期刊文献+
共找到834篇文章
< 1 2 42 >
每页显示 20 50 100
Resource Allocation based on Shared Criterion in OFDMA Distributed Radio Access Network 被引量:1
1
作者 Yang Bo Tang Youxi 《China Communications》 SCIE CSCD 2010年第1期16-22,共7页
Distributed radio access network (DRAN) is a novel wireless access architecture and can solve the problem of the available spectrum scarcity in wireless communications. In this paper, we investigate resource allocatio... Distributed radio access network (DRAN) is a novel wireless access architecture and can solve the problem of the available spectrum scarcity in wireless communications. In this paper, we investigate resource allocation for the downlink of OFDMA DRAN. Unlike previous exclusive criterion based algorithms that allocate each subcarrier to only one user in the system, the proposed algorithms are based on shared criterion that allow each subcarrier to be allocated to multiple users through different antennas and to only one user through same antenna. First, an adaptive resource allocation algorithm based on shared criterion is proposed to maximize total system rate under each user's minimal rate and each antenna's maximal power constraints. Then we improve the above algorithm by considering the influence of the resource allocation scheme on single user. The simulation results show that the shared criterion based algorithm provide much higher total system rate than that of the exclusive criterion based algorithm at the expense of the outage performance and the fairness, while the improved algorithm based on shared criterion can achieve a good tradeoff performance. 展开更多
关键词 resource ALLOCATION distributed radio access network (DRAN) ORTHOGONAL frequency DIVISION multiple access (OFDMA) shared criterion
在线阅读 下载PDF
Adaptive resource allocation in downlink multi-user MC-CDMA systems
2
作者 王俊波 陈明 王江舟 《Journal of Southeast University(English Edition)》 EI CAS 2008年第4期402-406,共5页
The joint channel and power allocation in the downlink transmission of multi-user multi-carrier code division multiple access(MC-CDMA) systems are investigated and the throughput maximization problem is considered a... The joint channel and power allocation in the downlink transmission of multi-user multi-carrier code division multiple access(MC-CDMA) systems are investigated and the throughput maximization problem is considered as a mixed integer optimization problem. For simplicity of analysis, the problem is divided into two less complex sub-problems: power allocation and channel allocation, which can be solved by a suboptimal adaptive power allocation (APA)algorithm and an optimal adaptive channel allocation (ACA) algorithm, respectively. By combining APA and ACA algorithms, an adaptive channel and power allocation scheme is proposed. The numerical results show that the proposed APA algorithm is more suitable for MC-CDMA systems than the conventional equal power allocation algorithm, and that the proposed channel and power allocation scheme can significantly improve the system throughout performance. 展开更多
