Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yongming Wang is active.

Publication


Featured researches published by Yongming Wang.


personal, indoor and mobile radio communications | 2014

Non-orthogonal waveform transmission technique with convolutional multiplexing signalling

Ying Wang; Yongming Wang; Weihua Zhou; Xuanxuan Wang; Daoben Li

A non-orthogonal waveform transmission (NOWT) technique with convolutional multiplexing signalling (CMS) is introduced and analyzed, which can improve the data rate and spectrum efficiency of the wireless communication system. By narrowing the time interval of pulse shaping filter and overlapping parallel data branches together, the technique can obtain preferable gains compared with Nyquist signalling in the band-limited Gaussian channel, as well as frequency selective fading channel. The technique decreases Eb/N0 threshold distinctly compared with M-QAM technique, which can be used in the power efficient communications. Its proved that Nyquist signaling is not the optimal transmission criterion, and capacity of NOWT technique outperforms that of Nyquist system.


international conference on telecommunications | 2015

Performance analysis of A NOWT scheme for high spectral efficiency communications

Ying Wang; Yongming Wang; Weihua Zhou; Daoben Li

Performance analysis of a bandlimited nonorthogonal waveform transmission (NOWT) scheme for high data rate wireless communications is presented. The technique is a potential alternative to classic orthogonal multiplexing techniques such as OFDM and QAM. It shows faster data transmission rate than Nyquist rate, and considerable performance gain compared with orthogonal techniques, as well as much lower peak to average power ratio (PAPR). The error probability in AWGN channel is derived, and the free squared Euclidean distance of NOWT signal is no more than the minimum squared distance of its modulation constellation. Analysis and numerical results demonstrate that the bandwidth efficiency and capacity of cod-ed/uncoded NOWT technique is higher than Nyquist signalling and orthogonal techniques.


Iet Communications | 2018

Green 5G enabling technologies: an overview

Weihua Zhou; Shunliang Zhang; Xuejun Cai; Yongming Wang

Given the rising concerns on carbon emission and increasing operating expense pressure, mobile network operators and device vendors are actively driving the energy-efficient network evolution. Energy efficiency (EE) has been determined as one of the key objectives of the 5G system. To realise sustainable 5G, various new technologies have been proposed to reduce conventional energy consumption. Meanwhile, green energy sources are explored to reduce the dependence on conventional energy. This study makes a survey on recent academia and industry research on the EE of the 5G system from perspectives of radio resource management, architecture and deployment paradigm, green energy harvesting and smart grid integration. Typical green 5G enabling technologies are presented and discussed comprehensively. Moreover, the latest progress on EE in 3GPP is also investigated. Given the broad research areas, only those critical open issues and challenges are presented to inspire further investigations. Finally, the authors identify several research directions as the way forward to realise the green 5G system.


wireless communications and networking conference | 2017

Optimal DoF and Closed-Form IA Design for K-User MIMO-OFDM Systems

Weihua Liu; Weihua Zhou; Ying Wang; Xingwei Li; Yongming Wang

Combining multiple-input multiple-output (MIMO) and orthogonal frequency-division multiplexing (OFDM) techniques, interference alignment (IA) enables concurrent transmission of multiple data streams with interference-free, and enormously enhances the system throughput. In this paper, we first explore the channel character of diagonal-block, to achieve the optimal DoF using IA in


international conference on computer information and telecommunication systems | 2017

A chaotic convolutional encryption scheme based on multiple chaos mapping

Xiaozhong Zhang; Ying Wang; Yongming Wang

K


military communications conference | 2016

Exploiting social relationship for secure routing in mobile social networks

Zhenxiang Gao; Weihua Zhou; Yongming Wang

-user MIMO-OFDM systems. With finite frequency extensions, the total normalized degree of freedom (DoF) can be achieved by


military communications conference | 2016

Reduced-complexity IBDFE for faster-than-Nyquist communication systems

Juan Zeng; Ying Wang; Xinke Zhang; Keke Hu; Yongming Wang

\frac{K}{2}


international symposium on computers and communications | 2016

Flexible multi-path routing for global optimization in software-defined datacenters

Weihua Liu; Weihua Zhou; Yongming Wang; Yuyao Duan; Zhenxiang Gao

. Furthermore, we provide the closed-form precoding and filtering matrices, without complex iteration. Simulation reveals the sum-rate performance we achieved is higher than that in previous works, and the complexity of closed-form solution is much lower than that of iterative algorithms.


international symposium on computers and communications | 2016

Capacity analysis and waveform design of a non-orthogonal waveform superposition scheme for high reliable communications

Ying Wang; Yongming Wang

In this paper, we propose a chaotic convolutional encryption scheme based on multiple chaos mapping. The scheme employs the characteristics of pseudo randomness and sensitivity to initial conditions of chaos mapping. It generates time-varying state transition matrix through modulo-two adder between multiple chaos sequences and input data as well as the state values of status registers in convolutional encoder. The scheme can encrypt the data sequences while providing the channel coding features. Its shown by simulation results and analysis that the scheme can not only effectively encrypt the information and enhance the randomness of output signals, but also reach similar performance to traditional convolutional code.


international conference on telecommunications | 2016

Secret key generation using entropy-constrained-like quantization scheme

Xuanxuan Wang; Lars Thiele; Thomas Haustein; Yongming Wang

Mobile social networks (MSNs) are modern paradigms of delay tolerant networks, which exploit human mobility and consequent wireless contacts between mobile devices to share information in a peer-to-peer manner. Since routing in MSNs depends heavily on the cooperation among participating nodes, selfish or malicious behaviors of nodes impact strongly on the routing performance. In this paper, we introduce the social relationship evaluation method (SRM) for detecting the quality of human social relationship and propose the trustworthy behavior evaluation method (TBM) which exploits recommendations from close friends to detect nodes selfish or malicious behaviors. Based on SRM, we define the community of each node as the set of nodes having close social relationships with this node either directly or indirectly, and define the local community centrality to identify influential nodes for message forwarding in the community. Then, we propose SSRS, a novel social-based secure routing strategy, which exploits social relationships to enhance routing security and performance. Simulations have been conducted on the real world data set and results demonstrate that SSRS achieves better performances than the existing algorithms.

Collaboration


Dive into the Yongming Wang's collaboration.

Top Co-Authors

Avatar

Weihua Zhou

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Ying Wang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Weihua Liu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Zhenxiang Gao

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Juan Zeng

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Xuanxuan Wang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Dan Wang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Daoben Li

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Haiqiang Liu

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge