[go: up one dir, main page]

CN114143791B - Transmission method of Cell-free system based on RSMA - Google Patents

Transmission method of Cell-free system based on RSMA Download PDF

Info

Publication number
CN114143791B
CN114143791B CN202111497328.5A CN202111497328A CN114143791B CN 114143791 B CN114143791 B CN 114143791B CN 202111497328 A CN202111497328 A CN 202111497328A CN 114143791 B CN114143791 B CN 114143791B
Authority
CN
China
Prior art keywords
rate
eavesdropper
public
stream
private
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111497328.5A
Other languages
Chinese (zh)
Other versions
CN114143791A (en
Inventor
冉静学
张天天
崔林林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Minzu University of China
Original Assignee
Minzu University of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Minzu University of China filed Critical Minzu University of China
Priority to CN202111497328.5A priority Critical patent/CN114143791B/en
Publication of CN114143791A publication Critical patent/CN114143791A/en
Application granted granted Critical
Publication of CN114143791B publication Critical patent/CN114143791B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/22Traffic simulation tools or models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/18Negotiating wireless communication parameters
    • H04W28/22Negotiating communication rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a transmission scheme of a Cell-free system based on RSMA, which consists of M access points, K legal users and an eavesdropper. An eavesdropper eavesdrops on the signal sent to the legitimate user throughout the data transmission process. And the common message serves a dual purpose, as a desired message at the legitimate user and as artificial noise at the eavesdropper, without consuming additional transmission power. The physical layer security and rate of the system are maximized by jointly optimizing the beamforming vector and rate assignment, and then solving the optimization problem using a continuous convex approximation method.

Description

Transmission method of Cell-free system based on RSMA
Technical Field
The invention belongs to the field of wireless communication, and particularly relates to a transmission method of a Cell-free system based on RSMA.
Background
Rate-division multiple access (Rate-SPLITTING MULTIPLE ACCESS, RSMA) is a more versatile, powerful multiple access approach for downlink multi-antenna systems that can meet the high throughput, qoS heterogeneity and huge connection requirements of future multi-antenna wireless networks. Rate-division multiple access is suitable for various network loads (underload and overload conditions) and user deployments (with different channel strengths, channel directions) compared to non-orthogonal multiple access. Recently, a Cell-free massive MIMO network has been receiving increasing attention, the wireless network is composed of a large number of Access Points (APs) randomly distributed in a network area, and the APs jointly serve a large number of users. In a Cell-free massive MIMO system, all APs may be interconnected by a Central Processing Unit (CPU) to perform beamforming transmission tasks. Cell-free massive MIMO networks can provide more diversity gain, better coverage and energy efficiency than traditional massive MIMO networks. Therefore, the Cell-free system based on the rate division multiple access is studied, and the future communication system can be better dealt with.
Disclosure of Invention
In order to improve the coverage of wireless communication, the invention discloses a transmission method of a Cell-free system based on RSMA, in particular to a physical layer security and rate maximization method in the Cell-free system based on rate division multiple access, which jointly optimizes beam forming vectors and rate distribution.
The embodiment of the invention provides the following technical scheme:
a method for physical layer security and rate maximization in a Cell-free system based on rate division multiple access, the method comprising:
step A, a Cell-free system model based on rate division multiple access is established, and received signals at legal users and eavesdroppers Eve are solved;
step B, respectively solving a transmission rate expression corresponding to the decoding public stream and the private stream at the legal user U k and the eavesdropper and a physical layer security rate expression which can be realized by the kth user;
and step C, initializing an optimization variable in the iterative algorithm.
And D, substituting the value of the optimized variable in the nth iteration into a convex problem obtained by using a continuous convex approximation method, solving an optimal value by using a Newton steepest descent gradient method, and updating the value of the (n+1) th optimized variable by using the obtained optimal value of the optimized variable.
And E, defining the condition for ending the iterative optimization.
The step A specifically comprises the following steps:
A1, a Cell-free system model based on rate division multiple access is established, and the system model consists of M Access Points (AP), K legal users (U k) and a passive eavesdropper. Where each AP is equipped with N antennas, both legitimate users and eavesdroppers are single antennas. The AP is connected to a CPU through a perfect backhaul network, which provides an error-free and higher capacity connection.
A2, at each AP, messages for U k are split into public and private parts according to the rate splitting principle. All common parts are then combined together and encoded into a common stream s c,sc for decoding by all users. The private parts are each encoded as a private stream s k,sk, which is decoded only by the corresponding user. Stream s= [ s c,s1,...,sK]T ] is linear precoded using precoder p= [ P c,p1,...,pK. The transmit signal at the mth AP is:
A3, the received signals at the legal user U k and the eavesdropper are respectively: And Wherein/>Representing the wireless channel matrix between the mth access point and the kth legal user U k, respectively,/>, between the mth access point and the eavesdropperAnd/>Additive white gaussian noise at the legitimate user U k and the eavesdropper, respectively.
The step B specifically comprises the following steps:
And B1, based on the received signal obtained in the step A, at a receiving end, each legal user firstly takes all private streams as noise to decode the public streams, and the signal-to-interference-and-noise ratio of the decoded public streams at U k, K E { 1.. To ensure that the common message can be decoded at all legitimate users, the achievable rate of decoding the common message accordingly should be: r c=min{Rc,1,Rc,2,...,Rc,K, where R c,k=log2(1+γc,k), K e { 1.. K is the achievable rate of decoding the common stream at U k.
