References of "Zheng, Gan 40021115"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailCalibrated Learning for Online Distributed Power Allocation in Small-Cell Networks
Zhang, Xinruo; Nakhai, Mohammad Reza; Zheng, Gan UL et al

in IEEE Transactions on Communications (2019), 67(11), 8124-8136

This paper introduces a combined calibrated learning and bandit approach to online distributed power control in small cell networks operated under the same frequency bandwidth. Each small base station ... [more ▼]

This paper introduces a combined calibrated learning and bandit approach to online distributed power control in small cell networks operated under the same frequency bandwidth. Each small base station (SBS) is modelled as an intelligent agent who autonomously decides on its instantaneous transmit power level by predicting the transmitting policies of the other SBSs, namely the opponent SBSs, in the network, in real-time. The decision making process is based jointly on the past observations and the calibrated forecasts of the upcoming power allocation decisions of the opponent SBSs who inflict the dominant interferences on the agent. Furthermore, we integrate the proposed calibrated forecast process with a bandit policy to account for the wireless channel conditions unknown a priori , and develop an autonomous power allocation algorithm that is executable at individual SBSs to enhance the accuracy of the autonomous decision making. We evaluate the performance of the proposed algorithm in cases of maximizing the long-term sum-rate, the overall energy efficiency and the average minimum achievable data rate. Numerical simulation results demonstrate that the proposed design outperforms the benchmark scheme with limited amount of information exchange and rapidly approaches towards the optimal centralized solution for all case studies. [less ▲]

Detailed reference viewed: 88 (2 UL)
Full Text
Peer Reviewed
See detailThe Application of Power-Domain Non-Orthogonal Multiple Access in Satellite Communication Networks
Yan, Xiaojuan; An, Kang; Liang, Tao et al

in IEEE Access (2019), 7

Satellite communication networks are expected to be indispensable as part of an integrated complement for the upcoming 5G networks since they can provide the most comprehensive coverage and reliable ... [more ▼]

Satellite communication networks are expected to be indispensable as part of an integrated complement for the upcoming 5G networks since they can provide the most comprehensive coverage and reliable connection for areas where are economically unviable and/or difficult to deploy terrestrial infrastructures. Meanwhile, the power-domain non-orthogonal multiple access (NOMA), which can serve multiple users simultaneously within the same time/frequency block, has been viewed as another promising strategy used in the 5G network to provide high spectral efficiency and resource utilization. In this paper, we introduce a general overview of the application of the NOMA to various satellite architectures for the benefits of meeting the availability, coverage, and efficiency requirements targeted by the 5G. The fundamental and ubiquitous features of satellite link budget are first reviewed. Then, the advantage and benefit of introducing the NOMA scheme in various satellite architectures, such as conventional downlink/uplink satellite networks, cognitive satellite terrestrial networks, and cooperative satellite networks with satellite/terrestrial relays, are provided, along with the motivation and research methodology for each scenario. Finally, this paper reviews the potential directions for future research. [less ▲]

Detailed reference viewed: 71 (0 UL)
Full Text
Peer Reviewed
See detailA Calibrated Learning Approach to Distributed Power Allocation in Small Cell Networks
Zhang, Xinruo; Nakhai; Zheng, Gan UL et al

in ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019, April 17)

This paper studies the problem of max-min fairness power allocation in distributed small cell networks operated under the same frequency bandwidth. We introduce a calibrated learning enhanced time ... [more ▼]

This paper studies the problem of max-min fairness power allocation in distributed small cell networks operated under the same frequency bandwidth. We introduce a calibrated learning enhanced time division multiple access scheme to optimize the transmit power decisions at the small base stations (SBSs) and achieve max-min user fairness in the long run. Provided that the SBSs are autonomous decision makers, the aim of the proposed algorithm is to allow SBSs to gradually improve their forecast of the possible transmit power levels of the other SBSs and react with the best response based on the predicted results at individual time slots. Simulation results validate that in terms of achieving max-min signal-to-interference-plus-noise ratio, the proposed distributed design outperforms two benchmark schemes and achieves a similar performance as compared to the optimal centralized design. [less ▲]

