You are on page 1of 54

Artificial Intelligence for

Communications and Networks: First


EAI International Conference, AICON
2019, Harbin, China, May 25–26, 2019,
Proceedings, Part I Shuai Han
Visit to download the full and correct content document:
https://textbookfull.com/product/artificial-intelligence-for-communications-and-network
s-first-eai-international-conference-aicon-2019-harbin-china-may-25-26-2019-proceed
ings-part-i-shuai-han/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Artificial Intelligence for Communications and


Networks: First EAI International Conference, AICON
2019, Harbin, China, May 25–26, 2019, Proceedings, Part
I Shuai Han
https://textbookfull.com/product/artificial-intelligence-for-
communications-and-networks-first-eai-international-conference-
aicon-2019-harbin-china-may-25-26-2019-proceedings-part-i-shuai-
han/

Artificial Intelligence for Communications and


Networks: First EAI International Conference, AICON
2019, Harbin, China, May 25–26, 2019, Proceedings, Part
II Shuai Han
https://textbookfull.com/product/artificial-intelligence-for-
communications-and-networks-first-eai-international-conference-
aicon-2019-harbin-china-may-25-26-2019-proceedings-part-ii-shuai-
han/

Broadband Communications, Networks, and Systems: 10th


EAI International Conference, Broadnets 2019, Xi’an,
China, October 27-28, 2019, Proceedings Qingshan Li

https://textbookfull.com/product/broadband-communications-
networks-and-systems-10th-eai-international-conference-
broadnets-2019-xian-china-october-27-28-2019-proceedings-
qingshan-li/

Advanced Hybrid Information Processing Third EAI


International Conference ADHIP 2019 Nanjing China
September 21 22 2019 Proceedings Part I Guan Gui

https://textbookfull.com/product/advanced-hybrid-information-
processing-third-eai-international-conference-adhip-2019-nanjing-
china-september-21-22-2019-proceedings-part-i-guan-gui/
Security and Privacy in Communication Networks 15th EAI
International Conference SecureComm 2019 Orlando FL USA
October 23 25 2019 Proceedings Part II Songqing Chen

https://textbookfull.com/product/security-and-privacy-in-
communication-networks-15th-eai-international-conference-
securecomm-2019-orlando-fl-usa-october-23-25-2019-proceedings-
part-ii-songqing-chen/

PRICAI 2019 Trends in Artificial Intelligence 16th


Pacific Rim International Conference on Artificial
Intelligence Cuvu Yanuca Island Fiji August 26 30 2019
Proceedings Part I Abhaya C. Nayak
https://textbookfull.com/product/pricai-2019-trends-in-
artificial-intelligence-16th-pacific-rim-international-
conference-on-artificial-intelligence-cuvu-yanuca-island-fiji-
august-26-30-2019-proceedings-part-i-abhaya-c-nayak/

Image and Graphics 10th International Conference ICIG


2019 Beijing China August 23 25 2019 Proceedings Part
III Yao Zhao

https://textbookfull.com/product/image-and-graphics-10th-
international-conference-icig-2019-beijing-china-
august-23-25-2019-proceedings-part-iii-yao-zhao/

Advanced Hybrid Information Processing Third EAI


International Conference ADHIP 2019 Nanjing China
September 21 22 2019 Proceedings Part II Guan Gui

https://textbookfull.com/product/advanced-hybrid-information-
processing-third-eai-international-conference-adhip-2019-nanjing-
china-september-21-22-2019-proceedings-part-ii-guan-gui/

Intelligence Science and Big Data Engineering Visual


Data Engineering 9th International Conference IScIDE
2019 Nanjing China October 17 20 2019 Proceedings Part
I Zhen Cui
https://textbookfull.com/product/intelligence-science-and-big-
data-engineering-visual-data-engineering-9th-international-
conference-iscide-2019-nanjing-china-
Shuai Han
Liang Ye
Weixiao Meng (Eds.)

286

Artificial Intelligence
for Communications
and Networks
First EAI International Conference, AICON 2019
Harbin, China, May 25–26, 2019
Proceedings, Part I

Part 1

123
Lecture Notes of the Institute
for Computer Sciences, Social Informatics
and Telecommunications Engineering 286

Editorial Board Members


Ozgur Akan
Middle East Technical University, Ankara, Turkey
Paolo Bellavista
University of Bologna, Bologna, Italy
Jiannong Cao
Hong Kong Polytechnic University, Hong Kong, China
Geoffrey Coulson
Lancaster University, Lancaster, UK
Falko Dressler
University of Erlangen, Erlangen, Germany
Domenico Ferrari
Università Cattolica Piacenza, Piacenza, Italy
Mario Gerla
UCLA, Los Angeles, USA
Hisashi Kobayashi
Princeton University, Princeton, USA
Sergio Palazzo
University of Catania, Catania, Italy
Sartaj Sahni
University of Florida, Gainesville, USA
Xuemin (Sherman) Shen
University of Waterloo, Waterloo, Canada
Mircea Stan
University of Virginia, Charlottesville, USA
Jia Xiaohua
City University of Hong Kong, Kowloon, Hong Kong
Albert Y. Zomaya
University of Sydney, Sydney, Australia
More information about this series at http://www.springer.com/series/8197
Shuai Han Liang Ye Weixiao Meng (Eds.)
• •

Artificial Intelligence
for Communications
and Networks
First EAI International Conference, AICON 2019
Harbin, China, May 25–26, 2019
Proceedings, Part I

123
Editors
Shuai Han Liang Ye
Harbin Institute of Technology Harbin Institute of Technology
Harbin, China Harbin, China
Weixiao Meng
Harbin Institute of Technology
Harbin, China

ISSN 1867-8211 ISSN 1867-822X (electronic)


Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering
ISBN 978-3-030-22967-2 ISBN 978-3-030-22968-9 (eBook)
https://doi.org/10.1007/978-3-030-22968-9

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, expressed or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

We are delighted to introduce the proceedings of the first edition of the 2019 European
Alliance for Innovation (EAI) International Conference on Artificial Intelligence for
Communications and Networks (AICON). This conference brought together
researchers, developers, and practitioners from around the world who are leveraging
and developing artificial intelligence technology for communications and networks.
The theme of AICON 2019 was “Artificial Intelligence for Communications and
Networks: Applying Artificial Intelligence to Communications and Networks.”
The technical program of AICON 2019 consisted of 93 full papers, including six
invited papers in oral presentation sessions during the main conference tracks. The
conference tracks were: Track 1—AI-Based Medium Access Control;
Track 2—AI-based Network Intelligence for IoT; Track 3—AI-enabled Network Layer
Algorithms and Protocols; Track 4—Cloud and Big Data of AI-enabled Networks;
Track 5—Deep Learning/Machine Learning in Physical Layer and Signal Processing;
and Track 6—Security with Deep Learning for Communications and Networks. Aside
from the high-quality technical paper presentations, the technical program also featured
four keynote speeches and four invited talks. The four keynote speeches were by Prof.
Moe Win from the Laboratory for Information and Decision Systems, Massachusetts
Institute of Technology, USA, Prof. Mohsen Guizani from the Department of Computer
Science and Engineering, Qatar University, Qatar, Prof. Guoqiang Mao from the Center
for Real-Time Information Networks, University of Technology Sydney, Australia, and
Prof. Byonghyo Shim from the Department of Electrical and Computer Engineering,
Seoul National University, South Korea. The invited talks were presented by Prof.
Jinhong Yuan from the University of New South Wales, Australia, Prof. Shui Yu from
the University of Technology Sydney, Australia, Prof. Bo Rong from the Communi-
cations Research Centre, Canada, and Prof. Haixia Zhang from Shandong University,
China.
Coordination with the steering chair, Imrich Chlamtac, the general chairs, Xuemai
Gu and Cheng Li, and the executive chairs, Qing Guo and Hsiao-Hwa Chen, was
essential for the success of the conference. We sincerely appreciate their constant
support and guidance. It was also a great pleasure to work with such an excellent
Organizing Committee team and we thank them for their hard work in organizing and
supporting the conference. In particular, we thank the Technical Program Committee,
led by our TPC co-chairs, Prof. Shuai Han and Prof. Weixiao Meng, who completed
the peer-review process of technical papers and compiled a high-quality technical
program. We are also grateful to the conference manager, Andrea Piekova, for her
support and all the authors who submitted their papers to the AICON 2019 conference.
vi Preface

We strongly believe that the AICON conference provides a good forum for all
researchers, developers, and practitioners to discuss all scientific and technological
aspects that are relevant for artificial intelligence and communications. We also expect
that future AICON conferences will be as successful and stimulating as indicated by the
contributions presented in this volume.

May 2019 Shuai Han


Liang Ye
Weixiao Meng
Organization

Steering Committee
Imrich Chlamtac University of Trento, Italy

Organizing Committee
General Chairs
Xuemai Gu Harbin Institute of Technology, China
Cheng Li Memorial University of Newfoundland, Canada

Executive Chairs
Qing Guo Harbin Institute of Technology, China
Hsiao-Hwa Chen National Cheng Kung University, Taiwan

Program Chairs
Shuai Han Harbin Institute of Technology, China
Weixiao Meng Harbin Institute of Technology, China

Sponsorship and Exhibits Chair


Rose Hu Utah State University, USA

Local Chair
Shuo Shi Harbin Institute of Technology, China

Workshop Chairs
Yahong Zheng Missouri University of Science and Technology, USA
Shaochuan Wu Harbin Institute of Technology, China

Publicity and Social Media Chairs


Zhensheng Zhang Retired
Lin Ma Harbin Institute of Technology, China

Publications Chair
Liang Ye Harbin Institute of Technology, China

Web Chairs
Xuejun Sha Harbin Institute of Technology, China
Chenguang He Harbin Institute of Technology, China
viii Organization

Posters and PhD Track Chair


Chau Yuen Singapore University of Technology and Design,
Singapore

Panels Chair
Xianbin Wang University of Western Ontario, Canada

Demos Chair
Yi Qian University of Nebraska Lincoln, USA

Tutorials Chair
Mugen Peng Beijing University of Posts and Telecommunications,
China