B2, then delete the common stream from the received signal with SIC at U k, and decode s k at its corresponding private stream s k.Uk with the signal-to-interference-and-noise ratio: the corresponding achievable rates for decoding the private stream at U k are: r k=log2(1+γk).
B3, using the public message as a dual purpose, as a desired message at the legitimate user and as artificial noise at the eavesdropper. In order for the public message to be considered as artificial noise satisfying at the eavesdropper, the condition should be satisfied: c c,e≤Rc, wherein C c,e represents the rate at which the eavesdropper decodes the common message. It is assumed that an eavesdropper can eavesdrop on all users' private messages.
And B4, decoding the public stream and the private stream at the eavesdropper, wherein the received signal-to-interference-and-noise ratios are respectively as follows: And/> The corresponding achievable rates for decoding the public stream and the private stream at the eavesdropper are respectively: c c,e=log2(1+γc,e) and C k,e=log2(1+γk,e).
B5, the physical layer security rate achievable by the kth user isWherein,Indicating that the public message transmitted to U k can achieve a safe rate, v k indicates the proportion of the kth user's public message that can achieve a safe rate. /(I)The private message transmitted to U k may be indicative of a secure rate.
The step C specifically comprises the following steps:
C1, setting the iteration number n=1, first using maximum ratio transmission and singular value decomposition to precoder Initializing precoder/>, for private stream s k Initializing toWherein/>Lambda is more than or equal to 0 and less than or equal to 1. Precoder/>, for common stream s c Initializing toWhere p c=(1-λ)Pt,uc is the eigenvector corresponding to the largest left singular value of the channel matrix h= [ g 1k,g2k,...,gMK ], which is calculated from U c =u (: 1), where h=usv H.
C2, the auxiliary variable alpha [1],ρ[1],/>β[1],/>Respectively initialize to,/>
The step D specifically comprises the following steps:
And D1, updating an optimization variable by utilizing a convex optimization problem obtained by a continuous convex approximation algorithm. Wherein the objective function of the convex optimization problem is r, which represents the system physical layer security and rate. Constraints on the convex optimization problem include user private rate constraints, public message is treated as artificial noise public rate constraints, and total power constraints at the AP.
D2, user private rate constraints are specifically expressed as Ω[n](pk,gm,kk)≤ρk[n](pk,hmk,e)≥ρk,e,1+ρk[n]k)≤0,Wherein,
D3, the common rate constraint for treating common messages as artificial noise is specifically expressed asΩ[n](pc,gm,kc,k)≥ρc,k[n](pc,hmc,e)≤ρc,e,/>1+Ρ c,e[n]c,e) is less than or equal to 0. Wherein,
D4, solving the convex optimization problem by utilizing the newton steepest descent gradient method, wherein the iteration process is η (m) = (t (m), P (m), α (m), α c(m),ρ(m),ρc(m),β(m),βc (m)),|Eta (m+1) -eta (m) | 2 < delta, where mu=0.39, delta=10 -3,/>To obtain optimal values of objective function and optimization variable for eta (m) gradient r*,P**c **c **c *.
D5, let iteration number n=n+1, update objective function and optimization variable in nth iteration based on the optimal value of objective function and optimization variable obtained in step D4, r [n]=r*,P[n]=P*[n]=α*,ρ[n]=ρ*,β[n]=β*,/>
The step E specifically comprises the following steps:
E1, setting convergence accuracy epsilon=10 -3, and repeating the step D when |r [n]-r[n-1] | < epsilon is not established.
E2, when the condition |r [n]-r[n-1] | < ε is satisfied, jump out of the loop, output an optimal value r *=r[n],P*=P[n]*=α[n],ρ*=ρ[n],/>β*=β[n],/>
Compared with the prior art, the technical scheme has the following advantages:
The invention discloses a physical layer security and rate maximization method in a Cell-free system based on RSMA. This scheme considers the use of public messages for dual purposes, as desired messages at legitimate users, as artificial noise at eavesdroppers, without consuming additional transmission power. The rate division multiple access method can flexibly cope with the change of the number of users in wireless communication. Consider the use of a Cell-free system to improve the coverage of a wireless network.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a transmission method of a RSMA-based Cell-free system according to an embodiment of the present invention.
Detailed Description
