Professional Documents
Culture Documents
5, JUNE 2012
recursively updated Cholesky decomposition-based detector performs Cognitive Amplify-and-Forward Relay Networks
as well as [1] with a much reduced computational complexity. The Over Nakagami-m Fading
novel algorithm can easily be extended to uplink CDMA system,
where the channel paths between the base station and the different Trung Q. Duong, Student Member, IEEE,
users are different. Daniel Benevides da Costa, Member, IEEE,
Maged Elkashlan, Member, IEEE, and
Vo Nguyen Quoc Bao, Member, IEEE
ACKNOWLEDGMENT
The author would like to thank E. Manuel of the College of
Engineering, Trivandrum, for help with part of computer simulations. Abstract—In this paper, the outage probability (OP) of
The author would also like to thank the Associate Editor and the dual-hop cognitive amplify-and-forward (AF) relay networks subject to
anonymous reviewers for their valuable suggestions and comments. independent non-identically distributed (i.n.i.d.) Nakagami-m fading
is examined. We assume a spectrum-sharing environment, where two
different strategies are proposed to determine the transmit powers of the
R EFERENCES secondary network. Specifically, the transmit power conditions of the
proposed spectrum-sharing network are governed by either the combined
[1] T. Sartenaer and L. Vandendorpe, “Linear and DF joint detectors for power constraint of the interference on the primary network and the
DS-CDMA communication using periodic long codes,” IEEE Trans. maximum transmission power at the secondary network or the single
Signal Process., vol. 52, no. 7, pp. 2080–2091, Jul. 2004. power constraint of the interference on the primary network. Closed-form
[2] A. Klein, G. K. Kaleh, and P. W. Baier, “Zero forcing and minimum mean lower bounds and asymptotic expressions for the OP are derived.
square error equalization for multiuser detection in code division multiple Regardless of the transmit power constraint, we reveal that the
access channels,” IEEE Trans. Veh. Technol., vol. 45, no. 2, pp. 276–287, diversity order is strictly defined by the minimum fading severity
May 1996. between the two hops of the secondary network. This aligns with
[3] S. Buzzi and M. Massaro, “Parameter estimation and multiuser detection the well-known result for conventional dual-hop AF relaying without
for bandlimited long-code CDMA systems,” IEEE Trans. Wireless Com- spectrum sharing. Furthermore, the impact of the primary network on
mun., vol. 7, no. 6, pp. 2307–2317, Jun. 2008. the diversity–multiplexing tradeoff is investigated. We confirm that the
[4] S. Buzzi and H. V. Poor, “On parameter estimation in long-code diversity–multiplexing tradeoff is independent of the primary network.
DS/CDMA systems: Cramer Rao bounds and least squares algorithms,”
IEEE Trans. Signal Process., vol. 51, no. 2, pp. 545–549, Feb. 2003. Index Terms—Amplify-and-forward (AF), dual-hop cognitive relay net-
[5] D. Guo, L. R. Rasmussen, and T. J. Lim, “Linear parallel interference work (CRN), Nakagami-m fading, spectrum sharing.
cancellation in long code CDMA multiuser detection,” IEEE J. Sel. Areas
Commun., vol. 17, no. 12, pp. 2074–2081, Dec. 1999.
[6] S. Bhashyam and B. Aazhang, “Multiuser channel estimation and tracking
for long-code CDMA systems,” IEEE Trans. Commun., vol. 50, no. 7, I. I NTRODUCTION
pp. 1081–1090, Jul. 2002.