Conference Manager
Andrea Piekova EAI

Technical Program Committee


Deyue Zou Dalian University of Technology, China
Fan Jiang Memorial University of Newfoundland, Canada
Lingyang Song Peking University, China
Bo Rong Communications Research Center, Canada
Wei Li Northern Illinois University, USA
Xi Chen Flatiron Institute, Simons Foundation, USA
Baoxian Zhang University of China Academy of Sciences, China
Jalel Ben-Othman University of Paris 13, France
Jun Shi Harbin Institute of Technology, China
Ruiqin Zhao Northwestern Polytechnical University, China
Feng Ye University of Dayton, USA
Tao Jiang Huazhong University of Science and Technology,
China
Hossam Hassanein Queen’s University, Canada
Ruofei Ma Harbin Institute of Technology, China
Jun Zheng Southeast University, China
Wei Shi Carleton University, Canada
Kun Wang Nanjing University of Posts and Telecommunications,
China
Xianye Ben Shandong University, China
Shiwen Mao Auburn University, USA
Mianxiong Dong Muroran Institute of Technology, Japan
Wei Xiang James Cook University, Australia
Yulong Gao Harbin Institute of Technology, China
Contents – Part I

Deep Learning/Machine Learning in Physical Layer


and Signal Processing

Dual-Mode OFDM-IM by Encoding All Possible Subcarrier


Activation Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Xiaoping Jin, Zheng Guo, Mengmeng Zhao, Ning Jin,
and Dongxiao Chen

Energy Efficiency Optimization Based SWIPT in OFDM


Relaying Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Dan Huang, Weidang Lu, and Mengshu Hou

An Efficient Resource Allocation Algorithm for LTE Uplink


VMIMO Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Yang Cai, Shaojun Qiu, Jia Cai, Wenchi Cheng, and Xiaofeng Lu

Research on UAV Swarm Interference Based on Improved Invasive


Weed Optimization Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Lijiao Wang, Yanping Liao, and Xiaoming Luan

Sparse Decomposition Algorithm Based on Joint Sparse Model . . . . . . . . . . 47


Qiyun Xuan, Si Wang, Yulong Gao, and Junhui Cheng

Millimeter Wave Massive MIMO Channel Estimation and Tracking . . . . . . . 57


Yanwu Song, Shaochuan Wu, Wenbin Zhang, and Huafeng Zhang

Deep Learning-Based Space Shift Keying Systems . . . . . . . . . . . . . . . . . . . 70


Yue Zhang, Xuesi Wang, Jintao Wang, Yonglin Xue, and Jian Song

Non-orthogonal Multiple Access Enabled Power Allocation


for Cooperative Jamming in Wireless Networks . . . . . . . . . . . . . . . . . . . . . 79
Yuan Wu, Weicong Wu, Daohang Wang, Kejie Ni, Li Ping Qian,
Weidang Lu, and Limin Meng

Joint Time-Frequency Diversity in the Context


of Spread-Spectrum Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Qiuhan Teng, Xuejun Sha, and Cong Ma

Design of Radar-Communication Integrated Signal Based on OFDM. . . . . . . 108


Tianqi Liang, Zhuoming Li, Mengqi Wang, and Xiaojie Fang
x Contents – Part I

A Multicast Beamforming Algorithm to Improve the Performance


of Group Service for Multicell B-TrunC System . . . . . . . . . . . . . . . . . . . . . 120
Zheming Zhang, Chengwen Zhang, Yutao Liu, and Bin Wang

Neural Networks in Hybrid Precoding for Millimeter Wave Massive


MIMO Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Jing Yang, Kai Chen, Xiaohu Ge, Yonghui Li, and Lin Tian

A Reinforcement Learning Based Joint Spectrum Allocation


and Power Control Algorithm for D2D Communication Underlaying
Cellular Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Wentai Chen and Jun Zheng

Improved Neural Machine Translation with POS-Tagging Through


Joint Decoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Xiaocheng Feng, Zhangyin Feng, Wanlong Zhao, Nan Zou, Bing Qin,
and Ting Liu

Distance Measurement Based on Linear Phase Correlation in WiFi CSI . . . . . 167


Qingfei Kang, Liangbo Xie, Mu Zhou, and Zengshan Tian

A Transfer Learning Method for Aircrafts Recognition . . . . . . . . . . . . . . . . 175


Hongbo Li, Bin Guo, Tong Gao, and Hao Chen

A New Two-Microphone Reduce Size SMFTF Algorithm for Speech


Enhancement in New Telecommunication Systems . . . . . . . . . . . . . . . . . . . 186
Zineddine Guernaz and Xuanli Wu

Adaptive Beamforming of Vertical Frequency Diverse Array


for Airborne Radar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Xuzi Wu and Yongliang Sun

2D DOA Estimation of PR-WSF Algorithm Based on Modified


Fireworks Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Yanping Liao, Chang Fu, and Emmanuel Milambo Mung’onya

Research on Indoor and Outdoor Seamless Positioning Based


on Combination of Clustering and GPS . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Jingqiu Ren, Ke Bao, Siyue Sun, and Weidang Lu

Angle-of-Arrival Positioning System Based on CSI Virtual


Antenna Array . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
Lu Yin, Ziyang Wang, Zhongliang Deng, Tianrun Jiang, and Yuan Sun

Cross-Sensor Image Change Detection Based on Deep Canonically


Correlated Autoencoders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Yuan Zhou, Hui Liu, Dan Li, Hai Cao, Jing Yang, and Zizi Li
Contents – Part I xi

An Innovative Weighted KNN Indoor Location Technology. . . . . . . . . . . . . 258


Lu Huang, Xingli Gan, Dan Du, Boyuan Wang, and Shuang Li

A Resistance Frequency Offset Synchronization Scheme Based


on the Zadoff-Chu Conjugate Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
Cong Ma, Xuejun Sha, Yong Li, and Xu Lin

AI-Based Medium Access Control

Compressed Sensing ISAR 3D Imaging Methods Based


on OMP Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Jingcheng Zhao, Zongkai Yang, and Shaozhu Gu

Ambiguity Function Analysis of Radar-Communication Integrated


Waveform Based on FDM and TDM Technologies . . . . . . . . . . . . . . . . . . . 293
Hongzhi Men, Zhiqun Song, and Guisheng Liao

Transmission Quality Improvement Algorithms for Multicast


Terrestrial-Satellite Cooperation System . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
Yuandong Zhang and Liuguo Yin

Application of Wavelet Analysis Method in Radar Echo


Signal Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Qiuyue Li and Xiangyu Tong

Chinese News Keyword Extraction Algorithm Based on TextRank


and Topic Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Ao Xiong and Qing Guo

An Adaptive Threshold Decision Algorithm in Non-cooperative


Signal Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
Ziheng Li, Shuo Shi, and Xuemai Gu

Trajectory Optimization Under Constrained UAV-Aided Wireless


Communications with Ground Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . 350
Kun Chen, Hong Lu, Xiangping Bryce Zhai, Congduan Li,
Yunlong Zhao, and Bing Chen

IOT-Based Thermal Comfort Control for Livable Environment . . . . . . . . . . . 363


Miao Zang, Zhiqiang Xing, and Yingqi Tan

Context Adaptive Visual Tracker in Surveillance Networks . . . . . . . . . . . . . 374


Wei Feng, Minye Li, Yuan Zhou, Zizi Li, and Chenghao Li

Research on Indoor Localization Based on Joint Coefficient APIT . . . . . . . . 383


Min Zhao, Danyang Qin, Ruolin Guo, and Lin Ma
xii Contents – Part I

A Cross-Layer Approach to Maximize the Lifetime of Underwater


Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Yuan Zhou, Hui Liu, Hai Cao, Dan Li, Hongyu Yang, and Tao Cao

An Efficient Indoor Localization Method Based on Visual Vocabulary . . . . . 398


Ruolin Guo, Danyang Qin, Min Zhao, and Guangchao Xu

Realization and Performance Simulation of Spectrum Detection Based


on Cyclostationarity Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Zhiqun Song, Yujing Lv, and Zhongzhao Zhang

AI-Enabled Network Layer Algorithms and Protocols

An Improved TDoA Localization Algorithm Based on AUV


for Underwater Acoustic Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . 419
Kaicheng Yu, Kun Hao, Cheng Li, Xiujuan Du, Beibei Wang,
and Yonglei Liu

Fuzzy Probabilistic Topology Control Algorithm for Underwater


Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Wenhao Ren, Kun Hao, Cheng Li, Xiujuan Du, Yonglei Liu,
and Li Wang

Naive Bayes Classifier Based Driving Habit Prediction Scheme


for VANET Stable Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
Tong Liu, Shuo Shi, and Xuemai Gu

Path Optimization with Machine-Learning Based Prediction


for Wireless Sensor Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
Jianxin Ma, Shuo Shi, and Xuemai Gu

Research on the Maximization of Total Information Rate Based


on Energy Allocation in Multi-user SWIPT Relaying System . . . . . . . . . . . . 460
Jianxiong Li, Xuelong Ding, Xianguo Li, Kunlai Li, Ke Zhao,
and Weiguang Shi

Optimization of AODV Routing Protocol in UAV Ad Hoc Network . . . . . . . 472


Jianze Wu, Shuo Shi, Zhongyue Liu, and Xuemai Gu

A KFL-TDOA UWB Positioning Method Based on Hybrid


Location Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Shuo Shi, Meng Wang, and Kunqi Hong

Simultaneous Wireless Information and Power Transfer Protocol


Under the Presence of Node Hardware Impairments . . . . . . . . . . . . . . . . . . 488
Yanlin Liu, Juan Li, Fengye Hu, and Qiao Qiao
Contents – Part I xiii

An Improved A* Algorithm Based on Divide-and-Conquer Method


for Golf Unmanned Cart Path Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Yi Chen, Liangbo Xie, Wei He, Qing Jiang, and Junxing Xu

Power Allocation Method for Satellite Communication Based


on Network Coding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
Jin Liu, Zhuoming Li, and Gongliang Liu

Seamless Positioning and Navigation System Based on GNSS,


WIFI and PDR for Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522
Yuanfeng Du and Dongkai Yang

Adaptive Routing Protocol for Underwater Wireless Sensor


Network Based on AUV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
Yuying Ding, Cheng Li, Kun Hao, Xiujuan Du, Lu Zhao, and Qi Liu

Performance Analysis of Energy-Efficient Cell Switch


off Scheme for CoMP Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554
Fei Ding, Yan Lu, Jialu Li, Ruoyu Su, Dengyin Zhang, and Hongbo Zhu

