DOI QR코드

DOI QR Code

Interference Cancellation Scheme for Three-hop Cooperative Relay Networks

  • Zhang, Yinghua (School of Computer and Communication Engineering, University of Science and Technology Beijing) ;
  • Wang, Lei (School of Computer and Communication Engineering, University of Science and Technology Beijing) ;
  • Liu, Jian (School of Computer and Communication Engineering, University of Science and Technology Beijing) ;
  • Peng, Yunfeng (School of Computer and Communication Engineering, University of Science and Technology Beijing)
  • Received : 2018.11.24
  • Accepted : 2019.03.25
  • Published : 2019.09.30

Abstract

In this paper, we focus on interference cancellation for three-hop cognitive radio networks (CRNs) over Rayleigh fading channels. In CRNs, secondary users (SUs) are allowed to opportunistically utilize the licensed spectrum during the idle time of primary users (PUs) to achieve spectrum sharing. However, the SUs maybe power constrained to avoid interference and cover a very short transmission range. We here propose an interference cancellation scheme (ICS) for three-hop CRNs to prolong the transmission range of SUs and improve their transmission efficiency. In the proposed scheme, a flexible transmission protocol is adopted to cancel the interference at both secondary relays and destinations at the same time. And a closed-form expression for the secondary outage probability over Rayleigh fading channels is derived to measure the system performance. Simulation results show that the proposed scheme can significantly reduce the secondary outage probability and increase the secondary diversity in comparison with the traditional cases.

Keywords

1. Introduction

 

In the past years, the development of the fifth generation (5G) mobile communications has captured the attention of researchers around world [1][2]. One of the evolving directions of 5G is to decrease the size of cells, which will significantly improve the cell throughput, energy efficiency and user data rate of cellular system [3]. Dense network deployment exhibits the above advantages, but produces a series of problems such as co-channel interference [4]. Interference becomes a major limiting factor for higher data rates [5]. Many new schemes have been proposed for interference cancellation [6][7].

With the development of 5G, cognitive radio (CR) technology is promising in improving spectral efficiency by allowing secondary users (SUs) to opportunistically utilize the licensed spectrum owned by primary users (PUs) [8]-[10]. Although licensed bands are heavily exploited, it has been shown that some licensed bands are underutilized. Cognitive radio allows SUs to dynamically utilize the underutilized licensed bands without causing harmful interference to PUs [11]-[13]. Generally, SUs operate in three kinds of paradigms, called interweave, overlay, and underlay, to exploit the licensed spectrum. Various aspects related to the spectrum sharing pattern have been addressed [14]-[16]. In [17], a transmission protocol has been proposed to enable SUs to utilize the licensed spectrum detected as unoccupied. The interweave spectrum sharing paradigm appears to be more sensitive to the spectrum sensing errors, which leads to low secondary transmission efficiency [18]. To overcome the disadvantages of interweave spectrum sharing, underlay spectrum sharing has been adopted, which permits SUs to utilize the licensed spectrum regardless of PU traffic patterns [19]. Different from the interweave paradigm, SUs transmit signals as long as the interference to PUs does not exceed a given threshold. The secondary transmission performance of two-hop decode-and-forward (DF) relaying under the underlay paradigm is measured by the secondary outage probability in [20]. However, there are still several problems to be solved due to the limited secondary transmission power. For example, the effective distance in environments with high path loss should be reduced and the transmission coverage area should be expanded [21].

As a result, several studies have been carried out to use multi-hop relays to enhance the performance of CRNs [22][23]. Multi-hop communication systems effectively extend the transmission range and increase the quality of service (QoS) of relay networks [24][25].

However, with the increase of the number of relay hops, the quality of signal transmission may be reduced [26][27]. Many conventional transmission protocols, such as interference cancellation (IC), relay selection, and data equalization, have been utilized in traditional CRNs to reduce the interference of primary users and improve the secondary transmission performance [28]-[30]. The IC-based underlay CRNs are considered in [17] and [20], where the single-hop and two-hop transmissions are studied. In [31], the author derives a cooperative outage probability model and a cooperative block error rate (BLER) model to mitigate co-channel interference and improve the system performance. Recently, [32] investigates an interference cancellation method when there are two interferences simultaneously, in which a system model was established to analyze the interference cancellation performance. 

Different from [17] and [20], we propose an IC-based three-hop cognitive transmission scheme, which is more flexible for the underlay paradigm. This three-hop model is the simplest and most typical model for multi-hop transmission. Taking into account the actual signal transmission range and direct transmission distance in the cell, we investigate the performance of a cognitive radio system, consisting of a single secondary transmitter (ST), a single secondary destination (SD), and two relay clusters, i.e., three hops that assist the ST to transmit signals to the SD. Our main contributions can be summarized in two-folds. 

In this paper, we expand the secondary transmission range and improve the secondary transmission performance. Specifically, we use a simplified system model and utilize the secondary outage probability to measure the performance of the secondary system. Under the strict power constraints, we propose a three-phase interference cancellation scheme (ICS), which can expand the transmission range and improve the performance of the secondary system. The ICS aims at promoting the QoS of secondary transmission measured by secondary tage probability. Note that our scheme enables more flexible relay selection with lower secondary outage probability in comparison with traditional cases [17] [20]. 

Based on the interpretation of ICS for underlay communication system, we derive the closed-form expression for outage probability over Rayleigh fading channels. Then we conduct the simulations and demonstrate the superiority of the performance analysis by using Monte Carlo methods. The improved system achieves better secondary performance than that of [20] due to the flexible protocol. 

The remainder of this paper is organized as follows: In section 2, we present an overview of the system model and propose the protocol for three-hop relay system in this paper, while in section 3 we provide the analytical results on the performance in terms of secondary outage probability and then derive the closed-form expressions of the system performance. In section 4, we provide the numerical and simulation results, while in section 5 we draw the conclusions.

 

2. System Protocol

We consider a cognitive radio system with the coexistence of primary and secondary networks, as shown in Fig. 1. In the primary networks, primary transmitter PT delivers signals to primary destination PD. In the secondary network, a secondary transmitter ST forwards its signal towards secondary destination SD, while a route of clusters i SR assisting ST data transmission to SD.

 

Fig. 1. System model of ICS scheme

Relay cluster i SR includes N single-antenna half-duplex relay node and decode-and-forward protocol is considered throughout this correspondence. As can be observed from Fig. 1, primary and secondary networks would affect each other. The  transmit power of ST should be limited for reducing the interference to PD in order to guarantee the QoS of primary transmissions measured by primary outage probability performance. We assume that all the channels are modeled as independent Rayleigh flat fading. We let  denote fading coefficient channel from A to B with fading variance. Denote that H \((H \in\{P T, S T, S R\})\) transmits \(x_H\) to the destination with data rates \(R\) , \(R_A\) and \(R_B\) represent as the data rate of ST and PT. The transmit power of H is  Watts/Hz. \(n_K\)  \((K \in\{S R, S D, P D\})\) respect the additive white Gaussian noise (AWGN).