As described in the background section, how to improve the physical layer security in wireless communication, improve the communication quality and reliability of users, and realize secure transmission of data is a problem to be solved by those skilled in the art.
The core idea of the invention is to provide a transmission method of a Cell-free system based on RSMA, in particular to a physical layer security and rate maximization method in the Cell-free system based on rate division multiple access, so as to improve the security of data transmission. By using a method of continuous convex approximation, the physical layer security and rate of the system is maximized by jointly optimizing the beamforming vector and rate allocation.
Referring to fig. 1, the implementation of the present invention provides a physical layer security and rate maximization method in a Cell-free system based on rate division multiple access, the method comprising:
And step A, a Cell-free system model based on rate division multiple access is established, and received signals at legal users and eavesdroppers Eve are solved.
And step B, respectively solving transmission rate expressions corresponding to the decoded public stream and the decoded private stream at the legal user U k and the eavesdropper and physical layer security rate expressions which can be realized by the kth user.
And step C, initializing an optimization variable in the iterative algorithm.
And D, substituting the value of the optimized variable in the nth iteration into a convex problem obtained by using a continuous convex approximation method, solving an optimal value by using a Newton steepest descent gradient method, and updating the value of the (n+1) th optimized variable by using the obtained optimal value of the optimized variable.
And E, defining the condition for ending the iterative optimization.
The step A specifically comprises the following steps:
A1, a Cell-free system model based on rate division multiple access is established, and the system model consists of M Access Points (AP), K legal users (U k) and a passive eavesdropper. Where each AP is equipped with N antennas, both legitimate users and eavesdroppers are single antennas. The AP is connected to a CPU through a perfect backhaul network, which provides an error-free and higher capacity connection.
A2, at each AP, messages for U k are split into public and private parts according to the rate splitting principle. All common parts are then combined together and encoded into a common stream s c,sc for decoding by all users. The private parts are each encoded as a private stream s k,sk, which is decoded only by the corresponding user. Stream s= [ s c,s1,...,sK]T ] is linear precoded using precoder p= [ P c,p1,...,pK. The transmit signal at the mth AP is:
A3, the received signals at the legal user U k and the eavesdropper are respectively: And Wherein/>Representing the wireless channel matrix between the mth access point and the kth legal user U k, respectively,/>, between the mth access point and the eavesdropperAnd/>Additive white gaussian noise at the legitimate user U k and the eavesdropper, respectively.
The step B specifically comprises the following steps:
And B1, based on the received signal obtained in the step A, at a receiving end, each legal user firstly takes all private streams as noise to decode the public streams, and the signal-to-interference-and-noise ratio of the decoded public streams at U k, K E { 1.. To ensure that the common message can be decoded at all legitimate users, the achievable rate of decoding the common message accordingly should be: r c=min{Rc,1,Rc,2,...,Rc,K, where R c,k=log2(1+γc,k), K e { 1.. K is the achievable rate of decoding the common stream at U k.
B2, then delete the common stream from the received signal with SIC at U k, and decode s k at its corresponding private stream s k.Uk with the signal-to-interference-and-noise ratio: the corresponding achievable rates for decoding the private stream at U k are: r k=log2(1+γk).
B3, using the public message as a dual purpose, as a desired message at the legitimate user and as artificial noise at the eavesdropper. In order for the public message to be considered as artificial noise satisfying at the eavesdropper, the condition should be satisfied: c c,e≤Rc, wherein C c,e represents the rate at which the eavesdropper decodes the common message. It is assumed that an eavesdropper can eavesdrop on all users' private messages.
And B4, decoding the public stream and the private stream at the eavesdropper, wherein the received signal-to-interference-and-noise ratios are respectively as follows: And/> The corresponding achievable rates for decoding the public stream and the private stream at the eavesdropper are respectively: c c,e=log2(1+γc,e) and C k,e=log2(1+γk,e).
