CN104519499A - Method for forming security cooperation beams in amplifying and forwarding wireless relay networks - Google Patents
Method for forming security cooperation beams in amplifying and forwarding wireless relay networks Download PDFInfo
- Publication number
- CN104519499A CN104519499A CN201410803788.XA CN201410803788A CN104519499A CN 104519499 A CN104519499 A CN 104519499A CN 201410803788 A CN201410803788 A CN 201410803788A CN 104519499 A CN104519499 A CN 104519499A
- Authority
- CN
- China
- Prior art keywords
- sigma
- beta
- alpha
- log
- source node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/24—Cell structures
- H04W16/28—Cell structures using beam steering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/155—Ground-based stations
- H04B7/15528—Control of operation parameters of a relay station to exploit the physical medium
- H04B7/1555—Selecting relay station antenna mode, e.g. selecting omnidirectional -, directional beams, selecting polarizations
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention discloses a method for forming security cooperation beams in amplifying and forwarding wireless relay networks. The method includes steps of 1), acquiring accessible information speeds I<1> at first source nodes T<i>, accessible information speeds I<2> at second source nodes T<2> and accessible information rates at eavesdroppers E<k> in the amplifying and forwarding wireless relay networks; 2), constructing optimization problems for controlling single relay power according to security and rate maximization criteria, converting the optimization problems into semi-definite programming problems, acquiring the optimal matrixes x<opt> by the aid of iteration processes and then acquiring the optimal security and rates according to the optimal matrixes x<opt>. The matrixes x<opt> meet an equation of rank(X<opt>)=1. The method has the advantages that the maximum security and rates for forming the security cooperation beams in the amplifying and forwarding wireless relay networks can be implemented by the aid of the method, accordingly the probability that the eavesdroppers steal information of legal users can be obviously reduced, and the spectral efficiency of security communication can be improved.
Description
Technical field
The invention belongs to wireless communication field, relate to the method for security cooperation wave beam forming in a kind of amplification forwarding wireless relay network.
Background technology
The intrinsic opening of wireless channel accelerates the development of wireless communication system, but too increases the probability be ravesdropping simultaneously.Safety of physical layer to obtain at secure communications as a kind of method of raising safety newly and pays close attention to widely.Compared with traditional high rise building safety scheme, the advantage of safety of physical layer is that overhead is little, protocol stack simple and complexity is lower, is therefore suitable for distributed relay network element.Up-to-date research shows, cooperation distributed node can improve safe rate significantly.
Research at present about safety of physical layer is mainly concentrated in mimo systems, and the distributed relay that cooperates can improve safe rate significantly.In distributed relay network, the secure communication of one-way junction cooperative beam figuration is suggested.Along with the development of secure communication, in order to improve spectrum efficiency, network scenarios has been extended to bilateral relay network.And the scheme of the suboptimum about secure communication has been proposed in bilateral network, such as, the kernel cooperative beam figuration when known listener-in's channel condition information and the man made noise's scheme when unknown listener-in's channel condition information.But the optimization aim in above scheme is all and speed instead of safety and speed.Also been proposed the research of the general approach of the kernel wave beam forming in the restriction of source node through-put power based on this, Optimality Criteria is safety and speed.But more than research is only suitable for the scene of an existence listener-in.In addition, in amplification forwarding bilateral relay network, propose a kind of integration and cooperation wave beam forming of suboptimum and the scheme of man made noise, the program can obtain higher safety and speed.
In sum, in amplification forwarding bilateral relay network, the research about the linear arrangement of secure communication is necessary.
Summary of the invention
The object of the invention is to the shortcoming overcoming above-mentioned prior art, provide the method for security cooperation wave beam forming in a kind of amplification forwarding wireless relay network, the method can realize the figuration of security cooperation wave beam in amplification forwarding wireless relay network, remarkable reduction listener-in steals the informational probability of proper user, improves the spectrum efficiency of secure communication.
