首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 109 毫秒
1.
文章提出一种新的合作感知方法,实现网络中一个认知用户与多个中继用户的合作。认知用户通过能量检测选择中继用户,根据可信度对中继用户进行筛选,采用"大多数"准则对感知结果进行融合。仿真结果表明,与独立检测和传统的合作检测相比较,该方法具有更高的检测性能与频谱利用率。  相似文献   

2.
在共存式频谱共享的认知中继网络中,为了保证主用户的通信质量,会严格限制次用户的发送功率,使次用户的性能很难得到保证.中断概率是评估次用户性能的最重要参数之一.本文对采用“选择最优中继放大转发\  相似文献   

3.
针对能量收集认知无线网络中的多跳中继传输问题,该文构建了一种新的具有主网络干扰的功率信标(PB)辅助能量收集认知多跳中继网络模型,并提出单向传输方案。在干扰链路统计信道状态信息场景下,推导了次网络精确和渐近总中断概率闭合式。针对精确总中断概率表达式的复杂性和非凸性,采用自适应混沌粒子群优化(ACPSO)算法对次网络总中断性能进行优化。仿真结果表明,PB功率、干扰约束、次网络跳数、能量收集比率、主接收端数目和信道容量阈值等参数对中断性能影响显著,所提算法能快速和有效地对网络中断性能进行优化。  相似文献   

4.
针对能量收集认知无线网络中的多跳中继传输问题,该文构建了一种新的具有主网络干扰的功率信标(PB)辅助能量收集认知多跳中继网络模型,并提出单向传输方案.在干扰链路统计信道状态信息场景下,推导了次网络精确和渐近总中断概率闭合式.针对精确总中断概率表达式的复杂性和非凸性,采用自适应混沌粒子群优化(ACPSO)算法对次网络总中断性能进行优化.仿真结果表明,PB功率、干扰约束、次网络跳数、能量收集比率、主接收端数目和信道容量阈值等参数对中断性能影响显著,所提算法能快速和有效地对网络中断性能进行优化.  相似文献   

5.
方萍  张琳 《数据通信》2013,(1):46-51
阴影热点区域环境复杂,信号传输损耗更大,协作中继转播功能能够提高通信性能.文章对阴影衰落信道上多中继认知无线电系统的联合频谱检测概率进行了分析,计算基于解码转发机制的中继器的成功解码概率;分析中继器对于一级和二级用户的中断概率的影响.误警率为0.1和0.05条件下的检测概率、一级系统和二级系统的中断概率等性能的仿真结果表明:中继器协作检测可以提高检测性能;协作中继转播可以在保证授权用户所需中断概率条件下降低认知用户的中断概率;结合联合频谱检测和协作中继转播,能提高系统通信性能,提高频谱使用效率.  相似文献   

6.
频谱感知技术是认知无线电系统实现的前提和基础。由于无线衰落环境下单节点频谱感知结果可靠性不高,主要讨论协作频谱感知中的中继协作频谱感知技术。针对单个中继节点的协作频谱感知网络,分析了在AF协议下的频谱感知结果。导出了在瑞利衰落环境下中继节点参与协作感知的检测概率上限的闭合表达式,并进行了数值仿真。数值分析结果表明中继节点参与协作能够提高频谱感知性能。  相似文献   

7.
物理层网络编码机会中继及中断性能分析   总被引:1,自引:1,他引:1  
该文研究了频率非选择性瑞利衰落信道中的物理层网络编码系统容量问题。基于放大转发机制提出了一种基于最大最小互信息准则的机会中继策略。在瑞利衰落信道环境下,从双向通信的角度,通过理论分析得出其中断概率解析式,同时推导了理想物理层网络编码和传统直接传输系统的中断概率解析式。通过理论分析,发现在某些节点发射功率条件下,系统中断概率将完全取决于单向链路。在此基础上完成了数值仿真实验,结果表明所提策略的中断性能与理想物理层网络编码和传统直接传输相比有了显著的提高。  相似文献   

