Performance Analysis of Amplify and Forward Cooperative Networks over Rayleigh and Nakagami-m Channels based Relaying Selection
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 5
Abstract
In this paper investigates the performance, analysis of amplify and forward (AF) cooperative networks with the relay selection over  Nakagami-m and Rayleigh fading channels and  M-ary phase shift keying (MPSK) modulations. New closed form expressions are derived for the general cases of Rayleigh and Nakagami-m fading channels. cumulative density function (CDF), probability density function (PDF) of the end –to - end signal –to – nois ratio (SNR) of a dual-hop opportunistic AF relaying system, moment generating function (MGF), symbol error rate (SER) and outage probability (Pout). and the first closed-form study for opportunistic AF relaying system where the best node is selected from a number of candidate intermediate nodes to relay the data signal between the source and the destination. Simulation results reveal that the PDF , CDF, Pout and SER performance downgrades either the m parameter or the number of relays increases. Our simulations compared between Rayleigh and Nakagami-m links for a different number of relays. In addition, different modulation techniques are examined to show the effect of the modulation scheme which was used over Rayleigh and Nakagami-m fading channels on the cooperative networks. The obtained results proved the impact of m parameters, relay selection and modulation index on the pout and SER performance.
Authors and Affiliations
Ali Abdulwahhab Mohammed, Li Yu, Manar Al-Kali, Desheng Wang
Enhancement of Sales promotion using Clustering Techniques in Data Mart
Clustering is an important research topic in wide range of unsupervised classification application. Clustering is a technique, which divides a data into meaningful groups. K-means algorithm is one of the popular clusteri...
Fast Effective Deterministic Primality Test Using CUDA/GPGPU
There are great interests in understanding the manner by which the prime numbers are distributed throughout the integers. Prime numbers are being used in secret codes for more than 60 years now. Computer security authori...
Chaos Baker-based Image Encryption in Operation Modes
This research paper study the application of chaos baker map for digital image encryption in different operation modes. The employed modes include the electronic code book (ECB), cipher block chai...
Congestion Control for Fault Tolerant Multicast Routing in MANET
Mobile Ad hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized admini...
A Novel Technique for Trust Delivery in the Cloud
For many organizations, keeping data private and secure has also become a compliance requirement. Cloud providers offering Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) offer a “shared responsibil...