interference constraint
Recently Published Documents


TOTAL DOCUMENTS

82
(FIVE YEARS 15)

H-INDEX

12
(FIVE YEARS 1)

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Wenjian Zhang ◽  
Senlin Jiang

In this paper, we investigate the per-tier outage probability of multiuser multiple-input multiple-output (MU-MIMO) transmissions in heterogeneous networks (HetNets) with joint interference constraint. In the tier of cellular cell, user equipment (UE) is required to report measured channel information and the base station (BS) adopts ZF-based precoding MU-MIMO transmission to achieve multiuser diversity gain. With the constraint of cross-tier interference and unpredicted inter-beam interference, we derive the closed-form expression of outage probability of downlink MU-MIMO transmissions. Considering the capacity of nodes in the tier of ad hoc networks, a max-SINR scheduler and codebook-based MU-MIMO transmission are employed. The scheduler selects the best receiving nodes for each beam in predefined codebook according to measured signal to interference plus noise ratio (SINR), and the transmitting node performs data transmissions using orthogonal beams. In the presence of inter-node interference, inter-beam interference, and cross-tier interference, we obtain the closed-form expression of outage probability of MU-MIMO transmissions when downlink or uplink transmissions occur in cellular cell. Additionally, in case that the outage probability in ad hoc networks should satisfy quality of service (QoS) requirement, a restricted area in cellular cell in which the outage probability in ad hoc networks is not greater than a required threshold is explored. Numerical results show that the unpredictable inter-beam interference in cellular cell degrades the outage probability slightly. The restricted area increases with the outage probability threshold.


2021 ◽  
Author(s):  
Vaibhav Kumar ◽  
Mark F. Flanagan ◽  
Daniel B. da Costa ◽  
Le-Nam Tran

<div>In this paper, we present the ergodic sum secrecy rate (ESSR) analysis of an underlay spectrum sharing non-orthogonal multiple access (NOMA) system. We consider the scenario where the power transmitted by the secondary transmitter (ST) is constrained by the peak tolerable interference at multiple primary receivers (PRs) as well as the maximum transmit power of the ST. The effect of channel estimation error is also taken into account in our analysis. We derive exact and asymptotic closed-form expressions for the ESSR of the downlink NOMA system, and show that the performance can be classified into two distinct regimes, i.e., it is dictated either by the interference constraint or by the power constraint. Our results confirm the superiority of the NOMA-based system over its orthogonal multiple access (OMA) based counterpart. More interestingly, our results show that NOMA helps in maintaining the secrecy rate of the strong user while significantly enhancing the secrecy performance of the weak user as compared to OMA. The correctness of the proposed investigation is corroborated through Monte Carlo simulation.</div>


2021 ◽  
Author(s):  
Vaibhav Kumar ◽  
Mark F. Flanagan ◽  
Daniel B. da Costa ◽  
Le-Nam Tran

<div>In this paper, we present the ergodic sum secrecy rate (ESSR) analysis of an underlay spectrum sharing non-orthogonal multiple access (NOMA) system. We consider the scenario where the power transmitted by the secondary transmitter (ST) is constrained by the peak tolerable interference at multiple primary receivers (PRs) as well as the maximum transmit power of the ST. The effect of channel estimation error is also taken into account in our analysis. We derive exact and asymptotic closed-form expressions for the ESSR of the downlink NOMA system, and show that the performance can be classified into two distinct regimes, i.e., it is dictated either by the interference constraint or by the power constraint. Our results confirm the superiority of the NOMA-based system over its orthogonal multiple access (OMA) based counterpart. More interestingly, our results show that NOMA helps in maintaining the secrecy rate of the strong user while significantly enhancing the secrecy performance of the weak user as compared to OMA. The correctness of the proposed investigation is corroborated through Monte Carlo simulation.</div>


Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 2074
Author(s):  
Dong Qin ◽  
Tianqing Zhou

This paper investigates two resource allocation problems in cognitive relaying networks where both secondary network and primary network coexist in the same frequency band and adopt orthogonal frequency division multiplexing (OFDM) technology. The first one is the sum rate maximization problem of a secondary network under total power budget of a secondary network and tolerable interference constraint of a primary network. The second one is the sum rate maximization problem of a secondary network under separate power budgets of a secondary network and tolerable interference constraint of a primary network. These two optimization problems are completely different from those in traditional cooperative communication due to interference management constraint condition. A joint optimization algorithm is proposed, where power allocation and subcarrier pairing are decomposed into two subproblems with reasonable cost. The first one is a closed form solution of power allocation of the secondary network while managing the interference to a primary network under a constraint condition. The other is optimal subcarrier pairing at given power allocation. Simulation results reveal aspects of average signal to noise ratio (SNR), interference level, relay position, and power ratio on the sum rate of a secondary network.


Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 469
Author(s):  
Deokhui Lee ◽  
Jaewoo So

As the number of users using multimedia sharing services increases, the need to ensure the minimum data rate of wireless users increases. Meanwhile, in the cooperative cognitive radio (CR) network, it is important to provide the quality-of-services for secondary users (SUs) while satisfying the inter-network interference constraint from secondary transmitters to primary users (PUs). Under the limited feedback resource constraint, this paper proposes a feedback bits allocation scheme for the guaranteed bit rate services of SUs while satisfying the inter-network interference constraint. This paper investigates how many feedback bits between the ST and PUs are required to guarantee the minimum data rate of SUs and then proposes a feedback bits allocation scheme that maximizes the average sum rate of SUs while reducing the outage probability of SUs.


Sign in / Sign up

Export Citation Format

Share Document