期刊文献+

一种基于FBMC-OQAM干扰抑制的功率资源分配新算法 被引量:2

A New Power-Resource Allocation Algorithm with Interference Restraining Based on FBMC-OQAM
下载PDF
导出
摘要 基于FBMC-OQAM(filter bank multicarrier-offset quadrature amplitude modulation)的多用户频谱共享的认知无线电网络中的资源分配问题,在此提出了一种干扰抑制的功率资源分配算法(powerresource allocation algorithm,PAA).引入跨层干扰限制来保护网络中的次用户免受过多的干扰.引入虚拟队列的概念,将多用户争用信道资源导致的额外分组时延转化为在信道对应的虚拟队列中的排队时延.该算法以系统能效为目标函数、以时延和传输功率为约束条件,提出一个非线性约束下的非线性分式规划问题.设计了一种迭代算法,先通过一些变换将分式目标函数变为多项式形式,降低其实现难度后迭代求其全局最优解.此外设计了一种次优算法,以部分性能换取更低的计算复杂度.经实验仿真对比,最优算法具有高性能,次优算法在低计算复杂度的基础上具有较高性能,2种算法均具有很好的实用价值. By taking the energy efficiency as the objective function,a nonlinear programming problem with nonlinear constraints is studied under the constraints of time delay and transmission power.That is to say,a kind of new power-resource allocation algorithm(PAA)with interference restraining based on FBMC-OQAM(filter bank multicarrier-offset quadrature amplitude modulation)has been presented in this paper,which can improve the energy efficiency of entire network resource and protect small-cell user(SU)in the network from too much interference while virtual queue is used to transform the extra packet delay caused by the contention for channel of multi-user into the queuing delay in the virtual queue.An iterative algorithm for PAA to solve the problem is used.The fractional objective function is transformed into polynomial form,and the global optimal solution is obtained by iteration after reducing the computational complexity.At the same time,a sub-optimal method is developed to reduce computational complexity and some performance.The simulation results show that the optimal algorithm has higher performance and the sub-optimal method has lower computational complexity.The designed algorithm has important value for the practical applications,such as the Internet of things,Internet of vehicles,signal processing,artificial intelligence,and so on.Now,it has been used in our project on cognitive radio network(CRN)to solve the problem of power resource allocation.
作者 张德干 张婷 张捷 周舢 Zhang Degan;Zhang Ting;Zhang Jie;Zhou Shan(Key Laboratory of Computer Vision and System(Tianjin University of Technology),Ministry of Education,Tianjin 300384;Tianjin Key Laboratory of Intelligent Computing&Novel Software Technology(Tianjin University of Technology),Tianjin 300384;Beijing No.20 High School,Beijing 100085)
出处 《计算机研究与发展》 EI CSCD 北大核心 2018年第11期2511-2521,共11页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61571328) 天津市重大科技专项(15ZXDSGX00050 16ZXFWGX00010) 天津市科技支撑重点项目(17YFZCGX00360) 天津市自然科学基金项目(15JCYBJC46500) 天津市科技创新团队项目(12-5016 2015-23)~~
关键词 滤波器组多载波 偏移正交幅度调制 认知无线电网络 干扰抑制 优化 filter bank multi-carrier(FBMC) offset quadrature amplitude modulation(OQAM) cognitive radio network(CRN) interference restraining optimal
  • 相关文献

参考文献3

二级参考文献46

  • 1Li C F, Ye M, Chen G H, Wu J. An energy-efficient unequal clustering mechanism for wireless sensor networks [ A ]. Pro- ceedings of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor System[ C ]. Washington DC: IEEE Press, 2005.597 - 604.
  • 2Barab~i A L. Scale-free networks: a decade and beyond[ J]. Science, 2009,325(5939) :412 - 413.
  • 3Barrat A, Barth61emy M, Vespignani A. Modeling the evolution of weighted networks[ J]. Physical Review E, 2004,70( 6 ) : 1 - 13.
  • 4Li X, Chen G R.A local-world evolving network model[J]. Physica A,2003,328(1 - 2) :274 - 286.
  • 5Ruela A S,Cabral R S,Aquino A L L, Guimaraes F G.Evolu- tionary design of wireless sensor networks based on complex networks[ A ]. Proceedings of the 5thInternational Conference on Intelligent Sensors, Sensor Networks and Information Pro- cessing[ C]. Melbourne:IEEE Press, 2009.237 - 242.
  • 6Yang Xinyu, Ma Ting, Shi Yi. Typical DoS/DDoS threats under IPv6 [C] //Proc of the 2nd Int Multi-Conf on Computing in the Global Information Technology. Los Alamitos, CA: IEEE Computer Society, 2007:55-60.
  • 7Smith M. Mitigating IPv6 neighbor discovery DoS attack using stateless neighbor presence discovery [EB/OL]. [2014- 01-15]. http://tools, ietf. org/html/draft-smith-6man-mitigate nd-cache-dos slnd-06.
  • 8Saad R, Ramadass S, Manickam S. A study on detecting ICMPv6 flooding attack based on IDS [J]. Australian Journal of Basic and Applied Sciences, 2013, 7(2): 175-181.
  • 9Supriyanto, Murugesan R K, Ramadass S. Review on IPv6 security vulnerability issues and mitigation methods [J]. Int Journal of Network Security & Its Applications, 2012, 4 (6) : 173-185.
  • 10Davies E, Krishnan S, Savola P. IPv6 transition/coexistence security considerations [EB/OL]. [ 2014-01-15 ]. http:// www. ietf. org/rfc/rfc4942, txt.

共引文献16

同被引文献20

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部