Detailed reference viewed: 75 (0 UL)
Full Text
Peer Reviewed
See detailOn the Performance of the Uplink Satellite Multiterrestrial Relay Networks With Hardware Impairments and Interference
Guo, Kefeng; An, Kang; Zhang et al

in IEEE Systems Journal (2019), 13(3), 2297-2308

In this paper, we consider an uplink satellite multiterrestrial relay network, which employs a single-antenna user to communicate with a satellite via multiple decode-and-forward (DF) terrestrial relays ... [more ▼]

In this paper, we consider an uplink satellite multiterrestrial relay network, which employs a single-antenna user to communicate with a satellite via multiple decode-and-forward (DF) terrestrial relays. Due to the spectrum sharing policy, terrestrial relays are interfered by cochannel interference (CCI). For inevitable radio frequency (RF) front-end imperfections, the interconnected nodes of the whole network are always impaired by inherent hardware impairments (HIs). Specifically, in order to improve the overall system performance, a partial relay selection scheme is used to enhance the system performance by improving the spatial diversity. On this foundation, we have derived the closed-form expressions for the outage probability (OP) and throughput of the considered system, where both the satellite and terrestrial channels are under independent nonidentical distributions. To get better insights at high signal-to-noise-ratios (SNRs), the asymptotic behaviors for the system performance are also derived. From the asymptotic results, the impacts of CCI and the HIs on the system performance are quantitatively analyzed. Especially, the OP and throughput will have bounds when the system is under HIs. Monte Carlo (MC) simulation results corroborate the theoretical analysis and illustrate the joint effects of CCI and HIs on the considered system. [less ▲]

Detailed reference viewed: 47 (0 UL)
Full Text
Peer Reviewed
See detailPerformance Limits of Cognitive Uplink FSS and Terrestrial FS for Ka-Band
An, K.; Liang, T.; Zheng, Gan UL et al

in IEEE Transactions on Aerospace and Electronic Systems (2018)

This paper investigates the performance limits of cognitive uplink Fixed Satellite Service (FSS) and terrestrial Fixed Service (FS) operating in 27.5-29.5 GHz for Ka-band. In light of standard ... [more ▼]

This paper investigates the performance limits of cognitive uplink Fixed Satellite Service (FSS) and terrestrial Fixed Service (FS) operating in 27.5-29.5 GHz for Ka-band. In light of standard International Telecommunications Union (ITU) recommendations and a rain fading channel model, we analyze the interference level at the FS receiver by considering the channel statistical properties, propagation losses and antenna patterns. By employing the interference constraint criterion at the FS, an analytical expression for the capacity of the cognitive uplink FSS is derived, which is useful in understanding the performance limits and the potential application of the considered coexistence scenario. Simulation results are carried out to verify the theoretical derivations, and highlight the impact of key parameters on the performance limits. [less ▲]

Detailed reference viewed: 138 (1 UL)
Full Text
Peer Reviewed
See detailIEEE Global Telecommunications Conference
Masouros, Christos; Zheng, Gan UL

in Power Efficient Downlink Beamforming Optimization by Exploiting Interference (2015, December 06)

We propose a new beamforming scheme for the multi-user multiple-input-single-output (MISO) downlink channel. While conventional beamforming aims at the minimization of the transmit power subject to ... [more ▼]

We propose a new beamforming scheme for the multi-user multiple-input-single-output (MISO) downlink channel. While conventional beamforming aims at the minimization of the transmit power subject to suppressing interference to guarantee quality of service (QoS) constraints, here we exploit, rather than suppress, the constructive part of interference. By exploiting the power of constructively interfering symbols, the proposed scheme achieves the required QoS at lower transmit power. In addition, we derive an equivalent virtual multicast formulation for the proposed optimization to facilitate the design of a more efficient solver. Our simulation and analysis show significant power savings for small scale MISO downlink channels with the proposed optimization compared to conventional beamforming optimization. [less ▲]

Detailed reference viewed: 127 (0 UL)
Full Text
Peer Reviewed
See detailA Fair Power Splitting Algorithm for Simultaneous Wireless Information and Energy Transfer in CoMP Downlink Transmission
Liang, Kai; Zhao, Liqiang; Yang, Kun et al

in Wireless Personal Communications (2015), 85(4), 2687-2710

Abstract A power splitting approach for simultaneous wireless information and energy transfer is provided in this paper. We consider coordinated multipiont downlink transmission with M base stations (BSs ... [more ▼]