An Energy-Efficient Routing Protocol for Internet


of Underwater Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
Ruoyu Su, Fei Ding, Dengyin Zhang, Hongbo Zhu, and Xiaohong Wang

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571


Contents – Part II

Security with Deep Learning for Communications and Networks

VITEC: A Violence Detection Framework . . . . . . . . . . . . . . . . . . . . . . . . . 3


Hany Ferdinando, Tuija Huuki, Liang Ye, Tian Han, Zhu Zhang,
Guobing Sun, Tapio Seppänen, and Esko Alasaarela

Software Defect Prediction Model Based on Stacked Denoising


Auto-Encoder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Yu Zhu, Dongjin Yin, Yingtao Gan, Lanlan Rui, and Guoxin Xia

Deep&Cross Network for Software-Intensive System Fault Prediction . . . . . . 28


Guoxin Xia, Dongjin Yin, Yingtao Gan, Lanlan Rui, and Yu Zhu

Research on Evaluation Method of Cooperative Jamming Effect


in Cognitive Confrontation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Jing Ma, Bin Shi, Fei Che, and Sitong Zhang

Navigation Performance Comparison of ACE-BOC Signal


and TD-AltBOC Signal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Chunxia Li, Jianjun Fan, Min Li, and Yang Gao

A Video-Selection-Encryption Privacy Protection Scheme Based


on Machine Learning in Smart Home Environment . . . . . . . . . . . . . . . . . . . 65
Qingshui Xue, Haozhi Zhu, Xingzhong Ju, Haojin Zhu, Fengying Li,
Xiangwei Zheng, and Baochuan Zuo

A Multi-agent Reinforcement Learning Based Power Control Algorithm


for D2D Communication Underlaying Cellular Networks . . . . . . . . . . . . . . . 77
Wentai Chen and Jun Zheng

An Adaptive Window Time-Frequency Analysis Method Based


on Short-Time Fourier Transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Zhiqiang Li, Xiao Wang, Ming Li, and Shuai Han

Research on the Security of Personal Information in the Era of Big Data . . . . 107
Cheng Chi, Tengyu Liu, Xiaochen Yu, Shuo Zhang, and Shuo Shi

Secure Access and Routing Scheme for Maritime Communication Network . . . 115
Yuzhou Fu, Chuanao Jiang, Yurong Qin, and Liuguo Yin

Multipath Based Privacy Protection Method for Data Transmission in SDN . . . 127
Na Dong, Zhigeng Han, and Liangmin Wang
xvi Contents – Part II

A Biometric-Based IoT Device Identity Authentication Scheme . . . . . . . . . . 139


Qingshui Xue, Xingzhong Ju, Haozhi Zhu, Haojin Zhu, Fengying Li,
and Xiangwei Zheng

A Physical and Verbal Bullying Detecting Algorithm Based on K-NN


for School Bullying Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Shangbin Gao and Liang Ye

Speech Bullying Vocabulary Recognition Algorithm in Artificial Intelligent


Child Protecting System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Tong Liu, Liang Ye, Tian Han, Yue Li, and Esko Alasaarela

Cross Station-Voltage-Level Route Planning Algorithm for System


Protection Services in UHV Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Danyang Xu, Peng Yu, Wenjing Li, Xuesong Qiu, and Luoming Meng

An Efficient Implementation of Multi-interface SSD Controller on SoC . . . . . 181


Yifei Niu, Hai Cheng, Songyan Liu, Huan Liu, Xiaowen Wang,
and Yanlin Chen

Joint BP and RNN for Resilient GPS Timing Against Spoofing Attacks . . . . 190
Sriramya Bhamidipati, Kyeong Jin Kim, Hongbo Sun, Philip Orlik,
and Jinyun Zhang

Cloud and Big Data of AI-Enabled Networks

Regional Landslide Sensitivity Analysis Based on CPSO-LSSVM. . . . . . . . . 213


Yanze Li, Zhenjian Yang, Yunjie Zhang, and Zhou Jin

Multitasks Scheduling in Delay-Bounded Mobile Edge Computing . . . . . . . . 224


Longyu Zhou, Supeng Leng, Ning Yang, and Ke Zhang

Edge Computing Based Traffic Analysis System Using Broad Learning. . . . . 238
Xiting Peng, Kaoru Ota, and Mianxiong Dong

The Performance of DF Relaying System Based on Energy Harvesting


and Dual-Media Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Zhixiong Chen, Lijiao Wang, Cong Ye, and Dongsheng Han

School Violence Detection Based on Multi-sensor Fusion and Improved


Relief-F Algorithms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Liang Ye, Jifu Shi, Hany Ferdinando, Tapio Seppänen,
and Esko Alasaarela

A UAV Based Multi-object Detection Scheme to Enhance Road


Condition Monitoring and Control for Future Smart Transportation . . . . . . . . 270
Jian Yang, Jielun Zhang, Feng Ye, and Xiaohui Cheng
Contents – Part II xvii

Sentiment Analysis for Tang Poetry Based on Imagery Aided


and Classifier Fusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Yabo Shen, Yong Ma, Chunguo Li, Shidang Li, Mingliang Gu,
Chaojin Zhang, Yun Jin, and Yingli Shen

Detection of Insulator Defects Based on YOLO V3. . . . . . . . . . . . . . . . . . . 291


Fei Guo, Kun Hao, Mengqi Xia, Lu Zhao, Li Wang, and Qi Liu

MCU-Based Isolated Appealing Words Detecting Method


with AI Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
Liang Ye, Yue Li, Wenjing Dong, Tapio Seppänen, and Esko Alasaarela

Performance Analysis Based on MGF Fading Approximation


in Hybrid Cooperative Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Cong Ye, Zhixiong Chen, Jinsha Yuan, and Lijiao Wang

Age and Gender Classification for Permission Control of Mobile Devices


in Tracking Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
Merahi Choukri and Shaochuan Wu

Research on Fusion of Multiple Positioning Algorithms Based


on Visual Indoor Positioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Guangchao Xu, Danyang Qin, Min Zhao, and Ruolin Guo

Social Aware Edge Caching in D2D Enabled Communication . . . . . . . . . . . 335


Jingyi Chen

AI-Based Network Intelligence for IoT

An Emergency Resource Scheduling Model Based on Edge Computing. . . . . 353


Songyan Zhong, Tao He, Mengyu Li, Lanlan Rui, Guoxin Xia,
and Yu Zhu

Mobility-Aware Task Parallel Offloading for Vehicle Fog Computing . . . . . . 367


Jindou Xie, Yunjian Jia, Zhengchuan Chen, and Liang Liang

A Floor Distinction Method Based on Recurrent Neural Network


in Cellular Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
Yongliang Zhang, Lin Ma, Danyang Qin, and Miao Yu

A Multi-classifier Approach for Fuzzy KNN Based


WIFI Indoor Localization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Yuanfeng Du and Dongkai Yang

Research on Application and Development of Key Technologies


of Dynamic Wireless Charging System in New Intelligent
Transportation System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Lina Ma, Shi An, and Wanlong Zhao
xviii Contents – Part II

Binocular Vision-Based Human Ranging Algorithm Based on Human


Faces Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Xiaolin He, Lin Ma, and Weixiao Meng

Deep Reinforcement Learning Based Task Offloading in SDN-Enabled


Industrial Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Jiadai Wang, Yurui Cao, Jiajia Liu, and Yanning Zhang

A Reinforcement Learning Based Task Offloading Scheme for Vehicular


Edge Computing Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
Jie Zhang, Hongzhi Guo, and Jiajia Liu

Sensor-Based Human Activity Recognition for Smart Healthcare:


A Semi-supervised Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
Abrar Zahin, Le Thanh Tan, and Rose Qingyang Hu

CoLoRSim: A Highly Scalable ICN Simulation Platform . . . . . . . . . . . . . . . 473


Hongyi Li and Hongbin Luo

Manifold Learning Based Super Resolution for Mixed-Resolution


Multi-view Video in Visual Internet of Things . . . . . . . . . . . . . . . . . . . . . . 486
Yuan Zhou, Ying Wang, Yeda Zhang, Xiaoting Du, Hui Liu, and Chuo Li

Posture Recognition and Heading Estimation Based on Machine Learning


Using MEMS Sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
Boyuan Wang, Xuelin Liu, Baoguo Yu, Ruicai Jia, and Lu Huang

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509


Deep Learning/Machine Learning in
Physical Layer and Signal Processing
Dual-Mode OFDM-IM by Encoding All
Possible Subcarrier Activation Patterns

Xiaoping Jin, Zheng Guo, Mengmeng Zhao, Ning Jin(&),


and Dongxiao Chen

Key Laboratory of Electromagnetic Wave Information Technology


and Metrology of Zhejiang Province, College of Information Engineering,
China Jiliang University, Hangzhou, China
{jxp1023,jinning1117}@cjlu.edu.cn,
guozheng311@sina.com, z_meng_meng@163.com

Abstract. In traditional orthogonal frequency division multiplexing with index


modulation (OFDM-IM), when the subcarrier activation patterns (SAPs) is not a
power of 2, part of SAPs will not be used. This will result in low transmission
efficiency and low bit error rate (BER) performance. We have proposed a new
scheme namely bit-padding dual-mode orthogonal frequency division multi-
plexing (BPDM-OFDM). It exploits all of the possible SAPs to convey data to
obtain a better BER performance. Meanwhile, the BPDM-OFDM uses the dual-
mode orthogonal frequency division multiplexing (DM-OFDM) to improve the
transmission efficiency. In addition, a subcarrier interleaving technique is
adopted to further improve the BER performance and the idea of hard limit
algorithm, which is applied to the log-likelihood ratio detector (LLR-HL) to
reduce the detection complexity. Significant performance improvement of the
proposed scheme, in terms of transmission rate, detection complexity and BER
performance, over the traditional OFDM-IM scheme has been validated through
theoretical analysis and extensive simulations.