[7] Y-H. Lee and S-J. Kim, “Sequence acquisition of DS-CDMA systems Over the past few years, cooperative diversity [1], [2] has rekindled
employing Gold sequences,” IEEE Trans. Veh. Technol., vol. 49, no. 6, enormous interest from the wireless communications community due
pp. 2397–2404, Nov. 2000.
to many perceived benefits acquired without the need for multiple
[8] A. Mirbagheri and Y. C. Yoon, “A linear MMSE receiver for multipath
asynchronous random-CDMA with chip-pulse shaping,” IEEE Trans. antennas implemented at the terminals. In particular, by allowing
Veh. Technol., vol. 51, no. 5, pp. 1072–1086, Sep. 2002. several mobile terminal relay signals for each other, an antenna array
[9] A. Weiss and B. Friendlander, “Channel estimation for DS-CDMA down- is emulated, and therefore, spatial diversity can be explored. Most
link with aperiodic spreading codes,” IEEE Trans. Commun., vol. 47, recently, in spectrum-sharing environments [3], the concept of coop-
no. 10, pp. 1561–1569, Oct. 1999.
[10] T. Li, W. Liang, Z. Ding, and J. Tugnait, “Blind multiuser detection for erative diversity has been applied in cognitive networks with decode-
long-code CDMA systems with transmission-induced cyclostationarity,” and-forward (DF) relays [4]–[9] and amplify-and-forward (AF) relays
EURASIP J. Wireless Commun. Netw., vol. 2005, no. 2, pp. 206–215, [10]–[12]. The basics of these are outlined next.
Apr. 2005. For DF relaying, Guo et al. [4] investigated the outage performance
[11] T. Fusco, L. Izzo, A. Napolitano, and M. Tanda, “On the second-order
of cognitive relay networks (CRNs) within the constraint imposed on
cyclostationarity properties of long-code DS-SS signals,” IEEE Trans.
Commun., vol. 54, no. 10, pp. 1741–1746, Oct. 2006. the interference suffered by the primary user (PU) receiver.1 In [5],
[12] Z. Xu, P. Liu, and M. D. Zoltowski, “Diversity-assisted channel estimation
and multiuser detection for downlink CDMA with long spreading codes,”
IEEE Trans. Signal Process., vol. 52, no. 1, pp. 190–201, Jan. 2004.
[13] Z. Yang and X. Wang, “Blind turbo multiuser detection for long-code Manuscript received November 23, 2011; revised February 8, 2012;
multipath CDMA,” IEEE Trans. Commun., vol. 50, no. 1, pp. 112–125, accepted March 19, 2012. Date of publication March 28, 2012; date of current
Jan. 2002. version June 12, 2012. This work was supported by the FUNCAP under Grant
[14] L. Tong, A.-J. Veen, P. Dewilde, and Y. Sung, “Blind de-correlating RAKE BPI-0031-00090.01.00/10. This work was supported by the Vietnam National
receivers for long-code WCDMA,” IEEE Trans. Signal Process., vol. 51, Foundation for Science and Technology Development under Grant 102.99-
no. 6, pp. 1642–1655, Jun. 2003. 2010.10. The review of this paper was coordinated by Dr. E. K. S Au.
[15] P. De and E. Manuel, “A novel fast algorithm for multiuser detection in T. Q. Duong is with Blekinge Institute of Technology, 371 79 Karlskrona,
long code CDMA system,” in Proc. IEEE Radio Wireless Symp., Long Sweden (e-mail: quang.trung.duong@bth.se).
Beach, CA, Jan. 2007, pp. 399–402. D. Benevides da Costa is with the Federal University of Ceará, 62042-280
[16] S. Haykin, Adaptive Filter Theory, 2nd ed. Englewood Cliffs, NJ: Sobral, Brazil (e-mail: danielbcosta@ieee.org).
Prentice–Hall, 1991. M. Elkashlan is with Queen Mary, University of London, E1 4NS London,
[17] C. Rialan and L. L. Scharf, “Fast algorithms for computing QR and U.K. (e-mail: maged.elkashlan@eecs.qmul.ac.uk).
Cholesky factors of Toeplitz operators,” IEEE Trans. Acoust., Speech, V. N. Q. Bao is with Posts and Telecommunications Institute of Technology,
Signal Process., vol. 36, no. 11, pp. 1740–1748, Nov. 1988. Ho Chi Minh, Vietnam (e-mail: baovnq@ptithcm.edu.vn).
