首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到8条相似文献,搜索用时 15 毫秒
1.
Cognitive radio (CR) has been viewed as a promising solution to spectrum scarcity. In order to design a reliable CR system, many improvements have been proposed to enhance spectrum sensing performance of secondary users (SUs) in a CR network (CRN). Sensing reliability and transmission throughput of SUs are two important performance criteria, which should be optimized to enhance signal protection of primary user (PU) as well as spectrum utilization rate. In this paper, we consider Rayleigh-faded sensing channels and SUs use improved energy detector (IED) to make their local decisions. The final decision is made in a fusion center (FC) through the cooperative spectrum sensing (CSS) scheme with erroneous reporting channels. We show that the improved double-threshold energy detector (IDED) outperforms the conventional energy detector (CED) in terms of the total error rate. Furthermore, we evaluate the transmission throughput of the CRN through various ED schemes with detection constraints over both perfect and imperfect reporting channels. We show that the IDED has the highest achievable throughput among different ED schemes over imperfect reporting channels.  相似文献   

2.
In this paper, we develop accurate distortion models for the lossy transmission of two correlated sources in a multiple access Rayleigh fading channel. We focus on a class of real-life communication systems, where the source and channel coders have already been designed separately and can only be configured during the system operation. We investigate three different source coding schemes: distributed source coding (DSC), layered source coding, and independent compression through quantization. With the later scheme the sources are jointly decoded with minimum mean square error (MMSE) estimation at the receiver. We also consider two different transmission schemes: Orthogonal transmissions and interfering transmissions decoded with a successive interference cancellation (SIC) decoder. Our final closed-form analytical models are used to determine the optimal combination of source coding and transmission schemes, as well as their optimal configuration. Hence, we exercise joint source and channel coding (JSCC) by optimizing the system configuration. Through simulations, we first validate the analytical model and illustrate the performance of different schemes. Finally, we demonstrate the JSCC gains achieved by our system.  相似文献   

3.
Cooperative relaying is considered as an effective technique to enlarge the coverage area and enhance the system capacity for the future wireless systems. In this paper, an infrastructure based multi-antenna cooperative relay network has been investigated. Closed form expressions of outage probability and average error rate have been derived, when the relay and the destination perform selection combining of the signals. The relay is assumed to operate in the adaptive decode and forward mode. The effect of number of antennas installed on the relay and their placement has also been studied.  相似文献   

4.
In this paper, we consider joint optimization of Component Carrier (CC) selection and resource allocation in 5G Carrier Aggregation (CA) system. Firstly, the upper-bound system throughput with determined number of CCs is derived and it is proved by using graph theory that the throughput optimization problem is NP hard. Then we propose a greedy based algorithm to solve this problem and prove that the proposed algorithm can achieve at least 1/2 of the optimal performance in the worst case. At last, we evaluate the throughput and computational complexity performance through a variety of simulations. Simulation results show that the proposed algorithm can obtain better performance comparing with existing schemes while keeping the computation complexity at an acceptable level.  相似文献   

5.
Signal space diversity is a powerful technique that increases reliability of detection over fading channels. In this paper, we explore the ability of this technique to provide secure communication. We enhance the security of OFDM systems in frequency selective fading channels by providing more diversity gain to the legitimate user compared to an eavesdropper. This is done by adapting the interleaving pattern to the channel of the legitimate user in rich multipath environments, where spatially separated channels are typically independent to each other. This ensures secrecy in a time division duplex system, where the eavesdropper has no information regarding the channel of the legitimate user. The scheme can also be used in the conventional frequency division duplex system, which is more challenging in terms of security aspects because of the channel state information leakage. A theoretical analysis is presented on the bit-error probability in Rayleigh fading environment. The numerical results support the conclusion that adapting the interleaving pattern to the CSI of the legitimate user provides a gain in the bit-error rate performance over the eavesdropper.  相似文献   

6.
In this paper, we study the joint user assignment and power allocation for the defined utility function (central cell throughput) maximization in massive Multiple Input-Multiple Output (MIMO) cellular system coexistence with Wireless Fidelity (WiFi) network. Firstly, the power allocation of problem is formulated as a convex optimization. Unfortunately, the formulated problem has not a closed-form solution. For solving the mentioned problem, it is converted to three sub-problem based on the number of lemmas that are expressed. Due to two of these problems remain difficult to solve, this two sub-problem are relaxed. The Ellipsoid algorithm is an iterative algorithm that used for solving of the relaxed problems. In the following, joint user assignment and power allocation will be addressed, in which two approaches are proposed for solving. In the first approach, we propose an iterative algorithm that user assignment problem and power allocation problem are solved in each iteration. In the second approach, at first, users are assigned to licensed and unlicensed bands, then for the obtained arrangement, the power allocation problem is solved. The simulation results showed that the proposed algorithms are significantly close to the benchmark methods.  相似文献   

7.
8.
Artificial bee colony (ABC) algorithm builds on simulating the intelligent behavior of honey bees. It shows good performance in many applications. As standard ABC algorithm does not employ any crossover operator, the dispersal of good genetic information amongst the solutions is undermined. In this paper, the impact of crossover operators on the performance of ABC is studied. Eight crossover operators, representing all kinds of crossover operators, are used in this study. A trial and error method is used to detect the most proper crossover operator and crossover rate for incorporation into the ABC algorithm on mathematical functions as an initial attempt. The overall best configuration of ABC with crossover which has been identified is then applied to solve power allocation problem in cognitive multiple input and multiple output orthogonal frequency division multiplexing (MIMO-OFDM) cognitive system. Promising performances are obtained when compared with those from genetic algorithm, particle swarm optimization and differential evolution algorithm.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号