Shibing Zhang

Shibing Zhang
Nantong University · Department of Information Technology

About

53
Publications
1,744
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
305
Citations

Publications

Publications (53)
Article
Full-text available
This paper investigates an optimization problem corresponding to energy efficiency maximization of an unmanned aerial vehicle (UAV)-enabled relaying system, where a fixed-wing UAV acts as an amplify-and-forward mobile relay to assist data transmission between a source node and a destination node. On the premise of satisfying the speed and accelerat...
Article
This paper solves an energy-efficient optimization problem of a fixed-wing unmanned aerial vehicle (UAV) assisted full-duplex mobile relaying in maritime communication environments. Taking the speed and the acceleration of the UAV and the information-causality constraints into consideration, the energy-efficiency of the system under investigation i...
Article
Cognitive emergency communication networks can meet the requirements of large capacity, high density and low delay in emergency communications. This paper analyzes the properties of emergency users in cognitive emergency communication networks, designs a multi-objective optimization and proposes a novel multi-objective bacterial foraging optimizati...
Article
This paper proposes a new artificial noise (AN) scheme that combines with the relay selection techniques to improve the physical layer security for a wiretap full-duplex decode-and-forward cooperative network. The communication consists of two phases. In the first phase, the source transmits a message to the selected full-duplex relay, which simult...
Article
Full-text available
This paper investigates the unmanned aerial vehicle (UAV) legitimately monitoring communication system. Specifically, a legitimate full-duplex (FD) UAV monitor eavesdrops the information sent by a suspicious ground transmitter while jams the suspicious receiver simultaneously. Considering the limited flight time, we jointly design the trajectory of...
Article
The Poisson point process (PPP) has been widely used in wireless network modeling and performance analysis due to the independence between its nodes. Therefore, it may not be a suitable model for many of the exclusive networks between the nodes. This paper analyzes the energy efficiency (EE) and optimizes the two-tier heterogeneous cellular network...
Article
Full-text available
Interference exploitation has been considered an effective method to improve secrecy in underlaid device-to-device (D2D) communication networks. This paper studied interference exploitation in unauthorized underlaid D2D communication networks, where a cellular user (CU) transmits uplink information to a base station (BS) and a pair of suspicious D2...
Article
With the development of society and the progress of technology, more and more ocean activities are carried out. It results in booming of deep-sea diving. The use of helium-oxygen mixture (as a kind of breathing gas) solves the physiological problems of divers in saturated diving, but it brings about the Heliumspeech voice communication problem, the...
Article
In this paper, we investigate a joint beamforming and time switching (TS) design for an energy-constrained cognitive two-way relay (TWR) network. In the network, the energy-constrained secondary user (SU) relay employs TS protocol to harvest energy from the signals sent by the circuit-powered primary user (PU) transmitter, and then exploits the har...
Article
Full-text available
Cognitive radio is considered an effective solution to spectrum shortages, which has been a significant issue in the next generation of wireless communications. In this paper, we focus on spectrum sensing under a low signal-to-noise-ratio (SNR) and noise fluctuation and propose a symmetric peaksbased spectrum sensing algorithm for modulated signals...
Article
We consider an underlay wiretap cognitive two-way relay network (CTWRN), where two secondary sources exchange their messages via multiple secondary decode-and-forward digital network coding relays in the presence of an eavesdropper by using a three-phase time division broadcast protocol and sharing the licensed spectrum of primary users. To mitigat...
Article
This paper considers a multi-relay legitimate surveillance system, where a suspicious link may transmit illegal information with the help of relays and a legitimate monitor aims at intercepting the information. We assume that the relay selection method is adopted by the suspicious link to improve the efficiency of the information transmission. We p...
Article
Smallcells have recently emerged as a potential approach for local area deployments that can satisfy high data rate requirements, reduce energy consumption and enhance network coverage. In this paper, we work on maximizing the weighted sum energy efficiency (WS-EE) for densely deployed smallcell networks. Due to the combinatorial and the general fr...
Article
The demand for wideband communication in the coastal area (i.e., ≤ 100 km from the coastline) has been rapidly increasing in recent years. Compared to the terrestrial scenario, the coastal environment has long-distance and highly dynamic channels, and the communication devices are more strictly constrained by energy supplies. While the RLNC has the...
