Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Qinghe Du is active.

Publication


Featured researches published by Qinghe Du.


IEEE Journal on Selected Areas in Communications | 2010

Statistical QoS provisionings for wireless unicast/multicast of multi-layer video streams

Qinghe Du; Xi Zhang

Due to the time-varying wireless channels, deterministic quality of service (QoS) is usually difficult to guarantee for real-time multi-layer video transmissions in wireless networks. Consequently, statistical QoS guarantees have become an important alternative in supporting real-time video transmissions. In this paper, we propose an efficient framework to model the statistical delay QoS guarantees, in terms of QoS exponent, effective bandwidth/capacity, and delay-bound violation probability, for multi-layer video transmissions over wireless fading channels. In particular, a separate queue is maintained for each video layer, and the same delay bound and corresponding violation probability threshold are set up for all layers. Applying the effective bandwidth/capacity analyses on the incoming video stream, we obtain a set of QoS exponents for all video layers to effectively characterize this delay QoS requirement.We then develop a set of optimal adaptive transmission schemes to minimize the resource consumption while satisfying the diverse QoS requirements under various scenarios, including video unicast/multicast with and/or without loss tolerance. Simulation results are also presented to demonstrate the impact of statistical QoS provisionings on resource allocations of our proposed adaptive transmission schemes.


Eurasip Journal on Wireless Communications and Networking | 2012

A survey on dynamic spectrum access protocols for distributed cognitive wireless networks

Pinyi Ren; Yichen Wang; Qinghe Du; Jing Xu

With the rapid development of wireless communications technologies, radio spectrum has become a type of extremely scarce resources in meeting the increasing demands for broadband wireless services. However, the traditional static spectrum allocation policy leads to severe spectrum underutilization and spectrum shortage problems. The cognitive radio (CR) technology can detect the occupancy of the spectrum and enable the dynamic spectrum access (DSA) to fill the spectrum hole caused by the static allocation policy, and thus has been widely recognized as an efficient approach to solve the above problems. The distributed cognitive wireless network (CWN), which does not have central entities, is one of the major networking architectures applying the CR technology. Correspondingly, the design of DSA in distributed CWNs is crucial, yet challenging, to increasing the utilization efficiency of the wireless spectrum with dynamically-varying occupancy statuses. In this article, we present a survey on DSA protocols for distributed CWNs. In particular, we first address the challenges in the design and implementation of distributed DSA protocols. Then, we categorize the existing distributed DSA protocols based on different criteria, such as spectrum sharing modes, spectrum allocation behaviors, spectrum access modes, the usage of common control channel, spectrum usage strategies, the number of radios, and spectrum sensing techniques. We also discuss the advantages and disadvantages of each category under diverse classification criterion. Moreover, we make a comprehensive survey of the state-of-the-art distributed DSA protocols using different spectrum access modes, which can be categorized into contention-based, time-slotted, and hybrid protocols. Through the study, we find out that most of distributed DSA protocols fall into the contention-based and hybrid protocols. In addition, the ongoing standardization efforts are also reviewed. Finally, several open research issues for the distributed DSA protocols are presented, such as spectrum handoff based protocols, spectrum prediction based protocols, adaptation of the spectrum-sharing modes, protocols with cooperative spectrum sensing, as well as distributed collision avoidance mechanisms.


IEEE Journal on Selected Areas in Communications | 2014

CAD-MAC: A Channel-Aggregation Diversity Based MAC Protocol for Spectrum and Energy Efficient Cognitive Ad Hoc Networks

Pinyi Ren; Yichen Wang; Qinghe Du

In cognitive Ad Hoc networks (CAHN), because the contentions and mutual interferences among secondary nodes are inevitable as well as secondary nodes usually have limited power budget, spectrum efficiency and energy efficiency are critically important to the CAHN, especially for the medium access control (MAC) protocol design. Aiming at improving both spectrum and energy efficiencies, we in this paper propose a diversity technology called Channel-Aggregation Diversity (CAD), through which each node can utilize multiple channels simultaneously and efficiently allocate the upper-bounded power resource with only one data radio. Based on the proposed CAD technology, we further develop a CAD-based MAC (CAD-MAC) protocol, which enables the secondary nodes to sufficiently use available channel resources under the upper-bounded power and transmit multiple data packets in one transmission process subject to the transmission-time fairness constraint. In order to improve the performance of CAHNs, we propose two joint power-channel allocation schemes. In the first scheme, we aim at maximizing the data transmission rate. By converting the joint power-channel allocation to the Multiple-Choice Knapsack Problem, we derive the optimal allocation policy through dynamic programming. In the second scheme, our objective is to optimize the energy efficiency and we obtain the corresponding allocation policy through fractional programming. Simulation results show that our proposed CAD-MAC protocol can efficiently increase the spectrum and energy efficiencies as well as the throughput of the CAHN compared with existing protocols. Moreover, the energy efficiency of the CAHN can be further improved by adopting the energy efficiency optimization based resource allocation scheme.


