712 resultados para 4x100 M Relay


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose cyclic prefix single carrier full-duplex transmission in amplify-and-forward cooperative spectrum sharing networks to achieve multipath diversity and full-duplex spectral efficiency. Integrating full-duplex transmission into cooperative spectrum sharing systems results in two intrinsic problems: 1) the residual loop interference occurs between the transmit and the receive antennas at the secondary relays and 2) the primary users simultaneously suffer interference from the secondary source (SS) and the secondary relays (SRs). Thus, examining the effects of residual loop interference under peak interference power constraint at the primary users and maximum transmit power constraints at the SS and the SRs is a particularly challenging problem in frequency selective fading channels. To do so, we derive and quantitatively compare the lower bounds on the outage probability and the corresponding asymptotic outage probability for max–min relay selection, partial relay selection, and maximum interference relay selection policies in frequency selective fading channels. To facilitate comparison, we provide the corresponding analysis for half-duplex. Our results show two complementary regions, named as the signal-to-noise ratio (SNR) dominant region and the residual loop interference dominant region, where the multipath diversity and spatial diversity can be achievable only in the SNR dominant region, however the diversity gain collapses to zero in the residual loop interference dominant region.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we propose three relay selection schemes for full-duplex heterogeneous networks in the presence of multiple cognitive radio eavesdroppers. In this setup, the cognitive small-cell nodes (secondary network) can share the spectrum licensed to the macro-cell system (primary network) on the condition that the quality-of-service of the primary network is always satisfied subjected to its outage probability constraint. The messages are delivered from one small-cell base station to the destination with the help of full-duplex small-cell base stations, which act as relay nodes. Based on the availability of the network’s channel state information at the secondary information source, three different selection criteria for full-duplex relays, namely: 1) partial relay selection; 2) optimal relay selection; and 3) minimal self-interference relay selection, are proposed. We derive the exact closed-form and asymptotic expressions of the secrecy outage probability for the three criteria under the attack of non-colluding/colluding eavesdroppers. We demonstrate that the optimal relay selection scheme outperforms the partial relay selection and minimal self-interference relay selection schemes at the expense of acquiring full channel state information knowledge. In addition, increasing the number of the full-duplex small-cell base stations can improve the security performance. At the illegitimate side, deploying colluding eavesdroppers and increasing the number of eavesdroppers put the confidential information at a greater risk. Besides, the transmit power and the desire outage probability of the primary network have great influences on the secrecy outage probability of the secondary network. 

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigate the secrecy performance of dualhop amplify-and-forward (AF) multi-antenna relaying systems over Rayleigh fading channels, by taking into account the direct link between the source and destination. In order to exploit the available direct link and the multiple antennas for secrecy improvement, different linear processing schemes at the relay and different diversity combining techniques at the destination are proposed, namely, 1) Zero-forcing/Maximal ratio combining (ZF/MRC), 2) ZF/Selection combining (ZF/SC), 3) Maximal ratio transmission/MRC (MRT/MRC) and 4) MRT/Selection combining (MRT/SC). For all these schemes, we present new closed-form approximations for the secrecy outage probability. Moreover, we investigate a benchmark scheme, i.e., cooperative jamming/ZF (CJ/ZF), where the secrecy outage probability is obtained in exact closed-form. In addition, we present asymptotic secrecy outage expressions for all the proposed schemes in the high signal-to-noise ratio (SNR) regime, in order to characterize key design parameters, such as secrecy diversity order and secrecy array gain. The outcomes of this paper can be summarized as follows: a) MRT/MRC and MRT/SC achieve a full diversity order of M + 1, ZF/MRC and ZF/SC achieve a diversity order of M, while CJ/ZF only achieves unit diversity order, where M is the number of antennas at the relay. b) ZF/MRC (ZF/SC) outperforms the corresponding MRT/MRC (MRT/SC) in the low SNR regime, while becomes inferior to the corresponding MRT/MRC (MRT/SC) in the high SNR. c) All of the proposed schemes tend to outperform the CJ/ZF with moderate number of antennas, and linear processing schemes with MRC attain better performance than those with SC.