 

Fig. 2. Transmission process of ICS

In this paper, we assumed that ST operates in a time division multiple access fashion, where each medium access control frame consists of three consecutive transmission phases denoted by \(t_1\) , \(t_2 \) and \(t_3\) . As shown in Fig. 2, we propose a decoding strategy and it can be described as follows: For the first time slot, primary transmitter PT sends data \(x_{PT}\) to primary destination PD, in the meanwhile, secondary transmitter ST send data \(x_{ST}\) to secondary destination SD. As is shown in Fig. 1, primary and secondary networks would affect each other. For the primary receiver, it would suffer interference from both the ST and secondary relay clusters. The secondary relays and secondary receiver are mainly interfered by PT. In order to ensure the QoS of primary transmissions, the transmit power of ST are required to be limited. Then, all relays attempt to decode the signal \(x_{ST}\) by utilizing the proposed IC-based decoding technique. At first, \(SR_1\) directly decodes \(x_{ST}\) from the original received signal in \(t_1\) . If decoding fails, \(SR_1\) will start the interference mechanism that decode \(x_{PT}\) and eliminate the interference component on \(x_{PT}\) . In this case, SR will use the interference cancelled signal to decode \(x_{ST}\) again. We make the best decoding set for the relays that utilize the improved interference cancellation and decode the signal successfully. At the same time, SD attempts to decode \(x_{PT}\) using the received signal, and if decoding is successful, \(SR_1\) removes the interference component of \(x_{PT}\) from the original received data.

For the second time slot, if the optimal decoding set of \(SR_2\) is not empty, then \(SR_{1-best}\) is selected to participate in the cooperative transmission. \(SR_2\) uses the same interference cancellation mechanism as \(SR_1\) . Otherwise, there is no relay could decode the signal successfully in the first phase, ST delivers signal towards \(SR_2\) , while ST transmits the signal to SD in the second time slot.

In the third time slot, SD starts with perception, \(SR_2\) will send data to SD if there are optimal decoding set of \(SR_2\) , simultaneously, the best relay \(SR_{2-best}\) − will be chosen to assist transmit data to SD. Otherwise, \(SR_1\) or ST transmit the signal towards SD. Finally, SD try to decode \(x_{PT}\) by using the received signal and removes the interference component of \(x_{PT}\) . Then SD performs the maximum ratio combining (MRC) technique to combine the transmission signals in three time slots and perform the final decoding.

 

3. System Modeling

The improved protocol has been described in section 2, the signals accepted at PD, 1 SR and SD during the first time slot can be respectively expressed as:

 

\(y_{P D}(1)=\sqrt{E_{P T}} h_{P T-P D} x_{P T}(1)+\sqrt{E_{S T}} h_{S T-P D} x_{S T}+n_{P D}(1)\)       (1)

 

\(y_{S R 1}(1)=\sqrt{E_{S T}} h_{S T-S R 1} x_{S T}+\sqrt{E_{P T}} h_{P T-S R 1} x_{P T}+n_{S R 1}(1)\)       (2)

 

\(y_{s D}(1)=\sqrt{E_{s T}} h_{s T-s o} x_{s T}+\sqrt{E_{P T}} h_{P T-s T} x_{P T}+n_{s 0}(1)\)       (3)

 

Where superscript 1 means the first transmission time slot. \(E_{PT}\) and \(E_{ST}\) represents the transmission power of PT and ST respectively. The improved Interference elimination mechanism is used to eliminate \(y_{PD}(1)\) from original signal \(y_{SR1}(1)\)and \(Y_{SD}(1)\) respectively. Signal after interference cancellation can be rewritten as:

 

\(y_{\mathrm{srl}}^{\mathrm{l}}(1)=\sqrt{E_{s \tau}} h_{s \tau-\mathrm{ss}_{1} x_{\mathrm{s}}+n_{\mathrm{sgn}}(1)}\)       (4)

 

\(y_{s o}^{1}(1)=\sqrt{E_{s T}} h_{s r-s o} x_{s T}+n_{s 0}(1)\)       (5)

 

Fig. 3. Second network transmission of \(t_2\)

As can be shown in Fig. 3, there are two situations of transmission situation depending on whether SR1 can successfully decode the signals. In other words, two possible process rely on whether best decoding set \(\Theta_{1}\) exist. We use \(\Omega_1\)represent best decoding set and \(\Xi\) represent empty set. \(\Theta_{1}\) = \(\Xi_1\) denote that all relays fails to decode signals and \(\Theta_{1}\)\(\Omega_1\) indicates that more than one relay within \(\Omega_1\) decode the signals successfully. Once the case \(\Theta_{1}\) = \(\Xi_1\) occurs, ST will retransmit the signal to \(SR_2\) during the second time slot. In this situation, the signal received at PD, SD and \(SR_2\) in \(t_2\) can be respectively described as:

 

\(y_{P D}(2)=\sqrt{E_{P T}} h_{P T-P D} x_{P T}(2)+\sqrt{E_{S T}} h_{S T-P D} x_{S T}+n_{P D}\)       (6)

 

\(y_{S D}(2)=\sqrt{E_{S T}} h_{S T-S D} x_{S T}+\sqrt{E_{P T}} h_{P T-S D} x_{P T}+n_{S D}\)       (7)

 

\(y_{\mathrm{sp} 2}(2)=\sqrt{E_{S T}} h_{S T-S R 2} x_{S T}(2)+\sqrt{E_{P T}} h_{P T-\operatorname{se} 2} x_{P T}+n_{S R 2}\)       (8)

 

where the superscript 2 denotes the second transmission time slot. The received signal which adapts the interference elimination is written as:

 

\(y_{P D}^{1}(2)=\sqrt{E_{S T}} h_{S T-S D} x_{P T}(2)+n_{S D}(2)\)       (9)

 

\(y_{\operatorname{SR} 2}^{1}(2)=\sqrt{E_{S T}} h_{S T-S R 2^{2}} x_{S T}(2)+n_{S R 2}(2)\)       (10)

 

\(y_{S D}^{1}(2)=y_{S D}^{1}(2)=\sqrt{E_{S T}} h_{S T-S D} x_{S T}+n_{S D}(2)\)       (11)

 

In another case, once \(\Theta_{1}\)\(\Omega_1\) occurs, the best relay will be chosen to assist to transmit the data to SD in \(t_2\) , the received signals of PD, SD and \(SR_2\) in \(t_2\) can be expressed as:

 

\(y_{s o}(2)=\sqrt{E_{s T}} h_{s r-s p} x_{s T}+\sqrt{E_{p T}} h_{p \tau-s o} x_{p \tau}+n_{s D}(2)\)       (12)

 

\(y_{\operatorname{sen} 2}(2)=\sqrt{E_{\mathrm{sga} 1}} h_{\mathrm{spl}-\mathrm{sg}_{2}} x_{\mathrm{sT}}(2)+\sqrt{E_{p T}} h_{p \tau-\mathrm{sR} 2} x_{\mathrm{PT}}+n_{\mathrm{sR} 2}\)       (13)

 

Fig. 4. Secondary network transmission of 3t

Fig. 4 shows secondary transmission during the third time slot, and there are still two situations which depends on whether \(\Theta_2\) is an empty set. If it is an empty set, \(SR_1\) or ST will deliver signal towards SD depending on whether \(SR_1\) can utilize IC-based relay selection scheme to decode signals.