Keywords: OFDM-IM  BPDM-OFDM  Transmission efficiency 


Bit-padding  LLR-HL detector

1 Introduction

Index modulation (IM) is one of the promising transmission schemes for next-
generation wireless communication systems due to its advantages [1]. It utilizes the
indices of the building blocks of the corresponding communication systems to convey
additional information bits in contrast to traditional modulation schemes that rely on
the modulation of the amplitude/phase/frequency of a sinusoidal carrier signal for
transmission [2]. In orthogonal frequency division multiplexing with index modulation
(OFDM-IM) system, a subset of subcarriers in an OFDM block is activated to convey
constellation symbols, the indices of the active subcarriers can be used to convey
additional information [3].
In the OFDM-IM system, the active subcarriers are selected by the incoming data
[4]. The correct determination of a subcarrier activation pattern (SAP) is essential for

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019
Published by Springer Nature Switzerland AG 2019. All Rights Reserved
S. Han et al. (Eds.): AICON 2019, LNICST 286, pp. 3–15, 2019.
https://doi.org/10.1007/978-3-030-22968-9_1
4 X. Jin et al.

the correct detection of the associated information bits. Different mapping and detection
techniques have been proposed, which indicate two major problems.
First of all, the detectors suffer from the possibility of detecting an invalid SAP
since not all of the possible SAPs are used in OFDM-IM. By now, a look-up table
mapping method and a combinatorial mapping method are mainly proposed [5]. But
the two methods share a common disadvantage that they cannot make full use of all
SAPs, unless the number of the SAPs is a power of 2. In this case, a method of using
unequal-length of index bits to exploit all SAPs is proposed [6], but it is difficult for
detection and the BER performance decreases. By changing the number of information
bits corresponding to the traditional amplitude phase modulation, and the information
bits carried by the OFDM block maintain constant, the literature [7] proposed an
equiprobable subcarrier activation method which is easy for detection, whereas the
transmission efficiency is not improved compared with the traditional OFDM-IM
system. In this paper, to achieve a better BER performance and higher transmission
efficiency, we propose a constructed index bits mapping method which use the concept
of bit-padding (BP) [8] to build an equal-length bits transmission scheme for dual-
mode OFDM (BPDM-OFDM).
The second problem is how to reduce the detection complexity while maintaining
high transmission efficiency. In [9], a dual-mode method is proposed to improve
transmission efficiency, but the log-likelihood ratio (LLR) detection algorithm which is
adopted has high complexity, especially under high order modulation [10]. In our
BPDM-OFDM system, a reduced-complexity approximate optimal LLR detector based
on the hard limit algorithm (LLR-HL) is employed, in which the modulation symbol is
detected by directly calculation instead of traversing all constellation points after the
active subcarriers are obtained [11].
It is shown via computer simulation that, under additive white Gaussian noise
(AWGN) channels and frequency-selective Rayleigh fading channels, our proposed
BPDM-OFDM achieves an overall better BER performance. And there is an increase
of 1 bit/s/Hz in transmission efficiency and a much lower detection complexity
achieved compared to the traditional OFDM-IM.
The rest of the paper is summarized as follows. In Section II, the system model of
BPDM-OFDM is presented. In Section III, the constructed index bits mapping method,
which is the main concept of BPDM-OFDM system, are introduced. The performance
of BPDM-OFDM compared with OFDM-IM is analyzed in Section IV. Finally, Sec-
tion V concludes the paper.

2 Methods

The number of subcarriers of OFDM-IM system is set as N, which is equal to the fast
Fourier transform (FFT). A total of m information bits enter the OFDM-IM transmitter
for the transmission of each OFDM block. These m bits are then split into g groups
each containing p bits, i.e., m ¼ pg. Each group of p-bits is mapped to an OFDM
subblock. The number of subcarriers of each subblock is n, where n ¼ N=g. Suppose
that the number of active subcarriers of each group is k, the number of SAPs is given by
the binomial coefficient Cðn; kÞ. The specific SAP of a subblock is determined by
Dual-Mode OFDM-IM by Encoding All Possible Subcarrier Activation Patterns 5

mapping a p1 -bit data code, where p1 ¼ blog2 Cðn; kÞc and bc is the floor function.
A data segment of p2 ¼ k log2 M bits is used such that k data codes of length log2 M
bits are mapped onto the M-QAM signal constellation to determine the data symbols
that are transmitted over the active subcarriers. Therefore, a total of p bits (p ¼ p1 þ p2 )
are mapped to an OFDM subblock of n subcarriers. This traditional OFDM-IM scheme
is shown in Fig. 1.

p1 bits Index
Selector

[X1,X2, ,XN]
p bits

Mapper OFDM
p2 bits
Block Cyclic
m bits Bit Creator Prefix
N-IFFT
Spliter & &
Subcarrier P/S
p1 bits Index Interleaving
Selector

p bits [XN-n+1, ,XN]

Mapper
p2 bits

Fig. 1. The block diagram of the traditional OFDM-IM transmitter

As the OFDM-IM transmitter in Fig. 1, if the value of Cðn; kÞ is not a power of 2,


there are always some SAPs that cannot be used. For example, for n ¼ 4 and k ¼ 2, the
number of all possible SAPs is 6. Assume p1 ¼ 2 bits, the 2p1 ¼ 4 SAPs are used. That
means there are 2 invalid SAPs. In order to improve the transmission efficiency, we
propose a constructed index bits mapping method to make use of all possible SAPs.
Instead of the Index Selector and Mapper in Fig. 1, the p1 bits will be processed by
Backward Selection or Padding ‘1’ module according to the decimal value of p1 bits.
The detailed process will be discussed in Sect. 3. After the Backward Selection or
Padding ‘1’ module, the constructed index bits are generated. Meanwhile, the p2 bits
are split into two parts and then modulated by the MA and MB order modulator,
respectively. The value of MA is equal to that of MB , whereas the constellation points of
MA mapper and MB mapper are different in amplitude and phase. This is called dual-
mode index modulation (DM-IM) techniques. The block diagram of the above-
mentioned scheme, which is called BPDM-OFDM transmitter is given in Fig. 2.
The transmitter combines g subblocks to form an OFDM symbol group. The N
symbols are interleaved for the purpose of improving the error performance at low SNR
region [12]. Then IFFT operation of point N is carried out to obtain the time domain
transmitted signal x ¼ ½x1 ; x2 ; . . .; xN T , where ðÞT represents transpose operation. At
6 X. Jin et al.

Fig. 2. The block diagram of the BPDM-OFDM transmitter

the output of IFFT, a cyclic prefix (CP) of length L samples x ¼


½xNL þ 1 ; . . .; xN1 ; xN T is appended to the beginning of the OFDM block. After par-
allel to serial (P/S) and digital-to-analog conversion, the signal is sent through a
frequency-selective Rayleigh fading channel which can be represented by the channel
impulse response (CIR) coefficients hT ¼ ½hT ð1Þ. . .hT ðvÞT , in which hT ðrÞ; r ¼
1; . . .; v are the cyclic symmetric complex Gauss random variable with CNð0; 1vÞ dis-
tribution, v represents the length of CIR. Supposing that the channel remains constant
during the transmission of an OFDM block and the CP length L is larger than v, the
coefficient of transfer function of frequency domain channel is the N-point FFT
transform of hT , which is represented as

1
H ¼ ½H1 ; H2 ; . . .; HN T ¼ pffiffiffiffi FFTð
hT Þ ð1Þ
N

where hT ¼ ½hT ð1Þ; . . .; hT ðvÞ; 0; . . .; 0T , p1ffiffiNffi FFTðÞ represents FFT operation of point N.
At the receiver, after the CP removal operation and serial-to-parallel conversion, the
FFT operation of point N and de-interleaving are performed to obtain the received
signal Y ¼ ½Y1 ; Y2 ; . . .; YN T , where

Yn ¼ Hn Xn þ Wn ; 1  n  N ð2Þ

In which Wn is the white Gaussian noise follows CNð0; N0 Þ distribution.


Dual-Mode OFDM-IM by Encoding All Possible Subcarrier Activation Patterns 7

In order to reduce the computational complexity, we use a low complexity log-


likelihood ratio (LLR) algorithm to calculate the constellation diagram where the active
symbols belonged. The basic idea is as follows: First, posterior probability is calculated
according to formula (3), in which 1  n  N, SA ðjÞ 2 MA , SB ðjÞ 2 MB . If the sign of
cn is positive, the subcarrier transmits the symbol modulated by MA -QAM; if the sign
of cn is negative, the subcarrier transmits the symbol modulated by MB -QAM. Thus,
the corresponding SAP is obtained.
PMA
j¼1 PrðXn ¼ SA ðjÞjYn Þ
cn ¼ lnðPMB Þ ð3Þ
j¼1 PrðXn ¼ SB ðjÞjYn Þ

Then, we determine the corresponding modulation symbol [11] of each subcarrier


according to HL algorithm. Firstly, break the M-QAM symbols into N1 -PAM and
N2 -PAM, where M ¼ N1  N2 . Then calculate the values of modulation symbols
carried by the received signal Yl of each subcarrier according to formula (4) and
formula (5), in which sl ¼ Rðsl Þ þ j  Iðsl Þ, u1 ¼ RðYl Þ, u2 ¼ IðYl Þ, and RðÞ represents
retrieving the real part, IðÞ represents getting the imaginary part, minðÞ, maxðÞ,
roundðÞ represent the minimum, maximum and round values, respectively. It is
unnecessary to search modulation symbols when using HL algorithm. So the com-
putational complexity can be greatly reduced, especially in the condition of high order
modulation.

u1 þ 1
Rðsl Þ ¼ min½maxð2roundð Þ  1; N1 þ 1Þ; N1  1 ð4Þ
2
u2 þ 1
Iðsl Þ ¼ min½maxð2roundð Þ  1; N2 þ 1Þ; N2  1 ð5Þ
2

3 The Constructed Index Bits Mapping Method

The constructed index bits mapping method includes the Backward Selection mode and
the Padding ‘1’ mode. The main idea is described as follows: a total of m information
bits enter the OFDM-IM transmitter for the transmission of each OFDM block, these m
bits are split into g groups each containing p bits, i.e., m ¼ pg. Select the first p1 bits of
the incoming p bits and convert the value of p1 into a decimal number Z. Then, we
compare the value of Z with Cðn; kÞ  2p1  1. According to the results of the com-
parison, the algorithm decides to choose one of the two modes, Backward Selection or
Padding ‘1’. The block diagram of the transmitter is given in Fig. 2.
(1) Backward Selection:
If 0  Z  Cðn; kÞ  2p1  1, select one more bit after the first p1 bits, so the index
bits become a length of p1 þ 1 bits sequence, then take the next step according to
the ðp1 þ 1Þ-th bit. This is called Backward Selection.
(a) If the ðp1 þ 1Þ-th bit is ‘0’, the index value Z I is equal to Z.
8 X. Jin et al.