[18] P. De, “A delta least squares lattice algorithm for fast sampling,” IEEE Color versions of one or more of the figures in this paper are available online
Trans. Signal Process., vol. 47, no. 9, pp. 2396–2407, Sep. 1999. at http://ieeexplore.ieee.org.
[19] N. Al-Dhahir and A. H. Sayed, “The finite-length multi-input multi-output Digital Object Identifier 10.1109/TVT.2012.2192509
MMSE-DFE,” IEEE Trans. Signal Process., vol. 48, no. 10, pp. 2921–
2936, Oct. 2000. 1 Hereafter, this constraint is referred to interference power constraint.
Authorized licensed use limited to: STAATS U UNIBIBL BREMEN. Downloaded on February 14,2020 at 22:12:24 UTC from IEEE Xplore. Restrictions apply.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 5, JUNE 2012 2369
Authorized licensed use limited to: STAATS U UNIBIBL BREMEN. Downloaded on February 14,2020 at 22:12:24 UTC from IEEE Xplore. Restrictions apply.
2370 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 5, JUNE 2012
function (cdf) of X, for X ∈ {|g1 |2 , |g2 |2 , |h1 |2 , |h2 |2 }, can be for- Applying the power series expansion of the lower incomplete
mulated in compact form as Gamma function, (9) can be rewritten as
αm m−1 m
mg1 +i
h αg1 γ
fX (x) =
Γ(m)
x exp(−αx) (5)
∞ αh1 1 γQ
I2 =
Γ(mh1 )Γ(mg1 + i + 1)
1 Γ(m, αx) i=0
FX (x) = Υ(m, αx) = 1 − (6)
∞
Γ(m) Γ(m) αg1 γ
× y mg1 +mh1 +i−1 exp − αh1 + y dy. (10)
respectively, where Γ(·) and Γ(·, ·) denote the Gamma function γQ
γQ
[13, Eq. (8.310.1)] and the upper incomplete Gamma function γP
old γth , i.e., Pout = Pr(γdA ≤ γth ). In [14], it has been proven that γdA where 1 = Υ(mh1 , (αh1 γ̄Q /γ̄P ))/Γ(mh1 ). Assuming integer val-
in (1) can be tightly upper bounded by γup = min(γ1 , γ2 ). Therefore, ues for the fading parameters m, with the help of [13, Eq. (8.352.2)]
it follows that the OP can be lower bounded by Pout ≥ Fγup (γth ) = and following the same steps previously described, (11) can be rewrit-
1 − (1 − Fγ1 (γth ))(1 − Fγ2 (γth )). In addition, it is easy to see that ten as
the cdfs of γ1 and γ2 are similar, so that one cdf can be easily attained
from the other. Then, focusing on the derivation of the cdf of γ1 , αg1 γ mg1 −1
1 Υ m g1 , γP αgi αhmh1 γ i
we have Fγ1 (γ) = + ¯1 − 1 1
Γ(mg1 )
i=0
Γ(mh1 )i!γ iQ
γ
I1 = Pr |h1 |2 ≤ Q Pr |g1 |2 ≤
γ
⎤
γP γP Γ mh1 + i,
γQ
αh1 +
αg1 γ
γP γQ ⎥
×
mh1 +i ⎦
γQ γ αg1 γ
= F|h1 |2 F|g1 |2 (8) αh1 + γQ
γP γP ⎡
αg2 γ mg2 −1
2 Υ m g2 , γP αgi αhmh2 γ i
where F|h1 |2 (·) and F|g1 |2 (·) are obtained from (6) by making the × ⎣1 − − ¯2 + 2 2
appropriate substitutions. By its turn, to evaluate I2 in (7), we invoke Γ(mg2 ) Γ(mh2 )i!γ iQ
i=0
the concepts of probability theory [15] so that
⎤
γQ αg2 γ
γ Γ mh2 + i, αh2 +
∞
γQ
y γP γQ ⎥
×
mh2 +i ⎦. (13)
αg2 γ
I2 = f|h1 |2 (y) f|g1 |2 (x) dx dy αh2 + γQ
γQ 0
γP
∞ 2 Although (11) is expressed in terms of an infinite sum, it converges very
γy fast to the exact result. For example, only five terms are required in the
= f|h1 |2 (y)F|g1 |2 dy. (9) summation to achieve a high accuracy of 10−15 for a representative scenario
γQ
γQ
with the following parameters: γ̄ = 30 dB, γth = 3 dB, {mg1 = mg2 = 3.5,
γP mh1 = 2, mh2 = 3}, {Ωg1 = Ωg2 = 1, and Ωh1 = Ωh2 = 7.3}.
