共查询到20条相似文献,搜索用时 25 毫秒
1.
This paper presents an analytic lower bound of ergodic capacity for distributed MIMO (D-MIMO) systems that experience not only Rician fading but also shadowing effects of Lognormal distributed. In particularly, we consider that the Rician fading channel is spatially correlated at both transmitter and receiver. In the communication environment corresponding to this setting, the angle spread at the transmitter and the angle spread at the receiver are both insufficient, and the non-fading components co-exists with the fading components. Such communication environment is very common. In the process of deriving the analytic lower bound, in order to avoid Hayakawa polynomials that cannot be analytically expressed, non-central quadratic forms are transformed to non-central Wishart matrices by use of inequality. The validity of the presented lower bound is verified by computer simulations. The simulation results show the influence of the number of radio ports at the transmitter, the number of antennas at the transmitter or receiver, correlation level (angle spreads) and Rician K-factor on the capacity of systems. In all cases, the presented bound remains tight across the entire signal-to-noise ratio (SNR) regime. 相似文献
2.
Weimin Kang 《Entropy (Basel, Switzerland)》2022,24(11)
In this paper, a novel, nonbinary (NB) LDPC-coded probabilistic shaping (PS) scheme for a Rayleigh fading channel is proposed. For the NB LDPC-coded PS scheme in Rayleigh fading channel, the rotation angle of 16 quadrature amplitude modulation (QAM) constellations, 64QAM constellations and 256QAM constellations are optimized by the exhaustive search. The simulation results verify the information–theoretical analysis. Compared with the binary LDPC-coded PS scheme for Rayleigh fading channel, the proposed NB LDPC-coded PS scheme can improve error performance. In summary, the proposed NB LDPC-coded PS scheme for Rayleigh fading channel is reliable and thus suitable for future communication systems. 相似文献
3.
4.
一种混沌扩频序列的产生方法及其优选算法 总被引:4,自引:0,他引:4
提出一种基于组合映射模型产生混沌扩频序列的方法. 根据扩频序列的特性要求和多址干扰性能指标,给出了一种混沌扩频序列的优选算法;将得到的优选序列应用于直扩码分多址系统,在不同信道条件下进行仿真,并与优选的Logistic混沌扩频序列进行性能比较,结果表明本方法产生的混沌扩频序列具有和Logistic混沌扩频序列相近的良好性能,而且保密性更好. 关键词:码分多址优选算法多径信道误码率 相似文献
5.
Outage probability (OP) performance of multiple-intelligent reflecting surface (IRS)-assisted is presented for a practically important single-input-single-output (SISO) wireless communication system over Rician fading channels where the IRS panel selection is considered. We investigate the SISO wireless communication scenario in which a single antenna transmitting node is sending its message to the receiving node with the aid of the best IRS panel selection. This wireless communication scenario model is a typical application of the uplink scenarios for future cellular wireless systems. We derive approximate OP expressions in the closed form using both the central limit theorem and the Laguerre series expansion. Further, we also derive a simple asymptotic OP to get diversity order and coding gain. The influence of each system parameter on OP performance is thoroughly investigated. In addition, the analytical OP results are corroborated with simulated OP results to confirm the accuracy of our presented analytical results. 相似文献
6.
Hatem BoujemâaAuthor vitae 《Physical Communication》2011,4(3):196-205
In this paper, we propose a static hybrid amplify and forward (AF) and decode and forward (DF) relaying protocol for cooperative systems. In such a scheme, relays close to the source amplify the received signal whereas the remaining relays transmit only if they decode correctly. We consider two subclasses of the proposed hybrid AF–DF relaying protocol. In the first one, all AF relays and DF relays that have decoded correctly transmit using orthogonal channels. The second protocol, called opportunistic hybrid AF–DF relaying, consists in activating only the relay offering the highest instantaneous signal to noise ratio (SNR) among AF relays and the relays that have decoded correctly. The outage SNR probability, and the exact and asymptotic bit error probability (BEP) values of both all-participating and opportunistic hybrid AF–DF relaying protocols are derived and compared to conventional AF and DF relaying. The proposed protocol offers better performance than AF relaying and similar performance to DF relaying with a lower computational complexity. Simulation results are also provided to verify the tightness of the derived results. 相似文献
7.