(b) If the ðp1 þ 1Þ-th bit is ‘1’, the index value Z I is equal to Z þ 2p1 .
(2) Padding ‘1’:
If Z [ Cðn; kÞ  2p1  1, padding ‘0’ or ‘1’ after p1 bits, then the index bits of p1
turn into p1 þ 1 bits. The index value Z I is equal to Z. This is called Padding ‘1’.
We take p1 ¼ 2; n ¼ 4; k ¼ 2 as an example for each subblock, which is shown in
Table 1. If the numeric value in the active subcarrier is ‘1’, it indicates that the cor-
responding subcarrier is activated, and ‘0’ indicates that the subcarrier is not activated.

Table 1. Constructed index bits mapping method when p1 ¼ 2; n ¼ 4; k ¼ 2


Index Z Cðn; kÞ Backward Constructed Index Sequences J Active
bit 2p1  1 Selection or index bits value Z I subcarrier
Padding ‘1’
00 0 1 Backward 000 0 {1, 0} [1, 1, 0, 0]
Selection 001 4 {3, 1} [0, 1, 0, 1]
01 1 1 Backward 010 1 {2, 0} [1, 0, 1, 0]
Selection 011 5 {3, 2} [0, 0, 1, 1]
10 2 1 Padding ‘1’ 101 2 {2, 1} [0, 1, 1, 0]
11 3 1 Padding ‘1’ 111 3 {3, 0} [1, 0, 0, 1]

If the p1 ¼ 2 information bits of the data stream are ‘00’, its decimal value is 0, that
is, Z ¼ 0. And Cðn; kÞ  2p1  1 ¼ 6  22  1 ¼ 1, so 0  Z  Cðn; kÞ  2p1  1 is
derived, according to the algorithm, the one more bit after the first p1 bits of the data
stream will be selected. The ‘0’ or ‘1’ should be padded into the sequence after original
index bits to form the new index bits sequence, which we named the Constructed Index
Bits: If the subsequent bit is ‘0’, the Z I ¼ 0 is obtained by converting the new index
bits ‘000’ into decimal form; If the subsequent bit is ‘1’, the Z I ¼ 4 is obtained by
converting the new index bits ‘001’ to decimal plus 2p1 , then Z I ¼ Z þ 2p1 ¼ 4.
If the two information bits of the data stream are ‘10’, its decimal value is 2.
Cðn; kÞ  2p1  1 ¼ 6  22  1 ¼ 1, 2  1. Therefore, according to the algorithm, the
information bit ‘1’ will be padded after the original index bits ‘10’, we get a new index
bits ‘101’. Then the new index bits sequence ‘101’ is converted to the decimal form 2,
that is Z I ¼ 2.
Each subblock adopts the bit-padding technique mentioned above, in the meantime
a total of p2 bits are sent to the MA mapper and MB mapper.

p2 ¼ k log2 MA þ ðn  kÞ log2 MB ð6Þ

where MA and MB represent the modulation order. It is clear that the length of sub-
carrier indices of each OFDM-IM subblock are equal after bit-padding process,
meanwhile the number of bits which carried in each subblock will be p ¼ ðp1 þ 1Þ þ p2
or p ¼ p1 þ p2 . Because of Backward Selection, the former is 1 larger than the latter.
According to the value of Z I , we use the combinational method to obtain the
corresponding SAP as shown in formula (2) [5]. Among them, ck [ . . . [ c1  0,
Dual-Mode OFDM-IM by Encoding All Possible Subcarrier Activation Patterns 9

which ck represents the position corresponding to the activation of the subcarrier in


each subblock. The number of active subcarriers satisfies Cðck ; kÞ  Z I and
Cðck1 ; k  1Þ  Z I  Cðck ; kÞ, etc. Then the serial number of active subcarriers finally
is J þ 1, J ¼ fck ; . . .; c1 g.

Z I ¼ Cðck ; kÞ þ . . . þ Cðc2 ; 2Þ þ Cðc1 ; 1Þ ð7Þ

As an example, when n ¼ 4; k ¼ 2; Cð4; 2Þ ¼ 6, the algorithm, which finds the


lexicographically ordered sequences for all possibilities, can be explained as follows:
start by choosing the maximal ck that satisfies Cðck1 ; 2Þ  5 and then choose the
maximum ck1 that satisfies Cðck1 ; 1Þ  5  Cðck ; 2Þ and so on. The following
sequences J can be calculated as:

5 ¼ Cð3; 2Þ þ Cð2; 1Þ ! J ¼ f3; 2g


4 ¼ Cð3; 2Þ þ Cð1; 1Þ ! J ¼ f3; 1g
3 ¼ Cð3; 2Þ þ Cð0; 1Þ ! J ¼ f3; 0g
ð8Þ
2 ¼ Cð2; 2Þ þ Cð1; 1Þ ! J ¼ f2; 1g
1 ¼ Cð2; 2Þ þ Cð0; 1Þ ! J ¼ f2; 0g
0 ¼ Cð1; 2Þ þ Cð0; 1Þ ! J ¼ f1; 0g

4 Results and Discussion

4.1 Transmission Efficiency


The number of data bits carried in each subblock of traditional OFDM-IM and the
proposed BPDM-OFDM are as below:
OFDM-IM:

p ¼ p1 þ p2 ¼ blog2 Cðn; kÞc þ k log2 M

BPDM-OFDM:
a. Backward Selection:

p ¼ ðp1 þ 1Þ þ p2 ¼ blog2 Cðn; kÞc þ 1 þ k log2 MA þ k log2 MB

b. Padding ‘1’:

p ¼ p1 þ p2 ¼ blog2 Cðn; kÞc þ k log2 MA þ k log2 MB


10 X. Jin et al.

The comparison of the number of transmission data bits in each subblock between
BPDM-OFDM and OFDM-IM systems for n ¼ 4; k ¼ 2 are shown in Table 2.

Table 2. Comparison of the number of data bits at n ¼ 4; k ¼ 2


Modulation OFDM- BPDM-OFDM BPDM-OFDM
mode IM (Backward (Padding ‘1’)
Selection)
BPSK 4 7 6
QPSK 6 11 10

Spectrum efficiency is calculated with q ¼ gðpN1 þþLp2 Þ.with BPSK, the spectrum
efficiency of OFDM-IM is 0.89 bit/Hz, and the spectrum efficiency of BPDM-OFDM
is 1.56 bit/s/Hz or 1.33 bit/s/Hz; With QPSK modulation, the spectrum efficiency
of OFDM-IM is 1.33 bit/Hz, and the spectrum efficiency of BPDM-OFDM is
2.45 bit/s/Hz or 2.22 bit/s/Hz. From the comparison it can be concluded that BPDM-
OFDM system obtains higher spectrum efficiency.

4.2 Complexity Analysis


The total computational complexity of the detectors of OFDM-IM and BPDM-OFDM
systems, in terms of real multiplications, are shown in Table 3.

Table 3. Complexity analysis


Model Detection Complexity Example:
algorithm n; k; M ¼ ð4; 2; 4Þ
OFDM-IM ML Oð2CM k Þ 196
BPDM- ML Oð6n2 MA MB Þ 1536
OFDM LLR+ML Oð6nMA þ 6nðMA þ MB ÞÞ 288
LLR-HL Oð9n þ 6nðMA þ MB ÞÞ 228

In Table 3, C ¼ 2p1 is the total number of active subcarrier index combinations,


and MA ¼ MB ¼ M is the order of modulation.
As shown in Table 3, the complexity of ML detection algorithm increases
quadratically with the number of subcarriers N, and increases linearly with modulation
order. When the transmitting terminal is equipped with dozens or even hundreds of
subcarriers, the detection complexity of ML detector will be so large that makes it
Dual-Mode OFDM-IM by Encoding All Possible Subcarrier Activation Patterns 11

become impractical. In our proposed LLR-HL algorithm, the posterior probability is


used to judge the dual-mode modulation constellation space. HL algorithm which can
directly calculates modulation symbol is used to replace the full-search ML detection,
so the LLR-HL detection algorithm can greatly reduce the complexity of detection and
eliminate the problem that the complexity increases exponentially with N.

4.3 BER Analysis


In this subsection, simulation is carried out under AWGN channel and frequency-
selective channel for the BPDM-OFDM with QPSK modulation and OFDM-IM with
16QAM modulation to ensure they have the same spectrum efficiency. In all simula-
tions, we assumed the following system parameters: N ¼ 128, n ¼ 4, k ¼ 2 and
L ¼ 16. The comparison of BER performance between OFDM-IM and BPDM-OFDM
systems using different detection algorithms are shown in Figs. 3, 4 and 5.

0
10
OFDM
OFDM-IM(4,2)
-1 OFDM-ISIM(4,2)
10

-2
10
BER

-3
10

-4
10

-5
10
0 5 10 15 20 25 30 35 40
Es/No (dB)

Fig. 3. Performance comparison of OFDM-IM with/without interleaving

As shown in Fig. 3, under BPSK modulation, the OFDM-IM with subcarrier


interleaving (OFDM-ISIM) has obvious advantages over OFDM-IM and OFDM at
medium to high SNR. At a BER value of 10−3, the performance gap between
OFDM-ISIM and OFDM-IM is about 7 dB. Therefore, we employ the subcarrier
12 X. Jin et al.