For achieving the above object, in amplification forwarding wireless relay network of the present invention, the method for security cooperation wave beam forming comprises the following steps:
Comprise the following steps:
1) in amplification forwarding wireless relay network, first source node T
1and second source node T
2by one group of relaying R
nexchange message, listener-in E
kbe passive, and attempt illegal wiretapping first source node T
1with second source node T
2the information at place, wherein, n=1,2 ..., N, k=1,2 ..., K, N are relaying sum, and K is the quantity of listener-in, then first source node T
1place can reach information rate I
1, second source node T
2place can reach information rate I
2and listener-in E
kplace can reach information rate
be respectively
Wherein P
1be first source node T
1average transmit power, P
2be second source node T
2average transmit power, w is wave beam formed matrix, f
rbe first source node T
1to the channel of all relayings, f
eto the first source node T
1to the channel of listener-in, g
rbe second source node T
2to the channel of all relayings, g
ebe second source node T
2to the channel of listener-in, c
efor being relayed to the quasistatic fading coefficients of listener-in,
for being relayed to the quasistatic fading coefficients of a kth listener-in,
r
ff=diag (| f
r, 1|
2, | f
r, 2|
2..., | f
r, N|
2),
a
fg=f
Rοg
R,
R
gg=diag(|f
g,1|
2,|f
g,2|
2,...,|f
g,N|
2),
2) then the optimization problem of the single relay power control of criteria construction is maximized namely according to safety and speed
Wherein, x
rcarry out wave beam forming to the received signal for relaying and add the signal after man made noise,
p
rfor the gross power of all relayings, then formula (9), formula (10) and formula (11) are brought in Q1,
Wherein, Q2 is a non-convex problem, Q2 is converted into semi definite programming problem, and obtains optimum matrix X by the method for iteration
opt, the matrix X of wherein said optimum
optmeet rank (X
opt)=1, then according to the matrix X of described optimum
optoptimum safety and speed, then carry out the figuration of security cooperation wave beam in amplification forwarding wireless relay network according to the safety of described optimum and speed.
2, the method for security cooperation wave beam forming in amplification forwarding wireless relay network according to claim 1, is characterized in that, if B
1=R
ff+ P
2r
fg, B
2=R
gg+ P
1r
fg,
C
1=R
ff, C
2=R
ggwith
then optimization problem Q2 can be expressed as
Make X=ww
h, then optimization problem Q3 can abbreviation be:
X≥0,rαnk{X}=1.
Target function due to optimization problem Q4 is the difference of two convex functions, so optimization problem Q4 is non-convex problem, carries out linear approximation to the target function of optimization problem Q4, order
β
j, 0be the initial value of Taylor expansion, the order 1 removed in optimization problem Q4 limits, then optimization problem Q4, can be reduced to:
Work as β
j, 0=β
j, opttime, log (β
j) first order Taylor expand into real Taylor expansion, the further abbreviation of optimization problem Q5 is
s.t.-(log(α
1)+log(α
2)+log(α
3k))+t
1+t
2+t
3k<=τ
Optimization problem Q6 is step 2) in semi definite programming problem.
The present invention has following beneficial effect:
In amplification forwarding wireless relay network of the present invention, the method for security cooperation wave beam forming considers the situation of multiple listener-in, the optimization problem of the single relay power control of standard construction is maximized according to safety and speed, and this optimization problem is changed into semi definite programming problem by linear approximation, optimum safety and speed is obtained again by the method for iteration, then optimum safety and speed is obtained described in basis, and then significantly reduce the informational probability that listener-in steals proper user, improve the spectrum efficiency of secure communication.
Accompanying drawing explanation
When Fig. 1 is relaying number N=20 in emulation experiment, safety and speed are with P
rchange;
Fig. 2 works as P in emulation experiment
rduring=20dBW, safety and speed are with the variation diagram of iterations.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail:
Obtain first source node T
1place can reach information rate I
1, second source node T
2place can reach information rate I
2and listener-in E
kplace can reach information rate
method specifically comprise the following steps:
At amplification forwarding wireless relay network, first source node T
1with second source node T
2by one group of relaying R
nexchange message, n=1,2 ..., N, listener-in E
kpassive, k=1,2 ..., K, and attempt illegal wiretapping first source node T
1place and second source node T
2the information at place, in system, all nodes only have an antenna, and are all semiduplex;
F
rbe first source node T
1to the channel of all relayings, f
eto the first source node T
1to the channel of listener-in, g
rbe second source node T
2to the channel of all relayings, g
ebe second source node T
2to the channel of listener-in, c
efor being relayed to the quasistatic fading coefficients of listener-in, global channel state information (CSI) is known;
Transmission is divided into two time slots, at time slot 1, and first source node T
1with second source node T
2simultaneously to repeat transmitted information, then the signal vector received at relaying place is
Wherein, P
1and P
2the average transmit power of first source node and second source node respectively, s
1and s
2the transmitting information of first source node and second source node respectively.If E [| s
m|
2]=1, m=1,2, n
rbe relaying place average be 0, the additive white Gaussian noise of unit covariance, therefore, in a kth information that listener-in place receives is
Wherein,
listener-in E
kthe average at place is 0, the additive white Gaussian noise of unit covariance.
