The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to i...The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to improve the performance of fading channels reducing the effects of aforementioned parameters. Motivated by these issues, in this paper, a secure wireless multicasting scenario through κ-μ shadowed fading channel is considered in the presence of multiple eavesdroppers with opportunistic relaying. The main purpose of this paper is to ensure the security level in wireless multicasting compensating the loss of security due to the effects of power ratio between dominant and scattered waves, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers, by opportunistic relaying technique. The closed-form analytical expressions are derived for the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to understand the insight of the effects of above parameters. The results show that the loss of security in multicasting through κ-μ shadowed fading channel can be significantly enhanced using opportunistic relaying technique by compensating the effects of scatterers, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers.展开更多
With the deployment of small cells and device to device communications in future heterogeneous networks,in many situations we would encounter mobile radio channels with partly blocked line of sight component,which are...With the deployment of small cells and device to device communications in future heterogeneous networks,in many situations we would encounter mobile radio channels with partly blocked line of sight component,which are well modeled by the Rician shadowed(RS) fading channel.In this paper,by the usage of Kummer transformation,a simplified representation of the RS fading channel with integral fading parameter is given.It is a finite series representation involving only exponential function and low order polynomials.This allows engineers not only the closed-form expressions for exact performance analysis over RS fading channel,but also the insights on the system design tactics.展开更多
This paper provides an analytic performance evaluation of dual-hop cognitive amplify-and-forward (AF) relaying networks over independent nonidentically distributed (i.n.i.d.) fading channels. Two different transmit po...This paper provides an analytic performance evaluation of dual-hop cognitive amplify-and-forward (AF) relaying networks over independent nonidentically distributed (i.n.i.d.) fading channels. Two different transmit power constraint strategies at the secondary network are proposed to investigate the performance of the secondary network. In the case of combined power constraint,the maximum tolerable interference power on the primary network and the maximum transmit power at the secondary network are considered. Closed-form lower bound and its asymptotic expression for the outage probability (OP) are achieved. Utilizing the above results,average symbol error probability (ABEP) at high signal-to-noise ratios (SNRs) are also derived. In order to further study the performance of dual-hop cognitive AF relaying networks,the Closed-form lower bounds and asymptotic expressions for OP with single power constraint of the tolerable interference on the primary network is also obtained. Both analytical and simulation are employed to validate the accuracy of the theoretical analysis. The results show that the secondary network obtains a better performance when higher power constraint is employed.展开更多
In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular,...In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular, we address the secrecy performance in terms of the average secrecy capacity(ASC) and the secrecy outage probability(SOP), for which novel analytical expressions are derived. Simulation results verify the analysis and demonstrate the impact of the physical parameters on the secrecy performance of this new channel fading model.展开更多
This paper studies the nonstationary filtering problem of Markov jump system under <span style="white-space:nowrap;"><i>l</i><sub>2</sub> - <i>l</i><sub>...This paper studies the nonstationary filtering problem of Markov jump system under <span style="white-space:nowrap;"><i>l</i><sub>2</sub> - <i>l</i><sub>∞</sub> </span>performance. Due to the difference in propagation channels, signal strength and phase will inevitably change randomly and cause the waste of signals resources. In response to this problem, a channel fading model with multiplicative noise is introduced. And then a nonstationary filter, which receives signals more efficiently is designed. Meanwhile Lyapunov function is constructed for error analysis. Finally, the gain matrix for filtering is obtained by solving the matrix inequality, and the results showed that the nonstationary filter converges to the stable point more quickly than the traditional asynchronous filter, the stability of the designed filter is verified.展开更多
The Nakagami-Gamma(NG) shadow fading model based on the moment-based method(MoM) generates lower tail approximation, which is inaccuracy when the gamma random variables are replaced by the lognormal random variables. ...The Nakagami-Gamma(NG) shadow fading model based on the moment-based method(MoM) generates lower tail approximation, which is inaccuracy when the gamma random variables are replaced by the lognormal random variables. The channel parameters of composite NG shadow fading based on the method of minimizing the Kullback-Leibler(KL) divergence were estimated and a closed-form expression for the system bit error rate(BER) was derived in this paper. The simulation results show that the KL estimated parameters solve the lower tail approximation problem, and the replacement effect of the lognormal function by the gamma function is better than the MoM when the shading parameters are around the typical value of 4 dB-9 dB. Moreover, the KL method has a lower mean square error(MSE) value for the channel analysis.展开更多