0
10
BPDM-OFDM,LLR-HL
BPDM-OFDM,LLR
-1 BPDM-OFDM,ML
10
OFDM-IM,ML

-2
10
BER

-3
10

-4
10

-5
10
5 6 7 8 9 10 11 12
Es/No (dB)

Fig. 4. Performance comparison of BPDM-OFDM over AWGN channel

0
10
OFDM-IM,ML
BPDM-OFDM,LLR-ML
-1 BPDM-OFDM,ML
10
BPDM-OFDM without interleaving,LLR-HL
BPDM-OFDM with interleaving,LLR-HL

-2
10
BER

-3
10

-4
10

-5
10
5 10 15 20 25 30 35 40
Es/No (dB)

Fig. 5. Performance comparison of BPDM-OFDM over frequency-selective channels


Another random document with
no related content on Scribd:
BOOK II
ESSAYS IN PRACTICAL EDUCATION
CHAPTER I

THE PHILOSOPHER AT HOME


“He has such a temper, ma’am!”
And there, hot, flurried, and, generally at her wits’ end, stood the
poor nurse at the door of her mistress’s room. The terrific bellowing
which filled the house was enough to account for the maid’s distress.
Mrs. Belmont looked worried. She went up wearily to what she well
knew was a weary task. A quarter of an hour ago life had looked
very bright—the sun shining, sparrows chirping, lilac and laburnum
making a gay show in the suburban gardens about; she thought of
her three nestlings in the nursery, and her heart was like a singing-
bird giving out chirps of thanks and praise. But that was all changed.
The outside world was as bright as ever, but she was under a cloud.
She knew too well how those screams from the nursery would spoil
her day.
There the boy lay, beating the ground with fists and feet; emitting
one prodigious roar after another, features convulsed, eyes
protruding, in the unrestrained rage of a wild creature, so
transfigured by passion that even his mother doubted if the noble
countenance and lovely smile of her son had any existence beyond
her fond imagination. He eyed his mother askance through his
tumbled, yellow hair, but her presence seemed only to aggravate the
demon in possession. The screams were more violent; the beating of
the ground more than ever like a maniac’s rage.
“Get up, Guy.”
Renewed screams; more violent action of the limbs!
“Did you hear me, Guy?” in tones of enforced calmness.
The uproar subsided a little, but when Mrs. Belmont laid her hand
on his shoulder to raise him, the boy sprang to his feet, ran into her,
head-foremost, like a young bull, kicked her, beat her with his fists,
tore her dress with his teeth, and would no doubt have ended by
overthrowing his delicate mother, but that Mr. Belmont, no longer
able to endure the disturbance, came up in time to disengage the
raging child and carry him off to his mother’s room. Once in, the key
was turned upon him, and Guy was left to “subside at his leisure,”
said his father.
Breakfast was not a cheerful meal, either upstairs or down. Nurse
was put out; snapped up little Flo, shook baby for being tiresome,
until she had them both in tears. In the dining-room, Mr. Belmont
read the Times with a frown which last night’s debate did not
warrant; sharp words were at his tongue’s end, but, in turning the
paper, he caught sight of his wife’s pale face and untasted breakfast.
He said nothing, but she knew and suffered under his thoughts fully
as much as if they had been uttered. Meantime, two closed doors
and the wide space between the rooms hardly served to dull the ear-
torturing sounds that came from the prisoner.
All at once there was a lull, a sudden and complete cessation of
sound. Was the child in a fit?
“Excuse me a minute, Edward;” and Mrs. Belmont flew upstairs,
followed shortly by her husband. What was her surprise to see Guy
with composed features contemplating himself in the glass! He held
in his hand a proof of his own photograph which had just come from
the photographer’s. The boy had been greatly interested in the
process; and here was the picture arrived, and Guy was solemnly
comparing it with that image of himself which the looking-glass
presented.
Nothing more was said on the subject; Mr. Belmont went to the
City, and his wife went about her household affairs with a lighter
heart than she had expected to carry that day. Guy was released,
and allowed to return to the nursery for his breakfast, which his
mother found him eating in much content and with the sweetest face
in the world; no more trace of passion than a June day bears when
the sun comes out after a thunderstorm. Guy was, indeed, delicious;
attentive and obedient to Harriet, full of charming play to amuse the
two little ones, and very docile and sweet with his mother, saying
from time to time the quaintest things. You would have thought he
had been trying to make up for the morning’s fracas, had he not
looked quite unconscious of wrong-doing.
This sort of thing had gone on since the child’s infancy. Now, a
frantic outburst of passion, to be so instantly followed by a sweet
April-day face and a sunshiny temper that the resolutions his parents
made about punishing or endeavouring to reform him passed away
like hoar-frost before the child’s genial mood.
A sunshiny day followed this stormy morning; the next day passed
in peace and gladness, but, the next, some hair astray, some
crumpled rose-leaf under him, brought on another of Guy’s furious
outbursts. Once again the same dreary routine was gone through;
and, once again, the tempestuous morning was forgotten in the
sunshine of the child’s day.
Not by the father, though: at last, Mr. Belmont was roused to give
his full attention to the mischief which had been going on under his
eyes for nearly the five years of Guy’s short life. It dawned upon him
—other people had seen it for years—that his wife’s nervous
headaches and general want of tone might well be due to this
constantly recurring distress. He was a man of reading and
intelligence, in touch with the scientific thought of the day, and
especially interested in what may be called the physical basis of
character,—the interaction which is ever taking place between the
material brain and the immaterial thought and feeling of which it is
the organ. He had even made little observations and experiments,
declared to be valuable by his friend and ally, Dr. Steinbach, the
head physician of the county hospital.
For a whole month he spread crumbs on the window-sill every
morning at five minutes to eight; the birds gathered as punctually,
and by eight o’clock the “table” was cleared and not a crumb
remained. So far, the experiment was a great delight to the children,
Guy and Flo, who were all agog to know how the birds knew the
time.
After a month of free breakfasts: “You shall see now whether or
no the birds come because they see the crumbs.” The prospect was
delightful, but, alas! this stage of the experiment was very much
otherwise to the pitiful childish hearts.
“Oh, father, please let us put out crumbs for the poor little birds,
they are so hungry!” a prayer seconded by Mrs. Belmont, met with
very ready acceptance. The best of us have our moments of
weakness.
“Very interesting,” said the two savants. “Nothing could show
more clearly the readiness with which a habit is formed in even the
less intelligent of the creatures.”
“Yes, and more than that, it shows the automatic nature of the
action once the habit is formed. Observe, the birds came punctually
and regularly when there were no longer crumbs for them. They did
not come, look for their breakfast, and take sudden flight when it was
not there, but they settled as before, stayed as long as before, and
then flew off without any sign of disappointment. That is, they came,
as we set one foot before another in walking, just out of habit,
without any looking for crumbs, or conscious intention of any sort, a
mere automatic or machine-like action with which conscious thought
has nothing to do.”
Of another little experiment Mr. Belmont was especially proud,
because it brought down, as it were, two quarries at a stroke;
touched heredity and automatic action in one little series of
observations. Rover, the family dog, appeared in the first place as a
miserable puppy saved from drowning. He was of no breed to speak
of, but care and good living agreed with him. He developed a
handsome shaggy white coat, a quiet, well-featured face, and
betrayed his low origin only by one inveterate habit; carts he took no
notice of, but never a carriage, small or great, appeared in sight but
he ran yelping at the heels of the horses in an intolerable way,
contriving at the same time to dodge the whip like any street Arab.
Oddly enough, it came out through the milkman that Rover came of
a mother who met with her death through this very peccadillo.
Here was an opportunity. The point was, to prove not only that the
barking was automatic, but that the most inveterate habit, even an
inherited habit, is open to cure.
Mr. Belmont devoted himself to the experiment: he gave orders
that, for a month, Rover should go out with no one but himself. Two
pairs of ears were on the alert for wheels; two, distinguished
between carriage and cart. Now Rover was the master of an
accomplishment of which he and the family were proud: he could
carry a newspaper in his mouth. Wheels in the distance, then, “Hi!
Rover!” and Rover trotted along, the proud bearer of the Times. This
went on daily for a month, until at last the association between
wheels and newspaper was established, and a distant rumble would
bring him up—a demand in his eyes. Rover was cured. By-and-by
the paper was unnecessary, and “To heel! good dog!” was enough
when an ominous falling of the jaw threatened a return of the old
habit.
It is extraordinary how wide is the gap between theory and
practice in most of our lives. “The man who knows the power of habit
has a key wherewith to regulate his own life and the lives of his
household, down to that of the cat sitting at his hearth.” (Applause.)
Thus, Mr. Belmont at a scientific gathering. But only this morning did
it dawn upon him that, with this key between his fingers, he was
letting his wife’s health, his child’s life, be ruined by a habit fatal alike
to present peace, and to the hope of manly self-possession in the
future. Poor man! he had a bad half-hour that morning on his way
Citywards. He was not given to introspection, but, when it was forced
upon him, he dealt honestly.
“I must see Steinbach to-night, and talk the whole thing out with
him.”
“Ah, so; the dear Guy! And how long is it, do you say, since the
boy has thus out-broken?”
“All his life, for anything I know—certainly it began in his infancy.”
“And do you think, my good friend”—here the Doctor laid a hand
on his friend’s arm, and peered at him with twinkling eyes and
gravely set mouth—“do you think it possible that he has—a—
inherited this little weakness? A grandfather, perhaps?”
“You mean me, I know; yes, it’s a fact. And I got it from my father,
and he, from his. We’re not a good stock. I know I’m an irascible
fellow, and it has stood in my way all through life.”
“Fair and softly, my dear fellow! go not so fast. I cannot let you say
bad things of my best friend. But this I allow; there are thorns,
bristles all over; and they come out at a touch. How much better for
you and for Science had the father cured all that!”
“As I must for Guy! Yes, and how much happier for wife, children,
and servants; how much pleasanter for friends. Well, Guy is the
question now. What do you advise?”
The two sat far into the night discussing a problem on the solution
of which depended the future of a noble boy, the happiness of a
family. No wonder they found the subject so profoundly interesting
that two by the church clock startled them into a hasty separation.
Both ladies resented this dereliction on the part of their several lords.
They would have been meeker than Sarah herself had they known
that, not science, not politics, but the bringing up of the children, was
the engrossing topic.

Breakfast-time three days later. Scene, the dining-room.