Abstract A power splitting approach for simultaneous wireless information and energy transfer is provided in this paper. We consider coordinated multipiont downlink transmission with M base stations (BSs) and J mobile stations (MSs). The main goal of this paper is to maximize per-MS data rate and receiving energy by dynamically optimizing transmitting beamformer. To improve fairness, this problem can be formulated to maximize the minimum rate of all J MSs with per-BS transmitting power constraints and per-MS receiving energy constraints, which is NP-hard problem. Minimum mean square error receiver, affine approximation and alternative convex optimization (ACO) methods are introduced to decompose the original NP-hard problem to several convex subproblems which can be solved by second-order cone programming with low rank (which is equal to the number of data streams) solutions, and then a fast heuristic algorithm is provided to solve the original problem. Numerical results show that the proposed algorithm can achieve fairness, and outperforms sum rate scheme in terms of fairness and outage probability. The fast convergency also demonstrates the proposed algorithm’s good performance. [less ▲]

Detailed reference viewed: 111 (3 UL)
Full Text
Peer Reviewed
See detailProtocols and Stability Analysis for Energy Harvesting TDMA Systems with/without Relaying
Ottersten, Björn UL; Krikidis, Ioannis; Zheng, Gan UL

in IEEE Global Telecommunications Conference (GLOBECOM) (2013, December)

Detailed reference viewed: 175 (2 UL)
Full Text
Peer Reviewed
See detailDetection of Pilot Contamination Attack Using Random Training and Massive MIMO
Kapetanovic, Dzevdan UL; Zheng, Gan UL; Wong, Kai-Kit et al

in IEEE Personal Indoor, Mobile and Radio Conference (PIMRC) 2013 (2013, September 09)

Channel estimation attacks can degrade the performance of the legitimate system and facilitate eavesdropping. It is known that pilot contamination can alter the legitimate transmit precoder design and ... [more ▼]

Channel estimation attacks can degrade the performance of the legitimate system and facilitate eavesdropping. It is known that pilot contamination can alter the legitimate transmit precoder design and strengthen the quality of the received signal at the eavesdropper, without being detected. In this paper, we devise a technique which employs random pilots chosen from a known set of phase-shift keying (PSK) symbols to detect pilot contamination. The scheme only requires two training periods without any prior channel knowledge. Our analysis demonstrates that using the proposed technique in a massive MIMO system, the detection probability of pilot contamination attacks can be made arbitrarily close to 1. Simulation results reveal that the proposed technique can significantly increase the detection probability and is robust to noise power as well as the eavesdropper’s power. [less ▲]

Detailed reference viewed: 194 (1 UL)
Full Text
Peer Reviewed
See detailHarvest-use cooperative networks with half/full-duplex relaying
Krikidis, I.; Zheng, Gan UL; Ottersten, Björn UL

in Wireless Communications and Networking Conference (WCNC), 2013 IEEE (2013)

Harvest-use (HU) is an energy harvesting (EH) architecture where the received energy cannot be stored and immediately must be consumed in order to maintain operability. Due to its current limited ... [more ▼]

Harvest-use (HU) is an energy harvesting (EH) architecture where the received energy cannot be stored and immediately must be consumed in order to maintain operability. Due to its current limited application interest, this architecture has not yet been examined in the literature and its deployment to communication system is an open problem. This paper deals with the application of HU architecture to communication systems and investigates cooperative protocols where the relay node has HU capabilities. We show that HU relaying introduces a trade-off between EH time and relaying (data communication) time; this trade-off is discussed for two fundamental relaying policies a) Amplify-and-forward (AF) with half-duplex (HD) relaying and b) AF with full-duplex (FD) relaying. The optimal time split is formulated as an optimization problem and an approximation is given in a closed form. Numerical results show that FD outperforms HD and is introduced as an efficient relaying policy for HU cooperative systems. [less ▲]

Detailed reference viewed: 222 (0 UL)
Full Text
Peer Reviewed
See detailCooperative Communications against Jamming with Half-Duplex and Full-Duplex Relaying
Zheng, Gan UL; Jorswieck, E.A.; Ottersten, Björn UL

in Vehicular Technology Conference (VTC Spring), 2013 IEEE 77th (2013)

