期刊文献+
共找到118篇文章
< 1 2 6 >
每页显示 20 50 100
Stackelberg Game for Wireless Powered and Backscattering Enabled Sensor Networks
1
作者 Lyu Bin Cao Yi +2 位作者 Wang Shuai Guo Haiyan Hao Chengyao 《China Communications》 SCIE CSCD 2024年第3期189-204,共16页
This paper investigates a wireless powered and backscattering enabled sensor network based on the non-linear energy harvesting model, where the power beacon(PB) delivers energy signals to wireless sensors to enable th... This paper investigates a wireless powered and backscattering enabled sensor network based on the non-linear energy harvesting model, where the power beacon(PB) delivers energy signals to wireless sensors to enable their passive backscattering and active transmission to the access point(AP). We propose an efficient time scheduling scheme for network performance enhancement, based on which each sensor can always harvest energy from the PB over the entire block except its time slots allocated for passive and active information delivery. Considering the PB and wireless sensors are from two selfish service providers, we use the Stackelberg game to model the energy interaction among them. To address the non-convexity of the leader-level problem, we propose to decompose the original problem into two subproblems and solve them iteratively in an alternating manner. Specifically, the successive convex approximation, semi-definite relaxation(SDR) and variable substitution techniques are applied to find a nearoptimal solution. To evaluate the performance loss caused by the interaction between two providers, we further investigate the social welfare maximization problem. Numerical results demonstrate that compared to the benchmark schemes, the proposed scheme can achieve up to 35.4% and 38.7% utility gain for the leader and the follower, respectively. 展开更多
关键词 backscatter communication energy interaction stackelberg game wireless powered sensor network
下载PDF
Joint Optimization of Resource Allocation and Trajectory Based on User Trajectory for UAV-Assisted Backscatter Communication System
2
作者 Peizhong Xie Junjie Jiang +1 位作者 Ting Li Yin Lu 《China Communications》 SCIE CSCD 2024年第2期197-209,共13页
The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backsca... The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backscatter communication based on user trajectory. This paper will establish an optimization problem of jointly optimizing the UAV trajectories, UAV transmission power and BD scheduling based on the large-scale channel state signals estimated in advance of the known user trajectories, taking into account the constraints of BD data and working energy consumption, to maximize the energy efficiency of the system. The problem is a non-convex optimization problem in fractional form, and there is nonlinear coupling between optimization variables.An iterative algorithm is proposed based on Dinkelbach algorithm, block coordinate descent method and continuous convex optimization technology. First, the objective function is converted into a non-fractional programming problem based on Dinkelbach method,and then the block coordinate descent method is used to decompose the original complex problem into three independent sub-problems. Finally, the successive convex approximation method is used to solve the trajectory optimization sub-problem. The simulation results show that the proposed scheme and algorithm have obvious energy efficiency gains compared with the comparison scheme. 展开更多
关键词 energy efficiency joint optimization UAV-assisted backscatter communication user trajectory
下载PDF
Data Aggregation Scheduling with Guaranteed Lifetime and Efficient Latency in Wireless Sensor Networks 被引量:4
3
作者 Chen Zhengyu Yang Geng +3 位作者 Chen Lei Xu Jian Wang Haiyong Yang Zhen 《China Communications》 SCIE CSCD 2012年第9期11-21,共11页