Article
Relay transmissions play an important role in many types of communication systems. In this paper, we consider packet-level coded transmissions over lossy relay links with the finite-buffer and coding coefficients delivery cost constraints. We propose a low-complexity coding scheme where packets are encoded from sequentially formed random subsets of...
Article
Based on the service characteristics and the sensing ability for secondary users, a joint optimization scheme of spectrum detection and allocation is investigated to expand the available sensing region and allocate the QoS-specified channels. On the aspect of spectrum detection, due to the available detection index with the global detection metrics...
Conference Paper
For the energy-constrained cognitive networks, it is particularly important to improve their energy efficiency (EE). We focus on the EE optimization of the continuous spectrum sensing (CSS). The EE of the secondary user (SU) networks is derived. To maximize the EE, an optimization problem is formulated under the constraints of sensing performance....
Conference Paper
Cognitive radio networks will play important role in future wireless networks. This paper proposes a new resource allocation strategy in cooperative multi-relay cognitive radio networks, in which multi second users can work as the relays of primary users to accelerate the data transmission when the channel between primary transmitter and primary re...
Chapter
Energy consumption is one of the factors that affect the lifetime of the mobile wireless network. In this paper, a joint optimizing subcarriers and bits allocations algorithm is proposed to minimize the transmitted power of the multi-users orthogonal frequency division multiplexing (OFDM) system. In the subcarriers allocation algorithm, all of the...
Article
Full-text available
Spectrum sensing strategy is key to realize cognitive radio. However, spectrum sensing error would affect the access strategy of secondary users in cognitive networks. This paper addresses the spectrum sensing strategy under imperfect spectrum sensing, and proposes opportunistic spectrum access strategies for the imperfect spectrum sensing and fadi...
Article
Based on the partially observable Markov decision process, this paper investigates spectrum access in cognitive networks and proposes an optimal spectrum access algorithm to maximize the throughput. The suboptimal solution to the optimal spectrum access strategy is given by use of the greedy algorithm. In order to achieve the optimal channel access...
Article
To design an efficient and efficient cognitive radio networks, the related technical and economic aspects should be needed to be considered. In this paper, an effective algorithm is proposed to address the spectrum trading in cognitive radio networks where there are multiple primary services (sellers), multiple secondary users (buyers) and one agen...
Article
The toxic property thus far shared by both ALS-linked SOD1 variants and wild-type SOD1 is an increased propensity to aggregation. However, whether SOD1 oligomers or aggregates are toxic to cells remains to be well defined. Moreover, how the toxic SOD1 species are removed from intra- and extra-cellular environments also needs to be further explored....
Article
We develop a secure random linear network coding scheme on wiretap networks where a wiretapper can only eavesdrop on a limited number of channels. On one hand, by refining Lima's "locked coefficients" method and applying the approach of one-time pad, our scheme can well protect message packets with-out decreasing network throughput. On the other ha...
Conference Paper
In the cooperative spectrum sensing, the bad channel environment where there are a few of malicious nodes, often results in deterioration of detection performance. This paper focuses on the spectrum sensing in the case malicious nodes and proposes an accumulated credibility-based weighted cooperative spectrum sensing algorithm. In the algorithm, th...
Article
In cognitive radio networks, the most important goal of spectrum sharing is to benefit both the seller and buyer. In order to increase the total benefits generated in spectrum sharing, this paper introduces a memory mechanism between the spectrum agent and multi-primary service providers (PSPs) and proposes a spectrum trading algorithm based on the...
Article
Full-text available
In order to optimize the spectrum resource allocation in the orthogonal frequency division multiplexing system and minimize the transmitted power, this paper proposed a modified basic particle swarm optimization algorithm to allocate the subcarriers and bits of the orthogonal frequency division multiplexing system. The algorithm uses the average in...
Article
Prediction of spectrum sensing and access is one of the keys in cognitive radio (CR). It is necessary to know the channel state transition probabilities to predict the spectrum. By the use of the model of partially observable Markov decision process (POMDP), this paper addressed the spectrum sensing and access in cognitive radio and proposed an est...