Authorized licensed use limited to: STAATS U UNIBIBL BREMEN. Downloaded on February 14,2020 at 22:12:24 UTC from IEEE Xplore. Restrictions apply.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 5, JUNE 2012 2371
2) Asymptotic Analysis for OP: To provide insights about how the B. Single Power Constraint: Interference at the PU
fading parameters affect the network performance, we now derive the 1) Tight Lower Bound and Exact Closed-Form Expression for OP:
OP in the high-SNR regime, from which the diversity and coding gains From (3), it can be seen that the cdfs of γ3 and γ4 are required for
are obtained.3 Without loss of generality, we assume that γ̄Q = μγ̄P , the OP analysis. Once again, these cdfs are very similar, and herein,
where μ is a positive constant, and define the average SNR as γ̄ = γ̄P . we focus on the derivation of the cdf of γ3 = γ̄Q |g1 |2 /|h1 |2 . Then,
Utilizing the series representation of the incomplete Gamma func- we have
tion [13, Eq. (8.354.1)], we have that
∞
∞
(−1)n (αx)n x→0(αx)m Fγ3 (γ) = F|g1 |2
γ
y f|h1 |2 (y) dy. (20)
Υ(m, αx) = (αx)m = . (14) γQ
n!(m + n) m 0
n=0
By substituting (14) into (6), we get By expanding F|g1 |2 ((γ/γ̄Q )y) in the power series, (20) can be
solved as
x→0 (αx)m
mg1+k
FX (x) = . (15) mh αg1 γ
Γ(m + 1)
∞ αh1 1 Γ(mg1 +mh1 +k) γQ
mg
(21)
γ̄→∞ Υ(mh1 , μαh1 )αg1 1
Fγ1 (γ) = Again, as claimed in footnote 2, (21) converges very fast, and
Γ(mg1 + 1)Γ(mh1 )
therefore, few terms are required to achieve high accuracy. However,
mg1 mg1
Γ(mg1 + mh1 , μαh1 ) αg1 γ assuming integer values for the fading parameters m, by utilizing [13,
+ . (16) Eq. (8.352.4)], we can express (21) as
Γ(mg1 + 1)Γ(mh1 ) μαh1 γ̄
mh
k
mg1 −1 αg1 γ
Similarly, an asymptotic expression for the cdf of Fγ2 (γ) can be αh1 1 Γ(mh1 + k) γQ
attained as Fγ3 (γ) = 1 −
mh1 +k . (22)
αg1 γ
mg
k=0 k!Γ(mh1 ) αh1 + γQ
γ̄→∞ Υ(mh2 , μαh2 )αg2 2
Fγ2 (γ) =
Γ(mg2 + 1)Γ(mh2 ) As before, the cdf of γ4 can be directly derived from the cdf of γ3
mg2 mg2
Γ(mg2 + mh2 , μαh2 ) αg2 γ after substituting the respective parameters by their counterparts (i.e.,
+ . (17) mh1 → mh2 , mg1 → mg2 , Ωg1 → Ωg2 , and Ωh1 → Ωh2 ). Thus,
Γ(mg2 + 1)Γ(mh2 ) μαh2 γ̄
making use of these results, the OP can be lower bounded by
