302 resultados para Relays.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The authors propose a three-node full diversity cooperative protocol, which allows the retransmission of all symbols. By allowing multiple nodes to transmit simultaneously, relaying transmission only consumes limited bandwidth resource. To facilitate the performance analysis of the proposed cooperative protocol, the lower and upper bounds of the outage probability are first developed, and then the high signal-to-noise ratio behaviour is studied. Our analytical results show that the proposed strategy can achieve full diversity. To achieve the performance gain promised by the cooperative diversity, at the relays decode-and-forward strategy is adopted and an iterative soft-interference-cancellation minimum mean-squared error equaliser is developed. The simulation results compare the bit-error-rate performance of the proposed protocol with the non-cooperative scheme and the scheme presented by Azarian et al. ( 2005).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The conserved habenular neural circuit relays cognitive information from the forebrain into the ventral mid- and hindbrain. In zebrafish, the bilaterally formed habenulae in the dorsal diencephalon are made up of the asymmetric dorsal and symmetric ventral habenular nuclei, which are homologous to the medial and lateral nuclei respectively, in mammals. These structures have been implicated in various behaviors related to the serotonergic/dopaminergic neurotransmitter system. The dorsal habenulae develop adjacent to the medially positioned pineal complex. Their precursors differentiate into two main neuronal subpopulations which differ in size across brain hemispheres as signals from left-sided parapineal cells influence their differentiation program. Unlike the dorsal habenulae and despite their importance, the ventral habenulae have been poorly studied. It is not known which genetic programs underlie their development and why they are formed symmetrically, unlike the dorsal habenulae. A main reason for this lack of knowledge is that the vHb origin has remained elusive to date.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We examine the impact of primary and secondary interference on opportunistic relaying in cognitive spectrum sharing networks. In particular, new closed-form exact and asymptotic expressions for the outage probability of cognitive opportunistic relaying are derived over Rayleigh and Nakagami-m fading channels. Our analysis presents revealing insights into the diversity and array gains, diversity-multiplexing tradeoff, impact of primary transceivers' positions, and the optimal position of relays. We highlight that cognitive opportunistic relaying achieves the full diversity gain which is a product of the number of relays and the minimum Nakagami-m fading parameter in the secondary network. Furthermore, we confirm that the diversity gain reduces to zero when the peak interference constraint in the secondary network is proportional to the interference power from the primary network.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, the impact of multiple active eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destination selection, in which, after the selection of the relay with the minimum effective maximum signal-to-noise ratio (SNR) to a cluster of eavesdroppers, the destination that has the maximum SNR from the chosen relay is selected. In order to accurately assess the secrecy performance, the exact and asymptotic expressions are obtained in closed-form for several security metrics including the secrecy outage probability, the probability of non-zero secrecy rate, and the ergodic secrecy rate in frequency selective fading. Based on the asymptotic analysis, key design parameters such as secrecy diversity gain, secrecy array gain, secrecy multiplexing gain, and power cost are characterized, from which new insights are drawn. Moreover, it is concluded that secrecy performance limits occur when the average received power at the eavesdropper is proportional to the counterpart at the destination. Specifically, for the secrecy outage probability, it is confirmed that the secrecy diversity gain collapses to zero with outage floor, whereas for the ergodic secrecy rate, it is confirmed confirm that its slope collapses to zero with capacity ceiling.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we study the information-theoretical security of a downlink multiuser cooperative relaying network with multiple intermediate amplify-and-forward (AF) relays, where there exist multiple eavesdroppers which can overhear the message. To prevent the wiretap and strength the network security, we select one best relay and user pair, so that the selected user can receive the message from the base station assisted by the selected relay. The relay and user selection is performed by maximizing the ratio of the received signal-to-noise ratio (SNR) at the user to the eavesdroppers, which is based on both the main and eavesdropper links. For the considered system, we derive the closed-form expression of the secrecy outage probability, and provide the asymptotic expression in high main-to-eavesdropper ratio (MER) region. From the asymptotic analysis, we can find that the system diversity order is equivalent to the number of relays regardless of the number of users and eavesdroppers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper proposes relay selection in order to increase the physical layer security in multiuser cooperative relay networks with multiple amplify-and-forward (AF) relays, in the presence of multiple eavesdroppers. To strengthen the network security against eavesdropping attack, we present three criteria to select the best relay and user pair. Specifically, criterion I and II study the received signal-to-noise ratio (SNR) at the receivers, and perform the selection by maximizing the SNR ratio of the user to the eavesdroppers. To this end, criterion I relies on both the main and eavesdropper links, while criterion II relies on the main links only. Criterion III is the standard max-min selection criterion,