关键词 code division multiple access (CDMA) multi-carriertransmission multi-user channel allocation power allocation
在线阅读 下载PDF
Development Of Multi-users Multi-function Watt-hour Meter Based On ATT7022B
3
作者 Mao-fa GONG Chang-lun HU +2 位作者 Jing-yin HE Xiao-ming ZHANG Long-qing CHAI 《Journal of Measurement Science and Instrumentation》 CAS 2010年第S1期123-125,共3页
According to the feature of city’s apartment building in China,a kind of Multi-users Watt-hour Meter based on ATT7022B has been developed in this paper.The master-slave MCU control model and the principles of Time Sh... According to the feature of city’s apartment building in China,a kind of Multi-users Watt-hour Meter based on ATT7022B has been developed in this paper.The master-slave MCU control model and the principles of Time Sharing Multiplex are adopted in this Watt-hour Meter,its function includes the measurement of current,voltage,power,power factor and the overload protection.It supports remote reading,pre-payment,multi-rate and etc.The practice shows that this meter has high accuracy,runs stable.It has wide prospect in the future market. 展开更多
关键词 multi-users ATT7022B Time Sharing Multiplex Master-Slave Control Mode
在线阅读 下载PDF
Dynamic multi-user detection scheme based on CVA-SSAOMP algorithm in uplink grant-free NOMA
4
作者 Xu Lei Tao Shangjin +3 位作者 Bai Shichao Zhang Jian Fang Hongyu Li Xiaohui 《High Technology Letters》 EI CAS 2021年第1期10-16,共7页
In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially a... In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially applied to the joint detection of the active user and the transmitted data.However,the existing compressed sensing recovery algorithms with unknown sparsity often require noise power or signal-to-noise ratio(SNR)as the priori conditions,which greatly reduces the algorithm adaptability in multi-user detection.Therefore,an algorithm based on cross validation aided structured sparsity adaptive orthogonal matching pursuit(CVA-SSAOMP)is proposed to realize multi-user detection in dynamic change communication scenario of channel state information(CSI).The proposed algorithm transforms the structured sparsity model into a block sparse model,and without the priori conditions above,the cross validation method in the field of statistics and machine learning is used to adaptively estimate the sparsity of active user through the residual update of cross validation.The simulation results show that,compared with the traditional orthogonal matching pursuit(OMP)algorithm,subspace pursuit(SP)algorithm and cross validation aided block sparsity adaptive subspace pursuit(CVA-BSASP)algorithm,the proposed algorithm can effectively improve the accurate estimation of the sparsity of active user and the performance of system bit error ratio(BER),and has the advantage of low-complexity. 展开更多
关键词 non-orthogonal multiple access(NOMA) multi-user detection cross validation structured sparsity(SP) orthogonal matching pursuit(OMP)
在线阅读 下载PDF
Triple-Polarized Multi-User Mimo-Idma System under Correlated Fading Channel
5
作者 B. Partibane V. Nagarajan 《Circuits and Systems》 2016年第8期1623-1634,共12页
A multiple-input multiple-output interleave division multiple access (MIMO-IDMA) system with Triple Polarized Division Multiplexing (TPDM) is presented in this paper. The present methodology replaces three indepe... A multiple-input multiple-output interleave division multiple access (MIMO-IDMA) system with Triple Polarized Division Multiplexing (TPDM) is presented in this paper. The present methodology replaces three independent linearly polarized antennas with a single triple polarized antenna at both the transmitter and receiver. The users in the communication link are accommodated and separated using a user-specific interleaver combined with low rate spreading sequence. To eliminate the effects of multi-stream interference (MSI), minimum mean square error (MMSE) algorithm based on successive interference cancellation (SIC) Multi-user detection (MUD) technique is employed at the receiver. Furthermore, log-maximum a posteriori probability (MAPP) decoding algorithm is implemented at the mobile stations (MSs) to overcome the effects of multi-user interference (MUI) effects. The paper also evaluates the effects of coded MIMO-IDMA in the downlink communication by adopting the Stanford University Interim (SUI) and Long-term Evolution (LTE)channel model specifications. In comparison with the traditional uncoded system, the present solution considering turbo coded triple-polarized MIMO-IDMA system with iterative decoding algorithm provides better bit error rate (BER) with reduced signal to noise ratio (SNR). The simulation results also show that though the SNR requirement is higher for the proposed technique compared to the conventional uni-polarized antenna based MIMO-IDMA system, it gives the advantages of achieving higher data rate with reduced cost and space requirements in the context of a downlink (DL). 展开更多
关键词 Interleave Division Multiple access (IDMA) Multiple Input Multiple Output (MIMO) multi-user Interference (MUI) Stanford University Interim (SUI) Channel Model Long Term Evolution (LTE) Channel Model
在线阅读 下载PDF
基于区块链的分层属性基可搜索加密方案
6
作者 高改梅 张爱贞 +3 位作者 刘春霞 杨玉丽 党伟超 杜苗莲 《计算机工程与设计》 北大核心 2026年第2期442-451,共10页
针对分层属性基加密算法的用户权限越界问题以及搜索权限上的局限性,提出基于区块链的分层属性基可搜索加密方案。在分层访问树的基础上,修改密文项设计分层属性基加密算法。基于非对称可搜索加密构造用户陷门及搜索算法,以实现用户对... 针对分层属性基加密算法的用户权限越界问题以及搜索权限上的局限性,提出基于区块链的分层属性基可搜索加密方案。在分层访问树的基础上,修改密文项设计分层属性基加密算法。基于非对称可搜索加密构造用户陷门及搜索算法,以实现用户对分层加密数据的有效搜索。利用区块链技术记录和验证搜索工作,通过链上链下的协同存储机制实现与云服务器的数据交互。验证了BC-HABSE方案在困难问题假设下密文和陷门的不可区分性安全。实验结果分析表明,BCHABSE在密钥生成时间、陷门生成时间和搜索时间上优于其它方案,适用于层次文件数据共享场景。 展开更多