In this paper, we develop and analyze an energy efficient ARQ (automatic repeat request) initialized transmit diversity protocol for cooperative communications.Medium access control (MAC) layer packet retransmissi...In this paper, we develop and analyze an energy efficient ARQ (automatic repeat request) initialized transmit diversity protocol for cooperative communications.Medium access control (MAC) layer packet retransmission limit (similar to aShortRetryLimit or aLongRetryLimit [802.11-1997]) has been used as an actuator for transmit cooperative diversity initialization.We take the channel state information (CSI) as a function of retransmission tries and the number of retransmission tries is modeled as a random variable.Relays close to the source node are chosen for the transmit cooperation.Closed form expressions are obtained for symbol error rate (SER), outage capacity and outage probability for the proposed scheme in shadowed fading channels.This cooperative scheme achieves lower signal-to-noise ratio (SNR), stumpy outage probability, higher bandwidth, and transmit energy efficiencies for desired average symbol error rate (ASER) than the preceding ARQ based cooperative protocols.Finally, the results of computer simulations are included to demonstrate the efficacy of the proposed scheme and to verify the accuracy of the analytical expressions.展开更多
针对已有动态信道分配策略在阴影衰落环境中性能损失较大的问题,对卫星移动通信系统的阴影衰落信道模型进行分析,提出了一种动态信道分配策略。该策略结合用户的运动状态,通过在用户的预测运动轨迹上选取抽样点,将这些抽样点的平均干扰...针对已有动态信道分配策略在阴影衰落环境中性能损失较大的问题,对卫星移动通信系统的阴影衰落信道模型进行分析,提出了一种动态信道分配策略。该策略结合用户的运动状态,通过在用户的预测运动轨迹上选取抽样点,将这些抽样点的平均干扰作为信道分配的指标,并采用链路质量约束避免了流量较大时的性能恶化。仿真结果表明提出的动态信道策略可在不增大阻塞率的前提下,在中低流量时将用户平均信噪比提高约0.5 d B。该策略可以应用于阴影衰落信道下的地面移动卫星通信系统,以提高用户的平均链路性能。展开更多
为了给下一代无线通信系统(B3G:Beyond 3G)参数设计提供参考以及为算法仿真提供信道建模,针对国内城市室外环境不同的传播场景,在5.8 GHz频段和20 MHz信道带宽的测量条件下,进行了室外信道测量和研究。根据测量数据统计分析,5.8 GHz频...为了给下一代无线通信系统(B3G:Beyond 3G)参数设计提供参考以及为算法仿真提供信道建模,针对国内城市室外环境不同的传播场景,在5.8 GHz频段和20 MHz信道带宽的测量条件下,进行了室外信道测量和研究。根据测量数据统计分析,5.8 GHz频段路径损耗指数在视距通信(LOS:Line of Sight)时为2.53,在非视距通信(NLOS:No Line of Sight)时为3.3~3.8;同时,对COST231-WI路径损耗模型进行了修正,考虑到阴影衰落的影响,修正后的模型能较准确地预测接收功率,为系统覆盖范围预测提供参考。均方根时延扩展(Root Mean Square Delay Spread)的累积概率为0.9时,在0.5~0.8μs之间变化。均方根角度扩展(RMS Azimuth Spread)主要由发射天线位置和传播环境决定。展开更多
文摘The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to improve the performance of fading channels reducing the effects of aforementioned parameters. Motivated by these issues, in this paper, a secure wireless multicasting scenario through κ-μ shadowed fading channel is considered in the presence of multiple eavesdroppers with opportunistic relaying. The main purpose of this paper is to ensure the security level in wireless multicasting compensating the loss of security due to the effects of power ratio between dominant and scattered waves, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers, by opportunistic relaying technique. The closed-form analytical expressions are derived for the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to understand the insight of the effects of above parameters. The results show that the loss of security in multicasting through κ-μ shadowed fading channel can be significantly enhanced using opportunistic relaying technique by compensating the effects of scatterers, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers.
基金sponsored by the National Natural Science Foundation of China under grant No.61171089the Training Program of the Major Research Plan of the National Natural Science Foundation of China under grant No.91438104
文摘With the deployment of small cells and device to device communications in future heterogeneous networks,in many situations we would encounter mobile radio channels with partly blocked line of sight component,which are well modeled by the Rician shadowed(RS) fading channel.In this paper,by the usage of Kummer transformation,a simplified representation of the RS fading channel with integral fading parameter is given.It is a finite series representation involving only exponential function and low order polynomials.This allows engineers not only the closed-form expressions for exact performance analysis over RS fading channel,but also the insights on the system design tactics.
基金National Natural Science Foundation of China(No.61461024)
文摘This paper provides an analytic performance evaluation of dual-hop cognitive amplify-and-forward (AF) relaying networks over independent nonidentically distributed (i.n.i.d.) fading channels. Two different transmit power constraint strategies at the secondary network are proposed to investigate the performance of the secondary network. In the case of combined power constraint,the maximum tolerable interference power on the primary network and the maximum transmit power at the secondary network are considered. Closed-form lower bound and its asymptotic expression for the outage probability (OP) are achieved. Utilizing the above results,average symbol error probability (ABEP) at high signal-to-noise ratios (SNRs) are also derived. In order to further study the performance of dual-hop cognitive AF relaying networks,the Closed-form lower bounds and asymptotic expressions for OP with single power constraint of the tolerable interference on the primary network is also obtained. Both analytical and simulation are employed to validate the accuracy of the theoretical analysis. The results show that the secondary network obtains a better performance when higher power constraint is employed.
