enter QRM-MLD, similar to the traditional QRM-MLD, the proposed detection application with multi-branch optimization can achieve near-ML performance.The study in [26] introduced a signal selection scheme suitable for the QRM-MLD algorithm.The numerical results obtained by computer simulation showed that even if the number of candidates in QRM-MLD is relatively small, the proposed scheme can provide a diversity performance equal to N signal candidate points.In addition, owing to the low computational complexity, the proposed scheme is feasible for implementation.

Aiming at solving the problem of poor detection of the conventional QR method in multiantenna systems, this study proposes a QR decomposition scheme based on ML criteria and a candidate mechanism.This algorithm greatly improves the performance while featuring low complexity.

2 Antenna System Model

A multi-antenna system is shown in Fig.1; it is assumed that the system hasMtransmitting antennas andNreceiving antennas, andN≥Mis satisfied.The wireless propagation channel experiences quasi-static flat fading and is in a strong scattering environment, that is, the channel fading experienced between each transmitting antenna and receiving antenna can be regarded as mutually independent [27].

Figure 1:Proposed system model

The received signal can be expressed as follows:

The vector form can be expressed as follows:

wherer(i)is anN×1 dimensional vector that represents the received signal;s(i)represents theM×1 dimensional vector, i.e., the transmitted signal; and thekthelementsk(i)represents the signal transmitted by thekthantenna.Each element ofs(i)is independently and identically distributed (i.i.d.), and the mean value of the transmitted signal is zero.The covariance is expressed as follows:

whereE[·] represents the signal digital expectation; (·)Hrepresents the Hermitian operation;represents the signal power;Irepresents the identity matrix;hkrepresents theN×1 dimensional channel coefficient; andHrepresents theN×Mdimensional matrix.This is a matrix of all channel vectors and represents the channel fading coefficient from each transmitting antenna to each receiving antenna.Note also thatn(i)is anN×1 dimensional vector representing Gaussian white noise whose power isand mean is zero; it has independent and imaginary parts with equal variances.The covariance matrix is expressed as follows:

3 Basic Principle of the Proposed Algorithm

3.1 Traditional QR Decomposition Algorithm

The core idea of the QR decomposition algorithm is to decompose the channel matrix to obtain an upper triangular matrix and an orthogonal matrix, and then use the correlation properties of the matrix to detect the received signal.Compared with the MMSE and ZF algorithms, the QR decomposition algorithm avoids the calculation of the channel matrix inversion and effectively reduces the computational complexity of the detection algorithm [28,29].

When the number of antennas at the receiving end is not less than the number of antennas at the transmitting end, QR decomposition is performed on channelHto obtain the following expression:

whereQis a unitary matrix,Ris an upper triangular matrix, and the received signalris left-multiplied by the conjugate transpose of the matrixQto obtain sufficient statistics of the transmitted vectors:

Simplifying, we obtain:

whereurepresents the noise vector after orthogonal transformation of the noise vector.Eq.(8)expands as follows:

Note that the received signal of the last antenna is not interfered by other signals.Thus, the signal of this layer can be s elected to be detected first, and then the transmitted signal can be estimated in sequence:

The QR decomposition algorithm detects layer by layer, and inevitably there is error propagation between two adjacent detection layers, leading to system performance degradation.If there is an error in the signal estimation of the first detection layer, it will affect the signal estimation of all subsequent layers.Therefore, the order of detection is critical for the QR algorithm, and the performance of the entire system largely depends on the first detection layer [30].

3.2 Proposed Algorithm

For QR decomposition detection algorithms, the correctness of the initial detection layer directly affects the signals of other detection layers.Ensuring the correctness of the first detection layer can effectively reduce the error propagation.The framework of the proposed ML-QR algorithm implementation is shown in Fig.2.

Figure 2:Implementation framework of the proposed ML-QR algorithm

The ML criterion is applied to the initial detection layer of the QR detection algorithm, that is, the modulation constellation points are sequentially used as the estimated model of the first layer, and then the QR detection algorithm is performed on the remaining layers.The optimal constellation point among the constellation points is selected for feedback as the initial detection layer estimation signal.After the initial layer signal is determined, the reliability of the soft estimation of the remaining layers is judged, and if the judgment is reliable, the candidate point is selected for optimal feedback [31].

