scholarly journals Theoretical analysis of maximum transmit power in a b-modulator

Author(s):  
S. Chimmalgi ◽  
S. Wahls
2018 ◽  
Vol 7 (3) ◽  
pp. 38 ◽  
Author(s):  
Xiao-Li Hu ◽  
Pin-Han Ho ◽  
Limei Peng

We study theoretical performance of Maximum Likelihood (ML) estimation for transmit power of a primary node in a wireless network with cooperative receiver nodes. The condition that the consistence of an ML estimation via cooperative sensing can be guaranteed is firstly defined. Theoretical analysis is conducted on the feasibility of the consistence condition regarding an ML function generated by independent yet not identically distributed random variables. Numerical experiments justify our theoretical discoveries.


Electronics ◽  
2019 ◽  
Vol 8 (7) ◽  
pp. 796 ◽  
Author(s):  
Amir Haider ◽  
Seung-Hoon Hwang

To furnish the network with small cells, it is vital to consider parameters like cell size, interference in the network, and deployment strategies to maximize the network’s performance gains expected from small cells. With a small cell network, it is critical to analyze the impact of the uplink power control parameters on the network’s performance. In particular, the maximum transmit power (Pmax) for user equipment (UE) needs to be revisited for small cells, since it is a major contributor towards interference. In this work, the network performance was evaluated for different Pmax values for the small cell uplink. Various deployment scenarios for furnishing the existing macro layer in LTE networks with small cells were considered. The Pmax limit for a small cell uplink was evaluated for both homogenous small cell and heterogeneous networks (HetNet). The numerical results showed that it would be appropriate to adopt Pmax = 18 dBm in uniformly distributed small cells rather than Pmax = 23 dBm, as in macro environments. The choice of Pmax = 18 dBm was further validated for three HetNet deployment scenarios. A decrease of 0.52 dBm and an increase of 0.03 dBm and 3.29 dBm in the proposed Pmax = 18 dBm were observed for the three HetNet deployments, respectively. Furthermore, we propose that the fractional power control mode can be employed instead of the full compensation mode in small cell uplinks.


2013 ◽  
Vol 765-767 ◽  
pp. 444-447
Author(s):  
Juan Wen ◽  
Qi Ming Tian

In this paper, we propose a fast and optimal adaptive transmit power and bit allocation algorithm, which is called Bisection Searching Level (BSL) for wireless OFDMA systems. The algorithm aims at maximization of data rate under the constraints of total transmit power and bit error rate (BER). BSL is based on water pouring approach, and adopt bisection algorithm to find the water pouring level under discrete bit restriction. Both theoretical analysis and simulation results demonstrate the optimality of our proposed algorithm.


2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Khuong Ho-Van ◽  
Thiem Do-Dac

This paper exploits a self-powered secondary relay to not only maintain but also secure communications between a secondary source and a secondary destination in cognitive radio networks when source-destination channel is unavailable. The relay scavenges energy from radio frequency (RF) signals of the primary transmitter and the secondary source and consumes the scavenged energy for its relaying activity. Under the maximum transmit power constraint, Rayleigh fading, the primary outage constraint, and the interference from the primary transmitter, this paper suggests an accurate closed-form expression of the secrecy outage probability to promptly assess the security performance of relaying communications in energy scavenging cognitive networks. The validity of the proposed expression is verified by computer simulations. Numerous results demonstrate the security performance saturation in the range of large maximum transmit power or high required outage probability of primary users. Moreover, the security performance is a function of several system parameters among which the relay’s position, the power splitting factor, and the time splitting factor can be optimized to achieve the minimum secrecy outage probability.


2015 ◽  
Vol 12 (5) ◽  
pp. 75-85 ◽  
Author(s):  
Xiangdong Jia ◽  
Pengfei Deng ◽  
Ming Zhou ◽  
Longxiang Yang ◽  
Hongbo Zhu

2016 ◽  
Vol 2016 ◽  
pp. 1-10 ◽  
Author(s):  
Jie Chen ◽  
Chang Liu ◽  
Husheng Li ◽  
Xulong Li ◽  
Shaoqian Li

Device-to-Device (D2D) communications are considered one of the key technologies for 5G wireless communication systems. In this paper, a resource sharing mechanism, which applies different policies for different cases (thus being categorized), is proposed. In this scheme, all D2D pairs are divided into three groups by comparing the minimum transmit power with the maximum transmit power of each cellular UE. The proposed mechanism enables multiple D2D pairs in the second group to share the resource with cellular user equipment (UE) simultaneously, by adjusting the transmit powers of these D2D transmitters. At the same time, D2D pairs in the first group and the third group share resource with cellular UE based on the transmit power minimization principle. Simulation results show that the proposed scheme can achieve relatively higher network throughput and lower transmit power consumption of the D2D system.


2013 ◽  
Vol 3 (1-2) ◽  
Author(s):  
Khuong Ho-Van ◽  
Vo Nguyen Quoc Bao

The bit error rate (BER) performance of underlay relay cognitive networks in the presence of Rayleigh fading is thoroughly analyzed in this paper. New exact and asymptotic analytic expressions under consideration of both interference power constraint and maximum transmit power constraint are derived in closed-form and are extensively corroborated by Monte-Carlo simulations. These expressions facilitate in evaluating effectively the network performance behaviour in key operation parameters as well as in optimizing system parameters. A multitude of analytical results expose that underlay relay cognitive networks experience the performance saturation phenomena while their performance considerably depends on the number of hops for the linear network model. Additionally, optimum relay position is significantly dependent of maximum transmit power, maximum interference power, and licensee location. Moreover, the appropriate order of locating unlicensees with different maximum transmit power levels can dramatically improve the network performance.


2019 ◽  
Vol 2019 ◽  
pp. 1-16 ◽  
Author(s):  
Khuong Ho-Van ◽  
Thiem Do-Dac

This study suggests an energy-scavenging capable unlicensed relay not only to retain communications between an unlicensed sender-recipient pair in underlay cognitive networks but also to secure these communications against eavesdropping of malicious users. Message-securing capability of such a network configuration is assessed through secrecy outage probability (SOP). For this purpose, a precise closed-form formula of the SOP accounting for interference power restriction, Nakagami-m fading, and maximum transmit power restriction is first proposed. Then, the proposed formula is validated by computer simulations. Ultimately, various results are supplied to contrive that the relay position, the time percentage, and the power percentage of the energy-scavenging technique should be appropriately chosen for achieving the best security performance. Moreover, the SOP decreases with lower severity fading level and is constant in the range of high maximum interference power or high maximum transmit power.


2013 ◽  
Vol 307 ◽  
pp. 62-65
Author(s):  
Hong Sheng Li ◽  
Ning Hui He

As to the power control protocol, in the CPC protocol each node uses the maximum transmit power choosed by all network nodes; the communication consumption of IPC protocol is smaller, but each node is using its own definition of transmission power, two-way link between nodes in the network can not be guaranteed. The sent power control based on data transmission can resolve the defaults of CPC and IPC.


Sign in / Sign up

Export Citation Format

Share Document