In scenarios of real-time data collection of long-term deployed Wireless Sensor Networks (WSNs),low-latency data collection with long network lifetime becomes a key issue.In this paper,we present a data aggregation sc... In scenarios of real-time data collection of long-term deployed Wireless Sensor Networks (WSNs),low-latency data collection with long network lifetime becomes a key issue.In this paper,we present a data aggregation scheduling with guaranteed lifetime and efficient latency in WSNs.We first construct a Guaranteed Lifetime Minimum Radius Data Aggregation Tree (GLMRDAT) which is conducive to reduce scheduling latency while providing a guaranteed network lifetime,and then design a Greedy Scheduling algorithM (GSM) based on finding the maximum independent set in conflict graph to schedule the transmission of nodes in the aggregation tree.Finally,simulations show that our proposed approach not only outperforms the state-of-the-art solutions in terms of schedule latency,but also provides longer and guaranteed network lifetime. 展开更多
关键词 无线传感器网络 调度延迟 数据聚合 使用寿命 低延时 实时数据采集 工作寿命 数据收集
下载PDF
ENERGY EFFICIENT DISTRIBUTED STEGANOGRAPHY FOR SECURE COMMUNICATION IN WIRELESS MULTIMEDIA SENSOR NETWORKS 被引量:1
4
作者 Lin Qiaomin Wang Ruchuan +1 位作者 Ye Ning Wang Zhongqin 《Journal of Electronics(China)》 2013年第1期9-16,共8页
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give... A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously. 展开更多
关键词 传感器网络 无线多媒体 分布式处理 安全通信 节能高效 隐写术 分布式计算 传感器节点
下载PDF
Channel Estimation and Throughput Evaluation for 5G Wireless Communication Systems in Various Scenarios on High Speed Railways 被引量:7
5
作者 yanrong zhao xiyu wang +3 位作者 gongpu wang ruisi he yulong zou zhuyan zhao 《China Communications》 SCIE CSCD 2018年第4期86-97,共12页
The fifth generation(5 G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways(HSR) are important applications of 5 G technologies. Existing studies about ... The fifth generation(5 G) wireless communication is currently a hot research topic and wireless communication systems on high speed railways(HSR) are important applications of 5 G technologies. Existing studies about 5 G wireless systems on high speed railways(HSR) often utilize ideal channel parameters and are usually based on simple scenarios. In this paper, we evaluate the downlink throughput of 5 G HSR communication systems on three typical scenarios including urban, cutting and viaduct with three different channel estimators. The channel parameters of each scenario are generated with tapped delay line(TDL) models through ray-tracing simulations, which can be considered as a good match to practical situations. The channel estimators including least square(LS), linear minimum mean square error(LMMSE), and our proposed historical information based basis expansion model(Hi BEM). We analyze the performance of the Hi BEM estimator in terms of mean square error(MSE) and evaluate the system throughputs with different channel estimates over each scenario. Simulation results are then provided to corroborate our proposed studies. It is shown that our Hi BEM estimator outperforms other estimators and that the sys- 展开更多
关键词 无线通讯系统 评估系统 隧道 产量 铁路 评价 阅读器 无线系统
下载PDF
Wavelet Transform-Based Distributed Compressed Sensing in Wireless Sensor Networks 被引量:4
6
作者 Hu Haifeng Yang Zhen Bao Jianmin 《China Communications》 SCIE CSCD 2012年第2期1-12,共12页
Wireless Sensor Networks(WSN) are mainly characterized by a potentially large number of distributed sensor nodes which collectively transmit information about sensed events to the sink.In this paper,we present a Distr... Wireless Sensor Networks(WSN) are mainly characterized by a potentially large number of distributed sensor nodes which collectively transmit information about sensed events to the sink.In this paper,we present a Distributed Wavelet Basis Generation(DWBG) algorithm performing at the sink to obtain the distributed wavelet basis in WSN.And on this basis,a Wavelet Transform-based Distributed Compressed Sensing(WTDCS) algorithm is proposed to compress and reconstruct the sensed data with spatial correlation.Finally,we make a detailed analysis of relationship between reconstruction performance and WTDCS algorithm parameters such as the compression ratio,the channel Signal-to-Noise Ratio(SNR),the observation noise power and the correlation decay parameter by simulation.The simulation results show that WTDCS can achieve high performance in terms of energy and reconstruction accuracy,as compared to the conventional distributed wavelet transform algorithm. 展开更多
关键词 无线传感器网络 小波变换算法 数据压缩 分布式 算法参数 传感器节点 信号噪声比 空间相关
下载PDF
RESEARCH ON ADAPTIVE COMPRESSION CODING FOR NETWORK CODING IN WIRELESS SENSOR NETWORK 被引量:4
7