The reliability decision scheme is shown in Fig.3.Judging the reliability of the soft decision based on the location of the soft decision point can improve the performance of the algorithm,avoid the redundant tree process, and greatly reduce the computational complexity.In the scheme,the inner circle area represents the reliable area, the center of the circle is the constellation point coordinates, and the unreliable area is represented by the shaded region.The QR decomposition algorithm calculates the soft estimation signal of the transmitted signal hierarchically.If the soft estimation point is located in the shadow area, then it will result in an unreliable soft decision.Conversely, if the soft estimation is located in the white area of the constellation diagram, then the soft estimation is reliable.The candidate mechanism uses the m minimum distances estimated by the near soft estimation as candidate points, and then select the best candidate point from those m candidate points [32].

Figure 3:Reliability decision method using QPSK

First, the modulation constellation points,?= [c1,c2,...,cL], are successively used as the estimated points of the first detection layer of the QR method.Then, the conventional QR decomposition algorithm is carried out separately, that is,clis respectively taken from Eq.(10) to obtain the estimated signalpl(i)of theLgroup, wherepl(i)=[cl,,...,].

If Eq.(11) is satisfied, thenctis the optimal detection of the initial detection layer, and it is also selected as the best feedback symbol of the next layer:

In addition to the initial detection layer, the subsequent detection layer usesOM-1=rM-1,M-1to obtain the soft estimate of theM-1 layer, and then detects layer by layer to obtaink=M-2,..., 1 through layer soft estimation.The reliability of soft estimation is judged bydk.The mathematical expressions fordkandOk(i)are as follows:

whereafrepresents the constellation point closest to the soft estimateOk(i)of thekthlayer.

If the constellation point is represented byA, thenafcan be described as follows:

Ifdk≥d(drepresents the range of reliability), then the soft estimateOk(i)is present in the shadow region, resulting in an unreliable soft decision of thekthlayer.Conversely, ifdk≤d, then the soft estimateOk(i)is located in the reliable area of the constellation diagram, and the soft decision of thekthlayer is reliable [27].When the soft decision is reliable, the soft decisionOk(i)is the reliable point, and the conventional QR decomposition scheme is implemented.Thekthlayer symbol estimation(i)is obtained by the hard decision(i)=Q[Ok(i)].

The soft decisionOk(i)is an unreliable point, and the candidate points?=[c1,c2,...,cn,...,cN] will be generated, whereNdenotes that the candidate-point distance of soft estimation rendersOk(i)as the nearest constellation point.The unreliable decisionQ[Ok(i)] is replaced by(i)=cmopt, wherecmoptis the best candidate from?=[c1,c2,...,cn,...,cN].

The process of obtaining optimal feedback candidate points is described next.

To determine the best candidate point, we define the selection vector [b1,b2,...,bn,...,bN],whereNis equal to the number of constellation candidates in?= [c1,c2,...,cn,...,cN]; the vectorbnis selected as anM×1 dimensional vector.When the soft estimation of thekthlayer is unreliable, theM-layer elements ofbnare composed as follows:

? The previously detected symbols [ct,?sM-1(i),..., ?sk+1(i)] range from theMthlayer to the(k+ 1)thlayer;

? Thekthlayer is an unreliable decisionQ[Ok(i)] candidatecnselected from the constellation points;

? The symbols from thek- 1 to the first layer belong to the traditional QR decomposition algorithm

Thus, the following expression can be obtained:

whereis a potential decision:

whereqis the index of a certain layer, ranging fromk- 1 to 1.

If the above conditions are met,cmoptis currently the best character for a more reliable user decision, and it is chosen as the best symbol for the next step.The pseudocode of the algorithm is shown in Algorithm 1.

Algorithm 1:Proposed algorithm for interference mitigation Initialization: QR=H; ?r=QHr; ?=[c1, c2,..., cl,..., cL]1:for l=1:L 2:?slM=cl 3:for k=M-1 to do 4: biq(i)=?rq-Mimages/BZ_1044_575_1101_622_1146.pngt=q+1 rq,t?slt 5:end for 6:end for 7: t=arg min 1≤l≤L r-Hblk(i)2 8:?sM=cl 9:for k=M-1:1 10: Ok(i)=images/BZ_1044_497_1448_529_1493.png?rk-Mimages/BZ_1044_644_1491_692_1537.pngi=k+1 rk,i?sniimages/BZ_1044_820_1448_851_1493.png11:if unreliable in ?=[c1, c2,..., cm,..., cM]12:for n=1:N do 13:for q=k-1:1 do 14: bnq(i)=images/BZ_1044_483_1735_515_1781.png?rq-Mimages/BZ_1044_629_1779_677_1824.pngt=q+1 rq,t?sntimages/BZ_1044_804_1735_836_1781.png15:end for 16: bn(i)=[ct, ...,?sk-1, cn, bnk+1,...,bnq(i),..., bNM(i)]T 17:end for 18: mopt=arg min 1≤n≤N ‖r-Hbnk(i)‖2 19:?sk(i)=cmopt 20:Else 21:?sk(k)=Q[Ok(i)]22:end if 23:end