which maximizes the minimum of the dual-hop channel gains of main links. For the three selection criteria, we examine the system secrecy performance by deriving the analytical expressions for the secrecy outage probability. We also derive the asymptotic analysis for the secrecy outage probability with high main-to eavesdropper ratio (MER). From the asymptotic analysis, an interesting observation is reached: for each criterion, the system diversity order is equivalent to the number of relays regardless of the number of users and eavesdroppers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cognitive radio (CR) with spectrum-sharing has been envisioned as emerging technology for the next generation of mobile and wireless networks by allowing the unlicensed customers simultaneously utilize the licensed radio frequency spectrums. However, the CR has faced some practical challenges due to its deduced system performance as compared to non spectrum-sharing counterpart. In this paper, we therefore consider the potential of incorporating the cooperative communications into CR by introducing the concept of reactive multiple decode-and-forward (DF) relays. In particular, we derive new results for exact and asymptotic expressions for the performance of cognitive relay networks with K-th best relay selection. Our novel results have exhibited the significance of using relay networks to enhance the system performance of CR.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, weconsider switch-and-stay combining (SSC) in two-way relay systems with two amplify-and-forward relays, one of which is activated to assist the information exchange between the two sources. The system operates in either analog network coding (ANC) protocol where the communication is only achieved with the help of the active relay or timedivision broadcast (TDBC) protocol where the direct link between two sources can be utilized to exploit more diversity gain. In both cases, we study the outage probability and bit error rate (BER) for Rayleigh fading channels. In particular, we derive closed-form lower bounds for the outage probability and the average BER, which remain tight for different fading conditions. We also present asymptotic analysis for both the outage probability and the average BER at high signalto-noise ratio. It is shown that SSC can achieve the full diversity order in two-way relay systems for both ANC and TDBC protocols with proper switching thresholds. Copyright © 2014 John Wiley & Sons, Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This letter proposes several relay selection policies for secure communication in cognitive decode-and-forward (DF) relay networks, where a pair of cognitive relays are opportunistically selected for security protection against eavesdropping. The first relay transmits the secrecy information to the destination,
and the second relay, as a friendly jammer, transmits the jamming signal to confound the eavesdropper. We present new exact closed-form expressions for the secrecy outage probability. Our analysis and simulation results strongly support our conclusion that the proposed relay selection policies can enhance the performance of secure cognitive radio. We also confirm that the error floor phenomenon is created in the absence of jamming.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we propose cyclic prefix single carrier (CP-SC) full-duplex transmission in cooperative spectrum sharing to achieve multipath diversity gain and full-duplex spectral efficiency. Integrating full-duplex transmission into cooperative spectrum sharing systems results in two intrinsic problems: 1) the peak interference power constraint at the PUs are concurrently inflicted on the transmit power at the secondary source (SS) and the secondary relays (SRs); and 2) the residual loop interference occurs between the transmit and the receive antennas at the secondary relays. Thus, examining the effects of residual loop interference under peak interference power constraint at the primary users and maximum transmit power constraints at the SS and the SRs is a particularly challenging problem in frequency selective fading channels. To do so, we derive and quantitatively evaluate the exact and the asymptotic outage probability for several relay selection policies in frequency selective fading channels. Our results manifest that a zero diversity gain is obtained with full-duplex.