diversity scheme
Recently Published Documents


TOTAL DOCUMENTS

248
(FIVE YEARS 16)

H-INDEX

21
(FIVE YEARS 1)

Doklady BGUIR ◽  
2021 ◽  
Vol 19 (4) ◽  
pp. 80-84
Author(s):  
A. D. Tussupov ◽  
A. T. Tokhmetov ◽  
N. I. Listopad

Gigabit passive optical networks (GPON) are the most advanced technology. The data transfer rate is 2.5 Gbps for downstream and 1.25 Gbps for upstreams. But this network architecture has a limited physical network length of 20 km. This is due to the high budgetary losses of the network. This restriction of access makes the network difficult to access for subscribers located far from the facilities of the telecom operator, and coverage of remote settlements is quite costly (cost of design work, fiber, laying of fiber-optic cable), thereby complicating the elimination of the digital divide between the city, the suburbs and the countryside. To solve this problem, it is proposed to use quantum dot semiconductor optical amplifiers (QD-SOA), which will expand the GPON reach up to 60 km, which is the limit for the logical length under the current protocols. Quantum dot semiconductor optical amplifiers are promising devices for optical communication technology, but for commercial use they have one disadvantage. They are polarization sensitive. In this paper the authors constructed a polarization diversity scheme to avoid polarization sensitivity of QD-SOAs.


2021 ◽  
Vol 11 (1) ◽  
pp. 47-62
Author(s):  
Akinyinka Olukunle Akande ◽  
◽  
Cosmas Kemisdrin Agubor ◽  
Olusola Kunle Akinde ◽  
Longinus Sunday Ezema ◽  
...  

Author(s):  
Akanksha Sharma ◽  
Lavish Kansal ◽  
Gurjot Singh Gaba ◽  
Mohamed Mounir

This chapter demonstrates various ways for transmitting an image file using MIMO-OFDM systems which have anti-error ability to reduce BER. Furthermore, various diversity combining techniques like maximal ratio combining (MRC), selection combining (SC) are incorporated along with transmitting diversity scheme (i.e., beamforming). Different modulation techniques (viz. QPSK, 16-PSK, and 64-PSK) are used and evaluated in terms of BER vs. SNR considering different combination of transmitters and receivers. Lastly, results showed that in the transmission course, BER is considerably reduced and the image quality is found much better in comparison to other schemes.


2020 ◽  
Vol 13 (5) ◽  
pp. 987-998
Author(s):  
Khyati Chopra ◽  
Ranjan Bose ◽  
Anupam Joshi

Background:: Based on the idea of cooperative communication, recently a lot of attention has been drawn to cooperative spectrum access for the secure information transmission in a Cognitive Radio Network (CRN). Security is one of the most important aspects of these networks, as due to their open and dynamic nature, they are extremely vulnerable to malicious behavior. Cooperative cognitive radio has emerged as a dynamic spectrum access technique, where an unlicensed (secondary) user is allowed to simultaneously access the licensed channels dedicated to a Primary User (PU), as long as the Quality of Service (QoS) of primary communication is not affected. Method:: This paper investigates the secrecy outage performance of threshold-based cognitive decode-andforward relay network, with interference constraints from primary licensed user. Threshold-based relaying is considered where; the source message is successfully decoded by the relay, only if the received SNR satisfies the particular threshold. Outage probability expressions have been derived for the worst-case scenario, where only the eavesdropper can achieve the advantage of diversity. The Selection Combining (SC) diversity scheme is employed only at the secondary eavesdropper. Results:: The system secrecy performance is better for SC diversity scheme at the eavesdropper than Maximal Ratio Combining (MRC) diversity scheme, as MRC has better diversity performance than SC. We have shown that the improvement in desired secrecy rate, predetermined threshold, eavesdropper channel quality and interference constraints affect the secrecy performance of the cognitive radio system. The outage probability decreases accordingly with an increase in the maximum tolerable interference level at primary destination. The outage probability of Optimal relay Selection (OS) scheme is derived for a multi-relay system, when either the Instantaneous Channel State Information (ICSI) or the Statistical Channel State Information (SCSI) is available. We have shown that the secrecy performance of the OS with ICSI of the system is better than with SCSI. Also, the OS improves the performance of the multi-relay system, when the number of relays is increased. Conclusion:: The secrecy outage probability of threshold-based DF underlay cognitive relay network is evaluated. Both interference and maximum transmit power constraints are considered at secondary source and secondary relay. Also, the relay can successfully decode the message, only if it meets the pre-defined threshold. We have investigated the performance of MRC and SC diversity schemes at the secondary eavesdropper and have shown that the system secrecy performance is better for SC than MRC, as MRC has better diversity performance than SC. We have shown that the system secrecy performance is significantly affected by the required secrecy rate, pre-defined threshold, interference constraints and choice of diversity scheme (MRC/SC) at the eavesdropper. The outage probability of OS scheme is derived for a multi-relay system, when either the ICSI or the SCSI is available. We have shown that the secrecy performance of the OS with ICSI of the system is better than with SCSI. Also, the OS improves the performance of the multi-relay system, when the number of relays is increased.


Sign in / Sign up

Export Citation Format

Share Document