Then, an asymptotic expression for the OP can be achieved using ⎡
k ⎤
mg1 −1 mh αg1 γth
the fact that Pout = Fγ1 (γth ) + Fγ2 (γth ) − Fγ1 (γth )Fγ2 (γth ) and
⎢
αh1 1 Γ(mh1 + k) γQ ⎥
γ̄→∞ Pout ≥ 1 − ⎣
mh1 +k ⎦
knowing that Fγ1 (γth )Fγ2 (γth ) Fγ1 (γth ) + Fγ2 (γth ), where αg1 γth
this latter can be easily attested from (16) and (17). Thus, after some k=0 k!Γ(mh1 ) αh1 + γQ
rearrangements and omitting the small terms, it follows that ⎡ ⎤
k
min(mg1 ,mg2 ) mg1 −1 mh αg2 γth
⎢
αh2 2 Γ(mh2 + k)
γ̄→∞ γth γQ ⎥
Pout = βA (18) ×⎣
mh2 +k ⎦ . (23)
γ̄ αg2 γth
k=0 k!Γ(mh2 ) αh2 + γQ
where βA is given by
In addition to (23), an exact closed-form expression for the OP can
β1 , if mg1 < mg2 be derived by rewriting the SNR γdB given in (3) as
βA = β1 + β2 , if mg1 = mg2 (19)
γ Q |g1 |2 |g2 |2
β2 , if mg1 > mg2 γdB = . (24)
|g1 |2 |h2 |2 + |g2 |2 |h1 |2
and β1 and β2 are expressed as
mg
From (24) and invoking the concepts of probability theorem [15],
Υ (mh1 , μαh1 ) αg1 1 the OP can be expressed4 as
β1 =
Γ(mg1 + 1)Γ(mh1 )
mg1 γth
Γ(mg1 + mh1 , μαh1 ) αg1 Pout = E|h2 |2 F|g2 |2 |h2 |2 + E|h1 |2 ,|h2 |2
+ γQ
Γ(mg1 + 1)Γ(mh1 ) μαh1 ⎧
Υ(mh2 , μαh2 )αg2 2
mg ⎪
⎨
∞
β2 =
Γ(mg2 + 1)Γ(mh2 ) f|g2 |2 |g2 |2 F|g1 |2
mg2 ⎪
⎩
Γ(mg2 + mh2 , μαh2 ) αg2 γth |h2 |2
+
Γ(mg2 + 1)Γ(mh2 ) μαh2 ⎛
⎞ ⎫
γth |g2 |2 + γth
γQ
|h2 |2 |h1 |2 ⎬
respectively. ×⎝ ⎠ d|g2 |2 (25)
γ Q |g2 |2 ⎭
Authorized licensed use limited to: STAATS U UNIBIBL BREMEN. Downloaded on February 14,2020 at 22:12:24 UTC from IEEE Xplore. Restrictions apply.
2372 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 5, JUNE 2012
where E{·} denotes expectation. By applying the binomial theorem where βB is given by
[13, Eq. (1.111)] and with the help of [13, Eq. (3.471.9)], [13, Eq.
(6.643.3)], and [13, Eq. (7.621.3)], an exact closed-form expression β3 , if mg1 < mg2
can be derived as βB = β3 + β4 , if mg1 = mg2 (30)
β4 , if mg1 > mg2
mg1 −1
u mg2
and β3 and β4 are given by
Pout = 1 −
mg1
u=0 v=0 w=0 Γ(mg1 + mh1 ) αg1
β3 =
mg mh mh Γ(mg1 + 1)Γ(mh1 ) αh1
αgu+
1
w−v+1
αg2 2 αh1 1 αh2 2 Γ(p1)Γ(p2)Γ(p3)Γ(p4) mg2
u!Γ(mg2)Γ(mh1)Γ(mh2)Γ(p2 + p3 ) Γ(mg2 + mh2 ) αg2
β4 =
Γ(mg2 + 1)Γ(mh2 ) αh2
−p1
u m g2 − 1 αg1 γth
× + αh1 respectively.