Case 1: This happens only \(SR_1\) is empty set ( \(\Theta_{1}\) = \(\Xi_1\) ), the signals received at PD and SD can be shown as:

 

\(y_{P D}(3)=\sqrt{E_{P T}} h_{P T-P D} x_{P T}(3)+\sqrt{E_{S T}} h_{S T-P D} x_{S T}+n_{P D}(3)\)       (16)

 

\(y_{s D}(3)=\sqrt{E_{s T}} h_{s T-s 0} x_{S T}+\sqrt{E_{P T}} h_{P T-s D} x_{P T}+n_{S D}(3)\)       (17)

 

Similar to the second time slot, SD get the signal after interference cancellation is shown as:

 

\(y_{S D}^{\mathrm{I}}(3)=\sqrt{E_{S T}} h_{S T-S D} x_{S T}+n_{\mathscr{S D}}(3)\)       (18)

 

Case 2: If 1 SR successfully decode the signal by taking IC-based protocol, the signal received at PD and SD can be derived as:

 

\(y_{P D}(3)=\sqrt{E_{P T}} h_{P T-P D} x_{P T}(3)+\sqrt{E_{S R 1}} h_{S R 1-P D} x_{S R 1}+n_{P D}\)       (19)

 

\(y_{S D}(3)=\sqrt{E_{S R 1}} h_{S R 1-S D} x_{S T}+\sqrt{E_{P T}} h_{P T-S D} x_{P T}+n_{S D}\)       (20)

 

After interference cancellation, signal received at SD is given as follows:

 

\(y_{s p}^{1}(3)=\sqrt{E_{s R 1}} h_{s s n-s o} x_{s T}+n_{s 0}(3)\)       (21)

 

Eventually, SD adapts MRC to combine the signals received in \(t_1 \) , \(t_2\) and \(t_3\) . We assume that if the signal interference cannot be eliminated at SD, we will use the original received signal for MRC combining. Better secondary outage probability could be expected due to using the improved interference elimination scheme at both SD and PD. 

In fact, we can think of this as a transmission process in multi-hop transmission. When the signal is transmitted to the Nth trunk group, the above relay selection will be performed until the signal is transmitted to the N+2 relay. So the three-hop interference cancellation model is the simplest form of the multi-hop model.

 

4. Analysis of Secondary Outage Probability

The case corresponds to the relays in best decoding set being accessible during the first time slot, i.e.

 

\(C_{S T-S R 1}=\frac{1}{3} \log _{2}\left(1+\frac{\gamma_{s T}\left|h_{S T-S R 1}\right|^{2}}{\gamma_{P T}\left|h_{P T-S R 1}\right|^{2}+1}\right)\)        (22)

 

And achievable data rates can be expressed as:

 

\(C_{P T-S R 1}=\frac{1}{3} \log _{2}\left(1+\frac{\gamma_{P T}\left|h_{P T-\operatorname{se} 1}\right|^{2}}{\gamma_{S T}\left|h_{S T-S R 1}\right|^{2}+1}\right)\)       (23)

 

Notice that fading factors \(\left|h_{S T-S R 1}\right|^{2}\) and \(\left|h_{P T} \cdot \operatorname{sR1}\right|^{2}\) are independent and follow the exponential distributions with parameters \(\frac{1}{\sigma_{S T-S R 1}^{2}}\) and \(\frac{1}{\sigma_{P T-S R 1}^{2}}\)respectively. As can be shown from (22), accessible data rate at SR1 can be shown as:

 

\(C_{s r s m}^{l C S}=\frac{1}{3} \log _{2}\left(1+\gamma_{s T}\left|h_{s T-s R 1}\right|^{2}\right)\)      (24)

 

\(SR_1\) can successfully deliver the data \(x_s\) by direct decoding or ICS-based decoding. The occurrence probability of \(SR_1\) successfully decode data \(x_s\) during \(t_1 \) can be expressed as:

 

\(\begin{aligned} P_{S R 1} &=\operatorname{Pr}\left\{C_{S T-S R 1} \geq R_{A}\right\}+\operatorname{Pr}\left\{C_{S T-S R 1}     (25)

 

Therefore, we can utilize the table of exponential distribution to calculate the approximate detection probability, that is

 

\(a_{1}=\frac{\gamma_{s T} \sigma_{s T-s R 1}^{2}}{\gamma_{S T} \sigma_{S T-S R 1}^{2}} \exp \left(-\frac{\Delta_{A}}{\gamma_{S T} \sigma_{S T-S R 1}^{2}}\right)\)       (26)

 

\(a_{2}=\frac{\Delta_{A} \gamma_{P T} \sigma_{P T-S R 1}^{2}}{\Delta_{A} \gamma_{P T} \sigma_{P T-S R 1}^{2}+\gamma_{S T} \sigma_{S T-S R 1}^{2}} \exp \left(\frac{1}{\gamma_{P T} \sigma_{P T-S R 1}^{2}}-\frac{\Psi}{\gamma_{S T} \sigma_{P T-S R 1}^{2}}-\frac{\Psi}{\Delta_{A} \gamma_{P T} \sigma_{P T-S R 1}^{2}}\right)\)       (27)

 

\(a_{3}=\frac{\gamma_{p \tau} \sigma_{p-5 R 1}^{2}}{\gamma_{p T} \sigma_{p T-s p 1}^{2}+\Delta_{B} \gamma_{p T} \sigma_{s T-s R 1}^{2}} \exp \left(-\frac{\Delta_{B}}{\gamma_{P T} \sigma_{p T-s R 1}^{2}}-\frac{\Delta_{A}}{\gamma_{s T} \sigma_{S T-s R 1}^{2}}-\frac{\Delta_{A} \Delta_{B}}{\gamma_{P T} \sigma_{P T-S R 1}^{2}}\right)\)       (28)

 

\(a_{4}=\frac{\gamma_{p_{7}} \sigma_{p_{T-S R 1}}^{2}}{\gamma_{p_{T}} \sigma_{p_{T-S R 1}}^{2}+\Delta_{B} \gamma_{S T} \sigma_{S T-S R 1}^{2}} \exp \left(-\frac{\Delta_{B}}{\gamma_{p T} \sigma_{P T-S R 1}^{2}}-\frac{\Psi}{\gamma_{S T} \sigma_{S T-S R 1}^{2}}-\frac{\Psi_{\Delta_{B}}}{\gamma_{P T} \sigma_{P T-S R 1}^{2}}\right)\)       (29)

 

Where \(\Delta_{A}=2^{2 R_{A}}-1, \Delta_{B}=2^{2 R_{s}}-1\) and \(\Psi=\frac{\Delta_{A}\left(1+\Delta_{B}\right)}{1-\Delta_{A} \Delta_{B}}\)
.