作者 Liu Ying Yang Zhen +1 位作者 Mei Zhonghui Kong Yuanyuan 《Journal of Electronics(China)》 2012年第5期415-421,共7页
Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences ... Based on the sequence entropy of Shannon information theory, we work on the network coding technology in Wireless Sensor Network (WSN). In this paper, we take into account the similarity of the transmission sequences at the network coding node in the multi-sources and multi-receivers network in order to compress the data redundancy. Theoretical analysis and computer simulation results show that this proposed scheme not only further improves the efficiency of network transmission and enhances the throughput of the network, but also reduces the energy consumption of sensor nodes and extends the network life cycle. 展开更多
关键词 Network coding Wireless Sensor Network (WSN) Sequence similarity Sequence entropy
下载PDF
Research on Time Synchronization Method Under Arbitrary Network Delay in Wireless Sensor Networks 被引量:1
8
作者 Bing Hu Feng Xiang +3 位作者 Fan Wu Jian Liu Zhe Sun Zhixin Sun 《Computers, Materials & Continua》 SCIE EI 2019年第9期1323-1344,共22页
To cope with the arbitrariness of the network delays,a novel method,referred to as the composite particle filter approach based on variational Bayesian(VB-CPF),is proposed herein to estimate the clock skew and clock o... To cope with the arbitrariness of the network delays,a novel method,referred to as the composite particle filter approach based on variational Bayesian(VB-CPF),is proposed herein to estimate the clock skew and clock offset in wireless sensor networks.VB-CPF is an improvement of the Gaussian mixture kalman particle filter(GMKPF)algorithm.In GMKPF,Expectation-Maximization(EM)algorithm needs to determine the number of mixture components in advance,and it is easy to generate overfitting and underfitting.Variational Bayesian EM(VB-EM)algorithm is introduced in this paper to determine the number of mixture components adaptively according to the observations.Moreover,to solve the problem of data packet loss caused by unreliable links,we propose a robust time synchronization(RTS)method in this paper.RTS establishes an autoregressive model for clock skew,and calculates the clock parameters based on the established autoregressive model in case of packet loss.The final simulation results illustrate that VB-CPF yields much more accurate results relative to GMKPF when the network delays are modeled in terms of an asymmetric Gaussian distribution.Moreover,RTS shows good robustness to the continuous and random dropout of time messages. 展开更多
关键词 Time synchronization particle filter expectation maximization wireless sensor networks(WSNs)
下载PDF
Diffraction deep neural network-based classification for vector vortex beams
9
作者 彭怡翔 陈兵 +1 位作者 王乐 赵生妹 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期387-392,共6页
The vector vortex beam(VVB)has attracted significant attention due to its intrinsic diversity of information and has found great applications in both classical and quantum communications.However,a VVB is unavoidably a... The vector vortex beam(VVB)has attracted significant attention due to its intrinsic diversity of information and has found great applications in both classical and quantum communications.However,a VVB is unavoidably affected by atmospheric turbulence(AT)when it propagates through the free-space optical communication environment,which results in detection errors at the receiver.In this paper,we propose a VVB classification scheme to detect VVBs with continuously changing polarization states under AT,where a diffractive deep neural network(DDNN)is designed and trained to classify the intensity distribution of the input distorted VVBs,and the horizontal direction of polarization of the input distorted beam is adopted as the feature for the classification through the DDNN.The numerical simulations and experimental results demonstrate that the proposed scheme has high accuracy in classification tasks.The energy distribution percentage remains above 95%from weak to medium AT,and the classification accuracy can remain above 95%for various strengths of turbulence.It has a faster convergence and better accuracy than that based on a convolutional neural network. 展开更多
关键词 vector vortex beam diffractive deep neural network classification atmospheric turbulence