v w γQ
−p3 p 5
αg2 γth γth C. Comparison Between the Two Transmit Power Strategies
× + αh2
γQ γQ 1) SNR Gap in Coding Gain: As can be explicitly observed from
(18) and (29), the diversity order of the secondary network does not
× 2 F1 (p3 , p1 , p2 + p3 ; Ξ) (26) depend on the fading parameters pertaining to the interference links,
i.e., mh1 and mh2 . Indeed, the diversity order is limited by the more
where p1 = mh1 + u + w − v + 1, p2 = mh1 + u, p3 = mg2 + mh2 , severe fading channel between the two secondary hops (data links),
p4 = p3 + v − w − 1, p5 = mg2 + u + w − v + 1, Ξ = ((αg2 αh1 + regardless of the transmit power strategy employed. However, the same
αg1 αh2 )(γth /γ̄Q )+αh1 αh2 )/(αh1 +(αg1 γth /γ̄Q ))(αh2 +(αg2 γth / is not true when it comes to coding gains, in which an SNR gap (in
γ̄Q )), and 2 F1 (·, ·, ·; ·) is the Gauss hypergeometric function [13, decibels) between the two strategies is observed. This coding gap is
Eq. (9.111)]. For the case of arbitrary fading parameter, the OP can be defined by the ratio
given by min(m 1 ,m
βA g1 g2 )
∞ mg +k mh G = 10 log10 . (31)
αg2 2 αh2 2 Γ(q3 + k) βB
Pout =
Γ(mh2 )Γ(mg2 + k + 1)
k=0 2) Diversity–Multiplexing Tradeoff: Making use of the asymptotic
mg2 +k −q3 −k expressions previously derived for the OP, the diversity–multiplexing
γth αg2 γth tradeoff will now be evaluated. As well known, the outage threshold
× + αh2
γQ γQ γth can be written in terms of the spectral efficiency R (in bits per
second per hertz) as γth = 22R − 1. In addition, from the definition
q q1 −mh1 mg2 mh1
∞
q αg1 αg2 αh in [1], the spectral efficiency R can be expressed in the form of the
1
+ normalized spectral efficiency r with respect to the channel capac-
l Γ(q6 )Γ(mg2 )
k=0 =0 ity as R = r log2 (1 + γ̄). Consequently, we have that γth = (1 +
mh −q1 γ̄)2r − 1 so that the diversity–multiplexing tradeoff can be formulated
αh2 2 Γ(q1 )Γ(q2 )Γ(q3 )Γ(q4 ) αg1 γth as [1]
× + αh1
Γ(mh1 )Γ(mh2 )Γ(q2 + q3 ) γQ
Δ − log Pout (γ̄, r)
d(r) = lim . (32)
−q3 q5 γ̄→∞ log γ̄
αg2 γth γth
× + αh2
γQ γQ Now, plugging γth = (1 + γ̄)2r − 1 into (18) and (29), and replac-
ing the respective resulting expressions into (32), we get
× 2 F1 (q3 , q1 , q2 + q3 ; Ξ) (27)
log [(1 + γ̄)2r − 1]
d(r) = − min(mg1 , mg2 ) lim − 1 . (33)
where q = mg1 +mg2 +k−1, q1 = mg1 +mg2 +mh1 +k−, q2 = γ̄→∞ log γ̄
mg1 + mh1 + k, q3 = mg2 + mh2 , q4 = mh2 + , q5 = mg1 +
Finally, by applying the l’Hospital rule to (33), the diversity–
2mg2 + k − , and q6 = mg1 + k + 1.
multiplexing tradeoff can be expressed as
2) Asymptotic OP Analysis: For high values of γ̄, Fγ3 · can be
approximated by d(r) = min(mg1 , mg2 )(1 − 2r). (34)
mg1 mg1
γ̄→∞ Γ(mg1 + mh1 ) αg1 γ From (34), we conclude the following: 1) The maximum diversity
Fγ3 (γ) = . (28)
Γ(mg1 + 1)Γ(mh1 ) αh1 γ̄ order of min(mg1 , mg2 ) is achieved as r → 0, and 2) the maximum
normalized spectral efficiency of 1/2 is achieved as d → 0 due to the
The preceding equation can also be used for approximating the cdf half-duplex communication modes.
of γ4 . For such, we just need to perform the appropriate substitutions.
Then, using the same approach as adopted in the previous section, the
IV. N UMERICAL R ESULTS AND S IMULATIONS
OP can be asymptotically approximated by
min(mg1 ,mg2 ) In this section, representative numerical results are provided to
γ̄→∞ γth validate the proposed analysis and illustrate the effects of the channel
Pout = βB (29)
γ̄ parameters, e.g., mg1 , mg2 , mh1 , mh2 and Ωg1 , Ωg2 , Ωh1 , Ωh2 , on
Authorized licensed use limited to: STAATS U UNIBIBL BREMEN. Downloaded on February 14,2020 at 22:12:24 UTC from IEEE Xplore. Restrictions apply.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 5, JUNE 2012 2373
Fig. 2. OP for spectrum-sharing AF relay networks with combined power Fig. 4. Performance comparison for different transmission strategies with
constraints at the PU and SU transmitters over Nakagami-m fading. combined power constraints at the PU and SU transmitters over Nakagami-m
fading.
Authorized licensed use limited to: STAATS U UNIBIBL BREMEN. Downloaded on February 14,2020 at 22:12:24 UTC from IEEE Xplore. Restrictions apply.
2374 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 5, JUNE 2012
R EFERENCES
[1] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in
wireless networks: Efficient protocols and outage behavior,” IEEE Trans.
Inf. Theory, vol. 50, no. 12, pp. 3062–3080, Dec. 2004.
[2] B. Maham and A. Hjorungnes, “Asymptotic performance analysis of
amplify-and-forward cooperative networks in a Nakagami-m fading
environment,” IEEE Commun. Lett., vol. 13, no. 5, pp. 300–302,
May 2009.
[3] B. Maham, R. Popovski, X. Zhou, and A. Hjorungnes, “Cognitive mul-
tiple access network with outage margin in the primary system,” IEEE
Trans. Wireless Commun., vol. 10, no. 10, pp. 3343–3353, Oct. 2011.
[4] Y. Guo, G. Kang, N. Zhang, W. Zhou, and P. Zhang, “Outage
Fig. 6. SNR gap of the two power constraints versus the PU’s position over performance of relay-assisted cognitive-radio system under spectrum-
Nakagami-m fading. sharing constraints,” IET Electron. Lett., vol. 46, no. 2, pp. 182–184,
Jan. 2010.
[5] J. Lee, H. Wang, J. G. Andrews, and D. Hong, “Outage probability of cog-
Scheme 2: mh1 = mh2 = 3 and Ωh1 = Ωh2 = 3.3, and Scheme nitive relay networks with interference constraints,” IEEE Trans. Wireless
3: mh1 = mh2 = 4 and Ωh1 = Ωh2 = 1. For Network B, the pa- Commun., vol. 10, no. 2, pp. 390–395, Feb. 2011.
rameters are chosen as Scheme 4: mh1 = mh2 = 2.2 and Ωh1 = [6] S. Sagong, J. Lee, and D. Hong, “Capacity of reactive DF scheme in
cognitive relay networks,” IEEE Trans. Wireless Commun., vol. 10, no. 10,
Ωh2 = 7.3, Scheme 5: mh1 = mh2 = 3.3 and Ωh1 = Ωh2 = 3.3, and pp. 3133–3138, Oct. 2011.