During the second time slot, the detection probability of that \(SR_2\) can successfully decode \(x_s\) during \(t_2\) is expressed as:

 

\(P_{S R 2}=\operatorname{Pr}\left\{C_{S T-S R 2} \geq R_{A}\right\}+\operatorname{Pr}\left\{C_{S T-S R 2}       (30)

 

Therefore, the occurrence probabilities of the case that both of \(SR_1\) and \(SR_2\) cannot decode the data correctly can be shown as:

 

\(P C_{\Xi}^{I C S}=\prod_{i=1}^{N} \prod_{j=1}^{M}\left(1-P_{S R_i}\right)\left(1-P_{S R_{j}}\right)\)       (31)

 

And the probability of a link can be expressed as:

 

\(P C_{\Omega}^{l \mathcal{C S}}=\prod_{i \in \Omega_{i}}\left(P_{S R_{i}}\right) \prod_{k \in \Omega_{i}}\left(1-P_{S R_{k}}\right) \prod_{i=1}^{N}\left(1-P_{S R_{i}}\right)+\prod_{j \in \Omega_{2}}\left(P_{S R_{j}}\right) \prod_{v \in \mathbb{R}_{2}}\left(1-P_{S R_{v}}\right)\)       (32)

 

Where \(\overline{\Omega_{1}}\) and \(\overline{\Omega_{2}}\) is the complementary set of \(\Omega_1\) and \(\Omega_2\) respectively. After applying the Interference elimination mechanism at SR and SD, interference from PT can be fully suppressed. From (7), the achievable data rate between PT and ST in \(t_1 \) is given as:

\(C_{S 0}^{P T}=\log _{2}\left(1+\frac{\Upsilon_{P T}\left|h_{P T-S D}\right|^{2}}{\Upsilon_{S T}\left|h_{S T-S D}\right|^{2}+1}\right)\)

According to section 2, if \(\Theta = \Xi\) occurs, there are two situations depending on whether ST could decode the data by ICS or not. If SD fails to use ICS to decode the data, the secondary achievable data rate is shown as \(C_{S 0,1}^{I C S}=\log _{2}\left(1+\frac{3 \Upsilon_{S T}\left|h_{S T-S D}\right|^{2}}{\Upsilon_{P T}\left|h_{P T-S D}\right|^{2}+1}\right)\), otherwise, the achievable data rate is \(C_{S 0,2}^{I C S}=\log _{2}\left(1+3 \Upsilon_{S T}\left|h_{S T-S D}\right|^{2}\right)\). Then the outage probability of the case \(\Theta=\Xi\) should be calculated as: 

 

\(\text { Pout }_{\Xi}=\operatorname{Pr}\left\{C_{S 0,1}^{I C S}     (33)

 

For convenience, we define \(X_{1}=\gamma_{S T}\left|h_{S T-S D}\right|^{2}\) and \(X_{3}=\gamma_{p T}\left|h_{P T-s D}\right|^{2}\), the above formula can be written as

 

\(\text { Pout }_{\Xi}=\operatorname{Pr}\left\{\frac{1}{3} \log _{2}\left(1+\frac{3 X_{1}}{X_{3}+1}\right)       (34)

 

When \(\Delta_{A} \Delta_{B}<3\)

 

\(\text { Pout }_{\Xi}=\int_{0}^{\Delta_{s}} \int_{0}^{\frac{\Delta_{t}\left(x_{j}+1\right)}{3}} f\left(x_{1}\right) f\left(x_{3}\right) d x_{1} d x_{3}+\int_{x}^{\Delta_{s}} \int_{x_{1}-1}^{\frac{\Delta_{i}\left(x_{j}+1\right)}{3}} f\left(x_{1}\right) d x_{1} d x_{3}+\int_{0}^{\frac{\Delta_{i}}{3}} \int_{\left(x_{i}+1\right) \Delta_{j}}^{\infty} f\left(x_{i}\right) f\left(x_{3}\right) d x_{1} d x_{3}\)      (35)

 

When \(\Delta_{A} \Delta_{B} \geq 3\) 

 

\(\text { Pout }_{\Xi}=\int_{0}^{\Delta_{a}} \int_{0}^{\frac{\Delta_{i}\left(x_{i}+1\right)}{3}} f\left(x_{1}\right) f\left(x_{3}\right) d x_{1} d x_{3}+\int_{\Delta_{s}}^{\infty} \int_{\frac{\Delta_{i}\left(x_{i}+1\right)}{3}}^{\frac{x_{i}}{x}-1} f\left(x_{1}\right) f\left(x_{i}\right) d x_{1} d x_{3}+\int_{0}^{\frac{\Delta_{i}}{3}} \int_{\left(x_{i}+1\right) \Delta_{g}}^{\infty} f\left(x_{i}\right) f\left(x_{3}\right) d x_{i} d x_{3}\)       (36)

 

where  \(f\left(x_{1}\right)=\frac{1}{\gamma_{s T} \sigma_{s T-s D}^{2}} \exp \left(-\frac{x_{1}}{\gamma_{s T} \sigma_{s T-s D}^{2}}\right), f\left(x_{3}\right)=\frac{1}{\gamma_{p_{T}} \sigma_{P T-s D}^{2}} \exp \left(-\frac{x_{3}}{\gamma_{p_{T}} \sigma_{p T-s 0}^{2}}\right), \kappa=\frac{\Delta_{B}\left(3+\Delta_{A}\right)}{3-\Delta_{A} \Delta_{B}}\).

 

On the other hand, when \(\Theta=\Omega\) occurs, the achievable data rate between ST and SD has four possible situations as given in Table 1. For simplicity, we define \(X_{1}=\gamma_{S T}\left|h_{S T-S D}\right|^{2}\) ,\(X_{2}=\max _{t \in \Omega_{N}} \gamma_{S R_{2}}\left|h_{S R_{2}-S D}\right|^{2}\)\(X_{2}=\max _{t \in \Omega_{N}} \gamma_{S R_{2}}\left|h_{S R_{2}-S D}\right|^{2}\). The achievable data rate between \(SR_2\) and \(SD\) can be shown as \(C_{S 0,2}^{P T}=\log _{2}\left(1+\frac{X_{3}}{X_{2}+1}\right)\).

 

Table 1. Secondary achievable rates of four cases
Therefore, the secondary outage probability conditioned on that case Θ=Ω occurs can be calculated as:

 

\(\begin{aligned} \text {Pout}_{\Omega} &=\operatorname{Pr}\left\{C_{S T-S D}^{I C S, C 1}        (37)


The above formulation can be calculated as :

 

\(\begin{aligned} &\text { Pout }_{\Omega}=\operatorname{Pr}\left\{\frac{2 X_{1}+X_{2}}{X_{3}+1}<\Delta_{A}, \frac{X_{3}}{X_{1}+1}<\Delta_{B}, \frac{X_{3}}{X_{2}+1}<\Delta_{B}\right\}\\ &+\operatorname{Pr}\left\{2 X_{1}+\frac{X_{2}}{X_{3}+1}<\Delta_{A}, \frac{X_{3}}{X_{1}+1} \geq \Delta_{B}, \frac{X_{3}}{X_{2}+1}<\Delta_{B}\right\}\\ &+\operatorname{Pr}\left\{X_{2}+\frac{2 X_{1}}{X_{3}+1}<\Delta_{A}, \frac{X_{3}}{X_{1}+1}<\Delta_{B}, \frac{X_{3}}{X_{2}+1} \geq \Delta_{B}\right\}\\ &+\operatorname{Pr}\left\{2 X_{1}+X_{2}<\Delta_{A}, \frac{X_{3}}{X_{1}+1} \geq \Delta_{B}, \frac{X_{3}}{X_{2}+1} \geq \Delta_{B}\right\}\\ &=P_{1}+P_{2}+P_{3}+P_{4} \end{aligned}\)        (38)

 

According to the above integral area, when \(\Delta_{A} \Delta_{B} \geq 3\) , we can get the following calculation process of \(P_1\)

 

\(\begin{aligned} P_{1} &=\int_{0}^{\Delta_{s}} \int_{0}^{\frac{\Delta_{A}\left(x_{1}+1\right)}{2}} \int_{0}^{\left(x_{1}+1\right) \Delta_{A}-2 x_{1}} f\left(x_{1}\right) f\left(x_{2}\right) f\left(x_{3}\right) d x_{1} d x_{2} d x_{3} \\ &+\int_{\Delta_{B}}^{g} \int_{\frac{x_{1}}{\Delta_{p}}-1}^{\left(x_{1}+1\right) \Delta_{A}-2\left(\frac{x_{3}}{\Delta_{q}}-1\right)} \int_{\frac{x_{1}}{\Delta_{s}}}^{\left.\frac{1}{2}\left[x_{3}+1\right) \Delta_{A}-x_{2}\right]} f\left(x_{1}\right) f\left(x_{2}\right) f\left(x_{2}\right) d x_{1} d x_{2} d x_{2} \end{aligned}\)       (39)

 

where \(\vartheta=\frac{\Delta_{A} \Delta_{B}+3 \Delta_{B}}{3-\Delta_{A} \Delta_{B}}\)

When \(\Delta_{A} \Delta_{B}<3\) , the calculation is as follows:

 

\(\begin{aligned} P_{1} &=\int_{0}^{\Delta_{B}} \int_{0}^{\frac{\Delta_{A}\left(x_{3}+1\right)}{2}} \int_{0}^{\left(x_{3}+1\right) \Delta_{A}-2 x_{1}} f\left(x_{1}\right) f\left(x_{2}\right) f\left(x_{3}\right) d x_{1} d x_{2} d x_{3} \\ &+\int_{\Delta_{B}}^{\infty} \int_{\frac{x_{3}}{\Delta_{B}}-1}^{\left(x_{3}+1\right) \Delta_{A}-2\left(\frac{x_{3}}{\Delta_{B}}-1\right)} \int_{\frac{x_{3}}{\Delta_{B}}}^{\frac{1}{2}\left[\left(x_{3}+1\right) \Delta_{A}-x_{2}\right]} f\left(x_{1}\right) f\left(x_{2}\right) f\left(x_{3}\right) d x_{1} d x_{2} d x_{3} \end{aligned}\)       (40)

 

where \(f\left(x_{1}\right)=\frac{1}{\gamma_{s T} \sigma_{s T-s D}^{2}} \exp \left(-\frac{x_{1}}{\gamma_{s T} \sigma_{s T-s D}^{2}}\right)\),\(f\left(x_{2}\right)=\frac{1}{\gamma_{S R} \sigma_{S R-S D}^{2}} \exp \left(-\frac{x_{2}}{\gamma_{S R} \sigma_{S R-S D}^{2}}\right)\)\(f\left(x_{3}\right)=\frac{1}{\gamma_{P T} \sigma_{P T-S D}^{2}} \exp \left(-\frac{x_{3}}{\gamma_{P T} \sigma_{P T-S D}^{2}}\right)\).

The remaining probability calculation formula is similar, and the calculation process is no longer described in the text, which will be explained in detail in the appendix.

Therefore, the outage probability of system can be calculated as:

 

\(\text { Pout }=\text { Pout }_{\Omega} * P C_{\Omega}^{I C S}+\text { Pout }_{\Xi}^{*} P C_{\Xi}^{I C S}\)        (41)

 

In fact, we describe the simplest model of multi-hop under the proposed interference cancellation scheme. This dual relay transfer scheme is also the selection and transfer mode of any two adjacent relays in multi-hop model. However, considering the restriction of direct link connection and system complexity, we do not specifically analyze the N-hop model. Moreover, the transmission range of dense cells is getting smaller and smaller under the 5G background, and excessively increasing the number of multi-hop is not constructive to the job of improving transmission efficiency.

 

5. Simulation and Analysis

In this section, we evaluate the proposed information cancellation scheme and show the superiority of proposed scheme by simulations. Note that all the simulation results are for independent Rayleigh flat fading. We consume that each secondary relay clusters insist of two relays. For the sake of simplicity, we assume that \(\sigma_{P T-S R}^{2}=\sigma_{P T-S D}^{2}=0.2\) ,  \(\sigma_{P T-P D}^{2}=\sigma_{S T-S D}^{2}=\sigma_{S T-S R_{1}}^{2}=\sigma_{S R_{1}-S R_{2}}^{2}=\sigma_{S R_{2}-S D}^{2}=1\)\(\sigma_{s T-P D}^{2}=\sigma_{s R-P D}^{2}, R_{A}=0.2\) and \(R_{B}=0.4\).

 

Fig. 5. Secondary outage probability versus γ0

First, Fig. 5 shows the secondary outage probability versus \(\gamma 0\left(E_{0} / \sigma_{0}^{2}\right)\) under different kinds of settings for traditional scheme and improved scheme. Note that \(\text{pout}^{Tra}\) denotes the secondary outage probability with single-relay cluster, \(\text{pout}^{Pro2}_{S0}\) and \(\text{pout}^{Pro2_{sim}}_{S0}\) respectively represent the theoretical and simulated values of the secondary outage probability for dual-relay scheme. Similarly, \(\text{pout}^{Pro2}_{S0}\) and \(\text{pout}^{Pro2_{sim}}_{S0}\) represent theoretical and simulated values for single-relay network. The lower corner 1 denotes \(\sigma_{S T-P D}^{2}=\sigma_{S R-P D}^{2}=0.2\) and
\(R_{s}=0.2 b i t s / s / H z\) , the lower corner 2 denotes \(\sigma_{S T-P D}^{2}=\sigma_{S R-P D}^{2}=0.4\) and \(R_{S}=0.2 \text { bits } / \mathrm{s} / \mathrm{Hz}\) and the lower corner 3 denotes \(\sigma_{s T-P D}^{2}=\sigma_{S R-P D}^{2}=0.2\) and \(R_{S}=0.4 \text {bits} / s / H z\) . As expressed by
following formula, dual-relay scheme adopts the same dual secondary power constraint as single-relay scheme. \(T_0\) denotes the preset threshold ordered by primary networks. As shown in Fig. 5, proposed scheme significantly reduces the secondary outage probability compared with traditional scheme because of power constraint and interference cancellation scheme. What’s more, compared with the scheme with single-relay, the improved system in this paper reduces the outage probability due to the flexible relay selection scheme. The power constraint of secondary network is the dominant factor that affects the secondary outage probability in low \(\gamma_0\) area. As the \(\gamma_0\) increases, the secondary outage probability will maintain a steady trend owning to the fact that the QoS requirement of primary network, which become the main reason for SU transmit power constraint in high \(\gamma_0\) regime. It is important to note that, when \(\gamma_0\le-2\) , the trend of the two curves for the improved scheme remains the same, then the downward trend of the two curves changes due to the power limitation and channel variance. As can be seen, the gap between the two curves in the same scheme in terms of outage probability increases as the channel variance increases.

 

\(\begin{aligned} &E_{S T}=\min \left(E_{S T}^{T n a}, E_{S T, T h r}\right)\\ &E_{S R}=\min \left(E_{S R}^{T r a}, E_{S R, T h r}\right) \end{aligned}\)       (42)

 

\(\begin{aligned} &E_{S T}^{T r a}=E_{P T} \sigma_{P T-P D}^{2} \max \left(\frac{1}{1-T_{0}} e^{\frac{\Delta_{B}}{\gamma \sigma_{T-P D}}}-1,0\right) /\left(\Delta_{B} \sigma_{S T-P D}^{2}\right)\\ &E_{S R}^{T r a}=E_{P T} \sigma_{P T-P D}^{2} \max \left(\frac{1}{1-T_{0}} e^{\frac{\Delta_{B}}{\gamma \sigma_{P \tau-P D}^{2}}}-1,0\right) /\left(\Delta_{B} \sigma_{S R-P D}^{2}\right) \end{aligned}\)        (43)

 

Fig. 6. Secondary outage probability versus \(\gamma_{PT}\)

In Fig. 6 we study the impact of \(\gamma _{PT}\) on the secondary outage probability by comparing the conventional scheme and improved scheme. \(T_0\) denotes the preset threshold ordered by primary networks. It is noteworthy that upon raising the number of \(\gamma _{PT}\) up to about 18, the system performance degrades as expected in terms of secondary outage probability due to interference from PT. However, comparing with conventional scheme, the decline of secondary outage probability of improved scheme is more obvious because of the IC-based relay selection scheme. Concerning the multi-hop based on ICS, we compared the improved three-hop scheme with two-hop scheme, as can be shown in the Fig. 6, the three-hop scheme can achieve lower secondary outage probability. Note that more flexible IC-based relay selection scheme could ensure the reliability of secondary transmission link and improve the effect of secondary transmission in the system model. In low \(\gamma _{PT}\) regions, the secondary outage probability is equal to 1, which due to the fact that the secondary transmission are not permitted in order to ensure the PU QoS when \(\gamma _{PT}\) is low. The higher is \(\gamma _{PT}\) , the lower is the secondary outage probability, due to the fact that more available transmit power is allowed in secondary system. Moreover, in order to evaluate the impact of numbers of relays on the secondary system performance, we calculate the system performance in terms of secondary outage probability achieved by traditional scheme, two-hop relay scheme and improved ICS scheme. As relay number increases in each relay cluster, each mechanism will have significant reduction in the secondary outage probability. 

If the SU receiver can reduce the interference close to zero, we can make the definition of the generalized diversity gain as an asymptotic ratio of secondary outage probability to the interference gain as follows:

 

\(d^{p r o}=\lim _{\sigma^2_{ST-PD} \rightarrow 0} \log (\lim_{\sigma^2_{SR-PD\rightarrow \infty} }Pout^{Pro}_{SD})/log(\sigma^2_{ST-PD})\)       (44)

 

Fig. 7. Illustration of generalized diversity gain

The proposed analysis of the exact generalized diversity gain of the underlying protocol is beyond the scope of this article. Fig. 7 shows the generalized diversity gain by simulation for conventional and improved scheme, where power constraint imposed by secondary networks will be removed. Fig. 7 shows that the underlying improved protocol achieves a higher degree of diversity than the traditional cases owing to the fact that the interfering link from the primary transmitter to the secondary destination can utilize additional diversity gain by using ICS on the secondary users.

 

6. Conclusion

In the final analysis, we focus on three-hop cooperative system and propose IC-based transmission protocol for underlay CRNs, where a flexible IC-based scheme is utilized at both the secondary relays and the secondary destination. The proposed IC-based transmission scheme indeed improves the secondary relay transmission efficiency and reduces the possibility of interruption drastically by adapting. What’s more, secondary users transmits signals under dual secondary power limitations which is restricted by both primary and secondary systems. Under the stringent power constraint, the improved system can ensure both the QoS requirement of primary users and the reduction of secondary outage  probability. We evaluate the secondary transmission system in terms of secondary outage probability and derive the closed-form expression over Rayleigh fading channels. As simulation results show, even with the increased hop number of relays, the secondary outage probability is still reduced due to the flexibility of the improved protocol. Furthermore, the proposed protocol can be easily extended to multi-hop transmission system where multiple relays assisted secondary transmissions would almost eliminate the interference from primary users.

 

APPENDIX

 

When \(\Delta_{A} \Delta_{B} \geq 1\) ≥ , we can get the following calculation process of \(P_2\)

 

\(P 2=\int_{\Delta_{g}}^{\tau} \int_{0}^{\frac{x_{1}}{\Delta_{g}}} \int_{0}^{\left(x_{1}+y / \Delta_{4}-2 x_{1}\right)} f\left(x_{1}\right) f\left(x_{3}\right) d x_{1} d x_{2} d x_{3}+\int_{\tau}^{\infty} \int_{\frac{x_{1}}{\Delta_{3}}-1}^{\left(x_{1}+1\right) \Delta_{4}} \int_{0}^{\frac{1}{2}\left(\Delta_{4}-\frac{x_{2}}{x_{3}+1}\right)} f\left(x_{1}\right) f\left(x_{2}\right) f\left(x_{3}\right) d x_{1} d x_{2} d x_{3}\)       (45)

 

When \(\Delta_A\Delta_B <1\) , the calculation is as follows:


