Escolar Documentos
Profissional Documentos
Cultura Documentos
I. I NTRODUCTION
c 2010 IEEE
0090-6778/10$25.00
JU and KIM: RELAY SELECTION WITH ANC AND TDBC PROTOCOLS IN BIDIRECTIONAL RELAY NETWORKS
3501
Rayleigh fading channel.1 Also, we can accommodate pathloss effect by choosing appropriate values for 0 , 1, , and
2, . Specifically, let 1 , denote the distance between S1
and R , and 2 , , the distance between S2 and R , both of
which are normalized by the distance between S1 and S2 .
Therefore, we have 1 , + 2 , = 1. Furthermore, we set
the path-loss exponent as four to model radio propagation in
urban areas [26]. As a result, we set 0 = 1, 1, = 4
1 , ,
4
and 2, = (1 1 , ) where = 1, , .
In the ANC protocol, there are two opposite traffic flows:
one is from S1 via R to S2 , and the other is S2 via R to
S1 . For the first traffic flow, R and S2 are the receivers.
Thus, it is reasonable to assume that R knows 1, , and
S2 knows {1, , 2, : = 1, , } as in the traditional
unidirectional relay network [27][29].2 Similarly, considering
the second traffic flow, it is reasonable to assume that R
knows 2, , and S1 knows {1, , 2, : = 1, , }. In
total, we assume that both end-sources know all the channel
coefficients {1, , 2, : = 1, , }, and that each relay R
knows the channel coefficients 1, and 2, . In a similar way,
for the TDBC protocol, we assume that both end-sources know
all the channel coefficients {0 , 1, , 2, : = 1, , }, and
that each relay R knows the channel coefficients 1, and
2, . Compared with the ANC, the TDBC needs additional
channel information on 0 at both end-sources because the
TDBC utilizes the direct-path between the two end-sources,
while the ANC cannot utilize the direct-path due to the halfduplex constraint even if such direct-path physically exists.
The channel information assumption adopted in this paper
has been made in almost all previous works3 on AF-based
bidirectional protocols [4][9], [12].4
A. ANC Protocol with Multiple Relays
ANC = 1, 1 + 2, 2 + ANC
,
(1)
1 Also, it is an interesting topic to investigate a system for frequencyselective Rayleigh/Rician/Nakagami fading channels with timing errors [25].
2 Note that R is the receiver associated only with the path from S to R ;
1
3502
Since S knows its own symbol and all thechannel coefficients, it can remove the self-interference, i.e. 21, 1
ANC
for S1 and 22, 2 for S2 , from ,
in (2). Therefore,
ANC
and
S1 and S2 can obtain new interference-free signals 1,
ANC
2, , respectively, as follows:
ANC
ANC
1,
= 1, 2, 2 + 1, ANC
+ 1,
,
(5)
ANC
ANC
ANC
+ 2, .
2, = 1, 2, 1 + 2,
(6)
R1
S1
Rl
S2
RL
(a) ANC protocol with multiple relays
R1
Rl
ANC
1,
=
RL
S1
ANC
2,
=
Time slot 3
Fig. 1. System models for the ANC and TDBC protocols with multiple
relays. In the ANC protocol, the direct-path between S1 and S2 is not plotted,
because it cannot be utilized due to the half-duplex constraint even if such
direct-path physically exists.
ANC
ANC
,
= , ANC + ,
= , 1, 1 + , 2, 2
ANC
+ , ANC
+ ,
,
(2)
ANC
is the
where is the transmission power at R , and ,
ANC
AWGN at S with , (0, 1) for = 1, 2. In order to
ensure that the transmission power at R is , the amplifying
coefficient should be determined as follows:
1
.
=
2
(1, + 2, 2 ) + 1
(3)
(7)
S2
Time slot 1
1, 2,
,
1, + ( + )2,
(4)
1, 2,
.
( + )1, + 2,
(8)
ANC
in
In Section III.A, based on the instantaneous SNRs 1,
ANC
(7) and 2, in (8), we will study RS for the ANC protocol.