8.
蔡静  贺玉成  乔宇航  周林 《信号处理》2019,35(12):2029-2035
把非正交多址接入(NOMA)技术应用到认知网络中,提出基于中继协作的底层认知NOMA系统模型。在瑞利衰落信道下,考虑一个两跳的通信网络,认知中继同时接收来自主网络发射源和次网络发射源的信号,并采用串行干扰消除策略解码转发接收到的信号。次级网络通过为主网络提供中继解码转发服务,获得接入授权频段的机会;主网络通过贡献出授权频段,换取次级网络协作通信的机会,同时获得了优先解码权,保证了主网络通信的可靠性。推导了系统各个接收端的中断概率闭合表达式,并进行了MATLAB仿真。仿真结果表明:采用中继协作可以有效提升认知NOMA网络的中断概率性能。   相似文献   

9.
文章针对全双工的解码转发机会中继选择协作通信网络的性能展开分析研究。分别在假设服从独立同分布的Nakagami-m和Rayleigh衰落链路下,推导出所提方案的中断概率闭式表达式,并通过仿真证实了其有效性。仿真分析表明,中断概率受一些关键参数影响,如残存自干扰强度,中继节点个数和链路平均信噪比,此外,还受衰落深度参数影响。  相似文献   

10.
针对认知双向中继网络在进行数据传输时面临的复杂无线信道场景问题,采用广义κ-μ分布构建认知双向中继网络中的视距和非视距无线传输信道,推导次网络在κ-μ衰落信道下的统一中断概率,并分析次网络在多种单一和混合衰落信道情况下的中断性能.仿真结果表明,无线信道的衰落程度对次网络的中断概率影响显著,依据衰落信道类型合理设置网络参...  相似文献   

11.
The two-way relay cooperation for underlay cognitive radio networks based on WIPT was presented,where secondary system adopted the two-way relay cooperative transmission.First,the relay adopted a power splitting protocol to harvest energy and to decode information transmitted by secondary users,then the relay forwarded information to two secondary users by using the harvested energy.Subsequently the exact expression of the outage probability,the ergodic capacity and energy efficiency of the secondary user system were derived.Finally,numerical simulation discusses the impact on the system performance with regard to secondary transmission power.The results reveal that the two-way relay cooperation effectively reduces the outage probability of data transmission.The capacity and energy efficiency of the system reaches optimal level when the power allocation coefficient is 0.5.  相似文献   

12.
This article studies the closed-form expressions of outage performance for opportunistic relay under aggregate power constraint in decode-and-forward(DF)relay networks over Rayleigh fading channels,assuming that multiple antennas are available at the relay node.According to whether instantaneous signal-to-noise ratio(SNR)or average SNR can be utilized for relay selection,two opportunistic relay schemes,opportunistic multi-antenna relay selection(OMRS)and average best relay selection(ABRS)are proposed.The performances of both two schemes are evaluated by means of theoretical analysis and simulation.It is observed that OMRS is outage-optimal among multi-antenna relay selection schemes and closely approaches the beamforming(BF)scheme known as theoretical outage-optimal.Compared with previous single-antenna opportunistic relaying(OR)scheme,OMRS brings remarkable performance improvement,which is obtained from maximum ratio combining(MRC)and beamforming techniques.It is also shown that the performance of ABRS in asymmetric channels is close to OMRS in the low and median SNR range.  相似文献   

13.
This paper considers the cognitive radio network with one primary user (PU), one secondary user (SU), and multiple decode‐and‐forward relays. We propose a relaying scheme to ensure the priority of primary transmission, where the relays are used to forward PU's message and sometimes also SU's message. First, SU is allowed to use the spectrum to transmit only when its transmission would not affect the decoding status of PU's message at all relays. Second, once the secondary transmission happens, the relays that successively decode SU's message are allowed to retransmit this message when it would not affect the decoding status of PU's message at primary receiver. The interference from PU to SU and the interference from SU to PU are both considered. By analyzing the decoding status of primary message and secondary message at different relays, we formulate the outage probabilities of both primary transmission and secondary transmission. When all channels follow Rayleigh distributions, we derive the analytical expressions for the general case of any number of relays, which are validated by means of Monte Carlo simulations. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