IEEE Communications Letters | 2015

Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes

Li Sun; Pinyi Ren; Qinghe Du; Yichen Wang; Zhenzhen Gao

This paper studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper and an eavesdropper. A security-aware relaying scheme is proposed, which employs the alternate jamming and secrecy-enhanced relay selection to prevent the confidential message from being eavesdropped by the untrusted relays. To evaluate the performance of the proposed strategies, we derive the lower bound of the achievable ergodic secrecy rate (ESR), and conduct the asymptotic analysis to examine how the ESR scales as the number of relays increases.


IEEE Transactions on Vehicular Technology | 2006

Adaptive Low-Complexity Erasure-Correcting Code-Based Protocols for QoS-Driven Mobile Multicast Services Over Wireless Networks

Xi Zhang; Qinghe Du

We propose an adaptive hybrid automatic repeat request-forward error correction (ARQ-FEC) erasure-correcting scheme for quality of service (QoS)-driven mobile multicast services over wireless networks. The main features of our proposed scheme include (i) the low complexity achieved by the graph code; (ii) dynamic adaptation to the variations of packet-loss level and QoS requirements. To increase error-control efficiency and support diverse QoS requirements, we develop a two-dimensional (2-D) adaptive error-control scheme that dynamically adjusts not only the error-control redundancy, but also the code mapping structures. By deriving and identifying the closed-form nonlinear analytical expression between the optimal check-node degree and the packet-loss level, we propose the nonuniformed adaptive coding structures to achieve high error-control efficiency. Applying the Markov chain model, we obtain closed-form expressions that derive the error-control redundancy as a function of packet-loss level and the optimal check-node degree in each adaptation step. The convergency of error-control redundancy adaptation is dynamically controlled by different QoS requirements such that a high error-control efficiency can be achieved. Using the proposed 2-D adaptive error control, we design an efficient hybrid ARQ-FEC protocol for mobile multicast services with diverse reliability QoS requirements. The proposed scheme keeps the feedback overhead low by consolidating only the numbers rather than the sequence numbers of the lost packets, which are fed back by multicast receivers. Also conducted is a set of numerical and simulation evaluations that analyze and compare our proposed adaptive scheme with those using nonadaptive graph codes, Reed-Solomon erasure codes (RSE), and the pure ARQ-based approach. The simulation results show that our proposed scheme can efficiently support QoS-driven mobile multicast services and achieve high error-control efficiency while imposing low error-control complexity and overhead for mobile multicast networks


IEEE Access | 2016

Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations

Qian Xu; Pinyi Ren; Houbing Song; Qinghe Du

The Internet of Things (IoT) depicts a bright future, where any devices having sensorial and computing capabilities can interact with each other. Among all existing technologies, the techniques for the fifth generation (5G) systems are the main driving force for the actualization of IoT concept. However, due to the heterogeneous environment in 5G networks and the broadcast nature of radio propagation, the security assurance against eavesdropping is a vital yet challenging task. In this paper, we focus on the transmission design for secure relay communications in IoT networks, where the communication is exposed to eavesdroppers with unknown number and locations. The randomize-and-forward relay strategy specially designed for secure multi-hop communications is employed in our transmission protocol. First, we consider a single-antenna scenario, where all the devices in the network are equipped with the single antenna. We derive the expression for the secrecy outage probability of the two-hop transmission. Following this, a secrecy-rate-maximization problem subject to a secrecy-outage-probability constraint is formulated. The optimal power allocation and codeword rate design are obtained. Furthermore, we generalize the above analyses to a more generic scenario, where the relay and eavesdroppers are equipped with multiple antennas. Numerical results show that the proper use of relay transmission can enhance the secrecy throughput and extend the secure coverage range.


IEEE Transactions on Wireless Communications | 2012

Delay and Throughput Oriented Continuous Spectrum Sensing Schemes in Cognitive Radio Networks

Wenshan Yin; Pinyi Ren; Qinghe Du; Yichen Wang

Periodic spectrum sensing over the entire primary user (PU) band always interrupts the secondary user (SU) data transmission in the sensing interval, which may degrade the quality of service of the SU. To alleviate this problem, we divide the PU band into two subbands, one for opportunistic SU data transmission, and the other for continuous spectrum sensing. Based on the PU band division, we propose a delay oriented continuous spectrum sensing (DO-CSS) scheme for delay sensitive SU services. In the DO-CSS scheme, the average SU transmission delay is reduced by selecting the proper bandwidth for spectrum sensing within each frame. Since different SUs may have different requirements on their quality of services, we further propose a throughput oriented continuous spectrum sensing (TO-CSS) scheme. In the TO-CSS scheme, the achievable average SU throughput is maximized by choosing the optimal sensing bandwidth within multiple adjacent frames. Both theoretical analyses and simulation results show that compared with the conventional periodical spectrum sensing scheme, the average transmission delay of the SU is reduced without degradation in the maximum achievable throughput by using the proposed DO-CSS scheme, and both the delay performance and achievable SU throughput are further improved by using the proposed TO-CSS scheme.