B5, the physical layer security rate achievable by the kth user isWherein,Indicating that the public message transmitted to U k can achieve a safe rate, v k indicates the proportion of the kth user's public message that can achieve a safe rate. /(I)The private message transmitted to U k may be indicative of a secure rate.
The step C specifically comprises the following steps:
C1, setting the iteration number n=1, first using maximum ratio transmission and singular value decomposition to precoder Initializing precoder/>, for private stream s k Initializing toWherein/>Lambda is more than or equal to 0 and less than or equal to 1. Precoder/>, for common stream s c Initializing toWhere p c=(1-λ)Pt,uc is the eigenvector corresponding to the largest left singular value of the channel matrix h= [ g 1k,g2k,...,gMK ], which is calculated from U c =u (: 1), where h=usv H.
C2, the auxiliary variable alpha [1],ρ[1],/>β[1],/>Respectively initialize to,/>
The step D specifically comprises the following steps:
And D1, updating an optimization variable by utilizing a convex optimization problem obtained by a continuous convex approximation algorithm. Wherein the objective function of the convex optimization problem is r, which represents the system physical layer security and rate. Constraints on the convex optimization problem include user private rate constraints, public message is treated as artificial noise public rate constraints, and total power constraints at the AP.
D2, user private rate constraints are specifically expressed as Ω[n](pk,gm,kk)≤ρk[n](pk,hmk,e)≥ρk,e,1+ρk[n]k)≤0,/>Wherein,
D3, the common rate constraint for treating common messages as artificial noise is specifically expressed asΩ[n](pc,hmc,e)≤ρc,e,/>1+Ρ c,e[n]c,e) is less than or equal to 0. Wherein,
D4, solving the convex optimization problem by utilizing the newton steepest descent gradient method, wherein the iteration process is η (m) = (t (m), P (m), α (m), α c(m),ρ(m),ρc(m),β(m),βc (m)),|Eta (m+1) -eta (m) | 2 < delta, where mu=0.39, delta=10 -3,/>To an optimal value r *,P**,/>, for the η (m) gradient, to obtain the objective function and the optimization variablesρ*,/>β*,/>
D5, let iteration number n=n+1, update objective function and optimization variable in nth iteration based on the optimal value of objective function and optimization variable obtained in step D4, r [n]=r*,P[n]=P*[n]=α*,ρ[n]=ρ*,β[n]=β*,/>
The step E specifically comprises the following steps:
E1, setting convergence accuracy epsilon=10 -3, and repeating the step D when |r [n]-r[n-1] | < epsilon is not established.
E2, when the condition |r [n]-r[n-1] | < ε is satisfied, jump out of the loop, output an optimal value r *=r[n],P*=P[n]*=α[n],ρ*=ρ[n],/>β*=β[n],/>
Compared with the prior art, the technical scheme has the following advantages:
The present invention considers a transmission scheme of an RSMA-based Cell-free system in which a common message is used as a desired message at a legitimate user and as artificial noise at an eavesdropper without consuming additional transmission power. Under the constraints of common information as noise constraint, total power constraint of a transmitting end and the like, physical layer security and rate of a user are maximized through joint optimization of active beam forming vector and rate distribution.
The invention discloses a physical layer security and rate maximization method in a Cell-free system based on RSMA. The method considers the introduction of the rate division multiple access technology into the Cell-free system for the first time to improve the coverage of wireless signals, and proposes a method for jointly optimizing the active beam forming vector and the rate distribution under the constraint that a common message is used as noise constraint, the total power constraint of a transmitting end and the like.
The invention provides a Cell-free system based on RSMA, which considers the problem of physical layer safety and rate maximization in the system, sequentially solves a series of convex problems by using a continuous convex approximation method, and carries out iterative optimization on an optimization variable so as to obtain an optimal solution of the optimization variable, thereby maximizing the physical layer safety and rate in the system.
In the present description, each part is described in a progressive manner, and each part is mainly described as different from other parts, and identical and similar parts between the parts are mutually referred.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (1)