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A relay network in which a source wishes to convey a confidential message to a legitimate destination with the assistance of trusted relays is considered. In particular, cooperative beamforming and user selection techniques are applied to protect the confidential message. The secrecy rate (SR) and secrecy outage probability (SOP) of the network are investigated first, and a tight upper bound for the SR and an exact formula for the SOP are derived. Next, asymptotic approximations for the SR and SOP in the high signal-to-noise ratio (SNR) regime are derived for two different schemes: i) cooperative beamforming and ii) multiuser selection. Further, a new concept of cooperative diversity gain, namely, adapted cooperative diversity gain (ACDG), which can be used to evaluate security level of a cooperative relaying network, is investigated. It is shown that the ACDG of cooperative beamforming is equal to the conventional cooperative diversity gain of traditional multiple-input single-output networks, while the ACDG of the multiuser scenario is equal to that of traditional single-input multiple-output networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we study a two-phase underlay cognitive relay network, where there exists an eavesdropper who can overhear the message. The secure data transmission from the secondary source to secondary destination is assisted by two decode-and-forward (DF) relays. Although the traditional opportunistic relaying technique can choose one relay to provide the best secure performance, it needs to continuously have the channel state information (CSI) of both relays, and may result in a high relay switching rate. To overcome these limitations, a secure switch-and-stay combining (SSSC) protocol is proposed where only one out of the two relays is activated to assist the secure data transmission, and the secure relay switching occurs when the relay cannot support the secure communication any longer. This security switching is assisted by either instantaneous or statistical eavesdropping CSI. For these two cases, we study the system secure performance of SSSC protocol, by deriving the analytical secrecy outage probability as well as an asymptotic expression for the high main-to-eavesdropper ratio (MER) region. We show that SSSC can substantially reduce the system complexity while achieving or approaching the full diversity order of opportunistic relaying in the presence of the instantaneous or statistical eavesdropping CSI.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The integration of an ever growing proportion of large scale distributed renewable generation has increased the probability of maloperation of the traditional RoCoF and vector shift relays. With reduced inertia due to non-synchronous penetration in a power grid, system wide disturbances have forced the utility industry to design advanced protection schemes to prevent system degradation and avoid cascading outages leading to widespread blackouts. This paper explores a novel adaptive nonlinear approach applied to islanding detection, based on wide area phase angle measurements. This is challenging, since the voltage phase angles from different locations exhibit not only strong nonlinear but also time-varying characteristics. The adaptive nonlinear technique, called moving window kernel principal component analysis is proposed to model the time-varying and nonlinear trends in the voltage phase angle data. The effectiveness of the technique is exemplified using both DigSilent simulated cases and real test cases recorded from the Great Britain and Ireland power systems by the OpenPMU project.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present two physical layer secure transmission schemes for multi-user multi-relay networks, where the communication from M users to the base station is assisted by direct links and by N decode-and-forward relays. In this network, we consider that a passive eavesdropper exists to overhear the transmitted information, which entails exploiting the advantages of both direct and relay links for physical layer security enhancement. To fulfill this requirement, we investigate two criteria for user and relay selection and examine the achievable secrecy performance. Criterion I performs a joint user and relay selection, while Criterion II performs separate user and relay selections, with a lower implementation complexity. We derive a tight lower bound on the secrecy outage probability for Criterion I and an accurate analytical expression for the secrecy outage probability for Criterion II. We further derive the asymptotic secrecy outage probabilities at high transmit signal-to-noise ratios and high main-to-eavesdropper ratios for both criteria. We demonstrate that the secrecy diversity order is min (MN, M + N) for Criterion I, and N for Criterion II. Finally, we present numerical and simulation results to validate the proposed analysis, and show the occurrence condition of the secrecy outage probability floor

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Os escritos de Johann Georg Tromlitz (1725-1805) são uma fonte inestimável de informação e inspiração para o actual intérprete e estudioso. Entre estes destaco o Ausfühlicher und gründlicher Unterricht die Flöte zu spielen [Método minucioso e detalhado para tocar flauta], 1791, claramente inspirado no tratado de Quantz de 1752, mas reflectindo a necessidade que o autor teve de o actualizar. Este tratado de Tromlitz foi projectado para que o leitor se pudesse tornar um Virtuoso sem recorrer a um professor, de modo que as informações são apresentadas de um modo muito detalhado em todos os aspectos. Infelizmente, este tratado não é muito conhecido entre o público de língua espanhola, devido à falta de traduções, assim que um dos principais objectivos desta tese foi oferecer uma primeira versão para o público de língua espanhola. Para o enquadrar no contexto europeu, fez-se uma comparação com os métodos de flauta mais importantes da última década do século, tendo em conta vários aspectos fundamentais relacionados com a interpretação: som, respiração, articulação e ornamentação. A partir das concluções de este trabalho comparativo foram geradas as directrices que guiaram a interpretação do autor de um repertorio representantivo deste período histórico, disponibilizando-se num CD a gravação dos excertos que serviram de exemplo para aplicação dos resultados da investigação.