At time slot 2, relaying carries out wave beam forming first to the received signal and adds man made noise, then signal can be expressed as after treatment
x
R=Wy
R+n
a, (3)
Wherein, wave beam formed matrix
n
afor man made noise, and
covariance matrix ∑>=0;
Then relaying resends x
r, first source node T
1with second source node T
2the signal that place receives can be expressed as
In like manner, listener-in E
kthe signal that place receives is
Wherein,
with
t respectively
1, T
2and E
kthe average at place is 0, the additive noise of unit covariance.
Information after self-interference is eliminated desired by source node can be expressed as
Wherein, a
fg=f
rο g
r, w=[w
1, w
2..., w
n]
t;
Then T
1, T
2and E
kreached at the information rate at place can be expressed as easily
Wherein P
1be first source node T
1average transmit power, P
2be second source node T
2average transmit power, w is wave beam formed matrix, f
rbe first source node T
1to the channel of all relayings, f
eto the first source node T
1to the channel of listener-in, g
rbe second source node T
2to the channel of all relayings, g
ebe second source node T
2to the channel of listener-in, c
efor being relayed to the quasistatic fading coefficients of listener-in,
for being relayed to the quasistatic fading coefficients of a kth listener-in,
r
ff=diag (| f
r, 1|
2, | f
r, 2|
2..., | f
r, N|
2), a
fg=f
rο g
r,
R
gg=diag(|f
g,1|
2,|f
g,2|
2,...,|f
g,N|
2),
In amplification forwarding wireless relay network of the present invention, the method for security cooperation wave beam forming comprises the following steps:
1) in amplification forwarding wireless relay network, first source node T
1and second source node T
2by one group of relaying R
nexchange message, listener-in E
kpassive, and attempt illegal wiretapping first source node T
1with second source node T
2the information at place, wherein, n=1,2 ..., N, k=1,2 ..., K, N are relaying sum, and K is the quantity of listener-in, then first source node T
1place can reach information rate I
1, second source node T
2place can reach information rate I
2and listener-in E
kplace can reach information rate
be respectively
Wherein P
1be first source node T
1average transmit power, P
2be second source node T
2average transmit power, w is wave beam formed matrix, f
rbe first source node T
1to the channel of all relayings, f
eto the first source node T
1to the channel of listener-in, g
rbe second source node T
2to the channel of all relayings, g
ebe second source node T
2to the channel of listener-in, c
efor being relayed to the quasistatic fading coefficients of listener-in,
for being relayed to the quasistatic fading coefficients of a kth listener-in,
r
ff=diag (| f
r, 1|
2, | f
r, 2|
2..., | f
r, N|
2), a
fg=f
rο g
r,
R
gg=diag(|f
g,1|
2,|f
g,2|
2,...,|f
g,N|
2);
2) then the optimization problem of the single relay power control of criteria construction is maximized namely according to safety and speed
Wherein, x
rcarry out wave beam forming to the received signal for relaying and add the signal after man made noise,
p
rfor the gross power of all relayings, then formula (9), formula (10) and formula (11) are brought in Q1,
Wherein, Q2 is a non-convex problem, Q2 is converted into semi definite programming problem, and obtains optimum matrix X by the method for iteration
opt, the matrix X of wherein said optimum
optmeet rank (X
opt)=1, then according to the matrix X of described optimum
optoptimum safety and speed, then carry out the figuration of security cooperation wave beam in amplification forwarding wireless relay network according to the safety of described optimum and speed.
Wherein, if B
1=R
ff+ P
2r
fg, B
2=R
gg+ P
1r
fg,
C
1=R
ff, C
2=R
ggwith
Then optimization problem Q2 can be expressed as
Make X=ww
h, then optimization problem Q3 can abbreviation be:
X≥0,rαnk{X}=1.
Target function due to optimization problem Q4 is the difference of two convex functions, so optimization problem Q4 is non-convex problem, carries out linear approximation to the target function of optimization problem Q4, order
β
j, 0be the initial value of Taylor expansion, the order 1 removed in optimization problem Q4 limits, then optimization problem Q4, can be reduced to:
Work as β
j, 0=β
j, opttime, log (β
j) first order Taylor expand into real Taylor expansion, the further abbreviation of optimization problem Q5 is
s.t.-(log(α
1)+log(α
2)+log(α
3k))+t
1+t
2+t
3k<=τ
Optimization problem Q6 is step 2) in semi definite programming problem.
In order to prove that the optimal solution that Q6 obtains meets rank (X
opt)=1, first considers a following problem
Construct Lagrangian and obtain KKT condition and be
Carry out abbreviation to ψ can obtain
Then (12) formula is substituted into ψ X=0 can obtain
Wherein,
Therefore can obtain
Namely the solution X in R1 meets rank (X)=1;
Because the problem after lax
so by Q
3the X obtained
optmeet rank (X
opt)=1.