恶劣情况下的非相干水声通信信道模型为随机相位Rayleigh衰落,推导了该模型的信道容量曲线。为实现接近非相干信道容量的可靠通信,提出多进制低密度校验码(LDPC)和恒重码级联码的多进制非相干概率域迭代处理算法。在信道幅度和相位完全未知的情况下,根据矩估计得到信号和噪声频点幅度的统计参量,进而得到恒重码的码字后验概率,再对多进制LDPC码进行因子图迭代译码。仿真证明本算法与现有的最大能量检测非迭代译码算法相比,与信道容量曲线的差距从4.5dB缩小至1.5dB。给出了实际海试湖试通信效果,频段为6~10kHz,数据速率为357bps,海试时近似垂直通信距离为5km,湖试时水平通信距离近3km、多径超过50mS,两种情况下无差错通信的信噪比门限为2dB,验证了本算法的优势。 相似文献
8.
9.
Signal space diversity is a powerful technique that increases reliability of detection over fading channels. In this paper, we explore the ability of this technique to provide secure communication. We enhance the security of OFDM systems in frequency selective fading channels by providing more diversity gain to the legitimate user compared to an eavesdropper. This is done by adapting the interleaving pattern to the channel of the legitimate user in rich multipath environments, where spatially separated channels are typically independent to each other. This ensures secrecy in a time division duplex system, where the eavesdropper has no information regarding the channel of the legitimate user. The scheme can also be used in the conventional frequency division duplex system, which is more challenging in terms of security aspects because of the channel state information leakage. A theoretical analysis is presented on the bit-error probability in Rayleigh fading environment. The numerical results support the conclusion that adapting the interleaving pattern to the CSI of the legitimate user provides a gain in the bit-error rate performance over the eavesdropper. 相似文献
10.
11.
Inspired by the promising potential of re-configurable intelligent surface (RIS)-aided transmission in achieving the vision of 6th Generation (6G) network, we analyze the security model for a vehicular-to-infrastructure (V2I) network by considering multiple RISs (M-RIS) on buildings to act as passive relays at fixed distances from a source. In addition, multiple eavesdroppers are presented in the vicinity of the intended destination. Our aim is to enhance the secrecy capacity (SC) and to minimize secrecy outage probability (SOP) in presence of multiple eavesdroppers with the help of M-RIS in V2I communications. We propose a key-less physical layer security using beam-forming by exploiting M-RIS. The proposed approach assumes the concept of detecting eavesdroppers before the information can be transmitted via beam-forming by utilizing M-RIS. The results reveal that with consideration of M-RIS and beam-forming, the achievable SC and SOP performance is significantly improved while imposing minimum power consumption and fewer RIS reflectors. 相似文献
12.
We consider the massive Multiple Input Multiple Output (MIMO) channel affected by independent and identically distributed Rayleigh fading, with linear processing at both transmitter and receiver sides to pursue full diversity, and analyze its outage capacity for large number of antennas. We first discuss the classical Single Input Multiple Output (SIMO) diversity channel that encompasses Maximal Ratio Combining (MRC) or Selection Combining (SC). For MRC, a numerical computation and a Gaussian Approximation (GA) are considered, whereas for SC an exact evaluation is presented. The analysis is then straightforwardly extended to the Multiple Input Single Output (MISO) diversity channel that encompasses Maximal Ratio Transmission (MRT) or transmit antenna selection. The general full diversity MIMO channel is finally considered, with optimal linear processing or simple antenna selection at both transmitter and receiver. If the number of antennas is sufficiently large on at least one side, the outage capacity of each considered diversity channel approaches that of a reference Additive White Gaussian Noise (AWGN) channel with properly defined Signal-to-Noise Ratio (SNR), which provides a performance benchmark. This conclusion is valid for large but realistic number of antennas compatible with the assumption of independent fading. 相似文献
13.
Cooperative relaying is considered as an effective technique to enlarge the coverage area and enhance the system capacity for the future wireless systems. In this paper, an infrastructure based multi-antenna cooperative relay network has been investigated. Closed form expressions of outage probability and average error rate have been derived, when the relay and the destination perform selection combining of the signals. The relay is assumed to operate in the adaptive decode and forward mode. The effect of number of antennas installed on the relay and their placement has also been studied. 相似文献
14.