\(P 2=\int_{\Lambda_{s}}^{\tau} \int_{0}^{\frac{x_{1}}{\Delta_{s}}-1} \int_{0}^{\left(x_{1}+1\right)\left(\Delta_{A}-2 x_{1}\right)} f\left(x_{1}\right) f\left(x_{2}\right) d x_{1} d x_{2} d x_{3}+\int_{\tau}^{\bar{\omega}} \int_{\frac{x_{1}-1}{\Delta_{q}}-1}^{\bar{\omega}\left(x_{1}+1\right) \Delta_{1}} \int_{0}^{\frac{1}{2}\left(\Delta_{1}-x_{3}+\frac{x_{2}}{x_{3}+1}\right)} f\left(x_{1}\right) f\left(x_{2}\right) f\left(x_{3}\right) d x_{1} d x_{2} d x_{3}\)       (46)

 

where \(\tau=\frac{\left(2 \Delta_{B}+\Delta_{A} \Delta_{B}-3\right)+\sqrt{\left(2 \Delta_{B}+\Delta_{A} \Delta_{B}-3\right)^{2}+8 \Delta_{B}\left(3+\Delta_{A}\right)}}{4}, \quad \varpi=\frac{\Delta_{B}\left(1+\Delta_{A}\right)}{1-\Delta_{A} \Delta_{B}}\)

 

\(P_3\) can be caldulated as:

When \(\Delta_A\Delta_B \ge 2\)

 

\(\int_{\zeta}^{\infty} \int_{\frac{x_{3}}{\Delta_{B}}-1}^{\Delta_{A}-\frac{2 x_{1}}{x_{3}+1}} \int_{0}^{\Delta_{A}-\frac{2 x_{1}}{x_{3}+1}} f\left(x_{1}\right) f\left(x_{2}\right) f\left(x_{3}\right) d x_{1} d x_{2} d x_{3}+\int_{\zeta}^{\infty} \int_{\frac{x_{3}}{\Delta_{B}}-1}^{\Delta_{A}-\frac{2 x_{1}}{x_{3}+1}} \int_{0}^{\Delta_{A}-\frac{2 x_{1}}{x_{3}+1}} f\left(x_{1}\right) f\left(x_{2}\right) f\left(x_{3}\right) d x_{1} d x_{2} d x_{3}\)       (47)

 

When \(\Delta_A\Delta_B < 2\)

 

\(\int_{\zeta}^{\chi} \int_{\frac{x_{3}}{\Delta_{B}}-1}^{\Delta_{A}-\frac{2 x_{1}}{x_{3}+1}} \int_{0}^{\Delta_{A}-\frac{2 x_{1}}{x_{3}+1}} f\left(x_{1}\right) f\left(x_{2}\right) f\left(x_{3}\right) d x_{1} d x_{2} d x_{3}+\int_{\zeta}^{\chi} \int_{\frac{x_{3}}{\Delta_{B}}-1}^{\Delta_{A}-\frac{2 x_{1}}{x_{3}+1}} \int_{0}^{\Delta_{A}-\frac{2 x_{1}}{x_{3}+1}} f\left(x_{1}\right) f\left(x_{2}\right) f\left(x_{3}\right) d x_{1} d x_{2} d x_{3}\)       (48)

 

where \(=\chi=\frac{-\left(3-\Delta_{A} \Delta_{B}-\Delta_{B}+\sqrt{\left(3-\Delta_{A} \Delta_{B}-\Delta_{B}\right)^{2}+4\left(\Delta_{A} \Delta_{B}+3 \Delta_{B}\right)}\right)}{2}, \zeta=\frac{\Delta_{B}\left(2+\Delta_{A}\right)}{2-\Delta_{A} \Delta_{B}}\) .

 

\(P_4 \) can be calculated as:

 

\(\begin{aligned} P 4 &=\int_{\Delta_{B}}^{\Delta_{B}\left(\frac{\Delta_{A}}{3}+1\right)} \int_{0}^{\frac{x_{3}}{\Delta_{B}}-1} \int_{0}^{\frac{x_{3}}{\Delta_{B}}-1} f\left(x_{1}\right) f\left(x_{2}\right) f\left(x_{3}\right) d x_{1} d x_{2} d x_{3} \\ &+\int_{\Delta_{B}\left(\frac{\Delta_{A}}{3}+1\right)}^{\Delta_{B}\left(\Delta_{A}+1\right)}\left[\int_{0}^{\frac{x_{3}}{\Delta_{B}}-1} \int_{0}^{\frac{1}{2}\left[a-\left(\frac{x_{3}}{\Lambda_{B}}\right)\right]} f\left(x_{1}\right) f\left(x_{2}\right) d x_{1} d x_{2}+\int_{\Delta_{A}-2\left(\frac{x_{3}}{\Delta_{B}}-1\right)}^{\frac{x_{3}}{\Delta_{B}}-1} \int_{0}^{\frac{\Delta_{4}-x_{2}}{2}} f\left(x_{1}\right) f\left(x_{2}\right) d x_{1} d x_{2}\right] d x_{3} \\ &+\int_{\Delta_{B}\left(\Delta_{A}+1\right)}^{\infty} \int_{0}^{\frac{\Delta_{A}}{2}} \int_{0}^{\Delta_{A}-2 x_{1}} f\left(x_{1}\right) f\left(x_{2}\right) f\left(x_{3}\right) d x_{1} d x_{2} d x_{3} \end{aligned}\)       (49)

 