This paper studies the impact of jamming on the design of three-node two-hop cooperative amplify-and-forward (AF) communications with both half-duplex and full-duplex relaying. For the half-duplex ... [more ▼]

This paper studies the impact of jamming on the design of three-node two-hop cooperative amplify-and-forward (AF) communications with both half-duplex and full-duplex relaying. For the half-duplex relaying, the jammer is smart such that it can optimally allocate jamming power between listening and forwarding phases. Given separate source and relay power constraints, we derive the optimal jamming power allocation; with a total source and relay power constraint, we model the interaction between the legitimate system and the jammer as a noncooperative game and prove the existence and uniqueness of the Nash Equilibrium (NE). It is found that due to the fact that the end performance is limited by the weaker phase, the legitimate systems tries to balance the performance of two phases while the jammer attacks the system by making the two hops imbalanced. While for the full-duplex relaying, we show that if the self-interference can be properly controlled, it can bring substantial performance gain. Simulation results verify our analysis. [less ▲]

Detailed reference viewed: 175 (0 UL)
Full Text
Peer Reviewed
See detailDetection of pilot contamination attack using random training and massive MIMO
Kapetanovic, D.; Zheng, Gan UL; Wong et al

in Personal Indoor and Mobile Radio Communications (PIMRC), 2013 IEEE 24th International Symposium on (2013)

Channel estimation attacks can degrade the performance of the legitimate system and facilitate eavesdropping. It is known that pilot contamination can alter the legitimate transmit precoder design and ... [more ▼]

Channel estimation attacks can degrade the performance of the legitimate system and facilitate eavesdropping. It is known that pilot contamination can alter the legitimate transmit precoder design and strengthen the quality of the received signal at the eavesdropper, without being detected. In this paper, we devise a technique which employs random pilots chosen from a known set of phase-shift keying (PSK) symbols to detect pilot contamination. The scheme only requires two training periods without any prior channel knowledge. Our analysis demonstrates that using the proposed technique in a massive MIMO system, the detection probability of pilot contamination attacks can be made arbitrarily close to 1. Simulation results reveal that the proposed technique can significantly increase the detection probability and is robust to noise power as well as the eavesdropper's power. [less ▲]

Detailed reference viewed: 183 (0 UL)
Full Text
Peer Reviewed
See detailImproving Physical Layer Secrecy Using Full-Duplex Jamming Receivers
Zheng, Gan UL; Krikidis, Ioannis; Jiangyuan, Li et al

in IEEE Transactions on Signal Processing (2013), 20(61), 4962-4974

This paper studies secrecy rate optimization in a wireless network with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper. This is an unfavorable scenario for secrecy ... [more ▼]

This paper studies secrecy rate optimization in a wireless network with a single-antenna source, a multi-antenna destination and a multi-antenna eavesdropper. This is an unfavorable scenario for secrecy performance as the system is interference-limited. In the literature, assuming that the receiver operates in half duplex (HD) mode, the aforementioned problem has been addressed via use of cooperating nodes who act as jammers to confound the eavesdropper. This paper investigates an alternative solution, which assumes the availability of a full duplex (FD) receiver. In particular, while receiving data, the receiver transmits jamming noise to degrade the eavesdropper channel. The proposed self-protection scheme eliminates the need for external helpers and provides system robustness. For the case in which global channel state information is available, we aim to design the optimal jamming covariance matrix that maximizes the secrecy rate and mitigates loop interference associated with the FD operation. We consider both fixed and optimal linear receiver design at the destination, and show that the optimal jamming covariance matrix is rank-1, and can be found via an efficient 1-D search. For the case in which only statistical information on the eavesdropper channel is available, the optimal power allocation is studied in terms of ergodic and outage secrecy rates. Simulation results verify the analysis and demonstrate substantial performance gain over conventional HD operation at the destination. [less ▲]

Detailed reference viewed: 192 (0 UL)
Full Text
Peer Reviewed
See detailCooperative cognitive networks: Optimal, distributed and low-complexity algorithms
Zheng, Gan UL; Song, Shenghui; Wong, Kai-Kit et al

in IEEE Transactions on Signal Processing (2013), 11(61), 2778-2790

This paper considers the cooperation between a cognitive system and a primary system where multiple cognitive base stations (CBSs) relay the primary user's (PU) signals in exchange for more opportunity to ... [more ▼]

