The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the system-level performance of nonorthogonal multiple access (NOMA) in coordinated direct and relay transmission (CDRT) is investigated. Considering a successive interference cancellation (SIC) receiver under the 3D channel model for LTE, the system-level performance of the NOMA-CDRT is compared to the NOMA in non-coordinated direct and relay transmission (nCDRT). Simulation results...
This paper proposes a novel usage of zero-forcing beamforming (ZFB) for secure transmission in multiple-input single-output (MISO) wiretap channels. When using ZFB for secure transmission, the difficulty lies in the legitimate transmitter (Alice) hardly knowing the channel to eavesdroppers (Eves). The knowledge of the channel to Eves is essential when Alice builds a ZFB precoder that could eliminate...
In cognitive radio (CR) systems, secondary transmitters (STs) should have etiquette that its transmission is not harmful to primary communication. Limiting transmitting power of ST is a usual way of being polite in a physical-layer point of view. In this paper, we assume that a primary user (PU) has a desire to keep its stable throughput though ST intervenes, which is a network-layer goal. And we...
In this paper, we present secure communication system with torch nodes. With a channel state information (CSI) between source and eavesdropper, a Alice null the received signal for eavesdropper with zero forcing beamforming (ZFB). But the CSI between source and eavesdropper is hard to achieve in secure communication. In this work, we propose the torch node in secure communication. The torch is assist...
This paper provides multicast outage probabilities in cluster-based mulitcast relaying networks with a full-duplex self-interference cancelation system and a half-duplex transmit beamforming system, respectively. In the full-duplex system, the source cluster head (CH) and the destination CH transmit the multicast signal in the same time slot, which causes the destination CH to suffer from self-interference...
Two-path successive relaying scheme is designed to restore the spectral inefficiency due to a half-duplex constraint. When not operating in orthogonal channels, the relay pair used in successive relaying scheme interferes each other. This inter-relay interference degrades the outage performance of the successive relaying scheme significantly. So, the zero forcing beamforming (ZFB) has been proposed...
In this paper, we investigate a maximum allowable time that ensure a given outage probability target in vehicle-to vehicle cooperative communication (VVCC) with a decode-and-forward (DF) relay, which is referred to quality-supporting duration (QSD). QSD depends on the velocity of relaying vehicle and the initial positions of communicating vehicles. Numerical investigation shows how QSD greater than...
This letter investigates the resource allocation in interweaved primary and secondary multicast networks (PMNs and SMNs, respectively), where an SMN can access the spectrum licensed for a PMN only if the PMN is not active. Given the number of primary terminals in a PMN and the detection probability requirement, the secondary power that is maximally allowable while maintaining the primary outage requirement...
In this paper, we provide a measure of reliable vehicle-to-vehicle communication, which is referred to quality-supporting duration (QSD). QSD is defined as a maximum allowable time that ensures a given outage probability target. When designing frame length or feedback interval for road safety systems, QSD can be used as a reference time interval during which the reliable communication is possible...
In this paper, we propose the unicast-multicast balancing protocol which improves the multicast outage probability performance satisfying maximum tolerable outage probability for unicast messages. The wireless relay-multicasting system comprises of a source S, a relay R, and K + 1 destinations Di, i ∊ {0, 1, …K}. Each Di, \ {D0}, i ∊ {0, 1, …K} wants to receive only the multicast messages. On the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.