freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

基于碼本波束成形和有線反饋的安全容量研究畢業(yè)論文-資料下載頁(yè)

2025-06-30 11:47本頁(yè)面

【導(dǎo)讀】路中斷概率被竊聽(tīng)了。所以我們認(rèn)為一個(gè)有限的反饋的情況的發(fā)射機(jī)所使用預(yù)定義的碼本被稱為用于波束形。方向的波束形成發(fā)送接收器。我們描述如何保密中斷概率來(lái)提高作為發(fā)射天線數(shù)的增加。我們進(jìn)一步的分析。了密增強(qiáng)碼書設(shè)計(jì)的影響,并提供在保密中斷概率的界限上的碼本波束形成。由于無(wú)線傳輸?shù)拈_(kāi)放性,它是脆弱的并有著潛在的安全威脅,如被動(dòng)竊聽(tīng)和主動(dòng)干擾。助于對(duì)被動(dòng)竊聽(tīng)的安全防范。射機(jī))到“Bob”(接收者)。我們的目標(biāo)是利用Alice給Bob有限的反饋,量化基于碼本的傳輸波束成形的安。懷納[9]的研究表明,當(dāng)AliceEve通道是相對(duì)于物理降解Alice,Bob通道,Alice可以用一個(gè)。通過(guò)使用隨機(jī)編碼器的秘密消息映射。最大化作為AliceBob的差異,相互之間的信息和AliceEve在所有可能的輸入分布。為了簡(jiǎn)化這個(gè)問(wèn)題[12]

  

【正文】 將( 38)和( 39)帶入( 37),我們得到( 15)的下界,然后用( 35)得到( 15)的上界,具體操作如上所述。 2. 樸素波束賦形 對(duì)于 單純 的波束賦形波束形成方向?yàn)閎b hhq?, 對(duì)于一個(gè) 單純 波束形成 的保密率 R 和傳輸功率 P 可以表示如下 ? ? ? ? ? ???? ??? ? dfhPRPPRP 2bnbsonbso , ( 40) 使用公式( 4)和引理 2 可得 ? ? ?????? ??? R e2e2bnbso 2 qHP r obhPRP ????, 我們會(huì)按照類似的步驟,由( 36) ~( 39)得到( 14)。 致謝 感謝彭張節(jié)老師一直以來(lái)給予的熱心幫助和指導(dǎo),此次在跟隨彭老師的學(xué)習(xí)中,我收獲良多。不僅豐富了自己的知識(shí),更覺(jué)得自己能夠把所學(xué)付諸于實(shí)踐, 這些都多虧了彭老師的教導(dǎo)和同學(xué)們的幫助。我會(huì)繼續(xù)努力 , 不辜負(fù)老師的期望和學(xué)校的教育。 參考文獻(xiàn) [1] D. Love, R. Heath Jr., and T. Strohmer, “Grassmannian beamforming for multipleinput multipleoutput wireless systems,” IEEE Trans. Inf. Theory, vol. 49, 20xx. [2] K. Mukkavilli, A. Sabharwal, E. Erkip, and B. Aazhang, “On beamforming with finite rate feedback in multipleantenna systems,” IEEE Trans. Inf. Theory, vol. 49, 20xx. [3] “IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems,” 20xx. [4] T. GPP, “,” Physical Channels and Modulation (Release 8).–3GPP, vol. 12. [5] I. Telatar, “Capacity of multiantenna Gaussian channels,” European Trans. Telemun., 1999. [6] G. Caire and S. Shamai, “On the capacity of some channels with channel state information” IEEE Trans. Inf. Theory, vol. 45, 1999. [7] U. Madhow and M. Honig, “MMSE interference suppression for directsequence spreadspectrum CDMA,” IEEE Trans. Commun., vol. 42, 1994. [8] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge University Press, 20xx. [9] A. Wyner, “The wiretap channel,” Bell System Techn. J., vol. 54, no. 8, pp. 1355–1387, 1975. [10] S. LeungYanCheong and M. Hellman, “The Gaussian wiretap channel,” IEEE Trans. Inf. Theory, vol. 24, 1978. [11] I. Csisz180。ar and J. Korner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 24, 1978. [12] Z. Li, W. Trappe, and R. Yates, “Secret munication via multiantenna transmission,” in Proc. Conf. Inform. Sciences and Systems, 20xx. [13] S. Shafiee and S. Ulukus, “Achievable rates in Gaussian MISO channels with secrecy constraints,” in Proc. IEEE International Symp. Inform. Theory, 20xx. [14] A. Khisti and G. Wornell, “Secure transmission with multiple antennas– part I: the MISOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, 20xx. [15] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, 20xx. [16] A. Khisti and G. Wornell, “The MIMOME channel,” in Proc. Allerton Conf. Commun., Control, and Computing, 20xx. [17] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channel,” in Proc. IEEE International Symp. Inform. Theory, 20xx. [18] T. Liu and S. Shamai, “A note on the secrecy capacity of the multiantenna wiretap channel,” IEEE Trans. Inf. Theory, vol. 55, 20xx. [19] P. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading channels,” IEEE Trans. Inf. Theory, vol. 54, 20xx. [20] Y. Liang, H. Poor, and S. Shamai, “Secure munication over fading channels,” IEEE Trans. Inf. Theory, vol. 54, 20xx. [21] Z. Li, R. Yates, and W. Trappe, “Secrecy capacity of independent parallel channels,” 20xx. [22] M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, “Wireless informationtheoretic security,” IEEE Trans. Inf. Theory, vol. 54, 20xx. [23] R. Ahlswede and I. Csisz180。ar, “Common randomness in information theory and cryptography–I: secret sharing,” IEEE Trans. Inf. Theory, vol. 39, 1993. [24] U. M. Maurer, “Secret key agreement by public discussion from mon information” IEEE Trans. Inf. Theory, vol. 39, 1993. [25] L. Lai, H. El Gamal, and H. Poor, “The wiretap channel with feedback: encryption over the channel,” IEEE Trans. Inf. Theory, vol. 54, 20xx. [26] E. Tekin and A. Yener, “The general Gaussian multipleaccess and twoway wiretap channels: achievable rates and cooperative jamming,” IEEE Trans. Inf. Theory, vol. 54, 20xx. [27] X. He and A. Yener, “On the role of feedback in twoway secure munication,” in Proc. Asilomer Conf. Signals, Systems and Computers, 20xx. [28] S. Bashar and Z. Ding, “Optimum power allocation against information leakage in wireless work,” in Proc. IEEE Conf. Global TeleCommun., 20xx. [29] A. Reznik, Y. Shah, and S. Goldberg, “Enhancing wireless system security with PHYlayer techniques,” in Proc. Wireless World Research Forum, 20xx. [30] E. Larsson and P. Stoica, SpaceTime Block Coding for Wireless Communications. Cambridge University Press, 20xx. [31] A. Edelman and N. Rao, “Random matrix theory,” Acta Numerica, vol. 14, 20xx. [32] T. Mathew and K. Nordstr168。om, “Wishart and chisquare distributions associated with matrix quadratic forms,” J. Multivariate Analysis, vol. 61, 1997. [33] J. Proakis and M. Salehi, Digital Communications. McGrawHill, 1995. [34] S. Jafar and S. Srinivasa, “On the optimality of beamforming with quantized feedback,” IEEE Trans. Commun., vol. 55, 20xx. [35] P. Xia, S. Zhou, and G. Giannakis, “Achieving the Welch bound with difference sets,” IEEE Trans. Inf. Theory, vol. 51, 20xx. [36] Available online: djlove/. ,
點(diǎn)擊復(fù)制文檔內(nèi)容
研究報(bào)告相關(guān)推薦
文庫(kù)吧 www.dybbs8.com
備案圖鄂ICP備17016276號(hào)-1