基金supported by the Fundamental Research Funds for the Center University of China under Grant HIT. MKSTISP. 2016 13
文摘In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular, we address the secrecy performance in terms of the average secrecy capacity(ASC) and the secrecy outage probability(SOP), for which novel analytical expressions are derived. Simulation results verify the analysis and demonstrate the impact of the physical parameters on the secrecy performance of this new channel fading model.
文摘This paper studies the nonstationary filtering problem of Markov jump system under <span style="white-space:nowrap;"><i>l</i><sub>2</sub> - <i>l</i><sub>∞</sub> </span>performance. Due to the difference in propagation channels, signal strength and phase will inevitably change randomly and cause the waste of signals resources. In response to this problem, a channel fading model with multiplicative noise is introduced. And then a nonstationary filter, which receives signals more efficiently is designed. Meanwhile Lyapunov function is constructed for error analysis. Finally, the gain matrix for filtering is obtained by solving the matrix inequality, and the results showed that the nonstationary filter converges to the stable point more quickly than the traditional asynchronous filter, the stability of the designed filter is verified.
基金supported by the Hunan Provincial Natural Science Foundation (2023JJ50045)the Project of Education Bureau of Hunan Province (22B0676,23C0217)。
文摘The Nakagami-Gamma(NG) shadow fading model based on the moment-based method(MoM) generates lower tail approximation, which is inaccuracy when the gamma random variables are replaced by the lognormal random variables. The channel parameters of composite NG shadow fading based on the method of minimizing the Kullback-Leibler(KL) divergence were estimated and a closed-form expression for the system bit error rate(BER) was derived in this paper. The simulation results show that the KL estimated parameters solve the lower tail approximation problem, and the replacement effect of the lognormal function by the gamma function is better than the MoM when the shading parameters are around the typical value of 4 dB-9 dB. Moreover, the KL method has a lower mean square error(MSE) value for the channel analysis.
基金Supported by the National Natral Science Foundation of China (Grant No 60602058)the National High Technology Research and Development Program of China (Grant No 2006AA01Z257)
文摘In this paper, we develop and analyze an energy efficient ARQ (automatic repeat request) initialized transmit diversity protocol for cooperative communications.Medium access control (MAC) layer packet retransmission limit (similar to aShortRetryLimit or aLongRetryLimit [802.11-1997]) has been used as an actuator for transmit cooperative diversity initialization.We take the channel state information (CSI) as a function of retransmission tries and the number of retransmission tries is modeled as a random variable.Relays close to the source node are chosen for the transmit cooperation.Closed form expressions are obtained for symbol error rate (SER), outage capacity and outage probability for the proposed scheme in shadowed fading channels.This cooperative scheme achieves lower signal-to-noise ratio (SNR), stumpy outage probability, higher bandwidth, and transmit energy efficiencies for desired average symbol error rate (ASER) than the preceding ARQ based cooperative protocols.Finally, the results of computer simulations are included to demonstrate the efficacy of the proposed scheme and to verify the accuracy of the analytical expressions.
文摘针对已有动态信道分配策略在阴影衰落环境中性能损失较大的问题,对卫星移动通信系统的阴影衰落信道模型进行分析,提出了一种动态信道分配策略。该策略结合用户的运动状态,通过在用户的预测运动轨迹上选取抽样点,将这些抽样点的平均干扰作为信道分配的指标,并采用链路质量约束避免了流量较大时的性能恶化。仿真结果表明提出的动态信道策略可在不增大阻塞率的前提下,在中低流量时将用户平均信噪比提高约0.5 d B。该策略可以应用于阴影衰落信道下的地面移动卫星通信系统,以提高用户的平均链路性能。
文摘为了给下一代无线通信系统(B3G:Beyond 3G)参数设计提供参考以及为算法仿真提供信道建模,针对国内城市室外环境不同的传播场景,在5.8 GHz频段和20 MHz信道带宽的测量条件下,进行了室外信道测量和研究。根据测量数据统计分析,5.8 GHz频段路径损耗指数在视距通信(LOS:Line of Sight)时为2.53,在非视距通信(NLOS:No Line of Sight)时为3.3~3.8;同时,对COST231-WI路径损耗模型进行了修正,考虑到阴影衰落的影响,修正后的模型能较准确地预测接收功率,为系统覆盖范围预测提供参考。均方根时延扩展(Root Mean Square Delay Spread)的累积概率为0.9时,在0.5~0.8μs之间变化。均方根角度扩展(RMS Azimuth Spread)主要由发射天线位置和传播环境决定。