Remark: Comparison of the ANC and physical-layer network coding (PNC): The ANC and PNC are very similar
in many aspects: they need two time slots for bidirectional
communication between two sources with the help of a relay;
and under a half-duplex constraint, they cannot exploit the
direct-path between two sources even if such direct-path
physically exists. Thus, the diversity order of both protocols
is just one. On the other hand, the two protocols have many
different features. The capacity region of the ANC is expressed
by the end-to-end SNRs at both sources, while the capacity
region of the PNC is limited by the MAC capacity region. The
detection complexity of the PNC protocol is much higher than
that of ANC protocol. The bit-error rate (BER) performance
of the PNC protocol is slightly better than that of the ANC
protocol when binary phase shift keying (BPSK) is adopted
and there is one relay, which can be seen in Fig. 2.
TDBC
TDBC
TDBC
TDBC
= 0 2 +1,0
; 2,0
= 0 1 +2,0
,
1,0
(9)
TDBC
TDBC
where ,0
is the AWGN at S with ,0
(0, 1)
for = 1, 2. Consequently, the instantaneous SNRs of the two
TDBC
TDBC
and 2,0
in (9), are identical
direct-path signals, 1,0
TDBC
, where 0TDBC = 0 2 .
and they are denoted by 0
TDBC
We then consider the relay-path signals. We let 1,
denote the signal transmitted from S1 and received by R at
JU and KIM: RELAY SELECTION WITH ANC AND TDBC PROTOCOLS IN BIDIRECTIONAL RELAY NETWORKS
10
PNC
ANC
10
Average BER
10
10
TDBC
= 2, 1, 2, 2 + 1, 1, TDBC
1,
1,
TDBC
+ 2, 1, TDBC
+
,
(15)
2,
1,
TDBC
2,
= 1, 1, 2, 1 + 1, 2, TDBC
1,
TDBC
TDBC
+ 2, 2, 2,
+ 2,
.
(16)
Then, using the approximate , in (13), the instantaneous
TDBC
TDBC
TDBC
SNRs 1,
of the signal 2,
in (16) and 2,
of the
TDBC
signal 1,
in (15) are given by, respectively,
10
10
3503
10
15
20
10 log10 E
25
30
35
40
Fig. 2. Average BER against 10 log10 of the ANC and PNC with one
relay when BPSK is adopted. = = . 1,1 = 2,1 = 1.
TDBC
the first time slot, and let 2,
denote the signal transmitted
from S2 and received by R at the second time slot. Then
TDBC
,
is given by
TDBC
,
= , + TDBC
,
(10)
,
where TDBC
is the AWGN at R with TDBC
(0, 1)
,
,
for = 1, 2. At the third time slot, R first combines the two
TDBC
TDBC
received signals 1,
and 2,
, and then it broadcasts the
TDBC
combined signal. Specifically, the two received signals 1,
TDBC
and 2,
are combined as follows:
TDBC
TDBC
TDBC
= 1, 1,
+ 2, 2,
.
(11)
TDBC 2
Since [,
] = , + 1, we can make TDBC
in (11)
,
,
(12)
, =
, + 1
,
,
.
(13)
,
Through numerical results, in Section VI, we will also demonstrate that the approximate , in (13) yields very accurate
results over the entire SNR range.
After combining the two received signals, R broadcasts the
in (11) to S1 and S2 , and the signal
combined signal TDBC
TDBC
,
received by S is given by
TDBC
TDBC
,
= , TDBC
+ ,
,
(14)
TDBC
TDBC
where ,
is the AWGN at S with ,
(0, 1)
for = 1, 2. Similar to the ANC protocol, since S knows its
1, 1, 2,
,
( + 2, )1, + 1, 2,
2, 1, 2,
=
.
2, 1, + ( + 1, )2,
TDBC
1,
=
(17)
TDBC
2,
(18)
1
ANC
log2 (1 + 2,
).
(20)
2
In a multiuser system, the system is in outage if any user
is in outage [23, eq. (25)], [24]. Since there are two opposite
traffic flows from two different users in the same channel, the
ANC protocol can be considered as a two-user system, which
is a special case of a multiuser system. Therefore, the -th
ANC
in
relay-path of the ANC protocol is in outage if either 1,
ANC
(19) or 2, in (20) is smaller than a target rate. Since the
two end-sources are equivalent terminals, it is fair to set the
target rate of each source as /2, where denotes a target rate
ANC
=
2,
5 Since detection/decoding is not involved at the relay, the mutual information of the ANC is expressed by the end-to-end SNRs at both end-sources.
On the other hand, the achievable rate region of the PNC is limited by the
sum-rate constraint as well as individual rate constraints at the MAC phase
because the relay detects/decodes the incoming signals from two end-sources.