This paper considers the cooperation between a cognitive system and a primary system where multiple cognitive base stations (CBSs) relay the primary user's (PU) signals in exchange for more opportunity to transmit their own signals. The CBSs use amplify-and-forward (AF) relaying and coordinated beamforming to relay the primary signals and transmit their own signals. The objective is to minimize the overall transmit power of the CBSs given the rate requirements of the PU and the cognitive users (CUs). We show that the relaying matrices have unity rank and perform two functions: Matched filter receive beamforming and transmit beamforming. We then develop two efficient algorithms to find the optimal solution. The first one has a linear convergence rate and is suitable for distributed implementation, while the second one enjoys superlinear convergence but requires centralized processing. Further, we derive the beamforming vectors for the linear conventional zero-forcing (CZF) and prior zero-forcing (PZF) schemes, which provide much simpler solutions. Simulation results demonstrate the improvement in terms of outage performance due to the cooperation between the primary and cognitive systems. [less ▲]

Detailed reference viewed: 157 (1 UL)
Full Text
Peer Reviewed
See detailFull-duplex cooperative cognitive radio with transmit imperfections
Zheng, Gan UL; Krkidis, I.; Ottersten, Björn UL

in IEEE Transactions on Wireless Communications (2013), 5(12), 2498-2511

In multi-relay cooperative systems, the signal at the destination is affected by impairments such as multiple channel gains, multiple timing offsets (MTOs), and multiple carrier frequency offsets (MCFOs ... [more ▼]

In multi-relay cooperative systems, the signal at the destination is affected by impairments such as multiple channel gains, multiple timing offsets (MTOs), and multiple carrier frequency offsets (MCFOs). In this paper we account for all these impairments and propose a new transceiver structure at the relays and a novel receiver design at the destination in distributed space-time block code (DSTBC) based amplify-and-forward (AF) cooperative networks. The Cramér-Rao lower bounds and a least squares (LS) estimator for the multi-parameter estimation problem are derived. In order to significantly reduce the receiver complexity at the destination, a differential evolution (DE) based estimation algorithm is applied and the initialization and constraints for the convergence of the proposed DE algorithm are investigated. In order to detect the signal from multiple relays in the presence of unknown channels, MTOs, and MCFOs, novel optimal and sub-optimal minimum mean-square error receiver designs at the destination node are proposed. Simulation results show that the proposed estimation and compensation methods achieve full diversity gain in the presence of channel and synchronization impairments in multi-relay AF cooperative networks. [less ▲]

Detailed reference viewed: 237 (2 UL)
Full Text
Peer Reviewed
See detailDistributed Multicell Beamforming Design Approaching Pareto Boundary with Max-Min Fairness
Huang, Yongming; Zheng, Gan UL; Bengtsson, Mats et al

in IEEE Transactions on Wireless Communications (2012), 11(8), 2921-2933

This paper addresses coordinated downlink beamforming optimization in multicell time division duplex (TDD) systems where a small number of parameters are exchanged between cells but with no data sharing ... [more ▼]

This paper addresses coordinated downlink beamforming optimization in multicell time division duplex (TDD) systems where a small number of parameters are exchanged between cells but with no data sharing. With the goal to reach the point on the Pareto boundary with max-min rate fairness, we first develop a two-step centralized optimization algorithm to design the joint beamforming vectors. This algorithm can achieve a further sum-rate improvement over the max-min optimal performance, and is shown to guarantee max-min Pareto optimality for scenarios with two base stations (BSs) each serving a single user. To realize a distributed solution with limited intercell communication, we then propose an iterative algorithm by exploiting an approximate uplink-downlink duality, in which only a small number of positive scalars are shared between cells in each iteration. Simulation results show that the proposed distributed solution achieves a fairness rate performance close to the centralized algorithm while it has a better sum-rate performance, and demonstrates a better tradeoff between sum-rate and fairness than the Nash Bargaining solution especially at high signal-to-noise ratio. [less ▲]

Detailed reference viewed: 184 (1 UL)
Full Text
Peer Reviewed
See detailPhysical Layer Security in Multibeam Satellite Systems
Zheng, Gan UL; Arapoglou, Pantelis-Daniel UL; Ottersten, Björn UL

in IEEE Transactions on Wireless Communications (2012), 11(2), 852-863

Security threats introduced due to the vulnerability of the transmission medium may hinder the proliferation of Ka band multibeam satellite systems for civil and military data applications. This paper ... [more ▼]