关键词 分层访问树 分层属性基加密 可搜索加密 数据共享 区块链 云服务器 协同存储
在线阅读 下载PDF
中继链环境下一种2阶段跨链访问控制机制
7
作者 张佩云 陶帅 +1 位作者 陈健 陈子寒 《计算机研究与发展》 北大核心 2026年第1期255-272,共18页
随着区块链技术的迅速发展,数据等资产已不满足于只在单个区块链上流通,因此跨链技术应运而生。跨链技术改善了区块链数据孤岛问题,但也为数据在不同区块链上的传输与共享带来了新的挑战。一方面,不同区块链用户存储数据方式通常不同,... 随着区块链技术的迅速发展,数据等资产已不满足于只在单个区块链上流通,因此跨链技术应运而生。跨链技术改善了区块链数据孤岛问题,但也为数据在不同区块链上的传输与共享带来了新的挑战。一方面,不同区块链用户存储数据方式通常不同,各区块链数据验证方式往往也不统一。因此,其他区块链上的用户可能传输虚假或者不一致的数据,导致数据难以被有效验证其真实性和一致性,从而影响跨链访问控制的可靠性。另一方面,虽然当前代理重加密技术能有效实现1对1的访问控制,但单一代理存在中心化问题,以及在跨链场景下面临多用户并发导致的访问控制时间开销大的问题。针对上述问题,提出中继链环境下一种2阶段跨链访问控制机制,分别从数据验证和代理重加密阶段2个阶段进行设计。在数据验证阶段,为确保加密数据的来源真实性和一致性,结合Fiat-Shamir启发式与星际文件系统(interplanetary file system,IPFS),设计一种数据验证方法对数据进行快速验证,使得加密数据可被用户正确接收,加密数据在IPFS中安全存储以缓解链上存储压力;在代理重加密阶段,设计一种改进的阈值代理重加密方法,以有效应对多用户场景下的访问控制,基于重加密更新算法对重加密过程进行优化,在实现去中心化重加密的同时,降低重加密的时间开销,并有效提高多用户访问控制的重加密事务处理效率。实验结果表明,所提出的机制在数据验证方面的开销较小,并在多用户场景下加密、重加密及解密过程的开销均优于对比方法。 展开更多
关键词 中继链 代理重加密 数据验证 访问控制 数据共享
在线阅读 下载PDF
Access XP数据库的安全性研究 被引量:2
8
作者 李海燕 《中国安全科学学报》 CAS CSCD 2005年第5期67-70,共4页
在信息化时代来临、Internet高速发展的今天,信息资源的经济和社会价值越来越明显,而数据库系统所管理、存储的数据已成为各个部门宝贵的信息资源,所以其安全保密性是目前所迫切需要解决的问题。笔者从数据库的安全性、保密性的角度,详... 在信息化时代来临、Internet高速发展的今天,信息资源的经济和社会价值越来越明显,而数据库系统所管理、存储的数据已成为各个部门宝贵的信息资源,所以其安全保密性是目前所迫切需要解决的问题。笔者从数据库的安全性、保密性的角度,详细地阐述了MicrosoftAccessXP数据库的安全机制;探讨了实现MicrosoftAccessXP数据库不同保护级别的各种方法;还讨论了共享级安全性和用户级安全性问题。 展开更多
关键词 access 安全性研究 XP MICROSOFT Internet 信息资源 信息化时代 数据库系统 安全保密性 安全性问题 社会价值 安全机制 保护级别 用户级 共享
在线阅读 下载PDF
支持分层访问控制的弱中心化敏感数据共享方案
9
作者 郑开发 孙炜 +4 位作者 周俊旭 吴云坤 徐振 刘志全 何强 《计算机科学》 北大核心 2026年第2期431-441,共11页
在云边协同等分布式应用场景下,实现高效性、可检索性与弱中心化的细粒度访问控制是保障敏感数据安全共享的核心挑战。然而,传统方案存在高昂的计算开销、缺少密文检索功能和中心化架构固有的安全风险等问题。对此,提出一种支持分层访... 在云边协同等分布式应用场景下,实现高效性、可检索性与弱中心化的细粒度访问控制是保障敏感数据安全共享的核心挑战。然而,传统方案存在高昂的计算开销、缺少密文检索功能和中心化架构固有的安全风险等问题。对此,提出一种支持分层访问控制的弱中心化敏感数据共享方案(HAC-SDS)。首先,通过云边端协同计算方式,将终端侧开销转移到云边侧,降低计算和存储开销。其次,通过构建加密的倒排索引,支持对云端文件进行快速、细粒度的检索,并结合属性撤销与动态更新机制,显著提升效率。最后,将区块链技术应用于密钥管理,通过其弱中心化的特性,从根本上消除传统中心化方案的单点瓶颈与信任风险。安全分析表明,密文的不可区分性有效保障了数据的机密性。实验结果表明,所提密文检索方案在实际应用中是高效可行的。 展开更多
关键词 分层访问控制 敏感数据共享 云边端协同计算 密文检索 弱中心化
在线阅读 下载PDF
基于可搜索属性加密的区块链智能建筑数据共享方案
10
作者 晏晨 吴宏杰 +3 位作者 王陆平 陈静 顾涔 崔志明 《现代电子技术》 北大核心 2026年第6期71-76,共6页
随着信息技术的发展,许多智能建筑系统将数据存储在云服务器中,但集中式存储模式存在数据隐私泄露的潜在风险。用户在访问建筑管理数据时,常常耗费大量时间却无法确保数据的准确性。此外,大多数智能建筑数据共享方案缺乏对第三方修改数... 随着信息技术的发展,许多智能建筑系统将数据存储在云服务器中,但集中式存储模式存在数据隐私泄露的潜在风险。用户在访问建筑管理数据时,常常耗费大量时间却无法确保数据的准确性。此外,大多数智能建筑数据共享方案缺乏对第三方修改数据的审计机制。为了解决这些问题,结合可检索属性加密技术与区块链技术,提出一种基于可检索属性加密的区块链智能建筑数据共享方案。该方案将关键词和密文分别存储在建筑联盟区块链和云服务器上,有效解决了区块链存储空间有限和云服务器隐私泄露的问题;引入数据公开审计机制,防止第三方以虚假身份篡改云服务器中的数据,保障上传数据的真实性与可靠性;借助多项式方程关联多个关键词,实现用户的多关键词检索,提升数据获取的准确度;利用可检索属性加密技术实现对用户的安全检索。此外,设计一种基于树形结构的细粒度访问控制机制,进一步增强访问控制的灵活性和安全性。理论分析与实验验证结果表明,该方案具备较高的数据安全性,且检索效率优于其他方案。 展开更多
关键词 区块链技术 可检索属性加密技术 智能建筑数据共享 数据公开审计机制 多项式方程 细粒度访问控制机制
在线阅读 下载PDF
应用Microsoft Access建立编辑信息的数据库 被引量:1
11
作者 庄晓琼 《佛山科学技术学院学报(自然科学版)》 CAS 2000年第3期30-33,共4页
把科技期刊编辑部的信息分门别类 ,采用 Microsoft Access数据库 ,建立若干有关编辑信息的数据库 ,以利于信息管理、信息共享。
关键词 MICROSOFTaccess 数据库管理系统 编辑信息
在线阅读 下载PDF
一种基于分类共享的资料审核方案设计与实现
12
作者 杜秉一 《计算机应用文摘》 2026年第2期142-144,147,共4页
针对银行业务办理过程中存在的资料重复提交与审核问题,文章提出一种基于分类共享的资料审核方案。基于双层存储架构,结合区块链及数据库,实现资料的智能分类与共享管理。同时,利用策略节点进行资料共享授权及核验,从而优化审核流程,提... 针对银行业务办理过程中存在的资料重复提交与审核问题,文章提出一种基于分类共享的资料审核方案。基于双层存储架构,结合区块链及数据库,实现资料的智能分类与共享管理。同时,利用策略节点进行资料共享授权及核验,从而优化审核流程,提升效率并降低成本。 展开更多
关键词 文件跨组织共享 双层存储 资料分级分类 入网审核 真实意愿核验
在线阅读 下载PDF
个人金融数据共享的法律障碍与分层规制路径
13
作者 姚舜禹 闫夏秋 《大数据》 2026年第1期96-110,共15页
个人金融数据共享对提升金融服务效率、实现协同监管和推动金融创新生态建设具有重要价值,但面临多重法律障碍。针对个人金融数据共享存在的产权界定争议、多元主体利益冲突和监管过度问题,提出基于数据来源者视角的分层治理框架。对个... 个人金融数据共享对提升金融服务效率、实现协同监管和推动金融创新生态建设具有重要价值,但面临多重法律障碍。针对个人金融数据共享存在的产权界定争议、多元主体利益冲突和监管过度问题,提出基于数据来源者视角的分层治理框架。对个人私密信息主张基于动态隐私期待进行场景化治理,以平衡隐私保护与利用;对个人非私密信息提出优化告知同意规则,以缓解保护绝对化并促进流通;对非个人信息建议确立数据访问权并实施强制共享,以破除垄断壁垒。规制对策包括明确私密信息识别标准、调适非私密信息告知同意规则、构建非个人信息数据访问权制度,在分层基础上细化规则设计并适应技术与场景发展。 展开更多
关键词 个人金融数据 数据共享 分层规制 数据访问权
在线阅读 下载PDF
Privacy Protection Based Access Control Scheme in Cloud-Based Services 被引量:3
14
作者 Kai Fan Qiong Tian +2 位作者 Junxiong Wang Hui Li Yintang Yang 《China Communications》 SCIE CSCD 2017年第1期61-71,共11页
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu... With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services. 展开更多
关键词 access control data sharing privacy protection cloud-based services
在线阅读 下载PDF
An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures 被引量:2
15
作者 PANG Liaojun LI Huixian WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1649-1652,共4页
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n... A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures. 展开更多
关键词 CRYPTOGRAPHY information security secret sharing access structure
在线阅读 下载PDF
Achieving Fine-Grained and Flexible Access Control on Blockchain-Based Data Sharing for the Internet of Things 被引量:4
16
作者 Ruimiao Wang Xiaodong Wang +2 位作者 Wenti Yang Shuai Yuan Zhitao Guan 《China Communications》 SCIE CSCD 2022年第6期22-34,共13页
The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upo... The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upon blockchain have been explored recently for Internet of Things(IoTs).However,the access from a legitimate user may be denied without the pre-defined policy and data update on the blockchain could be costly to the owners.In this paper,we first address these issues by incorporating the Accountable Subgroup Multi-Signature(ASM)algorithm into the Attribute-based Access Control(ABAC)method with Policy Smart Contract,to provide a finegrained and flexible solution.Next,we propose a policy-based Chameleon Hash algorithm that allows the data to be updated in a reliable and convenient way by the authorized users.Finally,we evaluate our work by comparing its performance with the benchmarks.The results demonstrate significant improvement on the effectiveness and efficiency. 展开更多