3504
ANC
ANC
ANC
out,
or 2,
() = Pr 1,
<
<
2
2
]
[
ANC
ANC
, 2,
]<
.
(21)
= Pr min[1,
2
1
TDBC
log2 (1 + 0TDBC + 2,
).
3
(25)
TDBC
() of the
Similar to (21), the outage probability out,
-th relay-path with the direct-path of the TDBC protocol is
given by
[
]
TDBC
TDBC
TDBC
out,
() = Pr min[1,
, 2,
]<
.
(26)
2
over all the relays. That is, the index of the selected relay
must be determined as follows:6
=1, ,
(22)
ANC
ANC
ANC
out () = Pr max min[1, , 2, ] <
. (23)
=1, ,
2
Note that the selection rule in (22), which maximizes the
ANC
ANC
and 2,
, also
minimum mutual information between 1,
minimizes the outage probability in (23). In Section IV, using
(23), we will derive the outage probability of the RS in the
ANC protocol.
B. RS in TDBC Protocol
In this subsection, we propose an RS scheme for the TDBC
protocol. Similar to the ANC protocol, there are two opposite
traffic flows between S1 and S2 . For the traffic flow from S1
to S2 , two channels are involved: the relay-path channel from
S1 via R to S2 and the direct-path channel from S1 directly to
TDBC
of the two channels
S2 . Then the mutual information 1,
is given by
1
TDBC
log2 (1 + 0TDBC + 1,
),
(24)
3
where we use the pre-log factor 1/3 because communication
from S1 to S2 is done during three time slots. In the same
TDBC
1,
=
=1, ,
(27)
TDBC
TDBC
TDBC
out () = Pr max min[1,
, 2,
]<
.
=1, ,
2
(28)
Note that the selection rule in (27), which maximizes the
TDBC
TDBC
and 2,
,
minimum mutual information between 1,
also minimizes the outage probability in (28). In Section V,
using (28), we derive the outage probability of the RS in the
TDBC protocol.
IV. O UTAGE P ROBABILITY FOR RS IN ANC P ROTOCOL
In this section, we derive the outage probability of the RS
in the ANC protocol. Using (19) and (20), we first rewrite the
ANC
() in (23) as follows:
outage probability out
ANC
out
()
]
[
[
]
ANC
ANC
), log2 (1 + 2,
) <
= Pr max min log2 (1 + 1,
=1, ,
[
]
)
(
ANC
ANC
= Pr max log2 1 + min[1,
, 2,
] <
(29)
=1, ,
]
[
(
)
ANC
ANC
, 2,
] < .
(30)
= Pr log2 1 + max min[1,
=1, ,
(31)
JU and KIM: RELAY SELECTION WITH ANC AND TDBC PROTOCOLS IN BIDIRECTIONAL RELAY NETWORKS
(
)
1 ; 1 , 2 , 3 , 4 , 5 =
(
)
5
4
(4 + 5 )(1 + (2 + 3 ))
+
exp
4 + 5
4 + 5
1 3 1, 2,
(
)
(
)[
)
( +
2 + 3
2 + 3
1
2
3
+
1 2
exp
2
1 3 4
3 5
1 32 1, 2,
1 32 1, 2,
)+1
(
)]
(
(1) (2 + 3 )
+2
!
1 3 5
3 4
=0
Note that 1 (; 1 , 2 , 3 , 4 , 5 ) in (33) involves only standard functions: the exponential function, the modified Bessel
function, and the exponential integral function. Also, one can
calculate recursively the exponential integral function +1 ()
for = 1, 2, , as follows [32]:
)
1(
exp() () ,
for > 0.
+1 () =
2 +3 (3 )
2
< lim
= 0.
lim
= lim
1,
+ 1 +2 (3 )
+ 1
By the ratio test [33],8 therefore, it can be shown that the
series expansion in (33) is convergent.
(),
(34)
=1
= 2 1.
where
a series
=0 , we define := lim +1 / . If < 1,
then the series converges absolutely; if > 1, then the series diverges; and
if = 1, then the series is inclusive [33].