References

  1. Jeffrey G. Andrews, Stefano Buzzi, Wan Choi, "What Will 5G Be?," IEEE Journal on Selected Areas in Communications, Vol.32, No.6, pp, 1065-1082, 2014. https://doi.org/10.1109/JSAC.2014.2328098
  2. Afif Osseiran, Federico Boccardi, Volker Braun, "Scenarios for 5G Mobile and Wireless Communications:The Vision of the METIS Project," IEEE Journals and Magazines, Vol.52, No.5, pp.26-35, 2014.
  3. Panagiotis Demestichas, Andreas Georgakopoulos, Dimitrios Karvounas, "5G on the Horizon," IEEE Vehicular Technology Magazine, Vol.8, No.3, pp.47-53, jul, 2013. https://doi.org/10.1109/MVT.2013.2269187
  4. Bin Shen, Zhenzhu Lei, Xiaoge Huang, "An Interference Contribution Rate Based Small Cells On/Off Switching Algorithm for 5G Dense Heterogeneous Networks," IEEE Access, Vol.6, pp.29757-29769, 2018. https://doi.org/10.1109/ACCESS.2018.2841044
  5. Victor Fernandez-Lopez, Klaus I. Pedersen, Jens Steiner, Beatriz Soret, Preben Mogensen, "Interference Management with Successive Cancellation for Dense Small Cell Networks," in Proc. of 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), pp.1-5, 2016.
  6. Ramez Askar, Abdulsalam Hamdan, Wilhelm Keusgen, Thomas Haustein, "Analysis of Utilizing Lossless Networks for Self-Interference Cancellation Purpose," in Proc. of 2018 IEEE Wireless Communications and Networking Conference (WCNC), pp.1-6, 2018.
  7. Naga Bhushan, Junyi Li, Durga Malladi, Rob Gilmore, Dean Brenner, Aleksandar Damnjanovic, Ravi Teja Sukhavasi, Chirag Patel, Stefan Geirhofer, "Network Densification: The Dominant Theme for Wireless Evolution into 5G," IEEE Communications Magazine,Vol.52, No. 2, pp.82-89, 2014. https://doi.org/10.1109/MCOM.2014.6736747
  8. Cordeiro, C., K. Challapali, and D. Birru, "IEEE 802.22: An introduction to the first wireless standard based on cognitive radios," Journal of Communications, Vol. 1, No. 1, Apr, 2006.
  9. Kolodzy, P., "Spectrum policy task force: Findings and recommendations," in Proc. of Internaitonal Symposium on Advanced Radio Technologies (ISART), Mar., 2003.
  10. S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE journal, vol.23, No.2, Feb, 2005.
  11. Xuemin Hong, Jing Wang, Cheng-Xiang Wang, Jianghong Shi, "Cognitive Radio in 5G: A Perspective on Energy-Spectral Efficiency Trade-off," IEEE Communications Magazine, Vol.52, No.7, pp.46-53, 2014. https://doi.org/10.1109/mcom.2014.6852082
  12. Tevfik Yucek, Huseyin Arslan, "A survey of spectrum sensing algorithms for cognitive radio applications," IEEE Communications Surveys and Tutorials, vol.11, No.1, pp116-130, March, 2009. https://doi.org/10.1109/SURV.2009.090109
  13. Qing Zhao, Ananthram Swami, "A Survey of Dynamic Spectrum Access: Signal Processing and Networking Perspectives," in Proc. of 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07, pp.1349-1352, 2007.
  14. Qing Zhao, Brian M. Sadler, "A Survey of Dynamic Spectrum Access," IEEE Signal Processing Magazine, Vol.24, No.3, May, 2007.
  15. Wafa Hedhly, Osama Amin, Mohamed-Slim Alouini, "Interweave Cognitive Radio with Improper Gaussian Signaling," in Proc. of GLOBECOM 2017 - 2017 IEEE Global Communications Conference, pp.1-6,2017.
  16. Vikram Chandrasekhar, Jeffrey G. Andrews, Tarik Muharemovic, "Power control in two-tier femtocell networks," IEEE TRANS, vol.8, No.8, pp. 4316-4328, Aug.2009.
  17. Y. Zou, Y. D. Yao, and B. Zheng, "A cooperative sensing based cognitive relay transmission scheme without a dedicated sensing relay channel in cognitive radio networks," IEEE Transactions on Signal Processing, vol. 59, no. 2, pp. 854-859, Feb, 2011. https://doi.org/10.1109/TSP.2010.2090876
  18. Antonio G. Marques, Luis M. Lopez-Ramos, Georgios B. Giannakis, Javier Ramos, "Resource Allocation for Interweave and Underlay CRs Under Probability-of-Interference Constraints," IEEE Journal on Selected Areas in Communications, Vol.30, No.10, pp.1922-1933, Oct, 2012. https://doi.org/10.1109/JSAC.2012.121108
  19. Jemin Lee, Hano Wang, Jeffrey G. Andrews, "Outage Probability of Cognitive Relay Networks with Interference Constraints," IEEE TRANS, Vol.10, No.2, pp.390-395, Feb, 2011.
  20. Zeyang Dai, Jian Liu , and Keping Long, "Cooperative Relaying with Interference Cancellation for Secondary Spectrum Access," KSII TRANS, vol.6, pp.2455-2472, 2012.
  21. N. Devroye, P. Mitran, V. Tarok, "Cognitive multiple access networks," in Proc. of IEEE Conferences, pp.57-61, 2005.
  22. Ioanna Kakalou, Kostas E. Psannis, "A broadcast protocol in Multi-Hop Cognitive Radio Ad Hoc Networks with guarantees," in Proc. of IEEE, pp.1-7, 2017.
  23. Jinlin Peng, Hao Yue, Kaiping Xue, "Energy-Aware Scheduling for Multi-Hop Cognitive Radio Networks," IEEE Transactions on Cognitive Communications and Networking, Vol.2, No. 4, pp.397-410, Oct, 2016. https://doi.org/10.1109/TCCN.2016.2614838
  24. Ilgin Safak, Ali Ozgur Yilmaz, "Error Rate Analysis of GF(q) Network Coded Detect-and-Forward Wireless Relay Networks Using Equivalent Relay Channel Models," IEEE Trans, vol.12, No.8, pp. 3908-3919, Aug, 2013.
  25. Alexander Sayenko, Mikhail Zolotukhin, "Simulation and Performance Analysis of Frame Structures for Multi-hop Relay Systems," in Proc. of 2017 IEEE Conference on Standards for Communications and Networking (CSCN), pp.144-150, 2017.
  26. Hari Krishna Boddapati, Manav R. Bhatnagar, Shankar Prakriya, "Ad-Hoc Relay Selection Protocols for Multi-Hop Underlay Cognitive Radio Networks," in Proc. of IEEE Globecom workshops, pp.1-6, Dec, 2016.
  27. Daquan Feng, Chenzi Jiang, Gubong Lim, "A survey of energy-efficient wireless communications," IEEE Communications Society, Vol.15, No.1, pp.167-178, Feb, 2012.
  28. Hari Krishna Boddapati, Manav R. Bhatnagar, Shankar Prakriya, "Performance Analysis of Cluster-Based Multi-Hop Underlay CRNs Using Max-Link-Selection Protocol," IEEE TRANS, Vol .4, no, 1, pp. 15-29, Oct, 2017.
  29. Jian Chen, Lu Lv, Yiyang Liu, "Energy efficient relay selection and power allocation for cooperative cognitive radio networks," IET, Vol.9, No. 13, pp.1661-1668, Aug, 2015.
  30. Dongqing Xie, Xiazhi Lai, Xianfu Lei, "Cognitive Multiuser Energy Harvesting Decode-and-Forward Relaying System with Direct Links," IEEE Access, Vol. 6, pp. 5596-5606, Nov, 2017. https://doi.org/10.1109/access.2017.2776953
  31. Jing Zhang, Xi Yang, Qi Yao, Xiaohu Ge, Minho Jo, Guoqiang Mao, "Cooperative Energy Efficiency Modeling and Performance Analysis in Co-Channel Interference Cellular Networks," The Computer Journal, Vol.56, No.8, pp.1010-1019, August 2013. https://doi.org/10.1093/comjnl/bxs130
  32. Y. Jiang, W. Ding, Z. Xi, N. Zhao and M. Wu, "Interference cancellation for two interferences with single co-site interference cancellation system," in Proc. of 2017 IEEE 17th International Conference on Communication Technology (ICCT), Chengdu, pp. 10-13, 2017. Article (CrossRef Link)