原文传递
A General Framework for Intelligent IoT Data Acquisition and Sharing in an Untrusted Environment Based on Blockchain
10
作者 Lu Yin Xue Yongtao +4 位作者 Li Qingyuan Wu Luocheng Li Taosen Yang Peipei Zhu Hongbo 《China Communications》 SCIE CSCD 2024年第3期137-148,共12页
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m... Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain. 展开更多
关键词 blockchain data sharing Internet of Things ORACLE
下载PDF
A NEW APPROACH TO DVC COMBINED WITH ROI EXTRACTION AND RESIDUAL VIDEO CODING FOR MULTIMEDIA SENSOR NETWORKS
11
作者 Lin Zhaoxiao Sun Lijuan +1 位作者 Xiao Fu Wang Ruchuan 《Journal of Electronics(China)》 2013年第1期17-24,共8页
The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual co... The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual coding of video, the residual of a frame with respect to a reference frame is Wyner-Ziv encoded, which can reduces the input entropy and leads to a higher coding efficiency than directly encoding the original frame. In this paper, we propose a new approach of residual coding combined with Region Of Interest (ROI) extraction. Experimental results show that, the proposed scheme achieves better rate-distortion performance compared to conventional Wyner-Ziv coding scheme. 展开更多
关键词 视频编码 ROI 传感器网络 残余 提取 多媒体 DVC 编码方案
下载PDF
SAE-TOPSIS algorithm for vertical handoff decision in heterogeneous wireless networks
12
作者 刘胜美 Pan Su Mi Zhengkun 《High Technology Letters》 EI CAS 2012年第4期382-386,共5页
关键词 TOPSIS法 异构无线网络 垂直切换 决策 层次分析法 SINR 信号干扰 服务质量
下载PDF
An improved multiplicative exponent weighting vertical handoff algorithm for WLAN/WCDMA heterogeneous wireless networks
13
作者 Liu Shengmei Pan Su +2 位作者 Mi Zhengkun Meng Qingmin Xu Minghai 《Engineering Sciences》 2012年第1期86-90,共5页
An improved MEW(multiplicative exponent weighting)algorithm,SLE-MEW is proposed for vertical handoff decision in heterogeneous wireless networks.It introduces the SINR(signal to interference plus noise ratio)effects,L... An improved MEW(multiplicative exponent weighting)algorithm,SLE-MEW is proposed for vertical handoff decision in heterogeneous wireless networks.It introduces the SINR(signal to interference plus noise ratio)effects,LS(least square)and information entropy method into the algorithm.An attribute matrix is constructed considering the SINR in the source network and the equivalent SINR in the target network,the required bandwidth,the traffic cost and the available bandwidth of participating access networks.Handoff decision meeting multi-attribute QoS(quality of service)requirement is made according to the traffic features.The subjective weight relation of decision elements is determined with LS method.The information entropy method is employed to derive the objective weights of the evaluation criteria,and lead to the comprehensive weight.Finally decision is made using MEW algorithm based on the attribute matrix and weight vector.Four 3GPP(the 3rd generation partnership project)defined traffic classes are considered in performance evaluation.The simulation results have shown that the proposed algorithm can provide satisfactory performance fitting to the characteristics of the traffic. 展开更多
关键词 异构无线网络 切换算法 指数加权 垂直切换 WCDMA WLAN 第三代合作伙伴计划 系统性红斑狼疮
下载PDF
Green Networking Based Energy Efficient Communications 被引量:2
14
作者 Wang Wennai Mi Zhengkun Wang Bin 《China Communications》 SCIE CSCD 2012年第2期22-30,共9页
The mainstream approaches to green networking are discussed first from the view of engineering,including resource consolidation,server virtualization,selective connectedness,and proportional computing.A brief introduc... The mainstream approaches to green networking are discussed first from the view of engineering,including resource consolidation,server virtualization,selective connectedness,and proportional computing.A brief introduction to network virtualization techniques is given then and a virtual node embedding approach is provided.Finally,three kinds of enhanced green networking schemes by network virtualization are proposed,that is enhancement to sever virtualization,resource consolidation and Adaptive Link Rate(ALR).Examples are included to show the virtue of network virtualization to green networking in terms of energy efficient communications. 展开更多