4 Complexity Analysis

4.1 Initial Layer Detection Signal Estimation

The first inspection layer with constellation points is in turn replaced, and a QR decomposition algorithm is in turn performed.The complexity of QR decomposition is mainly based on the decomposition of Q and R, and its computational complexity is O(n3).The algorithm proposed in this study is performed after the decomposition algorithm of Q and R.Only Eq.(10)is calculated.The complexity isLO(n3), whereLis the number of modulation bits.

4.2 Other Detection Layers

The soft judgment reliability judgment is denoted byp.A reliable decision occurs whenp=0, whereasp=1 denotes an unreliable decision.The computational complexity calculation is approximately 2M2+pNM2.Note from Figs.4 and 5 that at 25 dB and 30 dB, the reliability probability of the algorithm detection is very low.The complexity of the QR decomposition detection algorithm is the lowest in the current detection complexity, so it is compared with SIC (computational complexity).For some non-linear detection approaches such as o(O(n4)), the complexity of the algorithm proposed in this study does not increase significantly, and according to the simulations, the performance of the proposed QR detection algorithm based on the ML criterion is improved notably.

Figure 4:Comparison of the SER vs. number of antennas at SNR=25 dB

Figure 5:Comparison of the SER vs. number of antennas at SNR=30 dB

5 Simulation Results and Discussion

Let us assume that under flat Rayleigh fading channel in a multi-antenna system, the data sent by the transmitting antennas are mutually independent, the data frame length is 20,000,the unwoven system and QPSK modulation mode are used, and the algorithm performance is measured by the bit error rate [27].

Fig.6 shows the performance curve of QR decomposition, the ML-QR algorithm, and the ML detection algorithm assuming an arrangement of 4×4 transceiver antennas.The reliable radiusdwas set to 0.4, and four candidate points were selected.As shown in Fig.6, the proposed algorithm shows better performance than the conventional QR method.When the BER is 10-2,the proposed method is 10 dB better than the conventional QR method.When the BER is 10-3,the proposed ML-QR algorithm is 15 dB better than the QR decomposition algorithm.Note from Fig.6 that with the continuous increase in SNR, the BER of the proposed ML-QR algorithm decreases linearly, becoming much lower than that of the traditional QR decomposition algorithm.This shows that for the QR algorithm, the detection sequence is critical, and the performance of the entire system largely depends on the first detection layer.In addition, it is clear from these results that the performance of the proposed algorithm is also close to the performance of the optimal detection algorithm.

Figure 6:Comparison of the BER for three different algorithms with a 4×4 antenna arrangement and QPSK modulation

In Fig.7 the BER of the proposed method is compared with different numbers of candidates points and thresholds.The Tx-Rx antennas were set in a 4×4 arrangement.Note that the BER of the proposed method is better for smaller thresholds.The BER is improved with increasing candidate points.The proposed algorithm mitigates the propagation of false judgments in the entire process of detection, and greatly improves the system performance.

Fig.8 shows the traditional QR decomposition, the proposed algorithm, and optimal ML algorithm performance curves with the optimal threshold of 0.4, four candidate points, and 6×6 arrangement of Tx-Rx antennas.Note from Fig.8 that the proposed algorithm improves the BER by 9.5 dB over the conventional QR method.When the BER is 10-3, the proposed method improves the performance by 15 dBvs.the conventional QR method.

Figure 7:Comparison of the BER under different parameters with a 4×4 antenna arrangement and QPSK modulation

Figure 8:Comparison of the BER for three different algorithms with a 6×6 antenna arrangement and QPSK modulation

Fig.9 shows the performance curves of different reliability radii and candidate points under the condition that the arrangement of transmitting and receiving antennas is 6×6.Note that when the candidate points coincide, the smaller the reliability threshold, the better the performance.Likewise, the greater the number of candidate points, the better the performance.Compared with Fig.5, when the antenna arrangement is 4×4, the system performance with a 6×6 antenna arrangement decreases, indicating that as the number of antennas increases, the error propagation between antennas increases, resulting in a decrease in system performance.

Overall, the proposed detection algorithm can significantly improve the system performance with a certain degree of complexity.Simultaneously, it can effectively control the performance and complexity of the system through the threshold and the number of candidate points, thereby achieving a balanced compromise between the performance and complexity of the detection algorithm.The ideological response has a positive effect on reducing the cost of IoT communication and improving its reliability.