8 For
3505
(33)
(35)
(36)
(
)
1 ;
( 2, , 1, , , 1, , 2, )
1,
+(1 ; 1, , 2, , , 2, , 1, ,
2 ; ( + 2, )1, , 1, 2, , 1 + 2, / ,
=
2,
(
)
,
(
+
)
,
1
+
/ ,
2
2,
1,
1,
2,
1,
3,
(37)
where 1: (0 1, 1/2 and (1
21, ) ) or (1/2 < 1, 1 and (21, 1) );
2: 0 1, 1/2 and < (1 21, ) ; and
3: 1/2 < 1, 1 and < (21, 1) . In the above
equation,
(
)
2 ; 1 , 2 , 3
(
)
) (
(1
23
23
1)
=1
exp 3
+
. (38)
1
1
2
1 2
1 2
Proof: See Appendix B.
3506
TDBC
Theorem 4: The outage probability out
() of the RS
in the TDBC protocol is given by
)
(
exp (/( 0 ))
TDBC
out () =
( )
,
0
0
=1
(39)
= 21.5 1.
where
TDBC
() in (35)
Proof: Let 2 = max=1, , . Then out
can be given by
(
)
]
[
TDBC
() = Pr log2 1 + 0TDBC + 2 < 1.5
out
[
]
TDBC ().
Pr 2 <
(40)
=
0
0
TDBC
Although the obtained outage probability out
() in
(39) is very accurate, the final expression is given in a oneintegral form, which requires numerical integration. Therefore,
it should be also useful to derive a closed-form bound of the
outage probability. In the next subsection, we derive a lower
bound of the outage probability in closed-form, which does
not involve any numerical integration.
B. Lower Bound of Outage Probability in Closed-Form
In the performance analysis of relay networks, the following
inequality has widely been used [13], [27]: 1 2 /(1 + 2 ) <
min[1 , 2 ], where 1 > 0 and 2 > 0. Using this inTDBC
TDBC
and 2,
,
equality, the minimum value between 1,
TDBC
TDBC
min[1,
, 2,
], is upper-bounded by
TDBC
TDBC
, 2,
]
min[1,
[
]
[
1,
2, ,
< min min 1, ,
+ 2,
]]
[
2,
min
1, , 2,
+ 1,
[
]
1,
2,
= min 1, ,
2, ,
1, , 2,
+ 2,
+ 1,
U
(41)
=: .
(42)
1,
2,
3.
(43)
Proof: See Appendix C.
TDBC
() of the
Theorem 5: The closed-form lower bound out,LB
outage probability of the RS in the TDBC protocol is given
by
(
TDBC
out,LB
() = 1 exp
+
(1)
0
1 =1
=1
=1
!
1 <<
)
(
)
( ) exp /(
0 )
exp
=1
.
1 0 =1 ( )
(44)
Proof: See Appendix D.
TDBC
Note that since the lower bound out,LB
() of (44) is given
in closed-form, it does not require any numerical integration.
TDBC
() of (44) reduces to [12, eq. (26)]
Also, note that out,LB
when = 1 and 1, = 2, = 1/2 for = 1, , .
Therefore, the analysis in this subsection can be considered
as a generalization of that of [12].
VI. S IMULATION R ESULTS
In this section, we first discuss the convergence speed of
the series expression in (33), which was analytically shown
to be convergent in Section IV. Then, for the proposed RS in
the ANC and TDBC protocols, we check the accuracy of the
obtained outage probabilities by comparing our analysis with
Monte Carlo simulations. Finally, we compare the RS in the
ANC protocol with the RS in the TDBC protocol.
A. Convergence Speed of Series Expression in (33)
In this subsection, we check the convergence speed of the
( ) (; 1 , 2 , 3 , 4 , 5 )
series expression in (33). We let
1
denote a truncated version of 1 (; 1 , 2 , 3 , 4 , 5 ) with
truncation
window size , i.e.,
1 (; 1 , 2 , 3 , 4 , 5 ) of
(33) with
=0 replaced by
=0 . Then we define ( )
as the truncation error normalized by 1 (; 1 , 2 , 3 , 4 , 5 )
as follows:
( ) :=
()
1 (; 1 , 2 , 3 , 4 , 5 )
1 (; 1 , 2 , 3 , 4 , 5 )
1 (; 1 , 2 , 3 , 4 , 5 )
(
)
( +
1 )
2
3
+
= exp
1 3 4
3 5
(
)+1
(
)
(1)
(2 +3 )
+2
=+1 !
1 3 5
3 4
.