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider a cooperative relaying network in which a source communicates with a group of users in the presence of one eavesdropper. We assume that there are no source-user links and the group of users receive only retransmitted signal from the relay. Whereas, the eavesdropper receives both the original and retransmitted signals. Under these assumptions, we exploit the user selection technique to enhance the secure performance. We first find the optimal power allocation strategy when the source has the full channel state information (CSI) of all links. We then evaluate the security level through: i) ergodic secrecy rate and ii) secrecy outage probability when having only the statistical knowledge of CSIs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper a new method of establishing secret keys for wireless communications is proposed. A retrodirective array (RDA) that is configured to receive and re-transmit at different frequencies is utilized as a relay node. Specifically the analogue RDA is able to respond in ‘real-time’, reducing the required number of time slots for key establishment to two, compared with at least three in previous relay key generation schemes. More importantly, in the proposed architecture equivalent reciprocal wireless channels between legitimate keying nodes can be randomly updated within one channel coherence time period, leading to greatly increased key generation rates (KGRs) in slow fading environment. The secrecy performance of this RDA assisted key generation system is evaluated and it is shown that it outperforms previous relay key generation systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper analyzes the impact of transceiver impairments on outage probability (OP) and throughput of decode-and-forward two-way cognitive relay (TWCR) networks, where the relay is self-powered by harvesting energy from the transmitted signals. We consider two bidirectional relaying protocols namely, multiple access broadcast (MABC) protocol and time division broadcast (TDBC) protocol, as well as, two power transfer policies namely, dual-source (DS) energy transfer and single-fixed-source (SFS) energy transfer. Closed-form expressions for OP and throughput of the network are derived in the context of delay-limited transmission. Numerical results corroborate our analysis, thereby we can quantify the degradation of OP and throughput of TWCR networks due to transceiver hardware impairments. Under the specific parameters, our results indicate that the MABC protocol achieves asymptotically a higher throughput by 0.65 [bits/s/Hz] than the TDBC protocol, while the DS energy transfer scheme offers better performance than the SFS policy for both relaying protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider a multipair relay channel, where multiple sources communicate with multiple destinations with the help of a full-duplex (FD) relay station (RS). All sources and destinations have a single antenna, while the RS is equipped with massive arrays. We assume that the RS estimates the channels by using training sequences transmitted from sources and destinations. Then, it uses maximum-ratio combining/maximum-ratio transmission (MRC/MRT) to process the signals. To significantly reduce the loop interference (LI) effect, we propose two massive MIMO processing techniques: i) using a massive receive antenna array; or ii) using a massive transmit antenna array together with very low transmit power at the RS. We derive an exact achievable rate in closed-form and evaluate the system spectral efficiency. We show that, by doubling the number of antennas at the RS, the transmit power of each source and of the RS can be reduced by 1.5 dB if the pilot power is equal to the signal power and by 3 dB if the pilot power is kept fixed, while maintaining a given quality-of-service. Furthermore, we compare FD and half-duplex (HD) modes and show that FD improves significantly the performance when the LI level is low.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigate the performance of dual-hop two-way amplify-and-forward (AF) relaying in the presence of inphase and quadrature-phase imbalance (IQI) at the relay node. In particular, the effective signal-to-interference-plus-noise ratio (SINR) at both sources is derived. These SINRs are used to design an instantaneous power allocation scheme, which maximizes the minimum SINR of the two sources under a total transmit power constraint. The solution to this optimization problem is analytically determined and used to evaluate the outage probability (OP) of the considered two-way AF relaying system. Both analytical and numerical results show that IQI can create fundamental performance limits on two-way relaying, which cannot be avoided by simply improving the channel