共查询到10条相似文献,搜索用时 0 毫秒
2.
This paper presents an analytic lower bound of ergodic capacity for distributed MIMO (D-MIMO) systems that experience not only Rician fading but also shadowing effects of Lognormal distributed. In particularly, we consider that the Rician fading channel is spatially correlated at both transmitter and receiver. In the communication environment corresponding to this setting, the angle spread at the transmitter and the angle spread at the receiver are both insufficient, and the non-fading components co-exists with the fading components. Such communication environment is very common. In the process of deriving the analytic lower bound, in order to avoid Hayakawa polynomials that cannot be analytically expressed, non-central quadratic forms are transformed to non-central Wishart matrices by use of inequality. The validity of the presented lower bound is verified by computer simulations. The simulation results show the influence of the number of radio ports at the transmitter, the number of antennas at the transmitter or receiver, correlation level (angle spreads) and Rician K-factor on the capacity of systems. In all cases, the presented bound remains tight across the entire signal-to-noise ratio (SNR) regime. 相似文献
3.
4.
Here we address the problem of performing the resilience of Multiple Input Multiple Output (MIMO) architecture against intentional and unintentional interferences. We investigate the performance of a non-linear receiver based on the Maximum Likelihood (ML) detector in MIMO systems over Gaussian fading channels in the presence of interfering signals. Using the properties of the Gaussian matrix, a finite expression of the Probability Density Function (PDF) for the Signal to Interference plus Noise Ratio (SINR) is obtained as a function of the brute jammer power budget and the number of affected antennas. By considering a particular closed-form of intelligent jamming strategies against MIMO architecture presented in the literature, approximated upper limits of the Bit Error Rate (BER) are performed under different jamming scenarios depending on the Channel State Information (CSI) availability. These results enable us to characterize the consequences of such conflicting attacks on the quality of the legitimate link. Furthermore, extensive simulations are carried out to justify the performance of the ML detector and validate the obtained results. 相似文献
5.
Hatem BoujemâaAuthor vitae 《Physical Communication》2011,4(3):196-205
In this paper, we propose a static hybrid amplify and forward (AF) and decode and forward (DF) relaying protocol for cooperative systems. In such a scheme, relays close to the source amplify the received signal whereas the remaining relays transmit only if they decode correctly. We consider two subclasses of the proposed hybrid AF–DF relaying protocol. In the first one, all AF relays and DF relays that have decoded correctly transmit using orthogonal channels. The second protocol, called opportunistic hybrid AF–DF relaying, consists in activating only the relay offering the highest instantaneous signal to noise ratio (SNR) among AF relays and the relays that have decoded correctly. The outage SNR probability, and the exact and asymptotic bit error probability (BEP) values of both all-participating and opportunistic hybrid AF–DF relaying protocols are derived and compared to conventional AF and DF relaying. The proposed protocol offers better performance than AF relaying and similar performance to DF relaying with a lower computational complexity. Simulation results are also provided to verify the tightness of the derived results. 相似文献
6.
目前,正负电子湮灭过程的核子激发态N*产生的实验数据主要来自于粲偶素能区。粲偶素衰变到核子激发态过程类似于其类时电磁形状因子测量过程,正反粲夸克短程湮灭提供了近乎于点源的胶子强子化过程。与γN,eN,πN反应互补,这一新的N*产生源具有同位旋和低自旋筛选的优势。综述了正负电子湮灭过程的核子激发态N*产生的实验情况和相关的唯象进展,同时讨论未来发展的一些新方向,如正负电子湮灭过程的核子激发态N*产物的一些新来源等。Up to now, the N* production from e+e- annihilations has been studied only around charmonium region. Charmonium decays to N*s are analogous to (time-like) EM form factors in that the charm quark annihilation provides a nearly pointlike (ggg) current. Complementary to other sources, such as πN, eN and γN reactions, this new source for N* spectroscopy has a few advantages, such as an isospin filter and a low spin filter. The experimental results on N* from e+e- annihilations and their phenomenological implications are reviewed. Possible new sources on N* production from e+e- annihilations are discussed. 相似文献
7.
In this paper, by using harmonic-oscillator wave functions ofdifferent interaction models, i.e. OPE (one-pion-exchange model), OPsE(only pseudoscalar meson exchange model), the extended GBE(Goldstone-boson-exchange model including vector and scalarmesons), and OGE (one-gluon-exchange model), we calculate andcompare the strong decays of negative parity N* resonancesunder 2 GeV. We find that the conventional mixing angles arecorrect, and GBE and OGE are obviously superior to OPE and OPsE. 相似文献
8.
9.
This work considers a two-user multiple access channel in which both users have Age of Information (AoI)-oriented traffic with different characteristics. More specifically, the first user has external traffic and cannot control the generation of status updates, and the second user monitors a sensor and transmits status updates to the receiver according to a generate-at-will policy. The receiver is equipped with multiple antennas and the transmitters have single antennas; the channels are subject to Rayleigh fading and path loss. We analyze the average AoI of the first user for a discrete-time first-come-first-served (FCFS) queue, last-come-first-served (LCFS) queue, and queue with packet replacement. We derive the AoI distribution and the average AoI of the second user for a threshold policy. Then, we formulate an optimization problem to minimize the average AoI of the first user for the FCFS and LCFS with preemption queue discipline to maintain the average AoI of the second user below a given level. The constraints of the optimization problem are shown to be convex. It is also shown that the objective function of the problem for the first-come-first-served queue policy is non-convex, and a suboptimal technique is introduced to effectively solve the problem using the algorithms developed for solving a convex optimization problem. Numerical results illustrate the performance of the considered optimization algorithm versus the different parameters of the system. Finally, we discuss how the analytical results of this work can be extended to capture larger setups with more than two users. 相似文献