Security threats introduced due to the vulnerability of the transmission medium may hinder the proliferation of Ka band multibeam satellite systems for civil and military data applications. This paper sets the analytical framework and then studies physical layer security techniques for fixed legitimate receivers dispersed throughout multiple beams, each possibly surrounded by multiple (passive) eavesdroppers. The design objective is to minimize via transmit beamforming the costly total transmit power on board the satellite, while satisfying individual intended users' secrecy rate constraints. Assuming state-of-the-art satellite channel models, when perfect channel state information (CSI) about the eavesdroppers is available at the satellite, a partial zero-forcing approach is proposed for obtaining a low-complexity sub-optimal solution. For the optimal solution, an iterative algorithm combining semi-definite programming relaxation and the gradient-based method is devised by studying the convexity of the problem. Furthermore, the use of artificial noise as an additional degree-of-freedom for protection against eavesdroppers is explored. When only partial CSI about the eavesdroppers is available, we study the problem of minimizing the eavesdroppers' received signal to interference-plus-noise ratios. Simulation results demonstrate substantial performance improvements over existing approaches. [less ▲]

Detailed reference viewed: 319 (0 UL)
Full Text
Peer Reviewed
See detailRobust Monotonic Optimization Framework for Multicell MISO Systems
Björnson, Emil; Zheng, Gan UL; Bengtsson, Mats et al

in IEEE Transactions on Signal Processing (2012), 60(5), 2508-2523

The performance of multiuser systems is both difficult to measure fairly and to optimize. Most resource allocation problems are nonconvex and NP-hard, even under simplifying assumptions such as perfect ... [more ▼]

The performance of multiuser systems is both difficult to measure fairly and to optimize. Most resource allocation problems are nonconvex and NP-hard, even under simplifying assumptions such as perfect channel knowledge, homogeneous channel properties among users, and simple power constraints. We establish a general optimization framework that systematically solves these problems to global optimality. The proposed branch-reduce-and-bound (BRB) algorithm handles general multicell downlink systems with single-antenna users, multiantenna transmitters, arbitrary quadratic power constraints, and robust- ness to channel uncertainty. A robust fairness-profile optimization (RFO) problem is solved at each iteration, which is a quasiconvex problem and a novel generalization of max-min fairness. The BRB algorithm is computationally costly, but it shows better convergence than the previously proposed outer polyblock approximation algorithm. Our framework is suitable for computing benchmarks in general multicell systems with or without channel uncertainty. We illustrate this by deriving and evaluating a zero-forcing solution to the general problem. [less ▲]

Detailed reference viewed: 186 (2 UL)
Full Text
Peer Reviewed
See detailGeneric Optimization of Linear Precoding in Multibeam Satellite Systems
Zheng, Gan UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in IEEE Transactions on Wireless Communications (2012), 11(6), 2308-2320

Detailed reference viewed: 258 (19 UL)
Full Text
Peer Reviewed
See detailNon-regenerative Two-Hop Wiretap Channels using Interference Neutralization
Gerbracht, Sabrina; Jorswieck, Eduard A.; Zheng, Gan UL et al

in Information Forensics and Security (WIFS), 2012 IEEE International Workshop on (2012)

In this paper, we analyze the achievable secrecy rates in the two-hop wiretap channel with four nodes, where the transmitter and the receiver have multiple antennas while the relay and the eavesdropper ... [more ▼]

In this paper, we analyze the achievable secrecy rates in the two-hop wiretap channel with four nodes, where the transmitter and the receiver have multiple antennas while the relay and the eavesdropper have only a single antenna each. The relay is operating in amplify-and-forward mode and all the channels between the nodes are known perfectly by the transmitter. We discuss different transmission and protection schemes like artificial noise (AN). Furthermore, we introduce interference neutralization (IN) as a new protection scheme. We compare the different schemes regarding the high-SNR slope and the high-SNR power offset and illustrate the performance by simulation results. It is shown analytically as well as by numerical simulations that the high SNR performance of the proposed IN scheme is better than the one of AN. [less ▲]

Detailed reference viewed: 156 (0 UL)