Nurse in presence of Master and Mistress.
“You have been a faithful servant and good friend, both to us and
the children, Harriet, but we blame you a little for Guy’s passionate
outbreaks. Do not be offended, we blame ourselves more. Your
share of blame is that you have worshipped him from his babyhood,
and have allowed him to have his own way in everything. Now, your
part of the cure is, to do exactly as we desire. At present, I shall only
ask you to remember that, Prevention is better than cure. The thing
for all of us is to take precautions against even one more of these
outbreaks.
“Keep your eye upon Guy; if you notice—no matter what the
cause—flushed cheeks, pouting lips, flashing eye, frowning
forehead, with two little upright lines between the eyebrows, limbs
held stiffly, hands, perhaps, closed, head thrown slightly back; if you
notice any or all of these signs, the boy is on the verge of an
outbreak. Do not stop to ask questions, or soothe him, or make
peace, or threaten. Change his thoughts. That is the one hope. Say
quite naturally and pleasantly, as if you saw nothing, ‘Your father
wants you to garden with him,’ or, ‘for a game of dominoes;’ or, ‘your
mother wants you to help her in the store-room,’ or, ‘to tidy her work-
box.’ Be ruled by the time of the day, and how you know we are
employed. And be quite sure we do want the boy.”
“But, sir, please excuse me, is it any good to save him from
breaking out when the passion is there in his heart?”
“Yes, Harriet, all the good in the world. Your master thinks that
Guy’s passions have become a habit, and that the way to cure him is
to keep him a long time, a month or two, without a single outbreak; if
we can manage that, the trouble will be over. As for the passion in
his heart, that comes with the outer signs, and both will be cured
together. Do, Harriet, like a good woman, help us in this matter, and
your master and I will always be grateful to you!”
“I’m sure, ma’am,” with a sob (Harriet was a soft-hearted woman,
and was very much touched to be taken thus into the confidence of
her master and mistress). “I’m sure I’ll do my best, especially as I’ve
had a hand in it; but I’m sure I never meant to, and, if I forget, I hope
you’ll kindly forgive me.”
“No, Harriet, you must not forget, any more than you’d forget to
snatch a sharp knife from the baby. This is almost a matter of life and
death.”
“Very well, sir; I’ll remember, and thank you for telling me.”
Breakfast-time was unlucky; the very morning after the above talk,
Nurse had her opportunity. Flo, for some inscrutable reason,
preferred to eat her porridge with her brother’s spoon. Behold, quick
as a flash, flushed cheeks, puckered brow, rigid frame!
“Master Guy, dear,” in a quite easy, friendly tone (Harriet had
mastered her lesson), “run down to your father; he wants you to help
him in the garden.”
Instantly the flash in the eye became a sparkle of delight, the rigid
limbs were all active and eager; out of his chair, out of the room,
downstairs, by his father’s side in less time than it takes to tell. And
the face—joyous, sparkling, full of eager expectation—surely Nurse
had been mistaken this time? But no; both parents knew how quickly
Guy emerged from the shadow of a cloud, and they trusted Harriet’s
discretion.
“Well, boy, so you’ve come to help me garden? But I’ve not done
breakfast. Have you finished yours?”
“No, father,” with a dropping lip.
“Well, I’ll tell you what. You run up and eat your porridge and
come down as soon as you’re ready; I shall make haste, too, and we
shall get a good half-hour in the garden before I go out.”
Up again went Guy with hasty, willing feet.
“Nurse” (breathless hurry and importance), “I must make haste
with my porridge. Father wants me directly to help him in the
garden.”
Nurse winked hard at the fact that the porridge was gobbled. The
happy little boy trotted off to one of the greatest treats he knew, and
that day passed without calamity.
“I can see it will answer, and life will be another thing without
Guy’s passions; but do you think, Edward, it’s right to give the child
pleasures when he’s naughty—in fact, to put a premium upon
naughtiness, for it amounts to that?”
“You’re not quite right there. The child does not know he is
naughty; the emotions of ‘naughtiness’ are there; he is in a physical
tumult, but wilfulness has not set in; he does not yet mean to be
naughty, and all is gained if we avert the set of the will towards
wrong doing. He has not had time to recognise that he is naughty,
and his thoughts are changed so suddenly that he is not in the least
aware of what was going on in him before. The new thing comes to
him as naturally and graciously as do all the joys of the childish day.
The question of desert does not occur.”

For a week all went well. Nurse was on the alert, was quick to
note the ruddy storm-signal in the fair little face; never failed to
despatch him instantly, and with a quiet unconscious manner, on
some errand to father or mother; nay, she improved on her
instructions; when father and mother were out of the way, she herself
invented some pleasant errand to cook about the pudding for dinner;
to get fresh water for Dickie, or to see if Rover had had his breakfast.
Nurse was really clever in inventing expedients, in hitting instantly on
something to be done novel and amusing enough to fill the child’s
fancy. A mistake in this direction would, experience told her, be fatal;
propose what was stale, and not only would Guy decline to give up
the immediate gratification of a passionate outbreak—for it is a
gratification, that must be borne in mind—but he would begin to look
suspiciously on the “something else” which so often came in the way
of this gratification.
Security has its own risks. A morning came when Nurse was not
on the alert. Baby was teething and fractious, Nurse was overdone,
and the nursery was not a cheerful place. Guy, very sensitive to the
moral atmosphere about him, got, in Nurse’s phrase, out of sorts. He
relieved himself by drumming on the table with a couple of ninepins,
just as Nurse was getting baby off after a wakeful night.
“Stop that noise this minute, you naughty boy! Don’t you see your
poor little brother is going to sleep?” in a loud whisper. The noise
was redoubled, and assisted by kicks on chair-rungs and table-legs.
Sleep vanished and baby broke into a piteous wail. This was too
much; the Nurse laid down the child, seized the young culprit, chair
and all, carried him to the furthest corner, and, desiring him not to
move till she gave him leave, set him down with a vigorous shaking.
There were days when Guy would stand this style of treatment
cheerfully, but this was not one. Before Harriet had even noted the
danger signals, the storm had broken out. For half-an-hour the
nursery was a scene of frantic uproar, baby assisting, and even little
Flo. Half-an-hour is nothing to speak of; in pleasant chat, over an
amusing book, the thirty minutes fly like five; but half-an-hour in
struggle with a raging child is a day and a night in length. Mr. and
Mrs. Belmont were out, so Harriet had it all to herself, and it was
contrary to orders that she should attempt to place the child in
confinement; solitude and locked doors involved risks that the
parents would, rightly, allow no one but themselves to run. At last the
tempest subsided, spent, apparently, by its own force.
A child cannot bear estrangement, disapproval; he must needs
live in the light of a countenance smiling upon him. His passion over,
Guy set himself laboriously to be good, keeping watch out of the
corner of his eye to see how Nurse took it. She was too much vexed
to respond in any way, even by a smile. But her heart was touched;
and though, by-and-by, when Mrs. Belmont came in, she did say
—“Master Guy has been in one of his worst tempers again, ma’am:
screaming for better than half-an-hour”—yet she did not tell her tale
with the empressement necessary to show what a very bad half-hour
they had had. His mother looked with grave reproof at the
delinquent, but she was not proof against his coaxing ways.
After dinner she remarked to her husband, “You will be sorry to
hear that Guy has had one of his worst bouts again. Nurse said he
screamed steadily for more than half-an-hour.”
“What did you do?”
“I was out at the time, doing some shopping. But when I came
back, after letting him know how grieved I was, I did as you say,
changed his thoughts and did my best to give him a happy day.”
“How did you let him know you were grieved?”
“I looked at him in a way he quite understood, and you should
have seen the deliciously coaxing, half-ashamed look he shot up at
me. What eyes he has!”
“Yes, the little monkey! and no doubt he measured their effect on
his mother; you must allow me to say that my theory certainly is not
to give him a happy day after an outbreak of this sort.”
“Why, I thought your whole plan was to change his thoughts, to
keep him so well occupied with pleasant things that he does not
dwell on what agitated him.”
“Yes, but did you not tell me the passion was over when you
found him?”
“Quite over, he was as good as gold.”
“Well, the thing we settled on was to avert a threatened outbreak
by a pleasant change of thought; and to do so in order that, at last,
the habit of these outbreaks may be broken. Don’t you see, that is a
very different thing from pampering him with a pleasant day when he
has already pampered himself with the full indulgence of his
passion?”
“Pampered himself! Why, you surely don’t think those terrible
scenes give the poor child any pleasure. I always thought he was a
deal more to be pitied than we.”
“Indeed I do. Pleasure is perhaps hardly the word; but that the
display of temper is a form of self indulgence, there is no doubt at all.
You, my dear, are too amiable to know what a relief it is to us irritable
people to have a good storm and clear the air.”
“Nonsense, Edward! But what should I have done? What is the
best course after the child has given way?”
“I think we must, as you suggested before, consider how we
ourselves are governed. Estrangement, isolation, are the immediate
consequences of sin, even of what may seem a small sin of
harshness and selfishness.”
“Oh, but don’t you think that is our delusion? that God is loving us
all the time, and it is we who estrange ourselves?”
“Without doubt; and we are aware of the love all the time, but,
also, we are aware of a cloud between us and it; we know we are out
of favour. We know, too, there is only one way back, through the fire.
It is common to speak of repentance as a light thing, rather pleasant
than otherwise; but it is searching and bitter: so much so, that the
Christian soul dreads to sin, even the sin of coldness, from an almost
cowardly dread of the anguish of repentance, purging fire though it
is.”
Mrs. Belmont could not clear her throat to answer for a minute.
She had never before had such a glimpse into her husband’s soul.
Here were deeper things in the spiritual life than any of which she yet
knew.
“Well then, dear, about Guy; must he feel this estrangement, go
through this fire?”
“I think so, in his small degree; but he must never doubt our love.
He must see and feel that it is always there, though under a cloud of
sorrow which he only can break through.”