关键词 绿色网络 通信网络 能源 基础 资源整合 虚拟化 嵌入方法 虚拟节点
下载PDF
Quality-Aware Massive Content Delivery in Digital Twin-Enabled Edge Networks 被引量:1
15
作者 Yun Gao Junqi Liao +1 位作者 Xin Wei Liang Zhou 《China Communications》 SCIE CSCD 2023年第2期1-13,共13页
Massive content delivery will become one of the most prominent tasks of future B5G/6G communication.However,various multimedia applications possess huge differences in terms of object oriented(i.e.,machine or user)and... Massive content delivery will become one of the most prominent tasks of future B5G/6G communication.However,various multimedia applications possess huge differences in terms of object oriented(i.e.,machine or user)and corresponding quality evaluation metric,which will significantly impact the design of encoding or decoding within content delivery strategy.To get over this dilemma,we firstly integrate the digital twin into the edge networks to accurately and timely capture Quality-of-Decision(QoD)or Quality-of-Experience(QoE)for the guidance of content delivery.Then,in terms of machinecentric communication,a QoD-driven compression mechanism is designed for video analytics via temporally lightweight frame classification and spatially uneven quality assignment,which can achieve a balance among decision-making,delivered content,and encoding latency.Finally,in terms of user-centric communication,by fully leveraging haptic physical properties and semantic correlations of heterogeneous streams,we develop a QoE-driven video enhancement scheme to supply high data fidelity.Numerical results demonstrate the remarkable performance improvement of massive content delivery. 展开更多
关键词 content delivery digital twin edge networks QoD QOE
下载PDF
Users' Media Cloud Assisted D2D Communications for Distributed Caching Underlaying Cellular Network
16
作者 Mingkai Chen Lei Wang Jianxin Chen 《China Communications》 SCIE CSCD 2016年第8期13-23,共11页
In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component... In cellular networks, the proximity devices may share files directly without going through the e NBs, which is called Device-to-Device communications(D2D). It has been considered as a potential technological component for the next generation of communication. In this paper, we investigate a novel framework to distribute video files from some other proximity devices through users' media cloud assisted D2 D communication. The main contributions of this work lie in: 1) Providing an efficient algorithm Media Cloud Cluster Selecting Scheme(MCCSS) to achieve the reasonable cluster; 2) Distributing the optimum updating files to the cluster heads, in order to minimize the expected D2 D communication transmission hop for files; 3) Proposing a minimum the hop method, which can ensure the user obtain required file as soon as possible. Extensive simulation results have demonstrated the efficiency of the proposed scheme. 展开更多
关键词 device-to-device communication users’ media cloud CACHE content delivery
下载PDF
JOINT LLR-CRC ERROR MITIGATION FOR TWO-WAY ADAPTIVE DENOISE-AND-FORWARD NETWORK CODING
17
作者 Cheng Yulun Yang Longxiang 《Journal of Electronics(China)》 2013年第4期352-361,共10页
Network Coding (NC) brings correlation between the coded signals from different sources, which makes the system more vulnerable to the decode error at relay. Conventional Cyclic Redundancy Code (CRC) has been implemen... Network Coding (NC) brings correlation between the coded signals from different sources, which makes the system more vulnerable to the decode error at relay. Conventional Cyclic Redundancy Code (CRC) has been implemented for error bit detection. However, its error correction is simply ignored. To fully exploit this feature, this paper proposes a novel joint Log-Likelihood Ratio (LLR) CRC error mitigation for NC two way relay channel. Specific thresholds are designed to estimate the error number of data block and identify those which can be recovered if the number is within the error correction scope of CRC. We examine two modes of the thresholds, one based on the average Bit Error Rate (BER) of source-relay link, while the other based on that of instantaneous one. We provide the full analysis for the Pair-wise Error Probability (PEP) performance of the scheme. A variety of numerical results are presented to reveal the superiority of the proposed scheme to conventional CRC NC under independent Rayleigh fading channels. Moreover, the efficiencies of the proposed thresholds are also validated. 展开更多