Emulation experiment
In simulations, P
1=P
2=20dBW,
wherein, P
rbe the gross power of all relayings, in addition, all channel coefficients are all averages is in simulations 0, the gaussian random matrix of unit covariance, and the SCA method simultaneously carried in we and document carries out the performance contrasting to assess safety and speed.
Different relay power P is compared in Fig. 1
rtime safety and speed, as can be seen from Figure 1, safety and speed increase with the increase of relaying place power, and when relay power is larger, the method in this programme is significantly better than SCA algorithm; In addition, we find in simulations, and when listener-in's number increases, the method in this programme is stablized than SCA method, and this is also corresponding with the result in document.Compared for when channel is fixed in Fig. 2, safety and speed are with the change of iterations, and as can be seen from Figure 2, the method in the present invention can converge to maximum safety and speed faster; In addition, safety and speed increase with the increase of relaying number.
Claims (2)
1. the method for security cooperation wave beam forming in amplification forwarding wireless relay network, is characterized in that, comprise the following steps:
1) in amplification forwarding wireless relay network, first source node T
1and second source node T
2by one group of relaying R
nexchange message, listener-in E
kbe passive, and attempt illegal wiretapping first source node T
1with second source node T
2the information at place, wherein, n=1,2 ..., N, k=1,2 ..., K, N are relaying sum, and K is the quantity of listener-in, then first source node T
1place can reach information rate I
1, second source node T
2place can reach information rate I
2and listener-in E
kplace can reach information rate
be respectively
Wherein P
1be first source node T
1average transmit power, P
2be second source node T
2average transmit power, w is wave beam formed matrix, f
rbe first source node T
1to the channel of all relayings, f
eto the first source node T
1to the channel of listener-in, g
rbe second source node T
2to the channel of all relayings, g
ebe second source node T
2to the channel of listener-in, c
efor being relayed to the quasistatic fading coefficients of listener-in,
for being relayed to the quasistatic fading coefficients of a kth listener-in,
a
fg=f
rog
R,
2) then the optimization problem of the single relay power control of criteria construction is maximized namely according to safety and speed
Wherein, x
rcarry out wave beam forming to the received signal for relaying and add the signal after man made noise,
p
rfor the gross power of all relayings, then formula (9), formula (10) and formula (11) are brought in Q1,
Wherein, Q2 is a non-convex problem, Q2 is converted into semi definite programming problem, and obtains optimum matrix x by the method for iteration
opt, the matrix x of wherein said optimum
optmeet rank (x
opt)=1, then according to the matrix x of described optimum
optoptimum safety and speed, then carry out the figuration of security cooperation wave beam in amplification forwarding wireless relay network according to the safety of described optimum and speed.
2. the method for security cooperation wave beam forming in amplification forwarding wireless relay network according to claim 1, is characterized in that, if B
1=R
ff+ P
2r
fg, B
2=R
gg+ P
1r
fg,
C
1=R
ff, C
2=R
ggwith
then optimization problem Q2 can be expressed as
Make X=ww
h, then optimization problem Q3 can abbreviation be:
x≥0,rank{X}=1.
Target function due to optimization problem Q4 is the difference of two convex functions, so optimization problem Q4 is non-convex problem, carries out linear approximation to the target function of optimization problem Q4, order
j=1,2,3k, β
j, 0be the initial value of Taylor expansion, the order 1 removed in optimization problem Q4 limits, then optimization problem Q4, can be reduced to:
;
Work as β
j, 0=β
j, opttime, log (β
j) first order Taylor expand into real Taylor expansion, the further abbreviation of optimization problem Q5 is
s.t.-(log(α
1)+log(α
2)+log(α
3k))+t
1+t
2+t
3k<=τ
Optimization problem Q6 is step 2) in semi definite programming problem.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410803788.XA CN104519499A (en) | 2014-12-19 | 2014-12-19 | Method for forming security cooperation beams in amplifying and forwarding wireless relay networks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410803788.XA CN104519499A (en) | 2014-12-19 | 2014-12-19 | Method for forming security cooperation beams in amplifying and forwarding wireless relay networks |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104519499A true CN104519499A (en) | 2015-04-15 |
Family
ID=52794100
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410803788.XA Pending CN104519499A (en) | 2014-12-19 | 2014-12-19 | Method for forming security cooperation beams in amplifying and forwarding wireless relay networks |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104519499A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104967991A (en) * | 2015-05-06 | 2015-10-07 | 西安交通大学 | Secure communication method among multiple pairs of users in bidirectional relay network |
