期刊文献+
共找到1,727篇文章
< 1 2 87 >
每页显示 20 50 100
Max-Min Fair RIS-Aided Rate-Splitting Multiple Access for Multigroup Multicast Communications
1
作者 Tiantian Li Haixia Zhang +1 位作者 Shuaishuai Guo Dongfeng Yuan 《China Communications》 SCIE CSCD 2023年第1期184-198,共15页
Rate-splitting multiple access(RSMA)can cope with a wide range of propagation conditions in multigroup multicast communications through rate splitting optimization.To breakthrough the grouprate limited bottleneck,reco... Rate-splitting multiple access(RSMA)can cope with a wide range of propagation conditions in multigroup multicast communications through rate splitting optimization.To breakthrough the grouprate limited bottleneck,reconfigurable intelligent surface(RIS)technique can be introduced to assist wireless communications through enhancing the channel quality.In RIS-aided RSMA multigroup multicasting,how to provide fair and high-quality multiuser service under power and spectrum constraints is essential.In this paper,we propose a max-min fair RIS-aided rate-splitting multiple access(MMF-RISRSMA)scheme for multigroup multicast communications,where the rate fairness is obtained by maximizing the minimum group-rate.In doing so,we jointly optimize the beamformers,the rate splitting vector at the transmitter,as well as the phase shifts at RIS.To solve it,we divide the original optimization problem into two subproblems and alternately optimize the variables.The beamforming and rate splitting optimization subproblem is solved by using the successive convex approximation technique.The phase shift optimization subproblem is solved through the penalty function method to achieve a rank-one locally optimal solution.Simulations demonstrate that the proposed MMF-RIS-RSMA scheme can obtain significant performance gain in terms of the minimum group-rate. 展开更多
关键词 multigroup multicast communications rate-splitting multiple access(RSMA) reconfigurable intelligent surfaces(RIS) max-min fairness(MMF)
下载PDF
The Extended Hybrid Carrier-Based Multiple Access Technology for High Mobility Scenarios 被引量:1
2
作者 Ge Song Xiaojie Fang Xuejun Sha 《China Communications》 SCIE CSCD 2024年第1期53-68,共16页
The hybrid carrier(HC)system rooted in the carrier fusion concept is gradually garnering attention.In this paper,we study the extended hybrid carrier(EHC)multiple access scheme to ensure reliable wireless communicatio... The hybrid carrier(HC)system rooted in the carrier fusion concept is gradually garnering attention.In this paper,we study the extended hybrid carrier(EHC)multiple access scheme to ensure reliable wireless communication.By employing the EHC modulation,a power layered multiplexing framework is realized,which exhibits enhanced interference suppression capability owing to the more uniform energy distribution design.The implementation method and advantage mechanism are explicated respectively for the uplink and downlink,and the performance analysis under varying channel conditions is provided.In addition,considering the connectivity demand,we explore the non-orthogonal multiple access(NOMA)method of the EHC system and develop the EHC sparse code multiple access scheme.The proposed scheme melds the energy spread superiority of EHC with the access capacity of NOMA,facilitating superior support for massive connectivity in high mobility environments.Simulation results have verified the feasibility and advantages of the proposed scheme.Compared with existing HC multiple access schemes,the proposed scheme exhibits robust bit error rate performance and can better guarantee multiple access performance in complex scenarios of nextgeneration communications. 展开更多
关键词 extended hybrid carrier system high mo-Received:Jun.09 2023 Revised:Nov.20 2023 Editor:Yuanwei Liu bility communications multiple access
下载PDF
Resource allocation for D2D-assisted haptic communications
3
作者 Yan Wu Chao Yue +1 位作者 Yang Yang Liang Ao 《Digital Communications and Networks》 SCIE CSCD 2024年第1期63-74,共12页