conditions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The performance of multiuser dual-hop relaying over mixed radio frequency/free-space optical (RF/FSO) links is investigated. RF links are used for the simultaneous data transmission from m single-antenna sources to the relay, which is equipped with n ≥ m receive antennas and a photo-aperture transmitter. The relay operates under the decode-and-forward protocol and utilizes the popular ordered V-BLAST technique to successively decode each user's transmitted stream. A common norm-based ordering approach is adopted, where the streams are decoded in an ascending order. After the V-BLAST decoding, the relay retransmits the initial information to the destination, which is equipped with a photo-detector, via a point-to-point FSO link in m consecutive timeslots. Analytical expressions for the end-to-end outage probability and average symbol error probability of each user are derived. Some engineering insights are manifested, such as the diversity order, the impact of the pointing error displacement on the FSO link and the severity on the turbulence-induced channel fading.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigate the impact of co-channel interference on the security performance of multiple amplify-and-forward (AF) relaying networks, where N intermediate AF relays assist the data transmission from the source to the destination. The relays are corrupted by multiple co-channel interferers, and the information transmitted from the relays to destination can be overheard by the eavesdropper. In order to deal with the interference and wiretap, the best out of N relays is selected for security enhancement. To this end, we derive a novel lower bound on the secrecy outage probability (SOP), which is then utilized to present two best relay selection criteria, based on the instantaneous and statistical channel information of the interfering links. For these criteria and the conventional maxmin criterion, we quantify the impact of co-channel interference and relay selection by deriving the lower bound on the SOP. Furthermore, we derive the asymptotic SOP for each criterion, to explicitly reveal the impact of transmit power allocation among interferers on the secrecy performance, which offers valuable insights into practical design. We demonstrate that all selection criteria achieve full secrecy diversity order N, while the proposed in this paper two criteria outperform the conventional max-min scheme. 

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter examines how the choreography of affect in two dance theatre works creates a space of affective adjacency—a space in which the building of an alternative structure of feeling and an alternative economy of the body can be experienced. Focusing on the choreographic use of repetition in Junk Ensemble’s Bird With Boy (2011) and Fabulous Beast Dance Theatre’s Rian (2011), it shows how the work required to build an alternative affective space can become visible. Although affect is most often viewed as a preconscious, ephemeral phenomenon (a passage of intensities), that can have little or no lasting impact on socio-political action, theorists such as Megan Watkins have argued for a consideration of the ‘cumulative aspects of affect’. Highlighting Spinoza’s distinction between affectus (the capacity for a body to affect and be affected), and affectio (the impact the affecting body leaves on the affected), Watkins points out that affectio can ‘leave a residue’ allowing for the ‘capacity of affect to be retained, to accumulate, to form dispositions and thus shape subjectivities’. The choreography of repetition in Bird With Boy and Rian presents sites for an examination of this accumulation of affect and its capacity not only to form and shape dispositions, but also, as Lauren Berlant suggests, ‘to move along and make worlds, situations, and environments’.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper a new type of architecture for secure wireless key establishment is proposed. A retrodirective array (RDA) that is configured to receive and re-transmit at different frequencies is utilized as a relay node. The RDA is able to respond in ‘real-time’, reducing the required number of time slots to two. More importantly, in this architecture equivalent reciprocal wireless channels between legitimate keying nodes can be randomly updated within one channel coherence time period, leading to greatly increased key generation rates (KGRs) in slow fading environment. The secrecy performance of this RDA assisted key generation system is evaluated under several eavesdropping strategies and it is shown that it outperforms previous relay key generation systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