1 (; 1 , 2 , 3 , 4 , 5 )
(45)
JU and KIM: RELAY SELECTION WITH ANC AND TDBC PROTOCOLS IN BIDIRECTIONAL RELAY NETWORKS
3507
10
(N) for E = 10 dB
(N) for E = 20 dB
(N) for E = 30 dB
10
10
10
L=1
2
10
Outage probability
10
10
10
L=2
10
10
L=3
10
10
10
L=4
12
10
3
N
10
0.1
0.2
0.3
0.4
0.5
d
0.6
0.7
0.8
0.9
S ,R
1
10
() of (34).
10
Outage probability
10
L=1
3
10
10
10
L=2
L=3
L=4
10
10
15
20
10 log
10
25
E
30
35
40
45
3508
10
10
10
10
10
Outage probability
Outage probability
10
10
10
10
10
10
R=1
4
L=3
10
R=4
R=3
L=2
5
10
L=4
10
R=2
10
L=1
10
15
20
25
30
10
35
10
15
20
10 log
10 log10 E
10
Fig. 6. Outage probability against 10 log10 of the RS in the TDBC protocol. = 1, 2, 3, 4. = 1 bps/Hz. = = . 0 = 1, = 2, = 1
()
and 1, = 2, = 1/2 where = 1, , . = 2 in () for
() of (39).
25
30
35
()
() for () of (39).
() of (34) and
10
10
10
10
L=1
10
Outage probability
Outage probability
10
L=2
10
R=3
2
10
R=2
10
10
L=3
R=1
10
10
L=4
5
10
6
10
0.1
0.2
0.3
0.4
0.5
d
0.6
0.7
0.8
0.9
0.1
S ,R
0.3
0.4
0.5
d
0.6
0.7
0.8
0.9
0.2
S ,R
VII. C ONCLUSIONS
In this paper, we have studied RS for the ANC and TDBC
protocols in a bidirectional relay network consisting of two
end-sources and multiple relays. A single best relay was
selected depending on channel conditions to help bidirectional
communication between the two end-sources. Specifically, we
have selected a single best relay based on a max-min criterion
to minimize the outage probabilities of the ANC and TDBC
protocols. Then, for the RS in the ANC protocol, we have
derived a closed-form expression of the outage probability.
Also, for the RS in the TDBC protocol, we have derived
JU and KIM: RELAY SELECTION WITH ANC AND TDBC PROTOCOLS IN BIDIRECTIONAL RELAY NETWORKS
(
)
1, 2,
.
=
( 1, + ( + )2, )(( + )1, + 2, )
(A.1)
2 1, 2,
3509
1 =
1, ()2, ()
=0
=0
)
= 1+ (+
2, ()
)
1+ (+
( + )
=0
) 1,
1+
( + )
1, ()2, ()
)
1, ()2, ()
)
( + )
2, ()
=: 11 12 13 ,
(A.8)
exp(( + )/( 1, ))
( ( + ) )
2,
1+
(
)
2
( + )
exp
2 1, ( / ) 2,
(
)
( + )2
exp
=
,
We first solve 1 as follows:
2
( + )
2,
1,
2,
]
[
1 = Pr ( 2, )1, < ( + )2, , 1, < 2, .
(A.10)
(
(
))
(A.4)
Since the first condition, ( 2, )1, < ( + where = exp ( + )/( 1, ) + 1/( 2, ) .
)2, , of the probability in the right-hand side of (A.4) Since we have no closed-form solution to (A.10), we rewrite
is always satisfied for 2, / , the probability 1 in (A.10) as follows:
(
)
( + )2
(A.4) can be divided into two parts:
exp
13 =
[
]
2, 0
2 1,
2,
1 = Pr 1, < 2, , 2,
(
)
)
( +
( + )2
[
]
exp
.
]
[ ( + )
2, 0
2 1,
2,
2,
+ Pr 1, < min
, 2, , 2, >
.
(A.11)
2,
(A.5) Using [32, eq. (3.324.1)], the first part of the right
2,
(
)
( + )
2, ,
we tackle this problem by adopting
expansion of
1
+
,
<
2,
a series
(
)
=
exponential
function,
exp()
=
.
Substituting
the
(
+
)
(
+
)
2,
=0 !
.
2, , 2, > 1 +
[
]
(
)
exp
( + )
2, 0
2 1, 2,
1 = Pr 1, < 2, , 2,
1+
1
( )
(1) +1
[
2
1
exp
(A.12)
=
( + )2,
!