15.
Cognitive radio (CR) has been viewed as a promising solution to spectrum scarcity. In order to design a reliable CR system, many improvements have been proposed to enhance spectrum sensing performance of secondary users (SUs) in a CR network (CRN). Sensing reliability and transmission throughput of SUs are two important performance criteria, which should be optimized to enhance signal protection of primary user (PU) as well as spectrum utilization rate. In this paper, we consider Rayleigh-faded sensing channels and SUs use improved energy detector (IED) to make their local decisions. The final decision is made in a fusion center (FC) through the cooperative spectrum sensing (CSS) scheme with erroneous reporting channels. We show that the improved double-threshold energy detector (IDED) outperforms the conventional energy detector (CED) in terms of the total error rate. Furthermore, we evaluate the transmission throughput of the CRN through various ED schemes with detection constraints over both perfect and imperfect reporting channels. We show that the IDED has the highest achievable throughput among different ED schemes over imperfect reporting channels. 相似文献
16.
This work considers a two-user multiple access channel in which both users have Age of Information (AoI)-oriented traffic with different characteristics. More specifically, the first user has external traffic and cannot control the generation of status updates, and the second user monitors a sensor and transmits status updates to the receiver according to a generate-at-will policy. The receiver is equipped with multiple antennas and the transmitters have single antennas; the channels are subject to Rayleigh fading and path loss. We analyze the average AoI of the first user for a discrete-time first-come-first-served (FCFS) queue, last-come-first-served (LCFS) queue, and queue with packet replacement. We derive the AoI distribution and the average AoI of the second user for a threshold policy. Then, we formulate an optimization problem to minimize the average AoI of the first user for the FCFS and LCFS with preemption queue discipline to maintain the average AoI of the second user below a given level. The constraints of the optimization problem are shown to be convex. It is also shown that the objective function of the problem for the first-come-first-served queue policy is non-convex, and a suboptimal technique is introduced to effectively solve the problem using the algorithms developed for solving a convex optimization problem. Numerical results illustrate the performance of the considered optimization algorithm versus the different parameters of the system. Finally, we discuss how the analytical results of this work can be extended to capture larger setups with more than two users. 相似文献
17.
Noncoherent underwater acoustic communication channel in adverse conditions is modeled as a phase-random Rayleigh fading channel,and its capacity curve is derived.To approach the channel capacity curve,the concatenated code of the nonbinary LDPC code and the constant weight code is proposed for noncoherent communication which can late be iteratively decoded in the probability domain.Without information of channel amplitude or phase in the receiver,statistic parameters of the respective signal and noise bins were estimated based on the moment estimation method,the posterior probabilities of the constant weight code words were further calculated,and the nonbinary LDPC code was decoded with the nonbinary factor graph algorithm.It is verified by simulations that by utilizing the proposed concatenated code and its processing algorithm,gap to channel capacity curve is reduced by 3 dB when compared to the existing method.Underwater communication experiments were carried out in both deep ocean(vertical communication,5 km)and shallow lake(horizontal communication,near 3 km,delay spread larger than 50 ms),in which the signal frequency band was 6 kHz to10 kHz,and the data transmission rate Was 357 bps.The proposed scheme can work properly in both experiments with a signal-to-noise ratio threshold of 2 dB.The performance of the proposed algorithm Was well verified by the experiments. 相似文献
18.
19.
20.
In this paper, we develop accurate distortion models for the lossy transmission of two correlated sources in a multiple access Rayleigh fading channel. We focus on a class of real-life communication systems, where the source and channel coders have already been designed separately and can only be configured during the system operation. We investigate three different source coding schemes: distributed source coding (DSC), layered source coding, and independent compression through quantization. With the later scheme the sources are jointly decoded with minimum mean square error (MMSE) estimation at the receiver. We also consider two different transmission schemes: Orthogonal transmissions and interfering transmissions decoded with a successive interference cancellation (SIC) decoder. Our final closed-form analytical models are used to determine the optimal combination of source coding and transmission schemes, as well as their optimal configuration. Hence, we exercise joint source and channel coding (JSCC) by optimizing the system configuration. Through simulations, we first validate the analytical model and illustrate the performance of different schemes. Finally, we demonstrate the JSCC gains achieved by our system. 相似文献