When booking a trip along the railway through several train operators it is not uncommon that information about possible disruptions along the railway (that can change or cancel the booked trip) are not relayed to the passengers. Today, research on rail traffic in Sweden is limited. It is unclear how satisfied customers are with the quality of the information they receive during their trip (if they get it at all), including with respect to disruptions. Our partners have identified what they believe is a need among train operators, which is a service for disruption information to travelers. In addition to confirming that there is a need for such a service, we have an interest to investigate how such a service might look like and what the users want. Our research has shown that passengers are not satisfied with either the amount of information about disturbances or how often they get it. Along with KnowitBorlänge, we have come up with a proposed solution that uses already existing technologies to create a portal for an efficient way to get the interference information to travelers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present work is concerned with the use of the cross correlation technique to measure delay time between two simulated signals displaced with respect to time, in order to develop a cross correlator system that will be used to measure the water and oil pipes flowrate in which the detection system is composed by two external low intensity radiation sources located along the tube and two NaI(Tl) gamma-ray detectors. The final purpose of the correlator system is to use the natural disturbances, as the turbulence in the own flow rather than to inject radioactive tracers to the fluid flow as usually is carried out. In the design of this correlator is evaluated the point-by-point calculation method for the cross correlation function in order to produce a system accurate and fast. This method is divided at the same time in three modes of operation: direct, relay and polarity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introdução: O tratamento endovascular da aorta torácica (TEVAR) é uma modalidade terapêutica emergente que tem vindo a revolucionar a abordagem de diferentes tipos de patologia da aorta na sua localização torácica. Objetivos: Avaliação da experiência institucional do serviço de angiologia e cirurgia vascular. Métodos: Análise retrospetiva da série consecutiva de todos os doentes com patologia da aorta torácica e/ou toracoabdominal submetidos a TEVAR na nossa instituição. Foram excluídos aqueles com uso concomitante de endopróteses fenestradas/ramificadas abdominais. Resultados: Desde abril de 2005 até abril de 2014, 79 doentes foram submetidos a TEVAR, com idade média de 66 ± 12,83 anos (máx: 86; mín: 14). As indicações incluíram: 46 aneurismas (58%), 17 dissecções aórticas clássicas tipo B (22%), 13 no contexto de outras síndromes aórticas agudas (16%), 2 por ateroembolismo (3%) e um por fístula aortoesofágica (1%). Na patologia aneurismática, a distribuição anatómica da doença foi a seguinte: 5 na aorta ascendente e arco aórtico (11%), 35 na aorta torácica descendente (76%) e 6 toracoabdominal (13%). O diâmetro médio das dilatações aneurimáticas foi de 69,64 mm (máx: 150 mm). A rotura foi uma apresentação da patologia em 21,5% dos doentes (n = 17); 20,9% dos doentes tinham antecedentes de cirurgia aórtica prévia. A dissecção aórtica tipo B complicada foi a segunda indicação mais comum, sendo de apresentação aguda em 13 (76%) e crónica em 4 (24%). As complicações na base da intervenção foram dilatação aneurismática em 35% (n = 6), malperfusão com isquemia de órgão alvo 47% (n = 8), desconhecida em 18% (n = 3). Foi realizada extensão distal com stent descoberto (Petticoat) em 9 casos (41,2%) e foram realizados procedimentos adjuvantes em 18% (stenting renal n = 2; stenting ilíaco n = 1). Dentro das outras síndromes aórticas agudas, o TEVAR foi realizado no contexto de úlcera aórtica penetrante (n = 4), hematoma intramural (n = 4) e os restantes por rotura/pseudoaneurisma (n = 5). As endopróteses utilizadas foram: 32 Valiant Medtronic®, 15 TAG Gore®, 25 Zenith TX2 Cook®, 2 Zenith TX1 Cook®, uma Relay Plus®, 3 Talent Medtronic® e outras em 1%. A mediana de dias de cuidados intensivos foi 2 (intervalo 0-42) e a mediana de suporte tranfusional foi de 2 UCE. A taxa de mortalidade aos 30 dias ou intra-hospital foi de 18% (n = 14). Atendendo ao timing da cirurgia, a taxa de mortalidade aferida nos casos electivos foi de 8% (4/50) e nos urgentes atinge os 35% (10/29). Intraoperatoriamente foram tratadas 7 complicações relacionadas com vaso de acesso membro, 2 casos de dissecção aórtica iatrogénica, um caso de trombose arterial inferior e um endoleak tipo IA. A taxa de reintervenções foi de 17%, com as seguintes indicações: 9 endoleaks, 2 isquemias mesentéricas e 2 fístulas aortoesofágicas. Conclusões: A série apresentada traduz uma experiência institucional favorável com resultados reprodutíveis e que o TEVAR é um procedimento seguro e eficaz para o tratamento de diferentes patologias da aorta torácica, quando comparado com o tratamento cirúrgico aberto.