首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 171 毫秒
1.
针对能量收集认知无线网络中的多跳中继传输问题,该文构建了一种新的具有主网络干扰的功率信标(PB)辅助能量收集认知多跳中继网络模型,并提出单向传输方案.在干扰链路统计信道状态信息场景下,推导了次网络精确和渐近总中断概率闭合式.针对精确总中断概率表达式的复杂性和非凸性,采用自适应混沌粒子群优化(ACPSO)算法对次网络总中断性能进行优化.仿真结果表明,PB功率、干扰约束、次网络跳数、能量收集比率、主接收端数目和信道容量阈值等参数对中断性能影响显著,所提算法能快速和有效地对网络中断性能进行优化.  相似文献   

2.
针对采用无线携能通信的多中继底层协作认知非正交多址接入网络,提出一种两阶段中继选择策略。认知中继执行功率划分的无线携能通信协议为次级用户提供解码转发服务,其能量开销源于所采集到的能量。考虑了实际的非正交多址接入网络中,中继节点与次级用户均无法完全消除多址干扰,即无法实现理想连续干扰消除。在干扰阈值约束下,推导了非理想连续干扰消除下两次级用户端中断概率的精确表达式,并通过蒙特卡洛仿真验证其正确性。此外,定量分析了各系统相关参数(最大发射功率、干扰阈值、功率分配系数等)的选取对次级用户中断性能的具体影响。结果表明,在相同的系统参数设置下,所提方案次级用户中断性能远优于现有部分中继选择方案。   相似文献   

3.
针对采用无线携能传输(SWIPT)的多中继协作底层认知NOMA网络,提出一种基于NOMA和串行干扰消除协议的两阶段中继选择策略(TSRS).在保护主用户的干扰温度限约束下,次级网络源节点和最优中继均以固定功率分配生成多用户叠加信号向下一跳链路发送,最优中继采用功率分割方案采集能量,只利用从第一跳链路采集到的能量提供解码...  相似文献   

4.
针对采用联合overlay和underlay频谱共享模式的认知中继网络,基于频谱感知结果和干扰信道条件,提出了自适应功率控制策略,从理论上分析了次用户的中断概率。通过Monte-Carlo仿真,与单一overlay或underlay频谱共享模式和固定功率控制方案下次用户的中断性能进行了比较。仿真结果表明,采用自适应功率控制方案,在相同中断概率条件下,次用户对主用户的干扰概率降低了70%~80%;在相同干扰概率条件下,次用户的中断概率降低了1~2个数量级,频谱共享性能得到了有效提高。  相似文献   

5.
基于认知无线电系统的协作中继分布式功率分配算法   总被引:2,自引:0,他引:2  
协作通信与直接通信相比能够显著地提高系统性能。协作通信中的一个关键问题是管理中继节点及有效地进行功率分配。尤其对于频谱共享的认知无线电(Cognitive Radio,CR)系统,协作方案的设计不仅要最大限度地提高认知网络协作的功率效率,而且需要最小化对主系统的干扰。该文针对认知无线电系统的协作通信问题,在多个中继节点与源节点协同通信的场景下,提出了一种基于放大转发(Amplify and Forward,AF)模式下的功率分配及联合优化算法,在保证主系统传输性能不受影响的前提下,提高认知系统的传输速率。仿真结果表明该文提出的自适应协作传输方案,和直接传输及等功率传输方案相比获得了进一步的性能增益,中断概率显著下降。  相似文献   

6.
孙立悦  赵晓晖  虢明 《通信学报》2013,34(10):10-91
研究了功率受限情况下多中继协作通信网络的中继选择和功率优化问题。在AF网络中,提出了一种低复杂度中继选择与功率分配算法,其目标是在总功率一定的条件下使系统的中断概率最小。本算法对源节点和所有潜在中继节点进行功率分配,结合当前信噪比选择最优的中继集合,通过最速下降法求出使系统中断概率最低的功率分配因子。该算法不需要知道大量瞬时信道信息、不需要系统在等功率条件下进行中继选择,只需求得中继节点排列矩阵便可根据当前信噪比自适应获得最优中继节点集合。仿真结果表明,在相同条件下,该算法明显优于不同中继节点集合下几种算法的中断性能,并且与传统的SAF及AAF算法相比,有效降低了中断概率,提升了系统性能和功率效率。  相似文献   

7.
惠鏸  张晓静 《电子与信息学报》2020,42(12):2923-2930

针对无线自组织网络在窃听环境中的安全传输问题,该文提出了一种无线多跳自组织网络的联合安全路由和功率优化算法。首先,在窃听者服从泊松簇过程(PCP)这一假设下推导得到了系统安全中断概率(SOP)和连接中断概率(COP)的表达式;然后以安全中断概率约束下的连接中断概率最小为准则,针对给定路径推导得到了源与各跳中继的最优传输功率,并进一步获得了源与目的节点间的最优路由。仿真结果表明,该文所提系统安全中断概率和连接中断概率的表达式与蒙特卡洛仿真结果相符,所提算法可获得与穷举搜索方法接近的安全性能,显著优于传统方法。