关键词 CRC错误 网络编码 自适应 转发 降噪 CRC校验码 成对错误概率 瑞利衰落信道
下载PDF
LLR-AWARE SMART LINK-ADAPTIVE STRATEGY FOR DECODE-AND-FORWARD COOPERATIVE COMMUNICATION
18
作者 Cheng Yulun Yang Longxiang 《Journal of Electronics(China)》 2013年第2期175-182,共8页
Error propagation seriously degenerate the diversity order of Decode-and-Forward (DF) cooperative communication. To address this problem, a novel Log Likelihood Ratio (LLR)-based Link Adaptive Relaying (LAR) is propos... Error propagation seriously degenerate the diversity order of Decode-and-Forward (DF) cooperative communication. To address this problem, a novel Log Likelihood Ratio (LLR)-based Link Adaptive Relaying (LAR) is proposed to promote adaption accuracy at relay. The instantaneous Bit Error Probability (BEP) is calculated according to the LLR of the received signals firstly, then based on it, the equivalent Signal-to-Noise Ratio (SNR) is employed to operate dynamic power scaling by relay. It is theoretically proved that the full diversity order can be attained by the scheme. Besides, the power sensitivity is also analyzed. Simulation results show that the proposed scheme outperform the conventional LAR and can achieve full diversity order. Moreover, its strong adaptation to SNR fluctuation is validated. 展开更多
关键词 Cooperative communication Adaptive transmission Log Likelihood Ratio (LLR) Diversity order Power efficiency
下载PDF
AN IDENTITY-BASED KEY AGREEMENT SCHEME FOR LARGE SCALE SENSOR NETWORKS
19
作者 Yang Lijun Wu Meng Ding Chao 《Journal of Electronics(China)》 2013年第6期574-586,共13页
To solve the problems of high memory occupation,low connectivity and poor resiliency against node capture,which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor ... To solve the problems of high memory occupation,low connectivity and poor resiliency against node capture,which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor Networks(WSNs),an Identity-Based Key Agreement Scheme(IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman(ECDH).IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption.Theoretical analysis indicates that comparing to the random key pre-distribution techniques,IBKAS achieves significant improvement in key connectivity,communication overhead,memory occupation,and security strength,and also enables efficient secure rekeying and network expansion.Furthermore,we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes,and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensor networks. 展开更多
关键词 计算机网络 电子邮件 应用程序 网络安全
下载PDF
TWO-WAY DENOISE-AND-FORWARD NETWORK CODING OPPORTUNISTIC RELAYING AIMING AT MINIMIZING EUCLIDEAN DISTANCE IN MULTI-ACCESS PHASE
20
作者 Jia Xiangdong Yang Longxiang Shao Shixiang 《Journal of Electronics(China)》 2011年第4期433-443,共11页
To exploit the effect of modulation schemes on the best relay selection,a novel Jointing Modulation schemes max-min criterion(JM-max-min) is proposed firstly for Two-Way De-Noise-and-Forward(DNF) Opportunistic Relayin... To exploit the effect of modulation schemes on the best relay selection,a novel Jointing Modulation schemes max-min criterion(JM-max-min) is proposed firstly for Two-Way De-Noise-and-Forward(DNF) Opportunistic Relaying systems(TW-DNF-OR) by aiming at minimizing the Pairwise Error Probability(PEP) of Multi-Access(MA) phase which dominates the error per-formance of TW-DNF-OR due to the presence of MA interference.The proposed JM-max-min criterion integrates perfectly the minimum distances of constellations and the relay links gains.Then,with the proposed JM-max-min criterion,we analyze the Symbol Error Probabilities(SEPs) of MA phase and BroadCast(BC) phase by using the approximated mathematics analysis,and present the corresponding closed-form expressions to SEPs.The numerical analysis shows,for a given modulations combination at both sources,the TW-DNF-OR systems with the proposed JM-max-min criterion outperform the one with the conventional max-min criterion. 展开更多
关键词 Cooperative communications Opportunistic relaying Network coding Max-min crite-rion
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部