Haptic communications is recognized as a promising enabler of extensive services by enabling real-time haptic control and feedback in remote environments,e.g.,teleoperation and autonomous driving.Considering the stric... Haptic communications is recognized as a promising enabler of extensive services by enabling real-time haptic control and feedback in remote environments,e.g.,teleoperation and autonomous driving.Considering the strict transmission requirements on reliability and latency,Device-to-Device(D2D)communications is introduced to assist haptic communications.In particular,the teleoperators with poor channel quality are assisted by auxiliaries,and each auxiliary and its corresponding teleoperator constitute a D2D pair.However,the haptic interaction and the scarcity of radio resources pose severe challenges to the resource allocation,especially facing the sporadic packet arrivals.First,the contentionbased access scheme is applied to achieve low-latency transmission,where the resource scheduling latency is omitted and users can directly access available resources.In this context,we derive the reliability index of D2D pairs under the contention-based access scheme,i.e.,closed-loop packet error probability.Then,the reliability performance is guaranteed by bidirectional power control,which aims to minimize the sum packet error probability of all D2D pairs.Potential game theory is introduced to solve the problem with low complexity.Accordingly,a distributed power control algorithm based on synchronous log-linear learning is proposed to converge to the optimal Nash Equilibrium.Experimental results demonstrate the superiority of the proposed learning algorithm. 展开更多
关键词 Haptic communications D2D Power control Contention-based access Potential game
下载PDF
Design Framework of Unsourced Multiple Access for 6G Massive IoT
4
作者 Chunlin Yan Siying Lyu +2 位作者 Sen Wang Yuhong Huang Xiaodong Xu 《China Communications》 SCIE CSCD 2024年第1期1-12,共12页
In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical s... In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical solutions.A rather complete design of unsourced multiple access is proposed in which two key parts:a compressed sensing module for active user detection,and a sparse interleaver-division multiple access(SIDMA)module are simulated side by side on a same platform at balanced signal to noise ratio(SNR)operating points.With a proper combination of compressed sensing matrix,a convolutional encoder,receiver algorithms,the simulated performance results appear superior to the state-of-the-art benchmark,yet with relatively less complicated processing. 展开更多
关键词 channel coding compressed sensing massive Internet-of-Things(IoT) sparse interleaverdivision multiple access(SIDMA) the sixth generation(6G)mobile communications unsourced multiple access
下载PDF
Unsourced Multiple Access for 6G Massive Machine Type Communications 被引量:3
5
作者 Yuanjie Li Jincheng Dai +5 位作者 Zhongwei Si Kai Niu Chao Dong Jiaru Lin Sen Wang Yifei Yuan 《China Communications》 SCIE CSCD 2022年第3期70-87,共18页
Unsourced multiple access(UMA)is a multi-access technology for massive,low-power,uncoordinated,and unsourced Machine Type Communication(MTC)networks.It ensures transmission reliability under the premise of high energy... Unsourced multiple access(UMA)is a multi-access technology for massive,low-power,uncoordinated,and unsourced Machine Type Communication(MTC)networks.It ensures transmission reliability under the premise of high energy efficiency.Based on the analysis of the 6G MTC key performance indicators(KPIs)and scenario characteristics,this paper summarizes its requirements for radio access networks.Following this,the existing multiple access models are analyzed under these standards to determine UMA's advantages for 6G MTC according to its design characteristics.The critical technology of UMA is the design of its multiple-access coding scheme.Therefore,the existing UMA coding schemes from different coding paradigms are further summarized and compared.In particular,this paper comprehensively considers the energy efficiency and computational complexity of these schemes,studies the changes of the above two indexes with the increase of access scale,and considers the trade-off between the two.It is revealed by the above analysis that some guiding rules of UMA coding design.Finally,the open problems and potentials in this field are given for future research. 展开更多
关键词 unsourced multiple access machine type communications 6G massive random access uncoordinated
下载PDF
Symbol Error Rate Performance Analysis of Non-Orthogonal Multiple Access for Visible Light Communications 被引量:3
6
作者 Hongji Huang Jinyuan Wang +3 位作者 Jie Wang Jie Yang Jian Xiong Guan Gui 《China Communications》 SCIE CSCD 2017年第12期153-161,共9页
Non-orthogonal multiple access(NOMA) is considered as one of promising radio access techniques for visible light communications(VLC) in next-generation wireless communications systems.In order to provide theoretical s... Non-orthogonal multiple access(NOMA) is considered as one of promising radio access techniques for visible light communications(VLC) in next-generation wireless communications systems.In order to provide theoretical support for designing VLC-NOMA,we derive its analytic expressions for the symbol error rate(SER).Specifically,NOMA is first incorporated with appropriate VLC to establish a VLC-NOMA framework.Afterwards,mathematical expressions of the SER for the VLC-NOMA are developed.Moreover,numerical results are provided carefully to demonstrate that the proposed VLC-NOMA scheme outperforms than state-of-the-art orthogonal frequency division multiple access(OFDMA) one in terms of SER performance.Finally,relationships between the SER performance and the number of users,power allocation coefficient and semi-angle are well investigated,which can give us a scientific guide to devise the VLC-NOMA system for achieving better SER performance. 展开更多
关键词 VISIBLE light communication(VLC) non-orthogonal multiple access(NOMA) SYMBOL ERROR rate (SER)
下载PDF
A QUANTUM MULTIPLE ACCESS COMMUNICATIONS SCHEME USING ORBITAL ANGULAR MOMENTUM
7
作者 Dong Xiaoliang Zhao Shengmei Zheng Baoyu 《Journal of Electronics(China)》 2013年第2期145-151,共7页
We propose a quantum multiple access communications scheme using Orbital Angular Momentum (OAM) sector states in the paper. In the scheme, each user has an individual modified Poincare Bloch sphere and encodes his inf... We propose a quantum multiple access communications scheme using Orbital Angular Momentum (OAM) sector states in the paper. In the scheme, each user has an individual modified Poincare Bloch sphere and encodes his information with his own corresponding sector OAM states. A prepared entangled photon pairs are separated at transmitter and receiver. At the transmitter, each user encodes his information with the sector OAM states on the photons and the superposition of the different sector OAM states is carried by the photons. Then the photons are transmitted through quantum noiseless channel to the receiver. At the receiver, each user could retrieve his information by coincidently measuring the transmitted photons with the receiver side photons which are modulated by a special prepared measurement basis. The theoretical analysis and the numerical simulations show that each user could get his information from the superposition state without error. It seems that this scheme provides a novel method for quantum multiple users communications. 展开更多
关键词 Quantum multiple access communications Orbital Angular Momentum (OAM) Sector state Measurement basis
下载PDF
A Review in the Core Technologies of 5G: Device-to-Device Communication, Multi-Access Edge Computing and Network Function Virtualization 被引量:2
8
作者 Ruixuan Tu Ruxun Xiang +1 位作者 Yang Xu Yihan Mei 《International Journal of Communications, Network and System Sciences》 2019年第9期125-150,共26页
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ... 5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances. 展开更多
关键词 5th Generation Network VIRTUALIZATION Device-To-Device communication Base STATION Direct communication INTERFERENCE multi-access EDGE COMPUTING Mobile EDGE COMPUTING
下载PDF
ZTE Communications Special Issue on Multiple Access Techniques for 5G
9
《ZTE Communications》 2016年第1期2-,共1页
5G mobile cellular networks are required to provide the significant increase in network throughput,cell-edge data rate,massive connectivity,superior spectrum efficiency,currently deploying long-term evolution(LTE)and ... 5G mobile cellular networks are required to provide the significant increase in network throughput,cell-edge data rate,massive connectivity,superior spectrum efficiency,currently deploying long-term evolution(LTE)and LTE-advanced networks.To meet these challenges of 5G networks, 展开更多
关键词 ZTE communications Special Issue on multiple access Techniques for 5G access
下载PDF
ZTE Communications Special Issue on Multiple Access Techniques for 5G
10
《ZTE Communications》 2015年第4期33-33,共1页
5G mobile cellular networks are required to provide the significant increase in network throughput, cell-edge data rate, massive connectivity, superior spectrum efficiency, high energy efficiency and low latency, comp... 5G mobile cellular networks are required to provide the significant increase in network throughput, cell-edge data rate, massive connectivity, superior spectrum efficiency, high energy efficiency and low latency, compared with the currently deploying long-term evolution (LTE) and LTE-advanced networks. To meet these challenges of 5G networks, innovative technologies on radio air-interface and radio access network (RAN) are important in PHY design. Recently, 展开更多
关键词 ZTE communications Special Issue on multiple access Techniques for 5G access
下载PDF
Space-division multiple access for CDMA multiuser underwater acoustic communications
11
作者 Jingwei Yin Pengyu Du +1 位作者 Guang Yang Huanling Zhou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第6期1184-1190,共7页
Time reversal mirror (TRM) can use the physical characteristics of the underwater acoustic (UWA) channel to focus on the desired user in multi-user UWA communication. The active average sound intensity (AASI) de... Time reversal mirror (TRM) can use the physical characteristics of the underwater acoustic (UWA) channel to focus on the desired user in multi-user UWA communication. The active average sound intensity (AASI) detector can estimate all azimuths of users with the same frequency band at the same time in order to achieve directional communication by vector combination. Space-division multiple access (SDMA) based on TRM combined with the AASI detector is proposed in this paper, which can make the capacity of the code division multiple access (CDMA) UWA system significantly increase. The simulation and lake test results show that the 7-user UWA multi-user system can achieve low bit error communication. 展开更多
关键词 underwater acoustic (UWA) communication space-division multiple access (SDMA) time reversal mirror (TRM) active average sound intensity (AASI) detector.
下载PDF
Predictive Decision and Reliable Accessing for UAV Communication in Space-Air-Ground Integrated Networks 被引量:2
12
作者 Bowen Zeng Zhongshan Zhang +2 位作者 Xuhui Ding Xiangyuan Bu Jianping An 《China Communications》 SCIE CSCD 2022年第1期166-185,共20页
The cooperation of multiple Unmanned Aerial Vehicles(UAVs) has become a promising scenario in Space-Air-Ground Integrated Networks(SAGINs) recently due to their widespread applications,where wireless communication is ... The cooperation of multiple Unmanned Aerial Vehicles(UAVs) has become a promising scenario in Space-Air-Ground Integrated Networks(SAGINs) recently due to their widespread applications,where wireless communication is a basic necessity and is normally categorized into control and nonpayload communication(CNPC) as well as payload communication. In this paper, we attempt to tackle two challenges of UAV communication respectively on establishing reliable CNPC links against the high mobility of UAVs as well as changeable communication conditions, and on offering dynamic resource optimization for Quality-of-Service(QoS) guaranteed payload communication with variable link connectivity. Firstly, we propose the concept of air controlling center(ACC), a virtual application equipped on the infrastructure in SAGINs, which can collect global information for estimating UAV trajectory and communication channels. We then introduce the knapsack problem for modelling resource optimization of UAV communication in order to provide optimal access points for both CNPC and payload communication. Meanwhile, using the air controlling information, predictive decision algorithm and handover strategy are introduced for the reliable connection with multiple access points. Simulation results demonstrate that our proposal ensures an approximate always-on reliable accessing of communication links and outperforms the existing methods against high mobility,sparse distribution, and physical obstacles. 展开更多
关键词 space-air-ground integrated networks UAV communication air communication controlling predictive decision reliable accessing
下载PDF
Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks
13
作者 Wali Ullah Khan Furqan Jameel +2 位作者 Asim Ihsan Omer Waqar Manzoor Ahmed 《Digital Communications and Networks》 SCIE CSCD 2023年第1期264-269,共6页
Non-Orthogonal Multiple Access(NOMA)has emerged as a novel air interface technology for massive connectivity in Sixth-Generation(6G)era.The recent integration of NOMA in Backscatter Communication(BC)has triggered sign... Non-Orthogonal Multiple Access(NOMA)has emerged as a novel air interface technology for massive connectivity in Sixth-Generation(6G)era.The recent integration of NOMA in Backscatter Communication(BC)has triggered significant research interest due to its applications in low-powered Internet of Things(IoT)networks.However,the link security aspect of these networks has not been well investigated.This article provides a new optimization framework for improving the physical layer security of the NOMA ambient BC system.Our system model takes into account the simultaneous operation of NOMA IoT users and the Backscatter Node(BN)in the presence of multiple EavesDroppers(EDs).The EDs in the surrounding area can overhear the communication of Base Station(BS)and BN due to the wireless broadcast transmission.Thus,the chief aim is to enhance link security by optimizing the BN reflection coefficient and BS transmit power.To gauge the performance of the proposed scheme,we also present the suboptimal NOMA and conventional orthogonal multiple access as benchmark schemes.Monte Carlo simulation results demonstrate the superiority of the NOMA BC scheme over the pure NOMA scheme without the BC and conventional orthogonal multiple access schemes in terms of system secrecy rate. 展开更多
关键词 6G Non-orthogonal multiple access Ambient backscatter communication Internet-of-things Joint optimization Physical layer security
下载PDF
Interoperative fundus image and report sharing in compliance with integrating the healthcare enterprise conformance and web access to digital imaging and communication in medicine persistent object protocol 被引量:2
14
作者 Hui-Qun Wu Zheng-Min Lv +4 位作者 Xing-Yun Geng Kui Jiang Le-Min Tang Guo-Min Zhou Jian-Cheng Dong 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2013年第6期879-883,共5页
AIM:To address issues in interoperability between different fundus image systems,we proposed a web eyepicture archiving and communication system(PACS)framework in conformance with digital imaging and communication in ... AIM:To address issues in interoperability between different fundus image systems,we proposed a web eyepicture archiving and communication system(PACS)framework in conformance with digital imaging and communication in medicine(DICOM)and health level 7(HL7)protocol to realize fundus images and reports sharing and communication through internet.METHODS:Firstly,a telemedicine-based eye care work flow was established based on integrating the healthcare enterprise(IHE)Eye Care technical framework.Then,a browser/server architecture eye-PACS system was established in conformance with the web access to DICOM persistent object(WADO)protocol,which contains three tiers.RESULTS:In any client system installed with web browser,clinicians could log in the eye-PACS to observe fundus images and reports.Multipurpose internet mail extensions(MIME)type of a structured report is saved as pdf/html with reference link to relevant fundus image using the WADO syntax could provide enough information for clinicians.Some functions provided by open-source Oviyam could be used to query,zoom,move,measure,view OICOM fundus images.CONCLUSION:Such web eye-PACS in compliance to WADO protocol could be used to store and communicate fundus images and reports,therefore is of great significance for teleophthalmology. 展开更多
关键词 picture archiving and communication system teleophthalmology integrating the healthcare enterprise web access to DICOM persistent object
下载PDF
MmWave extra-large-scale MIMO based active user detection and channel estimation for high-speed railway communications
15
作者 Anwen Liao Ruiqi Wang +5 位作者 Yikun Mei Ziwei Wan Shicong Liu Zhen Gao Hua Wang Hao Yin 《High-Speed Railway》 2023年第1期31-36,共6页
The current High-Speed Railway(HSR)communications increasingly fail to satisfy the massive access services of numerous user equipment brought by the increasing number of people traveling by HSRs.To this end,this paper... The current High-Speed Railway(HSR)communications increasingly fail to satisfy the massive access services of numerous user equipment brought by the increasing number of people traveling by HSRs.To this end,this paper investigates millimeter-Wave(mmWave)extra-large scale(XL)-MIMO-based massive Internet-of-Things(loT)access in near-field HSR communications,and proposes a block simultaneous orthogonal matching pursuit(B-SOMP)-based Active User Detection(AUD)and Channel Estimation(CE)scheme by exploiting the spatial block sparsity of the XLMIMO-based massive access channels.Specifically,we first model the uplink mmWave XL-MIMO channels,which exhibit the near-field propagation characteristics of electromagnetic signals and the spatial non-stationarity of mmWave XL-MIMO arrays.By exploiting the spatial block sparsity and common frequency-domain sparsity pattern of massive access channels,the joint AUD and CE problem can be then formulated as a Multiple Measurement Vectors Compressive Sensing(MIMV-CS)problem.Based on the designed sensing matrix,a B-SOMP algorithm is proposed to achieve joint AUD and CE.Finally,simulation results show that the proposed solution can obtain a better AUD and CE performance than the conventional CS-based scheme for massive IoT access in near-field HSR communications. 展开更多
关键词 High-speed railway communications Massive access Activeuser detection Channel estimation Millimeter-wave extra-large scale MIMO Near-field spatial non-stationarity
下载PDF
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations 被引量:2
16
作者 Ezer Osei Yeboah-Boateng Grace Dzifa Kwabena-Adade 《Journal of Information Security》 2020年第3期161-175,共15页
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario... Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication. 展开更多
关键词 Remote access communications Security User Authentication 2FA Virtual Private Network (VPN) TELECOMMUTING Threats VULNERABILITIES
下载PDF
Wireless semantic communication based on semantic matching multiple access and intent bias multiplexing
17
作者 Ren Chao He Zongrui +2 位作者 Sun Chen Li Haojin Zhang Haijun 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2024年第1期26-36,共11页
This paper proposes a multi-access and multi-user semantic communication scheme based on semantic matching and intent deviation to address the increasing demand for wireless users and data.The scheme enables flexible ... This paper proposes a multi-access and multi-user semantic communication scheme based on semantic matching and intent deviation to address the increasing demand for wireless users and data.The scheme enables flexible management of long frames,allowing each unit of bandwidth to support a higher number of users.By leveraging semantic classification,different users can independently access the network through the transmission of long concatenated sequences without modifying the existing wireless communication architecture.To overcome the potential disadvantage of incomplete semantic database matching leading to semantic intent misunderstanding,the scheme proposes using intent deviation as an advantage.This allows different receivers to interpret the same semantic information differently,enabling multiplexing where one piece of information can serve multiple users with distinct purposes.Simulation results show that at a bit error rate(BER)of 0.1,it is possible to reduce the transmission by approximately 20 semantic basic units. 展开更多
关键词 semantic communication multiple access multiPLEXING multimodal communication
原文传递
Power Allocation for NOMA in D2D Relay Communications 被引量:5
18
作者 Yan Cai Chunhua Ke +2 位作者 Yiyang Ni Jun Zhang Hongbo Zhu 《China Communications》 SCIE CSCD 2021年第1期61-69,共9页
Non-orthogonal multiple access(NOMA)is considered as one of the key technologies for the fifth generation(5G)wireless communications.The integration of NOMA and device-to-device(D2D)communications has recently attract... Non-orthogonal multiple access(NOMA)is considered as one of the key technologies for the fifth generation(5G)wireless communications.The integration of NOMA and device-to-device(D2D)communications has recently attracted wide attention.In this paper,a relaying D2D communications assisted with cooperative relaying systems using NOMA(DRC-NOMA)is considered.We analyze the ergodic sum-rate for the proposed system and then derive the closed-form expressions.In addition,an optimal power allocation strategy maximizing the ergodic sum-rate is proposed based on these analysis results.Numerical results show the good agreement between the results of analysis and Monte Carlo method.The proposed DRC-NOMA has a great improvement of the ergodic sum-rate in the small regime of average channel gain of D2D pair. 展开更多
关键词 device-to-device communication nonorthogonal multiple access decode-and-forward relaying power allocation rate analysis
下载PDF
NOMA-Based UAV-Aided Networks for Emergency Communications 被引量:12
19
作者 Wanmei Feng Jie Tang +4 位作者 Nan Zhao Yuli Fu Xiuyin Zhang Kanapathippillai Cumanan Kai-Kit Wong 《China Communications》 SCIE CSCD 2020年第11期54-66,共13页
High spectrum efficiency(SE)requirement and massive connections are the main challenges for the fifth generation(5G)and beyond 5G(B5G)wireless networks,especially for the case when Internet of Things(IoT)devices are l... High spectrum efficiency(SE)requirement and massive connections are the main challenges for the fifth generation(5G)and beyond 5G(B5G)wireless networks,especially for the case when Internet of Things(IoT)devices are located in a disaster area.Non-orthogonal multiple access(NOMA)-based unmanned aerial vehicle(UAV)-aided network is emerging as a promising technique to overcome the above challenges.In this paper,an emergency communications framework of NOMA-based UAV-aided networks is established,where the disasters scenarios can be divided into three broad categories that have named emergency areas,wide areas and dense areas.First,a UAV-enabled uplink NOMA system is established to gather information from IoT devices in emergency areas.Then,a joint UAV deployment and resource allocation scheme for a multi-UAV enabled NOMA system is developed to extend the UAV coverage for IoT devices in wide areas.Furthermore,a UAV equipped with an antenna array has been considered to provide wireless service for multiple devices that are densely distributed in disaster areas.Simulation results are provided to validate the effectiveness of the above three schemes.Finally,potential research directions and challenges are also highlighted and discussed. 展开更多
关键词 emergency communications non-orthogonal multiple access(NOMA) Internet of Things(IoT) trajectory optimization unmanned aerial vehicle(UAV)
下载PDF
The Spread Spectrum GFDM Schemes for Integrated Satellite-Terrestrial Communication System 被引量:5
20
作者 Yang Yang Lidong Zhu +2 位作者 Xing Mao Qi Tan Zongmiao He 《China Communications》 SCIE CSCD 2019年第12期165-175,共11页
Recently, integrated Satellite-Terrestrial(S-T) communication system, especially the integration of satellite communication with 5G/6G, is regarded as a research hotpot. Future integrated S-T communication systems are... Recently, integrated Satellite-Terrestrial(S-T) communication system, especially the integration of satellite communication with 5G/6G, is regarded as a research hotpot. Future integrated S-T communication systems are demanding a more compatible and robust physical layer waveform. Considering physical layer access waveform design, this paper proposed a novel Spread Spectrum Generalized Frequency Division Multiplexing(SS-GFDM) scheme for integrated S-T communication system. Traditional GFDM has many advantages such as excellent adaptability and low out-ofband(OOB) radiation. However, because of intrinsic inter carrier interference(ICI) and low signal-to-noise ratio(SNR), the multiple access performance is degraded. In this paper, we introduced CDMA technology into GFDM. Two different spread spectrum modes, Cyclic Code Shift Keying(CCSK) soft spread spectrum and Direct Sequence Spread Spectrum(DSSS), are considered and compared in this paper to illustrate the benefits of GFDM-CDMA in low SNR scenario. Moreover, this scheme integrates the slot-ALOHA protocol with GFDM-CDMA, which extends access freedom in frequency, time and code domain. The simulation and analysis results show that the proposed GFDM-CDMA scheme reduces the performance degradation caused by interference. It is effective in typical satellite channel with low complexity. Meanwhile, the peak-average-power-ratio(PAPR) and access performance has been enhanced significantly. 展开更多
关键词 integrated satellite-terrestrial communication physical layer access waveform GFDM-CDMA S-ALOHA
下载PDF
上一页 1 2 87 下一页 到第
使用帮助 返回顶部