CN106068032A (en) * | 2016-05-20 | 2016-11-02 | 电子科技大学 | Power distribution method in collaborative network based on man made noise under the conditions of main channel imperfect channel estimation |
CN109768815A (en) * | 2019-01-18 | 2019-05-17 | 北京邮电大学 | Non-trusted bi-directional relaying multi-antenna cooperative communication means and device |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103259575A (en) * | 2013-04-19 | 2013-08-21 | 南京邮电大学 | Linear processing optimization method based on multi-antenna two-way relay wireless communication system |
-
2014
- 2014-12-19 CN CN201410803788.XA patent/CN104519499A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103259575A (en) * | 2013-04-19 | 2013-08-21 | 南京邮电大学 | Linear processing optimization method based on multi-antenna two-way relay wireless communication system |
Non-Patent Citations (3)
Title |
---|
GUOBING LI ET AL: "High-rate relay beamforming for simultaneous wireless information and power transfer", 《ELECTRONICS LETTERS》 * |
MEILU LIN ET AL: "Joint Cooperative Beamforming and Artificial Noise Design for Secrecy Sum Rate Maximization in Two-Way AF Relay Networks", 《IEEE COMMUNICATIONS LETTERS》 * |
YIZHEN ZHANG ET AL: "Relay Deployment for AF-MIMO Two-Way Relaying Networks with Antenna Selection", 《JOURNAL OF COMMUNICATIONS 》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104967991A (en) * | 2015-05-06 | 2015-10-07 | 西安交通大学 | Secure communication method among multiple pairs of users in bidirectional relay network |
CN106068032A (en) * | 2016-05-20 | 2016-11-02 | 电子科技大学 | Power distribution method in collaborative network based on man made noise under the conditions of main channel imperfect channel estimation |
CN109768815A (en) * | 2019-01-18 | 2019-05-17 | 北京邮电大学 | Non-trusted bi-directional relaying multi-antenna cooperative communication means and device |
CN109768815B (en) * | 2019-01-18 | 2020-11-03 | 北京邮电大学 | Non-trust bidirectional relay multi-antenna cooperative communication method, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104469755A (en) | Physical layer security transmission method for keeping relay and jamming node selection result secret | |
CN104378757B (en) | A kind of method that safety of physical layer is ensured in the more interference eavesdropping networks of more relayings | |
CN106059705B (en) | A kind of relaying safe transmission method of physical layer | |
CN104540124B (en) | A kind of more relaying safety of physical layer methods of known eavesdropping end channel information | |
CN103354463B (en) | The cooperative beam formation method of safety of physical layer is strengthened based on kernel | |
CN106374980A (en) | Safe transmission method in MIMO Y eavesdropping network based on real interference alignment | |
CN103546210B (en) | Based on the method for precoding that safe rate is optimized in multi-base station cooperative scene | |
CN103856299B (en) | Signal safe transmission method of MIMO amplifying forwarding relay network | |
CN104519499A (en) | Method for forming security cooperation beams in amplifying and forwarding wireless relay networks | |
CN106533606A (en) | Physical layer secure transmission method for single-antenna amplification forwarding relay network | |
CN105246158A (en) | Energy efficiency maximization multi-antenna relay system power allocation method based on high signal-to-noise ratio | |
CN105744516A (en) | Communication system and method for improving security performance of physical layer by energy station | |
CN103152086A (en) | Method for processing beam forming robustness signal on relay end of bi-direction multi-relay system | |
Xie et al. | Training design and channel estimation in uplink cloud radio access networks | |
CN110650480B (en) | Wireless network relay and interference node selection method facing safe communication | |
CN102752080A (en) | Anti-eavesdrop coding method based on physical layer | |
CN104936251A (en) | Optimal power distribution based relay selection method and system of security cooperation | |
CN104539334A (en) | Method for forming wave beam supporting multiple users to high-speed communication based on SWIPT | |
CN106788661B (en) | A kind of protocol self-adapting handover security transmission method of full duplex opportunistic relaying | |
CN105007248B (en) | A kind of downlink precoding method of MIMO Full-duplex cellular systems | |
Wang et al. | Multicast secrecy rate maximization for reconfigurable intelligent surface backscatter communication | |
CN103199962A (en) | Signal processing method for safe capacity in Coordinated Multi-Point Transmission (CoMP) system | |
CN103297108B (en) | A kind of uplink beam manufacturing process of Multi-source multi-relay collaborative network | |
Tu et al. | Performance statistics of broadcasting networks with receiver diversity and fountain codes | |
CN102769517B (en) | A kind of relay and control method of reliable feedback channel information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150415 |