APP下载

SELECTED PAPERS FROM IEEE/CIC ICCC 2016

2017-05-08

China Communications 2017年1期

Supeng Leng

Yan Zhang

Nei Kato

The IEEE/CIC International Conference on Communication in China (ICCC) has been globally recognized as one of the important annual international conference held by the IEEE Communication Society (ComSoc) and China Institute of Communication (CIC) in China.IEEE/CIC ICCC 2016, the fifth ICCC was held in the magnificent city of Chengdu, China, 27-29 July, 2016.Under the theme of “Ubiquitous Communications & Computing for Future Internet”, ICCC 2016 brings together distinguished scholars,leading researchers and ambitious students to discuss the latest advances in information and communication technologies.The technical program of ICCC 2016 features 4 worldclass keynotes speeches, 9 technical symposia, 9 tutorials, 1 industrial and academic panel, and 4 workshops.In addition,15 invited talks were delivered by the famous experts from academia or industry.All the participants had a very fruitful and productive conference, and also an unforgettable stay in Chengdu.

In this fifth edition of the IEEE ComSoc’s flagship conference in China, we have maintained the high quality of the conference.313 paper submissions were received from about 30 countries and regions and 151 papers were accepted.All papers were carefully peer reviewed by more than 400 TPC members and reviewers.We selected several excellent articles among those presented in the conference and invited the authors to submit their extended versions which contain at least 40% material variation to this Special Issue of China Communications.The guest editors then assigned these papers to another around of reviews for each paper.Based on the review results, we eventually selected the following five papers for this Special Issue.

The 1starticle,“Secure Beamforming Design for SWIPT in Cooperative D2D Communications”,is authored by Li Jiang,et al.The authors consider a new security problem in the cooperative D2D communication with SWIPT, where the idle D2D users may eavesdrop the confidential message instead of harvesting energy from the received signal.A secure beamforming strategy is formulated as an optimization problem to maximize the data rata of desired D2D users subject to the minimum energy requirement of multiple idle D2D users.Furthermore, a Semi-Definite programming Relaxation (SDR) approach is adopted to obtain the optimal solution and two suboptimal secure beamforming schemes are proposed to reduce the computational complexity.Simulation results show that the proposed schemes can effectively improve data rate of the desired D2D users as well guarantee the efficient power transfer for idle D2D users.

The 2ndarticle,“Hybrid Gene Expression Programming-Based Sensor Data Correlation Mining”,is authored by Lechen Yang, et al.This paper develops a tractable model including two key components, i.e., dimensionality reduction and model mining.Firstly, the authors propose a dimensionality reduction algorithm to decrease the redundant hyperspectral data’s complexity.Secondly, reflectance estimation model mining of leaf nitrogen concentration is presented to improve the computation speed and accuracy of the model.Experimental results on three databases demonstrate that proposed algorithms can obtain good performance with a very short running time compared to other traditional approaches.

The 3rdarticle,“Power Allocation and Performance Analysis of the Collaborative NOMA Assisted Relaying Systems in 5G”,is authored by Xin Liu, et al.In this paper, a Collaborative NOMA Assisted Relaying (CNAR) system and a low complex S-CNAR system are introduced to serve the multiple cell-edge users.Based on the CNAR systems, the authors propose an optimal power allocation scheme to minimize the outage probability subject to the date rate requirement.Simulation results indicate that the proposed CNAR scheme can achieve the optimal performance among possible transmission strategies, and S-CNAR obtains similar performance with low complexity.

The 4tharticle,“Privacy Protection Based Access Control Scheme in Cloud-based Services”,is authored by Kai Fan, etal.The authors propose a novel Privilege Separation of Access Control System (PS-ACS) based on privacy protection,where the users are divided into private domain (PRD) and public domain (PUD) logically.In PRD, the Key-Aggregate Encryption (KAE) and the Improved Attribute-based Signature (IABS) apply to read and write access permission respectively.For users in PUD, a new multi-authority Ciphertext Policy Attribute Based Encryption (CP-ABE) scheme is presented to avoid the issue of single point failure.The mathematical analysis and simulation results show that the proposed scheme is feasible and superior to protect users’privacy in cloud-based services.

The 5tharticle,“Priority-Based Real-time Stream Coding over Multi-Channel with Packet Erasures”,is authored by Yunkai Wei,et al.This paper focuses on the capacity model and efficient code of Multi-channel Real-time Stream Transmission (MRST) including Symmetric Real-time (SR)streams and Asymmetric Real-time (AR) streams.The authors first derive the analytical MRST capacity model of both SR streams and AR streams under window erasures theoretically.Then, a Maximum Equilibrium Intra-session Code (MEIC) and an Adaptive Maximum Equilibrium Intra-session Code (AMEIC) is proposed for real-time stream over multiple channels with window erasures and i.i.d.erasures respectively.Numerical results demonstrate the MEIC scheme can asymptotically achieve the MRST capacity as well the AMEIC scheme can approximately approach the MRST capacity under i.i.d erasures.