首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
    
One of the promising technologies for 5G cellular networks is machine‐to‐machine (M2M) communications. We propose a cognitive radio network (CR) that includes a primary cellular system and a secondary cognitive system. The primary cellular system has a primary client (PC) and the secondary cognitive system has M2M clients which are called secondary clients (SCs). In a conventional system of CR network based on orthogonal frequency division multiple access (CR‐OFDMA), when the primary client (PC) is absent, only one SC can obtain the idle spectrum. But, the SC must leave the spectrum when detecting the existence of the PC. So, the spectrum usage of this system is very low. This paper proposes a cooperative CR network based on nonorthogonal multiple access (CCR‐NOMA) for spectrum sensing using energy detection (ED) to allow multiple SCs to share the same frequency at the same time, but are differentiated according to the power domain or code domain, to improve spectrum efficiency of 5G communications and the transmission performance of CR network at the absence and presence of the PC. To evaluate the channel sensing performance of the ED technique in CCR‐NOMA, we derived a closed‐form expression between the achievable throughput and sensing time for the CCR‐NOMA system. The same analysis for the case of CR‐OFDMA is reproduced for the sake of comparison. The analysis showed that the CR‐NOMA system for M2M communication outperforms the CR‐OFDMA system for M2M communication for the same noncooperative and cooperative spectrum sensing and physical layer parameters.  相似文献   

2.
    
In this paper, the throughput and outage performance for an unmanned aerial vehicle (UAV)-assisted non-orthogonal multiple access (NOMA)-based hybrid cognitive radio (CR) network are examined under m-Nakagami fading channel. To be more specific, a secondary source transmitter (S⁢UT) broadcasts a NOMA-enabled mixed signal to secondary destinations via UAV relay, which operates in full-duplex (FD) mode and employs decode-and-forward protocol. In our approach, an energy harvesting (EH) circuit is employed at both and UAV to harvest energy from the PU radio frequency (RF) signals. These secondary transmitters are also incorporated with energy detector (ED) circuit as well, which detects the activity of the primary user (PU). The status of PU to be busy or idle is confirmed on the basis of the energy detector's results. In turn, this drives and UAV to switch between underlay and overlay protocols in an adaptive manner to increase spectrum efficiency (SE). The closed form mathematical expressions of the secondary outage probability for NOMA-based UAV equipped CR networks under imperfect successive interference cancellation (i-SIC) conditions have been evaluated. The administration of the power allocation policy at the and UAV is assessed while maintaining the PU quality of service (QoS). Finally, MATLAB simulation testbed has been used to verify all the analytical closed form expressions.  相似文献   

3.
    
In this paper, we investigate the physical layer security of a hybrid cognitive relay network using an energy harvesting relay in presence of an eavesdropper. In the hybrid scheme, a secondary user (SU) as well as a cognitive relay works either in underlay or in overlay mode. In underlay, the transmit power of the SU as well as the relay is limited by the maximum acceptable interference at primary user (PU) receiver as required by an outage constraint of PU, a quality of service for PU. The secondary network consists of a decode and forward relay that harvests energy from radio frequency signal of secondary transmitter as well as PU transmitter to assist the SU in forwarding the information signal to the destination. A time switching relaying protocol is used at the relay. We evaluate the secrecy outage probability of secondary relay network assuming that channel state information of the interfering links from both the SU and relay transmitter to PU receiver is imperfect. Our results reveal the impact of imperfect channel state information, energy harvesting time, tolerable interference threshold, and PU outage constraint on the secrecy outage probability of SU.  相似文献   

4.
    
Cognitive nonorthogonal multiple access (NOMA) technique allows multiple users to share the same time and same frequency resources to fulfil the reliability and spectral efficiency requirements of 5G communication standards. In this paper, simultaneous wireless information and power transfer (SWIPT)–based full‐duplex cognitive NOMA downlink system is proposed. In this system, secondary source (SS) serves as a relay to far primary user as there is no direct link from the primary source. NOMA technique is used at SS to transmit information to far primary user and secondary user. The time switching mechanism is adopted at SS for harvesting energy and information decoding. Analytical closed‐form expressions are derived for the outage probabilities of both primary and secondary users. Outage analysis is carried out in Nakagami‐ fading environment in the presence of self‐interference at SS. In addition to that, the optimal harvesting time to maximize the instantaneous throughput of the far primary user is also derived. Numerical results are plotted to validate the derived expressions. It is inferred that the outage probability of the proposed system depends on the fading environment, harvesting parameters, and self‐interference at SS.  相似文献   

5.
本文研究了中继选择方案对协作下认知非正交多址(CR-NOMA)网络中断性能的影响,提出了一种两级中继选择方案。第一时隙在保证主用户服务质量的基础上,次级网络源节点向认知中继集群广播叠加信号。第二时隙认知中继提供解码转发服务,协助源节点传输信息。基于上述假设,推导了次级用户中断概率的闭合表达式并给出了分析结果。证明相比于部分中继选择策略,两级中继选择策略可以达到更好的中断性能和更大的分集增益。同时本文的分析结果验证了备选中继节点数目和功率分配因子对系统中断性能的影响,蒙特卡罗仿真验证了理论结果。   相似文献   

6.
崔兆阳  黄容兰  万德焕 《电子学报》2000,48(10):1915-1922
本文主要解决当前功率域单胞元非正交多址接入结构应用层面存在的问题.具体说,针对现有单胞元结构因多用户时频同传形成强干扰而导致边缘用户服务质量差的问题,利用资源正交化的组网策略构建中心用户频带独立正交、边缘用户与其频带合作共享的并行多胞元结构,并进一步利用中心用户可获取边缘用户先验知识的特征将全双工的协作通信机制引入其中,从而有效解决现有单胞元结构在译码复杂度以及用户公平性等方面存在的不足.仿真结果证实了所提方案的有效性.  相似文献   

7.
    
In this paper, the secrecy outage probability (SOP) of an energy harvesting aided underlay single input multiple output cognitive radio network under the multiple eavesdroppers is investigated. It is assumed that all the channels within the network are subjected to Nakagami‐m distributions. In order to quantify the secrecy performance of the concerned network, two eavesdroppers' scenarios are considered and this includes: Colluding Eavesdropping and noncolluding Eavesdropping. Based on these, the SOP closed‐form expressions are derived for the network under the two scenarios. Our findings illustrate that the network under the noncolluding eavesdropping scenario achieve better secrecy outage performance compared with colluding eavesdropping mode. Furthermore, the impact of number of eavesdroppers Ne , the number of antennas equipped at eavesdroppers Ae as well as fading parameter of the wiretap channel me on the network secrecy outage performance are demonstrated. Finally, the accuracy of the derived expressions is validated through the Monte‐Carlo simulations.  相似文献   

8.
    
The simultaneous wireless information and power transfer or energy harvesting (EH) can be combined in nonorthogonal multiple access (NOMA) as green applications towards 5G. This paper investigates a new cooperative EH‐NOMA protocol, where the intermediate relay has not equipped the fixed power source and acts as a wireless powered relay to help signal transmission to representative weak user and strong user in NOMA. However, impacts of imperfect channel estimation contribute to outage system performance evaluations. We formulate the power resource assignment paradigms as two schemes, namely, fixed power allocation and dynamic power allocation, by considering imperfect channel state information (CSI). To solve this problem, we derive the closed‐form expressions of outage probability under imperfect CSI and the power allocation constraints. The expected numerical results related to the derived expressions for the outage probability are examined that numerical and the Monte Carlo simulations are strictly matching lines.  相似文献   

9.
吕铄  嵇建波 《电讯技术》2024,64(1):139-148
分析了认知无线电(Cognitive Radio,CR)非正交多址(Non-orthogonal Multiple Access,NOMA)网络中的物理层安全性能.考虑到现有窃听者,支持NOMA的CR通过Nakagami-m信道以解码转发协作模式传输数据.为了分析CR-NOMA物理层安全性能,通过连接中断概率和安全中断概率的闭式表达式来评估CR-NOMA的安全性能.此外,通过蒙特卡罗模拟仿真以验证推导出的分析结果,并深入分析了参数对系统性能的影响.  相似文献   

10.
薛鹏  朱芸灿  刘金昌  李美玲 《电讯技术》2024,64(12):2067-2074
为了解决移动通信系统中的高延迟和覆盖盲点问题,提出了一种基于认知无线电-非正交多址接入(Cognitive Radio Non-orthogonal Multiple Access,CR-NOMA)的工业物联网网络.在认知网络中次用户采用解码转发(Decode and Forward,DF)和放大转发(Amplify and Forward,AF)两种辅助解码方式下,推导了主用户和次用户在完全串行干扰或不完全串行干扰两种终端状态下的中断性能.当用户间链路条件相同时,认知中继采用AF方式优于DF方式,且不完全串行干扰技术后系统残留干扰噪声的增大也会导致主用户和次用户的中断概率增大.研究还发现,各用户移动导致用户之间距离增大时,主用户和次用户的中断概率也会增大.  相似文献   

11.
    
One of the key strategies for jointly increasing throughput and optimum resource allocation in 5G is device‐to‐device (D2D) communications, which can be obtained by minimizing the outage probability considered as an objective function of optimization problem. To minimize this objective function, we found that outage probability should be modeled by jointly considering the effect of interference, noise, and multipath phenomena. In this paper, the exact formulas for outage probability of in‐band D2D communications underlying cellular network are proposed. In the proposed model, additive white Gaussian noise and Rayleigh multipath fading are considered into 2 radio resource reuse scenarios. In the first scenario, each D2D pair is allowed to reuse radio resource block of one cellular user, whereas in the second scenario, 2 resources of 2 cellular users can be reused. The proposed formulas are compared to the approximate (nonexact) ones, which models additive white Gaussian noise by a constant variance. The numerical analysis for the first and second scenarios show that the approximate formulas and respected exact ones are in accordance with simulation results in MATLAB. Moreover, based on nonorthogonal multiple access approach, 2 approximations for the nonexact and the proposed formulas are extracted, which are acceptable for multiple resource reuse scenario. As a remarkable result, simulation results show that when the distance of the D2D pair from the respected cellular user is more than 71 m (2 times greater than average distance between the D2D nodes), multiple‐reuse scenarios offer higher throughput compared to 1‐reuse scenario in an acceptable outage probability.  相似文献   

12.
    
This paper considers a cognitive radio–assisted wireless information and power transfer system consisting of multipair of transceiver in primary network and 2‐hop relaying link in secondary network. In this investigation, a decoded‐and‐forward–assisted relay node and power splitting protocol are deployed to obtain ability of wireless energy transfer. The relay node harvests energy from the radio frequency signals of the secondary transmitter and primary transmitters in data transmission to the destination by reusing the licensed spectrum resource. We propose 2 policies for wireless power transfer at the relay, namely, (1) multisource power transfer and (2) single‐source power transfer. To evaluate performance under energy harvesting regime, we derive the closed‐form outage probability expressions and achievable throughput of the secondary network in delay‐limited transmission mode. In addition, we investigate the impact of various system parameters including number of primary transceivers, primary outage threshold, and position arrangement of nodes in primary transceivers on the outage performance of the proposed scheme. Furthermore, we evaluate the system energy efficiency to show trade‐off metric of energy consumption and throughput. Performance results are presented to validate our theoretical derivation and illustrate the impacts of various system parameters. An important result is that the secondary network is more beneficial than harmful from the primary interference under power constraint and reasonable node location arrangement.  相似文献   

13.
    
The time switching‐based relaying (TSR) scheme is considered in energy harvesting protocol to implement with its advantage to nonorthogonal multiple access (NOMA) system. In particular, decode‐and‐forward (DF) mode is proposed to employ in relay to forward signal to serve two far NOMA users. There are two main metrics including outage probability and ergodic rate, which are derived in exact expressions with respect to varying performance under impacts of energy harvesting fractions. To evaluate system performance, outage event and related capacity are illustrated, and we tailor performance gap among two NOMA users and such gap can be controlled by selecting of appropriate power allocation factors assigned for each user to obtain optimal performance. By examining node arrangement, target rates and varying transmit signal to noise ratio (SNR), it can be further achieved performance in several situations of such NOMA. As important result, the considered NOMA system outperforms than the conventional multiple access scheme, and this expected result is confirmed in numerical result and theoretical results. We also explore impacts of transmit power at source, noise power, the other key parameters of energy harvesting scheme to exhibit outage, and ergodic performance. Simulation results are presented to corroborate the proposed methodology.  相似文献   

14.
    
A new design of secure nonorthogonal multiple access (NOMA) deployed together with cooperative relaying network is investigated in two modes including direct link and relay link. This paper proposes a mathematical analysis under secrecy considerations of a downlink two‐user NOMA systems. In particular, physical layer security of NOMA is studied in two specific metrics to achieve secure performance analysis such as the secrecy outage probability (SOP) and probability of strictly positive secrecy capacity (SPSC). It should be further explored the situation as the illegal user which is assumed to be eavesdropper at the information level, it attempts to decode the information intended to legal users while NOMA scheme is employed for legal users. The transmission techniques of NOMA equipping relaying architecture (dual‐hop transmission) have proposed due to improving the spectrum efficiency greatly compared with the traditional single‐hop networks. Finally, this study shows the advantages of NOMA over the traditional orthogonal multiple access in the studied problems analytically and numerical analysis is further provided. As important achievement, new exact and closed‐form expressions of the SOP and SPSC are derived, and they will be confirmed by simulation, ie, Monte Carlo simulations are performed to verify the proposed analytical results. Ultimately, the effects of some critical factors are studied on secure performance through these simulation results.  相似文献   

15.
    
In this paper, resource allocation problem in orthogonal frequency division multiple access‐based cognitive radio (CR) systems to maintain minimum transmission rate constraints of CR users (CRUs) with the specified interference thresholds is investigated. Firstly, a single primary user (PU) CR system is considered, and a suboptimal resource allocation algorithm to maximize the sum transmission rate of all CRUs is proposed. Secondly, the single‐PU scenario is extended to multiple‐PU case, and an asymptotically optimal resource allocation algorithm is proposed using dual methods subject to constraints on both interference thresholds of PUs and total transmit power of all CRUs. Analysis and numerical results show that, in contrast to classical resource allocation algorithms, the proposed algorithm can achieve higher transmission rate and guarantee each CRU's minimum transmission rate in both scenarios. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

16.
    
A joint resource-optimization scheme is investigated for nonorthogonal multiple access (NOMA)-enhanced scalable video coding (SVC) multicast in unmanned aerial vehicle (UAV)-assisted radio-access networks (RANs). This scheme allows a ground base station and UAVs to simultaneously multicast successive video layers in SVC with successive interference cancellation in NOMA. A video quality-maximization problem is formulated as a mixed-integer nonlinear programming problem to determine the UAV deployment and association, RAN spectrum allocation for multicast groups, and UAV transmit power. The optimization problem is decoupled into the UAV deployment–association, spectrum-partition, and UAV transmit-power–control subproblems. A heuristic strategy is designed to determine the UAV deployment and association patterns. An upgraded knapsack algorithm is developed to solve spectrum partition, followed by fast UAV power fine-tuning to further boost the performance. The simulation results confirm that the proposed scheme improves the average peak signal-to-noise ratio, aggregate video-reception rate, and spectrum utilization over various baselines.  相似文献   

17.
    
This paper presents a cooperative spectrum sharing protocol using non‐orthogonal multiple access in cognitive radio networks. A 2‐phase protocol comprising of a primary transmitter‐receiver pair and a secondary transmitter‐receiver pair is considered. In the proposed protocol, 3 data symbols can be transmitted during the 2 phases; this is unlike the traditional decode‐and‐forward relaying where 1 data symbol can be transmitted and the conventional superposition coding–based overlay spectrum sharing and the cooperative relaying system using non‐orthogonal multiple access where 2 data symbols can be transmitted, under a single‐relay scenario. We have investigated performance of our proposed protocol in terms of ergodic sum capacity and outage probability along with analytical derivations over independent Rayleigh fading channels. We also compared our proposed protocol with the traditional decode‐and‐forward relaying, conventional superposition coding–based overlay spectrum sharing, and the cooperative relaying system using non‐orthogonal multiple access schemes to demonstrate efficacy of the proposed protocol. The simulation and analytical results are presented to confirm efficiency of the proposed spectrum sharing protocol.  相似文献   

18.
非饱和认知无线电网络MAC协议设计   总被引:1,自引:0,他引:1  
谢小可  唐菁敏  李静叶  蔡冉  赵明 《电子学报》2013,41(6):1140-1145
针对具有连续性接入需求的业务,论文融合时分多址接入技术和竞争窗口差分服务机制,提出了具有连续性保障的无线接入协议:CP-MAC(MAC with Continuity Provisioning)协议.通过对业务等级划分,保障了连续用户的接入概率.并基于Markov模型,给出了非饱和认知无线电网络的系统容量,接入时延和被阻塞概率的数学解析式.最后,通过与现存的MAC接入协议比较,CP-MAC协议在不降低系统容量的同时,提高了连续用户的接入概率,并降低了其接入时延.  相似文献   

19.
龙恳  谭路垚  王奕  陈兴  王亚领 《电讯技术》2022,62(1):116-122
针对协作非正交多址接入(Non-orthogonal Multiple Access,NOMA)系统中用户充当中继并存在窃听者的场景,提出了一种新型协作干扰传输方案,以提高该系统的安全性.在第一时隙,基站将混合信号进行广播,同时为了干扰窃听者,信道条件较差的用户采用全双工的工作模式,发出协作干扰信号对窃听者进行干扰.在...  相似文献   

20.
    
Joint impact of sensing time and signal power raise factor is studied for an improved energy detector–based energy harvesting cooperative cognitive radio network. All the cognitive radio nodes harvest energy either from radio frequency resources or from non–radio frequency resources. The probability density function of harvested energy from both the sources is exponentially distributed. Novel theoretical expressions for harvested energy and throughput are derived. Impact of several sensing parameters and a device constraint on the outage is studied. Optimal values of sensing time and signal power raise factor parameter pair are estimated for maximum harvested energy and maximum throughput. Energy efficiency of the network is also evaluated, and impact of sensing time on it is indicated.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号