ubiquitous computing | 2015

Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS

Qinghe Du; Houbing Song; Qian Xu; Pinyi Ren; Li Sun

AbstractDevice-to-device (D2D) networks underlaying cellular networks are widely recognized as one of the major approaches for ubiquitous information acquisition and exchange, which features the future cyber-physical systems (CPSs). In this paper, we propose the interference-controlled D2D routing designs underlaying cellular networks, i.e. sharing/reusing the cellular spectrum, to support multi-hop D2D transmissions and thus enhancing the flexibility of CPS. The unique feature and challenge for this task include threefolds. First, the huge density of device nodes in future cellular networks yields huge amount of information to process. Second, as device nodes in cellular networks do not maintain the routing table, the route selection via low-complexity knowledge-extraction approach over huge amount of information needs to be performed by the base station (BS). Third, the interference generated by reusing cellular spectrum needs to be thoroughly controlled. To address these issues, we in this work consider two D2D networking scenarios that allow D2D users to share the uplink and downlink spectrum of cellular networks, respectively. Our objective for routing is hop-count minimization such that the delay and power consumptions can be decreased. In particular, we propose a maximum rate towards destination (MR-D) routing algorithm for the scenario sharing uplink spectrum and a MR-D advanced (MR-DA) routing algorithm for the scenario sharing downlink spectrum, respectively. Both algorithms have low computational complexity and thus meaningful for practical systems. Furthermore, our routing designs can avoid the violation of tolerable interferences to cellular users as well as to fulfil the rate requirement of D2D services. Also conducted are abundant simulation evaluations to demonstrate the advantages of our proposed schemes as compared to the baseline schemes including the farthest neighbour routing and closest to destination routing scheme.


IEEE Transactions on Vehicular Technology | 2016

Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation

Li Sun; Qinghe Du; Pinyi Ren; Yichen Wang

This paper studies the cooperative device-to-device (D2D) transmissions in cellular networks, where two D2D users communicate bidirectionally with each other and simultaneously serve as relays to assist the two-way transmissions between two cellular users. For this scenario, both cellular and D2D links share the same spectrum, thus creating mutual interference. In addition to that, a security problem also exists since the cellular users want to keep their messages secret from the D2D users and vice versa. To address these two issues, a security-embedded interference avoidance scheme is proposed in this paper. By exploiting the constellation rotation technique, the proposed scheme can create interference-free links for both D2D and cellular communications, thereby significantly improving the system error performance. Moreover, our scheme also provides an inherent secrecy protection at the physical layer, which makes the information exchange between cellular users and that between D2D users confidential from each other.


IEEE Journal on Selected Areas in Communications | 2011

QoS-Aware Base-Station Selections for Distributed MIMO Links in Broadband Wireless Networks

Qinghe Du; Xi Zhang

The distributed multiple-input-multiple-output (MIMO) techniques across multiple cooperative base stations (BS) can significantly enhance the capability of the broadband wireless networks in terms of quality-of-service (QoS) provisioning for wireless data transmissions. However, the computational complexity and the interfering range of the distributed MIMO systems also increase rapidly as the number of cooperative BSs increases. In this paper, we propose the QoS-aware BS-selection schemes for the distributed wireless MIMO links, which aim at minimizing the BS usages and reducing the interfering range, while satisfying diverse statistical delay-QoS constraints characterized by the delay-bound violation probability and the effective capacity technique. In particular, based on the channel state information (CSI) and QoS requirements, a subset of BS with variable cardinality for the distributed MIMO transmission is dynamically selected, where the selections are controlled by a central server. For the single-user scenario, we develop two optimization frameworks, respectively, to derive the efficient BS-selection schemes and the corresponding resource allocation algorithms. One framework uses the incremental BS-selection and time-sharing (IBS-TS) strategies, and the other employs the ordered-gain based BS-selection and probabilistic transmissions (OGBS-PT). The IBS-TS framework can yield better performance, while the scheme developed under the OGBS-PT framework is easier to implement. For the multi-user scenario, we propose the optimization framework applying the priority BS-selection, block-diagonalization precoding, and probabilistic transmission (PBS-BD-PT) techniques. We also propose the optimization framework applying the priority BS-selection, time-division-multiple-access, and probabilistic transmission (PBS-TDMA-PT) techniques. We derive the optimal transmission schemes for all the aforementioned frameworks, respectively. Also conducted is a set of simulation evaluations which compare our proposed schemes with several baseline schemes and show the impact of the delay-QoS requirements, transmit power, and traffic loads on the performances of BS selections for distributed MIMO systems.

Collaboration


Dive into the Qinghe Du's collaboration.

Top Co-Authors

Avatar

Pinyi Ren

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Li Sun

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Yichen Wang

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dawei Wang

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Chao Zhang

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Qian Xu

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Datong Xu

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Guangen Wu

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Hongliang He

Xi'an Jiaotong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge