首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21篇
  免费   0篇
工业技术   21篇
  2023年   2篇
  2022年   1篇
  2021年   2篇
  2020年   3篇
  2019年   3篇
  2018年   3篇
  2017年   1篇
  2016年   2篇
  2014年   2篇
  2013年   2篇
排序方式: 共有21条查询结果,搜索用时 15 毫秒
1.
Wireless Personal Communications - In cognitive radio networks (CRNs), primary interference is either neglected or considered as an additive white Gaussian random variable (r.v.). Current...  相似文献   
2.
Our contribution in this paper is the derivation of an exact closed-form outage probability formula for underlay cognitive cooperative networks operated over Rayleigh fading channels. The derivation considers the correlation among received signal-to-noise ratios, two critical constraints (interference power constraint and maximum transmit power constraint), and non identically distributed (i.d.) channels. The derived formula is corroborated by Monte Carlo simulations and is served as an useful and effective tool to evaluate the performance behavior of underlay cognitive cooperative networks without time-consuming simulations under different operation parameters. Numerical results illustrate that underlay cognitive cooperative networks suffer the outage saturation phenomenon for a given maximum interference power level.  相似文献   
3.
Channel information (CI) plays an important role in system design optimization. It is obtained through channel estimation process and hence, inevitably imperfect at a certain degree. Numerical evaluation of the outage performance of cooperative underlay cognitive networks under the presence of channel estimation error has been left open. This paper heals this literature gap with the proposal of a precise outage probability expression. Various results show the excellent match between analysis and simulation, and the advantage of the derived expression in studying the effect of CI imperfection on system performance.  相似文献   
4.
Clathrate hydrates most often grow at the interface between liquid water and another fluid phase (hydrocarbon) acting as a provider for the hydrate guest molecules, and some transfer through this shell is required for the hydrate growth to proceed, thus self‐limiting the reaction rate. An optical microscope and a horizontal reaction cell are utilized to capture the shell growth phenomenology and to estimate the hydrate layer growth rates from sequential pictures. Cyclopentane (CP) is chosen as the hydrate‐forming molecule to obtain hydrates at low pressure. Experimental hydrate layer growth rates are provided for the CP+brine system, using various combinations of salts and degrees of subcooling.  相似文献   
5.
This paper provides a general outage analysis framework for cooperative cognitive networks with proactive relay selection over non-identical Rayleigh fading channels and under both maximum transmit power and interference power constraints. We firstly propose an exact closed-form outage probability expression, which is then exploited for determining the diversity order and coding gain for proactive relay selection scenarios as well as deriving system performance limits at either large maximum transmit power or large maximum interference power. The derived performance metrics bring several insights into system performance behavior without the need of time-consuming Monte-Carlo simulations. Various results confirm the validity of the proposed derivations and show that cooperative cognitive networks with proactive relay selection incur performance saturation and their performance depends considerably on the number of involved relays. In addition, cooperative cognitive networks are significantly better than dual-hop counterparts without any cost of system resources.  相似文献   
6.
We derive a closed-form bit error rate (BER) formula for underlay cognitive N-hop networks operated over Nakagami-m fading channels where N is the arbitrary integer. This formula is corroborated by Monte Carlo simulations and useful for evaluating the network performance under different parameters such as modulation level, path-loss, maximum transmit power, tolerable interference power level, fading model, and the number of hops. Numerical results illustrate that underlay cognitive multi-hop networks suffer a high error floor and the BER performance not only depends on the number of hops but also the network topology. For the linear network model, the higher the number of hops, the better the network performance.  相似文献   
7.
Wireless Personal Communications - Underlay mode of cognitive radio networks (CRNs) permits secondary users (SUs) to simultaneously operate with primary users (PUs), inducing mutual interference...  相似文献   
8.
Wireless Personal Communications - The spectrum sharing paradigm is a promising countermeasure to the spectrum under-utilization problem. However, it causes both primary interference (inflicted by...  相似文献   
9.
Le-Thanh  Toi  Ho-Van  Khuong 《Wireless Networks》2022,28(8):3639-3652
Wireless Networks - This paper proposes an overlay network wherein a pair of licensed source (LS) and licensed destination (LD) is adaptively assisted by a pair of unlicensed source (US) and...  相似文献   
10.
Do-Dac  Thiem  Ho-Van  Khuong 《Wireless Networks》2021,27(3):1561-1572

Energy harvesting has lately been of particular attention to researchers. In addition, cognitive radio networks (CRNs) are recognized as an attainable measure for the problem of radio spectrum shortage in next generation radio access. A combination of these two technologies, which forms energy harvesting CRNs (EHCRNs), allows wireless communication terminals to prolong their operation time in limited spectrum scenarios. Nonetheless, that CRNs create opportunities for secondary users to access primary users’ spectrum induces vulnerability of message security. So far, security capability analysis of EHCRNs has been limited to Rayleigh fading whilst Nakagami-m fading is more common than Rayleigh fading and better reflects distinct fading severity degrees in practical scenarios. Accordingly, this paper firstly offers the precise security capability analysis of EHCRNs under interference power constraint, Nakagami-m fading, maximum transmit power constraint, and primary interference. Then, the offered analysis is ratified by computer simulations. Ultimately, multiple results reveal that the security capability is considerably improved with smaller primary interference and lower required security threshold. Moreover, the security capability is significantly impacted by channel severity and is optimized with appropriate selection of time percentage.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号