In the OFDMA-based cellular relay networks, relay selection and resource allocation are the main problem to be solved. Many present works about resource allocation are for the goal of throughput maximization. In this ...
详细信息
Recently, Chung et al. gave a general method to construct frequency-hopping sequence set(FHS set) with low-hit-zone(LHZ FHS set) by the Cartesian product. In their paper, Theorems 5 and 8 claim that k FHS sets whose m...
详细信息
Recently, Chung et al. gave a general method to construct frequency-hopping sequence set(FHS set) with low-hit-zone(LHZ FHS set) by the Cartesian product. In their paper, Theorems 5 and 8 claim that k FHS sets whose maximum periodic Hamming correlation is 0 at the origin result in an LHZ FHS set based on the Cartesian product, and Proposition 4 presented an upper bound of the maximum periodic Hamming correlation of FHSs. However, their statements are imperfect or incorrect. In this paper, we give counterexamples and make corrections to them. Furthermore, based on the Cartesian product, we construct two classes of LHZ FHS sets with optimal maximum periodic partial Hamming correlation property. It is shown that new FHS sets are optimal by the maximum periodic partial Hamming correlation bound of LHZ FHS set.
In this paper, an Administrable Shortcut transmission (AST) scheme in two-hop relay networks which enables two Subscriber Stations (SSs) within the same Relay Station (RS) communicate directly via RS's forwarding ...
详细信息
ISBN:
(纸本)9781849191388
In this paper, an Administrable Shortcut transmission (AST) scheme in two-hop relay networks which enables two Subscriber Stations (SSs) within the same Relay Station (RS) communicate directly via RS's forwarding has been investigated. The scenario of AST scheme in two-hop relay networks and a path selection algorithm based on the minimum slot number with AST scheme are put forward. The simulation results show that the system performance is improved significantly with the increase of the probability of AST scheme taken into account. Therefore, AST scheme could be a potential technology for improving system performance in next generation wireless networks.
This paper presents a bandwidth occupied time proportion fair MAC algorithm (BOTP-FMAC) for WLAN and Wireless Mesh Network (WMN). It aims to address the unfairness problem in enhanced distributed channel access (EDCA)...
详细信息
ISBN:
(纸本)9781424428472
This paper presents a bandwidth occupied time proportion fair MAC algorithm (BOTP-FMAC) for WLAN and Wireless Mesh Network (WMN). It aims to address the unfairness problem in enhanced distributed channel access (EDCA) mechanism, in which higher-priority streaming traffic flows intend to severely deprive the access opportunity of lowerpriority traffic flows due to the capture effect, especially when the network load is near saturation. By dynamically tuning the parameters of channel contention and the threshold of bandwidth occupied time proportion for priority queue adaptively, BOTPFMAC algorithm can achieve a weighted fair allocation of the bandwidth resource among different traffic flows. The simulation results indicate that our proposed algorithm substantially improves the fairness and attains a greater aggregate throughput. Additionally, it is easy to carry out without generating network overhead.
In this paper, a novel communication system is introduced, i.e., the frequency-hopping multiple-access OFDM-BPSK communication system. Based on characteristic function method, the bit error rate (BER) performance of t...
详细信息
ISBN:
(纸本)9781424423736
In this paper, a novel communication system is introduced, i.e., the frequency-hopping multiple-access OFDM-BPSK communication system. Based on characteristic function method, the bit error rate (BER) performance of the system is derived in additive white Gaussian noise (AWGN) and Rayleigh fading channels. The numerical results firstly indicate the relationship between BER and the parameters such as the size of frequency slots set Nh, the number of OFDM subcarriers N and the number of users Nu. By the numerical and simulation results, the frequency resource of OFDM-BPSK-FHMA system is saved and the BER is decreased under the same parameter compared with other similar communication systems.
Data Dependent Superimposed Training(DDST) scheme outperforms the traditional su-perimposed training by fully canceling the effects of unknown data in channel *** DDST,however,the channel estimation accuracy and the d...
详细信息
Data Dependent Superimposed Training(DDST) scheme outperforms the traditional su-perimposed training by fully canceling the effects of unknown data in channel *** DDST,however,the channel estimation accuracy and the data detection or channel equalization performance are affected significantly by the amount of power allocated to data and superimposed training sequence,which is the motivation of this *** general,for DDST,there is a tradeoff between the channel estimation accuracy and the data detection reliability,i.e.,the more accurate the channel estimation,the more reliable the data detection;on the other hand,the more accurate the channel estimation,the more demanding on the power consumption of training sequence,which in turn leads to the less reliable data *** this paper,the relationship between the Signal-to-Noise Ratio(SNR) of the data detector and the training sequence power is *** optimal power allocation of the training sequence is derived based on the criterion of maximizing SNR of the *** and simulation results show that for a fixed transmit power,the SNR and the Symbol Error Rate(SER) of detector vary nonlinearly with the increasing of training sequence power,and there exists an optimal power ratio,which accords with the derived optimal power ratio,among the data and training sequence.
Sequences with low auto-correlation property have been applied in code-division multiple access communication systems, radar and cryptography. Using the inverse Gray mapping, a quaternary sequence of even length N can...
详细信息
Sequences with low auto-correlation property have been applied in code-division multiple access communication systems, radar and cryptography. Using the inverse Gray mapping, a quaternary sequence of even length N can be obtained from two binary sequences of the same length, which are called component sequences. In this paper, using interleaving method, we present several classes of component sequences from twin-prime sequences pairs or GMW sequences pairs given by Tang and Ding in 2010; or two, three or four binary sequences defined by cyclotomic classes of order 4. Hence we can obtain new classes of quaternary sequences, which are different from known ones, since known component sequences are constructed from a pair of binary sequences with optimal auto-correlation or Sidel'nikov sequences.
In this paper, performance of a Turbo coded OFDM wireless link is evaluated in the presence of Rayleigh fading for SISO, SIMO, MISO and MIMO system. Data are encoded using turbo encoder then modulated by QPSK or 16 QA...
详细信息
Localization anomaly detection (LAD) for a wireless sensor network (WSN) plays a prominent role in defending against attacks on localization services. However, it is a difficult task to evaluate the effectiveness of t...
详细信息
For an odd prime p, two new families of p-ary sequences of period p n - 1 are constructed for odd n = 2l + 1 = (2m + 1)e and even n = 2l = 2me, respectively. It is shown that, for a given integer ρ with 1 ≤ ρ ρ m,...
详细信息
暂无评论