3,790 research outputs found

    Mixed numerologies interference analysis and inter-numerology interference cancellation for windowed OFDM systems

    Get PDF
    Extremely diverse service requirements are one of the critical challenges for the upcoming fifth-generation (5G) radio access technologies. As a solution, mixed numerologies transmission is proposed as a new radio air interface by assigning different numerologies to different subbands. However, coexistence of multiple numerologies induces the inter-numerology interference (INI), which deteriorates the system performance. In this paper, a theoretical model for INI is established for windowed orthogonal frequency division multiplexing (W-OFDM) systems. The analytical expression of the INI power is derived as a function of the channel frequency response of interfering subcarrier, the spectral distance separating the aggressor and the victim subcarrier, and the overlapping windows generated by the interferer's transmitter windows and the victim's receiver window. Based on the derived INI power expression, a novel INI cancellation scheme is proposed by dividing the INI into a dominant deterministic part and an equivalent noise part. A soft-output ordered successive interference cancellation (OSIC) algorithm is proposed to cancel the dominant interference, and the residual interference power is utilized as effective noise variance for the calculation of log-likelihood ratios (LLRs) for bits. Numerical analysis shows that the INI theoretical model matches the simulated results, and the proposed interference cancellation algorithm effectively mitigates the INI and outperforms the state-of-the-art W-OFDM receiver algorithms

    A Compressive Sensing Assisted Massive SM-VBLAST System: Error Probability and Capacity Analysis

    Get PDF
    The concept of massive spatial modulation (SM) assisted vertical bell labs space-time (V-BLAST) (SM-VBLAST) system [1] is proposed, where SM symbols (instead of conventional constellation symbols) are mapped onto the VBLAST structure. We show that the proposed SM-VBLAST is a promising massive multiple input multiple output (MIMO) candidate owing to its high throughput and low number of radio frequency (RF) chains used at the transmitter. For the generalized massive SM-VBLAST systems, we first derive both the upper bounds of the average bit error probability (ABEP) and the lower bounds of the ergodic capacity. Then, we develop an efficient error correction mechanism (ECM) assisted compressive sensing (CS) detector whose performance tends to achieve that of the maximum likelihood (ML) detector. Our simulations indicate that the proposed ECM-CS detector is suitable both for massive SM-MIMO based point-to-point and for uplink communications at the cost of a slightly higher complexity than that of the compressive sampling matching pursuit (CoSaMP) based detector in the high SNR region

    Bis[1-(4-cyano­benz­yl)pyrazinium] bis­(1,2-dicyano­ethene-1,2-dithiol­ato)nickelate(II)

    Get PDF
    The asymmetric unit of the title complex, (C12H10N3)2[Ni(C4N2S2)2], consists of one 1-(4-cyano­benz­yl)pyrazinium cation and one half of an [Ni(mnt)2]2− dianion (mnt2− is 1,2-dicyano­ethene-1,2-dithiol­ate). The Ni2+ ion is located on an inversion center and is coordinated by four S atoms from two mnt2− ligands, exhibiting a square-planar coordination geometry. The cation adopts a conformation where both the pyrazine ring and the benzene ring are twisted with respect to the C—C—N reference plane by 16.5 (2) and 69.8 (1)°, respectively

    Dual antenna selection in secure cognitive radio networks

    Get PDF
    This paper investigates data transmission and physical layer secrecy in cognitive radio network. We propose to apply full duplex transmission and dual antenna selection at secondary destination node. With the full duplex transmission, the secondary destination node can simultaneously apply the receiving and jamming antenna selection to improve the secondary data transmission and primary secrecy performance respectively. This describes an attractive scheme in practice: unlike that in most existing approaches, the secrecy performance improvement in the CR network is no longer at the price of the data transmission loss. The outage probabilities for both the data transmission and physical layer secrecy are analyzed. Numerical simulations are also included to verify the performance of the proposed scheme
    • …
    corecore