1. The transmission method of the Cell-free system based on RSMA is characterized by comprising the following steps:
Step A, a Cell-free system model based on a rate division multiple access technology RSMA is established, and received signals at legal users and eavesdroppers Eve are solved;
step B, respectively solving a transmission rate expression corresponding to the decoding public stream and the private stream at the legal user U k and the eavesdropper and a physical layer security rate expression which can be realized by the kth user;
step C, initializing an optimization variable in an iterative algorithm;
Substituting the value of the optimized variable in the nth iteration into a convex problem obtained by using a continuous convex approximation method, solving an optimal value by using a Newton steepest descent gradient method, and updating the value of the (n+1) th optimized variable by using the obtained optimal value of the optimized variable;
Step E, defining the condition for ending the iterative optimization;
The step A specifically comprises the following steps:
A1, establishing a Cell-free system model based on rate division multiple access, wherein the system model consists of M Access Points (APs), K legal users U k and a passive eavesdropper, each AP is provided with N antennas, the legal users and the eavesdropper are single antennas, and the APs are connected to a CPU through a perfect backhaul network, so that an error-free and higher-capacity connection is provided;
a2, at each AP, the message for U k is split into public and private parts according to the rate splitting principle, then all public parts are combined together and encoded into a public stream s c,sc to be decoded by all users, the private parts are each encoded into a private stream s k,sk to be decoded by only the corresponding users, the stream s= [ s c,s1,...,sK]T ] is linearly precoded using a precoder p= [ P c,p1,...,pK ], and the transmitted signal at the mth AP is:
A3, the received signals at the legal user U k and the eavesdropper are respectively: And/> Wherein/>Representing the wireless channel matrix between the mth access point and the kth legal user U k, respectively,/>, between the mth access point and the eavesdropperAnd/>Additive white gaussian noise at legal user U k and eavesdropper, respectively;
The step B specifically comprises the following steps:
And B1, based on the received signal obtained in the step A, at a receiving end, each legal user firstly takes all private streams as noise to decode the public streams, and the signal-to-interference-and-noise ratio of the decoded public streams at U k, K E { 1.. To ensure that the common message can be decoded at all legitimate users, the achievable rate of decoding the common message accordingly should be: r c=min{Rc,1,Rc,2,...,Rc,K }, where R c,k=log2(1+γc,k), K e {1,., K } is the achievable rate of decoding the common stream at U k;
B2, then delete the common stream from the received signal with SIC at U k, and decode s k at its corresponding private stream s k,Uk with the signal-to-interference-and-noise ratio: The corresponding achievable rates for decoding the private stream at U k are: r k=log2(1+γk);
B3, using the public message as a dual purpose, as a desired message at the legitimate user and as an artificial noise at the eavesdropper, in order for the public message to be considered as an artificial noise satisfying at the eavesdropper, the condition should be satisfied: c c,e≤Rc, wherein C c,e represents the rate at which the eavesdropper decodes the public message, assuming that the eavesdropper can eavesdrop on all users' private messages;
And B4, decoding the public stream and the private stream at the eavesdropper, wherein the received signal-to-interference-and-noise ratios are respectively as follows: And The corresponding achievable rates for decoding the public stream and the private stream at the eavesdropper are respectively: c c,e=log2(1+γc,e) and C k,e=log2(1+γk,e);
b5, the physical layer security rate achievable by the kth user is Wherein/>Indicating that the public message transmitted to U k can realize the safe rate, v k indicates the proportion of the public message of the kth user to realize the safe rate,/>Indicating that the private message transmitted to U k may achieve a secure rate;
The step C specifically comprises the following steps:
C1, setting the iteration number n=1, first using maximum ratio transmission and singular value decomposition to precoder Initializing precoder/>, for private stream s k Initialized to/>Wherein/>Precoder/>, for common stream s c Initialized to/>Where p c=(1-λ)Pt,uc is the eigenvector corresponding to the largest left singular value of the channel matrix h= [ g 1k,g2k,...,gMK ], which is calculated from uc=u (: 1), where h=usv H;
C2, auxiliary variables Respectively initialize to,/>
The step D specifically comprises the following steps:
D1, updating an optimization variable by utilizing a convex optimization problem obtained by a continuous convex approximation algorithm, wherein an objective function of the convex optimization problem is r, r represents the security and the speed of a physical layer of a system, constraint conditions of the convex optimization problem comprise private speed constraint of a user, public information is regarded as public speed constraint of artificial noise, and total power constraint at an AP (access point);
D2, user private rate constraints are specifically expressed as Ω[n](pk,gm,kk)≤ρk[n](pk,hmk,e)≥ρk,e,1+ρk[n]k)≤0,Wherein,
D3, the common rate constraint for treating common messages as artificial noise is specifically expressed asΩ[n](pc,gm,kc,k)≥ρc,k[n](pc,hmc,e)≤ρc,e,/>1+Ρ c,e[n]c,e) is less than or equal to 0; wherein,
D4, solving the convex optimization problem by utilizing the newton steepest descent gradient method, wherein the iteration process is η (m) = (t (m), P (m), α (m), α c(m),ρ(m),ρc(m),β(m),βc (m)),|Eta (m+1) -eta (m) | 2 < delta, where mu=0.39, delta=10 -3,/>To obtain optimal values of objective function and optimization variable for eta (m) gradient r*,P**c **c **,/>
D5, let iteration number n=n+1, update objective function and optimization variable in nth iteration based on the optimal value of objective function and optimization variable obtained in step D4, r [n]=r*,P[n]=P*[n]=α*,ρ[n]=ρ*,β[n]=β*,/>
The step E specifically comprises the following steps:
e1, setting convergence accuracy epsilon=10 -3, and repeating the step D when |r [n]-r[n-1] | < epsilon is not satisfied;
E2, when the condition |r [n]-r[n-1] | < ε is satisfied, jump out of the loop, output an optimal value r *=r[n],P*=P[n]*=α[n], ρ*=ρ[n],/>β*=β[n],/>
CN202111497328.5A 2021-12-09 2021-12-09 Transmission method of Cell-free system based on RSMA Active CN114143791B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111497328.5A CN114143791B (en) 2021-12-09 2021-12-09 Transmission method of Cell-free system based on RSMA