14.
The secrecy performance of a nonorthogonal multiple access (NOMA) system is examined in this study by employment of a dual‐hop decode‐and‐forward (DF) relay under existence of eavesdropper. Due to the fact that the relay is trusted or untrusted device and thus eavesdropper may wiretap information from the base station or the relay. In this regard, three scenarios related to trusted and untrusted relays are proposed, with different assumptions on the information overhearing ability of the eavesdropper; ie, the first scenario is that an eavesdropper overhears signal from the relay while the BS is overheard by eavesdropper in the second scenarios. More specifically, we derive closed‐form expressions for the secure probability metrics when the direct and relay links experience independent Rayleigh fading. There metrics include strictly positive secrecy capacity (SPSC) and the secure outage probability (SOP). Furthermore, secure performance of traditional orthogonal multiple access (OMA) is also provided as further comparison with NOMA counterpart. We analyze the influence of main coefficients such as the target rates and the transmit SNR factors on the secrecy performance. Our results specify that for reasonable selection of such parameters, secrecy performance can be enhanced remarkably. Numerical results are delivered to corroborate the derived results.  相似文献   

15.
This paper investigates the performance of an underlay cognitive relay system where secondary users(SUs) suffer from a primary outage probability constraint and spectrum-sharing interference imposed by a primary user(PU). In particular, we consider a secondary multi-relay network operating in the selection decode-and-forward(SDF) mode and propose a best-relay selection criterion which takes into account the spectrum-sharing constraint and interference. Based on these assumptions, the closed-form expression of the outage probability of secondary transmissions is derived. We find that a floor of the outage probability occurs in high signal-to-noise ratio(SNR) regions due to the joint effect of the constraint and the interference from the PU. In addition, we propose a generalized definition of the diversity gain for such systems and show that a full diversity order is achieved. Simulation results verify our theoretical solutions.  相似文献   

16.
In this paper, we investigate the physical layer security of a hybrid cognitive relay network using an energy harvesting relay in presence of an eavesdropper. In the hybrid scheme, a secondary user (SU) as well as a cognitive relay works either in underlay or in overlay mode. In underlay, the transmit power of the SU as well as the relay is limited by the maximum acceptable interference at primary user (PU) receiver as required by an outage constraint of PU, a quality of service for PU. The secondary network consists of a decode and forward relay that harvests energy from radio frequency signal of secondary transmitter as well as PU transmitter to assist the SU in forwarding the information signal to the destination. A time switching relaying protocol is used at the relay. We evaluate the secrecy outage probability of secondary relay network assuming that channel state information of the interfering links from both the SU and relay transmitter to PU receiver is imperfect. Our results reveal the impact of imperfect channel state information, energy harvesting time, tolerable interference threshold, and PU outage constraint on the secrecy outage probability of SU.  相似文献   

17.
In this work, we have used stochastic geometry to analyze the effects of the radio environment and the secondary service sensing error on the primary service outage probability. We have also obtained a closed form expression for the primary service outage probability in a Rayleigh fading channel. Furthermore, an approximation was formulated for a general fading channel. The results obtained were used to drive an expression for the secondary service successful transmission density. Finally, we formulated an optimization problem to achieve highest density of secondary service successful transmissions while keeping the primary service outage probability in check by adjusting sensing error and secondary service node density to their optimal values. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

18.
In this paper, we jointly optimize the position of the relay node and transmission power ratio of the source node over the relay node to minimize the outage probability, which can provide guidance for IEEE 802.16j transparent relay node configuration. The result indicates that the outage probability is minimum when the relay is positioned at the midway between the source and the destination, and the transmission power ratio of the source node over the relay node is 11:9. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

19.
Cognitive radio (CR) has been considered a key technology to enhance overall spectrum utilization by opportunistic transmissions in CR transmitter–receiver link(s). However, CRs must form a cognitive radio network (CRN) so that the messages can be forwarded from source to destination, on top of a number of opportunistic links from co‐existing multi‐radio systems. Unfortunately, appropriate routing in CRN of coexisting multi‐radio systems remains an open problem. We explore the fundamental behaviors of CR links to conclude three major challenges, and thus decompose general CRN into cognitive radio relay network (CRRN), CR uplink relay network, CR downlink relay network, and tunneling (or core) network. Due to extremely dynamic nature of CR links, traditional routing to maintain end‐to‐end routing table for ad hoc networks is not feasible. We locally build up one‐step forward table at each CR to proceed based on spectrum sensing to determine trend of paths from source to destination, while primary systems (PSs) follow original ways to forward packets like tunneling. From simulations over ad hoc with infrastructure network topology and random network topology, we demonstrate such simple routing concept known as CRN local on‐demand (CLOD) routing to be realistic at reasonable routing delay to route packets through. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号