Scheme 6: mh1 = mh2 = 4.4 and Ωh1 = Ωh2 = 1. It can be seen [7] L. Luo, P. Zhang, G. Zhang, and J. Qin, “Outage performance for cog-
that the curves are not affected by varying the fading parameters of nitive relay networks with underlay spectrum sharing,” IEEE Commun.
the primary network. Indeed, only a coding gain is observed once Lett., vol. 15, no. 7, pp. 710–712, Jul. 2011.
the curves remain parallel to each other. This validates our proposed [8] J. Si, Z. Li, X. Chen, B. Hao, and Z. Liu, “On the performance of cognitive
relay networks under primary user’s outage constraint,” IEEE Commun.
analysis. Lett., vol. 15, no. 4, pp. 422–424, Apr. 2011.
To illustrate the effect of the two transmit power strategies on [9] C. Zhong, T. Ratnarajah, and K.-K. Wong, “Outage analysis of decode-
the network performance, Fig. 6 plots the SNR gain of Network B and-forward cognitive dual-hop systems with the interference constraint
over Network A, given in (31), for three different scenarios with in Nakagami-m fading channels,” IEEE Trans. Veh. Technol., vol. 60,
no. 6, pp. 2875–2879, Jul. 2011.
distinct fading severity parameters. A 2-D topology is assumed for [10] H. Ding, J. Ge, B. da Costa, and Z. Jiang, “Asymptotic analysis of
all nodes, in which the coordinate of each terminal is defined as cooperative diversity systems with relay selection in a spectrum shar-
(x, y). Thus, the channel mean power for the fading channel from ing scenario,” IEEE Trans. Veh. Technol., vol. 60, no. 2, pp. 457–472,
node M with coordinate (xM , yM ) to node N with coordinate (xN , yN ) Feb. 2011.
−η [11] T. Q. Duong, V. N. Q. Bao, and H.-J. Zepernick, “Exact outage probability
$ denoted as , where η is the path-loss exponent and =
is
of cognitive AF relaying with underlay spectrum sharing,” IET Electron.
(xM − xN )2 + (yM − yN )2 is the distance between M and N. In Lett., vol. 47, no. 17, pp. 1001–1002, Aug. 2011.
this figure, S, R, and D are located at the coordinates (0,0), (1/2, 0), and [12] T. Q. Duong, V. N. Q. Bao, G. C. Alexandropoulos, and
(1, 0), respectively, and the curves are plotted in terms of the position H.-J. Zepernick, “Cooperative spectrum sharing networks with AF
of the PU, with coordinate (d, d), and by setting the average SNR γ̄ to relay and selection diversity,” IET Electron. Lett., vol. 47, no. 20,
pp. 1149–1151, Sep. 2011.
30 dB. Note that the gain is remarkable when the PU is located close [13] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and
to the secondary network. This phenomenon is explained as follows: Products, 7th ed. San Diego, CA: Academic, 2007.
When the PU is near S and R, i.e., h1 and h2 are high, the interference [14] S. Ikki and M. H. Ahmed, “Performance analysis of cooperative diversity
at the PU is high. In this case, the transmit powers of Networks A and wireless networks over Nakagami-m fading channel,” IEEE Commun.
Lett., vol. 11, no. 4, pp. 334–336, Apr. 2007.
B are strictly governed by the constraint Q/|h1 |2 , which leads to a [15] A. Papoulis, Probability, Random Variables, and Stochastic Processes,
similar performance for both networks. By contrast, when PU moves 4th ed. New York: McGraw-Hill, 2002.
away from S and R, i.e., h1 and h2 are low, the interference on the PU
is low. In this case, the power constraint on the PU can be neglected,
and as such, Network B outperforms Network A since the latter is
still controlled by the transmit power constraint of the secondary
network.
V. C ONCLUSION
Authorized licensed use limited to: STAATS U UNIBIBL BREMEN. Downloaded on February 14,2020 at 22:12:24 UTC from IEEE Xplore. Restrictions apply.