This paper considers a two-user Gaussian interference channel aided by a single relay. Two source-destination pairs and the relay share a single common chaunel, and the relay assists both sources in communicating the ...This paper considers a two-user Gaussian interference channel aided by a single relay. Two source-destination pairs and the relay share a single common chaunel, and the relay assists both sources in communicating the messages to their respective destinations. This paper mainly focuses on the "amplify-and-forward" (AF) relaying strategy for relay, and derives upper bound and lower bound on achievable sum rate accordingly. Next, the application of the above model in cognitive radio (CR) networks is considered. The schemes that can ensure the coexistence of the secondary user with the primary user are proposed, in the sense that there is no rate degradation for the primary user due to sharing of the channel. Further, the throughput of the secondary user in different communication scenarios is investigated.展开更多
基金Supported by the National Natural Science Foundation of China (No. 60872049 60871042+1 种基金 60971082 60972073), the National High Technology Research and Development Programme of China (No.2007AA10Z235)and the National Key Basic Research Program of China (No.2009CB320407).
文摘This paper considers a two-user Gaussian interference channel aided by a single relay. Two source-destination pairs and the relay share a single common chaunel, and the relay assists both sources in communicating the messages to their respective destinations. This paper mainly focuses on the "amplify-and-forward" (AF) relaying strategy for relay, and derives upper bound and lower bound on achievable sum rate accordingly. Next, the application of the above model in cognitive radio (CR) networks is considered. The schemes that can ensure the coexistence of the secondary user with the primary user are proposed, in the sense that there is no rate degradation for the primary user due to sharing of the channel. Further, the throughput of the secondary user in different communication scenarios is investigated.