Figure 9:Comparison of the BER under different parameters with a 6×6 antenna arrangement and QPSK modulation

6 Conclusion

An effective error detection algorithm can greatly improve the communication performance of the IoT.The proposed algorithm can accurately estimate the initial detection layer signal through the principle of the ML criterion algorithm.Specifically, the proposed system model uses the shadow area constraint to enhance the interference cancelation and effectively reduces the impact of error propagation.In addition, it can ensure that the complexity caused by unreliability is reduced, and the candidate mechanism can be used to suppress the propagation of false judgments in the entire detection process effectively and improve the system performance.According to MATLAB simulations of the system, it is shown that the algorithm can greatly improve the system performance and effectively save the signal-to-noise ratio.In addition, the proposed algorithm can control the computational complexity and improve the system performance according to the threshold and number of candidate points, thereby achieving a good balance between detection performance and complexity.A potential future study could consider the mean square error and throughput analysis.

Acknowledgement:The author extends his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number (RGP.2/23/42), Received by Fahd N.Al-Wesabi.www.kku.edu.sa.

Funding Statement:This study is supported by Fujitsu-Waseda Digital Annealer FWDA Research Project and Fujitsu Co-Creation Research Laboratory at Waseda University (Joint Research between Waseda University and Fujitsu Lab).The study was also partly supported by the School of Fundamental Science and Engineering, Faculty of Science and Engineering, Waseda University,Japan.This study was supported by the Institute for Information & Communications Technology Planning & Evaluation (IITP) Grant funded by the Korean government (MSIT) (No.2019-0-01343,Training Key Talents in Industrial Convergence Security) and Research Cluster Project, R20143,by the Zayed University Research Office.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 青青草一区二区免费精品| 男人天堂伊人网| 天堂av高清一区二区三区| 亚洲人免费视频| 青草视频免费在线观看| 亚洲精品无码AV电影在线播放| 成人免费午夜视频| 久久精品91麻豆| 亚洲伊人久久精品影院| 国产成人综合日韩精品无码不卡| 玩两个丰满老熟女久久网| 亚洲高清国产拍精品26u| 国产 在线视频无码| 香蕉视频国产精品人| 亚洲熟妇AV日韩熟妇在线| 91国语视频| 欧美日本在线| 一本大道视频精品人妻| 日韩欧美亚洲国产成人综合| 欧美精品不卡| 日韩专区欧美| 亚洲欧美激情小说另类| 国产乱子伦无码精品小说| 鲁鲁鲁爽爽爽在线视频观看| 久久国产精品无码hdav| 国产视频 第一页| 国产一区二区三区精品久久呦| 亚洲精品国产综合99| 国产欧美专区在线观看| 精品无码一区二区三区电影| 欧美在线一级片| 国产男人的天堂| 亚洲综合一区国产精品| 国产在线第二页| 国产剧情无码视频在线观看| 欧美成人一级| 99re在线观看视频| 国产成人综合亚洲欧美在| 强乱中文字幕在线播放不卡| 日a本亚洲中文在线观看| 久久人午夜亚洲精品无码区| 色综合久久无码网| 91久久国产综合精品| 午夜视频日本| 中文字幕调教一区二区视频| 中文字幕在线看| 亚洲精品天堂在线观看| 91精品国产一区自在线拍| 午夜毛片免费观看视频 | 国产不卡国语在线| 国产人前露出系列视频| 99在线国产| 欧美a在线| 亚洲天堂免费在线视频| 国产极品美女在线播放| 97视频在线观看免费视频| 55夜色66夜色国产精品视频| 在线国产三级| 男女男免费视频网站国产| 人妻无码AⅤ中文字| 国产屁屁影院| 亚洲另类国产欧美一区二区| 免费国产在线精品一区| 欧美一区二区三区不卡免费| 91啪在线| 国产日韩欧美在线视频免费观看| 久久不卡国产精品无码| 国产福利一区视频| 亚洲伊人天堂| 五月综合色婷婷| 国产在线视频福利资源站| 中字无码精油按摩中出视频| 国产精品福利在线观看无码卡| 久久99蜜桃精品久久久久小说| 91黄视频在线观看| 日韩精品成人在线| 国产日韩精品一区在线不卡 | 亚洲v日韩v欧美在线观看| h视频在线观看网站| 国产办公室秘书无码精品| 欧美成人怡春院在线激情| 欧美精品亚洲精品日韩专|