关键词 blockchain access control smart contract MULTI-SIGNATURE chameleon-hash data sharing Internet of Things
在线阅读 下载PDF
共享Access数据库设计和开发策略研究 被引量:1
17
作者 王彦良 《延安职业技术学院学报》 2014年第5期153-154,共2页
Access是微软公司下的一种关系型数据库系统,简单易用,现在被大多数用户使用。ACCESS数据库有两种模式:共享模式和独占模式,在独占模式下,只有一个用户使用数据库是可行的。但是在共享模式下,多人使用ACCESS数据库时数据库经常会被锁死... Access是微软公司下的一种关系型数据库系统,简单易用,现在被大多数用户使用。ACCESS数据库有两种模式:共享模式和独占模式,在独占模式下,只有一个用户使用数据库是可行的。但是在共享模式下,多人使用ACCESS数据库时数据库经常会被锁死。本文就针对这样的问题,提出了几种在共享ACCESS数据库开发时的策略。解决在共享模式下的诸多问题,大大加快了开发的效率。 展开更多
关键词 access 数据库 管理系统 共享模式
在线阅读 下载PDF
基于Access Grid的共享应用程序开发
18
作者 朱旭庆 宋广华 黄争舸 《计算机应用研究》 CSCD 北大核心 2007年第4期223-225,共3页
为降低基于AG的共享应用程序的开发难度,在AG体系结构以及相关的API基础上实现了一个开发框架。利用此框架,能够在很大程度上提高开发共享应用程序的效率并缩短开发周期。此外,该框架还提供了一个通用访问界面,方便用户集成和调用相应... 为降低基于AG的共享应用程序的开发难度,在AG体系结构以及相关的API基础上实现了一个开发框架。利用此框架,能够在很大程度上提高开发共享应用程序的效率并缩短开发周期。此外,该框架还提供了一个通用访问界面,方便用户集成和调用相应的共享应用程序。 展开更多
关键词 网格 访问网格 虚拟会议 视频会议 共享应用程序
在线阅读 下载PDF
基于ACCESS的产品实时库存及质量检验管理系统 被引量:2
19
作者 郁雷 张骋 樊黎 《计算机时代》 2015年第7期42-45,共4页
为使产品库存和产品质量检验数据管理规范化、便捷化,并且在企业内部局域网实现数据共享,对企业的库存管理方式和产品质检过程进行充分调研,针对中小型机械制造类企业的实际需求,利用Microsoft Access 2003开发了产品实时库存及质量检... 为使产品库存和产品质量检验数据管理规范化、便捷化,并且在企业内部局域网实现数据共享,对企业的库存管理方式和产品质检过程进行充分调研,针对中小型机械制造类企业的实际需求,利用Microsoft Access 2003开发了产品实时库存及质量检验管理系统。实践证明,该数据库系统解决了企业旧的台账管理方式中数据处理机械化、低效率问题。 展开更多
关键词 access数据库 实时库存 质量检验 数据共享 中小企业
在线阅读 下载PDF
Downlink network-coded multiple access with diverse power
20
作者 Bohao Cao Zheng Xiang +2 位作者 Peng Ren Qiao Li Baoyi Xu 《Digital Communications and Networks》 SCIE CSCD 2024年第4期956-964,共9页
Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have differen... Normally,in the downlink Network-Coded Multiple Access(NCMA)system,the same power is allocated to different users.However,equal power allocation is unsuitable for some scenarios,such as when user devices have different Quality of Service(QoS)requirements.Hence,we study the power allocation in the downlink NCMA system in this paper,and propose a downlink Network-Coded Multiple Access with Diverse Power(NCMA-DP),wherein different amounts of power are allocated to different users.In terms of the Bit Error Rate(BER)of the multi-user decoder,and the number of packets required to correctly decode the message,the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA(NCMA-C).Meanwhile,the performance of the user with less allocated power is still much better than NCMA-C.Furthermore,the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C.The simulation results demonstrate the remarkable performance of the proposed NCMA-DP. 展开更多
关键词 Network-coded multiple access Physical-layer network coding multi-user decoder Power allocation Throughput Downlink network
在线阅读 下载PDF
上一页 1 2 42 下一页 到第
使用帮助 返回顶部