  相似文献   

8.
认知无线电中继网络中,认知用户需要成功感知到其所在簇内的主用户频谱空穴后才能成为认知中继节点,且各认知中继节点发射功率受到各自主用户干扰温度限制(ITC)。该文对认知中继节点采用分布式空时编码和解码转发协议时认知用户的中断性能进行了分析;给出了认知用户在干扰温度限制下中断概率的上下界,得出中断概率的上下界在不同干扰温度限下与认知用户归一化数据速率、中继数量和其对主用户检测概率的关系。给出了源节点和频谱感知中继节点在相同干扰温度限下的数值仿真,并对仿真结果进行了分析。  相似文献   

9.
洪浩  张焱  肖立民  王京 《电波科学学报》2014,29(2):201-206+226
相对于传统的认知单向中继系统,认知双向中继网络由于引入了网络编码技术,减少了传输时隙,能获得更高的频谱效率.对采用时分广播(Time Division Broadcast,TDBC)传输协议的译码转发(Decode-and-Forward,DF)认知双向中继网络的和速率进行了分析,提出了一种功率分配的优化算法,能在满足次用户(Secondary Users,SUs)总功率约束以及对主用户(Primary Users,PUs)最大干扰功率(Maximum Tolerable Interference Power,MTIP)约束的前提下,最大限度提高次用户网络的和速率.并推导了不同情况下,次用户网络功率分配的最优解.数值仿真结果验证了该理论分析的正确性,同时表明,次用户的总功率以及主用户的干扰功率限制,对次用户网络的和速率有较大影响.  相似文献   

10.
蔡静  贺玉成  乔宇航  周林 《信号处理》2019,35(12):2029-2035
把非正交多址接入(NOMA)技术应用到认知网络中,提出基于中继协作的底层认知NOMA系统模型。在瑞利衰落信道下,考虑一个两跳的通信网络,认知中继同时接收来自主网络发射源和次网络发射源的信号,并采用串行干扰消除策略解码转发接收到的信号。次级网络通过为主网络提供中继解码转发服务,获得接入授权频段的机会;主网络通过贡献出授权频段,换取次级网络协作通信的机会,同时获得了优先解码权,保证了主网络通信的可靠性。推导了系统各个接收端的中断概率闭合表达式,并进行了MATLAB仿真。仿真结果表明:采用中继协作可以有效提升认知NOMA网络的中断概率性能。   相似文献   

11.
This paper investigates the outage performance of multihop energy harvesting cognitive relay network (EH-CRN), in which the secondary nodes are powered by dedicated power beacons based on the time splitting strategy. Assuming a multihop secondary network, we derive an analytical expression for the outage probability experienced by a secondary user by taking into account the effect of interference power from primary source. The developed outage probability model can be used to assess the impact of some key parameters on the reliability of the secondary user’s link in an EH-CRN. We then investigate the optimal location of the relay node in a one dimensional two-hop secondary network that minimizes the outage probability. Next, we study how the various system parameters such as energy harvesting efficiency, path loss exponent, harvest-to-transmit time duration ratio and transmit power from primary source affect the optimal relay location. The outage improvement achieved when the relay is placed at the optimum location is also investigated. Furthermore, the sensitivity of optimal relay location to the variations in position of the primary receiver is examined. Extensive simulation results are used to corroborate the analytical findings.  相似文献   

12.
In this paper, we investigate the physical layer security of a hybrid cognitive relay network using an energy harvesting relay in presence of an eavesdropper. In the hybrid scheme, a secondary user (SU) as well as a cognitive relay works either in underlay or in overlay mode. In underlay, the transmit power of the SU as well as the relay is limited by the maximum acceptable interference at primary user (PU) receiver as required by an outage constraint of PU, a quality of service for PU. The secondary network consists of a decode and forward relay that harvests energy from radio frequency signal of secondary transmitter as well as PU transmitter to assist the SU in forwarding the information signal to the destination. A time switching relaying protocol is used at the relay. We evaluate the secrecy outage probability of secondary relay network assuming that channel state information of the interfering links from both the SU and relay transmitter to PU receiver is imperfect. Our results reveal the impact of imperfect channel state information, energy harvesting time, tolerable interference threshold, and PU outage constraint on the secrecy outage probability of SU.  相似文献   

13.
This paper considers a cognitive radio–assisted wireless information and power transfer system consisting of multipair of transceiver in primary network and 2‐hop relaying link in secondary network. In this investigation, a decoded‐and‐forward–assisted relay node and power splitting protocol are deployed to obtain ability of wireless energy transfer. The relay node harvests energy from the radio frequency signals of the secondary transmitter and primary transmitters in data transmission to the destination by reusing the licensed spectrum resource. We propose 2 policies for wireless power transfer at the relay, namely, (1) multisource power transfer and (2) single‐source power transfer. To evaluate performance under energy harvesting regime, we derive the closed‐form outage probability expressions and achievable throughput of the secondary network in delay‐limited transmission mode. In addition, we investigate the impact of various system parameters including number of primary transceivers, primary outage threshold, and position arrangement of nodes in primary transceivers on the outage performance of the proposed scheme. Furthermore, we evaluate the system energy efficiency to show trade‐off metric of energy consumption and throughput. Performance results are presented to validate our theoretical derivation and illustrate the impacts of various system parameters. An important result is that the secondary network is more beneficial than harmful from the primary interference under power constraint and reasonable node location arrangement.  相似文献   

14.
In order to reduce energy consumption and improve spectral efficiency of the cognitive relay wireless communication system in 5G network,an optimal cooperative transmission strategy of information and energy was designed for cognitive relay radio with wireless energy harvesting.For the proposed optimal cooperative strategy,the maximal throughput formula and outage probability of secondary user were deduced.In order to resolve the derived maximum throughput equation,a quantum bat algorithm which was based on the optimization mechanism of quantum computing and bat algorithm was designed to solve the deduced equation,and the optimal cooperative transmission scheme for information and energy could be obtained.Simulation results show that the proposed optimal cooperative strategy not only can meet the information transfer demand of primary user,but also can realize the energy self-supply of the secondary user system and improve the communication quality of the secondary user.The proposed optimal cooperative strategy has a better performance than the cooperative strategy of existing cognitive relay radio for different simulation scenarios.  相似文献   

15.
In order to provide privacy provisioning for the secondary information,we propose an energy harvesting based secure transmission scheme for the cognitive multi-relay networks.In the proposed scheme,two secondary relays harvest energy to power the secondary transmitter and assist the secondary secure transmission without interfere the secondary transmission.Specifically,the proposed secure transmission policy is implemented into two phases.In the first phase,the secondary transmitter transmits the secrecy information and jamming signal through the power split method.After harvesting energy from a fraction of received radio-frequency signals,one secondary relay adopts the amplify-and-forward relay protocol to assist the secondary secure transmission and the other secondary relay just forwards the new designed jamming signal to protect the secondary privacy information and degrade the jamming interference at the secondary receiver.For the proposed scheme,we first analyze the average secrecy rate,the secondary secrecy outage probability,and the ergodic secrecy rate,and derive their closed-form expressions.Following the above results,we optimally allocate the transmission power such that the secrecy rate is maximized under the secrecy outage probability constraint.For the optimization problem,an AI based simulated annealing algorithm is proposed to allocate the transmit power.Numerical results are presented to validate the performance analytical results and show the performance superiority of the proposed scheme in terms of the average secrecy rate.  相似文献   

16.
This paper evaluates the outage performance of cognitive relay networks with mutual interference between secondary users and primary users under the underlay approach, while adhering to the interference constraint on the primary user. A network path selection criterion, suitable for cognitive relay networks, is provided, from which we derive the outage probability expression of cognitive relay networks. It is shown that the outage probability considering the interference to secondary user from primary user is higher than that without considering the interference to secondary user from primary user. In addition, the outage probability is affected by key network parameters. We analyze network path selection method based on outage probability and prove that the interference to secondary user from primary user has a significant effect on the network path selection and can not be ignored in practical wireless communication environments. Simulation investigation is also provided and used to verify the theoretical analysis.  相似文献   

17.
In this paper, an energy harvesting relay network over Nakagami-m fading is investigated. In the considered system, the power beacon can provide wireless energy for the source and relays which deploy time-switching-based radio frequency energy harvesting technique. Two relay selection schemes, namely partial relay selection and optimal relay selection, are proposed in order to enhance the system performance. In the former, the source only has the channel state information of the first hop, while in the latter it has the full knowledge of the channel state information. The eavesdropper is able to wiretap to the signal transmitted from the source and the relays. The exact closed-form expressions of secrecy outage probability are derived. The results show that optimal relay selection performs better than partial relay selection. With increasing number of relays, the considered system shows better performance. In addition, the energy harvesting duration has a significant effect on the secrecy outage probability.  相似文献   

18.
针对认知双向中继网络在进行数据传输时面临的复杂无线信道场景问题,采用广义κ-μ分布构建认知双向中继网络中的视距和非视距无线传输信道,推导次网络在κ-μ衰落信道下的统一中断概率,并分析次网络在多种单一和混合衰落信道情况下的中断性能.仿真结果表明,无线信道的衰落程度对次网络的中断概率影响显著,依据衰落信道类型合理设置网络参...  相似文献   

19.
在共存式频谱共享的认知中继网络中,为了保证主用户的通信质量,会严格限制次用户的发送功率,使次用户的性能很难得到保证.中断概率是评估次用户性能的最重要参数之一.本文对采用“选择最优中继放大转发\  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号