Guy’s lapse prepared the way for further lapses. Not two days
passed before he was again hors de combat. The boy, his outbreak
over, was ready at once to emerge into the sunshine. Not so his
mother. His most bewitching arts met only with sad looks and
silence.
He told his small scraps of nursery news, looking in vain for the
customary answering smile and merry words. He sidled up to his
mother, and stroked her cheek; that did not do, so he stroked her
hand; then her gown; no answering touch, no smile, no word;
nothing but sorrowful eyes when he ventured to raise his own. Poor
little fellow! The iron was beginning to enter; he moved a step or two
away from his mother, and raised to hers eyes full of piteous doubt
and pleading. He saw love, which could not reach him, and sorrow,
which he was just beginning to comprehend. But his mother could
bear it no longer: she got up hastily and left the room. Then the little
boy, keeping close to the wall, as if even that were something to
interpose between him and this new sense of desolation, edged off
to the furthest corner of the room, and sinking on the floor with a sad,
new quietness, sobbed out lonely sobs; Nurse had had her lesson,
and although she, too, was crying for her boy, nobody went near him
but Flo. A little arm was passed round his neck; a hot little cheek
pressed against his curls:
“Don’t cry, Guy!” two or three times, and when the sobs came all
the thicker, there was nothing for it but that Flo must cry too; poor
little outcasts!
At last bedtime came, and his mother; but her face had still that
sad, far-away look, and Guy could see she had been crying. How he
longed to spring up and hug her and kiss her as he would have done
yesterday. But somehow he dared not; and she never smiled nor
spoke, and yet never before had Guy known how his mother loved
him.
She sat in her accustomed chair by the little white bed, and
beckoned the little boy in his nightgown to come and say his prayers.
He knelt at his mother’s knee as usual, and then she laid her hands
upon him.
“‘Our Father’—oh, mother, mo—o—ther, mother!” and a torrent of
tears drowned the rest, and Guy was again in his mother’s arms, and
she was raining kisses upon him, and crying softly with him.
Next morning his father received him with open arms.
“So my poor little boy had a bad day yesterday!”
Guy hung his head and said nothing.
“Would you like me to tell you how you may help ever having quite
such another bad day?”
“Oh yes, please, father; I thought I couldn’t help.”
“Can you tell when the ‘Cross-man’ is coming?”
Guy hesitated. “Sometimes, I think. I get all hot.”
“Well, the minute you find he’s coming, even if you have begun to
cry, say, ‘Please excuse me, Nurse,’ and run downstairs, and then
four times round the garden as fast as you can, without stopping to
take breath!”
“What a good way! Shall I try it now?”
“Why, the ‘Cross-man’ isn’t there now. But I’ll tell you a secret: he
always goes away if you begin to do something else as hard as you
can; and if you can remember to run away from him round the
garden, you’ll find he won’t run after you; at the very worst, he won’t
run after you more than once round!”
“Oh, father, I’ll try! What fun! See if I don’t beat him! Won’t I just
give Mr. ‘Cross-man’ a race! He shall be quite out of breath before
we get round the fourth time.”
The vivid imagination of the boy personified the foe, and the
father jumped with his humour. Guy was eager for the fray; the
parents had found an ally in their boy; the final victory was surely
within appreciable distance.

“This is glorious, Edward; and it’s as interesting as painting a


picture or writing a book! What a capital device the race with Mr.
‘Cross-man’ is! It’s like ‘Sintram.’ He’ll be so much on the qui vive for
‘Cross-man’ that he’ll forget to be cross. The only danger I see is that
of many false alarms. He’ll try the race, in all good faith, when there
is no foe in pursuit.”
“That’s very likely; but it will do no harm. He is getting the habit of
running away from the evil, and may for that be the more ready to
run when ’tis at his heels; this, of running away from temptation, is
the right principle, and may be useful to him in a thousand ways.”
“Indeed, it may be a safeguard to him through life. How did you
get the idea?”
“Do you remember how Rover was cured of barking after
carriages? There were two stages to the cure; the habit of barking
was stopped, and a new habit was put in its place; I worked upon the
recognised law of association of ideas, and got Rover to associate
the rumble of wheels with a newspaper in his mouth. I tried at the
time to explain how it was possible to act thus on the ‘mind’ of a
dog.”
“I recollect quite well, you said that the stuff—nervous tissue, you
called it—of which the brain is made is shaped in the same sort of
way—at least so I understood—by the thoughts that are in it, as the
cover of a tart is shaped by the plums below. And then, when there’s
a place ready for them in the brain, the same sort of thoughts always
come to fill it.”
“I did not intend to say precisely that,” said Mr. Belmont, laughing,
“especially the plum part. However, it will do. Pray go on with your
metaphor. It is decided that plums are not wholesome eating. You
put in your thumb, and pick out a plum; and that the place may be
filled, and well filled, you pop in a—a—figures fail me—a peach!”
“I see! I see! Guy’s screaming fits are the unwholesome plum
which we are picking out, and the running away from Cross-man the
peach to be got in instead. (I don’t see why it should be a peach
though, unpractical man!) His brain is to grow to the shape of the
peach, and behold, the place is filled. No more room for the
plum.”[21]
“You have it; you have put, in a light way, a most interesting law,
and I take much blame to myself that I never thought, until now, of
applying it to Guy’s case. But now I think we are making way; we
have made provision for dislodging the old habit and setting a new
one in its place.”
“Don’t you think the child will be a hero in a very small way, when
he makes himself run away from his temper?”
“Not in a small way at all; the child will be a hero. But we cannot
be heroes all the time. In sudden gusts of temptation, God grant him
grace to play the hero, if only through hasty flight; but in what are
called besetting sins, there is nothing safe but the contrary besetting
good habit. And here is where parents have such infinite power over
the future of their children.”
“Don’t think me superstitious and stupid; but somehow this
scientific training, good as I see it is, seems to me to undervalue the
help we get from above in times of difficulty and temptation.”
“Let me say that it is you who undervalue the virtue, and limit the
scope of the Divine action. Whose are the laws Science labours to
reveal? Whose are the works, body or brain, or what you like, upon
which these laws act?”
“How foolish of me! How one gets into a way of thinking that God
cares only for what we call spiritual things. Let me ask you one more
question. I do see that all this watchful training is necessary, and do
not wish to be idle or cowardly about it. But don’t you think Guy
would grow out of these violent tempers naturally, as he gets older?”
“Well, he would not, as youth or man, fling himself on the ground
and roar; but no doubt he would grow up touchy, fiery, open at any
minute to a sudden storm of rage. The man who has too much self-
respect for an open exhibition may, as you know well enough, poor
wife, indulge in continual irritability, suffer himself to be annoyed by
trifling matters. No, there is nothing for it but to look upon an irate
habit as one to be displaced by a contrary habit. Who knows what
cheerful days we may yet have, and whether in curing Guy I may not
cure myself? The thing can be done; only one is so lazy about one’s
own habits. Suppose you take me in hand?”
“Oh, I couldn’t! and yet it’s your only fault, dear.”
“Only fault! well, we’ll see. In the meantime there’s another thing I
wish we could do for Guy—stop him in the midst of an outbreak. Do
you remember the morning we found him admiring himself in the
glass?”
“Yes, with the photograph in his hand.”
“That was it; perhaps the Cross-man race will answer even in the
middle of a tempest. If not, we must try something else.”
“It won’t work.”
“Why not?”
“Guy will have no more rages; how then can he be stopped in
mid-tempest?”
“Most hopeful of women! But don’t deceive yourself. Our work is
only well begun, but that, let us hope, is half done.”

His father was right. Opportunities to check him in mid-career


occurred; and Guy answered to the rein. Mr. Cross-man worked
wonders. A record of outbreaks was kept; now a month intervened;
two months; a year; two years; and at last his parents forgot their
early troubles with their sweet-tempered, frank-natured boy.

FOOTNOTES:
[21] To state the case more accurately, certain cell
connections appear to be established by habitual traffic in
certain thoughts; but there is so much danger of over-
stating or of localising mental operations, that perhaps it is
safe to convey the practical outcome of this line of research
in a more or less figurative way—as, the wearing of a field-
path; the making of a bridge; a railway, &c.
CHAPTER II

ATTENTION.
“But now for the real object of this letter (does it take your breath
away to get four sheets?) We want you to help us about Kitty. My
husband and I are at our wits’ end, and should most thankfully take
your wise head and kind heart into counsel. I fear we have been
laying up trouble for ourselves and for our little girl. The ways of
nature are, there is no denying it, very attractive in all young
creatures, and it is so delightful to see a child do as ‘’tis its nature to,’
that you forget that Nature, left to herself, produces a waste, be it
never so lovely. Our little Kitty’s might so easily become a wasted
life.
“But not to prose any more, let me tell you the history of Kitty’s
yesterday—one of her days is like the rest, and you will be able to
see where we want your help.
“Figure to yourself the three little heads bent over ‘copy-books’ in
our cheery schoolroom. Before a line is done, up starts Kitty.
“‘Oh, mother, may I write the next copy—s h e l l? “Shell” is so
much nicer than—k n o w, and I’m so tired of it.’
“‘How much have you done?’
“‘I have written it three whole times, mother, and I really can’t do it
any more! I think I could do—s h e l l. “Shell” is so pretty!’
“By-and-by we read; but Kitty cannot read—can’t even spell the
words (don’t scold us, we know it is quite wrong to spell in a reading
lesson), because all the time her eyes are on a smutty sparrow on
the topmost twig of the poplar; so she reads, ‘W i t h, birdie!’ We do
sums; a short line of addition is to poor Kitty a hopeless and an
endless task. ‘Five and three make—nineteen,’ is her last effort,
though she knows quite well how to add up figures. Half a scale on
the piano, and then—eyes and ears for everybody’s business but her
own. Three stitches of hemming, and idle fingers plait up the hem or
fold the duster in a dozen shapes. I am in the midst of a thrilling
history talk: ‘So the Black Prince——’ ‘Oh, mother, do you think we
shall go to the sea this year? My pail is quite ready, all but the
handle, but I can’t find my spade anywhere!’
“And thus we go on, pulling Kitty through her lessons somehow;
but it is a weariness to herself and all of us, and I doubt if the child
learns anything except by bright flashes. But you have no notion how
quick the little monkey is. After idling through a lesson she will
overtake us at a bound at the last moment, and thus escape the
wholesome shame of being shown up as the dunce of our little party.
“Kitty’s dawdling ways, her restless desire for change of
occupation, her always wandering thoughts, lead to a good deal of
friction, and spoil our schoolroom party, which is a pity, for I want the
children to enjoy their lessons from the very first. What do you think
the child said to me yesterday in the most coaxing pretty way?
‘There are so many things nicer than lessons! Don’t you think so,
mother?’ Yes, dear aunt, I see you put your finger on those unlucky
words ‘coaxing, pretty way,’ and you look, if you do not say, that
awful sentence of yours about sin being bred of allowance. Isn’t that
it? It is quite true; we are in fault. Those butterfly ways of Kitty’s were
delicious to behold until we thought it time to set her to work, and
then we found that we should have been training her from her
babyhood. Well,
‘If you break your plaything yourself, dear,
Don’t you cry for it all the same?
I don’t think it is such a comfort
To have only oneself to blame.’

“So, like a dear, kind aunt, don’t scold us, but help us to do better. Is
Kitty constant to anything? you ask. Does she stick to any of the
‘many things so much nicer than lessons’? I am afraid that here, too,
our little girl is ‘unstable as water.’ And the worst of it is, she is all

You might also like