+ Pr 1, <
,
0 =0
2,
(1) +1
1
( + ) )
(
=
+2 (2 ),
(A.13)
1+
2, >
.
(A.7)
!
=0
13 =
3510
X 2,l = X 1,l
X 2,l
w w( E s + E r )
+
Er
Es Er
w
Er
P ROOF OF L EMMA 3
w( E s + E r ) X 2,l
P1 = Pr X 1,l <
s E r X 2 ,l E s w
[
]
(11, )
1,
min +
, 1,
1,
2,
+(1
)
1,
]1,
[
1,
2,
min 1, , +(1
=
2, ,
1, )
[
]
(1
)
1,
min
3.
+1, 1, , 2, ,
(C.1)
X 1,l
Fig. 10.
A PPENDIX B
P ROOF OF T HEOREM 3
TDBC
TDBC
2,
is
From (17) and (18), the difference 1,
given at the top of the next page. Depending on the values
( , , 1, , 1, , 2, ), in (36) is given by
TDBC
TDBC
, 2,
], 1,
min[1,
TDBC
,
2,
1,
=
TDBC
2,
,
3.
(B.2)
(B.3)
A PPENDIX D
P ROOF OF T HEOREM 5
Taking a step similar to (39), one can obtain the lower bound
TDBC
out,LB
() as follows:
)
(
exp (/( 0 ))
TDBC
out,LB () =
U ( )
.
0
0
=1
(D.1)
)
(
Using the product identity
1 ()
= 1 +
=1
1 =1, , =1
=1 (1)
=1 ( ), one can rewrite the
1 <<
expression =1 () in (D.1) as follows:
=1
U ()
=1+
=1
(1)
1 =1
(
exp
=1
1 <<
)
( ) .
=1
(D.2)
Then, substituting (D.2) into (D.1) and taking a simple integration, one can obtain the final closed-form result in (44).
R EFERENCES
[1] A. Sendonaris, E. Erkip, and B. Aazhang, User cooperation
diversitypart I, II, IEEE Trans. Commun., vol. 51, pp. 19271948,
Nov. 2003.
[2] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, Cooperative diversity in wireless networks: efficient protocols and outage behavior,
IEEE Trans. Inf. Theory, vol. 50, pp. 30623080, Dec. 2004.
[3] B. Rankov and A. Wittneben, Spectral efficient protocols for halfduplex fading relay chnnels, IEEE J. Sel. Areas Commun., vol. 25,
pp. 379389, Feb. 2007.
[4] S. Katti, S. Gollakota, and D. Katabi, Embracing wireless interference: analog network coding, in Proc. ACM SIGCOMM, 2007, pp.
397408.
[5] P. Popovski and H. Yomo, Wireless network coding by amplify-andforward for bi-directional traffic flows, IEEE Commun. Lett., vol. 11,
pp. 1618, Jan. 2007.
[6] X. Tang and Y. Hua, Optimal design of non-regenerative MIMO
wireless relays, IEEE Trans. Wireless Commun., vol. 6, pp. 1398
1407, Apr. 2007.
[7] R. Zhang, Y.-C. Liang, C. C. Chai, and S. Cui, Optimal beamforming
for two-way multi-antenna relay channel with analogue network
coding, IEEE J. Sel. Areas Commun., vol. 27, pp. 699712, June
2009.
JU and KIM: RELAY SELECTION WITH ANC AND TDBC PROTOCOLS IN BIDIRECTIONAL RELAY NETWORKS
TDBC
TDBC
1,
2,
(
)
1, 2, 1, ( + (21, 1) )2, (1 1, )( (21, 1) )1,
)(
)
= (
( + (1 1, ) )1, + 1, 2, (1 1, ) 1, + ( + 1, )2,
]
(1 1, )
1, ( + 1, )
2,
U () = Pr
1, < , 1, <
+ 1,
(1 1, )( + (1 1, ) )
]
[
1, ( + 1, )
1,
2,
2, < , 1,
+ Pr
+ (1 1, )
(1 1, )( + (1 1, ) )
+1,
(11, )
=
1, ()2, ()
(1
)( +(1
) )
3511
(B.1)
=0
( +(11, ) )
1,
=0
1,
1,
1, ( +1, )
1, ( +1, )
1, )( +(11, ) )
= (1
(C.2)
1, ()2, ()
(C.3)