期刊文献+
共找到1,853篇文章
< 1 2 93 >
每页显示 20 50 100
Multi-protocol relay chaining for large-scale quantum key distribution networks
1
作者 Yuan Cao Xiaosong Yu +4 位作者 Yongli Zhao Chunhui Zhang Xingyu Zhou Jie Zhang Qin Wang 《Chinese Physics B》 2025年第1期80-94,共15页
As the first stage of the quantum Internet,quantum key distribution(QKD)networks hold the promise of providing long-term security for diverse users.Most existing QKD networks have been constructed based on independent... As the first stage of the quantum Internet,quantum key distribution(QKD)networks hold the promise of providing long-term security for diverse users.Most existing QKD networks have been constructed based on independent QKD protocols,and they commonly rely on the deployment of single-protocol trusted relay chains for long reach.Driven by the evolution of QKD protocols,large-scale QKD networking is expected to migrate from a single-protocol to a multi-protocol paradigm,during which some useful evolutionary elements for the later stages of the quantum Internet may be incorporated.In this work,we delve into a pivotal technique for large-scale QKD networking,namely,multi-protocol relay chaining.A multi-protocol relay chain is established by connecting a set of trusted/untrusted relays relying on multiple QKD protocols between a pair of QKD nodes.The structures of diverse multi-protocol relay chains are described,based on which the associated model is formulated and the policies are defined for the deployment of multi-protocol relay chains.Furthermore,we propose three multi-protocol relay chaining heuristics.Numerical simulations indicate that the designed heuristics can effectively reduce the number of trusted relays deployed and enhance the average security level versus the commonly used single-protocol trusted relay chaining methods on backbone network topologies. 展开更多
关键词 quantum communications quantum networks trusted relay untrusted relay
下载PDF
Improving throughput in SWIPT-based wireless multirelay networks with relay selection and rateless codes
2
作者 Gaofei Huang Qihong Zhong +2 位作者 Hui Zheng Sai Zhao Dong Tang 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1131-1144,共14页
This paper studies a dual-hop Simultaneous Wireless Information and Power Transfer(SWIPT)-based multi-relay network with a direct link.To achieve high throughput in the network,a novel protocol is first developed,in w... This paper studies a dual-hop Simultaneous Wireless Information and Power Transfer(SWIPT)-based multi-relay network with a direct link.To achieve high throughput in the network,a novel protocol is first developed,in which the network can switch between a direct transmission mode and a Single-Relay-Selection-based Cooperative Transmission(SRS-CT)mode that employs dynamic decode-and-forward relaying accomplished with Rateless Codes(RCs).Then,under this protocol,an optimization problem is formulated to jointly optimize the network operation mode and the resource allocation in the SRS-CT mode.The formulated problem is difficult to solve because not only does the noncausal Channel State Information(CSI)cause the problem to be stochastic,but also the energy state evolution at each relay is complicated by network operation mode decision and resource allocation.Assuming that noncausal CSI is available,the stochastic optimization issue is first to be addressed by solving an involved deterministic optimization problem via dynamic programming,where the complicated energy state evolution issue is addressed by a layered optimization method.Then,based on a finite-state Markov channel model and assuming that CSI statistical properties are known,the stochastic optimization problem is solved by extending the result derived for the noncausal CSI case to the causal CSI case.Finally,a myopic strategy is proposed to achieve a tradeoff between complexity and performance without the knowledge of CSI statistical properties.The simulation results verify that our proposed SRS-and-RC-based design can achieve a maximum of approximately 40%throughput gain over a simple SRS-and-RC-based baseline scheme in SWIPT-based multi-relay networks. 展开更多
关键词 Simultaneous wireless information and power TRANSFER Energy harvesting relay networks Throughput maximization
下载PDF
Security-Reliability Analysis and Optimization for Cognitive Two-Way Relay Network with Energy Harvesting
3
作者 Luo Yi Zhou Lihua +3 位作者 Dong Jian Sun Yang Xu Jiahui Xi Kaixin 《China Communications》 SCIE CSCD 2024年第11期163-179,共17页
This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)node... This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm. 展开更多
关键词 artificial noise energy harvesting cognitive two-way relay network hardware impairments physical layer security security-reliability tradeoff self-adaptive quantum particle swarm optimization
下载PDF
Average Secrecy Capacity of the Reconfigurable Intelligent Surface-Assisted Integrated Satellite Unmanned Aerial Vehicle Relay Networks
4
作者 Ping Li Kefeng Guo +2 位作者 Feng Zhou XuelingWang Yuzhen Huang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1849-1864,共16页
Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-e... Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings. 展开更多
关键词 Integrated satellite unmanned aerial vehicle relay networks reconfigurable intelligent surface average secrecy capacity(ASC) asymptotic ASC
下载PDF
Interference Alignment in Two-Way Relay Networks via Rank Constraints Rank Minimization 被引量:1
5
作者 Xue Jiang Baoyu Zheng Yuelin Du 《China Communications》 SCIE CSCD 2017年第7期195-203,共9页
Interference alignment(IA) is one of the promising measures for the multi-user network to manage interference. The rank constraints rank minimization means that interference spans the lowest dimensional subspace and t... Interference alignment(IA) is one of the promising measures for the multi-user network to manage interference. The rank constraints rank minimization means that interference spans the lowest dimensional subspace and the useful signal spans all available spatial dimensions. In order to improve the performance of two-way relay network, we can use rank constrained rank minimization(RCRM) to solve the IA problem. This paper proposes left reweighted nuclear norm minimization-γalgorithm and selective coupling reweighted nuclear norm minimization algorithm to implement interference alignment in two-way relay networks. The left reweighted nuclear norm minimization-γ algorithm is based on reweighted nuclear norm minimization algorithm and has a novel γ choosing rule. The selective coupling reweighted nuclear norm minimization algorithm weighting methods choose according to singular value of interference matrixes. Simulation results show that the proposed algorithms considerably improve the sum rate performance and achieve the higher average achievable multiplexing gain in two-way relay interference networks. 展开更多
关键词 wireless Communications interference alignment two-way relay networks rank constraints rank minimization
下载PDF
Automatic Classification of Superimposed Modulations for 5G MIMO Two-Way Cognitive Relay Networks 被引量:1
6
作者 Haithem Ben Chikha Ahmad Almadhor 《Computers, Materials & Continua》 SCIE EI 2022年第1期1799-1814,共16页
To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the cl... To promote reliable and secure communications in the cognitive radio network,the automatic modulation classification algorithms have been mainly proposed to estimate a single modulation.In this paper,we address the classification of superimposed modulations dedicated to 5G multipleinput multiple-output(MIMO)two-way cognitive relay network in realistic channels modeled with Nakagami-m distribution.Our purpose consists of classifying pairs of users modulations from superimposed signals.To achieve this goal,we apply the higher-order statistics in conjunction with the Multi-BoostAB classifier.We use several efficiency metrics including the true positive(TP)rate,false positive(FP)rate,precision,recall,F-Measure and receiver operating characteristic(ROC)area in order to evaluate the performance of the proposed algorithm in terms of correct superimposed modulations classification.Computer simulations prove that our proposal allows obtaining a good probability of classification for ten superimposed modulations at a low signal-to-noise ratio,including the worst case(i.e.,m=0.5),where the fading distribution follows a one-sided Gaussian distribution.We also carry out a comparative study between our proposal usingMultiBoostAB classifier with the decision tree(J48)classifier.Simulation results show that the performance of MultiBoostAB on the superimposed modulations classifications outperforms the one of J48 classifier.In addition,we study the impact of the symbols number,path loss exponent and relay position on the performance of the proposed automatic classification superimposed modulations in terms of probability of correct classification. 展开更多
关键词 Automatic classification MIMO two-way cognitive relay network Nakagami-m channels superimposed modulations 5G
下载PDF
Secrecy-Enhancing Design for Two-Way Energy Harvesting Cooperative Networks with Full-Duplex Relay Jamming 被引量:1
7
作者 Siyang Xu Xin Song +3 位作者 Yiming Gao Suyuan Li Jing Cao Zhigang Xie 《China Communications》 SCIE CSCD 2021年第5期273-284,共12页
To guarantee secure information transmission within two sources,a full-duplex(FD)relay jamming scheme for two-way energy harvesting(EH)cooperative networks is proposed,in which the relay can achieve simultaneous infor... To guarantee secure information transmission within two sources,a full-duplex(FD)relay jamming scheme for two-way energy harvesting(EH)cooperative networks is proposed,in which the relay can achieve simultaneous information reception and jamming transmission.The EH relay node scavenges energy from two source signals,and then,uses the harvested energy for information relaying and jamming transmission by the power splitting(PS)protocol.Considering multiple eavesdroppers,the nonconvex optimization for maximizing the smaller bidirectional secrecy rates is formulated by jointly optimizing the power allocation and PS factor.Furthermore,an iterative algorithm based on successive convex approximation and alternate search method is proposed to solve this non-convexity.Simulation results verify the proposed iterative algorithm and show that the proposed jamming scheme can achieve substantial performance gain than other conventional schemes. 展开更多
关键词 physical layer security two-way EH cooperative networks FD relay jamming minimum guaranteed secrecy rate
下载PDF
Distributed Relay Beamforming in Cognitive Two-Way Networks: SINR Balancing Approach
8
作者 Seyed Hamid Safavi Mehrdad Ardebilipour 《International Journal of Communications, Network and System Sciences》 2012年第10期678-683,共6页
In this paper, we study the problem of distributed relay beamforming for a bidirectional cognitive relay network which consists of two secondary transceivers and K cognitive relay nodes and a primary network with a tr... In this paper, we study the problem of distributed relay beamforming for a bidirectional cognitive relay network which consists of two secondary transceivers and K cognitive relay nodes and a primary network with a transmitter and receiver, using underlay model. For effective use of spectrum, we propose a Multiple Access Broadcasting (MABC) two-way relaying scheme for cognitive networks. The two transceivers transmit their data towards the relays and then relays retransmit the processed form of signal towards the receiver. Our aim is to design the beamforming coefficients to maximize quality of service (QoS) for the secondary network while satisfying tolerable interference constraint for the primary network. We show that this approach yields a closed-form solution. Our simulation results show that the maximum achievable SINR improved while the tolerable interference temperature becomes not strict for primary receiver. 展开更多
关键词 COGNITIVE RADIO Two-way relay networks BEAMFORMING
下载PDF
Secure Communications for Two-Way Relay Networks Via Relay Chatting
9
作者 Jun Xiong Dongtang Ma +1 位作者 Chunguo Liu Xin Wang 《Communications and Network》 2013年第3期42-47,共6页
In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is ... In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is proposed. Specifically, the proposed scheme selects a best relay that maximize the sum mutual information among the sources to forward the sources’ signals using an amplify-and-forward protocol, and the remaining relays transmit interference signals to confuse the eavesdropper via distributed beam forming. It can be found that the proposed scheme with relay chatting does not require the knowledge of the eavesdropper’s channel, and outperforms the joint relay and jammer selection scheme, which introduces the interference into the sources. Numerical results show that the secrecy outage probability of the proposed scheme converges to zero as the transmit power increases. 展开更多
关键词 Two-way relay networks PHYSICAL LAYER SECURITY relay CHATTING
下载PDF
Joint Linear Processing Design for Distributed Two-Way Amplify-and-Forward MIMO Relaying Networks
10
作者 费泽松 罗晨 +1 位作者 邢成文 匡镜明 《China Communications》 SCIE CSCD 2013年第7期126-133,共8页
Linear transceiver designs are investigated for distributed two-way relaying networks,which aim at minimising the WeightedMean Square Error(WMSE) of data detections.The forwarding matrices at relays andequalization ma... Linear transceiver designs are investigated for distributed two-way relaying networks,which aim at minimising the WeightedMean Square Error(WMSE) of data detections.The forwarding matrices at relays andequalization matrices at destinations are jointly optimised.To overcome the challenginglimitations introduced by individual powerconstraints,a Semi-Definite Relaxation(SDR)called element-wise relaxation is proposed,which can transform the original optimizationproblem into a standard convex optimizationproblem.In this research,two-way relaying isunderstood from a pure signal processing perspective which can potentially simplify thetheoretical analysis.Finally,simulation resultsare used for assessing the performance advantage of the proposed algorithm. 展开更多
关键词 MIMO two-way relaying network coding
下载PDF
Joint Beamforming and Time Switching Designs for Energy-Constrained Cognitive Two-Way Relay Networks
11
作者 Meijuan Zhang Shibing Zhang +3 位作者 Zhihua Bao Wei Wang Xiaoge Zhang Yonghong Chen 《China Communications》 SCIE CSCD 2020年第5期110-118,共9页
In this paper, we investigate a joint beamforming and time switching(TS) design for an energy-constrained cognitive two-way relay(TWR) network. In the network, the energy-constrained secondary user(SU) relay employs T... In this paper, we investigate a joint beamforming and time switching(TS) design for an energy-constrained cognitive two-way relay(TWR) network. In the network, the energy-constrained secondary user(SU) relay employs TS protocol to harvest energy from the signals sent by the circuit-powered primary user(PU) transmitter, and then exploits the harvested energy to perform information forwarding. Our aim is to maximize the sum rate of SUs under the constraints of the data rate of PU, the energy harvesting and the transmit power of the SU relay. To determine the beamforming matrix and TS ratio, we decouple the original non-convex problem into two subproblems which can be solved by semidefinite relaxation and successive convex optimization methods. Furthermore, we derive closed form expressions of the optimal solutions for each subproblem, which facilitates the design of a suboptimal iterative algorithm to handle the original sum rate maximization problem. Simulation results are presented to illustrate the effectiveness and superior performance of the proposed joint design against other conventional schemes in the literature. 展开更多
关键词 cognitive networks two-way relay sum rate energy harvesting BEAMFORMING
下载PDF
Secrecy Outage Probability for Two-Way Integrated Satellite Unmanned Aerial Vehicle Relay Networks with Hardware Impairments
12
作者 Xiaoting Ren Kefeng Guo 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第6期2515-2530,共16页
In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy... In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis. 展开更多
关键词 Integrated satellite unmanned aerial vehicle relay networks two-way unmanned aerial vehicle relay hardware impairments secrecy outage probability(SOP) asymptotic SOP
下载PDF
Cooperative Jamming for Physical Layer Security in Hybrid Satellite Terrestrial Relay Networks 被引量:9
13
作者 Su Yan Xinyi Wang +2 位作者 Zongling Li Bin Li Zesong Fei 《China Communications》 SCIE CSCD 2019年第12期154-164,共11页
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTR... To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one. 展开更多
关键词 hybrid satellite terrestrial relay networks physical layer security cooperative jamming
下载PDF
Network Coding-Aware Cooperative Relaying for Downlink Cellular Relay Networks 被引量:4
14
作者 熊轲 樊平毅 +1 位作者 易粟 雷鸣 《China Communications》 SCIE CSCD 2013年第7期44-56,共13页
In this paper, we first overview some traditional relaying technologies, and then present a Network Coding-Aware Cooperative Relaying (NC2R) scheme to improve the performance of downlink transmission for relayaided ... In this paper, we first overview some traditional relaying technologies, and then present a Network Coding-Aware Cooperative Relaying (NC2R) scheme to improve the performance of downlink transmission for relayaided cellular networks. Moreover, systematic performance analysis and extensive simulations are performed for the proposed NC2R and traditional relaying and non-relaying schemes. The results show that NCR outperforms conventional relaying and non-relaying schemes in terms of blocking probability and spectral efficiency, especially for cell-edge users. Additionally, the location selections for relays with NCR are also discussed. These results will provide some insights for incorporating network coding into next-generation broadband cellular relay mobile systems. 展开更多
关键词 network coding relay networks cooperative transmission cellular networks
下载PDF
A Novel Beamforming Emulating Photonic Nanojets for Wireless Relay Networks 被引量:3
15
作者 Samer Alabed Ibrahim Mahariq +1 位作者 Mohammad Salman Mustafa Kuzuoglu 《Computers, Materials & Continua》 SCIE EI 2021年第10期575-588,共14页
In this article,a low-cost electromagnetic structure emulating photonic nanojets is utilized to improve the efficiency of wireless relay networks.The spectral element method,due to its high accuracy,is used to verify ... In this article,a low-cost electromagnetic structure emulating photonic nanojets is utilized to improve the efficiency of wireless relay networks.The spectral element method,due to its high accuracy,is used to verify the efficiency of the proposed structure by solving the associate field distribution.The application of optimal single-relay selection method shows that full diversity gain with low complexity can be achieved.In this paper,the proposed technique using smart relays combines the aforementioned two methods to attain the benefits of both methods by achieving the highest coding and diversity gain and enhances the overall network performance in terms of bit error rate(BER).Moreover,we analytically prove the advantage of using the proposed technique.In our simulations,it can be shown that the proposed technique outperforms the best known state-of-the-art single relay selection technique.Furthermore,the BER expressions obtained from the theoretical analysis are perfectly matched to those obtained from the conducted simulations. 展开更多
关键词 Wireless relay networks cooperative diversity techniques relay selection network beamforming techniques
下载PDF
Power Splitting Based SWIPT in Network-Coded Two-Way Networks with Data Rate Fairness:An Information-Theoretic Perspective 被引量:2
16
作者 Ke Xiong Yu Zhang +1 位作者 Yueyun Chen Xiaofei Di 《China Communications》 SCIE CSCD 2016年第12期107-119,共13页
This paper investigates the simultaneous wireless information and powertransfer(SWIPT) for network-coded two-way relay network from an information-theoretic perspective, where two sources exchange information via an S... This paper investigates the simultaneous wireless information and powertransfer(SWIPT) for network-coded two-way relay network from an information-theoretic perspective, where two sources exchange information via an SWIPT-aware energy harvesting(EH) relay. We present a power splitting(PS)-based two-way relaying(PS-TWR) protocol by employing the PS receiver architecture. To explore the system sum rate limit with data rate fairness, an optimization problem under total power constraint is formulated. Then, some explicit solutions are derived for the problem. Numerical results show that due to the path loss effect on energy transfer, with the same total available power, PS-TWR losses some system performance compared with traditional non-EH two-way relaying, where at relatively low and relatively high signalto-noise ratio(SNR), the performance loss is relatively small. Another observation is that, in relatively high SNR regime, PS-TWR outperforms time switching-based two-way relaying(TS-TWR) while in relatively low SNR regime TS-TWR outperforms PS-TWR. It is also shown that with individual available power at the two sources, PS-TWR outperforms TS-TWR in both relatively low and high SNR regimes. 展开更多
关键词 two-way relay energy harvesting wireless power transfer data rate fairness network coding
下载PDF
Cooperative Privacy Provisioning for Energy Harvesting Based Cognitive Multi-Relay Networks 被引量:2
17
作者 Dawei Wang Wei Liang +2 位作者 Xiaoyu Hu Daosen Zhai Di Zhang 《China Communications》 SCIE CSCD 2020年第2期125-137,共13页
In order to provide privacy provisioning for the secondary information,we propose an energy harvesting based secure transmission scheme for the cognitive multi-relay networks.In the proposed scheme,two secondary relay... In order to provide privacy provisioning for the secondary information,we propose an energy harvesting based secure transmission scheme for the cognitive multi-relay networks.In the proposed scheme,two secondary relays harvest energy to power the secondary transmitter and assist the secondary secure transmission without interfere the secondary transmission.Specifically,the proposed secure transmission policy is implemented into two phases.In the first phase,the secondary transmitter transmits the secrecy information and jamming signal through the power split method.After harvesting energy from a fraction of received radio-frequency signals,one secondary relay adopts the amplify-and-forward relay protocol to assist the secondary secure transmission and the other secondary relay just forwards the new designed jamming signal to protect the secondary privacy information and degrade the jamming interference at the secondary receiver.For the proposed scheme,we first analyze the average secrecy rate,the secondary secrecy outage probability,and the ergodic secrecy rate,and derive their closed-form expressions.Following the above results,we optimally allocate the transmission power such that the secrecy rate is maximized under the secrecy outage probability constraint.For the optimization problem,an AI based simulated annealing algorithm is proposed to allocate the transmit power.Numerical results are presented to validate the performance analytical results and show the performance superiority of the proposed scheme in terms of the average secrecy rate. 展开更多
关键词 cognitive radio networks energy harvesting relay security
下载PDF
Performance of Physical-Layer Network Coding in Asymmetric Two-Way Relay Channels 被引量:3
18
作者 李博 王钢 +3 位作者 Peter H.J.Chong 杨洪娟 Yongliang GUAN 沙学军 《China Communications》 SCIE CSCD 2013年第10期65-73,共9页
In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymm... In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymmetry and node asymmetry. The decision and mapping rule for symmetric and asymmetric cases are studied. The performance in terms of bit error rate for each case will be studied and analysed by computer simulation. Analytical and simulation results show that uplink asymmetry is the worst case;intra-phase asymmetry and unreliable uplink channels will more severely affect the performance degradation, which is caused by channel asymmetry. 展开更多
关键词 physical-layer network coding two-way relay channels asymmetric channels bit error rate
下载PDF
Cognitive amplify-and-forward dual-hop relay networks over α-μ fading channels 被引量:2
19
作者 HAN Yan-bo GAO Li YAN Wen-hua 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2019年第1期69-75,共7页
This paper provides an analytic performance evaluation of dual-hop cognitive amplify-and-forward (AF) relaying networks over independent nonidentically distributed (i.n.i.d.) fading channels. Two different transmit po... This paper provides an analytic performance evaluation of dual-hop cognitive amplify-and-forward (AF) relaying networks over independent nonidentically distributed (i.n.i.d.) fading channels. Two different transmit power constraint strategies at the secondary network are proposed to investigate the performance of the secondary network. In the case of combined power constraint,the maximum tolerable interference power on the primary network and the maximum transmit power at the secondary network are considered. Closed-form lower bound and its asymptotic expression for the outage probability (OP) are achieved. Utilizing the above results,average symbol error probability (ABEP) at high signal-to-noise ratios (SNRs) are also derived. In order to further study the performance of dual-hop cognitive AF relaying networks,the Closed-form lower bounds and asymptotic expressions for OP with single power constraint of the tolerable interference on the primary network is also obtained. Both analytical and simulation are employed to validate the accuracy of the theoretical analysis. The results show that the secondary network obtains a better performance when higher power constraint is employed. 展开更多
关键词 cognitive relay network amplify-and-forward relay outage probability α-μ fading channels
下载PDF
Outage Performance of Cognitive DF Relaying Networks Employing SWIPT 被引量:2
20
作者 Jing Yang Yiyun Cheng +2 位作者 Kostas P. Peppas P. Takis Mathiopoulos Jie Ding 《China Communications》 SCIE CSCD 2018年第4期28-40,共13页
In this paper, the outage perfor- mance of a cognitive relaying network over Nakagami-m fading channels, employing simultaneous wireless information and power transfer (SWIPT) technology is analyzed and evaluated. T... In this paper, the outage perfor- mance of a cognitive relaying network over Nakagami-m fading channels, employing simultaneous wireless information and power transfer (SWIPT) technology is analyzed and evaluated. The operation of this network is considered in conjunction with the convention- al decode-and-forward (DF) and incremental DF (IDF) protocols. For the conventional DF protocol, it is assumed that there is no direct link between the secondary transmitter (S) and the secondary destination (D), while (for both protocols) after harvesting energy, the relay node (R) always helps to forward the resulting signal to D. However, for the IDF protocol, R assists in relaying S's information to D only when the direct communication between S and D has failed. Furthermore, for both DF and IDF protocols, we assume there is no power supply for R, and R harvests energy from the transmitted signal of S. We derive exact ana- lytical expressions for the outage probability at D in DF and IDF protocols, respectively, in terms of the bivariate Meijer's G-function. Performance evaluation results obtained by means of Monte-Carlo simulations are also provided and have validated the correctness of the oroDosed analysis. 展开更多
关键词 cognitive relaying networks out-age probability energy harvestin incrementaldecode-and-forward
下载PDF
上一页 1 2 93 下一页 到第
使用帮助 返回顶部