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111497328.5A CN114143791B (en) 2021-12-09 2021-12-09 Transmission method of Cell-free system based on RSMA

Publications (2)

Publication Number Publication Date
CN114143791A CN114143791A (en) 2022-03-04
CN114143791B true CN114143791B (en) 2024-04-26

Family

ID=80385079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111497328.5A Active CN114143791B (en) 2021-12-09 2021-12-09 Transmission method of Cell-free system based on RSMA

Country Status (1)

Country Link
CN (1) CN114143791B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114786182A (en) * 2022-04-21 2022-07-22 哈尔滨工业大学 Pre-coding optimization safety transmission method based on rate division multiple access
CN115276744B (en) * 2022-06-23 2024-12-03 河北中创盈和通信科技有限公司 Millimeter wave system transmission method based on rate division multiple access technology

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314932A (en) * 2020-01-17 2020-06-19 山东师范大学 Generalized rate division multiple access method for multi-cell system
CN113411165A (en) * 2021-06-18 2021-09-17 东南大学 Precoding and public message rate allocation method based on rate split transmission

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112714470B (en) * 2017-01-04 2022-09-02 华为技术有限公司 Communication method, terminal equipment and network equipment thereof
US10917919B2 (en) * 2018-05-31 2021-02-09 Qualcomm Incorporated Reference signal design for medium access in cellular V2X communication

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314932A (en) * 2020-01-17 2020-06-19 山东师范大学 Generalized rate division multiple access method for multi-cell system
CN113411165A (en) * 2021-06-18 2021-09-17 东南大学 Precoding and public message rate allocation method based on rate split transmission

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于在线支持张量机分类算法的中性点接地方式研究(英文)";冉静学;《机床与液压》;全文 *

Also Published As

Publication number Publication date
CN114143791A (en) 2022-03-04

Similar Documents

Publication Publication Date Title
CN112290995B (en) Safety and energy efficiency based beam design method in satellite-ground integrated network
Park et al. Joint design of fronthaul and access links for C-RAN with wireless fronthauling
CN114143791B (en) Transmission method of Cell-free system based on RSMA
CN113067610B (en) Millimeter wave NOMA system safe energy efficiency maximization power distribution method based on SWIPT
CN108736943B (en) Hybrid precoding method suitable for large-scale MIMO system
CN106953671B (en) Multi-address access method and device for signal in mobile communication
CN111756424B (en) A beam design method for mmWave cloud wireless access network based on secure transmission
CN114124171B (en) A method for physical layer security and rate maximization
Dai et al. Partially active message passing receiver for MIMO-SCMA systems
CN111030779B (en) A rateless code degree distribution optimization method for cloud access network compression transmission
CN113660051B (en) Method and system for maximizing energy efficiency of millimeter wave communication system
Ahmad et al. Interference mitigation via rate-splitting in cloud radio access networks
Ahmad et al. Rate splitting multiple access in C-RAN
Zhou et al. Physical-layer security for cache-enabled C-RANs via rate splitting
Kai et al. Max-min fairness in IRS-aided MISO broadcast channel via joint transmit and reflective beamforming
CN114501580B (en) Cooperative rate-splitting network secure transmission method with untrusted relay threat
Kim et al. Minimum rate maximization for wireless powered cloud radio access networks
CN114448479B (en) Massive MIMO (multiple input multiple output) safe transmission optimization method based on antenna selection
Jo et al. Joint precoding and fronthaul compression for cell-free MIMO downlink with radio stripes
CN112073965A (en) A kind of physical layer key generation method, electronic device and storage medium
Xu et al. Max-min fairness for uplink rate-splitting multiple access with finite blocklength
CN110933716A (en) A secure and low-latency mmWave transmission method based on edge caching
CN113922849B (en) A method for user grouping and power allocation in mmWave MIMO-NOMA system
Cheng et al. Generalized signal-space alignment based physical-layer network coding for distributed MIMO systems
Xia et al. Joint optimization of fronthaul compression and bandwidth allocation in heterogeneous CRAN

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant