首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 515 毫秒
1.
为了提高无线通信系统的频谱利用率、降低功耗,针对双向协作非正交多址接入携能网络,提出了一种自适应功率分裂的无线携能准则。中继利用译码转发协议和用户的距离信息执行串行干扰消除,检测用户的信息并从发送端收割能量。发送端设计自适应功率分裂准则,使中继可以成功检测用户的信息,然后把剩余的能量全部用于能量传输,进而中继可以收割到最多的能量并将所解码的信息转发给接收端。基于所提的自适应功率分裂准则,分析网络的全局中断概率、端到端中断概率,以及高信噪比条件下的分集增益。与基于固定功率分裂的协作三级正交多址接入携能网络相比,基于自适应功率分裂的协作两级非正交多址接入携能网络可以获得更优的中断性能。  相似文献   

2.
杨键泉  贺玉成  马梦欢  周林 《信号处理》2021,37(9):1719-1726
本文把非正交多址接入(NOMA)技术与认知网络相结合,提出了一种基于多中继选择的认知NOMA网络模型。考虑了在瑞利衰落信道下,主网络借助次级网络中的全双工中继实现可靠通信,作为回报,次级网络允许接入授权频谱来传输次级信号。中继同时接收主次信号后,采用串行干扰消除技术(SIC)依次解码主次信号,并根据NOMA协议转发信号到主次用户端。推导了在两种中继选择策略下认知NOMA网络中断概率,并通过了蒙特卡罗仿真验证。仿真结果表明,两阶段中继选择策略和全双工技术能有效提高系统中断性能。   相似文献   

3.
本文研究了中继选择方案对协作下认知非正交多址(CR-NOMA)网络中断性能的影响,提出了一种两级中继选择方案。第一时隙在保证主用户服务质量的基础上,次级网络源节点向认知中继集群广播叠加信号。第二时隙认知中继提供解码转发服务,协助源节点传输信息。基于上述假设,推导了次级用户中断概率的闭合表达式并给出了分析结果。证明相比于部分中继选择策略,两级中继选择策略可以达到更好的中断性能和更大的分集增益。同时本文的分析结果验证了备选中继节点数目和功率分配因子对系统中断性能的影响,蒙特卡罗仿真验证了理论结果。   相似文献   

4.
针对采用无线携能传输(SWIPT)的多中继协作底层认知NOMA网络,提出一种基于NOMA和串行干扰消除协议的两阶段中继选择策略(TSRS).在保护主用户的干扰温度限约束下,次级网络源节点和最优中继均以固定功率分配生成多用户叠加信号向下一跳链路发送,最优中继采用功率分割方案采集能量,只利用从第一跳链路采集到的能量提供解码...  相似文献   

5.
赵亚楠  季薇  宋云超  李飞 《信号处理》2021,37(7):1324-1331
在传统的协作非正交多址(CNOMA, Cooperative Non Orthogonal Multiple Access)系统中,通常需要向弱用户分配更多的功率,分配给强用户的功率不超过总功率的一半。同时,强用户还需在协作阶段承担中继通信的任务。上述功率分配方式必将给强用户带来一定的负担。为了在满足弱用户服务质量的情况下,进一步提高强用户的中断性能,本文提出一种基于中继和无线携能通信(SWIPT, Simultaneous Wireless Information and Power Transfer)的新型功率分配方案。该方案使用能量收集设备收集能量,通过最大化系统和速率寻求无线携能通信的最优功率分割因子,从而获得系统中断概率的闭式表达。考虑到优化问题的性质,本文提出了一种在功率分配固定的情况下,通过单调优化求解无线携能通信功率分割因子的算法。仿真结果表明,与CNOMA系统的传统功率分配方案相比,本文所提方案能够在不损失弱用户中断性能的前提下,有效提升强用户的中断概率,系统和速率总体提高了近 20%。   相似文献   

6.
非正交多址接入(NOMA)是5G网络关键候选技术之一,其与认知无线电(CR)技术相结合形成系统(CRNOMA),能够实现更高的频谱效率及更大的吞吐量。该文将直传与中继协同传输(CDRT)方案引入多用户CRNOMA系统,其中CDRT表示次级源(SS)直接与近端次级用户通信,而仅通过中继(R)与多个远端次级用户通信。在非理想自干扰消除和全双工(FD)中继情况下,推导了每个NOMA用户中断概率(OP)的精确闭式表达。此外,在该系统模型下分析SS, R和用户的收益最优化问题,提出一种基于收益的两阶段迭代功率分配算法。仿真结果显示,在高信噪比(30 dB)条件下,与随机功率分配及平均功率分配方案相比,该文所提算法的用户和速率、SS总收益、R总收益分别可最高提升13%, 56%及26%。蒙特卡罗仿真验证了理论分析与实验结果的一致性。  相似文献   

7.
蔡静  贺玉成  乔宇航  周林 《信号处理》2019,35(12):2029-2035
把非正交多址接入(NOMA)技术应用到认知网络中,提出基于中继协作的底层认知NOMA系统模型。在瑞利衰落信道下,考虑一个两跳的通信网络,认知中继同时接收来自主网络发射源和次网络发射源的信号,并采用串行干扰消除策略解码转发接收到的信号。次级网络通过为主网络提供中继解码转发服务,获得接入授权频段的机会;主网络通过贡献出授权频段,换取次级网络协作通信的机会,同时获得了优先解码权,保证了主网络通信的可靠性。推导了系统各个接收端的中断概率闭合表达式,并进行了MATLAB仿真。仿真结果表明:采用中继协作可以有效提升认知NOMA网络的中断概率性能。   相似文献   

8.
基于非正交多址接入(NOMA,Non-Orthogonal Multiple Access)的认知无线电(CR,Cognitive Radio)网络物理层传输面临主用户干扰和第三方窃听双重干扰威胁.本文提出利用空时编码(STBC,Space Time Block Coding)技术提高认知用户物理层安全性能,推导了任意认知用户的安全中断概率闭合表达式.通过蒙特卡洛仿真进行验证,结果表明,所提STBC-CR-NOMA相比未采用STBC编码方案的CR-NOMA可以明显提高用户的安全中断概率,且随着认知发射功率的增大,近端用户安全中断性能提高越大,而远端用户安全中断性能提升受认知基站发射功率的影响较小.仿真结果还表明,通过调整功率分配系数对远端用户和近端用户的安全中断性能影响不同.  相似文献   

9.
在基于非正交多址接入技术(NOMA)的多用户多中继协作中继网络中,为优先满足混叠信号中的时延敏感信息的服务质量(QoS)需求,对功率因子进行了简单分析,进而找到了关于信道增益的解码限制条件。在给定中继的情况下,根据解码限制条件建立用户集合,进而找到可以使高QoS信号速率最大化的用户中继对作为最佳“用户-中继”来传递信号。并且对该“用户-中继”选择方案下的系统中断概率的表达式进行推导并求出了其渐进式。仿真结果验证了推导结果的正确性,系统的中断概率随着节点数目的增多而降低,而当信噪比趋于无穷时,系统的分集增益取决于用户数目和中继数目。且与已有文献进行对比,本文提出的用户中继匹配方案的中断性能相对较好。  相似文献   

10.
研究了瑞利衰落信道下协作非正交多址系统的安全性能。通信过程由一个时隙构成,源节点向中继广播叠加信号,全双工中继使用串行干扰消除技术解码信号协助用户通信。假设存在潜在全双工主动窃听者,窃听者能够从中继处截获信息并同时向用户发送人工噪声进行干扰。基于上述假设,在高信噪比条件下,推导了安全中断概率的近似表达式,分析了各节点传输信噪比与功率分配因子对系统中断概率的影响,分析结果与蒙特卡洛仿真结果吻合。  相似文献   

11.
This paper analyzes the performance of a cooperative nonorthogonal multiple access (NOMA) in an underlay cognitive radio network aided by an energy harvesting relay. A secondary source transmits signal for two users, where a near user acts as a relay for the far user. The far user applies the selection combining (SC) approach on the signals which were relayed by the near user and received via direct path from the secondary source. We analytically derive the outage probability (OP) of each user separately, the overall system OP, and the throughput of the system. The impact of the power allocation coefficient of NOMA and energy harvesting parameters on outage is indicated. Further, the performance of the network is investigated with imperfection in successive interference cancellation (SIC), maximal ratio combining (MRC) at relay, and Nakagami-m fading. The results derived analytically are supported by simulation in MATLAB.  相似文献   

12.
马梦欢  贺玉成  张彦  陈启望 《信号处理》2022,38(10):2155-2163
针对存在多个非共谋窃听者,研究了一种基于全双工中继和两阶段中继选择(TSRS)的非正交多址接入(NOMA)物理层安全通信方案。每个通信过程包含一个传输时隙,系统在每个时隙开始由TSRS策略选择最优中继,所选中继在从源节点接收NOMA叠加信号的同时,向两个目的节点转发上一时隙的再编码叠加信号,两个目的节点采用串行干扰消除(SIC)技术从中继叠加信号中解码获取各自的期望信号。推导了非理想SIC下系统安全中断概率的近似表达式,进行了蒙特卡洛(Monte-Carlo)仿真验证,同时分析了各仿真参数(SIC残余干扰系数、目标安全速率、中继规模等)与系统安全中断概率的关系。理论分析与模拟仿真的结果表明,全双工技术与TSRS的结合方案能有效提升系统的安全中断性能。将该方案应用于实际通信系统设计时,选择合适传输信噪比(SNR)、提高串行干扰消除能力或适当增加中继数量均可实现更好的保密性能。   相似文献   

13.
This paper evaluates the outage performance of cognitive relay networks with mutual interference between secondary users and primary users under the underlay approach, while adhering to the interference constraint on the primary user. A network path selection criterion, suitable for cognitive relay networks, is provided, from which we derive the outage probability expression of cognitive relay networks. It is shown that the outage probability considering the interference to secondary user from primary user is higher than that without considering the interference to secondary user from primary user. In addition, the outage probability is affected by key network parameters. We analyze network path selection method based on outage probability and prove that the interference to secondary user from primary user has a significant effect on the network path selection and can not be ignored in practical wireless communication environments. Simulation investigation is also provided and used to verify the theoretical analysis.  相似文献   

14.
In this paper, a down-link non-orthogonal multiple access (NOMA) system with imperfect successive interference cancellation (SIC) using Energy-Harvesting untrusted relays is investigated. These relaying nodes use in this study use a power-switching architecture to harvest energy from the sources signals and apply an amplify-and-forward protocol to forward the signals. In addition, transmit jamming or artificial noise, is generated by a source node to improve the security of the system and protect confidential source information from untrusted relays. Likewise, three relaying selection strategies are employed to examine the secrecy performance of the proposed system. In order to evaluate the performance evaluation of the proposed system, closed-form expressions of the Secrecy Outage Probability (SOP) are studied over Rayleigh fading channels and a Monte Carlo simulation is used to confirm the analytical results. Furthermore, we study the effects of various parameters, such as power allocation factors, relay node selection, the number of relays, energy harvesting efficiency and the location of relay nodes on the secure outage performances for two users of NOMA system and conventional orthogonal multiple access (OMA). These results show that NOMA offers the better security performance with multiple users.  相似文献   

15.
This paper introduces a new spectrum sharing constraint which facilitates outage analysis for the cognitive relay networks with multiple primary receivers (PR)s and under outdated channel state information (CSI). The pivotal idea in spectrum sharing paradigm is controlling the interference generated due to the coexistence of primary and secondary users. In a realistic scenario, interference management is hampered by several parameters. In this context, this paper targets the influence of the CSI accuracy and the number of PRs. In a cognitive network with multiple PRs, the best approach to shielding the receivers from intolerable interference is to limit the maximum inflicted interference. Although being effective, this strategy has two drawbacks. First: it measurably affects mathematical tractability of the outage analysis. Second: it requires substantial resources to find the strongest interference channel which may be unaffordable in certain applications, especially when there are many PRs. In this paper, we propose the total interference (TI) constraint as the spectrum sharing criterion and investigate the outage behavior of the secondary network. A simple back-off power control method is adopted so as to mitigate the harmful effect of the outdated CSI. Considering decode-and-forward relays and partial relay selection strategy, we derive exact expressions for the end-to-end outage probability. Monte-Carlo simulations are made and results corroborate correctness of the mathematical derivations. The findings suggest that: first, outage assessment under the TI constraint is more tractable than under the maximum interference (MI) constraint as it leads to simple closed-form expressions. Second, the secondary network under the TI constraint is more resilient against the outdated CSI because the interference probability arising from the outdated CSI is smaller under the TI constraint than MI.  相似文献   

16.
This paper investigates the performance of an underlay cognitive relay system where secondary users(SUs) suffer from a primary outage probability constraint and spectrum-sharing interference imposed by a primary user(PU). In particular, we consider a secondary multi-relay network operating in the selection decode-and-forward(SDF) mode and propose a best-relay selection criterion which takes into account the spectrum-sharing constraint and interference. Based on these assumptions, the closed-form expression of the outage probability of secondary transmissions is derived. We find that a floor of the outage probability occurs in high signal-to-noise ratio(SNR) regions due to the joint effect of the constraint and the interference from the PU. In addition, we propose a generalized definition of the diversity gain for such systems and show that a full diversity order is achieved. Simulation results verify our theoretical solutions.  相似文献   

17.
In this paper, we propose a Two-Way Cognitive Relay Network (TWCRN) where the secondary users operate on an underlay mode to access the licensed bands. In the proposed protocols, two secondary sources transmit their data to a relay in the first time slot, and then the relay would forward the received information to both sources in the remaining time. Moreover, the relay is self-powered by harvesting energy from ambient Radio Frequency (RF) signals, using the Time Switching (TS) and the Power Switching (PS) method. This paper concentrates on evaluating the performance of the secondary networks under the impact of hardware impairments and co-channel interference from the primary networks. In particular, based on the secondary transmitters’ constraint power, we derive the closed-form expressions of the outage probability and the throughput over Rayleigh fading channels in two cases: TS and PS. We also investigate the energy efficiency issue and the locally optimal position of the relay to maximize the system throughput, which provides much information to install the relay location. Finally, our derivations are verified by Monte Carlo simulation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号