Article
Energy detection is a simple spectrum sensing technique that compares the energy in the received signal with a threshold to determine whether a primary user signal is present or not. Setting the threshold is very important to the performance of the spectrum sensing. This paper proposes an adaptive spectrum sensing algorithm where an optimal decisio...
Conference Paper
Accurate spectrum sensing is the key technique of cognitive networks. According to characteristic of random matrix, a cooperative spectrum sensing algorithm is proposed, which is based the eigenvalue of the signals covariance matrix. Regarded the average eigenvalue of the signals received at the different nodes as the average noise power, the ratio...
Article
This paper analyzed the performance of multihop relay cooperative spectrum sensing. The closed form expression of the upper bound of the detection probability of multi-hop relay cooperation is derived in Rayleigh flat fading channel. It provides the theoretical basis for analyzing the performance of multi-hop relay cooperative spectrum sensing. Sim...
Article
We have demonstrated that the metal complexes of polybenzimidazoles are emerging likely as a new type of gene-delivery systems based on their strong DNA-condensing ability. However, the in vitro transfection efficacy of the DNA condensates formed with the metal complexes was relatively low. The positively charged peptides, such as cell-penetrating...
Article
Successive improvement of microprocessor performance makes the deadbeat control applied more widely in active power filter. However, the deadbeat control is susceptible to the noise when it is used to deal with the instantaneous current sampling data. This paper proposed a predictive deadbeat control method based on coherent average. It would suppr...
Article
Finite-time stable theorem about fractional system and finite-time synchronizing fractional chaotic system are studied in this paper. A finite-time stable theorem is proposed and proved according to the properties of fractional equation. Using this theorem, fractional super chaotic Lorenz systems is synchronized in finite-time. Numerical simulation...
Article
This paper focuses on the subcarrier allocation for multi-user in multi-band orthogonal frequency division multiplexing ultra-wideband (MB-OFDM UWB) system. A novel allocating algorithm is proposed to minimize the total transmission power subjective to a given bit error rate (BER) and user's data rate. The algorithm is divided into three parts, clu...
Conference Paper
Due to the geographical locations of cognitive users (namely secondary users, SUs) and the effect of shadowing and fading in channel, the primary user (PU) signal power received at SU is different from each other. In this paper, a weighted decision fusion (WDF) algorithm is proposed to improve the detection reliability. The weighted factors are cal...
Article
This paper considers the spectrum sensing technique for cognitive radio-based on energy detection. It proposes an improved spectrum sensing algorithm by linearly combining the criteria of the probability of detection and the probability of false alarm. Then, the optimal decision threshold is derived for energy detection in the proposed linear combi...
Conference Paper
Spectrum sensing is an essential technique for cognitive radios. This paper addresses the spectrum sensing under uncertain noise power and proposes an adaptive spectrum sensing algorithm. The adaptive decision threshold of energy detection is derived, which is based on the weighted probability of detection and probability of false alarm. By means o...
Conference Paper
Channel estimation is an essential technique for the orthogonal frequency division multiplexing (OFDM) based ultra-wide band (UWB) system. In this paper, a novel channel estimating method, fast Fourier transform-Hannan-Quinn(FFT-HQ) algorithm, is proposed. Based on the estimated channel response, the algorithm weighted the eigenvalue of the estimat...
Article
In paper proposes a linear combination (LC) algorithm instead of the CFAR criterion and the CDR criterion in energy detection. The LC algorithm linearly combines the probability of detection and the probability of false alarm, and optimizes them simultaneously. Based on the LC algorithm, the closed-form expression for the optimal decision threshold...
Conference Paper
It is a challenging problem in the ultra-wideband (UWB) system to be interfered by narrowband wireless systems or to interfere narrowband wireless systems. Cognitive radio technology has a ability to learn and sense the radio environment. It would detect the spectrum used and enables UWB system to avoid the interference. This paper addresses the st...
Conference Paper
The robustness of anti-interference UWB-OFDM (AI-UWB) system in presence of narrow-band interference or jamming is examined. We analyzed the bit error rate performance and compared the robustness. Encoded the transmitted symbols and spread the power of the symbols over all sub-bands, AI-UWB system could make full use of the frequency diversity acro...

Network

Cited By